2 * Load BSD executables.
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, see <http://www.gnu.org/licenses/>.
18 #include "qemu/osdep.h"
22 /* ??? This should really be somewhere else. */
23 abi_long memcpy_to_target(abi_ulong dest, const void *src,
28 host_ptr = lock_user(VERIFY_WRITE, dest, len, 0);
30 return -TARGET_EFAULT;
32 memcpy(host_ptr, src, len);
33 unlock_user(host_ptr, dest, 1);
37 static int count(char **vec)
41 for (i = 0; *vec; i++) {
48 static int prepare_binprm(struct bsd_binprm *bprm)
54 if (fstat(bprm->fd, &st) < 0) {
59 if (!S_ISREG(mode)) { /* Must be regular file */
62 if (!(mode & 0111)) { /* Must have at least one execute bit set */
66 bprm->e_uid = geteuid();
67 bprm->e_gid = getegid();
71 bprm->e_uid = st.st_uid;
76 * If setgid is set but no group execute bit then this
77 * is a candidate for mandatory locking, not a setgid
80 if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
81 bprm->e_gid = st.st_gid;
84 memset(bprm->buf, 0, sizeof(bprm->buf));
85 retval = lseek(bprm->fd, 0L, SEEK_SET);
87 retval = read(bprm->fd, bprm->buf, 128);
90 perror("prepare_binprm");
97 /* Construct the envp and argv tables on the target stack. */
98 abi_ulong loader_build_argptr(int envc, int argc, abi_ulong sp,
101 int n = sizeof(abi_ulong);
105 sp -= (envc + 1) * n;
107 sp -= (argc + 1) * n;
110 /* FIXME - handle put_user() failures */
111 put_user_ual(argc, sp);
114 /* FIXME - handle put_user() failures */
115 put_user_ual(stringp, argv);
117 stringp += target_strlen(stringp) + 1;
119 /* FIXME - handle put_user() failures */
120 put_user_ual(0, argv);
122 /* FIXME - handle put_user() failures */
123 put_user_ual(stringp, envp);
125 stringp += target_strlen(stringp) + 1;
127 /* FIXME - handle put_user() failures */
128 put_user_ual(0, envp);
133 static bool is_there(const char *candidate)
137 /* XXX work around access(2) false positives for superuser */
138 if (access(candidate, X_OK) == 0 && stat(candidate, &fin) == 0 &&
139 S_ISREG(fin.st_mode) && (getuid() != 0 ||
140 (fin.st_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) != 0)) {
147 int loader_exec(const char *filename, char **argv, char **envp,
148 struct target_pt_regs *regs, struct image_info *infop,
149 struct bsd_binprm *bprm)
151 char *path, fullpath[PATH_MAX];
154 bprm->p = TARGET_PAGE_SIZE * MAX_ARG_PAGES;
155 for (i = 0; i < MAX_ARG_PAGES; i++) { /* clear page-table */
156 bprm->page[i] = NULL;
159 if (strchr(filename, '/') != NULL) {
160 path = realpath(filename, fullpath);
162 /* Failed to resolve. */
165 if (!is_there(path)) {
169 path = g_find_program_in_path(filename);
175 retval = open(path, O_RDONLY);
181 bprm->fullpath = path;
183 bprm->filename = (char *)filename;
184 bprm->argc = count(argv);
186 bprm->envc = count(envp);
189 retval = prepare_binprm(bprm);
192 if (bprm->buf[0] == 0x7f
193 && bprm->buf[1] == 'E'
194 && bprm->buf[2] == 'L'
195 && bprm->buf[3] == 'F') {
196 retval = load_elf_binary(bprm, regs, infop);
198 fprintf(stderr, "Unknown binary format\n");
204 /* success. Initialize important registers */
205 do_init_thread(regs, infop);
209 /* Something went wrong, return the inode and free the argument pages*/
210 for (i = 0 ; i < MAX_ARG_PAGES ; i++) {
211 g_free(bprm->page[i]);