Per universal payload spec, the payload is in ELF format.
The patch adds a payload loader that supports to load ELF image.
The location of extra data sections whose names start with "upld."
is stored in UNIVERSAL_PAYLOAD_EXTRA_DATA HOB.
Signed-off-by: Maurice Ma <maurice.ma@intel.com>
Signed-off-by: Ray Ni <ray.ni@intel.com>
Cc: Maurice Ma <maurice.ma@intel.com>
Reviewed-by: Guo Dong <guo.dong@intel.com>
Cc: Benjamin You <benjamin.you@intel.com>
--- /dev/null
+/** @file\r
+ ELF library\r
+\r
+ Copyright (c) 2018 - 2021, Intel Corporation. All rights reserved.<BR>\r
+ SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#ifndef ELF_LIB_H_\r
+#define ELF_LIB_H_\r
+\r
+#include <PiPei.h>\r
+\r
+#define ELF_CLASS32 1\r
+#define ELF_CLASS64 2\r
+\r
+#define ELF_PT_LOAD 1\r
+\r
+typedef struct {\r
+ RETURN_STATUS ParseStatus; ///< Return the status after ParseElfImage().\r
+ UINT8 *FileBase; ///< The source location in memory.\r
+ UINTN FileSize; ///< The size including sections that don't require loading.\r
+ UINT8 *PreferredImageAddress; ///< The preferred image to be loaded. No relocation is needed if loaded to this address.\r
+ BOOLEAN ReloadRequired; ///< The image needs a new memory location for running.\r
+ UINT8 *ImageAddress; ///< The destination memory address set by caller.\r
+ UINTN ImageSize; ///< The memory size for loading and execution.\r
+ UINT32 EiClass;\r
+ UINT32 ShNum;\r
+ UINT32 PhNum;\r
+ UINTN ShStrOff;\r
+ UINTN ShStrLen;\r
+ UINTN EntryPoint; ///< Return the actual entry point after LoadElfImage().\r
+} ELF_IMAGE_CONTEXT;\r
+\r
+\r
+typedef struct {\r
+ UINT32 PtType;\r
+ UINTN Offset;\r
+ UINTN Length;\r
+ UINTN MemLen;\r
+ UINTN MemAddr;\r
+ UINTN Alignment;\r
+} SEGMENT_INFO;\r
+\r
+/**\r
+ Parse the ELF image info.\r
+\r
+ @param[in] ImageBase Memory address of an image.\r
+ @param[out] ElfCt The EFL image context pointer.\r
+\r
+ @retval EFI_INVALID_PARAMETER Input parameters are not valid.\r
+ @retval EFI_UNSUPPORTED Unsupported binary type.\r
+ @retval EFI_LOAD_ERROR ELF binary loading error.\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+ParseElfImage (\r
+ IN VOID *ImageBase,\r
+ OUT ELF_IMAGE_CONTEXT *ElfCt\r
+ );\r
+\r
+/**\r
+ Load the ELF segments to specified address in ELF header.\r
+\r
+ This function loads ELF image segments into memory address specified\r
+ in ELF program header.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_INVALID_PARAMETER Input parameters are not valid.\r
+ @retval EFI_UNSUPPORTED Unsupported binary type.\r
+ @retval EFI_LOAD_ERROR ELF binary loading error.\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+LoadElfImage (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ );\r
+\r
+/**\r
+ Get a ELF section name from its index.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+ @param[in] SectionIndex ELF section index.\r
+ @param[out] SectionName The pointer to the section name.\r
+\r
+ @retval EFI_INVALID_PARAMETER ElfCt or SecName is NULL.\r
+ @retval EFI_NOT_FOUND Could not find the section.\r
+ @retval EFI_SUCCESS Section name was filled successfully.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+GetElfSectionName (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt,\r
+ IN UINT32 SectionIndex,\r
+ OUT CHAR8 **SectionName\r
+ );\r
+\r
+/**\r
+ Get the offset and size of x-th ELF section.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+ @param[in] Index ELF section index.\r
+ @param[out] Offset Return the offset of the specific section.\r
+ @param[out] Size Return the size of the specific section.\r
+\r
+ @retval EFI_INVALID_PARAMETER ImageBase, Offset or Size is NULL.\r
+ @retval EFI_INVALID_PARAMETER EiClass doesn't equal to ELFCLASS32 or ELFCLASS64.\r
+ @retval EFI_NOT_FOUND Could not find the section.\r
+ @retval EFI_SUCCESS Offset and Size are returned.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+GetElfSectionPos (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt,\r
+ IN UINT32 Index,\r
+ OUT UINTN *Offset,\r
+ OUT UINTN *Size\r
+ );\r
+#endif /* ELF_LIB_H_ */\r
--- /dev/null
+/** @file\r
+Ported ELF include files from FreeBSD\r
+\r
+Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.<BR>\r
+SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+\r
+**/\r
+/*-\r
+ * Copyright (c) 1996-1998 John D. Polstra.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * $FreeBSD: src/sys/sys/elf32.h,v 1.8.14.2 2007/12/03 21:30:36 marius Exp $\r
+ */\r
+\r
+#ifndef _SYS_ELF32_H_\r
+#define _SYS_ELF32_H_ 1\r
+\r
+\r
+/*\r
+ * ELF definitions common to all 32-bit architectures.\r
+ */\r
+\r
+typedef UINT32 Elf32_Addr;\r
+typedef UINT16 Elf32_Half;\r
+typedef UINT32 Elf32_Off;\r
+typedef INT32 Elf32_Sword;\r
+typedef UINT32 Elf32_Word;\r
+typedef UINT64 Elf32_Lword;\r
+\r
+typedef Elf32_Word Elf32_Hashelt;\r
+\r
+/* Non-standard class-dependent datatype used for abstraction. */\r
+typedef Elf32_Word Elf32_Size;\r
+typedef Elf32_Sword Elf32_Ssize;\r
+\r
+/*\r
+ * ELF header.\r
+ */\r
+\r
+typedef struct {\r
+ unsigned char e_ident[EI_NIDENT]; /* File identification. */\r
+ Elf32_Half e_type; /* File type. */\r
+ Elf32_Half e_machine; /* Machine architecture. */\r
+ Elf32_Word e_version; /* ELF format version. */\r
+ Elf32_Addr e_entry; /* Entry point. */\r
+ Elf32_Off e_phoff; /* Program header file offset. */\r
+ Elf32_Off e_shoff; /* Section header file offset. */\r
+ Elf32_Word e_flags; /* Architecture-specific flags. */\r
+ Elf32_Half e_ehsize; /* Size of ELF header in bytes. */\r
+ Elf32_Half e_phentsize; /* Size of program header entry. */\r
+ Elf32_Half e_phnum; /* Number of program header entries. */\r
+ Elf32_Half e_shentsize; /* Size of section header entry. */\r
+ Elf32_Half e_shnum; /* Number of section header entries. */\r
+ Elf32_Half e_shstrndx; /* Section name strings section. */\r
+} Elf32_Ehdr;\r
+\r
+/*\r
+ * Section header.\r
+ */\r
+\r
+typedef struct {\r
+ Elf32_Word sh_name; /* Section name (index into the\r
+ section header string table). */\r
+ Elf32_Word sh_type; /* Section type. */\r
+ Elf32_Word sh_flags; /* Section flags. */\r
+ Elf32_Addr sh_addr; /* Address in memory image. */\r
+ Elf32_Off sh_offset; /* Offset in file. */\r
+ Elf32_Word sh_size; /* Size in bytes. */\r
+ Elf32_Word sh_link; /* Index of a related section. */\r
+ Elf32_Word sh_info; /* Depends on section type. */\r
+ Elf32_Word sh_addralign; /* Alignment in bytes. */\r
+ Elf32_Word sh_entsize; /* Size of each entry in section. */\r
+} Elf32_Shdr;\r
+\r
+/*\r
+ * Program header.\r
+ */\r
+\r
+typedef struct {\r
+ Elf32_Word p_type; /* Entry type. */\r
+ Elf32_Off p_offset; /* File offset of contents. */\r
+ Elf32_Addr p_vaddr; /* Virtual address in memory image. */\r
+ Elf32_Addr p_paddr; /* Physical address (not used). */\r
+ Elf32_Word p_filesz; /* Size of contents in file. */\r
+ Elf32_Word p_memsz; /* Size of contents in memory. */\r
+ Elf32_Word p_flags; /* Access permission flags. */\r
+ Elf32_Word p_align; /* Alignment in memory and file. */\r
+} Elf32_Phdr;\r
+\r
+/*\r
+ * Dynamic structure. The ".dynamic" section contains an array of them.\r
+ */\r
+\r
+typedef struct {\r
+ Elf32_Sword d_tag; /* Entry type. */\r
+ union {\r
+ Elf32_Word d_val; /* Integer value. */\r
+ Elf32_Addr d_ptr; /* Address value. */\r
+ } d_un;\r
+} Elf32_Dyn;\r
+\r
+/*\r
+ * Relocation entries.\r
+ */\r
+\r
+/* Relocations that don't need an addend field. */\r
+typedef struct {\r
+ Elf32_Addr r_offset; /* Location to be relocated. */\r
+ Elf32_Word r_info; /* Relocation type and symbol index. */\r
+} Elf32_Rel;\r
+\r
+/* Relocations that need an addend field. */\r
+typedef struct {\r
+ Elf32_Addr r_offset; /* Location to be relocated. */\r
+ Elf32_Word r_info; /* Relocation type and symbol index. */\r
+ Elf32_Sword r_addend; /* Addend. */\r
+} Elf32_Rela;\r
+\r
+/* Macros for accessing the fields of r_info. */\r
+#define ELF32_R_SYM(info) ((info) >> 8)\r
+#define ELF32_R_TYPE(info) ((unsigned char)(info))\r
+\r
+/* Macro for constructing r_info from field values. */\r
+#define ELF32_R_INFO(sym, type) (((sym) << 8) + (unsigned char)(type))\r
+\r
+/*\r
+ * Note entry header\r
+ */\r
+typedef Elf_Note Elf32_Nhdr;\r
+\r
+/*\r
+ * Move entry\r
+ */\r
+typedef struct {\r
+ Elf32_Lword m_value; /* symbol value */\r
+ Elf32_Word m_info; /* size + index */\r
+ Elf32_Word m_poffset; /* symbol offset */\r
+ Elf32_Half m_repeat; /* repeat count */\r
+ Elf32_Half m_stride; /* stride info */\r
+} Elf32_Move;\r
+\r
+/*\r
+ * The macros compose and decompose values for Move.r_info\r
+ *\r
+ * sym = ELF32_M_SYM(M.m_info)\r
+ * size = ELF32_M_SIZE(M.m_info)\r
+ * M.m_info = ELF32_M_INFO(sym, size)\r
+ */\r
+#define ELF32_M_SYM(info) ((info)>>8)\r
+#define ELF32_M_SIZE(info) ((unsigned char)(info))\r
+#define ELF32_M_INFO(sym, size) (((sym)<<8)+(unsigned char)(size))\r
+\r
+/*\r
+ * Hardware/Software capabilities entry\r
+ */\r
+typedef struct {\r
+ Elf32_Word c_tag; /* how to interpret value */\r
+ union {\r
+ Elf32_Word c_val;\r
+ Elf32_Addr c_ptr;\r
+ } c_un;\r
+} Elf32_Cap;\r
+\r
+/*\r
+ * Symbol table entries.\r
+ */\r
+\r
+typedef struct {\r
+ Elf32_Word st_name; /* String table index of name. */\r
+ Elf32_Addr st_value; /* Symbol value. */\r
+ Elf32_Word st_size; /* Size of associated object. */\r
+ unsigned char st_info; /* Type and binding information. */\r
+ unsigned char st_other; /* Reserved (not used). */\r
+ Elf32_Half st_shndx; /* Section index of symbol. */\r
+} Elf32_Sym;\r
+\r
+/* Macros for accessing the fields of st_info. */\r
+#define ELF32_ST_BIND(info) ((info) >> 4)\r
+#define ELF32_ST_TYPE(info) ((info) & 0xf)\r
+\r
+/* Macro for constructing st_info from field values. */\r
+#define ELF32_ST_INFO(bind, type) (((bind) << 4) + ((type) & 0xf))\r
+\r
+/* Macro for accessing the fields of st_other. */\r
+#define ELF32_ST_VISIBILITY(oth) ((oth) & 0x3)\r
+\r
+/* Structures used by Sun & GNU symbol versioning. */\r
+typedef struct\r
+{\r
+ Elf32_Half vd_version;\r
+ Elf32_Half vd_flags;\r
+ Elf32_Half vd_ndx;\r
+ Elf32_Half vd_cnt;\r
+ Elf32_Word vd_hash;\r
+ Elf32_Word vd_aux;\r
+ Elf32_Word vd_next;\r
+} Elf32_Verdef;\r
+\r
+typedef struct\r
+{\r
+ Elf32_Word vda_name;\r
+ Elf32_Word vda_next;\r
+} Elf32_Verdaux;\r
+\r
+typedef struct\r
+{\r
+ Elf32_Half vn_version;\r
+ Elf32_Half vn_cnt;\r
+ Elf32_Word vn_file;\r
+ Elf32_Word vn_aux;\r
+ Elf32_Word vn_next;\r
+} Elf32_Verneed;\r
+\r
+typedef struct\r
+{\r
+ Elf32_Word vna_hash;\r
+ Elf32_Half vna_flags;\r
+ Elf32_Half vna_other;\r
+ Elf32_Word vna_name;\r
+ Elf32_Word vna_next;\r
+} Elf32_Vernaux;\r
+\r
+typedef Elf32_Half Elf32_Versym;\r
+\r
+typedef struct {\r
+ Elf32_Half si_boundto; /* direct bindings - symbol bound to */\r
+ Elf32_Half si_flags; /* per symbol flags */\r
+} Elf32_Syminfo;\r
+\r
+#endif /* !_SYS_ELF32_H_ */\r
--- /dev/null
+/** @file\r
+ ELF library\r
+\r
+ Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.<BR>\r
+ SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#include "ElfLibInternal.h"\r
+\r
+/**\r
+ Return the section header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The section index.\r
+\r
+ @return Pointer to the section header.\r
+**/\r
+Elf32_Shdr *\r
+GetElf32SectionByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ )\r
+{\r
+ Elf32_Ehdr *Ehdr;\r
+\r
+ Ehdr = (Elf32_Ehdr *)ImageBase;\r
+ if (Index >= Ehdr->e_shnum) {\r
+ return NULL;\r
+ }\r
+\r
+ return (Elf32_Shdr *)(ImageBase + Ehdr->e_shoff + Index * Ehdr->e_shentsize);\r
+}\r
+\r
+/**\r
+ Return the segment header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The segment index.\r
+\r
+ @return Pointer to the segment header.\r
+**/\r
+Elf32_Phdr *\r
+GetElf32SegmentByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ )\r
+{\r
+ Elf32_Ehdr *Ehdr;\r
+\r
+ Ehdr = (Elf32_Ehdr *)ImageBase;\r
+ if (Index >= Ehdr->e_phnum) {\r
+ return NULL;\r
+ }\r
+\r
+ return (Elf32_Phdr *)(ImageBase + Ehdr->e_phoff + Index * Ehdr->e_phentsize);\r
+}\r
+\r
+/**\r
+ Return the section header specified by the range.\r
+\r
+ @param ImageBase The image base.\r
+ @param Offset The section offset.\r
+ @param Size The section size.\r
+\r
+ @return Pointer to the section header.\r
+**/\r
+Elf32_Shdr *\r
+GetElf32SectionByRange (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Offset,\r
+ IN UINT32 Size\r
+ )\r
+{\r
+ UINT32 Index;\r
+ Elf32_Ehdr *Ehdr;\r
+ Elf32_Shdr *Shdr;\r
+\r
+ Ehdr = (Elf32_Ehdr *)ImageBase;\r
+\r
+ Shdr = (Elf32_Shdr *) (ImageBase + Ehdr->e_shoff);\r
+ for (Index = 0; Index < Ehdr->e_shnum; Index++) {\r
+ if ((Shdr->sh_offset == Offset) && (Shdr->sh_size == Size)) {\r
+ return Shdr;\r
+ }\r
+ Shdr = ELF_NEXT_ENTRY (Elf32_Shdr, Shdr, Ehdr->e_shentsize);\r
+ }\r
+ return NULL;\r
+}\r
+\r
+/**\r
+ Fix up the image based on the relocation entries.\r
+\r
+ @param Rela Relocation entries.\r
+ @param RelaSize Total size of relocation entries.\r
+ @param RelaEntrySize Relocation entry size.\r
+ @param RelaType Type of relocation entry.\r
+ @param Delta The delta between preferred image base and the actual image base.\r
+ @param DynamicLinking TRUE when fixing up according to dynamic relocation.\r
+\r
+ @retval EFI_SUCCESS The image fix up is processed successfully.\r
+**/\r
+EFI_STATUS\r
+ProcessRelocation32 (\r
+ IN Elf32_Rela *Rela,\r
+ IN UINT32 RelaSize,\r
+ IN UINT32 RelaEntrySize,\r
+ IN UINT32 RelaType,\r
+ IN INTN Delta,\r
+ IN BOOLEAN DynamicLinking\r
+ )\r
+{\r
+ UINTN Index;\r
+ UINT32 *Ptr;\r
+ UINT32 Type;\r
+\r
+ for ( Index = 0\r
+ ; RelaEntrySize * Index < RelaSize\r
+ ; Index++, Rela = ELF_NEXT_ENTRY (Elf32_Rela, Rela, RelaEntrySize)\r
+ ) {\r
+ //\r
+ // r_offset is the virtual address of the storage unit affected by the relocation.\r
+ //\r
+ Ptr = (UINT32 *)(UINTN)(Rela->r_offset + Delta);\r
+ Type = ELF32_R_TYPE(Rela->r_info);\r
+ switch (Type) {\r
+ case R_386_NONE:\r
+ case R_386_PC32:\r
+ //\r
+ // No fixup entry required.\r
+ //\r
+ break;\r
+\r
+ case R_386_32:\r
+ if (DynamicLinking) {\r
+ //\r
+ // Dynamic section doesn't contain entries of this type.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ ASSERT (FALSE);\r
+ } else {\r
+ *Ptr += (UINT32) Delta;\r
+ }\r
+ break;\r
+\r
+ case R_386_RELATIVE:\r
+ if (DynamicLinking) {\r
+ //\r
+ // A: Represents the addend used to compute the value of the relocatable field.\r
+ // B: Represents the base address at which a shared object has been loaded into memory during execution.\r
+ // Generally, a shared object is built with a 0 base virtual address, but the execution address will be different.\r
+ //\r
+ // B (Base Address) in ELF spec is slightly different:\r
+ // An executable or shared object file's base address (on platforms that support the concept) is calculated during\r
+ // execution from three values: the virtual memory load address, the maximum page size, and the lowest virtual address\r
+ // of a program's loadable segment. To compute the base address, one determines the memory address associated with the\r
+ // lowest p_vaddr value for a PT_LOAD segment. This address is truncated to the nearest multiple of the maximum page size.\r
+ // The corresponding p_vaddr value itself is also truncated to the nearest multiple of the maximum page size.\r
+ //\r
+ // *** The base address is the difference between the truncated memory address and the truncated p_vaddr value. ***\r
+ //\r
+ // Delta in this function is B.\r
+ //\r
+ // Calculation: B + A\r
+ //\r
+ if (RelaType == SHT_RELA) {\r
+ ASSERT (*Ptr == 0);\r
+ *Ptr = (UINT32) Delta + Rela->r_addend;\r
+ } else {\r
+ //\r
+ // A is stored in the field of relocation for REL type.\r
+ //\r
+ *Ptr = (UINT32) Delta + *Ptr;\r
+ }\r
+ } else {\r
+ //\r
+ // non-Dynamic section doesn't contain entries of this type.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ ASSERT (FALSE);\r
+ }\r
+ break;\r
+\r
+ default:\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ }\r
+ }\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Relocate the DYN type image.\r
+\r
+ @param ElfCt Point to image context.\r
+\r
+ @retval EFI_SUCCESS The relocation succeeds.\r
+ @retval EFI_UNSUPPORTED The image doesn't contain a dynamic section.\r
+**/\r
+EFI_STATUS\r
+RelocateElf32Dynamic (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ UINT32 Index;\r
+ Elf32_Phdr *Phdr;\r
+ Elf32_Shdr *DynShdr;\r
+ Elf32_Shdr *RelShdr;\r
+ Elf32_Dyn *Dyn;\r
+ UINT32 RelaOffset;\r
+ UINT32 RelaCount;\r
+ UINT32 RelaSize;\r
+ UINT32 RelaEntrySize;\r
+ UINT32 RelaType;\r
+\r
+ //\r
+ // 1. Locate the dynamic section.\r
+ //\r
+ // If an object file participates in dynamic linking, its program header table\r
+ // will have an element of type PT_DYNAMIC.\r
+ // This ``segment'' contains the .dynamic section. A special symbol, _DYNAMIC,\r
+ // labels the section, which contains an array of Elf32_Dyn or Elf64_Dyn.\r
+ //\r
+ DynShdr = NULL;\r
+ for (Index = 0; Index < ElfCt->PhNum; Index++) {\r
+ Phdr = GetElf32SegmentByIndex (ElfCt->FileBase, Index);\r
+ ASSERT (Phdr != NULL);\r
+ if (Phdr->p_type == PT_DYNAMIC) {\r
+ //\r
+ // Verify the existence of the dynamic section.\r
+ //\r
+ DynShdr = GetElf32SectionByRange (ElfCt->FileBase, Phdr->p_offset, Phdr->p_filesz);\r
+ break;\r
+ }\r
+ }\r
+\r
+ //\r
+ // It's abnormal a DYN ELF doesn't contain a dynamic section.\r
+ //\r
+ ASSERT (DynShdr != NULL);\r
+ if (DynShdr == NULL) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ ASSERT (DynShdr->sh_type == SHT_DYNAMIC);\r
+ ASSERT (DynShdr->sh_entsize >= sizeof (*Dyn));\r
+\r
+ //\r
+ // 2. Locate the relocation section from the dynamic section.\r
+ //\r
+ RelaOffset = MAX_UINT32;\r
+ RelaSize = 0;\r
+ RelaCount = 0;\r
+ RelaEntrySize = 0;\r
+ RelaType = 0;\r
+ for ( Index = 0, Dyn = (Elf32_Dyn *) (ElfCt->FileBase + DynShdr->sh_offset)\r
+ ; Index < DynShdr->sh_size / DynShdr->sh_entsize\r
+ ; Index++, Dyn = ELF_NEXT_ENTRY (Elf32_Dyn, Dyn, DynShdr->sh_entsize)\r
+ ) {\r
+ switch (Dyn->d_tag) {\r
+ case DT_RELA:\r
+ case DT_REL:\r
+ //\r
+ // DT_REL represent program virtual addresses.\r
+ // A file's virtual addresses might not match the memory virtual addresses during execution.\r
+ // When interpreting addresses contained in the dynamic structure, the dynamic linker computes actual addresses,\r
+ // based on the original file value and the memory base address.\r
+ // For consistency, files do not contain relocation entries to ``correct'' addresses in the dynamic structure.\r
+ //\r
+ RelaOffset = Dyn->d_un.d_ptr - (UINT32) (UINTN) ElfCt->PreferredImageAddress;\r
+ RelaType = (Dyn->d_tag == DT_RELA) ? SHT_RELA: SHT_REL;\r
+ break;\r
+ case DT_RELACOUNT:\r
+ case DT_RELCOUNT:\r
+ RelaCount = Dyn->d_un.d_val;\r
+ break;\r
+ case DT_RELENT:\r
+ case DT_RELAENT:\r
+ RelaEntrySize = Dyn->d_un.d_val;\r
+ break;\r
+ case DT_RELSZ:\r
+ case DT_RELASZ:\r
+ RelaSize = Dyn->d_un.d_val;\r
+ break;\r
+ default:\r
+ break;\r
+ }\r
+ }\r
+\r
+ if (RelaOffset == MAX_UINT64) {\r
+ ASSERT (RelaCount == 0);\r
+ ASSERT (RelaEntrySize == 0);\r
+ ASSERT (RelaSize == 0);\r
+ //\r
+ // It's fine that a DYN ELF doesn't contain relocation section.\r
+ //\r
+ return EFI_SUCCESS;\r
+ }\r
+\r
+ //\r
+ // Verify the existence of the relocation section.\r
+ //\r
+ RelShdr = GetElf32SectionByRange (ElfCt->FileBase, RelaOffset, RelaSize);\r
+ ASSERT (RelShdr != NULL);\r
+ if (RelShdr == NULL) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ ASSERT (RelShdr->sh_type == RelaType);\r
+ ASSERT (RelShdr->sh_entsize == RelaEntrySize);\r
+\r
+ //\r
+ // 3. Process the relocation section.\r
+ //\r
+ ProcessRelocation32 (\r
+ (Elf32_Rela *) (ElfCt->FileBase + RelShdr->sh_offset),\r
+ RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type,\r
+ (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt->PreferredImageAddress,\r
+ TRUE\r
+ );\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Relocate all sections in a ELF image.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_UNSUPPORTED Relocation is not supported.\r
+ @retval EFI_SUCCESS ELF image was relocated successfully.\r
+**/\r
+EFI_STATUS\r
+RelocateElf32Sections (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ Elf32_Ehdr *Ehdr;\r
+ Elf32_Shdr *RelShdr;\r
+ Elf32_Shdr *Shdr;\r
+ UINT32 Index;\r
+ UINTN Delta;\r
+\r
+ Ehdr = (Elf32_Ehdr *)ElfCt->FileBase;\r
+ if (Ehdr->e_machine != EM_386) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+\r
+ Delta = (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt->PreferredImageAddress;\r
+ ElfCt->EntryPoint = (UINTN)(Ehdr->e_entry + Delta);\r
+\r
+ //\r
+ // 1. Relocate dynamic ELF using the relocation section pointed by dynamic section\r
+ //\r
+ if (Ehdr->e_type == ET_DYN) {\r
+ DEBUG ((DEBUG_INFO, "DYN ELF: Relocate using dynamic sections...\n"));\r
+ Status = RelocateElf32Dynamic (ElfCt);\r
+ ASSERT_EFI_ERROR (Status);\r
+ return Status;\r
+ }\r
+\r
+ //\r
+ // 2. Executable ELF: Fix up the delta between actual image address and preferred image address.\r
+ //\r
+ // Linker already fixed up EXEC ELF based on the preferred image address.\r
+ // A ELF loader in modern OS only loads it into the preferred image address.\r
+ // The below relocation is unneeded in that case.\r
+ // But the ELF loader in firmware supports to load the image to a different address.\r
+ // The below relocation is needed in this case.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "EXEC ELF: Fix actual/preferred base address delta ...\n"));\r
+ for ( Index = 0, RelShdr = (Elf32_Shdr *) (ElfCt->FileBase + Ehdr->e_shoff)\r
+ ; Index < Ehdr->e_shnum\r
+ ; Index++, RelShdr = ELF_NEXT_ENTRY (Elf32_Shdr, RelShdr, Ehdr->e_shentsize)\r
+ ) {\r
+ if ((RelShdr->sh_type != SHT_REL) && (RelShdr->sh_type != SHT_RELA)) {\r
+ continue;\r
+ }\r
+ Shdr = GetElf32SectionByIndex (ElfCt->FileBase, RelShdr->sh_info);\r
+ if ((Shdr->sh_flags & SHF_ALLOC) == SHF_ALLOC) {\r
+ //\r
+ // Only fix up sections that occupy memory during process execution.\r
+ //\r
+ ProcessRelocation32 (\r
+ (Elf32_Rela *)((UINT8*)Ehdr + RelShdr->sh_offset),\r
+ RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type,\r
+ Delta, FALSE\r
+ );\r
+ }\r
+ }\r
+\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Load ELF image which has 32-bit architecture.\r
+\r
+ Caller should set Context.ImageAddress to a proper value, either pointing to\r
+ a new allocated memory whose size equal to Context.ImageSize, or pointing\r
+ to Context.PreferredImageAddress.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+ @retval Others Loading ELF binary fails.\r
+\r
+**/\r
+EFI_STATUS\r
+LoadElf32Image (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ Elf32_Ehdr *Ehdr;\r
+ Elf32_Phdr *Phdr;\r
+ UINT16 Index;\r
+ UINTN Delta;\r
+\r
+ ASSERT (ElfCt != NULL);\r
+\r
+ //\r
+ // Per the sprit of ELF, loading to memory only consumes info from program headers.\r
+ //\r
+ Ehdr = (Elf32_Ehdr *)ElfCt->FileBase;\r
+\r
+ for ( Index = 0, Phdr = (Elf32_Phdr *)(ElfCt->FileBase + Ehdr->e_phoff)\r
+ ; Index < Ehdr->e_phnum\r
+ ; Index++, Phdr = ELF_NEXT_ENTRY (Elf32_Phdr, Phdr, Ehdr->e_phentsize)\r
+ ) {\r
+ //\r
+ // Skip segments that don't require load (type tells, or size is 0)\r
+ //\r
+ if ((Phdr->p_type != PT_LOAD) ||\r
+ (Phdr->p_memsz == 0)) {\r
+ continue;\r
+ }\r
+\r
+ //\r
+ // The memory offset of segment relative to the image base\r
+ // Note: CopyMem() does nothing when the dst equals to src.\r
+ //\r
+ Delta = Phdr->p_paddr - (UINT32) (UINTN) ElfCt->PreferredImageAddress;\r
+ CopyMem (ElfCt->ImageAddress + Delta, ElfCt->FileBase + Phdr->p_offset, Phdr->p_filesz);\r
+ ZeroMem (ElfCt->ImageAddress + Delta + Phdr->p_filesz, Phdr->p_memsz - Phdr->p_filesz);\r
+ }\r
+\r
+ //\r
+ // Relocate when new new image base is not the preferred image base.\r
+ //\r
+ if (ElfCt->ImageAddress != ElfCt->PreferredImageAddress) {\r
+ RelocateElf32Sections (ElfCt);\r
+ }\r
+\r
+ return EFI_SUCCESS;\r
+}\r
--- /dev/null
+/** @file\r
+Ported ELF include files from FreeBSD\r
+\r
+Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.<BR>\r
+SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+/*-\r
+ * Copyright (c) 1996-1998 John D. Polstra.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * $FreeBSD: src/sys/sys/elf64.h,v 1.10.14.2 2007/12/03 21:30:36 marius Exp $\r
+ */\r
+\r
+#ifndef _SYS_ELF64_H_\r
+#define _SYS_ELF64_H_ 1\r
+\r
+\r
+/*\r
+ * ELF definitions common to all 64-bit architectures.\r
+ */\r
+\r
+typedef UINT64 Elf64_Addr;\r
+typedef UINT16 Elf64_Half;\r
+typedef UINT64 Elf64_Off;\r
+typedef INT32 Elf64_Sword;\r
+typedef INT64 Elf64_Sxword;\r
+typedef UINT32 Elf64_Word;\r
+typedef UINT64 Elf64_Lword;\r
+typedef UINT64 Elf64_Xword;\r
+\r
+/*\r
+ * Types of dynamic symbol hash table bucket and chain elements.\r
+ *\r
+ * This is inconsistent among 64 bit architectures, so a machine dependent\r
+ * typedef is required.\r
+ */\r
+\r
+typedef Elf64_Word Elf64_Hashelt;\r
+\r
+/* Non-standard class-dependent datatype used for abstraction. */\r
+typedef Elf64_Xword Elf64_Size;\r
+typedef Elf64_Sxword Elf64_Ssize;\r
+\r
+/*\r
+ * ELF header.\r
+ */\r
+\r
+typedef struct {\r
+ unsigned char e_ident[EI_NIDENT]; /* File identification. */\r
+ Elf64_Half e_type; /* File type. */\r
+ Elf64_Half e_machine; /* Machine architecture. */\r
+ Elf64_Word e_version; /* ELF format version. */\r
+ Elf64_Addr e_entry; /* Entry point. */\r
+ Elf64_Off e_phoff; /* Program header file offset. */\r
+ Elf64_Off e_shoff; /* Section header file offset. */\r
+ Elf64_Word e_flags; /* Architecture-specific flags. */\r
+ Elf64_Half e_ehsize; /* Size of ELF header in bytes. */\r
+ Elf64_Half e_phentsize; /* Size of program header entry. */\r
+ Elf64_Half e_phnum; /* Number of program header entries. */\r
+ Elf64_Half e_shentsize; /* Size of section header entry. */\r
+ Elf64_Half e_shnum; /* Number of section header entries. */\r
+ Elf64_Half e_shstrndx; /* Section name strings section. */\r
+} Elf64_Ehdr;\r
+\r
+/*\r
+ * Section header.\r
+ */\r
+\r
+typedef struct {\r
+ Elf64_Word sh_name; /* Section name (index into the\r
+ section header string table). */\r
+ Elf64_Word sh_type; /* Section type. */\r
+ Elf64_Xword sh_flags; /* Section flags. */\r
+ Elf64_Addr sh_addr; /* Address in memory image. */\r
+ Elf64_Off sh_offset; /* Offset in file. */\r
+ Elf64_Xword sh_size; /* Size in bytes. */\r
+ Elf64_Word sh_link; /* Index of a related section. */\r
+ Elf64_Word sh_info; /* Depends on section type. */\r
+ Elf64_Xword sh_addralign; /* Alignment in bytes. */\r
+ Elf64_Xword sh_entsize; /* Size of each entry in section. */\r
+} Elf64_Shdr;\r
+\r
+/*\r
+ * Program header.\r
+ */\r
+\r
+typedef struct {\r
+ Elf64_Word p_type; /* Entry type. */\r
+ Elf64_Word p_flags; /* Access permission flags. */\r
+ Elf64_Off p_offset; /* File offset of contents. */\r
+ Elf64_Addr p_vaddr; /* Virtual address in memory image. */\r
+ Elf64_Addr p_paddr; /* Physical address (not used). */\r
+ Elf64_Xword p_filesz; /* Size of contents in file. */\r
+ Elf64_Xword p_memsz; /* Size of contents in memory. */\r
+ Elf64_Xword p_align; /* Alignment in memory and file. */\r
+} Elf64_Phdr;\r
+\r
+/*\r
+ * Dynamic structure. The ".dynamic" section contains an array of them.\r
+ */\r
+\r
+typedef struct {\r
+ Elf64_Sxword d_tag; /* Entry type. */\r
+ union {\r
+ Elf64_Xword d_val; /* Integer value. */\r
+ Elf64_Addr d_ptr; /* Address value. */\r
+ } d_un;\r
+} Elf64_Dyn;\r
+\r
+/*\r
+ * Relocation entries.\r
+ */\r
+\r
+/* Relocations that don't need an addend field. */\r
+typedef struct {\r
+ Elf64_Addr r_offset; /* Location to be relocated. */\r
+ Elf64_Xword r_info; /* Relocation type and symbol index. */\r
+} Elf64_Rel;\r
+\r
+/* Relocations that need an addend field. */\r
+typedef struct {\r
+ Elf64_Addr r_offset; /* Location to be relocated. */\r
+ Elf64_Xword r_info; /* Relocation type and symbol index. */\r
+ Elf64_Sxword r_addend; /* Addend. */\r
+} Elf64_Rela;\r
+\r
+/* Macros for accessing the fields of r_info. */\r
+#define ELF64_R_SYM(info) ((UINT32) RShiftU64 ((info), 32))\r
+#define ELF64_R_TYPE(info) ((info) & 0xffffffffL)\r
+\r
+/* Macro for constructing r_info from field values. */\r
+#define ELF64_R_INFO(sym, type) (((sym) << 32) + ((type) & 0xffffffffL))\r
+\r
+#define ELF64_R_TYPE_DATA(info) (((Elf64_Xword)(info)<<32)>>40)\r
+#define ELF64_R_TYPE_ID(info) (((Elf64_Xword)(info)<<56)>>56)\r
+#define ELF64_R_TYPE_INFO(data, type) \\r
+ (((Elf64_Xword)(data)<<8)+(Elf64_Xword)(type))\r
+\r
+/*\r
+ * Note entry header\r
+ */\r
+typedef Elf_Note Elf64_Nhdr;\r
+\r
+/*\r
+ * Move entry\r
+ */\r
+typedef struct {\r
+ Elf64_Lword m_value; /* symbol value */\r
+ Elf64_Xword m_info; /* size + index */\r
+ Elf64_Xword m_poffset; /* symbol offset */\r
+ Elf64_Half m_repeat; /* repeat count */\r
+ Elf64_Half m_stride; /* stride info */\r
+} Elf64_Move;\r
+\r
+#define ELF64_M_SYM(info) ((info)>>8)\r
+#define ELF64_M_SIZE(info) ((unsigned char)(info))\r
+#define ELF64_M_INFO(sym, size) (((sym)<<8)+(unsigned char)(size))\r
+\r
+/*\r
+ * Hardware/Software capabilities entry\r
+ */\r
+typedef struct {\r
+ Elf64_Xword c_tag; /* how to interpret value */\r
+ union {\r
+ Elf64_Xword c_val;\r
+ Elf64_Addr c_ptr;\r
+ } c_un;\r
+} Elf64_Cap;\r
+\r
+/*\r
+ * Symbol table entries.\r
+ */\r
+\r
+typedef struct {\r
+ Elf64_Word st_name; /* String table index of name. */\r
+ unsigned char st_info; /* Type and binding information. */\r
+ unsigned char st_other; /* Reserved (not used). */\r
+ Elf64_Half st_shndx; /* Section index of symbol. */\r
+ Elf64_Addr st_value; /* Symbol value. */\r
+ Elf64_Xword st_size; /* Size of associated object. */\r
+} Elf64_Sym;\r
+\r
+/* Macros for accessing the fields of st_info. */\r
+#define ELF64_ST_BIND(info) ((info) >> 4)\r
+#define ELF64_ST_TYPE(info) ((info) & 0xf)\r
+\r
+/* Macro for constructing st_info from field values. */\r
+#define ELF64_ST_INFO(bind, type) (((bind) << 4) + ((type) & 0xf))\r
+\r
+/* Macro for accessing the fields of st_other. */\r
+#define ELF64_ST_VISIBILITY(oth) ((oth) & 0x3)\r
+\r
+/* Structures used by Sun & GNU-style symbol versioning. */\r
+typedef struct {\r
+ Elf64_Half vd_version;\r
+ Elf64_Half vd_flags;\r
+ Elf64_Half vd_ndx;\r
+ Elf64_Half vd_cnt;\r
+ Elf64_Word vd_hash;\r
+ Elf64_Word vd_aux;\r
+ Elf64_Word vd_next;\r
+} Elf64_Verdef;\r
+\r
+typedef struct {\r
+ Elf64_Word vda_name;\r
+ Elf64_Word vda_next;\r
+} Elf64_Verdaux;\r
+\r
+typedef struct {\r
+ Elf64_Half vn_version;\r
+ Elf64_Half vn_cnt;\r
+ Elf64_Word vn_file;\r
+ Elf64_Word vn_aux;\r
+ Elf64_Word vn_next;\r
+} Elf64_Verneed;\r
+\r
+typedef struct {\r
+ Elf64_Word vna_hash;\r
+ Elf64_Half vna_flags;\r
+ Elf64_Half vna_other;\r
+ Elf64_Word vna_name;\r
+ Elf64_Word vna_next;\r
+} Elf64_Vernaux;\r
+\r
+typedef Elf64_Half Elf64_Versym;\r
+\r
+typedef struct {\r
+ Elf64_Half si_boundto; /* direct bindings - symbol bound to */\r
+ Elf64_Half si_flags; /* per symbol flags */\r
+} Elf64_Syminfo;\r
+\r
+#endif /* !_SYS_ELF64_H_ */\r
--- /dev/null
+/** @file\r
+ ELF library\r
+\r
+ Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.<BR>\r
+ SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#include "ElfLibInternal.h"\r
+\r
+/**\r
+ Return the section header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The section index.\r
+\r
+ @return Pointer to the section header.\r
+**/\r
+Elf64_Shdr *\r
+GetElf64SectionByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ )\r
+{\r
+ Elf64_Ehdr *Ehdr;\r
+\r
+ Ehdr = (Elf64_Ehdr *)ImageBase;\r
+ if (Index >= Ehdr->e_shnum) {\r
+ return NULL;\r
+ }\r
+\r
+ return (Elf64_Shdr *)(ImageBase + Ehdr->e_shoff + Index * Ehdr->e_shentsize);\r
+}\r
+\r
+/**\r
+ Return the segment header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The segment index.\r
+\r
+ @return Pointer to the segment header.\r
+**/\r
+Elf64_Phdr *\r
+GetElf64SegmentByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ )\r
+{\r
+ Elf64_Ehdr *Ehdr;\r
+\r
+ Ehdr = (Elf64_Ehdr *)ImageBase;\r
+ if (Index >= Ehdr->e_phnum) {\r
+ return NULL;\r
+ }\r
+\r
+ return (Elf64_Phdr *)(ImageBase + Ehdr->e_phoff + Index * Ehdr->e_phentsize);\r
+}\r
+\r
+/**\r
+ Return the section header specified by the range.\r
+\r
+ @param ImageBase The image base.\r
+ @param Offset The section offset.\r
+ @param Size The section size.\r
+\r
+ @return Pointer to the section header.\r
+**/\r
+Elf64_Shdr *\r
+GetElf64SectionByRange (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT64 Offset,\r
+ IN UINT64 Size\r
+ )\r
+{\r
+ UINT32 Index;\r
+ Elf64_Ehdr *Ehdr;\r
+ Elf64_Shdr *Shdr;\r
+\r
+ Ehdr = (Elf64_Ehdr *)ImageBase;\r
+\r
+ Shdr = (Elf64_Shdr *) (ImageBase + Ehdr->e_shoff);\r
+ for (Index = 0; Index < Ehdr->e_shnum; Index++) {\r
+ if ((Shdr->sh_offset == Offset) && (Shdr->sh_size == Size)) {\r
+ return Shdr;\r
+ }\r
+ Shdr = ELF_NEXT_ENTRY (Elf64_Shdr, Shdr, Ehdr->e_shentsize);\r
+ }\r
+ return NULL;\r
+}\r
+\r
+/**\r
+ Fix up the image based on the relocation entries.\r
+\r
+ @param Rela Relocation entries.\r
+ @param RelaSize Total size of relocation entries.\r
+ @param RelaEntrySize Relocation entry size.\r
+ @param RelaType Type of relocation entry.\r
+ @param Delta The delta between preferred image base and the actual image base.\r
+ @param DynamicLinking TRUE when fixing up according to dynamic relocation.\r
+\r
+ @retval EFI_SUCCESS The image fix up is processed successfully.\r
+**/\r
+EFI_STATUS\r
+ProcessRelocation64 (\r
+ IN Elf64_Rela *Rela,\r
+ IN UINT64 RelaSize,\r
+ IN UINT64 RelaEntrySize,\r
+ IN UINT64 RelaType,\r
+ IN INTN Delta,\r
+ IN BOOLEAN DynamicLinking\r
+ )\r
+{\r
+ UINTN Index;\r
+ UINT64 *Ptr;\r
+ UINT32 Type;\r
+\r
+ for ( Index = 0\r
+ ; MultU64x64 (RelaEntrySize, Index) < RelaSize\r
+ ; Index++, Rela = ELF_NEXT_ENTRY (Elf64_Rela, Rela, RelaEntrySize)\r
+ ) {\r
+ //\r
+ // r_offset is the virtual address of the storage unit affected by the relocation.\r
+ //\r
+ Ptr = (UINT64 *)(UINTN)(Rela->r_offset + Delta);\r
+ Type = ELF64_R_TYPE(Rela->r_info);\r
+ switch (Type) {\r
+ case R_X86_64_NONE:\r
+ case R_X86_64_PC32:\r
+ case R_X86_64_PLT32:\r
+ case R_X86_64_GOTPCREL:\r
+ case R_X86_64_GOTPCRELX:\r
+ case R_X86_64_REX_GOTPCRELX:\r
+ break;\r
+\r
+ case R_X86_64_64:\r
+ if (DynamicLinking) {\r
+ //\r
+ // Dynamic section doesn't contain entries of this type.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ ASSERT (FALSE);\r
+ } else {\r
+ *Ptr += Delta;\r
+ }\r
+ break;\r
+\r
+ case R_X86_64_32:\r
+ //\r
+ // Dynamic section doesn't contain entries of this type.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ ASSERT (FALSE);\r
+ break;\r
+\r
+ case R_X86_64_RELATIVE:\r
+ if (DynamicLinking) {\r
+ //\r
+ // A: Represents the addend used to compute the value of the relocatable field.\r
+ // B: Represents the base address at which a shared object has been loaded into memory during execution.\r
+ // Generally, a shared object is built with a 0 base virtual address, but the execution address will be different.\r
+ //\r
+ // B (Base Address) in ELF spec is slightly different:\r
+ // An executable or shared object file's base address (on platforms that support the concept) is calculated during\r
+ // execution from three values: the virtual memory load address, the maximum page size, and the lowest virtual address\r
+ // of a program's loadable segment. To compute the base address, one determines the memory address associated with the\r
+ // lowest p_vaddr value for a PT_LOAD segment. This address is truncated to the nearest multiple of the maximum page size.\r
+ // The corresponding p_vaddr value itself is also truncated to the nearest multiple of the maximum page size.\r
+ //\r
+ // *** The base address is the difference between the truncated memory address and the truncated p_vaddr value. ***\r
+ //\r
+ // Delta in this function is B.\r
+ //\r
+ // Calculation: B + A\r
+ //\r
+ if (RelaType == SHT_RELA) {\r
+ ASSERT (*Ptr == 0);\r
+ *Ptr = Delta + Rela->r_addend;\r
+ } else {\r
+ //\r
+ // A is stored in the field of relocation for REL type.\r
+ //\r
+ *Ptr = Delta + *Ptr;\r
+ }\r
+ } else {\r
+ //\r
+ // non-Dynamic section doesn't contain entries of this type.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ ASSERT (FALSE);\r
+ }\r
+ break;\r
+\r
+ default:\r
+ DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type));\r
+ }\r
+ }\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Relocate the DYN type image.\r
+\r
+ @param ElfCt Point to image context.\r
+\r
+ @retval EFI_SUCCESS The relocation succeeds.\r
+ @retval EFI_UNSUPPORTED The image doesn't contain a dynamic section.\r
+**/\r
+EFI_STATUS\r
+RelocateElf64Dynamic (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ UINT32 Index;\r
+ Elf64_Phdr *Phdr;\r
+ Elf64_Shdr *DynShdr;\r
+ Elf64_Shdr *RelShdr;\r
+ Elf64_Dyn *Dyn;\r
+ UINT64 RelaOffset;\r
+ UINT64 RelaCount;\r
+ UINT64 RelaSize;\r
+ UINT64 RelaEntrySize;\r
+ UINT64 RelaType;\r
+\r
+ //\r
+ // 1. Locate the dynamic section.\r
+ //\r
+ // If an object file participates in dynamic linking, its program header table\r
+ // will have an element of type PT_DYNAMIC.\r
+ // This ``segment'' contains the .dynamic section. A special symbol, _DYNAMIC,\r
+ // labels the section, which contains an array of Elf32_Dyn or Elf64_Dyn.\r
+ //\r
+ DynShdr = NULL;\r
+ for (Index = 0; Index < ElfCt->PhNum; Index++) {\r
+ Phdr = GetElf64SegmentByIndex (ElfCt->FileBase, Index);\r
+ ASSERT (Phdr != NULL);\r
+ if (Phdr->p_type == PT_DYNAMIC) {\r
+ //\r
+ // Verify the existence of the dynamic section.\r
+ //\r
+ DynShdr = GetElf64SectionByRange (ElfCt->FileBase, Phdr->p_offset, Phdr->p_filesz);\r
+ break;\r
+ }\r
+ }\r
+\r
+ //\r
+ // It's abnormal a DYN ELF doesn't contain a dynamic section.\r
+ //\r
+ ASSERT (DynShdr != NULL);\r
+ if (DynShdr == NULL) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ ASSERT (DynShdr->sh_type == SHT_DYNAMIC);\r
+ ASSERT (DynShdr->sh_entsize >= sizeof (*Dyn));\r
+\r
+ //\r
+ // 2. Locate the relocation section from the dynamic section.\r
+ //\r
+ RelaOffset = MAX_UINT64;\r
+ RelaSize = 0;\r
+ RelaCount = 0;\r
+ RelaEntrySize = 0;\r
+ RelaType = 0;\r
+ for ( Index = 0, Dyn = (Elf64_Dyn *) (ElfCt->FileBase + DynShdr->sh_offset)\r
+ ; Index < DivU64x64Remainder (DynShdr->sh_size, DynShdr->sh_entsize, NULL)\r
+ ; Index++, Dyn = ELF_NEXT_ENTRY (Elf64_Dyn, Dyn, DynShdr->sh_entsize)\r
+ ) {\r
+ switch (Dyn->d_tag) {\r
+ case DT_RELA:\r
+ case DT_REL:\r
+ //\r
+ // DT_REL represent program virtual addresses.\r
+ // A file's virtual addresses might not match the memory virtual addresses during execution.\r
+ // When interpreting addresses contained in the dynamic structure, the dynamic linker computes actual addresses,\r
+ // based on the original file value and the memory base address.\r
+ // For consistency, files do not contain relocation entries to ``correct'' addresses in the dynamic structure.\r
+ //\r
+ RelaOffset = Dyn->d_un.d_ptr - (UINTN) ElfCt->PreferredImageAddress;\r
+ RelaType = (Dyn->d_tag == DT_RELA) ? SHT_RELA: SHT_REL;\r
+ break;\r
+ case DT_RELACOUNT:\r
+ case DT_RELCOUNT:\r
+ RelaCount = Dyn->d_un.d_val;\r
+ break;\r
+ case DT_RELENT:\r
+ case DT_RELAENT:\r
+ RelaEntrySize = Dyn->d_un.d_val;\r
+ break;\r
+ case DT_RELSZ:\r
+ case DT_RELASZ:\r
+ RelaSize = Dyn->d_un.d_val;\r
+ break;\r
+ default:\r
+ break;\r
+ }\r
+ }\r
+\r
+ if (RelaOffset == MAX_UINT64) {\r
+ ASSERT (RelaCount == 0);\r
+ ASSERT (RelaEntrySize == 0);\r
+ ASSERT (RelaSize == 0);\r
+ //\r
+ // It's fine that a DYN ELF doesn't contain relocation section.\r
+ //\r
+ return EFI_SUCCESS;\r
+ }\r
+\r
+ //\r
+ // Verify the existence of the relocation section.\r
+ //\r
+ RelShdr = GetElf64SectionByRange (ElfCt->FileBase, RelaOffset, RelaSize);\r
+ ASSERT (RelShdr != NULL);\r
+ if (RelShdr == NULL) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ ASSERT (RelShdr->sh_type == RelaType);\r
+ ASSERT (RelShdr->sh_entsize == RelaEntrySize);\r
+\r
+ //\r
+ // 3. Process the relocation section.\r
+ //\r
+ ProcessRelocation64 (\r
+ (Elf64_Rela *) (ElfCt->FileBase + RelShdr->sh_offset),\r
+ RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type,\r
+ (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt->PreferredImageAddress,\r
+ TRUE\r
+ );\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Relocate all sections in a ELF image.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_UNSUPPORTED Relocation is not supported.\r
+ @retval EFI_SUCCESS ELF image was relocated successfully.\r
+**/\r
+EFI_STATUS\r
+RelocateElf64Sections (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ Elf64_Ehdr *Ehdr;\r
+ Elf64_Shdr *RelShdr;\r
+ Elf64_Shdr *Shdr;\r
+ UINT32 Index;\r
+ UINTN Delta;\r
+\r
+ Ehdr = (Elf64_Ehdr *)ElfCt->FileBase;\r
+ if (Ehdr->e_machine != EM_X86_64) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+\r
+ Delta = (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt->PreferredImageAddress;\r
+ ElfCt->EntryPoint = (UINTN)(Ehdr->e_entry + Delta);\r
+\r
+ //\r
+ // 1. Relocate dynamic ELF using the relocation section pointed by dynamic section\r
+ //\r
+ if (Ehdr->e_type == ET_DYN) {\r
+ DEBUG ((DEBUG_INFO, "DYN ELF: Relocate using dynamic sections...\n"));\r
+ Status = RelocateElf64Dynamic (ElfCt);\r
+ ASSERT_EFI_ERROR (Status);\r
+ return Status;\r
+ }\r
+\r
+ //\r
+ // 2. Executable ELF: Fix up the delta between actual image address and preferred image address.\r
+ //\r
+ // Linker already fixed up EXEC ELF based on the preferred image address.\r
+ // A ELF loader in modern OS only loads it into the preferred image address.\r
+ // The below relocation is unneeded in that case.\r
+ // But the ELF loader in firmware supports to load the image to a different address.\r
+ // The below relocation is needed in this case.\r
+ //\r
+ DEBUG ((DEBUG_INFO, "EXEC ELF: Fix actual/preferred base address delta ...\n"));\r
+ for ( Index = 0, RelShdr = (Elf64_Shdr *) (ElfCt->FileBase + Ehdr->e_shoff)\r
+ ; Index < Ehdr->e_shnum\r
+ ; Index++, RelShdr = ELF_NEXT_ENTRY (Elf64_Shdr, RelShdr, Ehdr->e_shentsize)\r
+ ) {\r
+ if ((RelShdr->sh_type != SHT_REL) && (RelShdr->sh_type != SHT_RELA)) {\r
+ continue;\r
+ }\r
+ Shdr = GetElf64SectionByIndex (ElfCt->FileBase, RelShdr->sh_info);\r
+ if ((Shdr->sh_flags & SHF_ALLOC) == SHF_ALLOC) {\r
+ //\r
+ // Only fix up sections that occupy memory during process execution.\r
+ //\r
+ ProcessRelocation64 (\r
+ (Elf64_Rela *)((UINT8*)Ehdr + RelShdr->sh_offset),\r
+ RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type,\r
+ Delta, FALSE\r
+ );\r
+ }\r
+ }\r
+\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Load ELF image which has 64-bit architecture.\r
+\r
+ Caller should set Context.ImageAddress to a proper value, either pointing to\r
+ a new allocated memory whose size equal to Context.ImageSize, or pointing\r
+ to Context.PreferredImageAddress.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+ @retval Others Loading ELF binary fails.\r
+\r
+**/\r
+EFI_STATUS\r
+LoadElf64Image (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ Elf64_Ehdr *Ehdr;\r
+ Elf64_Phdr *Phdr;\r
+ UINT16 Index;\r
+ UINTN Delta;\r
+\r
+ ASSERT (ElfCt != NULL);\r
+\r
+ //\r
+ // Per the sprit of ELF, loading to memory only consumes info from program headers.\r
+ //\r
+ Ehdr = (Elf64_Ehdr *)ElfCt->FileBase;\r
+\r
+ for ( Index = 0, Phdr = (Elf64_Phdr *)(ElfCt->FileBase + Ehdr->e_phoff)\r
+ ; Index < Ehdr->e_phnum\r
+ ; Index++, Phdr = ELF_NEXT_ENTRY (Elf64_Phdr, Phdr, Ehdr->e_phentsize)\r
+ ) {\r
+ //\r
+ // Skip segments that don't require load (type tells, or size is 0)\r
+ //\r
+ if ((Phdr->p_type != PT_LOAD) ||\r
+ (Phdr->p_memsz == 0)) {\r
+ continue;\r
+ }\r
+\r
+ //\r
+ // The memory offset of segment relative to the image base\r
+ // Note: CopyMem() does nothing when the dst equals to src.\r
+ //\r
+ Delta = (UINTN) Phdr->p_paddr - (UINTN) ElfCt->PreferredImageAddress;\r
+ CopyMem (ElfCt->ImageAddress + Delta, ElfCt->FileBase + (UINTN) Phdr->p_offset, (UINTN) Phdr->p_filesz);\r
+ ZeroMem (ElfCt->ImageAddress + Delta + (UINTN) Phdr->p_filesz, (UINTN) (Phdr->p_memsz - Phdr->p_filesz));\r
+ }\r
+\r
+ //\r
+ // Relocate when new new image base is not the preferred image base.\r
+ //\r
+ if (ElfCt->ImageAddress != ElfCt->PreferredImageAddress) {\r
+ RelocateElf64Sections (ElfCt);\r
+ }\r
+\r
+ return EFI_SUCCESS;\r
+}\r
--- /dev/null
+/** @file\r
+Ported ELF include files from FreeBSD\r
+\r
+Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.<BR>\r
+Portions Copyright (c) 2011 - 2013, ARM Ltd. All rights reserved.<BR>\r
+SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+\r
+**/\r
+/*-\r
+ * Copyright (c) 1998 John D. Polstra.\r
+ * All rights reserved.\r
+ *\r
+ * Redistribution and use in source and binary forms, with or without\r
+ * modification, are permitted provided that the following conditions\r
+ * are met:\r
+ * 1. Redistributions of source code must retain the above copyright\r
+ * notice, this list of conditions and the following disclaimer.\r
+ * 2. Redistributions in binary form must reproduce the above copyright\r
+ * notice, this list of conditions and the following disclaimer in the\r
+ * documentation and/or other materials provided with the distribution.\r
+ *\r
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND\r
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE\r
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
+ * SUCH DAMAGE.\r
+ *\r
+ * $FreeBSD: src/sys/sys/elf_common.h,v 1.15.8.2 2007/12/03 21:30:36 marius Exp $\r
+ */\r
+\r
+#ifndef _SYS_ELF_COMMON_H_\r
+#define _SYS_ELF_COMMON_H_ 1\r
+\r
+/*\r
+ * ELF definitions that are independent of architecture or word size.\r
+ */\r
+\r
+/*\r
+ * Note header. The ".note" section contains an array of notes. Each\r
+ * begins with this header, aligned to a word boundary. Immediately\r
+ * following the note header is n_namesz bytes of name, padded to the\r
+ * next word boundary. Then comes n_descsz bytes of descriptor, again\r
+ * padded to a word boundary. The values of n_namesz and n_descsz do\r
+ * not include the padding.\r
+ */\r
+\r
+typedef struct {\r
+ UINT32 n_namesz; /* Length of name. */\r
+ UINT32 n_descsz; /* Length of descriptor. */\r
+ UINT32 n_type; /* Type of this note. */\r
+} Elf_Note;\r
+\r
+/* Indexes into the e_ident array. Keep synced with\r
+ http://www.sco.com/developers/gabi/latest/ch4.eheader.html */\r
+#define EI_MAG0 0 /* Magic number, byte 0. */\r
+#define EI_MAG1 1 /* Magic number, byte 1. */\r
+#define EI_MAG2 2 /* Magic number, byte 2. */\r
+#define EI_MAG3 3 /* Magic number, byte 3. */\r
+#define EI_CLASS 4 /* Class of machine. */\r
+#define EI_DATA 5 /* Data format. */\r
+#define EI_VERSION 6 /* ELF format version. */\r
+#define EI_OSABI 7 /* Operating system / ABI identification */\r
+#define EI_ABIVERSION 8 /* ABI version */\r
+#define OLD_EI_BRAND 8 /* Start of architecture identification. */\r
+#define EI_PAD 9 /* Start of padding (per SVR4 ABI). */\r
+#define EI_NIDENT 16 /* Size of e_ident array. */\r
+\r
+/* Values for the magic number bytes. */\r
+#define ELFMAG0 0x7f\r
+#define ELFMAG1 'E'\r
+#define ELFMAG2 'L'\r
+#define ELFMAG3 'F'\r
+#define ELFMAG "\177ELF" /* magic string */\r
+#define SELFMAG 4 /* magic string size */\r
+\r
+/* Values for e_ident[EI_VERSION] and e_version. */\r
+#define EV_NONE 0\r
+#define EV_CURRENT 1\r
+\r
+/* Values for e_ident[EI_CLASS]. */\r
+#define ELFCLASSNONE 0 /* Unknown class. */\r
+#define ELFCLASS32 1 /* 32-bit architecture. */\r
+#define ELFCLASS64 2 /* 64-bit architecture. */\r
+\r
+/* Values for e_ident[EI_DATA]. */\r
+#define ELFDATANONE 0 /* Unknown data format. */\r
+#define ELFDATA2LSB 1 /* 2's complement little-endian. */\r
+#define ELFDATA2MSB 2 /* 2's complement big-endian. */\r
+\r
+/* Values for e_ident[EI_OSABI]. */\r
+#define ELFOSABI_NONE 0 /* UNIX System V ABI */\r
+#define ELFOSABI_HPUX 1 /* HP-UX operating system */\r
+#define ELFOSABI_NETBSD 2 /* NetBSD */\r
+#define ELFOSABI_LINUX 3 /* GNU/Linux */\r
+#define ELFOSABI_HURD 4 /* GNU/Hurd */\r
+#define ELFOSABI_86OPEN 5 /* 86Open common IA32 ABI */\r
+#define ELFOSABI_SOLARIS 6 /* Solaris */\r
+#define ELFOSABI_AIX 7 /* AIX */\r
+#define ELFOSABI_IRIX 8 /* IRIX */\r
+#define ELFOSABI_FREEBSD 9 /* FreeBSD */\r
+#define ELFOSABI_TRU64 10 /* TRU64 UNIX */\r
+#define ELFOSABI_MODESTO 11 /* Novell Modesto */\r
+#define ELFOSABI_OPENBSD 12 /* OpenBSD */\r
+#define ELFOSABI_OPENVMS 13 /* Open VMS */\r
+#define ELFOSABI_NSK 14 /* HP Non-Stop Kernel */\r
+#define ELFOSABI_ARM 97 /* ARM */\r
+#define ELFOSABI_STANDALONE 255 /* Standalone (embedded) application */\r
+\r
+#define ELFOSABI_SYSV ELFOSABI_NONE /* symbol used in old spec */\r
+#define ELFOSABI_MONTEREY ELFOSABI_AIX /* Monterey */\r
+\r
+/* e_ident */\r
+#define IS_ELF(ehdr) ((ehdr).e_ident[EI_MAG0] == ELFMAG0 && \\r
+ (ehdr).e_ident[EI_MAG1] == ELFMAG1 && \\r
+ (ehdr).e_ident[EI_MAG2] == ELFMAG2 && \\r
+ (ehdr).e_ident[EI_MAG3] == ELFMAG3)\r
+\r
+/* Values for e_type. */\r
+#define ET_NONE 0 /* Unknown type. */\r
+#define ET_REL 1 /* Relocatable. */\r
+#define ET_EXEC 2 /* Executable. */\r
+#define ET_DYN 3 /* Shared object. */\r
+#define ET_CORE 4 /* Core file. */\r
+#define ET_LOOS 0xfe00 /* First operating system specific. */\r
+#define ET_HIOS 0xfeff /* Last operating system-specific. */\r
+#define ET_LOPROC 0xff00 /* First processor-specific. */\r
+#define ET_HIPROC 0xffff /* Last processor-specific. */\r
+\r
+/* Values for e_machine. */\r
+#define EM_NONE 0 /* Unknown machine. */\r
+#define EM_M32 1 /* AT&T WE32100. */\r
+#define EM_SPARC 2 /* Sun SPARC. */\r
+#define EM_386 3 /* Intel i386. */\r
+#define EM_68K 4 /* Motorola 68000. */\r
+#define EM_88K 5 /* Motorola 88000. */\r
+#define EM_860 7 /* Intel i860. */\r
+#define EM_MIPS 8 /* MIPS R3000 Big-Endian only. */\r
+#define EM_S370 9 /* IBM System/370. */\r
+#define EM_MIPS_RS3_LE 10 /* MIPS R3000 Little-Endian. */\r
+#define EM_PARISC 15 /* HP PA-RISC. */\r
+#define EM_VPP500 17 /* Fujitsu VPP500. */\r
+#define EM_SPARC32PLUS 18 /* SPARC v8plus. */\r
+#define EM_960 19 /* Intel 80960. */\r
+#define EM_PPC 20 /* PowerPC 32-bit. */\r
+#define EM_PPC64 21 /* PowerPC 64-bit. */\r
+#define EM_S390 22 /* IBM System/390. */\r
+#define EM_V800 36 /* NEC V800. */\r
+#define EM_FR20 37 /* Fujitsu FR20. */\r
+#define EM_RH32 38 /* TRW RH-32. */\r
+#define EM_RCE 39 /* Motorola RCE. */\r
+#define EM_ARM 40 /* ARM. */\r
+#define EM_SH 42 /* Hitachi SH. */\r
+#define EM_SPARCV9 43 /* SPARC v9 64-bit. */\r
+#define EM_TRICORE 44 /* Siemens TriCore embedded processor. */\r
+#define EM_ARC 45 /* Argonaut RISC Core. */\r
+#define EM_H8_300 46 /* Hitachi H8/300. */\r
+#define EM_H8_300H 47 /* Hitachi H8/300H. */\r
+#define EM_H8S 48 /* Hitachi H8S. */\r
+#define EM_H8_500 49 /* Hitachi H8/500. */\r
+#define EM_MIPS_X 51 /* Stanford MIPS-X. */\r
+#define EM_COLDFIRE 52 /* Motorola ColdFire. */\r
+#define EM_68HC12 53 /* Motorola M68HC12. */\r
+#define EM_MMA 54 /* Fujitsu MMA. */\r
+#define EM_PCP 55 /* Siemens PCP. */\r
+#define EM_NCPU 56 /* Sony nCPU. */\r
+#define EM_NDR1 57 /* Denso NDR1 microprocessor. */\r
+#define EM_STARCORE 58 /* Motorola Star*Core processor. */\r
+#define EM_ME16 59 /* Toyota ME16 processor. */\r
+#define EM_ST100 60 /* STMicroelectronics ST100 processor. */\r
+#define EM_TINYJ 61 /* Advanced Logic Corp. TinyJ processor. */\r
+#define EM_X86_64 62 /* Advanced Micro Devices x86-64 */\r
+#define EM_AMD64 EM_X86_64 /* Advanced Micro Devices x86-64 (compat) */\r
+#define EM_AARCH64 183 /* ARM 64bit Architecture */\r
+\r
+/* Non-standard or deprecated. */\r
+#define EM_486 6 /* Intel i486. */\r
+#define EM_MIPS_RS4_BE 10 /* MIPS R4000 Big-Endian */\r
+#define EM_ALPHA_STD 41 /* Digital Alpha (standard value). */\r
+#define EM_ALPHA 0x9026 /* Alpha (written in the absence of an ABI) */\r
+\r
+/* Special section indexes. */\r
+#define SHN_UNDEF 0 /* Undefined, missing, irrelevant. */\r
+#define SHN_LORESERVE 0xff00 /* First of reserved range. */\r
+#define SHN_LOPROC 0xff00 /* First processor-specific. */\r
+#define SHN_HIPROC 0xff1f /* Last processor-specific. */\r
+#define SHN_LOOS 0xff20 /* First operating system-specific. */\r
+#define SHN_HIOS 0xff3f /* Last operating system-specific. */\r
+#define SHN_ABS 0xfff1 /* Absolute values. */\r
+#define SHN_COMMON 0xfff2 /* Common data. */\r
+#define SHN_XINDEX 0xffff /* Escape -- index stored elsewhere. */\r
+#define SHN_HIRESERVE 0xffff /* Last of reserved range. */\r
+\r
+/* sh_type */\r
+#define SHT_NULL 0 /* inactive */\r
+#define SHT_PROGBITS 1 /* program defined information */\r
+#define SHT_SYMTAB 2 /* symbol table section */\r
+#define SHT_STRTAB 3 /* string table section */\r
+#define SHT_RELA 4 /* relocation section with addends */\r
+#define SHT_HASH 5 /* symbol hash table section */\r
+#define SHT_DYNAMIC 6 /* dynamic section */\r
+#define SHT_NOTE 7 /* note section */\r
+#define SHT_NOBITS 8 /* no space section */\r
+#define SHT_REL 9 /* relocation section - no addends */\r
+#define SHT_SHLIB 10 /* reserved - purpose unknown */\r
+#define SHT_DYNSYM 11 /* dynamic symbol table section */\r
+#define SHT_INIT_ARRAY 14 /* Initialization function pointers. */\r
+#define SHT_FINI_ARRAY 15 /* Termination function pointers. */\r
+#define SHT_PREINIT_ARRAY 16 /* Pre-initialization function ptrs. */\r
+#define SHT_GROUP 17 /* Section group. */\r
+#define SHT_SYMTAB_SHNDX 18 /* Section indexes (see SHN_XINDEX). */\r
+#define SHT_LOOS 0x60000000 /* First of OS specific semantics */\r
+#define SHT_LOSUNW 0x6ffffff4\r
+#define SHT_SUNW_dof 0x6ffffff4\r
+#define SHT_SUNW_cap 0x6ffffff5\r
+#define SHT_SUNW_SIGNATURE 0x6ffffff6\r
+#define SHT_SUNW_ANNOTATE 0x6ffffff7\r
+#define SHT_SUNW_DEBUGSTR 0x6ffffff8\r
+#define SHT_SUNW_DEBUG 0x6ffffff9\r
+#define SHT_SUNW_move 0x6ffffffa\r
+#define SHT_SUNW_COMDAT 0x6ffffffb\r
+#define SHT_SUNW_syminfo 0x6ffffffc\r
+#define SHT_SUNW_verdef 0x6ffffffd\r
+#define SHT_GNU_verdef 0x6ffffffd /* Symbol versions provided */\r
+#define SHT_SUNW_verneed 0x6ffffffe\r
+#define SHT_GNU_verneed 0x6ffffffe /* Symbol versions required */\r
+#define SHT_SUNW_versym 0x6fffffff\r
+#define SHT_GNU_versym 0x6fffffff /* Symbol version table */\r
+#define SHT_HISUNW 0x6fffffff\r
+#define SHT_HIOS 0x6fffffff /* Last of OS specific semantics */\r
+#define SHT_LOPROC 0x70000000 /* reserved range for processor */\r
+#define SHT_AMD64_UNWIND 0x70000001 /* unwind information */\r
+#define SHT_HIPROC 0x7fffffff /* specific section header types */\r
+#define SHT_LOUSER 0x80000000 /* reserved range for application */\r
+#define SHT_HIUSER 0xffffffff /* specific indexes */\r
+\r
+/* Flags for sh_flags. */\r
+#define SHF_WRITE 0x1 /* Section contains writable data. */\r
+#define SHF_ALLOC 0x2 /* Section occupies memory. */\r
+#define SHF_EXECINSTR 0x4 /* Section contains instructions. */\r
+#define SHF_MERGE 0x10 /* Section may be merged. */\r
+#define SHF_STRINGS 0x20 /* Section contains strings. */\r
+#define SHF_INFO_LINK 0x40 /* sh_info holds section index. */\r
+#define SHF_LINK_ORDER 0x80 /* Special ordering requirements. */\r
+#define SHF_OS_NONCONFORMING 0x100 /* OS-specific processing required. */\r
+#define SHF_GROUP 0x200 /* Member of section group. */\r
+#define SHF_TLS 0x400 /* Section contains TLS data. */\r
+#define SHF_MASKOS 0x0ff00000 /* OS-specific semantics. */\r
+#define SHF_MASKPROC 0xf0000000 /* Processor-specific semantics. */\r
+\r
+/* Values for p_type. */\r
+#define PT_NULL 0 /* Unused entry. */\r
+#define PT_LOAD 1 /* Loadable segment. */\r
+#define PT_DYNAMIC 2 /* Dynamic linking information segment. */\r
+#define PT_INTERP 3 /* Pathname of interpreter. */\r
+#define PT_NOTE 4 /* Auxiliary information. */\r
+#define PT_SHLIB 5 /* Reserved (not used). */\r
+#define PT_PHDR 6 /* Location of program header itself. */\r
+#define PT_TLS 7 /* Thread local storage segment */\r
+#define PT_LOOS 0x60000000 /* First OS-specific. */\r
+#define PT_SUNW_UNWIND 0x6464e550 /* amd64 UNWIND program header */\r
+#define PT_GNU_EH_FRAME 0x6474e550\r
+#define PT_LOSUNW 0x6ffffffa\r
+#define PT_SUNWBSS 0x6ffffffa /* Sun Specific segment */\r
+#define PT_SUNWSTACK 0x6ffffffb /* describes the stack segment */\r
+#define PT_SUNWDTRACE 0x6ffffffc /* private */\r
+#define PT_SUNWCAP 0x6ffffffd /* hard/soft capabilities segment */\r
+#define PT_HISUNW 0x6fffffff\r
+#define PT_HIOS 0x6fffffff /* Last OS-specific. */\r
+#define PT_LOPROC 0x70000000 /* First processor-specific type. */\r
+#define PT_HIPROC 0x7fffffff /* Last processor-specific type. */\r
+\r
+/* Values for p_flags. */\r
+#define PF_X 0x1 /* Executable. */\r
+#define PF_W 0x2 /* Writable. */\r
+#define PF_R 0x4 /* Readable. */\r
+#define PF_MASKOS 0x0ff00000 /* Operating system-specific. */\r
+#define PF_MASKPROC 0xf0000000 /* Processor-specific. */\r
+\r
+/* Extended program header index. */\r
+#define PN_XNUM 0xffff\r
+\r
+/* Values for d_tag. */\r
+#define DT_NULL 0 /* Terminating entry. */\r
+#define DT_NEEDED 1 /* String table offset of a needed shared\r
+ library. */\r
+#define DT_PLTRELSZ 2 /* Total size in bytes of PLT relocations. */\r
+#define DT_PLTGOT 3 /* Processor-dependent address. */\r
+#define DT_HASH 4 /* Address of symbol hash table. */\r
+#define DT_STRTAB 5 /* Address of string table. */\r
+#define DT_SYMTAB 6 /* Address of symbol table. */\r
+#define DT_RELA 7 /* Address of ElfNN_Rela relocations. */\r
+#define DT_RELASZ 8 /* Total size of ElfNN_Rela relocations. */\r
+#define DT_RELAENT 9 /* Size of each ElfNN_Rela relocation entry. */\r
+#define DT_STRSZ 10 /* Size of string table. */\r
+#define DT_SYMENT 11 /* Size of each symbol table entry. */\r
+#define DT_INIT 12 /* Address of initialization function. */\r
+#define DT_FINI 13 /* Address of finalization function. */\r
+#define DT_SONAME 14 /* String table offset of shared object\r
+ name. */\r
+#define DT_RPATH 15 /* String table offset of library path. [sup] */\r
+#define DT_SYMBOLIC 16 /* Indicates "symbolic" linking. [sup] */\r
+#define DT_REL 17 /* Address of ElfNN_Rel relocations. */\r
+#define DT_RELSZ 18 /* Total size of ElfNN_Rel relocations. */\r
+#define DT_RELENT 19 /* Size of each ElfNN_Rel relocation. */\r
+#define DT_PLTREL 20 /* Type of relocation used for PLT. */\r
+#define DT_DEBUG 21 /* Reserved (not used). */\r
+#define DT_TEXTREL 22 /* Indicates there may be relocations in\r
+ non-writable segments. [sup] */\r
+#define DT_JMPREL 23 /* Address of PLT relocations. */\r
+#define DT_BIND_NOW 24 /* [sup] */\r
+#define DT_INIT_ARRAY 25 /* Address of the array of pointers to\r
+ initialization functions */\r
+#define DT_FINI_ARRAY 26 /* Address of the array of pointers to\r
+ termination functions */\r
+#define DT_INIT_ARRAYSZ 27 /* Size in bytes of the array of\r
+ initialization functions. */\r
+#define DT_FINI_ARRAYSZ 28 /* Size in bytes of the array of\r
+ terminationfunctions. */\r
+#define DT_RUNPATH 29 /* String table offset of a null-terminated\r
+ library search path string. */\r
+#define DT_FLAGS 30 /* Object specific flag values. */\r
+#define DT_ENCODING 32 /* Values greater than or equal to DT_ENCODING\r
+ and less than DT_LOOS follow the rules for\r
+ the interpretation of the d_un union\r
+ as follows: even == 'd_ptr', even == 'd_val'\r
+ or none */\r
+#define DT_PREINIT_ARRAY 32 /* Address of the array of pointers to\r
+ pre-initialization functions. */\r
+#define DT_PREINIT_ARRAYSZ 33 /* Size in bytes of the array of\r
+ pre-initialization functions. */\r
+#define DT_MAXPOSTAGS 34 /* number of positive tags */\r
+#define DT_LOOS 0x6000000d /* First OS-specific */\r
+#define DT_SUNW_AUXILIARY 0x6000000d /* symbol auxiliary name */\r
+#define DT_SUNW_RTLDINF 0x6000000e /* ld.so.1 info (private) */\r
+#define DT_SUNW_FILTER 0x6000000f /* symbol filter name */\r
+#define DT_SUNW_CAP 0x60000010 /* hardware/software */\r
+#define DT_HIOS 0x6ffff000 /* Last OS-specific */\r
+\r
+/*\r
+ * DT_* entries which fall between DT_VALRNGHI & DT_VALRNGLO use the\r
+ * Dyn.d_un.d_val field of the Elf*_Dyn structure.\r
+ */\r
+#define DT_VALRNGLO 0x6ffffd00\r
+#define DT_CHECKSUM 0x6ffffdf8 /* elf checksum */\r
+#define DT_PLTPADSZ 0x6ffffdf9 /* pltpadding size */\r
+#define DT_MOVEENT 0x6ffffdfa /* move table entry size */\r
+#define DT_MOVESZ 0x6ffffdfb /* move table size */\r
+#define DT_FEATURE_1 0x6ffffdfc /* feature holder */\r
+#define DT_POSFLAG_1 0x6ffffdfd /* flags for DT_* entries, effecting */\r
+ /* the following DT_* entry. */\r
+ /* See DF_P1_* definitions */\r
+#define DT_SYMINSZ 0x6ffffdfe /* syminfo table size (in bytes) */\r
+#define DT_SYMINENT 0x6ffffdff /* syminfo entry size (in bytes) */\r
+#define DT_VALRNGHI 0x6ffffdff\r
+\r
+/*\r
+ * DT_* entries which fall between DT_ADDRRNGHI & DT_ADDRRNGLO use the\r
+ * Dyn.d_un.d_ptr field of the Elf*_Dyn structure.\r
+ *\r
+ * If any adjustment is made to the ELF object after it has been\r
+ * built, these entries will need to be adjusted.\r
+ */\r
+#define DT_ADDRRNGLO 0x6ffffe00\r
+#define DT_CONFIG 0x6ffffefa /* configuration information */\r
+#define DT_DEPAUDIT 0x6ffffefb /* dependency auditing */\r
+#define DT_AUDIT 0x6ffffefc /* object auditing */\r
+#define DT_PLTPAD 0x6ffffefd /* pltpadding (sparcv9) */\r
+#define DT_MOVETAB 0x6ffffefe /* move table */\r
+#define DT_SYMINFO 0x6ffffeff /* syminfo table */\r
+#define DT_ADDRRNGHI 0x6ffffeff\r
+\r
+#define DT_VERSYM 0x6ffffff0 /* Address of versym section. */\r
+#define DT_RELACOUNT 0x6ffffff9 /* number of RELATIVE relocations */\r
+#define DT_RELCOUNT 0x6ffffffa /* number of RELATIVE relocations */\r
+#define DT_FLAGS_1 0x6ffffffb /* state flags - see DF_1_* defs */\r
+#define DT_VERDEF 0x6ffffffc /* Address of verdef section. */\r
+#define DT_VERDEFNUM 0x6ffffffd /* Number of elems in verdef section */\r
+#define DT_VERNEED 0x6ffffffe /* Address of verneed section. */\r
+#define DT_VERNEEDNUM 0x6fffffff /* Number of elems in verneed section */\r
+\r
+#define DT_LOPROC 0x70000000 /* First processor-specific type. */\r
+#define DT_DEPRECATED_SPARC_REGISTER 0x7000001\r
+#define DT_AUXILIARY 0x7ffffffd /* shared library auxiliary name */\r
+#define DT_USED 0x7ffffffe /* ignored - same as needed */\r
+#define DT_FILTER 0x7fffffff /* shared library filter name */\r
+#define DT_HIPROC 0x7fffffff /* Last processor-specific type. */\r
+\r
+/* Values for DT_FLAGS */\r
+#define DF_ORIGIN 0x0001 /* Indicates that the object being loaded may\r
+ make reference to the $ORIGIN substitution\r
+ string */\r
+#define DF_SYMBOLIC 0x0002 /* Indicates "symbolic" linking. */\r
+#define DF_TEXTREL 0x0004 /* Indicates there may be relocations in\r
+ non-writable segments. */\r
+#define DF_BIND_NOW 0x0008 /* Indicates that the dynamic linker should\r
+ process all relocations for the object\r
+ containing this entry before transferring\r
+ control to the program. */\r
+#define DF_STATIC_TLS 0x0010 /* Indicates that the shared object or\r
+ executable contains code using a static\r
+ thread-local storage scheme. */\r
+\r
+/* Values for n_type. Used in core files. */\r
+#define NT_PRSTATUS 1 /* Process status. */\r
+#define NT_FPREGSET 2 /* Floating point registers. */\r
+#define NT_PRPSINFO 3 /* Process state info. */\r
+\r
+/* Symbol Binding - ELFNN_ST_BIND - st_info */\r
+#define STB_LOCAL 0 /* Local symbol */\r
+#define STB_GLOBAL 1 /* Global symbol */\r
+#define STB_WEAK 2 /* like global - lower precedence */\r
+#define STB_LOOS 10 /* Reserved range for operating system */\r
+#define STB_HIOS 12 /* specific semantics. */\r
+#define STB_LOPROC 13 /* reserved range for processor */\r
+#define STB_HIPROC 15 /* specific semantics. */\r
+\r
+/* Symbol type - ELFNN_ST_TYPE - st_info */\r
+#define STT_NOTYPE 0 /* Unspecified type. */\r
+#define STT_OBJECT 1 /* Data object. */\r
+#define STT_FUNC 2 /* Function. */\r
+#define STT_SECTION 3 /* Section. */\r
+#define STT_FILE 4 /* Source file. */\r
+#define STT_COMMON 5 /* Uninitialized common block. */\r
+#define STT_TLS 6 /* TLS object. */\r
+#define STT_NUM 7\r
+#define STT_LOOS 10 /* Reserved range for operating system */\r
+#define STT_HIOS 12 /* specific semantics. */\r
+#define STT_LOPROC 13 /* reserved range for processor */\r
+#define STT_HIPROC 15 /* specific semantics. */\r
+\r
+/* Symbol visibility - ELFNN_ST_VISIBILITY - st_other */\r
+#define STV_DEFAULT 0x0 /* Default visibility (see binding). */\r
+#define STV_INTERNAL 0x1 /* Special meaning in relocatable objects. */\r
+#define STV_HIDDEN 0x2 /* Not visible. */\r
+#define STV_PROTECTED 0x3 /* Visible but not preemptible. */\r
+\r
+/* Special symbol table indexes. */\r
+#define STN_UNDEF 0 /* Undefined symbol index. */\r
+\r
+/* Symbol versioning flags. */\r
+#define VER_DEF_CURRENT 1\r
+#define VER_DEF_IDX(x) VER_NDX(x)\r
+\r
+#define VER_FLG_BASE 0x01\r
+#define VER_FLG_WEAK 0x02\r
+\r
+#define VER_NEED_CURRENT 1\r
+#define VER_NEED_WEAK (1u << 15)\r
+#define VER_NEED_HIDDEN VER_NDX_HIDDEN\r
+#define VER_NEED_IDX(x) VER_NDX(x)\r
+\r
+#define VER_NDX_LOCAL 0\r
+#define VER_NDX_GLOBAL 1\r
+#define VER_NDX_GIVEN 2\r
+\r
+#define VER_NDX_HIDDEN (1u << 15)\r
+#define VER_NDX(x) ((x) & ~(1u << 15))\r
+\r
+#define CA_SUNW_NULL 0\r
+#define CA_SUNW_HW_1 1 /* first hardware capabilities entry */\r
+#define CA_SUNW_SF_1 2 /* first software capabilities entry */\r
+\r
+/*\r
+ * Syminfo flag values\r
+ */\r
+#define SYMINFO_FLG_DIRECT 0x0001 /* symbol ref has direct association */\r
+ /* to object containing defn. */\r
+#define SYMINFO_FLG_PASSTHRU 0x0002 /* ignored - see SYMINFO_FLG_FILTER */\r
+#define SYMINFO_FLG_COPY 0x0004 /* symbol is a copy-reloc */\r
+#define SYMINFO_FLG_LAZYLOAD 0x0008 /* object containing defn should be */\r
+ /* lazily-loaded */\r
+#define SYMINFO_FLG_DIRECTBIND 0x0010 /* ref should be bound directly to */\r
+ /* object containing defn. */\r
+#define SYMINFO_FLG_NOEXTDIRECT 0x0020 /* don't let an external reference */\r
+ /* directly bind to this symbol */\r
+#define SYMINFO_FLG_FILTER 0x0002 /* symbol ref is associated to a */\r
+#define SYMINFO_FLG_AUXILIARY 0x0040 /* standard or auxiliary filter */\r
+\r
+/*\r
+ * Syminfo.si_boundto values.\r
+ */\r
+#define SYMINFO_BT_SELF 0xffff /* symbol bound to self */\r
+#define SYMINFO_BT_PARENT 0xfffe /* symbol bound to parent */\r
+#define SYMINFO_BT_NONE 0xfffd /* no special symbol binding */\r
+#define SYMINFO_BT_EXTERN 0xfffc /* symbol defined as external */\r
+#define SYMINFO_BT_LOWRESERVE 0xff00 /* beginning of reserved entries */\r
+\r
+/*\r
+ * Syminfo version values.\r
+ */\r
+#define SYMINFO_NONE 0 /* Syminfo version */\r
+#define SYMINFO_CURRENT 1\r
+#define SYMINFO_NUM 2\r
+\r
+/*\r
+ * Relocation types.\r
+ *\r
+ * All machine architectures are defined here to allow tools on one to\r
+ * handle others.\r
+ */\r
+\r
+#define R_386_NONE 0 /* No relocation. */\r
+#define R_386_32 1 /* Add symbol value. */\r
+#define R_386_PC32 2 /* Add PC-relative symbol value. */\r
+#define R_386_GOT32 3 /* Add PC-relative GOT offset. */\r
+#define R_386_PLT32 4 /* Add PC-relative PLT offset. */\r
+#define R_386_COPY 5 /* Copy data from shared object. */\r
+#define R_386_GLOB_DAT 6 /* Set GOT entry to data address. */\r
+#define R_386_JMP_SLOT 7 /* Set GOT entry to code address. */\r
+#define R_386_RELATIVE 8 /* Add load address of shared object. */\r
+#define R_386_GOTOFF 9 /* Add GOT-relative symbol address. */\r
+#define R_386_GOTPC 10 /* Add PC-relative GOT table address. */\r
+#define R_386_TLS_TPOFF 14 /* Negative offset in static TLS block */\r
+#define R_386_TLS_IE 15 /* Absolute address of GOT for -ve static TLS */\r
+#define R_386_TLS_GOTIE 16 /* GOT entry for negative static TLS block */\r
+#define R_386_TLS_LE 17 /* Negative offset relative to static TLS */\r
+#define R_386_TLS_GD 18 /* 32 bit offset to GOT (index,off) pair */\r
+#define R_386_TLS_LDM 19 /* 32 bit offset to GOT (index,zero) pair */\r
+#define R_386_TLS_GD_32 24 /* 32 bit offset to GOT (index,off) pair */\r
+#define R_386_TLS_GD_PUSH 25 /* pushl instruction for Sun ABI GD sequence */\r
+#define R_386_TLS_GD_CALL 26 /* call instruction for Sun ABI GD sequence */\r
+#define R_386_TLS_GD_POP 27 /* popl instruction for Sun ABI GD sequence */\r
+#define R_386_TLS_LDM_32 28 /* 32 bit offset to GOT (index,zero) pair */\r
+#define R_386_TLS_LDM_PUSH 29 /* pushl instruction for Sun ABI LD sequence */\r
+#define R_386_TLS_LDM_CALL 30 /* call instruction for Sun ABI LD sequence */\r
+#define R_386_TLS_LDM_POP 31 /* popl instruction for Sun ABI LD sequence */\r
+#define R_386_TLS_LDO_32 32 /* 32 bit offset from start of TLS block */\r
+#define R_386_TLS_IE_32 33 /* 32 bit offset to GOT static TLS offset entry */\r
+#define R_386_TLS_LE_32 34 /* 32 bit offset within static TLS block */\r
+#define R_386_TLS_DTPMOD32 35 /* GOT entry containing TLS index */\r
+#define R_386_TLS_DTPOFF32 36 /* GOT entry containing TLS offset */\r
+#define R_386_TLS_TPOFF32 37 /* GOT entry of -ve static TLS offset */\r
+\r
+/* Null relocation */\r
+#define R_AARCH64_NONE 256 /* No relocation */\r
+/* Static AArch64 relocations */\r
+ /* Static data relocations */\r
+#define R_AARCH64_ABS64 257 /* S + A */\r
+#define R_AARCH64_ABS32 258 /* S + A */\r
+#define R_AARCH64_ABS16 259 /* S + A */\r
+#define R_AARCH64_PREL64 260 /* S + A - P */\r
+#define R_AARCH64_PREL32 261 /* S + A - P */\r
+#define R_AARCH64_PREL16 262 /* S + A - P */\r
+ /* Group relocations to create a 16, 32, 48, or 64 bit unsigned data value or address inline */\r
+#define R_AARCH64_MOVW_UABS_G0 263 /* S + A */\r
+#define R_AARCH64_MOVW_UABS_G0_NC 264 /* S + A */\r
+#define R_AARCH64_MOVW_UABS_G1 265 /* S + A */\r
+#define R_AARCH64_MOVW_UABS_G1_NC 266 /* S + A */\r
+#define R_AARCH64_MOVW_UABS_G2 267 /* S + A */\r
+#define R_AARCH64_MOVW_UABS_G2_NC 268 /* S + A */\r
+#define R_AARCH64_MOVW_UABS_G3 269 /* S + A */\r
+ /* Group relocations to create a 16, 32, 48, or 64 bit signed data or offset value inline */\r
+#define R_AARCH64_MOVW_SABS_G0 270 /* S + A */\r
+#define R_AARCH64_MOVW_SABS_G1 271 /* S + A */\r
+#define R_AARCH64_MOVW_SABS_G2 272 /* S + A */\r
+ /* Relocations to generate 19, 21 and 33 bit PC-relative addresses */\r
+#define R_AARCH64_LD_PREL_LO19 273 /* S + A - P */\r
+#define R_AARCH64_ADR_PREL_LO21 274 /* S + A - P */\r
+#define R_AARCH64_ADR_PREL_PG_HI21 275 /* Page(S+A) - Page(P) */\r
+#define R_AARCH64_ADR_PREL_PG_HI21_NC 276 /* Page(S+A) - Page(P) */\r
+#define R_AARCH64_ADD_ABS_LO12_NC 277 /* S + A */\r
+#define R_AARCH64_LDST8_ABS_LO12_NC 278 /* S + A */\r
+#define R_AARCH64_LDST16_ABS_LO12_NC 284 /* S + A */\r
+#define R_AARCH64_LDST32_ABS_LO12_NC 285 /* S + A */\r
+#define R_AARCH64_LDST64_ABS_LO12_NC 286 /* S + A */\r
+#define R_AARCH64_LDST128_ABS_LO12_NC 299 /* S + A */\r
+ /* Relocations for control-flow instructions - all offsets are a multiple of 4 */\r
+#define R_AARCH64_TSTBR14 279 /* S+A-P */\r
+#define R_AARCH64_CONDBR19 280 /* S+A-P */\r
+#define R_AARCH64_JUMP26 282 /* S+A-P */\r
+#define R_AARCH64_CALL26 283 /* S+A-P */\r
+ /* Group relocations to create a 16, 32, 48, or 64 bit PC-relative offset inline */\r
+#define R_AARCH64_MOVW_PREL_G0 287 /* S+A-P */\r
+#define R_AARCH64_MOVW_PREL_G0_NC 288 /* S+A-P */\r
+#define R_AARCH64_MOVW_PREL_G1 289 /* S+A-P */\r
+#define R_AARCH64_MOVW_PREL_G1_NC 290 /* S+A-P */\r
+#define R_AARCH64_MOVW_PREL_G2 291 /* S+A-P */\r
+#define R_AARCH64_MOVW_PREL_G2_NC 292 /* S+A-P */\r
+#define R_AARCH64_MOVW_PREL_G3 293 /* S+A-P */\r
+ /* Group relocations to create a 16, 32, 48, or 64 bit GOT-relative offsets inline */\r
+#define R_AARCH64_MOVW_GOTOFF_G0 300 /* G(S)-GOT */\r
+#define R_AARCH64_MOVW_GOTOFF_G0_NC 301 /* G(S)-GOT */\r
+#define R_AARCH64_MOVW_GOTOFF_G1 302 /* G(S)-GOT */\r
+#define R_AARCH64_MOVW_GOTOFF_G1_NC 303 /* G(S)-GOT */\r
+#define R_AARCH64_MOVW_GOTOFF_G2 304 /* G(S)-GOT */\r
+#define R_AARCH64_MOVW_GOTOFF_G2_NC 305 /* G(S)-GOT */\r
+#define R_AARCH64_MOVW_GOTOFF_G3 306 /* G(S)-GOT */\r
+ /* GOT-relative data relocations */\r
+#define R_AARCH64_GOTREL64 307 /* S+A-GOT */\r
+#define R_AARCH64_GOTREL32 308 /* S+A-GOT */\r
+ /* GOT-relative instruction relocations */\r
+#define R_AARCH64_GOT_LD_PREL19 309 /* G(S)-P */\r
+#define R_AARCH64_LD64_GOTOFF_LO15 310 /* G(S)-GOT */\r
+#define R_AARCH64_ADR_GOT_PAGE 311 /* Page(G(S))-Page(P) */\r
+#define R_AARCH64_LD64_GOT_LO12_NC 312 /* G(S) */\r
+#define R_AARCH64_LD64_GOTPAGE_LO15 313 /* G(S)-Page(GOT) */\r
+/* Relocations for thread-local storage */\r
+ /* General Dynamic TLS relocations */\r
+#define R_AARCH64_TLSGD_ADR_PREL21 512 /* G(TLSIDX(S+A)) - P */\r
+#define R_AARCH64_TLSGD_ADR_PAGE21 513 /* Page(G(TLSIDX(S+A))) - Page(P) */\r
+#define R_AARCH64_TLSGD_ADD_LO12_NC 514 /* G(TLSIDX(S+A)) */\r
+#define R_AARCH64_TLSGD_MOVW_G1 515 /* G(TLSIDX(S+A)) - GOT */\r
+#define R_AARCH64_TLSGD_MOVW_G0_NC 516 /* G(TLSIDX(S+A)) - GOT */\r
+ /* Local Dynamic TLS relocations */\r
+#define R_AARCH64_TLSLD_ADR_PREL21 517 /* G(LDM(S))) - P */\r
+#define R_AARCH64_TLSLD_ADR_PAGE21 518 /* Page(G(LDM(S)))-Page(P) */\r
+#define R_AARCH64_TLSLD_ADD_LO12_NC 519 /* G(LDM(S)) */\r
+#define R_AARCH64_TLSLD_MOVW_G1 520 /* G(LDM(S)) - GOT */\r
+#define R_AARCH64_TLSLD_MOVW_G0_NC 521 /* G(LDM(S)) - GOT */\r
+#define R_AARCH64_TLSLD_LD_PREL19 522 /* G(LDM(S)) - P */\r
+#define R_AARCH64_TLSLD_MOVW_DTPREL_G2 523 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_MOVW_DTPREL_G1 524 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_MOVW_DTPREL_G1_NC 525 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_MOVW_DTPREL_G0 526 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_MOVW_DTPREL_G0_NC 527 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_ADD_DTPREL_HI12 528 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_ADD_DTPREL_LO12 529 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_ADD_DTPREL_LO12_NC 530 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST8_DTPREL_LO12 531 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST8_DTPREL_LO12_NC 532 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST16_DTPREL_LO12 533 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST16_DTPREL_LO12_NC 534 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST32_DTPREL_LO12 535 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST32_DTPREL_LO12_NC 536 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST64_DTPREL_LO12 537 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLSLD_LDST64_DTPREL_LO12_NC 538 /* DTPREL(S+A) */\r
+ /* Initial Exec TLS relocations */\r
+#define R_AARCH64_TLSIE_MOVW_GOTTPREL_G1 539 /* G(TPREL(S+A)) - GOT */\r
+#define R_AARCH64_TLSIE_MOVW_GOTTPREL_G0_NC 540 /* G(TPREL(S+A)) - GOT */\r
+#define R_AARCH64_TLSIE_ADR_GOTTPREL_PAGE21 541 /* Page(G(TPREL(S+A))) - Page(P) */\r
+#define R_AARCH64_TLSIE_LD64_GOTTPREL_LO12_NC 542 /* G(TPREL(S+A)) */\r
+#define R_AARCH64_TLSIE_LD_GOTTPREL_PREL19 543 /* G(TPREL(S+A)) - P */\r
+ /* Local Exec TLS relocations */\r
+#define R_AARCH64_TLSLE_MOVW_TPREL_G2 544 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_MOVW_TPREL_G1 545 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_MOVW_TPREL_G1_NC 546 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_MOVW_TPREL_G0 547 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_MOVW_TPREL_G0_NC 548 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_ADD_TPREL_HI12 549 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_ADD_TPREL_LO12 550 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_ADD_TPREL_LO12_NC 551 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST8_TPREL_LO12 552 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST8_TPREL_LO12_NC 553 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST16_TPREL_LO12 554 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST16_TPREL_LO12_NC 555 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST32_TPREL_LO12 556 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST32_TPREL_LO12_NC 557 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST64_TPREL_LO12 558 /* TPREL(S+A) */\r
+#define R_AARCH64_TLSLE_LDST64_TPREL_LO12_NC 559 /* TPREL(S+A) */\r
+/* Dynamic relocations */\r
+ /* Dynamic relocations */\r
+#define R_AARCH64_COPY 1024\r
+#define R_AARCH64_GLOB_DAT 1025 /* S + A */\r
+#define R_AARCH64_JUMP_SLOT 1026 /* S + A */\r
+#define R_AARCH64_RELATIVE 1027 /* Delta(S) + A , Delta(P) + A */\r
+#define R_AARCH64_TLS_DTPREL64 1028 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLS_DTPMOD64 1029 /* LDM(S) */\r
+#define R_AARCH64_TLS_TPREL64 1030 /* TPREL(S+A) */\r
+#define R_AARCH64_TLS_DTPREL32 1031 /* DTPREL(S+A) */\r
+#define R_AARCH64_TLS_DTPMOD32 1032 /* LDM(S) */\r
+#define R_AARCH64_TLS_TPREL32 1033 /* DTPREL(S+A) */\r
+\r
+#define R_ALPHA_NONE 0 /* No reloc */\r
+#define R_ALPHA_REFLONG 1 /* Direct 32 bit */\r
+#define R_ALPHA_REFQUAD 2 /* Direct 64 bit */\r
+#define R_ALPHA_GPREL32 3 /* GP relative 32 bit */\r
+#define R_ALPHA_LITERAL 4 /* GP relative 16 bit w/optimization */\r
+#define R_ALPHA_LITUSE 5 /* Optimization hint for LITERAL */\r
+#define R_ALPHA_GPDISP 6 /* Add displacement to GP */\r
+#define R_ALPHA_BRADDR 7 /* PC+4 relative 23 bit shifted */\r
+#define R_ALPHA_HINT 8 /* PC+4 relative 16 bit shifted */\r
+#define R_ALPHA_SREL16 9 /* PC relative 16 bit */\r
+#define R_ALPHA_SREL32 10 /* PC relative 32 bit */\r
+#define R_ALPHA_SREL64 11 /* PC relative 64 bit */\r
+#define R_ALPHA_OP_PUSH 12 /* OP stack push */\r
+#define R_ALPHA_OP_STORE 13 /* OP stack pop and store */\r
+#define R_ALPHA_OP_PSUB 14 /* OP stack subtract */\r
+#define R_ALPHA_OP_PRSHIFT 15 /* OP stack right shift */\r
+#define R_ALPHA_GPVALUE 16\r
+#define R_ALPHA_GPRELHIGH 17\r
+#define R_ALPHA_GPRELLOW 18\r
+#define R_ALPHA_IMMED_GP_16 19\r
+#define R_ALPHA_IMMED_GP_HI32 20\r
+#define R_ALPHA_IMMED_SCN_HI32 21\r
+#define R_ALPHA_IMMED_BR_HI32 22\r
+#define R_ALPHA_IMMED_LO32 23\r
+#define R_ALPHA_COPY 24 /* Copy symbol at runtime */\r
+#define R_ALPHA_GLOB_DAT 25 /* Create GOT entry */\r
+#define R_ALPHA_JMP_SLOT 26 /* Create PLT entry */\r
+#define R_ALPHA_RELATIVE 27 /* Adjust by program base */\r
+\r
+#define R_ARM_NONE 0 /* No relocation. */\r
+#define R_ARM_PC24 1\r
+#define R_ARM_ABS32 2\r
+#define R_ARM_REL32 3\r
+#define R_ARM_PC13 4\r
+#define R_ARM_ABS16 5\r
+#define R_ARM_ABS12 6\r
+#define R_ARM_THM_ABS5 7\r
+#define R_ARM_ABS8 8\r
+#define R_ARM_SBREL32 9\r
+#define R_ARM_THM_PC22 10\r
+#define R_ARM_THM_PC8 11\r
+#define R_ARM_AMP_VCALL9 12\r
+#define R_ARM_SWI24 13\r
+#define R_ARM_THM_SWI8 14\r
+#define R_ARM_XPC25 15\r
+#define R_ARM_THM_XPC22 16\r
+#define R_ARM_COPY 20 /* Copy data from shared object. */\r
+#define R_ARM_GLOB_DAT 21 /* Set GOT entry to data address. */\r
+#define R_ARM_JUMP_SLOT 22 /* Set GOT entry to code address. */\r
+#define R_ARM_RELATIVE 23 /* Add load address of shared object. */\r
+#define R_ARM_GOTOFF 24 /* Add GOT-relative symbol address. */\r
+#define R_ARM_GOTPC 25 /* Add PC-relative GOT table address. */\r
+#define R_ARM_GOT32 26 /* Add PC-relative GOT offset. */\r
+#define R_ARM_PLT32 27 /* Add PC-relative PLT offset. */\r
+#define R_ARM_CALL 28\r
+#define R_ARM_JMP24 29\r
+#define R_ARM_THM_MOVW_ABS_NC 47\r
+#define R_ARM_THM_MOVT_ABS 48\r
+\r
+// Block of PC-relative relocations added to work around gcc putting\r
+// object relocations in static executables.\r
+#define R_ARM_THM_JUMP24 30\r
+#define R_ARM_PREL31 42\r
+#define R_ARM_MOVW_PREL_NC 45\r
+#define R_ARM_MOVT_PREL 46\r
+#define R_ARM_THM_MOVW_PREL_NC 49\r
+#define R_ARM_THM_MOVT_PREL 50\r
+#define R_ARM_THM_JMP6 52\r
+#define R_ARM_THM_ALU_PREL_11_0 53\r
+#define R_ARM_THM_PC12 54\r
+#define R_ARM_REL32_NOI 56\r
+#define R_ARM_ALU_PC_G0_NC 57\r
+#define R_ARM_ALU_PC_G0 58\r
+#define R_ARM_ALU_PC_G1_NC 59\r
+#define R_ARM_ALU_PC_G1 60\r
+#define R_ARM_ALU_PC_G2 61\r
+#define R_ARM_LDR_PC_G1 62\r
+#define R_ARM_LDR_PC_G2 63\r
+#define R_ARM_LDRS_PC_G0 64\r
+#define R_ARM_LDRS_PC_G1 65\r
+#define R_ARM_LDRS_PC_G2 66\r
+#define R_ARM_LDC_PC_G0 67\r
+#define R_ARM_LDC_PC_G1 68\r
+#define R_ARM_LDC_PC_G2 69\r
+#define R_ARM_GOT_PREL 96\r
+#define R_ARM_THM_JUMP11 102\r
+#define R_ARM_THM_JUMP8 103\r
+#define R_ARM_TLS_GD32 104\r
+#define R_ARM_TLS_LDM32 105\r
+#define R_ARM_TLS_IE32 107\r
+\r
+#define R_ARM_THM_JUMP19 51\r
+#define R_ARM_GNU_VTENTRY 100\r
+#define R_ARM_GNU_VTINHERIT 101\r
+#define R_ARM_RSBREL32 250\r
+#define R_ARM_THM_RPC22 251\r
+#define R_ARM_RREL32 252\r
+#define R_ARM_RABS32 253\r
+#define R_ARM_RPC24 254\r
+#define R_ARM_RBASE 255\r
+\r
+#define R_PPC_NONE 0 /* No relocation. */\r
+#define R_PPC_ADDR32 1\r
+#define R_PPC_ADDR24 2\r
+#define R_PPC_ADDR16 3\r
+#define R_PPC_ADDR16_LO 4\r
+#define R_PPC_ADDR16_HI 5\r
+#define R_PPC_ADDR16_HA 6\r
+#define R_PPC_ADDR14 7\r
+#define R_PPC_ADDR14_BRTAKEN 8\r
+#define R_PPC_ADDR14_BRNTAKEN 9\r
+#define R_PPC_REL24 10\r
+#define R_PPC_REL14 11\r
+#define R_PPC_REL14_BRTAKEN 12\r
+#define R_PPC_REL14_BRNTAKEN 13\r
+#define R_PPC_GOT16 14\r
+#define R_PPC_GOT16_LO 15\r
+#define R_PPC_GOT16_HI 16\r
+#define R_PPC_GOT16_HA 17\r
+#define R_PPC_PLTREL24 18\r
+#define R_PPC_COPY 19\r
+#define R_PPC_GLOB_DAT 20\r
+#define R_PPC_JMP_SLOT 21\r
+#define R_PPC_RELATIVE 22\r
+#define R_PPC_LOCAL24PC 23\r
+#define R_PPC_UADDR32 24\r
+#define R_PPC_UADDR16 25\r
+#define R_PPC_REL32 26\r
+#define R_PPC_PLT32 27\r
+#define R_PPC_PLTREL32 28\r
+#define R_PPC_PLT16_LO 29\r
+#define R_PPC_PLT16_HI 30\r
+#define R_PPC_PLT16_HA 31\r
+#define R_PPC_SDAREL16 32\r
+#define R_PPC_SECTOFF 33\r
+#define R_PPC_SECTOFF_LO 34\r
+#define R_PPC_SECTOFF_HI 35\r
+#define R_PPC_SECTOFF_HA 36\r
+\r
+/*\r
+ * TLS relocations\r
+ */\r
+#define R_PPC_TLS 67\r
+#define R_PPC_DTPMOD32 68\r
+#define R_PPC_TPREL16 69\r
+#define R_PPC_TPREL16_LO 70\r
+#define R_PPC_TPREL16_HI 71\r
+#define R_PPC_TPREL16_HA 72\r
+#define R_PPC_TPREL32 73\r
+#define R_PPC_DTPREL16 74\r
+#define R_PPC_DTPREL16_LO 75\r
+#define R_PPC_DTPREL16_HI 76\r
+#define R_PPC_DTPREL16_HA 77\r
+#define R_PPC_DTPREL32 78\r
+#define R_PPC_GOT_TLSGD16 79\r
+#define R_PPC_GOT_TLSGD16_LO 80\r
+#define R_PPC_GOT_TLSGD16_HI 81\r
+#define R_PPC_GOT_TLSGD16_HA 82\r
+#define R_PPC_GOT_TLSLD16 83\r
+#define R_PPC_GOT_TLSLD16_LO 84\r
+#define R_PPC_GOT_TLSLD16_HI 85\r
+#define R_PPC_GOT_TLSLD16_HA 86\r
+#define R_PPC_GOT_TPREL16 87\r
+#define R_PPC_GOT_TPREL16_LO 88\r
+#define R_PPC_GOT_TPREL16_HI 89\r
+#define R_PPC_GOT_TPREL16_HA 90\r
+\r
+/*\r
+ * The remaining relocs are from the Embedded ELF ABI, and are not in the\r
+ * SVR4 ELF ABI.\r
+ */\r
+\r
+#define R_PPC_EMB_NADDR32 101\r
+#define R_PPC_EMB_NADDR16 102\r
+#define R_PPC_EMB_NADDR16_LO 103\r
+#define R_PPC_EMB_NADDR16_HI 104\r
+#define R_PPC_EMB_NADDR16_HA 105\r
+#define R_PPC_EMB_SDAI16 106\r
+#define R_PPC_EMB_SDA2I16 107\r
+#define R_PPC_EMB_SDA2REL 108\r
+#define R_PPC_EMB_SDA21 109\r
+#define R_PPC_EMB_MRKREF 110\r
+#define R_PPC_EMB_RELSEC16 111\r
+#define R_PPC_EMB_RELST_LO 112\r
+#define R_PPC_EMB_RELST_HI 113\r
+#define R_PPC_EMB_RELST_HA 114\r
+#define R_PPC_EMB_BIT_FLD 115\r
+#define R_PPC_EMB_RELSDA 116\r
+\r
+#define R_SPARC_NONE 0\r
+#define R_SPARC_8 1\r
+#define R_SPARC_16 2\r
+#define R_SPARC_32 3\r
+#define R_SPARC_DISP8 4\r
+#define R_SPARC_DISP16 5\r
+#define R_SPARC_DISP32 6\r
+#define R_SPARC_WDISP30 7\r
+#define R_SPARC_WDISP22 8\r
+#define R_SPARC_HI22 9\r
+#define R_SPARC_22 10\r
+#define R_SPARC_13 11\r
+#define R_SPARC_LO10 12\r
+#define R_SPARC_GOT10 13\r
+#define R_SPARC_GOT13 14\r
+#define R_SPARC_GOT22 15\r
+#define R_SPARC_PC10 16\r
+#define R_SPARC_PC22 17\r
+#define R_SPARC_WPLT30 18\r
+#define R_SPARC_COPY 19\r
+#define R_SPARC_GLOB_DAT 20\r
+#define R_SPARC_JMP_SLOT 21\r
+#define R_SPARC_RELATIVE 22\r
+#define R_SPARC_UA32 23\r
+#define R_SPARC_PLT32 24\r
+#define R_SPARC_HIPLT22 25\r
+#define R_SPARC_LOPLT10 26\r
+#define R_SPARC_PCPLT32 27\r
+#define R_SPARC_PCPLT22 28\r
+#define R_SPARC_PCPLT10 29\r
+#define R_SPARC_10 30\r
+#define R_SPARC_11 31\r
+#define R_SPARC_64 32\r
+#define R_SPARC_OLO10 33\r
+#define R_SPARC_HH22 34\r
+#define R_SPARC_HM10 35\r
+#define R_SPARC_LM22 36\r
+#define R_SPARC_PC_HH22 37\r
+#define R_SPARC_PC_HM10 38\r
+#define R_SPARC_PC_LM22 39\r
+#define R_SPARC_WDISP16 40\r
+#define R_SPARC_WDISP19 41\r
+#define R_SPARC_GLOB_JMP 42\r
+#define R_SPARC_7 43\r
+#define R_SPARC_5 44\r
+#define R_SPARC_6 45\r
+#define R_SPARC_DISP64 46\r
+#define R_SPARC_PLT64 47\r
+#define R_SPARC_HIX22 48\r
+#define R_SPARC_LOX10 49\r
+#define R_SPARC_H44 50\r
+#define R_SPARC_M44 51\r
+#define R_SPARC_L44 52\r
+#define R_SPARC_REGISTER 53\r
+#define R_SPARC_UA64 54\r
+#define R_SPARC_UA16 55\r
+#define R_SPARC_TLS_GD_HI22 56\r
+#define R_SPARC_TLS_GD_LO10 57\r
+#define R_SPARC_TLS_GD_ADD 58\r
+#define R_SPARC_TLS_GD_CALL 59\r
+#define R_SPARC_TLS_LDM_HI22 60\r
+#define R_SPARC_TLS_LDM_LO10 61\r
+#define R_SPARC_TLS_LDM_ADD 62\r
+#define R_SPARC_TLS_LDM_CALL 63\r
+#define R_SPARC_TLS_LDO_HIX22 64\r
+#define R_SPARC_TLS_LDO_LOX10 65\r
+#define R_SPARC_TLS_LDO_ADD 66\r
+#define R_SPARC_TLS_IE_HI22 67\r
+#define R_SPARC_TLS_IE_LO10 68\r
+#define R_SPARC_TLS_IE_LD 69\r
+#define R_SPARC_TLS_IE_LDX 70\r
+#define R_SPARC_TLS_IE_ADD 71\r
+#define R_SPARC_TLS_LE_HIX22 72\r
+#define R_SPARC_TLS_LE_LOX10 73\r
+#define R_SPARC_TLS_DTPMOD32 74\r
+#define R_SPARC_TLS_DTPMOD64 75\r
+#define R_SPARC_TLS_DTPOFF32 76\r
+#define R_SPARC_TLS_DTPOFF64 77\r
+#define R_SPARC_TLS_TPOFF32 78\r
+#define R_SPARC_TLS_TPOFF64 79\r
+\r
+#define R_X86_64_NONE 0 /* No relocation. */\r
+#define R_X86_64_64 1 /* Add 64 bit symbol value. */\r
+#define R_X86_64_PC32 2 /* PC-relative 32 bit signed sym value. */\r
+#define R_X86_64_GOT32 3 /* PC-relative 32 bit GOT offset. */\r
+#define R_X86_64_PLT32 4 /* PC-relative 32 bit PLT offset. */\r
+#define R_X86_64_COPY 5 /* Copy data from shared object. */\r
+#define R_X86_64_GLOB_DAT 6 /* Set GOT entry to data address. */\r
+#define R_X86_64_JMP_SLOT 7 /* Set GOT entry to code address. */\r
+#define R_X86_64_RELATIVE 8 /* Add load address of shared object. */\r
+#define R_X86_64_GOTPCREL 9 /* Add 32 bit signed pcrel offset to GOT. */\r
+#define R_X86_64_32 10 /* Add 32 bit zero extended symbol value */\r
+#define R_X86_64_32S 11 /* Add 32 bit sign extended symbol value */\r
+#define R_X86_64_16 12 /* Add 16 bit zero extended symbol value */\r
+#define R_X86_64_PC16 13 /* Add 16 bit signed extended pc relative symbol value */\r
+#define R_X86_64_8 14 /* Add 8 bit zero extended symbol value */\r
+#define R_X86_64_PC8 15 /* Add 8 bit signed extended pc relative symbol value */\r
+#define R_X86_64_DTPMOD64 16 /* ID of module containing symbol */\r
+#define R_X86_64_DTPOFF64 17 /* Offset in TLS block */\r
+#define R_X86_64_TPOFF64 18 /* Offset in static TLS block */\r
+#define R_X86_64_TLSGD 19 /* PC relative offset to GD GOT entry */\r
+#define R_X86_64_TLSLD 20 /* PC relative offset to LD GOT entry */\r
+#define R_X86_64_DTPOFF32 21 /* Offset in TLS block */\r
+#define R_X86_64_GOTTPOFF 22 /* PC relative offset to IE GOT entry */\r
+#define R_X86_64_TPOFF32 23 /* Offset in static TLS block */\r
+#define R_X86_64_PC64 24 /* PC relative 64 bit */\r
+#define R_X86_64_GOTOFF64 25 /* 64 bit offset to GOT */\r
+#define R_X86_64_GOTPC3 26 /* 32 bit signed pc relative offset to GOT */\r
+#define R_X86_64_GOT64 27 /* 64-bit GOT entry offset */\r
+#define R_X86_64_GOTPCREL64 28 /* 64-bit PC relative offset to GOT entry */\r
+#define R_X86_64_GOTPC64 29 /* 64-bit PC relative offset to GOT */\r
+#define R_X86_64_GOTPLT64 30 /* like GOT64, says PLT entry needed */\r
+#define R_X86_64_PLTOFF64 31 /* 64-bit GOT relative offset to PLT entry */\r
+#define R_X86_64_SIZE32 32 /* Size of symbol plus 32-bit addend */\r
+#define R_X86_64_SIZE64 33 /* Size of symbol plus 64-bit addend */\r
+#define R_X86_64_GOTPC32_TLSDESC 34 /* GOT offset for TLS descriptor. */\r
+#define R_X86_64_TLSDESC_CALL 35 /* Marker for call through TLS descriptor. */\r
+#define R_X86_64_TLSDESC 36 /* TLS descriptor. */\r
+#define R_X86_64_IRELATIVE 37 /* Adjust indirectly by program base */\r
+#define R_X86_64_RELATIVE64 38 /* 64-bit adjust by program base */\r
+#define R_X86_64_GOTPCRELX 41 /* Load from 32 bit signed pc relative offset to GOT entry without REX prefix, relaxable. */\r
+#define R_X86_64_REX_GOTPCRELX 42 /* Load from 32 bit signed pc relative offset to GOT entry with REX prefix, relaxable. */\r
+\r
+\r
+#endif /* !_SYS_ELF_COMMON_H_ */\r
--- /dev/null
+/** @file\r
+ ELF library\r
+\r
+ Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.<BR>\r
+ SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#include "ElfLibInternal.h"\r
+\r
+/**\r
+ Check if the ELF image is valid.\r
+\r
+ @param[in] ImageBase Memory address of an image.\r
+\r
+ @retval TRUE if valid.\r
+\r
+**/\r
+BOOLEAN\r
+IsElfFormat (\r
+ IN CONST UINT8 *ImageBase\r
+ )\r
+{\r
+ Elf32_Ehdr *Elf32Hdr;\r
+ Elf64_Ehdr *Elf64Hdr;\r
+\r
+ ASSERT (ImageBase != NULL);\r
+\r
+ Elf32Hdr = (Elf32_Ehdr *)ImageBase;\r
+\r
+ //\r
+ // Start with correct signature "\7fELF"\r
+ //\r
+ if ((Elf32Hdr->e_ident[EI_MAG0] != ELFMAG0) ||\r
+ (Elf32Hdr->e_ident[EI_MAG1] != ELFMAG1) ||\r
+ (Elf32Hdr->e_ident[EI_MAG1] != ELFMAG1) ||\r
+ (Elf32Hdr->e_ident[EI_MAG2] != ELFMAG2)\r
+ ) {\r
+ return FALSE;\r
+ }\r
+\r
+ //\r
+ // Support little-endian only\r
+ //\r
+ if (Elf32Hdr->e_ident[EI_DATA] != ELFDATA2LSB) {\r
+ return FALSE;\r
+ }\r
+\r
+ //\r
+ // Check 32/64-bit architecture\r
+ //\r
+ if (Elf32Hdr->e_ident[EI_CLASS] == ELFCLASS64) {\r
+ Elf64Hdr = (Elf64_Ehdr *)Elf32Hdr;\r
+ Elf32Hdr = NULL;\r
+ } else if (Elf32Hdr->e_ident[EI_CLASS] == ELFCLASS32) {\r
+ Elf64Hdr = NULL;\r
+ } else {\r
+ return FALSE;\r
+ }\r
+\r
+ if (Elf64Hdr != NULL) {\r
+ //\r
+ // Support intel architecture only for now\r
+ //\r
+ if (Elf64Hdr->e_machine != EM_X86_64) {\r
+ return FALSE;\r
+ }\r
+\r
+ //\r
+ // Support ELF types: EXEC (Executable file), DYN (Shared object file)\r
+ //\r
+ if ((Elf64Hdr->e_type != ET_EXEC) && (Elf64Hdr->e_type != ET_DYN)) {\r
+ return FALSE;\r
+ }\r
+\r
+ //\r
+ // Support current ELF version only\r
+ //\r
+ if (Elf64Hdr->e_version != EV_CURRENT) {\r
+ return FALSE;\r
+ }\r
+ } else {\r
+ //\r
+ // Support intel architecture only for now\r
+ //\r
+ if (Elf32Hdr->e_machine != EM_386) {\r
+ return FALSE;\r
+ }\r
+\r
+ //\r
+ // Support ELF types: EXEC (Executable file), DYN (Shared object file)\r
+ //\r
+ if ((Elf32Hdr->e_type != ET_EXEC) && (Elf32Hdr->e_type != ET_DYN)) {\r
+ return FALSE;\r
+ }\r
+\r
+ //\r
+ // Support current ELF version only\r
+ //\r
+ if (Elf32Hdr->e_version != EV_CURRENT) {\r
+ return FALSE;\r
+ }\r
+ }\r
+ return TRUE;\r
+}\r
+\r
+/**\r
+ Calculate a ELF file size.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+ @param[out] FileSize Return the file size.\r
+\r
+ @retval EFI_INVALID_PARAMETER ElfCt or SecPos is NULL.\r
+ @retval EFI_NOT_FOUND Could not find the section.\r
+ @retval EFI_SUCCESS Section posistion was filled successfully.\r
+**/\r
+EFI_STATUS\r
+CalculateElfFileSize (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt,\r
+ OUT UINTN *FileSize\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ UINTN FileSize1;\r
+ UINTN FileSize2;\r
+ Elf32_Ehdr *Elf32Hdr;\r
+ Elf64_Ehdr *Elf64Hdr;\r
+ UINTN Offset;\r
+ UINTN Size;\r
+\r
+ if ((ElfCt == NULL) || (FileSize == NULL)) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ // Use last section as end of file\r
+ Status = GetElfSectionPos (ElfCt, ElfCt->ShNum - 1, &Offset, &Size);\r
+ if (EFI_ERROR(Status)) {\r
+ return EFI_UNSUPPORTED;\r
+ }\r
+ FileSize1 = Offset + Size;\r
+\r
+ // Use end of section header as end of file\r
+ FileSize2 = 0;\r
+ if (ElfCt->EiClass == ELFCLASS32) {\r
+ Elf32Hdr = (Elf32_Ehdr *)ElfCt->FileBase;\r
+ FileSize2 = Elf32Hdr->e_shoff + Elf32Hdr->e_shentsize * Elf32Hdr->e_shnum;\r
+ } else if (ElfCt->EiClass == ELFCLASS64) {\r
+ Elf64Hdr = (Elf64_Ehdr *)ElfCt->FileBase;\r
+ FileSize2 = (UINTN)(Elf64Hdr->e_shoff + Elf64Hdr->e_shentsize * Elf64Hdr->e_shnum);\r
+ }\r
+\r
+ *FileSize = MAX(FileSize1, FileSize2);\r
+\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+/**\r
+ Get a ELF program segment loading info.\r
+\r
+ @param[in] ImageBase Image base.\r
+ @param[in] EiClass ELF class.\r
+ @param[in] Index ELF segment index.\r
+ @param[out] SegInfo The pointer to the segment info.\r
+\r
+ @retval EFI_INVALID_PARAMETER ElfCt or SecPos is NULL.\r
+ @retval EFI_NOT_FOUND Could not find the section.\r
+ @retval EFI_SUCCESS Section posistion was filled successfully.\r
+**/\r
+EFI_STATUS\r
+GetElfSegmentInfo (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 EiClass,\r
+ IN UINT32 Index,\r
+ OUT SEGMENT_INFO *SegInfo\r
+ )\r
+{\r
+ Elf32_Phdr *Elf32Phdr;\r
+ Elf64_Phdr *Elf64Phdr;\r
+\r
+ if ((ImageBase == NULL) || (SegInfo == NULL)) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ if (EiClass == ELFCLASS32) {\r
+ Elf32Phdr = GetElf32SegmentByIndex (ImageBase, Index);\r
+ if (Elf32Phdr != NULL) {\r
+ SegInfo->PtType = Elf32Phdr->p_type;\r
+ SegInfo->Offset = Elf32Phdr->p_offset;\r
+ SegInfo->Length = Elf32Phdr->p_filesz;\r
+ SegInfo->MemLen = Elf32Phdr->p_memsz;\r
+ SegInfo->MemAddr = Elf32Phdr->p_paddr;\r
+ SegInfo->Alignment = Elf32Phdr->p_align;\r
+ return EFI_SUCCESS;\r
+ }\r
+ } else if (EiClass == ELFCLASS64) {\r
+ Elf64Phdr = GetElf64SegmentByIndex (ImageBase, Index);\r
+ if (Elf64Phdr != NULL) {\r
+ SegInfo->PtType = Elf64Phdr->p_type;\r
+ SegInfo->Offset = (UINTN)Elf64Phdr->p_offset;\r
+ SegInfo->Length = (UINTN)Elf64Phdr->p_filesz;\r
+ SegInfo->MemLen = (UINTN)Elf64Phdr->p_memsz;\r
+ SegInfo->MemAddr = (UINTN)Elf64Phdr->p_paddr;\r
+ SegInfo->Alignment = (UINTN)Elf64Phdr->p_align;\r
+ return EFI_SUCCESS;\r
+ }\r
+ }\r
+\r
+ return EFI_NOT_FOUND;\r
+}\r
+\r
+/**\r
+ Parse the ELF image info.\r
+\r
+ On return, all fields in ElfCt are updated except ImageAddress.\r
+\r
+ @param[in] ImageBase Memory address of an image.\r
+ @param[out] ElfCt The EFL image context pointer.\r
+\r
+ @retval EFI_INVALID_PARAMETER Input parameters are not valid.\r
+ @retval EFI_UNSUPPORTED Unsupported binary type.\r
+ @retval EFI_LOAD_ERROR ELF binary loading error.\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+ParseElfImage (\r
+ IN VOID *ImageBase,\r
+ OUT ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ Elf32_Ehdr *Elf32Hdr;\r
+ Elf64_Ehdr *Elf64Hdr;\r
+ Elf32_Shdr *Elf32Shdr;\r
+ Elf64_Shdr *Elf64Shdr;\r
+ EFI_STATUS Status;\r
+ UINT32 Index;\r
+ SEGMENT_INFO SegInfo;\r
+ UINTN End;\r
+ UINTN Base;\r
+\r
+ if (ElfCt == NULL) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+ ZeroMem (ElfCt, sizeof(ELF_IMAGE_CONTEXT));\r
+\r
+ if (ImageBase == NULL) {\r
+ return (ElfCt->ParseStatus = EFI_INVALID_PARAMETER);\r
+ }\r
+\r
+ ElfCt->FileBase = (UINT8 *)ImageBase;\r
+ if (!IsElfFormat (ElfCt->FileBase)) {\r
+ return (ElfCt->ParseStatus = EFI_UNSUPPORTED);\r
+ }\r
+\r
+ Elf32Hdr = (Elf32_Ehdr *)ElfCt->FileBase;\r
+ ElfCt->EiClass = Elf32Hdr->e_ident[EI_CLASS];\r
+ if (ElfCt->EiClass == ELFCLASS32) {\r
+ if ((Elf32Hdr->e_type != ET_EXEC) && (Elf32Hdr->e_type != ET_DYN)) {\r
+ return (ElfCt->ParseStatus = EFI_UNSUPPORTED);\r
+ }\r
+ Elf32Shdr = (Elf32_Shdr *)GetElf32SectionByIndex (ElfCt->FileBase, Elf32Hdr->e_shstrndx);\r
+ if (Elf32Shdr == NULL) {\r
+ return (ElfCt->ParseStatus = EFI_UNSUPPORTED);\r
+ }\r
+ ElfCt->EntryPoint = (UINTN)Elf32Hdr->e_entry;\r
+ ElfCt->ShNum = Elf32Hdr->e_shnum;\r
+ ElfCt->PhNum = Elf32Hdr->e_phnum;\r
+ ElfCt->ShStrLen = Elf32Shdr->sh_size;\r
+ ElfCt->ShStrOff = Elf32Shdr->sh_offset;\r
+ } else {\r
+ Elf64Hdr = (Elf64_Ehdr *)Elf32Hdr;\r
+ if ((Elf64Hdr->e_type != ET_EXEC) && (Elf64Hdr->e_type != ET_DYN)) {\r
+ return (ElfCt->ParseStatus = EFI_UNSUPPORTED);\r
+ }\r
+ Elf64Shdr = (Elf64_Shdr *)GetElf64SectionByIndex (ElfCt->FileBase, Elf64Hdr->e_shstrndx);\r
+ if (Elf64Shdr == NULL) {\r
+ return (ElfCt->ParseStatus = EFI_UNSUPPORTED);\r
+ }\r
+ ElfCt->EntryPoint = (UINTN)Elf64Hdr->e_entry;\r
+ ElfCt->ShNum = Elf64Hdr->e_shnum;\r
+ ElfCt->PhNum = Elf64Hdr->e_phnum;\r
+ ElfCt->ShStrLen = (UINT32)Elf64Shdr->sh_size;\r
+ ElfCt->ShStrOff = (UINT32)Elf64Shdr->sh_offset;\r
+ }\r
+\r
+ //\r
+ // Get the preferred image base and required memory size when loaded to new location.\r
+ //\r
+ End = 0;\r
+ Base = MAX_UINT32;\r
+ ElfCt->ReloadRequired = FALSE;\r
+ for (Index = 0; Index < ElfCt->PhNum; Index++) {\r
+ Status = GetElfSegmentInfo (ElfCt->FileBase, ElfCt->EiClass, Index, &SegInfo);\r
+ ASSERT_EFI_ERROR (Status);\r
+\r
+ if (SegInfo.PtType != PT_LOAD) {\r
+ continue;\r
+ }\r
+\r
+ if (SegInfo.MemLen != SegInfo.Length) {\r
+ //\r
+ // Not enough space to execute at current location.\r
+ //\r
+ ElfCt->ReloadRequired = TRUE;\r
+ }\r
+\r
+ if (Base > (SegInfo.MemAddr & ~(EFI_PAGE_SIZE - 1))) {\r
+ Base = SegInfo.MemAddr & ~(EFI_PAGE_SIZE - 1);\r
+ }\r
+ if (End < ALIGN_VALUE (SegInfo.MemAddr + SegInfo.MemLen, EFI_PAGE_SIZE) - 1) {\r
+ End = ALIGN_VALUE (SegInfo.MemAddr + SegInfo.MemLen, EFI_PAGE_SIZE) - 1;\r
+ }\r
+ }\r
+ //\r
+ // 0 - MAX_UINT32 + 1 equals to 0.\r
+ //\r
+ ElfCt->ImageSize = End - Base + 1;\r
+ ElfCt->PreferredImageAddress = (VOID *) Base;\r
+\r
+ CalculateElfFileSize (ElfCt, &ElfCt->FileSize);\r
+ return (ElfCt->ParseStatus = EFI_SUCCESS);;\r
+}\r
+\r
+/**\r
+ Load the ELF image to Context.ImageAddress.\r
+\r
+ Context should be initialized by ParseElfImage().\r
+ Caller should set Context.ImageAddress to a proper value, either pointing to\r
+ a new allocated memory whose size equal to Context.ImageSize, or pointing\r
+ to Context.PreferredImageAddress.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_INVALID_PARAMETER Input parameters are not valid.\r
+ @retval EFI_UNSUPPORTED Unsupported binary type.\r
+ @retval EFI_LOAD_ERROR ELF binary loading error.\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+LoadElfImage (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+\r
+ if (ElfCt == NULL) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ if (EFI_ERROR (ElfCt->ParseStatus)) {\r
+ return ElfCt->ParseStatus;\r
+ }\r
+\r
+ if (ElfCt->ImageAddress == NULL) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ Status = EFI_UNSUPPORTED;\r
+ if (ElfCt->EiClass == ELFCLASS32) {\r
+ Status = LoadElf32Image (ElfCt);\r
+ } else if (ElfCt->EiClass == ELFCLASS64) {\r
+ Status = LoadElf64Image (ElfCt);\r
+ }\r
+\r
+ return Status;\r
+}\r
+\r
+\r
+/**\r
+ Get a ELF section name from its index.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+ @param[in] SectionIndex ELF section index.\r
+ @param[out] SectionName The pointer to the section name.\r
+\r
+ @retval EFI_INVALID_PARAMETER ElfCt or SecName is NULL.\r
+ @retval EFI_NOT_FOUND Could not find the section.\r
+ @retval EFI_SUCCESS Section name was filled successfully.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+GetElfSectionName (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt,\r
+ IN UINT32 SectionIndex,\r
+ OUT CHAR8 **SectionName\r
+ )\r
+{\r
+ Elf32_Shdr *Elf32Shdr;\r
+ Elf64_Shdr *Elf64Shdr;\r
+ CHAR8 *Name;\r
+\r
+ if ((ElfCt == NULL) || (SectionName == NULL)) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ if (EFI_ERROR (ElfCt->ParseStatus)) {\r
+ return ElfCt->ParseStatus;\r
+ }\r
+\r
+ Name = NULL;\r
+ if (ElfCt->EiClass == ELFCLASS32) {\r
+ Elf32Shdr = GetElf32SectionByIndex (ElfCt->FileBase, SectionIndex);\r
+ if ((Elf32Shdr != NULL) && (Elf32Shdr->sh_name < ElfCt->ShStrLen)) {\r
+ Name = (CHAR8 *)(ElfCt->FileBase + ElfCt->ShStrOff + Elf32Shdr->sh_name);\r
+ }\r
+ } else if (ElfCt->EiClass == ELFCLASS64) {\r
+ Elf64Shdr = GetElf64SectionByIndex (ElfCt->FileBase, SectionIndex);\r
+ if ((Elf64Shdr != NULL) && (Elf64Shdr->sh_name < ElfCt->ShStrLen)) {\r
+ Name = (CHAR8 *)(ElfCt->FileBase + ElfCt->ShStrOff + Elf64Shdr->sh_name);\r
+ }\r
+ }\r
+\r
+ if (Name == NULL) {\r
+ return EFI_NOT_FOUND;\r
+ }\r
+\r
+ *SectionName = Name;\r
+ return EFI_SUCCESS;\r
+}\r
+\r
+\r
+/**\r
+ Get the offset and size of x-th ELF section.\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+ @param[in] Index ELF section index.\r
+ @param[out] Offset Return the offset of the specific section.\r
+ @param[out] Size Return the size of the specific section.\r
+\r
+ @retval EFI_INVALID_PARAMETER ImageBase, Offset or Size is NULL.\r
+ @retval EFI_INVALID_PARAMETER EiClass doesn't equal to ELFCLASS32 or ELFCLASS64.\r
+ @retval EFI_NOT_FOUND Could not find the section.\r
+ @retval EFI_SUCCESS Offset and Size are returned.\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+GetElfSectionPos (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt,\r
+ IN UINT32 Index,\r
+ OUT UINTN *Offset,\r
+ OUT UINTN *Size\r
+ )\r
+{\r
+ Elf32_Shdr *Elf32Shdr;\r
+ Elf64_Shdr *Elf64Shdr;\r
+\r
+ if ((ElfCt == NULL) || (Offset == NULL) || (Size == NULL)) {\r
+ return EFI_INVALID_PARAMETER;\r
+ }\r
+\r
+ if (EFI_ERROR (ElfCt->ParseStatus)) {\r
+ return ElfCt->ParseStatus;\r
+ }\r
+\r
+ if (ElfCt->EiClass == ELFCLASS32) {\r
+ Elf32Shdr = GetElf32SectionByIndex (ElfCt->FileBase, Index);\r
+ if (Elf32Shdr != NULL) {\r
+ *Offset = (UINTN)Elf32Shdr->sh_offset;\r
+ *Size = (UINTN)Elf32Shdr->sh_size;\r
+ return EFI_SUCCESS;\r
+ }\r
+ } else if (ElfCt->EiClass == ELFCLASS64) {\r
+ Elf64Shdr = GetElf64SectionByIndex (ElfCt->FileBase, Index);\r
+ if (Elf64Shdr != NULL) {\r
+ *Offset = (UINTN)Elf64Shdr->sh_offset;\r
+ *Size = (UINTN)Elf64Shdr->sh_size;\r
+ return EFI_SUCCESS;\r
+ }\r
+ }\r
+\r
+ return EFI_NOT_FOUND;\r
+}\r
--- /dev/null
+/** @file\r
+ ELF library\r
+\r
+ Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.<BR>\r
+ SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#ifndef EFI_LIB_INTERNAL_H_\r
+#define EFI_LIB_INTERNAL_H_\r
+\r
+#include <Library/BaseLib.h>\r
+#include <Library/DebugLib.h>\r
+#include <Library/BaseMemoryLib.h>\r
+#include "ElfLib.h"\r
+#include "ElfCommon.h"\r
+#include "Elf32.h"\r
+#include "Elf64.h"\r
+\r
+#define ELF_NEXT_ENTRY(EntryType, Current, EntrySize) \\r
+ ((EntryType *) ((UINT8 *)Current + EntrySize))\r
+\r
+\r
+/**\r
+ Return the section header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The section index.\r
+\r
+ @return Pointer to the section header.\r
+**/\r
+Elf32_Shdr *\r
+GetElf32SectionByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ );\r
+\r
+/**\r
+ Return the section header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The section index.\r
+\r
+ @return Pointer to the section header.\r
+**/\r
+Elf64_Shdr *\r
+GetElf64SectionByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ );\r
+\r
+/**\r
+ Return the segment header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The segment index.\r
+\r
+ @return Pointer to the segment header.\r
+**/\r
+Elf32_Phdr *\r
+GetElf32SegmentByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ );\r
+\r
+/**\r
+ Return the segment header specified by Index.\r
+\r
+ @param ImageBase The image base.\r
+ @param Index The segment index.\r
+\r
+ @return Pointer to the segment header.\r
+**/\r
+Elf64_Phdr *\r
+GetElf64SegmentByIndex (\r
+ IN UINT8 *ImageBase,\r
+ IN UINT32 Index\r
+ );\r
+\r
+/**\r
+ Load ELF image which has 32-bit architecture\r
+\r
+ @param[in] ElfCt ELF image context pointer.\r
+\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+ @retval Others Loading ELF binary fails.\r
+\r
+**/\r
+EFI_STATUS\r
+LoadElf32Image (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ );\r
+\r
+/**\r
+ Load ELF image which has 64-bit architecture\r
+\r
+ @param[in] ImageBase Memory address of an image.\r
+ @param[out] EntryPoint The entry point of loaded ELF image.\r
+\r
+ @retval EFI_SUCCESS ELF binary is loaded successfully.\r
+ @retval Others Loading ELF binary fails.\r
+\r
+**/\r
+EFI_STATUS\r
+LoadElf64Image (\r
+ IN ELF_IMAGE_CONTEXT *ElfCt\r
+ );\r
+\r
+#endif\r
--- /dev/null
+/** @file\r
+ ELF Load Image Support\r
+\r
+Copyright (c) 2021, Intel Corporation. All rights reserved.<BR>\r
+SPDX-License-Identifier: BSD-2-Clause-Patent\r
+\r
+**/\r
+\r
+#include <PiPei.h>\r
+#include <UniversalPayload/UniversalPayload.h>\r
+#include <UniversalPayload/ExtraData.h>\r
+\r
+#include <Ppi/LoadFile.h>\r
+\r
+#include <Library/DebugLib.h>\r
+#include <Library/HobLib.h>\r
+#include <Library/PeiServicesLib.h>\r
+#include <Library/MemoryAllocationLib.h>\r
+#include <Library/BaseMemoryLib.h>\r
+\r
+#include "ElfLib.h"\r
+\r
+/**\r
+ The wrapper function of PeiLoadImageLoadImage().\r
+\r
+ @param This - Pointer to EFI_PEI_LOAD_FILE_PPI.\r
+ @param FileHandle - Pointer to the FFS file header of the image.\r
+ @param ImageAddressArg - Pointer to PE/TE image.\r
+ @param ImageSizeArg - Size of PE/TE image.\r
+ @param EntryPoint - Pointer to entry point of specified image file for output.\r
+ @param AuthenticationState - Pointer to attestation authentication state of image.\r
+\r
+ @return Status of PeiLoadImageLoadImage().\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+PeiLoadFileLoadPayload (\r
+ IN CONST EFI_PEI_LOAD_FILE_PPI *This,\r
+ IN EFI_PEI_FILE_HANDLE FileHandle,\r
+ OUT EFI_PHYSICAL_ADDRESS *ImageAddressArg, OPTIONAL\r
+ OUT UINT64 *ImageSizeArg, OPTIONAL\r
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint,\r
+ OUT UINT32 *AuthenticationState\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ VOID *Elf;\r
+ UNIVERSAL_PAYLOAD_EXTRA_DATA *ExtraData;\r
+ ELF_IMAGE_CONTEXT Context;\r
+ UNIVERSAL_PAYLOAD_INFO_HEADER *PldInfo;\r
+ UINT32 Index;\r
+ UINT16 ExtraDataIndex;\r
+ CHAR8 *SectionName;\r
+ UINTN Offset;\r
+ UINTN Size;\r
+ UINT32 ExtraDataCount;\r
+ UINTN Instance;\r
+\r
+ //\r
+ // ELF is added to file as RAW section for EDKII bootloader.\r
+ // But RAW section might be added by build tool before the ELF RAW section when alignment is specified for ELF RAW section.\r
+ // Below loop skips the RAW section that doesn't contain valid ELF image.\r
+ //\r
+ Instance = 0;\r
+ do {\r
+ Status = PeiServicesFfsFindSectionData3 (EFI_SECTION_RAW, Instance++, FileHandle, &Elf, AuthenticationState);\r
+ if (EFI_ERROR (Status)) {\r
+ return Status;\r
+ }\r
+\r
+ ZeroMem (&Context, sizeof (Context));\r
+ Status = ParseElfImage (Elf, &Context);\r
+ } while (EFI_ERROR (Status));\r
+\r
+ DEBUG ((\r
+ DEBUG_INFO, "Payload File Size: 0x%08X, Mem Size: 0x%08x, Reload: %d\n",\r
+ Context.FileSize, Context.ImageSize, Context.ReloadRequired\r
+ ));\r
+\r
+ //\r
+ // Get UNIVERSAL_PAYLOAD_INFO_HEADER and number of additional PLD sections.\r
+ //\r
+ PldInfo = NULL;\r
+ ExtraDataCount = 0;\r
+ for (Index = 0; Index < Context.ShNum; Index++) {\r
+ Status = GetElfSectionName (&Context, Index, &SectionName);\r
+ if (EFI_ERROR(Status)) {\r
+ continue;\r
+ }\r
+ DEBUG ((DEBUG_INFO, "Payload Section[%d]: %a\n", Index, SectionName));\r
+ if (AsciiStrCmp(SectionName, UNIVERSAL_PAYLOAD_INFO_SEC_NAME) == 0) {\r
+ Status = GetElfSectionPos (&Context, Index, &Offset, &Size);\r
+ if (!EFI_ERROR(Status)) {\r
+ PldInfo = (UNIVERSAL_PAYLOAD_INFO_HEADER *)(Context.FileBase + Offset);\r
+ }\r
+ } else if (AsciiStrnCmp(SectionName, UNIVERSAL_PAYLOAD_EXTRA_SEC_NAME_PREFIX, UNIVERSAL_PAYLOAD_EXTRA_SEC_NAME_PREFIX_LENGTH) == 0) {\r
+ Status = GetElfSectionPos (&Context, Index, &Offset, &Size);\r
+ if (!EFI_ERROR (Status)) {\r
+ ExtraDataCount++;\r
+ }\r
+ }\r
+ }\r
+\r
+ //\r
+ // Report the additional PLD sections through HOB.\r
+ //\r
+ ExtraData = BuildGuidHob (\r
+ &gUniversalPayloadExtraDataGuid,\r
+ sizeof (UNIVERSAL_PAYLOAD_EXTRA_DATA) + ExtraDataCount * sizeof (UNIVERSAL_PAYLOAD_EXTRA_DATA_ENTRY)\r
+ );\r
+ ExtraData->Count = ExtraDataCount;\r
+ if (ExtraDataCount != 0) {\r
+ for (ExtraDataIndex = 0, Index = 0; Index < Context.ShNum; Index++) {\r
+ Status = GetElfSectionName (&Context, Index, &SectionName);\r
+ if (EFI_ERROR(Status)) {\r
+ continue;\r
+ }\r
+ if (AsciiStrnCmp(SectionName, UNIVERSAL_PAYLOAD_EXTRA_SEC_NAME_PREFIX, UNIVERSAL_PAYLOAD_EXTRA_SEC_NAME_PREFIX_LENGTH) == 0) {\r
+ Status = GetElfSectionPos (&Context, Index, &Offset, &Size);\r
+ if (!EFI_ERROR (Status)) {\r
+ ASSERT (ExtraDataIndex < ExtraDataCount);\r
+ AsciiStrCpyS (\r
+ ExtraData->Entry[ExtraDataIndex].Identifier,\r
+ sizeof(ExtraData->Entry[ExtraDataIndex].Identifier),\r
+ SectionName + UNIVERSAL_PAYLOAD_EXTRA_SEC_NAME_PREFIX_LENGTH\r
+ );\r
+ ExtraData->Entry[ExtraDataIndex].Base = (UINTN)(Context.FileBase + Offset);\r
+ ExtraData->Entry[ExtraDataIndex].Size = Size;\r
+ ExtraDataIndex++;\r
+ }\r
+ }\r
+ }\r
+ }\r
+\r
+ if (Context.ReloadRequired || Context.PreferredImageAddress != Context.FileBase) {\r
+ Context.ImageAddress = AllocatePages (EFI_SIZE_TO_PAGES (Context.ImageSize));\r
+ } else {\r
+ Context.ImageAddress = Context.FileBase;\r
+ }\r
+\r
+ //\r
+ // Load ELF into the required base\r
+ //\r
+ Status = LoadElfImage (&Context);\r
+ if (!EFI_ERROR(Status)) {\r
+ *ImageAddressArg = (UINTN) Context.ImageAddress;\r
+ *EntryPoint = Context.EntryPoint;\r
+ *ImageSizeArg = Context.ImageSize;\r
+ }\r
+ return Status;\r
+}\r
+\r
+\r
+EFI_PEI_LOAD_FILE_PPI mPeiLoadFilePpi = {\r
+ PeiLoadFileLoadPayload\r
+};\r
+\r
+\r
+EFI_PEI_PPI_DESCRIPTOR gPpiLoadFilePpiList = {\r
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
+ &gEfiPeiLoadFilePpiGuid,\r
+ &mPeiLoadFilePpi\r
+};\r
+/**\r
+\r
+ Install Pei Load File PPI.\r
+\r
+ @param FileHandle Handle of the file being invoked.\r
+ @param PeiServices Describes the list of possible PEI Services.\r
+\r
+ @retval EFI_SUCESS The entry point executes successfully.\r
+ @retval Others Some error occurs during the execution of this function.\r
+\r
+**/\r
+EFI_STATUS\r
+EFIAPI\r
+InitializePayloadLoaderPeim (\r
+ IN EFI_PEI_FILE_HANDLE FileHandle,\r
+ IN CONST EFI_PEI_SERVICES **PeiServices\r
+ )\r
+{\r
+ EFI_STATUS Status;\r
+ Status = PeiServicesInstallPpi (&gPpiLoadFilePpiList);\r
+\r
+ return Status;\r
+}\r
--- /dev/null
+## @file\r
+# Produce LoadFile PPI for payload loading.\r
+#\r
+# Copyright (c) 2021, Intel Corporation. All rights reserved.<BR>\r
+#\r
+# SPDX-License-Identifier: BSD-2-Clause-Patent\r
+#\r
+##\r
+\r
+[Defines]\r
+ INF_VERSION = 0x00010005\r
+ BASE_NAME = PayloadLoaderPeim\r
+ FILE_GUID = D071A3B4-3EC1-40C5-BEF8-D0BD4A2446F0\r
+ MODULE_TYPE = PEIM\r
+ VERSION_STRING = 1.0\r
+\r
+ ENTRY_POINT = InitializePayloadLoaderPeim\r
+\r
+#\r
+# The following information is for reference only and not required by the build tools.\r
+#\r
+# VALID_ARCHITECTURES = IA32 X64\r
+#\r
+\r
+[Sources]\r
+ PayloadLoaderPeim.c\r
+ ElfLib.h\r
+ ElfLib/ElfLibInternal.h\r
+ ElfLib/ElfCommon.h\r
+ ElfLib/Elf32.h\r
+ ElfLib/Elf64.h\r
+ ElfLib/ElfLibInternal.h\r
+ ElfLib/ElfLib.c\r
+ ElfLib/Elf32Lib.c\r
+ ElfLib/Elf64Lib.c\r
+\r
+[Packages]\r
+ MdePkg/MdePkg.dec\r
+ MdeModulePkg/MdeModulePkg.dec\r
+ UefiPayloadPkg/UefiPayloadPkg.dec\r
+\r
+[LibraryClasses]\r
+ PcdLib\r
+ MemoryAllocationLib\r
+ BaseMemoryLib\r
+ PeiServicesLib\r
+ HobLib\r
+ BaseLib\r
+ PeimEntryPoint\r
+ DebugLib\r
+\r
+[Ppis]\r
+ gEfiPeiLoadFilePpiGuid ## PRODUCES\r
+\r
+[Guids]\r
+ gUniversalPayloadExtraDataGuid ## PRODUCES\r
+\r
+[Depex]\r
+ TRUE\r