Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Kernel Liteos A
提交
56a92f92
K
Kernel Liteos A
项目概览
OpenHarmony
/
Kernel Liteos A
9 个月 前同步成功
通知
450
Star
414
Fork
55
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
4
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
K
Kernel Liteos A
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
4
Issue
4
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
56a92f92
编写于
10月 08, 2021
作者:
O
openharmony_ci
提交者:
Gitee
10月 08, 2021
浏览文件
操作
浏览文件
下载
差异文件
!641 feat: 支持AT_RANDOM以增强用户态栈保护能力
Merge pull request !641 from Harylee/shm
上级
29df5dc1
06ea0371
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
38 addition
and
12 deletion
+38
-12
kernel/extended/dynload/include/los_load_elf.h
kernel/extended/dynload/include/los_load_elf.h
+4
-4
kernel/extended/dynload/src/los_load_elf.c
kernel/extended/dynload/src/los_load_elf.c
+34
-8
未找到文件。
kernel/extended/dynload/include/los_load_elf.h
浏览文件 @
56a92f92
...
...
@@ -79,6 +79,7 @@ extern "C" {
#endif
#define STACK_ALIGN_SIZE 0x10
#define RANDOM_VECTOR_SIZE 1
/* The permissions on sections in the program header. */
#define PF_R 0x4
...
...
@@ -99,23 +100,22 @@ typedef struct {
CHAR
*
execName
;
INT32
argc
;
INT32
envc
;
CHAR
*
const
*
argv
;
CHAR
*
const
*
envp
;
CHAR
*
const
*
argv
;
CHAR
*
const
*
envp
;
UINTPTR
stackTop
;
UINTPTR
stackTopMax
;
UINTPTR
stackBase
;
UINTPTR
stackParamBase
;
UINT32
stackSize
;
INT32
stackProt
;
UINTPTR
argStart
;
UINTPTR
loadAddr
;
UINTPTR
elfEntry
;
UINTPTR
topOfMem
;
UINTPTR
oldFiles
;
LosVmSpace
*
newSpace
;
LosVmSpace
*
oldSpace
;
#ifdef LOSCFG_ASLR
INT32
randomDevFD
;
#endif
}
ELFLoadInfo
;
STATIC
INLINE
BOOL
OsIsBadUserAddress
(
VADDR_T
vaddr
)
...
...
kernel/extended/dynload/src/los_load_elf.c
浏览文件 @
56a92f92
...
...
@@ -789,12 +789,10 @@ STATIC INT32 OsSetArgParams(ELFLoadInfo *loadInfo, CHAR *const *argv, CHAR *cons
UINT32
vmFlags
;
INT32
ret
;
#ifdef LOSCFG_ASLR
loadInfo
->
randomDevFD
=
open
(
"/dev/urandom"
,
O_RDONLY
);
if
(
loadInfo
->
randomDevFD
<
0
)
{
PRINT_ERR
(
"%s: open /dev/urandom failed
\n
"
,
__FUNCTION__
);
}
#endif
(
VOID
)
OsGetStackProt
(
loadInfo
);
if
(((
UINT32
)
loadInfo
->
stackProt
&
(
PROT_READ
|
PROT_WRITE
))
!=
(
PROT_READ
|
PROT_WRITE
))
{
...
...
@@ -831,13 +829,13 @@ STATIC INT32 OsSetArgParams(ELFLoadInfo *loadInfo, CHAR *const *argv, CHAR *cons
if
(
ret
!=
LOS_OK
)
{
return
ret
;
}
loadInfo
->
argStart
=
loadInfo
->
topOfMem
;
return
LOS_OK
;
}
STATIC
INT32
OsPutParamToStack
(
ELFLoadInfo
*
loadInfo
,
const
UINTPTR
*
auxVecInfo
,
INT32
vecIndex
)
{
UINTPTR
argStart
=
loadInfo
->
topOfMem
;
UINTPTR
*
topMem
=
(
UINTPTR
*
)
ROUNDDOWN
(
loadInfo
->
topOfMem
,
sizeof
(
UINTPTR
));
UINTPTR
*
argsPtr
=
NULL
;
INT32
items
=
(
loadInfo
->
argc
+
1
)
+
(
loadInfo
->
envc
+
1
)
+
1
;
...
...
@@ -858,8 +856,8 @@ STATIC INT32 OsPutParamToStack(ELFLoadInfo *loadInfo, const UINTPTR *auxVecInfo,
argsPtr
++
;
if
((
OsPutUserArgv
(
&
argStart
,
&
argsPtr
,
loadInfo
->
argc
)
!=
LOS_OK
)
||
(
OsPutUserArgv
(
&
argStart
,
&
argsPtr
,
loadInfo
->
envc
)
!=
LOS_OK
))
{
if
((
OsPutUserArgv
(
&
loadInfo
->
argStart
,
&
argsPtr
,
loadInfo
->
argc
)
!=
LOS_OK
)
||
(
OsPutUserArgv
(
&
loadInfo
->
argStart
,
&
argsPtr
,
loadInfo
->
envc
)
!=
LOS_OK
))
{
PRINT_ERR
(
"%s[%d], Failed to put argv or envp to user stack!
\n
"
,
__FUNCTION__
,
__LINE__
);
return
-
EFAULT
;
}
...
...
@@ -873,16 +871,46 @@ STATIC INT32 OsPutParamToStack(ELFLoadInfo *loadInfo, const UINTPTR *auxVecInfo,
return
LOS_OK
;
}
STATIC
INT32
OsGetRndNum
(
const
ELFLoadInfo
*
loadInfo
,
UINT32
*
rndVec
,
UINT32
vecSize
)
{
UINT32
randomValue
=
0
;
UINT32
i
,
ret
;
for
(
i
=
0
;
i
<
vecSize
;
++
i
)
{
ret
=
read
(
loadInfo
->
randomDevFD
,
&
randomValue
,
sizeof
(
UINT32
));
if
(
ret
!=
sizeof
(
UINT32
))
{
return
-
EIO
;
}
rndVec
[
i
]
=
randomValue
;
}
return
LOS_OK
;
}
STATIC
INT32
OsMakeArgsStack
(
ELFLoadInfo
*
loadInfo
,
UINTPTR
interpMapBase
)
{
UINTPTR
auxVector
[
AUX_VECTOR_SIZE
]
=
{
0
};
UINTPTR
*
auxVecInfo
=
(
UINTPTR
*
)
auxVector
;
INT32
vecIndex
=
0
;
UINT32
rndVec
[
RANDOM_VECTOR_SIZE
];
UINTPTR
rndVecStart
;
INT32
ret
;
#ifdef LOSCFG_KERNEL_VDSO
vaddr_t
vdsoLoadAddr
;
#endif
ret
=
OsGetRndNum
(
loadInfo
,
rndVec
,
sizeof
(
rndVec
));
if
(
ret
!=
LOS_OK
)
{
return
ret
;
}
loadInfo
->
topOfMem
-=
sizeof
(
rndVec
);
rndVecStart
=
loadInfo
->
topOfMem
;
ret
=
LOS_ArchCopyToUser
((
VOID
*
)
loadInfo
->
topOfMem
,
rndVec
,
sizeof
(
rndVec
));
if
(
ret
!=
0
)
{
return
-
EFAULT
;
}
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_PHDR
,
loadInfo
->
loadAddr
+
loadInfo
->
execInfo
.
elfEhdr
.
elfPhoff
);
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_PHENT
,
sizeof
(
LD_ELF_PHDR
));
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_PHNUM
,
loadInfo
->
execInfo
.
elfEhdr
.
elfPhNum
);
...
...
@@ -897,7 +925,7 @@ STATIC INT32 OsMakeArgsStack(ELFLoadInfo *loadInfo, UINTPTR interpMapBase)
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_HWCAP
,
0
);
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_CLKTCK
,
0
);
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_SECURE
,
0
);
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_RANDOM
,
0
);
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_RANDOM
,
rndVecStart
);
AUX_VEC_ENTRY
(
auxVector
,
vecIndex
,
AUX_EXECFN
,
(
UINTPTR
)
loadInfo
->
execName
);
#ifdef LOSCFG_KERNEL_VDSO
...
...
@@ -988,9 +1016,7 @@ STATIC VOID OsFlushAspace(ELFLoadInfo *loadInfo)
STATIC
VOID
OsDeInitLoadInfo
(
ELFLoadInfo
*
loadInfo
)
{
#ifdef LOSCFG_ASLR
(
VOID
)
close
(
loadInfo
->
randomDevFD
);
#endif
if
(
loadInfo
->
execInfo
.
elfPhdr
!=
NULL
)
{
(
VOID
)
LOS_MemFree
(
m_aucSysMem0
,
loadInfo
->
execInfo
.
elfPhdr
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录