Home | History | Annotate | Line # | Download | only in amd64
linux_exec_machdep.c revision 1.6
      1 /*	$NetBSD: linux_exec_machdep.c,v 1.6 2006/05/14 21:24:49 elad Exp $ */
      2 
      3 /*-
      4  * Copyright (c) 2005 Emmanuel Dreyfus, all rights reserved
      5  *
      6  * Redistribution and use in source and binary forms, with or without
      7  * modification, are permitted provided that the following conditions
      8  * are met:
      9  * 1. Redistributions of source code must retain the above copyright
     10  *    notice, this list of conditions and the following disclaimer.
     11  * 2. Redistributions in binary form must reproduce the above copyright
     12  *    notice, this list of conditions and the following disclaimer in the
     13  *    documentation and/or other materials provided with the distribution.
     14  * 3. All advertising materials mentioning features or use of this software
     15  *    must display the following acknowledgement:
     16  *	This product includes software developed by Emmanuel Dreyfus
     17  * 4. The name of the author may not be used to endorse or promote
     18  *    products derived from this software without specific prior written
     19  *    permission.
     20  *
     21  * THIS SOFTWARE IS PROVIDED BY THE THE AUTHOR AND CONTRIBUTORS ``AS IS''
     22  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
     23  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     24  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
     25  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     26  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     27  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     28  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     29  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     30  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     31  * POSSIBILITY OF SUCH DAMAGE.
     32  */
     33 
     34 #include <sys/cdefs.h>
     35 __KERNEL_RCSID(0, "$NetBSD: linux_exec_machdep.c,v 1.6 2006/05/14 21:24:49 elad Exp $");
     36 
     37 #ifdef __amd64__
     38 #define ELFSIZE 64
     39 #endif
     40 
     41 #include <sys/param.h>
     42 #include <sys/systm.h>
     43 #include <sys/kernel.h>
     44 #include <sys/resource.h>
     45 #include <sys/proc.h>
     46 #include <sys/conf.h>
     47 #include <sys/malloc.h>
     48 #include <sys/exec_elf.h>
     49 #include <sys/vnode.h>
     50 #include <sys/lwp.h>
     51 #include <sys/exec.h>
     52 #include <sys/stat.h>
     53 #include <sys/exec_elf.h>
     54 
     55 #include <machine/cpu.h>
     56 #include <machine/vmparam.h>
     57 
     58 #include <uvm/uvm.h>
     59 
     60 #include <compat/linux/common/linux_types.h>
     61 #include <compat/linux/common/linux_signal.h>
     62 #include <compat/linux/common/linux_util.h>
     63 #include <compat/linux/common/linux_ioctl.h>
     64 #include <compat/linux/common/linux_hdio.h>
     65 #include <compat/linux/common/linux_exec.h>
     66 #include <compat/linux/common/linux_machdep.h>
     67 #include <compat/linux/common/linux_errno.h>
     68 
     69 int
     70 linux_exec_setup_stack(struct lwp *l, struct exec_package *epp)
     71 {
     72 	u_long max_stack_size;
     73 	u_long access_linear_min, access_size;
     74 	u_long noaccess_linear_min, noaccess_size;
     75 
     76 #ifndef USRSTACK32
     77 #define USRSTACK32      (0x00000000ffffffffL & ~PGOFSET)
     78 #endif
     79 
     80 	if (epp->ep_flags & EXEC_32) {
     81 		epp->ep_minsaddr = USRSTACK32;
     82 		max_stack_size = MAXSSIZ;
     83 		if (epp->ep_minsaddr > LINUX_USRSTACK32)
     84 			epp->ep_minsaddr = LINUX_USRSTACK32;
     85 	} else {
     86 		epp->ep_minsaddr = USRSTACK;
     87 		max_stack_size = MAXSSIZ;
     88 		if (epp->ep_minsaddr > LINUX_USRSTACK)
     89 			epp->ep_minsaddr = LINUX_USRSTACK;
     90 
     91 	}
     92 
     93 	epp->ep_maxsaddr = (u_long)STACK_GROW(epp->ep_minsaddr,
     94 		max_stack_size);
     95 	epp->ep_ssize = l->l_proc->p_rlimit[RLIMIT_STACK].rlim_cur;
     96 
     97 	/*
     98 	 * set up commands for stack.  note that this takes *two*, one to
     99 	 * map the part of the stack which we can access, and one to map
    100 	 * the part which we can't.
    101 	 *
    102 	 * arguably, it could be made into one, but that would require the
    103 	 * addition of another mapping proc, which is unnecessary
    104 	 */
    105 	access_size = epp->ep_ssize;
    106 	access_linear_min = (u_long)STACK_ALLOC(epp->ep_minsaddr, access_size);
    107 	noaccess_size = max_stack_size - access_size;
    108 	noaccess_linear_min = (u_long)STACK_ALLOC(STACK_GROW(epp->ep_minsaddr,
    109 	    access_size), noaccess_size);
    110 	if (noaccess_size > 0) {
    111 		NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_zero, noaccess_size,
    112 		    noaccess_linear_min, NULLVP, 0, VM_PROT_NONE);
    113 	}
    114 	KASSERT(access_size > 0);
    115 	NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_zero, access_size,
    116 	    access_linear_min, NULLVP, 0, VM_PROT_READ | VM_PROT_WRITE);
    117 
    118 	return 0;
    119 }
    120 
    121 int
    122 ELFNAME2(linux,copyargs)(l, pack, arginfo, stackp, argp)
    123 	struct lwp *l;
    124 	struct exec_package *pack;
    125 	struct ps_strings *arginfo;
    126 	char **stackp;
    127 	void *argp;
    128 {
    129 	struct linux_extra_stack_data64 *esdp, esd;
    130 	struct elf_args *ap;
    131 	struct vattr *vap;
    132 	struct proc *p = l->l_proc;
    133 	Elf_Ehdr *eh;
    134 	Elf_Phdr *ph;
    135 	u_long phsize;
    136 	Elf_Addr phdr = 0;
    137 	int error;
    138 	int i;
    139 
    140 	if ((error = copyargs(l, pack, arginfo, stackp, argp)) != 0)
    141 		return error;
    142 
    143 	/*
    144 	 * Push extra arguments on the stack needed by dynamically
    145 	 * linked binaries and static binaries as well.
    146 	 */
    147 	memset(&esd, 0, sizeof(esd));
    148 	esdp = (struct linux_extra_stack_data64 *)(*stackp);
    149 	ap = (struct elf_args *)pack->ep_emul_arg;
    150 	vap = pack->ep_vap;
    151 	eh = (Elf_Ehdr *)pack->ep_hdr;
    152 
    153 	/*
    154 	 * We forgot this, so we ned to reload it now. XXX keep track of it?
    155 	 */
    156 	if (ap == NULL) {
    157 		phsize = eh->e_phnum * sizeof(Elf_Phdr);
    158 		ph = (Elf_Phdr *)malloc(phsize, M_TEMP, M_WAITOK);
    159 		error = exec_read_from(l, pack->ep_vp, eh->e_phoff, ph, phsize);
    160 		if (error != 0) {
    161 			for (i = 0; i < eh->e_phnum; i++) {
    162 				if (ph[i].p_type == PT_PHDR) {
    163 					phdr = ph[i].p_vaddr;
    164 					break;
    165 				}
    166 			}
    167 		}
    168 		free(ph, M_TEMP);
    169 	}
    170 
    171 
    172 	/*
    173 	 * The exec_package doesn't have a proc pointer and it's not
    174 	 * exactly trivial to add one since the credentials are
    175 	 * changing. XXX Linux uses curlwp's credentials.
    176 	 * Why can't we use them too?
    177 	 */
    178 
    179 	i = 0;
    180 	esd.ai[i].a_type = LINUX_AT_HWCAP;
    181 	esd.ai[i++].a_v = rcr4();
    182 
    183 	esd.ai[i].a_type = AT_PAGESZ;
    184 	esd.ai[i++].a_v = PAGE_SIZE;
    185 
    186 	esd.ai[i].a_type = LINUX_AT_CLKTCK;
    187 	esd.ai[i++].a_v = hz;
    188 
    189 	esd.ai[i].a_type = AT_PHDR;
    190 	esd.ai[i++].a_v = (ap ? ap->arg_phaddr: phdr);
    191 
    192 	esd.ai[i].a_type = AT_PHENT;
    193 	esd.ai[i++].a_v = (ap ? ap->arg_phentsize : eh->e_phentsize);
    194 
    195 	esd.ai[i].a_type = AT_PHNUM;
    196 	esd.ai[i++].a_v = (ap ? ap->arg_phnum : eh->e_phnum);
    197 
    198 	esd.ai[i].a_type = AT_BASE;
    199 	esd.ai[i++].a_v = (ap ? ap->arg_interp : 0);
    200 
    201 	esd.ai[i].a_type = AT_FLAGS;
    202 	esd.ai[i++].a_v = 0;
    203 
    204 	esd.ai[i].a_type = AT_ENTRY;
    205 	esd.ai[i++].a_v = (ap ? ap->arg_entry : eh->e_entry);
    206 
    207 	esd.ai[i].a_type = LINUX_AT_EGID;
    208 	esd.ai[i++].a_v =
    209 	    ((vap->va_mode & S_ISGID) ? vap->va_gid : kauth_cred_getegid(p->p_cred));
    210 
    211 	esd.ai[i].a_type = LINUX_AT_GID;
    212 	esd.ai[i++].a_v = kauth_cred_getgid(p->p_cred);
    213 
    214 	esd.ai[i].a_type = LINUX_AT_EUID;
    215 	esd.ai[i++].a_v =
    216 	    ((vap->va_mode & S_ISUID) ? vap->va_uid : kauth_cred_geteuid(p->p_cred));
    217 
    218 	esd.ai[i].a_type = LINUX_AT_UID;
    219 	esd.ai[i++].a_v = kauth_cred_getuid(p->p_cred);
    220 
    221 	esd.ai[i].a_type = LINUX_AT_SECURE;
    222 	esd.ai[i++].a_v = 0;
    223 
    224 	esd.ai[i].a_type = LINUX_AT_PLATFORM;
    225 	esd.ai[i++].a_v = (Elf_Addr)&esdp->hw_platform[0];
    226 
    227 	esd.ai[i].a_type = AT_NULL;
    228 	esd.ai[i++].a_v = 0;
    229 
    230 #ifdef DEBUG_LINUX
    231 	if (i != LINUX_ELF_AUX_ENTRIES) {
    232 		printf("linux_elf64_copyargs: %d Aux entries\n", i);
    233 		return EINVAL;
    234 	}
    235 #endif
    236 
    237 	strcpy(esd.hw_platform, LINUX_PLATFORM);
    238 
    239 	if (ap) {
    240 		free((char *)ap, M_TEMP);
    241 		pack->ep_emul_arg = NULL;
    242 	}
    243 
    244 	/*
    245 	 * Copy out the ELF auxiliary table and hw platform name
    246 	 */
    247 	if ((error = copyout(&esd, esdp, sizeof(esd))) != 0)
    248 		return error;
    249 	*stackp += sizeof(esd);
    250 
    251 	return 0;
    252 }
    253