1 /* This is the Linux kernel elf-loading code, ported into user space */ 2 3 #include <stdio.h> 4 #include <sys/types.h> 5 #include <fcntl.h> 6 #include <errno.h> 7 #include <unistd.h> 8 #include <sys/mman.h> 9 #include <stdlib.h> 10 #include <string.h> 11 12 #include "qemu.h" 13 #include "disas/disas.h" 14 15 #ifdef _ARCH_PPC64 16 #undef ARCH_DLINFO 17 #undef ELF_PLATFORM 18 #undef ELF_HWCAP 19 #undef ELF_CLASS 20 #undef ELF_DATA 21 #undef ELF_ARCH 22 #endif 23 24 /* from personality.h */ 25 26 /* 27 * Flags for bug emulation. 28 * 29 * These occupy the top three bytes. 30 */ 31 enum { 32 ADDR_NO_RANDOMIZE = 0x0040000, /* disable randomization of VA space */ 33 FDPIC_FUNCPTRS = 0x0080000, /* userspace function ptrs point to descriptors 34 * (signal handling) 35 */ 36 MMAP_PAGE_ZERO = 0x0100000, 37 ADDR_COMPAT_LAYOUT = 0x0200000, 38 READ_IMPLIES_EXEC = 0x0400000, 39 ADDR_LIMIT_32BIT = 0x0800000, 40 SHORT_INODE = 0x1000000, 41 WHOLE_SECONDS = 0x2000000, 42 STICKY_TIMEOUTS = 0x4000000, 43 ADDR_LIMIT_3GB = 0x8000000, 44 }; 45 46 /* 47 * Personality types. 48 * 49 * These go in the low byte. Avoid using the top bit, it will 50 * conflict with error returns. 51 */ 52 enum { 53 PER_LINUX = 0x0000, 54 PER_LINUX_32BIT = 0x0000 | ADDR_LIMIT_32BIT, 55 PER_LINUX_FDPIC = 0x0000 | FDPIC_FUNCPTRS, 56 PER_SVR4 = 0x0001 | STICKY_TIMEOUTS | MMAP_PAGE_ZERO, 57 PER_SVR3 = 0x0002 | STICKY_TIMEOUTS | SHORT_INODE, 58 PER_SCOSVR3 = 0x0003 | STICKY_TIMEOUTS | 59 WHOLE_SECONDS | SHORT_INODE, 60 PER_OSR5 = 0x0003 | STICKY_TIMEOUTS | WHOLE_SECONDS, 61 PER_WYSEV386 = 0x0004 | STICKY_TIMEOUTS | SHORT_INODE, 62 PER_ISCR4 = 0x0005 | STICKY_TIMEOUTS, 63 PER_BSD = 0x0006, 64 PER_SUNOS = 0x0006 | STICKY_TIMEOUTS, 65 PER_XENIX = 0x0007 | STICKY_TIMEOUTS | SHORT_INODE, 66 PER_LINUX32 = 0x0008, 67 PER_LINUX32_3GB = 0x0008 | ADDR_LIMIT_3GB, 68 PER_IRIX32 = 0x0009 | STICKY_TIMEOUTS,/* IRIX5 32-bit */ 69 PER_IRIXN32 = 0x000a | STICKY_TIMEOUTS,/* IRIX6 new 32-bit */ 70 PER_IRIX64 = 0x000b | STICKY_TIMEOUTS,/* IRIX6 64-bit */ 71 PER_RISCOS = 0x000c, 72 PER_SOLARIS = 0x000d | STICKY_TIMEOUTS, 73 PER_UW7 = 0x000e | STICKY_TIMEOUTS | MMAP_PAGE_ZERO, 74 PER_OSF4 = 0x000f, /* OSF/1 v4 */ 75 PER_HPUX = 0x0010, 76 PER_MASK = 0x00ff, 77 }; 78 79 /* 80 * Return the base personality without flags. 81 */ 82 #define personality(pers) (pers & PER_MASK) 83 84 /* this flag is uneffective under linux too, should be deleted */ 85 #ifndef MAP_DENYWRITE 86 #define MAP_DENYWRITE 0 87 #endif 88 89 /* should probably go in elf.h */ 90 #ifndef ELIBBAD 91 #define ELIBBAD 80 92 #endif 93 94 #ifdef TARGET_I386 95 96 #define ELF_PLATFORM get_elf_platform() 97 98 static const char *get_elf_platform(void) 99 { 100 static char elf_platform[] = "i386"; 101 int family = object_property_get_int(OBJECT(thread_cpu), "family", NULL); 102 if (family > 6) 103 family = 6; 104 if (family >= 3) 105 elf_platform[1] = '0' + family; 106 return elf_platform; 107 } 108 109 #define ELF_HWCAP get_elf_hwcap() 110 111 static uint32_t get_elf_hwcap(void) 112 { 113 X86CPU *cpu = X86_CPU(thread_cpu); 114 115 return cpu->env.features[FEAT_1_EDX]; 116 } 117 118 #ifdef TARGET_X86_64 119 #define ELF_START_MMAP 0x2aaaaab000ULL 120 #define elf_check_arch(x) ( ((x) == ELF_ARCH) ) 121 122 #define ELF_CLASS ELFCLASS64 123 #define ELF_DATA ELFDATA2LSB 124 #define ELF_ARCH EM_X86_64 125 126 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 127 { 128 regs->rax = 0; 129 regs->rsp = infop->start_stack; 130 regs->rip = infop->entry; 131 if (bsd_type == target_freebsd) { 132 regs->rdi = infop->start_stack; 133 } 134 } 135 136 #else 137 138 #define ELF_START_MMAP 0x80000000 139 140 /* 141 * This is used to ensure we don't load something for the wrong architecture. 142 */ 143 #define elf_check_arch(x) ( ((x) == EM_386) || ((x) == EM_486) ) 144 145 /* 146 * These are used to set parameters in the core dumps. 147 */ 148 #define ELF_CLASS ELFCLASS32 149 #define ELF_DATA ELFDATA2LSB 150 #define ELF_ARCH EM_386 151 152 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 153 { 154 regs->esp = infop->start_stack; 155 regs->eip = infop->entry; 156 157 /* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program 158 starts %edx contains a pointer to a function which might be 159 registered using `atexit'. This provides a mean for the 160 dynamic linker to call DT_FINI functions for shared libraries 161 that have been loaded before the code runs. 162 163 A value of 0 tells we have no such handler. */ 164 regs->edx = 0; 165 } 166 #endif 167 168 #define USE_ELF_CORE_DUMP 169 #define ELF_EXEC_PAGESIZE 4096 170 171 #endif 172 173 #ifdef TARGET_ARM 174 175 #define ELF_START_MMAP 0x80000000 176 177 #define elf_check_arch(x) ( (x) == EM_ARM ) 178 179 #define ELF_CLASS ELFCLASS32 180 #ifdef TARGET_WORDS_BIGENDIAN 181 #define ELF_DATA ELFDATA2MSB 182 #else 183 #define ELF_DATA ELFDATA2LSB 184 #endif 185 #define ELF_ARCH EM_ARM 186 187 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 188 { 189 abi_long stack = infop->start_stack; 190 memset(regs, 0, sizeof(*regs)); 191 regs->ARM_cpsr = 0x10; 192 if (infop->entry & 1) 193 regs->ARM_cpsr |= CPSR_T; 194 regs->ARM_pc = infop->entry & 0xfffffffe; 195 regs->ARM_sp = infop->start_stack; 196 /* FIXME - what to for failure of get_user()? */ 197 get_user_ual(regs->ARM_r2, stack + 8); /* envp */ 198 get_user_ual(regs->ARM_r1, stack + 4); /* envp */ 199 /* XXX: it seems that r0 is zeroed after ! */ 200 regs->ARM_r0 = 0; 201 /* For uClinux PIC binaries. */ 202 /* XXX: Linux does this only on ARM with no MMU (do we care ?) */ 203 regs->ARM_r10 = infop->start_data; 204 } 205 206 #define USE_ELF_CORE_DUMP 207 #define ELF_EXEC_PAGESIZE 4096 208 209 enum 210 { 211 ARM_HWCAP_ARM_SWP = 1 << 0, 212 ARM_HWCAP_ARM_HALF = 1 << 1, 213 ARM_HWCAP_ARM_THUMB = 1 << 2, 214 ARM_HWCAP_ARM_26BIT = 1 << 3, 215 ARM_HWCAP_ARM_FAST_MULT = 1 << 4, 216 ARM_HWCAP_ARM_FPA = 1 << 5, 217 ARM_HWCAP_ARM_VFP = 1 << 6, 218 ARM_HWCAP_ARM_EDSP = 1 << 7, 219 }; 220 221 #define ELF_HWCAP (ARM_HWCAP_ARM_SWP | ARM_HWCAP_ARM_HALF \ 222 | ARM_HWCAP_ARM_THUMB | ARM_HWCAP_ARM_FAST_MULT \ 223 | ARM_HWCAP_ARM_FPA | ARM_HWCAP_ARM_VFP) 224 225 #endif 226 227 #ifdef TARGET_SPARC 228 #ifdef TARGET_SPARC64 229 230 #define ELF_START_MMAP 0x80000000 231 232 #ifndef TARGET_ABI32 233 #define elf_check_arch(x) ( (x) == EM_SPARCV9 || (x) == EM_SPARC32PLUS ) 234 #else 235 #define elf_check_arch(x) ( (x) == EM_SPARC32PLUS || (x) == EM_SPARC ) 236 #endif 237 238 #define ELF_CLASS ELFCLASS64 239 #define ELF_DATA ELFDATA2MSB 240 #define ELF_ARCH EM_SPARCV9 241 242 #define STACK_BIAS 2047 243 244 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 245 { 246 #ifndef TARGET_ABI32 247 regs->tstate = 0; 248 #endif 249 regs->pc = infop->entry; 250 regs->npc = regs->pc + 4; 251 regs->y = 0; 252 #ifdef TARGET_ABI32 253 regs->u_regs[14] = infop->start_stack - 16 * 4; 254 #else 255 if (personality(infop->personality) == PER_LINUX32) 256 regs->u_regs[14] = infop->start_stack - 16 * 4; 257 else { 258 regs->u_regs[14] = infop->start_stack - 16 * 8 - STACK_BIAS; 259 if (bsd_type == target_freebsd) { 260 regs->u_regs[8] = infop->start_stack; 261 regs->u_regs[11] = infop->start_stack; 262 } 263 } 264 #endif 265 } 266 267 #else 268 #define ELF_START_MMAP 0x80000000 269 270 #define elf_check_arch(x) ( (x) == EM_SPARC ) 271 272 #define ELF_CLASS ELFCLASS32 273 #define ELF_DATA ELFDATA2MSB 274 #define ELF_ARCH EM_SPARC 275 276 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 277 { 278 regs->psr = 0; 279 regs->pc = infop->entry; 280 regs->npc = regs->pc + 4; 281 regs->y = 0; 282 regs->u_regs[14] = infop->start_stack - 16 * 4; 283 } 284 285 #endif 286 #endif 287 288 #ifdef TARGET_PPC 289 290 #define ELF_START_MMAP 0x80000000 291 292 #if defined(TARGET_PPC64) && !defined(TARGET_ABI32) 293 294 #define elf_check_arch(x) ( (x) == EM_PPC64 ) 295 296 #define ELF_CLASS ELFCLASS64 297 298 #else 299 300 #define elf_check_arch(x) ( (x) == EM_PPC ) 301 302 #define ELF_CLASS ELFCLASS32 303 304 #endif 305 306 #ifdef TARGET_WORDS_BIGENDIAN 307 #define ELF_DATA ELFDATA2MSB 308 #else 309 #define ELF_DATA ELFDATA2LSB 310 #endif 311 #define ELF_ARCH EM_PPC 312 313 /* 314 * We need to put in some extra aux table entries to tell glibc what 315 * the cache block size is, so it can use the dcbz instruction safely. 316 */ 317 #define AT_DCACHEBSIZE 19 318 #define AT_ICACHEBSIZE 20 319 #define AT_UCACHEBSIZE 21 320 /* A special ignored type value for PPC, for glibc compatibility. */ 321 #define AT_IGNOREPPC 22 322 /* 323 * The requirements here are: 324 * - keep the final alignment of sp (sp & 0xf) 325 * - make sure the 32-bit value at the first 16 byte aligned position of 326 * AUXV is greater than 16 for glibc compatibility. 327 * AT_IGNOREPPC is used for that. 328 * - for compatibility with glibc ARCH_DLINFO must always be defined on PPC, 329 * even if DLINFO_ARCH_ITEMS goes to zero or is undefined. 330 */ 331 #define DLINFO_ARCH_ITEMS 5 332 #define ARCH_DLINFO \ 333 do { \ 334 NEW_AUX_ENT(AT_DCACHEBSIZE, 0x20); \ 335 NEW_AUX_ENT(AT_ICACHEBSIZE, 0x20); \ 336 NEW_AUX_ENT(AT_UCACHEBSIZE, 0); \ 337 /* \ 338 * Now handle glibc compatibility. \ 339 */ \ 340 NEW_AUX_ENT(AT_IGNOREPPC, AT_IGNOREPPC); \ 341 NEW_AUX_ENT(AT_IGNOREPPC, AT_IGNOREPPC); \ 342 } while (0) 343 344 static inline void init_thread(struct target_pt_regs *_regs, struct image_info *infop) 345 { 346 abi_ulong pos = infop->start_stack; 347 abi_ulong tmp; 348 #if defined(TARGET_PPC64) && !defined(TARGET_ABI32) 349 abi_ulong entry, toc; 350 #endif 351 352 _regs->gpr[1] = infop->start_stack; 353 #if defined(TARGET_PPC64) && !defined(TARGET_ABI32) 354 get_user_u64(entry, infop->entry); 355 entry += infop->load_addr; 356 get_user_u64(toc, infop->entry + 8); 357 toc += infop->load_addr; 358 _regs->gpr[2] = toc; 359 infop->entry = entry; 360 #endif 361 _regs->nip = infop->entry; 362 /* Note that isn't exactly what regular kernel does 363 * but this is what the ABI wants and is needed to allow 364 * execution of PPC BSD programs. 365 */ 366 /* FIXME - what to for failure of get_user()? */ 367 get_user_ual(_regs->gpr[3], pos); 368 pos += sizeof(abi_ulong); 369 _regs->gpr[4] = pos; 370 for (tmp = 1; tmp != 0; pos += sizeof(abi_ulong)) { 371 get_user_ual(tmp, pos); 372 } 373 _regs->gpr[5] = pos; 374 } 375 376 #define USE_ELF_CORE_DUMP 377 #define ELF_EXEC_PAGESIZE 4096 378 379 #endif 380 381 #ifdef TARGET_MIPS 382 383 #define ELF_START_MMAP 0x80000000 384 385 #define elf_check_arch(x) ( (x) == EM_MIPS ) 386 387 #ifdef TARGET_MIPS64 388 #define ELF_CLASS ELFCLASS64 389 #else 390 #define ELF_CLASS ELFCLASS32 391 #endif 392 #ifdef TARGET_WORDS_BIGENDIAN 393 #define ELF_DATA ELFDATA2MSB 394 #else 395 #define ELF_DATA ELFDATA2LSB 396 #endif 397 #define ELF_ARCH EM_MIPS 398 399 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 400 { 401 regs->cp0_status = 2 << CP0St_KSU; 402 regs->cp0_epc = infop->entry; 403 regs->regs[29] = infop->start_stack; 404 } 405 406 #define USE_ELF_CORE_DUMP 407 #define ELF_EXEC_PAGESIZE 4096 408 409 #endif /* TARGET_MIPS */ 410 411 #ifdef TARGET_SH4 412 413 #define ELF_START_MMAP 0x80000000 414 415 #define elf_check_arch(x) ( (x) == EM_SH ) 416 417 #define ELF_CLASS ELFCLASS32 418 #define ELF_DATA ELFDATA2LSB 419 #define ELF_ARCH EM_SH 420 421 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 422 { 423 /* Check other registers XXXXX */ 424 regs->pc = infop->entry; 425 regs->regs[15] = infop->start_stack; 426 } 427 428 #define USE_ELF_CORE_DUMP 429 #define ELF_EXEC_PAGESIZE 4096 430 431 #endif 432 433 #ifdef TARGET_CRIS 434 435 #define ELF_START_MMAP 0x80000000 436 437 #define elf_check_arch(x) ( (x) == EM_CRIS ) 438 439 #define ELF_CLASS ELFCLASS32 440 #define ELF_DATA ELFDATA2LSB 441 #define ELF_ARCH EM_CRIS 442 443 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 444 { 445 regs->erp = infop->entry; 446 } 447 448 #define USE_ELF_CORE_DUMP 449 #define ELF_EXEC_PAGESIZE 8192 450 451 #endif 452 453 #ifdef TARGET_M68K 454 455 #define ELF_START_MMAP 0x80000000 456 457 #define elf_check_arch(x) ( (x) == EM_68K ) 458 459 #define ELF_CLASS ELFCLASS32 460 #define ELF_DATA ELFDATA2MSB 461 #define ELF_ARCH EM_68K 462 463 /* ??? Does this need to do anything? 464 #define ELF_PLAT_INIT(_r) */ 465 466 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 467 { 468 regs->usp = infop->start_stack; 469 regs->sr = 0; 470 regs->pc = infop->entry; 471 } 472 473 #define USE_ELF_CORE_DUMP 474 #define ELF_EXEC_PAGESIZE 8192 475 476 #endif 477 478 #ifdef TARGET_ALPHA 479 480 #define ELF_START_MMAP (0x30000000000ULL) 481 482 #define elf_check_arch(x) ( (x) == ELF_ARCH ) 483 484 #define ELF_CLASS ELFCLASS64 485 #define ELF_DATA ELFDATA2MSB 486 #define ELF_ARCH EM_ALPHA 487 488 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop) 489 { 490 regs->pc = infop->entry; 491 regs->ps = 8; 492 regs->usp = infop->start_stack; 493 regs->unique = infop->start_data; /* ? */ 494 printf("Set unique value to " TARGET_FMT_lx " (" TARGET_FMT_lx ")\n", 495 regs->unique, infop->start_data); 496 } 497 498 #define USE_ELF_CORE_DUMP 499 #define ELF_EXEC_PAGESIZE 8192 500 501 #endif /* TARGET_ALPHA */ 502 503 #ifndef ELF_PLATFORM 504 #define ELF_PLATFORM (NULL) 505 #endif 506 507 #ifndef ELF_HWCAP 508 #define ELF_HWCAP 0 509 #endif 510 511 #ifdef TARGET_ABI32 512 #undef ELF_CLASS 513 #define ELF_CLASS ELFCLASS32 514 #undef bswaptls 515 #define bswaptls(ptr) bswap32s(ptr) 516 #endif 517 518 #include "elf.h" 519 520 struct exec 521 { 522 unsigned int a_info; /* Use macros N_MAGIC, etc for access */ 523 unsigned int a_text; /* length of text, in bytes */ 524 unsigned int a_data; /* length of data, in bytes */ 525 unsigned int a_bss; /* length of uninitialized data area, in bytes */ 526 unsigned int a_syms; /* length of symbol table data in file, in bytes */ 527 unsigned int a_entry; /* start address */ 528 unsigned int a_trsize; /* length of relocation info for text, in bytes */ 529 unsigned int a_drsize; /* length of relocation info for data, in bytes */ 530 }; 531 532 533 #define N_MAGIC(exec) ((exec).a_info & 0xffff) 534 #define OMAGIC 0407 535 #define NMAGIC 0410 536 #define ZMAGIC 0413 537 #define QMAGIC 0314 538 539 /* max code+data+bss space allocated to elf interpreter */ 540 #define INTERP_MAP_SIZE (32 * 1024 * 1024) 541 542 /* max code+data+bss+brk space allocated to ET_DYN executables */ 543 #define ET_DYN_MAP_SIZE (128 * 1024 * 1024) 544 545 /* Necessary parameters */ 546 #define TARGET_ELF_EXEC_PAGESIZE TARGET_PAGE_SIZE 547 #define TARGET_ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(TARGET_ELF_EXEC_PAGESIZE-1)) 548 #define TARGET_ELF_PAGEOFFSET(_v) ((_v) & (TARGET_ELF_EXEC_PAGESIZE-1)) 549 550 #define INTERPRETER_NONE 0 551 #define INTERPRETER_AOUT 1 552 #define INTERPRETER_ELF 2 553 554 #define DLINFO_ITEMS 12 555 556 static inline void memcpy_fromfs(void * to, const void * from, unsigned long n) 557 { 558 memcpy(to, from, n); 559 } 560 561 static int load_aout_interp(void * exptr, int interp_fd); 562 563 #ifdef BSWAP_NEEDED 564 static void bswap_ehdr(struct elfhdr *ehdr) 565 { 566 bswap16s(&ehdr->e_type); /* Object file type */ 567 bswap16s(&ehdr->e_machine); /* Architecture */ 568 bswap32s(&ehdr->e_version); /* Object file version */ 569 bswaptls(&ehdr->e_entry); /* Entry point virtual address */ 570 bswaptls(&ehdr->e_phoff); /* Program header table file offset */ 571 bswaptls(&ehdr->e_shoff); /* Section header table file offset */ 572 bswap32s(&ehdr->e_flags); /* Processor-specific flags */ 573 bswap16s(&ehdr->e_ehsize); /* ELF header size in bytes */ 574 bswap16s(&ehdr->e_phentsize); /* Program header table entry size */ 575 bswap16s(&ehdr->e_phnum); /* Program header table entry count */ 576 bswap16s(&ehdr->e_shentsize); /* Section header table entry size */ 577 bswap16s(&ehdr->e_shnum); /* Section header table entry count */ 578 bswap16s(&ehdr->e_shstrndx); /* Section header string table index */ 579 } 580 581 static void bswap_phdr(struct elf_phdr *phdr) 582 { 583 bswap32s(&phdr->p_type); /* Segment type */ 584 bswaptls(&phdr->p_offset); /* Segment file offset */ 585 bswaptls(&phdr->p_vaddr); /* Segment virtual address */ 586 bswaptls(&phdr->p_paddr); /* Segment physical address */ 587 bswaptls(&phdr->p_filesz); /* Segment size in file */ 588 bswaptls(&phdr->p_memsz); /* Segment size in memory */ 589 bswap32s(&phdr->p_flags); /* Segment flags */ 590 bswaptls(&phdr->p_align); /* Segment alignment */ 591 } 592 593 static void bswap_shdr(struct elf_shdr *shdr) 594 { 595 bswap32s(&shdr->sh_name); 596 bswap32s(&shdr->sh_type); 597 bswaptls(&shdr->sh_flags); 598 bswaptls(&shdr->sh_addr); 599 bswaptls(&shdr->sh_offset); 600 bswaptls(&shdr->sh_size); 601 bswap32s(&shdr->sh_link); 602 bswap32s(&shdr->sh_info); 603 bswaptls(&shdr->sh_addralign); 604 bswaptls(&shdr->sh_entsize); 605 } 606 607 static void bswap_sym(struct elf_sym *sym) 608 { 609 bswap32s(&sym->st_name); 610 bswaptls(&sym->st_value); 611 bswaptls(&sym->st_size); 612 bswap16s(&sym->st_shndx); 613 } 614 #endif 615 616 /* 617 * 'copy_elf_strings()' copies argument/envelope strings from user 618 * memory to free pages in kernel mem. These are in a format ready 619 * to be put directly into the top of new user memory. 620 * 621 */ 622 static abi_ulong copy_elf_strings(int argc,char ** argv, void **page, 623 abi_ulong p) 624 { 625 char *tmp, *tmp1, *pag = NULL; 626 int len, offset = 0; 627 628 if (!p) { 629 return 0; /* bullet-proofing */ 630 } 631 while (argc-- > 0) { 632 tmp = argv[argc]; 633 if (!tmp) { 634 fprintf(stderr, "VFS: argc is wrong"); 635 exit(-1); 636 } 637 tmp1 = tmp; 638 while (*tmp++); 639 len = tmp - tmp1; 640 if (p < len) { /* this shouldn't happen - 128kB */ 641 return 0; 642 } 643 while (len) { 644 --p; --tmp; --len; 645 if (--offset < 0) { 646 offset = p % TARGET_PAGE_SIZE; 647 pag = (char *)page[p/TARGET_PAGE_SIZE]; 648 if (!pag) { 649 pag = g_try_malloc0(TARGET_PAGE_SIZE); 650 page[p/TARGET_PAGE_SIZE] = pag; 651 if (!pag) 652 return 0; 653 } 654 } 655 if (len == 0 || offset == 0) { 656 *(pag + offset) = *tmp; 657 } 658 else { 659 int bytes_to_copy = (len > offset) ? offset : len; 660 tmp -= bytes_to_copy; 661 p -= bytes_to_copy; 662 offset -= bytes_to_copy; 663 len -= bytes_to_copy; 664 memcpy_fromfs(pag + offset, tmp, bytes_to_copy + 1); 665 } 666 } 667 } 668 return p; 669 } 670 671 static abi_ulong setup_arg_pages(abi_ulong p, struct linux_binprm *bprm, 672 struct image_info *info) 673 { 674 abi_ulong stack_base, size, error; 675 int i; 676 677 /* Create enough stack to hold everything. If we don't use 678 * it for args, we'll use it for something else... 679 */ 680 size = x86_stack_size; 681 if (size < MAX_ARG_PAGES*TARGET_PAGE_SIZE) 682 size = MAX_ARG_PAGES*TARGET_PAGE_SIZE; 683 error = target_mmap(0, 684 size + qemu_host_page_size, 685 PROT_READ | PROT_WRITE, 686 MAP_PRIVATE | MAP_ANON, 687 -1, 0); 688 if (error == -1) { 689 perror("stk mmap"); 690 exit(-1); 691 } 692 /* we reserve one extra page at the top of the stack as guard */ 693 target_mprotect(error + size, qemu_host_page_size, PROT_NONE); 694 695 stack_base = error + size - MAX_ARG_PAGES*TARGET_PAGE_SIZE; 696 p += stack_base; 697 698 for (i = 0 ; i < MAX_ARG_PAGES ; i++) { 699 if (bprm->page[i]) { 700 info->rss++; 701 /* FIXME - check return value of memcpy_to_target() for failure */ 702 memcpy_to_target(stack_base, bprm->page[i], TARGET_PAGE_SIZE); 703 g_free(bprm->page[i]); 704 } 705 stack_base += TARGET_PAGE_SIZE; 706 } 707 return p; 708 } 709 710 static void set_brk(abi_ulong start, abi_ulong end) 711 { 712 /* page-align the start and end addresses... */ 713 start = HOST_PAGE_ALIGN(start); 714 end = HOST_PAGE_ALIGN(end); 715 if (end <= start) 716 return; 717 if(target_mmap(start, end - start, 718 PROT_READ | PROT_WRITE | PROT_EXEC, 719 MAP_FIXED | MAP_PRIVATE | MAP_ANON, -1, 0) == -1) { 720 perror("cannot mmap brk"); 721 exit(-1); 722 } 723 } 724 725 726 /* We need to explicitly zero any fractional pages after the data 727 section (i.e. bss). This would contain the junk from the file that 728 should not be in memory. */ 729 static void padzero(abi_ulong elf_bss, abi_ulong last_bss) 730 { 731 abi_ulong nbyte; 732 733 if (elf_bss >= last_bss) 734 return; 735 736 /* XXX: this is really a hack : if the real host page size is 737 smaller than the target page size, some pages after the end 738 of the file may not be mapped. A better fix would be to 739 patch target_mmap(), but it is more complicated as the file 740 size must be known */ 741 if (qemu_real_host_page_size < qemu_host_page_size) { 742 abi_ulong end_addr, end_addr1; 743 end_addr1 = REAL_HOST_PAGE_ALIGN(elf_bss); 744 end_addr = HOST_PAGE_ALIGN(elf_bss); 745 if (end_addr1 < end_addr) { 746 mmap((void *)g2h(end_addr1), end_addr - end_addr1, 747 PROT_READ|PROT_WRITE|PROT_EXEC, 748 MAP_FIXED|MAP_PRIVATE|MAP_ANON, -1, 0); 749 } 750 } 751 752 nbyte = elf_bss & (qemu_host_page_size-1); 753 if (nbyte) { 754 nbyte = qemu_host_page_size - nbyte; 755 do { 756 /* FIXME - what to do if put_user() fails? */ 757 put_user_u8(0, elf_bss); 758 elf_bss++; 759 } while (--nbyte); 760 } 761 } 762 763 764 static abi_ulong create_elf_tables(abi_ulong p, int argc, int envc, 765 struct elfhdr * exec, 766 abi_ulong load_addr, 767 abi_ulong load_bias, 768 abi_ulong interp_load_addr, int ibcs, 769 struct image_info *info) 770 { 771 abi_ulong sp; 772 int size; 773 abi_ulong u_platform; 774 const char *k_platform; 775 const int n = sizeof(elf_addr_t); 776 777 sp = p; 778 u_platform = 0; 779 k_platform = ELF_PLATFORM; 780 if (k_platform) { 781 size_t len = strlen(k_platform) + 1; 782 sp -= (len + n - 1) & ~(n - 1); 783 u_platform = sp; 784 /* FIXME - check return value of memcpy_to_target() for failure */ 785 memcpy_to_target(sp, k_platform, len); 786 } 787 /* 788 * Force 16 byte _final_ alignment here for generality. 789 */ 790 sp = sp &~ (abi_ulong)15; 791 size = (DLINFO_ITEMS + 1) * 2; 792 if (k_platform) 793 size += 2; 794 #ifdef DLINFO_ARCH_ITEMS 795 size += DLINFO_ARCH_ITEMS * 2; 796 #endif 797 size += envc + argc + 2; 798 size += (!ibcs ? 3 : 1); /* argc itself */ 799 size *= n; 800 if (size & 15) 801 sp -= 16 - (size & 15); 802 803 /* This is correct because Linux defines 804 * elf_addr_t as Elf32_Off / Elf64_Off 805 */ 806 #define NEW_AUX_ENT(id, val) do { \ 807 sp -= n; put_user_ual(val, sp); \ 808 sp -= n; put_user_ual(id, sp); \ 809 } while(0) 810 811 NEW_AUX_ENT (AT_NULL, 0); 812 813 /* There must be exactly DLINFO_ITEMS entries here. */ 814 NEW_AUX_ENT(AT_PHDR, (abi_ulong)(load_addr + exec->e_phoff)); 815 NEW_AUX_ENT(AT_PHENT, (abi_ulong)(sizeof (struct elf_phdr))); 816 NEW_AUX_ENT(AT_PHNUM, (abi_ulong)(exec->e_phnum)); 817 NEW_AUX_ENT(AT_PAGESZ, (abi_ulong)(TARGET_PAGE_SIZE)); 818 NEW_AUX_ENT(AT_BASE, (abi_ulong)(interp_load_addr)); 819 NEW_AUX_ENT(AT_FLAGS, (abi_ulong)0); 820 NEW_AUX_ENT(AT_ENTRY, load_bias + exec->e_entry); 821 NEW_AUX_ENT(AT_UID, (abi_ulong) getuid()); 822 NEW_AUX_ENT(AT_EUID, (abi_ulong) geteuid()); 823 NEW_AUX_ENT(AT_GID, (abi_ulong) getgid()); 824 NEW_AUX_ENT(AT_EGID, (abi_ulong) getegid()); 825 NEW_AUX_ENT(AT_HWCAP, (abi_ulong) ELF_HWCAP); 826 NEW_AUX_ENT(AT_CLKTCK, (abi_ulong) sysconf(_SC_CLK_TCK)); 827 if (k_platform) 828 NEW_AUX_ENT(AT_PLATFORM, u_platform); 829 #ifdef ARCH_DLINFO 830 /* 831 * ARCH_DLINFO must come last so platform specific code can enforce 832 * special alignment requirements on the AUXV if necessary (eg. PPC). 833 */ 834 ARCH_DLINFO; 835 #endif 836 #undef NEW_AUX_ENT 837 838 sp = loader_build_argptr(envc, argc, sp, p, !ibcs); 839 return sp; 840 } 841 842 843 static abi_ulong load_elf_interp(struct elfhdr * interp_elf_ex, 844 int interpreter_fd, 845 abi_ulong *interp_load_addr) 846 { 847 struct elf_phdr *elf_phdata = NULL; 848 struct elf_phdr *eppnt; 849 abi_ulong load_addr = 0; 850 int load_addr_set = 0; 851 int retval; 852 abi_ulong last_bss, elf_bss; 853 abi_ulong error; 854 int i; 855 856 elf_bss = 0; 857 last_bss = 0; 858 error = 0; 859 860 #ifdef BSWAP_NEEDED 861 bswap_ehdr(interp_elf_ex); 862 #endif 863 /* First of all, some simple consistency checks */ 864 if ((interp_elf_ex->e_type != ET_EXEC && 865 interp_elf_ex->e_type != ET_DYN) || 866 !elf_check_arch(interp_elf_ex->e_machine)) { 867 return ~((abi_ulong)0UL); 868 } 869 870 871 /* Now read in all of the header information */ 872 873 if (sizeof(struct elf_phdr) * interp_elf_ex->e_phnum > TARGET_PAGE_SIZE) 874 return ~(abi_ulong)0UL; 875 876 elf_phdata = (struct elf_phdr *) 877 malloc(sizeof(struct elf_phdr) * interp_elf_ex->e_phnum); 878 879 if (!elf_phdata) 880 return ~((abi_ulong)0UL); 881 882 /* 883 * If the size of this structure has changed, then punt, since 884 * we will be doing the wrong thing. 885 */ 886 if (interp_elf_ex->e_phentsize != sizeof(struct elf_phdr)) { 887 free(elf_phdata); 888 return ~((abi_ulong)0UL); 889 } 890 891 retval = lseek(interpreter_fd, interp_elf_ex->e_phoff, SEEK_SET); 892 if(retval >= 0) { 893 retval = read(interpreter_fd, 894 (char *) elf_phdata, 895 sizeof(struct elf_phdr) * interp_elf_ex->e_phnum); 896 } 897 if (retval < 0) { 898 perror("load_elf_interp"); 899 exit(-1); 900 free (elf_phdata); 901 return retval; 902 } 903 #ifdef BSWAP_NEEDED 904 eppnt = elf_phdata; 905 for (i=0; i<interp_elf_ex->e_phnum; i++, eppnt++) { 906 bswap_phdr(eppnt); 907 } 908 #endif 909 910 if (interp_elf_ex->e_type == ET_DYN) { 911 /* in order to avoid hardcoding the interpreter load 912 address in qemu, we allocate a big enough memory zone */ 913 error = target_mmap(0, INTERP_MAP_SIZE, 914 PROT_NONE, MAP_PRIVATE | MAP_ANON, 915 -1, 0); 916 if (error == -1) { 917 perror("mmap"); 918 exit(-1); 919 } 920 load_addr = error; 921 load_addr_set = 1; 922 } 923 924 eppnt = elf_phdata; 925 for(i=0; i<interp_elf_ex->e_phnum; i++, eppnt++) 926 if (eppnt->p_type == PT_LOAD) { 927 int elf_type = MAP_PRIVATE | MAP_DENYWRITE; 928 int elf_prot = 0; 929 abi_ulong vaddr = 0; 930 abi_ulong k; 931 932 if (eppnt->p_flags & PF_R) elf_prot = PROT_READ; 933 if (eppnt->p_flags & PF_W) elf_prot |= PROT_WRITE; 934 if (eppnt->p_flags & PF_X) elf_prot |= PROT_EXEC; 935 if (interp_elf_ex->e_type == ET_EXEC || load_addr_set) { 936 elf_type |= MAP_FIXED; 937 vaddr = eppnt->p_vaddr; 938 } 939 error = target_mmap(load_addr+TARGET_ELF_PAGESTART(vaddr), 940 eppnt->p_filesz + TARGET_ELF_PAGEOFFSET(eppnt->p_vaddr), 941 elf_prot, 942 elf_type, 943 interpreter_fd, 944 eppnt->p_offset - TARGET_ELF_PAGEOFFSET(eppnt->p_vaddr)); 945 946 if (error == -1) { 947 /* Real error */ 948 close(interpreter_fd); 949 free(elf_phdata); 950 return ~((abi_ulong)0UL); 951 } 952 953 if (!load_addr_set && interp_elf_ex->e_type == ET_DYN) { 954 load_addr = error; 955 load_addr_set = 1; 956 } 957 958 /* 959 * Find the end of the file mapping for this phdr, and keep 960 * track of the largest address we see for this. 961 */ 962 k = load_addr + eppnt->p_vaddr + eppnt->p_filesz; 963 if (k > elf_bss) elf_bss = k; 964 965 /* 966 * Do the same thing for the memory mapping - between 967 * elf_bss and last_bss is the bss section. 968 */ 969 k = load_addr + eppnt->p_memsz + eppnt->p_vaddr; 970 if (k > last_bss) last_bss = k; 971 } 972 973 /* Now use mmap to map the library into memory. */ 974 975 close(interpreter_fd); 976 977 /* 978 * Now fill out the bss section. First pad the last page up 979 * to the page boundary, and then perform a mmap to make sure 980 * that there are zeromapped pages up to and including the last 981 * bss page. 982 */ 983 padzero(elf_bss, last_bss); 984 elf_bss = TARGET_ELF_PAGESTART(elf_bss + qemu_host_page_size - 1); /* What we have mapped so far */ 985 986 /* Map the last of the bss segment */ 987 if (last_bss > elf_bss) { 988 target_mmap(elf_bss, last_bss-elf_bss, 989 PROT_READ|PROT_WRITE|PROT_EXEC, 990 MAP_FIXED|MAP_PRIVATE|MAP_ANON, -1, 0); 991 } 992 free(elf_phdata); 993 994 *interp_load_addr = load_addr; 995 return ((abi_ulong) interp_elf_ex->e_entry) + load_addr; 996 } 997 998 static int symfind(const void *s0, const void *s1) 999 { 1000 target_ulong addr = *(target_ulong *)s0; 1001 struct elf_sym *sym = (struct elf_sym *)s1; 1002 int result = 0; 1003 if (addr < sym->st_value) { 1004 result = -1; 1005 } else if (addr >= sym->st_value + sym->st_size) { 1006 result = 1; 1007 } 1008 return result; 1009 } 1010 1011 static const char *lookup_symbolxx(struct syminfo *s, target_ulong orig_addr) 1012 { 1013 #if ELF_CLASS == ELFCLASS32 1014 struct elf_sym *syms = s->disas_symtab.elf32; 1015 #else 1016 struct elf_sym *syms = s->disas_symtab.elf64; 1017 #endif 1018 1019 // binary search 1020 struct elf_sym *sym; 1021 1022 sym = bsearch(&orig_addr, syms, s->disas_num_syms, sizeof(*syms), symfind); 1023 if (sym != NULL) { 1024 return s->disas_strtab + sym->st_name; 1025 } 1026 1027 return ""; 1028 } 1029 1030 /* FIXME: This should use elf_ops.h */ 1031 static int symcmp(const void *s0, const void *s1) 1032 { 1033 struct elf_sym *sym0 = (struct elf_sym *)s0; 1034 struct elf_sym *sym1 = (struct elf_sym *)s1; 1035 return (sym0->st_value < sym1->st_value) 1036 ? -1 1037 : ((sym0->st_value > sym1->st_value) ? 1 : 0); 1038 } 1039 1040 /* Best attempt to load symbols from this ELF object. */ 1041 static void load_symbols(struct elfhdr *hdr, int fd) 1042 { 1043 unsigned int i, nsyms; 1044 struct elf_shdr sechdr, symtab, strtab; 1045 char *strings; 1046 struct syminfo *s; 1047 struct elf_sym *syms, *new_syms; 1048 1049 lseek(fd, hdr->e_shoff, SEEK_SET); 1050 for (i = 0; i < hdr->e_shnum; i++) { 1051 if (read(fd, &sechdr, sizeof(sechdr)) != sizeof(sechdr)) 1052 return; 1053 #ifdef BSWAP_NEEDED 1054 bswap_shdr(&sechdr); 1055 #endif 1056 if (sechdr.sh_type == SHT_SYMTAB) { 1057 symtab = sechdr; 1058 lseek(fd, hdr->e_shoff 1059 + sizeof(sechdr) * sechdr.sh_link, SEEK_SET); 1060 if (read(fd, &strtab, sizeof(strtab)) 1061 != sizeof(strtab)) 1062 return; 1063 #ifdef BSWAP_NEEDED 1064 bswap_shdr(&strtab); 1065 #endif 1066 goto found; 1067 } 1068 } 1069 return; /* Shouldn't happen... */ 1070 1071 found: 1072 /* Now know where the strtab and symtab are. Snarf them. */ 1073 s = malloc(sizeof(*s)); 1074 syms = malloc(symtab.sh_size); 1075 if (!syms) { 1076 free(s); 1077 return; 1078 } 1079 s->disas_strtab = strings = malloc(strtab.sh_size); 1080 if (!s->disas_strtab) { 1081 free(s); 1082 free(syms); 1083 return; 1084 } 1085 1086 lseek(fd, symtab.sh_offset, SEEK_SET); 1087 if (read(fd, syms, symtab.sh_size) != symtab.sh_size) { 1088 free(s); 1089 free(syms); 1090 free(strings); 1091 return; 1092 } 1093 1094 nsyms = symtab.sh_size / sizeof(struct elf_sym); 1095 1096 i = 0; 1097 while (i < nsyms) { 1098 #ifdef BSWAP_NEEDED 1099 bswap_sym(syms + i); 1100 #endif 1101 // Throw away entries which we do not need. 1102 if (syms[i].st_shndx == SHN_UNDEF || 1103 syms[i].st_shndx >= SHN_LORESERVE || 1104 ELF_ST_TYPE(syms[i].st_info) != STT_FUNC) { 1105 nsyms--; 1106 if (i < nsyms) { 1107 syms[i] = syms[nsyms]; 1108 } 1109 continue; 1110 } 1111 #if defined(TARGET_ARM) || defined (TARGET_MIPS) 1112 /* The bottom address bit marks a Thumb or MIPS16 symbol. */ 1113 syms[i].st_value &= ~(target_ulong)1; 1114 #endif 1115 i++; 1116 } 1117 1118 /* Attempt to free the storage associated with the local symbols 1119 that we threw away. Whether or not this has any effect on the 1120 memory allocation depends on the malloc implementation and how 1121 many symbols we managed to discard. */ 1122 new_syms = realloc(syms, nsyms * sizeof(*syms)); 1123 if (new_syms == NULL) { 1124 free(s); 1125 free(syms); 1126 free(strings); 1127 return; 1128 } 1129 syms = new_syms; 1130 1131 qsort(syms, nsyms, sizeof(*syms), symcmp); 1132 1133 lseek(fd, strtab.sh_offset, SEEK_SET); 1134 if (read(fd, strings, strtab.sh_size) != strtab.sh_size) { 1135 free(s); 1136 free(syms); 1137 free(strings); 1138 return; 1139 } 1140 s->disas_num_syms = nsyms; 1141 #if ELF_CLASS == ELFCLASS32 1142 s->disas_symtab.elf32 = syms; 1143 s->lookup_symbol = (lookup_symbol_t)lookup_symbolxx; 1144 #else 1145 s->disas_symtab.elf64 = syms; 1146 s->lookup_symbol = (lookup_symbol_t)lookup_symbolxx; 1147 #endif 1148 s->next = syminfos; 1149 syminfos = s; 1150 } 1151 1152 int load_elf_binary(struct linux_binprm * bprm, struct target_pt_regs * regs, 1153 struct image_info * info) 1154 { 1155 struct elfhdr elf_ex; 1156 struct elfhdr interp_elf_ex; 1157 struct exec interp_ex; 1158 int interpreter_fd = -1; /* avoid warning */ 1159 abi_ulong load_addr, load_bias; 1160 int load_addr_set = 0; 1161 unsigned int interpreter_type = INTERPRETER_NONE; 1162 unsigned char ibcs2_interpreter; 1163 int i; 1164 abi_ulong mapped_addr; 1165 struct elf_phdr * elf_ppnt; 1166 struct elf_phdr *elf_phdata; 1167 abi_ulong elf_bss, k, elf_brk; 1168 int retval; 1169 char * elf_interpreter; 1170 abi_ulong elf_entry, interp_load_addr = 0; 1171 int status; 1172 abi_ulong start_code, end_code, start_data, end_data; 1173 abi_ulong reloc_func_desc = 0; 1174 abi_ulong elf_stack; 1175 char passed_fileno[6]; 1176 1177 ibcs2_interpreter = 0; 1178 status = 0; 1179 load_addr = 0; 1180 load_bias = 0; 1181 elf_ex = *((struct elfhdr *) bprm->buf); /* exec-header */ 1182 #ifdef BSWAP_NEEDED 1183 bswap_ehdr(&elf_ex); 1184 #endif 1185 1186 /* First of all, some simple consistency checks */ 1187 if ((elf_ex.e_type != ET_EXEC && elf_ex.e_type != ET_DYN) || 1188 (! elf_check_arch(elf_ex.e_machine))) { 1189 return -ENOEXEC; 1190 } 1191 1192 bprm->p = copy_elf_strings(1, &bprm->filename, bprm->page, bprm->p); 1193 bprm->p = copy_elf_strings(bprm->envc,bprm->envp,bprm->page,bprm->p); 1194 bprm->p = copy_elf_strings(bprm->argc,bprm->argv,bprm->page,bprm->p); 1195 if (!bprm->p) { 1196 retval = -E2BIG; 1197 } 1198 1199 /* Now read in all of the header information */ 1200 elf_phdata = (struct elf_phdr *)malloc(elf_ex.e_phentsize*elf_ex.e_phnum); 1201 if (elf_phdata == NULL) { 1202 return -ENOMEM; 1203 } 1204 1205 retval = lseek(bprm->fd, elf_ex.e_phoff, SEEK_SET); 1206 if(retval > 0) { 1207 retval = read(bprm->fd, (char *) elf_phdata, 1208 elf_ex.e_phentsize * elf_ex.e_phnum); 1209 } 1210 1211 if (retval < 0) { 1212 perror("load_elf_binary"); 1213 exit(-1); 1214 free (elf_phdata); 1215 return -errno; 1216 } 1217 1218 #ifdef BSWAP_NEEDED 1219 elf_ppnt = elf_phdata; 1220 for (i=0; i<elf_ex.e_phnum; i++, elf_ppnt++) { 1221 bswap_phdr(elf_ppnt); 1222 } 1223 #endif 1224 elf_ppnt = elf_phdata; 1225 1226 elf_bss = 0; 1227 elf_brk = 0; 1228 1229 1230 elf_stack = ~((abi_ulong)0UL); 1231 elf_interpreter = NULL; 1232 start_code = ~((abi_ulong)0UL); 1233 end_code = 0; 1234 start_data = 0; 1235 end_data = 0; 1236 interp_ex.a_info = 0; 1237 1238 for(i=0;i < elf_ex.e_phnum; i++) { 1239 if (elf_ppnt->p_type == PT_INTERP) { 1240 if ( elf_interpreter != NULL ) 1241 { 1242 free (elf_phdata); 1243 free(elf_interpreter); 1244 close(bprm->fd); 1245 return -EINVAL; 1246 } 1247 1248 /* This is the program interpreter used for 1249 * shared libraries - for now assume that this 1250 * is an a.out format binary 1251 */ 1252 1253 elf_interpreter = (char *)malloc(elf_ppnt->p_filesz); 1254 1255 if (elf_interpreter == NULL) { 1256 free (elf_phdata); 1257 close(bprm->fd); 1258 return -ENOMEM; 1259 } 1260 1261 retval = lseek(bprm->fd, elf_ppnt->p_offset, SEEK_SET); 1262 if(retval >= 0) { 1263 retval = read(bprm->fd, elf_interpreter, elf_ppnt->p_filesz); 1264 } 1265 if(retval < 0) { 1266 perror("load_elf_binary2"); 1267 exit(-1); 1268 } 1269 1270 /* If the program interpreter is one of these two, 1271 then assume an iBCS2 image. Otherwise assume 1272 a native linux image. */ 1273 1274 /* JRP - Need to add X86 lib dir stuff here... */ 1275 1276 if (strcmp(elf_interpreter,"/usr/lib/libc.so.1") == 0 || 1277 strcmp(elf_interpreter,"/usr/lib/ld.so.1") == 0) { 1278 ibcs2_interpreter = 1; 1279 } 1280 1281 #if 0 1282 printf("Using ELF interpreter %s\n", path(elf_interpreter)); 1283 #endif 1284 if (retval >= 0) { 1285 retval = open(path(elf_interpreter), O_RDONLY); 1286 if(retval >= 0) { 1287 interpreter_fd = retval; 1288 } 1289 else { 1290 perror(elf_interpreter); 1291 exit(-1); 1292 /* retval = -errno; */ 1293 } 1294 } 1295 1296 if (retval >= 0) { 1297 retval = lseek(interpreter_fd, 0, SEEK_SET); 1298 if(retval >= 0) { 1299 retval = read(interpreter_fd,bprm->buf,128); 1300 } 1301 } 1302 if (retval >= 0) { 1303 interp_ex = *((struct exec *) bprm->buf); /* aout exec-header */ 1304 interp_elf_ex = *((struct elfhdr *) bprm->buf); /* elf exec-header */ 1305 } 1306 if (retval < 0) { 1307 perror("load_elf_binary3"); 1308 exit(-1); 1309 free (elf_phdata); 1310 free(elf_interpreter); 1311 close(bprm->fd); 1312 return retval; 1313 } 1314 } 1315 elf_ppnt++; 1316 } 1317 1318 /* Some simple consistency checks for the interpreter */ 1319 if (elf_interpreter){ 1320 interpreter_type = INTERPRETER_ELF | INTERPRETER_AOUT; 1321 1322 /* Now figure out which format our binary is */ 1323 if ((N_MAGIC(interp_ex) != OMAGIC) && (N_MAGIC(interp_ex) != ZMAGIC) && 1324 (N_MAGIC(interp_ex) != QMAGIC)) { 1325 interpreter_type = INTERPRETER_ELF; 1326 } 1327 1328 if (interp_elf_ex.e_ident[0] != 0x7f || 1329 strncmp((char *)&interp_elf_ex.e_ident[1], "ELF",3) != 0) { 1330 interpreter_type &= ~INTERPRETER_ELF; 1331 } 1332 1333 if (!interpreter_type) { 1334 free(elf_interpreter); 1335 free(elf_phdata); 1336 close(bprm->fd); 1337 return -ELIBBAD; 1338 } 1339 } 1340 1341 /* OK, we are done with that, now set up the arg stuff, 1342 and then start this sucker up */ 1343 1344 { 1345 char * passed_p; 1346 1347 if (interpreter_type == INTERPRETER_AOUT) { 1348 snprintf(passed_fileno, sizeof(passed_fileno), "%d", bprm->fd); 1349 passed_p = passed_fileno; 1350 1351 if (elf_interpreter) { 1352 bprm->p = copy_elf_strings(1,&passed_p,bprm->page,bprm->p); 1353 bprm->argc++; 1354 } 1355 } 1356 if (!bprm->p) { 1357 free(elf_interpreter); 1358 free (elf_phdata); 1359 close(bprm->fd); 1360 return -E2BIG; 1361 } 1362 } 1363 1364 /* OK, This is the point of no return */ 1365 info->end_data = 0; 1366 info->end_code = 0; 1367 info->start_mmap = (abi_ulong)ELF_START_MMAP; 1368 info->mmap = 0; 1369 elf_entry = (abi_ulong) elf_ex.e_entry; 1370 1371 /* 1372 * In case where user has not explicitly set the guest_base, we 1373 * probe here that should we set it automatically. 1374 */ 1375 if (!have_guest_base) { 1376 /* 1377 * Go through ELF program header table and find out whether 1378 * any of the segments drop below our current mmap_min_addr and 1379 * in that case set guest_base to corresponding address. 1380 */ 1381 for (i = 0, elf_ppnt = elf_phdata; i < elf_ex.e_phnum; 1382 i++, elf_ppnt++) { 1383 if (elf_ppnt->p_type != PT_LOAD) 1384 continue; 1385 if (HOST_PAGE_ALIGN(elf_ppnt->p_vaddr) < mmap_min_addr) { 1386 guest_base = HOST_PAGE_ALIGN(mmap_min_addr); 1387 break; 1388 } 1389 } 1390 } 1391 1392 /* Do this so that we can load the interpreter, if need be. We will 1393 change some of these later */ 1394 info->rss = 0; 1395 bprm->p = setup_arg_pages(bprm->p, bprm, info); 1396 info->start_stack = bprm->p; 1397 1398 /* Now we do a little grungy work by mmaping the ELF image into 1399 * the correct location in memory. At this point, we assume that 1400 * the image should be loaded at fixed address, not at a variable 1401 * address. 1402 */ 1403 1404 for(i = 0, elf_ppnt = elf_phdata; i < elf_ex.e_phnum; i++, elf_ppnt++) { 1405 int elf_prot = 0; 1406 int elf_flags = 0; 1407 abi_ulong error; 1408 1409 if (elf_ppnt->p_type != PT_LOAD) 1410 continue; 1411 1412 if (elf_ppnt->p_flags & PF_R) elf_prot |= PROT_READ; 1413 if (elf_ppnt->p_flags & PF_W) elf_prot |= PROT_WRITE; 1414 if (elf_ppnt->p_flags & PF_X) elf_prot |= PROT_EXEC; 1415 elf_flags = MAP_PRIVATE | MAP_DENYWRITE; 1416 if (elf_ex.e_type == ET_EXEC || load_addr_set) { 1417 elf_flags |= MAP_FIXED; 1418 } else if (elf_ex.e_type == ET_DYN) { 1419 /* Try and get dynamic programs out of the way of the default mmap 1420 base, as well as whatever program they might try to exec. This 1421 is because the brk will follow the loader, and is not movable. */ 1422 /* NOTE: for qemu, we do a big mmap to get enough space 1423 without hardcoding any address */ 1424 error = target_mmap(0, ET_DYN_MAP_SIZE, 1425 PROT_NONE, MAP_PRIVATE | MAP_ANON, 1426 -1, 0); 1427 if (error == -1) { 1428 perror("mmap"); 1429 exit(-1); 1430 } 1431 load_bias = TARGET_ELF_PAGESTART(error - elf_ppnt->p_vaddr); 1432 } 1433 1434 error = target_mmap(TARGET_ELF_PAGESTART(load_bias + elf_ppnt->p_vaddr), 1435 (elf_ppnt->p_filesz + 1436 TARGET_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)), 1437 elf_prot, 1438 (MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE), 1439 bprm->fd, 1440 (elf_ppnt->p_offset - 1441 TARGET_ELF_PAGEOFFSET(elf_ppnt->p_vaddr))); 1442 if (error == -1) { 1443 perror("mmap"); 1444 exit(-1); 1445 } 1446 1447 #ifdef LOW_ELF_STACK 1448 if (TARGET_ELF_PAGESTART(elf_ppnt->p_vaddr) < elf_stack) 1449 elf_stack = TARGET_ELF_PAGESTART(elf_ppnt->p_vaddr); 1450 #endif 1451 1452 if (!load_addr_set) { 1453 load_addr_set = 1; 1454 load_addr = elf_ppnt->p_vaddr - elf_ppnt->p_offset; 1455 if (elf_ex.e_type == ET_DYN) { 1456 load_bias += error - 1457 TARGET_ELF_PAGESTART(load_bias + elf_ppnt->p_vaddr); 1458 load_addr += load_bias; 1459 reloc_func_desc = load_bias; 1460 } 1461 } 1462 k = elf_ppnt->p_vaddr; 1463 if (k < start_code) 1464 start_code = k; 1465 if (start_data < k) 1466 start_data = k; 1467 k = elf_ppnt->p_vaddr + elf_ppnt->p_filesz; 1468 if (k > elf_bss) 1469 elf_bss = k; 1470 if ((elf_ppnt->p_flags & PF_X) && end_code < k) 1471 end_code = k; 1472 if (end_data < k) 1473 end_data = k; 1474 k = elf_ppnt->p_vaddr + elf_ppnt->p_memsz; 1475 if (k > elf_brk) elf_brk = k; 1476 } 1477 1478 elf_entry += load_bias; 1479 elf_bss += load_bias; 1480 elf_brk += load_bias; 1481 start_code += load_bias; 1482 end_code += load_bias; 1483 start_data += load_bias; 1484 end_data += load_bias; 1485 1486 if (elf_interpreter) { 1487 if (interpreter_type & 1) { 1488 elf_entry = load_aout_interp(&interp_ex, interpreter_fd); 1489 } 1490 else if (interpreter_type & 2) { 1491 elf_entry = load_elf_interp(&interp_elf_ex, interpreter_fd, 1492 &interp_load_addr); 1493 } 1494 reloc_func_desc = interp_load_addr; 1495 1496 close(interpreter_fd); 1497 free(elf_interpreter); 1498 1499 if (elf_entry == ~((abi_ulong)0UL)) { 1500 printf("Unable to load interpreter\n"); 1501 free(elf_phdata); 1502 exit(-1); 1503 return 0; 1504 } 1505 } 1506 1507 free(elf_phdata); 1508 1509 if (qemu_log_enabled()) 1510 load_symbols(&elf_ex, bprm->fd); 1511 1512 if (interpreter_type != INTERPRETER_AOUT) close(bprm->fd); 1513 info->personality = (ibcs2_interpreter ? PER_SVR4 : PER_LINUX); 1514 1515 #ifdef LOW_ELF_STACK 1516 info->start_stack = bprm->p = elf_stack - 4; 1517 #endif 1518 bprm->p = create_elf_tables(bprm->p, 1519 bprm->argc, 1520 bprm->envc, 1521 &elf_ex, 1522 load_addr, load_bias, 1523 interp_load_addr, 1524 (interpreter_type == INTERPRETER_AOUT ? 0 : 1), 1525 info); 1526 info->load_addr = reloc_func_desc; 1527 info->start_brk = info->brk = elf_brk; 1528 info->end_code = end_code; 1529 info->start_code = start_code; 1530 info->start_data = start_data; 1531 info->end_data = end_data; 1532 info->start_stack = bprm->p; 1533 1534 /* Calling set_brk effectively mmaps the pages that we need for the bss and break 1535 sections */ 1536 set_brk(elf_bss, elf_brk); 1537 1538 padzero(elf_bss, elf_brk); 1539 1540 #if 0 1541 printf("(start_brk) %x\n" , info->start_brk); 1542 printf("(end_code) %x\n" , info->end_code); 1543 printf("(start_code) %x\n" , info->start_code); 1544 printf("(end_data) %x\n" , info->end_data); 1545 printf("(start_stack) %x\n" , info->start_stack); 1546 printf("(brk) %x\n" , info->brk); 1547 #endif 1548 1549 if ( info->personality == PER_SVR4 ) 1550 { 1551 /* Why this, you ask??? Well SVr4 maps page 0 as read-only, 1552 and some applications "depend" upon this behavior. 1553 Since we do not have the power to recompile these, we 1554 emulate the SVr4 behavior. Sigh. */ 1555 mapped_addr = target_mmap(0, qemu_host_page_size, PROT_READ | PROT_EXEC, 1556 MAP_FIXED | MAP_PRIVATE, -1, 0); 1557 } 1558 1559 info->entry = elf_entry; 1560 1561 return 0; 1562 } 1563 1564 static int load_aout_interp(void * exptr, int interp_fd) 1565 { 1566 printf("a.out interpreter not yet supported\n"); 1567 return(0); 1568 } 1569 1570 void do_init_thread(struct target_pt_regs *regs, struct image_info *infop) 1571 { 1572 init_thread(regs, infop); 1573 } 1574