From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web11.8764.1622608543922034859 for ; Tue, 01 Jun 2021 21:35:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=BDWtirwc; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: guo.dong@intel.com) IronPort-SDR: dJ1S6mNakuZov8mwNluoZ2w0jbXGwJ0eBDQb7Z90DYgCW7uHQkddhmSXGFlu64ATQ6WxitV4Gq L3lx+Hsdq2vQ== X-IronPort-AV: E=McAfee;i="6200,9189,10002"; a="289327661" X-IronPort-AV: E=Sophos;i="5.83,241,1616482800"; d="scan'208";a="289327661" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Jun 2021 21:35:41 -0700 IronPort-SDR: HA16VEagBYoBuW4Qyqt598YLU9iQLXVzPuGEr2/0IPtMoL/MyHywgo5RqI5sPKMzh65R/YHCZ1 fsMcEHWIomnQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.83,241,1616482800"; d="scan'208";a="479547486" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga001.jf.intel.com with ESMTP; 01 Jun 2021 21:35:41 -0700 Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.4; Tue, 1 Jun 2021 21:35:40 -0700 Received: from orsmsx608.amr.corp.intel.com (10.22.229.21) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.4; Tue, 1 Jun 2021 21:35:40 -0700 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx608.amr.corp.intel.com (10.22.229.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.4 via Frontend Transport; Tue, 1 Jun 2021 21:35:40 -0700 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.174) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.4; Tue, 1 Jun 2021 21:35:39 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nhhUnJwOzVaWxFvO58wkicKS4rl5zbmWLa5OG8yGEDfFzxGg5/jE7PXwviRZGeXHiHFlId/1BZjxDQlK3iEZ9BTVy5wGYqGoq7JhY18PnSINbF4lxyJoiPQ0rtTcKBAIQC761vX9MRahy6hlK8sd6az0VPjhLgINlyzYqaUnT6xZZaumIQQxcM5Ri1+AhOdaSZJpOnGsz2eMDgHaCNZZ5WYbS/7DYMfu9K8RryWaPNOOYto/kh7mAvxfTfujeyuTYIrHvxNpsWgAook5Bkln9fp2gRkMBtpqtEEtR2xnIigDj37yO1Av8ocbAYP1FmRCHDNleSwEGYFITKYI7iAijw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GXk450FYoKe8Y2FbVSxVI5Rv0scfRt4Y/AjbHtv9sO0=; b=UJ88LlbyUmq1bv9iKZ5qPZieRtI7OVzQ2iK68EPyMcjPUzDfiU2vAqO4538xoc94UqjdAFvCKStS10bLmz3o6hGg8qFsawCFO3knsv+F7bsmmTN//qTRlBOoGXUH18WjnKiivf/wLAIetiJKM/simaQfLPgrQvHQDMo9yNfSP/I++xctl2j61hKvjW3Z91ZOPxi3MTZTW/nw1slJ/PFpfik8W4Er+88TAdbcPtOKwTTeVZoQSXO/sytkOQq5zxeHZtTzOAIY+gTl9RDTXVsdUqnO5AAj4bHNuTCrl5BwNni8R1gcO2vVJmcRVWBiwwByNK2XrWC2a08V05qg+uwNZg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GXk450FYoKe8Y2FbVSxVI5Rv0scfRt4Y/AjbHtv9sO0=; b=BDWtirwc0In7amg/SgR9ZgU7YRhKCN1EWpmPaqyyQIU5JyxJsfVhqNK/j4I8ag+9m3lJdcgn6JCiSAmSXMULrl5feGhBu7eCdAa4zMHULsjrLsHE063RbhGXUMCZ3DxpZ0Co7+nvBZv06HUI2PjYp24JnM7uUygsyHGjzfvgZI0= Received: from BYAPR11MB3622.namprd11.prod.outlook.com (2603:10b6:a03:fe::30) by SJ0PR11MB5071.namprd11.prod.outlook.com (2603:10b6:a03:2d7::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4195.20; Wed, 2 Jun 2021 04:35:37 +0000 Received: from BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::49f0:3ec3:7ce5:60db]) by BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::49f0:3ec3:7ce5:60db%7]) with mapi id 15.20.4173.030; Wed, 2 Jun 2021 04:35:36 +0000 From: "Guo Dong" To: "Ni, Ray" , "devel@edk2.groups.io" CC: "Ma, Maurice" , "You, Benjamin" Subject: Re: [PATCH 3/4] UefiPayloadPkg: Add PayloadLoaderPeim which can load ELF payload Thread-Topic: [PATCH 3/4] UefiPayloadPkg: Add PayloadLoaderPeim which can load ELF payload Thread-Index: AQHXUghwD3HBqSXze061HbeVzwsPrKsAIAsg Date: Wed, 2 Jun 2021 04:35:36 +0000 Message-ID: References: <20210526082310.1597-1-ray.ni@intel.com> <20210526082310.1597-4-ray.ni@intel.com> In-Reply-To: <20210526082310.1597-4-ray.ni@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.5.1.3 authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-originating-ip: [2600:8800:1704:2800:b49c:eccc:5368:3c44] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 2d29068d-e368-4848-231d-08d9257fde47 x-ms-traffictypediagnostic: SJ0PR11MB5071: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR11MB3622.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(366004)(136003)(376002)(39860400002)(346002)(396003)(186003)(122000001)(53546011)(4326008)(6506007)(86362001)(478600001)(966005)(38100700002)(19627235002)(8676002)(8936002)(107886003)(5660300002)(52536014)(2906002)(316002)(83380400001)(110136005)(54906003)(7696005)(76116006)(71200400001)(30864003)(55016002)(9686003)(66476007)(33656002)(66556008)(64756008)(66446008)(66946007)(569008);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?1FEtr/OHWdLYs9mDmmhnokpK6R1e+YohtEsE5YEMU00Rk6leAHc7PJmS7FNQ?= =?us-ascii?Q?UagA5TA3gmgb0wg2CX06pgsDbKPQ5S2FnKXuBjFkrvEivjsb97MQsewHqOb0?= =?us-ascii?Q?Fr/fWobST8gz8JNwiRnvGKb/aN56ApMi2Gw2FeeQHa5I1Dd4OcXtROaN6L8A?= =?us-ascii?Q?/pmBCuWASbk8JKex8IOKkQg4J/7phmdjvu1yMRiw5BmTk4jEAwF8GLb9TqF0?= =?us-ascii?Q?O0EOWhE5q+eouBUkDUbGVTwYjRPIPBDyuQg8Q0SKtIqHUMwrazbU7LHomR6Q?= =?us-ascii?Q?HxCLggOoJVB0QSAvwptYLx067qopz8A7Q08z2V+1OugAULYVHWNzxmqr16lB?= =?us-ascii?Q?gCD9G1JuKtMwDZClmXMhaTsnx2ZRdLUWK8PlAXkd4aM34WQfFeSnHyNBc9M9?= =?us-ascii?Q?4fi7tXpXJjbpIUiJxoGEB5VgEOTIFlhCkhWNd2hnXf1bJC/iE2PVR/OaGmFJ?= =?us-ascii?Q?qndfuhlKczTkhYmz1pxrN3C/ySkdhGG5HuXLgkX215M3QUOMwEag5GX6ubhn?= =?us-ascii?Q?rWXFim1iiB7r2/5aEht5ygc70+8DC75ONZQvFQwcu7hPvKeeOAyIfqqBw11t?= =?us-ascii?Q?2ygMuuruO4A9iQxHlE4BdXzqdD6ea1HAreHSdGTMgwqVileXXWEkvd9Eme25?= =?us-ascii?Q?+uXvGbQfi0krqAnc+pyz9Rnvq+fFGQEU9OsWkBLKK3fz8dAj2HW3KpucCmAv?= =?us-ascii?Q?3K08DV/Dg7q/bJ3wqCQ2203e+K/Rsp+cy6dgPlxVy4gGT0d659aKze7pTr7z?= =?us-ascii?Q?yot0bWgq4MK324AA89e8drK/dDAlBt3qdFWVFgaTilfUBVaF4q/GfYZ/R44R?= =?us-ascii?Q?6Sa6GD5xEpfKrUgCwy2fyZy1p0la6ZvQJYF9FhEJHOErYw/KHdTbCRJQrZdp?= =?us-ascii?Q?lUXrjflGnmLvNC8p4jd1gLynqKYtibqN1WiK0y37x+UpYrZOPc1XHag3FC+A?= =?us-ascii?Q?l7+Kg/DizcjnVXx0nuSGr0RJAr3L/avMYNPkDnpANuXM14VW7XZcMzG0coWT?= =?us-ascii?Q?5z0sMqwXqofyT1seXEvpHHVLH9lf0gbbezrSt0wbkb0ITf5gOvcy/ZmBj6PR?= =?us-ascii?Q?aYyKNLcqUnvi8XtDnIXOIHhFhR39xgAu7dvbVvqF0iI2am18iZZHjUti433V?= =?us-ascii?Q?l/kD4M+DrYdbUQEMEgRDQWM3ri55nSRkl247X9zXX7tma41znJpZAuYi2FmW?= =?us-ascii?Q?lZIIZ7TORGgfIbEi8DyJG1Tl+rralIEWGbHY9zFUFuPfoHRvRmb58IVBr8N0?= =?us-ascii?Q?IYcTeNYg7wbRW2XyPFLhKzDyhPLGP/h2CnP17k3oPd94garLWpHownEAIw75?= =?us-ascii?Q?yekR5+z8jk87hp2m8/bj+Ir10RQ0ydazs2bDVUb0Cixwex7U0H6+0+rpQRlN?= =?us-ascii?Q?sWPaYxLTlH/pTSCVHAI8Jyyo4ozR?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3622.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2d29068d-e368-4848-231d-08d9257fde47 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jun 2021 04:35:36.8604 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 5BWGOqD025xnfsyvt+Tg2vdBR93Iu+IcToOu8s4Ql355t7NINqKq1FrNa627zYjmo74EYD+SEu/EC54gNI0lZQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5071 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Add 2 minor comments. And some functions comments are missing, it would be = great if they could be added. > -----Original Message----- > From: Ni, Ray > Sent: Wednesday, May 26, 2021 1:23 AM > To: devel@edk2.groups.io > Cc: Ma, Maurice ; Dong, Guo > ; You, Benjamin > Subject: [PATCH 3/4] UefiPayloadPkg: Add PayloadLoaderPeim which can > load ELF payload >=20 > Per universal payload spec, the payload is in ELF format. > The patch adds a payload loader that supports to load ELF image. >=20 > The location of extra data sections whose names start with "upld." > is stored in PLD_EXTRA_DATA HOB. >=20 > Signed-off-by: Maurice Ma > Signed-off-by: Ray Ni > Cc: Maurice Ma > Cc: Guo Dong > Cc: Benjamin You > --- > UefiPayloadPkg/PayloadLoaderPeim/ElfLib.h | 122 +++ > .../PayloadLoaderPeim/ElfLib/Elf32.h | 252 +++++ > .../PayloadLoaderPeim/ElfLib/Elf32Lib.c | 398 +++++++ > .../PayloadLoaderPeim/ElfLib/Elf64.h | 254 +++++ > .../PayloadLoaderPeim/ElfLib/Elf64Lib.c | 407 ++++++++ > .../PayloadLoaderPeim/ElfLib/ElfCommon.h | 983 ++++++++++++++++++ > .../PayloadLoaderPeim/ElfLib/ElfLib.c | 499 +++++++++ > .../PayloadLoaderPeim/ElfLib/ElfLibInternal.h | 88 ++ > .../PayloadLoaderPeim/PayloadLoaderPeim.c | 187 ++++ > .../PayloadLoaderPeim/PayloadLoaderPeim.inf | 59 ++ > 10 files changed, 3249 insertions(+) > create mode 100644 UefiPayloadPkg/PayloadLoaderPeim/ElfLib.h > create mode 100644 UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32.h > create mode 100644 UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c > create mode 100644 UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64.h > create mode 100644 UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64Lib.c > create mode 100644 > UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfCommon.h > create mode 100644 UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLib.c > create mode 100644 > UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLibInternal.h > create mode 100644 > UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.c > create mode 100644 > UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.inf >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib.h > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib.h > new file mode 100644 > index 0000000000..17885aac78 > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib.h > @@ -0,0 +1,122 @@ > +/** @file >=20 > + ELF library >=20 > + >=20 > + Copyright (c) 2018 - 2021, Intel Corporation. All rights reserved.
>=20 > + SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > + >=20 > +#ifndef __ELF_LIB_H__ >=20 > +#define __ELF_LIB_H__ >=20 > + >=20 > +#include >=20 > + >=20 > +#define ELF_CLASS32 1 >=20 > +#define ELF_CLASS64 2 >=20 > + >=20 > +#define ELF_PT_LOAD 1 >=20 > + >=20 > +typedef struct { >=20 > + RETURN_STATUS ParseStatus; ///< Return the status after > ParseElfImage(). >=20 > + UINT8 *FileBase; ///< The source location in mem= ory. >=20 > + UINTN FileSize; ///< The size including section= s that don't > require loading. >=20 > + UINT8 *PreferredImageAddress; ///< The preferred image to be > loaded. No relocation is needed if loaded to this address. >=20 > + BOOLEAN ReloadRequired; ///< The image needs a new memo= ry > location for running. >=20 > + UINT8 *ImageAddress; ///< The destination memory add= ress set > by caller. >=20 > + UINTN ImageSize; ///< The memory size for loadin= g and > execution. >=20 > + UINT32 EiClass; >=20 > + UINT32 ShNum; >=20 > + UINT32 PhNum; >=20 > + UINTN ShStrOff; >=20 > + UINTN ShStrLen; >=20 > + UINTN EntryPoint; ///< Return the actual entry po= int after > LoadElfImage(). >=20 > +} ELF_IMAGE_CONTEXT; >=20 > + >=20 > + >=20 > +typedef struct { >=20 > + UINT32 PtType; >=20 > + UINTN Offset; >=20 > + UINTN Length; >=20 > + UINTN MemLen; >=20 > + UINTN MemAddr; >=20 > + UINTN Alignment; >=20 > +} SEGMENT_INFO; >=20 > + >=20 > +/** >=20 > + Parse the ELF image info. >=20 > + >=20 > + @param[in] ImageBase Memory address of an image. >=20 > + @param[out] ElfCt The EFL image context pointer. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER Input parameters are not valid. >=20 > + @retval EFI_UNSUPPORTED Unsupported binary type. >=20 > + @retval EFI_LOAD_ERROR ELF binary loading error. >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +ParseElfImage ( >=20 > + IN VOID *ImageBase, >=20 > + OUT ELF_IMAGE_CONTEXT *ElfCt >=20 > + ); >=20 > + >=20 > +/** >=20 > + Load the ELF segments to specified address in ELF header. >=20 > + >=20 > + This function loads ELF image segments into memory address specified >=20 > + in ELF program header. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER Input parameters are not valid. >=20 > + @retval EFI_UNSUPPORTED Unsupported binary type. >=20 > + @retval EFI_LOAD_ERROR ELF binary loading error. >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +LoadElfImage ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ); >=20 > + >=20 > +/** >=20 > + Get a ELF section name from its index. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + @param[in] SectionIndex ELF section index. >=20 > + @param[out] SectionName The pointer to the section name. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ElfCt or SecName is NULL. >=20 > + @retval EFI_NOT_FOUND Could not find the section. >=20 > + @retval EFI_SUCCESS Section name was filled successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +GetElfSectionName ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt, >=20 > + IN UINT32 SectionIndex, >=20 > + OUT CHAR8 **SectionName >=20 > + ); >=20 > + >=20 > +/** >=20 > + Get the offset and size of x-th ELF section. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + @param[in] Index ELF section index. >=20 > + @param[out] Offset Return the offset of the specific sect= ion. >=20 > + @param[out] Size Return the size of the specific sectio= n. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ImageBase, Offset or Size is NULL. >=20 > + @retval EFI_INVALID_PARAMETER EiClass doesn't equal to ELFCLASS32 or > ELFCLASS64. >=20 > + @retval EFI_NOT_FOUND Could not find the section. >=20 > + @retval EFI_SUCCESS Offset and Size are returned. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +GetElfSectionPos ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt, >=20 > + IN UINT32 Index, >=20 > + OUT UINTN *Offset, >=20 > + OUT UINTN *Size >=20 > + ); >=20 > +#endif /* __ELF_LIB_H__ */ >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32.h > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32.h > new file mode 100644 > index 0000000000..ebed5f00c3 > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32.h > @@ -0,0 +1,252 @@ > +/** @file >=20 > +Ported ELF include files from FreeBSD >=20 > + >=20 > +Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.
>=20 > +SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > + >=20 > +**/ >=20 > +/*- >=20 > + * Copyright (c) 1996-1998 John D. Polstra. >=20 > + * All rights reserved. >=20 > + * >=20 > + * Redistribution and use in source and binary forms, with or without >=20 > + * modification, are permitted provided that the following conditions >=20 > + * are met: >=20 > + * 1. Redistributions of source code must retain the above copyright >=20 > + * notice, this list of conditions and the following disclaimer. >=20 > + * 2. Redistributions in binary form must reproduce the above copyright >=20 > + * notice, this list of conditions and the following disclaimer in th= e >=20 > + * documentation and/or other materials provided with the distributio= n. >=20 > + * >=20 > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS > IS'' AND >=20 > + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED > TO, THE >=20 > + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A > PARTICULAR PURPOSE >=20 > + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS > BE LIABLE >=20 > + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR > CONSEQUENTIAL >=20 > + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF > SUBSTITUTE GOODS >=20 > + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS > INTERRUPTION) >=20 > + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN > CONTRACT, STRICT >=20 > + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING > IN ANY WAY >=20 > + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE > POSSIBILITY OF >=20 > + * SUCH DAMAGE. >=20 > + * >=20 > + * $FreeBSD: src/sys/sys/elf32.h,v 1.8.14.2 2007/12/03 21:30:36 marius E= xp $ >=20 > + */ >=20 > + >=20 > +#ifndef _SYS_ELF32_H_ >=20 > +#define _SYS_ELF32_H_ 1 >=20 > + >=20 > + >=20 > +/* >=20 > + * ELF definitions common to all 32-bit architectures. >=20 > + */ >=20 > + >=20 > +typedef UINT32 Elf32_Addr; >=20 > +typedef UINT16 Elf32_Half; >=20 > +typedef UINT32 Elf32_Off; >=20 > +typedef INT32 Elf32_Sword; >=20 > +typedef UINT32 Elf32_Word; >=20 > +typedef UINT64 Elf32_Lword; >=20 > + >=20 > +typedef Elf32_Word Elf32_Hashelt; >=20 > + >=20 > +/* Non-standard class-dependent datatype used for abstraction. */ >=20 > +typedef Elf32_Word Elf32_Size; >=20 > +typedef Elf32_Sword Elf32_Ssize; >=20 > + >=20 > +/* >=20 > + * ELF header. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + unsigned char e_ident[EI_NIDENT]; /* File identification. */ >=20 > + Elf32_Half e_type; /* File type. */ >=20 > + Elf32_Half e_machine; /* Machine architecture. */ >=20 > + Elf32_Word e_version; /* ELF format version. */ >=20 > + Elf32_Addr e_entry; /* Entry point. */ >=20 > + Elf32_Off e_phoff; /* Program header file offset. */ >=20 > + Elf32_Off e_shoff; /* Section header file offset. */ >=20 > + Elf32_Word e_flags; /* Architecture-specific flags. */ >=20 > + Elf32_Half e_ehsize; /* Size of ELF header in bytes. */ >=20 > + Elf32_Half e_phentsize; /* Size of program header entry. */ >=20 > + Elf32_Half e_phnum; /* Number of program header entries. */ >=20 > + Elf32_Half e_shentsize; /* Size of section header entry. */ >=20 > + Elf32_Half e_shnum; /* Number of section header entries. */ >=20 > + Elf32_Half e_shstrndx; /* Section name strings section. */ >=20 > +} Elf32_Ehdr; >=20 > + >=20 > +/* >=20 > + * Section header. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf32_Word sh_name; /* Section name (index into the >=20 > + section header string table). */ >=20 > + Elf32_Word sh_type; /* Section type. */ >=20 > + Elf32_Word sh_flags; /* Section flags. */ >=20 > + Elf32_Addr sh_addr; /* Address in memory image. */ >=20 > + Elf32_Off sh_offset; /* Offset in file. */ >=20 > + Elf32_Word sh_size; /* Size in bytes. */ >=20 > + Elf32_Word sh_link; /* Index of a related section. */ >=20 > + Elf32_Word sh_info; /* Depends on section type. */ >=20 > + Elf32_Word sh_addralign; /* Alignment in bytes. */ >=20 > + Elf32_Word sh_entsize; /* Size of each entry in section. */ >=20 > +} Elf32_Shdr; >=20 > + >=20 > +/* >=20 > + * Program header. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf32_Word p_type; /* Entry type. */ >=20 > + Elf32_Off p_offset; /* File offset of contents. */ >=20 > + Elf32_Addr p_vaddr; /* Virtual address in memory image. */ >=20 > + Elf32_Addr p_paddr; /* Physical address (not used). */ >=20 > + Elf32_Word p_filesz; /* Size of contents in file. */ >=20 > + Elf32_Word p_memsz; /* Size of contents in memory. */ >=20 > + Elf32_Word p_flags; /* Access permission flags. */ >=20 > + Elf32_Word p_align; /* Alignment in memory and file. */ >=20 > +} Elf32_Phdr; >=20 > + >=20 > +/* >=20 > + * Dynamic structure. The ".dynamic" section contains an array of them. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf32_Sword d_tag; /* Entry type. */ >=20 > + union { >=20 > + Elf32_Word d_val; /* Integer value. */ >=20 > + Elf32_Addr d_ptr; /* Address value. */ >=20 > + } d_un; >=20 > +} Elf32_Dyn; >=20 > + >=20 > +/* >=20 > + * Relocation entries. >=20 > + */ >=20 > + >=20 > +/* Relocations that don't need an addend field. */ >=20 > +typedef struct { >=20 > + Elf32_Addr r_offset; /* Location to be relocated. */ >=20 > + Elf32_Word r_info; /* Relocation type and symbol index. */ >=20 > +} Elf32_Rel; >=20 > + >=20 > +/* Relocations that need an addend field. */ >=20 > +typedef struct { >=20 > + Elf32_Addr r_offset; /* Location to be relocated. */ >=20 > + Elf32_Word r_info; /* Relocation type and symbol index. */ >=20 > + Elf32_Sword r_addend; /* Addend. */ >=20 > +} Elf32_Rela; >=20 > + >=20 > +/* Macros for accessing the fields of r_info. */ >=20 > +#define ELF32_R_SYM(info) ((info) >> 8) >=20 > +#define ELF32_R_TYPE(info) ((unsigned char)(info)) >=20 > + >=20 > +/* Macro for constructing r_info from field values. */ >=20 > +#define ELF32_R_INFO(sym, type) (((sym) << 8) + (unsigned char)(type)) >=20 > + >=20 > +/* >=20 > + * Note entry header >=20 > + */ >=20 > +typedef Elf_Note Elf32_Nhdr; >=20 > + >=20 > +/* >=20 > + * Move entry >=20 > + */ >=20 > +typedef struct { >=20 > + Elf32_Lword m_value; /* symbol value */ >=20 > + Elf32_Word m_info; /* size + index */ >=20 > + Elf32_Word m_poffset; /* symbol offset */ >=20 > + Elf32_Half m_repeat; /* repeat count */ >=20 > + Elf32_Half m_stride; /* stride info */ >=20 > +} Elf32_Move; >=20 > + >=20 > +/* >=20 > + * The macros compose and decompose values for Move.r_info >=20 > + * >=20 > + * sym =3D ELF32_M_SYM(M.m_info) >=20 > + * size =3D ELF32_M_SIZE(M.m_info) >=20 > + * M.m_info =3D ELF32_M_INFO(sym, size) >=20 > + */ >=20 > +#define ELF32_M_SYM(info) ((info)>>8) >=20 > +#define ELF32_M_SIZE(info) ((unsigned char)(info)) >=20 > +#define ELF32_M_INFO(sym, size) (((sym)<<8)+(unsigned char)(size)) >=20 > + >=20 > +/* >=20 > + * Hardware/Software capabilities entry >=20 > + */ >=20 > +typedef struct { >=20 > + Elf32_Word c_tag; /* how to interpret value */ >=20 > + union { >=20 > + Elf32_Word c_val; >=20 > + Elf32_Addr c_ptr; >=20 > + } c_un; >=20 > +} Elf32_Cap; >=20 > + >=20 > +/* >=20 > + * Symbol table entries. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf32_Word st_name; /* String table index of name. */ >=20 > + Elf32_Addr st_value; /* Symbol value. */ >=20 > + Elf32_Word st_size; /* Size of associated object. */ >=20 > + unsigned char st_info; /* Type and binding information. */ >=20 > + unsigned char st_other; /* Reserved (not used). */ >=20 > + Elf32_Half st_shndx; /* Section index of symbol. */ >=20 > +} Elf32_Sym; >=20 > + >=20 > +/* Macros for accessing the fields of st_info. */ >=20 > +#define ELF32_ST_BIND(info) ((info) >> 4) >=20 > +#define ELF32_ST_TYPE(info) ((info) & 0xf) >=20 > + >=20 > +/* Macro for constructing st_info from field values. */ >=20 > +#define ELF32_ST_INFO(bind, type) (((bind) << 4) + ((type) & 0xf)) >=20 > + >=20 > +/* Macro for accessing the fields of st_other. */ >=20 > +#define ELF32_ST_VISIBILITY(oth) ((oth) & 0x3) >=20 > + >=20 > +/* Structures used by Sun & GNU symbol versioning. */ >=20 > +typedef struct >=20 > +{ >=20 > + Elf32_Half vd_version; >=20 > + Elf32_Half vd_flags; >=20 > + Elf32_Half vd_ndx; >=20 > + Elf32_Half vd_cnt; >=20 > + Elf32_Word vd_hash; >=20 > + Elf32_Word vd_aux; >=20 > + Elf32_Word vd_next; >=20 > +} Elf32_Verdef; >=20 > + >=20 > +typedef struct >=20 > +{ >=20 > + Elf32_Word vda_name; >=20 > + Elf32_Word vda_next; >=20 > +} Elf32_Verdaux; >=20 > + >=20 > +typedef struct >=20 > +{ >=20 > + Elf32_Half vn_version; >=20 > + Elf32_Half vn_cnt; >=20 > + Elf32_Word vn_file; >=20 > + Elf32_Word vn_aux; >=20 > + Elf32_Word vn_next; >=20 > +} Elf32_Verneed; >=20 > + >=20 > +typedef struct >=20 > +{ >=20 > + Elf32_Word vna_hash; >=20 > + Elf32_Half vna_flags; >=20 > + Elf32_Half vna_other; >=20 > + Elf32_Word vna_name; >=20 > + Elf32_Word vna_next; >=20 > +} Elf32_Vernaux; >=20 > + >=20 > +typedef Elf32_Half Elf32_Versym; >=20 > + >=20 > +typedef struct { >=20 > + Elf32_Half si_boundto; /* direct bindings - symbol bound to */ >=20 > + Elf32_Half si_flags; /* per symbol flags */ >=20 > +} Elf32_Syminfo; >=20 > + >=20 > +#endif /* !_SYS_ELF32_H_ */ >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c > new file mode 100644 > index 0000000000..4d8f155881 > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c > @@ -0,0 +1,398 @@ > +/** @file >=20 > + ELF library >=20 > + >=20 > + Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.
>=20 > + SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > + >=20 > +#include "ElfLibInternal.h" >=20 > + >=20 > +Elf32_Shdr * >=20 > +GetElf32SectionByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ) >=20 > +{ >=20 > + Elf32_Ehdr *Ehdr; >=20 > + >=20 > + Ehdr =3D (Elf32_Ehdr *)ImageBase; >=20 > + if (Index >=3D Ehdr->e_shnum) { >=20 > + return NULL; >=20 > + } >=20 > + >=20 > + return (Elf32_Shdr *)(ImageBase + Ehdr->e_shoff + Index * Ehdr- > >e_shentsize); >=20 > +} >=20 > + >=20 > +Elf32_Phdr * >=20 > +GetElf32SegmentByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ) >=20 > +{ >=20 > + Elf32_Ehdr *Ehdr; >=20 > + >=20 > + Ehdr =3D (Elf32_Ehdr *)ImageBase; >=20 > + if (Index >=3D Ehdr->e_phnum) { >=20 > + return NULL; >=20 > + } >=20 > + >=20 > + return (Elf32_Phdr *)(ImageBase + Ehdr->e_phoff + Index * Ehdr- > >e_phentsize); >=20 > +} >=20 > + >=20 > +Elf32_Shdr * >=20 > +GetElf32SectionByRange ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Offset, >=20 > + IN UINT32 Size >=20 > + ) >=20 > +{ >=20 > + UINT32 Index; >=20 > + Elf32_Ehdr *Ehdr; >=20 > + Elf32_Shdr *Shdr; >=20 > + >=20 > + Ehdr =3D (Elf32_Ehdr *)ImageBase; >=20 > + >=20 > + Shdr =3D (Elf32_Shdr *) (ImageBase + Ehdr->e_shoff); >=20 > + for (Index =3D 0; Index < Ehdr->e_shnum; Index++) { >=20 > + if ((Shdr->sh_offset =3D=3D Offset) && (Shdr->sh_size =3D=3D Size)) = { >=20 > + return Shdr; >=20 > + } >=20 > + Shdr =3D ELF_NEXT_ENTRY (Elf32_Shdr, Shdr, Ehdr->e_shentsize); >=20 > + } >=20 > + return NULL; >=20 > +} >=20 > + >=20 > +EFI_STATUS >=20 > +ProcessRelocation32 ( >=20 > + IN Elf32_Rela *Rela, >=20 > + IN UINT32 RelaSize, >=20 > + IN UINT32 RelaEntrySize, >=20 > + IN UINT32 RelaType, >=20 > + IN INTN Delta, >=20 > + IN BOOLEAN DynamicLinking >=20 > + ) >=20 > +{ >=20 > + UINTN Index; >=20 > + UINT32 *Ptr; >=20 > + UINT32 Type; >=20 > + >=20 > + for ( Index =3D 0 >=20 > + ; RelaEntrySize * Index < RelaSize >=20 > + ; Index++, Rela =3D ELF_NEXT_ENTRY (Elf32_Rela, Rela, RelaEntrySiz= e) >=20 > + ) { >=20 > + // >=20 > + // r_offset is the virtual address of the storage unit affected by t= he > relocation. >=20 > + // >=20 > + Ptr =3D (UINT32 *)(UINTN)(Rela->r_offset + Delta); >=20 > + Type =3D ELF32_R_TYPE(Rela->r_info); >=20 > + switch (Type) { >=20 > + case R_386_NONE: >=20 > + case R_386_PC32: >=20 > + // >=20 > + // No fixup entry required. >=20 > + // >=20 > + break; >=20 > + >=20 > + case R_386_32: >=20 > + if (DynamicLinking) { >=20 > + // >=20 > + // Dynamic section doesn't contain entries of this type. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", > Type)); >=20 > + ASSERT (FALSE); >=20 > + } else { >=20 > + *Ptr +=3D (UINT32) Delta; >=20 > + } >=20 > + break; >=20 > + >=20 > + case R_386_RELATIVE: >=20 > + if (DynamicLinking) { >=20 > + // >=20 > + // A: Represents the addend used to compute the value of the > relocatable field. >=20 > + // B: Represents the base address at which a shared object has= been > loaded into memory during execution. >=20 > + // Generally, a shared object is built with a 0 base virtua= l address, but > the execution address will be different. >=20 > + // >=20 > + // B (Base Address) in ELF spec is slightly different: >=20 > + // An executable or shared object file's base address (on pl= atforms > that support the concept) is calculated during >=20 > + // execution from three values: the virtual memory load addr= ess, the > maximum page size, and the lowest virtual address >=20 > + // of a program's loadable segment. To compute the base addr= ess, > one determines the memory address associated with the >=20 > + // lowest p_vaddr value for a PT_LOAD segment. This address = is > truncated to the nearest multiple of the maximum page size. >=20 > + // The corresponding p_vaddr value itself is also truncated = to the > nearest multiple of the maximum page size. >=20 > + // >=20 > + // *** The base address is the difference between the trunca= ted > memory address and the truncated p_vaddr value. *** >=20 > + // >=20 > + // Delta in this function is B. >=20 > + // >=20 > + // Calculation: B + A >=20 > + // >=20 > + if (RelaType =3D=3D SHT_RELA) { >=20 > + ASSERT (*Ptr =3D=3D 0); >=20 > + *Ptr =3D (UINT32) Delta + Rela->r_addend; >=20 > + } else { >=20 > + // >=20 > + // A is stored in the field of relocation for REL type. >=20 > + // >=20 > + *Ptr =3D (UINT32) Delta + *Ptr; >=20 > + } >=20 > + } else { >=20 > + // >=20 > + // non-Dynamic section doesn't contain entries of this type. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", > Type)); >=20 > + ASSERT (FALSE); >=20 > + } >=20 > + break; >=20 > + >=20 > + default: >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type))= ; >=20 > + } >=20 > + } >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +EFI_STATUS >=20 > +RelocateElf32Dynamic ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + UINT32 Index; >=20 > + Elf32_Phdr *Phdr; >=20 > + Elf32_Shdr *DynShdr; >=20 > + Elf32_Shdr *RelShdr; >=20 > + Elf32_Dyn *Dyn; >=20 > + UINT32 RelaOffset; >=20 > + UINT32 RelaCount; >=20 > + UINT32 RelaSize; >=20 > + UINT32 RelaEntrySize; >=20 > + UINT32 RelaType; >=20 > + >=20 > + // >=20 > + // 1. Locate the dynamic section. >=20 > + // >=20 > + // If an object file participates in dynamic linking, its program head= er table >=20 > + // will have an element of type PT_DYNAMIC. >=20 > + // This ``segment'' contains the .dynamic section. A special symbol, > _DYNAMIC, >=20 > + // labels the section, which contains an array of Elf32_Dyn or Elf64_D= yn. >=20 > + // >=20 > + DynShdr =3D NULL; >=20 > + for (Index =3D 0; Index < ElfCt->PhNum; Index++) { >=20 > + Phdr =3D GetElf32SegmentByIndex (ElfCt->FileBase, Index); >=20 > + ASSERT (Phdr !=3D NULL); >=20 > + if (Phdr->p_type =3D=3D PT_DYNAMIC) { >=20 > + // >=20 > + // Verify the existence of the dynamic section. >=20 > + // >=20 > + DynShdr =3D GetElf32SectionByRange (ElfCt->FileBase, Phdr->p_offse= t, > Phdr->p_filesz); >=20 > + break; >=20 > + } >=20 > + } >=20 > + >=20 > + // >=20 > + // It's abnormal a DYN ELF doesn't contain a dynamic section. >=20 > + // >=20 > + ASSERT (DynShdr !=3D NULL); >=20 > + if (DynShdr =3D=3D NULL) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + ASSERT (DynShdr->sh_type =3D=3D SHT_DYNAMIC); >=20 > + ASSERT (DynShdr->sh_entsize >=3D sizeof (*Dyn)); >=20 > + >=20 > + // >=20 > + // 2. Locate the relocation section from the dynamic section. >=20 > + // >=20 > + RelaOffset =3D MAX_UINT32; >=20 > + RelaSize =3D 0; >=20 > + RelaCount =3D 0; >=20 > + RelaEntrySize =3D 0; >=20 > + RelaType =3D 0; >=20 > + for ( Index =3D 0, Dyn =3D (Elf32_Dyn *) (ElfCt->FileBase + DynShdr->s= h_offset) >=20 > + ; Index < DynShdr->sh_size / DynShdr->sh_entsize >=20 > + ; Index++, Dyn =3D ELF_NEXT_ENTRY (Elf32_Dyn, Dyn, DynShdr- > >sh_entsize) >=20 > + ) { >=20 > + switch (Dyn->d_tag) { >=20 > + case DT_RELA: >=20 > + case DT_REL: >=20 > + // >=20 > + // DT_REL represent program virtual addresses. >=20 > + // A file's virtual addresses might not match the memory virtual > addresses during execution. >=20 > + // When interpreting addresses contained in the dynamic structur= e, the > dynamic linker computes actual addresses, >=20 > + // based on the original file value and the memory base address. >=20 > + // For consistency, files do not contain relocation entries to `= `correct'' > addresses in the dynamic structure. >=20 > + // >=20 > + RelaOffset =3D Dyn->d_un.d_ptr - (UINT32) (UINTN) ElfCt- > >PreferredImageAddress; >=20 > + RelaType =3D (Dyn->d_tag =3D=3D DT_RELA) ? SHT_RELA: SHT_REL; >=20 > + break; >=20 > + case DT_RELACOUNT: >=20 > + case DT_RELCOUNT: >=20 > + RelaCount =3D Dyn->d_un.d_val; >=20 > + break; >=20 > + case DT_RELENT: >=20 > + case DT_RELAENT: >=20 > + RelaEntrySize =3D Dyn->d_un.d_val; >=20 > + break; >=20 > + case DT_RELSZ: >=20 > + case DT_RELASZ: >=20 > + RelaSize =3D Dyn->d_un.d_val; >=20 > + break; >=20 > + default: >=20 > + break; >=20 > + } >=20 > + } >=20 > + >=20 > + if (RelaOffset =3D=3D MAX_UINT64) { >=20 > + ASSERT (RelaCount =3D=3D 0); >=20 > + ASSERT (RelaEntrySize =3D=3D 0); >=20 > + ASSERT (RelaSize =3D=3D 0); >=20 > + // >=20 > + // It's fine that a DYN ELF doesn't contain relocation section. >=20 > + // >=20 > + return EFI_SUCCESS; >=20 > + } >=20 > + >=20 > + // >=20 > + // Verify the existence of the relocation section. >=20 > + // >=20 > + RelShdr =3D GetElf32SectionByRange (ElfCt->FileBase, RelaOffset, RelaS= ize); >=20 > + ASSERT (RelShdr !=3D NULL); >=20 > + if (RelShdr =3D=3D NULL) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + ASSERT (RelShdr->sh_type =3D=3D RelaType); >=20 > + ASSERT (RelShdr->sh_entsize =3D=3D RelaEntrySize); >=20 > + >=20 > + // >=20 > + // 3. Process the relocation section. >=20 > + // >=20 > + ProcessRelocation32 ( >=20 > + (Elf32_Rela *) (ElfCt->FileBase + RelShdr->sh_offset), >=20 > + RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type, >=20 > + (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt->PreferredImageAddress, >=20 > + TRUE >=20 > + ); >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +EFI_STATUS >=20 > +RelocateElf32Sections ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + EFI_STATUS Status; >=20 > + Elf32_Ehdr *Ehdr; >=20 > + Elf32_Shdr *RelShdr; >=20 > + Elf32_Shdr *Shdr; >=20 > + UINT32 Index; >=20 > + UINTN Delta; >=20 > + >=20 > + Ehdr =3D (Elf32_Ehdr *)ElfCt->FileBase; >=20 > + if (Ehdr->e_machine !=3D EM_386) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + >=20 > + Delta =3D (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt- > >PreferredImageAddress; >=20 > + ElfCt->EntryPoint =3D (UINTN)(Ehdr->e_entry + Delta); >=20 > + >=20 > + // >=20 > + // 1. Relocate dynamic ELF using the relocation section pointed by dyn= amic > section >=20 > + // >=20 > + if (Ehdr->e_type =3D=3D ET_DYN) { >=20 > + DEBUG ((DEBUG_INFO, "DYN ELF: Relocate using dynamic sections...\n")= ); >=20 > + Status =3D RelocateElf32Dynamic (ElfCt); >=20 > + ASSERT_EFI_ERROR (Status); >=20 > + return Status; >=20 > + } >=20 > + >=20 > + // >=20 > + // 2. Executable ELF: Fix up the delta between actual image address an= d > preferred image address. >=20 > + // >=20 > + // Linker already fixed up EXEC ELF based on the preferred image addr= ess. >=20 > + // A ELF loader in modern OS only loads it into the preferred image > address. >=20 > + // The below relocation is unneeded in that case. >=20 > + // But the ELF loader in firmware supports to load the image to a dif= ferent > address. >=20 > + // The below relocation is needed in this case. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "EXEC ELF: Fix actual/preferred base address > delta ...\n")); >=20 > + for ( Index =3D 0, RelShdr =3D (Elf32_Shdr *) (ElfCt->FileBase + Ehdr-= >e_shoff) >=20 > + ; Index < Ehdr->e_shnum >=20 > + ; Index++, RelShdr =3D ELF_NEXT_ENTRY (Elf32_Shdr, RelShdr, Ehdr= - > >e_shentsize) >=20 > + ) { >=20 > + if ((RelShdr->sh_type !=3D SHT_REL) && (RelShdr->sh_type !=3D SHT_RE= LA)) { >=20 > + continue; >=20 > + } >=20 > + Shdr =3D GetElf32SectionByIndex (ElfCt->FileBase, RelShdr->sh_info); >=20 > + if ((Shdr->sh_flags & SHF_ALLOC) =3D=3D SHF_ALLOC) { >=20 > + // >=20 > + // Only fix up sections that occupy memory during process executio= n. >=20 > + // >=20 > + ProcessRelocation32 ( >=20 > + (Elf32_Rela *)((UINT8*)Ehdr + RelShdr->sh_offset), >=20 > + RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type, >=20 > + Delta, FALSE >=20 > + ); >=20 > + } >=20 > + } >=20 > + >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +/** >=20 > + Load ELF image which has 32-bit architecture. >=20 > + >=20 > + Caller should set Context.ImageAddress to a proper value, either point= ing > to >=20 > + a new allocated memory whose size equal to Context.ImageSize, or > pointing >=20 > + to Context.PreferredImageAddress. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > + @retval Others Loading ELF binary fails. >=20 > + >=20 > +**/ >=20 > +EFI_STATUS >=20 > +LoadElf32Image ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + Elf32_Ehdr *Ehdr; >=20 > + Elf32_Phdr *Phdr; >=20 > + UINT16 Index; >=20 > + UINTN Delta; >=20 > + >=20 > + ASSERT (ElfCt !=3D NULL); >=20 > + >=20 > + // >=20 > + // Per the sprit of ELF, loading to memory only consumes info from > program headers. >=20 > + // >=20 > + Ehdr =3D (Elf32_Ehdr *)ElfCt->FileBase; >=20 > + >=20 > + for ( Index =3D 0, Phdr =3D (Elf32_Phdr *)(ElfCt->FileBase + Ehdr->e_p= hoff) >=20 > + ; Index < Ehdr->e_phnum >=20 > + ; Index++, Phdr =3D ELF_NEXT_ENTRY (Elf32_Phdr, Phdr, Ehdr- > >e_phentsize) >=20 > + ) { >=20 > + // >=20 > + // Skip segments that don't require load (type tells, or size is 0) >=20 > + // >=20 > + if ((Phdr->p_type !=3D PT_LOAD) || >=20 > + (Phdr->p_memsz =3D=3D 0)) { >=20 > + continue; >=20 > + } >=20 > + >=20 > + // >=20 > + // The memory offset of segment relative to the image base >=20 > + // Note: CopyMem() does nothing when the dst equals to src. >=20 > + // >=20 > + Delta =3D Phdr->p_paddr - (UINT32) (UINTN) ElfCt- > >PreferredImageAddress; >=20 > + CopyMem (ElfCt->ImageAddress + Delta, ElfCt->FileBase + Phdr- > >p_offset, Phdr->p_filesz); >=20 > + ZeroMem (ElfCt->ImageAddress + Delta + Phdr->p_filesz, Phdr- > >p_memsz - Phdr->p_filesz); >=20 > + } >=20 > + >=20 > + // >=20 > + // Relocate when new new image base is not the preferred image base. >=20 > + // >=20 > + if (ElfCt->ImageAddress !=3D ElfCt->PreferredImageAddress) { >=20 > + RelocateElf32Sections (ElfCt); >=20 > + } >=20 > + >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64.h > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64.h > new file mode 100644 > index 0000000000..d64dc64a6a > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64.h > @@ -0,0 +1,254 @@ > +/** @file >=20 > +Ported ELF include files from FreeBSD >=20 > + >=20 > +Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.
>=20 > +SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > +/*- >=20 > + * Copyright (c) 1996-1998 John D. Polstra. >=20 > + * All rights reserved. >=20 > + * >=20 > + * Redistribution and use in source and binary forms, with or without >=20 > + * modification, are permitted provided that the following conditions >=20 > + * are met: >=20 > + * 1. Redistributions of source code must retain the above copyright >=20 > + * notice, this list of conditions and the following disclaimer. >=20 > + * 2. Redistributions in binary form must reproduce the above copyright >=20 > + * notice, this list of conditions and the following disclaimer in th= e >=20 > + * documentation and/or other materials provided with the distributio= n. >=20 > + * >=20 > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS > IS'' AND >=20 > + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED > TO, THE >=20 > + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A > PARTICULAR PURPOSE >=20 > + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS > BE LIABLE >=20 > + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR > CONSEQUENTIAL >=20 > + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF > SUBSTITUTE GOODS >=20 > + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS > INTERRUPTION) >=20 > + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN > CONTRACT, STRICT >=20 > + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING > IN ANY WAY >=20 > + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE > POSSIBILITY OF >=20 > + * SUCH DAMAGE. >=20 > + * >=20 > + * $FreeBSD: src/sys/sys/elf64.h,v 1.10.14.2 2007/12/03 21:30:36 marius = Exp > $ >=20 > + */ >=20 > + >=20 > +#ifndef _SYS_ELF64_H_ >=20 > +#define _SYS_ELF64_H_ 1 >=20 > + >=20 > + >=20 > +/* >=20 > + * ELF definitions common to all 64-bit architectures. >=20 > + */ >=20 > + >=20 > +typedef UINT64 Elf64_Addr; >=20 > +typedef UINT16 Elf64_Half; >=20 > +typedef UINT64 Elf64_Off; >=20 > +typedef INT32 Elf64_Sword; >=20 > +typedef INT64 Elf64_Sxword; >=20 > +typedef UINT32 Elf64_Word; >=20 > +typedef UINT64 Elf64_Lword; >=20 > +typedef UINT64 Elf64_Xword; >=20 > + >=20 > +/* >=20 > + * Types of dynamic symbol hash table bucket and chain elements. >=20 > + * >=20 > + * This is inconsistent among 64 bit architectures, so a machine depende= nt >=20 > + * typedef is required. >=20 > + */ >=20 > + >=20 > +typedef Elf64_Word Elf64_Hashelt; >=20 > + >=20 > +/* Non-standard class-dependent datatype used for abstraction. */ >=20 > +typedef Elf64_Xword Elf64_Size; >=20 > +typedef Elf64_Sxword Elf64_Ssize; >=20 > + >=20 > +/* >=20 > + * ELF header. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + unsigned char e_ident[EI_NIDENT]; /* File identification. */ >=20 > + Elf64_Half e_type; /* File type. */ >=20 > + Elf64_Half e_machine; /* Machine architecture. */ >=20 > + Elf64_Word e_version; /* ELF format version. */ >=20 > + Elf64_Addr e_entry; /* Entry point. */ >=20 > + Elf64_Off e_phoff; /* Program header file offset. */ >=20 > + Elf64_Off e_shoff; /* Section header file offset. */ >=20 > + Elf64_Word e_flags; /* Architecture-specific flags. */ >=20 > + Elf64_Half e_ehsize; /* Size of ELF header in bytes. */ >=20 > + Elf64_Half e_phentsize; /* Size of program header entry. */ >=20 > + Elf64_Half e_phnum; /* Number of program header entries. */ >=20 > + Elf64_Half e_shentsize; /* Size of section header entry. */ >=20 > + Elf64_Half e_shnum; /* Number of section header entries. */ >=20 > + Elf64_Half e_shstrndx; /* Section name strings section. */ >=20 > +} Elf64_Ehdr; >=20 > + >=20 > +/* >=20 > + * Section header. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Word sh_name; /* Section name (index into the >=20 > + section header string table). */ >=20 > + Elf64_Word sh_type; /* Section type. */ >=20 > + Elf64_Xword sh_flags; /* Section flags. */ >=20 > + Elf64_Addr sh_addr; /* Address in memory image. */ >=20 > + Elf64_Off sh_offset; /* Offset in file. */ >=20 > + Elf64_Xword sh_size; /* Size in bytes. */ >=20 > + Elf64_Word sh_link; /* Index of a related section. */ >=20 > + Elf64_Word sh_info; /* Depends on section type. */ >=20 > + Elf64_Xword sh_addralign; /* Alignment in bytes. */ >=20 > + Elf64_Xword sh_entsize; /* Size of each entry in section. */ >=20 > +} Elf64_Shdr; >=20 > + >=20 > +/* >=20 > + * Program header. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Word p_type; /* Entry type. */ >=20 > + Elf64_Word p_flags; /* Access permission flags. */ >=20 > + Elf64_Off p_offset; /* File offset of contents. */ >=20 > + Elf64_Addr p_vaddr; /* Virtual address in memory image. */ >=20 > + Elf64_Addr p_paddr; /* Physical address (not used). */ >=20 > + Elf64_Xword p_filesz; /* Size of contents in file. */ >=20 > + Elf64_Xword p_memsz; /* Size of contents in memory. */ >=20 > + Elf64_Xword p_align; /* Alignment in memory and file. */ >=20 > +} Elf64_Phdr; >=20 > + >=20 > +/* >=20 > + * Dynamic structure. The ".dynamic" section contains an array of them. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Sxword d_tag; /* Entry type. */ >=20 > + union { >=20 > + Elf64_Xword d_val; /* Integer value. */ >=20 > + Elf64_Addr d_ptr; /* Address value. */ >=20 > + } d_un; >=20 > +} Elf64_Dyn; >=20 > + >=20 > +/* >=20 > + * Relocation entries. >=20 > + */ >=20 > + >=20 > +/* Relocations that don't need an addend field. */ >=20 > +typedef struct { >=20 > + Elf64_Addr r_offset; /* Location to be relocated. */ >=20 > + Elf64_Xword r_info; /* Relocation type and symbol index. */ >=20 > +} Elf64_Rel; >=20 > + >=20 > +/* Relocations that need an addend field. */ >=20 > +typedef struct { >=20 > + Elf64_Addr r_offset; /* Location to be relocated. */ >=20 > + Elf64_Xword r_info; /* Relocation type and symbol index. */ >=20 > + Elf64_Sxword r_addend; /* Addend. */ >=20 > +} Elf64_Rela; >=20 > + >=20 > +/* Macros for accessing the fields of r_info. */ >=20 > +#define ELF64_R_SYM(info) ((UINT32) RShiftU64 ((info), 32)) >=20 > +#define ELF64_R_TYPE(info) ((info) & 0xffffffffL) >=20 > + >=20 > +/* Macro for constructing r_info from field values. */ >=20 > +#define ELF64_R_INFO(sym, type) (((sym) << 32) + ((type) & 0xffffffffL)= ) >=20 > + >=20 > +#define ELF64_R_TYPE_DATA(info) (((Elf64_Xword)(info)<<32)>>40) >=20 > +#define ELF64_R_TYPE_ID(info) (((Elf64_Xword)(info)<<56)>>56) >=20 > +#define ELF64_R_TYPE_INFO(data, type) \ >=20 > + (((Elf64_Xword)(data)<<8)+(Elf64_Xword)(type)) >=20 > + >=20 > +/* >=20 > + * Note entry header >=20 > + */ >=20 > +typedef Elf_Note Elf64_Nhdr; >=20 > + >=20 > +/* >=20 > + * Move entry >=20 > + */ >=20 > +typedef struct { >=20 > + Elf64_Lword m_value; /* symbol value */ >=20 > + Elf64_Xword m_info; /* size + index */ >=20 > + Elf64_Xword m_poffset; /* symbol offset */ >=20 > + Elf64_Half m_repeat; /* repeat count */ >=20 > + Elf64_Half m_stride; /* stride info */ >=20 > +} Elf64_Move; >=20 > + >=20 > +#define ELF64_M_SYM(info) ((info)>>8) >=20 > +#define ELF64_M_SIZE(info) ((unsigned char)(info)) >=20 > +#define ELF64_M_INFO(sym, size) (((sym)<<8)+(unsigned char)(size)) >=20 > + >=20 > +/* >=20 > + * Hardware/Software capabilities entry >=20 > + */ >=20 > +typedef struct { >=20 > + Elf64_Xword c_tag; /* how to interpret value */ >=20 > + union { >=20 > + Elf64_Xword c_val; >=20 > + Elf64_Addr c_ptr; >=20 > + } c_un; >=20 > +} Elf64_Cap; >=20 > + >=20 > +/* >=20 > + * Symbol table entries. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Word st_name; /* String table index of name. */ >=20 > + unsigned char st_info; /* Type and binding information. */ >=20 > + unsigned char st_other; /* Reserved (not used). */ >=20 > + Elf64_Half st_shndx; /* Section index of symbol. */ >=20 > + Elf64_Addr st_value; /* Symbol value. */ >=20 > + Elf64_Xword st_size; /* Size of associated object. */ >=20 > +} Elf64_Sym; >=20 > + >=20 > +/* Macros for accessing the fields of st_info. */ >=20 > +#define ELF64_ST_BIND(info) ((info) >> 4) >=20 > +#define ELF64_ST_TYPE(info) ((info) & 0xf) >=20 > + >=20 > +/* Macro for constructing st_info from field values. */ >=20 > +#define ELF64_ST_INFO(bind, type) (((bind) << 4) + ((type) & 0xf)) >=20 > + >=20 > +/* Macro for accessing the fields of st_other. */ >=20 > +#define ELF64_ST_VISIBILITY(oth) ((oth) & 0x3) >=20 > + >=20 > +/* Structures used by Sun & GNU-style symbol versioning. */ >=20 > +typedef struct { >=20 > + Elf64_Half vd_version; >=20 > + Elf64_Half vd_flags; >=20 > + Elf64_Half vd_ndx; >=20 > + Elf64_Half vd_cnt; >=20 > + Elf64_Word vd_hash; >=20 > + Elf64_Word vd_aux; >=20 > + Elf64_Word vd_next; >=20 > +} Elf64_Verdef; >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Word vda_name; >=20 > + Elf64_Word vda_next; >=20 > +} Elf64_Verdaux; >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Half vn_version; >=20 > + Elf64_Half vn_cnt; >=20 > + Elf64_Word vn_file; >=20 > + Elf64_Word vn_aux; >=20 > + Elf64_Word vn_next; >=20 > +} Elf64_Verneed; >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Word vna_hash; >=20 > + Elf64_Half vna_flags; >=20 > + Elf64_Half vna_other; >=20 > + Elf64_Word vna_name; >=20 > + Elf64_Word vna_next; >=20 > +} Elf64_Vernaux; >=20 > + >=20 > +typedef Elf64_Half Elf64_Versym; >=20 > + >=20 > +typedef struct { >=20 > + Elf64_Half si_boundto; /* direct bindings - symbol bound to */ >=20 > + Elf64_Half si_flags; /* per symbol flags */ >=20 > +} Elf64_Syminfo; >=20 > + >=20 > +#endif /* !_SYS_ELF64_H_ */ >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64Lib.c > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64Lib.c > new file mode 100644 > index 0000000000..c3fb252c7e > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf64Lib.c > @@ -0,0 +1,407 @@ > +/** @file >=20 > + ELF library >=20 > + >=20 > + Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.
>=20 > + SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > + >=20 > +#include "ElfLibInternal.h" >=20 > + >=20 > +Elf64_Shdr * >=20 > +GetElf64SectionByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ) >=20 > +{ >=20 > + Elf64_Ehdr *Ehdr; >=20 > + >=20 > + Ehdr =3D (Elf64_Ehdr *)ImageBase; >=20 > + if (Index >=3D Ehdr->e_shnum) { >=20 > + return NULL; >=20 > + } >=20 > + >=20 > + return (Elf64_Shdr *)(ImageBase + Ehdr->e_shoff + Index * Ehdr- > >e_shentsize); >=20 > +} >=20 > + >=20 > +Elf64_Phdr * >=20 > +GetElf64SegmentByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ) >=20 > +{ >=20 > + Elf64_Ehdr *Ehdr; >=20 > + >=20 > + Ehdr =3D (Elf64_Ehdr *)ImageBase; >=20 > + if (Index >=3D Ehdr->e_phnum) { >=20 > + return NULL; >=20 > + } >=20 > + >=20 > + return (Elf64_Phdr *)(ImageBase + Ehdr->e_phoff + Index * Ehdr- > >e_phentsize); >=20 > +} >=20 > + >=20 > +Elf64_Shdr * >=20 > +GetElf64SectionByRange ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT64 Offset, >=20 > + IN UINT64 Size >=20 > + ) >=20 > +{ >=20 > + UINT32 Index; >=20 > + Elf64_Ehdr *Ehdr; >=20 > + Elf64_Shdr *Shdr; >=20 > + >=20 > + Ehdr =3D (Elf64_Ehdr *)ImageBase; >=20 > + >=20 > + Shdr =3D (Elf64_Shdr *) (ImageBase + Ehdr->e_shoff); >=20 > + for (Index =3D 0; Index < Ehdr->e_shnum; Index++) { >=20 > + if ((Shdr->sh_offset =3D=3D Offset) && (Shdr->sh_size =3D=3D Size)) = { >=20 > + return Shdr; >=20 > + } >=20 > + Shdr =3D ELF_NEXT_ENTRY (Elf64_Shdr, Shdr, Ehdr->e_shentsize); >=20 > + } >=20 > + return NULL; >=20 > +} >=20 > + >=20 > +EFI_STATUS >=20 > +ProcessRelocation64 ( >=20 > + IN Elf64_Rela *Rela, >=20 > + IN UINT64 RelaSize, >=20 > + IN UINT64 RelaEntrySize, >=20 > + IN UINT64 RelaType, >=20 > + IN INTN Delta, >=20 > + IN BOOLEAN DynamicLinking >=20 > + ) >=20 > +{ >=20 > + UINTN Index; >=20 > + UINT64 *Ptr; >=20 > + UINT32 Type; >=20 > + >=20 > + for ( Index =3D 0 >=20 > + ; MultU64x64 (RelaEntrySize, Index) < RelaSize >=20 > + ; Index++, Rela =3D ELF_NEXT_ENTRY (Elf64_Rela, Rela, RelaEntrySiz= e) >=20 > + ) { >=20 > + // >=20 > + // r_offset is the virtual address of the storage unit affected by t= he > relocation. >=20 > + // >=20 > + Ptr =3D (UINT64 *)(UINTN)(Rela->r_offset + Delta); >=20 > + Type =3D ELF64_R_TYPE(Rela->r_info); >=20 > + switch (Type) { >=20 > + case R_X86_64_NONE: >=20 > + case R_X86_64_PC32: >=20 > + case R_X86_64_PLT32: >=20 > + case R_X86_64_GOTPCREL: >=20 > + case R_X86_64_GOTPCRELX: >=20 > + case R_X86_64_REX_GOTPCRELX: >=20 > + break; >=20 > + >=20 > + case R_X86_64_64: >=20 > + if (DynamicLinking) { >=20 > + // >=20 > + // Dynamic section doesn't contain entries of this type. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", > Type)); >=20 > + ASSERT (FALSE); >=20 > + } else { >=20 > + *Ptr +=3D Delta; >=20 > + } >=20 > + break; >=20 > + >=20 > + case R_X86_64_32: >=20 > + // >=20 > + // Dynamic section doesn't contain entries of this type. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type))= ; >=20 > + ASSERT (FALSE); >=20 > + break; >=20 > + >=20 > + case R_X86_64_RELATIVE: >=20 > + if (DynamicLinking) { >=20 > + // >=20 > + // A: Represents the addend used to compute the value of the > relocatable field. >=20 > + // B: Represents the base address at which a shared object has= been > loaded into memory during execution. >=20 > + // Generally, a shared object is built with a 0 base virtua= l address, but > the execution address will be different. >=20 > + // >=20 > + // B (Base Address) in ELF spec is slightly different: >=20 > + // An executable or shared object file's base address (on pl= atforms > that support the concept) is calculated during >=20 > + // execution from three values: the virtual memory load addr= ess, the > maximum page size, and the lowest virtual address >=20 > + // of a program's loadable segment. To compute the base addr= ess, > one determines the memory address associated with the >=20 > + // lowest p_vaddr value for a PT_LOAD segment. This address = is > truncated to the nearest multiple of the maximum page size. >=20 > + // The corresponding p_vaddr value itself is also truncated = to the > nearest multiple of the maximum page size. >=20 > + // >=20 > + // *** The base address is the difference between the trunca= ted > memory address and the truncated p_vaddr value. *** >=20 > + // >=20 > + // Delta in this function is B. >=20 > + // >=20 > + // Calculation: B + A >=20 > + // >=20 > + if (RelaType =3D=3D SHT_RELA) { >=20 > + ASSERT (*Ptr =3D=3D 0); >=20 > + *Ptr =3D Delta + Rela->r_addend; >=20 > + } else { >=20 > + // >=20 > + // A is stored in the field of relocation for REL type. >=20 > + // >=20 > + *Ptr =3D Delta + *Ptr; >=20 > + } >=20 > + } else { >=20 > + // >=20 > + // non-Dynamic section doesn't contain entries of this type. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", > Type)); >=20 > + ASSERT (FALSE); >=20 > + } >=20 > + break; >=20 > + >=20 > + default: >=20 > + DEBUG ((DEBUG_INFO, "Unsupported relocation type %02X\n", Type))= ; >=20 > + } >=20 > + } >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +EFI_STATUS >=20 > +RelocateElf64Dynamic ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + UINT32 Index; >=20 > + Elf64_Phdr *Phdr; >=20 > + Elf64_Shdr *DynShdr; >=20 > + Elf64_Shdr *RelShdr; >=20 > + Elf64_Dyn *Dyn; >=20 > + UINT64 RelaOffset; >=20 > + UINT64 RelaCount; >=20 > + UINT64 RelaSize; >=20 > + UINT64 RelaEntrySize; >=20 > + UINT64 RelaType; >=20 > + >=20 > + // >=20 > + // 1. Locate the dynamic section. >=20 > + // >=20 > + // If an object file participates in dynamic linking, its program head= er table >=20 > + // will have an element of type PT_DYNAMIC. >=20 > + // This ``segment'' contains the .dynamic section. A special symbol, > _DYNAMIC, >=20 > + // labels the section, which contains an array of Elf32_Dyn or Elf64_D= yn. >=20 > + // >=20 > + DynShdr =3D NULL; >=20 > + for (Index =3D 0; Index < ElfCt->PhNum; Index++) { >=20 > + Phdr =3D GetElf64SegmentByIndex (ElfCt->FileBase, Index); >=20 > + ASSERT (Phdr !=3D NULL); >=20 > + if (Phdr->p_type =3D=3D PT_DYNAMIC) { >=20 > + // >=20 > + // Verify the existence of the dynamic section. >=20 > + // >=20 > + DynShdr =3D GetElf64SectionByRange (ElfCt->FileBase, Phdr->p_offse= t, > Phdr->p_filesz); >=20 > + break; >=20 > + } >=20 > + } >=20 > + >=20 > + // >=20 > + // It's abnormal a DYN ELF doesn't contain a dynamic section. >=20 > + // >=20 > + ASSERT (DynShdr !=3D NULL); >=20 > + if (DynShdr =3D=3D NULL) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + ASSERT (DynShdr->sh_type =3D=3D SHT_DYNAMIC); >=20 > + ASSERT (DynShdr->sh_entsize >=3D sizeof (*Dyn)); >=20 > + >=20 > + // >=20 > + // 2. Locate the relocation section from the dynamic section. >=20 > + // >=20 > + RelaOffset =3D MAX_UINT64; >=20 > + RelaSize =3D 0; >=20 > + RelaCount =3D 0; >=20 > + RelaEntrySize =3D 0; >=20 > + RelaType =3D 0; >=20 > + for ( Index =3D 0, Dyn =3D (Elf64_Dyn *) (ElfCt->FileBase + DynShdr->s= h_offset) >=20 > + ; Index < DivU64x64Remainder (DynShdr->sh_size, DynShdr->sh_entsiz= e, > NULL) >=20 > + ; Index++, Dyn =3D ELF_NEXT_ENTRY (Elf64_Dyn, Dyn, DynShdr- > >sh_entsize) >=20 > + ) { >=20 > + switch (Dyn->d_tag) { >=20 > + case DT_RELA: >=20 > + case DT_REL: >=20 > + // >=20 > + // DT_REL represent program virtual addresses. >=20 > + // A file's virtual addresses might not match the memory virtual > addresses during execution. >=20 > + // When interpreting addresses contained in the dynamic structur= e, the > dynamic linker computes actual addresses, >=20 > + // based on the original file value and the memory base address. >=20 > + // For consistency, files do not contain relocation entries to `= `correct'' > addresses in the dynamic structure. >=20 > + // >=20 > + RelaOffset =3D Dyn->d_un.d_ptr - (UINTN) ElfCt- > >PreferredImageAddress; >=20 > + RelaType =3D (Dyn->d_tag =3D=3D DT_RELA) ? SHT_RELA: SHT_REL; >=20 > + break; >=20 > + case DT_RELACOUNT: >=20 > + case DT_RELCOUNT: >=20 > + RelaCount =3D Dyn->d_un.d_val; >=20 > + break; >=20 > + case DT_RELENT: >=20 > + case DT_RELAENT: >=20 > + RelaEntrySize =3D Dyn->d_un.d_val; >=20 > + break; >=20 > + case DT_RELSZ: >=20 > + case DT_RELASZ: >=20 > + RelaSize =3D Dyn->d_un.d_val; >=20 > + break; >=20 > + default: >=20 > + break; >=20 > + } >=20 > + } >=20 > + >=20 > + if (RelaOffset =3D=3D MAX_UINT64) { >=20 > + ASSERT (RelaCount =3D=3D 0); >=20 > + ASSERT (RelaEntrySize =3D=3D 0); >=20 > + ASSERT (RelaSize =3D=3D 0); >=20 > + // >=20 > + // It's fine that a DYN ELF doesn't contain relocation section. >=20 > + // >=20 > + return EFI_SUCCESS; >=20 > + } >=20 > + >=20 > + // >=20 > + // Verify the existence of the relocation section. >=20 > + // >=20 > + RelShdr =3D GetElf64SectionByRange (ElfCt->FileBase, RelaOffset, RelaS= ize); >=20 > + ASSERT (RelShdr !=3D NULL); >=20 > + if (RelShdr =3D=3D NULL) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + ASSERT (RelShdr->sh_type =3D=3D RelaType); >=20 > + ASSERT (RelShdr->sh_entsize =3D=3D RelaEntrySize); >=20 > + >=20 > + // >=20 > + // 3. Process the relocation section. >=20 > + // >=20 > + ProcessRelocation64 ( >=20 > + (Elf64_Rela *) (ElfCt->FileBase + RelShdr->sh_offset), >=20 > + RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type, >=20 > + (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt->PreferredImageAddress, >=20 > + TRUE >=20 > + ); >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +EFI_STATUS >=20 > +RelocateElf64Sections ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + EFI_STATUS Status; >=20 > + Elf64_Ehdr *Ehdr; >=20 > + Elf64_Shdr *RelShdr; >=20 > + Elf64_Shdr *Shdr; >=20 > + UINT32 Index; >=20 > + UINTN Delta; >=20 > + >=20 > + Ehdr =3D (Elf64_Ehdr *)ElfCt->FileBase; >=20 > + if (Ehdr->e_machine !=3D EM_X86_64) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + >=20 > + Delta =3D (UINTN) ElfCt->ImageAddress - (UINTN) ElfCt- > >PreferredImageAddress; >=20 > + ElfCt->EntryPoint =3D (UINTN)(Ehdr->e_entry + Delta); >=20 > + >=20 > + // >=20 > + // 1. Relocate dynamic ELF using the relocation section pointed by dyn= amic > section >=20 > + // >=20 > + if (Ehdr->e_type =3D=3D ET_DYN) { >=20 > + DEBUG ((DEBUG_INFO, "DYN ELF: Relocate using dynamic sections...\n")= ); >=20 > + Status =3D RelocateElf64Dynamic (ElfCt); >=20 > + ASSERT_EFI_ERROR (Status); >=20 > + return Status; >=20 > + } >=20 > + >=20 > + // >=20 > + // 2. Executable ELF: Fix up the delta between actual image address an= d > preferred image address. >=20 > + // >=20 > + // Linker already fixed up EXEC ELF based on the preferred image addr= ess. >=20 > + // A ELF loader in modern OS only loads it into the preferred image > address. >=20 > + // The below relocation is unneeded in that case. >=20 > + // But the ELF loader in firmware supports to load the image to a dif= ferent > address. >=20 > + // The below relocation is needed in this case. >=20 > + // >=20 > + DEBUG ((DEBUG_INFO, "EXEC ELF: Fix actual/preferred base address > delta ...\n")); >=20 > + for ( Index =3D 0, RelShdr =3D (Elf64_Shdr *) (ElfCt->FileBase + Ehdr-= >e_shoff) >=20 > + ; Index < Ehdr->e_shnum >=20 > + ; Index++, RelShdr =3D ELF_NEXT_ENTRY (Elf64_Shdr, RelShdr, Ehdr= - > >e_shentsize) >=20 > + ) { >=20 > + if ((RelShdr->sh_type !=3D SHT_REL) && (RelShdr->sh_type !=3D SHT_RE= LA)) { >=20 > + continue; >=20 > + } >=20 > + Shdr =3D GetElf64SectionByIndex (ElfCt->FileBase, RelShdr->sh_info); >=20 > + if ((Shdr->sh_flags & SHF_ALLOC) =3D=3D SHF_ALLOC) { >=20 > + // >=20 > + // Only fix up sections that occupy memory during process executio= n. >=20 > + // >=20 > + ProcessRelocation64 ( >=20 > + (Elf64_Rela *)((UINT8*)Ehdr + RelShdr->sh_offset), >=20 > + RelShdr->sh_size, RelShdr->sh_entsize, RelShdr->sh_type, >=20 > + Delta, FALSE >=20 > + ); >=20 > + } >=20 > + } >=20 > + >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +/** >=20 > + Load ELF image which has 64-bit architecture. >=20 > + >=20 > + Caller should set Context.ImageAddress to a proper value, either point= ing > to >=20 > + a new allocated memory whose size equal to Context.ImageSize, or > pointing >=20 > + to Context.PreferredImageAddress. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > + @retval Others Loading ELF binary fails. >=20 > + >=20 > +**/ >=20 > +EFI_STATUS >=20 > +LoadElf64Image ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + Elf64_Ehdr *Ehdr; >=20 > + Elf64_Phdr *Phdr; >=20 > + UINT16 Index; >=20 > + UINTN Delta; >=20 > + >=20 > + ASSERT (ElfCt !=3D NULL); >=20 > + >=20 > + // >=20 > + // Per the sprit of ELF, loading to memory only consumes info from > program headers. >=20 > + // >=20 > + Ehdr =3D (Elf64_Ehdr *)ElfCt->FileBase; >=20 > + >=20 > + for ( Index =3D 0, Phdr =3D (Elf64_Phdr *)(ElfCt->FileBase + Ehdr->e_p= hoff) >=20 > + ; Index < Ehdr->e_phnum >=20 > + ; Index++, Phdr =3D ELF_NEXT_ENTRY (Elf64_Phdr, Phdr, Ehdr- > >e_phentsize) >=20 > + ) { >=20 > + // >=20 > + // Skip segments that don't require load (type tells, or size is 0) >=20 > + // >=20 > + if ((Phdr->p_type !=3D PT_LOAD) || >=20 > + (Phdr->p_memsz =3D=3D 0)) { >=20 > + continue; >=20 > + } >=20 > + >=20 > + // >=20 > + // The memory offset of segment relative to the image base >=20 > + // Note: CopyMem() does nothing when the dst equals to src. >=20 > + // >=20 > + Delta =3D (UINTN) Phdr->p_paddr - (UINTN) ElfCt->PreferredImageAddre= ss; >=20 > + CopyMem (ElfCt->ImageAddress + Delta, ElfCt->FileBase + (UINTN) Phdr= - > >p_offset, (UINTN) Phdr->p_filesz); >=20 > + ZeroMem (ElfCt->ImageAddress + Delta + (UINTN) Phdr->p_filesz, > (UINTN) (Phdr->p_memsz - Phdr->p_filesz)); >=20 > + } >=20 > + >=20 > + // >=20 > + // Relocate when new new image base is not the preferred image base. >=20 > + // >=20 > + if (ElfCt->ImageAddress !=3D ElfCt->PreferredImageAddress) { >=20 > + RelocateElf64Sections (ElfCt); >=20 > + } >=20 > + >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfCommon.h > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfCommon.h > new file mode 100644 > index 0000000000..15c9e33d3f > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfCommon.h > @@ -0,0 +1,983 @@ > +/** @file >=20 > +Ported ELF include files from FreeBSD >=20 > + >=20 > +Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.
>=20 > +Portions Copyright (c) 2011 - 2013, ARM Ltd. All rights reserved.
>=20 > +SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > + >=20 > +**/ >=20 > +/*- >=20 > + * Copyright (c) 1998 John D. Polstra. >=20 > + * All rights reserved. >=20 > + * >=20 > + * Redistribution and use in source and binary forms, with or without >=20 > + * modification, are permitted provided that the following conditions >=20 > + * are met: >=20 > + * 1. Redistributions of source code must retain the above copyright >=20 > + * notice, this list of conditions and the following disclaimer. >=20 > + * 2. Redistributions in binary form must reproduce the above copyright >=20 > + * notice, this list of conditions and the following disclaimer in th= e >=20 > + * documentation and/or other materials provided with the distributio= n. >=20 > + * >=20 > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS > IS'' AND >=20 > + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED > TO, THE >=20 > + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A > PARTICULAR PURPOSE >=20 > + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS > BE LIABLE >=20 > + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR > CONSEQUENTIAL >=20 > + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF > SUBSTITUTE GOODS >=20 > + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS > INTERRUPTION) >=20 > + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN > CONTRACT, STRICT >=20 > + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING > IN ANY WAY >=20 > + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE > POSSIBILITY OF >=20 > + * SUCH DAMAGE. >=20 > + * >=20 > + * $FreeBSD: src/sys/sys/elf_common.h,v 1.15.8.2 2007/12/03 21:30:36 > marius Exp $ >=20 > + */ >=20 > + >=20 > +#ifndef _SYS_ELF_COMMON_H_ >=20 > +#define _SYS_ELF_COMMON_H_ 1 >=20 > + >=20 > +/* >=20 > + * ELF definitions that are independent of architecture or word size. >=20 > + */ >=20 > + >=20 > +/* >=20 > + * Note header. The ".note" section contains an array of notes. Each >=20 > + * begins with this header, aligned to a word boundary. Immediately >=20 > + * following the note header is n_namesz bytes of name, padded to the >=20 > + * next word boundary. Then comes n_descsz bytes of descriptor, again >=20 > + * padded to a word boundary. The values of n_namesz and n_descsz do >=20 > + * not include the padding. >=20 > + */ >=20 > + >=20 > +typedef struct { >=20 > + UINT32 n_namesz; /* Length of name. */ >=20 > + UINT32 n_descsz; /* Length of descriptor. */ >=20 > + UINT32 n_type; /* Type of this note. */ >=20 > +} Elf_Note; >=20 > + >=20 > +/* Indexes into the e_ident array. Keep synced with >=20 > + http://www.sco.com/developers/gabi/latest/ch4.eheader.html */ >=20 > +#define EI_MAG0 0 /* Magic number, byte 0. */ >=20 > +#define EI_MAG1 1 /* Magic number, byte 1. */ >=20 > +#define EI_MAG2 2 /* Magic number, byte 2. */ >=20 > +#define EI_MAG3 3 /* Magic number, byte 3. */ >=20 > +#define EI_CLASS 4 /* Class of machine. */ >=20 > +#define EI_DATA 5 /* Data format. */ >=20 > +#define EI_VERSION 6 /* ELF format version. */ >=20 > +#define EI_OSABI 7 /* Operating system / ABI identification */ >=20 > +#define EI_ABIVERSION 8 /* ABI version */ >=20 > +#define OLD_EI_BRAND 8 /* Start of architecture identification. */ >=20 > +#define EI_PAD 9 /* Start of padding (per SVR4 ABI). */ >=20 > +#define EI_NIDENT 16 /* Size of e_ident array. */ >=20 > + >=20 > +/* Values for the magic number bytes. */ >=20 > +#define ELFMAG0 0x7f >=20 > +#define ELFMAG1 'E' >=20 > +#define ELFMAG2 'L' >=20 > +#define ELFMAG3 'F' >=20 > +#define ELFMAG "\177ELF" /* magic string */ >=20 > +#define SELFMAG 4 /* magic string size */ >=20 > + >=20 > +/* Values for e_ident[EI_VERSION] and e_version. */ >=20 > +#define EV_NONE 0 >=20 > +#define EV_CURRENT 1 >=20 > + >=20 > +/* Values for e_ident[EI_CLASS]. */ >=20 > +#define ELFCLASSNONE 0 /* Unknown class. */ >=20 > +#define ELFCLASS32 1 /* 32-bit architecture. */ >=20 > +#define ELFCLASS64 2 /* 64-bit architecture. */ >=20 > + >=20 > +/* Values for e_ident[EI_DATA]. */ >=20 > +#define ELFDATANONE 0 /* Unknown data format. */ >=20 > +#define ELFDATA2LSB 1 /* 2's complement little-endian. */ >=20 > +#define ELFDATA2MSB 2 /* 2's complement big-endian. */ >=20 > + >=20 > +/* Values for e_ident[EI_OSABI]. */ >=20 > +#define ELFOSABI_NONE 0 /* UNIX System V ABI */ >=20 > +#define ELFOSABI_HPUX 1 /* HP-UX operating system */ >=20 > +#define ELFOSABI_NETBSD 2 /* NetBSD */ >=20 > +#define ELFOSABI_LINUX 3 /* GNU/Linux */ >=20 > +#define ELFOSABI_HURD 4 /* GNU/Hurd */ >=20 > +#define ELFOSABI_86OPEN 5 /* 86Open common IA32 ABI */ >=20 > +#define ELFOSABI_SOLARIS 6 /* Solaris */ >=20 > +#define ELFOSABI_AIX 7 /* AIX */ >=20 > +#define ELFOSABI_IRIX 8 /* IRIX */ >=20 > +#define ELFOSABI_FREEBSD 9 /* FreeBSD */ >=20 > +#define ELFOSABI_TRU64 10 /* TRU64 UNIX */ >=20 > +#define ELFOSABI_MODESTO 11 /* Novell Modesto */ >=20 > +#define ELFOSABI_OPENBSD 12 /* OpenBSD */ >=20 > +#define ELFOSABI_OPENVMS 13 /* Open VMS */ >=20 > +#define ELFOSABI_NSK 14 /* HP Non-Stop Kernel */ >=20 > +#define ELFOSABI_ARM 97 /* ARM */ >=20 > +#define ELFOSABI_STANDALONE 255 /* Standalone (embedded) > application */ >=20 > + >=20 > +#define ELFOSABI_SYSV ELFOSABI_NONE /* symbol used in old spec */ >=20 > +#define ELFOSABI_MONTEREY ELFOSABI_AIX /* Monterey */ >=20 > + >=20 > +/* e_ident */ >=20 > +#define IS_ELF(ehdr) ((ehdr).e_ident[EI_MAG0] =3D=3D ELFMAG0 && \ >=20 > + (ehdr).e_ident[EI_MAG1] =3D=3D ELFMAG1 && \ >=20 > + (ehdr).e_ident[EI_MAG2] =3D=3D ELFMAG2 && \ >=20 > + (ehdr).e_ident[EI_MAG3] =3D=3D ELFMAG3) >=20 > + >=20 > +/* Values for e_type. */ >=20 > +#define ET_NONE 0 /* Unknown type. */ >=20 > +#define ET_REL 1 /* Relocatable. */ >=20 > +#define ET_EXEC 2 /* Executable. */ >=20 > +#define ET_DYN 3 /* Shared object. */ >=20 > +#define ET_CORE 4 /* Core file. */ >=20 > +#define ET_LOOS 0xfe00 /* First operating system specific. */ >=20 > +#define ET_HIOS 0xfeff /* Last operating system-specific. */ >=20 > +#define ET_LOPROC 0xff00 /* First processor-specific. */ >=20 > +#define ET_HIPROC 0xffff /* Last processor-specific. */ >=20 > + >=20 > +/* Values for e_machine. */ >=20 > +#define EM_NONE 0 /* Unknown machine. */ >=20 > +#define EM_M32 1 /* AT&T WE32100. */ >=20 > +#define EM_SPARC 2 /* Sun SPARC. */ >=20 > +#define EM_386 3 /* Intel i386. */ >=20 > +#define EM_68K 4 /* Motorola 68000. */ >=20 > +#define EM_88K 5 /* Motorola 88000. */ >=20 > +#define EM_860 7 /* Intel i860. */ >=20 > +#define EM_MIPS 8 /* MIPS R3000 Big-Endian only. */ >=20 > +#define EM_S370 9 /* IBM System/370. */ >=20 > +#define EM_MIPS_RS3_LE 10 /* MIPS R3000 Little-Endian. */ >=20 > +#define EM_PARISC 15 /* HP PA-RISC. */ >=20 > +#define EM_VPP500 17 /* Fujitsu VPP500. */ >=20 > +#define EM_SPARC32PLUS 18 /* SPARC v8plus. */ >=20 > +#define EM_960 19 /* Intel 80960. */ >=20 > +#define EM_PPC 20 /* PowerPC 32-bit. */ >=20 > +#define EM_PPC64 21 /* PowerPC 64-bit. */ >=20 > +#define EM_S390 22 /* IBM System/390. */ >=20 > +#define EM_V800 36 /* NEC V800. */ >=20 > +#define EM_FR20 37 /* Fujitsu FR20. */ >=20 > +#define EM_RH32 38 /* TRW RH-32. */ >=20 > +#define EM_RCE 39 /* Motorola RCE. */ >=20 > +#define EM_ARM 40 /* ARM. */ >=20 > +#define EM_SH 42 /* Hitachi SH. */ >=20 > +#define EM_SPARCV9 43 /* SPARC v9 64-bit. */ >=20 > +#define EM_TRICORE 44 /* Siemens TriCore embedded processor. */ >=20 > +#define EM_ARC 45 /* Argonaut RISC Core. */ >=20 > +#define EM_H8_300 46 /* Hitachi H8/300. */ >=20 > +#define EM_H8_300H 47 /* Hitachi H8/300H. */ >=20 > +#define EM_H8S 48 /* Hitachi H8S. */ >=20 > +#define EM_H8_500 49 /* Hitachi H8/500. */ >=20 > +#define EM_MIPS_X 51 /* Stanford MIPS-X. */ >=20 > +#define EM_COLDFIRE 52 /* Motorola ColdFire. */ >=20 > +#define EM_68HC12 53 /* Motorola M68HC12. */ >=20 > +#define EM_MMA 54 /* Fujitsu MMA. */ >=20 > +#define EM_PCP 55 /* Siemens PCP. */ >=20 > +#define EM_NCPU 56 /* Sony nCPU. */ >=20 > +#define EM_NDR1 57 /* Denso NDR1 microprocessor. */ >=20 > +#define EM_STARCORE 58 /* Motorola Star*Core processor. */ >=20 > +#define EM_ME16 59 /* Toyota ME16 processor. */ >=20 > +#define EM_ST100 60 /* STMicroelectronics ST100 processor. */ >=20 > +#define EM_TINYJ 61 /* Advanced Logic Corp. TinyJ processor. */ >=20 > +#define EM_X86_64 62 /* Advanced Micro Devices x86-64 */ >=20 > +#define EM_AMD64 EM_X86_64 /* Advanced Micro Devices x86-64 > (compat) */ >=20 > +#define EM_AARCH64 183 /* ARM 64bit Architecture */ >=20 > + >=20 > +/* Non-standard or deprecated. */ >=20 > +#define EM_486 6 /* Intel i486. */ >=20 > +#define EM_MIPS_RS4_BE 10 /* MIPS R4000 Big-Endian */ >=20 > +#define EM_ALPHA_STD 41 /* Digital Alpha (standard value). */ >=20 > +#define EM_ALPHA 0x9026 /* Alpha (written in the absence of an ABI) */ >=20 > + >=20 > +/* Special section indexes. */ >=20 > +#define SHN_UNDEF 0 /* Undefined, missing, irrelevant. */ >=20 > +#define SHN_LORESERVE 0xff00 /* First of reserved range. */ >=20 > +#define SHN_LOPROC 0xff00 /* First processor-specific. */ >=20 > +#define SHN_HIPROC 0xff1f /* Last processor-specific. */ >=20 > +#define SHN_LOOS 0xff20 /* First operating system-specific. */ >=20 > +#define SHN_HIOS 0xff3f /* Last operating system-specific. */ >=20 > +#define SHN_ABS 0xfff1 /* Absolute values. */ >=20 > +#define SHN_COMMON 0xfff2 /* Common data. */ >=20 > +#define SHN_XINDEX 0xffff /* Escape -- index stored elsewhere. */ >=20 > +#define SHN_HIRESERVE 0xffff /* Last of reserved range. */ >=20 > + >=20 > +/* sh_type */ >=20 > +#define SHT_NULL 0 /* inactive */ >=20 > +#define SHT_PROGBITS 1 /* program defined information */ >=20 > +#define SHT_SYMTAB 2 /* symbol table section */ >=20 > +#define SHT_STRTAB 3 /* string table section */ >=20 > +#define SHT_RELA 4 /* relocation section with addends */ >=20 > +#define SHT_HASH 5 /* symbol hash table section */ >=20 > +#define SHT_DYNAMIC 6 /* dynamic section */ >=20 > +#define SHT_NOTE 7 /* note section */ >=20 > +#define SHT_NOBITS 8 /* no space section */ >=20 > +#define SHT_REL 9 /* relocation section - no addends */ >=20 > +#define SHT_SHLIB 10 /* reserved - purpose unknown */ >=20 > +#define SHT_DYNSYM 11 /* dynamic symbol table section */ >=20 > +#define SHT_INIT_ARRAY 14 /* Initialization function pointers. */ >=20 > +#define SHT_FINI_ARRAY 15 /* Termination function pointers. */ >=20 > +#define SHT_PREINIT_ARRAY 16 /* Pre-initialization function ptrs. */ >=20 > +#define SHT_GROUP 17 /* Section group. */ >=20 > +#define SHT_SYMTAB_SHNDX 18 /* Section indexes (see SHN_XINDEX). */ >=20 > +#define SHT_LOOS 0x60000000 /* First of OS specific semantics */ >=20 > +#define SHT_LOSUNW 0x6ffffff4 >=20 > +#define SHT_SUNW_dof 0x6ffffff4 >=20 > +#define SHT_SUNW_cap 0x6ffffff5 >=20 > +#define SHT_SUNW_SIGNATURE 0x6ffffff6 >=20 > +#define SHT_SUNW_ANNOTATE 0x6ffffff7 >=20 > +#define SHT_SUNW_DEBUGSTR 0x6ffffff8 >=20 > +#define SHT_SUNW_DEBUG 0x6ffffff9 >=20 > +#define SHT_SUNW_move 0x6ffffffa >=20 > +#define SHT_SUNW_COMDAT 0x6ffffffb >=20 > +#define SHT_SUNW_syminfo 0x6ffffffc >=20 > +#define SHT_SUNW_verdef 0x6ffffffd >=20 > +#define SHT_GNU_verdef 0x6ffffffd /* Symbol versions provided */ >=20 > +#define SHT_SUNW_verneed 0x6ffffffe >=20 > +#define SHT_GNU_verneed 0x6ffffffe /* Symbol versions required */ >=20 > +#define SHT_SUNW_versym 0x6fffffff >=20 > +#define SHT_GNU_versym 0x6fffffff /* Symbol version table */ >=20 > +#define SHT_HISUNW 0x6fffffff >=20 > +#define SHT_HIOS 0x6fffffff /* Last of OS specific semantics */ >=20 > +#define SHT_LOPROC 0x70000000 /* reserved range for processor */ >=20 > +#define SHT_AMD64_UNWIND 0x70000001 /* unwind information */ >=20 > +#define SHT_HIPROC 0x7fffffff /* specific section header types */ >=20 > +#define SHT_LOUSER 0x80000000 /* reserved range for application */ >=20 > +#define SHT_HIUSER 0xffffffff /* specific indexes */ >=20 > + >=20 > +/* Flags for sh_flags. */ >=20 > +#define SHF_WRITE 0x1 /* Section contains writable data. */ >=20 > +#define SHF_ALLOC 0x2 /* Section occupies memory. */ >=20 > +#define SHF_EXECINSTR 0x4 /* Section contains instructions. */ >=20 > +#define SHF_MERGE 0x10 /* Section may be merged. */ >=20 > +#define SHF_STRINGS 0x20 /* Section contains strings. */ >=20 > +#define SHF_INFO_LINK 0x40 /* sh_info holds section index. */ >=20 > +#define SHF_LINK_ORDER 0x80 /* Special ordering requirements. */ >=20 > +#define SHF_OS_NONCONFORMING 0x100 /* OS-specific processing > required. */ >=20 > +#define SHF_GROUP 0x200 /* Member of section group. */ >=20 > +#define SHF_TLS 0x400 /* Section contains TLS data. */ >=20 > +#define SHF_MASKOS 0x0ff00000 /* OS-specific semantics. */ >=20 > +#define SHF_MASKPROC 0xf0000000 /* Processor-specific semantics. */ >=20 > + >=20 > +/* Values for p_type. */ >=20 > +#define PT_NULL 0 /* Unused entry. */ >=20 > +#define PT_LOAD 1 /* Loadable segment. */ >=20 > +#define PT_DYNAMIC 2 /* Dynamic linking information segment. */ >=20 > +#define PT_INTERP 3 /* Pathname of interpreter. */ >=20 > +#define PT_NOTE 4 /* Auxiliary information. */ >=20 > +#define PT_SHLIB 5 /* Reserved (not used). */ >=20 > +#define PT_PHDR 6 /* Location of program header itself. */ >=20 > +#define PT_TLS 7 /* Thread local storage segment */ >=20 > +#define PT_LOOS 0x60000000 /* First OS-specific. */ >=20 > +#define PT_SUNW_UNWIND 0x6464e550 /* amd64 UNWIND program > header */ >=20 > +#define PT_GNU_EH_FRAME 0x6474e550 >=20 > +#define PT_LOSUNW 0x6ffffffa >=20 > +#define PT_SUNWBSS 0x6ffffffa /* Sun Specific segment */ >=20 > +#define PT_SUNWSTACK 0x6ffffffb /* describes the stack segment */ >=20 > +#define PT_SUNWDTRACE 0x6ffffffc /* private */ >=20 > +#define PT_SUNWCAP 0x6ffffffd /* hard/soft capabilities segment */ >=20 > +#define PT_HISUNW 0x6fffffff >=20 > +#define PT_HIOS 0x6fffffff /* Last OS-specific. */ >=20 > +#define PT_LOPROC 0x70000000 /* First processor-specific type. */ >=20 > +#define PT_HIPROC 0x7fffffff /* Last processor-specific type. */ >=20 > + >=20 > +/* Values for p_flags. */ >=20 > +#define PF_X 0x1 /* Executable. */ >=20 > +#define PF_W 0x2 /* Writable. */ >=20 > +#define PF_R 0x4 /* Readable. */ >=20 > +#define PF_MASKOS 0x0ff00000 /* Operating system-specific. */ >=20 > +#define PF_MASKPROC 0xf0000000 /* Processor-specific. */ >=20 > + >=20 > +/* Extended program header index. */ >=20 > +#define PN_XNUM 0xffff >=20 > + >=20 > +/* Values for d_tag. */ >=20 > +#define DT_NULL 0 /* Terminating entry. */ >=20 > +#define DT_NEEDED 1 /* String table offset of a needed shared >=20 > + library. */ >=20 > +#define DT_PLTRELSZ 2 /* Total size in bytes of PLT relocations. */ >=20 > +#define DT_PLTGOT 3 /* Processor-dependent address. */ >=20 > +#define DT_HASH 4 /* Address of symbol hash table. */ >=20 > +#define DT_STRTAB 5 /* Address of string table. */ >=20 > +#define DT_SYMTAB 6 /* Address of symbol table. */ >=20 > +#define DT_RELA 7 /* Address of ElfNN_Rela relocations. */ >=20 > +#define DT_RELASZ 8 /* Total size of ElfNN_Rela relocations. */ >=20 > +#define DT_RELAENT 9 /* Size of each ElfNN_Rela relocation entry. */ >=20 > +#define DT_STRSZ 10 /* Size of string table. */ >=20 > +#define DT_SYMENT 11 /* Size of each symbol table entry. */ >=20 > +#define DT_INIT 12 /* Address of initialization function. */ >=20 > +#define DT_FINI 13 /* Address of finalization function. */ >=20 > +#define DT_SONAME 14 /* String table offset of shared object >=20 > + name. */ >=20 > +#define DT_RPATH 15 /* String table offset of library path. [sup] */ >=20 > +#define DT_SYMBOLIC 16 /* Indicates "symbolic" linking. [sup] */ >=20 > +#define DT_REL 17 /* Address of ElfNN_Rel relocations. */ >=20 > +#define DT_RELSZ 18 /* Total size of ElfNN_Rel relocations. */ >=20 > +#define DT_RELENT 19 /* Size of each ElfNN_Rel relocation. */ >=20 > +#define DT_PLTREL 20 /* Type of relocation used for PLT. */ >=20 > +#define DT_DEBUG 21 /* Reserved (not used). */ >=20 > +#define DT_TEXTREL 22 /* Indicates there may be relocations in >=20 > + non-writable segments. [sup] */ >=20 > +#define DT_JMPREL 23 /* Address of PLT relocations. */ >=20 > +#define DT_BIND_NOW 24 /* [sup] */ >=20 > +#define DT_INIT_ARRAY 25 /* Address of the array of pointers to >=20 > + initialization functions */ >=20 > +#define DT_FINI_ARRAY 26 /* Address of the array of pointers to >=20 > + termination functions */ >=20 > +#define DT_INIT_ARRAYSZ 27 /* Size in bytes of the array of >=20 > + initialization functions. */ >=20 > +#define DT_FINI_ARRAYSZ 28 /* Size in bytes of the array of >=20 > + terminationfunctions. */ >=20 > +#define DT_RUNPATH 29 /* String table offset of a null-terminated >=20 > + library search path string. */ >=20 > +#define DT_FLAGS 30 /* Object specific flag values. */ >=20 > +#define DT_ENCODING 32 /* Values greater than or equal to > DT_ENCODING >=20 > + and less than DT_LOOS follow the rules for >=20 > + the interpretation of the d_un union >=20 > + as follows: even =3D=3D 'd_ptr', even =3D=3D 'd_val' >=20 > + or none */ >=20 > +#define DT_PREINIT_ARRAY 32 /* Address of the array of pointers to >=20 > + pre-initialization functions. */ >=20 > +#define DT_PREINIT_ARRAYSZ 33 /* Size in bytes of the array of >=20 > + pre-initialization functions. */ >=20 > +#define DT_MAXPOSTAGS 34 /* number of positive tags */ >=20 > +#define DT_LOOS 0x6000000d /* First OS-specific */ >=20 > +#define DT_SUNW_AUXILIARY 0x6000000d /* symbol auxiliary name */ >=20 > +#define DT_SUNW_RTLDINF 0x6000000e /* ld.so.1 info (private) */ >=20 > +#define DT_SUNW_FILTER 0x6000000f /* symbol filter name */ >=20 > +#define DT_SUNW_CAP 0x60000010 /* hardware/software */ >=20 > +#define DT_HIOS 0x6ffff000 /* Last OS-specific */ >=20 > + >=20 > +/* >=20 > + * DT_* entries which fall between DT_VALRNGHI & DT_VALRNGLO use the >=20 > + * Dyn.d_un.d_val field of the Elf*_Dyn structure. >=20 > + */ >=20 > +#define DT_VALRNGLO 0x6ffffd00 >=20 > +#define DT_CHECKSUM 0x6ffffdf8 /* elf checksum */ >=20 > +#define DT_PLTPADSZ 0x6ffffdf9 /* pltpadding size */ >=20 > +#define DT_MOVEENT 0x6ffffdfa /* move table entry size */ >=20 > +#define DT_MOVESZ 0x6ffffdfb /* move table size */ >=20 > +#define DT_FEATURE_1 0x6ffffdfc /* feature holder */ >=20 > +#define DT_POSFLAG_1 0x6ffffdfd /* flags for DT_* entries, effecting = */ >=20 > + /* the following DT_* entry. */ >=20 > + /* See DF_P1_* definitions */ >=20 > +#define DT_SYMINSZ 0x6ffffdfe /* syminfo table size (in bytes) */ >=20 > +#define DT_SYMINENT 0x6ffffdff /* syminfo entry size (in bytes) */ >=20 > +#define DT_VALRNGHI 0x6ffffdff >=20 > + >=20 > +/* >=20 > + * DT_* entries which fall between DT_ADDRRNGHI & DT_ADDRRNGLO use > the >=20 > + * Dyn.d_un.d_ptr field of the Elf*_Dyn structure. >=20 > + * >=20 > + * If any adjustment is made to the ELF object after it has been >=20 > + * built, these entries will need to be adjusted. >=20 > + */ >=20 > +#define DT_ADDRRNGLO 0x6ffffe00 >=20 > +#define DT_CONFIG 0x6ffffefa /* configuration information */ >=20 > +#define DT_DEPAUDIT 0x6ffffefb /* dependency auditing */ >=20 > +#define DT_AUDIT 0x6ffffefc /* object auditing */ >=20 > +#define DT_PLTPAD 0x6ffffefd /* pltpadding (sparcv9) */ >=20 > +#define DT_MOVETAB 0x6ffffefe /* move table */ >=20 > +#define DT_SYMINFO 0x6ffffeff /* syminfo table */ >=20 > +#define DT_ADDRRNGHI 0x6ffffeff >=20 > + >=20 > +#define DT_VERSYM 0x6ffffff0 /* Address of versym section. */ >=20 > +#define DT_RELACOUNT 0x6ffffff9 /* number of RELATIVE relocations */ >=20 > +#define DT_RELCOUNT 0x6ffffffa /* number of RELATIVE relocations */ >=20 > +#define DT_FLAGS_1 0x6ffffffb /* state flags - see DF_1_* defs */ >=20 > +#define DT_VERDEF 0x6ffffffc /* Address of verdef section. */ >=20 > +#define DT_VERDEFNUM 0x6ffffffd /* Number of elems in verdef section > */ >=20 > +#define DT_VERNEED 0x6ffffffe /* Address of verneed section. */ >=20 > +#define DT_VERNEEDNUM 0x6fffffff /* Number of elems in verneed > section */ >=20 > + >=20 > +#define DT_LOPROC 0x70000000 /* First processor-specific type. */ >=20 > +#define DT_DEPRECATED_SPARC_REGISTER 0x7000001 >=20 > +#define DT_AUXILIARY 0x7ffffffd /* shared library auxiliary name */ >=20 > +#define DT_USED 0x7ffffffe /* ignored - same as needed */ >=20 > +#define DT_FILTER 0x7fffffff /* shared library filter name */ >=20 > +#define DT_HIPROC 0x7fffffff /* Last processor-specific type. */ >=20 > + >=20 > +/* Values for DT_FLAGS */ >=20 > +#define DF_ORIGIN 0x0001 /* Indicates that the object being loaded ma= y >=20 > + make reference to the $ORIGIN substitution >=20 > + string */ >=20 > +#define DF_SYMBOLIC 0x0002 /* Indicates "symbolic" linking. */ >=20 > +#define DF_TEXTREL 0x0004 /* Indicates there may be relocations in >=20 > + non-writable segments. */ >=20 > +#define DF_BIND_NOW 0x0008 /* Indicates that the dynamic linker > should >=20 > + process all relocations for the object >=20 > + containing this entry before transferring >=20 > + control to the program. */ >=20 > +#define DF_STATIC_TLS 0x0010 /* Indicates that the shared object or >=20 > + executable contains code using a static >=20 > + thread-local storage scheme. */ >=20 > + >=20 > +/* Values for n_type. Used in core files. */ >=20 > +#define NT_PRSTATUS 1 /* Process status. */ >=20 > +#define NT_FPREGSET 2 /* Floating point registers. */ >=20 > +#define NT_PRPSINFO 3 /* Process state info. */ >=20 > + >=20 > +/* Symbol Binding - ELFNN_ST_BIND - st_info */ >=20 > +#define STB_LOCAL 0 /* Local symbol */ >=20 > +#define STB_GLOBAL 1 /* Global symbol */ >=20 > +#define STB_WEAK 2 /* like global - lower precedence */ >=20 > +#define STB_LOOS 10 /* Reserved range for operating system */ >=20 > +#define STB_HIOS 12 /* specific semantics. */ >=20 > +#define STB_LOPROC 13 /* reserved range for processor */ >=20 > +#define STB_HIPROC 15 /* specific semantics. */ >=20 > + >=20 > +/* Symbol type - ELFNN_ST_TYPE - st_info */ >=20 > +#define STT_NOTYPE 0 /* Unspecified type. */ >=20 > +#define STT_OBJECT 1 /* Data object. */ >=20 > +#define STT_FUNC 2 /* Function. */ >=20 > +#define STT_SECTION 3 /* Section. */ >=20 > +#define STT_FILE 4 /* Source file. */ >=20 > +#define STT_COMMON 5 /* Uninitialized common block. */ >=20 > +#define STT_TLS 6 /* TLS object. */ >=20 > +#define STT_NUM 7 >=20 > +#define STT_LOOS 10 /* Reserved range for operating system */ >=20 > +#define STT_HIOS 12 /* specific semantics. */ >=20 > +#define STT_LOPROC 13 /* reserved range for processor */ >=20 > +#define STT_HIPROC 15 /* specific semantics. */ >=20 > + >=20 > +/* Symbol visibility - ELFNN_ST_VISIBILITY - st_other */ >=20 > +#define STV_DEFAULT 0x0 /* Default visibility (see binding). */ >=20 > +#define STV_INTERNAL 0x1 /* Special meaning in relocatable objects. */ >=20 > +#define STV_HIDDEN 0x2 /* Not visible. */ >=20 > +#define STV_PROTECTED 0x3 /* Visible but not preemptible. */ >=20 > + >=20 > +/* Special symbol table indexes. */ >=20 > +#define STN_UNDEF 0 /* Undefined symbol index. */ >=20 > + >=20 > +/* Symbol versioning flags. */ >=20 > +#define VER_DEF_CURRENT 1 >=20 > +#define VER_DEF_IDX(x) VER_NDX(x) >=20 > + >=20 > +#define VER_FLG_BASE 0x01 >=20 > +#define VER_FLG_WEAK 0x02 >=20 > + >=20 > +#define VER_NEED_CURRENT 1 >=20 > +#define VER_NEED_WEAK (1u << 15) >=20 > +#define VER_NEED_HIDDEN VER_NDX_HIDDEN >=20 > +#define VER_NEED_IDX(x) VER_NDX(x) >=20 > + >=20 > +#define VER_NDX_LOCAL 0 >=20 > +#define VER_NDX_GLOBAL 1 >=20 > +#define VER_NDX_GIVEN 2 >=20 > + >=20 > +#define VER_NDX_HIDDEN (1u << 15) >=20 > +#define VER_NDX(x) ((x) & ~(1u << 15)) >=20 > + >=20 > +#define CA_SUNW_NULL 0 >=20 > +#define CA_SUNW_HW_1 1 /* first hardware capabilities entry */ >=20 > +#define CA_SUNW_SF_1 2 /* first software capabilities entry */ >=20 > + >=20 > +/* >=20 > + * Syminfo flag values >=20 > + */ >=20 > +#define SYMINFO_FLG_DIRECT 0x0001 /* symbol ref has direct associatio= n > */ >=20 > + /* to object containing defn. */ >=20 > +#define SYMINFO_FLG_PASSTHRU 0x0002 /* ignored - see > SYMINFO_FLG_FILTER */ >=20 > +#define SYMINFO_FLG_COPY 0x0004 /* symbol is a copy-reloc */ >=20 > +#define SYMINFO_FLG_LAZYLOAD 0x0008 /* object containing defn > should be */ >=20 > + /* lazily-loaded */ >=20 > +#define SYMINFO_FLG_DIRECTBIND 0x0010 /* ref should be bound > directly to */ >=20 > + /* object containing defn. */ >=20 > +#define SYMINFO_FLG_NOEXTDIRECT 0x0020 /* don't let an external > reference */ >=20 > + /* directly bind to this symbol */ >=20 > +#define SYMINFO_FLG_FILTER 0x0002 /* symbol ref is associated to a */ >=20 > +#define SYMINFO_FLG_AUXILIARY 0x0040 /* standard or auxiliary filte= r > */ >=20 > + >=20 > +/* >=20 > + * Syminfo.si_boundto values. >=20 > + */ >=20 > +#define SYMINFO_BT_SELF 0xffff /* symbol bound to self */ >=20 > +#define SYMINFO_BT_PARENT 0xfffe /* symbol bound to parent */ >=20 > +#define SYMINFO_BT_NONE 0xfffd /* no special symbol binding */ >=20 > +#define SYMINFO_BT_EXTERN 0xfffc /* symbol defined as external */ >=20 > +#define SYMINFO_BT_LOWRESERVE 0xff00 /* beginning of reserved > entries */ >=20 > + >=20 > +/* >=20 > + * Syminfo version values. >=20 > + */ >=20 > +#define SYMINFO_NONE 0 /* Syminfo version */ >=20 > +#define SYMINFO_CURRENT 1 >=20 > +#define SYMINFO_NUM 2 >=20 > + >=20 > +/* >=20 > + * Relocation types. >=20 > + * >=20 > + * All machine architectures are defined here to allow tools on one to >=20 > + * handle others. >=20 > + */ >=20 > + >=20 > +#define R_386_NONE 0 /* No relocation. */ >=20 > +#define R_386_32 1 /* Add symbol value. */ >=20 > +#define R_386_PC32 2 /* Add PC-relative symbol value. */ >=20 > +#define R_386_GOT32 3 /* Add PC-relative GOT offset. */ >=20 > +#define R_386_PLT32 4 /* Add PC-relative PLT offset. */ >=20 > +#define R_386_COPY 5 /* Copy data from shared object. */ >=20 > +#define R_386_GLOB_DAT 6 /* Set GOT entry to data address. */ >=20 > +#define R_386_JMP_SLOT 7 /* Set GOT entry to code address. */ >=20 > +#define R_386_RELATIVE 8 /* Add load address of shared object. */ >=20 > +#define R_386_GOTOFF 9 /* Add GOT-relative symbol address. */ >=20 > +#define R_386_GOTPC 10 /* Add PC-relative GOT table address. */ >=20 > +#define R_386_TLS_TPOFF 14 /* Negative offset in static TLS block *= / >=20 > +#define R_386_TLS_IE 15 /* Absolute address of GOT for -ve static T= LS */ >=20 > +#define R_386_TLS_GOTIE 16 /* GOT entry for negative static TLS blo= ck > */ >=20 > +#define R_386_TLS_LE 17 /* Negative offset relative to static TLS *= / >=20 > +#define R_386_TLS_GD 18 /* 32 bit offset to GOT (index,off) pair */ >=20 > +#define R_386_TLS_LDM 19 /* 32 bit offset to GOT (index,zero) pair = */ >=20 > +#define R_386_TLS_GD_32 24 /* 32 bit offset to GOT (index,off) pair= */ >=20 > +#define R_386_TLS_GD_PUSH 25 /* pushl instruction for Sun ABI GD > sequence */ >=20 > +#define R_386_TLS_GD_CALL 26 /* call instruction for Sun ABI GD > sequence */ >=20 > +#define R_386_TLS_GD_POP 27 /* popl instruction for Sun ABI GD > sequence */ >=20 > +#define R_386_TLS_LDM_32 28 /* 32 bit offset to GOT (index,zero) pair= */ >=20 > +#define R_386_TLS_LDM_PUSH 29 /* pushl instruction for Sun ABI LD > sequence */ >=20 > +#define R_386_TLS_LDM_CALL 30 /* call instruction for Sun ABI LD > sequence */ >=20 > +#define R_386_TLS_LDM_POP 31 /* popl instruction for Sun ABI LD > sequence */ >=20 > +#define R_386_TLS_LDO_32 32 /* 32 bit offset from start of TLS block = */ >=20 > +#define R_386_TLS_IE_32 33 /* 32 bit offset to GOT static TLS offse= t entry > */ >=20 > +#define R_386_TLS_LE_32 34 /* 32 bit offset within static TLS block= */ >=20 > +#define R_386_TLS_DTPMOD32 35 /* GOT entry containing TLS index */ >=20 > +#define R_386_TLS_DTPOFF32 36 /* GOT entry containing TLS offset */ >=20 > +#define R_386_TLS_TPOFF32 37 /* GOT entry of -ve static TLS offset */ >=20 > + >=20 > +/* Null relocation */ >=20 > +#define R_AARCH64_NONE 256 /* No relocation */ >=20 > +/* Static AArch64 relocations */ >=20 > + /* Static data relocations */ >=20 > +#define R_AARCH64_ABS64 257 /* S + A */ >=20 > +#define R_AARCH64_ABS32 258 /* S + A */ >=20 > +#define R_AARCH64_ABS16 259 /* S + A */ >=20 > +#define R_AARCH64_PREL64 260 /* S + A - P */ >=20 > +#define R_AARCH64_PREL32 261 /* S + A - P */ >=20 > +#define R_AARCH64_PREL16 262 /* S + A - P */ >=20 > + /* Group relocations to create a 16, 32, 48, or 64 bit unsigned data va= lue or > address inline */ >=20 > +#define R_AARCH64_MOVW_UABS_G0 263 /* S + A */ >=20 > +#define R_AARCH64_MOVW_UABS_G0_NC 264 /* S + A */ >=20 > +#define R_AARCH64_MOVW_UABS_G1 265 /* S + A */ >=20 > +#define R_AARCH64_MOVW_UABS_G1_NC 266 /* S + A */ >=20 > +#define R_AARCH64_MOVW_UABS_G2 267 /* S + A */ >=20 > +#define R_AARCH64_MOVW_UABS_G2_NC 268 /* S + A */ >=20 > +#define R_AARCH64_MOVW_UABS_G3 269 /* S + A */ >=20 > + /* Group relocations to create a 16, 32, 48, or 64 bit signed data or o= ffset > value inline */ >=20 > +#define R_AARCH64_MOVW_SABS_G0 270 /* S + A */ >=20 > +#define R_AARCH64_MOVW_SABS_G1 271 /* S + A */ >=20 > +#define R_AARCH64_MOVW_SABS_G2 272 /* S + A */ >=20 > + /* Relocations to generate 19, 21 and 33 bit PC-relative addresses */ >=20 > +#define R_AARCH64_LD_PREL_LO19 273 /* S + A - P */ >=20 > +#define R_AARCH64_ADR_PREL_LO21 274 /* S + A - P */ >=20 > +#define R_AARCH64_ADR_PREL_PG_HI21 275 /* Page(S+A) - Page(P) */ >=20 > +#define R_AARCH64_ADR_PREL_PG_HI21_NC 276 /* Page(S+A) - Page(P) > */ >=20 > +#define R_AARCH64_ADD_ABS_LO12_NC 277 /* S + A */ >=20 > +#define R_AARCH64_LDST8_ABS_LO12_NC 278 /* S + A */ >=20 > +#define R_AARCH64_LDST16_ABS_LO12_NC 284 /* S + A */ >=20 > +#define R_AARCH64_LDST32_ABS_LO12_NC 285 /* S + A */ >=20 > +#define R_AARCH64_LDST64_ABS_LO12_NC 286 /* S + A */ >=20 > +#define R_AARCH64_LDST128_ABS_LO12_NC 299 /* S + A */ >=20 > + /* Relocations for control-flow instructions - all offsets are a multip= le of 4 */ >=20 > +#define R_AARCH64_TSTBR14 279 /* S+A-P */ >=20 > +#define R_AARCH64_CONDBR19 280 /* S+A-P */ >=20 > +#define R_AARCH64_JUMP26 282 /* S+A-P */ >=20 > +#define R_AARCH64_CALL26 283 /* S+A-P */ >=20 > + /* Group relocations to create a 16, 32, 48, or 64 bit PC-relative offs= et inline > */ >=20 > +#define R_AARCH64_MOVW_PREL_G0 287 /* S+A-P */ >=20 > +#define R_AARCH64_MOVW_PREL_G0_NC 288 /* S+A-P */ >=20 > +#define R_AARCH64_MOVW_PREL_G1 289 /* S+A-P */ >=20 > +#define R_AARCH64_MOVW_PREL_G1_NC 290 /* S+A-P */ >=20 > +#define R_AARCH64_MOVW_PREL_G2 291 /* S+A-P */ >=20 > +#define R_AARCH64_MOVW_PREL_G2_NC 292 /* S+A-P */ >=20 > +#define R_AARCH64_MOVW_PREL_G3 293 /* S+A-P */ >=20 > + /* Group relocations to create a 16, 32, 48, or 64 bit GOT-relative off= sets > inline */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G0 300 /* G(S)-GOT */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G0_NC 301 /* G(S)-GOT */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G1 302 /* G(S)-GOT */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G1_NC 303 /* G(S)-GOT */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G2 304 /* G(S)-GOT */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G2_NC 305 /* G(S)-GOT */ >=20 > +#define R_AARCH64_MOVW_GOTOFF_G3 306 /* G(S)-GOT */ >=20 > + /* GOT-relative data relocations */ >=20 > +#define R_AARCH64_GOTREL64 307 /* S+A-GOT */ >=20 > +#define R_AARCH64_GOTREL32 308 /* S+A-GOT */ >=20 > + /* GOT-relative instruction relocations */ >=20 > +#define R_AARCH64_GOT_LD_PREL19 309 /* G(S)-P */ >=20 > +#define R_AARCH64_LD64_GOTOFF_LO15 310 /* G(S)-GOT */ >=20 > +#define R_AARCH64_ADR_GOT_PAGE 311 /* Page(G(S))-Page(P) */ >=20 > +#define R_AARCH64_LD64_GOT_LO12_NC 312 /* G(S) */ >=20 > +#define R_AARCH64_LD64_GOTPAGE_LO15 313 /* G(S)-Page(GOT) */ >=20 > +/* Relocations for thread-local storage */ >=20 > + /* General Dynamic TLS relocations */ >=20 > +#define R_AARCH64_TLSGD_ADR_PREL21 512 /* G(TLSIDX(S+A)) - P */ >=20 > +#define R_AARCH64_TLSGD_ADR_PAGE21 513 /* Page(G(TLSIDX(S+A))) > - Page(P) */ >=20 > +#define R_AARCH64_TLSGD_ADD_LO12_NC 514 /* G(TLSIDX(S+A)) */ >=20 > +#define R_AARCH64_TLSGD_MOVW_G1 515 /* G(TLSIDX(S+A)) - GOT > */ >=20 > +#define R_AARCH64_TLSGD_MOVW_G0_NC 516 /* G(TLSIDX(S+A)) - > GOT */ >=20 > + /* Local Dynamic TLS relocations */ >=20 > +#define R_AARCH64_TLSLD_ADR_PREL21 517 /* G(LDM(S))) - P */ >=20 > +#define R_AARCH64_TLSLD_ADR_PAGE21 518 /* Page(G(LDM(S)))- > Page(P) */ >=20 > +#define R_AARCH64_TLSLD_ADD_LO12_NC 519 /* G(LDM(S)) */ >=20 > +#define R_AARCH64_TLSLD_MOVW_G1 520 /* G(LDM(S)) - GOT */ >=20 > +#define R_AARCH64_TLSLD_MOVW_G0_NC 521 /* G(LDM(S)) - GOT */ >=20 > +#define R_AARCH64_TLSLD_LD_PREL19 522 /* G(LDM(S)) - P */ >=20 > +#define R_AARCH64_TLSLD_MOVW_DTPREL_G2 523 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_MOVW_DTPREL_G1 524 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_MOVW_DTPREL_G1_NC 525 /* DTPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLD_MOVW_DTPREL_G0 526 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_MOVW_DTPREL_G0_NC 527 /* DTPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLD_ADD_DTPREL_HI12 528 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_ADD_DTPREL_LO12 529 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_ADD_DTPREL_LO12_NC 530 /* DTPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLD_LDST8_DTPREL_LO12 531 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_LDST8_DTPREL_LO12_NC 532 /* DTPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLD_LDST16_DTPREL_LO12 533 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_LDST16_DTPREL_LO12_NC 534 /* DTPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLD_LDST32_DTPREL_LO12 535 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_LDST32_DTPREL_LO12_NC 536 /* DTPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLD_LDST64_DTPREL_LO12 537 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLD_LDST64_DTPREL_LO12_NC 538 /* DTPREL(S+A) > */ >=20 > + /* Initial Exec TLS relocations */ >=20 > +#define R_AARCH64_TLSIE_MOVW_GOTTPREL_G1 539 /* G(TPREL(S+A)) > - GOT */ >=20 > +#define R_AARCH64_TLSIE_MOVW_GOTTPREL_G0_NC 540 /* > G(TPREL(S+A)) - GOT */ >=20 > +#define R_AARCH64_TLSIE_ADR_GOTTPREL_PAGE21 541 /* > Page(G(TPREL(S+A))) - Page(P) */ >=20 > +#define R_AARCH64_TLSIE_LD64_GOTTPREL_LO12_NC 542 /* > G(TPREL(S+A)) */ >=20 > +#define R_AARCH64_TLSIE_LD_GOTTPREL_PREL19 543 /* G(TPREL(S+A)) - > P */ >=20 > + /* Local Exec TLS relocations */ >=20 > +#define R_AARCH64_TLSLE_MOVW_TPREL_G2 544 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_MOVW_TPREL_G1 545 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_MOVW_TPREL_G1_NC 546 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_MOVW_TPREL_G0 547 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_MOVW_TPREL_G0_NC 548 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_ADD_TPREL_HI12 549 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_ADD_TPREL_LO12 550 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_ADD_TPREL_LO12_NC 551 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_LDST8_TPREL_LO12 552 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_LDST8_TPREL_LO12_NC 553 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_LDST16_TPREL_LO12 554 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_LDST16_TPREL_LO12_NC 555 /* TPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLE_LDST32_TPREL_LO12 556 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_LDST32_TPREL_LO12_NC 557 /* TPREL(S+A) > */ >=20 > +#define R_AARCH64_TLSLE_LDST64_TPREL_LO12 558 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLSLE_LDST64_TPREL_LO12_NC 559 /* TPREL(S+A) > */ >=20 > +/* Dynamic relocations */ >=20 > + /* Dynamic relocations */ >=20 > +#define R_AARCH64_COPY 1024 >=20 > +#define R_AARCH64_GLOB_DAT 1025 /* S + A */ >=20 > +#define R_AARCH64_JUMP_SLOT 1026 /* S + A */ >=20 > +#define R_AARCH64_RELATIVE 1027 /* Delta(S) + A , Delta(P) + A */ >=20 > +#define R_AARCH64_TLS_DTPREL64 1028 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLS_DTPMOD64 1029 /* LDM(S) */ >=20 > +#define R_AARCH64_TLS_TPREL64 1030 /* TPREL(S+A) */ >=20 > +#define R_AARCH64_TLS_DTPREL32 1031 /* DTPREL(S+A) */ >=20 > +#define R_AARCH64_TLS_DTPMOD32 1032 /* LDM(S) */ >=20 > +#define R_AARCH64_TLS_TPREL32 1033 /* DTPREL(S+A) */ >=20 > + >=20 > +#define R_ALPHA_NONE 0 /* No reloc */ >=20 > +#define R_ALPHA_REFLONG 1 /* Direct 32 bit */ >=20 > +#define R_ALPHA_REFQUAD 2 /* Direct 64 bit */ >=20 > +#define R_ALPHA_GPREL32 3 /* GP relative 32 bit */ >=20 > +#define R_ALPHA_LITERAL 4 /* GP relative 16 bit w/optimization */ >=20 > +#define R_ALPHA_LITUSE 5 /* Optimization hint for LITERAL */ >=20 > +#define R_ALPHA_GPDISP 6 /* Add displacement to GP */ >=20 > +#define R_ALPHA_BRADDR 7 /* PC+4 relative 23 bit shifted */ >=20 > +#define R_ALPHA_HINT 8 /* PC+4 relative 16 bit shifted */ >=20 > +#define R_ALPHA_SREL16 9 /* PC relative 16 bit */ >=20 > +#define R_ALPHA_SREL32 10 /* PC relative 32 bit */ >=20 > +#define R_ALPHA_SREL64 11 /* PC relative 64 bit */ >=20 > +#define R_ALPHA_OP_PUSH 12 /* OP stack push */ >=20 > +#define R_ALPHA_OP_STORE 13 /* OP stack pop and store */ >=20 > +#define R_ALPHA_OP_PSUB 14 /* OP stack subtract */ >=20 > +#define R_ALPHA_OP_PRSHIFT 15 /* OP stack right shift */ >=20 > +#define R_ALPHA_GPVALUE 16 >=20 > +#define R_ALPHA_GPRELHIGH 17 >=20 > +#define R_ALPHA_GPRELLOW 18 >=20 > +#define R_ALPHA_IMMED_GP_16 19 >=20 > +#define R_ALPHA_IMMED_GP_HI32 20 >=20 > +#define R_ALPHA_IMMED_SCN_HI32 21 >=20 > +#define R_ALPHA_IMMED_BR_HI32 22 >=20 > +#define R_ALPHA_IMMED_LO32 23 >=20 > +#define R_ALPHA_COPY 24 /* Copy symbol at runtime */ >=20 > +#define R_ALPHA_GLOB_DAT 25 /* Create GOT entry */ >=20 > +#define R_ALPHA_JMP_SLOT 26 /* Create PLT entry */ >=20 > +#define R_ALPHA_RELATIVE 27 /* Adjust by program base */ >=20 > + >=20 > +#define R_ARM_NONE 0 /* No relocation. */ >=20 > +#define R_ARM_PC24 1 >=20 > +#define R_ARM_ABS32 2 >=20 > +#define R_ARM_REL32 3 >=20 > +#define R_ARM_PC13 4 >=20 > +#define R_ARM_ABS16 5 >=20 > +#define R_ARM_ABS12 6 >=20 > +#define R_ARM_THM_ABS5 7 >=20 > +#define R_ARM_ABS8 8 >=20 > +#define R_ARM_SBREL32 9 >=20 > +#define R_ARM_THM_PC22 10 >=20 > +#define R_ARM_THM_PC8 11 >=20 > +#define R_ARM_AMP_VCALL9 12 >=20 > +#define R_ARM_SWI24 13 >=20 > +#define R_ARM_THM_SWI8 14 >=20 > +#define R_ARM_XPC25 15 >=20 > +#define R_ARM_THM_XPC22 16 >=20 > +#define R_ARM_COPY 20 /* Copy data from shared object. */ >=20 > +#define R_ARM_GLOB_DAT 21 /* Set GOT entry to data address. */ >=20 > +#define R_ARM_JUMP_SLOT 22 /* Set GOT entry to code address. */ >=20 > +#define R_ARM_RELATIVE 23 /* Add load address of shared object. */ >=20 > +#define R_ARM_GOTOFF 24 /* Add GOT-relative symbol address. */ >=20 > +#define R_ARM_GOTPC 25 /* Add PC-relative GOT table address. */ >=20 > +#define R_ARM_GOT32 26 /* Add PC-relative GOT offset. */ >=20 > +#define R_ARM_PLT32 27 /* Add PC-relative PLT offset. */ >=20 > +#define R_ARM_CALL 28 >=20 > +#define R_ARM_JMP24 29 >=20 > +#define R_ARM_THM_MOVW_ABS_NC 47 >=20 > +#define R_ARM_THM_MOVT_ABS 48 >=20 > + >=20 > +// Block of PC-relative relocations added to work around gcc putting >=20 > +// object relocations in static executables. >=20 > +#define R_ARM_THM_JUMP24 30 >=20 > +#define R_ARM_PREL31 42 >=20 > +#define R_ARM_MOVW_PREL_NC 45 >=20 > +#define R_ARM_MOVT_PREL 46 >=20 > +#define R_ARM_THM_MOVW_PREL_NC 49 >=20 > +#define R_ARM_THM_MOVT_PREL 50 >=20 > +#define R_ARM_THM_JMP6 52 >=20 > +#define R_ARM_THM_ALU_PREL_11_0 53 >=20 > +#define R_ARM_THM_PC12 54 >=20 > +#define R_ARM_REL32_NOI 56 >=20 > +#define R_ARM_ALU_PC_G0_NC 57 >=20 > +#define R_ARM_ALU_PC_G0 58 >=20 > +#define R_ARM_ALU_PC_G1_NC 59 >=20 > +#define R_ARM_ALU_PC_G1 60 >=20 > +#define R_ARM_ALU_PC_G2 61 >=20 > +#define R_ARM_LDR_PC_G1 62 >=20 > +#define R_ARM_LDR_PC_G2 63 >=20 > +#define R_ARM_LDRS_PC_G0 64 >=20 > +#define R_ARM_LDRS_PC_G1 65 >=20 > +#define R_ARM_LDRS_PC_G2 66 >=20 > +#define R_ARM_LDC_PC_G0 67 >=20 > +#define R_ARM_LDC_PC_G1 68 >=20 > +#define R_ARM_LDC_PC_G2 69 >=20 > +#define R_ARM_GOT_PREL 96 >=20 > +#define R_ARM_THM_JUMP11 102 >=20 > +#define R_ARM_THM_JUMP8 103 >=20 > +#define R_ARM_TLS_GD32 104 >=20 > +#define R_ARM_TLS_LDM32 105 >=20 > +#define R_ARM_TLS_IE32 107 >=20 > + >=20 > +#define R_ARM_THM_JUMP19 51 >=20 > +#define R_ARM_GNU_VTENTRY 100 >=20 > +#define R_ARM_GNU_VTINHERIT 101 >=20 > +#define R_ARM_RSBREL32 250 >=20 > +#define R_ARM_THM_RPC22 251 >=20 > +#define R_ARM_RREL32 252 >=20 > +#define R_ARM_RABS32 253 >=20 > +#define R_ARM_RPC24 254 >=20 > +#define R_ARM_RBASE 255 >=20 > + >=20 > +#define R_PPC_NONE 0 /* No relocation. */ >=20 > +#define R_PPC_ADDR32 1 >=20 > +#define R_PPC_ADDR24 2 >=20 > +#define R_PPC_ADDR16 3 >=20 > +#define R_PPC_ADDR16_LO 4 >=20 > +#define R_PPC_ADDR16_HI 5 >=20 > +#define R_PPC_ADDR16_HA 6 >=20 > +#define R_PPC_ADDR14 7 >=20 > +#define R_PPC_ADDR14_BRTAKEN 8 >=20 > +#define R_PPC_ADDR14_BRNTAKEN 9 >=20 > +#define R_PPC_REL24 10 >=20 > +#define R_PPC_REL14 11 >=20 > +#define R_PPC_REL14_BRTAKEN 12 >=20 > +#define R_PPC_REL14_BRNTAKEN 13 >=20 > +#define R_PPC_GOT16 14 >=20 > +#define R_PPC_GOT16_LO 15 >=20 > +#define R_PPC_GOT16_HI 16 >=20 > +#define R_PPC_GOT16_HA 17 >=20 > +#define R_PPC_PLTREL24 18 >=20 > +#define R_PPC_COPY 19 >=20 > +#define R_PPC_GLOB_DAT 20 >=20 > +#define R_PPC_JMP_SLOT 21 >=20 > +#define R_PPC_RELATIVE 22 >=20 > +#define R_PPC_LOCAL24PC 23 >=20 > +#define R_PPC_UADDR32 24 >=20 > +#define R_PPC_UADDR16 25 >=20 > +#define R_PPC_REL32 26 >=20 > +#define R_PPC_PLT32 27 >=20 > +#define R_PPC_PLTREL32 28 >=20 > +#define R_PPC_PLT16_LO 29 >=20 > +#define R_PPC_PLT16_HI 30 >=20 > +#define R_PPC_PLT16_HA 31 >=20 > +#define R_PPC_SDAREL16 32 >=20 > +#define R_PPC_SECTOFF 33 >=20 > +#define R_PPC_SECTOFF_LO 34 >=20 > +#define R_PPC_SECTOFF_HI 35 >=20 > +#define R_PPC_SECTOFF_HA 36 >=20 > + >=20 > +/* >=20 > + * TLS relocations >=20 > + */ >=20 > +#define R_PPC_TLS 67 >=20 > +#define R_PPC_DTPMOD32 68 >=20 > +#define R_PPC_TPREL16 69 >=20 > +#define R_PPC_TPREL16_LO 70 >=20 > +#define R_PPC_TPREL16_HI 71 >=20 > +#define R_PPC_TPREL16_HA 72 >=20 > +#define R_PPC_TPREL32 73 >=20 > +#define R_PPC_DTPREL16 74 >=20 > +#define R_PPC_DTPREL16_LO 75 >=20 > +#define R_PPC_DTPREL16_HI 76 >=20 > +#define R_PPC_DTPREL16_HA 77 >=20 > +#define R_PPC_DTPREL32 78 >=20 > +#define R_PPC_GOT_TLSGD16 79 >=20 > +#define R_PPC_GOT_TLSGD16_LO 80 >=20 > +#define R_PPC_GOT_TLSGD16_HI 81 >=20 > +#define R_PPC_GOT_TLSGD16_HA 82 >=20 > +#define R_PPC_GOT_TLSLD16 83 >=20 > +#define R_PPC_GOT_TLSLD16_LO 84 >=20 > +#define R_PPC_GOT_TLSLD16_HI 85 >=20 > +#define R_PPC_GOT_TLSLD16_HA 86 >=20 > +#define R_PPC_GOT_TPREL16 87 >=20 > +#define R_PPC_GOT_TPREL16_LO 88 >=20 > +#define R_PPC_GOT_TPREL16_HI 89 >=20 > +#define R_PPC_GOT_TPREL16_HA 90 >=20 > + >=20 > +/* >=20 > + * The remaining relocs are from the Embedded ELF ABI, and are not in th= e >=20 > + * SVR4 ELF ABI. >=20 > + */ >=20 > + >=20 > +#define R_PPC_EMB_NADDR32 101 >=20 > +#define R_PPC_EMB_NADDR16 102 >=20 > +#define R_PPC_EMB_NADDR16_LO 103 >=20 > +#define R_PPC_EMB_NADDR16_HI 104 >=20 > +#define R_PPC_EMB_NADDR16_HA 105 >=20 > +#define R_PPC_EMB_SDAI16 106 >=20 > +#define R_PPC_EMB_SDA2I16 107 >=20 > +#define R_PPC_EMB_SDA2REL 108 >=20 > +#define R_PPC_EMB_SDA21 109 >=20 > +#define R_PPC_EMB_MRKREF 110 >=20 > +#define R_PPC_EMB_RELSEC16 111 >=20 > +#define R_PPC_EMB_RELST_LO 112 >=20 > +#define R_PPC_EMB_RELST_HI 113 >=20 > +#define R_PPC_EMB_RELST_HA 114 >=20 > +#define R_PPC_EMB_BIT_FLD 115 >=20 > +#define R_PPC_EMB_RELSDA 116 >=20 > + >=20 > +#define R_SPARC_NONE 0 >=20 > +#define R_SPARC_8 1 >=20 > +#define R_SPARC_16 2 >=20 > +#define R_SPARC_32 3 >=20 > +#define R_SPARC_DISP8 4 >=20 > +#define R_SPARC_DISP16 5 >=20 > +#define R_SPARC_DISP32 6 >=20 > +#define R_SPARC_WDISP30 7 >=20 > +#define R_SPARC_WDISP22 8 >=20 > +#define R_SPARC_HI22 9 >=20 > +#define R_SPARC_22 10 >=20 > +#define R_SPARC_13 11 >=20 > +#define R_SPARC_LO10 12 >=20 > +#define R_SPARC_GOT10 13 >=20 > +#define R_SPARC_GOT13 14 >=20 > +#define R_SPARC_GOT22 15 >=20 > +#define R_SPARC_PC10 16 >=20 > +#define R_SPARC_PC22 17 >=20 > +#define R_SPARC_WPLT30 18 >=20 > +#define R_SPARC_COPY 19 >=20 > +#define R_SPARC_GLOB_DAT 20 >=20 > +#define R_SPARC_JMP_SLOT 21 >=20 > +#define R_SPARC_RELATIVE 22 >=20 > +#define R_SPARC_UA32 23 >=20 > +#define R_SPARC_PLT32 24 >=20 > +#define R_SPARC_HIPLT22 25 >=20 > +#define R_SPARC_LOPLT10 26 >=20 > +#define R_SPARC_PCPLT32 27 >=20 > +#define R_SPARC_PCPLT22 28 >=20 > +#define R_SPARC_PCPLT10 29 >=20 > +#define R_SPARC_10 30 >=20 > +#define R_SPARC_11 31 >=20 > +#define R_SPARC_64 32 >=20 > +#define R_SPARC_OLO10 33 >=20 > +#define R_SPARC_HH22 34 >=20 > +#define R_SPARC_HM10 35 >=20 > +#define R_SPARC_LM22 36 >=20 > +#define R_SPARC_PC_HH22 37 >=20 > +#define R_SPARC_PC_HM10 38 >=20 > +#define R_SPARC_PC_LM22 39 >=20 > +#define R_SPARC_WDISP16 40 >=20 > +#define R_SPARC_WDISP19 41 >=20 > +#define R_SPARC_GLOB_JMP 42 >=20 > +#define R_SPARC_7 43 >=20 > +#define R_SPARC_5 44 >=20 > +#define R_SPARC_6 45 >=20 > +#define R_SPARC_DISP64 46 >=20 > +#define R_SPARC_PLT64 47 >=20 > +#define R_SPARC_HIX22 48 >=20 > +#define R_SPARC_LOX10 49 >=20 > +#define R_SPARC_H44 50 >=20 > +#define R_SPARC_M44 51 >=20 > +#define R_SPARC_L44 52 >=20 > +#define R_SPARC_REGISTER 53 >=20 > +#define R_SPARC_UA64 54 >=20 > +#define R_SPARC_UA16 55 >=20 > +#define R_SPARC_TLS_GD_HI22 56 >=20 > +#define R_SPARC_TLS_GD_LO10 57 >=20 > +#define R_SPARC_TLS_GD_ADD 58 >=20 > +#define R_SPARC_TLS_GD_CALL 59 >=20 > +#define R_SPARC_TLS_LDM_HI22 60 >=20 > +#define R_SPARC_TLS_LDM_LO10 61 >=20 > +#define R_SPARC_TLS_LDM_ADD 62 >=20 > +#define R_SPARC_TLS_LDM_CALL 63 >=20 > +#define R_SPARC_TLS_LDO_HIX22 64 >=20 > +#define R_SPARC_TLS_LDO_LOX10 65 >=20 > +#define R_SPARC_TLS_LDO_ADD 66 >=20 > +#define R_SPARC_TLS_IE_HI22 67 >=20 > +#define R_SPARC_TLS_IE_LO10 68 >=20 > +#define R_SPARC_TLS_IE_LD 69 >=20 > +#define R_SPARC_TLS_IE_LDX 70 >=20 > +#define R_SPARC_TLS_IE_ADD 71 >=20 > +#define R_SPARC_TLS_LE_HIX22 72 >=20 > +#define R_SPARC_TLS_LE_LOX10 73 >=20 > +#define R_SPARC_TLS_DTPMOD32 74 >=20 > +#define R_SPARC_TLS_DTPMOD64 75 >=20 > +#define R_SPARC_TLS_DTPOFF32 76 >=20 > +#define R_SPARC_TLS_DTPOFF64 77 >=20 > +#define R_SPARC_TLS_TPOFF32 78 >=20 > +#define R_SPARC_TLS_TPOFF64 79 >=20 > + >=20 > +#define R_X86_64_NONE 0 /* No relocation. */ >=20 > +#define R_X86_64_64 1 /* Add 64 bit symbol value. */ >=20 > +#define R_X86_64_PC32 2 /* PC-relative 32 bit signed sym value. */ >=20 > +#define R_X86_64_GOT32 3 /* PC-relative 32 bit GOT offset. */ >=20 > +#define R_X86_64_PLT32 4 /* PC-relative 32 bit PLT offset. */ >=20 > +#define R_X86_64_COPY 5 /* Copy data from shared object. */ >=20 > +#define R_X86_64_GLOB_DAT 6 /* Set GOT entry to data address. */ >=20 > +#define R_X86_64_JMP_SLOT 7 /* Set GOT entry to code address. */ >=20 > +#define R_X86_64_RELATIVE 8 /* Add load address of shared object. */ >=20 > +#define R_X86_64_GOTPCREL 9 /* Add 32 bit signed pcrel offset to GOT. > */ >=20 > +#define R_X86_64_32 10 /* Add 32 bit zero extended symbol value */ >=20 > +#define R_X86_64_32S 11 /* Add 32 bit sign extended symbol value */ >=20 > +#define R_X86_64_16 12 /* Add 16 bit zero extended symbol value */ >=20 > +#define R_X86_64_PC16 13 /* Add 16 bit signed extended pc relative > symbol value */ >=20 > +#define R_X86_64_8 14 /* Add 8 bit zero extended symbol value */ >=20 > +#define R_X86_64_PC8 15 /* Add 8 bit signed extended pc relative > symbol value */ >=20 > +#define R_X86_64_DTPMOD64 16 /* ID of module containing symbol */ >=20 > +#define R_X86_64_DTPOFF64 17 /* Offset in TLS block */ >=20 > +#define R_X86_64_TPOFF64 18 /* Offset in static TLS block */ >=20 > +#define R_X86_64_TLSGD 19 /* PC relative offset to GD GOT entry */ >=20 > +#define R_X86_64_TLSLD 20 /* PC relative offset to LD GOT entry */ >=20 > +#define R_X86_64_DTPOFF32 21 /* Offset in TLS block */ >=20 > +#define R_X86_64_GOTTPOFF 22 /* PC relative offset to IE GOT entry */ >=20 > +#define R_X86_64_TPOFF32 23 /* Offset in static TLS block */ >=20 > +#define R_X86_64_PC64 24 /* PC relative 64 bit */ >=20 > +#define R_X86_64_GOTOFF64 25 /* 64 bit offset to GOT */ >=20 > +#define R_X86_64_GOTPC3 26 /* 32 bit signed pc relative offset to GOT= */ >=20 > +#define R_X86_64_GOT64 27 /* 64-bit GOT entry offset */ >=20 > +#define R_X86_64_GOTPCREL64 28 /* 64-bit PC relative offset to GOT > entry */ >=20 > +#define R_X86_64_GOTPC64 29 /* 64-bit PC relative offset to GOT */ >=20 > +#define R_X86_64_GOTPLT64 30 /* like GOT64, says PLT entry needed */ >=20 > +#define R_X86_64_PLTOFF64 31 /* 64-bit GOT relative offset to PLT ent= ry > */ >=20 > +#define R_X86_64_SIZE32 32 /* Size of symbol plus 32-bit addend */ >=20 > +#define R_X86_64_SIZE64 33 /* Size of symbol plus 64-bit addend */ >=20 > +#define R_X86_64_GOTPC32_TLSDESC 34 /* GOT offset for TLS descriptor. > */ >=20 > +#define R_X86_64_TLSDESC_CALL 35 /* Marker for call through TLS > descriptor. */ >=20 > +#define R_X86_64_TLSDESC 36 /* TLS descriptor. */ >=20 > +#define R_X86_64_IRELATIVE 37 /* Adjust indirectly by program base */ >=20 > +#define R_X86_64_RELATIVE64 38 /* 64-bit adjust by program base */ >=20 > +#define R_X86_64_GOTPCRELX 41 /* Load from 32 bit signed pc relative > offset to GOT entry without REX prefix, relaxable. */ >=20 > +#define R_X86_64_REX_GOTPCRELX 42 /* Load from 32 bit signed pc > relative offset to GOT entry with REX prefix, relaxable. */ >=20 > + >=20 > + >=20 > +#endif /* !_SYS_ELF_COMMON_H_ */ >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLib.c > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLib.c > new file mode 100644 > index 0000000000..a8f1cf4b3e > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLib.c > @@ -0,0 +1,499 @@ > +/** @file >=20 > + ELF library >=20 > + >=20 > + Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.
>=20 > + SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > + >=20 > +#include "ElfLibInternal.h" >=20 > + >=20 > +/** >=20 > + Check if the ELF image is valid. >=20 > + >=20 > + @param[in] ImageBase Memory address of an image. >=20 > + >=20 > + @retval TRUE if valid. >=20 > + >=20 > +**/ >=20 > +BOOLEAN >=20 > +IsElfFormat ( >=20 > + IN CONST UINT8 *ImageBase >=20 > + ) >=20 > +{ >=20 > + Elf32_Ehdr *Elf32Hdr; >=20 > + Elf64_Ehdr *Elf64Hdr; >=20 > + >=20 > + ASSERT (ImageBase !=3D NULL); >=20 > + >=20 > + Elf32Hdr =3D (Elf32_Ehdr *)ImageBase; >=20 > + >=20 > + // >=20 > + // Start with correct signature "\7fELF" >=20 > + // >=20 > + if ((Elf32Hdr->e_ident[EI_MAG0] !=3D ELFMAG0) || >=20 > + (Elf32Hdr->e_ident[EI_MAG1] !=3D ELFMAG1) || >=20 > + (Elf32Hdr->e_ident[EI_MAG1] !=3D ELFMAG1) || >=20 > + (Elf32Hdr->e_ident[EI_MAG2] !=3D ELFMAG2) >=20 > + ) { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + // >=20 > + // Support little-endian only >=20 > + // >=20 > + if (Elf32Hdr->e_ident[EI_DATA] !=3D ELFDATA2LSB) { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + // >=20 > + // Check 32/64-bit architecture >=20 > + // >=20 > + if (Elf32Hdr->e_ident[EI_CLASS] =3D=3D ELFCLASS64) { >=20 > + Elf64Hdr =3D (Elf64_Ehdr *)Elf32Hdr; >=20 > + Elf32Hdr =3D NULL; >=20 > + } else if (Elf32Hdr->e_ident[EI_CLASS] =3D=3D ELFCLASS32) { >=20 > + Elf64Hdr =3D NULL; >=20 > + } else { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + if (Elf64Hdr !=3D NULL) { >=20 > + // >=20 > + // Support intel architecture only for now >=20 > + // >=20 > + if (Elf64Hdr->e_machine !=3D EM_X86_64) { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + // >=20 > + // Support ELF types: EXEC (Executable file), DYN (Shared object fi= le) >=20 > + // >=20 > + if ((Elf64Hdr->e_type !=3D ET_EXEC) && (Elf64Hdr->e_type !=3D ET_DYN= )) { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + // >=20 > + // Support current ELF version only >=20 > + // >=20 > + if (Elf64Hdr->e_version !=3D EV_CURRENT) { >=20 > + return FALSE; >=20 > + } >=20 > + } else { >=20 > + // >=20 > + // Support intel architecture only for now >=20 > + // >=20 > + if (Elf32Hdr->e_machine !=3D EM_386) { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + // >=20 > + // Support ELF types: EXEC (Executable file), DYN (Shared object fi= le) >=20 > + // >=20 > + if ((Elf32Hdr->e_type !=3D ET_EXEC) && (Elf32Hdr->e_type !=3D ET_DYN= )) { >=20 > + return FALSE; >=20 > + } >=20 > + >=20 > + // >=20 > + // Support current ELF version only >=20 > + // >=20 > + if (Elf32Hdr->e_version !=3D EV_CURRENT) { >=20 > + return FALSE; >=20 > + } >=20 > + } >=20 > + return TRUE; >=20 > +} >=20 > + >=20 > +/** >=20 > + Calculate a ELF image size. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ElfCt or SecPos is NULL. >=20 > + @retval EFI_NOT_FOUND Could not find the section. >=20 > + @retval EFI_SUCCESS Section posistion was filled successfu= lly. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +CalculateElfFileSize ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt, >=20 > + OUT UINTN *FileSize >=20 > + ) >=20 Add the second parameter FileSize in the function comment. > +{ >=20 > + EFI_STATUS Status; >=20 > + UINTN FileSize1; >=20 > + UINTN FileSize2; >=20 > + Elf32_Ehdr *Elf32Hdr; >=20 > + Elf64_Ehdr *Elf64Hdr; >=20 > + UINTN Offset; >=20 > + UINTN Size; >=20 > + >=20 > + if ((ElfCt =3D=3D NULL) || (FileSize =3D=3D NULL)) { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + >=20 > + // Use last section as end of file >=20 > + Status =3D GetElfSectionPos (ElfCt, ElfCt->ShNum - 1, &Offset, &Size); >=20 > + if (EFI_ERROR(Status)) { >=20 > + return EFI_UNSUPPORTED; >=20 > + } >=20 > + FileSize1 =3D Offset + Size; >=20 > + >=20 > + // Use end of section header as end of file >=20 > + FileSize2 =3D 0; >=20 > + if (ElfCt->EiClass =3D=3D ELFCLASS32) { >=20 > + Elf32Hdr =3D (Elf32_Ehdr *)ElfCt->FileBase; >=20 > + FileSize2 =3D Elf32Hdr->e_shoff + Elf32Hdr->e_shentsize * Elf32Hdr- > >e_shnum; >=20 > + } else if (ElfCt->EiClass =3D=3D ELFCLASS64) { >=20 > + Elf64Hdr =3D (Elf64_Ehdr *)ElfCt->FileBase; >=20 > + FileSize2 =3D (UINTN)(Elf64Hdr->e_shoff + Elf64Hdr->e_shentsize * > Elf64Hdr->e_shnum); >=20 > + } >=20 > + >=20 > + *FileSize =3D MAX(FileSize1, FileSize2); >=20 > + >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > +/** >=20 > + Get a ELF program segment loading info. >=20 > + >=20 > + @param[in] ImageBase Image base. >=20 > + @param[in] EiClass ELF class. >=20 > + @param[in] Index ELF segment index. >=20 > + @param[out] SegInfo The pointer to the segment info. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ElfCt or SecPos is NULL. >=20 > + @retval EFI_NOT_FOUND Could not find the section. >=20 > + @retval EFI_SUCCESS Section posistion was filled successfu= lly. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +GetElfSegmentInfo ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 EiClass, >=20 > + IN UINT32 Index, >=20 > + OUT SEGMENT_INFO *SegInfo >=20 > + ) >=20 > +{ >=20 > + Elf32_Phdr *Elf32Phdr; >=20 > + Elf64_Phdr *Elf64Phdr; >=20 > + >=20 > + if ((ImageBase =3D=3D NULL) || (SegInfo =3D=3D NULL)) { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + >=20 > + if (EiClass =3D=3D ELFCLASS32) { >=20 > + Elf32Phdr =3D GetElf32SegmentByIndex (ImageBase, Index); >=20 > + if (Elf32Phdr !=3D NULL) { >=20 > + SegInfo->PtType =3D Elf32Phdr->p_type; >=20 > + SegInfo->Offset =3D Elf32Phdr->p_offset; >=20 > + SegInfo->Length =3D Elf32Phdr->p_filesz; >=20 > + SegInfo->MemLen =3D Elf32Phdr->p_memsz; >=20 > + SegInfo->MemAddr =3D Elf32Phdr->p_paddr; >=20 > + SegInfo->Alignment =3D Elf32Phdr->p_align; >=20 > + return EFI_SUCCESS; >=20 > + } >=20 > + } else if (EiClass =3D=3D ELFCLASS64) { >=20 > + Elf64Phdr =3D GetElf64SegmentByIndex (ImageBase, Index); >=20 > + if (Elf64Phdr !=3D NULL) { >=20 > + SegInfo->PtType =3D Elf64Phdr->p_type; >=20 > + SegInfo->Offset =3D (UINTN)Elf64Phdr->p_offset; >=20 > + SegInfo->Length =3D (UINTN)Elf64Phdr->p_filesz; >=20 > + SegInfo->MemLen =3D (UINTN)Elf64Phdr->p_memsz; >=20 > + SegInfo->MemAddr =3D (UINTN)Elf64Phdr->p_paddr; >=20 > + SegInfo->Alignment =3D (UINTN)Elf64Phdr->p_align; >=20 > + return EFI_SUCCESS; >=20 > + } >=20 > + } >=20 > + >=20 > + return EFI_NOT_FOUND; >=20 > +} >=20 > + >=20 > +/** >=20 > + Parse the ELF image info. >=20 > + >=20 > + On return, all fields in ElfCt are updated except ImageAddress. >=20 > + >=20 > + @param[in] ImageBase Memory address of an image. >=20 > + @param[out] ElfCt The EFL image context pointer. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER Input parameters are not valid. >=20 > + @retval EFI_UNSUPPORTED Unsupported binary type. >=20 > + @retval EFI_LOAD_ERROR ELF binary loading error. >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +ParseElfImage ( >=20 > + IN VOID *ImageBase, >=20 > + OUT ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + Elf32_Ehdr *Elf32Hdr; >=20 > + Elf64_Ehdr *Elf64Hdr; >=20 > + Elf32_Shdr *Elf32Shdr; >=20 > + Elf64_Shdr *Elf64Shdr; >=20 > + EFI_STATUS Status; >=20 > + UINT32 Index; >=20 > + SEGMENT_INFO SegInfo; >=20 > + UINTN End; >=20 > + UINTN Base; >=20 > + >=20 > + if (ElfCt =3D=3D NULL) { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + ZeroMem (ElfCt, sizeof(ELF_IMAGE_CONTEXT)); >=20 > + >=20 > + if (ImageBase =3D=3D NULL) { >=20 > + return (ElfCt->ParseStatus =3D EFI_INVALID_PARAMETER); >=20 > + } >=20 > + >=20 > + ElfCt->FileBase =3D (UINT8 *)ImageBase; >=20 > + if (!IsElfFormat (ElfCt->FileBase)) { >=20 > + return (ElfCt->ParseStatus =3D EFI_UNSUPPORTED); >=20 > + } >=20 > + >=20 > + Elf32Hdr =3D (Elf32_Ehdr *)ElfCt->FileBase; >=20 > + ElfCt->EiClass =3D Elf32Hdr->e_ident[EI_CLASS]; >=20 > + if (ElfCt->EiClass =3D=3D ELFCLASS32) { >=20 > + if ((Elf32Hdr->e_type !=3D ET_EXEC) && (Elf32Hdr->e_type !=3D ET_DYN= )) { >=20 > + return (ElfCt->ParseStatus =3D EFI_UNSUPPORTED); >=20 > + } >=20 > + Elf32Shdr =3D (Elf32_Shdr *)GetElf32SectionByIndex (ElfCt->FileBase, > Elf32Hdr->e_shstrndx); >=20 > + if (Elf32Shdr =3D=3D NULL) { >=20 > + return (ElfCt->ParseStatus =3D EFI_UNSUPPORTED); >=20 > + } >=20 > + ElfCt->EntryPoint =3D (UINTN)Elf32Hdr->e_entry; >=20 > + ElfCt->ShNum =3D Elf32Hdr->e_shnum; >=20 > + ElfCt->PhNum =3D Elf32Hdr->e_phnum; >=20 > + ElfCt->ShStrLen =3D Elf32Shdr->sh_size; >=20 > + ElfCt->ShStrOff =3D Elf32Shdr->sh_offset; >=20 > + } else { >=20 > + Elf64Hdr =3D (Elf64_Ehdr *)Elf32Hdr; >=20 > + if ((Elf64Hdr->e_type !=3D ET_EXEC) && (Elf64Hdr->e_type !=3D ET_DYN= )) { >=20 > + return (ElfCt->ParseStatus =3D EFI_UNSUPPORTED); >=20 > + } >=20 > + Elf64Shdr =3D (Elf64_Shdr *)GetElf64SectionByIndex (ElfCt->FileBase, > Elf64Hdr->e_shstrndx); >=20 > + if (Elf64Shdr =3D=3D NULL) { >=20 > + return (ElfCt->ParseStatus =3D EFI_UNSUPPORTED); >=20 > + } >=20 > + ElfCt->EntryPoint =3D (UINTN)Elf64Hdr->e_entry; >=20 > + ElfCt->ShNum =3D Elf64Hdr->e_shnum; >=20 > + ElfCt->PhNum =3D Elf64Hdr->e_phnum; >=20 > + ElfCt->ShStrLen =3D (UINT32)Elf64Shdr->sh_size; >=20 > + ElfCt->ShStrOff =3D (UINT32)Elf64Shdr->sh_offset; >=20 > + } >=20 > + >=20 > + // >=20 > + // Get the preferred image base and required memory size when loaded > to new location. >=20 > + // >=20 > + End =3D 0; >=20 > + Base =3D MAX_UINT32; >=20 > + ElfCt->ReloadRequired =3D FALSE; >=20 > + for (Index =3D 0; Index < ElfCt->PhNum; Index++) { >=20 > + Status =3D GetElfSegmentInfo (ElfCt->FileBase, ElfCt->EiClass, Index= , > &SegInfo); >=20 > + ASSERT_EFI_ERROR (Status); >=20 > + >=20 > + if (SegInfo.PtType !=3D PT_LOAD) { >=20 > + continue; >=20 > + } >=20 > + >=20 > + if (SegInfo.MemLen !=3D SegInfo.Length) { >=20 > + // >=20 > + // Not enough space to execute at current location. >=20 > + // >=20 > + ElfCt->ReloadRequired =3D TRUE; >=20 > + } >=20 > + >=20 > + if (Base > (SegInfo.MemAddr & ~(EFI_PAGE_SIZE - 1))) { >=20 > + Base =3D SegInfo.MemAddr & ~(EFI_PAGE_SIZE - 1); >=20 > + } >=20 > + if (End < ALIGN_VALUE (SegInfo.MemAddr + SegInfo.MemLen, > EFI_PAGE_SIZE) - 1) { >=20 > + End =3D ALIGN_VALUE (SegInfo.MemAddr + SegInfo.MemLen, > EFI_PAGE_SIZE) - 1; >=20 > + } >=20 > + } >=20 > + // >=20 > + // 0 - MAX_UINT32 + 1 equals to 0. >=20 > + // >=20 > + ElfCt->ImageSize =3D End - Base + 1; >=20 > + ElfCt->PreferredImageAddress =3D (VOID *) Base; >=20 > + >=20 > + CalculateElfFileSize (ElfCt, &ElfCt->FileSize); >=20 > + return (ElfCt->ParseStatus =3D EFI_SUCCESS);; >=20 > +} >=20 > + >=20 > +/** >=20 > + Load the ELF image to Context.ImageAddress. >=20 > + >=20 > + Context should be initialized by ParseElfImage(). >=20 > + Caller should set Context.ImageAddress to a proper value, either point= ing > to >=20 > + a new allocated memory whose size equal to Context.ImageSize, or > pointing >=20 > + to Context.PreferredImageAddress. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER Input parameters are not valid. >=20 > + @retval EFI_UNSUPPORTED Unsupported binary type. >=20 > + @retval EFI_LOAD_ERROR ELF binary loading error. >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +LoadElfImage ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + EFI_STATUS Status; >=20 > + >=20 > + if (ElfCt =3D=3D NULL) { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + >=20 > + if (EFI_ERROR (ElfCt->ParseStatus)) { >=20 > + return ElfCt->ParseStatus; >=20 > + } >=20 > + >=20 > + if (ElfCt->ImageAddress =3D=3D NULL) { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + >=20 > + Status =3D EFI_UNSUPPORTED; >=20 > + if (ElfCt->EiClass =3D=3D ELFCLASS32) { >=20 > + Status =3D LoadElf32Image (ElfCt); >=20 > + } else if (ElfCt->EiClass =3D=3D ELFCLASS64) { >=20 > + Status =3D LoadElf64Image (ElfCt); >=20 > + } >=20 > + >=20 > + return Status; >=20 > +} >=20 > + >=20 > + >=20 > +/** >=20 > + Get a ELF section name from its index. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + @param[in] SectionIndex ELF section index. >=20 > + @param[out] SectionName The pointer to the section name. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ElfCt or SecName is NULL. >=20 > + @retval EFI_NOT_FOUND Could not find the section. >=20 > + @retval EFI_SUCCESS Section name was filled successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +GetElfSectionName ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt, >=20 > + IN UINT32 SectionIndex, >=20 > + OUT CHAR8 **SectionName >=20 > + ) >=20 > +{ >=20 > + Elf32_Shdr *Elf32Shdr; >=20 > + Elf64_Shdr *Elf64Shdr; >=20 > + CHAR8 *Name; >=20 > + >=20 > + if ((ElfCt =3D=3D NULL) || (SectionName =3D=3D NULL)) { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + >=20 > + if (EFI_ERROR (ElfCt->ParseStatus)) { >=20 > + return ElfCt->ParseStatus; >=20 > + } >=20 > + >=20 > + Name =3D NULL; >=20 > + if (ElfCt->EiClass =3D=3D ELFCLASS32) { >=20 > + Elf32Shdr =3D GetElf32SectionByIndex (ElfCt->FileBase, SectionIndex)= ; >=20 > + if ((Elf32Shdr !=3D NULL) && (Elf32Shdr->sh_name < ElfCt->ShStrLen))= { >=20 > + Name =3D (CHAR8 *)(ElfCt->FileBase + ElfCt->ShStrOff + Elf32Shdr- > >sh_name); >=20 > + } >=20 > + } else if (ElfCt->EiClass =3D=3D ELFCLASS64) { >=20 > + Elf64Shdr =3D GetElf64SectionByIndex (ElfCt->FileBase, SectionIndex)= ; >=20 > + if ((Elf64Shdr !=3D NULL) && (Elf64Shdr->sh_name < ElfCt->ShStrLen))= { >=20 > + Name =3D (CHAR8 *)(ElfCt->FileBase + ElfCt->ShStrOff + Elf64Shdr- > >sh_name); >=20 > + } >=20 > + } >=20 > + >=20 > + if (Name =3D=3D NULL) { >=20 > + return EFI_NOT_FOUND; >=20 > + } >=20 > + >=20 > + *SectionName =3D Name; >=20 > + return EFI_SUCCESS; >=20 > +} >=20 > + >=20 > + >=20 > +/** >=20 > + Get the offset and size of x-th ELF section. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + @param[in] Index ELF section index. >=20 > + @param[out] Offset Return the offset of the specific sect= ion. >=20 > + @param[out] Size Return the size of the specific sectio= n. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ImageBase, Offset or Size is NULL. >=20 > + @retval EFI_INVALID_PARAMETER EiClass doesn't equal to ELFCLASS32 or > ELFCLASS64. >=20 > + @retval EFI_NOT_FOUND Could not find the section. >=20 > + @retval EFI_SUCCESS Offset and Size are returned. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +GetElfSectionPos ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt, >=20 > + IN UINT32 Index, >=20 > + OUT UINTN *Offset, >=20 > + OUT UINTN *Size >=20 > + ) >=20 > +{ >=20 > + Elf32_Shdr *Elf32Shdr; >=20 > + Elf64_Shdr *Elf64Shdr; >=20 > + >=20 > + if ((ElfCt =3D=3D NULL) || (Offset =3D=3D NULL) || (Size =3D=3D NULL))= { >=20 > + return EFI_INVALID_PARAMETER; >=20 > + } >=20 > + >=20 > + if (EFI_ERROR (ElfCt->ParseStatus)) { >=20 > + return ElfCt->ParseStatus; >=20 > + } >=20 > + >=20 > + if (ElfCt->EiClass =3D=3D ELFCLASS32) { >=20 > + Elf32Shdr =3D GetElf32SectionByIndex (ElfCt->FileBase, Index); >=20 > + if (Elf32Shdr !=3D NULL) { >=20 > + *Offset =3D (UINTN)Elf32Shdr->sh_offset; >=20 > + *Size =3D (UINTN)Elf32Shdr->sh_size; >=20 > + return EFI_SUCCESS; >=20 > + } >=20 > + } else if (ElfCt->EiClass =3D=3D ELFCLASS64) { >=20 > + Elf64Shdr =3D GetElf64SectionByIndex (ElfCt->FileBase, Index); >=20 > + if (Elf64Shdr !=3D NULL) { >=20 > + *Offset =3D (UINTN)Elf64Shdr->sh_offset; >=20 > + *Size =3D (UINTN)Elf64Shdr->sh_size; >=20 > + return EFI_SUCCESS; >=20 > + } >=20 > + } >=20 > + >=20 > + return EFI_NOT_FOUND; >=20 > +} >=20 > + >=20 > +/** >=20 > + Relocate all sections in a ELF image to current location. >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_INVALID_PARAMETER ElfCt is NULL. >=20 > + @retval EFI_UNSUPPORTED Relocation is not supported. >=20 > + @retval EFI_SUCCESS ELF image was relocated successfully. >=20 > +**/ >=20 > +EFI_STATUS >=20 > +RelocateElfSections ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ) >=20 > +{ >=20 > + EFI_STATUS Status; >=20 > + >=20 > + ASSERT (ElfCt !=3D NULL); >=20 > + >=20 > + Status =3D EFI_UNSUPPORTED; >=20 > + if (ElfCt->EiClass =3D=3D ELFCLASS32) { >=20 > + Status =3D RelocateElf32Sections (ElfCt); >=20 > + } else if (ElfCt->EiClass =3D=3D ELFCLASS64) { >=20 > + Status =3D RelocateElf64Sections (ElfCt); >=20 > + } >=20 > + return Status; >=20 > +} >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLibInternal.h > b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLibInternal.h > new file mode 100644 > index 0000000000..b4b591d2e7 > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/ElfLibInternal.h > @@ -0,0 +1,88 @@ > +/** @file >=20 > + ELF library >=20 > + >=20 > + Copyright (c) 2019 - 2021, Intel Corporation. All rights reserved.
>=20 > + SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > + >=20 > +#ifndef _EFI_LIB_INTERNAL_H_ >=20 > +#define _EFI_LIB_INTERNAL_H_ >=20 > + >=20 > +#include >=20 > +#include >=20 > +#include >=20 > +#include "ElfLib.h" >=20 > +#include "ElfCommon.h" >=20 > +#include "Elf32.h" >=20 > +#include "Elf64.h" >=20 > + >=20 > +#define ELF_NEXT_ENTRY(EntryType, Current, EntrySize) \ >=20 > + ((EntryType *) ((UINT8 *)Current + EntrySize)) >=20 > + >=20 > +Elf32_Shdr * >=20 > +GetElf32SectionByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ); >=20 > + >=20 > +Elf64_Shdr * >=20 > +GetElf64SectionByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ); >=20 > + >=20 > +Elf32_Phdr * >=20 > +GetElf32SegmentByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ); >=20 > + >=20 > +Elf64_Phdr * >=20 > +GetElf64SegmentByIndex ( >=20 > + IN UINT8 *ImageBase, >=20 > + IN UINT32 Index >=20 > + ); >=20 > + >=20 > +/** >=20 > + Load ELF image which has 32-bit architecture >=20 > + >=20 > + @param[in] ElfCt ELF image context pointer. >=20 > + >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > + @retval Others Loading ELF binary fails. >=20 > + >=20 > +**/ >=20 > +EFI_STATUS >=20 > +LoadElf32Image ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ); >=20 > + >=20 > +/** >=20 > + Load ELF image which has 64-bit architecture >=20 > + >=20 > + @param[in] ImageBase Memory address of an image. >=20 > + @param[out] EntryPoint The entry point of loaded ELF image. >=20 > + >=20 > + @retval EFI_SUCCESS ELF binary is loaded successfully. >=20 > + @retval Others Loading ELF binary fails. >=20 > + >=20 > +**/ >=20 > +EFI_STATUS >=20 > +LoadElf64Image ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ); >=20 > + >=20 > + >=20 > +EFI_STATUS >=20 > +RelocateElf32Sections ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ); >=20 > + >=20 > + >=20 > +EFI_STATUS >=20 > +RelocateElf64Sections ( >=20 > + IN ELF_IMAGE_CONTEXT *ElfCt >=20 > + ); >=20 > + >=20 > +#endif >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.c > b/UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.c > new file mode 100644 > index 0000000000..ac27fcf267 > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.c > @@ -0,0 +1,187 @@ > +/** @file >=20 > + ELF Load Image Support >=20 > + >=20 > +Copyright (c) 2021, Intel Corporation. All rights reserved.
>=20 > +SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > + >=20 > +**/ >=20 > + >=20 > +#include >=20 > +#include >=20 > +#include >=20 > + >=20 > +#include >=20 > + >=20 > +#include >=20 > +#include >=20 > +#include >=20 > +#include >=20 > +#include >=20 > + >=20 > +#include "ElfLib.h" >=20 > + >=20 > +/** >=20 > + The wrapper function of PeiLoadImageLoadImage(). >=20 > + >=20 > + @param This - Pointer to EFI_PEI_LOAD_FILE_PPI. >=20 > + @param FileHandle - Pointer to the FFS file header of the image. >=20 > + @param ImageAddressArg - Pointer to PE/TE image. >=20 > + @param ImageSizeArg - Size of PE/TE image. >=20 > + @param EntryPoint - Pointer to entry point of specified image fil= e for > output. >=20 > + @param AuthenticationState - Pointer to attestation authentication sta= te > of image. >=20 > + >=20 > + @return Status of PeiLoadImageLoadImage(). >=20 > + >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +PeiLoadFileLoadPayload ( >=20 > + IN CONST EFI_PEI_LOAD_FILE_PPI *This, >=20 > + IN EFI_PEI_FILE_HANDLE FileHandle, >=20 > + OUT EFI_PHYSICAL_ADDRESS *ImageAddressArg, OPTIONAL >=20 > + OUT UINT64 *ImageSizeArg, OPTIONAL >=20 > + OUT EFI_PHYSICAL_ADDRESS *EntryPoint, >=20 > + OUT UINT32 *AuthenticationState >=20 > + ) >=20 > +{ >=20 > + EFI_STATUS Status; >=20 > + VOID *Elf; >=20 > + PLD_EXTRA_DATA *ExtraData; >=20 > + ELF_IMAGE_CONTEXT Context; >=20 > + PLD_INFO_HEADER *PldInfo; >=20 > + UINT32 Index; >=20 > + UINT16 ExtraDataIndex; >=20 > + CHAR8 *SectionName; >=20 > + UINTN Offset; >=20 > + UINTN Size; >=20 > + UINT32 ExtraDataCount; >=20 > + UINTN Instance; >=20 > + >=20 > + // >=20 > + // ELF is added to file as RAW section for EDKII bootloader. >=20 > + // But RAW section might be added by build tool before the ELF RAW > section when alignment is specified for ELF RAW section. >=20 > + // Below loop skips the RAW section that doesn't contain valid ELF ima= ge. >=20 > + // >=20 > + Instance =3D 0; >=20 > + do { >=20 > + Status =3D PeiServicesFfsFindSectionData3 (EFI_SECTION_RAW, Instance= ++, > FileHandle, &Elf, AuthenticationState); >=20 > + if (EFI_ERROR (Status)) { >=20 > + return Status; >=20 > + } >=20 > + >=20 > + ZeroMem (&Context, sizeof (Context)); >=20 > + Status =3D ParseElfImage (Elf, &Context); >=20 > + } while (EFI_ERROR (Status)); >=20 > + >=20 > + DEBUG (( >=20 > + DEBUG_INFO, "Payload File Size: 0x%08X, Mem Size: 0x%08x, > Reload: %d\n", >=20 > + Context.FileSize, Context.ImageSize, Context.ReloadRequired >=20 > + )); >=20 > + >=20 > + // >=20 > + // Get PLD_INFO and number of additional PLD sections. >=20 > + // >=20 > + PldInfo =3D NULL; >=20 > + ExtraDataCount =3D 0; >=20 > + for (Index =3D 0; Index < Context.ShNum; Index++) { >=20 > + Status =3D GetElfSectionName (&Context, Index, &SectionName); >=20 > + if (EFI_ERROR(Status)) { >=20 > + continue; >=20 > + } >=20 > + DEBUG ((DEBUG_ERROR, "Payload Section[%d]: %a\n", Index, > SectionName)); >=20 Better using DEBUG_INFO since this is expected info > + if (AsciiStrCmp(SectionName, PLD_INFO_SEC_NAME) =3D=3D 0) { >=20 > + Status =3D GetElfSectionPos (&Context, Index, &Offset, &Size); >=20 > + if (!EFI_ERROR(Status)) { >=20 > + PldInfo =3D (PLD_INFO_HEADER *)(Context.FileBase + Offset); >=20 > + } >=20 > + } else if (AsciiStrnCmp(SectionName, PLD_EXTRA_SEC_NAME_PREFIX, > PLD_EXTRA_SEC_NAME_PREFIX_LENGTH) =3D=3D 0) { >=20 > + Status =3D GetElfSectionPos (&Context, Index, &Offset, &Size); >=20 > + if (!EFI_ERROR (Status)) { >=20 > + ExtraDataCount++; >=20 > + } >=20 > + } >=20 > + } >=20 > + >=20 > + // >=20 > + // Report the additional PLD sections through HOB. >=20 > + // >=20 > + ExtraData =3D BuildGuidHob ( >=20 > + &gPldExtraDataGuid, >=20 > + sizeof (PLD_EXTRA_DATA) + ExtraDataCount * sizeof > (PLD_EXTRA_DATA_ENTRY) >=20 > + ); >=20 > + ExtraData->Count =3D ExtraDataCount; >=20 > + if (ExtraDataCount !=3D 0) { >=20 > + for (ExtraDataIndex =3D 0, Index =3D 0; Index < Context.ShNum; Index= ++) { >=20 > + Status =3D GetElfSectionName (&Context, Index, &SectionName); >=20 > + if (EFI_ERROR(Status)) { >=20 > + continue; >=20 > + } >=20 > + if (AsciiStrnCmp(SectionName, PLD_EXTRA_SEC_NAME_PREFIX, > PLD_EXTRA_SEC_NAME_PREFIX_LENGTH) =3D=3D 0) { >=20 > + Status =3D GetElfSectionPos (&Context, Index, &Offset, &Size); >=20 > + if (!EFI_ERROR (Status)) { >=20 > + ASSERT (ExtraDataIndex < ExtraDataCount); >=20 > + AsciiStrCpyS ( >=20 > + ExtraData->Entry[ExtraDataIndex].Identifier, >=20 > + sizeof(ExtraData->Entry[ExtraDataIndex].Identifier), >=20 > + SectionName + PLD_EXTRA_SEC_NAME_PREFIX_LENGTH >=20 > + ); >=20 > + ExtraData->Entry[ExtraDataIndex].Base =3D (UINTN)(Context.File= Base + > Offset); >=20 > + ExtraData->Entry[ExtraDataIndex].Size =3D Size; >=20 > + ExtraDataIndex++; >=20 > + } >=20 > + } >=20 > + } >=20 > + } >=20 > + >=20 > + if (Context.ReloadRequired || Context.PreferredImageAddress !=3D > Context.FileBase) { >=20 > + Context.ImageAddress =3D AllocatePages (EFI_SIZE_TO_PAGES > (Context.ImageSize)); >=20 > + } else { >=20 > + Context.ImageAddress =3D Context.FileBase; >=20 > + } >=20 > + >=20 > + // >=20 > + // Load ELF into the required base >=20 > + // >=20 > + Status =3D LoadElfImage (&Context); >=20 > + if (!EFI_ERROR(Status)) { >=20 > + *ImageAddressArg =3D (UINTN) Context.ImageAddress; >=20 > + *EntryPoint =3D Context.EntryPoint; >=20 > + *ImageSizeArg =3D Context.ImageSize; >=20 > + } >=20 > + return Status; >=20 > +} >=20 > + >=20 > + >=20 > +EFI_PEI_LOAD_FILE_PPI mPeiLoadFilePpi =3D { >=20 > + PeiLoadFileLoadPayload >=20 > +}; >=20 > + >=20 > + >=20 > +EFI_PEI_PPI_DESCRIPTOR gPpiLoadFilePpiList =3D { >=20 > + (EFI_PEI_PPI_DESCRIPTOR_PPI | > EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST), >=20 > + &gEfiPeiLoadFilePpiGuid, >=20 > + &mPeiLoadFilePpi >=20 > +}; >=20 > +/** >=20 > + >=20 > + Install Pei Load File PPI. >=20 > + >=20 > + @param FileHandle Handle of the file being invoked. >=20 > + @param PeiServices Describes the list of possible PEI Services. >=20 > + >=20 > + @retval EFI_SUCESS The entry point executes successfully. >=20 > + @retval Others Some error occurs during the execution of this fun= ction. >=20 > + >=20 > +**/ >=20 > +EFI_STATUS >=20 > +EFIAPI >=20 > +InitializePayloadLoaderPeim ( >=20 > + IN EFI_PEI_FILE_HANDLE FileHandle, >=20 > + IN CONST EFI_PEI_SERVICES **PeiServices >=20 > + ) >=20 > +{ >=20 > + EFI_STATUS Status; >=20 > + Status =3D PeiServicesInstallPpi (&gPpiLoadFilePpiList); >=20 > + >=20 > + return Status; >=20 > +} >=20 > diff --git a/UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.inf > b/UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.inf > new file mode 100644 > index 0000000000..c45f3ecf2d > --- /dev/null > +++ b/UefiPayloadPkg/PayloadLoaderPeim/PayloadLoaderPeim.inf > @@ -0,0 +1,59 @@ > +## @file >=20 > +# Produce LoadFile PPI for ELF loading. >=20 > +# >=20 > +# Copyright (c) 2021, Intel Corporation. All rights reserved.
>=20 > +# >=20 > +# SPDX-License-Identifier: BSD-2-Clause-Patent >=20 > +# >=20 > +## >=20 > + >=20 > +[Defines] >=20 > + INF_VERSION =3D 0x00010005 >=20 > + BASE_NAME =3D ElfLoaderPeim >=20 > + FILE_GUID =3D D071A3B4-3EC1-40C5-BEF8-D0BD4A2446F= 0 >=20 > + MODULE_TYPE =3D PEIM >=20 > + VERSION_STRING =3D 1.0 >=20 > + >=20 > + ENTRY_POINT =3D InitializePayloadLoaderPeim >=20 > + >=20 > +# >=20 > +# The following information is for reference only and not required by th= e > build tools. >=20 > +# >=20 > +# VALID_ARCHITECTURES =3D IA32 X64 >=20 > +# >=20 > + >=20 > +[Sources] >=20 > + PayloadLoaderPeim.c >=20 > + ElfLib.h >=20 > + ElfLib/ElfLibInternal.h >=20 > + ElfLib/ElfCommon.h >=20 > + ElfLib/Elf32.h >=20 > + ElfLib/Elf64.h >=20 > + ElfLib/ElfLibInternal.h >=20 > + ElfLib/ElfLib.c >=20 > + ElfLib/Elf32Lib.c >=20 > + ElfLib/Elf64Lib.c >=20 > + >=20 > +[Packages] >=20 > + MdePkg/MdePkg.dec >=20 > + MdeModulePkg/MdeModulePkg.dec >=20 > + UefiPayloadPkg/UefiPayloadPkg.dec >=20 > + >=20 > +[LibraryClasses] >=20 > + PcdLib >=20 > + MemoryAllocationLib >=20 > + BaseMemoryLib >=20 > + PeiServicesLib >=20 > + HobLib >=20 > + BaseLib >=20 > + PeimEntryPoint >=20 > + DebugLib >=20 > + >=20 > +[Ppis] >=20 > + gEfiPeiLoadFilePpiGuid ## PRODUCES >=20 > + >=20 > +[Guids] >=20 > + gPldExtraDataGuid ## PRODUCES >=20 > + >=20 > +[Depex] >=20 > + TRUE > \ No newline at end of file > -- > 2.31.1.windows.1