2021-08-06 21:05:02 +03:00
|
|
|
/*
|
|
|
|
* ELF loading code
|
|
|
|
*
|
|
|
|
* Copyright (c) 2013 Stacey D. Son
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2016-01-29 20:49:53 +03:00
|
|
|
#include "qemu/osdep.h"
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
#include "qemu.h"
|
2012-10-24 13:12:21 +04:00
|
|
|
#include "disas/disas.h"
|
2016-03-20 20:16:19 +03:00
|
|
|
#include "qemu/path.h"
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-29 19:41:29 +03:00
|
|
|
#include "target_arch_elf.h"
|
2021-08-04 07:04:20 +03:00
|
|
|
#include "target_os_thread.h"
|
2021-04-29 19:41:29 +03:00
|
|
|
|
2008-10-26 23:33:16 +03:00
|
|
|
/* this flag is uneffective under linux too, should be deleted */
|
|
|
|
#ifndef MAP_DENYWRITE
|
|
|
|
#define MAP_DENYWRITE 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* should probably go in elf.h */
|
|
|
|
#ifndef ELIBBAD
|
|
|
|
#define ELIBBAD 80
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef ELF_PLATFORM
|
|
|
|
#define ELF_PLATFORM (NULL)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef ELF_HWCAP
|
|
|
|
#define ELF_HWCAP 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef TARGET_ABI32
|
|
|
|
#undef ELF_CLASS
|
|
|
|
#define ELF_CLASS ELFCLASS32
|
|
|
|
#undef bswaptls
|
|
|
|
#define bswaptls(ptr) bswap32s(ptr)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "elf.h"
|
|
|
|
|
|
|
|
/* max code+data+bss space allocated to elf interpreter */
|
|
|
|
#define INTERP_MAP_SIZE (32 * 1024 * 1024)
|
|
|
|
|
|
|
|
/* max code+data+bss+brk space allocated to ET_DYN executables */
|
|
|
|
#define ET_DYN_MAP_SIZE (128 * 1024 * 1024)
|
|
|
|
|
|
|
|
/* Necessary parameters */
|
|
|
|
#define TARGET_ELF_EXEC_PAGESIZE TARGET_PAGE_SIZE
|
2021-04-23 18:05:57 +03:00
|
|
|
#define TARGET_ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(TARGET_ELF_EXEC_PAGESIZE - 1))
|
|
|
|
#define TARGET_ELF_PAGEOFFSET(_v) ((_v) & (TARGET_ELF_EXEC_PAGESIZE - 1))
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
#define DLINFO_ITEMS 12
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
static inline void memcpy_fromfs(void *to, const void *from, unsigned long n)
|
2008-10-26 23:33:16 +03:00
|
|
|
{
|
2021-08-03 07:59:12 +03:00
|
|
|
memcpy(to, from, n);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef BSWAP_NEEDED
|
|
|
|
static void bswap_ehdr(struct elfhdr *ehdr)
|
|
|
|
{
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap16s(&ehdr->e_type); /* Object file type */
|
2008-10-26 23:33:16 +03:00
|
|
|
bswap16s(&ehdr->e_machine); /* Architecture */
|
|
|
|
bswap32s(&ehdr->e_version); /* Object file version */
|
|
|
|
bswaptls(&ehdr->e_entry); /* Entry point virtual address */
|
|
|
|
bswaptls(&ehdr->e_phoff); /* Program header table file offset */
|
|
|
|
bswaptls(&ehdr->e_shoff); /* Section header table file offset */
|
|
|
|
bswap32s(&ehdr->e_flags); /* Processor-specific flags */
|
|
|
|
bswap16s(&ehdr->e_ehsize); /* ELF header size in bytes */
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap16s(&ehdr->e_phentsize); /* Program header table entry size */
|
2008-10-26 23:33:16 +03:00
|
|
|
bswap16s(&ehdr->e_phnum); /* Program header table entry count */
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap16s(&ehdr->e_shentsize); /* Section header table entry size */
|
2008-10-26 23:33:16 +03:00
|
|
|
bswap16s(&ehdr->e_shnum); /* Section header table entry count */
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap16s(&ehdr->e_shstrndx); /* Section header string table index */
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
2021-08-03 07:59:12 +03:00
|
|
|
static void bswap_phdr(struct elf_phdr *phdr, int phnum)
|
2008-10-26 23:33:16 +03:00
|
|
|
{
|
2021-08-03 07:59:12 +03:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < phnum; i++, phdr++) {
|
|
|
|
bswap32s(&phdr->p_type); /* Segment type */
|
|
|
|
bswap32s(&phdr->p_flags); /* Segment flags */
|
|
|
|
bswaptls(&phdr->p_offset); /* Segment file offset */
|
|
|
|
bswaptls(&phdr->p_vaddr); /* Segment virtual address */
|
|
|
|
bswaptls(&phdr->p_paddr); /* Segment physical address */
|
|
|
|
bswaptls(&phdr->p_filesz); /* Segment size in file */
|
|
|
|
bswaptls(&phdr->p_memsz); /* Segment size in memory */
|
|
|
|
bswaptls(&phdr->p_align); /* Segment alignment */
|
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
2021-08-03 07:59:12 +03:00
|
|
|
static void bswap_shdr(struct elf_shdr *shdr, int shnum)
|
2008-10-26 23:33:16 +03:00
|
|
|
{
|
2021-08-03 07:59:12 +03:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < shnum; i++, shdr++) {
|
|
|
|
bswap32s(&shdr->sh_name);
|
|
|
|
bswap32s(&shdr->sh_type);
|
|
|
|
bswaptls(&shdr->sh_flags);
|
|
|
|
bswaptls(&shdr->sh_addr);
|
|
|
|
bswaptls(&shdr->sh_offset);
|
|
|
|
bswaptls(&shdr->sh_size);
|
|
|
|
bswap32s(&shdr->sh_link);
|
|
|
|
bswap32s(&shdr->sh_info);
|
|
|
|
bswaptls(&shdr->sh_addralign);
|
|
|
|
bswaptls(&shdr->sh_entsize);
|
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void bswap_sym(struct elf_sym *sym)
|
|
|
|
{
|
|
|
|
bswap32s(&sym->st_name);
|
|
|
|
bswaptls(&sym->st_value);
|
|
|
|
bswaptls(&sym->st_size);
|
|
|
|
bswap16s(&sym->st_shndx);
|
|
|
|
}
|
2021-08-03 07:59:12 +03:00
|
|
|
|
|
|
|
#else /* ! BSWAP_NEEDED */
|
|
|
|
|
|
|
|
static void bswap_ehdr(struct elfhdr *ehdr) { }
|
|
|
|
static void bswap_phdr(struct elf_phdr *phdr, int phnum) { }
|
|
|
|
static void bswap_shdr(struct elf_shdr *shdr, int shnum) { }
|
|
|
|
static void bswap_sym(struct elf_sym *sym) { }
|
|
|
|
|
|
|
|
#endif /* ! BSWAP_NEEDED */
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* 'copy_elf_strings()' copies argument/envelope strings from user
|
|
|
|
* memory to free pages in kernel mem. These are in a format ready
|
|
|
|
* to be put directly into the top of new user memory.
|
|
|
|
*
|
|
|
|
*/
|
2021-04-23 18:05:57 +03:00
|
|
|
static abi_ulong copy_elf_strings(int argc, char **argv, void **page,
|
2008-10-26 23:33:16 +03:00
|
|
|
abi_ulong p)
|
|
|
|
{
|
|
|
|
char *tmp, *tmp1, *pag = NULL;
|
|
|
|
int len, offset = 0;
|
|
|
|
|
|
|
|
if (!p) {
|
|
|
|
return 0; /* bullet-proofing */
|
|
|
|
}
|
|
|
|
while (argc-- > 0) {
|
|
|
|
tmp = argv[argc];
|
|
|
|
if (!tmp) {
|
2014-06-02 16:24:37 +04:00
|
|
|
fprintf(stderr, "VFS: argc is wrong");
|
2008-10-26 23:33:16 +03:00
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
tmp1 = tmp;
|
|
|
|
while (*tmp++);
|
|
|
|
len = tmp - tmp1;
|
|
|
|
if (p < len) { /* this shouldn't happen - 128kB */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
while (len) {
|
|
|
|
--p; --tmp; --len;
|
|
|
|
if (--offset < 0) {
|
|
|
|
offset = p % TARGET_PAGE_SIZE;
|
2021-04-23 18:05:57 +03:00
|
|
|
pag = (char *)page[p / TARGET_PAGE_SIZE];
|
2008-10-26 23:33:16 +03:00
|
|
|
if (!pag) {
|
2011-11-22 00:06:22 +04:00
|
|
|
pag = g_try_malloc0(TARGET_PAGE_SIZE);
|
2021-04-23 18:05:57 +03:00
|
|
|
page[p / TARGET_PAGE_SIZE] = pag;
|
2008-10-26 23:33:16 +03:00
|
|
|
if (!pag)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (len == 0 || offset == 0) {
|
|
|
|
*(pag + offset) = *tmp;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
int bytes_to_copy = (len > offset) ? offset : len;
|
|
|
|
tmp -= bytes_to_copy;
|
|
|
|
p -= bytes_to_copy;
|
|
|
|
offset -= bytes_to_copy;
|
|
|
|
len -= bytes_to_copy;
|
|
|
|
memcpy_fromfs(pag + offset, tmp, bytes_to_copy + 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
2021-04-29 19:04:28 +03:00
|
|
|
static abi_ulong setup_arg_pages(abi_ulong p, struct bsd_binprm *bprm,
|
2008-10-26 23:33:16 +03:00
|
|
|
struct image_info *info)
|
|
|
|
{
|
|
|
|
abi_ulong stack_base, size, error;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* Create enough stack to hold everything. If we don't use
|
|
|
|
* it for args, we'll use it for something else...
|
|
|
|
*/
|
2021-08-07 03:48:37 +03:00
|
|
|
size = target_dflssiz;
|
2021-04-23 18:05:57 +03:00
|
|
|
if (size < MAX_ARG_PAGES * TARGET_PAGE_SIZE)
|
|
|
|
size = MAX_ARG_PAGES * TARGET_PAGE_SIZE;
|
2008-10-26 23:33:16 +03:00
|
|
|
error = target_mmap(0,
|
|
|
|
size + qemu_host_page_size,
|
|
|
|
PROT_READ | PROT_WRITE,
|
|
|
|
MAP_PRIVATE | MAP_ANON,
|
|
|
|
-1, 0);
|
|
|
|
if (error == -1) {
|
|
|
|
perror("stk mmap");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
/* we reserve one extra page at the top of the stack as guard */
|
|
|
|
target_mprotect(error + size, qemu_host_page_size, PROT_NONE);
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
stack_base = error + size - MAX_ARG_PAGES * TARGET_PAGE_SIZE;
|
2008-10-26 23:33:16 +03:00
|
|
|
p += stack_base;
|
|
|
|
|
|
|
|
for (i = 0 ; i < MAX_ARG_PAGES ; i++) {
|
|
|
|
if (bprm->page[i]) {
|
|
|
|
info->rss++;
|
|
|
|
/* FIXME - check return value of memcpy_to_target() for failure */
|
|
|
|
memcpy_to_target(stack_base, bprm->page[i], TARGET_PAGE_SIZE);
|
2011-11-22 00:06:22 +04:00
|
|
|
g_free(bprm->page[i]);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
stack_base += TARGET_PAGE_SIZE;
|
|
|
|
}
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void set_brk(abi_ulong start, abi_ulong end)
|
|
|
|
{
|
|
|
|
/* page-align the start and end addresses... */
|
|
|
|
start = HOST_PAGE_ALIGN(start);
|
|
|
|
end = HOST_PAGE_ALIGN(end);
|
|
|
|
if (end <= start)
|
|
|
|
return;
|
2021-04-23 18:05:57 +03:00
|
|
|
if (target_mmap(start, end - start,
|
2008-10-26 23:33:16 +03:00
|
|
|
PROT_READ | PROT_WRITE | PROT_EXEC,
|
|
|
|
MAP_FIXED | MAP_PRIVATE | MAP_ANON, -1, 0) == -1) {
|
|
|
|
perror("cannot mmap brk");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* We need to explicitly zero any fractional pages after the data
|
|
|
|
section (i.e. bss). This would contain the junk from the file that
|
|
|
|
should not be in memory. */
|
|
|
|
static void padzero(abi_ulong elf_bss, abi_ulong last_bss)
|
|
|
|
{
|
|
|
|
abi_ulong nbyte;
|
|
|
|
|
|
|
|
if (elf_bss >= last_bss)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* XXX: this is really a hack : if the real host page size is
|
|
|
|
smaller than the target page size, some pages after the end
|
|
|
|
of the file may not be mapped. A better fix would be to
|
|
|
|
patch target_mmap(), but it is more complicated as the file
|
|
|
|
size must be known */
|
|
|
|
if (qemu_real_host_page_size < qemu_host_page_size) {
|
|
|
|
abi_ulong end_addr, end_addr1;
|
2015-12-02 15:00:54 +03:00
|
|
|
end_addr1 = REAL_HOST_PAGE_ALIGN(elf_bss);
|
2008-10-26 23:33:16 +03:00
|
|
|
end_addr = HOST_PAGE_ALIGN(elf_bss);
|
|
|
|
if (end_addr1 < end_addr) {
|
2021-02-12 21:48:43 +03:00
|
|
|
mmap((void *)g2h_untagged(end_addr1), end_addr - end_addr1,
|
2021-04-23 18:05:57 +03:00
|
|
|
PROT_READ | PROT_WRITE | PROT_EXEC,
|
|
|
|
MAP_FIXED | MAP_PRIVATE | MAP_ANON, -1, 0);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
nbyte = elf_bss & (qemu_host_page_size - 1);
|
2008-10-26 23:33:16 +03:00
|
|
|
if (nbyte) {
|
|
|
|
nbyte = qemu_host_page_size - nbyte;
|
|
|
|
do {
|
|
|
|
/* FIXME - what to do if put_user() fails? */
|
|
|
|
put_user_u8(0, elf_bss);
|
|
|
|
elf_bss++;
|
|
|
|
} while (--nbyte);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static abi_ulong create_elf_tables(abi_ulong p, int argc, int envc,
|
|
|
|
struct elfhdr * exec,
|
|
|
|
abi_ulong load_addr,
|
|
|
|
abi_ulong load_bias,
|
2021-04-30 17:17:23 +03:00
|
|
|
abi_ulong interp_load_addr,
|
2008-10-26 23:33:16 +03:00
|
|
|
struct image_info *info)
|
|
|
|
{
|
|
|
|
abi_ulong sp;
|
|
|
|
int size;
|
|
|
|
abi_ulong u_platform;
|
|
|
|
const char *k_platform;
|
|
|
|
const int n = sizeof(elf_addr_t);
|
|
|
|
|
|
|
|
sp = p;
|
|
|
|
u_platform = 0;
|
|
|
|
k_platform = ELF_PLATFORM;
|
|
|
|
if (k_platform) {
|
|
|
|
size_t len = strlen(k_platform) + 1;
|
|
|
|
sp -= (len + n - 1) & ~(n - 1);
|
|
|
|
u_platform = sp;
|
|
|
|
/* FIXME - check return value of memcpy_to_target() for failure */
|
|
|
|
memcpy_to_target(sp, k_platform, len);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Force 16 byte _final_ alignment here for generality.
|
|
|
|
*/
|
2021-04-23 18:05:57 +03:00
|
|
|
sp = sp & ~(abi_ulong)15;
|
2008-10-26 23:33:16 +03:00
|
|
|
size = (DLINFO_ITEMS + 1) * 2;
|
|
|
|
if (k_platform)
|
2021-04-23 18:05:57 +03:00
|
|
|
size += 2;
|
2008-10-26 23:33:16 +03:00
|
|
|
#ifdef DLINFO_ARCH_ITEMS
|
|
|
|
size += DLINFO_ARCH_ITEMS * 2;
|
|
|
|
#endif
|
|
|
|
size += envc + argc + 2;
|
2021-04-30 17:17:23 +03:00
|
|
|
size += 1; /* argc itself */
|
2008-10-26 23:33:16 +03:00
|
|
|
size *= n;
|
|
|
|
if (size & 15)
|
2021-04-23 18:05:57 +03:00
|
|
|
sp -= 16 - (size & 15);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
/* This is correct because Linux defines
|
|
|
|
* elf_addr_t as Elf32_Off / Elf64_Off
|
|
|
|
*/
|
|
|
|
#define NEW_AUX_ENT(id, val) do { \
|
|
|
|
sp -= n; put_user_ual(val, sp); \
|
|
|
|
sp -= n; put_user_ual(id, sp); \
|
2021-04-23 18:05:57 +03:00
|
|
|
} while (0)
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
NEW_AUX_ENT(AT_NULL, 0);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
/* There must be exactly DLINFO_ITEMS entries here. */
|
|
|
|
NEW_AUX_ENT(AT_PHDR, (abi_ulong)(load_addr + exec->e_phoff));
|
2021-04-23 18:05:57 +03:00
|
|
|
NEW_AUX_ENT(AT_PHENT, (abi_ulong)(sizeof(struct elf_phdr)));
|
2008-10-26 23:33:16 +03:00
|
|
|
NEW_AUX_ENT(AT_PHNUM, (abi_ulong)(exec->e_phnum));
|
|
|
|
NEW_AUX_ENT(AT_PAGESZ, (abi_ulong)(TARGET_PAGE_SIZE));
|
|
|
|
NEW_AUX_ENT(AT_BASE, (abi_ulong)(interp_load_addr));
|
|
|
|
NEW_AUX_ENT(AT_FLAGS, (abi_ulong)0);
|
|
|
|
NEW_AUX_ENT(AT_ENTRY, load_bias + exec->e_entry);
|
|
|
|
NEW_AUX_ENT(AT_UID, (abi_ulong) getuid());
|
|
|
|
NEW_AUX_ENT(AT_EUID, (abi_ulong) geteuid());
|
|
|
|
NEW_AUX_ENT(AT_GID, (abi_ulong) getgid());
|
|
|
|
NEW_AUX_ENT(AT_EGID, (abi_ulong) getegid());
|
|
|
|
NEW_AUX_ENT(AT_HWCAP, (abi_ulong) ELF_HWCAP);
|
|
|
|
NEW_AUX_ENT(AT_CLKTCK, (abi_ulong) sysconf(_SC_CLK_TCK));
|
|
|
|
if (k_platform)
|
|
|
|
NEW_AUX_ENT(AT_PLATFORM, u_platform);
|
|
|
|
#ifdef ARCH_DLINFO
|
|
|
|
/*
|
|
|
|
* ARCH_DLINFO must come last so platform specific code can enforce
|
|
|
|
* special alignment requirements on the AUXV if necessary (eg. PPC).
|
|
|
|
*/
|
|
|
|
ARCH_DLINFO;
|
|
|
|
#endif
|
|
|
|
#undef NEW_AUX_ENT
|
|
|
|
|
2021-04-30 17:17:23 +03:00
|
|
|
sp = loader_build_argptr(envc, argc, sp, p);
|
2008-10-26 23:33:16 +03:00
|
|
|
return sp;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
static abi_ulong load_elf_interp(struct elfhdr *interp_elf_ex,
|
2008-10-26 23:33:16 +03:00
|
|
|
int interpreter_fd,
|
|
|
|
abi_ulong *interp_load_addr)
|
|
|
|
{
|
2021-04-23 18:05:57 +03:00
|
|
|
struct elf_phdr *elf_phdata = NULL;
|
|
|
|
struct elf_phdr *eppnt;
|
|
|
|
abi_ulong load_addr = 0;
|
|
|
|
int load_addr_set = 0;
|
|
|
|
int retval;
|
|
|
|
abi_ulong last_bss, elf_bss;
|
|
|
|
abi_ulong error;
|
|
|
|
int i;
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
elf_bss = 0;
|
|
|
|
last_bss = 0;
|
|
|
|
error = 0;
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
bswap_ehdr(interp_elf_ex);
|
|
|
|
/* First of all, some simple consistency checks */
|
|
|
|
if ((interp_elf_ex->e_type != ET_EXEC &&
|
|
|
|
interp_elf_ex->e_type != ET_DYN) ||
|
|
|
|
!elf_check_arch(interp_elf_ex->e_machine)) {
|
|
|
|
return ~((abi_ulong)0UL);
|
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
/* Now read in all of the header information */
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
if (sizeof(struct elf_phdr) * interp_elf_ex->e_phnum > TARGET_PAGE_SIZE)
|
|
|
|
return ~(abi_ulong)0UL;
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
elf_phdata = (struct elf_phdr *)
|
|
|
|
malloc(sizeof(struct elf_phdr) * interp_elf_ex->e_phnum);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
if (!elf_phdata)
|
|
|
|
return ~((abi_ulong)0UL);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
/*
|
|
|
|
* If the size of this structure has changed, then punt, since
|
|
|
|
* we will be doing the wrong thing.
|
|
|
|
*/
|
|
|
|
if (interp_elf_ex->e_phentsize != sizeof(struct elf_phdr)) {
|
|
|
|
free(elf_phdata);
|
|
|
|
return ~((abi_ulong)0UL);
|
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
retval = lseek(interpreter_fd, interp_elf_ex->e_phoff, SEEK_SET);
|
|
|
|
if (retval >= 0) {
|
|
|
|
retval = read(interpreter_fd,
|
|
|
|
(char *) elf_phdata,
|
|
|
|
sizeof(struct elf_phdr) * interp_elf_ex->e_phnum);
|
|
|
|
}
|
|
|
|
if (retval < 0) {
|
|
|
|
perror("load_elf_interp");
|
|
|
|
exit(-1);
|
2021-04-30 17:17:23 +03:00
|
|
|
free(elf_phdata);
|
2021-04-23 18:05:57 +03:00
|
|
|
return retval;
|
|
|
|
}
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap_phdr(elf_phdata, interp_elf_ex->e_phnum);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
if (interp_elf_ex->e_type == ET_DYN) {
|
|
|
|
/* in order to avoid hardcoding the interpreter load
|
|
|
|
address in qemu, we allocate a big enough memory zone */
|
|
|
|
error = target_mmap(0, INTERP_MAP_SIZE,
|
|
|
|
PROT_NONE, MAP_PRIVATE | MAP_ANON,
|
|
|
|
-1, 0);
|
|
|
|
if (error == -1) {
|
|
|
|
perror("mmap");
|
|
|
|
exit(-1);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
2021-04-23 18:05:57 +03:00
|
|
|
load_addr = error;
|
|
|
|
load_addr_set = 1;
|
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
eppnt = elf_phdata;
|
|
|
|
for (i = 0; i < interp_elf_ex->e_phnum; i++, eppnt++)
|
|
|
|
if (eppnt->p_type == PT_LOAD) {
|
2008-10-26 23:33:16 +03:00
|
|
|
int elf_type = MAP_PRIVATE | MAP_DENYWRITE;
|
|
|
|
int elf_prot = 0;
|
|
|
|
abi_ulong vaddr = 0;
|
|
|
|
abi_ulong k;
|
|
|
|
|
|
|
|
if (eppnt->p_flags & PF_R) elf_prot = PROT_READ;
|
|
|
|
if (eppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
|
|
|
|
if (eppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
|
|
|
|
if (interp_elf_ex->e_type == ET_EXEC || load_addr_set) {
|
|
|
|
elf_type |= MAP_FIXED;
|
|
|
|
vaddr = eppnt->p_vaddr;
|
|
|
|
}
|
2021-04-23 18:05:57 +03:00
|
|
|
error = target_mmap(load_addr + TARGET_ELF_PAGESTART(vaddr),
|
|
|
|
eppnt->p_filesz + TARGET_ELF_PAGEOFFSET(eppnt->p_vaddr),
|
|
|
|
elf_prot,
|
|
|
|
elf_type,
|
|
|
|
interpreter_fd,
|
|
|
|
eppnt->p_offset - TARGET_ELF_PAGEOFFSET(eppnt->p_vaddr));
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
if (error == -1) {
|
2021-04-23 18:05:57 +03:00
|
|
|
/* Real error */
|
|
|
|
close(interpreter_fd);
|
|
|
|
free(elf_phdata);
|
|
|
|
return ~((abi_ulong)0UL);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!load_addr_set && interp_elf_ex->e_type == ET_DYN) {
|
2021-04-23 18:05:57 +03:00
|
|
|
load_addr = error;
|
|
|
|
load_addr_set = 1;
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the end of the file mapping for this phdr, and keep
|
|
|
|
* track of the largest address we see for this.
|
|
|
|
*/
|
|
|
|
k = load_addr + eppnt->p_vaddr + eppnt->p_filesz;
|
|
|
|
if (k > elf_bss) elf_bss = k;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do the same thing for the memory mapping - between
|
|
|
|
* elf_bss and last_bss is the bss section.
|
|
|
|
*/
|
|
|
|
k = load_addr + eppnt->p_memsz + eppnt->p_vaddr;
|
|
|
|
if (k > last_bss) last_bss = k;
|
2021-04-23 18:05:57 +03:00
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
/* Now use mmap to map the library into memory. */
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
close(interpreter_fd);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
/*
|
|
|
|
* Now fill out the bss section. First pad the last page up
|
|
|
|
* to the page boundary, and then perform a mmap to make sure
|
|
|
|
* that there are zeromapped pages up to and including the last
|
|
|
|
* bss page.
|
|
|
|
*/
|
|
|
|
padzero(elf_bss, last_bss);
|
|
|
|
elf_bss = TARGET_ELF_PAGESTART(elf_bss + qemu_host_page_size - 1); /* What we have mapped so far */
|
|
|
|
|
|
|
|
/* Map the last of the bss segment */
|
|
|
|
if (last_bss > elf_bss) {
|
|
|
|
target_mmap(elf_bss, last_bss - elf_bss,
|
|
|
|
PROT_READ | PROT_WRITE | PROT_EXEC,
|
|
|
|
MAP_FIXED | MAP_PRIVATE | MAP_ANON, -1, 0);
|
|
|
|
}
|
|
|
|
free(elf_phdata);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
*interp_load_addr = load_addr;
|
|
|
|
return ((abi_ulong) interp_elf_ex->e_entry) + load_addr;
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int symfind(const void *s0, const void *s1)
|
|
|
|
{
|
2012-01-05 18:39:39 +04:00
|
|
|
target_ulong addr = *(target_ulong *)s0;
|
2008-10-26 23:33:16 +03:00
|
|
|
struct elf_sym *sym = (struct elf_sym *)s1;
|
|
|
|
int result = 0;
|
2012-01-05 18:39:39 +04:00
|
|
|
if (addr < sym->st_value) {
|
2008-10-26 23:33:16 +03:00
|
|
|
result = -1;
|
2012-01-05 18:39:39 +04:00
|
|
|
} else if (addr >= sym->st_value + sym->st_size) {
|
2008-10-26 23:33:16 +03:00
|
|
|
result = 1;
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char *lookup_symbolxx(struct syminfo *s, target_ulong orig_addr)
|
|
|
|
{
|
|
|
|
#if ELF_CLASS == ELFCLASS32
|
|
|
|
struct elf_sym *syms = s->disas_symtab.elf32;
|
|
|
|
#else
|
|
|
|
struct elf_sym *syms = s->disas_symtab.elf64;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// binary search
|
|
|
|
struct elf_sym *sym;
|
|
|
|
|
2012-01-05 18:39:39 +04:00
|
|
|
sym = bsearch(&orig_addr, syms, s->disas_num_syms, sizeof(*syms), symfind);
|
2009-08-01 14:13:20 +04:00
|
|
|
if (sym != NULL) {
|
2008-10-26 23:33:16 +03:00
|
|
|
return s->disas_strtab + sym->st_name;
|
|
|
|
}
|
|
|
|
|
|
|
|
return "";
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: This should use elf_ops.h */
|
|
|
|
static int symcmp(const void *s0, const void *s1)
|
|
|
|
{
|
|
|
|
struct elf_sym *sym0 = (struct elf_sym *)s0;
|
|
|
|
struct elf_sym *sym1 = (struct elf_sym *)s1;
|
|
|
|
return (sym0->st_value < sym1->st_value)
|
|
|
|
? -1
|
|
|
|
: ((sym0->st_value > sym1->st_value) ? 1 : 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Best attempt to load symbols from this ELF object. */
|
|
|
|
static void load_symbols(struct elfhdr *hdr, int fd)
|
|
|
|
{
|
|
|
|
unsigned int i, nsyms;
|
|
|
|
struct elf_shdr sechdr, symtab, strtab;
|
|
|
|
char *strings;
|
|
|
|
struct syminfo *s;
|
2011-01-16 18:28:20 +03:00
|
|
|
struct elf_sym *syms, *new_syms;
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
lseek(fd, hdr->e_shoff, SEEK_SET);
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
|
|
|
if (read(fd, &sechdr, sizeof(sechdr)) != sizeof(sechdr))
|
|
|
|
return;
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap_shdr(&sechdr, 1);
|
2008-10-26 23:33:16 +03:00
|
|
|
if (sechdr.sh_type == SHT_SYMTAB) {
|
|
|
|
symtab = sechdr;
|
|
|
|
lseek(fd, hdr->e_shoff
|
|
|
|
+ sizeof(sechdr) * sechdr.sh_link, SEEK_SET);
|
|
|
|
if (read(fd, &strtab, sizeof(strtab))
|
|
|
|
!= sizeof(strtab))
|
|
|
|
return;
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap_shdr(&strtab, 1);
|
2008-10-26 23:33:16 +03:00
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return; /* Shouldn't happen... */
|
|
|
|
|
|
|
|
found:
|
|
|
|
/* Now know where the strtab and symtab are. Snarf them. */
|
|
|
|
s = malloc(sizeof(*s));
|
|
|
|
syms = malloc(symtab.sh_size);
|
2011-01-16 18:28:20 +03:00
|
|
|
if (!syms) {
|
|
|
|
free(s);
|
2008-10-26 23:33:16 +03:00
|
|
|
return;
|
2011-01-16 18:28:20 +03:00
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
s->disas_strtab = strings = malloc(strtab.sh_size);
|
2011-01-16 18:28:20 +03:00
|
|
|
if (!s->disas_strtab) {
|
|
|
|
free(s);
|
|
|
|
free(syms);
|
2008-10-26 23:33:16 +03:00
|
|
|
return;
|
2011-01-16 18:28:20 +03:00
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
lseek(fd, symtab.sh_offset, SEEK_SET);
|
2011-01-16 18:28:20 +03:00
|
|
|
if (read(fd, syms, symtab.sh_size) != symtab.sh_size) {
|
|
|
|
free(s);
|
|
|
|
free(syms);
|
|
|
|
free(strings);
|
2008-10-26 23:33:16 +03:00
|
|
|
return;
|
2011-01-16 18:28:20 +03:00
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
nsyms = symtab.sh_size / sizeof(struct elf_sym);
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
while (i < nsyms) {
|
|
|
|
bswap_sym(syms + i);
|
|
|
|
// Throw away entries which we do not need.
|
|
|
|
if (syms[i].st_shndx == SHN_UNDEF ||
|
|
|
|
syms[i].st_shndx >= SHN_LORESERVE ||
|
|
|
|
ELF_ST_TYPE(syms[i].st_info) != STT_FUNC) {
|
|
|
|
nsyms--;
|
|
|
|
if (i < nsyms) {
|
|
|
|
syms[i] = syms[nsyms];
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
i++;
|
|
|
|
}
|
2011-01-16 18:28:20 +03:00
|
|
|
|
|
|
|
/* Attempt to free the storage associated with the local symbols
|
|
|
|
that we threw away. Whether or not this has any effect on the
|
|
|
|
memory allocation depends on the malloc implementation and how
|
|
|
|
many symbols we managed to discard. */
|
|
|
|
new_syms = realloc(syms, nsyms * sizeof(*syms));
|
|
|
|
if (new_syms == NULL) {
|
|
|
|
free(s);
|
|
|
|
free(syms);
|
|
|
|
free(strings);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
syms = new_syms;
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
qsort(syms, nsyms, sizeof(*syms), symcmp);
|
|
|
|
|
|
|
|
lseek(fd, strtab.sh_offset, SEEK_SET);
|
2011-01-16 18:28:20 +03:00
|
|
|
if (read(fd, strings, strtab.sh_size) != strtab.sh_size) {
|
|
|
|
free(s);
|
|
|
|
free(syms);
|
|
|
|
free(strings);
|
2008-10-26 23:33:16 +03:00
|
|
|
return;
|
2011-01-16 18:28:20 +03:00
|
|
|
}
|
2008-10-26 23:33:16 +03:00
|
|
|
s->disas_num_syms = nsyms;
|
|
|
|
#if ELF_CLASS == ELFCLASS32
|
|
|
|
s->disas_symtab.elf32 = syms;
|
2009-09-27 23:30:56 +04:00
|
|
|
s->lookup_symbol = (lookup_symbol_t)lookup_symbolxx;
|
2008-10-26 23:33:16 +03:00
|
|
|
#else
|
|
|
|
s->disas_symtab.elf64 = syms;
|
2009-09-27 23:30:56 +04:00
|
|
|
s->lookup_symbol = (lookup_symbol_t)lookup_symbolxx;
|
2008-10-26 23:33:16 +03:00
|
|
|
#endif
|
|
|
|
s->next = syminfos;
|
|
|
|
syminfos = s;
|
|
|
|
}
|
|
|
|
|
2021-04-29 19:04:28 +03:00
|
|
|
int load_elf_binary(struct bsd_binprm *bprm, struct target_pt_regs *regs,
|
2021-04-23 18:05:57 +03:00
|
|
|
struct image_info *info)
|
2008-10-26 23:33:16 +03:00
|
|
|
{
|
|
|
|
struct elfhdr elf_ex;
|
|
|
|
struct elfhdr interp_elf_ex;
|
|
|
|
int interpreter_fd = -1; /* avoid warning */
|
|
|
|
abi_ulong load_addr, load_bias;
|
|
|
|
int load_addr_set = 0;
|
|
|
|
int i;
|
|
|
|
struct elf_phdr * elf_ppnt;
|
|
|
|
struct elf_phdr *elf_phdata;
|
|
|
|
abi_ulong elf_bss, k, elf_brk;
|
|
|
|
int retval;
|
|
|
|
char * elf_interpreter;
|
|
|
|
abi_ulong elf_entry, interp_load_addr = 0;
|
|
|
|
abi_ulong start_code, end_code, start_data, end_data;
|
|
|
|
abi_ulong reloc_func_desc = 0;
|
2017-07-18 19:26:32 +03:00
|
|
|
#ifdef LOW_ELF_STACK
|
|
|
|
abi_ulong elf_stack = ~((abi_ulong)0UL);
|
|
|
|
#endif
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
load_addr = 0;
|
|
|
|
load_bias = 0;
|
|
|
|
elf_ex = *((struct elfhdr *) bprm->buf); /* exec-header */
|
|
|
|
bswap_ehdr(&elf_ex);
|
|
|
|
|
|
|
|
/* First of all, some simple consistency checks */
|
|
|
|
if ((elf_ex.e_type != ET_EXEC && elf_ex.e_type != ET_DYN) ||
|
2021-04-23 18:05:57 +03:00
|
|
|
(!elf_check_arch(elf_ex.e_machine))) {
|
2008-10-26 23:33:16 +03:00
|
|
|
return -ENOEXEC;
|
|
|
|
}
|
|
|
|
|
|
|
|
bprm->p = copy_elf_strings(1, &bprm->filename, bprm->page, bprm->p);
|
2021-04-23 18:05:57 +03:00
|
|
|
bprm->p = copy_elf_strings(bprm->envc, bprm->envp, bprm->page,bprm->p);
|
|
|
|
bprm->p = copy_elf_strings(bprm->argc, bprm->argv, bprm->page,bprm->p);
|
2008-10-26 23:33:16 +03:00
|
|
|
if (!bprm->p) {
|
|
|
|
retval = -E2BIG;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now read in all of the header information */
|
|
|
|
elf_phdata = (struct elf_phdr *)malloc(elf_ex.e_phentsize*elf_ex.e_phnum);
|
|
|
|
if (elf_phdata == NULL) {
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = lseek(bprm->fd, elf_ex.e_phoff, SEEK_SET);
|
2021-04-23 18:05:57 +03:00
|
|
|
if (retval > 0) {
|
|
|
|
retval = read(bprm->fd, (char *)elf_phdata,
|
2008-10-26 23:33:16 +03:00
|
|
|
elf_ex.e_phentsize * elf_ex.e_phnum);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (retval < 0) {
|
|
|
|
perror("load_elf_binary");
|
|
|
|
exit(-1);
|
2021-04-23 18:05:57 +03:00
|
|
|
free(elf_phdata);
|
2008-10-26 23:33:16 +03:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
2021-08-03 07:59:12 +03:00
|
|
|
bswap_phdr(elf_phdata, elf_ex.e_phnum);
|
|
|
|
|
2008-10-26 23:33:16 +03:00
|
|
|
elf_ppnt = elf_phdata;
|
|
|
|
|
|
|
|
elf_bss = 0;
|
|
|
|
elf_brk = 0;
|
|
|
|
|
|
|
|
|
|
|
|
elf_interpreter = NULL;
|
|
|
|
start_code = ~((abi_ulong)0UL);
|
|
|
|
end_code = 0;
|
|
|
|
start_data = 0;
|
|
|
|
end_data = 0;
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
for (i = 0;i < elf_ex.e_phnum; i++) {
|
2008-10-26 23:33:16 +03:00
|
|
|
if (elf_ppnt->p_type == PT_INTERP) {
|
2021-04-23 18:05:57 +03:00
|
|
|
if (elf_interpreter != NULL)
|
2008-10-26 23:33:16 +03:00
|
|
|
{
|
2021-04-23 18:05:57 +03:00
|
|
|
free(elf_phdata);
|
2008-10-26 23:33:16 +03:00
|
|
|
free(elf_interpreter);
|
|
|
|
close(bprm->fd);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is the program interpreter used for
|
|
|
|
* shared libraries - for now assume that this
|
|
|
|
* is an a.out format binary
|
|
|
|
*/
|
|
|
|
|
|
|
|
elf_interpreter = (char *)malloc(elf_ppnt->p_filesz);
|
|
|
|
|
|
|
|
if (elf_interpreter == NULL) {
|
2021-04-23 18:05:57 +03:00
|
|
|
free(elf_phdata);
|
2008-10-26 23:33:16 +03:00
|
|
|
close(bprm->fd);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = lseek(bprm->fd, elf_ppnt->p_offset, SEEK_SET);
|
2021-04-23 18:05:57 +03:00
|
|
|
if (retval >= 0) {
|
2008-10-26 23:33:16 +03:00
|
|
|
retval = read(bprm->fd, elf_interpreter, elf_ppnt->p_filesz);
|
|
|
|
}
|
2021-04-23 18:05:57 +03:00
|
|
|
if (retval < 0) {
|
2008-10-26 23:33:16 +03:00
|
|
|
perror("load_elf_binary2");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (retval >= 0) {
|
|
|
|
retval = open(path(elf_interpreter), O_RDONLY);
|
2021-04-23 18:05:57 +03:00
|
|
|
if (retval >= 0) {
|
2008-10-26 23:33:16 +03:00
|
|
|
interpreter_fd = retval;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
perror(elf_interpreter);
|
|
|
|
exit(-1);
|
|
|
|
/* retval = -errno; */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (retval >= 0) {
|
|
|
|
retval = lseek(interpreter_fd, 0, SEEK_SET);
|
2021-04-23 18:05:57 +03:00
|
|
|
if (retval >= 0) {
|
|
|
|
retval = read(interpreter_fd, bprm->buf, 128);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (retval >= 0) {
|
2009-09-30 21:43:38 +04:00
|
|
|
interp_elf_ex = *((struct elfhdr *) bprm->buf); /* elf exec-header */
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
if (retval < 0) {
|
|
|
|
perror("load_elf_binary3");
|
|
|
|
exit(-1);
|
2021-04-23 18:05:57 +03:00
|
|
|
free(elf_phdata);
|
2008-10-26 23:33:16 +03:00
|
|
|
free(elf_interpreter);
|
|
|
|
close(bprm->fd);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
elf_ppnt++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Some simple consistency checks for the interpreter */
|
2021-04-23 18:05:57 +03:00
|
|
|
if (elf_interpreter) {
|
2008-10-26 23:33:16 +03:00
|
|
|
if (interp_elf_ex.e_ident[0] != 0x7f ||
|
2021-04-30 17:17:23 +03:00
|
|
|
strncmp((char *)&interp_elf_ex.e_ident[1], "ELF", 3) != 0) {
|
2008-10-26 23:33:16 +03:00
|
|
|
free(elf_interpreter);
|
|
|
|
free(elf_phdata);
|
|
|
|
close(bprm->fd);
|
|
|
|
return -ELIBBAD;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* OK, we are done with that, now set up the arg stuff,
|
|
|
|
and then start this sucker up */
|
|
|
|
|
2021-04-30 17:17:23 +03:00
|
|
|
if (!bprm->p) {
|
|
|
|
free(elf_interpreter);
|
|
|
|
free(elf_phdata);
|
|
|
|
close(bprm->fd);
|
|
|
|
return -E2BIG;
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* OK, This is the point of no return */
|
|
|
|
info->end_data = 0;
|
|
|
|
info->end_code = 0;
|
|
|
|
info->start_mmap = (abi_ulong)ELF_START_MMAP;
|
|
|
|
info->mmap = 0;
|
|
|
|
elf_entry = (abi_ulong) elf_ex.e_entry;
|
|
|
|
|
2009-09-27 23:30:51 +04:00
|
|
|
/*
|
|
|
|
* In case where user has not explicitly set the guest_base, we
|
|
|
|
* probe here that should we set it automatically.
|
|
|
|
*/
|
|
|
|
if (!have_guest_base) {
|
|
|
|
/*
|
|
|
|
* Go through ELF program header table and find out whether
|
2018-12-14 01:37:37 +03:00
|
|
|
* any of the segments drop below our current mmap_min_addr and
|
2009-09-27 23:30:51 +04:00
|
|
|
* in that case set guest_base to corresponding address.
|
|
|
|
*/
|
|
|
|
for (i = 0, elf_ppnt = elf_phdata; i < elf_ex.e_phnum;
|
|
|
|
i++, elf_ppnt++) {
|
|
|
|
if (elf_ppnt->p_type != PT_LOAD)
|
|
|
|
continue;
|
|
|
|
if (HOST_PAGE_ALIGN(elf_ppnt->p_vaddr) < mmap_min_addr) {
|
|
|
|
guest_base = HOST_PAGE_ALIGN(mmap_min_addr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-10-26 23:33:16 +03:00
|
|
|
/* Do this so that we can load the interpreter, if need be. We will
|
|
|
|
change some of these later */
|
|
|
|
info->rss = 0;
|
|
|
|
bprm->p = setup_arg_pages(bprm->p, bprm, info);
|
|
|
|
info->start_stack = bprm->p;
|
|
|
|
|
|
|
|
/* Now we do a little grungy work by mmaping the ELF image into
|
|
|
|
* the correct location in memory. At this point, we assume that
|
|
|
|
* the image should be loaded at fixed address, not at a variable
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
|
2021-04-23 18:05:57 +03:00
|
|
|
for (i = 0, elf_ppnt = elf_phdata; i < elf_ex.e_phnum; i++, elf_ppnt++) {
|
2008-10-26 23:33:16 +03:00
|
|
|
int elf_prot = 0;
|
|
|
|
int elf_flags = 0;
|
|
|
|
abi_ulong error;
|
|
|
|
|
|
|
|
if (elf_ppnt->p_type != PT_LOAD)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (elf_ppnt->p_flags & PF_R) elf_prot |= PROT_READ;
|
|
|
|
if (elf_ppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
|
|
|
|
if (elf_ppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
|
|
|
|
elf_flags = MAP_PRIVATE | MAP_DENYWRITE;
|
|
|
|
if (elf_ex.e_type == ET_EXEC || load_addr_set) {
|
|
|
|
elf_flags |= MAP_FIXED;
|
|
|
|
} else if (elf_ex.e_type == ET_DYN) {
|
|
|
|
/* Try and get dynamic programs out of the way of the default mmap
|
|
|
|
base, as well as whatever program they might try to exec. This
|
|
|
|
is because the brk will follow the loader, and is not movable. */
|
|
|
|
/* NOTE: for qemu, we do a big mmap to get enough space
|
|
|
|
without hardcoding any address */
|
|
|
|
error = target_mmap(0, ET_DYN_MAP_SIZE,
|
|
|
|
PROT_NONE, MAP_PRIVATE | MAP_ANON,
|
|
|
|
-1, 0);
|
|
|
|
if (error == -1) {
|
|
|
|
perror("mmap");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
load_bias = TARGET_ELF_PAGESTART(error - elf_ppnt->p_vaddr);
|
|
|
|
}
|
|
|
|
|
|
|
|
error = target_mmap(TARGET_ELF_PAGESTART(load_bias + elf_ppnt->p_vaddr),
|
|
|
|
(elf_ppnt->p_filesz +
|
|
|
|
TARGET_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)),
|
|
|
|
elf_prot,
|
|
|
|
(MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE),
|
|
|
|
bprm->fd,
|
|
|
|
(elf_ppnt->p_offset -
|
|
|
|
TARGET_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)));
|
|
|
|
if (error == -1) {
|
|
|
|
perror("mmap");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef LOW_ELF_STACK
|
|
|
|
if (TARGET_ELF_PAGESTART(elf_ppnt->p_vaddr) < elf_stack)
|
|
|
|
elf_stack = TARGET_ELF_PAGESTART(elf_ppnt->p_vaddr);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (!load_addr_set) {
|
|
|
|
load_addr_set = 1;
|
|
|
|
load_addr = elf_ppnt->p_vaddr - elf_ppnt->p_offset;
|
|
|
|
if (elf_ex.e_type == ET_DYN) {
|
|
|
|
load_bias += error -
|
|
|
|
TARGET_ELF_PAGESTART(load_bias + elf_ppnt->p_vaddr);
|
|
|
|
load_addr += load_bias;
|
|
|
|
reloc_func_desc = load_bias;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
k = elf_ppnt->p_vaddr;
|
|
|
|
if (k < start_code)
|
|
|
|
start_code = k;
|
|
|
|
if (start_data < k)
|
|
|
|
start_data = k;
|
|
|
|
k = elf_ppnt->p_vaddr + elf_ppnt->p_filesz;
|
|
|
|
if (k > elf_bss)
|
|
|
|
elf_bss = k;
|
|
|
|
if ((elf_ppnt->p_flags & PF_X) && end_code < k)
|
|
|
|
end_code = k;
|
|
|
|
if (end_data < k)
|
|
|
|
end_data = k;
|
|
|
|
k = elf_ppnt->p_vaddr + elf_ppnt->p_memsz;
|
|
|
|
if (k > elf_brk) elf_brk = k;
|
|
|
|
}
|
|
|
|
|
|
|
|
elf_entry += load_bias;
|
|
|
|
elf_bss += load_bias;
|
|
|
|
elf_brk += load_bias;
|
|
|
|
start_code += load_bias;
|
|
|
|
end_code += load_bias;
|
|
|
|
start_data += load_bias;
|
|
|
|
end_data += load_bias;
|
|
|
|
|
|
|
|
if (elf_interpreter) {
|
2021-04-30 17:17:23 +03:00
|
|
|
elf_entry = load_elf_interp(&interp_elf_ex, interpreter_fd,
|
|
|
|
&interp_load_addr);
|
2008-10-26 23:33:16 +03:00
|
|
|
reloc_func_desc = interp_load_addr;
|
|
|
|
|
|
|
|
close(interpreter_fd);
|
|
|
|
free(elf_interpreter);
|
|
|
|
|
|
|
|
if (elf_entry == ~((abi_ulong)0UL)) {
|
|
|
|
printf("Unable to load interpreter\n");
|
|
|
|
free(elf_phdata);
|
|
|
|
exit(-1);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
free(elf_phdata);
|
|
|
|
|
2009-01-16 01:34:14 +03:00
|
|
|
if (qemu_log_enabled())
|
2008-10-26 23:33:16 +03:00
|
|
|
load_symbols(&elf_ex, bprm->fd);
|
|
|
|
|
2021-04-30 17:17:23 +03:00
|
|
|
close(bprm->fd);
|
2008-10-26 23:33:16 +03:00
|
|
|
|
|
|
|
#ifdef LOW_ELF_STACK
|
|
|
|
info->start_stack = bprm->p = elf_stack - 4;
|
|
|
|
#endif
|
|
|
|
bprm->p = create_elf_tables(bprm->p,
|
2021-04-30 17:17:23 +03:00
|
|
|
bprm->argc,
|
|
|
|
bprm->envc,
|
|
|
|
&elf_ex,
|
|
|
|
load_addr, load_bias,
|
|
|
|
interp_load_addr,
|
|
|
|
info);
|
2008-10-26 23:33:16 +03:00
|
|
|
info->load_addr = reloc_func_desc;
|
|
|
|
info->start_brk = info->brk = elf_brk;
|
|
|
|
info->end_code = end_code;
|
|
|
|
info->start_code = start_code;
|
|
|
|
info->start_data = start_data;
|
|
|
|
info->end_data = end_data;
|
|
|
|
info->start_stack = bprm->p;
|
|
|
|
|
|
|
|
/* Calling set_brk effectively mmaps the pages that we need for the bss and break
|
|
|
|
sections */
|
|
|
|
set_brk(elf_bss, elf_brk);
|
|
|
|
|
|
|
|
padzero(elf_bss, elf_brk);
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
printf("(start_brk) %x\n" , info->start_brk);
|
|
|
|
printf("(end_code) %x\n" , info->end_code);
|
|
|
|
printf("(start_code) %x\n" , info->start_code);
|
|
|
|
printf("(end_data) %x\n" , info->end_data);
|
|
|
|
printf("(start_stack) %x\n" , info->start_stack);
|
|
|
|
printf("(brk) %x\n" , info->brk);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
info->entry = elf_entry;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void do_init_thread(struct target_pt_regs *regs, struct image_info *infop)
|
|
|
|
{
|
2021-08-04 07:04:20 +03:00
|
|
|
|
|
|
|
target_thread_init(regs, infop);
|
2008-10-26 23:33:16 +03:00
|
|
|
}
|