Home | History | Annotate | Line # | Download | only in kern
exec_elf.c revision 1.6.4.1
      1 /*	$NetBSD: exec_elf.c,v 1.6.4.1 1996/12/05 06:41:12 rat Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1994 Christos Zoulas
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. The name of the author may not be used to endorse or promote products
     16  *    derived from this software without specific prior written permission
     17  *
     18  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     19  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     20  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     21  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     22  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     23  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     24  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     25  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     26  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     27  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     28  *
     29  */
     30 
     31 #include <sys/param.h>
     32 #include <sys/systm.h>
     33 #include <sys/kernel.h>
     34 #include <sys/proc.h>
     35 #include <sys/malloc.h>
     36 #include <sys/namei.h>
     37 #include <sys/vnode.h>
     38 #include <sys/exec.h>
     39 #include <sys/exec_elf.h>
     40 
     41 #include <sys/mman.h>
     42 #include <vm/vm.h>
     43 #include <vm/vm_param.h>
     44 #include <vm/vm_map.h>
     45 
     46 #include <machine/cpu.h>
     47 #include <machine/reg.h>
     48 #include <machine/exec.h>
     49 
     50 #ifdef COMPAT_LINUX
     51 #include <compat/linux/linux_exec.h>
     52 #endif
     53 
     54 #ifdef COMPAT_SVR4
     55 #include <compat/svr4/svr4_exec.h>
     56 #endif
     57 
     58 int (*elf_probe_funcs[]) __P((struct proc *, struct exec_package *,
     59 			      char *, u_long *)) = {
     60 #ifdef COMPAT_SVR4
     61 	svr4_elf_probe,
     62 #endif
     63 #ifdef COMPAT_LINUX
     64 	linux_elf_probe
     65 #endif
     66 };
     67 
     68 int elf_check_header __P((Elf32_Ehdr *, int));
     69 int elf_load_file __P((struct proc *, char *, struct exec_vmcmd_set *,
     70 		       u_long *, struct elf_args *, u_long *));
     71 
     72 static int elf_read_from __P((struct proc *, struct vnode *, u_long,
     73 	caddr_t, int));
     74 static void elf_load_psection __P((struct exec_vmcmd_set *,
     75 	struct vnode *, Elf32_Phdr *, u_long *, u_long *, int *));
     76 
     77 #define ELF_ALIGN(a, b) ((a) & ~((b) - 1))
     78 
     79 /*
     80  * Copy arguments onto the stack in the normal way, but add some
     81  * extra information in case of dynamic binding.
     82  */
     83 void *
     84 elf_copyargs(pack, arginfo, stack, argp)
     85 	struct exec_package *pack;
     86 	struct ps_strings *arginfo;
     87 	void *stack;
     88 	void *argp;
     89 {
     90 	size_t len;
     91 	AuxInfo ai[ELF_AUX_ENTRIES], *a;
     92 	struct elf_args *ap;
     93 
     94 	stack = copyargs(pack, arginfo, stack, argp);
     95 	if (!stack)
     96 		return NULL;
     97 
     98 	/*
     99 	 * Push extra arguments on the stack needed by dynamically
    100 	 * linked binaries
    101 	 */
    102 	if ((ap = (struct elf_args *) pack->ep_emul_arg)) {
    103 		a = ai;
    104 
    105 		a->au_id = AUX_phdr;
    106 		a->au_v = ap->arg_phaddr;
    107 		a++;
    108 
    109 		a->au_id = AUX_phent;
    110 		a->au_v = ap->arg_phentsize;
    111 		a++;
    112 
    113 		a->au_id = AUX_phnum;
    114 		a->au_v = ap->arg_phnum;
    115 		a++;
    116 
    117 		a->au_id = AUX_pagesz;
    118 		a->au_v = NBPG;
    119 		a++;
    120 
    121 		a->au_id = AUX_base;
    122 		a->au_v = ap->arg_interp;
    123 		a++;
    124 
    125 		a->au_id = AUX_flags;
    126 		a->au_v = 0;
    127 		a++;
    128 
    129 		a->au_id = AUX_entry;
    130 		a->au_v = ap->arg_entry;
    131 		a++;
    132 
    133 		a->au_id = AUX_null;
    134 		a->au_v = 0;
    135 		a++;
    136 
    137 		free((char *) ap, M_TEMP);
    138 		len = ELF_AUX_ENTRIES * sizeof (AuxInfo);
    139 		if (copyout(ai, stack, len))
    140 			return NULL;
    141 		stack += len;
    142 	}
    143 	return stack;
    144 }
    145 
    146 /*
    147  * elf_check_header():
    148  *
    149  * Check header for validity; return 0 of ok ENOEXEC if error
    150  *
    151  * XXX machine type needs to be moved to <machine/param.h> so
    152  * just one comparison can be done. Unfortunately, there is both
    153  * em_486 and em_386, so this would not work on the i386.
    154  */
    155 int
    156 elf_check_header(eh, type)
    157 	Elf32_Ehdr *eh;
    158 	int type;
    159 {
    160 
    161 	if (bcmp(eh->e_ident, Elf32_e_ident, Elf32_e_siz) != 0)
    162 		return ENOEXEC;
    163 
    164 	switch (eh->e_machine) {
    165 	/* XXX */
    166 #ifdef i386
    167 	case Elf32_em_386:
    168 	case Elf32_em_486:
    169 #endif
    170 #ifdef sparc
    171 	case Elf32_em_sparc:
    172 #endif
    173 		break;
    174 
    175 	default:
    176 		return ENOEXEC;
    177 	}
    178 
    179 	if (eh->e_type != type)
    180 		return ENOEXEC;
    181 
    182 	return 0;
    183 }
    184 
    185 /*
    186  * elf_load_psection():
    187  *
    188  * Load a psection at the appropriate address
    189  */
    190 static void
    191 elf_load_psection(vcset, vp, ph, addr, size, prot)
    192 	struct exec_vmcmd_set *vcset;
    193 	struct vnode *vp;
    194 	Elf32_Phdr *ph;
    195 	u_long *addr;
    196 	u_long *size;
    197 	int *prot;
    198 {
    199 	u_long uaddr, msize, rm, rf;
    200 	long diff, offset;
    201 
    202 	/*
    203          * If the user specified an address, then we load there.
    204          */
    205 	if (*addr != ELF32_NO_ADDR) {
    206 		if (ph->p_align > 1) {
    207 			*addr = ELF_ALIGN(*addr + ph->p_align, ph->p_align);
    208 			uaddr = ELF_ALIGN(ph->p_vaddr, ph->p_align);
    209 		} else
    210 			uaddr = ph->p_vaddr;
    211 		diff = ph->p_vaddr - uaddr;
    212 	} else {
    213 		*addr = uaddr = ph->p_vaddr;
    214 		if (ph->p_align > 1)
    215 			*addr = ELF_ALIGN(uaddr, ph->p_align);
    216 		diff = uaddr - *addr;
    217 	}
    218 
    219 	*prot |= (ph->p_flags & Elf32_pf_r) ? VM_PROT_READ : 0;
    220 	*prot |= (ph->p_flags & Elf32_pf_w) ? VM_PROT_WRITE : 0;
    221 	*prot |= (ph->p_flags & Elf32_pf_x) ? VM_PROT_EXECUTE : 0;
    222 
    223 	offset = ph->p_offset - diff;
    224 	*size = ph->p_filesz + diff;
    225 	msize = ph->p_memsz + diff;
    226 
    227 	NEW_VMCMD(vcset, vmcmd_map_readvn, *size, *addr, vp, offset, *prot);
    228 
    229 	/*
    230          * Check if we need to extend the size of the segment
    231          */
    232 	rm = round_page(*addr + msize);
    233 	rf = round_page(*addr + *size);
    234 
    235 	if (rm != rf) {
    236 		NEW_VMCMD(vcset, vmcmd_map_zero, rm - rf, rf, NULLVP, 0, *prot);
    237 		*size = msize;
    238 	}
    239 }
    240 
    241 /*
    242  * elf_read_from():
    243  *
    244  *	Read from vnode into buffer at offset.
    245  */
    246 static int
    247 elf_read_from(p, vp, off, buf, size)
    248 	struct vnode *vp;
    249 	u_long off;
    250 	struct proc *p;
    251 	caddr_t buf;
    252 	int size;
    253 {
    254 	int error;
    255 	int resid;
    256 
    257 	if ((error = vn_rdwr(UIO_READ, vp, buf, size,
    258 			     off, UIO_SYSSPACE, IO_NODELOCKED, p->p_ucred,
    259 			     &resid, p)) != 0)
    260 		return error;
    261 	/*
    262          * See if we got all of it
    263          */
    264 	if (resid != 0)
    265 		return ENOEXEC;
    266 	return 0;
    267 }
    268 
    269 /*
    270  * elf_load_file():
    271  *
    272  * Load a file (interpreter/library) pointed to by path
    273  * [stolen from coff_load_shlib()]. Made slightly generic
    274  * so it might be used externally.
    275  */
    276 int
    277 elf_load_file(p, path, vcset, entry, ap, last)
    278 	struct proc *p;
    279 	char *path;
    280 	struct exec_vmcmd_set *vcset;
    281 	u_long *entry;
    282 	struct elf_args	*ap;
    283 	u_long *last;
    284 {
    285 	int error, i;
    286 	struct nameidata nd;
    287 	Elf32_Ehdr eh;
    288 	Elf32_Phdr *ph = NULL;
    289 	u_long phsize;
    290 	char *bp = NULL;
    291 	u_long addr = *last;
    292 
    293 	bp = path;
    294 	/*
    295          * 1. open file
    296          * 2. read filehdr
    297          * 3. map text, data, and bss out of it using VM_*
    298          */
    299 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_SYSSPACE, path, p);
    300 	if ((error = namei(&nd)) != 0) {
    301 		return error;
    302 	}
    303 	if ((error = elf_read_from(p, nd.ni_vp, 0, (caddr_t) &eh,
    304 				    sizeof(eh))) != 0)
    305 		goto bad;
    306 
    307 	if ((error = elf_check_header(&eh, Elf32_et_dyn)) != 0)
    308 		goto bad;
    309 
    310 	phsize = eh.e_phnum * sizeof(Elf32_Phdr);
    311 	ph = (Elf32_Phdr *) malloc(phsize, M_TEMP, M_WAITOK);
    312 
    313 	if ((error = elf_read_from(p, nd.ni_vp, eh.e_phoff,
    314 				    (caddr_t) ph, phsize)) != 0)
    315 		goto bad;
    316 
    317 	/*
    318          * Load all the necessary sections
    319          */
    320 	for (i = 0; i < eh.e_phnum; i++) {
    321 		u_long size = 0;
    322 		int prot = 0;
    323 
    324 		switch (ph[i].p_type) {
    325 		case Elf32_pt_load:
    326 			elf_load_psection(vcset, nd.ni_vp, &ph[i], &addr,
    327 						&size, &prot);
    328 			/* If entry is within this section it must be text */
    329 			if (eh.e_entry >= ph[i].p_vaddr &&
    330 			    eh.e_entry < (ph[i].p_vaddr + size)) {
    331 				*entry = addr + eh.e_entry;
    332 				ap->arg_interp = addr;
    333 			}
    334 			addr += size;
    335 			break;
    336 
    337 		case Elf32_pt_dynamic:
    338 		case Elf32_pt_phdr:
    339 		case Elf32_pt_note:
    340 			break;
    341 
    342 		default:
    343 			break;
    344 		}
    345 	}
    346 
    347 bad:
    348 	if (ph != NULL)
    349 		free((char *) ph, M_TEMP);
    350 
    351 	*last = addr;
    352 	vrele(nd.ni_vp);
    353 	return error;
    354 }
    355 
    356 /*
    357  * exec_elf_makecmds(): Prepare an Elf binary's exec package
    358  *
    359  * First, set of the various offsets/lengths in the exec package.
    360  *
    361  * Then, mark the text image busy (so it can be demand paged) or error
    362  * out if this is not possible.  Finally, set up vmcmds for the
    363  * text, data, bss, and stack segments.
    364  *
    365  * XXX no demand paging (yet?)
    366  */
    367 int
    368 exec_elf_makecmds(p, epp)
    369 	struct proc *p;
    370 	struct exec_package *epp;
    371 {
    372 	Elf32_Ehdr *eh = epp->ep_hdr;
    373 	Elf32_Phdr *ph, *pp;
    374 	Elf32_Addr phdr = 0;
    375 	int error, i, n, nload;
    376 	char interp[MAXPATHLEN];
    377 	u_long pos = 0, phsize;
    378 
    379 	if (epp->ep_hdrvalid < sizeof(Elf32_Ehdr))
    380 		return ENOEXEC;
    381 
    382 	if (elf_check_header(eh, Elf32_et_exec))
    383 		return ENOEXEC;
    384 
    385 	/*
    386          * check if vnode is in open for writing, because we want to
    387          * demand-page out of it.  if it is, don't do it, for various
    388          * reasons
    389          */
    390 	if (epp->ep_vp->v_writecount != 0) {
    391 #ifdef DIAGNOSTIC
    392 		if (epp->ep_vp->v_flag & VTEXT)
    393 			panic("exec: a VTEXT vnode has writecount != 0\n");
    394 #endif
    395 		return ETXTBSY;
    396 	}
    397 	/*
    398          * Allocate space to hold all the program headers, and read them
    399          * from the file
    400          */
    401 	phsize = eh->e_phnum * sizeof(Elf32_Phdr);
    402 	ph = (Elf32_Phdr *) malloc(phsize, M_TEMP, M_WAITOK);
    403 
    404 	if ((error = elf_read_from(p, epp->ep_vp, eh->e_phoff,
    405 				    (caddr_t) ph, phsize)) != 0)
    406 		goto bad;
    407 
    408 	epp->ep_taddr = epp->ep_tsize = ELF32_NO_ADDR;
    409 	epp->ep_daddr = epp->ep_dsize = ELF32_NO_ADDR;
    410 
    411 	interp[0] = '\0';
    412 
    413 	for (i = 0; i < eh->e_phnum; i++) {
    414 		pp = &ph[i];
    415 		if (pp->p_type == Elf32_pt_interp) {
    416 			if (pp->p_filesz >= sizeof(interp))
    417 				goto bad;
    418 			if ((error = elf_read_from(p, epp->ep_vp, pp->p_offset,
    419 				      (caddr_t) interp, pp->p_filesz)) != 0)
    420 				goto bad;
    421 			break;
    422 		}
    423 	}
    424 
    425 	/*
    426 	 * On the same architecture, we may be emulating different systems.
    427 	 * See which one will accept this executable. This currently only
    428 	 * applies to Linux and SVR4 on the i386.
    429 	 *
    430 	 * Probe functions would normally see if the interpreter (if any)
    431 	 * exists. Emulation packages may possibly replace the interpreter in
    432 	 * interp[] with a changed path (/emul/xxx/<path>), and also
    433 	 * set the ep_emul field in the exec package structure.
    434 	 */
    435 	if ((n = sizeof elf_probe_funcs / sizeof elf_probe_funcs[0])) {
    436 		error = ENOEXEC;
    437 		for (i = 0; i < n && error; i++)
    438 			error = elf_probe_funcs[i](p, epp, interp, &pos);
    439 
    440 		if (error)
    441 			goto bad;
    442 	}
    443 
    444 	/*
    445          * Load all the necessary sections
    446          */
    447 	for (i = nload = 0; i < eh->e_phnum; i++) {
    448 		u_long  addr = ELF32_NO_ADDR, size = 0;
    449 		int prot = 0;
    450 
    451 		pp = &ph[i];
    452 
    453 		switch (ph[i].p_type) {
    454 		case Elf32_pt_load:
    455 			/*
    456 			 * XXX
    457 			 * Can handle only 2 sections: text and data
    458 			 */
    459 			if (nload++ == 2)
    460 				goto bad;
    461 			elf_load_psection(&epp->ep_vmcmds, epp->ep_vp,
    462 				&ph[i], &addr, &size, &prot);
    463 			/*
    464 			 * Decide whether it's text or data by looking
    465 			 * at the entry point.
    466 			 */
    467 			if (eh->e_entry >= addr && eh->e_entry < (addr + size)){
    468 				epp->ep_taddr = addr;
    469 				epp->ep_tsize = size;
    470 				if (epp->ep_daddr == ELF32_NO_ADDR) {
    471 					epp->ep_daddr = addr;
    472 					epp->ep_dsize = size;
    473 				}
    474 			} else {
    475 				epp->ep_daddr = addr;
    476 				epp->ep_dsize = size;
    477 			}
    478 			break;
    479 
    480 		case Elf32_pt_shlib:
    481 			error = ENOEXEC;
    482 			goto bad;
    483 
    484 		case Elf32_pt_interp:
    485 			/* Already did this one */
    486 		case Elf32_pt_dynamic:
    487 		case Elf32_pt_note:
    488 			break;
    489 
    490 		case Elf32_pt_phdr:
    491 			/* Note address of program headers (in text segment) */
    492 			phdr = pp->p_vaddr;
    493 		break;
    494 
    495 		default:
    496 			/*
    497 			 * Not fatal, we don't need to understand everything
    498 			 * :-)
    499 			 */
    500 			break;
    501 		}
    502 	}
    503 
    504 	/*
    505 	 * If no position to load the interpreter was set by a probe
    506 	 * function, pick the same address that a non-fixed mmap(0, ..)
    507 	 * would (i.e. something safely out of the way).
    508 	 */
    509 	if (pos == ELF32_NO_ADDR)
    510 		pos = round_page(epp->ep_daddr + MAXDSIZ);
    511 
    512 	/*
    513          * Check if we found a dynamically linked binary and arrange to load
    514          * it's interpreter
    515          */
    516 	if (interp[0]) {
    517 		struct elf_args *ap;
    518 
    519 		ap = (struct elf_args *) malloc(sizeof(struct elf_args),
    520 						 M_TEMP, M_WAITOK);
    521 		if ((error = elf_load_file(p, interp, &epp->ep_vmcmds,
    522 				&epp->ep_entry, ap, &pos)) != 0) {
    523 			free((char *) ap, M_TEMP);
    524 			goto bad;
    525 		}
    526 		pos += phsize;
    527 		ap->arg_phaddr = phdr;
    528 
    529 		ap->arg_phentsize = eh->e_phentsize;
    530 		ap->arg_phnum = eh->e_phnum;
    531 		ap->arg_entry = eh->e_entry;
    532 
    533 		epp->ep_emul_arg = ap;
    534 	} else
    535 		epp->ep_entry = eh->e_entry;
    536 
    537 	free((char *) ph, M_TEMP);
    538 	epp->ep_vp->v_flag |= VTEXT;
    539 	return exec_aout_setup_stack(p, epp);
    540 
    541 bad:
    542 	free((char *) ph, M_TEMP);
    543 	kill_vmcmds(&epp->ep_vmcmds);
    544 	return ENOEXEC;
    545 }
    546