1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 28 #include <sys/types.h> 29 #include <sys/inttypes.h> 30 #include <sys/systm.h> 31 #include <sys/elf.h> 32 #include <sys/elf_notes.h> 33 34 #include <util/memcpy.h> 35 36 #include "dboot_xboot.h" 37 #include "dboot_elfload.h" 38 #include "dboot_printf.h" 39 40 static caddr_t elf_file = 0; 41 42 #define PGETBYTES(offset) ((void *)(elf_file + (offset))) 43 44 static void * 45 getehdr(void) 46 { 47 uchar_t *ident; 48 void *hdr = NULL; 49 50 ident = PGETBYTES(0); 51 if (ident == NULL) 52 dboot_panic("Cannot read kernel ELF header"); 53 54 if (ident[EI_MAG0] != ELFMAG0 || ident[EI_MAG1] != ELFMAG1 || 55 ident[EI_MAG2] != ELFMAG2 || ident[EI_MAG3] != ELFMAG3) 56 dboot_panic("not an ELF file!"); 57 58 if (ident[EI_CLASS] == ELFCLASS32) 59 hdr = PGETBYTES(0); 60 else if (ident[EI_CLASS] == ELFCLASS64) 61 hdr = PGETBYTES(0); 62 else 63 dboot_panic("Unknown ELF class"); 64 65 return (hdr); 66 } 67 68 69 /* 70 * parse the elf file for program information 71 */ 72 int 73 dboot_elfload64(uintptr_t file_image) 74 { 75 Elf64_Ehdr *eh; 76 Elf64_Phdr *phdr; 77 Elf64_Shdr *shdr; 78 caddr_t allphdrs, sechdrs; 79 int i; 80 paddr_t src; 81 paddr_t dst; 82 paddr_t next_addr; 83 84 elf_file = (caddr_t)file_image; 85 86 allphdrs = NULL; 87 88 eh = getehdr(); 89 if (eh == NULL) 90 dboot_panic("getehdr() failed"); 91 92 if (eh->e_type != ET_EXEC) 93 dboot_panic("not ET_EXEC, e_type = 0x%x", eh->e_type); 94 95 if (eh->e_phnum == 0 || eh->e_phoff == 0) 96 dboot_panic("no program headers"); 97 98 /* 99 * Get the program headers. 100 */ 101 allphdrs = PGETBYTES(eh->e_phoff); 102 if (allphdrs == NULL) 103 dboot_panic("Failed to get program headers e_phnum = %d", 104 eh->e_phnum); 105 106 /* 107 * Get the section headers. 108 */ 109 sechdrs = PGETBYTES(eh->e_shoff); 110 if (sechdrs == NULL) 111 dboot_panic("Failed to get section headers e_shnum = %d", 112 eh->e_shnum); 113 114 /* 115 * Next look for interesting program headers. 116 */ 117 for (i = 0; i < eh->e_phnum; i++) { 118 /*LINTED [ELF program header alignment]*/ 119 phdr = (Elf64_Phdr *)(allphdrs + eh->e_phentsize * i); 120 121 /* 122 * Dynamically-linked executable. 123 * Complain. 124 */ 125 if (phdr->p_type == PT_INTERP) { 126 dboot_printf("warning: PT_INTERP section\n"); 127 continue; 128 } 129 130 /* 131 * at this point we only care about PT_LOAD segments 132 */ 133 if (phdr->p_type != PT_LOAD) 134 continue; 135 136 if (phdr->p_flags == (PF_R | PF_W) && phdr->p_vaddr == 0) { 137 dboot_printf("warning: krtld reloc info?\n"); 138 continue; 139 } 140 141 /* 142 * If memory size is zero just ignore this header. 143 */ 144 if (phdr->p_memsz == 0) 145 continue; 146 147 /* 148 * If load address 1:1 then ignore this header. 149 */ 150 if (phdr->p_paddr == phdr->p_vaddr) { 151 if (prom_debug) 152 dboot_printf("Skipping PT_LOAD segment for " 153 "paddr = 0x%lx\n", (ulong_t)phdr->p_paddr); 154 continue; 155 } 156 157 /* 158 * copy the data to kernel area 159 */ 160 if (phdr->p_paddr != FOUR_MEG && phdr->p_paddr != 2 * FOUR_MEG) 161 dboot_panic("Bad paddr for kernel nucleus segment"); 162 src = (uintptr_t)PGETBYTES(phdr->p_offset); 163 dst = ktext_phys + phdr->p_paddr - FOUR_MEG; 164 if (prom_debug) 165 dboot_printf("copying %ld bytes from ELF offset 0x%lx " 166 "to physaddr 0x%lx (va=0x%lx)\n", 167 (ulong_t)phdr->p_filesz, (ulong_t)phdr->p_offset, 168 (ulong_t)dst, (ulong_t)phdr->p_vaddr); 169 (void) memcpy((void *)(uintptr_t)dst, 170 (void *)(uintptr_t)src, (size_t)phdr->p_filesz); 171 172 next_addr = dst + phdr->p_filesz; 173 } 174 175 176 /* 177 * Next look for bss 178 */ 179 for (i = 0; i < eh->e_shnum; i++) { 180 shdr = (Elf64_Shdr *)(sechdrs + eh->e_shentsize * i); 181 182 /* zero out bss */ 183 if (shdr->sh_type == SHT_NOBITS) { 184 if (prom_debug) 185 dboot_printf("zeroing BSS %lu bytes from " 186 "physaddr 0x%" PRIx64 187 " (end=0x%" PRIx64 ")\n", 188 (ulong_t)shdr->sh_size, 189 next_addr, 190 next_addr + shdr->sh_size); 191 (void) memset((void *)(uintptr_t)next_addr, 0, 192 shdr->sh_size); 193 break; 194 } 195 } 196 197 /* 198 * Ignore the intepreter (or should we die if there is one??) 199 */ 200 return (0); 201 }