[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
On 03.07.2024 02:04, Milan Djokic wrote: > Added riscv image header to enable boot from second stage bootloaders (e.g. > uboot. Image header defined in riscv-image-header.h) > Additionally, RISC-V xen image is extended with PE/COFF headers, introducing > EFI application format. > PE/COFF header is optionally included (with CONFIG_RISCV_EFI) so > both plain ELF and image with PE/COFF header can now be generated as build > artifacts. > Note that this patch represents initial EFI application format support (image > contains EFI application header embeded into binary when CONFIG_RISCV_EFI > is enabled). For full EFI application Xen support, boot/runtime services > and system table handling are yet to be implemented. So, first: Please Cc all applicable maintainers. It would probably be prudent to also Cc Oleksii, who's doing most of the RISC-V work now (but Oleksii, please correct me if you don't want to be Cc-ed). With Oleksii in the audience, second: I tink I've seen that in binutils work is being done to actually allow to create EFI applications "properly" for RISC-V. Was it firmly determined that you/we do not want to go that route? > --- a/xen/arch/riscv/Kconfig > +++ b/xen/arch/riscv/Kconfig > @@ -9,6 +9,16 @@ config ARCH_DEFCONFIG > string > default "arch/riscv/configs/tiny64_defconfig" > > +config RISCV_EFI > + bool "UEFI boot service support" > + depends on RISCV_64 && RISCV_ISA_C > + help > + This option provides support for boot services through > + UEFI firmware. A UEFI stub is provided to allow Xen to > + be booted as an EFI application. Currently, only EFI PE/COFF > application > + header is included into RISC-V image. Boot/Runtime services as part > + of EFI application stub are yet to be implemented. The first sentence in particular worries me. What it says is basically all taken back by what follows. I think this help text wants reducing to a minimum, andthen wants replacing once proper EFI support is in place. > --- /dev/null > +++ b/xen/arch/riscv/include/asm/riscv-image-header.h > @@ -0,0 +1,57 @@ > +#ifndef _ASM_RISCV_IMAGE_H > +#define _ASM_RISCV_IMAGE_H > + > +#define RISCV_IMAGE_MAGIC "RISCV\0\0\0" > +#define RISCV_IMAGE_MAGIC2 "RSC\x05" > + > +#define RISCV_IMAGE_FLAG_BE_SHIFT 0 > + > +#define RISCV_IMAGE_FLAG_LE 0 > +#define RISCV_IMAGE_FLAG_BE 1 > + > +#define __HEAD_FLAG_BE RISCV_IMAGE_FLAG_LE > + > +#define __HEAD_FLAG(field) > \ > + (__HEAD_FLAG_##field << RISCV_IMAGE_FLAG_##field##_SHIFT) Nit: Generally we treat ## as a binary operator, too. Which means it also wants to be surrounded by blanks. > +#define __HEAD_FLAGS (__HEAD_FLAG(BE)) Nit: The outer pair of parentheses isn't needed here, is it? > +#define RISCV_HEADER_VERSION_MAJOR 0 > +#define RISCV_HEADER_VERSION_MINOR 2 > + > +#define RISCV_HEADER_VERSION > \ > + (RISCV_HEADER_VERSION_MAJOR << 16 | RISCV_HEADER_VERSION_MINOR) Nit: Please parenthesize the << against the |. > --- /dev/null > +++ b/xen/arch/riscv/riscv64/efi-header.S > @@ -0,0 +1,99 @@ > +#include <efi/pe.h> > +#include <xen/sizes.h> > + > + .macro __EFI_PE_HEADER > + .long PE_MAGIC > +coff_header: > +#ifdef CONFIG_RISCV_64 > + .short IMAGE_FILE_MACHINE_RISCV64 /* Machine */ > +#else > + .short IMAGE_FILE_MACHINE_RISCV32 /* Machine */ > +#endif > + .short section_count /* NumberOfSections > */ > + .long 0 /* TimeDateStamp */ > + .long 0 /* > PointerToSymbolTable */ > + .long 0 /* NumberOfSymbols */ > + .short section_table - optional_header /* > SizeOfOptionalHeader */ > + .short IMAGE_FILE_DEBUG_STRIPPED | \ > + IMAGE_FILE_EXECUTABLE_IMAGE | \ > + IMAGE_FILE_LINE_NUMS_STRIPPED /* Characteristics */ > + > +optional_header: > +#ifdef CONFIG_RISCV_64 > + .short PE_OPT_MAGIC_PE32PLUS /* PE32+ format */ > +#else > + .short PE_OPT_MAGIC_PE32 /* PE32 format */ > +#endif > + .byte 0x02 /* > MajorLinkerVersion */ > + .byte 0x14 /* > MinorLinkerVersion */ > + .long _end - xen_start /* SizeOfCode */ > + .long 0 /* > SizeOfInitializedData */ > + .long 0 /* > SizeOfUninitializedData */ > + .long 0 /* > AddressOfEntryPoint */ > + .long xen_start - _start /* BaseOfCode */ > +#ifdef CONFIG_RISCV_32 > + .long _end - _start /* BaseOfData */ > +#endif As requested before, the decision to represent all of .text/.data/.bss as code (with no data at all) wants explaining in a (possibly brief) comment. > +extra_header_fields: > + .quad 0 /* ImageBase */ > + .long PECOFF_SECTION_ALIGNMENT /* SectionAlignment > */ > + .long PECOFF_FILE_ALIGNMENT /* FileAlignment */ > + .short 0 /* > MajorOperatingSystemVersion */ > + .short 0 /* > MinorOperatingSystemVersion */ > + .short LINUX_EFISTUB_MAJOR_VERSION /* MajorImageVersion > */ > + .short LINUX_EFISTUB_MINOR_VERSION /* MinorImageVersion > */ > + .short 0 /* > MajorSubsystemVersion */ > + .short 0 /* > MinorSubsystemVersion */ > + .long 0 /* Win32VersionValue > */ > + .long _end - _start /* SizeOfImage */ > + > + /* Everything before the xen image is considered part of the header > */ > + .long xen_start - _start /* SizeOfHeaders */ > + .long 0 /* CheckSum */ > + .short IMAGE_SUBSYSTEM_EFI_APPLICATION /* Subsystem */ > + .short 0 /* > DllCharacteristics */ > + .quad 0 /* > SizeOfStackReserve */ > + .quad 0 /* SizeOfStackCommit > */ > + .quad 0 /* SizeOfHeapReserve > */ > + .quad 0 /* SizeOfHeapCommit > */ > + .long 0 /* LoaderFlags */ > + .long (section_table - .) / 8 /* > NumberOfRvaAndSizes */ > + /* > + * Data directories are not used in this case, therefore not defined > to reduce header size. > + */ > + > + /* Section table */ > +section_table: > + /* Currently code/data sections are not used since EFI stub > implementation is not yet finalized */ > + .ascii ".text\0\0\0" > + .long 0 /* VirtualSize */ > + .long 0 /* VirtualAddress */ > + .long 0 /* SizeOfRawData */ > + .long 0 /* PointerToRawData > */ > + .long 0 /* > PointerToRelocations */ > + .long 0 /* > PointerToLineNumbers */ > + .short 0 /* > NumberOfRelocations */ > + .short 0 /* > NumberOfLineNumbers */ > + .long IMAGE_SCN_CNT_CODE | \ > + IMAGE_SCN_MEM_READ | \ > + IMAGE_SCN_MEM_EXECUTE /* Characteristics */ > + > + .ascii ".data\0\0\0" > + .long 0 /* VirtualSize */ > + .long 0 /* VirtualAddress */ > + .long 0 /* SizeOfRawData */ > + .long 0 /* PointerToRawData > */ > + .long 0 /* > PointerToRelocations */ > + .long 0 /* > PointerToLineNumbers */ > + .short 0 /* > NumberOfRelocations */ > + .short 0 /* > NumberOfLineNumbers */ > + .long IMAGE_SCN_CNT_INITIALIZED_DATA | \ > + IMAGE_SCN_MEM_READ | \ > + IMAGE_SCN_MEM_WRITE /* Characteristics */ > + > + .set section_count, (. - section_table) / 40 > + > + .balign 0x1000 > +efi_header_end: > + .endm > \ No newline at end of file Please take care of this. > --- a/xen/arch/riscv/riscv64/head.S > +++ b/xen/arch/riscv/riscv64/head.S > @@ -1,14 +1,54 @@ > #include <asm/asm.h> > #include <asm/riscv_encoding.h> > +#include <asm/riscv-image-header.h> > +#ifdef CONFIG_RISCV_EFI > +#include "efi-header.S" > +#endif > > .section .text.header, "ax", %progbits > - > /* I see no reason for removing this blank line. > * OpenSBI pass to start(): > * a0 -> hart_id ( bootcpu_id ) > - * a1 -> dtb_base > + * a1 -> dtb_base > */ > FUNC(start) > +/* Image header expected by second stage bootloaders (format defined in > asm/riscv-image-header.h) */ Nit: Overlong line (and not the only one). > +#ifdef CONFIG_RISCV_EFI > + /* > + * This instruction decodes to "MZ" ASCII required by UEFI. > + */ > + c.li s4,-13 > + c.j xen_start > +#else > + /* jump to start kernel */ > + jal xen_start JAL, not J? Why? > +#endif > + .balign 8 This won't do what you want unless "start" itself is also suitably aligned. It'll be as long as it's first in the section, but better make such explicit. > +#ifdef CONFIG_RISCV_64 > + /* Image load offset(2MB) from start of RAM */ > + .quad 0x200000 > +#else > + /* Image load offset(4MB) from start of RAM */ > + .quad 0x400000 > +#endif What these constants derive from? I expect they aren't really "magic". > + .quad _end - _start /* Effective Image size */ > + .quad __HEAD_FLAGS > + .long RISCV_HEADER_VERSION In the C struct this is a 64-bit field. Why .long here? Or perhaps the C struct is wrong, actually also leaving unspecified padding there after ... > + .long 0 /* reserved */ ... this field then. > + .quad 0 /* reserved */ > + .ascii RISCV_IMAGE_MAGIC /* Magic number (RISC-V specific; > deprecated) */ > + .balign 4 RISCV_IMAGE_MAGIC is already nul-padded to 8 bytes. I therefore find the .balign here somewhat confusing. > + .ascii RISCV_IMAGE_MAGIC2 /* Magic number 2 (to match the > ARM64 'magic' field pos) */ > +#ifdef CONFIG_RISCV_EFI > + .long pe_head_start - _start /* reserved (PE COFF offset) */ > +pe_head_start: > + > + __EFI_PE_HEADER Using a macro for a single, simple purpose is somewhat unexpected. Can't you simply #include "efi-header.S" here? That would also make it more straightforward to find the use / purpose of that file. > +#else > + .long 0 /* 0 means no PE header. */ > +#endif > + > +xen_start: > /* Mask all interrupts */ > csrw CSR_SIE, zero > > @@ -60,6 +100,7 @@ FUNC(start) > mv a1, s1 > > tail start_xen > + > END(start) > > .section .text, "ax", %progbits What is this hunk about? > --- a/xen/arch/riscv/xen.lds.S > +++ b/xen/arch/riscv/xen.lds.S > @@ -12,6 +12,9 @@ PHDRS > #endif > } > > +PECOFF_SECTION_ALIGNMENT = 0x1000; > +PECOFF_FILE_ALIGNMENT = 0x200; What are these about? I see you use them in efi-header.S, but why do they need supplying from the linker script? > --- /dev/null > +++ b/xen/include/efi/pe.h > @@ -0,0 +1,458 @@ > +#ifndef __PE_H This probably wants (needs?) to gain an SPDX line. > +#define __PE_H > + > +/* > + * Linux EFI stub v1.0 adds the following functionality: > + * - Loading initrd from the LINUX_EFI_INITRD_MEDIA_GUID device path, > + * - Loading/starting the kernel from firmware that targets a different > + * machine type, via the entrypoint exposed in the .compat PE/COFF section. > + * > + * The recommended way of loading and starting v1.0 or later kernels is to > use > + * the LoadImage() and StartImage() EFI boot services, and expose the initrd > + * via the LINUX_EFI_INITRD_MEDIA_GUID device path. > + * > + * Versions older than v1.0 support initrd loading via the image load options > + * (using initrd=, limited to the volume from which the kernel itself was > + * loaded), or via arch specific means (bootparams, DT, etc). > + * > + * On x86, LoadImage() and StartImage() can be omitted if the EFI handover > + * protocol is implemented, which can be inferred from the version, > + * handover_offset and xloadflags fields in the bootparams structure. > + */ > +#define LINUX_EFISTUB_MAJOR_VERSION 0x1 > +#define LINUX_EFISTUB_MINOR_VERSION 0x0 > + > +#define MZ_MAGIC 0x5a4d /* "MZ" */ > + > +#define PE_MAGIC 0x00004550 /* "PE\0\0" */ > +#define PE_OPT_MAGIC_PE32 0x010b > +#define PE_OPT_MAGIC_PE32_ROM 0x0107 > +#define PE_OPT_MAGIC_PE32PLUS 0x020b > + > +/* machine type */ > +#define IMAGE_FILE_MACHINE_UNKNOWN 0x0000 > +#define IMAGE_FILE_MACHINE_AM33 0x01d3 > +#define IMAGE_FILE_MACHINE_AMD64 0x8664 > +#define IMAGE_FILE_MACHINE_ARM 0x01c0 > +#define IMAGE_FILE_MACHINE_ARMV7 0x01c4 > +#define IMAGE_FILE_MACHINE_ARM64 0xaa64 > +#define IMAGE_FILE_MACHINE_EBC 0x0ebc > +#define IMAGE_FILE_MACHINE_I386 0x014c > +#define IMAGE_FILE_MACHINE_IA64 0x0200 > +#define IMAGE_FILE_MACHINE_M32R 0x9041 > +#define IMAGE_FILE_MACHINE_MIPS16 0x0266 > +#define IMAGE_FILE_MACHINE_MIPSFPU 0x0366 > +#define IMAGE_FILE_MACHINE_MIPSFPU16 0x0466 > +#define IMAGE_FILE_MACHINE_POWERPC 0x01f0 > +#define IMAGE_FILE_MACHINE_POWERPCFP 0x01f1 > +#define IMAGE_FILE_MACHINE_R4000 0x0166 > +#define IMAGE_FILE_MACHINE_RISCV32 0x5032 > +#define IMAGE_FILE_MACHINE_RISCV64 0x5064 > +#define IMAGE_FILE_MACHINE_RISCV128 0x5128 > +#define IMAGE_FILE_MACHINE_SH3 0x01a2 > +#define IMAGE_FILE_MACHINE_SH3DSP 0x01a3 > +#define IMAGE_FILE_MACHINE_SH3E 0x01a4 > +#define IMAGE_FILE_MACHINE_SH4 0x01a6 > +#define IMAGE_FILE_MACHINE_SH5 0x01a8 > +#define IMAGE_FILE_MACHINE_THUMB 0x01c2 > +#define IMAGE_FILE_MACHINE_WCEMIPSV2 0x0169 > + > +/* flags */ > +#define IMAGE_FILE_RELOCS_STRIPPED 0x0001 > +#define IMAGE_FILE_EXECUTABLE_IMAGE 0x0002 > +#define IMAGE_FILE_LINE_NUMS_STRIPPED 0x0004 > +#define IMAGE_FILE_LOCAL_SYMS_STRIPPED 0x0008 > +#define IMAGE_FILE_AGGRESSIVE_WS_TRIM 0x0010 > +#define IMAGE_FILE_LARGE_ADDRESS_AWARE 0x0020 > +#define IMAGE_FILE_16BIT_MACHINE 0x0040 > +#define IMAGE_FILE_BYTES_REVERSED_LO 0x0080 > +#define IMAGE_FILE_32BIT_MACHINE 0x0100 > +#define IMAGE_FILE_DEBUG_STRIPPED 0x0200 > +#define IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP 0x0400 > +#define IMAGE_FILE_NET_RUN_FROM_SWAP 0x0800 > +#define IMAGE_FILE_SYSTEM 0x1000 > +#define IMAGE_FILE_DLL 0x2000 > +#define IMAGE_FILE_UP_SYSTEM_ONLY 0x4000 > +#define IMAGE_FILE_BYTES_REVERSED_HI 0x8000 > + > +#define IMAGE_FILE_OPT_ROM_MAGIC 0x107 > +#define IMAGE_FILE_OPT_PE32_MAGIC 0x10b > +#define IMAGE_FILE_OPT_PE32_PLUS_MAGIC 0x20b > + > +#define IMAGE_SUBSYSTEM_UNKNOWN 0 > +#define IMAGE_SUBSYSTEM_NATIVE 1 > +#define IMAGE_SUBSYSTEM_WINDOWS_GUI 2 > +#define IMAGE_SUBSYSTEM_WINDOWS_CUI 3 > +#define IMAGE_SUBSYSTEM_POSIX_CUI 7 > +#define IMAGE_SUBSYSTEM_WINDOWS_CE_GUI 9 > +#define IMAGE_SUBSYSTEM_EFI_APPLICATION 10 > +#define IMAGE_SUBSYSTEM_EFI_BOOT_SERVICE_DRIVER 11 > +#define IMAGE_SUBSYSTEM_EFI_RUNTIME_DRIVER 12 > +#define IMAGE_SUBSYSTEM_EFI_ROM_IMAGE 13 > +#define IMAGE_SUBSYSTEM_XBOX 14 > + > +#define IMAGE_DLL_CHARACTERISTICS_DYNAMIC_BASE 0x0040 > +#define IMAGE_DLL_CHARACTERISTICS_FORCE_INTEGRITY 0x0080 > +#define IMAGE_DLL_CHARACTERISTICS_NX_COMPAT 0x0100 > +#define IMAGE_DLLCHARACTERISTICS_NO_ISOLATION 0x0200 > +#define IMAGE_DLLCHARACTERISTICS_NO_SEH 0x0400 > +#define IMAGE_DLLCHARACTERISTICS_NO_BIND 0x0800 > +#define IMAGE_DLLCHARACTERISTICS_WDM_DRIVER 0x2000 > +#define IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE 0x8000 > + > +/* they actually defined 0x00000000 as well, but I think we'll skip that > one. */ > +#define IMAGE_SCN_RESERVED_0 0x00000001 > +#define IMAGE_SCN_RESERVED_1 0x00000002 > +#define IMAGE_SCN_RESERVED_2 0x00000004 > +#define IMAGE_SCN_TYPE_NO_PAD 0x00000008 /* don't pad - obsolete > */ > +#define IMAGE_SCN_RESERVED_3 0x00000010 > +#define IMAGE_SCN_CNT_CODE 0x00000020 /* .text */ > +#define IMAGE_SCN_CNT_INITIALIZED_DATA 0x00000040 /* .data */ > +#define IMAGE_SCN_CNT_UNINITIALIZED_DATA 0x00000080 /* .bss */ > +#define IMAGE_SCN_LNK_OTHER 0x00000100 /* reserved */ > +#define IMAGE_SCN_LNK_INFO 0x00000200 /* .drectve comments */ > +#define IMAGE_SCN_RESERVED_4 0x00000400 > +#define IMAGE_SCN_LNK_REMOVE 0x00000800 /* .o only - scn to be > rm'd*/ > +#define IMAGE_SCN_LNK_COMDAT 0x00001000 /* .o only - COMDAT data > */ > +#define IMAGE_SCN_RESERVED_5 0x00002000 /* spec omits this */ > +#define IMAGE_SCN_RESERVED_6 0x00004000 /* spec omits this */ > +#define IMAGE_SCN_GPREL 0x00008000 /* global pointer > referenced data */ > +/* spec lists 0x20000 twice, I suspect they meant 0x10000 for one of them */ > +#define IMAGE_SCN_MEM_PURGEABLE 0x00010000 /* reserved for "future" use */ > +#define IMAGE_SCN_16BIT 0x00020000 /* reserved for "future" use */ > +#define IMAGE_SCN_LOCKED 0x00040000 /* reserved for "future" use */ > +#define IMAGE_SCN_PRELOAD 0x00080000 /* reserved for "future" use */ > +/* and here they just stuck a 1-byte integer in the middle of a bitfield */ > +#define IMAGE_SCN_ALIGN_1BYTES 0x00100000 /* it does what it says on the > box */ > +#define IMAGE_SCN_ALIGN_2BYTES 0x00200000 > +#define IMAGE_SCN_ALIGN_4BYTES 0x00300000 > +#define IMAGE_SCN_ALIGN_8BYTES 0x00400000 > +#define IMAGE_SCN_ALIGN_16BYTES 0x00500000 > +#define IMAGE_SCN_ALIGN_32BYTES 0x00600000 > +#define IMAGE_SCN_ALIGN_64BYTES 0x00700000 > +#define IMAGE_SCN_ALIGN_128BYTES 0x00800000 > +#define IMAGE_SCN_ALIGN_256BYTES 0x00900000 > +#define IMAGE_SCN_ALIGN_512BYTES 0x00a00000 > +#define IMAGE_SCN_ALIGN_1024BYTES 0x00b00000 > +#define IMAGE_SCN_ALIGN_2048BYTES 0x00c00000 > +#define IMAGE_SCN_ALIGN_4096BYTES 0x00d00000 > +#define IMAGE_SCN_ALIGN_8192BYTES 0x00e00000 > +#define IMAGE_SCN_LNK_NRELOC_OVFL 0x01000000 /* extended relocations */ > +#define IMAGE_SCN_MEM_DISCARDABLE 0x02000000 /* scn can be discarded */ > +#define IMAGE_SCN_MEM_NOT_CACHED 0x04000000 /* cannot be cached */ > +#define IMAGE_SCN_MEM_NOT_PAGED 0x08000000 /* not pageable */ > +#define IMAGE_SCN_MEM_SHARED 0x10000000 /* can be shared */ > +#define IMAGE_SCN_MEM_EXECUTE 0x20000000 /* can be executed as code */ > +#define IMAGE_SCN_MEM_READ 0x40000000 /* readable */ > +#define IMAGE_SCN_MEM_WRITE 0x80000000 /* writeable */ > + > +#define IMAGE_DEBUG_TYPE_CODEVIEW 2 > + > +#ifndef __ASSEMBLY__ > + > +struct mz_hdr { > + uint16_t magic; /* MZ_MAGIC */ > + uint16_t lbsize; /* size of last used block */ > + uint16_t blocks; /* pages in file, 0x3 */ > + uint16_t relocs; /* relocations */ > + uint16_t hdrsize; /* header size in "paragraphs" */ > + uint16_t min_extra_pps; /* .bss */ > + uint16_t max_extra_pps; /* runtime limit for the arena size */ > + uint16_t ss; /* relative stack segment */ > + uint16_t sp; /* initial %sp register */ > + uint16_t checksum; /* word checksum */ > + uint16_t ip; /* initial %ip register */ > + uint16_t cs; /* initial %cs relative to load segment */ > + uint16_t reloc_table_offset; /* offset of the first relocation */ > + uint16_t overlay_num; /* overlay number. set to 0. */ > + uint16_t reserved0[4]; /* reserved */ > + uint16_t oem_id; /* oem identifier */ > + uint16_t oem_info; /* oem specific */ > + uint16_t reserved1[10]; /* reserved */ > + uint32_t peaddr; /* address of pe header */ > + char message[]; /* message to print */ > +}; We already have an instance of this struct in common/efi/pe.c. I think it wouldn't be very desirable to have two (different) instances. > +struct mz_reloc { > + uint16_t offset; > + uint16_t segment; > +}; We aren't going to need this anywhere, are we? > +struct pe_hdr { > + uint32_t magic; /* PE magic */ > + uint16_t machine; /* machine type */ > + uint16_t sections; /* number of sections */ > + uint32_t timestamp; /* time_t */ > + uint32_t symbol_table; /* symbol table offset */ > + uint32_t symbols; /* number of symbols */ > + uint16_t opt_hdr_size; /* size of optional header */ > + uint16_t flags; /* flags */ > +}; And again another (different) instance of this and further struct-s already exists. Same for the section header further down. > +/* the fact that pe32 isn't padded where pe32+ is 64-bit means union won't > + * work right. vomit. */ Noticing here in particular, but being an issue elsewhere as well: Unless this file is to be a verbatim copy taken from somewhere (in which case it should probably be introduced in a separate commit with an Origin: tag), comments want to adhere of ./CODING_STYLE. > +struct pe32_opt_hdr { > + /* "standard" header */ > + uint16_t magic; /* file type */ > + uint8_t ld_major; /* linker major version */ > + uint8_t ld_minor; /* linker minor version */ > + uint32_t text_size; /* size of text section(s) */ > + uint32_t data_size; /* size of data section(s) */ > + uint32_t bss_size; /* size of bss section(s) */ > + uint32_t entry_point; /* file offset of entry point */ > + uint32_t code_base; /* relative code addr in ram */ > + uint32_t data_base; /* relative data addr in ram */ > + /* "windows" header */ > + uint32_t image_base; /* preferred load address */ > + uint32_t section_align; /* alignment in bytes */ > + uint32_t file_align; /* file alignment in bytes */ > + uint16_t os_major; /* major OS version */ > + uint16_t os_minor; /* minor OS version */ > + uint16_t image_major; /* major image version */ > + uint16_t image_minor; /* minor image version */ > + uint16_t subsys_major; /* major subsystem version */ > + uint16_t subsys_minor; /* minor subsystem version */ > + uint32_t win32_version; /* reserved, must be 0 */ > + uint32_t image_size; /* image size */ > + uint32_t header_size; /* header size rounded up to file_align */ > + uint32_t csum; /* checksum */ > + uint16_t subsys; /* subsystem */ > + uint16_t dll_flags; /* executable characteristics */ > + uint32_t stack_size_req; /* amt of stack requested */ > + uint32_t stack_size; /* amt of stack required */ > + uint32_t heap_size_req; /* amt of heap requested */ > + uint32_t heap_size; /* amt of heap required */ > + uint32_t loader_flags; /* reserved, must be 0 */ > + uint32_t data_dirs; /* number of data dir entries */ > +}; > + > +struct pe32plus_opt_hdr { > + uint16_t magic; /* file type */ > + uint8_t ld_major; /* linker major version */ > + uint8_t ld_minor; /* linker minor version */ > + uint32_t text_size; /* size of text section(s) */ > + uint32_t data_size; /* size of data section(s) */ > + uint32_t bss_size; /* size of bss section(s) */ > + uint32_t entry_point; /* file offset of entry point */ > + uint32_t code_base; /* relative code addr in ram */ > + /* "windows" header */ > + uint64_t image_base; /* preferred load address */ > + uint32_t section_align; /* alignment in bytes */ > + uint32_t file_align; /* file alignment in bytes */ > + uint16_t os_major; /* major OS version */ > + uint16_t os_minor; /* minor OS version */ > + uint16_t image_major; /* major image version */ > + uint16_t image_minor; /* minor image version */ > + uint16_t subsys_major; /* major subsystem version */ > + uint16_t subsys_minor; /* minor subsystem version */ > + uint32_t win32_version; /* reserved, must be 0 */ > + uint32_t image_size; /* image size */ > + uint32_t header_size; /* header size rounded up to file_align */ > + uint32_t csum; /* checksum */ > + uint16_t subsys; /* subsystem */ > + uint16_t dll_flags; /* executable characteristics */ > + uint64_t stack_size_req; /* amt of stack requested */ > + uint64_t stack_size; /* amt of stack required */ > + uint64_t heap_size_req; /* amt of heap requested */ > + uint64_t heap_size; /* amt of heap required */ > + uint32_t loader_flags; /* reserved, must be 0 */ > + uint32_t data_dirs; /* number of data dir entries */ > +}; > + > +struct data_dirent { > + uint32_t virtual_address; /* relative to load address */ > + uint32_t size; > +}; Will we need this and ... > +struct data_directory { > + struct data_dirent exports; /* .edata */ > + struct data_dirent imports; /* .idata */ > + struct data_dirent resources; /* .rsrc */ > + struct data_dirent exceptions; /* .pdata */ > + struct data_dirent certs; /* certs */ > + struct data_dirent base_relocations; /* .reloc */ > + struct data_dirent debug; /* .debug */ > + struct data_dirent arch; /* reservered */ > + struct data_dirent global_ptr; /* global pointer reg. Size=0 */ > + struct data_dirent tls; /* .tls */ > + struct data_dirent load_config; /* load configuration structure */ > + struct data_dirent bound_imports; /* no idea */ > + struct data_dirent import_addrs; /* import address table */ > + struct data_dirent delay_imports; /* delay-load import table */ > + struct data_dirent clr_runtime_hdr; /* .cor (object only) */ > + struct data_dirent reserved; > +}; ... this? > +struct section_header { > + char name[8]; /* name or string tbl offset */ > + uint32_t virtual_size; /* size of loaded section in ram */ > + uint32_t virtual_address; /* relative virtual address */ > + uint32_t raw_data_size; /* size of the section */ > + uint32_t data_addr; /* file pointer to first page of sec */ > + uint32_t relocs; /* file pointer to relocation entries */ > + uint32_t line_numbers; /* line numbers */ > + uint16_t num_relocs; /* number of relocations */ > + uint16_t num_lin_numbers; /* COFF line count. */ > + uint32_t flags; > +}; > + > +enum x64_coff_reloc_type { > + IMAGE_REL_AMD64_ABSOLUTE = 0, > + IMAGE_REL_AMD64_ADDR64, > + IMAGE_REL_AMD64_ADDR32, > + IMAGE_REL_AMD64_ADDR32N, > + IMAGE_REL_AMD64_REL32, > + IMAGE_REL_AMD64_REL32_1, > + IMAGE_REL_AMD64_REL32_2, > + IMAGE_REL_AMD64_REL32_3, > + IMAGE_REL_AMD64_REL32_4, > + IMAGE_REL_AMD64_REL32_5, > + IMAGE_REL_AMD64_SECTION, > + IMAGE_REL_AMD64_SECREL, > + IMAGE_REL_AMD64_SECREL7, > + IMAGE_REL_AMD64_TOKEN, > + IMAGE_REL_AMD64_SREL32, > + IMAGE_REL_AMD64_PAIR, > + IMAGE_REL_AMD64_SSPAN32, > +}; > + > +enum arm_coff_reloc_type { > + IMAGE_REL_ARM_ABSOLUTE, > + IMAGE_REL_ARM_ADDR32, > + IMAGE_REL_ARM_ADDR32N, > + IMAGE_REL_ARM_BRANCH2, > + IMAGE_REL_ARM_BRANCH1, > + IMAGE_REL_ARM_SECTION, > + IMAGE_REL_ARM_SECREL, > +}; > + > +enum sh_coff_reloc_type { > + IMAGE_REL_SH3_ABSOLUTE, > + IMAGE_REL_SH3_DIRECT16, > + IMAGE_REL_SH3_DIRECT32, > + IMAGE_REL_SH3_DIRECT8, > + IMAGE_REL_SH3_DIRECT8_WORD, > + IMAGE_REL_SH3_DIRECT8_LONG, > + IMAGE_REL_SH3_DIRECT4, > + IMAGE_REL_SH3_DIRECT4_WORD, > + IMAGE_REL_SH3_DIRECT4_LONG, > + IMAGE_REL_SH3_PCREL8_WORD, > + IMAGE_REL_SH3_PCREL8_LONG, > + IMAGE_REL_SH3_PCREL12_WORD, > + IMAGE_REL_SH3_STARTOF_SECTION, > + IMAGE_REL_SH3_SIZEOF_SECTION, > + IMAGE_REL_SH3_SECTION, > + IMAGE_REL_SH3_SECREL, > + IMAGE_REL_SH3_DIRECT32_NB, > + IMAGE_REL_SH3_GPREL4_LONG, > + IMAGE_REL_SH3_TOKEN, > + IMAGE_REL_SHM_PCRELPT, > + IMAGE_REL_SHM_REFLO, > + IMAGE_REL_SHM_REFHALF, > + IMAGE_REL_SHM_RELLO, > + IMAGE_REL_SHM_RELHALF, > + IMAGE_REL_SHM_PAIR, > + IMAGE_REL_SHM_NOMODE, > +}; > + > +enum ppc_coff_reloc_type { > + IMAGE_REL_PPC_ABSOLUTE, > + IMAGE_REL_PPC_ADDR64, > + IMAGE_REL_PPC_ADDR32, > + IMAGE_REL_PPC_ADDR24, > + IMAGE_REL_PPC_ADDR16, > + IMAGE_REL_PPC_ADDR14, > + IMAGE_REL_PPC_REL24, > + IMAGE_REL_PPC_REL14, > + IMAGE_REL_PPC_ADDR32N, > + IMAGE_REL_PPC_SECREL, > + IMAGE_REL_PPC_SECTION, > + IMAGE_REL_PPC_SECREL16, > + IMAGE_REL_PPC_REFHI, > + IMAGE_REL_PPC_REFLO, > + IMAGE_REL_PPC_PAIR, > + IMAGE_REL_PPC_SECRELLO, > + IMAGE_REL_PPC_GPREL, > + IMAGE_REL_PPC_TOKEN, > +}; > + > +enum x86_coff_reloc_type { > + IMAGE_REL_I386_ABSOLUTE, > + IMAGE_REL_I386_DIR16, > + IMAGE_REL_I386_REL16, > + IMAGE_REL_I386_DIR32, > + IMAGE_REL_I386_DIR32NB, > + IMAGE_REL_I386_SEG12, > + IMAGE_REL_I386_SECTION, > + IMAGE_REL_I386_SECREL, > + IMAGE_REL_I386_TOKEN, > + IMAGE_REL_I386_SECREL7, > + IMAGE_REL_I386_REL32, > +}; > + > +enum ia64_coff_reloc_type { > + IMAGE_REL_IA64_ABSOLUTE, > + IMAGE_REL_IA64_IMM14, > + IMAGE_REL_IA64_IMM22, > + IMAGE_REL_IA64_IMM64, > + IMAGE_REL_IA64_DIR32, > + IMAGE_REL_IA64_DIR64, > + IMAGE_REL_IA64_PCREL21B, > + IMAGE_REL_IA64_PCREL21M, > + IMAGE_REL_IA64_PCREL21F, > + IMAGE_REL_IA64_GPREL22, > + IMAGE_REL_IA64_LTOFF22, > + IMAGE_REL_IA64_SECTION, > + IMAGE_REL_IA64_SECREL22, > + IMAGE_REL_IA64_SECREL64I, > + IMAGE_REL_IA64_SECREL32, > + IMAGE_REL_IA64_DIR32NB, > + IMAGE_REL_IA64_SREL14, > + IMAGE_REL_IA64_SREL22, > + IMAGE_REL_IA64_SREL32, > + IMAGE_REL_IA64_UREL32, > + IMAGE_REL_IA64_PCREL60X, > + IMAGE_REL_IA64_PCREL60B, > + IMAGE_REL_IA64_PCREL60F, > + IMAGE_REL_IA64_PCREL60I, > + IMAGE_REL_IA64_PCREL60M, > + IMAGE_REL_IA64_IMMGPREL6, > + IMAGE_REL_IA64_TOKEN, > + IMAGE_REL_IA64_GPREL32, > + IMAGE_REL_IA64_ADDEND, > +}; All sorts of relocation types, but none for RISC-V? Are we going to need any of this? > +struct coff_reloc { > + uint32_t virtual_address; > + uint32_t symbol_table_index; > + > + union { > + enum x64_coff_reloc_type x64_type; > + enum arm_coff_reloc_type arm_type; > + enum sh_coff_reloc_type sh_type; > + enum ppc_coff_reloc_type ppc_type; > + enum x86_coff_reloc_type x86_type; > + enum ia64_coff_reloc_type ia64_type; > + uint16_t data; > + }; > +}; > + > +/* > + * Definitions for the contents of the certs data block > + */ > +#define WIN_CERT_TYPE_PKCS_SIGNED_DATA 0x0002 > +#define WIN_CERT_TYPE_EFI_OKCS115 0x0EF0 > +#define WIN_CERT_TYPE_EFI_GUID 0x0EF1 > + > +#define WIN_CERT_REVISION_1_0 0x0100 > +#define WIN_CERT_REVISION_2_0 0x0200 > + > +struct win_certificate { > + uint32_t length; > + uint16_t revision; > + uint16_t cert_type; > +}; Or any of this? Jan
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |