diff options
author | V3n3RiX <venerix@redcorelinux.org> | 2018-08-04 08:53:53 +0100 |
---|---|---|
committer | V3n3RiX <venerix@redcorelinux.org> | 2018-08-04 08:53:53 +0100 |
commit | e3872864be25f7421015bef2732fa57c0c9fb726 (patch) | |
tree | 9cb29a544215119b5c5538e37211b994ce1c87ae /sys-apps/proot/files | |
parent | 480486b52ea64765faf696c88b2c6a26a5a454d4 (diff) |
gentoo resync : 04.08.2018
Diffstat (limited to 'sys-apps/proot/files')
-rw-r--r-- | sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch | 4 | ||||
-rw-r--r-- | sys-apps/proot/files/proot-3.2.1-makefile.patch | 11 | ||||
-rw-r--r-- | sys-apps/proot/files/proot-3.2.2-build-care.patch | 20 | ||||
-rw-r--r-- | sys-apps/proot/files/proot-4.0.1-argv.patch | 125 | ||||
-rw-r--r-- | sys-apps/proot/files/proot-5.1.0-loader.patch | 272 | ||||
-rw-r--r-- | sys-apps/proot/files/proot-5.1.0-makefile.patch | 22 |
6 files changed, 296 insertions, 158 deletions
diff --git a/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch b/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch index 43c0d03d978a..647f19183a9d 100644 --- a/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch +++ b/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch @@ -1,5 +1,5 @@ ---- src/execve/ldso.c 2013-01-23 16:22:37.870287856 +0400 -+++ src/execve/ldso.c 2013-01-23 16:31:40.219283675 +0400 +--- a/src/execve/ldso.c 2013-01-23 16:22:37.870287856 +0400 ++++ b/src/execve/ldso.c 2013-01-23 16:31:40.219283675 +0400 @@ -285,16 +285,10 @@ /* 6. /lib, /usr/lib + /usr/local/lib */ if (IS_CLASS32(elf_header)) diff --git a/sys-apps/proot/files/proot-3.2.1-makefile.patch b/sys-apps/proot/files/proot-3.2.1-makefile.patch deleted file mode 100644 index 854c48ef0817..000000000000 --- a/sys-apps/proot/files/proot-3.2.1-makefile.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- src/GNUmakefile.orig 2013-12-06 10:47:18.554784621 +0400 -+++ src/GNUmakefile 2013-12-06 10:47:43.129785804 +0400 -@@ -9,7 +9,7 @@ - CC = gcc - LD = $(CC) - CPPFLAGS += -D_FILE_OFFSET_BITS=64 -D_GNU_SOURCE -I. -I$(VPATH) --CFLAGS += -Wall -Wextra -O2 -+CFLAGS += -Wall -Wextra - LDFLAGS += -ltalloc - - OBJECTS = \ diff --git a/sys-apps/proot/files/proot-3.2.2-build-care.patch b/sys-apps/proot/files/proot-3.2.2-build-care.patch deleted file mode 100644 index c52a39cf787b..000000000000 --- a/sys-apps/proot/files/proot-3.2.2-build-care.patch +++ /dev/null @@ -1,20 +0,0 @@ -Skip check for building care, patch by Patrick Lauer <patrick AT gentoo.org> - ---- src/GNUmakefile 2014-02-25 16:42:04.336863622 +0800 -+++ src/GNUmakefile.new 2014-02-25 16:42:26.063050467 +0800 -@@ -54,15 +54,6 @@ - all: proot - - ###################################################################### --# Sanity checks -- --ifneq (,$(findstring care,$(MAKECMDGOALS))) --ifneq ($(CARE_BUILD_ENV),ok) --$(error care is supposed to be built with: http://build.reproducible.io) --endif --endif -- --###################################################################### - # Beautified output - - quiet_GEN = @echo " GEN $@"; $(GEN) diff --git a/sys-apps/proot/files/proot-4.0.1-argv.patch b/sys-apps/proot/files/proot-4.0.1-argv.patch deleted file mode 100644 index df580563458c..000000000000 --- a/sys-apps/proot/files/proot-4.0.1-argv.patch +++ /dev/null @@ -1,125 +0,0 @@ -commit 520fa3601c36dd0a3c84e310bd2a1189259000bd -Author: Cédric VINCENT <cedric.vincent@st.com> -Date: Thu Aug 7 14:29:37 2014 +0200 - - Don't dereference argv[0] when launching a script through a symlink. - - Reported-by: Joakim Tjernlund <Joakim.Tjernlund@transmode.se> - Ref: https://bugs.gentoo.org/show_bug.cgi?id=517496 - - Also, don't complain about non-regular or non-executable files that - are not explicitely candidates. - -diff --git a/src/path/path.c b/src/path/path.c -index 4225876..ecdef70 100644 ---- a/src/path/path.c -+++ b/src/path/path.c -@@ -219,17 +219,21 @@ int which(Tracee *tracee, const char *paths, char host_path[PATH_MAX], char *con - /* Is the command available without any $PATH look-up? */ - status = realpath2(tracee, host_path, command, true); - if (status == 0 && stat(host_path, &statr) == 0) { -- if (!S_ISREG(statr.st_mode)) { -+ if (is_explicit && !S_ISREG(statr.st_mode)) { - notice(tracee, ERROR, USER, "'%s' is not a regular file", command); - return -EACCES; - } - -- if ((statr.st_mode & S_IXUSR) == 0) { -+ if (is_explicit && (statr.st_mode & S_IXUSR) == 0) { - notice(tracee, ERROR, USER, "'%s' is not executable", command); - return -EACCES; - } - - found = true; -+ -+ /* Don't dereference the final component to preserve -+ * argv0 in case it is a symlink to script. */ -+ (void) realpath2(tracee, host_path, command, false); - } - else - found = false; -@@ -274,8 +278,12 @@ int which(Tracee *tracee, const char *paths, char host_path[PATH_MAX], char *con - if (status == 0 - && stat(host_path, &statr) == 0 - && S_ISREG(statr.st_mode) -- && (statr.st_mode & S_IXUSR) != 0) -- return 0; -+ && (statr.st_mode & S_IXUSR) != 0) { -+ /* Don't dereference the final component to preserve -+ * argv0 in case it is a symlink to script. */ -+ (void) realpath2(tracee, host_path, path, false); -+ return 0; -+ } - } while (*(cursor - 1) != '\0'); - - not_found: -diff --git a/src/tracee/event.c b/src/tracee/event.c -index 70668d6..5905c43 100644 ---- a/src/tracee/event.c -+++ b/src/tracee/event.c -@@ -92,7 +92,7 @@ int launch_process(Tracee *tracee) - * guest rootfs. Note: Valgrind can't handle execve(2) on - * "foreign" binaries (ENOEXEC) but can handle execvp(3) on such - * binaries. */ -- execvp(tracee->exe, tracee->cmdline); -+ execv(tracee->exe, tracee->cmdline); - return -errno; - - default: /* parent */ -diff --git a/tests/test-713b6910.sh b/tests/test-713b6910.sh -new file mode 100644 -index 0000000..82e01fd ---- /dev/null -+++ b/tests/test-713b6910.sh -@@ -0,0 +1,51 @@ -+if [ -z `which mcookie` ] || [ -z `which rm` ] || [ -z `which cat` ] || [ -z `which chmod` ] || [ -z `which ln` ] || [ -z `which grep` ] || [ -z `which mkdir` ] || [ ! -x ${ROOTFS}/bin/readlink ]; then -+ exit 125; -+fi -+ -+###################################################################### -+ -+TMP1=/tmp/$(mcookie) -+TMP2=/tmp/$(mcookie) -+TMP3=/tmp/$(mcookie) -+TMP4=/tmp/$(mcookie) -+ -+rm -fr ${TMP1} ${TMP2} ${TMP3} ${TMP4} -+ -+###################################################################### -+ -+cat > ${TMP1} <<'EOF' -+#!/bin/sh -+echo $0 -+EOF -+ -+chmod +x ${TMP1} -+ln -s ${TMP1} ${TMP2} -+ -+${PROOT} ${TMP2} | grep -v ${TMP1} -+${PROOT} ${TMP2} | grep ${TMP2} -+ -+###################################################################### -+ -+mkdir -p ${TMP3} -+cd ${TMP3} -+ -+ln -s $(which true) false -+! ${PROOT} false -+ -+echo "#!$(which false)" > true -+chmod a-x true -+${PROOT} true -+ -+###################################################################### -+ -+ln -s ${ROOTFS}/bin/readlink ${TMP4} -+ -+TEST1=$(${PROOT} ${ROOTFS}/bin/readlink /proc/self/exe) -+TEST2=$(${PROOT} ${TMP4} /proc/self/exe) -+ -+test "${TEST1}" = "${TEST2}" -+ -+###################################################################### -+ -+cd / -+rm -fr ${TMP1} ${TMP2} ${TMP3} ${TMP4} diff --git a/sys-apps/proot/files/proot-5.1.0-loader.patch b/sys-apps/proot/files/proot-5.1.0-loader.patch new file mode 100644 index 000000000000..e74cfaa7807b --- /dev/null +++ b/sys-apps/proot/files/proot-5.1.0-loader.patch @@ -0,0 +1,272 @@ +commit 77d5ba4e5bb35f91d026a3240ad0a91a2d4b662a +Author: Cédric VINCENT <cedric.vincent@st.com> +Date: Fri Feb 20 14:28:55 2015 +0100 + + Set tracee's stack executable when the loaded program requires this. + + This is required for UMEQ and for some older versions of PRoot. For + example: + + $ proot -q umeq-arm64-dce01957 -R ~/gentoo-arm64-20140718 + + Before: + + proot info: vpid 1 terminated with signal 11 + + Now, it is OK. + +diff --git a/src/compat.h b/src/compat.h +index 2b603f1..5009490 100644 +--- a/src/compat.h ++++ b/src/compat.h +@@ -243,5 +243,17 @@ + # ifndef MAP_ANONYMOUS + # define MAP_ANONYMOUS 0x20 + # endif ++# ifndef PROT_READ ++# define PROT_READ 0x1 ++# endif ++# ifndef PROT_WRITE ++# define PROT_WRITE 0x2 ++# endif ++# ifndef PROT_EXEC ++# define PROT_EXEC 0x4 ++# endif ++# ifndef PROT_GROWSDOWN ++# define PROT_GROWSDOWN 0x01000000 ++# endif + + #endif /* COMPAT_H */ +diff --git a/src/execve/elf.h b/src/execve/elf.h +index 3ced10c..a5b367b 100644 +--- a/src/execve/elf.h ++++ b/src/execve/elf.h +@@ -108,7 +108,8 @@ typedef union { + typedef enum { + PT_LOAD = 1, + PT_DYNAMIC = 2, +- PT_INTERP = 3 ++ PT_INTERP = 3, ++ PT_GNU_STACK = 0x6474e551, + } SegmentType; + + typedef struct { +diff --git a/src/execve/enter.c b/src/execve/enter.c +index cb84ec6..f0f3e7f 100644 +--- a/src/execve/enter.c ++++ b/src/execve/enter.c +@@ -252,6 +252,11 @@ static int add_load_info(const ElfHeader *elf_header, + return status; + break; + ++ case PT_GNU_STACK: ++ data->load_info->needs_executable_stack |= ++ ((PROGRAM_FIELD(*elf_header, *program_header, flags) & PF_X) != 0); ++ break; ++ + default: + break; + } +diff --git a/src/execve/execve.h b/src/execve/execve.h +index 11eca10..98b8d03 100644 +--- a/src/execve/execve.h ++++ b/src/execve/execve.h +@@ -49,6 +49,7 @@ typedef struct load_info { + char *raw_path; + Mapping *mappings; + ElfHeader elf_header; ++ bool needs_executable_stack; + + struct load_info *interp; + } LoadInfo; +diff --git a/src/execve/exit.c b/src/execve/exit.c +index e6eff44..36cc51f 100644 +--- a/src/execve/exit.c ++++ b/src/execve/exit.c +@@ -174,6 +174,9 @@ static void *transcript_mappings(void *cursor, const Mapping *mappings) + static int transfer_load_script(Tracee *tracee) + { + const word_t stack_pointer = peek_reg(tracee, CURRENT, STACK_POINTER); ++ static word_t page_size = 0; ++ static word_t page_mask = 0; ++ + word_t entry_point; + + size_t script_size; +@@ -190,10 +193,22 @@ static int transfer_load_script(Tracee *tracee) + void *buffer; + size_t buffer_size; + ++ bool needs_executable_stack; + LoadStatement *statement; + void *cursor; + int status; + ++ if (page_size == 0) { ++ page_size = sysconf(_SC_PAGE_SIZE); ++ if ((int) page_size <= 0) ++ page_size = 0x1000; ++ page_mask = ~(page_size - 1); ++ } ++ ++ needs_executable_stack = (tracee->load_info->needs_executable_stack ++ || ( tracee->load_info->interp != NULL ++ && tracee->load_info->interp->needs_executable_stack)); ++ + /* Strings addresses are required to generate the load script, + * for "open" actions. Since I want to generate it in one + * pass, these strings will be put right below the current +@@ -208,7 +223,7 @@ static int transfer_load_script(Tracee *tracee) + : strlen(tracee->load_info->raw_path) + 1); + + /* A padding will be appended at the end of the load script +- * (a.k.a "strings area") to ensure this latter is aligned on ++ * (a.k.a "strings area") to ensure this latter is aligned to + * a word boundary, for sake of performance. */ + padding_size = (stack_pointer - string1_size - string2_size - string3_size) + % sizeof_word(tracee); +@@ -229,6 +244,7 @@ static int transfer_load_script(Tracee *tracee) + : LOAD_STATEMENT_SIZE(*statement, open) + + (LOAD_STATEMENT_SIZE(*statement, mmap) + * talloc_array_length(tracee->load_info->interp->mappings))) ++ + (needs_executable_stack ? LOAD_STATEMENT_SIZE(*statement, make_stack_exec) : 0) + + LOAD_STATEMENT_SIZE(*statement, start); + + /* Allocate enough room for both the load script and the +@@ -266,6 +282,16 @@ static int transfer_load_script(Tracee *tracee) + else + entry_point = ELF_FIELD(tracee->load_info->elf_header, entry); + ++ if (needs_executable_stack) { ++ /* Load script statement: stack_exec. */ ++ statement = cursor; ++ ++ statement->action = LOAD_ACTION_MAKE_STACK_EXEC; ++ statement->make_stack_exec.start = stack_pointer & page_mask; ++ ++ cursor += LOAD_STATEMENT_SIZE(*statement, make_stack_exec); ++ } ++ + /* Load script statement: start. */ + statement = cursor; + +@@ -352,7 +378,7 @@ static int transfer_load_script(Tracee *tracee) + * | mmap file | + * +------------+ + * | open | +- * +------------+ <- stack pointer, sysarg1 (word aligned) ++ * +------------+ <- stack pointer, userarg1 (word aligned) + */ + + /* Remember we are in the sysexit stage, so be sure the +diff --git a/src/loader/assembly-arm.h b/src/loader/assembly-arm.h +index ee5bb85..59a7fe0 100644 +--- a/src/loader/assembly-arm.h ++++ b/src/loader/assembly-arm.h +@@ -89,4 +89,5 @@ + #define EXECVE 11 + #define EXIT 1 + #define PRCTL 172 ++#define MPROTECT 125 + +diff --git a/src/loader/assembly-x86.h b/src/loader/assembly-x86.h +index c83b3ef..4045144 100644 +--- a/src/loader/assembly-x86.h ++++ b/src/loader/assembly-x86.h +@@ -65,3 +65,4 @@ extern word_t syscall_1(word_t number, word_t arg1); + #define EXECVE 11 + #define EXIT 1 + #define PRCTL 172 ++#define MPROTECT 125 +diff --git a/src/loader/assembly-x86_64.h b/src/loader/assembly-x86_64.h +index c581208..6f431be 100644 +--- a/src/loader/assembly-x86_64.h ++++ b/src/loader/assembly-x86_64.h +@@ -93,3 +93,4 @@ + #define EXECVE 59 + #define EXIT 60 + #define PRCTL 157 ++#define MPROTECT 10 +diff --git a/src/loader/loader.c b/src/loader/loader.c +index 5b31b02..9c2037b 100644 +--- a/src/loader/loader.c ++++ b/src/loader/loader.c +@@ -171,6 +171,14 @@ void _start(void *cursor) + cursor += LOAD_STATEMENT_SIZE(*stmt, mmap); + break; + ++ case LOAD_ACTION_MAKE_STACK_EXEC: ++ SYSCALL(MPROTECT, 3, ++ stmt->make_stack_exec.start, 1, ++ PROT_READ | PROT_WRITE | PROT_EXEC | PROT_GROWSDOWN); ++ ++ cursor += LOAD_STATEMENT_SIZE(*stmt, make_stack_exec); ++ break; ++ + case LOAD_ACTION_START_TRACED: + traced = true; + /* Fall through. */ +diff --git a/src/loader/script.h b/src/loader/script.h +index bb48af5..6ae7621 100644 +--- a/src/loader/script.h ++++ b/src/loader/script.h +@@ -42,6 +42,10 @@ struct load_statement { + word_t clear_length; + } mmap; + ++ struct { ++ word_t start; ++ } make_stack_exec; ++ + struct { + word_t stack_pointer; + word_t entry_point; +@@ -67,7 +71,8 @@ typedef struct load_statement LoadStatement; + #define LOAD_ACTION_OPEN 1 + #define LOAD_ACTION_MMAP_FILE 2 + #define LOAD_ACTION_MMAP_ANON 3 +-#define LOAD_ACTION_START_TRACED 4 +-#define LOAD_ACTION_START 5 ++#define LOAD_ACTION_MAKE_STACK_EXEC 4 ++#define LOAD_ACTION_START_TRACED 5 ++#define LOAD_ACTION_START 6 + + #endif /* SCRIPT */ + +commit d649854ddb66779950954aac99d960379c631a71 +Author: Nicolas Cornu <ncornu@aldebaran.com> +Date: Wed Jul 29 14:52:57 2015 +0200 + + Fix use of size + +diff --git a/src/execve/enter.c b/src/execve/enter.c +index 8f22d9c..4c163a1 100644 +--- a/src/execve/enter.c ++++ b/src/execve/enter.c +@@ -454,10 +454,10 @@ static int expand_runner(Tracee* tracee, char host_path[PATH_MAX], char user_pat + } + + extern unsigned char _binary_loader_exe_start; +-extern unsigned char _binary_loader_exe_size; ++extern unsigned char _binary_loader_exe_end; + + extern unsigned char WEAK _binary_loader_m32_exe_start; +-extern unsigned char WEAK _binary_loader_m32_exe_size; ++extern unsigned char WEAK _binary_loader_m32_exe_end; + + /** + * Extract the built-in loader. This function returns NULL if an +@@ -483,11 +483,11 @@ static char *extract_loader(const Tracee *tracee, bool wants_32bit_version) + + if (wants_32bit_version) { + start = (void *) &_binary_loader_m32_exe_start; +- size = (size_t) &_binary_loader_m32_exe_size; ++ size = (size_t)(&_binary_loader_m32_exe_end-&_binary_loader_m32_exe_start); + } + else { + start = (void *) &_binary_loader_exe_start; +- size = (size_t) &_binary_loader_exe_size; ++ size = (size_t) (&_binary_loader_exe_end-&_binary_loader_exe_start); + } + + status2 = write(fd, start, size); diff --git a/sys-apps/proot/files/proot-5.1.0-makefile.patch b/sys-apps/proot/files/proot-5.1.0-makefile.patch new file mode 100644 index 000000000000..414cb29010cb --- /dev/null +++ b/sys-apps/proot/files/proot-5.1.0-makefile.patch @@ -0,0 +1,22 @@ +--- a/src/GNUmakefile 2018-08-01 16:30:00.957743804 +0300 ++++ b/src/GNUmakefile 2018-08-01 16:30:34.876741798 +0300 +@@ -15,8 +15,8 @@ + OBJDUMP = $(CROSS_COMPILE)objdump + + CPPFLAGS += -D_FILE_OFFSET_BITS=64 -D_GNU_SOURCE -I. -I$(VPATH) +-CFLAGS += -Wall -Wextra -O2 +-LDFLAGS += -ltalloc ++CFLAGS += -Wall -Wextra ++LDFLAGS += -ltalloc -Wl,-z,noexecstack + + CARE_LDFLAGS = -larchive + +@@ -182,7 +182,7 @@ + $(eval $(call define_from_arch.h,$1,LOADER_ADDRESS)) + + LOADER_CFLAGS$1 += -fPIC -ffreestanding $(LOADER_ARCH_CFLAGS$1) +-LOADER_LDFLAGS$1 += -static -nostdlib -Wl$(BUILD_ID_NONE),-Ttext=$(LOADER_ADDRESS$1) ++LOADER_LDFLAGS$1 += -static -nostdlib -Wl$(BUILD_ID_NONE),-Ttext=$(LOADER_ADDRESS$1),-z,noexecstack + + loader/loader$1.o: loader/loader.c + @mkdir -p $$(dir $$@) |