Interfacing with ELF files An introduction to the Executable file specification standard

advertisement
Interfacing with ELF files
An introduction to the Executable
and Linkable Format (ELF) binary
file specification standard
Overview of source translation
User-created files
Makefile
Make Utility
C/C++
C/C++Source
Source
and
Header
and Header
Files
Files
assembler
Object
Object
Files
Files
Archive Utility
Shared
Object
File
Linker
Script
File
preprocessor
compiler
Library
Library
Files
Files
Assembly
Assembly
Source
Source
Files
Files
Linker and Locator
Linkable
Image File
Executable
Image File
Link Map
File
Executable versus Linkable
ELF Header
ELF Header
Program-Header Table
(optional)
Program-Header Table
Section 1 Data
Segment 1 Data
Section 2 Data
Segment 2 Data
Section 3 Data
Segment 3 Data
…
Section n Data
…
Segment n Data
Section-Header Table
Section-Header Table
(optional)
Linkable File
Executable File
Role of the Linker
ELF Header
Section 1 Data
Section 2 Data
…
Section n Data
ELF Header
Program-Header Table
Segment 1 Data
Section-Header Table
Linkable File
Segment 2 Data
ELF Header
…
Segment n Data
Section 1 Data
Section 2 Data
…
Section n Data
Section-Header Table
Linkable File
Executable File
ELF Header
e_ident [ EI_NIDENT ]
e_type
e_machine
e_shoff
e_version
e_flags
e_entry
e_phoff
e_ehsize e_phentsize e_phnum e_shentsize
e_shnum e_shstrndx
Section-Header Table: e_shoff, e_shentsize, e_shnum, e_shstrndx
Program-Header Table: e_phoff, e_phentsize, e_phnum, e_entry
Section-Headers
sh_name
sh_type
sh_flags
sh_addr
sh_offset
sh_size
sh_link
sh_info
sh_addralign
sh_entsize
Program-Headers
p_type
p_offset
p_vaddr
p_paddr
p_filesz
p_memsz
p_flags
p_align
Official ELF documentation
• The official document that describes ELF
file-formats for both the ‘linkable’ and the
‘executable’ files is available online on our
CS630 course website (see ‘Resources’)
• (Recently this document has been revised
to accommodate programs that will run on
platforms that implement 64-bit addresses
and processor registers)
Memory: Physical vs. Virtual
Portions of physical memory
are “mapped” by the CPU
into regions of each task’s
‘virtual’ address-space
Virtual
Address
Space
(4 GB)
Physical
address space
(2 GB)
Linux ‘Executable’ ELF files
• The Executable ELF files produced by the
Linux linker are configured for execution in
a private ‘virtual’ address space, whereby
every program gets loaded at the identical
virtual memory-address (i.e., 0x08048000)
• We will soon study the Pentium’s paging
mechanism which makes this possible
(i.e., after we have finished Project #1)
Linux ‘Linkable’ ELF files
• But it is possible that some ‘linkable’ ELF
files are self-contained (i.e., they may not
need to be linked with other object-files or
shared libraries)
• Our ‘manydots.o’ is one such example
• So we can write our own system-code that
can execute the instructions contained in a
stand-alone ‘linkable’ object-module, using
the CPU’s ‘segmented’ physical memory
Our ‘loadmap.cpp’ utility
• We created a tool that ‘parses’ a linkable
ELF file, to identify each section’s length,
type, and location within the object-module
• For those sections containing the ‘text’ and
‘data’ for the program, we build segmentdescriptors, based on where the linkable
image-file will reside in physical memory
32-bit versus 16-bit code
• The Linux compilers, and the ‘as’ assembler,
produce object-files that are intended to reside
in ’32-bit’ memory-segments (i.e., the ‘default’ bit
in the segment-descriptor is set to 1)
• This affects the CPU’s interpretation of all the
machine-instructions that it fetches
• Our ‘as’ assembler can produce either 16-bit or
32-bit code (although its default is 32-bit code)
• We can employ ‘.code32’ or ‘.code16’ directives
Example: ‘as’ Listing
0x0000
01 D8
0x0002 66 01 D8
0x0005
90
.code32
add %eax, %ebx
add %ax, %bx
nop
0x0006 66 01 D8
0x0009
01 D8
0x000B
90
.code16
add %eax, %ebx
add %ax, %bx
nop
.end
Demo-program
• We created a Linux program (‘hello.s’) that
invokes two system-calls (‘write’ and ‘exit’)
• We assembled it with the ‘as’ assembler:
$ as hello.s –o hello.o
• This linkable ELF object-file ‘hello.o’ should then
be written to our hard disk partition (‘/dev/sda4’)
at sector address 13, using the Linux ‘dd’ utility:
$ dd if=hello.o of=/dev/sda4
seek=13
• So it will get loaded into memory by ‘quikload’
Memory-Map
Loaded into ram
from sectors 1..16
of disk-partition
by our ‘quikload.b’
program-loader
‘quikload.b’ reads from
CS630 disk partition via
ROM-BIOS bootstrap
‘hello.o’ image
0x00011800
‘try32bit.b’
image
0x00010000
BOOT-LOADER
0x00007C00
ROM-BIOS DATA
IVT
0x00000400
Segment Descriptors
• We created 32-bit segment-descriptors for
the ‘text’ and ‘data’ sections of ‘hello.o’ (in
a Local Descriptor Table) with DPL=3
• For the ‘.text’ section:
offset in ELF file = 0x34 size = 0x23
• So its segment-descriptor is:
.word 0x0023, 0x1834, 0xFA01, 0x0040
(base-address = load-address + file-offset)
Descriptors (continued)
• For the ‘.data’ section:
offset in ELF file = 0x58 size = 0x0D
• So its segment-descriptor is:
.word 0x000D, 0x1858, 0xF201, 0x0040
(base-address = load-address + file-offset)
• For the ring3 stack (not part of ELF file):
.word 0x0FFF, 0x2100, 0xF201, 0x0040
Task-State Segment
• Because any system-calls (via int 0x80)
will cause privilege-level transitions, we
will need to setup a Task-State Segment
(to store the ring0 stacktop pointer)
theTSS: .long 0, 0, 0 # 3 longwords
• Its segment-descriptor goes into our GDT:
.word 0x000B, theTSS, 0x8901, 0x0000
Transition to Ring 3
• Recall that we use ‘lret’ to enter ring 3:
pushw
$userSS
pushw
$0x1000
pushw
$userCS
pushw
$0x0000
lret
(NOTE: This assumes we are coming from
a 16-bit code-segment in protected-mode)
System-Call Dispatcher
• All system-calls are ‘vectored’ through IDT
interrupt-gate 0x80
• For ‘hello.o’ we only require implementing
two system-calls: ‘exit’ and ‘write’
• But to simplify future enhancements, we
used a ‘jump-table’ anyway (for now it has
a few ‘dummy’ entries that we can modify
later)
System-Call ID-numbers
• System-call ID #0 (it will never be needed)
• System-call ID #1 is for ‘exit’ (required)
• System-call ID #2 is for ‘fork’ (deferred)
• System-call ID #3 is for ‘read’ (deferred)
• System-call ID #4 is for ‘write’ (required)
• System-call ID #5 is for ‘open’ (deferred)
• System-call ID #6 is for ‘close’ (deferred)
(NOTE: over 200 system-calls exist in Linux)
Defining our jump-table
sys_call_table:
.long do_nothing
# for service 0
.long do_exit
# for service 1
.long do_nothing
# for service 2
.long do_nothing
# for service 3
.long do_write
# for service 4
.equ NR_SYS_CALLS, ( . - sys_call_table)/4
Setting up IDT Gate 0x80
• The Descriptor Privilege Level must be 3
• The Gate-Type should be ‘386 Trap-Gate’
• The entry-point will be our ‘isrSVC’ label
# Interrupt Descriptor Table’s entry for SuperVisor Call (int $0x80)
mov
lea
movw
movw
movw
movw
$0x80, %ebx
theIDT(, %ebx, 8), %edi
$isrSVC, 0(%edi)
$sel_CS, 2(%edi)
$0xEF00, 4(%edi)
$0x0000, 6(%edi)
# table-entry array-index
# descriptor offset-address
# entry-point offset’s loword
# selector for code-segment
# Gate-Type: 386 Trap-Gate
# entry-point offset’s hiword
Using our jump-table
isrSVC:
idok:
# service-number is found in EAX
cmp $NR_SYS_CALLS, %eax
jb
idok
xor %eax, %eax
jmp *sys_call_table(, eax, 4)
Our ‘exit’ service
• When the application invokes the ‘exit’
system-call, our mini ‘operating system’
should leave protected-mode and return
back to our boot-loader program
• The ‘exit-code’ parameter (in %ebx) may
just as well be discarded (since this isn’t
yet a multitasking operating-system)
Our ‘write’ service
• We only implement writing to the STDOUT
device (i.e., the video display terminal)
• For most characters in the user’s buffer,
we just write the ascii-code (and standard
display-attribute) directly to video memory
at the current cursor-location and advance
the cursor (scrolling the screen if needed)
• Special ascii control-codes (‘\n’, ‘\r’, ‘\b’)
are treated differently, as on a TTY device
In-Class Exercise
• The ‘manydots.s’ demo (to be used with
Project #1) uses the ‘read’ system-call (in
addition to the ‘write’ and ‘exit’ services)
• However, you could still ‘execute’ it using
the ‘try32bit.s’ mini operating-stem, letting
the ‘read’ service simply “do nothing” (or
return with “hard-coded” buffer-contents)
• Just modify the LDT descriptors so they
conform to the sections in ‘manydots.o’
Download