xref: /openbmc/qemu/linux-user/elfload.c (revision b17780d5)
1 /* This is the Linux kernel elf-loading code, ported into user space */
2 
3 #include <stdio.h>
4 #include <sys/types.h>
5 #include <fcntl.h>
6 #include <sys/stat.h>
7 #include <errno.h>
8 #include <unistd.h>
9 #include <sys/mman.h>
10 #include <stdlib.h>
11 #include <string.h>
12 
13 #include "gemu.h"
14 
15 #include "linux_bin.h"
16 #include "elf.h"
17 #include "segment.h"
18 
19 /* Necessary parameters */
20 #define	ALPHA_PAGE_SIZE 4096
21 #define	X86_PAGE_SIZE 4096
22 
23 #define ALPHA_PAGE_MASK (~(ALPHA_PAGE_SIZE-1))
24 #define X86_PAGE_MASK (~(X86_PAGE_SIZE-1))
25 
26 #define ALPHA_PAGE_ALIGN(addr) ((((addr)+ALPHA_PAGE_SIZE)-1)&ALPHA_PAGE_MASK)
27 #define X86_PAGE_ALIGN(addr) ((((addr)+X86_PAGE_SIZE)-1)&X86_PAGE_MASK)
28 
29 #define NGROUPS 32
30 
31 #define X86_ELF_EXEC_PAGESIZE X86_PAGE_SIZE
32 #define X86_ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(X86_ELF_EXEC_PAGESIZE-1))
33 #define X86_ELF_PAGEOFFSET(_v) ((_v) & (X86_ELF_EXEC_PAGESIZE-1))
34 
35 #define ALPHA_ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(ALPHA_PAGE_SIZE-1))
36 #define ALPHA_ELF_PAGEOFFSET(_v) ((_v) & (ALPHA_PAGE_SIZE-1))
37 
38 #define INTERPRETER_NONE 0
39 #define INTERPRETER_AOUT 1
40 #define INTERPRETER_ELF 2
41 
42 #define DLINFO_ITEMS 12
43 
44 /* Where we find X86 libraries... */
45 //#define X86_DEFAULT_LIB_DIR	"/usr/x86/"
46 #define X86_DEFAULT_LIB_DIR	"/"
47 
48 //extern void * mmap4k();
49 #define mmap4k(a, b, c, d, e, f) mmap((void *)(a), b, c, d, e, f)
50 
51 extern unsigned long x86_stack_size;
52 
53 static int load_aout_interp(void * exptr, int interp_fd);
54 
55 #ifdef BSWAP_NEEDED
56 static void bswap_ehdr(Elf32_Ehdr *ehdr)
57 {
58     bswap16s(&ehdr->e_type);			/* Object file type */
59     bswap16s(&ehdr->e_machine);		/* Architecture */
60     bswap32s(&ehdr->e_version);		/* Object file version */
61     bswap32s(&ehdr->e_entry);		/* Entry point virtual address */
62     bswap32s(&ehdr->e_phoff);		/* Program header table file offset */
63     bswap32s(&ehdr->e_shoff);		/* Section header table file offset */
64     bswap32s(&ehdr->e_flags);		/* Processor-specific flags */
65     bswap16s(&ehdr->e_ehsize);		/* ELF header size in bytes */
66     bswap16s(&ehdr->e_phentsize);		/* Program header table entry size */
67     bswap16s(&ehdr->e_phnum);		/* Program header table entry count */
68     bswap16s(&ehdr->e_shentsize);		/* Section header table entry size */
69     bswap16s(&ehdr->e_shnum);		/* Section header table entry count */
70     bswap16s(&ehdr->e_shstrndx);		/* Section header string table index */
71 }
72 
73 static void bswap_phdr(Elf32_Phdr *phdr)
74 {
75     bswap32s(&phdr->p_type);			/* Segment type */
76     bswap32s(&phdr->p_offset);		/* Segment file offset */
77     bswap32s(&phdr->p_vaddr);		/* Segment virtual address */
78     bswap32s(&phdr->p_paddr);		/* Segment physical address */
79     bswap32s(&phdr->p_filesz);		/* Segment size in file */
80     bswap32s(&phdr->p_memsz);		/* Segment size in memory */
81     bswap32s(&phdr->p_flags);		/* Segment flags */
82     bswap32s(&phdr->p_align);		/* Segment alignment */
83 }
84 #endif
85 
86 static void * get_free_page(void)
87 {
88     void *	retval;
89 
90     /* User-space version of kernel get_free_page.  Returns a page-aligned
91      * page-sized chunk of memory.
92      */
93     retval = mmap4k(0, ALPHA_PAGE_SIZE, PROT_READ|PROT_WRITE,
94 			MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
95 
96     if((long)retval == -1) {
97 	perror("get_free_page");
98 	exit(-1);
99     }
100     else {
101 	return(retval);
102     }
103 }
104 
105 static void free_page(void * pageaddr)
106 {
107     (void)munmap(pageaddr, ALPHA_PAGE_SIZE);
108 }
109 
110 /*
111  * 'copy_string()' copies argument/envelope strings from user
112  * memory to free pages in kernel mem. These are in a format ready
113  * to be put directly into the top of new user memory.
114  *
115  */
116 static unsigned long copy_strings(int argc,char ** argv,unsigned long *page,
117                 unsigned long p)
118 {
119     char *tmp, *tmp1, *pag = NULL;
120     int len, offset = 0;
121 
122     if (!p) {
123 	return 0;       /* bullet-proofing */
124     }
125     while (argc-- > 0) {
126 	if (!(tmp1 = tmp = get_user(argv+argc))) {
127 	    fprintf(stderr, "VFS: argc is wrong");
128 	    exit(-1);
129 	}
130 	while (get_user(tmp++));
131 	len = tmp - tmp1;
132 	if (p < len) {  /* this shouldn't happen - 128kB */
133 		return 0;
134 	}
135 	while (len) {
136 	    --p; --tmp; --len;
137 	    if (--offset < 0) {
138 		offset = p % X86_PAGE_SIZE;
139 		if (!(pag = (char *) page[p/X86_PAGE_SIZE]) &&
140 		    !(pag = (char *) page[p/X86_PAGE_SIZE] =
141 		      (unsigned long *) get_free_page())) {
142 			return 0;
143 		}
144 	    }
145 	    if (len == 0 || offset == 0) {
146 	        *(pag + offset) = get_user(tmp);
147 	    }
148 	    else {
149 	      int bytes_to_copy = (len > offset) ? offset : len;
150 	      tmp -= bytes_to_copy;
151 	      p -= bytes_to_copy;
152 	      offset -= bytes_to_copy;
153 	      len -= bytes_to_copy;
154 	      memcpy_fromfs(pag + offset, tmp, bytes_to_copy + 1);
155 	    }
156 	}
157     }
158     return p;
159 }
160 
161 static int in_group_p(gid_t g)
162 {
163     /* return TRUE if we're in the specified group, FALSE otherwise */
164     int		ngroup;
165     int		i;
166     gid_t	grouplist[NGROUPS];
167 
168     ngroup = getgroups(NGROUPS, grouplist);
169     for(i = 0; i < ngroup; i++) {
170 	if(grouplist[i] == g) {
171 	    return 1;
172 	}
173     }
174     return 0;
175 }
176 
177 static int count(char ** vec)
178 {
179     int		i;
180 
181     for(i = 0; *vec; i++) {
182         vec++;
183     }
184 
185     return(i);
186 }
187 
188 static int prepare_binprm(struct linux_binprm *bprm)
189 {
190     struct stat		st;
191     int mode;
192     int retval, id_change;
193 
194     if(fstat(bprm->fd, &st) < 0) {
195 	return(-errno);
196     }
197 
198     mode = st.st_mode;
199     if(!S_ISREG(mode)) {	/* Must be regular file */
200 	return(-EACCES);
201     }
202     if(!(mode & 0111)) {	/* Must have at least one execute bit set */
203 	return(-EACCES);
204     }
205 
206     bprm->e_uid = geteuid();
207     bprm->e_gid = getegid();
208     id_change = 0;
209 
210     /* Set-uid? */
211     if(mode & S_ISUID) {
212     	bprm->e_uid = st.st_uid;
213 	if(bprm->e_uid != geteuid()) {
214 	    id_change = 1;
215 	}
216     }
217 
218     /* Set-gid? */
219     /*
220      * If setgid is set but no group execute bit then this
221      * is a candidate for mandatory locking, not a setgid
222      * executable.
223      */
224     if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
225 	bprm->e_gid = st.st_gid;
226 	if (!in_group_p(bprm->e_gid)) {
227 		id_change = 1;
228 	}
229     }
230 
231     memset(bprm->buf, 0, sizeof(bprm->buf));
232     retval = lseek(bprm->fd, 0L, SEEK_SET);
233     if(retval >= 0) {
234         retval = read(bprm->fd, bprm->buf, 128);
235     }
236     if(retval < 0) {
237 	perror("prepare_binprm");
238 	exit(-1);
239 	/* return(-errno); */
240     }
241     else {
242 	return(retval);
243     }
244 }
245 
246 unsigned long setup_arg_pages(unsigned long p, struct linux_binprm * bprm,
247 						struct image_info * info)
248 {
249     unsigned long stack_base;
250     int i;
251     extern unsigned long stktop;
252 
253     stack_base = X86_STACK_TOP - MAX_ARG_PAGES*X86_PAGE_SIZE;
254 
255     p += stack_base;
256     if (bprm->loader) {
257 	bprm->loader += stack_base;
258     }
259     bprm->exec += stack_base;
260 
261     /* Create enough stack to hold everything.  If we don't use
262      * it for args, we'll use it for something else...
263      */
264     if(x86_stack_size >  MAX_ARG_PAGES*X86_PAGE_SIZE) {
265         if((long)mmap4k((void *)(X86_STACK_TOP-x86_stack_size), x86_stack_size + X86_PAGE_SIZE,
266     		     PROT_READ | PROT_WRITE,
267 		     MAP_GROWSDOWN | MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0) == -1) {
268 	    perror("stk mmap");
269 	    exit(-1);
270 	}
271     }
272     else {
273         if((long)mmap4k((void *)stack_base, (MAX_ARG_PAGES+1)*X86_PAGE_SIZE,
274     		     PROT_READ | PROT_WRITE,
275 		     MAP_GROWSDOWN | MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0) == -1) {
276 	    perror("stk mmap");
277 	    exit(-1);
278 	}
279     }
280 
281     stktop = stack_base;
282 
283     for (i = 0 ; i < MAX_ARG_PAGES ; i++) {
284 	if (bprm->page[i]) {
285 	    info->rss++;
286 
287 	    memcpy((void *)stack_base, (void *)bprm->page[i], X86_PAGE_SIZE);
288 	    free_page((void *)bprm->page[i]);
289 	}
290 	stack_base += X86_PAGE_SIZE;
291     }
292     return p;
293 }
294 
295 static void set_brk(unsigned long start, unsigned long end)
296 {
297 	/* page-align the start and end addresses... */
298         start = ALPHA_PAGE_ALIGN(start);
299         end = ALPHA_PAGE_ALIGN(end);
300         if (end <= start)
301                 return;
302         if((long)mmap4k(start, end - start,
303                 PROT_READ | PROT_WRITE | PROT_EXEC,
304                 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0) == -1) {
305 	    perror("cannot mmap brk");
306 	    exit(-1);
307 	}
308 }
309 
310 
311 /* We need to explicitly zero any fractional pages
312    after the data section (i.e. bss).  This would
313    contain the junk from the file that should not
314    be in memory */
315 
316 
317 static void padzero(unsigned long elf_bss)
318 {
319         unsigned long nbyte;
320         char * fpnt;
321 
322         nbyte = elf_bss & (ALPHA_PAGE_SIZE-1);	/* was X86_PAGE_SIZE - JRP */
323         if (nbyte) {
324 	    nbyte = ALPHA_PAGE_SIZE - nbyte;
325 	    fpnt = (char *) elf_bss;
326 	    do {
327 		*fpnt++ = 0;
328 	    } while (--nbyte);
329         }
330 }
331 
332 static unsigned int * create_elf_tables(char *p, int argc, int envc,
333                                   struct elfhdr * exec,
334                                   unsigned long load_addr,
335                                   unsigned long interp_load_addr, int ibcs,
336 				  struct image_info *info)
337 {
338         target_ulong *argv, *envp, *dlinfo;
339         target_ulong *sp;
340 
341         /*
342          * Force 16 byte alignment here for generality.
343          */
344         sp = (unsigned int *) (~15UL & (unsigned long) p);
345         sp -= exec ? DLINFO_ITEMS*2 : 2;
346         dlinfo = sp;
347         sp -= envc+1;
348         envp = sp;
349         sp -= argc+1;
350         argv = sp;
351         if (!ibcs) {
352                 put_user(tswapl((target_ulong)envp),--sp);
353                 put_user(tswapl((target_ulong)argv),--sp);
354         }
355 
356 #define NEW_AUX_ENT(id, val) \
357           put_user (tswapl(id), dlinfo++); \
358           put_user (tswapl(val), dlinfo++)
359 
360         if (exec) { /* Put this here for an ELF program interpreter */
361           struct elf_phdr * eppnt;
362           eppnt = (struct elf_phdr *)((unsigned long)exec->e_phoff);
363 
364           NEW_AUX_ENT (AT_PHDR, (unsigned int)(load_addr + exec->e_phoff));
365           NEW_AUX_ENT (AT_PHENT, (unsigned int)(sizeof (struct elf_phdr)));
366           NEW_AUX_ENT (AT_PHNUM, (unsigned int)(exec->e_phnum));
367           NEW_AUX_ENT (AT_PAGESZ, (unsigned int)(ALPHA_PAGE_SIZE));
368           NEW_AUX_ENT (AT_BASE, (unsigned int)(interp_load_addr));
369           NEW_AUX_ENT (AT_FLAGS, (unsigned int)0);
370           NEW_AUX_ENT (AT_ENTRY, (unsigned int) exec->e_entry);
371           NEW_AUX_ENT (AT_UID, (unsigned int) getuid());
372           NEW_AUX_ENT (AT_EUID, (unsigned int) geteuid());
373           NEW_AUX_ENT (AT_GID, (unsigned int) getgid());
374           NEW_AUX_ENT (AT_EGID, (unsigned int) getegid());
375         }
376         NEW_AUX_ENT (AT_NULL, 0);
377 #undef NEW_AUX_ENT
378         put_user(tswapl(argc),--sp);
379         info->arg_start = (unsigned int)((unsigned long)p & 0xffffffff);
380         while (argc-->0) {
381                 put_user(tswapl((target_ulong)p),argv++);
382                 while (get_user(p++)) /* nothing */ ;
383         }
384         put_user(0,argv);
385         info->arg_end = info->env_start = (unsigned int)((unsigned long)p & 0xffffffff);
386         while (envc-->0) {
387                 put_user(tswapl((target_ulong)p),envp++);
388                 while (get_user(p++)) /* nothing */ ;
389         }
390         put_user(0,envp);
391         info->env_end = (unsigned int)((unsigned long)p & 0xffffffff);
392         return sp;
393 }
394 
395 
396 
397 static unsigned long load_elf_interp(struct elfhdr * interp_elf_ex,
398 				     int interpreter_fd,
399 				     unsigned long *interp_load_addr)
400 {
401 	struct elf_phdr *elf_phdata  =  NULL;
402 	struct elf_phdr *eppnt;
403 	unsigned long load_addr;
404 	int load_addr_set = 0;
405 	int retval;
406 	unsigned long last_bss, elf_bss;
407 	unsigned long error;
408 	int i;
409 
410 	elf_bss = 0;
411 	last_bss = 0;
412 	error = 0;
413 
414 	/* We put this here so that mmap will search for the *first*
415 	 * available memory...
416 	 */
417 	load_addr = INTERP_LOADADDR;
418 
419 	/* First of all, some simple consistency checks */
420 	if ((interp_elf_ex->e_type != ET_EXEC &&
421 	    interp_elf_ex->e_type != ET_DYN) ||
422 	   !elf_check_arch(interp_elf_ex->e_machine)) {
423 		return ~0UL;
424 	}
425 
426 	/* Now read in all of the header information */
427 
428 	if (sizeof(struct elf_phdr) * interp_elf_ex->e_phnum > X86_PAGE_SIZE)
429 	    return ~0UL;
430 
431 	elf_phdata =  (struct elf_phdr *)
432 		malloc(sizeof(struct elf_phdr) * interp_elf_ex->e_phnum);
433 
434 	if (!elf_phdata)
435 	  return ~0UL;
436 
437 	/*
438 	 * If the size of this structure has changed, then punt, since
439 	 * we will be doing the wrong thing.
440 	 */
441 	if (interp_elf_ex->e_phentsize != sizeof(struct elf_phdr))
442 	  {
443 	    free(elf_phdata);
444 	    return ~0UL;
445 	  }
446 
447 	retval = lseek(interpreter_fd, interp_elf_ex->e_phoff, SEEK_SET);
448 	if(retval >= 0) {
449 	    retval = read(interpreter_fd,
450 			   (char *) elf_phdata,
451 			   sizeof(struct elf_phdr) * interp_elf_ex->e_phnum);
452 	}
453 
454 	if (retval < 0) {
455 		perror("load_elf_interp");
456 		exit(-1);
457 		free (elf_phdata);
458 		return retval;
459  	}
460 #ifdef BSWAP_NEEDED
461 	eppnt = elf_phdata;
462 	for (i=0; i<interp_elf_ex->e_phnum; i++, eppnt++) {
463             bswap_phdr(eppnt);
464         }
465 #endif
466 	eppnt = elf_phdata;
467 	for(i=0; i<interp_elf_ex->e_phnum; i++, eppnt++)
468 	  if (eppnt->p_type == PT_LOAD) {
469 	    int elf_type = MAP_PRIVATE | MAP_DENYWRITE;
470 	    int elf_prot = 0;
471 	    unsigned long vaddr = 0;
472 	    unsigned long k;
473 
474 	    if (eppnt->p_flags & PF_R) elf_prot =  PROT_READ;
475 	    if (eppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
476 	    if (eppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
477 	    if (interp_elf_ex->e_type == ET_EXEC || load_addr_set) {
478 	    	elf_type |= MAP_FIXED;
479 	    	vaddr = eppnt->p_vaddr;
480 	    }
481 	    error = (unsigned long)mmap4k(load_addr+X86_ELF_PAGESTART(vaddr),
482 		 eppnt->p_filesz + X86_ELF_PAGEOFFSET(eppnt->p_vaddr),
483 		 elf_prot,
484 		 elf_type,
485 		 interpreter_fd,
486 		 eppnt->p_offset - X86_ELF_PAGEOFFSET(eppnt->p_vaddr));
487 
488 	    if (error > -1024UL) {
489 	      /* Real error */
490 	      close(interpreter_fd);
491 	      free(elf_phdata);
492 	      return ~0UL;
493 	    }
494 
495 	    if (!load_addr_set && interp_elf_ex->e_type == ET_DYN) {
496 	      load_addr = error;
497 	      load_addr_set = 1;
498 	    }
499 
500 	    /*
501 	     * Find the end of the file  mapping for this phdr, and keep
502 	     * track of the largest address we see for this.
503 	     */
504 	    k = load_addr + eppnt->p_vaddr + eppnt->p_filesz;
505 	    if (k > elf_bss) elf_bss = k;
506 
507 	    /*
508 	     * Do the same thing for the memory mapping - between
509 	     * elf_bss and last_bss is the bss section.
510 	     */
511 	    k = load_addr + eppnt->p_memsz + eppnt->p_vaddr;
512 	    if (k > last_bss) last_bss = k;
513 	  }
514 
515 	/* Now use mmap to map the library into memory. */
516 
517 	close(interpreter_fd);
518 
519 	/*
520 	 * Now fill out the bss section.  First pad the last page up
521 	 * to the page boundary, and then perform a mmap to make sure
522 	 * that there are zeromapped pages up to and including the last
523 	 * bss page.
524 	 */
525 	padzero(elf_bss);
526 	elf_bss = X86_ELF_PAGESTART(elf_bss + ALPHA_PAGE_SIZE - 1); /* What we have mapped so far */
527 
528 	/* Map the last of the bss segment */
529 	if (last_bss > elf_bss) {
530 	  mmap4k(elf_bss, last_bss-elf_bss,
531 		  PROT_READ|PROT_WRITE|PROT_EXEC,
532 		  MAP_FIXED|MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
533 	}
534 	free(elf_phdata);
535 
536 	*interp_load_addr = load_addr;
537 	return ((unsigned long) interp_elf_ex->e_entry) + load_addr;
538 }
539 
540 
541 
542 static int load_elf_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
543                            struct image_info * info)
544 {
545     struct elfhdr elf_ex;
546     struct elfhdr interp_elf_ex;
547     struct exec interp_ex;
548     int interpreter_fd = -1; /* avoid warning */
549     unsigned long load_addr;
550     int load_addr_set = 0;
551     unsigned int interpreter_type = INTERPRETER_NONE;
552     unsigned char ibcs2_interpreter;
553     int i;
554     void * mapped_addr;
555     struct elf_phdr * elf_ppnt;
556     struct elf_phdr *elf_phdata;
557     unsigned long elf_bss, k, elf_brk;
558     int retval;
559     char * elf_interpreter;
560     unsigned long elf_entry, interp_load_addr = 0;
561     int status;
562     unsigned long start_code, end_code, end_data;
563     unsigned long elf_stack;
564     char passed_fileno[6];
565 
566     ibcs2_interpreter = 0;
567     status = 0;
568     load_addr = 0;
569     elf_ex = *((struct elfhdr *) bprm->buf);          /* exec-header */
570 #ifdef BSWAP_NEEDED
571     bswap_ehdr(&elf_ex);
572 #endif
573 
574     if (elf_ex.e_ident[0] != 0x7f ||
575 	strncmp(&elf_ex.e_ident[1], "ELF",3) != 0) {
576 	    return  -ENOEXEC;
577     }
578 
579     /* First of all, some simple consistency checks */
580     if ((elf_ex.e_type != ET_EXEC && elf_ex.e_type != ET_DYN) ||
581        				(! elf_check_arch(elf_ex.e_machine))) {
582 	    return -ENOEXEC;
583     }
584 
585     /* Now read in all of the header information */
586 
587     elf_phdata = (struct elf_phdr *)malloc(elf_ex.e_phentsize*elf_ex.e_phnum);
588     if (elf_phdata == NULL) {
589 	return -ENOMEM;
590     }
591 
592     retval = lseek(bprm->fd, elf_ex.e_phoff, SEEK_SET);
593     if(retval > 0) {
594 	retval = read(bprm->fd, (char *) elf_phdata,
595 				elf_ex.e_phentsize * elf_ex.e_phnum);
596     }
597 
598     if (retval < 0) {
599 	perror("load_elf_binary");
600 	exit(-1);
601 	free (elf_phdata);
602 	return -errno;
603     }
604 
605 #ifdef BSWAP_NEEDED
606     elf_ppnt = elf_phdata;
607     for (i=0; i<elf_ex.e_phnum; i++, elf_ppnt++) {
608         bswap_phdr(elf_ppnt);
609     }
610 #endif
611     elf_ppnt = elf_phdata;
612 
613     elf_bss = 0;
614     elf_brk = 0;
615 
616 
617     elf_stack = ~0UL;
618     elf_interpreter = NULL;
619     start_code = ~0UL;
620     end_code = 0;
621     end_data = 0;
622 
623     for(i=0;i < elf_ex.e_phnum; i++) {
624 	if (elf_ppnt->p_type == PT_INTERP) {
625 	    if ( elf_interpreter != NULL )
626 	    {
627 		free (elf_phdata);
628 		free(elf_interpreter);
629 		close(bprm->fd);
630 		return -EINVAL;
631 	    }
632 
633 	    /* This is the program interpreter used for
634 	     * shared libraries - for now assume that this
635 	     * is an a.out format binary
636 	     */
637 
638 	    elf_interpreter = (char *)malloc(elf_ppnt->p_filesz+strlen(X86_DEFAULT_LIB_DIR));
639 
640 	    if (elf_interpreter == NULL) {
641 		free (elf_phdata);
642 		close(bprm->fd);
643 		return -ENOMEM;
644 	    }
645 
646 	    strcpy(elf_interpreter, X86_DEFAULT_LIB_DIR);
647 	    retval = lseek(bprm->fd, elf_ppnt->p_offset, SEEK_SET);
648 	    if(retval >= 0) {
649 		retval = read(bprm->fd,
650 			      elf_interpreter+strlen(X86_DEFAULT_LIB_DIR),
651 			      elf_ppnt->p_filesz);
652 	    }
653 	    if(retval < 0) {
654 	 	perror("load_elf_binary2");
655 		exit(-1);
656 	    }
657 
658 	    /* If the program interpreter is one of these two,
659 	       then assume an iBCS2 image. Otherwise assume
660 	       a native linux image. */
661 
662 	    /* JRP - Need to add X86 lib dir stuff here... */
663 
664 	    if (strcmp(elf_interpreter,"/usr/lib/libc.so.1") == 0 ||
665 		strcmp(elf_interpreter,"/usr/lib/ld.so.1") == 0) {
666 	      ibcs2_interpreter = 1;
667 	    }
668 
669 #if 0
670 	    printf("Using ELF interpreter %s\n", elf_interpreter);
671 #endif
672 	    if (retval >= 0) {
673 		retval = open(elf_interpreter, O_RDONLY);
674 		if(retval >= 0) {
675 		    interpreter_fd = retval;
676 		}
677 		else {
678 		    perror(elf_interpreter);
679 		    exit(-1);
680 		    /* retval = -errno; */
681 		}
682 	    }
683 
684 	    if (retval >= 0) {
685 		retval = lseek(interpreter_fd, 0, SEEK_SET);
686 		if(retval >= 0) {
687 		    retval = read(interpreter_fd,bprm->buf,128);
688 		}
689 	    }
690 	    if (retval >= 0) {
691 		interp_ex = *((struct exec *) bprm->buf); /* aout exec-header */
692 		interp_elf_ex=*((struct elfhdr *) bprm->buf); /* elf exec-header */
693 	    }
694 	    if (retval < 0) {
695 		perror("load_elf_binary3");
696 		exit(-1);
697 		free (elf_phdata);
698 		free(elf_interpreter);
699 		close(bprm->fd);
700 		return retval;
701 	    }
702 	}
703 	elf_ppnt++;
704     }
705 
706     /* Some simple consistency checks for the interpreter */
707     if (elf_interpreter){
708 	interpreter_type = INTERPRETER_ELF | INTERPRETER_AOUT;
709 
710 	/* Now figure out which format our binary is */
711 	if ((N_MAGIC(interp_ex) != OMAGIC) && (N_MAGIC(interp_ex) != ZMAGIC) &&
712 	    	(N_MAGIC(interp_ex) != QMAGIC)) {
713 	  interpreter_type = INTERPRETER_ELF;
714 	}
715 
716 	if (interp_elf_ex.e_ident[0] != 0x7f ||
717 	    	strncmp(&interp_elf_ex.e_ident[1], "ELF",3) != 0) {
718 	    interpreter_type &= ~INTERPRETER_ELF;
719 	}
720 
721 	if (!interpreter_type) {
722 	    free(elf_interpreter);
723 	    free(elf_phdata);
724 	    close(bprm->fd);
725 	    return -ELIBBAD;
726 	}
727     }
728 
729     /* OK, we are done with that, now set up the arg stuff,
730        and then start this sucker up */
731 
732     if (!bprm->sh_bang) {
733 	char * passed_p;
734 
735 	if (interpreter_type == INTERPRETER_AOUT) {
736 	    sprintf(passed_fileno, "%d", bprm->fd);
737 	    passed_p = passed_fileno;
738 
739 	    if (elf_interpreter) {
740 		bprm->p = copy_strings(1,&passed_p,bprm->page,bprm->p);
741 		bprm->argc++;
742 	    }
743 	}
744 	if (!bprm->p) {
745 	    if (elf_interpreter) {
746 	        free(elf_interpreter);
747 	    }
748 	    free (elf_phdata);
749 	    close(bprm->fd);
750 	    return -E2BIG;
751 	}
752     }
753 
754     /* OK, This is the point of no return */
755     info->end_data = 0;
756     info->end_code = 0;
757     info->start_mmap = (unsigned long)ELF_START_MMAP;
758     info->mmap = 0;
759     elf_entry = (unsigned long) elf_ex.e_entry;
760 
761     /* Do this so that we can load the interpreter, if need be.  We will
762        change some of these later */
763     info->rss = 0;
764     bprm->p = setup_arg_pages(bprm->p, bprm, info);
765     info->start_stack = bprm->p;
766 
767     /* Now we do a little grungy work by mmaping the ELF image into
768      * the correct location in memory.  At this point, we assume that
769      * the image should be loaded at fixed address, not at a variable
770      * address.
771      */
772 
773 
774 
775     for(i = 0, elf_ppnt = elf_phdata; i < elf_ex.e_phnum; i++, elf_ppnt++) {
776 	if (elf_ppnt->p_type == PT_LOAD) {
777 	    int elf_prot = 0;
778 	    if (elf_ppnt->p_flags & PF_R) elf_prot |= PROT_READ;
779 	    if (elf_ppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
780 	    if (elf_ppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
781 
782 	    mapped_addr = mmap4k(X86_ELF_PAGESTART(elf_ppnt->p_vaddr),
783 		    (elf_ppnt->p_filesz +
784 			    X86_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)),
785 		    elf_prot,
786 		    (MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE),
787 		    bprm->fd,
788 		    (elf_ppnt->p_offset -
789 			    X86_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)));
790 
791 	    if((unsigned long)mapped_addr == 0xffffffffffffffff) {
792 		perror("mmap");
793 		exit(-1);
794 	    }
795 
796 
797 
798 #ifdef LOW_ELF_STACK
799 	    if (X86_ELF_PAGESTART(elf_ppnt->p_vaddr) < elf_stack)
800 		    elf_stack = X86_ELF_PAGESTART(elf_ppnt->p_vaddr);
801 #endif
802 
803 	    if (!load_addr_set) {
804 	        load_addr = elf_ppnt->p_vaddr - elf_ppnt->p_offset;
805 	        load_addr_set = 1;
806 	    }
807 	    k = elf_ppnt->p_vaddr;
808 	    if (k < start_code) start_code = k;
809 	    k = elf_ppnt->p_vaddr + elf_ppnt->p_filesz;
810 	    if (k > elf_bss) elf_bss = k;
811 #if 1
812 	    if ((elf_ppnt->p_flags & PF_X) && end_code <  k)
813 #else
814 	    if ( !(elf_ppnt->p_flags & PF_W) && end_code <  k)
815 #endif
816 		    end_code = k;
817 	    if (end_data < k) end_data = k;
818 	    k = elf_ppnt->p_vaddr + elf_ppnt->p_memsz;
819 	    if (k > elf_brk) elf_brk = k;
820 	}
821     }
822 
823     if (elf_interpreter) {
824 	if (interpreter_type & 1) {
825 	    elf_entry = load_aout_interp(&interp_ex, interpreter_fd);
826 	}
827 	else if (interpreter_type & 2) {
828 	    elf_entry = load_elf_interp(&interp_elf_ex, interpreter_fd,
829 					    &interp_load_addr);
830 	}
831 
832 	close(interpreter_fd);
833 	free(elf_interpreter);
834 
835 	if (elf_entry == ~0UL) {
836 	    printf("Unable to load interpreter\n");
837 	    free(elf_phdata);
838 	    exit(-1);
839 	    return 0;
840 	}
841     }
842 
843     free(elf_phdata);
844 
845     if (interpreter_type != INTERPRETER_AOUT) close(bprm->fd);
846     info->personality = (ibcs2_interpreter ? PER_SVR4 : PER_LINUX);
847 
848 #ifdef LOW_ELF_STACK
849     info->start_stack = bprm->p = elf_stack - 4;
850 #endif
851     bprm->p = (unsigned long)
852       create_elf_tables((char *)bprm->p,
853 		    bprm->argc,
854 		    bprm->envc,
855 		    (interpreter_type == INTERPRETER_ELF ? &elf_ex : NULL),
856 		    load_addr,
857 		    interp_load_addr,
858 		    (interpreter_type == INTERPRETER_AOUT ? 0 : 1),
859 		    info);
860     if (interpreter_type == INTERPRETER_AOUT)
861       info->arg_start += strlen(passed_fileno) + 1;
862     info->start_brk = info->brk = elf_brk;
863     info->end_code = end_code;
864     info->start_code = start_code;
865     info->end_data = end_data;
866     info->start_stack = bprm->p;
867 
868     /* Calling set_brk effectively mmaps the pages that we need for the bss and break
869        sections */
870     set_brk(elf_bss, elf_brk);
871 
872     padzero(elf_bss);
873 
874 #if 0
875     printf("(start_brk) %x\n" , info->start_brk);
876     printf("(end_code) %x\n" , info->end_code);
877     printf("(start_code) %x\n" , info->start_code);
878     printf("(end_data) %x\n" , info->end_data);
879     printf("(start_stack) %x\n" , info->start_stack);
880     printf("(brk) %x\n" , info->brk);
881 #endif
882 
883     if ( info->personality == PER_SVR4 )
884     {
885 	    /* Why this, you ask???  Well SVr4 maps page 0 as read-only,
886 	       and some applications "depend" upon this behavior.
887 	       Since we do not have the power to recompile these, we
888 	       emulate the SVr4 behavior.  Sigh.  */
889 	    mapped_addr = mmap4k(NULL, ALPHA_PAGE_SIZE, PROT_READ | PROT_EXEC,
890 			    MAP_FIXED | MAP_PRIVATE, -1, 0);
891     }
892 
893 #ifdef ELF_PLAT_INIT
894     /*
895      * The ABI may specify that certain registers be set up in special
896      * ways (on i386 %edx is the address of a DT_FINI function, for
897      * example.  This macro performs whatever initialization to
898      * the regs structure is required.
899      */
900     ELF_PLAT_INIT(regs);
901 #endif
902 
903 
904     info->entry = elf_entry;
905 
906     return 0;
907 }
908 
909 
910 
911 int elf_exec(const char * filename, char ** argv, char ** envp,
912              struct target_pt_regs * regs, struct image_info *infop)
913 {
914         struct linux_binprm bprm;
915         int retval;
916         int i;
917 
918         bprm.p = X86_PAGE_SIZE*MAX_ARG_PAGES-sizeof(unsigned int);
919         for (i=0 ; i<MAX_ARG_PAGES ; i++)       /* clear page-table */
920                 bprm.page[i] = 0;
921         retval = open(filename, O_RDONLY);
922         if (retval == -1) {
923 	    perror(filename);
924 	    exit(-1);
925             /* return retval; */
926 	}
927 	else {
928 	    bprm.fd = retval;
929 	}
930         bprm.filename = (char *)filename;
931         bprm.sh_bang = 0;
932         bprm.loader = 0;
933         bprm.exec = 0;
934         bprm.dont_iput = 0;
935 	bprm.argc = count(argv);
936 	bprm.envc = count(envp);
937 
938         retval = prepare_binprm(&bprm);
939 
940         if(retval>=0) {
941 	    bprm.p = copy_strings(1, &bprm.filename, bprm.page, bprm.p);
942 	    bprm.exec = bprm.p;
943 	    bprm.p = copy_strings(bprm.envc,envp,bprm.page,bprm.p);
944 	    bprm.p = copy_strings(bprm.argc,argv,bprm.page,bprm.p);
945 	    if (!bprm.p) {
946 		retval = -E2BIG;
947 	    }
948         }
949 
950         if(retval>=0) {
951 	    retval = load_elf_binary(&bprm,regs,infop);
952 	}
953         if(retval>=0) {
954 	    /* success.  Initialize important registers */
955 	    regs->esp = infop->start_stack;
956 	    regs->eip = infop->entry;
957 	    return retval;
958 	}
959 
960         /* Something went wrong, return the inode and free the argument pages*/
961         for (i=0 ; i<MAX_ARG_PAGES ; i++) {
962 	    free_page((void *)bprm.page[i]);
963 	}
964         return(retval);
965 }
966 
967 
968 static int load_aout_interp(void * exptr, int interp_fd)
969 {
970     printf("a.out interpreter not yet supported\n");
971     return(0);
972 }
973 
974