1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22 /*
23 * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
24 * Use is subject to license terms.
25 */
26
27 /*
28 * Copyright 2020 Joyent, Inc.
29 */
30
31 #include <sys/types.h>
32 #include <sys/inttypes.h>
33 #include <sys/systm.h>
34 #include <sys/elf.h>
35 #include <sys/elf_notes.h>
36
37 #include <util/memcpy.h>
38
39 #include "dboot_xboot.h"
40 #include "dboot_elfload.h"
41 #include "dboot_printf.h"
42
43 static caddr_t elf_file = 0;
44
45 #define PGETBYTES(offset) ((void *)(elf_file + (offset)))
46
47 static void *
getehdr(void)48 getehdr(void)
49 {
50 uchar_t *ident;
51 void *hdr = NULL;
52
53 ident = PGETBYTES(0);
54 if (ident == NULL)
55 dboot_panic("Cannot read kernel ELF header");
56
57 if (ident[EI_MAG0] != ELFMAG0 || ident[EI_MAG1] != ELFMAG1 ||
58 ident[EI_MAG2] != ELFMAG2 || ident[EI_MAG3] != ELFMAG3)
59 dboot_panic("not an ELF file!");
60
61 if (ident[EI_CLASS] == ELFCLASS32)
62 hdr = PGETBYTES(0);
63 else if (ident[EI_CLASS] == ELFCLASS64)
64 hdr = PGETBYTES(0);
65 else
66 dboot_panic("Unknown ELF class");
67
68 return (hdr);
69 }
70
71
72 /*
73 * parse the elf file for program information
74 */
75 int
dboot_elfload64(uintptr_t file_image)76 dboot_elfload64(uintptr_t file_image)
77 {
78 Elf64_Ehdr *eh;
79 Elf64_Phdr *phdr;
80 Elf64_Shdr *shdr;
81 caddr_t allphdrs, sechdrs;
82 int i;
83 paddr_t src;
84 paddr_t dst;
85 paddr_t next_addr;
86
87 next_addr = 0;
88 elf_file = (caddr_t)file_image;
89
90 allphdrs = NULL;
91
92 eh = getehdr();
93 if (eh == NULL)
94 dboot_panic("getehdr() failed");
95
96 if (eh->e_type != ET_EXEC)
97 dboot_panic("not ET_EXEC, e_type = 0x%x", eh->e_type);
98
99 if (eh->e_phnum == 0 || eh->e_phoff == 0)
100 dboot_panic("no program headers");
101
102 /*
103 * Get the program headers.
104 */
105 allphdrs = PGETBYTES(eh->e_phoff);
106 if (allphdrs == NULL)
107 dboot_panic("Failed to get program headers e_phnum = %d",
108 eh->e_phnum);
109
110 /*
111 * Get the section headers.
112 */
113 sechdrs = PGETBYTES(eh->e_shoff);
114 if (sechdrs == NULL)
115 dboot_panic("Failed to get section headers e_shnum = %d",
116 eh->e_shnum);
117
118 /*
119 * Next look for interesting program headers.
120 */
121 for (i = 0; i < eh->e_phnum; i++) {
122 /*LINTED [ELF program header alignment]*/
123 phdr = (Elf64_Phdr *)(allphdrs + eh->e_phentsize * i);
124
125 /*
126 * Dynamically-linked executable.
127 * Complain.
128 */
129 if (phdr->p_type == PT_INTERP) {
130 dboot_printf("warning: PT_INTERP section\n");
131 continue;
132 }
133
134 /*
135 * at this point we only care about PT_LOAD segments
136 */
137 if (phdr->p_type != PT_LOAD)
138 continue;
139
140 if (phdr->p_flags == (PF_R | PF_W) && phdr->p_vaddr == 0) {
141 dboot_printf("warning: krtld reloc info?\n");
142 continue;
143 }
144
145 /*
146 * If memory size is zero just ignore this header.
147 */
148 if (phdr->p_memsz == 0)
149 continue;
150
151 /*
152 * If load address 1:1 then ignore this header.
153 */
154 if (phdr->p_paddr == phdr->p_vaddr) {
155 if (prom_debug)
156 dboot_printf("Skipping PT_LOAD segment for "
157 "paddr = 0x%lx\n", (ulong_t)phdr->p_paddr);
158 continue;
159 }
160
161 /*
162 * copy the data to kernel area
163 */
164 if (phdr->p_paddr != FOUR_MEG && phdr->p_paddr != 2 * FOUR_MEG)
165 dboot_panic("Bad paddr for kernel nucleus segment");
166 src = (uintptr_t)PGETBYTES(phdr->p_offset);
167 dst = ktext_phys + phdr->p_paddr - FOUR_MEG;
168 if (prom_debug)
169 dboot_printf("copying %ld bytes from ELF offset 0x%lx "
170 "to physaddr 0x%lx (va=0x%lx)\n",
171 (ulong_t)phdr->p_filesz, (ulong_t)phdr->p_offset,
172 (ulong_t)dst, (ulong_t)phdr->p_vaddr);
173 (void) memcpy((void *)(uintptr_t)dst,
174 (void *)(uintptr_t)src, (size_t)phdr->p_filesz);
175
176 next_addr = dst + phdr->p_filesz;
177 }
178
179
180 /*
181 * Next look for bss
182 */
183 for (i = 0; i < eh->e_shnum; i++) {
184 shdr = (Elf64_Shdr *)(sechdrs + eh->e_shentsize * i);
185
186 /* zero out bss */
187 if (shdr->sh_type == SHT_NOBITS) {
188 if (prom_debug)
189 dboot_printf("zeroing BSS %lu bytes from "
190 "physaddr 0x%" PRIx64
191 " (end=0x%" PRIx64 ")\n",
192 (ulong_t)shdr->sh_size,
193 next_addr,
194 next_addr + shdr->sh_size);
195 (void) memset((void *)(uintptr_t)next_addr, 0,
196 shdr->sh_size);
197 break;
198 }
199 }
200
201 /*
202 * Ignore the intepreter (or should we die if there is one??)
203 */
204 return (0);
205 }
206