| /* Code for loading Linux executables. Mostly linux kernel code. */ |
| |
| #include "qemu/osdep.h" |
| #include "qemu.h" |
| #include "user-internals.h" |
| #include "user-mmap.h" |
| #include "loader.h" |
| #include "qapi/error.h" |
| |
| #define NGROUPS 32 |
| |
| /* ??? This should really be somewhere else. */ |
| abi_long memcpy_to_target(abi_ulong dest, const void *src, unsigned long len) |
| { |
| void *host_ptr; |
| |
| host_ptr = lock_user(VERIFY_WRITE, dest, len, 0); |
| if (!host_ptr) { |
| return -TARGET_EFAULT; |
| } |
| memcpy(host_ptr, src, len); |
| unlock_user(host_ptr, dest, 1); |
| return 0; |
| } |
| |
| static int count(char **vec) |
| { |
| int i; |
| |
| for (i = 0; *vec; i++) { |
| vec++; |
| } |
| return i; |
| } |
| |
| static int prepare_binprm(struct linux_binprm *bprm) |
| { |
| struct stat st; |
| int mode; |
| int retval; |
| |
| if (fstat(bprm->fd, &st) < 0) { |
| return -errno; |
| } |
| |
| mode = st.st_mode; |
| if (!S_ISREG(mode)) { /* Must be regular file */ |
| return -EACCES; |
| } |
| if (!(mode & 0111)) { /* Must have at least one execute bit set */ |
| return -EACCES; |
| } |
| |
| bprm->e_uid = geteuid(); |
| bprm->e_gid = getegid(); |
| |
| /* Set-uid? */ |
| if (mode & S_ISUID) { |
| bprm->e_uid = st.st_uid; |
| } |
| |
| /* Set-gid? */ |
| /* |
| * If setgid is set but no group execute bit then this |
| * is a candidate for mandatory locking, not a setgid |
| * executable. |
| */ |
| if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { |
| bprm->e_gid = st.st_gid; |
| } |
| |
| retval = read(bprm->fd, bprm->buf, BPRM_BUF_SIZE); |
| if (retval < 0) { |
| perror("prepare_binprm"); |
| exit(-1); |
| } |
| if (retval < BPRM_BUF_SIZE) { |
| /* Make sure the rest of the loader won't read garbage. */ |
| memset(bprm->buf + retval, 0, BPRM_BUF_SIZE - retval); |
| } |
| |
| bprm->src.cache = bprm->buf; |
| bprm->src.cache_size = retval; |
| |
| return retval; |
| } |
| |
| /* Construct the envp and argv tables on the target stack. */ |
| abi_ulong loader_build_argptr(int envc, int argc, abi_ulong sp, |
| abi_ulong stringp, int push_ptr) |
| { |
| TaskState *ts = (TaskState *)thread_cpu->opaque; |
| int n = sizeof(abi_ulong); |
| abi_ulong envp; |
| abi_ulong argv; |
| |
| sp -= (envc + 1) * n; |
| envp = sp; |
| sp -= (argc + 1) * n; |
| argv = sp; |
| ts->info->envp = envp; |
| ts->info->envc = envc; |
| ts->info->argv = argv; |
| ts->info->argc = argc; |
| |
| if (push_ptr) { |
| /* FIXME - handle put_user() failures */ |
| sp -= n; |
| put_user_ual(envp, sp); |
| sp -= n; |
| put_user_ual(argv, sp); |
| } |
| |
| sp -= n; |
| /* FIXME - handle put_user() failures */ |
| put_user_ual(argc, sp); |
| |
| ts->info->arg_strings = stringp; |
| while (argc-- > 0) { |
| /* FIXME - handle put_user() failures */ |
| put_user_ual(stringp, argv); |
| argv += n; |
| stringp += target_strlen(stringp) + 1; |
| } |
| /* FIXME - handle put_user() failures */ |
| put_user_ual(0, argv); |
| |
| ts->info->env_strings = stringp; |
| while (envc-- > 0) { |
| /* FIXME - handle put_user() failures */ |
| put_user_ual(stringp, envp); |
| envp += n; |
| stringp += target_strlen(stringp) + 1; |
| } |
| /* FIXME - handle put_user() failures */ |
| put_user_ual(0, envp); |
| |
| return sp; |
| } |
| |
| int loader_exec(int fdexec, const char *filename, char **argv, char **envp, |
| struct target_pt_regs *regs, struct image_info *infop, |
| struct linux_binprm *bprm) |
| { |
| int retval; |
| |
| bprm->fd = fdexec; |
| bprm->src.fd = fdexec; |
| bprm->filename = (char *)filename; |
| bprm->argc = count(argv); |
| bprm->argv = argv; |
| bprm->envc = count(envp); |
| bprm->envp = envp; |
| |
| retval = prepare_binprm(bprm); |
| |
| if (retval < 4) { |
| return -ENOEXEC; |
| } |
| if (bprm->buf[0] == 0x7f |
| && bprm->buf[1] == 'E' |
| && bprm->buf[2] == 'L' |
| && bprm->buf[3] == 'F') { |
| retval = load_elf_binary(bprm, infop); |
| #if defined(TARGET_HAS_BFLT) |
| } else if (bprm->buf[0] == 'b' |
| && bprm->buf[1] == 'F' |
| && bprm->buf[2] == 'L' |
| && bprm->buf[3] == 'T') { |
| retval = load_flt_binary(bprm, infop); |
| #endif |
| } else { |
| return -ENOEXEC; |
| } |
| if (retval < 0) { |
| return retval; |
| } |
| |
| /* Success. Initialize important registers. */ |
| do_init_thread(regs, infop); |
| return 0; |
| } |
| |
| bool imgsrc_read(void *dst, off_t offset, size_t len, |
| const ImageSource *img, Error **errp) |
| { |
| ssize_t ret; |
| |
| if (offset + len <= img->cache_size) { |
| memcpy(dst, img->cache + offset, len); |
| return true; |
| } |
| |
| if (img->fd < 0) { |
| error_setg(errp, "read past end of buffer"); |
| return false; |
| } |
| |
| ret = pread(img->fd, dst, len, offset); |
| if (ret == len) { |
| return true; |
| } |
| if (ret < 0) { |
| error_setg_errno(errp, errno, "Error reading file header"); |
| } else { |
| error_setg(errp, "Incomplete read of file header"); |
| } |
| return false; |
| } |
| |
| void *imgsrc_read_alloc(off_t offset, size_t len, |
| const ImageSource *img, Error **errp) |
| { |
| void *alloc = g_malloc(len); |
| bool ok = imgsrc_read(alloc, offset, len, img, errp); |
| |
| if (!ok) { |
| g_free(alloc); |
| alloc = NULL; |
| } |
| return alloc; |
| } |
| |
| abi_long imgsrc_mmap(abi_ulong start, abi_ulong len, int prot, |
| int flags, const ImageSource *src, abi_ulong offset) |
| { |
| const int prot_write = PROT_READ | PROT_WRITE; |
| abi_long ret; |
| void *haddr; |
| |
| assert(flags == (MAP_PRIVATE | MAP_FIXED)); |
| |
| if (src->fd >= 0) { |
| return target_mmap(start, len, prot, flags, src->fd, offset); |
| } |
| |
| /* |
| * This case is for the vdso; we don't expect bad images. |
| * The mmap may extend beyond the end of the image, especially |
| * to the end of the page. Zero fill. |
| */ |
| assert(offset < src->cache_size); |
| |
| ret = target_mmap(start, len, prot_write, flags | MAP_ANON, -1, 0); |
| if (ret == -1) { |
| return ret; |
| } |
| |
| haddr = lock_user(VERIFY_WRITE, start, len, 0); |
| assert(haddr != NULL); |
| if (offset + len <= src->cache_size) { |
| memcpy(haddr, src->cache + offset, len); |
| } else { |
| size_t rest = src->cache_size - offset; |
| memcpy(haddr, src->cache + offset, rest); |
| memset(haddr + rest, 0, len - rest); |
| } |
| unlock_user(haddr, start, len); |
| |
| if (prot != prot_write) { |
| target_mprotect(start, len, prot); |
| } |
| |
| return ret; |
| } |