mu/subx/012elf.cc

168 lines
6.5 KiB
C++
Raw Normal View History

2018-09-21 17:06:17 +00:00
//: Generating ELF binaries for SubX programs.
//: This will allow us to run them natively on a Linux kernel.
//: Based on https://github.com/kragen/stoneknifeforth/blob/702d2ebe1b/386.c
:(before "End Main")
assert(argc > 1);
if (is_equal(argv[1], "run")) {
START_TRACING_UNTIL_END_OF_SCOPE;
assert(argc > 2);
reset();
2018-07-03 22:37:45 +00:00
cerr << std::hex;
load_elf(argv[2], argc, argv);
2018-06-28 22:54:52 +00:00
while (EIP < End_of_program) // weak final-gasp termination check
run_one_instruction();
2018-08-14 03:43:38 +00:00
trace(90, "load") << "executed past end of the world: " << EIP << " vs " << End_of_program << end();
return 0;
}
:(code)
void load_elf(const string& filename, int argc, char* argv[]) {
int fd = open(filename.c_str(), O_RDONLY);
2018-06-28 23:34:47 +00:00
if (fd < 0) raise << filename.c_str() << ": open" << perr() << '\n' << die();
off_t size = lseek(fd, 0, SEEK_END);
lseek(fd, 0, SEEK_SET);
uint8_t* elf_contents = static_cast<uint8_t*>(malloc(size));
2018-06-28 23:34:47 +00:00
if (elf_contents == NULL) raise << "malloc(" << size << ')' << perr() << '\n' << die();
ssize_t read_size = read(fd, elf_contents, size);
2018-06-28 23:34:47 +00:00
if (size != read_size) raise << "read → " << size << " (!= " << read_size << ')' << perr() << '\n' << die();
load_elf_contents(elf_contents, size, argc, argv);
free(elf_contents);
}
void load_elf_contents(uint8_t* elf_contents, size_t size, int argc, char* argv[]) {
uint8_t magic[5] = {0};
memcpy(magic, elf_contents, 4);
if (memcmp(magic, "\177ELF", 4) != 0)
2018-06-28 23:34:47 +00:00
raise << "Invalid ELF file; starts with \"" << magic << '"' << die();
if (elf_contents[4] != 1)
2018-06-28 23:34:47 +00:00
raise << "Only 32-bit ELF files (4-byte words; virtual addresses up to 4GB) supported.\n" << die();
if (elf_contents[5] != 1)
2018-06-28 23:34:47 +00:00
raise << "Only little-endian ELF files supported.\n" << die();
// unused: remaining 10 bytes of e_ident
uint32_t e_machine_type = u32_in(&elf_contents[16]);
if (e_machine_type != 0x00030002)
2018-06-28 23:34:47 +00:00
raise << "ELF type/machine 0x" << HEXWORD << e_machine_type << " isn't i386 executable\n" << die();
// unused: e_version. We only support version 1, and later versions will be backwards compatible.
uint32_t e_entry = u32_in(&elf_contents[24]);
uint32_t e_phoff = u32_in(&elf_contents[28]);
// unused: e_shoff
// unused: e_flags
uint32_t e_ehsize = u16_in(&elf_contents[40]);
2018-06-28 23:34:47 +00:00
if (e_ehsize < 52) raise << "Invalid binary; ELF header too small\n" << die();
uint32_t e_phentsize = u16_in(&elf_contents[42]);
uint32_t e_phnum = u16_in(&elf_contents[44]);
2018-08-14 03:43:38 +00:00
trace(90, "load") << e_phnum << " entries in the program header, each " << e_phentsize << " bytes long" << end();
// unused: e_shentsize
// unused: e_shnum
// unused: e_shstrndx
for (size_t i = 0; i < e_phnum; ++i)
load_segment_from_program_header(elf_contents, i, size, e_phoff + i*e_phentsize, e_ehsize);
// initialize code and stack
Mem.push_back(vma(STACK_SEGMENT));
Reg[ESP].u = AFTER_STACK;
Reg[EBP].u = 0;
EIP = e_entry;
// initialize args on stack
// no envp for now
// we wastefully use a separate page of memory for argv
Mem.push_back(vma(ARGV_DATA_SEGMENT));
uint32_t argv_data = ARGV_DATA_SEGMENT;
for (int i = argc-1; i >= /*skip 'subx_bin' and 'run'*/2; --i) {
push(argv_data);
for (size_t j = 0; j <= strlen(argv[i]); ++j) {
write_mem_u8(argv_data, argv[i][j]);
argv_data += sizeof(char);
assert(argv_data < ARGV_DATA_SEGMENT + SEGMENT_SIZE);
}
}
push(argc-/*skip 'subx_bin' and 'run'*/2);
}
void push(uint32_t val) {
Reg[ESP].u -= 4;
trace(90, "run") << "decrementing ESP to 0x" << HEXWORD << Reg[ESP].u << end();
trace(90, "run") << "pushing value 0x" << HEXWORD << val << end();
write_mem_u32(Reg[ESP].u, val);
}
void load_segment_from_program_header(uint8_t* elf_contents, int segment_index, size_t size, uint32_t offset, uint32_t e_ehsize) {
uint32_t p_type = u32_in(&elf_contents[offset]);
2018-08-14 03:43:38 +00:00
trace(90, "load") << "program header at offset " << offset << ": type " << p_type << end();
if (p_type != 1) {
2018-08-14 03:43:38 +00:00
trace(90, "load") << "ignoring segment at offset " << offset << " of non PT_LOAD type " << p_type << " (see http://refspecs.linuxbase.org/elf/elf.pdf)" << end();
return;
}
uint32_t p_offset = u32_in(&elf_contents[offset + 4]);
uint32_t p_vaddr = u32_in(&elf_contents[offset + 8]);
2018-06-28 23:34:47 +00:00
if (e_ehsize > p_vaddr) raise << "Invalid binary; program header overlaps ELF header\n" << die();
// unused: p_paddr
uint32_t p_filesz = u32_in(&elf_contents[offset + 16]);
uint32_t p_memsz = u32_in(&elf_contents[offset + 20]);
if (p_filesz != p_memsz)
raise << "Can't yet handle segments where p_filesz != p_memsz (see http://refspecs.linuxbase.org/elf/elf.pdf)\n" << die();
if (p_offset + p_filesz > size)
2018-06-28 23:34:47 +00:00
raise << "Invalid binary; segment at offset " << offset << " is too large: wants to end at " << p_offset+p_filesz << " but the file ends at " << size << '\n' << die();
if (p_memsz > INITIAL_SEGMENT_SIZE) {
raise << "Code segment too small for SubX; for now please manually increase INITIAL_SEGMENT_SIZE.\n" << end();
return;
}
2018-08-14 03:43:38 +00:00
trace(90, "load") << "blitting file offsets (" << p_offset << ", " << (p_offset+p_filesz) << ") to addresses (" << p_vaddr << ", " << (p_vaddr+p_memsz) << ')' << end();
if (size > p_memsz) size = p_memsz;
Mem.push_back(vma(p_vaddr));
for (size_t i = 0; i < p_filesz; ++i)
2018-07-09 05:33:15 +00:00
write_mem_u8(p_vaddr+i, elf_contents[p_offset+i]);
if (segment_index == 0 && End_of_program < p_vaddr+p_memsz)
End_of_program = p_vaddr+p_memsz;
}
2018-07-10 14:18:36 +00:00
:(before "End Includes")
// Very primitive/fixed/insecure ELF segments for now.
// code: 0x08048000 -> 0x08048fff
// data/heap: 0x08050000 -> 0x08050fff
// stack: 0x08060fff -> 0x08060000 (downward)
2018-07-10 14:18:36 +00:00
const int SEGMENT_SIZE = 0x1000;
const int CODE_START = 0x08048000;
const int DATA_SEGMENT = 0x08050000;
const int HEAP_SEGMENT = DATA_SEGMENT;
const int STACK_SEGMENT = 0x08060000;
const int AFTER_STACK = 0x08060ffc; // forget final word because of the off-by-one with INITIAL_SEGMENT_SIZE;
const int ARGV_DATA_SEGMENT = 0x08070000;
2018-07-10 14:18:36 +00:00
:(code)
inline uint32_t u32_in(uint8_t* p) {
return p[0] | p[1] << 8 | p[2] << 16 | p[3] << 24;
}
inline uint16_t u16_in(uint8_t* p) {
return p[0] | p[1] << 8;
}
2018-06-28 23:34:47 +00:00
:(before "End Types")
struct perr {};
:(code)
ostream& operator<<(ostream& os, perr /*unused*/) {
if (errno)
os << ": " << strerror(errno);
2018-06-28 23:34:47 +00:00
return os;
}
:(before "End Types")
struct die {};
:(code)
ostream& operator<<(ostream& /*unused*/, die /*unused*/) {
2018-06-28 23:34:47 +00:00
if (Trace_stream) Trace_stream->newline();
exit(1);
}
2018-06-28 23:34:04 +00:00
:(before "End Includes")
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <stdarg.h>
2017-12-31 18:23:08 +00:00
#include <errno.h>
2018-08-04 06:42:20 +00:00
#include <unistd.h>