imgact_elf.c revision 133464
1139749Simp/*-
250770Sdfr * Copyright (c) 2000 David O'Brien
350770Sdfr * Copyright (c) 1995-1996 S�ren Schmidt
450770Sdfr * Copyright (c) 1996 Peter Wemm
550770Sdfr * All rights reserved.
650770Sdfr *
750770Sdfr * Redistribution and use in source and binary forms, with or without
850770Sdfr * modification, are permitted provided that the following conditions
950770Sdfr * are met:
1050770Sdfr * 1. Redistributions of source code must retain the above copyright
1150770Sdfr *    notice, this list of conditions and the following disclaimer
1250770Sdfr *    in this position and unchanged.
1350770Sdfr * 2. Redistributions in binary form must reproduce the above copyright
1450770Sdfr *    notice, this list of conditions and the following disclaimer in the
1550770Sdfr *    documentation and/or other materials provided with the distribution.
1650770Sdfr * 3. The name of the author may not be used to endorse or promote products
1750770Sdfr *    derived from this software without specific prior written permission
1850770Sdfr *
1950770Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
2050770Sdfr * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
2150770Sdfr * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
2250770Sdfr * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
2350770Sdfr * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
2450770Sdfr * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
2550770Sdfr * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
2650770Sdfr * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2750959Speter * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
2850770Sdfr * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2950770Sdfr */
3070355Simp
3170355Simp#include <sys/cdefs.h>
3250770Sdfr__FBSDID("$FreeBSD: head/sys/kern/imgact_elf.c 133464 2004-08-11 02:35:06Z marcel $");
3350770Sdfr
3450770Sdfr#include <sys/param.h>
3550770Sdfr#include <sys/exec.h>
36147256Sbrooks#include <sys/fcntl.h>
37149558Simp#include <sys/imgact.h>
38149558Simp#include <sys/imgact_elf.h>
39149558Simp#include <sys/kernel.h>
4050770Sdfr#include <sys/lock.h>
4150770Sdfr#include <sys/malloc.h>
4250770Sdfr#include <sys/mutex.h>
4350770Sdfr#include <sys/mman.h>
44141877Simp#include <sys/namei.h>
45141877Simp#include <sys/pioctl.h>
46141877Simp#include <sys/proc.h>
47141877Simp#include <sys/procfs.h>
48147256Sbrooks#include <sys/resourcevar.h>
4950770Sdfr#include <sys/systm.h>
5050770Sdfr#include <sys/signalvar.h>
5150770Sdfr#include <sys/stat.h>
5250770Sdfr#include <sys/sx.h>
53142202Simp#include <sys/syscall.h>
54142202Simp#include <sys/sysctl.h>
5550770Sdfr#include <sys/sysent.h>
5650770Sdfr#include <sys/vnode.h>
5750770Sdfr
58142202Simp#include <vm/vm.h>
59142202Simp#include <vm/vm_kern.h>
6050770Sdfr#include <vm/vm_param.h>
6150770Sdfr#include <vm/pmap.h>
6250770Sdfr#include <vm/vm_map.h>
63149832Simp#include <vm/vm_object.h>
6473374Simp#include <vm/vm_extern.h>
6592739Salfred
6692739Salfred#include <machine/elf.h>
67149558Simp#include <machine/md_var.h>
68149558Simp
69149558Simp#define OLD_EI_BRAND	8
7050770Sdfr
7164777Snyanstatic int __elfN(check_header)(const Elf_Ehdr *hdr);
7264777Snyanstatic Elf_Brandinfo *__elfN(get_brandinfo)(const Elf_Ehdr *hdr,
7364630Stanimura    const char *interp);
7450770Sdfrstatic int __elfN(load_file)(struct proc *p, const char *file, u_long *addr,
7550770Sdfr    u_long *entry, size_t pagesize);
7650770Sdfrstatic int __elfN(load_section)(struct proc *p,
7750770Sdfr    struct vmspace *vmspace, struct vnode *vp, vm_object_t object,
7850770Sdfr    vm_offset_t offset, caddr_t vmaddr, size_t memsz, size_t filsz,
7950770Sdfr    vm_prot_t prot, size_t pagesize);
8050770Sdfrstatic int __CONCAT(exec_, __elfN(imgact))(struct image_params *imgp);
8150770Sdfr
8250770SdfrSYSCTL_NODE(_kern, OID_AUTO, __CONCAT(elf, __ELF_WORD_SIZE), CTLFLAG_RW, 0,
8350770Sdfr    "");
8450770Sdfr
8550770Sdfrint __elfN(fallback_brand) = -1;
8650770SdfrSYSCTL_INT(__CONCAT(_kern_elf, __ELF_WORD_SIZE), OID_AUTO,
8764777Snyan    fallback_brand, CTLFLAG_RW, &__elfN(fallback_brand), 0,
8850770Sdfr    __XSTRING(__CONCAT(ELF, __ELF_WORD_SIZE)) " brand of last resort");
89149558SimpTUNABLE_INT("kern.elf" __XSTRING(__ELF_WORD_SIZE) ".fallback_brand",
90149558Simp    &__elfN(fallback_brand));
91140468Simp
92149558Simpstatic int elf_trace = 0;
9350770SdfrSYSCTL_INT(_debug, OID_AUTO, __elfN(trace), CTLFLAG_RW, &elf_trace, 0, "");
9450770Sdfr
9550770Sdfrstatic int elf_legacy_coredump = 0;
9650770SdfrSYSCTL_INT(_debug, OID_AUTO, __elfN(legacy_coredump), CTLFLAG_RW,
9750770Sdfr    &elf_legacy_coredump, 0, "");
9850770Sdfr
9950770Sdfrstatic Elf_Brandinfo *elf_brand_list[MAX_BRANDS];
10050770Sdfr
10150770Sdfrint
10250770Sdfr__elfN(insert_brand_entry)(Elf_Brandinfo *entry)
10350770Sdfr{
10450770Sdfr	int i;
10550770Sdfr
10652247Smdodd	for (i = 0; i < MAX_BRANDS; i++) {
10764777Snyan		if (elf_brand_list[i] == NULL) {
108142202Simp			elf_brand_list[i] = entry;
10964777Snyan			break;
11064777Snyan		}
111142202Simp	}
112142202Simp	if (i == MAX_BRANDS)
11364777Snyan		return (-1);
11464777Snyan	return (0);
115142202Simp}
11664777Snyan
11764777Snyanint
118142202Simp__elfN(remove_brand_entry)(Elf_Brandinfo *entry)
119142202Simp{
12064777Snyan	int i;
12164777Snyan
122142202Simp	for (i = 0; i < MAX_BRANDS; i++) {
12364777Snyan		if (elf_brand_list[i] == entry) {
12464777Snyan			elf_brand_list[i] = NULL;
12564777Snyan			break;
126142202Simp		}
12764777Snyan	}
12864777Snyan	if (i == MAX_BRANDS)
12964777Snyan		return (-1);
130142202Simp	return (0);
131140468Simp}
13264777Snyan
13364777Snyanint
134142202Simp__elfN(brand_inuse)(Elf_Brandinfo *entry)
135140468Simp{
13664777Snyan	struct proc *p;
13764777Snyan	int rval = FALSE;
138142202Simp
139140468Simp	sx_slock(&allproc_lock);
14064777Snyan	LIST_FOREACH(p, &allproc, p_list) {
14164777Snyan		if (p->p_sysent == entry->sysvec) {
142142202Simp			rval = TRUE;
143140468Simp			break;
14464777Snyan		}
14564777Snyan	}
146142202Simp	sx_sunlock(&allproc_lock);
147142202Simp
14864777Snyan	return (rval);
14964777Snyan}
150142202Simp
151142202Simpstatic Elf_Brandinfo *
15264777Snyan__elfN(get_brandinfo)(const Elf_Ehdr *hdr, const char *interp)
15364777Snyan{
154142202Simp	Elf_Brandinfo *bi;
155142202Simp	int i;
15664777Snyan
15764777Snyan	/*
158142202Simp	 * We support three types of branding -- (1) the ELF EI_OSABI field
159142202Simp	 * that SCO added to the ELF spec, (2) FreeBSD 3.x's traditional string
16064777Snyan	 * branding w/in the ELF header, and (3) path of the `interp_path'
16164777Snyan	 * field.  We should also look for an ".note.ABI-tag" ELF section now
162142202Simp	 * in all Linux ELF binaries, FreeBSD 4.1+, and some NetBSD ones.
16364777Snyan	 */
16464777Snyan
16564777Snyan	/* If the executable has a brand, search for it in the brand list. */
166142202Simp	for (i = 0; i < MAX_BRANDS; i++) {
16764777Snyan		bi = elf_brand_list[i];
16864777Snyan		if (bi != NULL && hdr->e_machine == bi->machine &&
16964777Snyan		    (hdr->e_ident[EI_OSABI] == bi->brand ||
170142202Simp		    strncmp((const char *)&hdr->e_ident[OLD_EI_BRAND],
171140468Simp		    bi->compat_3_brand, strlen(bi->compat_3_brand)) == 0))
17264777Snyan			return (bi);
17364777Snyan	}
174142202Simp
175140468Simp	/* Lacking a known brand, search for a recognized interpreter. */
17664777Snyan	if (interp != NULL) {
17764777Snyan		for (i = 0; i < MAX_BRANDS; i++) {
178142202Simp			bi = elf_brand_list[i];
179140468Simp			if (bi != NULL && hdr->e_machine == bi->machine &&
18064777Snyan			    strcmp(interp, bi->interp_path) == 0)
18164777Snyan				return (bi);
182142202Simp		}
183140468Simp	}
18464777Snyan
185141493Simp	/* Lacking a recognized interpreter, try the default brand */
186141493Simp	for (i = 0; i < MAX_BRANDS; i++) {
187141493Simp		bi = elf_brand_list[i];
188141493Simp		if (bi != NULL && hdr->e_machine == bi->machine &&
18952247Smdodd		    __elfN(fallback_brand) == bi->brand)
190141493Simp			return (bi);
191141493Simp	}
192141495Simp	return (NULL);
193142134Simp}
194141493Simp
195142134Simpstatic int
196142134Simp__elfN(check_header)(const Elf_Ehdr *hdr)
197141493Simp{
198142134Simp	Elf_Brandinfo *bi;
199141493Simp	int i;
200141931Simp
201142134Simp	if (!IS_ELF(*hdr) ||
202141493Simp	    hdr->e_ident[EI_CLASS] != ELF_TARG_CLASS ||
203142134Simp	    hdr->e_ident[EI_DATA] != ELF_TARG_DATA ||
20464777Snyan	    hdr->e_ident[EI_VERSION] != EV_CURRENT ||
205141493Simp	    hdr->e_phentsize != sizeof(Elf_Phdr) ||
206141494Simp	    hdr->e_version != ELF_TARG_VER)
207141548Simp		return (ENOEXEC);
208141586Simp
209141493Simp	/*
210149558Simp	 * Make sure we have at least one brand for this machine.
211149558Simp	 */
212149558Simp
213141495Simp	for (i = 0; i < MAX_BRANDS; i++) {
21484151Siedowse		bi = elf_brand_list[i];
215141493Simp		if (bi != NULL && bi->machine == hdr->e_machine)
216141493Simp			break;
217141493Simp	}
218141493Simp	if (i == MAX_BRANDS)
219141493Simp		return (ENOEXEC);
22084151Siedowse
22152247Smdodd	return (0);
222141586Simp}
223142134Simp
224141586Simpstatic int
225149558Simp__elfN(map_partial)(vm_map_t map, vm_object_t object, vm_ooffset_t offset,
226141586Simp	vm_offset_t start, vm_offset_t end, vm_prot_t prot,
227142134Simp	vm_prot_t max)
228141586Simp{
229141673Simp	int error, rv;
230141673Simp	vm_offset_t off;
231141673Simp	vm_offset_t data_buf = 0;
23252247Smdodd
23352247Smdodd	/*
23470355Simp	 * Create the page if it doesn't exist yet. Ignore errors.
235141931Simp	 */
236141931Simp	vm_map_lock(map);
237141931Simp	vm_map_insert(map, NULL, 0, trunc_page(start), round_page(end), max,
238141931Simp	    max, 0);
239141931Simp	vm_map_unlock(map);
240141931Simp
241141931Simp	/*
242141931Simp	 * Find the page from the underlying object.
243141931Simp	 */
244141931Simp	if (object) {
245141931Simp		vm_object_reference(object);
246141931Simp		rv = vm_map_find(exec_map,
247141931Simp				 object,
248141931Simp				 trunc_page(offset),
249141931Simp				 &data_buf,
250141931Simp				 PAGE_SIZE,
251141931Simp				 TRUE,
252141931Simp				 VM_PROT_READ,
253141931Simp				 VM_PROT_ALL,
254141931Simp				 MAP_COPY_ON_WRITE | MAP_PREFAULT_PARTIAL);
255141931Simp		if (rv != KERN_SUCCESS) {
256141931Simp			vm_object_deallocate(object);
257141931Simp			return (rv);
258141931Simp		}
259141931Simp
260141931Simp		off = offset - trunc_page(offset);
261141931Simp		error = copyout((caddr_t)data_buf + off, (caddr_t)start,
262141931Simp		    end - start);
263141931Simp		vm_map_remove(exec_map, data_buf, data_buf + PAGE_SIZE);
264141931Simp		if (error) {
265141931Simp			return (KERN_FAILURE);
266141931Simp		}
267141931Simp	}
268141931Simp
269141931Simp	return (KERN_SUCCESS);
270141931Simp}
271141931Simp
272141931Simpstatic int
273141931Simp__elfN(map_insert)(vm_map_t map, vm_object_t object, vm_ooffset_t offset,
274141931Simp	vm_offset_t start, vm_offset_t end, vm_prot_t prot,
275141931Simp	vm_prot_t max, int cow)
276141931Simp{
277141931Simp	vm_offset_t data_buf, off;
278141931Simp	vm_size_t sz;
279141931Simp	int error, rv;
280141931Simp
281141931Simp	if (start != trunc_page(start)) {
282149558Simp		rv = __elfN(map_partial)(map, object, offset, start,
283149558Simp		    round_page(start), prot, max);
284149558Simp		if (rv)
285149558Simp			return (rv);
286149558Simp		offset += round_page(start) - start;
287149558Simp		start = round_page(start);
288149558Simp	}
289149558Simp	if (end != round_page(end)) {
290149558Simp		rv = __elfN(map_partial)(map, object, offset +
291149558Simp		    trunc_page(end) - start, trunc_page(end), end, prot, max);
29270355Simp		if (rv)
293			return (rv);
294		end = trunc_page(end);
295	}
296	if (end > start) {
297		if (offset & PAGE_MASK) {
298			/*
299			 * The mapping is not page aligned. This means we have
300			 * to copy the data. Sigh.
301			 */
302			rv = vm_map_find(map, 0, 0, &start, end - start,
303			    FALSE, prot, max, 0);
304			if (rv)
305				return (rv);
306			data_buf = 0;
307			while (start < end) {
308				vm_object_reference(object);
309				rv = vm_map_find(exec_map,
310						 object,
311						 trunc_page(offset),
312						 &data_buf,
313						 2 * PAGE_SIZE,
314						 TRUE,
315						 VM_PROT_READ,
316						 VM_PROT_ALL,
317						 (MAP_COPY_ON_WRITE
318						  | MAP_PREFAULT_PARTIAL));
319				if (rv != KERN_SUCCESS) {
320					vm_object_deallocate(object);
321					return (rv);
322				}
323				off = offset - trunc_page(offset);
324				sz = end - start;
325				if (sz > PAGE_SIZE)
326					sz = PAGE_SIZE;
327				error = copyout((caddr_t)data_buf + off,
328				    (caddr_t)start, sz);
329				vm_map_remove(exec_map, data_buf,
330				    data_buf + 2 * PAGE_SIZE);
331				if (error) {
332					return (KERN_FAILURE);
333				}
334				start += sz;
335			}
336			rv = KERN_SUCCESS;
337		} else {
338			vm_map_lock(map);
339			rv = vm_map_insert(map, object, offset, start, end,
340			    prot, max, cow);
341			vm_map_unlock(map);
342		}
343		return (rv);
344	} else {
345		return (KERN_SUCCESS);
346	}
347}
348
349static int
350__elfN(load_section)(struct proc *p, struct vmspace *vmspace,
351	struct vnode *vp, vm_object_t object, vm_offset_t offset,
352	caddr_t vmaddr, size_t memsz, size_t filsz, vm_prot_t prot,
353	size_t pagesize)
354{
355	size_t map_len;
356	vm_offset_t map_addr;
357	int error, rv, cow;
358	size_t copy_len;
359	vm_offset_t file_addr;
360	vm_offset_t data_buf = 0;
361
362	GIANT_REQUIRED;
363
364	error = 0;
365
366	/*
367	 * It's necessary to fail if the filsz + offset taken from the
368	 * header is greater than the actual file pager object's size.
369	 * If we were to allow this, then the vm_map_find() below would
370	 * walk right off the end of the file object and into the ether.
371	 *
372	 * While I'm here, might as well check for something else that
373	 * is invalid: filsz cannot be greater than memsz.
374	 */
375	if ((off_t)filsz + offset > object->un_pager.vnp.vnp_size ||
376	    filsz > memsz) {
377		uprintf("elf_load_section: truncated ELF file\n");
378		return (ENOEXEC);
379	}
380
381#define trunc_page_ps(va, ps)	((va) & ~(ps - 1))
382#define round_page_ps(va, ps)	(((va) + (ps - 1)) & ~(ps - 1))
383
384	map_addr = trunc_page_ps((vm_offset_t)vmaddr, pagesize);
385	file_addr = trunc_page_ps(offset, pagesize);
386
387	/*
388	 * We have two choices.  We can either clear the data in the last page
389	 * of an oversized mapping, or we can start the anon mapping a page
390	 * early and copy the initialized data into that first page.  We
391	 * choose the second..
392	 */
393	if (memsz > filsz)
394		map_len = trunc_page_ps(offset + filsz, pagesize) - file_addr;
395	else
396		map_len = round_page_ps(offset + filsz, pagesize) - file_addr;
397
398	if (map_len != 0) {
399		vm_object_reference(object);
400
401		/* cow flags: don't dump readonly sections in core */
402		cow = MAP_COPY_ON_WRITE | MAP_PREFAULT |
403		    (prot & VM_PROT_WRITE ? 0 : MAP_DISABLE_COREDUMP);
404
405		rv = __elfN(map_insert)(&vmspace->vm_map,
406				      object,
407				      file_addr,	/* file offset */
408				      map_addr,		/* virtual start */
409				      map_addr + map_len,/* virtual end */
410				      prot,
411				      VM_PROT_ALL,
412				      cow);
413		if (rv != KERN_SUCCESS) {
414			vm_object_deallocate(object);
415			return (EINVAL);
416		}
417
418		/* we can stop now if we've covered it all */
419		if (memsz == filsz) {
420			return (0);
421		}
422	}
423
424
425	/*
426	 * We have to get the remaining bit of the file into the first part
427	 * of the oversized map segment.  This is normally because the .data
428	 * segment in the file is extended to provide bss.  It's a neat idea
429	 * to try and save a page, but it's a pain in the behind to implement.
430	 */
431	copy_len = (offset + filsz) - trunc_page_ps(offset + filsz, pagesize);
432	map_addr = trunc_page_ps((vm_offset_t)vmaddr + filsz, pagesize);
433	map_len = round_page_ps((vm_offset_t)vmaddr + memsz, pagesize) -
434	    map_addr;
435
436	/* This had damn well better be true! */
437	if (map_len != 0) {
438		rv = __elfN(map_insert)(&vmspace->vm_map, NULL, 0, map_addr,
439		    map_addr + map_len, VM_PROT_ALL, VM_PROT_ALL, 0);
440		if (rv != KERN_SUCCESS) {
441			return (EINVAL);
442		}
443	}
444
445	if (copy_len != 0) {
446		vm_offset_t off;
447		vm_object_reference(object);
448		rv = vm_map_find(exec_map,
449				 object,
450				 trunc_page(offset + filsz),
451				 &data_buf,
452				 PAGE_SIZE,
453				 TRUE,
454				 VM_PROT_READ,
455				 VM_PROT_ALL,
456				 MAP_COPY_ON_WRITE | MAP_PREFAULT_PARTIAL);
457		if (rv != KERN_SUCCESS) {
458			vm_object_deallocate(object);
459			return (EINVAL);
460		}
461
462		/* send the page fragment to user space */
463		off = trunc_page_ps(offset + filsz, pagesize) -
464		    trunc_page(offset + filsz);
465		error = copyout((caddr_t)data_buf + off, (caddr_t)map_addr,
466		    copy_len);
467		vm_map_remove(exec_map, data_buf, data_buf + PAGE_SIZE);
468		if (error) {
469			return (error);
470		}
471	}
472
473	/*
474	 * set it to the specified protection.
475	 * XXX had better undo the damage from pasting over the cracks here!
476	 */
477	vm_map_protect(&vmspace->vm_map, trunc_page(map_addr),
478	    round_page(map_addr + map_len),  prot, FALSE);
479
480	return (error);
481}
482
483/*
484 * Load the file "file" into memory.  It may be either a shared object
485 * or an executable.
486 *
487 * The "addr" reference parameter is in/out.  On entry, it specifies
488 * the address where a shared object should be loaded.  If the file is
489 * an executable, this value is ignored.  On exit, "addr" specifies
490 * where the file was actually loaded.
491 *
492 * The "entry" reference parameter is out only.  On exit, it specifies
493 * the entry point for the loaded file.
494 */
495static int
496__elfN(load_file)(struct proc *p, const char *file, u_long *addr,
497	u_long *entry, size_t pagesize)
498{
499	struct {
500		struct nameidata nd;
501		struct vattr attr;
502		struct image_params image_params;
503	} *tempdata;
504	const Elf_Ehdr *hdr = NULL;
505	const Elf_Phdr *phdr = NULL;
506	struct nameidata *nd;
507	struct vmspace *vmspace = p->p_vmspace;
508	struct vattr *attr;
509	struct image_params *imgp;
510	vm_prot_t prot;
511	u_long rbase;
512	u_long base_addr = 0;
513	int error, i, numsegs;
514
515	if (curthread->td_proc != p)
516		panic("elf_load_file - thread");	/* XXXKSE DIAGNOSTIC */
517
518	tempdata = malloc(sizeof(*tempdata), M_TEMP, M_WAITOK);
519	nd = &tempdata->nd;
520	attr = &tempdata->attr;
521	imgp = &tempdata->image_params;
522
523	/*
524	 * Initialize part of the common data
525	 */
526	imgp->proc = p;
527	imgp->userspace_argv = NULL;
528	imgp->userspace_envv = NULL;
529	imgp->attr = attr;
530	imgp->firstpage = NULL;
531	imgp->image_header = NULL;
532	imgp->object = NULL;
533	imgp->execlabel = NULL;
534
535	/* XXXKSE */
536	NDINIT(nd, LOOKUP, LOCKLEAF|FOLLOW, UIO_SYSSPACE, file, curthread);
537
538	if ((error = namei(nd)) != 0) {
539		nd->ni_vp = NULL;
540		goto fail;
541	}
542	NDFREE(nd, NDF_ONLY_PNBUF);
543	imgp->vp = nd->ni_vp;
544
545	/*
546	 * Check permissions, modes, uid, etc on the file, and "open" it.
547	 */
548	error = exec_check_permissions(imgp);
549	if (error) {
550		VOP_UNLOCK(nd->ni_vp, 0, curthread); /* XXXKSE */
551		goto fail;
552	}
553
554	error = exec_map_first_page(imgp);
555	/*
556	 * Also make certain that the interpreter stays the same, so set
557	 * its VV_TEXT flag, too.
558	 */
559	if (error == 0)
560		nd->ni_vp->v_vflag |= VV_TEXT;
561
562	VOP_GETVOBJECT(nd->ni_vp, &imgp->object);
563	vm_object_reference(imgp->object);
564
565	VOP_UNLOCK(nd->ni_vp, 0, curthread); /* XXXKSE */
566	if (error)
567		goto fail;
568
569	hdr = (const Elf_Ehdr *)imgp->image_header;
570	if ((error = __elfN(check_header)(hdr)) != 0)
571		goto fail;
572	if (hdr->e_type == ET_DYN)
573		rbase = *addr;
574	else if (hdr->e_type == ET_EXEC)
575		rbase = 0;
576	else {
577		error = ENOEXEC;
578		goto fail;
579	}
580
581	/* Only support headers that fit within first page for now      */
582	/*    (multiplication of two Elf_Half fields will not overflow) */
583	if ((hdr->e_phoff > PAGE_SIZE) ||
584	    (hdr->e_phentsize * hdr->e_phnum) > PAGE_SIZE - hdr->e_phoff) {
585		error = ENOEXEC;
586		goto fail;
587	}
588
589	phdr = (const Elf_Phdr *)(imgp->image_header + hdr->e_phoff);
590
591	for (i = 0, numsegs = 0; i < hdr->e_phnum; i++) {
592		if (phdr[i].p_type == PT_LOAD) {	/* Loadable segment */
593			prot = 0;
594			if (phdr[i].p_flags & PF_X)
595  				prot |= VM_PROT_EXECUTE;
596			if (phdr[i].p_flags & PF_W)
597  				prot |= VM_PROT_WRITE;
598			if (phdr[i].p_flags & PF_R)
599  				prot |= VM_PROT_READ;
600
601			if ((error = __elfN(load_section)(p, vmspace,
602			    nd->ni_vp, imgp->object, phdr[i].p_offset,
603			    (caddr_t)(uintptr_t)phdr[i].p_vaddr + rbase,
604			    phdr[i].p_memsz, phdr[i].p_filesz, prot,
605			    pagesize)) != 0)
606				goto fail;
607			/*
608			 * Establish the base address if this is the
609			 * first segment.
610			 */
611			if (numsegs == 0)
612  				base_addr = trunc_page(phdr[i].p_vaddr +
613				    rbase);
614			numsegs++;
615		}
616	}
617	*addr = base_addr;
618	*entry = (unsigned long)hdr->e_entry + rbase;
619
620fail:
621	if (imgp->firstpage)
622		exec_unmap_first_page(imgp);
623	if (imgp->object)
624		vm_object_deallocate(imgp->object);
625
626	if (nd->ni_vp)
627		vrele(nd->ni_vp);
628
629	free(tempdata, M_TEMP);
630
631	return (error);
632}
633
634static int
635__CONCAT(exec_, __elfN(imgact))(struct image_params *imgp)
636{
637	const Elf_Ehdr *hdr = (const Elf_Ehdr *)imgp->image_header;
638	const Elf_Phdr *phdr;
639	Elf_Auxargs *elf_auxargs = NULL;
640	struct vmspace *vmspace;
641	vm_prot_t prot;
642	u_long text_size = 0, data_size = 0, total_size = 0;
643	u_long text_addr = 0, data_addr = 0;
644	u_long seg_size, seg_addr;
645	u_long addr, entry = 0, proghdr = 0;
646	int error, i;
647	const char *interp = NULL;
648	Elf_Brandinfo *brand_info;
649	char *path;
650	struct thread *td = curthread;
651	struct sysentvec *sv;
652
653	GIANT_REQUIRED;
654
655	/*
656	 * Do we have a valid ELF header ?
657	 */
658	if (__elfN(check_header)(hdr) != 0 || hdr->e_type != ET_EXEC)
659		return (-1);
660
661	/*
662	 * From here on down, we return an errno, not -1, as we've
663	 * detected an ELF file.
664	 */
665
666	if ((hdr->e_phoff > PAGE_SIZE) ||
667	    (hdr->e_phoff + hdr->e_phentsize * hdr->e_phnum) > PAGE_SIZE) {
668		/* Only support headers in first page for now */
669		return (ENOEXEC);
670	}
671	phdr = (const Elf_Phdr *)(imgp->image_header + hdr->e_phoff);
672
673	/*
674	 * From this point on, we may have resources that need to be freed.
675	 */
676
677	VOP_UNLOCK(imgp->vp, 0, td);
678
679	for (i = 0; i < hdr->e_phnum; i++) {
680		switch (phdr[i].p_type) {
681	  	case PT_INTERP:	/* Path to interpreter */
682			if (phdr[i].p_filesz > MAXPATHLEN ||
683			    phdr[i].p_offset + phdr[i].p_filesz > PAGE_SIZE) {
684				error = ENOEXEC;
685				goto fail;
686			}
687			interp = imgp->image_header + phdr[i].p_offset;
688			break;
689		default:
690			break;
691		}
692	}
693
694	brand_info = __elfN(get_brandinfo)(hdr, interp);
695	if (brand_info == NULL) {
696		uprintf("ELF binary type \"%u\" not known.\n",
697		    hdr->e_ident[EI_OSABI]);
698		error = ENOEXEC;
699		goto fail;
700	}
701	sv = brand_info->sysvec;
702	if (interp != NULL && brand_info->interp_newpath != NULL)
703		interp = brand_info->interp_newpath;
704
705	if ((error = exec_extract_strings(imgp)) != 0)
706		goto fail;
707
708	exec_new_vmspace(imgp, sv);
709
710	vmspace = imgp->proc->p_vmspace;
711
712	for (i = 0; i < hdr->e_phnum; i++) {
713		switch (phdr[i].p_type) {
714		case PT_LOAD:	/* Loadable segment */
715			prot = 0;
716			if (phdr[i].p_flags & PF_X)
717  				prot |= VM_PROT_EXECUTE;
718			if (phdr[i].p_flags & PF_W)
719  				prot |= VM_PROT_WRITE;
720			if (phdr[i].p_flags & PF_R)
721  				prot |= VM_PROT_READ;
722
723#if defined(__ia64__) && __ELF_WORD_SIZE == 32 && defined(IA32_ME_HARDER)
724			/*
725			 * Some x86 binaries assume read == executable,
726			 * notably the M3 runtime and therefore cvsup
727			 */
728			if (prot & VM_PROT_READ)
729				prot |= VM_PROT_EXECUTE;
730#endif
731
732			if ((error = __elfN(load_section)(imgp->proc, vmspace,
733			    imgp->vp, imgp->object, phdr[i].p_offset,
734			    (caddr_t)(uintptr_t)phdr[i].p_vaddr,
735			    phdr[i].p_memsz, phdr[i].p_filesz, prot,
736			    sv->sv_pagesize)) != 0)
737  				goto fail;
738
739			/*
740			 * If this segment contains the program headers,
741			 * remember their virtual address for the AT_PHDR
742			 * aux entry. Static binaries don't usually include
743			 * a PT_PHDR entry.
744			 */
745			if (phdr[i].p_offset == 0 &&
746			    hdr->e_phoff + hdr->e_phnum * hdr->e_phentsize
747				<= phdr[i].p_filesz)
748				proghdr = phdr[i].p_vaddr + hdr->e_phoff;
749
750			seg_addr = trunc_page(phdr[i].p_vaddr);
751			seg_size = round_page(phdr[i].p_memsz +
752			    phdr[i].p_vaddr - seg_addr);
753
754			/*
755			 * Is this .text or .data?  We can't use
756			 * VM_PROT_WRITE or VM_PROT_EXEC, it breaks the
757			 * alpha terribly and possibly does other bad
758			 * things so we stick to the old way of figuring
759			 * it out:  If the segment contains the program
760			 * entry point, it's a text segment, otherwise it
761			 * is a data segment.
762			 *
763			 * Note that obreak() assumes that data_addr +
764			 * data_size == end of data load area, and the ELF
765			 * file format expects segments to be sorted by
766			 * address.  If multiple data segments exist, the
767			 * last one will be used.
768			 */
769			if (hdr->e_entry >= phdr[i].p_vaddr &&
770			    hdr->e_entry < (phdr[i].p_vaddr +
771			    phdr[i].p_memsz)) {
772				text_size = seg_size;
773				text_addr = seg_addr;
774				entry = (u_long)hdr->e_entry;
775			} else {
776				data_size = seg_size;
777				data_addr = seg_addr;
778			}
779			total_size += seg_size;
780			break;
781		case PT_PHDR: 	/* Program header table info */
782			proghdr = phdr[i].p_vaddr;
783			break;
784		default:
785			break;
786		}
787	}
788
789	if (data_addr == 0 && data_size == 0) {
790		data_addr = text_addr;
791		data_size = text_size;
792	}
793
794	/*
795	 * Check limits.  It should be safe to check the
796	 * limits after loading the segments since we do
797	 * not actually fault in all the segments pages.
798	 */
799	PROC_LOCK(imgp->proc);
800	if (data_size > lim_cur(imgp->proc, RLIMIT_DATA) ||
801	    text_size > maxtsiz ||
802	    total_size > lim_cur(imgp->proc, RLIMIT_VMEM)) {
803		PROC_UNLOCK(imgp->proc);
804		error = ENOMEM;
805		goto fail;
806	}
807
808	vmspace->vm_tsize = text_size >> PAGE_SHIFT;
809	vmspace->vm_taddr = (caddr_t)(uintptr_t)text_addr;
810	vmspace->vm_dsize = data_size >> PAGE_SHIFT;
811	vmspace->vm_daddr = (caddr_t)(uintptr_t)data_addr;
812
813	/*
814	 * We load the dynamic linker where a userland call
815	 * to mmap(0, ...) would put it.  The rationale behind this
816	 * calculation is that it leaves room for the heap to grow to
817	 * its maximum allowed size.
818	 */
819	addr = round_page((vm_offset_t)imgp->proc->p_vmspace->vm_daddr +
820	    lim_max(imgp->proc, RLIMIT_DATA));
821	PROC_UNLOCK(imgp->proc);
822
823	imgp->entry_addr = entry;
824
825	imgp->proc->p_sysent = sv;
826	if (interp != NULL && brand_info->emul_path != NULL &&
827	    brand_info->emul_path[0] != '\0') {
828		path = malloc(MAXPATHLEN, M_TEMP, M_WAITOK);
829		snprintf(path, MAXPATHLEN, "%s%s", brand_info->emul_path,
830		    interp);
831		error = __elfN(load_file)(imgp->proc, path, &addr,
832		    &imgp->entry_addr, sv->sv_pagesize);
833		free(path, M_TEMP);
834		if (error == 0)
835			interp = NULL;
836	}
837	if (interp != NULL) {
838		error = __elfN(load_file)(imgp->proc, interp, &addr,
839		    &imgp->entry_addr, sv->sv_pagesize);
840		if (error != 0) {
841			uprintf("ELF interpreter %s not found\n", interp);
842			goto fail;
843		}
844	}
845
846	/*
847	 * Construct auxargs table (used by the fixup routine)
848	 */
849	elf_auxargs = malloc(sizeof(Elf_Auxargs), M_TEMP, M_WAITOK);
850	elf_auxargs->execfd = -1;
851	elf_auxargs->phdr = proghdr;
852	elf_auxargs->phent = hdr->e_phentsize;
853	elf_auxargs->phnum = hdr->e_phnum;
854	elf_auxargs->pagesz = PAGE_SIZE;
855	elf_auxargs->base = addr;
856	elf_auxargs->flags = 0;
857	elf_auxargs->entry = entry;
858	elf_auxargs->trace = elf_trace;
859
860	imgp->auxargs = elf_auxargs;
861	imgp->interpreted = 0;
862
863fail:
864	vn_lock(imgp->vp, LK_EXCLUSIVE | LK_RETRY, td);
865	return (error);
866}
867
868#define	suword __CONCAT(suword, __ELF_WORD_SIZE)
869
870int
871__elfN(freebsd_fixup)(register_t **stack_base, struct image_params *imgp)
872{
873	Elf_Auxargs *args = (Elf_Auxargs *)imgp->auxargs;
874	Elf_Addr *base;
875	Elf_Addr *pos;
876
877	base = (Elf_Addr *)*stack_base;
878	pos = base + (imgp->argc + imgp->envc + 2);
879
880	if (args->trace) {
881		AUXARGS_ENTRY(pos, AT_DEBUG, 1);
882	}
883	if (args->execfd != -1) {
884		AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd);
885	}
886	AUXARGS_ENTRY(pos, AT_PHDR, args->phdr);
887	AUXARGS_ENTRY(pos, AT_PHENT, args->phent);
888	AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum);
889	AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz);
890	AUXARGS_ENTRY(pos, AT_FLAGS, args->flags);
891	AUXARGS_ENTRY(pos, AT_ENTRY, args->entry);
892	AUXARGS_ENTRY(pos, AT_BASE, args->base);
893	AUXARGS_ENTRY(pos, AT_NULL, 0);
894
895	free(imgp->auxargs, M_TEMP);
896	imgp->auxargs = NULL;
897
898	base--;
899	suword(base, (long)imgp->argc);
900	*stack_base = (register_t *)base;
901	return (0);
902}
903
904/*
905 * Code for generating ELF core dumps.
906 */
907
908typedef void (*segment_callback)(vm_map_entry_t, void *);
909
910/* Closure for cb_put_phdr(). */
911struct phdr_closure {
912	Elf_Phdr *phdr;		/* Program header to fill in */
913	Elf_Off offset;		/* Offset of segment in core file */
914};
915
916/* Closure for cb_size_segment(). */
917struct sseg_closure {
918	int count;		/* Count of writable segments. */
919	size_t size;		/* Total size of all writable segments. */
920};
921
922static void cb_put_phdr(vm_map_entry_t, void *);
923static void cb_size_segment(vm_map_entry_t, void *);
924static void each_writable_segment(struct thread *, segment_callback, void *);
925static int __elfN(corehdr)(struct thread *, struct vnode *, struct ucred *,
926    int, void *, size_t);
927static void __elfN(puthdr)(struct thread *, void *, size_t *, int);
928static void __elfN(putnote)(void *, size_t *, const char *, int,
929    const void *, size_t);
930
931extern int osreldate;
932
933int
934__elfN(coredump)(td, vp, limit)
935	struct thread *td;
936	struct vnode *vp;
937	off_t limit;
938{
939	struct ucred *cred = td->td_ucred;
940	int error = 0;
941	struct sseg_closure seginfo;
942	void *hdr;
943	size_t hdrsize;
944
945	/* Size the program segments. */
946	seginfo.count = 0;
947	seginfo.size = 0;
948	each_writable_segment(td, cb_size_segment, &seginfo);
949
950	/*
951	 * Calculate the size of the core file header area by making
952	 * a dry run of generating it.  Nothing is written, but the
953	 * size is calculated.
954	 */
955	hdrsize = 0;
956	__elfN(puthdr)(td, (void *)NULL, &hdrsize, seginfo.count);
957
958	if (hdrsize + seginfo.size >= limit)
959		return (EFAULT);
960
961	/*
962	 * Allocate memory for building the header, fill it up,
963	 * and write it out.
964	 */
965	hdr = malloc(hdrsize, M_TEMP, M_WAITOK);
966	if (hdr == NULL) {
967		return (EINVAL);
968	}
969	error = __elfN(corehdr)(td, vp, cred, seginfo.count, hdr, hdrsize);
970
971	/* Write the contents of all of the writable segments. */
972	if (error == 0) {
973		Elf_Phdr *php;
974		off_t offset;
975		int i;
976
977		php = (Elf_Phdr *)((char *)hdr + sizeof(Elf_Ehdr)) + 1;
978		offset = hdrsize;
979		for (i = 0; i < seginfo.count; i++) {
980			error = vn_rdwr_inchunks(UIO_WRITE, vp,
981			    (caddr_t)(uintptr_t)php->p_vaddr,
982			    php->p_filesz, offset, UIO_USERSPACE,
983			    IO_UNIT | IO_DIRECT, cred, NOCRED, NULL,
984			    curthread); /* XXXKSE */
985			if (error != 0)
986				break;
987			offset += php->p_filesz;
988			php++;
989		}
990	}
991	free(hdr, M_TEMP);
992
993	return (error);
994}
995
996/*
997 * A callback for each_writable_segment() to write out the segment's
998 * program header entry.
999 */
1000static void
1001cb_put_phdr(entry, closure)
1002	vm_map_entry_t entry;
1003	void *closure;
1004{
1005	struct phdr_closure *phc = (struct phdr_closure *)closure;
1006	Elf_Phdr *phdr = phc->phdr;
1007
1008	phc->offset = round_page(phc->offset);
1009
1010	phdr->p_type = PT_LOAD;
1011	phdr->p_offset = phc->offset;
1012	phdr->p_vaddr = entry->start;
1013	phdr->p_paddr = 0;
1014	phdr->p_filesz = phdr->p_memsz = entry->end - entry->start;
1015	phdr->p_align = PAGE_SIZE;
1016	phdr->p_flags = 0;
1017	if (entry->protection & VM_PROT_READ)
1018		phdr->p_flags |= PF_R;
1019	if (entry->protection & VM_PROT_WRITE)
1020		phdr->p_flags |= PF_W;
1021	if (entry->protection & VM_PROT_EXECUTE)
1022		phdr->p_flags |= PF_X;
1023
1024	phc->offset += phdr->p_filesz;
1025	phc->phdr++;
1026}
1027
1028/*
1029 * A callback for each_writable_segment() to gather information about
1030 * the number of segments and their total size.
1031 */
1032static void
1033cb_size_segment(entry, closure)
1034	vm_map_entry_t entry;
1035	void *closure;
1036{
1037	struct sseg_closure *ssc = (struct sseg_closure *)closure;
1038
1039	ssc->count++;
1040	ssc->size += entry->end - entry->start;
1041}
1042
1043/*
1044 * For each writable segment in the process's memory map, call the given
1045 * function with a pointer to the map entry and some arbitrary
1046 * caller-supplied data.
1047 */
1048static void
1049each_writable_segment(td, func, closure)
1050	struct thread *td;
1051	segment_callback func;
1052	void *closure;
1053{
1054	struct proc *p = td->td_proc;
1055	vm_map_t map = &p->p_vmspace->vm_map;
1056	vm_map_entry_t entry;
1057
1058	for (entry = map->header.next; entry != &map->header;
1059	    entry = entry->next) {
1060		vm_object_t obj;
1061
1062		/*
1063		 * Don't dump inaccessible mappings, deal with legacy
1064		 * coredump mode.
1065		 *
1066		 * Note that read-only segments related to the elf binary
1067		 * are marked MAP_ENTRY_NOCOREDUMP now so we no longer
1068		 * need to arbitrarily ignore such segments.
1069		 */
1070		if (elf_legacy_coredump) {
1071			if ((entry->protection & VM_PROT_RW) != VM_PROT_RW)
1072				continue;
1073		} else {
1074			if ((entry->protection & VM_PROT_ALL) == 0)
1075				continue;
1076		}
1077
1078		/*
1079		 * Dont include memory segment in the coredump if
1080		 * MAP_NOCORE is set in mmap(2) or MADV_NOCORE in
1081		 * madvise(2).  Do not dump submaps (i.e. parts of the
1082		 * kernel map).
1083		 */
1084		if (entry->eflags & (MAP_ENTRY_NOCOREDUMP|MAP_ENTRY_IS_SUB_MAP))
1085			continue;
1086
1087		if ((obj = entry->object.vm_object) == NULL)
1088			continue;
1089
1090		/* Find the deepest backing object. */
1091		while (obj->backing_object != NULL)
1092			obj = obj->backing_object;
1093
1094		/* Ignore memory-mapped devices and such things. */
1095		if (obj->type != OBJT_DEFAULT &&
1096		    obj->type != OBJT_SWAP &&
1097		    obj->type != OBJT_VNODE)
1098			continue;
1099
1100		(*func)(entry, closure);
1101	}
1102}
1103
1104/*
1105 * Write the core file header to the file, including padding up to
1106 * the page boundary.
1107 */
1108static int
1109__elfN(corehdr)(td, vp, cred, numsegs, hdr, hdrsize)
1110	struct thread *td;
1111	struct vnode *vp;
1112	struct ucred *cred;
1113	int numsegs;
1114	size_t hdrsize;
1115	void *hdr;
1116{
1117	size_t off;
1118
1119	/* Fill in the header. */
1120	bzero(hdr, hdrsize);
1121	off = 0;
1122	__elfN(puthdr)(td, hdr, &off, numsegs);
1123
1124	/* Write it to the core file. */
1125	return (vn_rdwr_inchunks(UIO_WRITE, vp, hdr, hdrsize, (off_t)0,
1126	    UIO_SYSSPACE, IO_UNIT | IO_DIRECT, cred, NOCRED, NULL,
1127	    td)); /* XXXKSE */
1128}
1129
1130static void
1131__elfN(puthdr)(struct thread *td, void *dst, size_t *off, int numsegs)
1132{
1133	struct {
1134		prstatus_t status;
1135		prfpregset_t fpregset;
1136		prpsinfo_t psinfo;
1137	} *tempdata;
1138	prstatus_t *status;
1139	prfpregset_t *fpregset;
1140	prpsinfo_t *psinfo;
1141	struct proc *p;
1142	struct thread *thr;
1143	size_t ehoff, noteoff, notesz, phoff;
1144
1145	p = td->td_proc;
1146
1147	ehoff = *off;
1148	*off += sizeof(Elf_Ehdr);
1149
1150	phoff = *off;
1151	*off += (numsegs + 1) * sizeof(Elf_Phdr);
1152
1153	noteoff = *off;
1154	/*
1155	 * Don't allocate space for the notes if we're just calculating
1156	 * the size of the header. We also don't collect the data.
1157	 */
1158	if (dst != NULL) {
1159		tempdata = malloc(sizeof(*tempdata), M_TEMP, M_ZERO|M_WAITOK);
1160		status = &tempdata->status;
1161		fpregset = &tempdata->fpregset;
1162		psinfo = &tempdata->psinfo;
1163	} else {
1164		tempdata = NULL;
1165		status = NULL;
1166		fpregset = NULL;
1167		psinfo = NULL;
1168	}
1169
1170	if (dst != NULL) {
1171		psinfo->pr_version = PRPSINFO_VERSION;
1172		psinfo->pr_psinfosz = sizeof(prpsinfo_t);
1173		strlcpy(psinfo->pr_fname, p->p_comm, sizeof(psinfo->pr_fname));
1174		/*
1175		 * XXX - We don't fill in the command line arguments properly
1176		 * yet.
1177		 */
1178		strlcpy(psinfo->pr_psargs, p->p_comm,
1179		    sizeof(psinfo->pr_psargs));
1180	}
1181	__elfN(putnote)(dst, off, "FreeBSD", NT_PRPSINFO, psinfo,
1182	    sizeof *psinfo);
1183
1184	/*
1185	 * To have the debugger select the right thread (LWP) as the initial
1186	 * thread, we dump the state of the thread passed to us in td first.
1187	 * This is the thread that causes the core dump and thus likely to
1188	 * be the right thread one wants to have selected in the debugger.
1189	 */
1190	thr = td;
1191	while (thr != NULL) {
1192		if (dst != NULL) {
1193			status->pr_version = PRSTATUS_VERSION;
1194			status->pr_statussz = sizeof(prstatus_t);
1195			status->pr_gregsetsz = sizeof(gregset_t);
1196			status->pr_fpregsetsz = sizeof(fpregset_t);
1197			status->pr_osreldate = osreldate;
1198			status->pr_cursig = p->p_sig;
1199			status->pr_pid = thr->td_tid;
1200			fill_regs(thr, &status->pr_reg);
1201			fill_fpregs(thr, fpregset);
1202		}
1203		__elfN(putnote)(dst, off, "FreeBSD", NT_PRSTATUS, status,
1204		    sizeof *status);
1205		__elfN(putnote)(dst, off, "FreeBSD", NT_FPREGSET, fpregset,
1206		    sizeof *fpregset);
1207		/*
1208		 * Allow for MD specific notes, as well as any MD
1209		 * specific preparations for writing MI notes.
1210		 */
1211		__elfN(dump_thread)(thr, dst, off);
1212
1213		thr = (thr == td) ? TAILQ_FIRST(&p->p_threads) :
1214		    TAILQ_NEXT(thr, td_plist);
1215		if (thr == td)
1216			thr = TAILQ_NEXT(thr, td_plist);
1217	}
1218
1219	notesz = *off - noteoff;
1220
1221	if (dst != NULL)
1222		free(tempdata, M_TEMP);
1223
1224	/* Align up to a page boundary for the program segments. */
1225	*off = round_page(*off);
1226
1227	if (dst != NULL) {
1228		Elf_Ehdr *ehdr;
1229		Elf_Phdr *phdr;
1230		struct phdr_closure phc;
1231
1232		/*
1233		 * Fill in the ELF header.
1234		 */
1235		ehdr = (Elf_Ehdr *)((char *)dst + ehoff);
1236		ehdr->e_ident[EI_MAG0] = ELFMAG0;
1237		ehdr->e_ident[EI_MAG1] = ELFMAG1;
1238		ehdr->e_ident[EI_MAG2] = ELFMAG2;
1239		ehdr->e_ident[EI_MAG3] = ELFMAG3;
1240		ehdr->e_ident[EI_CLASS] = ELF_CLASS;
1241		ehdr->e_ident[EI_DATA] = ELF_DATA;
1242		ehdr->e_ident[EI_VERSION] = EV_CURRENT;
1243		ehdr->e_ident[EI_OSABI] = ELFOSABI_FREEBSD;
1244		ehdr->e_ident[EI_ABIVERSION] = 0;
1245		ehdr->e_ident[EI_PAD] = 0;
1246		ehdr->e_type = ET_CORE;
1247		ehdr->e_machine = ELF_ARCH;
1248		ehdr->e_version = EV_CURRENT;
1249		ehdr->e_entry = 0;
1250		ehdr->e_phoff = phoff;
1251		ehdr->e_flags = 0;
1252		ehdr->e_ehsize = sizeof(Elf_Ehdr);
1253		ehdr->e_phentsize = sizeof(Elf_Phdr);
1254		ehdr->e_phnum = numsegs + 1;
1255		ehdr->e_shentsize = sizeof(Elf_Shdr);
1256		ehdr->e_shnum = 0;
1257		ehdr->e_shstrndx = SHN_UNDEF;
1258
1259		/*
1260		 * Fill in the program header entries.
1261		 */
1262		phdr = (Elf_Phdr *)((char *)dst + phoff);
1263
1264		/* The note segement. */
1265		phdr->p_type = PT_NOTE;
1266		phdr->p_offset = noteoff;
1267		phdr->p_vaddr = 0;
1268		phdr->p_paddr = 0;
1269		phdr->p_filesz = notesz;
1270		phdr->p_memsz = 0;
1271		phdr->p_flags = 0;
1272		phdr->p_align = 0;
1273		phdr++;
1274
1275		/* All the writable segments from the program. */
1276		phc.phdr = phdr;
1277		phc.offset = *off;
1278		each_writable_segment(td, cb_put_phdr, &phc);
1279	}
1280}
1281
1282static void
1283__elfN(putnote)(void *dst, size_t *off, const char *name, int type,
1284    const void *desc, size_t descsz)
1285{
1286	Elf_Note note;
1287
1288	note.n_namesz = strlen(name) + 1;
1289	note.n_descsz = descsz;
1290	note.n_type = type;
1291	if (dst != NULL)
1292		bcopy(&note, (char *)dst + *off, sizeof note);
1293	*off += sizeof note;
1294	if (dst != NULL)
1295		bcopy(name, (char *)dst + *off, note.n_namesz);
1296	*off += roundup2(note.n_namesz, sizeof(Elf_Size));
1297	if (dst != NULL)
1298		bcopy(desc, (char *)dst + *off, note.n_descsz);
1299	*off += roundup2(note.n_descsz, sizeof(Elf_Size));
1300}
1301
1302/*
1303 * Tell kern_execve.c about it, with a little help from the linker.
1304 */
1305static struct execsw __elfN(execsw) = {
1306	__CONCAT(exec_, __elfN(imgact)),
1307	__XSTRING(__CONCAT(ELF, __ELF_WORD_SIZE))
1308};
1309EXEC_SET(__CONCAT(elf, __ELF_WORD_SIZE), __elfN(execsw));
1310