Blame view
fs/binfmt_flat.c
28.2 KB
b24413180
|
1 |
// SPDX-License-Identifier: GPL-2.0 |
1da177e4c
|
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 |
/****************************************************************************/ /* * linux/fs/binfmt_flat.c * * Copyright (C) 2000-2003 David McCullough <davidm@snapgear.com> * Copyright (C) 2002 Greg Ungerer <gerg@snapgear.com> * Copyright (C) 2002 SnapGear, by Paul Dale <pauli@snapgear.com> * Copyright (C) 2000, 2001 Lineo, by David McCullough <davidm@lineo.com> * based heavily on: * * linux/fs/binfmt_aout.c: * Copyright (C) 1991, 1992, 1996 Linus Torvalds * linux/fs/binfmt_flat.c for 2.0 kernel * Copyright (C) 1998 Kenneth Albanowski <kjahds@kjahds.com> * JAN/99 -- coded full program relocation (gerg@snapgear.com) */ |
4adbb6ac4
|
18 |
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
1da177e4c
|
19 20 |
#include <linux/kernel.h> #include <linux/sched.h> |
68db0cf10
|
21 |
#include <linux/sched/task_stack.h> |
1da177e4c
|
22 23 |
#include <linux/mm.h> #include <linux/mman.h> |
1da177e4c
|
24 25 26 27 28 |
#include <linux/errno.h> #include <linux/signal.h> #include <linux/string.h> #include <linux/fs.h> #include <linux/file.h> |
1da177e4c
|
29 30 31 32 33 34 35 |
#include <linux/ptrace.h> #include <linux/user.h> #include <linux/slab.h> #include <linux/binfmts.h> #include <linux/personality.h> #include <linux/init.h> #include <linux/flat.h> |
13c3f50c9
|
36 |
#include <linux/uaccess.h> |
472f95f32
|
37 |
#include <linux/vmalloc.h> |
1da177e4c
|
38 39 |
#include <asm/byteorder.h> |
1da177e4c
|
40 41 |
#include <asm/unaligned.h> #include <asm/cacheflush.h> |
c3dc5bec0
|
42 |
#include <asm/page.h> |
06d2bfedd
|
43 |
#include <asm/flat.h> |
1da177e4c
|
44 |
|
02da28330
|
45 46 47 |
#ifndef flat_get_relocate_addr #define flat_get_relocate_addr(rel) (rel) #endif |
1da177e4c
|
48 49 |
/****************************************************************************/ |
c3dc5bec0
|
50 |
/* |
2e94de8ac
|
51 52 53 54 55 56 57 58 59 60 61 |
* User data (data section and bss) needs to be aligned. * We pick 0x20 here because it is the max value elf2flt has always * used in producing FLAT files, and because it seems to be large * enough to make all the gcc alignment related tests happy. */ #define FLAT_DATA_ALIGN (0x20) /* * User data (stack) also needs to be aligned. * Here we can be a bit looser than the data sections since this * needs to only meet arch ABI requirements. |
c3dc5bec0
|
62 |
*/ |
2952095c6
|
63 |
#define FLAT_STACK_ALIGN max_t(unsigned long, sizeof(void *), ARCH_SLAB_MINALIGN) |
c3dc5bec0
|
64 |
|
1da177e4c
|
65 66 |
#define RELOC_FAILED 0xff00ff01 /* Relocation incorrect somewhere */ #define UNLOADED_LIB 0x7ff000ff /* Placeholder for unused library */ |
a445d988b
|
67 68 69 70 71 |
#ifdef CONFIG_BINFMT_SHARED_FLAT #define MAX_SHARED_LIBS (4) #else #define MAX_SHARED_LIBS (1) #endif |
1da177e4c
|
72 73 74 75 76 77 78 79 |
struct lib_info { struct { unsigned long start_code; /* Start of text segment */ unsigned long start_data; /* Start of data segment */ unsigned long start_brk; /* End of data segment */ unsigned long text_len; /* Length of text segment */ unsigned long entry; /* Start address for this module */ unsigned long build_date; /* When this one was compiled */ |
13c3f50c9
|
80 |
bool loaded; /* Has this library been loaded? */ |
1da177e4c
|
81 82 83 84 85 86 |
} lib_list[MAX_SHARED_LIBS]; }; #ifdef CONFIG_BINFMT_SHARED_FLAT static int load_flat_shared_library(int id, struct lib_info *p); #endif |
71613c3b8
|
87 |
static int load_flat_binary(struct linux_binprm *); |
f6151dfea
|
88 |
static int flat_core_dump(struct coredump_params *cprm); |
1da177e4c
|
89 |
|
1da177e4c
|
90 91 92 93 94 95 96 97 98 99 100 101 |
static struct linux_binfmt flat_format = { .module = THIS_MODULE, .load_binary = load_flat_binary, .core_dump = flat_core_dump, .min_coredump = PAGE_SIZE }; /****************************************************************************/ /* * Routine writes a core dump image in the current directory. * Currently only a stub-function. */ |
f6151dfea
|
102 |
static int flat_core_dump(struct coredump_params *cprm) |
1da177e4c
|
103 |
{ |
4adbb6ac4
|
104 105 106 |
pr_warn("Process %s:%d received signr %d and should have core dumped ", current->comm, current->pid, cprm->siginfo->si_signo); |
13c3f50c9
|
107 |
return 1; |
1da177e4c
|
108 109 110 111 112 113 |
} /****************************************************************************/ /* * create_flat_tables() parses the env- and arg-strings in new user * memory and creates the pointer tables from them, and puts their |
a97d157d0
|
114 |
* addresses on the "stack", recording the new stack pointer value. |
1da177e4c
|
115 |
*/ |
a97d157d0
|
116 |
static int create_flat_tables(struct linux_binprm *bprm, unsigned long arg_start) |
1da177e4c
|
117 |
{ |
a97d157d0
|
118 119 120 |
char __user *p; unsigned long __user *sp; long i, len; |
1da177e4c
|
121 |
|
a97d157d0
|
122 123 124 125 126 |
p = (char __user *)arg_start; sp = (unsigned long __user *)current->mm->start_stack; sp -= bprm->envc + 1; sp -= bprm->argc + 1; |
bdd15a288
|
127 128 |
if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK)) sp -= 2; /* argvp + envp */ |
a97d157d0
|
129 130 131 132 133 134 |
sp -= 1; /* &argc */ current->mm->start_stack = (unsigned long)sp & -FLAT_STACK_ALIGN; sp = (unsigned long __user *)current->mm->start_stack; __put_user(bprm->argc, sp++); |
bdd15a288
|
135 |
if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK)) { |
a97d157d0
|
136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 |
unsigned long argv, envp; argv = (unsigned long)(sp + 2); envp = (unsigned long)(sp + 2 + bprm->argc + 1); __put_user(argv, sp++); __put_user(envp, sp++); } current->mm->arg_start = (unsigned long)p; for (i = bprm->argc; i > 0; i--) { __put_user((unsigned long)p, sp++); len = strnlen_user(p, MAX_ARG_STRLEN); if (!len || len > MAX_ARG_STRLEN) return -EINVAL; p += len; } __put_user(0, sp++); current->mm->arg_end = (unsigned long)p; current->mm->env_start = (unsigned long) p; for (i = bprm->envc; i > 0; i--) { __put_user((unsigned long)p, sp++); len = strnlen_user(p, MAX_ARG_STRLEN); if (!len || len > MAX_ARG_STRLEN) return -EINVAL; p += len; } __put_user(0, sp++); current->mm->env_end = (unsigned long)p; return 0; |
1da177e4c
|
166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 |
} /****************************************************************************/ #ifdef CONFIG_BINFMT_ZFLAT #include <linux/zlib.h> #define LBUFSIZE 4000 /* gzip flag byte */ #define ASCII_FLAG 0x01 /* bit 0 set: file probably ASCII text */ #define CONTINUATION 0x02 /* bit 1 set: continuation of multi-part gzip file */ #define EXTRA_FIELD 0x04 /* bit 2 set: extra field present */ #define ORIG_NAME 0x08 /* bit 3 set: original file name present */ #define COMMENT 0x10 /* bit 4 set: file comment present */ #define ENCRYPTED 0x20 /* bit 5 set: file is encrypted */ #define RESERVED 0xC0 /* bit 6,7: reserved */ |
bdd1d2d3d
|
184 185 |
static int decompress_exec(struct linux_binprm *bprm, loff_t fpos, char *dst, long len, int fd) |
1da177e4c
|
186 187 188 |
{ unsigned char *buf; z_stream strm; |
1da177e4c
|
189 |
int ret, retval; |
bdd1d2d3d
|
190 191 |
pr_debug("decompress_exec(offset=%llx,buf=%p,len=%lx) ", fpos, dst, len); |
1da177e4c
|
192 193 194 |
memset(&strm, 0, sizeof(strm)); strm.workspace = kmalloc(zlib_inflate_workspacesize(), GFP_KERNEL); |
9367bb730
|
195 |
if (!strm.workspace) |
1da177e4c
|
196 |
return -ENOMEM; |
9367bb730
|
197 |
|
1da177e4c
|
198 |
buf = kmalloc(LBUFSIZE, GFP_KERNEL); |
9367bb730
|
199 |
if (!buf) { |
1da177e4c
|
200 201 202 203 204 |
retval = -ENOMEM; goto out_free; } /* Read in first chunk of data and parse gzip header. */ |
bdd1d2d3d
|
205 |
ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos); |
1da177e4c
|
206 207 208 209 210 211 212 213 214 |
strm.next_in = buf; strm.avail_in = ret; strm.total_in = 0; retval = -ENOEXEC; /* Check minimum size -- gzip header */ if (ret < 10) { |
4adbb6ac4
|
215 216 |
pr_debug("file too small? "); |
1da177e4c
|
217 218 219 220 221 |
goto out_free_buf; } /* Check gzip magic number */ if ((buf[0] != 037) || ((buf[1] != 0213) && (buf[1] != 0236))) { |
4adbb6ac4
|
222 223 |
pr_debug("unknown compression magic? "); |
1da177e4c
|
224 225 226 227 228 |
goto out_free_buf; } /* Check gzip method */ if (buf[2] != 8) { |
4adbb6ac4
|
229 230 |
pr_debug("unknown compression method? "); |
1da177e4c
|
231 232 233 234 235 |
goto out_free_buf; } /* Check gzip flags */ if ((buf[3] & ENCRYPTED) || (buf[3] & CONTINUATION) || (buf[3] & RESERVED)) { |
4adbb6ac4
|
236 237 |
pr_debug("unknown flags? "); |
1da177e4c
|
238 239 240 241 242 243 |
goto out_free_buf; } ret = 10; if (buf[3] & EXTRA_FIELD) { ret += 2 + buf[10] + (buf[11] << 8); |
13c3f50c9
|
244 |
if (unlikely(ret >= LBUFSIZE)) { |
4adbb6ac4
|
245 246 |
pr_debug("buffer overflow (EXTRA)? "); |
1da177e4c
|
247 248 249 250 |
goto out_free_buf; } } if (buf[3] & ORIG_NAME) { |
f4cfb18d7
|
251 |
while (ret < LBUFSIZE && buf[ret++] != 0) |
1da177e4c
|
252 |
; |
13c3f50c9
|
253 |
if (unlikely(ret == LBUFSIZE)) { |
4adbb6ac4
|
254 255 |
pr_debug("buffer overflow (ORIG_NAME)? "); |
1da177e4c
|
256 257 258 259 |
goto out_free_buf; } } if (buf[3] & COMMENT) { |
f4cfb18d7
|
260 |
while (ret < LBUFSIZE && buf[ret++] != 0) |
1da177e4c
|
261 |
; |
13c3f50c9
|
262 |
if (unlikely(ret == LBUFSIZE)) { |
4adbb6ac4
|
263 264 |
pr_debug("buffer overflow (COMMENT)? "); |
1da177e4c
|
265 266 267 268 269 270 271 272 273 274 275 276 |
goto out_free_buf; } } strm.next_in += ret; strm.avail_in -= ret; strm.next_out = dst; strm.avail_out = len; strm.total_out = 0; if (zlib_inflateInit2(&strm, -MAX_WBITS) != Z_OK) { |
4adbb6ac4
|
277 278 |
pr_debug("zlib init failed? "); |
1da177e4c
|
279 280 281 282 |
goto out_free_buf; } while ((ret = zlib_inflate(&strm, Z_NO_FLUSH)) == Z_OK) { |
bdd1d2d3d
|
283 |
ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos); |
1da177e4c
|
284 285 |
if (ret <= 0) break; |
1da177e4c
|
286 287 288 289 290 291 292 293 |
len -= ret; strm.next_in = buf; strm.avail_in = ret; strm.total_in = 0; } if (ret < 0) { |
4adbb6ac4
|
294 295 |
pr_debug("decompression failed (%d), %s ", |
1da177e4c
|
296 297 298 299 300 301 302 303 304 305 306 |
ret, strm.msg); goto out_zlib; } retval = 0; out_zlib: zlib_inflateEnd(&strm); out_free_buf: kfree(buf); out_free: kfree(strm.workspace); |
1da177e4c
|
307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 |
return retval; } #endif /* CONFIG_BINFMT_ZFLAT */ /****************************************************************************/ static unsigned long calc_reloc(unsigned long r, struct lib_info *p, int curid, int internalp) { unsigned long addr; int id; unsigned long start_brk; unsigned long start_data; unsigned long text_len; unsigned long start_code; #ifdef CONFIG_BINFMT_SHARED_FLAT if (r == 0) id = curid; /* Relocs of 0 are always self referring */ else { id = (r >> 24) & 0xff; /* Find ID for this reloc */ r &= 0x00ffffff; /* Trim ID off here */ } if (id >= MAX_SHARED_LIBS) { |
4adbb6ac4
|
332 |
pr_err("reference 0x%lx to shared library %d", r, id); |
1da177e4c
|
333 334 335 336 |
goto failed; } if (curid != id) { if (internalp) { |
4adbb6ac4
|
337 338 |
pr_err("reloc address 0x%lx not in same module " "(%d != %d)", r, curid, id); |
1da177e4c
|
339 |
goto failed; |
13c3f50c9
|
340 341 |
} else if (!p->lib_list[id].loaded && load_flat_shared_library(id, p) < 0) { |
4adbb6ac4
|
342 |
pr_err("failed to load library %d", id); |
1da177e4c
|
343 344 345 346 347 |
goto failed; } /* Check versioning information (i.e. time stamps) */ if (p->lib_list[id].build_date && p->lib_list[curid].build_date && p->lib_list[curid].build_date < p->lib_list[id].build_date) { |
4adbb6ac4
|
348 |
pr_err("library %d is younger than %d", id, curid); |
1da177e4c
|
349 350 351 352 353 354 355 356 357 358 359 |
goto failed; } } #else id = 0; #endif start_brk = p->lib_list[id].start_brk; start_data = p->lib_list[id].start_data; start_code = p->lib_list[id].start_code; text_len = p->lib_list[id].text_len; |
9ee24b2a3
|
360 |
if (r > start_brk - start_data + text_len) { |
4adbb6ac4
|
361 |
pr_err("reloc outside program 0x%lx (0 - 0x%lx/0x%lx)", |
13c3f50c9
|
362 |
r, start_brk-start_data+text_len, text_len); |
1da177e4c
|
363 364 365 366 367 368 369 370 371 |
goto failed; } if (r < text_len) /* In text segment */ addr = r + start_code; else /* In data segment */ addr = r - text_len + start_data; /* Range checked already above so doing the range tests is redundant...*/ |
13c3f50c9
|
372 |
return addr; |
1da177e4c
|
373 374 |
failed: |
4adbb6ac4
|
375 376 |
pr_cont(", killing %s! ", current->comm); |
1da177e4c
|
377 378 379 380 381 382 |
send_sig(SIGSEGV, current, 0); return RELOC_FAILED; } /****************************************************************************/ |
cf9a566c2
|
383 |
#ifdef CONFIG_BINFMT_FLAT_OLD |
343034357
|
384 |
static void old_reloc(unsigned long rl) |
1da177e4c
|
385 |
{ |
13c3f50c9
|
386 |
static const char *segment[] = { "TEXT", "DATA", "BSS", "*UNKNOWN*" }; |
1da177e4c
|
387 |
flat_v2_reloc_t r; |
1b2ce442e
|
388 389 |
unsigned long __user *ptr; unsigned long val; |
13c3f50c9
|
390 |
|
1da177e4c
|
391 392 |
r.value = rl; #if defined(CONFIG_COLDFIRE) |
1b2ce442e
|
393 |
ptr = (unsigned long __user *)(current->mm->start_code + r.reloc.offset); |
1da177e4c
|
394 |
#else |
1b2ce442e
|
395 |
ptr = (unsigned long __user *)(current->mm->start_data + r.reloc.offset); |
1da177e4c
|
396 |
#endif |
1b2ce442e
|
397 |
get_user(val, ptr); |
1da177e4c
|
398 |
|
4adbb6ac4
|
399 400 401 |
pr_debug("Relocation of variable at DATASEG+%x " "(address %p, currently %lx) into segment %s ", |
1b2ce442e
|
402 |
r.reloc.offset, ptr, val, segment[r.reloc.type]); |
13c3f50c9
|
403 |
|
1da177e4c
|
404 405 |
switch (r.reloc.type) { case OLD_FLAT_RELOC_TYPE_TEXT: |
1b2ce442e
|
406 |
val += current->mm->start_code; |
1da177e4c
|
407 408 |
break; case OLD_FLAT_RELOC_TYPE_DATA: |
1b2ce442e
|
409 |
val += current->mm->start_data; |
1da177e4c
|
410 411 |
break; case OLD_FLAT_RELOC_TYPE_BSS: |
1b2ce442e
|
412 |
val += current->mm->end_data; |
1da177e4c
|
413 414 |
break; default: |
4adbb6ac4
|
415 416 |
pr_err("Unknown relocation type=%x ", r.reloc.type); |
1da177e4c
|
417 418 |
break; } |
1b2ce442e
|
419 |
put_user(val, ptr); |
1da177e4c
|
420 |
|
1b2ce442e
|
421 422 |
pr_debug("Relocation became %lx ", val); |
13c3f50c9
|
423 |
} |
cf9a566c2
|
424 |
#endif /* CONFIG_BINFMT_FLAT_OLD */ |
1da177e4c
|
425 426 |
/****************************************************************************/ |
13c3f50c9
|
427 |
static int load_flat_file(struct linux_binprm *bprm, |
1da177e4c
|
428 429 |
struct lib_info *libinfo, int id, unsigned long *extra_stack) { |
13c3f50c9
|
430 431 |
struct flat_hdr *hdr; unsigned long textpos, datapos, realdatastart; |
468138d78
|
432 |
u32 text_len, data_len, bss_len, stack_len, full_data, flags; |
13c3f50c9
|
433 |
unsigned long len, memp, memp_size, extra, rlim; |
3b9777184
|
434 435 |
__be32 __user *reloc; u32 __user *rp; |
13c3f50c9
|
436 |
int i, rev, relocs; |
1da177e4c
|
437 438 |
loff_t fpos; unsigned long start_code, end_code; |
13c3f50c9
|
439 |
ssize_t result; |
1ad3dcc09
|
440 |
int ret; |
1da177e4c
|
441 442 |
hdr = ((struct flat_hdr *) bprm->buf); /* exec-header */ |
1da177e4c
|
443 444 445 446 447 448 449 450 451 452 453 454 |
text_len = ntohl(hdr->data_start); data_len = ntohl(hdr->data_end) - ntohl(hdr->data_start); bss_len = ntohl(hdr->bss_end) - ntohl(hdr->data_end); stack_len = ntohl(hdr->stack_size); if (extra_stack) { stack_len += *extra_stack; *extra_stack = stack_len; } relocs = ntohl(hdr->reloc_count); flags = ntohl(hdr->flags); rev = ntohl(hdr->rev); |
3dc20cb28
|
455 |
full_data = data_len + relocs * sizeof(unsigned long); |
1da177e4c
|
456 |
|
845884d33
|
457 |
if (strncmp(hdr->magic, "bFLT", 4)) { |
1da177e4c
|
458 |
/* |
e2a366dc5
|
459 460 461 462 |
* Previously, here was a printk to tell people * "BINFMT_FLAT: bad header magic". * But for the kernel which also use ELF FD-PIC format, this * error message is confusing. |
1da177e4c
|
463 |
* because a lot of people do not manage to produce good |
1da177e4c
|
464 |
*/ |
1ad3dcc09
|
465 466 |
ret = -ENOEXEC; goto err; |
845884d33
|
467 468 469 |
} if (flags & FLAT_FLAG_KTRACE) |
4adbb6ac4
|
470 471 |
pr_info("Loading file: %s ", bprm->filename); |
845884d33
|
472 |
|
cf9a566c2
|
473 |
#ifdef CONFIG_BINFMT_FLAT_OLD |
845884d33
|
474 |
if (rev != FLAT_VERSION && rev != OLD_FLAT_VERSION) { |
4adbb6ac4
|
475 476 477 |
pr_err("bad flat file version 0x%x (supported 0x%lx and 0x%lx) ", rev, FLAT_VERSION, OLD_FLAT_VERSION); |
1ad3dcc09
|
478 479 |
ret = -ENOEXEC; goto err; |
1da177e4c
|
480 |
} |
13c3f50c9
|
481 |
|
1da177e4c
|
482 483 |
/* Don't allow old format executables to use shared libraries */ if (rev == OLD_FLAT_VERSION && id != 0) { |
4adbb6ac4
|
484 485 486 |
pr_err("shared libraries are not available before rev 0x%lx ", FLAT_VERSION); |
1ad3dcc09
|
487 488 |
ret = -ENOEXEC; goto err; |
1da177e4c
|
489 490 491 |
} /* |
cf9a566c2
|
492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 |
* fix up the flags for the older format, there were all kinds * of endian hacks, this only works for the simple cases */ if (rev == OLD_FLAT_VERSION && (flags || IS_ENABLED(CONFIG_BINFMT_FLAT_OLD_ALWAYS_RAM))) flags = FLAT_FLAG_RAM; #else /* CONFIG_BINFMT_FLAT_OLD */ if (rev != FLAT_VERSION) { pr_err("bad flat file version 0x%x (supported 0x%lx) ", rev, FLAT_VERSION); ret = -ENOEXEC; goto err; } #endif /* !CONFIG_BINFMT_FLAT_OLD */ /* |
c995ee28d
|
510 511 512 513 514 515 516 517 518 519 |
* Make sure the header params are sane. * 28 bits (256 MB) is way more than reasonable in this case. * If some top bits are set we have probable binary corruption. */ if ((text_len | data_len | bss_len | stack_len | full_data) >> 28) { pr_err("bad header "); ret = -ENOEXEC; goto err; } |
1da177e4c
|
520 521 |
#ifndef CONFIG_BINFMT_ZFLAT if (flags & (FLAT_FLAG_GZIP|FLAT_FLAG_GZDATA)) { |
4adbb6ac4
|
522 523 |
pr_err("Support for ZFLAT executables is not enabled. "); |
1ad3dcc09
|
524 525 |
ret = -ENOEXEC; goto err; |
1da177e4c
|
526 527 528 529 530 531 532 533 |
} #endif /* * Check initial limits. This avoids letting people circumvent * size limits imposed on them by creating programs with large * arrays in the data or bss. */ |
d554ed895
|
534 |
rlim = rlimit(RLIMIT_DATA); |
1da177e4c
|
535 536 |
if (rlim >= RLIM_INFINITY) rlim = ~0; |
1ad3dcc09
|
537 538 539 540 |
if (data_len + bss_len > rlim) { ret = -ENOMEM; goto err; } |
1da177e4c
|
541 542 |
/* Flush all traces of the currently running executable */ if (id == 0) { |
13c3f50c9
|
543 544 |
ret = flush_old_exec(bprm); if (ret) |
df88912a2
|
545 |
goto err; |
1da177e4c
|
546 547 |
/* OK, This is the point of no return */ |
fcc18e83e
|
548 |
set_personality(PER_LINUX_32BIT); |
221af7f87
|
549 |
setup_new_exec(bprm); |
1da177e4c
|
550 551 552 553 554 |
} /* * calculate the extra space we need to map in */ |
0e647c04f
|
555 556 |
extra = max_t(unsigned long, bss_len + stack_len, relocs * sizeof(unsigned long)); |
1da177e4c
|
557 558 559 560 561 562 |
/* * there are a couple of cases here, the separate code/data * case, and then the fully copied to RAM case which lumps * it all together. */ |
015feacf9
|
563 |
if (!IS_ENABLED(CONFIG_MMU) && !(flags & (FLAT_FLAG_RAM|FLAT_FLAG_GZIP))) { |
1da177e4c
|
564 565 566 567 |
/* * this should give us a ROM ptr, but if it doesn't we don't * really care */ |
4adbb6ac4
|
568 569 |
pr_debug("ROM mapping of file (we hope) "); |
1da177e4c
|
570 |
|
6be5ceb02
|
571 |
textpos = vm_mmap(bprm->file, 0, text_len, PROT_READ|PROT_EXEC, |
925d1c401
|
572 |
MAP_PRIVATE|MAP_EXECUTABLE, 0); |
0b8c78f2b
|
573 |
if (!textpos || IS_ERR_VALUE(textpos)) { |
1ad3dcc09
|
574 |
ret = textpos; |
13c3f50c9
|
575 576 |
if (!textpos) ret = -ENOMEM; |
4adbb6ac4
|
577 578 |
pr_err("Unable to mmap process text, errno %d ", ret); |
df88912a2
|
579 |
goto err; |
1da177e4c
|
580 |
} |
730443f4c
|
581 |
len = data_len + extra + MAX_SHARED_LIBS * sizeof(unsigned long); |
0f3e442a4
|
582 |
len = PAGE_ALIGN(len); |
13c3f50c9
|
583 |
realdatastart = vm_mmap(NULL, 0, len, |
72613e5f4
|
584 |
PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE, 0); |
1da177e4c
|
585 |
|
0b8c78f2b
|
586 |
if (realdatastart == 0 || IS_ERR_VALUE(realdatastart)) { |
13c3f50c9
|
587 |
ret = realdatastart; |
1da177e4c
|
588 |
if (!realdatastart) |
13c3f50c9
|
589 |
ret = -ENOMEM; |
4adbb6ac4
|
590 |
pr_err("Unable to allocate RAM for process data, " |
13c3f50c9
|
591 592 |
"errno %d ", ret); |
7696e0c37
|
593 |
vm_munmap(textpos, text_len); |
df88912a2
|
594 |
goto err; |
1da177e4c
|
595 |
} |
730443f4c
|
596 597 598 |
datapos = ALIGN(realdatastart + MAX_SHARED_LIBS * sizeof(unsigned long), FLAT_DATA_ALIGN); |
1da177e4c
|
599 |
|
a86054236
|
600 601 |
pr_debug("Allocated data+bss+stack (%u bytes): %lx ", |
4adbb6ac4
|
602 |
data_len + bss_len + stack_len, datapos); |
1da177e4c
|
603 604 605 606 |
fpos = ntohl(hdr->data_start); #ifdef CONFIG_BINFMT_ZFLAT if (flags & FLAT_FLAG_GZDATA) { |
13c3f50c9
|
607 |
result = decompress_exec(bprm, fpos, (char *)datapos, |
3dc20cb28
|
608 |
full_data, 0); |
1da177e4c
|
609 610 611 |
} else #endif { |
3dc20cb28
|
612 613 |
result = read_code(bprm->file, datapos, fpos, full_data); |
1da177e4c
|
614 |
} |
0b8c78f2b
|
615 |
if (IS_ERR_VALUE(result)) { |
13c3f50c9
|
616 |
ret = result; |
4adbb6ac4
|
617 618 |
pr_err("Unable to read data+bss, errno %d ", ret); |
7696e0c37
|
619 620 |
vm_munmap(textpos, text_len); vm_munmap(realdatastart, len); |
df88912a2
|
621 |
goto err; |
1da177e4c
|
622 |
} |
3b9777184
|
623 |
reloc = (__be32 __user *) |
13c3f50c9
|
624 |
(datapos + (ntohl(hdr->reloc_start) - text_len)); |
1da177e4c
|
625 |
memp = realdatastart; |
0f3e442a4
|
626 |
memp_size = len; |
1da177e4c
|
627 |
} else { |
730443f4c
|
628 |
len = text_len + data_len + extra + MAX_SHARED_LIBS * sizeof(u32); |
0f3e442a4
|
629 |
len = PAGE_ALIGN(len); |
13c3f50c9
|
630 |
textpos = vm_mmap(NULL, 0, len, |
72613e5f4
|
631 |
PROT_READ | PROT_EXEC | PROT_WRITE, MAP_PRIVATE, 0); |
72613e5f4
|
632 |
|
0b8c78f2b
|
633 |
if (!textpos || IS_ERR_VALUE(textpos)) { |
1ad3dcc09
|
634 |
ret = textpos; |
13c3f50c9
|
635 636 |
if (!textpos) ret = -ENOMEM; |
4adbb6ac4
|
637 |
pr_err("Unable to allocate RAM for process text/data, " |
13c3f50c9
|
638 639 |
"errno %d ", ret); |
df88912a2
|
640 |
goto err; |
1da177e4c
|
641 642 643 |
} realdatastart = textpos + ntohl(hdr->data_start); |
730443f4c
|
644 645 646 |
datapos = ALIGN(realdatastart + MAX_SHARED_LIBS * sizeof(u32), FLAT_DATA_ALIGN); |
c3dc5bec0
|
647 |
|
3b9777184
|
648 |
reloc = (__be32 __user *) |
c3dc5bec0
|
649 |
(datapos + (ntohl(hdr->reloc_start) - text_len)); |
1da177e4c
|
650 |
memp = textpos; |
0f3e442a4
|
651 |
memp_size = len; |
1da177e4c
|
652 653 654 655 656 |
#ifdef CONFIG_BINFMT_ZFLAT /* * load it all in and treat it like a RAM load from now on */ if (flags & FLAT_FLAG_GZIP) { |
472f95f32
|
657 |
#ifndef CONFIG_MMU |
13c3f50c9
|
658 659 |
result = decompress_exec(bprm, sizeof(struct flat_hdr), (((char *)textpos) + sizeof(struct flat_hdr)), |
3dc20cb28
|
660 |
(text_len + full_data |
13c3f50c9
|
661 |
- sizeof(struct flat_hdr)), |
1da177e4c
|
662 |
0); |
730443f4c
|
663 664 |
memmove((void *) datapos, (void *) realdatastart, full_data); |
472f95f32
|
665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 |
#else /* * This is used on MMU systems mainly for testing. * Let's use a kernel buffer to simplify things. */ long unz_text_len = text_len - sizeof(struct flat_hdr); long unz_len = unz_text_len + full_data; char *unz_data = vmalloc(unz_len); if (!unz_data) { result = -ENOMEM; } else { result = decompress_exec(bprm, sizeof(struct flat_hdr), unz_data, unz_len, 0); if (result == 0 && (copy_to_user((void __user *)textpos + sizeof(struct flat_hdr), unz_data, unz_text_len) || copy_to_user((void __user *)datapos, unz_data + unz_text_len, full_data))) result = -EFAULT; vfree(unz_data); } #endif |
1da177e4c
|
687 |
} else if (flags & FLAT_FLAG_GZDATA) { |
3dc20cb28
|
688 |
result = read_code(bprm->file, textpos, 0, text_len); |
472f95f32
|
689 690 |
if (!IS_ERR_VALUE(result)) { #ifndef CONFIG_MMU |
1da177e4c
|
691 |
result = decompress_exec(bprm, text_len, (char *) datapos, |
3dc20cb28
|
692 |
full_data, 0); |
472f95f32
|
693 694 695 696 697 698 699 700 701 702 703 704 705 |
#else char *unz_data = vmalloc(full_data); if (!unz_data) { result = -ENOMEM; } else { result = decompress_exec(bprm, text_len, unz_data, full_data, 0); if (result == 0 && copy_to_user((void __user *)datapos, unz_data, full_data)) result = -EFAULT; vfree(unz_data); } |
1da177e4c
|
706 |
#endif |
472f95f32
|
707 708 709 |
} } else #endif /* CONFIG_BINFMT_ZFLAT */ |
1da177e4c
|
710 |
{ |
3dc20cb28
|
711 712 713 714 715 |
result = read_code(bprm->file, textpos, 0, text_len); if (!IS_ERR_VALUE(result)) result = read_code(bprm->file, datapos, ntohl(hdr->data_start), full_data); |
1da177e4c
|
716 |
} |
0b8c78f2b
|
717 |
if (IS_ERR_VALUE(result)) { |
13c3f50c9
|
718 |
ret = result; |
4adbb6ac4
|
719 720 |
pr_err("Unable to read code+data+bss, errno %d ", ret); |
730443f4c
|
721 722 |
vm_munmap(textpos, text_len + data_len + extra + MAX_SHARED_LIBS * sizeof(u32)); |
df88912a2
|
723 |
goto err; |
1da177e4c
|
724 725 |
} } |
13c3f50c9
|
726 727 728 |
start_code = textpos + sizeof(struct flat_hdr); end_code = textpos + text_len; text_len -= sizeof(struct flat_hdr); /* the real code len */ |
1da177e4c
|
729 730 |
/* The main program needs a little extra setup in the task structure */ |
1da177e4c
|
731 732 733 734 735 736 737 738 739 |
if (id == 0) { current->mm->start_code = start_code; current->mm->end_code = end_code; current->mm->start_data = datapos; current->mm->end_data = datapos + data_len; /* * set up the brk stuff, uses any slack left in data/bss/stack * allocation. We put the brk after the bss (between the bss * and stack) like other platforms. |
0f3e442a4
|
740 741 |
* Userspace code relies on the stack pointer starting out at * an address right at the end of a page. |
1da177e4c
|
742 743 744 |
*/ current->mm->start_brk = datapos + data_len + bss_len; current->mm->brk = (current->mm->start_brk + 3) & ~3; |
015feacf9
|
745 |
#ifndef CONFIG_MMU |
0f3e442a4
|
746 |
current->mm->context.end_brk = memp + memp_size - stack_len; |
015feacf9
|
747 |
#endif |
1da177e4c
|
748 |
} |
13c3f50c9
|
749 |
if (flags & FLAT_FLAG_KTRACE) { |
4adbb6ac4
|
750 751 752 753 754 755 756 757 |
pr_info("Mapping is %lx, Entry point is %x, data_start is %x ", textpos, 0x00ffffff&ntohl(hdr->entry), ntohl(hdr->data_start)); pr_info("%s %s: TEXT=%lx-%lx DATA=%lx-%lx BSS=%lx-%lx ", id ? "Lib" : "Load", bprm->filename, start_code, end_code, datapos, datapos + data_len, datapos + data_len, (datapos + data_len + bss_len + 3) & ~3); |
13c3f50c9
|
758 |
} |
1da177e4c
|
759 760 761 762 763 764 765 766 767 |
/* Store the current module values into the global library structure */ libinfo->lib_list[id].start_code = start_code; libinfo->lib_list[id].start_data = datapos; libinfo->lib_list[id].start_brk = datapos + data_len + bss_len; libinfo->lib_list[id].text_len = text_len; libinfo->lib_list[id].loaded = 1; libinfo->lib_list[id].entry = (0x00ffffff & ntohl(hdr->entry)) + textpos; libinfo->lib_list[id].build_date = ntohl(hdr->build_date); |
13c3f50c9
|
768 |
|
1da177e4c
|
769 770 771 772 773 |
/* * We just load the allocations into some temporary memory to * help simplify all this mumbo jumbo * * We've got two different sections of relocation entries. |
25985edce
|
774 |
* The first is the GOT which resides at the beginning of the data segment |
1da177e4c
|
775 776 777 778 779 780 781 |
* and is terminated with a -1. This one can be relocated in place. * The second is the extra relocation entries tacked after the image's * data segment. These require a little more processing as the entry is * really an offset into the image which contains an offset into the * image. */ if (flags & FLAT_FLAG_GOTPIC) { |
468138d78
|
782 783 |
for (rp = (u32 __user *)datapos; ; rp++) { u32 addr, rp_val; |
6e572ffe3
|
784 785 786 787 788 789 |
if (get_user(rp_val, rp)) return -EFAULT; if (rp_val == 0xffffffff) break; if (rp_val) { addr = calc_reloc(rp_val, libinfo, id, 0); |
1ad3dcc09
|
790 791 |
if (addr == RELOC_FAILED) { ret = -ENOEXEC; |
df88912a2
|
792 |
goto err; |
1ad3dcc09
|
793 |
} |
6e572ffe3
|
794 795 |
if (put_user(addr, rp)) return -EFAULT; |
1da177e4c
|
796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 |
} } } /* * Now run through the relocation entries. * We've got to be careful here as C++ produces relocatable zero * entries in the constructor and destructor tables which are then * tested for being not zero (which will always occur unless we're * based from address zero). This causes an endless loop as __start * is at zero. The solution used is to not relocate zero addresses. * This has the negative side effect of not allowing a global data * reference to be statically initialised to _stext (I've moved * __start to address 4 so that is okay). */ if (rev > OLD_FLAT_VERSION) { |
13c3f50c9
|
812 |
for (i = 0; i < relocs; i++) { |
468138d78
|
813 |
u32 addr, relval; |
3b9777184
|
814 |
__be32 tmp; |
1da177e4c
|
815 |
|
13c3f50c9
|
816 817 818 819 820 |
/* * Get the address of the pointer to be * relocated (of course, the address has to be * relocated first). */ |
3b9777184
|
821 |
if (get_user(tmp, reloc + i)) |
6e572ffe3
|
822 |
return -EFAULT; |
3b9777184
|
823 |
relval = ntohl(tmp); |
1da177e4c
|
824 |
addr = flat_get_relocate_addr(relval); |
468138d78
|
825 826 |
rp = (u32 __user *)calc_reloc(addr, libinfo, id, 1); if (rp == (u32 __user *)RELOC_FAILED) { |
1ad3dcc09
|
827 |
ret = -ENOEXEC; |
df88912a2
|
828 |
goto err; |
1ad3dcc09
|
829 |
} |
1da177e4c
|
830 831 |
/* Get the pointer's value. */ |
6843d8aa5
|
832 |
ret = flat_get_addr_from_rp(rp, relval, flags, &addr); |
468138d78
|
833 834 |
if (unlikely(ret)) goto err; |
1da177e4c
|
835 836 837 838 839 |
if (addr != 0) { /* * Do the relocation. PIC relocs in the data section are * already in target order */ |
3b9777184
|
840 841 842 843 844 845 846 |
if ((flags & FLAT_FLAG_GOTPIC) == 0) { /* * Meh, the same value can have a different * byte order based on a flag.. */ addr = ntohl((__force __be32)addr); } |
1da177e4c
|
847 |
addr = calc_reloc(addr, libinfo, id, 0); |
1ad3dcc09
|
848 849 |
if (addr == RELOC_FAILED) { ret = -ENOEXEC; |
df88912a2
|
850 |
goto err; |
1ad3dcc09
|
851 |
} |
1da177e4c
|
852 853 |
/* Write back the relocated pointer. */ |
468138d78
|
854 855 856 |
ret = flat_put_addr_at_rp(rp, addr, relval); if (unlikely(ret)) goto err; |
1da177e4c
|
857 858 |
} } |
cf9a566c2
|
859 |
#ifdef CONFIG_BINFMT_FLAT_OLD |
1da177e4c
|
860 |
} else { |
1b2ce442e
|
861 |
for (i = 0; i < relocs; i++) { |
3b9777184
|
862 |
__be32 relval; |
1b2ce442e
|
863 864 |
if (get_user(relval, reloc + i)) return -EFAULT; |
3b9777184
|
865 |
old_reloc(ntohl(relval)); |
1b2ce442e
|
866 |
} |
cf9a566c2
|
867 |
#endif /* CONFIG_BINFMT_FLAT_OLD */ |
1da177e4c
|
868 |
} |
13c3f50c9
|
869 |
|
1da177e4c
|
870 871 872 |
flush_icache_range(start_code, end_code); /* zero the BSS, BRK and stack areas */ |
467aa1465
|
873 874 875 876 877 |
if (clear_user((void __user *)(datapos + data_len), bss_len + (memp + memp_size - stack_len - /* end brk */ libinfo->lib_list[id].start_brk) + /* start brk */ stack_len)) return -EFAULT; |
1da177e4c
|
878 879 |
return 0; |
1ad3dcc09
|
880 881 |
err: return ret; |
1da177e4c
|
882 883 884 885 886 887 888 889 890 891 892 893 894 |
} /****************************************************************************/ #ifdef CONFIG_BINFMT_SHARED_FLAT /* * Load a shared library into memory. The library gets its own data * segment (including bss) but not argv/argc/environ. */ static int load_flat_shared_library(int id, struct lib_info *libs) { |
867bfa4a5
|
895 896 897 898 |
/* * This is a fake bprm struct; only the members "buf", "file" and * "filename" are actually used. */ |
1da177e4c
|
899 900 901 |
struct linux_binprm bprm; int res; char buf[16]; |
867bfa4a5
|
902 |
loff_t pos = 0; |
1da177e4c
|
903 |
|
3a852d3bd
|
904 |
memset(&bprm, 0, sizeof(bprm)); |
1da177e4c
|
905 906 907 908 909 910 911 912 913 |
/* Create the file name */ sprintf(buf, "/lib/lib%d.so", id); /* Open the file up */ bprm.filename = buf; bprm.file = open_exec(bprm.filename); res = PTR_ERR(bprm.file); if (IS_ERR(bprm.file)) return res; |
867bfa4a5
|
914 |
res = kernel_read(bprm.file, bprm.buf, BINPRM_BUF_SIZE, &pos); |
1da177e4c
|
915 |
|
867bfa4a5
|
916 |
if (res >= 0) |
1da177e4c
|
917 |
res = load_flat_file(&bprm, libs, id, NULL); |
3440625d7
|
918 |
|
3440625d7
|
919 920 |
allow_write_access(bprm.file); fput(bprm.file); |
13c3f50c9
|
921 |
return res; |
1da177e4c
|
922 923 924 925 926 927 928 929 930 |
} #endif /* CONFIG_BINFMT_SHARED_FLAT */ /****************************************************************************/ /* * These are the functions used to load flat style executables and shared * libraries. There is no binary dependent code anywhere else. */ |
13c3f50c9
|
931 |
static int load_flat_binary(struct linux_binprm *bprm) |
1da177e4c
|
932 933 |
{ struct lib_info libinfo; |
71613c3b8
|
934 |
struct pt_regs *regs = current_pt_regs(); |
015feacf9
|
935 |
unsigned long stack_len = 0; |
1da177e4c
|
936 |
unsigned long start_addr; |
1da177e4c
|
937 938 939 940 |
int res; int i, j; memset(&libinfo, 0, sizeof(libinfo)); |
13c3f50c9
|
941 |
|
1da177e4c
|
942 943 944 945 946 947 948 |
/* * We have to add the size of our arguments to our stack size * otherwise it's too easy for users to create stack overflows * by passing in a huge argument list. And yes, we have to be * pedantic and include space for the argv/envp array as it may have * a lot of entries. */ |
015feacf9
|
949 950 951 |
#ifndef CONFIG_MMU stack_len += PAGE_SIZE * MAX_ARG_PAGES - bprm->p; /* the strings */ #endif |
a97d157d0
|
952 953 954 |
stack_len += (bprm->argc + 1) * sizeof(char *); /* the argv array */ stack_len += (bprm->envc + 1) * sizeof(char *); /* the envp array */ stack_len = ALIGN(stack_len, FLAT_STACK_ALIGN); |
13c3f50c9
|
955 |
|
1da177e4c
|
956 |
res = load_flat_file(bprm, &libinfo, 0, &stack_len); |
287980e49
|
957 |
if (res < 0) |
1da177e4c
|
958 |
return res; |
13c3f50c9
|
959 |
|
1da177e4c
|
960 |
/* Update data segment pointers for all libraries */ |
af521f92d
|
961 962 963 964 965 966 967 968 969 970 971 972 973 |
for (i = 0; i < MAX_SHARED_LIBS; i++) { if (!libinfo.lib_list[i].loaded) continue; for (j = 0; j < MAX_SHARED_LIBS; j++) { unsigned long val = libinfo.lib_list[j].loaded ? libinfo.lib_list[j].start_data : UNLOADED_LIB; unsigned long __user *p = (unsigned long __user *) libinfo.lib_list[i].start_data; p -= j + 1; if (put_user(val, p)) return -EFAULT; } } |
1da177e4c
|
974 |
|
a6f76f23d
|
975 |
install_exec_creds(bprm); |
1da177e4c
|
976 977 |
set_binfmt(&flat_format); |
015feacf9
|
978 979 980 981 982 |
#ifdef CONFIG_MMU res = setup_arg_pages(bprm, STACK_TOP, EXSTACK_DEFAULT); if (!res) res = create_flat_tables(bprm, bprm->p); #else |
a97d157d0
|
983 984 985 986 987 |
/* Stash our initial stack pointer into the mm structure */ current->mm->start_stack = ((current->mm->context.end_brk + stack_len + 3) & ~3) - 4; pr_debug("sp=%lx ", current->mm->start_stack); |
1da177e4c
|
988 |
|
687fd7738
|
989 |
/* copy the arg pages onto the stack */ |
a97d157d0
|
990 991 992 |
res = transfer_args_to_stack(bprm, ¤t->mm->start_stack); if (!res) res = create_flat_tables(bprm, current->mm->start_stack); |
015feacf9
|
993 |
#endif |
687fd7738
|
994 995 |
if (res) return res; |
1da177e4c
|
996 |
|
1da177e4c
|
997 998 999 1000 1001 1002 1003 |
/* Fake some return addresses to ensure the call chain will * initialise library in order for us. We are required to call * lib 1 first, then 2, ... and finally the main program (id 0). */ start_addr = libinfo.lib_list[0].entry; #ifdef CONFIG_BINFMT_SHARED_FLAT |
13c3f50c9
|
1004 |
for (i = MAX_SHARED_LIBS-1; i > 0; i--) { |
1da177e4c
|
1005 1006 |
if (libinfo.lib_list[i].loaded) { /* Push previos first to call address */ |
a97d157d0
|
1007 1008 1009 1010 |
unsigned long __user *sp; current->mm->start_stack -= sizeof(unsigned long); sp = (unsigned long __user *)current->mm->start_stack; __put_user(start_addr, sp); |
1da177e4c
|
1011 1012 1013 1014 |
start_addr = libinfo.lib_list[i].entry; } } #endif |
13c3f50c9
|
1015 |
|
74c27c43e
|
1016 1017 1018 |
#ifdef FLAT_PLAT_INIT FLAT_PLAT_INIT(regs); #endif |
13c3f50c9
|
1019 |
|
b83838313
|
1020 |
finalize_exec(bprm); |
4adbb6ac4
|
1021 1022 1023 |
pr_debug("start_thread(regs=0x%p, entry=0x%lx, start_stack=0x%lx) ", regs, start_addr, current->mm->start_stack); |
1da177e4c
|
1024 |
start_thread(regs, start_addr, current->mm->start_stack); |
1da177e4c
|
1025 1026 1027 1028 1029 1030 1031 |
return 0; } /****************************************************************************/ static int __init init_flat_binfmt(void) { |
8fc3dc5a3
|
1032 1033 |
register_binfmt(&flat_format); return 0; |
1da177e4c
|
1034 |
} |
1da177e4c
|
1035 |
core_initcall(init_flat_binfmt); |
1da177e4c
|
1036 1037 |
/****************************************************************************/ |