]> git.proxmox.com Git - qemu.git/blob - linux-user/elfload.c
MIPS linux-user update.
[qemu.git] / linux-user / elfload.c
1 /* This is the Linux kernel elf-loading code, ported into user space */
2
3 #include <stdio.h>
4 #include <sys/types.h>
5 #include <fcntl.h>
6 #include <errno.h>
7 #include <unistd.h>
8 #include <sys/mman.h>
9 #include <stdlib.h>
10 #include <string.h>
11
12 #include "qemu.h"
13 #include "disas.h"
14
15 /* this flag is uneffective under linux too, should be deleted */
16 #ifndef MAP_DENYWRITE
17 #define MAP_DENYWRITE 0
18 #endif
19
20 /* should probably go in elf.h */
21 #ifndef ELIBBAD
22 #define ELIBBAD 80
23 #endif
24
25 #ifdef TARGET_I386
26
27 #define ELF_PLATFORM get_elf_platform()
28
29 static const char *get_elf_platform(void)
30 {
31 static char elf_platform[] = "i386";
32 int family = (global_env->cpuid_version >> 8) & 0xff;
33 if (family > 6)
34 family = 6;
35 if (family >= 3)
36 elf_platform[1] = '0' + family;
37 return elf_platform;
38 }
39
40 #define ELF_HWCAP get_elf_hwcap()
41
42 static uint32_t get_elf_hwcap(void)
43 {
44 return global_env->cpuid_features;
45 }
46
47 #ifdef TARGET_X86_64
48 #define ELF_START_MMAP 0x2aaaaab000ULL
49 #define elf_check_arch(x) ( ((x) == ELF_ARCH) )
50
51 #define ELF_CLASS ELFCLASS64
52 #define ELF_DATA ELFDATA2LSB
53 #define ELF_ARCH EM_X86_64
54
55 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
56 {
57 regs->rax = 0;
58 regs->rsp = infop->start_stack;
59 regs->rip = infop->entry;
60 }
61
62 #else
63
64 #define ELF_START_MMAP 0x80000000
65
66 /*
67 * This is used to ensure we don't load something for the wrong architecture.
68 */
69 #define elf_check_arch(x) ( ((x) == EM_386) || ((x) == EM_486) )
70
71 /*
72 * These are used to set parameters in the core dumps.
73 */
74 #define ELF_CLASS ELFCLASS32
75 #define ELF_DATA ELFDATA2LSB
76 #define ELF_ARCH EM_386
77
78 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
79 {
80 regs->esp = infop->start_stack;
81 regs->eip = infop->entry;
82
83 /* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program
84 starts %edx contains a pointer to a function which might be
85 registered using `atexit'. This provides a mean for the
86 dynamic linker to call DT_FINI functions for shared libraries
87 that have been loaded before the code runs.
88
89 A value of 0 tells we have no such handler. */
90 regs->edx = 0;
91 }
92 #endif
93
94 #define USE_ELF_CORE_DUMP
95 #define ELF_EXEC_PAGESIZE 4096
96
97 #endif
98
99 #ifdef TARGET_ARM
100
101 #define ELF_START_MMAP 0x80000000
102
103 #define elf_check_arch(x) ( (x) == EM_ARM )
104
105 #define ELF_CLASS ELFCLASS32
106 #ifdef TARGET_WORDS_BIGENDIAN
107 #define ELF_DATA ELFDATA2MSB
108 #else
109 #define ELF_DATA ELFDATA2LSB
110 #endif
111 #define ELF_ARCH EM_ARM
112
113 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
114 {
115 target_long stack = infop->start_stack;
116 memset(regs, 0, sizeof(*regs));
117 regs->ARM_cpsr = 0x10;
118 if (infop->entry & 1)
119 regs->ARM_cpsr |= CPSR_T;
120 regs->ARM_pc = infop->entry & 0xfffffffe;
121 regs->ARM_sp = infop->start_stack;
122 regs->ARM_r2 = tgetl(stack + 8); /* envp */
123 regs->ARM_r1 = tgetl(stack + 4); /* envp */
124 /* XXX: it seems that r0 is zeroed after ! */
125 regs->ARM_r0 = 0;
126 /* For uClinux PIC binaries. */
127 regs->ARM_r10 = infop->start_data;
128 }
129
130 #define USE_ELF_CORE_DUMP
131 #define ELF_EXEC_PAGESIZE 4096
132
133 enum
134 {
135 ARM_HWCAP_ARM_SWP = 1 << 0,
136 ARM_HWCAP_ARM_HALF = 1 << 1,
137 ARM_HWCAP_ARM_THUMB = 1 << 2,
138 ARM_HWCAP_ARM_26BIT = 1 << 3,
139 ARM_HWCAP_ARM_FAST_MULT = 1 << 4,
140 ARM_HWCAP_ARM_FPA = 1 << 5,
141 ARM_HWCAP_ARM_VFP = 1 << 6,
142 ARM_HWCAP_ARM_EDSP = 1 << 7,
143 };
144
145 #define ELF_HWCAP (ARM_HWCAP_ARM_SWP | ARM_HWCAP_ARM_HALF \
146 | ARM_HWCAP_ARM_THUMB | ARM_HWCAP_ARM_FAST_MULT \
147 | ARM_HWCAP_ARM_FPA | ARM_HWCAP_ARM_VFP)
148
149 #endif
150
151 #ifdef TARGET_SPARC
152 #ifdef TARGET_SPARC64
153
154 #define ELF_START_MMAP 0x80000000
155
156 #define elf_check_arch(x) ( (x) == EM_SPARCV9 )
157
158 #define ELF_CLASS ELFCLASS64
159 #define ELF_DATA ELFDATA2MSB
160 #define ELF_ARCH EM_SPARCV9
161
162 #define STACK_BIAS 2047
163
164 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
165 {
166 regs->tstate = 0;
167 regs->pc = infop->entry;
168 regs->npc = regs->pc + 4;
169 regs->y = 0;
170 regs->u_regs[14] = infop->start_stack - 16 * 8 - STACK_BIAS;
171 }
172
173 #else
174 #define ELF_START_MMAP 0x80000000
175
176 #define elf_check_arch(x) ( (x) == EM_SPARC )
177
178 #define ELF_CLASS ELFCLASS32
179 #define ELF_DATA ELFDATA2MSB
180 #define ELF_ARCH EM_SPARC
181
182 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
183 {
184 regs->psr = 0;
185 regs->pc = infop->entry;
186 regs->npc = regs->pc + 4;
187 regs->y = 0;
188 regs->u_regs[14] = infop->start_stack - 16 * 4;
189 }
190
191 #endif
192 #endif
193
194 #ifdef TARGET_PPC
195
196 #define ELF_START_MMAP 0x80000000
197
198 #ifdef TARGET_PPC64
199
200 #define elf_check_arch(x) ( (x) == EM_PPC64 )
201
202 #define ELF_CLASS ELFCLASS64
203
204 #else
205
206 #define elf_check_arch(x) ( (x) == EM_PPC )
207
208 #define ELF_CLASS ELFCLASS32
209
210 #endif
211
212 #ifdef TARGET_WORDS_BIGENDIAN
213 #define ELF_DATA ELFDATA2MSB
214 #else
215 #define ELF_DATA ELFDATA2LSB
216 #endif
217 #define ELF_ARCH EM_PPC
218
219 /*
220 * We need to put in some extra aux table entries to tell glibc what
221 * the cache block size is, so it can use the dcbz instruction safely.
222 */
223 #define AT_DCACHEBSIZE 19
224 #define AT_ICACHEBSIZE 20
225 #define AT_UCACHEBSIZE 21
226 /* A special ignored type value for PPC, for glibc compatibility. */
227 #define AT_IGNOREPPC 22
228 /*
229 * The requirements here are:
230 * - keep the final alignment of sp (sp & 0xf)
231 * - make sure the 32-bit value at the first 16 byte aligned position of
232 * AUXV is greater than 16 for glibc compatibility.
233 * AT_IGNOREPPC is used for that.
234 * - for compatibility with glibc ARCH_DLINFO must always be defined on PPC,
235 * even if DLINFO_ARCH_ITEMS goes to zero or is undefined.
236 */
237 #define DLINFO_ARCH_ITEMS 5
238 #define ARCH_DLINFO \
239 do { \
240 NEW_AUX_ENT(AT_DCACHEBSIZE, 0x20); \
241 NEW_AUX_ENT(AT_ICACHEBSIZE, 0x20); \
242 NEW_AUX_ENT(AT_UCACHEBSIZE, 0); \
243 /* \
244 * Now handle glibc compatibility. \
245 */ \
246 NEW_AUX_ENT(AT_IGNOREPPC, AT_IGNOREPPC); \
247 NEW_AUX_ENT(AT_IGNOREPPC, AT_IGNOREPPC); \
248 } while (0)
249
250 static inline void init_thread(struct target_pt_regs *_regs, struct image_info *infop)
251 {
252 target_ulong pos = infop->start_stack;
253 target_ulong tmp;
254 #ifdef TARGET_PPC64
255 target_ulong entry, toc;
256 #endif
257
258 _regs->msr = 1 << MSR_PR; /* Set user mode */
259 _regs->gpr[1] = infop->start_stack;
260 #ifdef TARGET_PPC64
261 entry = ldq_raw(infop->entry) + infop->load_addr;
262 toc = ldq_raw(infop->entry + 8) + infop->load_addr;
263 _regs->gpr[2] = toc;
264 infop->entry = entry;
265 #endif
266 _regs->nip = infop->entry;
267 /* Note that isn't exactly what regular kernel does
268 * but this is what the ABI wants and is needed to allow
269 * execution of PPC BSD programs.
270 */
271 _regs->gpr[3] = tgetl(pos);
272 pos += sizeof(target_ulong);
273 _regs->gpr[4] = pos;
274 for (tmp = 1; tmp != 0; pos += sizeof(target_ulong))
275 tmp = ldl(pos);
276 _regs->gpr[5] = pos;
277 }
278
279 #define USE_ELF_CORE_DUMP
280 #define ELF_EXEC_PAGESIZE 4096
281
282 #endif
283
284 #ifdef TARGET_MIPS
285
286 #define ELF_START_MMAP 0x80000000
287
288 #define elf_check_arch(x) ( (x) == EM_MIPS )
289
290 #ifdef TARGET_MIPS64
291 #define ELF_CLASS ELFCLASS64
292 #else
293 #define ELF_CLASS ELFCLASS32
294 #endif
295 #ifdef TARGET_WORDS_BIGENDIAN
296 #define ELF_DATA ELFDATA2MSB
297 #else
298 #define ELF_DATA ELFDATA2LSB
299 #endif
300 #define ELF_ARCH EM_MIPS
301
302 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
303 {
304 regs->cp0_status = CP0St_UM;
305 regs->cp0_epc = infop->entry;
306 regs->regs[29] = infop->start_stack;
307 }
308
309 #define USE_ELF_CORE_DUMP
310 #define ELF_EXEC_PAGESIZE 4096
311
312 #endif /* TARGET_MIPS */
313
314 #ifdef TARGET_SH4
315
316 #define ELF_START_MMAP 0x80000000
317
318 #define elf_check_arch(x) ( (x) == EM_SH )
319
320 #define ELF_CLASS ELFCLASS32
321 #define ELF_DATA ELFDATA2LSB
322 #define ELF_ARCH EM_SH
323
324 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
325 {
326 /* Check other registers XXXXX */
327 regs->pc = infop->entry;
328 regs->regs[15] = infop->start_stack - 16 * 4;
329 }
330
331 #define USE_ELF_CORE_DUMP
332 #define ELF_EXEC_PAGESIZE 4096
333
334 #endif
335
336 #ifdef TARGET_M68K
337
338 #define ELF_START_MMAP 0x80000000
339
340 #define elf_check_arch(x) ( (x) == EM_68K )
341
342 #define ELF_CLASS ELFCLASS32
343 #define ELF_DATA ELFDATA2MSB
344 #define ELF_ARCH EM_68K
345
346 /* ??? Does this need to do anything?
347 #define ELF_PLAT_INIT(_r) */
348
349 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
350 {
351 regs->usp = infop->start_stack;
352 regs->sr = 0;
353 regs->pc = infop->entry;
354 }
355
356 #define USE_ELF_CORE_DUMP
357 #define ELF_EXEC_PAGESIZE 8192
358
359 #endif
360
361 #ifdef TARGET_ALPHA
362
363 #define ELF_START_MMAP (0x30000000000ULL)
364
365 #define elf_check_arch(x) ( (x) == ELF_ARCH )
366
367 #define ELF_CLASS ELFCLASS64
368 #define ELF_DATA ELFDATA2MSB
369 #define ELF_ARCH EM_ALPHA
370
371 static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
372 {
373 regs->pc = infop->entry;
374 regs->ps = 8;
375 regs->usp = infop->start_stack;
376 regs->unique = infop->start_data; /* ? */
377 printf("Set unique value to " TARGET_FMT_lx " (" TARGET_FMT_lx ")\n",
378 regs->unique, infop->start_data);
379 }
380
381 #define USE_ELF_CORE_DUMP
382 #define ELF_EXEC_PAGESIZE 8192
383
384 #endif /* TARGET_ALPHA */
385
386 #ifndef ELF_PLATFORM
387 #define ELF_PLATFORM (NULL)
388 #endif
389
390 #ifndef ELF_HWCAP
391 #define ELF_HWCAP 0
392 #endif
393
394 #include "elf.h"
395
396 struct exec
397 {
398 unsigned int a_info; /* Use macros N_MAGIC, etc for access */
399 unsigned int a_text; /* length of text, in bytes */
400 unsigned int a_data; /* length of data, in bytes */
401 unsigned int a_bss; /* length of uninitialized data area, in bytes */
402 unsigned int a_syms; /* length of symbol table data in file, in bytes */
403 unsigned int a_entry; /* start address */
404 unsigned int a_trsize; /* length of relocation info for text, in bytes */
405 unsigned int a_drsize; /* length of relocation info for data, in bytes */
406 };
407
408
409 #define N_MAGIC(exec) ((exec).a_info & 0xffff)
410 #define OMAGIC 0407
411 #define NMAGIC 0410
412 #define ZMAGIC 0413
413 #define QMAGIC 0314
414
415 /* max code+data+bss space allocated to elf interpreter */
416 #define INTERP_MAP_SIZE (32 * 1024 * 1024)
417
418 /* max code+data+bss+brk space allocated to ET_DYN executables */
419 #define ET_DYN_MAP_SIZE (128 * 1024 * 1024)
420
421 /* from personality.h */
422
423 /* Flags for bug emulation. These occupy the top three bytes. */
424 #define STICKY_TIMEOUTS 0x4000000
425 #define WHOLE_SECONDS 0x2000000
426
427 /* Personality types. These go in the low byte. Avoid using the top bit,
428 * it will conflict with error returns.
429 */
430 #define PER_MASK (0x00ff)
431 #define PER_LINUX (0x0000)
432 #define PER_SVR4 (0x0001 | STICKY_TIMEOUTS)
433 #define PER_SVR3 (0x0002 | STICKY_TIMEOUTS)
434 #define PER_SCOSVR3 (0x0003 | STICKY_TIMEOUTS | WHOLE_SECONDS)
435 #define PER_WYSEV386 (0x0004 | STICKY_TIMEOUTS)
436 #define PER_ISCR4 (0x0005 | STICKY_TIMEOUTS)
437 #define PER_BSD (0x0006)
438 #define PER_XENIX (0x0007 | STICKY_TIMEOUTS)
439
440 /* Necessary parameters */
441 #define TARGET_ELF_EXEC_PAGESIZE TARGET_PAGE_SIZE
442 #define TARGET_ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(TARGET_ELF_EXEC_PAGESIZE-1))
443 #define TARGET_ELF_PAGEOFFSET(_v) ((_v) & (TARGET_ELF_EXEC_PAGESIZE-1))
444
445 #define INTERPRETER_NONE 0
446 #define INTERPRETER_AOUT 1
447 #define INTERPRETER_ELF 2
448
449 #define DLINFO_ITEMS 12
450
451 static inline void memcpy_fromfs(void * to, const void * from, unsigned long n)
452 {
453 memcpy(to, from, n);
454 }
455
456 extern unsigned long x86_stack_size;
457
458 static int load_aout_interp(void * exptr, int interp_fd);
459
460 #ifdef BSWAP_NEEDED
461 static void bswap_ehdr(struct elfhdr *ehdr)
462 {
463 bswap16s(&ehdr->e_type); /* Object file type */
464 bswap16s(&ehdr->e_machine); /* Architecture */
465 bswap32s(&ehdr->e_version); /* Object file version */
466 bswaptls(&ehdr->e_entry); /* Entry point virtual address */
467 bswaptls(&ehdr->e_phoff); /* Program header table file offset */
468 bswaptls(&ehdr->e_shoff); /* Section header table file offset */
469 bswap32s(&ehdr->e_flags); /* Processor-specific flags */
470 bswap16s(&ehdr->e_ehsize); /* ELF header size in bytes */
471 bswap16s(&ehdr->e_phentsize); /* Program header table entry size */
472 bswap16s(&ehdr->e_phnum); /* Program header table entry count */
473 bswap16s(&ehdr->e_shentsize); /* Section header table entry size */
474 bswap16s(&ehdr->e_shnum); /* Section header table entry count */
475 bswap16s(&ehdr->e_shstrndx); /* Section header string table index */
476 }
477
478 static void bswap_phdr(struct elf_phdr *phdr)
479 {
480 bswap32s(&phdr->p_type); /* Segment type */
481 bswaptls(&phdr->p_offset); /* Segment file offset */
482 bswaptls(&phdr->p_vaddr); /* Segment virtual address */
483 bswaptls(&phdr->p_paddr); /* Segment physical address */
484 bswaptls(&phdr->p_filesz); /* Segment size in file */
485 bswaptls(&phdr->p_memsz); /* Segment size in memory */
486 bswap32s(&phdr->p_flags); /* Segment flags */
487 bswaptls(&phdr->p_align); /* Segment alignment */
488 }
489
490 static void bswap_shdr(struct elf_shdr *shdr)
491 {
492 bswap32s(&shdr->sh_name);
493 bswap32s(&shdr->sh_type);
494 bswaptls(&shdr->sh_flags);
495 bswaptls(&shdr->sh_addr);
496 bswaptls(&shdr->sh_offset);
497 bswaptls(&shdr->sh_size);
498 bswap32s(&shdr->sh_link);
499 bswap32s(&shdr->sh_info);
500 bswaptls(&shdr->sh_addralign);
501 bswaptls(&shdr->sh_entsize);
502 }
503
504 static void bswap_sym(struct elf_sym *sym)
505 {
506 bswap32s(&sym->st_name);
507 bswaptls(&sym->st_value);
508 bswaptls(&sym->st_size);
509 bswap16s(&sym->st_shndx);
510 }
511 #endif
512
513 /*
514 * 'copy_elf_strings()' copies argument/envelope strings from user
515 * memory to free pages in kernel mem. These are in a format ready
516 * to be put directly into the top of new user memory.
517 *
518 */
519 static unsigned long copy_elf_strings(int argc,char ** argv, void **page,
520 unsigned long p)
521 {
522 char *tmp, *tmp1, *pag = NULL;
523 int len, offset = 0;
524
525 if (!p) {
526 return 0; /* bullet-proofing */
527 }
528 while (argc-- > 0) {
529 tmp = argv[argc];
530 if (!tmp) {
531 fprintf(stderr, "VFS: argc is wrong");
532 exit(-1);
533 }
534 tmp1 = tmp;
535 while (*tmp++);
536 len = tmp - tmp1;
537 if (p < len) { /* this shouldn't happen - 128kB */
538 return 0;
539 }
540 while (len) {
541 --p; --tmp; --len;
542 if (--offset < 0) {
543 offset = p % TARGET_PAGE_SIZE;
544 pag = (char *)page[p/TARGET_PAGE_SIZE];
545 if (!pag) {
546 pag = (char *)malloc(TARGET_PAGE_SIZE);
547 page[p/TARGET_PAGE_SIZE] = pag;
548 if (!pag)
549 return 0;
550 }
551 }
552 if (len == 0 || offset == 0) {
553 *(pag + offset) = *tmp;
554 }
555 else {
556 int bytes_to_copy = (len > offset) ? offset : len;
557 tmp -= bytes_to_copy;
558 p -= bytes_to_copy;
559 offset -= bytes_to_copy;
560 len -= bytes_to_copy;
561 memcpy_fromfs(pag + offset, tmp, bytes_to_copy + 1);
562 }
563 }
564 }
565 return p;
566 }
567
568 unsigned long setup_arg_pages(target_ulong p, struct linux_binprm * bprm,
569 struct image_info * info)
570 {
571 target_ulong stack_base, size, error;
572 int i;
573
574 /* Create enough stack to hold everything. If we don't use
575 * it for args, we'll use it for something else...
576 */
577 size = x86_stack_size;
578 if (size < MAX_ARG_PAGES*TARGET_PAGE_SIZE)
579 size = MAX_ARG_PAGES*TARGET_PAGE_SIZE;
580 error = target_mmap(0,
581 size + qemu_host_page_size,
582 PROT_READ | PROT_WRITE,
583 MAP_PRIVATE | MAP_ANONYMOUS,
584 -1, 0);
585 if (error == -1) {
586 perror("stk mmap");
587 exit(-1);
588 }
589 /* we reserve one extra page at the top of the stack as guard */
590 target_mprotect(error + size, qemu_host_page_size, PROT_NONE);
591
592 stack_base = error + size - MAX_ARG_PAGES*TARGET_PAGE_SIZE;
593 p += stack_base;
594
595 for (i = 0 ; i < MAX_ARG_PAGES ; i++) {
596 if (bprm->page[i]) {
597 info->rss++;
598
599 memcpy_to_target(stack_base, bprm->page[i], TARGET_PAGE_SIZE);
600 free(bprm->page[i]);
601 }
602 stack_base += TARGET_PAGE_SIZE;
603 }
604 return p;
605 }
606
607 static void set_brk(unsigned long start, unsigned long end)
608 {
609 /* page-align the start and end addresses... */
610 start = HOST_PAGE_ALIGN(start);
611 end = HOST_PAGE_ALIGN(end);
612 if (end <= start)
613 return;
614 if(target_mmap(start, end - start,
615 PROT_READ | PROT_WRITE | PROT_EXEC,
616 MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0) == -1) {
617 perror("cannot mmap brk");
618 exit(-1);
619 }
620 }
621
622
623 /* We need to explicitly zero any fractional pages after the data
624 section (i.e. bss). This would contain the junk from the file that
625 should not be in memory. */
626 static void padzero(unsigned long elf_bss, unsigned long last_bss)
627 {
628 unsigned long nbyte;
629
630 if (elf_bss >= last_bss)
631 return;
632
633 /* XXX: this is really a hack : if the real host page size is
634 smaller than the target page size, some pages after the end
635 of the file may not be mapped. A better fix would be to
636 patch target_mmap(), but it is more complicated as the file
637 size must be known */
638 if (qemu_real_host_page_size < qemu_host_page_size) {
639 unsigned long end_addr, end_addr1;
640 end_addr1 = (elf_bss + qemu_real_host_page_size - 1) &
641 ~(qemu_real_host_page_size - 1);
642 end_addr = HOST_PAGE_ALIGN(elf_bss);
643 if (end_addr1 < end_addr) {
644 mmap((void *)end_addr1, end_addr - end_addr1,
645 PROT_READ|PROT_WRITE|PROT_EXEC,
646 MAP_FIXED|MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
647 }
648 }
649
650 nbyte = elf_bss & (qemu_host_page_size-1);
651 if (nbyte) {
652 nbyte = qemu_host_page_size - nbyte;
653 do {
654 tput8(elf_bss, 0);
655 elf_bss++;
656 } while (--nbyte);
657 }
658 }
659
660
661 static unsigned long create_elf_tables(target_ulong p, int argc, int envc,
662 struct elfhdr * exec,
663 unsigned long load_addr,
664 unsigned long load_bias,
665 unsigned long interp_load_addr, int ibcs,
666 struct image_info *info)
667 {
668 target_ulong sp;
669 int size;
670 target_ulong u_platform;
671 const char *k_platform;
672 const int n = sizeof(target_ulong);
673
674 sp = p;
675 u_platform = 0;
676 k_platform = ELF_PLATFORM;
677 if (k_platform) {
678 size_t len = strlen(k_platform) + 1;
679 sp -= (len + n - 1) & ~(n - 1);
680 u_platform = sp;
681 memcpy_to_target(sp, k_platform, len);
682 }
683 /*
684 * Force 16 byte _final_ alignment here for generality.
685 */
686 sp = sp &~ (target_ulong)15;
687 size = (DLINFO_ITEMS + 1) * 2;
688 if (k_platform)
689 size += 2;
690 #ifdef DLINFO_ARCH_ITEMS
691 size += DLINFO_ARCH_ITEMS * 2;
692 #endif
693 size += envc + argc + 2;
694 size += (!ibcs ? 3 : 1); /* argc itself */
695 size *= n;
696 if (size & 15)
697 sp -= 16 - (size & 15);
698
699 #define NEW_AUX_ENT(id, val) do { \
700 sp -= n; tputl(sp, val); \
701 sp -= n; tputl(sp, id); \
702 } while(0)
703 NEW_AUX_ENT (AT_NULL, 0);
704
705 /* There must be exactly DLINFO_ITEMS entries here. */
706 NEW_AUX_ENT(AT_PHDR, (target_ulong)(load_addr + exec->e_phoff));
707 NEW_AUX_ENT(AT_PHENT, (target_ulong)(sizeof (struct elf_phdr)));
708 NEW_AUX_ENT(AT_PHNUM, (target_ulong)(exec->e_phnum));
709 NEW_AUX_ENT(AT_PAGESZ, (target_ulong)(TARGET_PAGE_SIZE));
710 NEW_AUX_ENT(AT_BASE, (target_ulong)(interp_load_addr));
711 NEW_AUX_ENT(AT_FLAGS, (target_ulong)0);
712 NEW_AUX_ENT(AT_ENTRY, load_bias + exec->e_entry);
713 NEW_AUX_ENT(AT_UID, (target_ulong) getuid());
714 NEW_AUX_ENT(AT_EUID, (target_ulong) geteuid());
715 NEW_AUX_ENT(AT_GID, (target_ulong) getgid());
716 NEW_AUX_ENT(AT_EGID, (target_ulong) getegid());
717 NEW_AUX_ENT(AT_HWCAP, (target_ulong) ELF_HWCAP);
718 if (k_platform)
719 NEW_AUX_ENT(AT_PLATFORM, u_platform);
720 #ifdef ARCH_DLINFO
721 /*
722 * ARCH_DLINFO must come last so platform specific code can enforce
723 * special alignment requirements on the AUXV if necessary (eg. PPC).
724 */
725 ARCH_DLINFO;
726 #endif
727 #undef NEW_AUX_ENT
728
729 sp = loader_build_argptr(envc, argc, sp, p, !ibcs);
730 return sp;
731 }
732
733
734 static unsigned long load_elf_interp(struct elfhdr * interp_elf_ex,
735 int interpreter_fd,
736 unsigned long *interp_load_addr)
737 {
738 struct elf_phdr *elf_phdata = NULL;
739 struct elf_phdr *eppnt;
740 unsigned long load_addr = 0;
741 int load_addr_set = 0;
742 int retval;
743 unsigned long last_bss, elf_bss;
744 unsigned long error;
745 int i;
746
747 elf_bss = 0;
748 last_bss = 0;
749 error = 0;
750
751 #ifdef BSWAP_NEEDED
752 bswap_ehdr(interp_elf_ex);
753 #endif
754 /* First of all, some simple consistency checks */
755 if ((interp_elf_ex->e_type != ET_EXEC &&
756 interp_elf_ex->e_type != ET_DYN) ||
757 !elf_check_arch(interp_elf_ex->e_machine)) {
758 return ~0UL;
759 }
760
761
762 /* Now read in all of the header information */
763
764 if (sizeof(struct elf_phdr) * interp_elf_ex->e_phnum > TARGET_PAGE_SIZE)
765 return ~0UL;
766
767 elf_phdata = (struct elf_phdr *)
768 malloc(sizeof(struct elf_phdr) * interp_elf_ex->e_phnum);
769
770 if (!elf_phdata)
771 return ~0UL;
772
773 /*
774 * If the size of this structure has changed, then punt, since
775 * we will be doing the wrong thing.
776 */
777 if (interp_elf_ex->e_phentsize != sizeof(struct elf_phdr)) {
778 free(elf_phdata);
779 return ~0UL;
780 }
781
782 retval = lseek(interpreter_fd, interp_elf_ex->e_phoff, SEEK_SET);
783 if(retval >= 0) {
784 retval = read(interpreter_fd,
785 (char *) elf_phdata,
786 sizeof(struct elf_phdr) * interp_elf_ex->e_phnum);
787 }
788 if (retval < 0) {
789 perror("load_elf_interp");
790 exit(-1);
791 free (elf_phdata);
792 return retval;
793 }
794 #ifdef BSWAP_NEEDED
795 eppnt = elf_phdata;
796 for (i=0; i<interp_elf_ex->e_phnum; i++, eppnt++) {
797 bswap_phdr(eppnt);
798 }
799 #endif
800
801 if (interp_elf_ex->e_type == ET_DYN) {
802 /* in order to avoid harcoding the interpreter load
803 address in qemu, we allocate a big enough memory zone */
804 error = target_mmap(0, INTERP_MAP_SIZE,
805 PROT_NONE, MAP_PRIVATE | MAP_ANON,
806 -1, 0);
807 if (error == -1) {
808 perror("mmap");
809 exit(-1);
810 }
811 load_addr = error;
812 load_addr_set = 1;
813 }
814
815 eppnt = elf_phdata;
816 for(i=0; i<interp_elf_ex->e_phnum; i++, eppnt++)
817 if (eppnt->p_type == PT_LOAD) {
818 int elf_type = MAP_PRIVATE | MAP_DENYWRITE;
819 int elf_prot = 0;
820 unsigned long vaddr = 0;
821 unsigned long k;
822
823 if (eppnt->p_flags & PF_R) elf_prot = PROT_READ;
824 if (eppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
825 if (eppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
826 if (interp_elf_ex->e_type == ET_EXEC || load_addr_set) {
827 elf_type |= MAP_FIXED;
828 vaddr = eppnt->p_vaddr;
829 }
830 error = target_mmap(load_addr+TARGET_ELF_PAGESTART(vaddr),
831 eppnt->p_filesz + TARGET_ELF_PAGEOFFSET(eppnt->p_vaddr),
832 elf_prot,
833 elf_type,
834 interpreter_fd,
835 eppnt->p_offset - TARGET_ELF_PAGEOFFSET(eppnt->p_vaddr));
836
837 if (error == -1) {
838 /* Real error */
839 close(interpreter_fd);
840 free(elf_phdata);
841 return ~0UL;
842 }
843
844 if (!load_addr_set && interp_elf_ex->e_type == ET_DYN) {
845 load_addr = error;
846 load_addr_set = 1;
847 }
848
849 /*
850 * Find the end of the file mapping for this phdr, and keep
851 * track of the largest address we see for this.
852 */
853 k = load_addr + eppnt->p_vaddr + eppnt->p_filesz;
854 if (k > elf_bss) elf_bss = k;
855
856 /*
857 * Do the same thing for the memory mapping - between
858 * elf_bss and last_bss is the bss section.
859 */
860 k = load_addr + eppnt->p_memsz + eppnt->p_vaddr;
861 if (k > last_bss) last_bss = k;
862 }
863
864 /* Now use mmap to map the library into memory. */
865
866 close(interpreter_fd);
867
868 /*
869 * Now fill out the bss section. First pad the last page up
870 * to the page boundary, and then perform a mmap to make sure
871 * that there are zeromapped pages up to and including the last
872 * bss page.
873 */
874 padzero(elf_bss, last_bss);
875 elf_bss = TARGET_ELF_PAGESTART(elf_bss + qemu_host_page_size - 1); /* What we have mapped so far */
876
877 /* Map the last of the bss segment */
878 if (last_bss > elf_bss) {
879 target_mmap(elf_bss, last_bss-elf_bss,
880 PROT_READ|PROT_WRITE|PROT_EXEC,
881 MAP_FIXED|MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
882 }
883 free(elf_phdata);
884
885 *interp_load_addr = load_addr;
886 return ((unsigned long) interp_elf_ex->e_entry) + load_addr;
887 }
888
889 /* Best attempt to load symbols from this ELF object. */
890 static void load_symbols(struct elfhdr *hdr, int fd)
891 {
892 unsigned int i;
893 struct elf_shdr sechdr, symtab, strtab;
894 char *strings;
895 struct syminfo *s;
896
897 lseek(fd, hdr->e_shoff, SEEK_SET);
898 for (i = 0; i < hdr->e_shnum; i++) {
899 if (read(fd, &sechdr, sizeof(sechdr)) != sizeof(sechdr))
900 return;
901 #ifdef BSWAP_NEEDED
902 bswap_shdr(&sechdr);
903 #endif
904 if (sechdr.sh_type == SHT_SYMTAB) {
905 symtab = sechdr;
906 lseek(fd, hdr->e_shoff
907 + sizeof(sechdr) * sechdr.sh_link, SEEK_SET);
908 if (read(fd, &strtab, sizeof(strtab))
909 != sizeof(strtab))
910 return;
911 #ifdef BSWAP_NEEDED
912 bswap_shdr(&strtab);
913 #endif
914 goto found;
915 }
916 }
917 return; /* Shouldn't happen... */
918
919 found:
920 /* Now know where the strtab and symtab are. Snarf them. */
921 s = malloc(sizeof(*s));
922 s->disas_symtab = malloc(symtab.sh_size);
923 s->disas_strtab = strings = malloc(strtab.sh_size);
924 if (!s->disas_symtab || !s->disas_strtab)
925 return;
926
927 lseek(fd, symtab.sh_offset, SEEK_SET);
928 if (read(fd, s->disas_symtab, symtab.sh_size) != symtab.sh_size)
929 return;
930
931 #ifdef BSWAP_NEEDED
932 for (i = 0; i < symtab.sh_size / sizeof(struct elf_sym); i++)
933 bswap_sym(s->disas_symtab + sizeof(struct elf_sym)*i);
934 #endif
935
936 lseek(fd, strtab.sh_offset, SEEK_SET);
937 if (read(fd, strings, strtab.sh_size) != strtab.sh_size)
938 return;
939 s->disas_num_syms = symtab.sh_size / sizeof(struct elf_sym);
940 s->next = syminfos;
941 syminfos = s;
942 }
943
944 int load_elf_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
945 struct image_info * info)
946 {
947 struct elfhdr elf_ex;
948 struct elfhdr interp_elf_ex;
949 struct exec interp_ex;
950 int interpreter_fd = -1; /* avoid warning */
951 unsigned long load_addr, load_bias;
952 int load_addr_set = 0;
953 unsigned int interpreter_type = INTERPRETER_NONE;
954 unsigned char ibcs2_interpreter;
955 int i;
956 unsigned long mapped_addr;
957 struct elf_phdr * elf_ppnt;
958 struct elf_phdr *elf_phdata;
959 unsigned long elf_bss, k, elf_brk;
960 int retval;
961 char * elf_interpreter;
962 unsigned long elf_entry, interp_load_addr = 0;
963 int status;
964 unsigned long start_code, end_code, end_data;
965 unsigned long reloc_func_desc = 0;
966 unsigned long elf_stack;
967 char passed_fileno[6];
968
969 ibcs2_interpreter = 0;
970 status = 0;
971 load_addr = 0;
972 load_bias = 0;
973 elf_ex = *((struct elfhdr *) bprm->buf); /* exec-header */
974 #ifdef BSWAP_NEEDED
975 bswap_ehdr(&elf_ex);
976 #endif
977
978 /* First of all, some simple consistency checks */
979 if ((elf_ex.e_type != ET_EXEC && elf_ex.e_type != ET_DYN) ||
980 (! elf_check_arch(elf_ex.e_machine))) {
981 return -ENOEXEC;
982 }
983
984 bprm->p = copy_elf_strings(1, &bprm->filename, bprm->page, bprm->p);
985 bprm->p = copy_elf_strings(bprm->envc,bprm->envp,bprm->page,bprm->p);
986 bprm->p = copy_elf_strings(bprm->argc,bprm->argv,bprm->page,bprm->p);
987 if (!bprm->p) {
988 retval = -E2BIG;
989 }
990
991 /* Now read in all of the header information */
992 elf_phdata = (struct elf_phdr *)malloc(elf_ex.e_phentsize*elf_ex.e_phnum);
993 if (elf_phdata == NULL) {
994 return -ENOMEM;
995 }
996
997 retval = lseek(bprm->fd, elf_ex.e_phoff, SEEK_SET);
998 if(retval > 0) {
999 retval = read(bprm->fd, (char *) elf_phdata,
1000 elf_ex.e_phentsize * elf_ex.e_phnum);
1001 }
1002
1003 if (retval < 0) {
1004 perror("load_elf_binary");
1005 exit(-1);
1006 free (elf_phdata);
1007 return -errno;
1008 }
1009
1010 #ifdef BSWAP_NEEDED
1011 elf_ppnt = elf_phdata;
1012 for (i=0; i<elf_ex.e_phnum; i++, elf_ppnt++) {
1013 bswap_phdr(elf_ppnt);
1014 }
1015 #endif
1016 elf_ppnt = elf_phdata;
1017
1018 elf_bss = 0;
1019 elf_brk = 0;
1020
1021
1022 elf_stack = ~0UL;
1023 elf_interpreter = NULL;
1024 start_code = ~0UL;
1025 end_code = 0;
1026 end_data = 0;
1027
1028 for(i=0;i < elf_ex.e_phnum; i++) {
1029 if (elf_ppnt->p_type == PT_INTERP) {
1030 if ( elf_interpreter != NULL )
1031 {
1032 free (elf_phdata);
1033 free(elf_interpreter);
1034 close(bprm->fd);
1035 return -EINVAL;
1036 }
1037
1038 /* This is the program interpreter used for
1039 * shared libraries - for now assume that this
1040 * is an a.out format binary
1041 */
1042
1043 elf_interpreter = (char *)malloc(elf_ppnt->p_filesz);
1044
1045 if (elf_interpreter == NULL) {
1046 free (elf_phdata);
1047 close(bprm->fd);
1048 return -ENOMEM;
1049 }
1050
1051 retval = lseek(bprm->fd, elf_ppnt->p_offset, SEEK_SET);
1052 if(retval >= 0) {
1053 retval = read(bprm->fd, elf_interpreter, elf_ppnt->p_filesz);
1054 }
1055 if(retval < 0) {
1056 perror("load_elf_binary2");
1057 exit(-1);
1058 }
1059
1060 /* If the program interpreter is one of these two,
1061 then assume an iBCS2 image. Otherwise assume
1062 a native linux image. */
1063
1064 /* JRP - Need to add X86 lib dir stuff here... */
1065
1066 if (strcmp(elf_interpreter,"/usr/lib/libc.so.1") == 0 ||
1067 strcmp(elf_interpreter,"/usr/lib/ld.so.1") == 0) {
1068 ibcs2_interpreter = 1;
1069 }
1070
1071 #if 0
1072 printf("Using ELF interpreter %s\n", elf_interpreter);
1073 #endif
1074 if (retval >= 0) {
1075 retval = open(path(elf_interpreter), O_RDONLY);
1076 if(retval >= 0) {
1077 interpreter_fd = retval;
1078 }
1079 else {
1080 perror(elf_interpreter);
1081 exit(-1);
1082 /* retval = -errno; */
1083 }
1084 }
1085
1086 if (retval >= 0) {
1087 retval = lseek(interpreter_fd, 0, SEEK_SET);
1088 if(retval >= 0) {
1089 retval = read(interpreter_fd,bprm->buf,128);
1090 }
1091 }
1092 if (retval >= 0) {
1093 interp_ex = *((struct exec *) bprm->buf); /* aout exec-header */
1094 interp_elf_ex=*((struct elfhdr *) bprm->buf); /* elf exec-header */
1095 }
1096 if (retval < 0) {
1097 perror("load_elf_binary3");
1098 exit(-1);
1099 free (elf_phdata);
1100 free(elf_interpreter);
1101 close(bprm->fd);
1102 return retval;
1103 }
1104 }
1105 elf_ppnt++;
1106 }
1107
1108 /* Some simple consistency checks for the interpreter */
1109 if (elf_interpreter){
1110 interpreter_type = INTERPRETER_ELF | INTERPRETER_AOUT;
1111
1112 /* Now figure out which format our binary is */
1113 if ((N_MAGIC(interp_ex) != OMAGIC) && (N_MAGIC(interp_ex) != ZMAGIC) &&
1114 (N_MAGIC(interp_ex) != QMAGIC)) {
1115 interpreter_type = INTERPRETER_ELF;
1116 }
1117
1118 if (interp_elf_ex.e_ident[0] != 0x7f ||
1119 strncmp(&interp_elf_ex.e_ident[1], "ELF",3) != 0) {
1120 interpreter_type &= ~INTERPRETER_ELF;
1121 }
1122
1123 if (!interpreter_type) {
1124 free(elf_interpreter);
1125 free(elf_phdata);
1126 close(bprm->fd);
1127 return -ELIBBAD;
1128 }
1129 }
1130
1131 /* OK, we are done with that, now set up the arg stuff,
1132 and then start this sucker up */
1133
1134 {
1135 char * passed_p;
1136
1137 if (interpreter_type == INTERPRETER_AOUT) {
1138 snprintf(passed_fileno, sizeof(passed_fileno), "%d", bprm->fd);
1139 passed_p = passed_fileno;
1140
1141 if (elf_interpreter) {
1142 bprm->p = copy_elf_strings(1,&passed_p,bprm->page,bprm->p);
1143 bprm->argc++;
1144 }
1145 }
1146 if (!bprm->p) {
1147 if (elf_interpreter) {
1148 free(elf_interpreter);
1149 }
1150 free (elf_phdata);
1151 close(bprm->fd);
1152 return -E2BIG;
1153 }
1154 }
1155
1156 /* OK, This is the point of no return */
1157 info->end_data = 0;
1158 info->end_code = 0;
1159 info->start_mmap = (unsigned long)ELF_START_MMAP;
1160 info->mmap = 0;
1161 elf_entry = (unsigned long) elf_ex.e_entry;
1162
1163 /* Do this so that we can load the interpreter, if need be. We will
1164 change some of these later */
1165 info->rss = 0;
1166 bprm->p = setup_arg_pages(bprm->p, bprm, info);
1167 info->start_stack = bprm->p;
1168
1169 /* Now we do a little grungy work by mmaping the ELF image into
1170 * the correct location in memory. At this point, we assume that
1171 * the image should be loaded at fixed address, not at a variable
1172 * address.
1173 */
1174
1175 for(i = 0, elf_ppnt = elf_phdata; i < elf_ex.e_phnum; i++, elf_ppnt++) {
1176 int elf_prot = 0;
1177 int elf_flags = 0;
1178 unsigned long error;
1179
1180 if (elf_ppnt->p_type != PT_LOAD)
1181 continue;
1182
1183 if (elf_ppnt->p_flags & PF_R) elf_prot |= PROT_READ;
1184 if (elf_ppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
1185 if (elf_ppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
1186 elf_flags = MAP_PRIVATE | MAP_DENYWRITE;
1187 if (elf_ex.e_type == ET_EXEC || load_addr_set) {
1188 elf_flags |= MAP_FIXED;
1189 } else if (elf_ex.e_type == ET_DYN) {
1190 /* Try and get dynamic programs out of the way of the default mmap
1191 base, as well as whatever program they might try to exec. This
1192 is because the brk will follow the loader, and is not movable. */
1193 /* NOTE: for qemu, we do a big mmap to get enough space
1194 without harcoding any address */
1195 error = target_mmap(0, ET_DYN_MAP_SIZE,
1196 PROT_NONE, MAP_PRIVATE | MAP_ANON,
1197 -1, 0);
1198 if (error == -1) {
1199 perror("mmap");
1200 exit(-1);
1201 }
1202 load_bias = TARGET_ELF_PAGESTART(error - elf_ppnt->p_vaddr);
1203 }
1204
1205 error = target_mmap(TARGET_ELF_PAGESTART(load_bias + elf_ppnt->p_vaddr),
1206 (elf_ppnt->p_filesz +
1207 TARGET_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)),
1208 elf_prot,
1209 (MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE),
1210 bprm->fd,
1211 (elf_ppnt->p_offset -
1212 TARGET_ELF_PAGEOFFSET(elf_ppnt->p_vaddr)));
1213 if (error == -1) {
1214 perror("mmap");
1215 exit(-1);
1216 }
1217
1218 #ifdef LOW_ELF_STACK
1219 if (TARGET_ELF_PAGESTART(elf_ppnt->p_vaddr) < elf_stack)
1220 elf_stack = TARGET_ELF_PAGESTART(elf_ppnt->p_vaddr);
1221 #endif
1222
1223 if (!load_addr_set) {
1224 load_addr_set = 1;
1225 load_addr = elf_ppnt->p_vaddr - elf_ppnt->p_offset;
1226 if (elf_ex.e_type == ET_DYN) {
1227 load_bias += error -
1228 TARGET_ELF_PAGESTART(load_bias + elf_ppnt->p_vaddr);
1229 load_addr += load_bias;
1230 reloc_func_desc = load_bias;
1231 }
1232 }
1233 k = elf_ppnt->p_vaddr;
1234 if (k < start_code)
1235 start_code = k;
1236 k = elf_ppnt->p_vaddr + elf_ppnt->p_filesz;
1237 if (k > elf_bss)
1238 elf_bss = k;
1239 if ((elf_ppnt->p_flags & PF_X) && end_code < k)
1240 end_code = k;
1241 if (end_data < k)
1242 end_data = k;
1243 k = elf_ppnt->p_vaddr + elf_ppnt->p_memsz;
1244 if (k > elf_brk) elf_brk = k;
1245 }
1246
1247 elf_entry += load_bias;
1248 elf_bss += load_bias;
1249 elf_brk += load_bias;
1250 start_code += load_bias;
1251 end_code += load_bias;
1252 // start_data += load_bias;
1253 end_data += load_bias;
1254
1255 if (elf_interpreter) {
1256 if (interpreter_type & 1) {
1257 elf_entry = load_aout_interp(&interp_ex, interpreter_fd);
1258 }
1259 else if (interpreter_type & 2) {
1260 elf_entry = load_elf_interp(&interp_elf_ex, interpreter_fd,
1261 &interp_load_addr);
1262 }
1263 reloc_func_desc = interp_load_addr;
1264
1265 close(interpreter_fd);
1266 free(elf_interpreter);
1267
1268 if (elf_entry == ~0UL) {
1269 printf("Unable to load interpreter\n");
1270 free(elf_phdata);
1271 exit(-1);
1272 return 0;
1273 }
1274 }
1275
1276 free(elf_phdata);
1277
1278 if (loglevel)
1279 load_symbols(&elf_ex, bprm->fd);
1280
1281 if (interpreter_type != INTERPRETER_AOUT) close(bprm->fd);
1282 info->personality = (ibcs2_interpreter ? PER_SVR4 : PER_LINUX);
1283
1284 #ifdef LOW_ELF_STACK
1285 info->start_stack = bprm->p = elf_stack - 4;
1286 #endif
1287 bprm->p = create_elf_tables(bprm->p,
1288 bprm->argc,
1289 bprm->envc,
1290 &elf_ex,
1291 load_addr, load_bias,
1292 interp_load_addr,
1293 (interpreter_type == INTERPRETER_AOUT ? 0 : 1),
1294 info);
1295 info->start_brk = info->brk = elf_brk;
1296 info->end_code = end_code;
1297 info->start_code = start_code;
1298 info->start_data = end_code;
1299 info->end_data = end_data;
1300 info->start_stack = bprm->p;
1301
1302 /* Calling set_brk effectively mmaps the pages that we need for the bss and break
1303 sections */
1304 set_brk(elf_bss, elf_brk);
1305
1306 padzero(elf_bss, elf_brk);
1307
1308 #if 0
1309 printf("(start_brk) %x\n" , info->start_brk);
1310 printf("(end_code) %x\n" , info->end_code);
1311 printf("(start_code) %x\n" , info->start_code);
1312 printf("(end_data) %x\n" , info->end_data);
1313 printf("(start_stack) %x\n" , info->start_stack);
1314 printf("(brk) %x\n" , info->brk);
1315 #endif
1316
1317 if ( info->personality == PER_SVR4 )
1318 {
1319 /* Why this, you ask??? Well SVr4 maps page 0 as read-only,
1320 and some applications "depend" upon this behavior.
1321 Since we do not have the power to recompile these, we
1322 emulate the SVr4 behavior. Sigh. */
1323 mapped_addr = target_mmap(0, qemu_host_page_size, PROT_READ | PROT_EXEC,
1324 MAP_FIXED | MAP_PRIVATE, -1, 0);
1325 }
1326
1327 info->entry = elf_entry;
1328
1329 return 0;
1330 }
1331
1332 static int load_aout_interp(void * exptr, int interp_fd)
1333 {
1334 printf("a.out interpreter not yet supported\n");
1335 return(0);
1336 }
1337
1338 void do_init_thread(struct target_pt_regs *regs, struct image_info *infop)
1339 {
1340 init_thread(regs, infop);
1341 }