]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /****************************************************************************/ |
2 | /* | |
3 | * linux/fs/binfmt_flat.c | |
4 | * | |
5 | * Copyright (C) 2000-2003 David McCullough <davidm@snapgear.com> | |
6 | * Copyright (C) 2002 Greg Ungerer <gerg@snapgear.com> | |
7 | * Copyright (C) 2002 SnapGear, by Paul Dale <pauli@snapgear.com> | |
8 | * Copyright (C) 2000, 2001 Lineo, by David McCullough <davidm@lineo.com> | |
9 | * based heavily on: | |
10 | * | |
11 | * linux/fs/binfmt_aout.c: | |
12 | * Copyright (C) 1991, 1992, 1996 Linus Torvalds | |
13 | * linux/fs/binfmt_flat.c for 2.0 kernel | |
14 | * Copyright (C) 1998 Kenneth Albanowski <kjahds@kjahds.com> | |
15 | * JAN/99 -- coded full program relocation (gerg@snapgear.com) | |
16 | */ | |
17 | ||
4adbb6ac NP |
18 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
19 | ||
1da177e4 LT |
20 | #include <linux/kernel.h> |
21 | #include <linux/sched.h> | |
22 | #include <linux/mm.h> | |
23 | #include <linux/mman.h> | |
1da177e4 LT |
24 | #include <linux/errno.h> |
25 | #include <linux/signal.h> | |
26 | #include <linux/string.h> | |
27 | #include <linux/fs.h> | |
28 | #include <linux/file.h> | |
1da177e4 LT |
29 | #include <linux/ptrace.h> |
30 | #include <linux/user.h> | |
31 | #include <linux/slab.h> | |
32 | #include <linux/binfmts.h> | |
33 | #include <linux/personality.h> | |
34 | #include <linux/init.h> | |
35 | #include <linux/flat.h> | |
13c3f50c | 36 | #include <linux/uaccess.h> |
1da177e4 LT |
37 | |
38 | #include <asm/byteorder.h> | |
1da177e4 LT |
39 | #include <asm/unaligned.h> |
40 | #include <asm/cacheflush.h> | |
c3dc5bec | 41 | #include <asm/page.h> |
1da177e4 LT |
42 | |
43 | /****************************************************************************/ | |
44 | ||
c3dc5bec | 45 | /* |
2e94de8a MF |
46 | * User data (data section and bss) needs to be aligned. |
47 | * We pick 0x20 here because it is the max value elf2flt has always | |
48 | * used in producing FLAT files, and because it seems to be large | |
49 | * enough to make all the gcc alignment related tests happy. | |
50 | */ | |
51 | #define FLAT_DATA_ALIGN (0x20) | |
52 | ||
53 | /* | |
54 | * User data (stack) also needs to be aligned. | |
55 | * Here we can be a bit looser than the data sections since this | |
56 | * needs to only meet arch ABI requirements. | |
c3dc5bec | 57 | */ |
2952095c | 58 | #define FLAT_STACK_ALIGN max_t(unsigned long, sizeof(void *), ARCH_SLAB_MINALIGN) |
c3dc5bec | 59 | |
1da177e4 LT |
60 | #define RELOC_FAILED 0xff00ff01 /* Relocation incorrect somewhere */ |
61 | #define UNLOADED_LIB 0x7ff000ff /* Placeholder for unused library */ | |
62 | ||
63 | struct lib_info { | |
64 | struct { | |
65 | unsigned long start_code; /* Start of text segment */ | |
66 | unsigned long start_data; /* Start of data segment */ | |
67 | unsigned long start_brk; /* End of data segment */ | |
68 | unsigned long text_len; /* Length of text segment */ | |
69 | unsigned long entry; /* Start address for this module */ | |
70 | unsigned long build_date; /* When this one was compiled */ | |
13c3f50c | 71 | bool loaded; /* Has this library been loaded? */ |
1da177e4 LT |
72 | } lib_list[MAX_SHARED_LIBS]; |
73 | }; | |
74 | ||
75 | #ifdef CONFIG_BINFMT_SHARED_FLAT | |
76 | static int load_flat_shared_library(int id, struct lib_info *p); | |
77 | #endif | |
78 | ||
71613c3b | 79 | static int load_flat_binary(struct linux_binprm *); |
f6151dfe | 80 | static int flat_core_dump(struct coredump_params *cprm); |
1da177e4 | 81 | |
1da177e4 LT |
82 | static struct linux_binfmt flat_format = { |
83 | .module = THIS_MODULE, | |
84 | .load_binary = load_flat_binary, | |
85 | .core_dump = flat_core_dump, | |
86 | .min_coredump = PAGE_SIZE | |
87 | }; | |
88 | ||
89 | /****************************************************************************/ | |
90 | /* | |
91 | * Routine writes a core dump image in the current directory. | |
92 | * Currently only a stub-function. | |
93 | */ | |
94 | ||
f6151dfe | 95 | static int flat_core_dump(struct coredump_params *cprm) |
1da177e4 | 96 | { |
4adbb6ac NP |
97 | pr_warn("Process %s:%d received signr %d and should have core dumped\n", |
98 | current->comm, current->pid, cprm->siginfo->si_signo); | |
13c3f50c | 99 | return 1; |
1da177e4 LT |
100 | } |
101 | ||
102 | /****************************************************************************/ | |
103 | /* | |
104 | * create_flat_tables() parses the env- and arg-strings in new user | |
105 | * memory and creates the pointer tables from them, and puts their | |
106 | * addresses on the "stack", returning the new stack pointer value. | |
107 | */ | |
108 | ||
109 | static unsigned long create_flat_tables( | |
110 | unsigned long pp, | |
13c3f50c | 111 | struct linux_binprm *bprm) |
1da177e4 | 112 | { |
13c3f50c NP |
113 | unsigned long *argv, *envp; |
114 | unsigned long *sp; | |
115 | char *p = (char *)pp; | |
1da177e4 LT |
116 | int argc = bprm->argc; |
117 | int envc = bprm->envc; | |
0e647c04 | 118 | char uninitialized_var(dummy); |
1da177e4 | 119 | |
c3dc5bec OS |
120 | sp = (unsigned long *)p; |
121 | sp -= (envc + argc + 2) + 1 + (flat_argvp_envp_on_stack() ? 2 : 0); | |
2e94de8a | 122 | sp = (unsigned long *) ((unsigned long)sp & -FLAT_STACK_ALIGN); |
c3dc5bec OS |
123 | argv = sp + 1 + (flat_argvp_envp_on_stack() ? 2 : 0); |
124 | envp = argv + (argc + 1); | |
1da177e4 | 125 | |
1da177e4 | 126 | if (flat_argvp_envp_on_stack()) { |
c3dc5bec OS |
127 | put_user((unsigned long) envp, sp + 2); |
128 | put_user((unsigned long) argv, sp + 1); | |
1da177e4 LT |
129 | } |
130 | ||
c3dc5bec | 131 | put_user(argc, sp); |
1da177e4 | 132 | current->mm->arg_start = (unsigned long) p; |
13c3f50c | 133 | while (argc-- > 0) { |
1da177e4 LT |
134 | put_user((unsigned long) p, argv++); |
135 | do { | |
136 | get_user(dummy, p); p++; | |
137 | } while (dummy); | |
138 | } | |
139 | put_user((unsigned long) NULL, argv); | |
140 | current->mm->arg_end = current->mm->env_start = (unsigned long) p; | |
13c3f50c | 141 | while (envc-- > 0) { |
1da177e4 LT |
142 | put_user((unsigned long)p, envp); envp++; |
143 | do { | |
144 | get_user(dummy, p); p++; | |
145 | } while (dummy); | |
146 | } | |
147 | put_user((unsigned long) NULL, envp); | |
148 | current->mm->env_end = (unsigned long) p; | |
149 | return (unsigned long)sp; | |
150 | } | |
151 | ||
152 | /****************************************************************************/ | |
153 | ||
154 | #ifdef CONFIG_BINFMT_ZFLAT | |
155 | ||
156 | #include <linux/zlib.h> | |
157 | ||
158 | #define LBUFSIZE 4000 | |
159 | ||
160 | /* gzip flag byte */ | |
161 | #define ASCII_FLAG 0x01 /* bit 0 set: file probably ASCII text */ | |
162 | #define CONTINUATION 0x02 /* bit 1 set: continuation of multi-part gzip file */ | |
163 | #define EXTRA_FIELD 0x04 /* bit 2 set: extra field present */ | |
164 | #define ORIG_NAME 0x08 /* bit 3 set: original file name present */ | |
165 | #define COMMENT 0x10 /* bit 4 set: file comment present */ | |
166 | #define ENCRYPTED 0x20 /* bit 5 set: file is encrypted */ | |
167 | #define RESERVED 0xC0 /* bit 6,7: reserved */ | |
168 | ||
169 | static int decompress_exec( | |
170 | struct linux_binprm *bprm, | |
171 | unsigned long offset, | |
172 | char *dst, | |
173 | long len, | |
174 | int fd) | |
175 | { | |
176 | unsigned char *buf; | |
177 | z_stream strm; | |
178 | loff_t fpos; | |
179 | int ret, retval; | |
180 | ||
4adbb6ac | 181 | pr_debug("decompress_exec(offset=%lx,buf=%p,len=%lx)\n", offset, dst, len); |
1da177e4 LT |
182 | |
183 | memset(&strm, 0, sizeof(strm)); | |
184 | strm.workspace = kmalloc(zlib_inflate_workspacesize(), GFP_KERNEL); | |
185 | if (strm.workspace == NULL) { | |
4adbb6ac | 186 | pr_debug("no memory for decompress workspace\n"); |
1da177e4 LT |
187 | return -ENOMEM; |
188 | } | |
189 | buf = kmalloc(LBUFSIZE, GFP_KERNEL); | |
190 | if (buf == NULL) { | |
4adbb6ac | 191 | pr_debug("no memory for read buffer\n"); |
1da177e4 LT |
192 | retval = -ENOMEM; |
193 | goto out_free; | |
194 | } | |
195 | ||
196 | /* Read in first chunk of data and parse gzip header. */ | |
197 | fpos = offset; | |
3dc20cb2 | 198 | ret = kernel_read(bprm->file, offset, buf, LBUFSIZE); |
1da177e4 LT |
199 | |
200 | strm.next_in = buf; | |
201 | strm.avail_in = ret; | |
202 | strm.total_in = 0; | |
3dc20cb2 | 203 | fpos += ret; |
1da177e4 LT |
204 | |
205 | retval = -ENOEXEC; | |
206 | ||
207 | /* Check minimum size -- gzip header */ | |
208 | if (ret < 10) { | |
4adbb6ac | 209 | pr_debug("file too small?\n"); |
1da177e4 LT |
210 | goto out_free_buf; |
211 | } | |
212 | ||
213 | /* Check gzip magic number */ | |
214 | if ((buf[0] != 037) || ((buf[1] != 0213) && (buf[1] != 0236))) { | |
4adbb6ac | 215 | pr_debug("unknown compression magic?\n"); |
1da177e4 LT |
216 | goto out_free_buf; |
217 | } | |
218 | ||
219 | /* Check gzip method */ | |
220 | if (buf[2] != 8) { | |
4adbb6ac | 221 | pr_debug("unknown compression method?\n"); |
1da177e4 LT |
222 | goto out_free_buf; |
223 | } | |
224 | /* Check gzip flags */ | |
225 | if ((buf[3] & ENCRYPTED) || (buf[3] & CONTINUATION) || | |
226 | (buf[3] & RESERVED)) { | |
4adbb6ac | 227 | pr_debug("unknown flags?\n"); |
1da177e4 LT |
228 | goto out_free_buf; |
229 | } | |
230 | ||
231 | ret = 10; | |
232 | if (buf[3] & EXTRA_FIELD) { | |
233 | ret += 2 + buf[10] + (buf[11] << 8); | |
13c3f50c | 234 | if (unlikely(ret >= LBUFSIZE)) { |
4adbb6ac | 235 | pr_debug("buffer overflow (EXTRA)?\n"); |
1da177e4 LT |
236 | goto out_free_buf; |
237 | } | |
238 | } | |
239 | if (buf[3] & ORIG_NAME) { | |
f4cfb18d | 240 | while (ret < LBUFSIZE && buf[ret++] != 0) |
1da177e4 | 241 | ; |
13c3f50c | 242 | if (unlikely(ret == LBUFSIZE)) { |
4adbb6ac | 243 | pr_debug("buffer overflow (ORIG_NAME)?\n"); |
1da177e4 LT |
244 | goto out_free_buf; |
245 | } | |
246 | } | |
247 | if (buf[3] & COMMENT) { | |
f4cfb18d | 248 | while (ret < LBUFSIZE && buf[ret++] != 0) |
1da177e4 | 249 | ; |
13c3f50c | 250 | if (unlikely(ret == LBUFSIZE)) { |
4adbb6ac | 251 | pr_debug("buffer overflow (COMMENT)?\n"); |
1da177e4 LT |
252 | goto out_free_buf; |
253 | } | |
254 | } | |
255 | ||
256 | strm.next_in += ret; | |
257 | strm.avail_in -= ret; | |
258 | ||
259 | strm.next_out = dst; | |
260 | strm.avail_out = len; | |
261 | strm.total_out = 0; | |
262 | ||
263 | if (zlib_inflateInit2(&strm, -MAX_WBITS) != Z_OK) { | |
4adbb6ac | 264 | pr_debug("zlib init failed?\n"); |
1da177e4 LT |
265 | goto out_free_buf; |
266 | } | |
267 | ||
268 | while ((ret = zlib_inflate(&strm, Z_NO_FLUSH)) == Z_OK) { | |
3dc20cb2 | 269 | ret = kernel_read(bprm->file, fpos, buf, LBUFSIZE); |
1da177e4 LT |
270 | if (ret <= 0) |
271 | break; | |
1da177e4 LT |
272 | len -= ret; |
273 | ||
274 | strm.next_in = buf; | |
275 | strm.avail_in = ret; | |
276 | strm.total_in = 0; | |
3dc20cb2 | 277 | fpos += ret; |
1da177e4 LT |
278 | } |
279 | ||
280 | if (ret < 0) { | |
4adbb6ac | 281 | pr_debug("decompression failed (%d), %s\n", |
1da177e4 LT |
282 | ret, strm.msg); |
283 | goto out_zlib; | |
284 | } | |
285 | ||
286 | retval = 0; | |
287 | out_zlib: | |
288 | zlib_inflateEnd(&strm); | |
289 | out_free_buf: | |
290 | kfree(buf); | |
291 | out_free: | |
292 | kfree(strm.workspace); | |
1da177e4 LT |
293 | return retval; |
294 | } | |
295 | ||
296 | #endif /* CONFIG_BINFMT_ZFLAT */ | |
297 | ||
298 | /****************************************************************************/ | |
299 | ||
300 | static unsigned long | |
301 | calc_reloc(unsigned long r, struct lib_info *p, int curid, int internalp) | |
302 | { | |
303 | unsigned long addr; | |
304 | int id; | |
305 | unsigned long start_brk; | |
306 | unsigned long start_data; | |
307 | unsigned long text_len; | |
308 | unsigned long start_code; | |
309 | ||
310 | #ifdef CONFIG_BINFMT_SHARED_FLAT | |
311 | if (r == 0) | |
312 | id = curid; /* Relocs of 0 are always self referring */ | |
313 | else { | |
314 | id = (r >> 24) & 0xff; /* Find ID for this reloc */ | |
315 | r &= 0x00ffffff; /* Trim ID off here */ | |
316 | } | |
317 | if (id >= MAX_SHARED_LIBS) { | |
4adbb6ac | 318 | pr_err("reference 0x%lx to shared library %d", r, id); |
1da177e4 LT |
319 | goto failed; |
320 | } | |
321 | if (curid != id) { | |
322 | if (internalp) { | |
4adbb6ac NP |
323 | pr_err("reloc address 0x%lx not in same module " |
324 | "(%d != %d)", r, curid, id); | |
1da177e4 | 325 | goto failed; |
13c3f50c NP |
326 | } else if (!p->lib_list[id].loaded && |
327 | load_flat_shared_library(id, p) < 0) { | |
4adbb6ac | 328 | pr_err("failed to load library %d", id); |
1da177e4 LT |
329 | goto failed; |
330 | } | |
331 | /* Check versioning information (i.e. time stamps) */ | |
332 | if (p->lib_list[id].build_date && p->lib_list[curid].build_date && | |
333 | p->lib_list[curid].build_date < p->lib_list[id].build_date) { | |
4adbb6ac | 334 | pr_err("library %d is younger than %d", id, curid); |
1da177e4 LT |
335 | goto failed; |
336 | } | |
337 | } | |
338 | #else | |
339 | id = 0; | |
340 | #endif | |
341 | ||
342 | start_brk = p->lib_list[id].start_brk; | |
343 | start_data = p->lib_list[id].start_data; | |
344 | start_code = p->lib_list[id].start_code; | |
345 | text_len = p->lib_list[id].text_len; | |
346 | ||
347 | if (!flat_reloc_valid(r, start_brk - start_data + text_len)) { | |
4adbb6ac | 348 | pr_err("reloc outside program 0x%lx (0 - 0x%lx/0x%lx)", |
13c3f50c | 349 | r, start_brk-start_data+text_len, text_len); |
1da177e4 LT |
350 | goto failed; |
351 | } | |
352 | ||
353 | if (r < text_len) /* In text segment */ | |
354 | addr = r + start_code; | |
355 | else /* In data segment */ | |
356 | addr = r - text_len + start_data; | |
357 | ||
358 | /* Range checked already above so doing the range tests is redundant...*/ | |
13c3f50c | 359 | return addr; |
1da177e4 LT |
360 | |
361 | failed: | |
4adbb6ac | 362 | pr_cont(", killing %s!\n", current->comm); |
1da177e4 LT |
363 | send_sig(SIGSEGV, current, 0); |
364 | ||
365 | return RELOC_FAILED; | |
366 | } | |
367 | ||
368 | /****************************************************************************/ | |
369 | ||
34303435 | 370 | static void old_reloc(unsigned long rl) |
1da177e4 | 371 | { |
13c3f50c | 372 | static const char *segment[] = { "TEXT", "DATA", "BSS", "*UNKNOWN*" }; |
1da177e4 LT |
373 | flat_v2_reloc_t r; |
374 | unsigned long *ptr; | |
13c3f50c | 375 | |
1da177e4 LT |
376 | r.value = rl; |
377 | #if defined(CONFIG_COLDFIRE) | |
378 | ptr = (unsigned long *) (current->mm->start_code + r.reloc.offset); | |
379 | #else | |
380 | ptr = (unsigned long *) (current->mm->start_data + r.reloc.offset); | |
381 | #endif | |
382 | ||
4adbb6ac NP |
383 | pr_debug("Relocation of variable at DATASEG+%x " |
384 | "(address %p, currently %lx) into segment %s\n", | |
385 | r.reloc.offset, ptr, *ptr, segment[r.reloc.type]); | |
13c3f50c | 386 | |
1da177e4 LT |
387 | switch (r.reloc.type) { |
388 | case OLD_FLAT_RELOC_TYPE_TEXT: | |
389 | *ptr += current->mm->start_code; | |
390 | break; | |
391 | case OLD_FLAT_RELOC_TYPE_DATA: | |
392 | *ptr += current->mm->start_data; | |
393 | break; | |
394 | case OLD_FLAT_RELOC_TYPE_BSS: | |
395 | *ptr += current->mm->end_data; | |
396 | break; | |
397 | default: | |
4adbb6ac | 398 | pr_err("Unknown relocation type=%x\n", r.reloc.type); |
1da177e4 LT |
399 | break; |
400 | } | |
401 | ||
4adbb6ac | 402 | pr_debug("Relocation became %lx\n", *ptr); |
13c3f50c | 403 | } |
1da177e4 LT |
404 | |
405 | /****************************************************************************/ | |
406 | ||
13c3f50c | 407 | static int load_flat_file(struct linux_binprm *bprm, |
1da177e4 LT |
408 | struct lib_info *libinfo, int id, unsigned long *extra_stack) |
409 | { | |
13c3f50c NP |
410 | struct flat_hdr *hdr; |
411 | unsigned long textpos, datapos, realdatastart; | |
412 | unsigned long text_len, data_len, bss_len, stack_len, full_data, flags; | |
413 | unsigned long len, memp, memp_size, extra, rlim; | |
414 | unsigned long *reloc, *rp; | |
1da177e4 | 415 | struct inode *inode; |
13c3f50c | 416 | int i, rev, relocs; |
1da177e4 LT |
417 | loff_t fpos; |
418 | unsigned long start_code, end_code; | |
13c3f50c | 419 | ssize_t result; |
1ad3dcc0 | 420 | int ret; |
1da177e4 LT |
421 | |
422 | hdr = ((struct flat_hdr *) bprm->buf); /* exec-header */ | |
496ad9aa | 423 | inode = file_inode(bprm->file); |
1da177e4 LT |
424 | |
425 | text_len = ntohl(hdr->data_start); | |
426 | data_len = ntohl(hdr->data_end) - ntohl(hdr->data_start); | |
427 | bss_len = ntohl(hdr->bss_end) - ntohl(hdr->data_end); | |
428 | stack_len = ntohl(hdr->stack_size); | |
429 | if (extra_stack) { | |
430 | stack_len += *extra_stack; | |
431 | *extra_stack = stack_len; | |
432 | } | |
433 | relocs = ntohl(hdr->reloc_count); | |
434 | flags = ntohl(hdr->flags); | |
435 | rev = ntohl(hdr->rev); | |
3dc20cb2 | 436 | full_data = data_len + relocs * sizeof(unsigned long); |
1da177e4 | 437 | |
845884d3 | 438 | if (strncmp(hdr->magic, "bFLT", 4)) { |
1da177e4 | 439 | /* |
e2a366dc MF |
440 | * Previously, here was a printk to tell people |
441 | * "BINFMT_FLAT: bad header magic". | |
442 | * But for the kernel which also use ELF FD-PIC format, this | |
443 | * error message is confusing. | |
1da177e4 | 444 | * because a lot of people do not manage to produce good |
1da177e4 | 445 | */ |
1ad3dcc0 LY |
446 | ret = -ENOEXEC; |
447 | goto err; | |
845884d3 GU |
448 | } |
449 | ||
450 | if (flags & FLAT_FLAG_KTRACE) | |
4adbb6ac | 451 | pr_info("Loading file: %s\n", bprm->filename); |
845884d3 GU |
452 | |
453 | if (rev != FLAT_VERSION && rev != OLD_FLAT_VERSION) { | |
4adbb6ac NP |
454 | pr_err("bad flat file version 0x%x (supported 0x%lx and 0x%lx)\n", |
455 | rev, FLAT_VERSION, OLD_FLAT_VERSION); | |
1ad3dcc0 LY |
456 | ret = -ENOEXEC; |
457 | goto err; | |
1da177e4 | 458 | } |
13c3f50c | 459 | |
1da177e4 LT |
460 | /* Don't allow old format executables to use shared libraries */ |
461 | if (rev == OLD_FLAT_VERSION && id != 0) { | |
4adbb6ac NP |
462 | pr_err("shared libraries are not available before rev 0x%lx\n", |
463 | FLAT_VERSION); | |
1ad3dcc0 LY |
464 | ret = -ENOEXEC; |
465 | goto err; | |
1da177e4 LT |
466 | } |
467 | ||
468 | /* | |
469 | * fix up the flags for the older format, there were all kinds | |
470 | * of endian hacks, this only works for the simple cases | |
471 | */ | |
472 | if (rev == OLD_FLAT_VERSION && flat_old_ram_flag(flags)) | |
473 | flags = FLAT_FLAG_RAM; | |
474 | ||
475 | #ifndef CONFIG_BINFMT_ZFLAT | |
476 | if (flags & (FLAT_FLAG_GZIP|FLAT_FLAG_GZDATA)) { | |
4adbb6ac | 477 | pr_err("Support for ZFLAT executables is not enabled.\n"); |
1ad3dcc0 LY |
478 | ret = -ENOEXEC; |
479 | goto err; | |
1da177e4 LT |
480 | } |
481 | #endif | |
482 | ||
483 | /* | |
484 | * Check initial limits. This avoids letting people circumvent | |
485 | * size limits imposed on them by creating programs with large | |
486 | * arrays in the data or bss. | |
487 | */ | |
d554ed89 | 488 | rlim = rlimit(RLIMIT_DATA); |
1da177e4 LT |
489 | if (rlim >= RLIM_INFINITY) |
490 | rlim = ~0; | |
1ad3dcc0 LY |
491 | if (data_len + bss_len > rlim) { |
492 | ret = -ENOMEM; | |
493 | goto err; | |
494 | } | |
495 | ||
1da177e4 LT |
496 | /* Flush all traces of the currently running executable */ |
497 | if (id == 0) { | |
13c3f50c NP |
498 | ret = flush_old_exec(bprm); |
499 | if (ret) | |
df88912a | 500 | goto err; |
1da177e4 LT |
501 | |
502 | /* OK, This is the point of no return */ | |
fcc18e83 | 503 | set_personality(PER_LINUX_32BIT); |
221af7f8 | 504 | setup_new_exec(bprm); |
1da177e4 LT |
505 | } |
506 | ||
507 | /* | |
508 | * calculate the extra space we need to map in | |
509 | */ | |
0e647c04 AM |
510 | extra = max_t(unsigned long, bss_len + stack_len, |
511 | relocs * sizeof(unsigned long)); | |
1da177e4 LT |
512 | |
513 | /* | |
514 | * there are a couple of cases here, the separate code/data | |
515 | * case, and then the fully copied to RAM case which lumps | |
516 | * it all together. | |
517 | */ | |
518 | if ((flags & (FLAT_FLAG_RAM|FLAT_FLAG_GZIP)) == 0) { | |
519 | /* | |
520 | * this should give us a ROM ptr, but if it doesn't we don't | |
521 | * really care | |
522 | */ | |
4adbb6ac | 523 | pr_debug("ROM mapping of file (we hope)\n"); |
1da177e4 | 524 | |
6be5ceb0 | 525 | textpos = vm_mmap(bprm->file, 0, text_len, PROT_READ|PROT_EXEC, |
925d1c40 | 526 | MAP_PRIVATE|MAP_EXECUTABLE, 0); |
0b8c78f2 | 527 | if (!textpos || IS_ERR_VALUE(textpos)) { |
1ad3dcc0 | 528 | ret = textpos; |
13c3f50c NP |
529 | if (!textpos) |
530 | ret = -ENOMEM; | |
4adbb6ac | 531 | pr_err("Unable to mmap process text, errno %d\n", ret); |
df88912a | 532 | goto err; |
1da177e4 LT |
533 | } |
534 | ||
72613e5f | 535 | len = data_len + extra + MAX_SHARED_LIBS * sizeof(unsigned long); |
0f3e442a | 536 | len = PAGE_ALIGN(len); |
13c3f50c | 537 | realdatastart = vm_mmap(NULL, 0, len, |
72613e5f | 538 | PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE, 0); |
1da177e4 | 539 | |
0b8c78f2 | 540 | if (realdatastart == 0 || IS_ERR_VALUE(realdatastart)) { |
13c3f50c | 541 | ret = realdatastart; |
1da177e4 | 542 | if (!realdatastart) |
13c3f50c | 543 | ret = -ENOMEM; |
4adbb6ac | 544 | pr_err("Unable to allocate RAM for process data, " |
13c3f50c | 545 | "errno %d\n", ret); |
7696e0c3 | 546 | vm_munmap(textpos, text_len); |
df88912a | 547 | goto err; |
1da177e4 | 548 | } |
c3dc5bec OS |
549 | datapos = ALIGN(realdatastart + |
550 | MAX_SHARED_LIBS * sizeof(unsigned long), | |
551 | FLAT_DATA_ALIGN); | |
1da177e4 | 552 | |
4adbb6ac NP |
553 | pr_debug("Allocated data+bss+stack (%ld bytes): %lx\n", |
554 | data_len + bss_len + stack_len, datapos); | |
1da177e4 LT |
555 | |
556 | fpos = ntohl(hdr->data_start); | |
557 | #ifdef CONFIG_BINFMT_ZFLAT | |
558 | if (flags & FLAT_FLAG_GZDATA) { | |
13c3f50c | 559 | result = decompress_exec(bprm, fpos, (char *)datapos, |
3dc20cb2 | 560 | full_data, 0); |
1da177e4 LT |
561 | } else |
562 | #endif | |
563 | { | |
3dc20cb2 AV |
564 | result = read_code(bprm->file, datapos, fpos, |
565 | full_data); | |
1da177e4 | 566 | } |
0b8c78f2 | 567 | if (IS_ERR_VALUE(result)) { |
13c3f50c | 568 | ret = result; |
4adbb6ac | 569 | pr_err("Unable to read data+bss, errno %d\n", ret); |
7696e0c3 AV |
570 | vm_munmap(textpos, text_len); |
571 | vm_munmap(realdatastart, len); | |
df88912a | 572 | goto err; |
1da177e4 LT |
573 | } |
574 | ||
13c3f50c NP |
575 | reloc = (unsigned long *) |
576 | (datapos + (ntohl(hdr->reloc_start) - text_len)); | |
1da177e4 | 577 | memp = realdatastart; |
0f3e442a | 578 | memp_size = len; |
1da177e4 LT |
579 | } else { |
580 | ||
72613e5f | 581 | len = text_len + data_len + extra + MAX_SHARED_LIBS * sizeof(unsigned long); |
0f3e442a | 582 | len = PAGE_ALIGN(len); |
13c3f50c | 583 | textpos = vm_mmap(NULL, 0, len, |
72613e5f | 584 | PROT_READ | PROT_EXEC | PROT_WRITE, MAP_PRIVATE, 0); |
72613e5f | 585 | |
0b8c78f2 | 586 | if (!textpos || IS_ERR_VALUE(textpos)) { |
1ad3dcc0 | 587 | ret = textpos; |
13c3f50c NP |
588 | if (!textpos) |
589 | ret = -ENOMEM; | |
4adbb6ac | 590 | pr_err("Unable to allocate RAM for process text/data, " |
13c3f50c | 591 | "errno %d\n", ret); |
df88912a | 592 | goto err; |
1da177e4 LT |
593 | } |
594 | ||
595 | realdatastart = textpos + ntohl(hdr->data_start); | |
c3dc5bec OS |
596 | datapos = ALIGN(realdatastart + |
597 | MAX_SHARED_LIBS * sizeof(unsigned long), | |
598 | FLAT_DATA_ALIGN); | |
599 | ||
600 | reloc = (unsigned long *) | |
601 | (datapos + (ntohl(hdr->reloc_start) - text_len)); | |
1da177e4 | 602 | memp = textpos; |
0f3e442a | 603 | memp_size = len; |
1da177e4 LT |
604 | #ifdef CONFIG_BINFMT_ZFLAT |
605 | /* | |
606 | * load it all in and treat it like a RAM load from now on | |
607 | */ | |
608 | if (flags & FLAT_FLAG_GZIP) { | |
13c3f50c NP |
609 | result = decompress_exec(bprm, sizeof(struct flat_hdr), |
610 | (((char *)textpos) + sizeof(struct flat_hdr)), | |
3dc20cb2 | 611 | (text_len + full_data |
13c3f50c | 612 | - sizeof(struct flat_hdr)), |
1da177e4 LT |
613 | 0); |
614 | memmove((void *) datapos, (void *) realdatastart, | |
3dc20cb2 | 615 | full_data); |
1da177e4 | 616 | } else if (flags & FLAT_FLAG_GZDATA) { |
3dc20cb2 | 617 | result = read_code(bprm->file, textpos, 0, text_len); |
0b8c78f2 | 618 | if (!IS_ERR_VALUE(result)) |
1da177e4 | 619 | result = decompress_exec(bprm, text_len, (char *) datapos, |
3dc20cb2 | 620 | full_data, 0); |
13c3f50c | 621 | } else |
1da177e4 LT |
622 | #endif |
623 | { | |
3dc20cb2 AV |
624 | result = read_code(bprm->file, textpos, 0, text_len); |
625 | if (!IS_ERR_VALUE(result)) | |
626 | result = read_code(bprm->file, datapos, | |
627 | ntohl(hdr->data_start), | |
628 | full_data); | |
1da177e4 | 629 | } |
0b8c78f2 | 630 | if (IS_ERR_VALUE(result)) { |
13c3f50c | 631 | ret = result; |
4adbb6ac | 632 | pr_err("Unable to read code+data+bss, errno %d\n", ret); |
7696e0c3 | 633 | vm_munmap(textpos, text_len + data_len + extra + |
1da177e4 | 634 | MAX_SHARED_LIBS * sizeof(unsigned long)); |
df88912a | 635 | goto err; |
1da177e4 LT |
636 | } |
637 | } | |
638 | ||
13c3f50c NP |
639 | start_code = textpos + sizeof(struct flat_hdr); |
640 | end_code = textpos + text_len; | |
641 | text_len -= sizeof(struct flat_hdr); /* the real code len */ | |
1da177e4 LT |
642 | |
643 | /* The main program needs a little extra setup in the task structure */ | |
1da177e4 LT |
644 | if (id == 0) { |
645 | current->mm->start_code = start_code; | |
646 | current->mm->end_code = end_code; | |
647 | current->mm->start_data = datapos; | |
648 | current->mm->end_data = datapos + data_len; | |
649 | /* | |
650 | * set up the brk stuff, uses any slack left in data/bss/stack | |
651 | * allocation. We put the brk after the bss (between the bss | |
652 | * and stack) like other platforms. | |
0f3e442a DH |
653 | * Userspace code relies on the stack pointer starting out at |
654 | * an address right at the end of a page. | |
1da177e4 LT |
655 | */ |
656 | current->mm->start_brk = datapos + data_len + bss_len; | |
657 | current->mm->brk = (current->mm->start_brk + 3) & ~3; | |
0f3e442a | 658 | current->mm->context.end_brk = memp + memp_size - stack_len; |
1da177e4 LT |
659 | } |
660 | ||
13c3f50c | 661 | if (flags & FLAT_FLAG_KTRACE) { |
4adbb6ac NP |
662 | pr_info("Mapping is %lx, Entry point is %x, data_start is %x\n", |
663 | textpos, 0x00ffffff&ntohl(hdr->entry), ntohl(hdr->data_start)); | |
664 | pr_info("%s %s: TEXT=%lx-%lx DATA=%lx-%lx BSS=%lx-%lx\n", | |
665 | id ? "Lib" : "Load", bprm->filename, | |
666 | start_code, end_code, datapos, datapos + data_len, | |
667 | datapos + data_len, (datapos + data_len + bss_len + 3) & ~3); | |
13c3f50c | 668 | } |
1da177e4 LT |
669 | |
670 | /* Store the current module values into the global library structure */ | |
671 | libinfo->lib_list[id].start_code = start_code; | |
672 | libinfo->lib_list[id].start_data = datapos; | |
673 | libinfo->lib_list[id].start_brk = datapos + data_len + bss_len; | |
674 | libinfo->lib_list[id].text_len = text_len; | |
675 | libinfo->lib_list[id].loaded = 1; | |
676 | libinfo->lib_list[id].entry = (0x00ffffff & ntohl(hdr->entry)) + textpos; | |
677 | libinfo->lib_list[id].build_date = ntohl(hdr->build_date); | |
13c3f50c | 678 | |
1da177e4 LT |
679 | /* |
680 | * We just load the allocations into some temporary memory to | |
681 | * help simplify all this mumbo jumbo | |
682 | * | |
683 | * We've got two different sections of relocation entries. | |
25985edc | 684 | * The first is the GOT which resides at the beginning of the data segment |
1da177e4 LT |
685 | * and is terminated with a -1. This one can be relocated in place. |
686 | * The second is the extra relocation entries tacked after the image's | |
687 | * data segment. These require a little more processing as the entry is | |
688 | * really an offset into the image which contains an offset into the | |
689 | * image. | |
690 | */ | |
691 | if (flags & FLAT_FLAG_GOTPIC) { | |
692 | for (rp = (unsigned long *)datapos; *rp != 0xffffffff; rp++) { | |
693 | unsigned long addr; | |
694 | if (*rp) { | |
695 | addr = calc_reloc(*rp, libinfo, id, 0); | |
1ad3dcc0 LY |
696 | if (addr == RELOC_FAILED) { |
697 | ret = -ENOEXEC; | |
df88912a | 698 | goto err; |
1ad3dcc0 | 699 | } |
1da177e4 LT |
700 | *rp = addr; |
701 | } | |
702 | } | |
703 | } | |
704 | ||
705 | /* | |
706 | * Now run through the relocation entries. | |
707 | * We've got to be careful here as C++ produces relocatable zero | |
708 | * entries in the constructor and destructor tables which are then | |
709 | * tested for being not zero (which will always occur unless we're | |
710 | * based from address zero). This causes an endless loop as __start | |
711 | * is at zero. The solution used is to not relocate zero addresses. | |
712 | * This has the negative side effect of not allowing a global data | |
713 | * reference to be statically initialised to _stext (I've moved | |
714 | * __start to address 4 so that is okay). | |
715 | */ | |
716 | if (rev > OLD_FLAT_VERSION) { | |
f9720205 | 717 | unsigned long persistent = 0; |
13c3f50c | 718 | for (i = 0; i < relocs; i++) { |
1da177e4 LT |
719 | unsigned long addr, relval; |
720 | ||
13c3f50c NP |
721 | /* |
722 | * Get the address of the pointer to be | |
723 | * relocated (of course, the address has to be | |
724 | * relocated first). | |
725 | */ | |
1da177e4 | 726 | relval = ntohl(reloc[i]); |
13c3f50c | 727 | if (flat_set_persistent(relval, &persistent)) |
f9720205 | 728 | continue; |
1da177e4 LT |
729 | addr = flat_get_relocate_addr(relval); |
730 | rp = (unsigned long *) calc_reloc(addr, libinfo, id, 1); | |
1ad3dcc0 LY |
731 | if (rp == (unsigned long *)RELOC_FAILED) { |
732 | ret = -ENOEXEC; | |
df88912a | 733 | goto err; |
1ad3dcc0 | 734 | } |
1da177e4 LT |
735 | |
736 | /* Get the pointer's value. */ | |
576bb9ce AM |
737 | addr = flat_get_addr_from_rp(rp, relval, flags, |
738 | &persistent); | |
1da177e4 LT |
739 | if (addr != 0) { |
740 | /* | |
741 | * Do the relocation. PIC relocs in the data section are | |
742 | * already in target order | |
743 | */ | |
744 | if ((flags & FLAT_FLAG_GOTPIC) == 0) | |
745 | addr = ntohl(addr); | |
746 | addr = calc_reloc(addr, libinfo, id, 0); | |
1ad3dcc0 LY |
747 | if (addr == RELOC_FAILED) { |
748 | ret = -ENOEXEC; | |
df88912a | 749 | goto err; |
1ad3dcc0 | 750 | } |
1da177e4 LT |
751 | |
752 | /* Write back the relocated pointer. */ | |
753 | flat_put_addr_at_rp(rp, addr, relval); | |
754 | } | |
755 | } | |
756 | } else { | |
13c3f50c | 757 | for (i = 0; i < relocs; i++) |
1da177e4 LT |
758 | old_reloc(ntohl(reloc[i])); |
759 | } | |
13c3f50c | 760 | |
1da177e4 LT |
761 | flush_icache_range(start_code, end_code); |
762 | ||
763 | /* zero the BSS, BRK and stack areas */ | |
13c3f50c | 764 | memset((void *)(datapos + data_len), 0, bss_len + |
0f3e442a DH |
765 | (memp + memp_size - stack_len - /* end brk */ |
766 | libinfo->lib_list[id].start_brk) + /* start brk */ | |
1da177e4 LT |
767 | stack_len); |
768 | ||
769 | return 0; | |
1ad3dcc0 LY |
770 | err: |
771 | return ret; | |
1da177e4 LT |
772 | } |
773 | ||
774 | ||
775 | /****************************************************************************/ | |
776 | #ifdef CONFIG_BINFMT_SHARED_FLAT | |
777 | ||
778 | /* | |
779 | * Load a shared library into memory. The library gets its own data | |
780 | * segment (including bss) but not argv/argc/environ. | |
781 | */ | |
782 | ||
783 | static int load_flat_shared_library(int id, struct lib_info *libs) | |
784 | { | |
785 | struct linux_binprm bprm; | |
786 | int res; | |
787 | char buf[16]; | |
788 | ||
3a852d3b DH |
789 | memset(&bprm, 0, sizeof(bprm)); |
790 | ||
1da177e4 LT |
791 | /* Create the file name */ |
792 | sprintf(buf, "/lib/lib%d.so", id); | |
793 | ||
794 | /* Open the file up */ | |
795 | bprm.filename = buf; | |
796 | bprm.file = open_exec(bprm.filename); | |
797 | res = PTR_ERR(bprm.file); | |
798 | if (IS_ERR(bprm.file)) | |
799 | return res; | |
800 | ||
3440625d LT |
801 | bprm.cred = prepare_exec_creds(); |
802 | res = -ENOMEM; | |
803 | if (!bprm.cred) | |
804 | goto out; | |
805 | ||
3a852d3b DH |
806 | /* We don't really care about recalculating credentials at this point |
807 | * as we're past the point of no return and are dealing with shared | |
808 | * libraries. | |
809 | */ | |
810 | bprm.cred_prepared = 1; | |
811 | ||
1da177e4 LT |
812 | res = prepare_binprm(&bprm); |
813 | ||
287980e4 | 814 | if (!res) |
1da177e4 | 815 | res = load_flat_file(&bprm, libs, id, NULL); |
3440625d LT |
816 | |
817 | abort_creds(bprm.cred); | |
818 | ||
819 | out: | |
820 | allow_write_access(bprm.file); | |
821 | fput(bprm.file); | |
822 | ||
13c3f50c | 823 | return res; |
1da177e4 LT |
824 | } |
825 | ||
826 | #endif /* CONFIG_BINFMT_SHARED_FLAT */ | |
827 | /****************************************************************************/ | |
828 | ||
829 | /* | |
830 | * These are the functions used to load flat style executables and shared | |
831 | * libraries. There is no binary dependent code anywhere else. | |
832 | */ | |
833 | ||
13c3f50c | 834 | static int load_flat_binary(struct linux_binprm *bprm) |
1da177e4 LT |
835 | { |
836 | struct lib_info libinfo; | |
71613c3b | 837 | struct pt_regs *regs = current_pt_regs(); |
1da177e4 LT |
838 | unsigned long p = bprm->p; |
839 | unsigned long stack_len; | |
840 | unsigned long start_addr; | |
841 | unsigned long *sp; | |
842 | int res; | |
843 | int i, j; | |
844 | ||
845 | memset(&libinfo, 0, sizeof(libinfo)); | |
13c3f50c | 846 | |
1da177e4 LT |
847 | /* |
848 | * We have to add the size of our arguments to our stack size | |
849 | * otherwise it's too easy for users to create stack overflows | |
850 | * by passing in a huge argument list. And yes, we have to be | |
851 | * pedantic and include space for the argv/envp array as it may have | |
852 | * a lot of entries. | |
853 | */ | |
854 | #define TOP_OF_ARGS (PAGE_SIZE * MAX_ARG_PAGES - sizeof(void *)) | |
855 | stack_len = TOP_OF_ARGS - bprm->p; /* the strings */ | |
856 | stack_len += (bprm->argc + 1) * sizeof(char *); /* the argv array */ | |
857 | stack_len += (bprm->envc + 1) * sizeof(char *); /* the envp array */ | |
2e94de8a | 858 | stack_len += FLAT_STACK_ALIGN - 1; /* reserve for upcoming alignment */ |
13c3f50c | 859 | |
1da177e4 | 860 | res = load_flat_file(bprm, &libinfo, 0, &stack_len); |
287980e4 | 861 | if (res < 0) |
1da177e4 | 862 | return res; |
13c3f50c | 863 | |
1da177e4 | 864 | /* Update data segment pointers for all libraries */ |
13c3f50c | 865 | for (i = 0; i < MAX_SHARED_LIBS; i++) |
1da177e4 | 866 | if (libinfo.lib_list[i].loaded) |
13c3f50c | 867 | for (j = 0; j < MAX_SHARED_LIBS; j++) |
1da177e4 | 868 | (-(j+1))[(unsigned long *)(libinfo.lib_list[i].start_data)] = |
13c3f50c NP |
869 | (libinfo.lib_list[j].loaded) ? |
870 | libinfo.lib_list[j].start_data : UNLOADED_LIB; | |
1da177e4 | 871 | |
a6f76f23 | 872 | install_exec_creds(bprm); |
1da177e4 LT |
873 | |
874 | set_binfmt(&flat_format); | |
875 | ||
876 | p = ((current->mm->context.end_brk + stack_len + 3) & ~3) - 4; | |
4adbb6ac | 877 | pr_debug("p=%lx\n", p); |
1da177e4 LT |
878 | |
879 | /* copy the arg pages onto the stack, this could be more efficient :-) */ | |
880 | for (i = TOP_OF_ARGS - 1; i >= bprm->p; i--) | |
13c3f50c | 881 | *(char *) --p = |
1da177e4 LT |
882 | ((char *) page_address(bprm->page[i/PAGE_SIZE]))[i % PAGE_SIZE]; |
883 | ||
884 | sp = (unsigned long *) create_flat_tables(p, bprm); | |
13c3f50c | 885 | |
1da177e4 LT |
886 | /* Fake some return addresses to ensure the call chain will |
887 | * initialise library in order for us. We are required to call | |
888 | * lib 1 first, then 2, ... and finally the main program (id 0). | |
889 | */ | |
890 | start_addr = libinfo.lib_list[0].entry; | |
891 | ||
892 | #ifdef CONFIG_BINFMT_SHARED_FLAT | |
13c3f50c | 893 | for (i = MAX_SHARED_LIBS-1; i > 0; i--) { |
1da177e4 LT |
894 | if (libinfo.lib_list[i].loaded) { |
895 | /* Push previos first to call address */ | |
896 | --sp; put_user(start_addr, sp); | |
897 | start_addr = libinfo.lib_list[i].entry; | |
898 | } | |
899 | } | |
900 | #endif | |
13c3f50c | 901 | |
1da177e4 | 902 | /* Stash our initial stack pointer into the mm structure */ |
13c3f50c | 903 | current->mm->start_stack = (unsigned long)sp; |
1da177e4 | 904 | |
74c27c43 TY |
905 | #ifdef FLAT_PLAT_INIT |
906 | FLAT_PLAT_INIT(regs); | |
907 | #endif | |
13c3f50c | 908 | |
4adbb6ac NP |
909 | pr_debug("start_thread(regs=0x%p, entry=0x%lx, start_stack=0x%lx)\n", |
910 | regs, start_addr, current->mm->start_stack); | |
1da177e4 LT |
911 | start_thread(regs, start_addr, current->mm->start_stack); |
912 | ||
1da177e4 LT |
913 | return 0; |
914 | } | |
915 | ||
916 | /****************************************************************************/ | |
917 | ||
918 | static int __init init_flat_binfmt(void) | |
919 | { | |
8fc3dc5a AV |
920 | register_binfmt(&flat_format); |
921 | return 0; | |
1da177e4 | 922 | } |
1da177e4 | 923 | core_initcall(init_flat_binfmt); |
1da177e4 LT |
924 | |
925 | /****************************************************************************/ |