source: trunk/kLdr/kLdrInternal.h@ 2875

Last change on this file since 2875 was 2875, checked in by bird, 19 years ago

Got the stub loader working (but without stack allocation/switching).

  • Property svn:keywords set to Id
File size: 14.9 KB
Line 
1/* $Id: kLdrInternal.h 2875 2006-11-12 08:59:45Z bird $ */
2/** @file
3 *
4 * kLdr - The Dynamic Loader, internal header.
5 *
6 * Copyright (c) 2006 knut st. osmundsen <bird-kbuild-src@anduin.net>
7 *
8 *
9 * This file is part of kLdr.
10 *
11 * kLdr is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * kLdr is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with kLdr; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 *
25 */
26
27
28#ifndef __kLdrInternal_h__
29#define __kLdrInternal_h__
30
31#ifdef __cplusplus
32extern "C" {
33#endif
34
35/* ignore definitions in winnt.h */
36#undef IMAGE_DOS_SIGNATURE
37#undef IMAGE_NT_SIGNATURE
38
39/** @name Signatures we know
40 * @{ */
41/** ELF signature ("\x7fELF"). */
42#define IMAGE_ELF_SIGNATURE KLDRHLP_LE2H_U32(0x7f | ('E' << 8) | ((uint32_t)'L' << 16) | ((uint32_t)'F' << 24))
43/** PE signature ("PE\0\0"). */
44#define IMAGE_NT_SIGNATURE KLDRHLP_LE2H_U32('P' | ('E' << 8))
45/** LX signature ("LX") */
46#define IMAGE_LX_SIGNATURE KLDRHLP_LE2H_U16('L' | ('X' << 8))
47/** LE signature ("LE") */
48#define IMAGE_LE_SIGNATURE KLDRHLP_LE2H_U16('L' | ('E' << 8))
49/** NE signature ("NE") */
50#define IMAGE_NE_SIGNATURE KLDRHLP_LE2H_U16('N' | ('E' << 8))
51/** MZ signature ("MZ"). */
52#define IMAGE_DOS_SIGNATURE KLDRHLP_LE2H_U16('M' | ('Z' << 8))
53/** @} */
54
55/** @defgroup grp_kLdrInternal Internals
56 * @internal
57 * @{
58 */
59
60
61/** Native file provider operations. */
62extern const KLDRRDROPS g_kLdrRdrFileOps;
63
64
65/**
66 * The state of a dynamic loader module.
67 * @image html KLDRSTATE.gif "The state diagram"
68 */
69typedef enum KLDRSTATE
70{
71 /** The usual invalid 0 enum. */
72 KLDRSTATE_INVALID = 0,
73
74 /** The module has just been opened and linked into the load list.
75 *
76 * Prev state: -
77 * Next state: MAPPED, PENDING_DESTROY
78 */
79 KLDRSTATE_OPEN,
80
81 /** The module segments has been mapped into the process memory.
82 *
83 * Prev state: OPEN
84 * Next state: LOADED_PREREQUISITES, PENDING_DESTROY
85 */
86 KLDRSTATE_MAPPED,
87 /** The module has been reloaded and needs to be fixed up again.
88 * This can occure when the loader is called recursivly.
89 *
90 * The reason RELOADED modules must go back to the PENDING_GC state is
91 * because we want to guard against uninit order issues, and therefore
92 * doesn't unmap modules untill all pending termintation callbacks has
93 * been executed.
94 *
95 * Prev state: PENDING_GC
96 * Next state: RELOADED_LOADED_PREREQUISITES, PENDING_GC
97 */
98 KLDRSTATE_RELOADED,
99
100 /** The immediate prerequisites have been loaded.
101 *
102 * Prev state: MAPPED
103 * Next state: FIXED_UP, PENDING_DESTROY
104 */
105 KLDRSTATE_LOADED_PREREQUISITES,
106 /** The immediate prerequisites have been loaded for a reloaded module.
107 *
108 * Prev state: RELOADED
109 * Next state: RELOADED_FIXED_UP, PENDING_GC
110 */
111 KLDRSTATE_RELOADED_LOADED_PREREQUISITES,
112
113 /** Fixups has been applied.
114 *
115 * Prev state: LOADED_PREREQUISITES
116 * Next state: PENDING_INITIALIZATION, PENDING_DESTROY
117 */
118 KLDRSTATE_FIXED_UP,
119 /** Fixups has been applied.
120 *
121 * Prev state: RELOADED_LOADED_PREREQUISITES
122 * Next state: PENDING_INITIALIZATION, PENDING_GC
123 */
124 KLDRSTATE_RELOADED_FIXED_UP,
125
126 /** Pending initialization.
127 * While the module is in this state the loader is in reentrant mode.
128 *
129 * Prev state: FIXED_UP, RELOADED_FIXED_UP
130 * Next state: INITIALIZATION, PENDING_GC
131 */
132 KLDRSTATE_PENDING_INITIALIZATION,
133
134 /** Initializing.
135 * While the module is in this state the loader is in reentrant mode.
136 *
137 * Prev state: PENDING_INITIALIZATION
138 * Next state: GOOD, PENDING_GC
139 */
140 KLDRSTATE_INITIALIZING,
141
142 /** Initialization failed.
143 *
144 * This is somewhat similar to PENDING_GC except that, a module
145 * in this state cannot be reloaded untill we've done GC. This ensures
146 * that a init failure during recursive loading is propagated up.
147 *
148 * While the module is in this state the loader is in reentrant mode.
149 *
150 * Prev state: INITIALIZING
151 * Next state: GC
152 */
153 KLDRSTATE_INITIALIZATION_FAILED,
154
155 /** The module has been successfully loaded and initialized.
156 * While the module is in this state the loader can be in reentrant
157 * or 'unused' mode.
158 *
159 * Prev state: INITIALIZING
160 * Next state: PENDING_TERMINATION
161 */
162 KLDRSTATE_GOOD,
163
164 /** Pending termination, reference count is 0.
165 * While the module is in this state the loader is in reentrant mode.
166 * Prerequisite modules are dropped when a module enters this state.
167 *
168 * Prev state: GOOD
169 * Next state: TERMINATING, GOOD
170 */
171 KLDRSTATE_PENDING_TERMINATION,
172
173 /** Terminating, reference count is still 0.
174 * While the module is in this state the loader is in reentrant mode.
175 *
176 * Prev state: PENDING_TERMINATION
177 * Next state: PENDING_GC
178 */
179 KLDRSTATE_TERMINATING,
180
181 /** Pending garbage collection.
182 * Prerequisite modules are dropped when a module enters this state (if not done already).
183 *
184 * Prev state: TERMINATING, PENDING_INITIALIZATION, INITIALIZATION_FAILED
185 * Next state: GC, RELOADED
186 */
187 KLDRSTATE_PENDING_GC,
188
189 /** Being garbage collected.
190 *
191 * Prev state: PENDING_GC, INITIALIZATION_FAILED
192 * Next state: PENDING_DESTROY, DESTROYED
193 */
194 KLDRSTATE_GC,
195
196 /** The module has be unlinked, but there are still stack references to it.
197 *
198 * Prev state: GC, FIXED_UP, LOADED_PREREQUISITES, MAPPED, OPEN
199 * Next state: DESTROYED
200 */
201 KLDRSTATE_PENDING_DESTROY,
202
203 /** The module has been destroyed but not freed yet.
204 *
205 * This happens when a module ends up being destroyed when cRefs > 0. The
206 * module structure will be freed when cRefs reaches 0.
207 *
208 * Prev state: GC, PENDING_DESTROY
209 */
210 KLDRSTATE_DESTROYED,
211
212 /** The end of valid states (exclusive) */
213 KLDRSTATE_END = KLDRSTATE_DESTROYED,
214 /** The usual 32-bit blowup. */
215 KLDRSTATE_32BIT_HACK = 0x7fffffff
216} KLDRSTATE;
217
218
219/**
220 * Dynamic loader module.
221 */
222typedef struct KLDRDYLDMOD
223{
224 /** Magic number. */
225 uint32_t u32MagicHead;
226 /** The module state. */
227 KLDRSTATE enmState;
228 /** The module. */
229 PKLDRMOD pMod;
230 /** The module handle. */
231 HKLDRMOD hMod;
232 /** The total number of references. */
233 uint32_t cRefs;
234 /** The number of dependency references. */
235 uint32_t cDepRefs;
236 /** The number of dynamic load references. */
237 uint32_t cDynRefs;
238 /** Set if this is the executable module.
239 * When clear, the module is a shared object or relocatable object. */
240 uint32_t fExecutable : 1;
241 /** Global DLL (set) or specific DLL (clear). */
242 uint32_t fGlobalOrSpecific : 1;
243 /** Whether the module contains bindable symbols in the global unix namespace. */
244 uint32_t fBindable : 1;
245 /** Set if linked into the global init list. */
246 uint32_t fInitList : 1;
247 /** Already loaded or checked prerequisites.
248 * This flag is used when loading prerequisites, when set it means that
249 * this module is already seen and shouldn't be processed again. */
250 uint32_t fAlreadySeen : 1;
251 /** Set if the module is currently mapped.
252 * This is used to avoid unnecessary calls to kLdrModUnmap during cleanup. */
253 uint32_t fMapped : 1;
254 /** Set if TLS allocation has been done. (part of the mapping). */
255 uint32_t fAllocatedTLS : 1;
256 /** Reserved for future use. */
257 uint32_t f25Reserved : 25;
258 /** The load list linkage. */
259 struct
260 {
261 /** The next module in the list. */
262 struct KLDRDYLDMOD *pNext;
263 /** The prev module in the list. */
264 struct KLDRDYLDMOD *pPrev;
265 } Load;
266 /** The initialization and termination list linkage.
267 * If non-recursive initialization is used, the module will be pushed on
268 * the initialization list.
269 * A module will be linked into the termination list upon a successful
270 * return from module initialization. */
271 struct
272 {
273 /** The next module in the list. */
274 struct KLDRDYLDMOD *pNext;
275 /** The prev module in the list. */
276 struct KLDRDYLDMOD *pPrev;
277 } InitTerm;
278 /** The bind order list linkage.
279 * The module is not in this list when fBindable is clear. */
280 struct
281 {
282 /** The next module in the list. */
283 struct KLDRDYLDMOD *pNext;
284 /** The prev module in the list. */
285 struct KLDRDYLDMOD *pPrev;
286 } Bind;
287
288 /** The number of prerequisite modules in the prereq array. */
289 uint32_t cPrereqs;
290 /** Pointer to an array of prerequisite module pointers.
291 * This array is only filled when in the states starting with
292 * KLDRSTATE_LOADED_PREREQUISITES thru KLDRSTATE_GOOD.
293 */
294 struct KLDRDYLDMOD **papPrereqs;
295
296 /** Magic number. */
297 uint32_t u32MagicTail;
298} KLDRDYLDMOD, *PKLDRDYLDMOD, **PPKLDRDYLDMOD;
299
300/** KLDRDYLDMOD magic value. (Fuyumi Soryo) */
301#define KLDRDYMOD_MAGIC 0x19590106
302
303/** Return / crash validation of a module handle argument. */
304#define KLDRDYLD_VALIDATE_HKLDRMOD(hMod) \
305 do { \
306 if ( (hMod) == NIL_HKLDRMOD \
307 || (hMod)->u32MagicHead != KLDRDYMOD_MAGIC \
308 || (hMod)->u32MagicTail != KLDRDYMOD_MAGIC) \
309 { \
310 return KLDR_ERR_INVALID_HANDLE; \
311 } \
312 } while (0)
313
314
315int kldrInit(void);
316void kldrTerm(void);
317
318int kldrDyldInit(void);
319void kldrDyldTerm(void);
320
321void kldrDyldDoLoadExe(PKLDRDYLDMOD pExe);
322int kldrDyldFailure(int rc, const char *pszFormat, ...);
323
324int kldrDyldOSStartExe(uintptr_t uMainEntrypoint, void *pvStack, size_t cbStack);
325void *kldrDyldOSAllocStack(size_t cb);
326
327int kldrDyldFindInit(void);
328int kldrDyldFindNewModule(const char *pszName, const char *pszPrefix, const char *pszSuffix,
329 KLDRDYLDSEARCH enmSearch, unsigned fFlags, PPKLDRDYLDMOD ppMod);
330int kldrDyldFindExistingModule(const char *pszName, const char *pszPrefix, const char *pszSuffix,
331 KLDRDYLDSEARCH enmSearch, unsigned fFlags, PPKLDRDYLDMOD ppMod);
332
333int kldrDyldGetPrerequisite(const char *pszDll, const char *pszPrefix, const char *pszSuffix, KLDRDYLDSEARCH enmSearch,
334 unsigned fFlags, PKLDRDYLDMOD pDep, PPKLDRDYLDMOD ppMod);
335
336
337int kldrDyldModCreate(PKLDRRDR pRdr, uint32_t fFlags, PPKLDRDYLDMOD ppMod);
338void kldrDyldModDestroy(PKLDRDYLDMOD pMod);
339void kldrDyldModAddRef(PKLDRDYLDMOD pMod);
340void kldrDyldModDeref(PKLDRDYLDMOD pMod);
341void kldrDyldModAddDep(PKLDRDYLDMOD pMod, PKLDRDYLDMOD pDep);
342void kldrDyldModRemoveDep(PKLDRDYLDMOD pMod, PKLDRDYLDMOD pDep);
343int kldrDyldModDynamicLoad(PKLDRDYLDMOD pMod);
344int kldrDyldModDynamicUnload(PKLDRDYLDMOD pMod);
345void kldrDyldModMarkGlobal(PKLDRDYLDMOD pMod);
346void kldrDyldModMarkSpecific(PKLDRDYLDMOD pMod);
347void kldrDyldModSetBindable(PKLDRDYLDMOD pMod, unsigned fDeep);
348void kldrDyldModClearBindable(PKLDRDYLDMOD pMod);
349int kldrDyldModMap(PKLDRDYLDMOD pMod);
350int kldrDyldModUnmap(PKLDRDYLDMOD pMod);
351int kldrDyldModLoadPrerequisites(PKLDRDYLDMOD pMod, const char *pszPrefix, const char *pszSuffix,
352 KLDRDYLDSEARCH enmSearch, unsigned fFlags);
353int kldrDyldModCheckPrerequisites(PKLDRDYLDMOD pMod);
354void kldrDyldModUnloadPrerequisites(PKLDRDYLDMOD pMod);
355int kldrDyldModFixup(PKLDRDYLDMOD pMod);
356int kldrDyldModCallInit(PKLDRDYLDMOD pMod);
357void kldrDyldModCallTerm(PKLDRDYLDMOD pMod);
358int kldrDyldModReload(PKLDRDYLDMOD pMod);
359int kldrDyldModAttachThread(PKLDRDYLDMOD pMod);
360void kldrDyldModDetachThread(PKLDRDYLDMOD pMod);
361int kldrDyldModGetMainStack(PKLDRDYLDMOD pMod, void **ppvStack, size_t *pcbStack);
362int kldrDyldModStartExe(PKLDRDYLDMOD pMod);
363
364int kldrDyldModGetName(PKLDRDYLDMOD pMod, char *pszName, size_t cchName);
365int kldrDyldModGetFilename(PKLDRDYLDMOD pMod, char *pszFilename, size_t cchFilename);
366int kldrDyldModQuerySymbol(PKLDRDYLDMOD pMod, uint32_t uSymbolOrdinal, const char *pszSymbolName, uintptr_t *puValue, uint32_t *pfKind);
367
368
369/** Pointer to the head module (the executable).
370 * (This is exported, so no prefix.) */
371extern PKLDRDYLDMOD kLdrDyldHead;
372/** Pointer to the tail module.
373 * (This is exported, so no prefix.) */
374extern PKLDRDYLDMOD kLdrDyldTail;
375/** Pointer to the head module of the initialization list.
376 * The outermost load call will pop elements from this list in LIFO order (i.e.
377 * from the tail). The list is only used during non-recursive initialization
378 * and may therefore share the pNext/pPrev members with the termination list
379 * since we don't push a module onto the termination list untill it has been
380 * successfully initialized. */
381extern PKLDRDYLDMOD g_pkLdrDyldInitHead;
382/** Pointer to the tail module of the initalization list. */
383extern PKLDRDYLDMOD g_pkLdrDyldInitTail;
384/** Pointer to the head module of the termination order list. */
385extern PKLDRDYLDMOD g_pkLdrDyldTermHead;
386/** Pointer to the tail module of the termination order list. */
387extern PKLDRDYLDMOD g_pkLdrDyldTermTail;
388/** Pointer to the head module of the bind order list.
389 * The modules in this list makes up the global namespace used when binding symbol unix fashion. */
390extern PKLDRDYLDMOD g_pkLdrDyldBindHead;
391/** Pointer to the tail module of the bind order list. */
392extern PKLDRDYLDMOD g_pkLdrDyldBindTail;
393
394/** Indicates that the other MainStack globals have been filled in. */
395extern unsigned g_fkLdrDyldDoneMainStack;
396/** Whether the stack was allocated seperatly or was part of the executable. */
397extern unsigned g_fkLdrDyldMainStackAllocated;
398/** Pointer to the main stack object. */
399extern void *g_pvkLdrDyldMainStack;
400/** The size of the main stack object. */
401extern size_t g_cbkLdrDyldMainStack;
402
403/** The global error buffer. */
404extern char g_szkLdrDyldError[1024];
405
406extern char kLdrDyldExePath[8192];
407extern char kLdrDyldLibraryPath[8192];
408extern char kLdrDyldDefPrefix[16];
409extern char kLdrDyldDefSuffix[16];
410
411extern int g_fBootstrapping;
412
413
414/** @name Module interpreter method tables
415 * @{ */
416extern KLDRMODOPS g_kLdrModPEOps;
417/** @} */
418
419/** @} */
420#ifdef __cplusplus
421}
422#endif
423
424#endif
Note: See TracBrowser for help on using the repository browser.