/* SPDX-License-Identifier: LGPL-2.1-or-later */ /* * Copyright (C) 2019, Google Inc. * * ipa_module.cpp - Image Processing Algorithm module */ #include "ipa_module.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include "log.h" #include "pipeline_handler.h" #include "utils.h" /** * \file ipa_module.h * \brief Image Processing Algorithm module */ /** * \file ipa_module_info.h * \brief Image Processing Algorithm module information */ namespace libcamera { LOG_DEFINE_CATEGORY(IPAModule) namespace { template typename std::remove_extent::type *elfPointer(void *map, off_t offset, size_t fileSize, size_t objSize) { size_t size = offset + objSize; if (size > fileSize || size < objSize) return nullptr; return reinterpret_cast::type *> (static_cast(map) + offset); } template typename std::remove_extent::type *elfPointer(void *map, off_t offset, size_t fileSize) { return elfPointer(map, offset, fileSize, sizeof(T)); } int elfVerifyIdent(void *map, size_t soSize) { char *e_ident = elfPointer(map, 0, soSize); if (!e_ident) return -ENOEXEC; if (e_ident[EI_MAG0] != ELFMAG0 || e_ident[EI_MAG1] != ELFMAG1 || e_ident[EI_MAG2] != ELFMAG2 || e_ident[EI_MAG3] != ELFMAG3 || e_ident[EI_VERSION] != EV_CURRENT) return -ENOEXEC; int bitClass = sizeof(unsigned long) == 4 ? ELFCLASS32 : ELFCLASS64; if (e_ident[EI_CLASS] != bitClass) return -ENOEXEC; int a = 1; unsigned char endianness = *reinterpret_cast(&a) == 1 ? ELFDATA2LSB : ELFDATA2MSB; if (e_ident[EI_DATA] != endianness) return -ENOEXEC; return 0; } /** * \brief Retrieve address and size of a symbol from an mmap'ed ELF file * \param[in] map Address of mmap'ed ELF file * \param[in] soSize Size of mmap'ed ELF file (in bytes) * \param[in] symbol Symbol name * * \return zero or error code, address or nullptr, size of symbol or zero, * respectively */ std::tuple elfLoadSymbol(void *map, size_t soSize, const char *symbol) { ElfW(Ehdr) *eHdr = elfPointer(map, 0, soSize); if (!eHdr) return std::make_tuple(nullptr, 0); off_t offset = eHdr->e_shoff + eHdr->e_shentsize * eHdr->e_shstrndx; ElfW(Shdr) *sHdr = elfPointer(map, offset, soSize); if (!sHdr) return std::make_tuple(nullptr, 0); off_t shnameoff = sHdr->sh_offset; /* Locate .dynsym section header. */ ElfW(Shdr) *dynsym = nullptr; for (unsigned int i = 0; i < eHdr->e_shnum; i++) { offset = eHdr->e_shoff + eHdr->e_shentsize * i; sHdr = elfPointer(map, offset, soSize); if (!sHdr) return std::make_tuple(nullptr, 0); offset = shnameoff + sHdr->sh_name; char *name = elfPointer(map, offset, soSize); if (!name) return std::make_tuple(nullptr, 0); if (sHdr->sh_type == SHT_DYNSYM && !strcmp(name, ".dynsym")) { dynsym = sHdr; break; } } if (dynsym == nullptr) { LOG(IPAModule, Error) << "ELF has no .dynsym section"; return std::make_tuple(nullptr, 0); } offset = eHdr->e_shoff + eHdr->e_shentsize * dynsym->sh_link; sHdr = elfPointer(map, offset, soSize); if (!sHdr) return std::make_tuple(nullptr, 0); off_t dynsym_nameoff = sHdr->sh_offset; /* Locate symbol in the .dynsym section. */ ElfW(Sym) *targetSymbol = nullptr; unsigned int dynsym_num = dynsym->sh_size / dynsym->sh_entsize; for (unsigned int i = 0; i < dynsym_num; i++) { offset = dynsym->sh_offset + dynsym->sh_entsize * i; ElfW(Sym) *sym = elfPointer(map, offset, soSize); if (!sym) return std::make_tuple(nullptr, 0); offset = dynsym_nameoff + sym->st_name; char *name = elfPointer(map, offset, soSize, strlen(symbol) + 1); if (!name) return std::make_tuple(nullptr, 0); if (!strcmp(name, symbol) && sym->st_info & STB_GLOBAL) { targetSymbol = sym; break; } } if (targetSymbol == nullptr) { LOG(IPAModule, Error) << "Symbol " << symbol << " not found"; return std::make_tuple(nullptr, 0); } /* Locate and return data of symbol. */ if (targetSymbol->st_shndx >= eHdr->e_shnum) return std::make_tuple(nullptr, 0); offset = eHdr->e_shoff + targetSymbol->st_shndx * eHdr->e_shentsize; sHdr = elfPointer(map, offset, soSize); if (!sHdr) return std::make_tuple(nullptr, 0); offset = sHdr->sh_offset + (targetSymbol->st_value - sHdr->sh_addr); char *data = elfPointer(map, offset, soSize, targetSymbol->st_size); if (!data) return std::make_tuple(nullptr, 0); return std::make_tuple(data, targetSymbol->st_size); } } /* namespace */ /** * \def IPA_MODULE_API_VERSION * \brief The IPA module API version * * This version number specifies the version for the layout of * struct IPAModuleInfo. The IPA module shall use this macro to * set its moduleAPIVersion field. * * \sa IPAModuleInfo::moduleAPIVersion */ /** * \struct IPAModuleInfo * \brief Information of an IPA module * * This structure contains the information of an IPA module. It is loaded, * read, and validated before anything else is loaded from the shared object. * * \var IPAModuleInfo::moduleAPIVersion * \brief The IPA module API version that the IPA module implements * * This version number specifies the version for the layout of * struct IPAModuleInfo. The IPA module shall report here the version that * it was built for, using the macro IPA_MODULE_API_VERSION. * * \var IPAModuleInfo::pipelineVersion * \brief The pipeline handler version that the IPA module is for * * \var IPAModuleInfo::pipelineName * \brief The name of the pipeline handler that the IPA module is for * * This name is used to match a pipeline handler with the module. * * \var IPAModuleInfo::name * \brief The name of the IPA module * * \var IPAModuleInfo::license * \brief License of the IPA module * * This license is used to determine whether to force isolation of the IPA in * a separate process. If the license is "Proprietary", then the IPA will * be isolated. If the license is open-source, then the IPA will be allowed to * run without isolation if the user enables it. The license should be an * SPDX license string. The following licenses are currently available to * allow the IPA to run unisolated: * * - GPL-2.0-only * - GPL-2.0-or-later * - GPL-3.0-only * - GPL-3.0-or-later * - LGPL-2.1-only * - LGPL-2.1-or-later * - LGPL-3.0-only * - LGPL-3.0-or-later * * Any other license will cause the IPA to be run isolated. * * \todo Allow user to choose to isolate open source IPAs */ /** * \var ipaModuleInfo * \brief Information of an IPA module * * An IPA module must export a struct IPAModuleInfo of this name. */ /** * \class IPAModule * \brief Wrapper around IPA module shared object */ /** * \brief Construct an IPAModule instance * \param[in] libPath path to IPA module shared object * * Loads the IPAModuleInfo from the IPA module shared object at libPath. * The IPA module shared object file must be of the same endianness and * bitness as libcamera. * * The caller shall call the isValid() method after constructing an * IPAModule instance to verify the validity of the IPAModule. */ IPAModule::IPAModule(const std::string &libPath) : libPath_(libPath), valid_(false), loaded_(false), dlHandle_(nullptr), ipaCreate_(nullptr) { if (loadIPAModuleInfo() < 0) return; valid_ = true; } IPAModule::~IPAModule() { if (dlHandle_) dlclose(dlHandle_); } int IPAModule::loadIPAModuleInfo() { int fd = open(libPath_.c_str(), O_RDONLY); if (fd < 0) { int ret = -errno; LOG(IPAModule, Error) << "Failed to open IPA library: " << strerror(-ret); return ret; } void *data = nullptr; size_t dataSize; void *map; size_t soSize; struct stat st; int ret = fstat(fd, &st); if (ret < 0) goto close; soSize = st.st_size; map = mmap(NULL, soSize, PROT_READ, MAP_PRIVATE, fd, 0); if (map == MAP_FAILED) { ret = -errno; goto close; } ret = elfVerifyIdent(map, soSize); if (ret) goto unmap; std::tie(data, dataSize) = elfLoadSymbol(map, soSize, "ipaModuleInfo"); if (data && dataSize == sizeof(info_)) memcpy(&info_, data, dataSize); if (!data) goto unmap; if (info_.moduleAPIVersion != IPA_MODULE_API_VERSION) { LOG(IPAModule, Error) << "IPA module API version mismatch"; ret = -EINVAL; } unmap: munmap(map, soSize); close: if (ret || !data) LOG(IPAModule, Error) << "Error loading IPA module info for " << libPath_; close(fd); return ret; } /** * \brief Check if the IPAModule instance is valid * * An IPAModule instance is valid if the IPA module shared object exists and * the IPA module information it contains was successfully retrieved and * validated. * * \return True if the IPAModule is valid, false otherwise */ bool IPAModule::isValid() const { return valid_; } /** * \brief Retrieve the IPA module information * * The content of the IPA module information is loaded from the module, * and is valid only if the module is valid (as returned by isValid()). * Calling this function on an invalid module is an error. * * \return the IPA module information */ const struct IPAModuleInfo &IPAModule::info() const { return info_; } /** * \brief Retrieve the IPA module path * * The IPA module path is the file name and path of the IPA module shared * object from which the IPA module was created. * * \return The IPA module path */ const std::string &IPAModule::path() const { return libPath_; } /** * \brief Load the IPA implementation factory from the shared object * * The IPA module shared object implements an ipa_context object to be used * by pipeline handlers. This method loads the factory function from the * shared object. Later, createContext() can be called to instantiate the * ipa_context. * * This method only needs to be called successfully once, after which * createContext() can be called as many times as ipa_context instances are * needed. * * Calling this function on an invalid module (as returned by isValid()) is * an error. * * \return True if load was successful, or already loaded, and false otherwise */ bool IPAModule::load() { if (!valid_) return false; if (loaded_) return true; dlHandle_ = dlopen(libPath_.c_str(), RTLD_LAZY); if (!dlHandle_) { LOG(IPAModule, Error) << "Failed to open IPA module shared object: " << dlerror(); return false; } void *symbol = dlsym(dlHandle_, "ipaCreate"); if (!symbol) { LOG(IPAModule, Error) << "Failed to load ipaCreate() from IPA module shared object: " << dlerror(); dlclose(dlHandle_); dlHandle_ = nullptr; return false; } ipaCreate_ = reinterpret_cast(symbol); loaded_ = true; return true; } /** * \brief Instantiate an IPA context * * After loading the IPA module with load(), this method creates an instance of * the IPA module context. Ownership of the context is passed to the caller, and * the context shall be destroyed by calling the \ref ipa_context_ops::destroy * "ipa_context::ops::destroy()" function. * * Calling this function on a module that has not yet been loaded, or an * invalid module (as returned by load() and isValid(), respectively) is * an error. * * \return The IPA context on success, or nullptr on error */ struct ipa_context *IPAModule::createContext() { if (!valid_ || !loaded_) return nullptr; return ipaCreate_(); } /** * \brief Verify if the IPA module maches a given pipeline handler * \param[in] pipe Pipeline handler to match with * \param[in] minVersion Minimum acceptable version of IPA module * \param[in] maxVersion Maximum acceptable version of IPA module * * This method checks if this IPA module matches the \a pipe pipeline handler, * and the input version range. * * \return True if the pipeline handler matches the IPA module, or false otherwise */ bool IPAModule::match(PipelineHandler *pipe, uint32_t minVersion, uint32_t maxVersion) const { return info_.pipelineVersion >= minVersion && info_.pipelineVersion <= maxVersion && !strcmp(info_.pipelineName, pipe->name()); } /** * \brief Verify if the IPA module is open source * * \sa IPAModuleInfo::license */ bool IPAModule::isOpenSource() const { static const char *osLicenses[] = { "GPL-2.0-only", "GPL-2.0-or-later", "GPL-3.0-only", "GPL-3.0-or-later", "LGPL-2.1-only", "LGPL-2.1-or-later", "LGPL-3.0-only", "LGPL-3.0-or-later", }; for (unsigned int i = 0; i < ARRAY_SIZE(osLicenses); i++) if (!strcmp(osLicenses[i], info_.license)) return true; return false; } } /* namespace libcamera */