diff options
Diffstat (limited to 'Kernel/Process.cpp')
-rw-r--r-- | Kernel/Process.cpp | 62 |
1 files changed, 50 insertions, 12 deletions
diff --git a/Kernel/Process.cpp b/Kernel/Process.cpp index c021999fb6..f4e5995db3 100644 --- a/Kernel/Process.cpp +++ b/Kernel/Process.cpp @@ -33,6 +33,7 @@ #include <AK/Time.h> #include <AK/Types.h> #include <Kernel/ACPI/Parser.h> +#include <Kernel/API/Syscall.h> #include <Kernel/Arch/i386/CPU.h> #include <Kernel/Console.h> #include <Kernel/Devices/BlockDevice.h> @@ -67,7 +68,6 @@ #include <Kernel/Scheduler.h> #include <Kernel/SharedBuffer.h> #include <Kernel/StdLib.h> -#include <Kernel/API/Syscall.h> #include <Kernel/TTY/MasterPTY.h> #include <Kernel/TTY/TTY.h> #include <Kernel/Thread.h> @@ -888,7 +888,7 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve // It also happens to be the static Virtual Addresss offset every static exectuable gets :) // Without this, some assumptions by the ELF loading hooks below are severely broken. // 0x08000000 is a verified random number chosen by random dice roll https://xkcd.com/221/ - u32 totally_random_offset = interpreter_description ? 0x08000000 : 0; + m_load_offset = interpreter_description ? 0x08000000 : 0; // FIXME: We should be able to load both the PT_INTERP interpreter and the main program... once the RTLD is smart enough if (interpreter_description) { @@ -906,7 +906,7 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve Region* master_tls_region { nullptr }; size_t master_tls_size = 0; size_t master_tls_alignment = 0; - u32 entry_eip = 0; + m_entry_eip = 0; MM.enter_process_paging_scope(*this); RefPtr<ELF::Loader> loader; @@ -935,7 +935,7 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve prot |= PROT_WRITE; if (is_executable) prot |= PROT_EXEC; - if (auto* region = allocate_region_with_vmobject(vaddr.offset(totally_random_offset), size, *vmobject, offset_in_image, String(name), prot)) { + if (auto* region = allocate_region_with_vmobject(vaddr.offset(m_load_offset), size, *vmobject, offset_in_image, String(name), prot)) { region->set_shared(true); return region->vaddr().as_ptr(); } @@ -949,7 +949,7 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve prot |= PROT_READ; if (is_writable) prot |= PROT_WRITE; - if (auto* region = allocate_region(vaddr.offset(totally_random_offset), size, String(name), prot)) + if (auto* region = allocate_region(vaddr.offset(m_load_offset), size, String(name), prot)) return region->vaddr().as_ptr(); return nullptr; }; @@ -976,15 +976,15 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve // FIXME: Validate that this virtual address is within executable region, // instead of just non-null. You could totally have a DSO with entry point of // the beginning of the text segement. - if (!loader->entry().offset(totally_random_offset).get()) { - klog() << "do_exec: Failure loading " << path.characters() << ", entry pointer is invalid! (" << loader->entry().offset(totally_random_offset) << ")"; + if (!loader->entry().offset(m_load_offset).get()) { + klog() << "do_exec: Failure loading " << path.characters() << ", entry pointer is invalid! (" << loader->entry().offset(m_load_offset) << ")"; return -ENOEXEC; } rollback_regions_guard.disarm(); // NOTE: At this point, we've committed to the new executable. - entry_eip = loader->entry().offset(totally_random_offset).get(); + m_entry_eip = loader->entry().offset(m_load_offset).get(); kill_threads_except_self(); @@ -1002,6 +1002,7 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve m_unveiled_paths.clear(); // Copy of the master TLS region that we will clone for new threads + // FIXME: Handle this in userspace m_master_tls_region = master_tls_region->make_weak_ptr(); auto main_program_metadata = main_program_description->metadata(); @@ -1042,9 +1043,11 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve } ASSERT(new_main_thread); + auto auxv = generate_auxiliary_vector(); + // NOTE: We create the new stack before disabling interrupts since it will zero-fault // and we don't want to deal with faults after this point. - u32 new_userspace_esp = new_main_thread->make_userspace_stack_for_main_thread(move(arguments), move(environment)); + u32 new_userspace_esp = new_main_thread->make_userspace_stack_for_main_thread(move(arguments), move(environment), move(auxv)); // We enter a critical section here because we don't want to get interrupted between do_exec() // and Processor::assume_context() or the next context switch. @@ -1070,13 +1073,13 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve tss.ss = GDT_SELECTOR_DATA3 | 3; tss.fs = GDT_SELECTOR_DATA3 | 3; tss.gs = GDT_SELECTOR_TLS | 3; - tss.eip = entry_eip; + tss.eip = m_entry_eip; tss.esp = new_userspace_esp; tss.cr3 = m_page_directory->cr3(); tss.ss2 = m_pid; #ifdef TASK_DEBUG - klog() << "Process " << VirtualAddress(this) << " thread " << VirtualAddress(new_main_thread) << " exec'd " << path.characters() << " @ " << String::format("%p", entry_eip); + klog() << "Process " << VirtualAddress(this) << " thread " << VirtualAddress(new_main_thread) << " exec'd " << path.characters() << " @ " << String::format("%p", m_entry_eip); #endif if (was_profiling) @@ -1089,6 +1092,42 @@ int Process::do_exec(NonnullRefPtr<FileDescription> main_program_description, Ve return 0; } +Vector<AuxiliaryValue> Process::generate_auxiliary_vector() const +{ + Vector<AuxiliaryValue> auxv; + // PHDR/EXECFD + // PH* + auxv.append({ AuxiliaryValue::PageSize, PAGE_SIZE }); + auxv.append({ AuxiliaryValue::BaseAddress, (void*)m_load_offset }); + // FLAGS + auxv.append({ AuxiliaryValue::Entry, (void*)m_entry_eip }); + // NOTELF + auxv.append({ AuxiliaryValue::Uid, (long)m_uid }); + auxv.append({ AuxiliaryValue::EUid, (long)m_euid }); + auxv.append({ AuxiliaryValue::Gid, (long)m_gid }); + auxv.append({ AuxiliaryValue::EGid, (long)m_egid }); + + // FIXME: Don't hard code this? We might support other platforms later.. (e.g. x86_64) + auxv.append({ AuxiliaryValue::Platform, "i386" }); + // FIXME: This is platform specific + auxv.append({ AuxiliaryValue::HwCap, (long)CPUID(1).edx() }); + + auxv.append({ AuxiliaryValue::ClockTick, (long)TimeManagement::the().ticks_per_second() }); + + // FIXME: Also take into account things like extended filesystem permissions? That's what linux does... + auxv.append({ AuxiliaryValue::Secure, ((m_uid != m_euid) || (m_gid != m_egid)) ? 1 : 0 }); + + char random_bytes[16] {}; + get_good_random_bytes((u8*)random_bytes, sizeof(random_bytes)); + + auxv.append({ AuxiliaryValue::Random, String(random_bytes, sizeof(random_bytes)) }); + + auxv.append({ AuxiliaryValue::ExecFilename, m_executable->absolute_path() }); + + auxv.append({ AuxiliaryValue::Null, 0L }); + return auxv; +} + static KResultOr<Vector<String>> find_shebang_interpreter_for_executable(const char first_page[], int nread) { int word_start = 2; @@ -5269,5 +5308,4 @@ int Process::sys$recvfd(int sockfd) m_fds[new_fd].set(*received_descriptor_or_error.value(), 0); return new_fd; } - } |