The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/kern/imgact_elf.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2000 David O'Brien
    3  * Copyright (c) 1995-1996 Søren Schmidt
    4  * Copyright (c) 1996 Peter Wemm
    5  * All rights reserved.
    6  *
    7  * Redistribution and use in source and binary forms, with or without
    8  * modification, are permitted provided that the following conditions
    9  * are met:
   10  * 1. Redistributions of source code must retain the above copyright
   11  *    notice, this list of conditions and the following disclaimer
   12  *    in this position and unchanged.
   13  * 2. Redistributions in binary form must reproduce the above copyright
   14  *    notice, this list of conditions and the following disclaimer in the
   15  *    documentation and/or other materials provided with the distribution.
   16  * 3. The name of the author may not be used to endorse or promote products
   17  *    derived from this software without specific prior written permission
   18  *
   19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
   20  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
   21  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
   22  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
   23  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
   24  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
   25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
   26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
   27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
   28  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   29  */
   30 
   31 #include <sys/cdefs.h>
   32 __FBSDID("$FreeBSD$");
   33 
   34 #include "opt_compat.h"
   35 
   36 #include <sys/param.h>
   37 #include <sys/exec.h>
   38 #include <sys/fcntl.h>
   39 #include <sys/imgact.h>
   40 #include <sys/imgact_elf.h>
   41 #include <sys/kernel.h>
   42 #include <sys/lock.h>
   43 #include <sys/malloc.h>
   44 #include <sys/mount.h>
   45 #include <sys/mutex.h>
   46 #include <sys/mman.h>
   47 #include <sys/namei.h>
   48 #include <sys/pioctl.h>
   49 #include <sys/proc.h>
   50 #include <sys/procfs.h>
   51 #include <sys/resourcevar.h>
   52 #include <sys/sf_buf.h>
   53 #include <sys/systm.h>
   54 #include <sys/signalvar.h>
   55 #include <sys/stat.h>
   56 #include <sys/sx.h>
   57 #include <sys/syscall.h>
   58 #include <sys/sysctl.h>
   59 #include <sys/sysent.h>
   60 #include <sys/vnode.h>
   61 
   62 #include <vm/vm.h>
   63 #include <vm/vm_kern.h>
   64 #include <vm/vm_param.h>
   65 #include <vm/pmap.h>
   66 #include <vm/vm_map.h>
   67 #include <vm/vm_object.h>
   68 #include <vm/vm_extern.h>
   69 
   70 #include <machine/elf.h>
   71 #include <machine/md_var.h>
   72 
   73 #if defined(COMPAT_IA32) && __ELF_WORD_SIZE == 32
   74 #include <machine/fpu.h>
   75 #include <compat/ia32/ia32_reg.h>
   76 #endif
   77 
   78 #define OLD_EI_BRAND    8
   79 
   80 static int __elfN(check_header)(const Elf_Ehdr *hdr);
   81 static Elf_Brandinfo *__elfN(get_brandinfo)(struct image_params *imgp,
   82     const char *interp, int32_t *osrel);
   83 static int __elfN(load_file)(struct proc *p, const char *file, u_long *addr,
   84     u_long *entry, size_t pagesize);
   85 static int __elfN(load_section)(struct vmspace *vmspace, vm_object_t object,
   86     vm_offset_t offset, caddr_t vmaddr, size_t memsz, size_t filsz,
   87     vm_prot_t prot, size_t pagesize);
   88 static int __CONCAT(exec_, __elfN(imgact))(struct image_params *imgp);
   89 static boolean_t __elfN(check_note)(struct image_params *imgp,
   90     Elf_Brandnote *checknote, int32_t *osrel);
   91 
   92 SYSCTL_NODE(_kern, OID_AUTO, __CONCAT(elf, __ELF_WORD_SIZE), CTLFLAG_RW, 0,
   93     "");
   94 
   95 int __elfN(fallback_brand) = -1;
   96 SYSCTL_INT(__CONCAT(_kern_elf, __ELF_WORD_SIZE), OID_AUTO,
   97     fallback_brand, CTLFLAG_RW, &__elfN(fallback_brand), 0,
   98     __XSTRING(__CONCAT(ELF, __ELF_WORD_SIZE)) " brand of last resort");
   99 TUNABLE_INT("kern.elf" __XSTRING(__ELF_WORD_SIZE) ".fallback_brand",
  100     &__elfN(fallback_brand));
  101 
  102 static int elf_trace = 0;
  103 SYSCTL_INT(_debug, OID_AUTO, __elfN(trace), CTLFLAG_RW, &elf_trace, 0, "");
  104 
  105 static int elf_legacy_coredump = 0;
  106 SYSCTL_INT(_debug, OID_AUTO, __elfN(legacy_coredump), CTLFLAG_RW, 
  107     &elf_legacy_coredump, 0, "");
  108 
  109 static Elf_Brandinfo *elf_brand_list[MAX_BRANDS];
  110 
  111 #define trunc_page_ps(va, ps)   ((va) & ~(ps - 1))
  112 #define round_page_ps(va, ps)   (((va) + (ps - 1)) & ~(ps - 1))
  113 #define aligned(a, t)   (trunc_page_ps((u_long)(a), sizeof(t)) == (u_long)(a))
  114 
  115 static const char FREEBSD_ABI_VENDOR[] = "FreeBSD";
  116 
  117 Elf_Brandnote __elfN(freebsd_brandnote) = {
  118         .hdr.n_namesz   = sizeof(FREEBSD_ABI_VENDOR),
  119         .hdr.n_descsz   = sizeof(int32_t),
  120         .hdr.n_type     = 1,
  121         .vendor         = FREEBSD_ABI_VENDOR,
  122         .flags          = BN_CAN_FETCH_OSREL
  123 };
  124 
  125 int
  126 __elfN(insert_brand_entry)(Elf_Brandinfo *entry)
  127 {
  128         int i;
  129 
  130         for (i = 0; i < MAX_BRANDS; i++) {
  131                 if (elf_brand_list[i] == NULL) {
  132                         elf_brand_list[i] = entry;
  133                         break;
  134                 }
  135         }
  136         if (i == MAX_BRANDS)
  137                 return (-1);
  138         return (0);
  139 }
  140 
  141 int
  142 __elfN(remove_brand_entry)(Elf_Brandinfo *entry)
  143 {
  144         int i;
  145 
  146         for (i = 0; i < MAX_BRANDS; i++) {
  147                 if (elf_brand_list[i] == entry) {
  148                         elf_brand_list[i] = NULL;
  149                         break;
  150                 }
  151         }
  152         if (i == MAX_BRANDS)
  153                 return (-1);
  154         return (0);
  155 }
  156 
  157 int
  158 __elfN(brand_inuse)(Elf_Brandinfo *entry)
  159 {
  160         struct proc *p;
  161         int rval = FALSE;
  162 
  163         sx_slock(&allproc_lock);
  164         FOREACH_PROC_IN_SYSTEM(p) {
  165                 if (p->p_sysent == entry->sysvec) {
  166                         rval = TRUE;
  167                         break;
  168                 }
  169         }
  170         sx_sunlock(&allproc_lock);
  171 
  172         return (rval);
  173 }
  174 
  175 static Elf_Brandinfo *
  176 __elfN(get_brandinfo)(struct image_params *imgp, const char *interp,
  177     int32_t *osrel)
  178 {
  179         const Elf_Ehdr *hdr = (const Elf_Ehdr *)imgp->image_header;
  180         Elf_Brandinfo *bi;
  181         boolean_t ret;
  182         int i;
  183 
  184         /*
  185          * We support four types of branding -- (1) the ELF EI_OSABI field
  186          * that SCO added to the ELF spec, (2) FreeBSD 3.x's traditional string
  187          * branding w/in the ELF header, (3) path of the `interp_path'
  188          * field, and (4) the ".note.ABI-tag" ELF section.
  189          */
  190 
  191         /* Look for an ".note.ABI-tag" ELF section */
  192         for (i = 0; i < MAX_BRANDS; i++) {
  193                 bi = elf_brand_list[i];
  194                 if (bi != NULL && hdr->e_machine == bi->machine &&
  195                     (bi->flags & BI_BRAND_NOTE) != 0) {
  196                         ret = __elfN(check_note)(imgp, bi->brand_note, osrel);
  197                         if (ret)
  198                                 return (bi);
  199                 }
  200         }
  201 
  202         /* If the executable has a brand, search for it in the brand list. */
  203         for (i = 0; i < MAX_BRANDS; i++) {
  204                 bi = elf_brand_list[i];
  205                 if (bi != NULL && hdr->e_machine == bi->machine &&
  206                     (hdr->e_ident[EI_OSABI] == bi->brand ||
  207                     strncmp((const char *)&hdr->e_ident[OLD_EI_BRAND],
  208                     bi->compat_3_brand, strlen(bi->compat_3_brand)) == 0))
  209                         return (bi);
  210         }
  211 
  212         /* Lacking a known brand, search for a recognized interpreter. */
  213         if (interp != NULL) {
  214                 for (i = 0; i < MAX_BRANDS; i++) {
  215                         bi = elf_brand_list[i];
  216                         if (bi != NULL && hdr->e_machine == bi->machine &&
  217                             strcmp(interp, bi->interp_path) == 0)
  218                                 return (bi);
  219                 }
  220         }
  221 
  222         /* Lacking a recognized interpreter, try the default brand */
  223         for (i = 0; i < MAX_BRANDS; i++) {
  224                 bi = elf_brand_list[i];
  225                 if (bi != NULL && hdr->e_machine == bi->machine &&
  226                     __elfN(fallback_brand) == bi->brand)
  227                         return (bi);
  228         }
  229         return (NULL);
  230 }
  231 
  232 static int
  233 __elfN(check_header)(const Elf_Ehdr *hdr)
  234 {
  235         Elf_Brandinfo *bi;
  236         int i;
  237 
  238         if (!IS_ELF(*hdr) ||
  239             hdr->e_ident[EI_CLASS] != ELF_TARG_CLASS ||
  240             hdr->e_ident[EI_DATA] != ELF_TARG_DATA ||
  241             hdr->e_ident[EI_VERSION] != EV_CURRENT ||
  242             hdr->e_phentsize != sizeof(Elf_Phdr) ||
  243             hdr->e_version != ELF_TARG_VER)
  244                 return (ENOEXEC);
  245 
  246         /*
  247          * Make sure we have at least one brand for this machine.
  248          */
  249 
  250         for (i = 0; i < MAX_BRANDS; i++) {
  251                 bi = elf_brand_list[i];
  252                 if (bi != NULL && bi->machine == hdr->e_machine)
  253                         break;
  254         }
  255         if (i == MAX_BRANDS)
  256                 return (ENOEXEC);
  257 
  258         return (0);
  259 }
  260 
  261 static int
  262 __elfN(map_partial)(vm_map_t map, vm_object_t object, vm_ooffset_t offset,
  263     vm_offset_t start, vm_offset_t end, vm_prot_t prot)
  264 {
  265         struct sf_buf *sf;
  266         int error;
  267         vm_offset_t off;
  268 
  269         /*
  270          * Create the page if it doesn't exist yet. Ignore errors.
  271          */
  272         vm_map_lock(map);
  273         vm_map_insert(map, NULL, 0, trunc_page(start), round_page(end),
  274             VM_PROT_ALL, VM_PROT_ALL, 0);
  275         vm_map_unlock(map);
  276 
  277         /*
  278          * Find the page from the underlying object.
  279          */
  280         if (object) {
  281                 sf = vm_imgact_map_page(object, offset);
  282                 if (sf == NULL)
  283                         return (KERN_FAILURE);
  284                 off = offset - trunc_page(offset);
  285                 error = copyout((caddr_t)sf_buf_kva(sf) + off, (caddr_t)start,
  286                     end - start);
  287                 vm_imgact_unmap_page(sf);
  288                 if (error) {
  289                         return (KERN_FAILURE);
  290                 }
  291         }
  292 
  293         return (KERN_SUCCESS);
  294 }
  295 
  296 static int
  297 __elfN(map_insert)(vm_map_t map, vm_object_t object, vm_ooffset_t offset,
  298     vm_offset_t start, vm_offset_t end, vm_prot_t prot, int cow)
  299 {
  300         struct sf_buf *sf;
  301         vm_offset_t off;
  302         vm_size_t sz;
  303         int error, rv;
  304 
  305         if (start != trunc_page(start)) {
  306                 rv = __elfN(map_partial)(map, object, offset, start,
  307                     round_page(start), prot);
  308                 if (rv)
  309                         return (rv);
  310                 offset += round_page(start) - start;
  311                 start = round_page(start);
  312         }
  313         if (end != round_page(end)) {
  314                 rv = __elfN(map_partial)(map, object, offset +
  315                     trunc_page(end) - start, trunc_page(end), end, prot);
  316                 if (rv)
  317                         return (rv);
  318                 end = trunc_page(end);
  319         }
  320         if (end > start) {
  321                 if (offset & PAGE_MASK) {
  322                         /*
  323                          * The mapping is not page aligned. This means we have
  324                          * to copy the data. Sigh.
  325                          */
  326                         rv = vm_map_find(map, NULL, 0, &start, end - start,
  327                             FALSE, prot | VM_PROT_WRITE, VM_PROT_ALL, 0);
  328                         if (rv)
  329                                 return (rv);
  330                         if (object == NULL)
  331                                 return (KERN_SUCCESS);
  332                         for (; start < end; start += sz) {
  333                                 sf = vm_imgact_map_page(object, offset);
  334                                 if (sf == NULL)
  335                                         return (KERN_FAILURE);
  336                                 off = offset - trunc_page(offset);
  337                                 sz = end - start;
  338                                 if (sz > PAGE_SIZE - off)
  339                                         sz = PAGE_SIZE - off;
  340                                 error = copyout((caddr_t)sf_buf_kva(sf) + off,
  341                                     (caddr_t)start, sz);
  342                                 vm_imgact_unmap_page(sf);
  343                                 if (error) {
  344                                         return (KERN_FAILURE);
  345                                 }
  346                                 offset += sz;
  347                         }
  348                         rv = KERN_SUCCESS;
  349                 } else {
  350                         vm_object_reference(object);
  351                         vm_map_lock(map);
  352                         rv = vm_map_insert(map, object, offset, start, end,
  353                             prot, VM_PROT_ALL, cow);
  354                         vm_map_unlock(map);
  355                         if (rv != KERN_SUCCESS)
  356                                 vm_object_deallocate(object);
  357                 }
  358                 return (rv);
  359         } else {
  360                 return (KERN_SUCCESS);
  361         }
  362 }
  363 
  364 static int
  365 __elfN(load_section)(struct vmspace *vmspace,
  366         vm_object_t object, vm_offset_t offset,
  367         caddr_t vmaddr, size_t memsz, size_t filsz, vm_prot_t prot,
  368         size_t pagesize)
  369 {
  370         struct sf_buf *sf;
  371         size_t map_len;
  372         vm_offset_t map_addr;
  373         int error, rv, cow;
  374         size_t copy_len;
  375         vm_offset_t file_addr;
  376 
  377         /*
  378          * It's necessary to fail if the filsz + offset taken from the
  379          * header is greater than the actual file pager object's size.
  380          * If we were to allow this, then the vm_map_find() below would
  381          * walk right off the end of the file object and into the ether.
  382          *
  383          * While I'm here, might as well check for something else that
  384          * is invalid: filsz cannot be greater than memsz.
  385          */
  386         if ((off_t)filsz + offset > object->un_pager.vnp.vnp_size ||
  387             filsz > memsz) {
  388                 uprintf("elf_load_section: truncated ELF file\n");
  389                 return (ENOEXEC);
  390         }
  391 
  392         map_addr = trunc_page_ps((vm_offset_t)vmaddr, pagesize);
  393         file_addr = trunc_page_ps(offset, pagesize);
  394 
  395         /*
  396          * We have two choices.  We can either clear the data in the last page
  397          * of an oversized mapping, or we can start the anon mapping a page
  398          * early and copy the initialized data into that first page.  We
  399          * choose the second..
  400          */
  401         if (memsz > filsz)
  402                 map_len = trunc_page_ps(offset + filsz, pagesize) - file_addr;
  403         else
  404                 map_len = round_page_ps(offset + filsz, pagesize) - file_addr;
  405 
  406         if (map_len != 0) {
  407                 /* cow flags: don't dump readonly sections in core */
  408                 cow = MAP_COPY_ON_WRITE | MAP_PREFAULT |
  409                     (prot & VM_PROT_WRITE ? 0 : MAP_DISABLE_COREDUMP);
  410 
  411                 rv = __elfN(map_insert)(&vmspace->vm_map,
  412                                       object,
  413                                       file_addr,        /* file offset */
  414                                       map_addr,         /* virtual start */
  415                                       map_addr + map_len,/* virtual end */
  416                                       prot,
  417                                       cow);
  418                 if (rv != KERN_SUCCESS)
  419                         return (EINVAL);
  420 
  421                 /* we can stop now if we've covered it all */
  422                 if (memsz == filsz) {
  423                         return (0);
  424                 }
  425         }
  426 
  427 
  428         /*
  429          * We have to get the remaining bit of the file into the first part
  430          * of the oversized map segment.  This is normally because the .data
  431          * segment in the file is extended to provide bss.  It's a neat idea
  432          * to try and save a page, but it's a pain in the behind to implement.
  433          */
  434         copy_len = (offset + filsz) - trunc_page_ps(offset + filsz, pagesize);
  435         map_addr = trunc_page_ps((vm_offset_t)vmaddr + filsz, pagesize);
  436         map_len = round_page_ps((vm_offset_t)vmaddr + memsz, pagesize) -
  437             map_addr;
  438 
  439         /* This had damn well better be true! */
  440         if (map_len != 0) {
  441                 rv = __elfN(map_insert)(&vmspace->vm_map, NULL, 0, map_addr,
  442                     map_addr + map_len, VM_PROT_ALL, 0);
  443                 if (rv != KERN_SUCCESS) {
  444                         return (EINVAL);
  445                 }
  446         }
  447 
  448         if (copy_len != 0) {
  449                 vm_offset_t off;
  450 
  451                 sf = vm_imgact_map_page(object, offset + filsz);
  452                 if (sf == NULL)
  453                         return (EIO);
  454 
  455                 /* send the page fragment to user space */
  456                 off = trunc_page_ps(offset + filsz, pagesize) -
  457                     trunc_page(offset + filsz);
  458                 error = copyout((caddr_t)sf_buf_kva(sf) + off,
  459                     (caddr_t)map_addr, copy_len);
  460                 vm_imgact_unmap_page(sf);
  461                 if (error) {
  462                         return (error);
  463                 }
  464         }
  465 
  466         /*
  467          * set it to the specified protection.
  468          * XXX had better undo the damage from pasting over the cracks here!
  469          */
  470         vm_map_protect(&vmspace->vm_map, trunc_page(map_addr),
  471             round_page(map_addr + map_len),  prot, FALSE);
  472 
  473         return (0);
  474 }
  475 
  476 /*
  477  * Load the file "file" into memory.  It may be either a shared object
  478  * or an executable.
  479  *
  480  * The "addr" reference parameter is in/out.  On entry, it specifies
  481  * the address where a shared object should be loaded.  If the file is
  482  * an executable, this value is ignored.  On exit, "addr" specifies
  483  * where the file was actually loaded.
  484  *
  485  * The "entry" reference parameter is out only.  On exit, it specifies
  486  * the entry point for the loaded file.
  487  */
  488 static int
  489 __elfN(load_file)(struct proc *p, const char *file, u_long *addr,
  490         u_long *entry, size_t pagesize)
  491 {
  492         struct {
  493                 struct nameidata nd;
  494                 struct vattr attr;
  495                 struct image_params image_params;
  496         } *tempdata;
  497         const Elf_Ehdr *hdr = NULL;
  498         const Elf_Phdr *phdr = NULL;
  499         struct nameidata *nd;
  500         struct vmspace *vmspace = p->p_vmspace;
  501         struct vattr *attr;
  502         struct image_params *imgp;
  503         vm_prot_t prot;
  504         u_long rbase;
  505         u_long base_addr = 0;
  506         int vfslocked, error, i, numsegs;
  507 
  508         if (curthread->td_proc != p)
  509                 panic("elf_load_file - thread");        /* XXXKSE DIAGNOSTIC */
  510 
  511         tempdata = malloc(sizeof(*tempdata), M_TEMP, M_WAITOK);
  512         nd = &tempdata->nd;
  513         attr = &tempdata->attr;
  514         imgp = &tempdata->image_params;
  515 
  516         /*
  517          * Initialize part of the common data
  518          */
  519         imgp->proc = p;
  520         imgp->attr = attr;
  521         imgp->firstpage = NULL;
  522         imgp->image_header = NULL;
  523         imgp->object = NULL;
  524         imgp->execlabel = NULL;
  525 
  526         /* XXXKSE */
  527         NDINIT(nd, LOOKUP, MPSAFE|LOCKLEAF|FOLLOW, UIO_SYSSPACE, file,
  528             curthread);
  529         vfslocked = 0;
  530         if ((error = namei(nd)) != 0) {
  531                 nd->ni_vp = NULL;
  532                 goto fail;
  533         }
  534         vfslocked = NDHASGIANT(nd);
  535         NDFREE(nd, NDF_ONLY_PNBUF);
  536         imgp->vp = nd->ni_vp;
  537 
  538         /*
  539          * Check permissions, modes, uid, etc on the file, and "open" it.
  540          */
  541         error = exec_check_permissions(imgp);
  542         if (error)
  543                 goto fail;
  544 
  545         error = exec_map_first_page(imgp);
  546         if (error)
  547                 goto fail;
  548 
  549         /*
  550          * Also make certain that the interpreter stays the same, so set
  551          * its VV_TEXT flag, too.
  552          */
  553         nd->ni_vp->v_vflag |= VV_TEXT;
  554 
  555         imgp->object = nd->ni_vp->v_object;
  556 
  557         hdr = (const Elf_Ehdr *)imgp->image_header;
  558         if ((error = __elfN(check_header)(hdr)) != 0)
  559                 goto fail;
  560         if (hdr->e_type == ET_DYN)
  561                 rbase = *addr;
  562         else if (hdr->e_type == ET_EXEC)
  563                 rbase = 0;
  564         else {
  565                 error = ENOEXEC;
  566                 goto fail;
  567         }
  568 
  569         /* Only support headers that fit within first page for now      */
  570         /*    (multiplication of two Elf_Half fields will not overflow) */
  571         if ((hdr->e_phoff > PAGE_SIZE) ||
  572             (hdr->e_phentsize * hdr->e_phnum) > PAGE_SIZE - hdr->e_phoff) {
  573                 error = ENOEXEC;
  574                 goto fail;
  575         }
  576 
  577         phdr = (const Elf_Phdr *)(imgp->image_header + hdr->e_phoff);
  578         if (!aligned(phdr, Elf_Addr)) {
  579                 error = ENOEXEC;
  580                 goto fail;
  581         }
  582 
  583         for (i = 0, numsegs = 0; i < hdr->e_phnum; i++) {
  584                 if (phdr[i].p_type == PT_LOAD) {        /* Loadable segment */
  585                         prot = 0;
  586                         if (phdr[i].p_flags & PF_X)
  587                                 prot |= VM_PROT_EXECUTE;
  588                         if (phdr[i].p_flags & PF_W)
  589                                 prot |= VM_PROT_WRITE;
  590                         if (phdr[i].p_flags & PF_R)
  591                                 prot |= VM_PROT_READ;
  592 
  593                         if ((error = __elfN(load_section)(vmspace,
  594                             imgp->object, phdr[i].p_offset,
  595                             (caddr_t)(uintptr_t)phdr[i].p_vaddr + rbase,
  596                             phdr[i].p_memsz, phdr[i].p_filesz, prot,
  597                             pagesize)) != 0)
  598                                 goto fail;
  599                         /*
  600                          * Establish the base address if this is the
  601                          * first segment.
  602                          */
  603                         if (numsegs == 0)
  604                                 base_addr = trunc_page(phdr[i].p_vaddr +
  605                                     rbase);
  606                         numsegs++;
  607                 }
  608         }
  609         *addr = base_addr;
  610         *entry = (unsigned long)hdr->e_entry + rbase;
  611 
  612 fail:
  613         if (imgp->firstpage)
  614                 exec_unmap_first_page(imgp);
  615 
  616         if (nd->ni_vp)
  617                 vput(nd->ni_vp);
  618 
  619         VFS_UNLOCK_GIANT(vfslocked);
  620         free(tempdata, M_TEMP);
  621 
  622         return (error);
  623 }
  624 
  625 static int
  626 __CONCAT(exec_, __elfN(imgact))(struct image_params *imgp)
  627 {
  628         const Elf_Ehdr *hdr = (const Elf_Ehdr *)imgp->image_header;
  629         const Elf_Phdr *phdr;
  630         Elf_Auxargs *elf_auxargs;
  631         struct vmspace *vmspace;
  632         vm_prot_t prot;
  633         u_long text_size = 0, data_size = 0, total_size = 0;
  634         u_long text_addr = 0, data_addr = 0;
  635         u_long seg_size, seg_addr;
  636         u_long addr, entry = 0, proghdr = 0;
  637         int32_t osrel = 0;
  638         int error = 0, i;
  639         const char *interp = NULL, *newinterp = NULL;
  640         Elf_Brandinfo *brand_info;
  641         char *path;
  642         struct thread *td = curthread;
  643         struct sysentvec *sv;
  644 
  645         /*
  646          * Do we have a valid ELF header ?
  647          *
  648          * Only allow ET_EXEC & ET_DYN here, reject ET_DYN later
  649          * if particular brand doesn't support it.
  650          */
  651         if (__elfN(check_header)(hdr) != 0 ||
  652             (hdr->e_type != ET_EXEC && hdr->e_type != ET_DYN))
  653                 return (-1);
  654 
  655         /*
  656          * From here on down, we return an errno, not -1, as we've
  657          * detected an ELF file.
  658          */
  659 
  660         if ((hdr->e_phoff > PAGE_SIZE) ||
  661             (hdr->e_phoff + hdr->e_phentsize * hdr->e_phnum) > PAGE_SIZE) {
  662                 /* Only support headers in first page for now */
  663                 return (ENOEXEC);
  664         }
  665         phdr = (const Elf_Phdr *)(imgp->image_header + hdr->e_phoff);
  666         if (!aligned(phdr, Elf_Addr))
  667                 return (ENOEXEC);
  668         for (i = 0; i < hdr->e_phnum; i++) {
  669                 if (phdr[i].p_type == PT_INTERP) {
  670                         /* Path to interpreter */
  671                         if (phdr[i].p_filesz > MAXPATHLEN ||
  672                             phdr[i].p_offset + phdr[i].p_filesz > PAGE_SIZE)
  673                                 return (ENOEXEC);
  674                         interp = imgp->image_header + phdr[i].p_offset;
  675                         break;
  676                 }
  677         }
  678 
  679         brand_info = __elfN(get_brandinfo)(imgp, interp, &osrel);
  680         if (brand_info == NULL) {
  681                 uprintf("ELF binary type \"%u\" not known.\n",
  682                     hdr->e_ident[EI_OSABI]);
  683                 return (ENOEXEC);
  684         }
  685         if (hdr->e_type == ET_DYN &&
  686             (brand_info->flags & BI_CAN_EXEC_DYN) == 0)
  687                 return (ENOEXEC);
  688         sv = brand_info->sysvec;
  689         if (interp != NULL && brand_info->interp_newpath != NULL)
  690                 newinterp = brand_info->interp_newpath;
  691 
  692         /*
  693          * Avoid a possible deadlock if the current address space is destroyed
  694          * and that address space maps the locked vnode.  In the common case,
  695          * the locked vnode's v_usecount is decremented but remains greater
  696          * than zero.  Consequently, the vnode lock is not needed by vrele().
  697          * However, in cases where the vnode lock is external, such as nullfs,
  698          * v_usecount may become zero.
  699          */
  700         VOP_UNLOCK(imgp->vp, 0, td);
  701 
  702         error = exec_new_vmspace(imgp, sv);
  703         imgp->proc->p_sysent = sv;
  704 
  705         vn_lock(imgp->vp, LK_EXCLUSIVE | LK_RETRY, td);
  706         if (error)
  707                 return (error);
  708 
  709         vmspace = imgp->proc->p_vmspace;
  710 
  711         for (i = 0; i < hdr->e_phnum; i++) {
  712                 switch (phdr[i].p_type) {
  713                 case PT_LOAD:   /* Loadable segment */
  714                         prot = 0;
  715                         if (phdr[i].p_flags & PF_X)
  716                                 prot |= VM_PROT_EXECUTE;
  717                         if (phdr[i].p_flags & PF_W)
  718                                 prot |= VM_PROT_WRITE;
  719                         if (phdr[i].p_flags & PF_R)
  720                                 prot |= VM_PROT_READ;
  721 
  722 #if defined(__ia64__) && __ELF_WORD_SIZE == 32 && defined(IA32_ME_HARDER)
  723                         /*
  724                          * Some x86 binaries assume read == executable,
  725                          * notably the M3 runtime and therefore cvsup
  726                          */
  727                         if (prot & VM_PROT_READ)
  728                                 prot |= VM_PROT_EXECUTE;
  729 #endif
  730 
  731                         if ((error = __elfN(load_section)(vmspace,
  732                             imgp->object, phdr[i].p_offset,
  733                             (caddr_t)(uintptr_t)phdr[i].p_vaddr,
  734                             phdr[i].p_memsz, phdr[i].p_filesz, prot,
  735                             sv->sv_pagesize)) != 0)
  736                                 return (error);
  737 
  738                         /*
  739                          * If this segment contains the program headers,
  740                          * remember their virtual address for the AT_PHDR
  741                          * aux entry. Static binaries don't usually include
  742                          * a PT_PHDR entry.
  743                          */
  744                         if (phdr[i].p_offset == 0 &&
  745                             hdr->e_phoff + hdr->e_phnum * hdr->e_phentsize
  746                                 <= phdr[i].p_filesz)
  747                                 proghdr = phdr[i].p_vaddr + hdr->e_phoff;
  748 
  749                         seg_addr = trunc_page(phdr[i].p_vaddr);
  750                         seg_size = round_page(phdr[i].p_memsz +
  751                             phdr[i].p_vaddr - seg_addr);
  752 
  753                         /*
  754                          * Is this .text or .data?  We can't use
  755                          * VM_PROT_WRITE or VM_PROT_EXEC, it breaks the
  756                          * alpha terribly and possibly does other bad
  757                          * things so we stick to the old way of figuring
  758                          * it out:  If the segment contains the program
  759                          * entry point, it's a text segment, otherwise it
  760                          * is a data segment.
  761                          *
  762                          * Note that obreak() assumes that data_addr + 
  763                          * data_size == end of data load area, and the ELF
  764                          * file format expects segments to be sorted by
  765                          * address.  If multiple data segments exist, the
  766                          * last one will be used.
  767                          */
  768                         if (hdr->e_entry >= phdr[i].p_vaddr &&
  769                             hdr->e_entry < (phdr[i].p_vaddr +
  770                             phdr[i].p_memsz)) {
  771                                 text_size = seg_size;
  772                                 text_addr = seg_addr;
  773                                 entry = (u_long)hdr->e_entry;
  774                         } else {
  775                                 data_size = seg_size;
  776                                 data_addr = seg_addr;
  777                         }
  778                         total_size += seg_size;
  779                         break;
  780                 case PT_PHDR:   /* Program header table info */
  781                         proghdr = phdr[i].p_vaddr;
  782                         break;
  783                 default:
  784                         break;
  785                 }
  786         }
  787         
  788         if (data_addr == 0 && data_size == 0) {
  789                 data_addr = text_addr;
  790                 data_size = text_size;
  791         }
  792 
  793         /*
  794          * Check limits.  It should be safe to check the
  795          * limits after loading the segments since we do
  796          * not actually fault in all the segments pages.
  797          */
  798         PROC_LOCK(imgp->proc);
  799         if (data_size > lim_cur(imgp->proc, RLIMIT_DATA) ||
  800             text_size > maxtsiz ||
  801             total_size > lim_cur(imgp->proc, RLIMIT_VMEM)) {
  802                 PROC_UNLOCK(imgp->proc);
  803                 return (ENOMEM);
  804         }
  805 
  806         vmspace->vm_tsize = text_size >> PAGE_SHIFT;
  807         vmspace->vm_taddr = (caddr_t)(uintptr_t)text_addr;
  808         vmspace->vm_dsize = data_size >> PAGE_SHIFT;
  809         vmspace->vm_daddr = (caddr_t)(uintptr_t)data_addr;
  810 
  811         /*
  812          * We load the dynamic linker where a userland call
  813          * to mmap(0, ...) would put it.  The rationale behind this
  814          * calculation is that it leaves room for the heap to grow to
  815          * its maximum allowed size.
  816          */
  817         addr = round_page((vm_offset_t)imgp->proc->p_vmspace->vm_daddr +
  818             lim_max(imgp->proc, RLIMIT_DATA));
  819         PROC_UNLOCK(imgp->proc);
  820 
  821         imgp->entry_addr = entry;
  822 
  823         if (interp != NULL) {
  824                 int have_interp = FALSE;
  825                 VOP_UNLOCK(imgp->vp, 0, td);
  826                 if (brand_info->emul_path != NULL &&
  827                     brand_info->emul_path[0] != '\0') {
  828                         path = malloc(MAXPATHLEN, M_TEMP, M_WAITOK);
  829                         snprintf(path, MAXPATHLEN, "%s%s",
  830                             brand_info->emul_path, interp);
  831                         error = __elfN(load_file)(imgp->proc, path, &addr,
  832                             &imgp->entry_addr, sv->sv_pagesize);
  833                         free(path, M_TEMP);
  834                         if (error == 0)
  835                                 have_interp = TRUE;
  836                 }
  837                 if (!have_interp && newinterp != NULL) {
  838                         error = __elfN(load_file)(imgp->proc, newinterp, &addr,
  839                             &imgp->entry_addr, sv->sv_pagesize);
  840                         if (error == 0)
  841                                 have_interp = TRUE;
  842                 }
  843                 if (!have_interp) {
  844                         error = __elfN(load_file)(imgp->proc, interp, &addr,
  845                             &imgp->entry_addr, sv->sv_pagesize);
  846                 }
  847                 vn_lock(imgp->vp, LK_EXCLUSIVE | LK_RETRY, td);
  848                 if (error != 0) {
  849                         uprintf("ELF interpreter %s not found\n", interp);
  850                         return (error);
  851                 }
  852         } else
  853                 addr = 0;
  854 
  855         /*
  856          * Construct auxargs table (used by the fixup routine)
  857          */
  858         elf_auxargs = malloc(sizeof(Elf_Auxargs), M_TEMP, M_WAITOK);
  859         elf_auxargs->execfd = -1;
  860         elf_auxargs->phdr = proghdr;
  861         elf_auxargs->phent = hdr->e_phentsize;
  862         elf_auxargs->phnum = hdr->e_phnum;
  863         elf_auxargs->pagesz = PAGE_SIZE;
  864         elf_auxargs->base = addr;
  865         elf_auxargs->flags = 0;
  866         elf_auxargs->entry = entry;
  867         elf_auxargs->trace = elf_trace;
  868 
  869         imgp->auxargs = elf_auxargs;
  870         imgp->interpreted = 0;
  871         imgp->proc->p_osrel = osrel;
  872 
  873         return (error);
  874 }
  875 
  876 #define suword __CONCAT(suword, __ELF_WORD_SIZE)
  877 
  878 int
  879 __elfN(freebsd_fixup)(register_t **stack_base, struct image_params *imgp)
  880 {
  881         Elf_Auxargs *args = (Elf_Auxargs *)imgp->auxargs;
  882         Elf_Addr *base;
  883         Elf_Addr *pos;
  884 
  885         base = (Elf_Addr *)*stack_base;
  886         pos = base + (imgp->args->argc + imgp->args->envc + 2);
  887 
  888         if (args->trace) {
  889                 AUXARGS_ENTRY(pos, AT_DEBUG, 1);
  890         }
  891         if (args->execfd != -1) {
  892                 AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd);
  893         }
  894         AUXARGS_ENTRY(pos, AT_PHDR, args->phdr);
  895         AUXARGS_ENTRY(pos, AT_PHENT, args->phent);
  896         AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum);
  897         AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz);
  898         AUXARGS_ENTRY(pos, AT_FLAGS, args->flags);
  899         AUXARGS_ENTRY(pos, AT_ENTRY, args->entry);
  900         AUXARGS_ENTRY(pos, AT_BASE, args->base);
  901         AUXARGS_ENTRY(pos, AT_NULL, 0);
  902 
  903         free(imgp->auxargs, M_TEMP);
  904         imgp->auxargs = NULL;
  905 
  906         base--;
  907         suword(base, (long)imgp->args->argc);
  908         *stack_base = (register_t *)base;
  909         return (0);
  910 }
  911 
  912 /*
  913  * Code for generating ELF core dumps.
  914  */
  915 
  916 typedef void (*segment_callback)(vm_map_entry_t, void *);
  917 
  918 /* Closure for cb_put_phdr(). */
  919 struct phdr_closure {
  920         Elf_Phdr *phdr;         /* Program header to fill in */
  921         Elf_Off offset;         /* Offset of segment in core file */
  922 };
  923 
  924 /* Closure for cb_size_segment(). */
  925 struct sseg_closure {
  926         int count;              /* Count of writable segments. */
  927         size_t size;            /* Total size of all writable segments. */
  928 };
  929 
  930 static void cb_put_phdr(vm_map_entry_t, void *);
  931 static void cb_size_segment(vm_map_entry_t, void *);
  932 static void each_writable_segment(struct thread *, segment_callback, void *);
  933 static int __elfN(corehdr)(struct thread *, struct vnode *, struct ucred *,
  934     int, void *, size_t);
  935 static void __elfN(puthdr)(struct thread *, void *, size_t *, int);
  936 static void __elfN(putnote)(void *, size_t *, const char *, int,
  937     const void *, size_t);
  938 
  939 int
  940 __elfN(coredump)(td, vp, limit)
  941         struct thread *td;
  942         struct vnode *vp;
  943         off_t limit;
  944 {
  945         struct ucred *cred = td->td_ucred;
  946         int error = 0;
  947         struct sseg_closure seginfo;
  948         void *hdr;
  949         size_t hdrsize;
  950 
  951         /* Size the program segments. */
  952         seginfo.count = 0;
  953         seginfo.size = 0;
  954         each_writable_segment(td, cb_size_segment, &seginfo);
  955 
  956         /*
  957          * Calculate the size of the core file header area by making
  958          * a dry run of generating it.  Nothing is written, but the
  959          * size is calculated.
  960          */
  961         hdrsize = 0;
  962         __elfN(puthdr)(td, (void *)NULL, &hdrsize, seginfo.count);
  963 
  964         if (hdrsize + seginfo.size >= limit)
  965                 return (EFAULT);
  966 
  967         /*
  968          * Allocate memory for building the header, fill it up,
  969          * and write it out.
  970          */
  971         hdr = malloc(hdrsize, M_TEMP, M_WAITOK);
  972         if (hdr == NULL) {
  973                 return (EINVAL);
  974         }
  975         error = __elfN(corehdr)(td, vp, cred, seginfo.count, hdr, hdrsize);
  976 
  977         /* Write the contents of all of the writable segments. */
  978         if (error == 0) {
  979                 Elf_Phdr *php;
  980                 off_t offset;
  981                 int i;
  982 
  983                 php = (Elf_Phdr *)((char *)hdr + sizeof(Elf_Ehdr)) + 1;
  984                 offset = hdrsize;
  985                 for (i = 0; i < seginfo.count; i++) {
  986                         error = vn_rdwr_inchunks(UIO_WRITE, vp,
  987                             (caddr_t)(uintptr_t)php->p_vaddr,
  988                             php->p_filesz, offset, UIO_USERSPACE,
  989                             IO_UNIT | IO_DIRECT, cred, NOCRED, NULL,
  990                             curthread); /* XXXKSE */
  991                         if (error != 0)
  992                                 break;
  993                         offset += php->p_filesz;
  994                         php++;
  995                 }
  996         }
  997         free(hdr, M_TEMP);
  998 
  999         return (error);
 1000 }
 1001 
 1002 /*
 1003  * A callback for each_writable_segment() to write out the segment's
 1004  * program header entry.
 1005  */
 1006 static void
 1007 cb_put_phdr(entry, closure)
 1008         vm_map_entry_t entry;
 1009         void *closure;
 1010 {
 1011         struct phdr_closure *phc = (struct phdr_closure *)closure;
 1012         Elf_Phdr *phdr = phc->phdr;
 1013 
 1014         phc->offset = round_page(phc->offset);
 1015 
 1016         phdr->p_type = PT_LOAD;
 1017         phdr->p_offset = phc->offset;
 1018         phdr->p_vaddr = entry->start;
 1019         phdr->p_paddr = 0;
 1020         phdr->p_filesz = phdr->p_memsz = entry->end - entry->start;
 1021         phdr->p_align = PAGE_SIZE;
 1022         phdr->p_flags = 0;
 1023         if (entry->protection & VM_PROT_READ)
 1024                 phdr->p_flags |= PF_R;
 1025         if (entry->protection & VM_PROT_WRITE)
 1026                 phdr->p_flags |= PF_W;
 1027         if (entry->protection & VM_PROT_EXECUTE)
 1028                 phdr->p_flags |= PF_X;
 1029 
 1030         phc->offset += phdr->p_filesz;
 1031         phc->phdr++;
 1032 }
 1033 
 1034 /*
 1035  * A callback for each_writable_segment() to gather information about
 1036  * the number of segments and their total size.
 1037  */
 1038 static void
 1039 cb_size_segment(entry, closure)
 1040         vm_map_entry_t entry;
 1041         void *closure;
 1042 {
 1043         struct sseg_closure *ssc = (struct sseg_closure *)closure;
 1044 
 1045         ssc->count++;
 1046         ssc->size += entry->end - entry->start;
 1047 }
 1048 
 1049 /*
 1050  * For each writable segment in the process's memory map, call the given
 1051  * function with a pointer to the map entry and some arbitrary
 1052  * caller-supplied data.
 1053  */
 1054 static void
 1055 each_writable_segment(td, func, closure)
 1056         struct thread *td;
 1057         segment_callback func;
 1058         void *closure;
 1059 {
 1060         struct proc *p = td->td_proc;
 1061         vm_map_t map = &p->p_vmspace->vm_map;
 1062         vm_map_entry_t entry;
 1063         vm_object_t backing_object, object;
 1064         boolean_t ignore_entry;
 1065 
 1066         vm_map_lock_read(map);
 1067         for (entry = map->header.next; entry != &map->header;
 1068             entry = entry->next) {
 1069                 /*
 1070                  * Don't dump inaccessible mappings, deal with legacy
 1071                  * coredump mode.
 1072                  *
 1073                  * Note that read-only segments related to the elf binary
 1074                  * are marked MAP_ENTRY_NOCOREDUMP now so we no longer
 1075                  * need to arbitrarily ignore such segments.
 1076                  */
 1077                 if (elf_legacy_coredump) {
 1078                         if ((entry->protection & VM_PROT_RW) != VM_PROT_RW)
 1079                                 continue;
 1080                 } else {
 1081                         if ((entry->protection & VM_PROT_ALL) == 0)
 1082                                 continue;
 1083                 }
 1084 
 1085                 /*
 1086                  * Dont include memory segment in the coredump if
 1087                  * MAP_NOCORE is set in mmap(2) or MADV_NOCORE in
 1088                  * madvise(2).  Do not dump submaps (i.e. parts of the
 1089                  * kernel map).
 1090                  */
 1091                 if (entry->eflags & (MAP_ENTRY_NOCOREDUMP|MAP_ENTRY_IS_SUB_MAP))
 1092                         continue;
 1093 
 1094                 if ((object = entry->object.vm_object) == NULL)
 1095                         continue;
 1096 
 1097                 /* Ignore memory-mapped devices and such things. */
 1098                 VM_OBJECT_LOCK(object);
 1099                 while ((backing_object = object->backing_object) != NULL) {
 1100                         VM_OBJECT_LOCK(backing_object);
 1101                         VM_OBJECT_UNLOCK(object);
 1102                         object = backing_object;
 1103                 }
 1104                 ignore_entry = object->type != OBJT_DEFAULT &&
 1105                     object->type != OBJT_SWAP && object->type != OBJT_VNODE;
 1106                 VM_OBJECT_UNLOCK(object);
 1107                 if (ignore_entry)
 1108                         continue;
 1109 
 1110                 (*func)(entry, closure);
 1111         }
 1112         vm_map_unlock_read(map);
 1113 }
 1114 
 1115 /*
 1116  * Write the core file header to the file, including padding up to
 1117  * the page boundary.
 1118  */
 1119 static int
 1120 __elfN(corehdr)(td, vp, cred, numsegs, hdr, hdrsize)
 1121         struct thread *td;
 1122         struct vnode *vp;
 1123         struct ucred *cred;
 1124         int numsegs;
 1125         size_t hdrsize;
 1126         void *hdr;
 1127 {
 1128         size_t off;
 1129 
 1130         /* Fill in the header. */
 1131         bzero(hdr, hdrsize);
 1132         off = 0;
 1133         __elfN(puthdr)(td, hdr, &off, numsegs);
 1134 
 1135         /* Write it to the core file. */
 1136         return (vn_rdwr_inchunks(UIO_WRITE, vp, hdr, hdrsize, (off_t)0,
 1137             UIO_SYSSPACE, IO_UNIT | IO_DIRECT, cred, NOCRED, NULL,
 1138             td)); /* XXXKSE */
 1139 }
 1140 
 1141 #if defined(COMPAT_IA32) && __ELF_WORD_SIZE == 32
 1142 typedef struct prstatus32 elf_prstatus_t;
 1143 typedef struct prpsinfo32 elf_prpsinfo_t;
 1144 typedef struct fpreg32 elf_prfpregset_t;
 1145 typedef struct fpreg32 elf_fpregset_t;
 1146 typedef struct reg32 elf_gregset_t;
 1147 #else
 1148 typedef prstatus_t elf_prstatus_t;
 1149 typedef prpsinfo_t elf_prpsinfo_t;
 1150 typedef prfpregset_t elf_prfpregset_t;
 1151 typedef prfpregset_t elf_fpregset_t;
 1152 typedef gregset_t elf_gregset_t;
 1153 #endif
 1154 
 1155 static void
 1156 __elfN(puthdr)(struct thread *td, void *dst, size_t *off, int numsegs)
 1157 {
 1158         struct {
 1159                 elf_prstatus_t status;
 1160                 elf_prfpregset_t fpregset;
 1161                 elf_prpsinfo_t psinfo;
 1162         } *tempdata;
 1163         elf_prstatus_t *status;
 1164         elf_prfpregset_t *fpregset;
 1165         elf_prpsinfo_t *psinfo;
 1166         struct proc *p;
 1167         struct thread *thr;
 1168         size_t ehoff, noteoff, notesz, phoff;
 1169 
 1170         p = td->td_proc;
 1171 
 1172         ehoff = *off;
 1173         *off += sizeof(Elf_Ehdr);
 1174 
 1175         phoff = *off;
 1176         *off += (numsegs + 1) * sizeof(Elf_Phdr);
 1177 
 1178         noteoff = *off;
 1179         /*
 1180          * Don't allocate space for the notes if we're just calculating
 1181          * the size of the header. We also don't collect the data.
 1182          */
 1183         if (dst != NULL) {
 1184                 tempdata = malloc(sizeof(*tempdata), M_TEMP, M_ZERO|M_WAITOK);
 1185                 status = &tempdata->status;
 1186                 fpregset = &tempdata->fpregset;
 1187                 psinfo = &tempdata->psinfo;
 1188         } else {
 1189                 tempdata = NULL;
 1190                 status = NULL;
 1191                 fpregset = NULL;
 1192                 psinfo = NULL;
 1193         }
 1194 
 1195         if (dst != NULL) {
 1196                 psinfo->pr_version = PRPSINFO_VERSION;
 1197                 psinfo->pr_psinfosz = sizeof(elf_prpsinfo_t);
 1198                 strlcpy(psinfo->pr_fname, p->p_comm, sizeof(psinfo->pr_fname));
 1199                 /*
 1200                  * XXX - We don't fill in the command line arguments properly
 1201                  * yet.
 1202                  */
 1203                 strlcpy(psinfo->pr_psargs, p->p_comm,
 1204                     sizeof(psinfo->pr_psargs));
 1205         }
 1206         __elfN(putnote)(dst, off, "FreeBSD", NT_PRPSINFO, psinfo,
 1207             sizeof *psinfo);
 1208 
 1209         /*
 1210          * To have the debugger select the right thread (LWP) as the initial
 1211          * thread, we dump the state of the thread passed to us in td first.
 1212          * This is the thread that causes the core dump and thus likely to
 1213          * be the right thread one wants to have selected in the debugger.
 1214          */
 1215         thr = td;
 1216         while (thr != NULL) {
 1217                 if (dst != NULL) {
 1218                         status->pr_version = PRSTATUS_VERSION;
 1219                         status->pr_statussz = sizeof(elf_prstatus_t);
 1220                         status->pr_gregsetsz = sizeof(elf_gregset_t);
 1221                         status->pr_fpregsetsz = sizeof(elf_fpregset_t);
 1222                         status->pr_osreldate = osreldate;
 1223                         status->pr_cursig = p->p_sig;
 1224                         status->pr_pid = thr->td_tid;
 1225 #if defined(COMPAT_IA32) && __ELF_WORD_SIZE == 32
 1226                         fill_regs32(thr, &status->pr_reg);
 1227                         fill_fpregs32(thr, fpregset);
 1228 #else
 1229                         fill_regs(thr, &status->pr_reg);
 1230                         fill_fpregs(thr, fpregset);
 1231 #endif
 1232                 }
 1233                 __elfN(putnote)(dst, off, "FreeBSD", NT_PRSTATUS, status,
 1234                     sizeof *status);
 1235                 __elfN(putnote)(dst, off, "FreeBSD", NT_FPREGSET, fpregset,
 1236                     sizeof *fpregset);
 1237                 /*
 1238                  * Allow for MD specific notes, as well as any MD
 1239                  * specific preparations for writing MI notes.
 1240                  */
 1241                 __elfN(dump_thread)(thr, dst, off);
 1242 
 1243                 thr = (thr == td) ? TAILQ_FIRST(&p->p_threads) :
 1244                     TAILQ_NEXT(thr, td_plist);
 1245                 if (thr == td)
 1246                         thr = TAILQ_NEXT(thr, td_plist);
 1247         }
 1248 
 1249         notesz = *off - noteoff;
 1250 
 1251         if (dst != NULL)
 1252                 free(tempdata, M_TEMP);
 1253 
 1254         /* Align up to a page boundary for the program segments. */
 1255         *off = round_page(*off);
 1256 
 1257         if (dst != NULL) {
 1258                 Elf_Ehdr *ehdr;
 1259                 Elf_Phdr *phdr;
 1260                 struct phdr_closure phc;
 1261 
 1262                 /*
 1263                  * Fill in the ELF header.
 1264                  */
 1265                 ehdr = (Elf_Ehdr *)((char *)dst + ehoff);
 1266                 ehdr->e_ident[EI_MAG0] = ELFMAG0;
 1267                 ehdr->e_ident[EI_MAG1] = ELFMAG1;
 1268                 ehdr->e_ident[EI_MAG2] = ELFMAG2;
 1269                 ehdr->e_ident[EI_MAG3] = ELFMAG3;
 1270                 ehdr->e_ident[EI_CLASS] = ELF_CLASS;
 1271                 ehdr->e_ident[EI_DATA] = ELF_DATA;
 1272                 ehdr->e_ident[EI_VERSION] = EV_CURRENT;
 1273                 ehdr->e_ident[EI_OSABI] = ELFOSABI_FREEBSD;
 1274                 ehdr->e_ident[EI_ABIVERSION] = 0;
 1275                 ehdr->e_ident[EI_PAD] = 0;
 1276                 ehdr->e_type = ET_CORE;
 1277 #if defined(COMPAT_IA32) && __ELF_WORD_SIZE == 32
 1278                 ehdr->e_machine = EM_386;
 1279 #else
 1280                 ehdr->e_machine = ELF_ARCH;
 1281 #endif
 1282                 ehdr->e_version = EV_CURRENT;
 1283                 ehdr->e_entry = 0;
 1284                 ehdr->e_phoff = phoff;
 1285                 ehdr->e_flags = 0;
 1286                 ehdr->e_ehsize = sizeof(Elf_Ehdr);
 1287                 ehdr->e_phentsize = sizeof(Elf_Phdr);
 1288                 ehdr->e_phnum = numsegs + 1;
 1289                 ehdr->e_shentsize = sizeof(Elf_Shdr);
 1290                 ehdr->e_shnum = 0;
 1291                 ehdr->e_shstrndx = SHN_UNDEF;
 1292 
 1293                 /*
 1294                  * Fill in the program header entries.
 1295                  */
 1296                 phdr = (Elf_Phdr *)((char *)dst + phoff);
 1297 
 1298                 /* The note segement. */
 1299                 phdr->p_type = PT_NOTE;
 1300                 phdr->p_offset = noteoff;
 1301                 phdr->p_vaddr = 0;
 1302                 phdr->p_paddr = 0;
 1303                 phdr->p_filesz = notesz;
 1304                 phdr->p_memsz = 0;
 1305                 phdr->p_flags = 0;
 1306                 phdr->p_align = 0;
 1307                 phdr++;
 1308 
 1309                 /* All the writable segments from the program. */
 1310                 phc.phdr = phdr;
 1311                 phc.offset = *off;
 1312                 each_writable_segment(td, cb_put_phdr, &phc);
 1313         }
 1314 }
 1315 
 1316 static void
 1317 __elfN(putnote)(void *dst, size_t *off, const char *name, int type,
 1318     const void *desc, size_t descsz)
 1319 {
 1320         Elf_Note note;
 1321 
 1322         note.n_namesz = strlen(name) + 1;
 1323         note.n_descsz = descsz;
 1324         note.n_type = type;
 1325         if (dst != NULL)
 1326                 bcopy(&note, (char *)dst + *off, sizeof note);
 1327         *off += sizeof note;
 1328         if (dst != NULL)
 1329                 bcopy(name, (char *)dst + *off, note.n_namesz);
 1330         *off += roundup2(note.n_namesz, sizeof(Elf_Size));
 1331         if (dst != NULL)
 1332                 bcopy(desc, (char *)dst + *off, note.n_descsz);
 1333         *off += roundup2(note.n_descsz, sizeof(Elf_Size));
 1334 }
 1335 
 1336 /*
 1337  * Try to find the appropriate ABI-note section for checknote,
 1338  * fetch the osreldate for binary from the ELF OSABI-note. Only the
 1339  * first page of the image is searched, the same as for headers.
 1340  */
 1341 static boolean_t
 1342 __elfN(check_note)(struct image_params *imgp, Elf_Brandnote *checknote,
 1343     int32_t *osrel)
 1344 {
 1345         const Elf_Note *note, *note0, *note_end;
 1346         const Elf_Phdr *phdr, *pnote;
 1347         const Elf_Ehdr *hdr;
 1348         const char *note_name;
 1349         int i;
 1350 
 1351         pnote = NULL;
 1352         hdr = (const Elf_Ehdr *)imgp->image_header;
 1353         phdr = (const Elf_Phdr *)(imgp->image_header + hdr->e_phoff);
 1354 
 1355         for (i = 0; i < hdr->e_phnum; i++) {
 1356                 if (phdr[i].p_type == PT_NOTE) {
 1357                         pnote = &phdr[i];
 1358                         break;
 1359                 }
 1360         }
 1361 
 1362         if (pnote == NULL || pnote->p_offset >= PAGE_SIZE ||
 1363             pnote->p_offset + pnote->p_filesz >= PAGE_SIZE)
 1364                 return (FALSE);
 1365 
 1366         note = note0 = (const Elf_Note *)(imgp->image_header + pnote->p_offset);
 1367         note_end = (const Elf_Note *)(imgp->image_header +
 1368             pnote->p_offset + pnote->p_filesz);
 1369         for (i = 0; i < 100 && note >= note0 && note < note_end; i++) {
 1370                 if (!aligned(note, Elf32_Addr))
 1371                         return (FALSE);
 1372                 if (note->n_namesz != checknote->hdr.n_namesz ||
 1373                     note->n_descsz != checknote->hdr.n_descsz ||
 1374                     note->n_type != checknote->hdr.n_type)
 1375                         goto nextnote;
 1376                 note_name = (const char *)(note + 1);
 1377                 if (strncmp(checknote->vendor, note_name,
 1378                     checknote->hdr.n_namesz) != 0)
 1379                         goto nextnote;
 1380 
 1381                 /*
 1382                  * Fetch the osreldate for binary
 1383                  * from the ELF OSABI-note if necessary.
 1384                  */
 1385                 if ((checknote->flags & BN_CAN_FETCH_OSREL) != 0 &&
 1386                     osrel != NULL)
 1387                         *osrel = *(const int32_t *) (note_name +
 1388                             roundup2(checknote->hdr.n_namesz,
 1389                             sizeof(Elf32_Addr)));
 1390                 return (TRUE);
 1391 
 1392 nextnote:
 1393                 note = (const Elf_Note *)((const char *)(note + 1) +
 1394                     roundup2(note->n_namesz, sizeof(Elf32_Addr)) +
 1395                     roundup2(note->n_descsz, sizeof(Elf32_Addr)));
 1396         }
 1397 
 1398         return (FALSE);
 1399 }
 1400 
 1401 /*
 1402  * Tell kern_execve.c about it, with a little help from the linker.
 1403  */
 1404 static struct execsw __elfN(execsw) = {
 1405         __CONCAT(exec_, __elfN(imgact)),
 1406         __XSTRING(__CONCAT(ELF, __ELF_WORD_SIZE))
 1407 };
 1408 EXEC_SET(__CONCAT(elf, __ELF_WORD_SIZE), __elfN(execsw));

Cache object: 5d333b774a9cb092e4a531c848e07c8c


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.