/* Code for loading Linux executables. Mostly linux kernel code. */ #include "qemu/osdep.h" #include "qemu.h" #include "user-internals.h" #include "user-mmap.h" #include "loader.h" #include "qapi/error.h" #define NGROUPS 32 /* ??? This should really be somewhere else. */ abi_long memcpy_to_target(abi_ulong dest, const void *src, unsigned long len) { void *host_ptr; host_ptr = lock_user(VERIFY_WRITE, dest, len, 0); if (!host_ptr) { return -TARGET_EFAULT; } memcpy(host_ptr, src, len); unlock_user(host_ptr, dest, 1); return 0; } static int count(char **vec) { int i; for (i = 0; *vec; i++) { vec++; } return i; } static int prepare_binprm(struct linux_binprm *bprm) { struct stat st; int mode; int retval; if (fstat(bprm->src.fd, &st) < 0) { return -errno; } mode = st.st_mode; if (!S_ISREG(mode)) { /* Must be regular file */ return -EACCES; } if (!(mode & 0111)) { /* Must have at least one execute bit set */ return -EACCES; } bprm->e_uid = geteuid(); bprm->e_gid = getegid(); /* Set-uid? */ if (mode & S_ISUID) { bprm->e_uid = st.st_uid; } /* Set-gid? */ /* * If setgid is set but no group execute bit then this * is a candidate for mandatory locking, not a setgid * executable. */ if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { bprm->e_gid = st.st_gid; } retval = read(bprm->src.fd, bprm->buf, BPRM_BUF_SIZE); if (retval < 0) { perror("prepare_binprm"); exit(-1); } if (retval < BPRM_BUF_SIZE) { /* Make sure the rest of the loader won't read garbage. */ memset(bprm->buf + retval, 0, BPRM_BUF_SIZE - retval); } bprm->src.cache = bprm->buf; bprm->src.cache_size = retval; return retval; } /* Construct the envp and argv tables on the target stack. */ abi_ulong loader_build_argptr(int envc, int argc, abi_ulong sp, abi_ulong stringp, int push_ptr) { TaskState *ts = (TaskState *)thread_cpu->opaque; int n = sizeof(abi_ulong); abi_ulong envp; abi_ulong argv; sp -= (envc + 1) * n; envp = sp; sp -= (argc + 1) * n; argv = sp; ts->info->envp = envp; ts->info->envc = envc; ts->info->argv = argv; ts->info->argc = argc; if (push_ptr) { /* FIXME - handle put_user() failures */ sp -= n; put_user_ual(envp, sp); sp -= n; put_user_ual(argv, sp); } sp -= n; /* FIXME - handle put_user() failures */ put_user_ual(argc, sp); ts->info->arg_strings = stringp; while (argc-- > 0) { /* FIXME - handle put_user() failures */ put_user_ual(stringp, argv); argv += n; stringp += target_strlen(stringp) + 1; } /* FIXME - handle put_user() failures */ put_user_ual(0, argv); ts->info->env_strings = stringp; while (envc-- > 0) { /* FIXME - handle put_user() failures */ put_user_ual(stringp, envp); envp += n; stringp += target_strlen(stringp) + 1; } /* FIXME - handle put_user() failures */ put_user_ual(0, envp); return sp; } int loader_exec(int fdexec, const char *filename, char **argv, char **envp, struct target_pt_regs *regs, struct image_info *infop, struct linux_binprm *bprm) { int retval; bprm->src.fd = fdexec; bprm->filename = (char *)filename; bprm->argc = count(argv); bprm->argv = argv; bprm->envc = count(envp); bprm->envp = envp; retval = prepare_binprm(bprm); if (retval < 4) { return -ENOEXEC; } if (bprm->buf[0] == 0x7f && bprm->buf[1] == 'E' && bprm->buf[2] == 'L' && bprm->buf[3] == 'F') { retval = load_elf_binary(bprm, infop); #if defined(TARGET_HAS_BFLT) } else if (bprm->buf[0] == 'b' && bprm->buf[1] == 'F' && bprm->buf[2] == 'L' && bprm->buf[3] == 'T') { retval = load_flt_binary(bprm, infop); #endif } else { return -ENOEXEC; } if (retval < 0) { return retval; } /* Success. Initialize important registers. */ do_init_thread(regs, infop); return 0; } bool imgsrc_read(void *dst, off_t offset, size_t len, const ImageSource *img, Error **errp) { ssize_t ret; if (offset + len <= img->cache_size) { memcpy(dst, img->cache + offset, len); return true; } if (img->fd < 0) { error_setg(errp, "read past end of buffer"); return false; } ret = pread(img->fd, dst, len, offset); if (ret == len) { return true; } if (ret < 0) { error_setg_errno(errp, errno, "Error reading file header"); } else { error_setg(errp, "Incomplete read of file header"); } return false; } void *imgsrc_read_alloc(off_t offset, size_t len, const ImageSource *img, Error **errp) { void *alloc = g_malloc(len); bool ok = imgsrc_read(alloc, offset, len, img, errp); if (!ok) { g_free(alloc); alloc = NULL; } return alloc; } abi_long imgsrc_mmap(abi_ulong start, abi_ulong len, int prot, int flags, const ImageSource *src, abi_ulong offset) { const int prot_write = PROT_READ | PROT_WRITE; abi_long ret; void *haddr; assert(flags == (MAP_PRIVATE | MAP_FIXED)); if (src->fd >= 0) { return target_mmap(start, len, prot, flags, src->fd, offset); } /* * This case is for the vdso; we don't expect bad images. * The mmap may extend beyond the end of the image, especially * to the end of the page. Zero fill. */ assert(offset < src->cache_size); ret = target_mmap(start, len, prot_write, flags | MAP_ANON, -1, 0); if (ret == -1) { return ret; } haddr = lock_user(VERIFY_WRITE, start, len, 0); assert(haddr != NULL); if (offset + len <= src->cache_size) { memcpy(haddr, src->cache + offset, len); } else { size_t rest = src->cache_size - offset; memcpy(haddr, src->cache + offset, rest); memset(haddr + rest, 0, len - rest); } unlock_user(haddr, start, len); if (prot != prot_write) { target_mprotect(start, len, prot); } return ret; }