blob: 4ce97434e52b9bf6eeb8b70df68ebed17c4e979a [file] [log] [blame]
bellard31e31b82003-02-18 22:55:36 +00001/* This is the Linux kernel elf-loading code, ported into user space */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002#include <sys/time.h>
3#include <sys/param.h>
bellard31e31b82003-02-18 22:55:36 +00004
5#include <stdio.h>
6#include <sys/types.h>
7#include <fcntl.h>
bellard31e31b82003-02-18 22:55:36 +00008#include <errno.h>
9#include <unistd.h>
10#include <sys/mman.h>
Mika Westerbergedf8e2a2009-04-07 09:57:11 +030011#include <sys/resource.h>
bellard31e31b82003-02-18 22:55:36 +000012#include <stdlib.h>
13#include <string.h>
Mika Westerbergedf8e2a2009-04-07 09:57:11 +030014#include <time.h>
bellard31e31b82003-02-18 22:55:36 +000015
bellard3ef693a2003-03-23 20:17:16 +000016#include "qemu.h"
bellard689f9362003-04-29 20:40:07 +000017#include "disas.h"
bellard31e31b82003-02-18 22:55:36 +000018
malce58ffeb2009-01-14 18:39:49 +000019#ifdef _ARCH_PPC64
malca6cc84f2008-08-20 22:39:28 +000020#undef ARCH_DLINFO
21#undef ELF_PLATFORM
22#undef ELF_HWCAP
23#undef ELF_CLASS
24#undef ELF_DATA
25#undef ELF_ARCH
26#endif
27
Mika Westerbergedf8e2a2009-04-07 09:57:11 +030028#define ELF_OSABI ELFOSABI_SYSV
29
blueswir1cb33da52007-10-09 16:34:29 +000030/* from personality.h */
31
32/*
33 * Flags for bug emulation.
34 *
35 * These occupy the top three bytes.
36 */
37enum {
Richard Hendersond97ef722010-07-27 10:25:29 -070038 ADDR_NO_RANDOMIZE = 0x0040000, /* disable randomization of VA space */
39 FDPIC_FUNCPTRS = 0x0080000, /* userspace function ptrs point to
40 descriptors (signal handling) */
41 MMAP_PAGE_ZERO = 0x0100000,
42 ADDR_COMPAT_LAYOUT = 0x0200000,
43 READ_IMPLIES_EXEC = 0x0400000,
44 ADDR_LIMIT_32BIT = 0x0800000,
45 SHORT_INODE = 0x1000000,
46 WHOLE_SECONDS = 0x2000000,
47 STICKY_TIMEOUTS = 0x4000000,
48 ADDR_LIMIT_3GB = 0x8000000,
blueswir1cb33da52007-10-09 16:34:29 +000049};
50
51/*
52 * Personality types.
53 *
54 * These go in the low byte. Avoid using the top bit, it will
55 * conflict with error returns.
56 */
57enum {
Richard Hendersond97ef722010-07-27 10:25:29 -070058 PER_LINUX = 0x0000,
59 PER_LINUX_32BIT = 0x0000 | ADDR_LIMIT_32BIT,
60 PER_LINUX_FDPIC = 0x0000 | FDPIC_FUNCPTRS,
61 PER_SVR4 = 0x0001 | STICKY_TIMEOUTS | MMAP_PAGE_ZERO,
62 PER_SVR3 = 0x0002 | STICKY_TIMEOUTS | SHORT_INODE,
63 PER_SCOSVR3 = 0x0003 | STICKY_TIMEOUTS | WHOLE_SECONDS | SHORT_INODE,
64 PER_OSR5 = 0x0003 | STICKY_TIMEOUTS | WHOLE_SECONDS,
65 PER_WYSEV386 = 0x0004 | STICKY_TIMEOUTS | SHORT_INODE,
66 PER_ISCR4 = 0x0005 | STICKY_TIMEOUTS,
67 PER_BSD = 0x0006,
68 PER_SUNOS = 0x0006 | STICKY_TIMEOUTS,
69 PER_XENIX = 0x0007 | STICKY_TIMEOUTS | SHORT_INODE,
70 PER_LINUX32 = 0x0008,
71 PER_LINUX32_3GB = 0x0008 | ADDR_LIMIT_3GB,
72 PER_IRIX32 = 0x0009 | STICKY_TIMEOUTS,/* IRIX5 32-bit */
73 PER_IRIXN32 = 0x000a | STICKY_TIMEOUTS,/* IRIX6 new 32-bit */
74 PER_IRIX64 = 0x000b | STICKY_TIMEOUTS,/* IRIX6 64-bit */
75 PER_RISCOS = 0x000c,
76 PER_SOLARIS = 0x000d | STICKY_TIMEOUTS,
77 PER_UW7 = 0x000e | STICKY_TIMEOUTS | MMAP_PAGE_ZERO,
78 PER_OSF4 = 0x000f, /* OSF/1 v4 */
79 PER_HPUX = 0x0010,
80 PER_MASK = 0x00ff,
blueswir1cb33da52007-10-09 16:34:29 +000081};
82
83/*
84 * Return the base personality without flags.
85 */
Richard Hendersond97ef722010-07-27 10:25:29 -070086#define personality(pers) (pers & PER_MASK)
blueswir1cb33da52007-10-09 16:34:29 +000087
bellard83fb7ad2004-07-05 21:25:26 +000088/* this flag is uneffective under linux too, should be deleted */
89#ifndef MAP_DENYWRITE
90#define MAP_DENYWRITE 0
91#endif
92
93/* should probably go in elf.h */
94#ifndef ELIBBAD
95#define ELIBBAD 80
96#endif
97
Richard Henderson28490232010-07-27 10:25:31 -070098#ifdef TARGET_WORDS_BIGENDIAN
99#define ELF_DATA ELFDATA2MSB
100#else
101#define ELF_DATA ELFDATA2LSB
102#endif
103
Richard Hendersond97ef722010-07-27 10:25:29 -0700104typedef target_ulong target_elf_greg_t;
Nathan Froyd21e807f2009-12-11 09:04:46 -0800105#ifdef USE_UID16
Laurent Vivier80f5ce72011-02-13 23:37:35 +0100106typedef target_ushort target_uid_t;
107typedef target_ushort target_gid_t;
Nathan Froyd21e807f2009-12-11 09:04:46 -0800108#else
Laurent Vivier80f5ce72011-02-13 23:37:35 +0100109typedef target_uint target_uid_t;
110typedef target_uint target_gid_t;
Nathan Froyd21e807f2009-12-11 09:04:46 -0800111#endif
Laurent Vivier80f5ce72011-02-13 23:37:35 +0100112typedef target_int target_pid_t;
Nathan Froyd21e807f2009-12-11 09:04:46 -0800113
bellard30ac07d2003-04-07 21:33:03 +0000114#ifdef TARGET_I386
115
bellard15338fd2005-11-26 11:41:16 +0000116#define ELF_PLATFORM get_elf_platform()
117
118static const char *get_elf_platform(void)
119{
120 static char elf_platform[] = "i386";
pbrookd5975362008-06-07 20:50:51 +0000121 int family = (thread_env->cpuid_version >> 8) & 0xff;
bellard15338fd2005-11-26 11:41:16 +0000122 if (family > 6)
123 family = 6;
124 if (family >= 3)
125 elf_platform[1] = '0' + family;
126 return elf_platform;
127}
128
129#define ELF_HWCAP get_elf_hwcap()
130
131static uint32_t get_elf_hwcap(void)
132{
Richard Hendersond97ef722010-07-27 10:25:29 -0700133 return thread_env->cpuid_features;
bellard15338fd2005-11-26 11:41:16 +0000134}
135
j_mayer84409dd2007-04-06 08:56:50 +0000136#ifdef TARGET_X86_64
137#define ELF_START_MMAP 0x2aaaaab000ULL
138#define elf_check_arch(x) ( ((x) == ELF_ARCH) )
139
140#define ELF_CLASS ELFCLASS64
j_mayer84409dd2007-04-06 08:56:50 +0000141#define ELF_ARCH EM_X86_64
142
143static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
144{
145 regs->rax = 0;
146 regs->rsp = infop->start_stack;
147 regs->rip = infop->entry;
148}
149
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300150#define ELF_NREG 27
Anthony Liguoric227f092009-10-01 16:12:16 -0500151typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300152
153/*
154 * Note that ELF_NREG should be 29 as there should be place for
155 * TRAPNO and ERR "registers" as well but linux doesn't dump
156 * those.
157 *
158 * See linux kernel: arch/x86/include/asm/elf.h
159 */
Andreas Färber05390242012-02-25 03:37:53 +0100160static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUX86State *env)
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300161{
162 (*regs)[0] = env->regs[15];
163 (*regs)[1] = env->regs[14];
164 (*regs)[2] = env->regs[13];
165 (*regs)[3] = env->regs[12];
166 (*regs)[4] = env->regs[R_EBP];
167 (*regs)[5] = env->regs[R_EBX];
168 (*regs)[6] = env->regs[11];
169 (*regs)[7] = env->regs[10];
170 (*regs)[8] = env->regs[9];
171 (*regs)[9] = env->regs[8];
172 (*regs)[10] = env->regs[R_EAX];
173 (*regs)[11] = env->regs[R_ECX];
174 (*regs)[12] = env->regs[R_EDX];
175 (*regs)[13] = env->regs[R_ESI];
176 (*regs)[14] = env->regs[R_EDI];
177 (*regs)[15] = env->regs[R_EAX]; /* XXX */
178 (*regs)[16] = env->eip;
179 (*regs)[17] = env->segs[R_CS].selector & 0xffff;
180 (*regs)[18] = env->eflags;
181 (*regs)[19] = env->regs[R_ESP];
182 (*regs)[20] = env->segs[R_SS].selector & 0xffff;
183 (*regs)[21] = env->segs[R_FS].selector & 0xffff;
184 (*regs)[22] = env->segs[R_GS].selector & 0xffff;
185 (*regs)[23] = env->segs[R_DS].selector & 0xffff;
186 (*regs)[24] = env->segs[R_ES].selector & 0xffff;
187 (*regs)[25] = env->segs[R_FS].selector & 0xffff;
188 (*regs)[26] = env->segs[R_GS].selector & 0xffff;
189}
190
j_mayer84409dd2007-04-06 08:56:50 +0000191#else
192
bellard30ac07d2003-04-07 21:33:03 +0000193#define ELF_START_MMAP 0x80000000
194
bellard30ac07d2003-04-07 21:33:03 +0000195/*
196 * This is used to ensure we don't load something for the wrong architecture.
197 */
198#define elf_check_arch(x) ( ((x) == EM_386) || ((x) == EM_486) )
199
200/*
201 * These are used to set parameters in the core dumps.
202 */
Richard Hendersond97ef722010-07-27 10:25:29 -0700203#define ELF_CLASS ELFCLASS32
Richard Hendersond97ef722010-07-27 10:25:29 -0700204#define ELF_ARCH EM_386
bellard30ac07d2003-04-07 21:33:03 +0000205
Richard Hendersond97ef722010-07-27 10:25:29 -0700206static inline void init_thread(struct target_pt_regs *regs,
207 struct image_info *infop)
bellardb346ff42003-06-15 20:05:50 +0000208{
209 regs->esp = infop->start_stack;
210 regs->eip = infop->entry;
pbrooke5fe0c52006-06-11 13:32:59 +0000211
212 /* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program
213 starts %edx contains a pointer to a function which might be
214 registered using `atexit'. This provides a mean for the
215 dynamic linker to call DT_FINI functions for shared libraries
216 that have been loaded before the code runs.
217
218 A value of 0 tells we have no such handler. */
219 regs->edx = 0;
bellardb346ff42003-06-15 20:05:50 +0000220}
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300221
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300222#define ELF_NREG 17
Anthony Liguoric227f092009-10-01 16:12:16 -0500223typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300224
225/*
226 * Note that ELF_NREG should be 19 as there should be place for
227 * TRAPNO and ERR "registers" as well but linux doesn't dump
228 * those.
229 *
230 * See linux kernel: arch/x86/include/asm/elf.h
231 */
Andreas Färber05390242012-02-25 03:37:53 +0100232static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUX86State *env)
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300233{
234 (*regs)[0] = env->regs[R_EBX];
235 (*regs)[1] = env->regs[R_ECX];
236 (*regs)[2] = env->regs[R_EDX];
237 (*regs)[3] = env->regs[R_ESI];
238 (*regs)[4] = env->regs[R_EDI];
239 (*regs)[5] = env->regs[R_EBP];
240 (*regs)[6] = env->regs[R_EAX];
241 (*regs)[7] = env->segs[R_DS].selector & 0xffff;
242 (*regs)[8] = env->segs[R_ES].selector & 0xffff;
243 (*regs)[9] = env->segs[R_FS].selector & 0xffff;
244 (*regs)[10] = env->segs[R_GS].selector & 0xffff;
245 (*regs)[11] = env->regs[R_EAX]; /* XXX */
246 (*regs)[12] = env->eip;
247 (*regs)[13] = env->segs[R_CS].selector & 0xffff;
248 (*regs)[14] = env->eflags;
249 (*regs)[15] = env->regs[R_ESP];
250 (*regs)[16] = env->segs[R_SS].selector & 0xffff;
251}
j_mayer84409dd2007-04-06 08:56:50 +0000252#endif
bellardb346ff42003-06-15 20:05:50 +0000253
Mika Westerberg9edc5d72009-04-07 09:57:59 +0300254#define USE_ELF_CORE_DUMP
Richard Hendersond97ef722010-07-27 10:25:29 -0700255#define ELF_EXEC_PAGESIZE 4096
bellardb346ff42003-06-15 20:05:50 +0000256
257#endif
258
259#ifdef TARGET_ARM
260
261#define ELF_START_MMAP 0x80000000
262
263#define elf_check_arch(x) ( (x) == EM_ARM )
264
Richard Hendersond97ef722010-07-27 10:25:29 -0700265#define ELF_CLASS ELFCLASS32
Richard Hendersond97ef722010-07-27 10:25:29 -0700266#define ELF_ARCH EM_ARM
bellardb346ff42003-06-15 20:05:50 +0000267
Richard Hendersond97ef722010-07-27 10:25:29 -0700268static inline void init_thread(struct target_pt_regs *regs,
269 struct image_info *infop)
bellardb346ff42003-06-15 20:05:50 +0000270{
blueswir1992f48a2007-10-14 16:27:31 +0000271 abi_long stack = infop->start_stack;
bellardb346ff42003-06-15 20:05:50 +0000272 memset(regs, 0, sizeof(*regs));
273 regs->ARM_cpsr = 0x10;
pbrook0240ded2006-02-04 19:30:51 +0000274 if (infop->entry & 1)
Richard Hendersond97ef722010-07-27 10:25:29 -0700275 regs->ARM_cpsr |= CPSR_T;
pbrook0240ded2006-02-04 19:30:51 +0000276 regs->ARM_pc = infop->entry & 0xfffffffe;
bellardb346ff42003-06-15 20:05:50 +0000277 regs->ARM_sp = infop->start_stack;
bellard2f619692007-11-16 10:46:05 +0000278 /* FIXME - what to for failure of get_user()? */
279 get_user_ual(regs->ARM_r2, stack + 8); /* envp */
280 get_user_ual(regs->ARM_r1, stack + 4); /* envp */
bellarda1516e92003-07-09 17:13:37 +0000281 /* XXX: it seems that r0 is zeroed after ! */
pbrooke5fe0c52006-06-11 13:32:59 +0000282 regs->ARM_r0 = 0;
283 /* For uClinux PIC binaries. */
j_mayer863cf0b2007-10-07 15:59:45 +0000284 /* XXX: Linux does this only on ARM with no MMU (do we care ?) */
pbrooke5fe0c52006-06-11 13:32:59 +0000285 regs->ARM_r10 = infop->start_data;
bellardb346ff42003-06-15 20:05:50 +0000286}
287
Mika Westerbergedf8e2a2009-04-07 09:57:11 +0300288#define ELF_NREG 18
Anthony Liguoric227f092009-10-01 16:12:16 -0500289typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
Mika Westerbergedf8e2a2009-04-07 09:57:11 +0300290
Andreas Färber05390242012-02-25 03:37:53 +0100291static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUARMState *env)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +0300292{
Nathan Froydd049e622009-12-11 09:04:47 -0800293 (*regs)[0] = tswapl(env->regs[0]);
294 (*regs)[1] = tswapl(env->regs[1]);
295 (*regs)[2] = tswapl(env->regs[2]);
296 (*regs)[3] = tswapl(env->regs[3]);
297 (*regs)[4] = tswapl(env->regs[4]);
298 (*regs)[5] = tswapl(env->regs[5]);
299 (*regs)[6] = tswapl(env->regs[6]);
300 (*regs)[7] = tswapl(env->regs[7]);
301 (*regs)[8] = tswapl(env->regs[8]);
302 (*regs)[9] = tswapl(env->regs[9]);
303 (*regs)[10] = tswapl(env->regs[10]);
304 (*regs)[11] = tswapl(env->regs[11]);
305 (*regs)[12] = tswapl(env->regs[12]);
306 (*regs)[13] = tswapl(env->regs[13]);
307 (*regs)[14] = tswapl(env->regs[14]);
308 (*regs)[15] = tswapl(env->regs[15]);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +0300309
Andreas Färber05390242012-02-25 03:37:53 +0100310 (*regs)[16] = tswapl(cpsr_read((CPUARMState *)env));
Nathan Froydd049e622009-12-11 09:04:47 -0800311 (*regs)[17] = tswapl(env->regs[0]); /* XXX */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +0300312}
313
bellard30ac07d2003-04-07 21:33:03 +0000314#define USE_ELF_CORE_DUMP
Richard Hendersond97ef722010-07-27 10:25:29 -0700315#define ELF_EXEC_PAGESIZE 4096
bellard30ac07d2003-04-07 21:33:03 +0000316
bellardafce2922005-10-30 20:58:30 +0000317enum
318{
Richard Hendersond97ef722010-07-27 10:25:29 -0700319 ARM_HWCAP_ARM_SWP = 1 << 0,
320 ARM_HWCAP_ARM_HALF = 1 << 1,
321 ARM_HWCAP_ARM_THUMB = 1 << 2,
322 ARM_HWCAP_ARM_26BIT = 1 << 3,
323 ARM_HWCAP_ARM_FAST_MULT = 1 << 4,
324 ARM_HWCAP_ARM_FPA = 1 << 5,
325 ARM_HWCAP_ARM_VFP = 1 << 6,
326 ARM_HWCAP_ARM_EDSP = 1 << 7,
327 ARM_HWCAP_ARM_JAVA = 1 << 8,
328 ARM_HWCAP_ARM_IWMMXT = 1 << 9,
329 ARM_HWCAP_ARM_THUMBEE = 1 << 10,
330 ARM_HWCAP_ARM_NEON = 1 << 11,
331 ARM_HWCAP_ARM_VFPv3 = 1 << 12,
332 ARM_HWCAP_ARM_VFPv3D16 = 1 << 13,
bellardafce2922005-10-30 20:58:30 +0000333};
334
Dr. David Alan Gilbert97cc7562011-08-31 17:24:34 +0100335#define TARGET_HAS_GUEST_VALIDATE_BASE
336/* We want the opportunity to check the suggested base */
337bool guest_validate_base(unsigned long guest_base)
338{
339 unsigned long real_start, test_page_addr;
340
341 /* We need to check that we can force a fault on access to the
342 * commpage at 0xffff0fxx
343 */
344 test_page_addr = guest_base + (0xffff0f00 & qemu_host_page_mask);
345 /* Note it needs to be writeable to let us initialise it */
346 real_start = (unsigned long)
347 mmap((void *)test_page_addr, qemu_host_page_size,
348 PROT_READ | PROT_WRITE,
349 MAP_ANONYMOUS | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
350
351 /* If we can't map it then try another address */
352 if (real_start == -1ul) {
353 return 0;
354 }
355
356 if (real_start != test_page_addr) {
357 /* OS didn't put the page where we asked - unmap and reject */
358 munmap((void *)real_start, qemu_host_page_size);
359 return 0;
360 }
361
362 /* Leave the page mapped
363 * Populate it (mmap should have left it all 0'd)
364 */
365
366 /* Kernel helper versions */
367 __put_user(5, (uint32_t *)g2h(0xffff0ffcul));
368
369 /* Now it's populated make it RO */
370 if (mprotect((void *)test_page_addr, qemu_host_page_size, PROT_READ)) {
371 perror("Protecting guest commpage");
372 exit(-1);
373 }
374
375 return 1; /* All good */
376}
377
Benoit Canetadf050b2011-11-09 03:37:23 +0000378
379#define ELF_HWCAP get_elf_hwcap()
380
381static uint32_t get_elf_hwcap(void)
382{
383 CPUARMState *e = thread_env;
384 uint32_t hwcaps = 0;
385
386 hwcaps |= ARM_HWCAP_ARM_SWP;
387 hwcaps |= ARM_HWCAP_ARM_HALF;
388 hwcaps |= ARM_HWCAP_ARM_THUMB;
389 hwcaps |= ARM_HWCAP_ARM_FAST_MULT;
390 hwcaps |= ARM_HWCAP_ARM_FPA;
391
392 /* probe for the extra features */
393#define GET_FEATURE(feat, hwcap) \
394 do {if (arm_feature(e, feat)) { hwcaps |= hwcap; } } while (0)
395 GET_FEATURE(ARM_FEATURE_VFP, ARM_HWCAP_ARM_VFP);
396 GET_FEATURE(ARM_FEATURE_IWMMXT, ARM_HWCAP_ARM_IWMMXT);
397 GET_FEATURE(ARM_FEATURE_THUMB2EE, ARM_HWCAP_ARM_THUMBEE);
398 GET_FEATURE(ARM_FEATURE_NEON, ARM_HWCAP_ARM_NEON);
399 GET_FEATURE(ARM_FEATURE_VFP3, ARM_HWCAP_ARM_VFPv3);
400 GET_FEATURE(ARM_FEATURE_VFP_FP16, ARM_HWCAP_ARM_VFPv3D16);
401#undef GET_FEATURE
402
403 return hwcaps;
404}
bellardafce2922005-10-30 20:58:30 +0000405
bellard30ac07d2003-04-07 21:33:03 +0000406#endif
407
Guan Xuetaod2fbca92011-04-12 16:27:03 +0800408#ifdef TARGET_UNICORE32
409
410#define ELF_START_MMAP 0x80000000
411
412#define elf_check_arch(x) ((x) == EM_UNICORE32)
413
414#define ELF_CLASS ELFCLASS32
415#define ELF_DATA ELFDATA2LSB
416#define ELF_ARCH EM_UNICORE32
417
418static inline void init_thread(struct target_pt_regs *regs,
419 struct image_info *infop)
420{
421 abi_long stack = infop->start_stack;
422 memset(regs, 0, sizeof(*regs));
423 regs->UC32_REG_asr = 0x10;
424 regs->UC32_REG_pc = infop->entry & 0xfffffffe;
425 regs->UC32_REG_sp = infop->start_stack;
426 /* FIXME - what to for failure of get_user()? */
427 get_user_ual(regs->UC32_REG_02, stack + 8); /* envp */
428 get_user_ual(regs->UC32_REG_01, stack + 4); /* envp */
429 /* XXX: it seems that r0 is zeroed after ! */
430 regs->UC32_REG_00 = 0;
431}
432
433#define ELF_NREG 34
434typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
435
Andreas Färber05390242012-02-25 03:37:53 +0100436static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUUniCore32State *env)
Guan Xuetaod2fbca92011-04-12 16:27:03 +0800437{
438 (*regs)[0] = env->regs[0];
439 (*regs)[1] = env->regs[1];
440 (*regs)[2] = env->regs[2];
441 (*regs)[3] = env->regs[3];
442 (*regs)[4] = env->regs[4];
443 (*regs)[5] = env->regs[5];
444 (*regs)[6] = env->regs[6];
445 (*regs)[7] = env->regs[7];
446 (*regs)[8] = env->regs[8];
447 (*regs)[9] = env->regs[9];
448 (*regs)[10] = env->regs[10];
449 (*regs)[11] = env->regs[11];
450 (*regs)[12] = env->regs[12];
451 (*regs)[13] = env->regs[13];
452 (*regs)[14] = env->regs[14];
453 (*regs)[15] = env->regs[15];
454 (*regs)[16] = env->regs[16];
455 (*regs)[17] = env->regs[17];
456 (*regs)[18] = env->regs[18];
457 (*regs)[19] = env->regs[19];
458 (*regs)[20] = env->regs[20];
459 (*regs)[21] = env->regs[21];
460 (*regs)[22] = env->regs[22];
461 (*regs)[23] = env->regs[23];
462 (*regs)[24] = env->regs[24];
463 (*regs)[25] = env->regs[25];
464 (*regs)[26] = env->regs[26];
465 (*regs)[27] = env->regs[27];
466 (*regs)[28] = env->regs[28];
467 (*regs)[29] = env->regs[29];
468 (*regs)[30] = env->regs[30];
469 (*regs)[31] = env->regs[31];
470
Andreas Färber05390242012-02-25 03:37:53 +0100471 (*regs)[32] = cpu_asr_read((CPUUniCore32State *)env);
Guan Xuetaod2fbca92011-04-12 16:27:03 +0800472 (*regs)[33] = env->regs[0]; /* XXX */
473}
474
475#define USE_ELF_CORE_DUMP
476#define ELF_EXEC_PAGESIZE 4096
477
478#define ELF_HWCAP (UC32_HWCAP_CMOV | UC32_HWCAP_UCF64)
479
480#endif
481
bellard853d6f72003-09-30 20:58:32 +0000482#ifdef TARGET_SPARC
bellarda315a142005-01-30 22:59:18 +0000483#ifdef TARGET_SPARC64
bellard853d6f72003-09-30 20:58:32 +0000484
485#define ELF_START_MMAP 0x80000000
Artyom Tarasenkocf973e42011-07-14 19:37:06 +0200486#define ELF_HWCAP (HWCAP_SPARC_FLUSH | HWCAP_SPARC_STBAR | HWCAP_SPARC_SWAP \
487 | HWCAP_SPARC_MULDIV | HWCAP_SPARC_V9)
blueswir1992f48a2007-10-14 16:27:31 +0000488#ifndef TARGET_ABI32
blueswir1cb33da52007-10-09 16:34:29 +0000489#define elf_check_arch(x) ( (x) == EM_SPARCV9 || (x) == EM_SPARC32PLUS )
blueswir1992f48a2007-10-14 16:27:31 +0000490#else
491#define elf_check_arch(x) ( (x) == EM_SPARC32PLUS || (x) == EM_SPARC )
492#endif
bellard853d6f72003-09-30 20:58:32 +0000493
bellarda315a142005-01-30 22:59:18 +0000494#define ELF_CLASS ELFCLASS64
bellard5ef54112006-07-18 21:14:09 +0000495#define ELF_ARCH EM_SPARCV9
496
Richard Hendersond97ef722010-07-27 10:25:29 -0700497#define STACK_BIAS 2047
bellarda315a142005-01-30 22:59:18 +0000498
Richard Hendersond97ef722010-07-27 10:25:29 -0700499static inline void init_thread(struct target_pt_regs *regs,
500 struct image_info *infop)
bellarda315a142005-01-30 22:59:18 +0000501{
blueswir1992f48a2007-10-14 16:27:31 +0000502#ifndef TARGET_ABI32
bellarda315a142005-01-30 22:59:18 +0000503 regs->tstate = 0;
blueswir1992f48a2007-10-14 16:27:31 +0000504#endif
bellarda315a142005-01-30 22:59:18 +0000505 regs->pc = infop->entry;
506 regs->npc = regs->pc + 4;
507 regs->y = 0;
blueswir1992f48a2007-10-14 16:27:31 +0000508#ifdef TARGET_ABI32
509 regs->u_regs[14] = infop->start_stack - 16 * 4;
510#else
blueswir1cb33da52007-10-09 16:34:29 +0000511 if (personality(infop->personality) == PER_LINUX32)
512 regs->u_regs[14] = infop->start_stack - 16 * 4;
513 else
514 regs->u_regs[14] = infop->start_stack - 16 * 8 - STACK_BIAS;
blueswir1992f48a2007-10-14 16:27:31 +0000515#endif
bellarda315a142005-01-30 22:59:18 +0000516}
517
518#else
519#define ELF_START_MMAP 0x80000000
Artyom Tarasenkocf973e42011-07-14 19:37:06 +0200520#define ELF_HWCAP (HWCAP_SPARC_FLUSH | HWCAP_SPARC_STBAR | HWCAP_SPARC_SWAP \
521 | HWCAP_SPARC_MULDIV)
bellarda315a142005-01-30 22:59:18 +0000522#define elf_check_arch(x) ( (x) == EM_SPARC )
523
bellard853d6f72003-09-30 20:58:32 +0000524#define ELF_CLASS ELFCLASS32
bellard853d6f72003-09-30 20:58:32 +0000525#define ELF_ARCH EM_SPARC
526
Richard Hendersond97ef722010-07-27 10:25:29 -0700527static inline void init_thread(struct target_pt_regs *regs,
528 struct image_info *infop)
bellard853d6f72003-09-30 20:58:32 +0000529{
bellardf5155282004-01-04 15:46:50 +0000530 regs->psr = 0;
531 regs->pc = infop->entry;
532 regs->npc = regs->pc + 4;
533 regs->y = 0;
534 regs->u_regs[14] = infop->start_stack - 16 * 4;
bellard853d6f72003-09-30 20:58:32 +0000535}
536
537#endif
bellarda315a142005-01-30 22:59:18 +0000538#endif
bellard853d6f72003-09-30 20:58:32 +0000539
bellard67867302003-11-23 17:05:30 +0000540#ifdef TARGET_PPC
541
542#define ELF_START_MMAP 0x80000000
543
j_mayere85e7c62007-10-18 19:59:49 +0000544#if defined(TARGET_PPC64) && !defined(TARGET_ABI32)
j_mayer84409dd2007-04-06 08:56:50 +0000545
546#define elf_check_arch(x) ( (x) == EM_PPC64 )
547
Richard Hendersond97ef722010-07-27 10:25:29 -0700548#define ELF_CLASS ELFCLASS64
j_mayer84409dd2007-04-06 08:56:50 +0000549
550#else
551
bellard67867302003-11-23 17:05:30 +0000552#define elf_check_arch(x) ( (x) == EM_PPC )
553
Richard Hendersond97ef722010-07-27 10:25:29 -0700554#define ELF_CLASS ELFCLASS32
j_mayer84409dd2007-04-06 08:56:50 +0000555
556#endif
557
Richard Hendersond97ef722010-07-27 10:25:29 -0700558#define ELF_ARCH EM_PPC
bellard67867302003-11-23 17:05:30 +0000559
Nathan Froyddf84e4f2009-05-12 12:26:59 -0700560/* Feature masks for the Aux Vector Hardware Capabilities (AT_HWCAP).
561 See arch/powerpc/include/asm/cputable.h. */
562enum {
malc3efa9a62009-07-18 13:10:12 +0400563 QEMU_PPC_FEATURE_32 = 0x80000000,
564 QEMU_PPC_FEATURE_64 = 0x40000000,
565 QEMU_PPC_FEATURE_601_INSTR = 0x20000000,
566 QEMU_PPC_FEATURE_HAS_ALTIVEC = 0x10000000,
567 QEMU_PPC_FEATURE_HAS_FPU = 0x08000000,
568 QEMU_PPC_FEATURE_HAS_MMU = 0x04000000,
569 QEMU_PPC_FEATURE_HAS_4xxMAC = 0x02000000,
570 QEMU_PPC_FEATURE_UNIFIED_CACHE = 0x01000000,
571 QEMU_PPC_FEATURE_HAS_SPE = 0x00800000,
572 QEMU_PPC_FEATURE_HAS_EFP_SINGLE = 0x00400000,
573 QEMU_PPC_FEATURE_HAS_EFP_DOUBLE = 0x00200000,
574 QEMU_PPC_FEATURE_NO_TB = 0x00100000,
575 QEMU_PPC_FEATURE_POWER4 = 0x00080000,
576 QEMU_PPC_FEATURE_POWER5 = 0x00040000,
577 QEMU_PPC_FEATURE_POWER5_PLUS = 0x00020000,
578 QEMU_PPC_FEATURE_CELL = 0x00010000,
579 QEMU_PPC_FEATURE_BOOKE = 0x00008000,
580 QEMU_PPC_FEATURE_SMT = 0x00004000,
581 QEMU_PPC_FEATURE_ICACHE_SNOOP = 0x00002000,
582 QEMU_PPC_FEATURE_ARCH_2_05 = 0x00001000,
583 QEMU_PPC_FEATURE_PA6T = 0x00000800,
584 QEMU_PPC_FEATURE_HAS_DFP = 0x00000400,
585 QEMU_PPC_FEATURE_POWER6_EXT = 0x00000200,
586 QEMU_PPC_FEATURE_ARCH_2_06 = 0x00000100,
587 QEMU_PPC_FEATURE_HAS_VSX = 0x00000080,
588 QEMU_PPC_FEATURE_PSERIES_PERFMON_COMPAT = 0x00000040,
Nathan Froyddf84e4f2009-05-12 12:26:59 -0700589
malc3efa9a62009-07-18 13:10:12 +0400590 QEMU_PPC_FEATURE_TRUE_LE = 0x00000002,
591 QEMU_PPC_FEATURE_PPC_LE = 0x00000001,
Nathan Froyddf84e4f2009-05-12 12:26:59 -0700592};
593
594#define ELF_HWCAP get_elf_hwcap()
595
596static uint32_t get_elf_hwcap(void)
597{
Andreas Färber05390242012-02-25 03:37:53 +0100598 CPUPPCState *e = thread_env;
Nathan Froyddf84e4f2009-05-12 12:26:59 -0700599 uint32_t features = 0;
600
601 /* We don't have to be terribly complete here; the high points are
602 Altivec/FP/SPE support. Anything else is just a bonus. */
Richard Hendersond97ef722010-07-27 10:25:29 -0700603#define GET_FEATURE(flag, feature) \
Nathan Froyddf84e4f2009-05-12 12:26:59 -0700604 do {if (e->insns_flags & flag) features |= feature; } while(0)
malc3efa9a62009-07-18 13:10:12 +0400605 GET_FEATURE(PPC_64B, QEMU_PPC_FEATURE_64);
606 GET_FEATURE(PPC_FLOAT, QEMU_PPC_FEATURE_HAS_FPU);
607 GET_FEATURE(PPC_ALTIVEC, QEMU_PPC_FEATURE_HAS_ALTIVEC);
608 GET_FEATURE(PPC_SPE, QEMU_PPC_FEATURE_HAS_SPE);
609 GET_FEATURE(PPC_SPE_SINGLE, QEMU_PPC_FEATURE_HAS_EFP_SINGLE);
610 GET_FEATURE(PPC_SPE_DOUBLE, QEMU_PPC_FEATURE_HAS_EFP_DOUBLE);
611 GET_FEATURE(PPC_BOOKE, QEMU_PPC_FEATURE_BOOKE);
612 GET_FEATURE(PPC_405_MAC, QEMU_PPC_FEATURE_HAS_4xxMAC);
Nathan Froyddf84e4f2009-05-12 12:26:59 -0700613#undef GET_FEATURE
614
615 return features;
616}
617
bellardf5155282004-01-04 15:46:50 +0000618/*
bellardf5155282004-01-04 15:46:50 +0000619 * The requirements here are:
620 * - keep the final alignment of sp (sp & 0xf)
621 * - make sure the 32-bit value at the first 16 byte aligned position of
622 * AUXV is greater than 16 for glibc compatibility.
623 * AT_IGNOREPPC is used for that.
624 * - for compatibility with glibc ARCH_DLINFO must always be defined on PPC,
625 * even if DLINFO_ARCH_ITEMS goes to zero or is undefined.
626 */
bellard0bccf032005-08-21 10:12:28 +0000627#define DLINFO_ARCH_ITEMS 5
Richard Hendersond97ef722010-07-27 10:25:29 -0700628#define ARCH_DLINFO \
629 do { \
630 NEW_AUX_ENT(AT_DCACHEBSIZE, 0x20); \
631 NEW_AUX_ENT(AT_ICACHEBSIZE, 0x20); \
632 NEW_AUX_ENT(AT_UCACHEBSIZE, 0); \
633 /* \
634 * Now handle glibc compatibility. \
635 */ \
636 NEW_AUX_ENT(AT_IGNOREPPC, AT_IGNOREPPC); \
637 NEW_AUX_ENT(AT_IGNOREPPC, AT_IGNOREPPC); \
638 } while (0)
bellardf5155282004-01-04 15:46:50 +0000639
bellard67867302003-11-23 17:05:30 +0000640static inline void init_thread(struct target_pt_regs *_regs, struct image_info *infop)
641{
bellard67867302003-11-23 17:05:30 +0000642 _regs->gpr[1] = infop->start_stack;
j_mayere85e7c62007-10-18 19:59:49 +0000643#if defined(TARGET_PPC64) && !defined(TARGET_ABI32)
Richard Henderson8e780642011-10-26 09:59:17 -0700644 _regs->gpr[2] = ldq_raw(infop->entry + 8) + infop->load_bias;
645 infop->entry = ldq_raw(infop->entry) + infop->load_bias;
j_mayer84409dd2007-04-06 08:56:50 +0000646#endif
bellard67867302003-11-23 17:05:30 +0000647 _regs->nip = infop->entry;
648}
649
Nathan Froyde2f3e742009-12-11 09:04:48 -0800650/* See linux kernel: arch/powerpc/include/asm/elf.h. */
651#define ELF_NREG 48
652typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
653
Andreas Färber05390242012-02-25 03:37:53 +0100654static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUPPCState *env)
Nathan Froyde2f3e742009-12-11 09:04:48 -0800655{
656 int i;
657 target_ulong ccr = 0;
658
659 for (i = 0; i < ARRAY_SIZE(env->gpr); i++) {
660 (*regs)[i] = tswapl(env->gpr[i]);
661 }
662
663 (*regs)[32] = tswapl(env->nip);
664 (*regs)[33] = tswapl(env->msr);
665 (*regs)[35] = tswapl(env->ctr);
666 (*regs)[36] = tswapl(env->lr);
667 (*regs)[37] = tswapl(env->xer);
668
669 for (i = 0; i < ARRAY_SIZE(env->crf); i++) {
670 ccr |= env->crf[i] << (32 - ((i + 1) * 4));
671 }
672 (*regs)[38] = tswapl(ccr);
673}
674
675#define USE_ELF_CORE_DUMP
Richard Hendersond97ef722010-07-27 10:25:29 -0700676#define ELF_EXEC_PAGESIZE 4096
bellard67867302003-11-23 17:05:30 +0000677
678#endif
679
bellard048f6b42005-11-26 18:47:20 +0000680#ifdef TARGET_MIPS
681
682#define ELF_START_MMAP 0x80000000
683
684#define elf_check_arch(x) ( (x) == EM_MIPS )
685
ths388bb212007-05-13 13:58:00 +0000686#ifdef TARGET_MIPS64
687#define ELF_CLASS ELFCLASS64
688#else
bellard048f6b42005-11-26 18:47:20 +0000689#define ELF_CLASS ELFCLASS32
ths388bb212007-05-13 13:58:00 +0000690#endif
bellard048f6b42005-11-26 18:47:20 +0000691#define ELF_ARCH EM_MIPS
692
Richard Hendersond97ef722010-07-27 10:25:29 -0700693static inline void init_thread(struct target_pt_regs *regs,
694 struct image_info *infop)
bellard048f6b42005-11-26 18:47:20 +0000695{
ths623a9302007-10-28 19:45:05 +0000696 regs->cp0_status = 2 << CP0St_KSU;
bellard048f6b42005-11-26 18:47:20 +0000697 regs->cp0_epc = infop->entry;
698 regs->regs[29] = infop->start_stack;
699}
700
Nathan Froyd51e52602009-12-11 09:04:49 -0800701/* See linux kernel: arch/mips/include/asm/elf.h. */
702#define ELF_NREG 45
703typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
704
705/* See linux kernel: arch/mips/include/asm/reg.h. */
706enum {
707#ifdef TARGET_MIPS64
708 TARGET_EF_R0 = 0,
709#else
710 TARGET_EF_R0 = 6,
711#endif
712 TARGET_EF_R26 = TARGET_EF_R0 + 26,
713 TARGET_EF_R27 = TARGET_EF_R0 + 27,
714 TARGET_EF_LO = TARGET_EF_R0 + 32,
715 TARGET_EF_HI = TARGET_EF_R0 + 33,
716 TARGET_EF_CP0_EPC = TARGET_EF_R0 + 34,
717 TARGET_EF_CP0_BADVADDR = TARGET_EF_R0 + 35,
718 TARGET_EF_CP0_STATUS = TARGET_EF_R0 + 36,
719 TARGET_EF_CP0_CAUSE = TARGET_EF_R0 + 37
720};
721
722/* See linux kernel: arch/mips/kernel/process.c:elf_dump_regs. */
Andreas Färber05390242012-02-25 03:37:53 +0100723static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUMIPSState *env)
Nathan Froyd51e52602009-12-11 09:04:49 -0800724{
725 int i;
726
727 for (i = 0; i < TARGET_EF_R0; i++) {
728 (*regs)[i] = 0;
729 }
730 (*regs)[TARGET_EF_R0] = 0;
731
732 for (i = 1; i < ARRAY_SIZE(env->active_tc.gpr); i++) {
733 (*regs)[TARGET_EF_R0 + i] = tswapl(env->active_tc.gpr[i]);
734 }
735
736 (*regs)[TARGET_EF_R26] = 0;
737 (*regs)[TARGET_EF_R27] = 0;
738 (*regs)[TARGET_EF_LO] = tswapl(env->active_tc.LO[0]);
739 (*regs)[TARGET_EF_HI] = tswapl(env->active_tc.HI[0]);
740 (*regs)[TARGET_EF_CP0_EPC] = tswapl(env->active_tc.PC);
741 (*regs)[TARGET_EF_CP0_BADVADDR] = tswapl(env->CP0_BadVAddr);
742 (*regs)[TARGET_EF_CP0_STATUS] = tswapl(env->CP0_Status);
743 (*regs)[TARGET_EF_CP0_CAUSE] = tswapl(env->CP0_Cause);
744}
745
746#define USE_ELF_CORE_DUMP
ths388bb212007-05-13 13:58:00 +0000747#define ELF_EXEC_PAGESIZE 4096
748
bellard048f6b42005-11-26 18:47:20 +0000749#endif /* TARGET_MIPS */
750
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +0200751#ifdef TARGET_MICROBLAZE
752
753#define ELF_START_MMAP 0x80000000
754
Edgar E. Iglesias0d5d4692010-05-19 15:24:17 +0200755#define elf_check_arch(x) ( (x) == EM_MICROBLAZE || (x) == EM_MICROBLAZE_OLD)
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +0200756
757#define ELF_CLASS ELFCLASS32
Edgar E. Iglesias0d5d4692010-05-19 15:24:17 +0200758#define ELF_ARCH EM_MICROBLAZE
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +0200759
Richard Hendersond97ef722010-07-27 10:25:29 -0700760static inline void init_thread(struct target_pt_regs *regs,
761 struct image_info *infop)
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +0200762{
763 regs->pc = infop->entry;
764 regs->r1 = infop->start_stack;
765
766}
767
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +0200768#define ELF_EXEC_PAGESIZE 4096
769
Edgar E. Iglesiase4cbd442010-05-19 15:09:28 +0200770#define USE_ELF_CORE_DUMP
771#define ELF_NREG 38
772typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
773
774/* See linux kernel: arch/mips/kernel/process.c:elf_dump_regs. */
Andreas Färber05390242012-02-25 03:37:53 +0100775static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUMBState *env)
Edgar E. Iglesiase4cbd442010-05-19 15:09:28 +0200776{
777 int i, pos = 0;
778
779 for (i = 0; i < 32; i++) {
780 (*regs)[pos++] = tswapl(env->regs[i]);
781 }
782
783 for (i = 0; i < 6; i++) {
784 (*regs)[pos++] = tswapl(env->sregs[i]);
785 }
786}
787
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +0200788#endif /* TARGET_MICROBLAZE */
789
bellardfdf9b3e2006-04-27 21:07:38 +0000790#ifdef TARGET_SH4
791
792#define ELF_START_MMAP 0x80000000
793
794#define elf_check_arch(x) ( (x) == EM_SH )
795
796#define ELF_CLASS ELFCLASS32
bellardfdf9b3e2006-04-27 21:07:38 +0000797#define ELF_ARCH EM_SH
798
Richard Hendersond97ef722010-07-27 10:25:29 -0700799static inline void init_thread(struct target_pt_regs *regs,
800 struct image_info *infop)
bellardfdf9b3e2006-04-27 21:07:38 +0000801{
Richard Hendersond97ef722010-07-27 10:25:29 -0700802 /* Check other registers XXXXX */
803 regs->pc = infop->entry;
804 regs->regs[15] = infop->start_stack;
bellardfdf9b3e2006-04-27 21:07:38 +0000805}
806
Nathan Froyd7631c972009-12-11 09:04:51 -0800807/* See linux kernel: arch/sh/include/asm/elf.h. */
808#define ELF_NREG 23
809typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
810
811/* See linux kernel: arch/sh/include/asm/ptrace.h. */
812enum {
813 TARGET_REG_PC = 16,
814 TARGET_REG_PR = 17,
815 TARGET_REG_SR = 18,
816 TARGET_REG_GBR = 19,
817 TARGET_REG_MACH = 20,
818 TARGET_REG_MACL = 21,
819 TARGET_REG_SYSCALL = 22
820};
821
Richard Hendersond97ef722010-07-27 10:25:29 -0700822static inline void elf_core_copy_regs(target_elf_gregset_t *regs,
Andreas Färber05390242012-02-25 03:37:53 +0100823 const CPUSH4State *env)
Nathan Froyd7631c972009-12-11 09:04:51 -0800824{
825 int i;
826
827 for (i = 0; i < 16; i++) {
828 (*regs[i]) = tswapl(env->gregs[i]);
829 }
830
831 (*regs)[TARGET_REG_PC] = tswapl(env->pc);
832 (*regs)[TARGET_REG_PR] = tswapl(env->pr);
833 (*regs)[TARGET_REG_SR] = tswapl(env->sr);
834 (*regs)[TARGET_REG_GBR] = tswapl(env->gbr);
835 (*regs)[TARGET_REG_MACH] = tswapl(env->mach);
836 (*regs)[TARGET_REG_MACL] = tswapl(env->macl);
837 (*regs)[TARGET_REG_SYSCALL] = 0; /* FIXME */
838}
839
840#define USE_ELF_CORE_DUMP
bellardfdf9b3e2006-04-27 21:07:38 +0000841#define ELF_EXEC_PAGESIZE 4096
842
843#endif
844
ths48733d12007-10-08 13:36:46 +0000845#ifdef TARGET_CRIS
846
847#define ELF_START_MMAP 0x80000000
848
849#define elf_check_arch(x) ( (x) == EM_CRIS )
850
851#define ELF_CLASS ELFCLASS32
ths48733d12007-10-08 13:36:46 +0000852#define ELF_ARCH EM_CRIS
853
Richard Hendersond97ef722010-07-27 10:25:29 -0700854static inline void init_thread(struct target_pt_regs *regs,
855 struct image_info *infop)
ths48733d12007-10-08 13:36:46 +0000856{
Richard Hendersond97ef722010-07-27 10:25:29 -0700857 regs->erp = infop->entry;
ths48733d12007-10-08 13:36:46 +0000858}
859
ths48733d12007-10-08 13:36:46 +0000860#define ELF_EXEC_PAGESIZE 8192
861
862#endif
863
pbrooke6e59062006-10-22 00:18:54 +0000864#ifdef TARGET_M68K
865
866#define ELF_START_MMAP 0x80000000
867
868#define elf_check_arch(x) ( (x) == EM_68K )
869
Richard Hendersond97ef722010-07-27 10:25:29 -0700870#define ELF_CLASS ELFCLASS32
Richard Hendersond97ef722010-07-27 10:25:29 -0700871#define ELF_ARCH EM_68K
pbrooke6e59062006-10-22 00:18:54 +0000872
873/* ??? Does this need to do anything?
Richard Hendersond97ef722010-07-27 10:25:29 -0700874 #define ELF_PLAT_INIT(_r) */
pbrooke6e59062006-10-22 00:18:54 +0000875
Richard Hendersond97ef722010-07-27 10:25:29 -0700876static inline void init_thread(struct target_pt_regs *regs,
877 struct image_info *infop)
pbrooke6e59062006-10-22 00:18:54 +0000878{
879 regs->usp = infop->start_stack;
880 regs->sr = 0;
881 regs->pc = infop->entry;
882}
883
Nathan Froyd7a93cc52009-12-11 09:04:50 -0800884/* See linux kernel: arch/m68k/include/asm/elf.h. */
885#define ELF_NREG 20
886typedef target_elf_greg_t target_elf_gregset_t[ELF_NREG];
887
Andreas Färber05390242012-02-25 03:37:53 +0100888static void elf_core_copy_regs(target_elf_gregset_t *regs, const CPUM68KState *env)
Nathan Froyd7a93cc52009-12-11 09:04:50 -0800889{
890 (*regs)[0] = tswapl(env->dregs[1]);
891 (*regs)[1] = tswapl(env->dregs[2]);
892 (*regs)[2] = tswapl(env->dregs[3]);
893 (*regs)[3] = tswapl(env->dregs[4]);
894 (*regs)[4] = tswapl(env->dregs[5]);
895 (*regs)[5] = tswapl(env->dregs[6]);
896 (*regs)[6] = tswapl(env->dregs[7]);
897 (*regs)[7] = tswapl(env->aregs[0]);
898 (*regs)[8] = tswapl(env->aregs[1]);
899 (*regs)[9] = tswapl(env->aregs[2]);
900 (*regs)[10] = tswapl(env->aregs[3]);
901 (*regs)[11] = tswapl(env->aregs[4]);
902 (*regs)[12] = tswapl(env->aregs[5]);
903 (*regs)[13] = tswapl(env->aregs[6]);
904 (*regs)[14] = tswapl(env->dregs[0]);
905 (*regs)[15] = tswapl(env->aregs[7]);
906 (*regs)[16] = tswapl(env->dregs[0]); /* FIXME: orig_d0 */
907 (*regs)[17] = tswapl(env->sr);
908 (*regs)[18] = tswapl(env->pc);
909 (*regs)[19] = 0; /* FIXME: regs->format | regs->vector */
910}
911
912#define USE_ELF_CORE_DUMP
Richard Hendersond97ef722010-07-27 10:25:29 -0700913#define ELF_EXEC_PAGESIZE 8192
pbrooke6e59062006-10-22 00:18:54 +0000914
915#endif
916
j_mayer7a3148a2007-04-05 07:13:51 +0000917#ifdef TARGET_ALPHA
918
919#define ELF_START_MMAP (0x30000000000ULL)
920
921#define elf_check_arch(x) ( (x) == ELF_ARCH )
922
923#define ELF_CLASS ELFCLASS64
j_mayer7a3148a2007-04-05 07:13:51 +0000924#define ELF_ARCH EM_ALPHA
925
Richard Hendersond97ef722010-07-27 10:25:29 -0700926static inline void init_thread(struct target_pt_regs *regs,
927 struct image_info *infop)
j_mayer7a3148a2007-04-05 07:13:51 +0000928{
929 regs->pc = infop->entry;
930 regs->ps = 8;
931 regs->usp = infop->start_stack;
j_mayer7a3148a2007-04-05 07:13:51 +0000932}
933
j_mayer7a3148a2007-04-05 07:13:51 +0000934#define ELF_EXEC_PAGESIZE 8192
935
936#endif /* TARGET_ALPHA */
937
Ulrich Hechta4c075f2009-07-24 16:57:31 +0200938#ifdef TARGET_S390X
939
940#define ELF_START_MMAP (0x20000000000ULL)
941
942#define elf_check_arch(x) ( (x) == ELF_ARCH )
943
944#define ELF_CLASS ELFCLASS64
945#define ELF_DATA ELFDATA2MSB
946#define ELF_ARCH EM_S390
947
948static inline void init_thread(struct target_pt_regs *regs, struct image_info *infop)
949{
950 regs->psw.addr = infop->entry;
951 regs->psw.mask = PSW_MASK_64 | PSW_MASK_32;
952 regs->gprs[15] = infop->start_stack;
953}
954
955#endif /* TARGET_S390X */
956
bellard15338fd2005-11-26 11:41:16 +0000957#ifndef ELF_PLATFORM
958#define ELF_PLATFORM (NULL)
959#endif
960
961#ifndef ELF_HWCAP
962#define ELF_HWCAP 0
963#endif
964
blueswir1992f48a2007-10-14 16:27:31 +0000965#ifdef TARGET_ABI32
blueswir1cb33da52007-10-09 16:34:29 +0000966#undef ELF_CLASS
blueswir1992f48a2007-10-14 16:27:31 +0000967#define ELF_CLASS ELFCLASS32
blueswir1cb33da52007-10-09 16:34:29 +0000968#undef bswaptls
969#define bswaptls(ptr) bswap32s(ptr)
970#endif
971
bellard31e31b82003-02-18 22:55:36 +0000972#include "elf.h"
bellard09bfb052003-04-10 00:03:40 +0000973
bellard09bfb052003-04-10 00:03:40 +0000974struct exec
975{
Richard Hendersond97ef722010-07-27 10:25:29 -0700976 unsigned int a_info; /* Use macros N_MAGIC, etc for access */
977 unsigned int a_text; /* length of text, in bytes */
978 unsigned int a_data; /* length of data, in bytes */
979 unsigned int a_bss; /* length of uninitialized data area, in bytes */
980 unsigned int a_syms; /* length of symbol table data in file, in bytes */
981 unsigned int a_entry; /* start address */
982 unsigned int a_trsize; /* length of relocation info for text, in bytes */
983 unsigned int a_drsize; /* length of relocation info for data, in bytes */
bellard09bfb052003-04-10 00:03:40 +0000984};
985
986
987#define N_MAGIC(exec) ((exec).a_info & 0xffff)
988#define OMAGIC 0407
989#define NMAGIC 0410
990#define ZMAGIC 0413
991#define QMAGIC 0314
992
bellard31e31b82003-02-18 22:55:36 +0000993/* Necessary parameters */
bellard54936002003-05-13 00:25:15 +0000994#define TARGET_ELF_EXEC_PAGESIZE TARGET_PAGE_SIZE
995#define TARGET_ELF_PAGESTART(_v) ((_v) & ~(unsigned long)(TARGET_ELF_EXEC_PAGESIZE-1))
996#define TARGET_ELF_PAGEOFFSET(_v) ((_v) & (TARGET_ELF_EXEC_PAGESIZE-1))
bellard31e31b82003-02-18 22:55:36 +0000997
Laurent ALFONSI14322ba2011-06-20 08:43:13 +0200998#define DLINFO_ITEMS 13
bellard31e31b82003-02-18 22:55:36 +0000999
bellard09bfb052003-04-10 00:03:40 +00001000static inline void memcpy_fromfs(void * to, const void * from, unsigned long n)
1001{
Richard Hendersond97ef722010-07-27 10:25:29 -07001002 memcpy(to, from, n);
bellard09bfb052003-04-10 00:03:40 +00001003}
1004
bellard31e31b82003-02-18 22:55:36 +00001005#ifdef BSWAP_NEEDED
bellard92a31b12005-02-10 22:00:52 +00001006static void bswap_ehdr(struct elfhdr *ehdr)
bellard31e31b82003-02-18 22:55:36 +00001007{
Richard Hendersond97ef722010-07-27 10:25:29 -07001008 bswap16s(&ehdr->e_type); /* Object file type */
1009 bswap16s(&ehdr->e_machine); /* Architecture */
1010 bswap32s(&ehdr->e_version); /* Object file version */
1011 bswaptls(&ehdr->e_entry); /* Entry point virtual address */
1012 bswaptls(&ehdr->e_phoff); /* Program header table file offset */
1013 bswaptls(&ehdr->e_shoff); /* Section header table file offset */
1014 bswap32s(&ehdr->e_flags); /* Processor-specific flags */
1015 bswap16s(&ehdr->e_ehsize); /* ELF header size in bytes */
1016 bswap16s(&ehdr->e_phentsize); /* Program header table entry size */
1017 bswap16s(&ehdr->e_phnum); /* Program header table entry count */
1018 bswap16s(&ehdr->e_shentsize); /* Section header table entry size */
1019 bswap16s(&ehdr->e_shnum); /* Section header table entry count */
1020 bswap16s(&ehdr->e_shstrndx); /* Section header string table index */
bellard31e31b82003-02-18 22:55:36 +00001021}
1022
Richard Henderson991f8f02010-07-27 10:25:32 -07001023static void bswap_phdr(struct elf_phdr *phdr, int phnum)
bellard31e31b82003-02-18 22:55:36 +00001024{
Richard Henderson991f8f02010-07-27 10:25:32 -07001025 int i;
1026 for (i = 0; i < phnum; ++i, ++phdr) {
1027 bswap32s(&phdr->p_type); /* Segment type */
1028 bswap32s(&phdr->p_flags); /* Segment flags */
1029 bswaptls(&phdr->p_offset); /* Segment file offset */
1030 bswaptls(&phdr->p_vaddr); /* Segment virtual address */
1031 bswaptls(&phdr->p_paddr); /* Segment physical address */
1032 bswaptls(&phdr->p_filesz); /* Segment size in file */
1033 bswaptls(&phdr->p_memsz); /* Segment size in memory */
1034 bswaptls(&phdr->p_align); /* Segment alignment */
1035 }
bellard31e31b82003-02-18 22:55:36 +00001036}
bellard689f9362003-04-29 20:40:07 +00001037
Richard Henderson991f8f02010-07-27 10:25:32 -07001038static void bswap_shdr(struct elf_shdr *shdr, int shnum)
bellard689f9362003-04-29 20:40:07 +00001039{
Richard Henderson991f8f02010-07-27 10:25:32 -07001040 int i;
1041 for (i = 0; i < shnum; ++i, ++shdr) {
1042 bswap32s(&shdr->sh_name);
1043 bswap32s(&shdr->sh_type);
1044 bswaptls(&shdr->sh_flags);
1045 bswaptls(&shdr->sh_addr);
1046 bswaptls(&shdr->sh_offset);
1047 bswaptls(&shdr->sh_size);
1048 bswap32s(&shdr->sh_link);
1049 bswap32s(&shdr->sh_info);
1050 bswaptls(&shdr->sh_addralign);
1051 bswaptls(&shdr->sh_entsize);
1052 }
bellard689f9362003-04-29 20:40:07 +00001053}
1054
j_mayer7a3148a2007-04-05 07:13:51 +00001055static void bswap_sym(struct elf_sym *sym)
bellard689f9362003-04-29 20:40:07 +00001056{
1057 bswap32s(&sym->st_name);
j_mayer7a3148a2007-04-05 07:13:51 +00001058 bswaptls(&sym->st_value);
1059 bswaptls(&sym->st_size);
bellard689f9362003-04-29 20:40:07 +00001060 bswap16s(&sym->st_shndx);
1061}
Richard Henderson991f8f02010-07-27 10:25:32 -07001062#else
1063static inline void bswap_ehdr(struct elfhdr *ehdr) { }
1064static inline void bswap_phdr(struct elf_phdr *phdr, int phnum) { }
1065static inline void bswap_shdr(struct elf_shdr *shdr, int shnum) { }
1066static inline void bswap_sym(struct elf_sym *sym) { }
bellard31e31b82003-02-18 22:55:36 +00001067#endif
1068
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001069#ifdef USE_ELF_CORE_DUMP
Andreas Färber9349b4f2012-03-14 01:38:32 +01001070static int elf_core_dump(int, const CPUArchState *);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001071#endif /* USE_ELF_CORE_DUMP */
Richard Henderson682674b2010-07-27 10:25:33 -07001072static void load_symbols(struct elfhdr *hdr, int fd, abi_ulong load_bias);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001073
Richard Henderson9058abd2010-07-27 10:25:34 -07001074/* Verify the portions of EHDR within E_IDENT for the target.
1075 This can be performed before bswapping the entire header. */
1076static bool elf_check_ident(struct elfhdr *ehdr)
1077{
1078 return (ehdr->e_ident[EI_MAG0] == ELFMAG0
1079 && ehdr->e_ident[EI_MAG1] == ELFMAG1
1080 && ehdr->e_ident[EI_MAG2] == ELFMAG2
1081 && ehdr->e_ident[EI_MAG3] == ELFMAG3
1082 && ehdr->e_ident[EI_CLASS] == ELF_CLASS
1083 && ehdr->e_ident[EI_DATA] == ELF_DATA
1084 && ehdr->e_ident[EI_VERSION] == EV_CURRENT);
1085}
1086
1087/* Verify the portions of EHDR outside of E_IDENT for the target.
1088 This has to wait until after bswapping the header. */
1089static bool elf_check_ehdr(struct elfhdr *ehdr)
1090{
1091 return (elf_check_arch(ehdr->e_machine)
1092 && ehdr->e_ehsize == sizeof(struct elfhdr)
1093 && ehdr->e_phentsize == sizeof(struct elf_phdr)
1094 && ehdr->e_shentsize == sizeof(struct elf_shdr)
1095 && (ehdr->e_type == ET_EXEC || ehdr->e_type == ET_DYN));
1096}
1097
bellard31e31b82003-02-18 22:55:36 +00001098/*
pbrooke5fe0c52006-06-11 13:32:59 +00001099 * 'copy_elf_strings()' copies argument/envelope strings from user
bellard31e31b82003-02-18 22:55:36 +00001100 * memory to free pages in kernel mem. These are in a format ready
1101 * to be put directly into the top of new user memory.
1102 *
1103 */
blueswir1992f48a2007-10-14 16:27:31 +00001104static abi_ulong copy_elf_strings(int argc,char ** argv, void **page,
1105 abi_ulong p)
bellard31e31b82003-02-18 22:55:36 +00001106{
1107 char *tmp, *tmp1, *pag = NULL;
1108 int len, offset = 0;
1109
1110 if (!p) {
Richard Hendersond97ef722010-07-27 10:25:29 -07001111 return 0; /* bullet-proofing */
bellard31e31b82003-02-18 22:55:36 +00001112 }
1113 while (argc-- > 0) {
bellardedf779f2004-02-22 13:40:13 +00001114 tmp = argv[argc];
1115 if (!tmp) {
Richard Hendersond97ef722010-07-27 10:25:29 -07001116 fprintf(stderr, "VFS: argc is wrong");
1117 exit(-1);
1118 }
bellardedf779f2004-02-22 13:40:13 +00001119 tmp1 = tmp;
Richard Hendersond97ef722010-07-27 10:25:29 -07001120 while (*tmp++);
1121 len = tmp - tmp1;
1122 if (p < len) { /* this shouldn't happen - 128kB */
1123 return 0;
1124 }
1125 while (len) {
1126 --p; --tmp; --len;
1127 if (--offset < 0) {
1128 offset = p % TARGET_PAGE_SIZE;
pbrook53a59602006-03-25 19:31:22 +00001129 pag = (char *)page[p/TARGET_PAGE_SIZE];
bellard44a91ca2004-01-18 22:05:44 +00001130 if (!pag) {
Peter Maydell7dd47662011-11-09 19:22:11 +00001131 pag = g_try_malloc0(TARGET_PAGE_SIZE);
pbrook53a59602006-03-25 19:31:22 +00001132 page[p/TARGET_PAGE_SIZE] = pag;
bellard44a91ca2004-01-18 22:05:44 +00001133 if (!pag)
1134 return 0;
Richard Hendersond97ef722010-07-27 10:25:29 -07001135 }
1136 }
1137 if (len == 0 || offset == 0) {
1138 *(pag + offset) = *tmp;
1139 }
1140 else {
1141 int bytes_to_copy = (len > offset) ? offset : len;
1142 tmp -= bytes_to_copy;
1143 p -= bytes_to_copy;
1144 offset -= bytes_to_copy;
1145 len -= bytes_to_copy;
1146 memcpy_fromfs(pag + offset, tmp, bytes_to_copy + 1);
1147 }
1148 }
bellard31e31b82003-02-18 22:55:36 +00001149 }
1150 return p;
1151}
1152
blueswir1992f48a2007-10-14 16:27:31 +00001153static abi_ulong setup_arg_pages(abi_ulong p, struct linux_binprm *bprm,
1154 struct image_info *info)
pbrook53a59602006-03-25 19:31:22 +00001155{
Richard Henderson60dcbcb2010-07-27 10:25:35 -07001156 abi_ulong stack_base, size, error, guard;
bellard31e31b82003-02-18 22:55:36 +00001157 int i;
bellard31e31b82003-02-18 22:55:36 +00001158
1159 /* Create enough stack to hold everything. If we don't use
Richard Henderson60dcbcb2010-07-27 10:25:35 -07001160 it for args, we'll use it for something else. */
Richard Henderson703e0e82010-03-19 14:21:13 -07001161 size = guest_stack_size;
Richard Henderson60dcbcb2010-07-27 10:25:35 -07001162 if (size < MAX_ARG_PAGES*TARGET_PAGE_SIZE) {
bellard54936002003-05-13 00:25:15 +00001163 size = MAX_ARG_PAGES*TARGET_PAGE_SIZE;
Richard Henderson60dcbcb2010-07-27 10:25:35 -07001164 }
1165 guard = TARGET_PAGE_SIZE;
1166 if (guard < qemu_real_host_page_size) {
1167 guard = qemu_real_host_page_size;
1168 }
1169
1170 error = target_mmap(0, size + guard, PROT_READ | PROT_WRITE,
1171 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
bellard09bfb052003-04-10 00:03:40 +00001172 if (error == -1) {
Richard Henderson60dcbcb2010-07-27 10:25:35 -07001173 perror("mmap stack");
bellard09bfb052003-04-10 00:03:40 +00001174 exit(-1);
bellard31e31b82003-02-18 22:55:36 +00001175 }
bellard09bfb052003-04-10 00:03:40 +00001176
Richard Henderson60dcbcb2010-07-27 10:25:35 -07001177 /* We reserve one extra page at the top of the stack as guard. */
1178 target_mprotect(error, guard, PROT_NONE);
1179
1180 info->stack_limit = error + guard;
1181 stack_base = info->stack_limit + size - MAX_ARG_PAGES*TARGET_PAGE_SIZE;
bellard09bfb052003-04-10 00:03:40 +00001182 p += stack_base;
1183
bellard31e31b82003-02-18 22:55:36 +00001184 for (i = 0 ; i < MAX_ARG_PAGES ; i++) {
Richard Hendersond97ef722010-07-27 10:25:29 -07001185 if (bprm->page[i]) {
1186 info->rss++;
bellard579a97f2007-11-11 14:26:47 +00001187 /* FIXME - check return value of memcpy_to_target() for failure */
Richard Hendersond97ef722010-07-27 10:25:29 -07001188 memcpy_to_target(stack_base, bprm->page[i], TARGET_PAGE_SIZE);
Peter Maydell7dd47662011-11-09 19:22:11 +00001189 g_free(bprm->page[i]);
Richard Hendersond97ef722010-07-27 10:25:29 -07001190 }
pbrook53a59602006-03-25 19:31:22 +00001191 stack_base += TARGET_PAGE_SIZE;
bellard31e31b82003-02-18 22:55:36 +00001192 }
1193 return p;
1194}
1195
Richard Hendersoncf129f32010-07-27 10:25:27 -07001196/* Map and zero the bss. We need to explicitly zero any fractional pages
1197 after the data section (i.e. bss). */
1198static void zero_bss(abi_ulong elf_bss, abi_ulong last_bss, int prot)
bellard31e31b82003-02-18 22:55:36 +00001199{
Richard Hendersoncf129f32010-07-27 10:25:27 -07001200 uintptr_t host_start, host_map_start, host_end;
bellard31e31b82003-02-18 22:55:36 +00001201
Richard Hendersoncf129f32010-07-27 10:25:27 -07001202 last_bss = TARGET_PAGE_ALIGN(last_bss);
bellard31e31b82003-02-18 22:55:36 +00001203
Richard Hendersoncf129f32010-07-27 10:25:27 -07001204 /* ??? There is confusion between qemu_real_host_page_size and
1205 qemu_host_page_size here and elsewhere in target_mmap, which
1206 may lead to the end of the data section mapping from the file
1207 not being mapped. At least there was an explicit test and
1208 comment for that here, suggesting that "the file size must
1209 be known". The comment probably pre-dates the introduction
1210 of the fstat system call in target_mmap which does in fact
1211 find out the size. What isn't clear is if the workaround
1212 here is still actually needed. For now, continue with it,
1213 but merge it with the "normal" mmap that would allocate the bss. */
bellard31e31b82003-02-18 22:55:36 +00001214
Richard Hendersoncf129f32010-07-27 10:25:27 -07001215 host_start = (uintptr_t) g2h(elf_bss);
1216 host_end = (uintptr_t) g2h(last_bss);
1217 host_map_start = (host_start + qemu_real_host_page_size - 1);
1218 host_map_start &= -qemu_real_host_page_size;
ths768a4a32006-12-14 13:32:11 +00001219
Richard Hendersoncf129f32010-07-27 10:25:27 -07001220 if (host_map_start < host_end) {
1221 void *p = mmap((void *)host_map_start, host_end - host_map_start,
1222 prot, MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
1223 if (p == MAP_FAILED) {
1224 perror("cannot mmap brk");
1225 exit(-1);
bellard853d6f72003-09-30 20:58:32 +00001226 }
1227
Richard Hendersoncf129f32010-07-27 10:25:27 -07001228 /* Since we didn't use target_mmap, make sure to record
1229 the validity of the pages with qemu. */
1230 page_set_flags(elf_bss & TARGET_PAGE_MASK, last_bss, prot|PAGE_VALID);
1231 }
bellard31e31b82003-02-18 22:55:36 +00001232
Richard Hendersoncf129f32010-07-27 10:25:27 -07001233 if (host_start < host_map_start) {
1234 memset((void *)host_start, 0, host_map_start - host_start);
1235 }
1236}
bellardedf779f2004-02-22 13:40:13 +00001237
Mike Frysinger1af02e82011-02-07 01:05:50 -05001238#ifdef CONFIG_USE_FDPIC
1239static abi_ulong loader_build_fdpic_loadmap(struct image_info *info, abi_ulong sp)
1240{
1241 uint16_t n;
1242 struct elf32_fdpic_loadseg *loadsegs = info->loadsegs;
1243
1244 /* elf32_fdpic_loadseg */
1245 n = info->nsegs;
1246 while (n--) {
1247 sp -= 12;
1248 put_user_u32(loadsegs[n].addr, sp+0);
1249 put_user_u32(loadsegs[n].p_vaddr, sp+4);
1250 put_user_u32(loadsegs[n].p_memsz, sp+8);
1251 }
1252
1253 /* elf32_fdpic_loadmap */
1254 sp -= 4;
1255 put_user_u16(0, sp+0); /* version */
1256 put_user_u16(info->nsegs, sp+2); /* nsegs */
1257
1258 info->personality = PER_LINUX_FDPIC;
1259 info->loadmap_addr = sp;
1260
1261 return sp;
1262}
1263#endif
1264
blueswir1992f48a2007-10-14 16:27:31 +00001265static abi_ulong create_elf_tables(abi_ulong p, int argc, int envc,
Richard Henderson8e62a712010-07-27 10:25:37 -07001266 struct elfhdr *exec,
1267 struct image_info *info,
1268 struct image_info *interp_info)
pbrook53a59602006-03-25 19:31:22 +00001269{
Richard Hendersond97ef722010-07-27 10:25:29 -07001270 abi_ulong sp;
Alexander Graf125b0f52012-01-28 21:12:14 +02001271 abi_ulong sp_auxv;
Richard Hendersond97ef722010-07-27 10:25:29 -07001272 int size;
Laurent ALFONSI14322ba2011-06-20 08:43:13 +02001273 int i;
1274 abi_ulong u_rand_bytes;
1275 uint8_t k_rand_bytes[16];
Richard Hendersond97ef722010-07-27 10:25:29 -07001276 abi_ulong u_platform;
1277 const char *k_platform;
1278 const int n = sizeof(elf_addr_t);
pbrook53a59602006-03-25 19:31:22 +00001279
Richard Hendersond97ef722010-07-27 10:25:29 -07001280 sp = p;
Mike Frysinger1af02e82011-02-07 01:05:50 -05001281
1282#ifdef CONFIG_USE_FDPIC
1283 /* Needs to be before we load the env/argc/... */
1284 if (elf_is_fdpic(exec)) {
1285 /* Need 4 byte alignment for these structs */
1286 sp &= ~3;
1287 sp = loader_build_fdpic_loadmap(info, sp);
1288 info->other_info = interp_info;
1289 if (interp_info) {
1290 interp_info->other_info = info;
1291 sp = loader_build_fdpic_loadmap(interp_info, sp);
1292 }
1293 }
1294#endif
1295
Richard Hendersond97ef722010-07-27 10:25:29 -07001296 u_platform = 0;
1297 k_platform = ELF_PLATFORM;
1298 if (k_platform) {
1299 size_t len = strlen(k_platform) + 1;
1300 sp -= (len + n - 1) & ~(n - 1);
1301 u_platform = sp;
1302 /* FIXME - check return value of memcpy_to_target() for failure */
1303 memcpy_to_target(sp, k_platform, len);
1304 }
Laurent ALFONSI14322ba2011-06-20 08:43:13 +02001305
1306 /*
1307 * Generate 16 random bytes for userspace PRNG seeding (not
1308 * cryptically secure but it's not the aim of QEMU).
1309 */
1310 srand((unsigned int) time(NULL));
1311 for (i = 0; i < 16; i++) {
1312 k_rand_bytes[i] = rand();
1313 }
1314 sp -= 16;
1315 u_rand_bytes = sp;
1316 /* FIXME - check return value of memcpy_to_target() for failure */
1317 memcpy_to_target(sp, k_rand_bytes, 16);
1318
Richard Hendersond97ef722010-07-27 10:25:29 -07001319 /*
1320 * Force 16 byte _final_ alignment here for generality.
1321 */
1322 sp = sp &~ (abi_ulong)15;
1323 size = (DLINFO_ITEMS + 1) * 2;
1324 if (k_platform)
1325 size += 2;
bellardf5155282004-01-04 15:46:50 +00001326#ifdef DLINFO_ARCH_ITEMS
Richard Hendersond97ef722010-07-27 10:25:29 -07001327 size += DLINFO_ARCH_ITEMS * 2;
bellardf5155282004-01-04 15:46:50 +00001328#endif
Richard Hendersond97ef722010-07-27 10:25:29 -07001329 size += envc + argc + 2;
Richard Hendersonb9329d42010-07-27 10:25:36 -07001330 size += 1; /* argc itself */
Richard Hendersond97ef722010-07-27 10:25:29 -07001331 size *= n;
1332 if (size & 15)
1333 sp -= 16 - (size & 15);
ths3b46e622007-09-17 08:09:54 +00001334
Richard Hendersond97ef722010-07-27 10:25:29 -07001335 /* This is correct because Linux defines
1336 * elf_addr_t as Elf32_Off / Elf64_Off
1337 */
1338#define NEW_AUX_ENT(id, val) do { \
1339 sp -= n; put_user_ual(val, sp); \
1340 sp -= n; put_user_ual(id, sp); \
1341 } while(0)
bellard2f619692007-11-16 10:46:05 +00001342
Alexander Graf125b0f52012-01-28 21:12:14 +02001343 sp_auxv = sp;
Richard Hendersond97ef722010-07-27 10:25:29 -07001344 NEW_AUX_ENT (AT_NULL, 0);
bellardf5155282004-01-04 15:46:50 +00001345
Richard Hendersond97ef722010-07-27 10:25:29 -07001346 /* There must be exactly DLINFO_ITEMS entries here. */
Richard Henderson8e62a712010-07-27 10:25:37 -07001347 NEW_AUX_ENT(AT_PHDR, (abi_ulong)(info->load_addr + exec->e_phoff));
Richard Hendersond97ef722010-07-27 10:25:29 -07001348 NEW_AUX_ENT(AT_PHENT, (abi_ulong)(sizeof (struct elf_phdr)));
1349 NEW_AUX_ENT(AT_PHNUM, (abi_ulong)(exec->e_phnum));
1350 NEW_AUX_ENT(AT_PAGESZ, (abi_ulong)(TARGET_PAGE_SIZE));
Richard Henderson8e62a712010-07-27 10:25:37 -07001351 NEW_AUX_ENT(AT_BASE, (abi_ulong)(interp_info ? interp_info->load_addr : 0));
Richard Hendersond97ef722010-07-27 10:25:29 -07001352 NEW_AUX_ENT(AT_FLAGS, (abi_ulong)0);
Richard Henderson8e62a712010-07-27 10:25:37 -07001353 NEW_AUX_ENT(AT_ENTRY, info->entry);
Richard Hendersond97ef722010-07-27 10:25:29 -07001354 NEW_AUX_ENT(AT_UID, (abi_ulong) getuid());
1355 NEW_AUX_ENT(AT_EUID, (abi_ulong) geteuid());
1356 NEW_AUX_ENT(AT_GID, (abi_ulong) getgid());
1357 NEW_AUX_ENT(AT_EGID, (abi_ulong) getegid());
1358 NEW_AUX_ENT(AT_HWCAP, (abi_ulong) ELF_HWCAP);
1359 NEW_AUX_ENT(AT_CLKTCK, (abi_ulong) sysconf(_SC_CLK_TCK));
Laurent ALFONSI14322ba2011-06-20 08:43:13 +02001360 NEW_AUX_ENT(AT_RANDOM, (abi_ulong) u_rand_bytes);
1361
Richard Hendersond97ef722010-07-27 10:25:29 -07001362 if (k_platform)
1363 NEW_AUX_ENT(AT_PLATFORM, u_platform);
bellardf5155282004-01-04 15:46:50 +00001364#ifdef ARCH_DLINFO
Richard Hendersond97ef722010-07-27 10:25:29 -07001365 /*
1366 * ARCH_DLINFO must come last so platform specific code can enforce
1367 * special alignment requirements on the AUXV if necessary (eg. PPC).
1368 */
1369 ARCH_DLINFO;
bellardf5155282004-01-04 15:46:50 +00001370#endif
1371#undef NEW_AUX_ENT
1372
Richard Hendersond97ef722010-07-27 10:25:29 -07001373 info->saved_auxv = sp;
Alexander Graf125b0f52012-01-28 21:12:14 +02001374 info->auxv_len = sp_auxv - sp;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001375
Richard Hendersonb9329d42010-07-27 10:25:36 -07001376 sp = loader_build_argptr(envc, argc, sp, p, 0);
Richard Hendersond97ef722010-07-27 10:25:29 -07001377 return sp;
bellard31e31b82003-02-18 22:55:36 +00001378}
1379
Dr. David Alan Gilbert97cc7562011-08-31 17:24:34 +01001380#ifndef TARGET_HAS_GUEST_VALIDATE_BASE
1381/* If the guest doesn't have a validation function just agree */
1382bool guest_validate_base(unsigned long guest_base)
1383{
1384 return 1;
1385}
1386#endif
1387
Peter Maydellf3ed1f52011-05-17 13:34:46 +01001388static void probe_guest_base(const char *image_name,
1389 abi_ulong loaddr, abi_ulong hiaddr)
1390{
1391 /* Probe for a suitable guest base address, if the user has not set
1392 * it explicitly, and set guest_base appropriately.
1393 * In case of error we will print a suitable message and exit.
1394 */
1395#if defined(CONFIG_USE_GUEST_BASE)
1396 const char *errmsg;
1397 if (!have_guest_base && !reserved_va) {
1398 unsigned long host_start, real_start, host_size;
1399
1400 /* Round addresses to page boundaries. */
1401 loaddr &= qemu_host_page_mask;
1402 hiaddr = HOST_PAGE_ALIGN(hiaddr);
1403
1404 if (loaddr < mmap_min_addr) {
1405 host_start = HOST_PAGE_ALIGN(mmap_min_addr);
1406 } else {
1407 host_start = loaddr;
1408 if (host_start != loaddr) {
1409 errmsg = "Address overflow loading ELF binary";
1410 goto exit_errmsg;
1411 }
1412 }
1413 host_size = hiaddr - loaddr;
1414 while (1) {
1415 /* Do not use mmap_find_vma here because that is limited to the
1416 guest address space. We are going to make the
1417 guest address space fit whatever we're given. */
1418 real_start = (unsigned long)
1419 mmap((void *)host_start, host_size, PROT_NONE,
1420 MAP_ANONYMOUS | MAP_PRIVATE | MAP_NORESERVE, -1, 0);
1421 if (real_start == (unsigned long)-1) {
1422 goto exit_perror;
1423 }
Dr. David Alan Gilbert97cc7562011-08-31 17:24:34 +01001424 guest_base = real_start - loaddr;
1425 if ((real_start == host_start) &&
1426 guest_validate_base(guest_base)) {
Peter Maydellf3ed1f52011-05-17 13:34:46 +01001427 break;
1428 }
1429 /* That address didn't work. Unmap and try a different one.
1430 The address the host picked because is typically right at
1431 the top of the host address space and leaves the guest with
1432 no usable address space. Resort to a linear search. We
1433 already compensated for mmap_min_addr, so this should not
1434 happen often. Probably means we got unlucky and host
1435 address space randomization put a shared library somewhere
1436 inconvenient. */
1437 munmap((void *)real_start, host_size);
1438 host_start += qemu_host_page_size;
1439 if (host_start == loaddr) {
1440 /* Theoretically possible if host doesn't have any suitably
1441 aligned areas. Normally the first mmap will fail. */
1442 errmsg = "Unable to find space for application";
1443 goto exit_errmsg;
1444 }
1445 }
1446 qemu_log("Relocating guest address space from 0x"
1447 TARGET_ABI_FMT_lx " to 0x%lx\n",
1448 loaddr, real_start);
Peter Maydellf3ed1f52011-05-17 13:34:46 +01001449 }
1450 return;
1451
1452exit_perror:
1453 errmsg = strerror(errno);
1454exit_errmsg:
1455 fprintf(stderr, "%s: %s\n", image_name, errmsg);
1456 exit(-1);
1457#endif
1458}
1459
1460
Richard Henderson8e62a712010-07-27 10:25:37 -07001461/* Load an ELF image into the address space.
bellard31e31b82003-02-18 22:55:36 +00001462
Richard Henderson8e62a712010-07-27 10:25:37 -07001463 IMAGE_NAME is the filename of the image, to use in error messages.
1464 IMAGE_FD is the open file descriptor for the image.
1465
1466 BPRM_BUF is a copy of the beginning of the file; this of course
1467 contains the elf file header at offset 0. It is assumed that this
1468 buffer is sufficiently aligned to present no problems to the host
1469 in accessing data at aligned offsets within the buffer.
1470
1471 On return: INFO values will be filled in, as necessary or available. */
1472
1473static void load_elf_image(const char *image_name, int image_fd,
Richard Hendersonbf858892010-07-27 10:25:38 -07001474 struct image_info *info, char **pinterp_name,
Richard Henderson8e62a712010-07-27 10:25:37 -07001475 char bprm_buf[BPRM_BUF_SIZE])
bellard31e31b82003-02-18 22:55:36 +00001476{
Richard Henderson8e62a712010-07-27 10:25:37 -07001477 struct elfhdr *ehdr = (struct elfhdr *)bprm_buf;
1478 struct elf_phdr *phdr;
1479 abi_ulong load_addr, load_bias, loaddr, hiaddr, error;
1480 int i, retval;
1481 const char *errmsg;
ths5fafdf22007-09-16 21:08:06 +00001482
Richard Henderson8e62a712010-07-27 10:25:37 -07001483 /* First of all, some simple consistency checks */
1484 errmsg = "Invalid ELF image for this architecture";
1485 if (!elf_check_ident(ehdr)) {
1486 goto exit_errmsg;
1487 }
1488 bswap_ehdr(ehdr);
1489 if (!elf_check_ehdr(ehdr)) {
1490 goto exit_errmsg;
Richard Hendersond97ef722010-07-27 10:25:29 -07001491 }
ths5fafdf22007-09-16 21:08:06 +00001492
Richard Henderson8e62a712010-07-27 10:25:37 -07001493 i = ehdr->e_phnum * sizeof(struct elf_phdr);
1494 if (ehdr->e_phoff + i <= BPRM_BUF_SIZE) {
1495 phdr = (struct elf_phdr *)(bprm_buf + ehdr->e_phoff);
Richard Henderson9955ffa2010-07-27 10:25:30 -07001496 } else {
Richard Henderson8e62a712010-07-27 10:25:37 -07001497 phdr = (struct elf_phdr *) alloca(i);
1498 retval = pread(image_fd, phdr, i, ehdr->e_phoff);
Richard Henderson9955ffa2010-07-27 10:25:30 -07001499 if (retval != i) {
Richard Henderson8e62a712010-07-27 10:25:37 -07001500 goto exit_read;
Richard Henderson9955ffa2010-07-27 10:25:30 -07001501 }
Richard Hendersond97ef722010-07-27 10:25:29 -07001502 }
Richard Henderson8e62a712010-07-27 10:25:37 -07001503 bswap_phdr(phdr, ehdr->e_phnum);
bellard09bfb052003-04-10 00:03:40 +00001504
Mike Frysinger1af02e82011-02-07 01:05:50 -05001505#ifdef CONFIG_USE_FDPIC
1506 info->nsegs = 0;
1507 info->pt_dynamic_addr = 0;
1508#endif
1509
Richard Henderson682674b2010-07-27 10:25:33 -07001510 /* Find the maximum size of the image and allocate an appropriate
1511 amount of memory to handle that. */
1512 loaddr = -1, hiaddr = 0;
Richard Henderson8e62a712010-07-27 10:25:37 -07001513 for (i = 0; i < ehdr->e_phnum; ++i) {
1514 if (phdr[i].p_type == PT_LOAD) {
1515 abi_ulong a = phdr[i].p_vaddr;
Richard Henderson682674b2010-07-27 10:25:33 -07001516 if (a < loaddr) {
1517 loaddr = a;
1518 }
Richard Henderson8e62a712010-07-27 10:25:37 -07001519 a += phdr[i].p_memsz;
Richard Henderson682674b2010-07-27 10:25:33 -07001520 if (a > hiaddr) {
1521 hiaddr = a;
1522 }
Mike Frysinger1af02e82011-02-07 01:05:50 -05001523#ifdef CONFIG_USE_FDPIC
1524 ++info->nsegs;
1525#endif
Richard Henderson682674b2010-07-27 10:25:33 -07001526 }
1527 }
1528
1529 load_addr = loaddr;
Richard Henderson8e62a712010-07-27 10:25:37 -07001530 if (ehdr->e_type == ET_DYN) {
Richard Henderson682674b2010-07-27 10:25:33 -07001531 /* The image indicates that it can be loaded anywhere. Find a
1532 location that can hold the memory space required. If the
1533 image is pre-linked, LOADDR will be non-zero. Since we do
1534 not supply MAP_FIXED here we'll use that address if and
1535 only if it remains available. */
1536 load_addr = target_mmap(loaddr, hiaddr - loaddr, PROT_NONE,
1537 MAP_PRIVATE | MAP_ANON | MAP_NORESERVE,
1538 -1, 0);
1539 if (load_addr == -1) {
Richard Henderson8e62a712010-07-27 10:25:37 -07001540 goto exit_perror;
Richard Hendersond97ef722010-07-27 10:25:29 -07001541 }
Richard Hendersonbf858892010-07-27 10:25:38 -07001542 } else if (pinterp_name != NULL) {
1543 /* This is the main executable. Make sure that the low
1544 address does not conflict with MMAP_MIN_ADDR or the
1545 QEMU application itself. */
Peter Maydellf3ed1f52011-05-17 13:34:46 +01001546 probe_guest_base(image_name, loaddr, hiaddr);
Richard Hendersond97ef722010-07-27 10:25:29 -07001547 }
Richard Henderson682674b2010-07-27 10:25:33 -07001548 load_bias = load_addr - loaddr;
Richard Hendersond97ef722010-07-27 10:25:29 -07001549
Mike Frysinger1af02e82011-02-07 01:05:50 -05001550#ifdef CONFIG_USE_FDPIC
1551 {
1552 struct elf32_fdpic_loadseg *loadsegs = info->loadsegs =
Anthony Liguori7267c092011-08-20 22:09:37 -05001553 g_malloc(sizeof(*loadsegs) * info->nsegs);
Mike Frysinger1af02e82011-02-07 01:05:50 -05001554
1555 for (i = 0; i < ehdr->e_phnum; ++i) {
1556 switch (phdr[i].p_type) {
1557 case PT_DYNAMIC:
1558 info->pt_dynamic_addr = phdr[i].p_vaddr + load_bias;
1559 break;
1560 case PT_LOAD:
1561 loadsegs->addr = phdr[i].p_vaddr + load_bias;
1562 loadsegs->p_vaddr = phdr[i].p_vaddr;
1563 loadsegs->p_memsz = phdr[i].p_memsz;
1564 ++loadsegs;
1565 break;
1566 }
1567 }
1568 }
1569#endif
1570
Richard Henderson8e62a712010-07-27 10:25:37 -07001571 info->load_bias = load_bias;
1572 info->load_addr = load_addr;
1573 info->entry = ehdr->e_entry + load_bias;
1574 info->start_code = -1;
1575 info->end_code = 0;
1576 info->start_data = -1;
1577 info->end_data = 0;
1578 info->brk = 0;
1579
1580 for (i = 0; i < ehdr->e_phnum; i++) {
1581 struct elf_phdr *eppnt = phdr + i;
Richard Hendersond97ef722010-07-27 10:25:29 -07001582 if (eppnt->p_type == PT_LOAD) {
Richard Henderson682674b2010-07-27 10:25:33 -07001583 abi_ulong vaddr, vaddr_po, vaddr_ps, vaddr_ef, vaddr_em;
Richard Hendersond97ef722010-07-27 10:25:29 -07001584 int elf_prot = 0;
Richard Hendersond97ef722010-07-27 10:25:29 -07001585
1586 if (eppnt->p_flags & PF_R) elf_prot = PROT_READ;
1587 if (eppnt->p_flags & PF_W) elf_prot |= PROT_WRITE;
1588 if (eppnt->p_flags & PF_X) elf_prot |= PROT_EXEC;
bellard09bfb052003-04-10 00:03:40 +00001589
Richard Henderson682674b2010-07-27 10:25:33 -07001590 vaddr = load_bias + eppnt->p_vaddr;
1591 vaddr_po = TARGET_ELF_PAGEOFFSET(vaddr);
1592 vaddr_ps = TARGET_ELF_PAGESTART(vaddr);
1593
1594 error = target_mmap(vaddr_ps, eppnt->p_filesz + vaddr_po,
1595 elf_prot, MAP_PRIVATE | MAP_FIXED,
Richard Henderson8e62a712010-07-27 10:25:37 -07001596 image_fd, eppnt->p_offset - vaddr_po);
Richard Hendersond97ef722010-07-27 10:25:29 -07001597 if (error == -1) {
Richard Henderson8e62a712010-07-27 10:25:37 -07001598 goto exit_perror;
Richard Hendersond97ef722010-07-27 10:25:29 -07001599 }
bellard31e31b82003-02-18 22:55:36 +00001600
Richard Henderson682674b2010-07-27 10:25:33 -07001601 vaddr_ef = vaddr + eppnt->p_filesz;
1602 vaddr_em = vaddr + eppnt->p_memsz;
bellard31e31b82003-02-18 22:55:36 +00001603
Richard Hendersoncf129f32010-07-27 10:25:27 -07001604 /* If the load segment requests extra zeros (e.g. bss), map it. */
Richard Henderson682674b2010-07-27 10:25:33 -07001605 if (vaddr_ef < vaddr_em) {
1606 zero_bss(vaddr_ef, vaddr_em, elf_prot);
Richard Hendersoncf129f32010-07-27 10:25:27 -07001607 }
Richard Henderson8e62a712010-07-27 10:25:37 -07001608
1609 /* Find the full program boundaries. */
1610 if (elf_prot & PROT_EXEC) {
1611 if (vaddr < info->start_code) {
1612 info->start_code = vaddr;
1613 }
1614 if (vaddr_ef > info->end_code) {
1615 info->end_code = vaddr_ef;
1616 }
1617 }
1618 if (elf_prot & PROT_WRITE) {
1619 if (vaddr < info->start_data) {
1620 info->start_data = vaddr;
1621 }
1622 if (vaddr_ef > info->end_data) {
1623 info->end_data = vaddr_ef;
1624 }
1625 if (vaddr_em > info->brk) {
1626 info->brk = vaddr_em;
1627 }
1628 }
Richard Hendersonbf858892010-07-27 10:25:38 -07001629 } else if (eppnt->p_type == PT_INTERP && pinterp_name) {
1630 char *interp_name;
1631
1632 if (*pinterp_name) {
1633 errmsg = "Multiple PT_INTERP entries";
1634 goto exit_errmsg;
1635 }
1636 interp_name = malloc(eppnt->p_filesz);
1637 if (!interp_name) {
1638 goto exit_perror;
1639 }
1640
1641 if (eppnt->p_offset + eppnt->p_filesz <= BPRM_BUF_SIZE) {
1642 memcpy(interp_name, bprm_buf + eppnt->p_offset,
1643 eppnt->p_filesz);
1644 } else {
1645 retval = pread(image_fd, interp_name, eppnt->p_filesz,
1646 eppnt->p_offset);
1647 if (retval != eppnt->p_filesz) {
1648 goto exit_perror;
1649 }
1650 }
1651 if (interp_name[eppnt->p_filesz - 1] != 0) {
1652 errmsg = "Invalid PT_INTERP entry";
1653 goto exit_errmsg;
1654 }
1655 *pinterp_name = interp_name;
Richard Hendersond97ef722010-07-27 10:25:29 -07001656 }
Richard Henderson682674b2010-07-27 10:25:33 -07001657 }
ths5fafdf22007-09-16 21:08:06 +00001658
Richard Henderson8e62a712010-07-27 10:25:37 -07001659 if (info->end_data == 0) {
1660 info->start_data = info->end_code;
1661 info->end_data = info->end_code;
1662 info->brk = info->end_code;
Richard Henderson682674b2010-07-27 10:25:33 -07001663 }
bellard31e31b82003-02-18 22:55:36 +00001664
Richard Henderson8e62a712010-07-27 10:25:37 -07001665 if (qemu_log_enabled()) {
1666 load_symbols(ehdr, image_fd, load_bias);
1667 }
bellard31e31b82003-02-18 22:55:36 +00001668
Richard Henderson8e62a712010-07-27 10:25:37 -07001669 close(image_fd);
1670 return;
1671
1672 exit_read:
1673 if (retval >= 0) {
1674 errmsg = "Incomplete read of file header";
1675 goto exit_errmsg;
1676 }
1677 exit_perror:
1678 errmsg = strerror(errno);
1679 exit_errmsg:
1680 fprintf(stderr, "%s: %s\n", image_name, errmsg);
1681 exit(-1);
1682}
1683
1684static void load_elf_interp(const char *filename, struct image_info *info,
1685 char bprm_buf[BPRM_BUF_SIZE])
1686{
1687 int fd, retval;
1688
1689 fd = open(path(filename), O_RDONLY);
1690 if (fd < 0) {
1691 goto exit_perror;
1692 }
1693
1694 retval = read(fd, bprm_buf, BPRM_BUF_SIZE);
1695 if (retval < 0) {
1696 goto exit_perror;
1697 }
1698 if (retval < BPRM_BUF_SIZE) {
1699 memset(bprm_buf + retval, 0, BPRM_BUF_SIZE - retval);
1700 }
1701
Richard Hendersonbf858892010-07-27 10:25:38 -07001702 load_elf_image(filename, fd, info, NULL, bprm_buf);
Richard Henderson8e62a712010-07-27 10:25:37 -07001703 return;
1704
1705 exit_perror:
1706 fprintf(stderr, "%s: %s\n", filename, strerror(errno));
1707 exit(-1);
bellard31e31b82003-02-18 22:55:36 +00001708}
1709
pbrook49918a72008-10-22 15:11:31 +00001710static int symfind(const void *s0, const void *s1)
1711{
Stefan Weilc7c530c2012-01-05 15:39:39 +01001712 target_ulong addr = *(target_ulong *)s0;
pbrook49918a72008-10-22 15:11:31 +00001713 struct elf_sym *sym = (struct elf_sym *)s1;
1714 int result = 0;
Stefan Weilc7c530c2012-01-05 15:39:39 +01001715 if (addr < sym->st_value) {
pbrook49918a72008-10-22 15:11:31 +00001716 result = -1;
Stefan Weilc7c530c2012-01-05 15:39:39 +01001717 } else if (addr >= sym->st_value + sym->st_size) {
pbrook49918a72008-10-22 15:11:31 +00001718 result = 1;
1719 }
1720 return result;
1721}
1722
1723static const char *lookup_symbolxx(struct syminfo *s, target_ulong orig_addr)
1724{
1725#if ELF_CLASS == ELFCLASS32
1726 struct elf_sym *syms = s->disas_symtab.elf32;
1727#else
1728 struct elf_sym *syms = s->disas_symtab.elf64;
1729#endif
1730
1731 // binary search
pbrook49918a72008-10-22 15:11:31 +00001732 struct elf_sym *sym;
1733
Stefan Weilc7c530c2012-01-05 15:39:39 +01001734 sym = bsearch(&orig_addr, syms, s->disas_num_syms, sizeof(*syms), symfind);
Blue Swirl7cba04f2009-08-01 10:13:20 +00001735 if (sym != NULL) {
pbrook49918a72008-10-22 15:11:31 +00001736 return s->disas_strtab + sym->st_name;
1737 }
1738
1739 return "";
1740}
1741
1742/* FIXME: This should use elf_ops.h */
1743static int symcmp(const void *s0, const void *s1)
1744{
1745 struct elf_sym *sym0 = (struct elf_sym *)s0;
1746 struct elf_sym *sym1 = (struct elf_sym *)s1;
1747 return (sym0->st_value < sym1->st_value)
1748 ? -1
1749 : ((sym0->st_value > sym1->st_value) ? 1 : 0);
1750}
1751
bellard689f9362003-04-29 20:40:07 +00001752/* Best attempt to load symbols from this ELF object. */
Richard Henderson682674b2010-07-27 10:25:33 -07001753static void load_symbols(struct elfhdr *hdr, int fd, abi_ulong load_bias)
bellard689f9362003-04-29 20:40:07 +00001754{
Richard Henderson682674b2010-07-27 10:25:33 -07001755 int i, shnum, nsyms, sym_idx = 0, str_idx = 0;
1756 struct elf_shdr *shdr;
Cédric VINCENTb9475272011-06-01 14:36:38 +02001757 char *strings = NULL;
1758 struct syminfo *s = NULL;
1759 struct elf_sym *new_syms, *syms = NULL;
bellard31e31b82003-02-18 22:55:36 +00001760
Richard Henderson682674b2010-07-27 10:25:33 -07001761 shnum = hdr->e_shnum;
1762 i = shnum * sizeof(struct elf_shdr);
1763 shdr = (struct elf_shdr *)alloca(i);
1764 if (pread(fd, shdr, i, hdr->e_shoff) != i) {
1765 return;
1766 }
1767
1768 bswap_shdr(shdr, shnum);
1769 for (i = 0; i < shnum; ++i) {
1770 if (shdr[i].sh_type == SHT_SYMTAB) {
1771 sym_idx = i;
1772 str_idx = shdr[i].sh_link;
pbrook49918a72008-10-22 15:11:31 +00001773 goto found;
1774 }
bellard689f9362003-04-29 20:40:07 +00001775 }
Richard Henderson682674b2010-07-27 10:25:33 -07001776
1777 /* There will be no symbol table if the file was stripped. */
1778 return;
bellard689f9362003-04-29 20:40:07 +00001779
1780 found:
Richard Henderson682674b2010-07-27 10:25:33 -07001781 /* Now know where the strtab and symtab are. Snarf them. */
bellarde80cfcf2004-12-19 23:18:01 +00001782 s = malloc(sizeof(*s));
Richard Henderson682674b2010-07-27 10:25:33 -07001783 if (!s) {
Cédric VINCENTb9475272011-06-01 14:36:38 +02001784 goto give_up;
Richard Henderson682674b2010-07-27 10:25:33 -07001785 }
1786
1787 i = shdr[str_idx].sh_size;
1788 s->disas_strtab = strings = malloc(i);
1789 if (!strings || pread(fd, strings, i, shdr[str_idx].sh_offset) != i) {
Cédric VINCENTb9475272011-06-01 14:36:38 +02001790 goto give_up;
Richard Henderson682674b2010-07-27 10:25:33 -07001791 }
ths5fafdf22007-09-16 21:08:06 +00001792
Richard Henderson682674b2010-07-27 10:25:33 -07001793 i = shdr[sym_idx].sh_size;
1794 syms = malloc(i);
1795 if (!syms || pread(fd, syms, i, shdr[sym_idx].sh_offset) != i) {
Cédric VINCENTb9475272011-06-01 14:36:38 +02001796 goto give_up;
Richard Henderson682674b2010-07-27 10:25:33 -07001797 }
bellard689f9362003-04-29 20:40:07 +00001798
Richard Henderson682674b2010-07-27 10:25:33 -07001799 nsyms = i / sizeof(struct elf_sym);
1800 for (i = 0; i < nsyms; ) {
pbrook49918a72008-10-22 15:11:31 +00001801 bswap_sym(syms + i);
Richard Henderson682674b2010-07-27 10:25:33 -07001802 /* Throw away entries which we do not need. */
1803 if (syms[i].st_shndx == SHN_UNDEF
1804 || syms[i].st_shndx >= SHN_LORESERVE
1805 || ELF_ST_TYPE(syms[i].st_info) != STT_FUNC) {
1806 if (i < --nsyms) {
pbrook49918a72008-10-22 15:11:31 +00001807 syms[i] = syms[nsyms];
1808 }
Richard Henderson682674b2010-07-27 10:25:33 -07001809 } else {
pbrook49918a72008-10-22 15:11:31 +00001810#if defined(TARGET_ARM) || defined (TARGET_MIPS)
Richard Henderson682674b2010-07-27 10:25:33 -07001811 /* The bottom address bit marks a Thumb or MIPS16 symbol. */
1812 syms[i].st_value &= ~(target_ulong)1;
blueswir10774bed2007-07-05 13:23:29 +00001813#endif
Richard Henderson682674b2010-07-27 10:25:33 -07001814 syms[i].st_value += load_bias;
1815 i++;
1816 }
blueswir10774bed2007-07-05 13:23:29 +00001817 }
bellard689f9362003-04-29 20:40:07 +00001818
Cédric VINCENTb9475272011-06-01 14:36:38 +02001819 /* No "useful" symbol. */
1820 if (nsyms == 0) {
1821 goto give_up;
1822 }
1823
Richard Henderson5d5c9932010-07-29 09:37:01 -07001824 /* Attempt to free the storage associated with the local symbols
1825 that we threw away. Whether or not this has any effect on the
1826 memory allocation depends on the malloc implementation and how
1827 many symbols we managed to discard. */
Stefan Weil8d79de62011-01-17 21:36:06 +01001828 new_syms = realloc(syms, nsyms * sizeof(*syms));
1829 if (new_syms == NULL) {
Cédric VINCENTb9475272011-06-01 14:36:38 +02001830 goto give_up;
Richard Henderson5d5c9932010-07-29 09:37:01 -07001831 }
Stefan Weil8d79de62011-01-17 21:36:06 +01001832 syms = new_syms;
Richard Henderson5d5c9932010-07-29 09:37:01 -07001833
pbrook49918a72008-10-22 15:11:31 +00001834 qsort(syms, nsyms, sizeof(*syms), symcmp);
1835
pbrook49918a72008-10-22 15:11:31 +00001836 s->disas_num_syms = nsyms;
1837#if ELF_CLASS == ELFCLASS32
1838 s->disas_symtab.elf32 = syms;
pbrook49918a72008-10-22 15:11:31 +00001839#else
1840 s->disas_symtab.elf64 = syms;
pbrook49918a72008-10-22 15:11:31 +00001841#endif
Richard Henderson682674b2010-07-27 10:25:33 -07001842 s->lookup_symbol = lookup_symbolxx;
bellarde80cfcf2004-12-19 23:18:01 +00001843 s->next = syminfos;
1844 syminfos = s;
Cédric VINCENTb9475272011-06-01 14:36:38 +02001845
1846 return;
1847
1848give_up:
1849 free(s);
1850 free(strings);
1851 free(syms);
bellard689f9362003-04-29 20:40:07 +00001852}
bellard31e31b82003-02-18 22:55:36 +00001853
pbrooke5fe0c52006-06-11 13:32:59 +00001854int load_elf_binary(struct linux_binprm * bprm, struct target_pt_regs * regs,
1855 struct image_info * info)
bellard31e31b82003-02-18 22:55:36 +00001856{
Richard Henderson8e62a712010-07-27 10:25:37 -07001857 struct image_info interp_info;
bellard31e31b82003-02-18 22:55:36 +00001858 struct elfhdr elf_ex;
Richard Henderson8e62a712010-07-27 10:25:37 -07001859 char *elf_interpreter = NULL;
bellard31e31b82003-02-18 22:55:36 +00001860
Richard Hendersonbf858892010-07-27 10:25:38 -07001861 info->start_mmap = (abi_ulong)ELF_START_MMAP;
1862 info->mmap = 0;
1863 info->rss = 0;
bellard31e31b82003-02-18 22:55:36 +00001864
Richard Hendersonbf858892010-07-27 10:25:38 -07001865 load_elf_image(bprm->filename, bprm->fd, info,
1866 &elf_interpreter, bprm->buf);
1867
1868 /* ??? We need a copy of the elf header for passing to create_elf_tables.
1869 If we do nothing, we'll have overwritten this when we re-use bprm->buf
1870 when we load the interpreter. */
1871 elf_ex = *(struct elfhdr *)bprm->buf;
bellard31e31b82003-02-18 22:55:36 +00001872
pbrooke5fe0c52006-06-11 13:32:59 +00001873 bprm->p = copy_elf_strings(1, &bprm->filename, bprm->page, bprm->p);
1874 bprm->p = copy_elf_strings(bprm->envc,bprm->envp,bprm->page,bprm->p);
1875 bprm->p = copy_elf_strings(bprm->argc,bprm->argv,bprm->page,bprm->p);
1876 if (!bprm->p) {
Richard Hendersonbf858892010-07-27 10:25:38 -07001877 fprintf(stderr, "%s: %s\n", bprm->filename, strerror(E2BIG));
1878 exit(-1);
pbrooke5fe0c52006-06-11 13:32:59 +00001879 }
1880
bellard31e31b82003-02-18 22:55:36 +00001881 /* Do this so that we can load the interpreter, if need be. We will
1882 change some of these later */
bellard31e31b82003-02-18 22:55:36 +00001883 bprm->p = setup_arg_pages(bprm->p, bprm, info);
bellard31e31b82003-02-18 22:55:36 +00001884
Richard Henderson8e62a712010-07-27 10:25:37 -07001885 if (elf_interpreter) {
1886 load_elf_interp(elf_interpreter, &interp_info, bprm->buf);
bellard31e31b82003-02-18 22:55:36 +00001887
Richard Henderson8e62a712010-07-27 10:25:37 -07001888 /* If the program interpreter is one of these two, then assume
1889 an iBCS2 image. Otherwise assume a native linux image. */
bellard31e31b82003-02-18 22:55:36 +00001890
Richard Henderson8e62a712010-07-27 10:25:37 -07001891 if (strcmp(elf_interpreter, "/usr/lib/libc.so.1") == 0
1892 || strcmp(elf_interpreter, "/usr/lib/ld.so.1") == 0) {
1893 info->personality = PER_SVR4;
1894
1895 /* Why this, you ask??? Well SVr4 maps page 0 as read-only,
1896 and some applications "depend" upon this behavior. Since
1897 we do not have the power to recompile these, we emulate
1898 the SVr4 behavior. Sigh. */
1899 target_mmap(0, qemu_host_page_size, PROT_READ | PROT_EXEC,
1900 MAP_FIXED | MAP_PRIVATE, -1, 0);
1901 }
bellard31e31b82003-02-18 22:55:36 +00001902 }
1903
Richard Henderson8e62a712010-07-27 10:25:37 -07001904 bprm->p = create_elf_tables(bprm->p, bprm->argc, bprm->envc, &elf_ex,
1905 info, (elf_interpreter ? &interp_info : NULL));
1906 info->start_stack = bprm->p;
1907
1908 /* If we have an interpreter, set that as the program's entry point.
Richard Henderson8e780642011-10-26 09:59:17 -07001909 Copy the load_bias as well, to help PPC64 interpret the entry
Richard Henderson8e62a712010-07-27 10:25:37 -07001910 point as a function descriptor. Do this after creating elf tables
1911 so that we copy the original program entry point into the AUXV. */
1912 if (elf_interpreter) {
Richard Henderson8e780642011-10-26 09:59:17 -07001913 info->load_bias = interp_info.load_bias;
Richard Henderson8e62a712010-07-27 10:25:37 -07001914 info->entry = interp_info.entry;
Richard Hendersonbf858892010-07-27 10:25:38 -07001915 free(elf_interpreter);
Richard Henderson8e62a712010-07-27 10:25:37 -07001916 }
bellard31e31b82003-02-18 22:55:36 +00001917
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001918#ifdef USE_ELF_CORE_DUMP
1919 bprm->core_dump = &elf_core_dump;
1920#endif
1921
bellard31e31b82003-02-18 22:55:36 +00001922 return 0;
1923}
1924
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001925#ifdef USE_ELF_CORE_DUMP
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001926/*
1927 * Definitions to generate Intel SVR4-like core files.
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01001928 * These mostly have the same names as the SVR4 types with "target_elf_"
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001929 * tacked on the front to prevent clashes with linux definitions,
1930 * and the typedef forms have been avoided. This is mostly like
1931 * the SVR4 structure, but more Linuxy, with things that Linux does
1932 * not support and which gdb doesn't really use excluded.
1933 *
1934 * Fields we don't dump (their contents is zero) in linux-user qemu
1935 * are marked with XXX.
1936 *
1937 * Core dump code is copied from linux kernel (fs/binfmt_elf.c).
1938 *
1939 * Porting ELF coredump for target is (quite) simple process. First you
Nathan Froyddd0a3652009-12-11 09:04:45 -08001940 * define USE_ELF_CORE_DUMP in target ELF code (where init_thread() for
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001941 * the target resides):
1942 *
1943 * #define USE_ELF_CORE_DUMP
1944 *
1945 * Next you define type of register set used for dumping. ELF specification
1946 * says that it needs to be array of elf_greg_t that has size of ELF_NREG.
1947 *
Anthony Liguoric227f092009-10-01 16:12:16 -05001948 * typedef <target_regtype> target_elf_greg_t;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001949 * #define ELF_NREG <number of registers>
Anthony Liguoric227f092009-10-01 16:12:16 -05001950 * typedef taret_elf_greg_t target_elf_gregset_t[ELF_NREG];
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001951 *
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001952 * Last step is to implement target specific function that copies registers
1953 * from given cpu into just specified register set. Prototype is:
1954 *
Anthony Liguoric227f092009-10-01 16:12:16 -05001955 * static void elf_core_copy_regs(taret_elf_gregset_t *regs,
Andreas Färber9349b4f2012-03-14 01:38:32 +01001956 * const CPUArchState *env);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001957 *
1958 * Parameters:
1959 * regs - copy register values into here (allocated and zeroed by caller)
1960 * env - copy registers from here
1961 *
1962 * Example for ARM target is provided in this file.
1963 */
1964
1965/* An ELF note in memory */
1966struct memelfnote {
1967 const char *name;
1968 size_t namesz;
1969 size_t namesz_rounded;
1970 int type;
1971 size_t datasz;
Laurent Vivier80f5ce72011-02-13 23:37:35 +01001972 size_t datasz_rounded;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001973 void *data;
1974 size_t notesz;
1975};
1976
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01001977struct target_elf_siginfo {
Laurent Vivier80f5ce72011-02-13 23:37:35 +01001978 target_int si_signo; /* signal number */
1979 target_int si_code; /* extra code */
1980 target_int si_errno; /* errno */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001981};
1982
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01001983struct target_elf_prstatus {
1984 struct target_elf_siginfo pr_info; /* Info associated with signal */
Laurent Vivier80f5ce72011-02-13 23:37:35 +01001985 target_short pr_cursig; /* Current signal */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001986 target_ulong pr_sigpend; /* XXX */
1987 target_ulong pr_sighold; /* XXX */
Anthony Liguoric227f092009-10-01 16:12:16 -05001988 target_pid_t pr_pid;
1989 target_pid_t pr_ppid;
1990 target_pid_t pr_pgrp;
1991 target_pid_t pr_sid;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001992 struct target_timeval pr_utime; /* XXX User time */
1993 struct target_timeval pr_stime; /* XXX System time */
1994 struct target_timeval pr_cutime; /* XXX Cumulative user time */
1995 struct target_timeval pr_cstime; /* XXX Cumulative system time */
Anthony Liguoric227f092009-10-01 16:12:16 -05001996 target_elf_gregset_t pr_reg; /* GP registers */
Laurent Vivier80f5ce72011-02-13 23:37:35 +01001997 target_int pr_fpvalid; /* XXX */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03001998};
1999
2000#define ELF_PRARGSZ (80) /* Number of chars for args */
2001
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002002struct target_elf_prpsinfo {
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002003 char pr_state; /* numeric process state */
2004 char pr_sname; /* char for pr_state */
2005 char pr_zomb; /* zombie */
2006 char pr_nice; /* nice val */
2007 target_ulong pr_flag; /* flags */
Anthony Liguoric227f092009-10-01 16:12:16 -05002008 target_uid_t pr_uid;
2009 target_gid_t pr_gid;
2010 target_pid_t pr_pid, pr_ppid, pr_pgrp, pr_sid;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002011 /* Lots missing */
2012 char pr_fname[16]; /* filename of executable */
2013 char pr_psargs[ELF_PRARGSZ]; /* initial part of arg list */
2014};
2015
2016/* Here is the structure in which status of each thread is captured. */
2017struct elf_thread_status {
Blue Swirl72cf2d42009-09-12 07:36:22 +00002018 QTAILQ_ENTRY(elf_thread_status) ets_link;
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002019 struct target_elf_prstatus prstatus; /* NT_PRSTATUS */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002020#if 0
2021 elf_fpregset_t fpu; /* NT_PRFPREG */
2022 struct task_struct *thread;
2023 elf_fpxregset_t xfpu; /* ELF_CORE_XFPREG_TYPE */
2024#endif
2025 struct memelfnote notes[1];
2026 int num_notes;
2027};
2028
2029struct elf_note_info {
2030 struct memelfnote *notes;
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002031 struct target_elf_prstatus *prstatus; /* NT_PRSTATUS */
2032 struct target_elf_prpsinfo *psinfo; /* NT_PRPSINFO */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002033
Blue Swirl72cf2d42009-09-12 07:36:22 +00002034 QTAILQ_HEAD(thread_list_head, elf_thread_status) thread_list;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002035#if 0
2036 /*
2037 * Current version of ELF coredump doesn't support
2038 * dumping fp regs etc.
2039 */
2040 elf_fpregset_t *fpu;
2041 elf_fpxregset_t *xfpu;
2042 int thread_status_size;
2043#endif
2044 int notes_size;
2045 int numnote;
2046};
2047
2048struct vm_area_struct {
2049 abi_ulong vma_start; /* start vaddr of memory region */
2050 abi_ulong vma_end; /* end vaddr of memory region */
2051 abi_ulong vma_flags; /* protection etc. flags for the region */
Blue Swirl72cf2d42009-09-12 07:36:22 +00002052 QTAILQ_ENTRY(vm_area_struct) vma_link;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002053};
2054
2055struct mm_struct {
Blue Swirl72cf2d42009-09-12 07:36:22 +00002056 QTAILQ_HEAD(, vm_area_struct) mm_mmap;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002057 int mm_count; /* number of mappings */
2058};
2059
2060static struct mm_struct *vma_init(void);
2061static void vma_delete(struct mm_struct *);
2062static int vma_add_mapping(struct mm_struct *, abi_ulong,
Richard Hendersond97ef722010-07-27 10:25:29 -07002063 abi_ulong, abi_ulong);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002064static int vma_get_mapping_count(const struct mm_struct *);
2065static struct vm_area_struct *vma_first(const struct mm_struct *);
2066static struct vm_area_struct *vma_next(struct vm_area_struct *);
2067static abi_ulong vma_dump_size(const struct vm_area_struct *);
Paul Brookb480d9b2010-03-12 23:23:29 +00002068static int vma_walker(void *priv, abi_ulong start, abi_ulong end,
Richard Hendersond97ef722010-07-27 10:25:29 -07002069 unsigned long flags);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002070
2071static void fill_elf_header(struct elfhdr *, int, uint16_t, uint32_t);
2072static void fill_note(struct memelfnote *, const char *, int,
Richard Hendersond97ef722010-07-27 10:25:29 -07002073 unsigned int, void *);
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002074static void fill_prstatus(struct target_elf_prstatus *, const TaskState *, int);
2075static int fill_psinfo(struct target_elf_prpsinfo *, const TaskState *);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002076static void fill_auxv_note(struct memelfnote *, const TaskState *);
2077static void fill_elf_note_phdr(struct elf_phdr *, int, off_t);
2078static size_t note_size(const struct memelfnote *);
2079static void free_note_info(struct elf_note_info *);
Andreas Färber9349b4f2012-03-14 01:38:32 +01002080static int fill_note_info(struct elf_note_info *, long, const CPUArchState *);
2081static void fill_thread_info(struct elf_note_info *, const CPUArchState *);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002082static int core_dump_filename(const TaskState *, char *, size_t);
2083
2084static int dump_write(int, const void *, size_t);
2085static int write_note(struct memelfnote *, int);
2086static int write_note_info(struct elf_note_info *, int);
2087
2088#ifdef BSWAP_NEEDED
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002089static void bswap_prstatus(struct target_elf_prstatus *prstatus)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002090{
2091 prstatus->pr_info.si_signo = tswapl(prstatus->pr_info.si_signo);
2092 prstatus->pr_info.si_code = tswapl(prstatus->pr_info.si_code);
2093 prstatus->pr_info.si_errno = tswapl(prstatus->pr_info.si_errno);
2094 prstatus->pr_cursig = tswap16(prstatus->pr_cursig);
2095 prstatus->pr_sigpend = tswapl(prstatus->pr_sigpend);
2096 prstatus->pr_sighold = tswapl(prstatus->pr_sighold);
2097 prstatus->pr_pid = tswap32(prstatus->pr_pid);
2098 prstatus->pr_ppid = tswap32(prstatus->pr_ppid);
2099 prstatus->pr_pgrp = tswap32(prstatus->pr_pgrp);
2100 prstatus->pr_sid = tswap32(prstatus->pr_sid);
2101 /* cpu times are not filled, so we skip them */
2102 /* regs should be in correct format already */
2103 prstatus->pr_fpvalid = tswap32(prstatus->pr_fpvalid);
2104}
2105
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002106static void bswap_psinfo(struct target_elf_prpsinfo *psinfo)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002107{
2108 psinfo->pr_flag = tswapl(psinfo->pr_flag);
2109 psinfo->pr_uid = tswap16(psinfo->pr_uid);
2110 psinfo->pr_gid = tswap16(psinfo->pr_gid);
2111 psinfo->pr_pid = tswap32(psinfo->pr_pid);
2112 psinfo->pr_ppid = tswap32(psinfo->pr_ppid);
2113 psinfo->pr_pgrp = tswap32(psinfo->pr_pgrp);
2114 psinfo->pr_sid = tswap32(psinfo->pr_sid);
2115}
Richard Henderson991f8f02010-07-27 10:25:32 -07002116
2117static void bswap_note(struct elf_note *en)
2118{
2119 bswap32s(&en->n_namesz);
2120 bswap32s(&en->n_descsz);
2121 bswap32s(&en->n_type);
2122}
2123#else
2124static inline void bswap_prstatus(struct target_elf_prstatus *p) { }
2125static inline void bswap_psinfo(struct target_elf_prpsinfo *p) {}
2126static inline void bswap_note(struct elf_note *en) { }
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002127#endif /* BSWAP_NEEDED */
2128
2129/*
2130 * Minimal support for linux memory regions. These are needed
2131 * when we are finding out what memory exactly belongs to
2132 * emulated process. No locks needed here, as long as
2133 * thread that received the signal is stopped.
2134 */
2135
2136static struct mm_struct *vma_init(void)
2137{
2138 struct mm_struct *mm;
2139
Anthony Liguori7267c092011-08-20 22:09:37 -05002140 if ((mm = g_malloc(sizeof (*mm))) == NULL)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002141 return (NULL);
2142
2143 mm->mm_count = 0;
Blue Swirl72cf2d42009-09-12 07:36:22 +00002144 QTAILQ_INIT(&mm->mm_mmap);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002145
2146 return (mm);
2147}
2148
2149static void vma_delete(struct mm_struct *mm)
2150{
2151 struct vm_area_struct *vma;
2152
2153 while ((vma = vma_first(mm)) != NULL) {
Blue Swirl72cf2d42009-09-12 07:36:22 +00002154 QTAILQ_REMOVE(&mm->mm_mmap, vma, vma_link);
Anthony Liguori7267c092011-08-20 22:09:37 -05002155 g_free(vma);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002156 }
Anthony Liguori7267c092011-08-20 22:09:37 -05002157 g_free(mm);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002158}
2159
2160static int vma_add_mapping(struct mm_struct *mm, abi_ulong start,
Richard Hendersond97ef722010-07-27 10:25:29 -07002161 abi_ulong end, abi_ulong flags)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002162{
2163 struct vm_area_struct *vma;
2164
Anthony Liguori7267c092011-08-20 22:09:37 -05002165 if ((vma = g_malloc0(sizeof (*vma))) == NULL)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002166 return (-1);
2167
2168 vma->vma_start = start;
2169 vma->vma_end = end;
2170 vma->vma_flags = flags;
2171
Blue Swirl72cf2d42009-09-12 07:36:22 +00002172 QTAILQ_INSERT_TAIL(&mm->mm_mmap, vma, vma_link);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002173 mm->mm_count++;
2174
2175 return (0);
2176}
2177
2178static struct vm_area_struct *vma_first(const struct mm_struct *mm)
2179{
Blue Swirl72cf2d42009-09-12 07:36:22 +00002180 return (QTAILQ_FIRST(&mm->mm_mmap));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002181}
2182
2183static struct vm_area_struct *vma_next(struct vm_area_struct *vma)
2184{
Blue Swirl72cf2d42009-09-12 07:36:22 +00002185 return (QTAILQ_NEXT(vma, vma_link));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002186}
2187
2188static int vma_get_mapping_count(const struct mm_struct *mm)
2189{
2190 return (mm->mm_count);
2191}
2192
2193/*
2194 * Calculate file (dump) size of given memory region.
2195 */
2196static abi_ulong vma_dump_size(const struct vm_area_struct *vma)
2197{
2198 /* if we cannot even read the first page, skip it */
2199 if (!access_ok(VERIFY_READ, vma->vma_start, TARGET_PAGE_SIZE))
2200 return (0);
2201
2202 /*
2203 * Usually we don't dump executable pages as they contain
2204 * non-writable code that debugger can read directly from
2205 * target library etc. However, thread stacks are marked
2206 * also executable so we read in first page of given region
2207 * and check whether it contains elf header. If there is
2208 * no elf header, we dump it.
2209 */
2210 if (vma->vma_flags & PROT_EXEC) {
2211 char page[TARGET_PAGE_SIZE];
2212
2213 copy_from_user(page, vma->vma_start, sizeof (page));
2214 if ((page[EI_MAG0] == ELFMAG0) &&
2215 (page[EI_MAG1] == ELFMAG1) &&
2216 (page[EI_MAG2] == ELFMAG2) &&
2217 (page[EI_MAG3] == ELFMAG3)) {
2218 /*
2219 * Mappings are possibly from ELF binary. Don't dump
2220 * them.
2221 */
2222 return (0);
2223 }
2224 }
2225
2226 return (vma->vma_end - vma->vma_start);
2227}
2228
Paul Brookb480d9b2010-03-12 23:23:29 +00002229static int vma_walker(void *priv, abi_ulong start, abi_ulong end,
Richard Hendersond97ef722010-07-27 10:25:29 -07002230 unsigned long flags)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002231{
2232 struct mm_struct *mm = (struct mm_struct *)priv;
2233
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002234 vma_add_mapping(mm, start, end, flags);
2235 return (0);
2236}
2237
2238static void fill_note(struct memelfnote *note, const char *name, int type,
Richard Hendersond97ef722010-07-27 10:25:29 -07002239 unsigned int sz, void *data)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002240{
2241 unsigned int namesz;
2242
2243 namesz = strlen(name) + 1;
2244 note->name = name;
2245 note->namesz = namesz;
2246 note->namesz_rounded = roundup(namesz, sizeof (int32_t));
2247 note->type = type;
Laurent Vivier80f5ce72011-02-13 23:37:35 +01002248 note->datasz = sz;
2249 note->datasz_rounded = roundup(sz, sizeof (int32_t));
2250
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002251 note->data = data;
2252
2253 /*
2254 * We calculate rounded up note size here as specified by
2255 * ELF document.
2256 */
2257 note->notesz = sizeof (struct elf_note) +
Laurent Vivier80f5ce72011-02-13 23:37:35 +01002258 note->namesz_rounded + note->datasz_rounded;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002259}
2260
2261static void fill_elf_header(struct elfhdr *elf, int segs, uint16_t machine,
Richard Hendersond97ef722010-07-27 10:25:29 -07002262 uint32_t flags)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002263{
2264 (void) memset(elf, 0, sizeof(*elf));
2265
2266 (void) memcpy(elf->e_ident, ELFMAG, SELFMAG);
2267 elf->e_ident[EI_CLASS] = ELF_CLASS;
2268 elf->e_ident[EI_DATA] = ELF_DATA;
2269 elf->e_ident[EI_VERSION] = EV_CURRENT;
2270 elf->e_ident[EI_OSABI] = ELF_OSABI;
2271
2272 elf->e_type = ET_CORE;
2273 elf->e_machine = machine;
2274 elf->e_version = EV_CURRENT;
2275 elf->e_phoff = sizeof(struct elfhdr);
2276 elf->e_flags = flags;
2277 elf->e_ehsize = sizeof(struct elfhdr);
2278 elf->e_phentsize = sizeof(struct elf_phdr);
2279 elf->e_phnum = segs;
2280
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002281 bswap_ehdr(elf);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002282}
2283
2284static void fill_elf_note_phdr(struct elf_phdr *phdr, int sz, off_t offset)
2285{
2286 phdr->p_type = PT_NOTE;
2287 phdr->p_offset = offset;
2288 phdr->p_vaddr = 0;
2289 phdr->p_paddr = 0;
2290 phdr->p_filesz = sz;
2291 phdr->p_memsz = 0;
2292 phdr->p_flags = 0;
2293 phdr->p_align = 0;
2294
Richard Henderson991f8f02010-07-27 10:25:32 -07002295 bswap_phdr(phdr, 1);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002296}
2297
2298static size_t note_size(const struct memelfnote *note)
2299{
2300 return (note->notesz);
2301}
2302
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002303static void fill_prstatus(struct target_elf_prstatus *prstatus,
Richard Hendersond97ef722010-07-27 10:25:29 -07002304 const TaskState *ts, int signr)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002305{
2306 (void) memset(prstatus, 0, sizeof (*prstatus));
2307 prstatus->pr_info.si_signo = prstatus->pr_cursig = signr;
2308 prstatus->pr_pid = ts->ts_tid;
2309 prstatus->pr_ppid = getppid();
2310 prstatus->pr_pgrp = getpgrp();
2311 prstatus->pr_sid = getsid(0);
2312
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002313 bswap_prstatus(prstatus);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002314}
2315
Laurent Desnoguesa2547a12009-07-17 13:33:41 +01002316static int fill_psinfo(struct target_elf_prpsinfo *psinfo, const TaskState *ts)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002317{
2318 char *filename, *base_filename;
2319 unsigned int i, len;
2320
2321 (void) memset(psinfo, 0, sizeof (*psinfo));
2322
2323 len = ts->info->arg_end - ts->info->arg_start;
2324 if (len >= ELF_PRARGSZ)
2325 len = ELF_PRARGSZ - 1;
2326 if (copy_from_user(&psinfo->pr_psargs, ts->info->arg_start, len))
2327 return -EFAULT;
2328 for (i = 0; i < len; i++)
2329 if (psinfo->pr_psargs[i] == 0)
2330 psinfo->pr_psargs[i] = ' ';
2331 psinfo->pr_psargs[len] = 0;
2332
2333 psinfo->pr_pid = getpid();
2334 psinfo->pr_ppid = getppid();
2335 psinfo->pr_pgrp = getpgrp();
2336 psinfo->pr_sid = getsid(0);
2337 psinfo->pr_uid = getuid();
2338 psinfo->pr_gid = getgid();
2339
2340 filename = strdup(ts->bprm->filename);
2341 base_filename = strdup(basename(filename));
2342 (void) strncpy(psinfo->pr_fname, base_filename,
Richard Hendersond97ef722010-07-27 10:25:29 -07002343 sizeof(psinfo->pr_fname));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002344 free(base_filename);
2345 free(filename);
2346
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002347 bswap_psinfo(psinfo);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002348 return (0);
2349}
2350
2351static void fill_auxv_note(struct memelfnote *note, const TaskState *ts)
2352{
2353 elf_addr_t auxv = (elf_addr_t)ts->info->saved_auxv;
2354 elf_addr_t orig_auxv = auxv;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002355 void *ptr;
Alexander Graf125b0f52012-01-28 21:12:14 +02002356 int len = ts->info->auxv_len;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002357
2358 /*
2359 * Auxiliary vector is stored in target process stack. It contains
2360 * {type, value} pairs that we need to dump into note. This is not
2361 * strictly necessary but we do it here for sake of completeness.
2362 */
2363
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002364 /* read in whole auxv vector and copy it to memelfnote */
2365 ptr = lock_user(VERIFY_READ, orig_auxv, len, 0);
2366 if (ptr != NULL) {
2367 fill_note(note, "CORE", NT_AUXV, len, ptr);
2368 unlock_user(ptr, auxv, len);
2369 }
2370}
2371
2372/*
2373 * Constructs name of coredump file. We have following convention
2374 * for the name:
2375 * qemu_<basename-of-target-binary>_<date>-<time>_<pid>.core
2376 *
2377 * Returns 0 in case of success, -1 otherwise (errno is set).
2378 */
2379static int core_dump_filename(const TaskState *ts, char *buf,
Richard Hendersond97ef722010-07-27 10:25:29 -07002380 size_t bufsize)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002381{
2382 char timestamp[64];
2383 char *filename = NULL;
2384 char *base_filename = NULL;
2385 struct timeval tv;
2386 struct tm tm;
2387
2388 assert(bufsize >= PATH_MAX);
2389
2390 if (gettimeofday(&tv, NULL) < 0) {
2391 (void) fprintf(stderr, "unable to get current timestamp: %s",
Richard Hendersond97ef722010-07-27 10:25:29 -07002392 strerror(errno));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002393 return (-1);
2394 }
2395
2396 filename = strdup(ts->bprm->filename);
2397 base_filename = strdup(basename(filename));
2398 (void) strftime(timestamp, sizeof (timestamp), "%Y%m%d-%H%M%S",
Richard Hendersond97ef722010-07-27 10:25:29 -07002399 localtime_r(&tv.tv_sec, &tm));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002400 (void) snprintf(buf, bufsize, "qemu_%s_%s_%d.core",
Richard Hendersond97ef722010-07-27 10:25:29 -07002401 base_filename, timestamp, (int)getpid());
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002402 free(base_filename);
2403 free(filename);
2404
2405 return (0);
2406}
2407
2408static int dump_write(int fd, const void *ptr, size_t size)
2409{
2410 const char *bufp = (const char *)ptr;
2411 ssize_t bytes_written, bytes_left;
2412 struct rlimit dumpsize;
2413 off_t pos;
2414
2415 bytes_written = 0;
2416 getrlimit(RLIMIT_CORE, &dumpsize);
2417 if ((pos = lseek(fd, 0, SEEK_CUR))==-1) {
2418 if (errno == ESPIPE) { /* not a seekable stream */
2419 bytes_left = size;
2420 } else {
2421 return pos;
2422 }
2423 } else {
2424 if (dumpsize.rlim_cur <= pos) {
2425 return -1;
2426 } else if (dumpsize.rlim_cur == RLIM_INFINITY) {
2427 bytes_left = size;
2428 } else {
2429 size_t limit_left=dumpsize.rlim_cur - pos;
2430 bytes_left = limit_left >= size ? size : limit_left ;
2431 }
2432 }
2433
2434 /*
2435 * In normal conditions, single write(2) should do but
2436 * in case of socket etc. this mechanism is more portable.
2437 */
2438 do {
2439 bytes_written = write(fd, bufp, bytes_left);
2440 if (bytes_written < 0) {
2441 if (errno == EINTR)
2442 continue;
2443 return (-1);
2444 } else if (bytes_written == 0) { /* eof */
2445 return (-1);
2446 }
2447 bufp += bytes_written;
2448 bytes_left -= bytes_written;
2449 } while (bytes_left > 0);
2450
2451 return (0);
2452}
2453
2454static int write_note(struct memelfnote *men, int fd)
2455{
2456 struct elf_note en;
2457
2458 en.n_namesz = men->namesz;
2459 en.n_type = men->type;
2460 en.n_descsz = men->datasz;
2461
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002462 bswap_note(&en);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002463
2464 if (dump_write(fd, &en, sizeof(en)) != 0)
2465 return (-1);
2466 if (dump_write(fd, men->name, men->namesz_rounded) != 0)
2467 return (-1);
Laurent Vivier80f5ce72011-02-13 23:37:35 +01002468 if (dump_write(fd, men->data, men->datasz_rounded) != 0)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002469 return (-1);
2470
2471 return (0);
2472}
2473
Andreas Färber9349b4f2012-03-14 01:38:32 +01002474static void fill_thread_info(struct elf_note_info *info, const CPUArchState *env)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002475{
2476 TaskState *ts = (TaskState *)env->opaque;
2477 struct elf_thread_status *ets;
2478
Anthony Liguori7267c092011-08-20 22:09:37 -05002479 ets = g_malloc0(sizeof (*ets));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002480 ets->num_notes = 1; /* only prstatus is dumped */
2481 fill_prstatus(&ets->prstatus, ts, 0);
2482 elf_core_copy_regs(&ets->prstatus.pr_reg, env);
2483 fill_note(&ets->notes[0], "CORE", NT_PRSTATUS, sizeof (ets->prstatus),
Richard Hendersond97ef722010-07-27 10:25:29 -07002484 &ets->prstatus);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002485
Blue Swirl72cf2d42009-09-12 07:36:22 +00002486 QTAILQ_INSERT_TAIL(&info->thread_list, ets, ets_link);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002487
2488 info->notes_size += note_size(&ets->notes[0]);
2489}
2490
2491static int fill_note_info(struct elf_note_info *info,
Andreas Färber9349b4f2012-03-14 01:38:32 +01002492 long signr, const CPUArchState *env)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002493{
2494#define NUMNOTES 3
Andreas Färber9349b4f2012-03-14 01:38:32 +01002495 CPUArchState *cpu = NULL;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002496 TaskState *ts = (TaskState *)env->opaque;
2497 int i;
2498
2499 (void) memset(info, 0, sizeof (*info));
2500
Blue Swirl72cf2d42009-09-12 07:36:22 +00002501 QTAILQ_INIT(&info->thread_list);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002502
Anthony Liguori7267c092011-08-20 22:09:37 -05002503 info->notes = g_malloc0(NUMNOTES * sizeof (struct memelfnote));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002504 if (info->notes == NULL)
2505 return (-ENOMEM);
Anthony Liguori7267c092011-08-20 22:09:37 -05002506 info->prstatus = g_malloc0(sizeof (*info->prstatus));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002507 if (info->prstatus == NULL)
2508 return (-ENOMEM);
Anthony Liguori7267c092011-08-20 22:09:37 -05002509 info->psinfo = g_malloc0(sizeof (*info->psinfo));
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002510 if (info->prstatus == NULL)
2511 return (-ENOMEM);
2512
2513 /*
2514 * First fill in status (and registers) of current thread
2515 * including process info & aux vector.
2516 */
2517 fill_prstatus(info->prstatus, ts, signr);
2518 elf_core_copy_regs(&info->prstatus->pr_reg, env);
2519 fill_note(&info->notes[0], "CORE", NT_PRSTATUS,
Richard Hendersond97ef722010-07-27 10:25:29 -07002520 sizeof (*info->prstatus), info->prstatus);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002521 fill_psinfo(info->psinfo, ts);
2522 fill_note(&info->notes[1], "CORE", NT_PRPSINFO,
Richard Hendersond97ef722010-07-27 10:25:29 -07002523 sizeof (*info->psinfo), info->psinfo);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002524 fill_auxv_note(&info->notes[2], ts);
2525 info->numnote = 3;
2526
2527 info->notes_size = 0;
2528 for (i = 0; i < info->numnote; i++)
2529 info->notes_size += note_size(&info->notes[i]);
2530
2531 /* read and fill status of all threads */
2532 cpu_list_lock();
2533 for (cpu = first_cpu; cpu != NULL; cpu = cpu->next_cpu) {
2534 if (cpu == thread_env)
2535 continue;
2536 fill_thread_info(info, cpu);
2537 }
2538 cpu_list_unlock();
2539
2540 return (0);
2541}
2542
2543static void free_note_info(struct elf_note_info *info)
2544{
2545 struct elf_thread_status *ets;
2546
Blue Swirl72cf2d42009-09-12 07:36:22 +00002547 while (!QTAILQ_EMPTY(&info->thread_list)) {
2548 ets = QTAILQ_FIRST(&info->thread_list);
2549 QTAILQ_REMOVE(&info->thread_list, ets, ets_link);
Anthony Liguori7267c092011-08-20 22:09:37 -05002550 g_free(ets);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002551 }
2552
Anthony Liguori7267c092011-08-20 22:09:37 -05002553 g_free(info->prstatus);
2554 g_free(info->psinfo);
2555 g_free(info->notes);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002556}
2557
2558static int write_note_info(struct elf_note_info *info, int fd)
2559{
2560 struct elf_thread_status *ets;
2561 int i, error = 0;
2562
2563 /* write prstatus, psinfo and auxv for current thread */
2564 for (i = 0; i < info->numnote; i++)
2565 if ((error = write_note(&info->notes[i], fd)) != 0)
2566 return (error);
2567
2568 /* write prstatus for each thread */
2569 for (ets = info->thread_list.tqh_first; ets != NULL;
Richard Hendersond97ef722010-07-27 10:25:29 -07002570 ets = ets->ets_link.tqe_next) {
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002571 if ((error = write_note(&ets->notes[0], fd)) != 0)
2572 return (error);
2573 }
2574
2575 return (0);
2576}
2577
2578/*
2579 * Write out ELF coredump.
2580 *
2581 * See documentation of ELF object file format in:
2582 * http://www.caldera.com/developers/devspecs/gabi41.pdf
2583 *
2584 * Coredump format in linux is following:
2585 *
2586 * 0 +----------------------+ \
2587 * | ELF header | ET_CORE |
2588 * +----------------------+ |
2589 * | ELF program headers | |--- headers
2590 * | - NOTE section | |
2591 * | - PT_LOAD sections | |
2592 * +----------------------+ /
2593 * | NOTEs: |
2594 * | - NT_PRSTATUS |
2595 * | - NT_PRSINFO |
2596 * | - NT_AUXV |
2597 * +----------------------+ <-- aligned to target page
2598 * | Process memory dump |
2599 * : :
2600 * . .
2601 * : :
2602 * | |
2603 * +----------------------+
2604 *
2605 * NT_PRSTATUS -> struct elf_prstatus (per thread)
2606 * NT_PRSINFO -> struct elf_prpsinfo
2607 * NT_AUXV is array of { type, value } pairs (see fill_auxv_note()).
2608 *
2609 * Format follows System V format as close as possible. Current
2610 * version limitations are as follows:
2611 * - no floating point registers are dumped
2612 *
2613 * Function returns 0 in case of success, negative errno otherwise.
2614 *
2615 * TODO: make this work also during runtime: it should be
2616 * possible to force coredump from running process and then
2617 * continue processing. For example qemu could set up SIGUSR2
2618 * handler (provided that target process haven't registered
2619 * handler for that) that does the dump when signal is received.
2620 */
Andreas Färber9349b4f2012-03-14 01:38:32 +01002621static int elf_core_dump(int signr, const CPUArchState *env)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002622{
2623 const TaskState *ts = (const TaskState *)env->opaque;
2624 struct vm_area_struct *vma = NULL;
2625 char corefile[PATH_MAX];
2626 struct elf_note_info info;
2627 struct elfhdr elf;
2628 struct elf_phdr phdr;
2629 struct rlimit dumpsize;
2630 struct mm_struct *mm = NULL;
2631 off_t offset = 0, data_offset = 0;
2632 int segs = 0;
2633 int fd = -1;
2634
2635 errno = 0;
2636 getrlimit(RLIMIT_CORE, &dumpsize);
2637 if (dumpsize.rlim_cur == 0)
Richard Hendersond97ef722010-07-27 10:25:29 -07002638 return 0;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002639
2640 if (core_dump_filename(ts, corefile, sizeof (corefile)) < 0)
2641 return (-errno);
2642
2643 if ((fd = open(corefile, O_WRONLY | O_CREAT,
Richard Hendersond97ef722010-07-27 10:25:29 -07002644 S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH)) < 0)
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002645 return (-errno);
2646
2647 /*
2648 * Walk through target process memory mappings and
2649 * set up structure containing this information. After
2650 * this point vma_xxx functions can be used.
2651 */
2652 if ((mm = vma_init()) == NULL)
2653 goto out;
2654
2655 walk_memory_regions(mm, vma_walker);
2656 segs = vma_get_mapping_count(mm);
2657
2658 /*
2659 * Construct valid coredump ELF header. We also
2660 * add one more segment for notes.
2661 */
2662 fill_elf_header(&elf, segs + 1, ELF_MACHINE, 0);
2663 if (dump_write(fd, &elf, sizeof (elf)) != 0)
2664 goto out;
2665
2666 /* fill in in-memory version of notes */
2667 if (fill_note_info(&info, signr, env) < 0)
2668 goto out;
2669
2670 offset += sizeof (elf); /* elf header */
2671 offset += (segs + 1) * sizeof (struct elf_phdr); /* program headers */
2672
2673 /* write out notes program header */
2674 fill_elf_note_phdr(&phdr, info.notes_size, offset);
2675
2676 offset += info.notes_size;
2677 if (dump_write(fd, &phdr, sizeof (phdr)) != 0)
2678 goto out;
2679
2680 /*
2681 * ELF specification wants data to start at page boundary so
2682 * we align it here.
2683 */
Laurent Vivier80f5ce72011-02-13 23:37:35 +01002684 data_offset = offset = roundup(offset, ELF_EXEC_PAGESIZE);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002685
2686 /*
2687 * Write program headers for memory regions mapped in
2688 * the target process.
2689 */
2690 for (vma = vma_first(mm); vma != NULL; vma = vma_next(vma)) {
2691 (void) memset(&phdr, 0, sizeof (phdr));
2692
2693 phdr.p_type = PT_LOAD;
2694 phdr.p_offset = offset;
2695 phdr.p_vaddr = vma->vma_start;
2696 phdr.p_paddr = 0;
2697 phdr.p_filesz = vma_dump_size(vma);
2698 offset += phdr.p_filesz;
2699 phdr.p_memsz = vma->vma_end - vma->vma_start;
2700 phdr.p_flags = vma->vma_flags & PROT_READ ? PF_R : 0;
2701 if (vma->vma_flags & PROT_WRITE)
2702 phdr.p_flags |= PF_W;
2703 if (vma->vma_flags & PROT_EXEC)
2704 phdr.p_flags |= PF_X;
2705 phdr.p_align = ELF_EXEC_PAGESIZE;
2706
Laurent Vivier80f5ce72011-02-13 23:37:35 +01002707 bswap_phdr(&phdr, 1);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002708 dump_write(fd, &phdr, sizeof (phdr));
2709 }
2710
2711 /*
2712 * Next we write notes just after program headers. No
2713 * alignment needed here.
2714 */
2715 if (write_note_info(&info, fd) < 0)
2716 goto out;
2717
2718 /* align data to page boundary */
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002719 if (lseek(fd, data_offset, SEEK_SET) != data_offset)
2720 goto out;
2721
2722 /*
2723 * Finally we can dump process memory into corefile as well.
2724 */
2725 for (vma = vma_first(mm); vma != NULL; vma = vma_next(vma)) {
2726 abi_ulong addr;
2727 abi_ulong end;
2728
2729 end = vma->vma_start + vma_dump_size(vma);
2730
2731 for (addr = vma->vma_start; addr < end;
Richard Hendersond97ef722010-07-27 10:25:29 -07002732 addr += TARGET_PAGE_SIZE) {
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002733 char page[TARGET_PAGE_SIZE];
2734 int error;
2735
2736 /*
2737 * Read in page from target process memory and
2738 * write it to coredump file.
2739 */
2740 error = copy_from_user(page, addr, sizeof (page));
2741 if (error != 0) {
Aurelien Jarno49995e12009-12-19 20:28:23 +01002742 (void) fprintf(stderr, "unable to dump " TARGET_ABI_FMT_lx "\n",
Richard Hendersond97ef722010-07-27 10:25:29 -07002743 addr);
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002744 errno = -error;
2745 goto out;
2746 }
2747 if (dump_write(fd, page, TARGET_PAGE_SIZE) < 0)
2748 goto out;
2749 }
2750 }
2751
Richard Hendersond97ef722010-07-27 10:25:29 -07002752 out:
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002753 free_note_info(&info);
2754 if (mm != NULL)
2755 vma_delete(mm);
2756 (void) close(fd);
2757
2758 if (errno != 0)
2759 return (-errno);
2760 return (0);
2761}
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03002762#endif /* USE_ELF_CORE_DUMP */
2763
pbrooke5fe0c52006-06-11 13:32:59 +00002764void do_init_thread(struct target_pt_regs *regs, struct image_info *infop)
2765{
2766 init_thread(regs, infop);
2767}