summaryrefslogtreecommitdiff
path: root/sys-apps/proot/files
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2018-08-04 08:53:53 +0100
committerV3n3RiX <venerix@redcorelinux.org>2018-08-04 08:53:53 +0100
commite3872864be25f7421015bef2732fa57c0c9fb726 (patch)
tree9cb29a544215119b5c5538e37211b994ce1c87ae /sys-apps/proot/files
parent480486b52ea64765faf696c88b2c6a26a5a454d4 (diff)
gentoo resync : 04.08.2018
Diffstat (limited to 'sys-apps/proot/files')
-rw-r--r--sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch4
-rw-r--r--sys-apps/proot/files/proot-3.2.1-makefile.patch11
-rw-r--r--sys-apps/proot/files/proot-3.2.2-build-care.patch20
-rw-r--r--sys-apps/proot/files/proot-4.0.1-argv.patch125
-rw-r--r--sys-apps/proot/files/proot-5.1.0-loader.patch272
-rw-r--r--sys-apps/proot/files/proot-5.1.0-makefile.patch22
6 files changed, 296 insertions, 158 deletions
diff --git a/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch b/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch
index 43c0d03d978a..647f19183a9d 100644
--- a/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch
+++ b/sys-apps/proot/files/proot-2.3.1-lib-paths-fix.patch
@@ -1,5 +1,5 @@
---- src/execve/ldso.c 2013-01-23 16:22:37.870287856 +0400
-+++ src/execve/ldso.c 2013-01-23 16:31:40.219283675 +0400
+--- a/src/execve/ldso.c 2013-01-23 16:22:37.870287856 +0400
++++ b/src/execve/ldso.c 2013-01-23 16:31:40.219283675 +0400
@@ -285,16 +285,10 @@
/* 6. /lib, /usr/lib + /usr/local/lib */
if (IS_CLASS32(elf_header))
diff --git a/sys-apps/proot/files/proot-3.2.1-makefile.patch b/sys-apps/proot/files/proot-3.2.1-makefile.patch
deleted file mode 100644
index 854c48ef0817..000000000000
--- a/sys-apps/proot/files/proot-3.2.1-makefile.patch
+++ /dev/null
@@ -1,11 +0,0 @@
---- src/GNUmakefile.orig 2013-12-06 10:47:18.554784621 +0400
-+++ src/GNUmakefile 2013-12-06 10:47:43.129785804 +0400
-@@ -9,7 +9,7 @@
- CC = gcc
- LD = $(CC)
- CPPFLAGS += -D_FILE_OFFSET_BITS=64 -D_GNU_SOURCE -I. -I$(VPATH)
--CFLAGS += -Wall -Wextra -O2
-+CFLAGS += -Wall -Wextra
- LDFLAGS += -ltalloc
-
- OBJECTS = \
diff --git a/sys-apps/proot/files/proot-3.2.2-build-care.patch b/sys-apps/proot/files/proot-3.2.2-build-care.patch
deleted file mode 100644
index c52a39cf787b..000000000000
--- a/sys-apps/proot/files/proot-3.2.2-build-care.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-Skip check for building care, patch by Patrick Lauer <patrick AT gentoo.org>
-
---- src/GNUmakefile 2014-02-25 16:42:04.336863622 +0800
-+++ src/GNUmakefile.new 2014-02-25 16:42:26.063050467 +0800
-@@ -54,15 +54,6 @@
- all: proot
-
- ######################################################################
--# Sanity checks
--
--ifneq (,$(findstring care,$(MAKECMDGOALS)))
--ifneq ($(CARE_BUILD_ENV),ok)
--$(error care is supposed to be built with: http://build.reproducible.io)
--endif
--endif
--
--######################################################################
- # Beautified output
-
- quiet_GEN = @echo " GEN $@"; $(GEN)
diff --git a/sys-apps/proot/files/proot-4.0.1-argv.patch b/sys-apps/proot/files/proot-4.0.1-argv.patch
deleted file mode 100644
index df580563458c..000000000000
--- a/sys-apps/proot/files/proot-4.0.1-argv.patch
+++ /dev/null
@@ -1,125 +0,0 @@
-commit 520fa3601c36dd0a3c84e310bd2a1189259000bd
-Author: Cédric VINCENT <cedric.vincent@st.com>
-Date: Thu Aug 7 14:29:37 2014 +0200
-
- Don't dereference argv[0] when launching a script through a symlink.
-
- Reported-by: Joakim Tjernlund <Joakim.Tjernlund@transmode.se>
- Ref: https://bugs.gentoo.org/show_bug.cgi?id=517496
-
- Also, don't complain about non-regular or non-executable files that
- are not explicitely candidates.
-
-diff --git a/src/path/path.c b/src/path/path.c
-index 4225876..ecdef70 100644
---- a/src/path/path.c
-+++ b/src/path/path.c
-@@ -219,17 +219,21 @@ int which(Tracee *tracee, const char *paths, char host_path[PATH_MAX], char *con
- /* Is the command available without any $PATH look-up? */
- status = realpath2(tracee, host_path, command, true);
- if (status == 0 && stat(host_path, &statr) == 0) {
-- if (!S_ISREG(statr.st_mode)) {
-+ if (is_explicit && !S_ISREG(statr.st_mode)) {
- notice(tracee, ERROR, USER, "'%s' is not a regular file", command);
- return -EACCES;
- }
-
-- if ((statr.st_mode & S_IXUSR) == 0) {
-+ if (is_explicit && (statr.st_mode & S_IXUSR) == 0) {
- notice(tracee, ERROR, USER, "'%s' is not executable", command);
- return -EACCES;
- }
-
- found = true;
-+
-+ /* Don't dereference the final component to preserve
-+ * argv0 in case it is a symlink to script. */
-+ (void) realpath2(tracee, host_path, command, false);
- }
- else
- found = false;
-@@ -274,8 +278,12 @@ int which(Tracee *tracee, const char *paths, char host_path[PATH_MAX], char *con
- if (status == 0
- && stat(host_path, &statr) == 0
- && S_ISREG(statr.st_mode)
-- && (statr.st_mode & S_IXUSR) != 0)
-- return 0;
-+ && (statr.st_mode & S_IXUSR) != 0) {
-+ /* Don't dereference the final component to preserve
-+ * argv0 in case it is a symlink to script. */
-+ (void) realpath2(tracee, host_path, path, false);
-+ return 0;
-+ }
- } while (*(cursor - 1) != '\0');
-
- not_found:
-diff --git a/src/tracee/event.c b/src/tracee/event.c
-index 70668d6..5905c43 100644
---- a/src/tracee/event.c
-+++ b/src/tracee/event.c
-@@ -92,7 +92,7 @@ int launch_process(Tracee *tracee)
- * guest rootfs. Note: Valgrind can't handle execve(2) on
- * "foreign" binaries (ENOEXEC) but can handle execvp(3) on such
- * binaries. */
-- execvp(tracee->exe, tracee->cmdline);
-+ execv(tracee->exe, tracee->cmdline);
- return -errno;
-
- default: /* parent */
-diff --git a/tests/test-713b6910.sh b/tests/test-713b6910.sh
-new file mode 100644
-index 0000000..82e01fd
---- /dev/null
-+++ b/tests/test-713b6910.sh
-@@ -0,0 +1,51 @@
-+if [ -z `which mcookie` ] || [ -z `which rm` ] || [ -z `which cat` ] || [ -z `which chmod` ] || [ -z `which ln` ] || [ -z `which grep` ] || [ -z `which mkdir` ] || [ ! -x ${ROOTFS}/bin/readlink ]; then
-+ exit 125;
-+fi
-+
-+######################################################################
-+
-+TMP1=/tmp/$(mcookie)
-+TMP2=/tmp/$(mcookie)
-+TMP3=/tmp/$(mcookie)
-+TMP4=/tmp/$(mcookie)
-+
-+rm -fr ${TMP1} ${TMP2} ${TMP3} ${TMP4}
-+
-+######################################################################
-+
-+cat > ${TMP1} <<'EOF'
-+#!/bin/sh
-+echo $0
-+EOF
-+
-+chmod +x ${TMP1}
-+ln -s ${TMP1} ${TMP2}
-+
-+${PROOT} ${TMP2} | grep -v ${TMP1}
-+${PROOT} ${TMP2} | grep ${TMP2}
-+
-+######################################################################
-+
-+mkdir -p ${TMP3}
-+cd ${TMP3}
-+
-+ln -s $(which true) false
-+! ${PROOT} false
-+
-+echo "#!$(which false)" > true
-+chmod a-x true
-+${PROOT} true
-+
-+######################################################################
-+
-+ln -s ${ROOTFS}/bin/readlink ${TMP4}
-+
-+TEST1=$(${PROOT} ${ROOTFS}/bin/readlink /proc/self/exe)
-+TEST2=$(${PROOT} ${TMP4} /proc/self/exe)
-+
-+test "${TEST1}" = "${TEST2}"
-+
-+######################################################################
-+
-+cd /
-+rm -fr ${TMP1} ${TMP2} ${TMP3} ${TMP4}
diff --git a/sys-apps/proot/files/proot-5.1.0-loader.patch b/sys-apps/proot/files/proot-5.1.0-loader.patch
new file mode 100644
index 000000000000..e74cfaa7807b
--- /dev/null
+++ b/sys-apps/proot/files/proot-5.1.0-loader.patch
@@ -0,0 +1,272 @@
+commit 77d5ba4e5bb35f91d026a3240ad0a91a2d4b662a
+Author: Cédric VINCENT <cedric.vincent@st.com>
+Date: Fri Feb 20 14:28:55 2015 +0100
+
+ Set tracee's stack executable when the loaded program requires this.
+
+ This is required for UMEQ and for some older versions of PRoot. For
+ example:
+
+ $ proot -q umeq-arm64-dce01957 -R ~/gentoo-arm64-20140718
+
+ Before:
+
+ proot info: vpid 1 terminated with signal 11
+
+ Now, it is OK.
+
+diff --git a/src/compat.h b/src/compat.h
+index 2b603f1..5009490 100644
+--- a/src/compat.h
++++ b/src/compat.h
+@@ -243,5 +243,17 @@
+ # ifndef MAP_ANONYMOUS
+ # define MAP_ANONYMOUS 0x20
+ # endif
++# ifndef PROT_READ
++# define PROT_READ 0x1
++# endif
++# ifndef PROT_WRITE
++# define PROT_WRITE 0x2
++# endif
++# ifndef PROT_EXEC
++# define PROT_EXEC 0x4
++# endif
++# ifndef PROT_GROWSDOWN
++# define PROT_GROWSDOWN 0x01000000
++# endif
+
+ #endif /* COMPAT_H */
+diff --git a/src/execve/elf.h b/src/execve/elf.h
+index 3ced10c..a5b367b 100644
+--- a/src/execve/elf.h
++++ b/src/execve/elf.h
+@@ -108,7 +108,8 @@ typedef union {
+ typedef enum {
+ PT_LOAD = 1,
+ PT_DYNAMIC = 2,
+- PT_INTERP = 3
++ PT_INTERP = 3,
++ PT_GNU_STACK = 0x6474e551,
+ } SegmentType;
+
+ typedef struct {
+diff --git a/src/execve/enter.c b/src/execve/enter.c
+index cb84ec6..f0f3e7f 100644
+--- a/src/execve/enter.c
++++ b/src/execve/enter.c
+@@ -252,6 +252,11 @@ static int add_load_info(const ElfHeader *elf_header,
+ return status;
+ break;
+
++ case PT_GNU_STACK:
++ data->load_info->needs_executable_stack |=
++ ((PROGRAM_FIELD(*elf_header, *program_header, flags) & PF_X) != 0);
++ break;
++
+ default:
+ break;
+ }
+diff --git a/src/execve/execve.h b/src/execve/execve.h
+index 11eca10..98b8d03 100644
+--- a/src/execve/execve.h
++++ b/src/execve/execve.h
+@@ -49,6 +49,7 @@ typedef struct load_info {
+ char *raw_path;
+ Mapping *mappings;
+ ElfHeader elf_header;
++ bool needs_executable_stack;
+
+ struct load_info *interp;
+ } LoadInfo;
+diff --git a/src/execve/exit.c b/src/execve/exit.c
+index e6eff44..36cc51f 100644
+--- a/src/execve/exit.c
++++ b/src/execve/exit.c
+@@ -174,6 +174,9 @@ static void *transcript_mappings(void *cursor, const Mapping *mappings)
+ static int transfer_load_script(Tracee *tracee)
+ {
+ const word_t stack_pointer = peek_reg(tracee, CURRENT, STACK_POINTER);
++ static word_t page_size = 0;
++ static word_t page_mask = 0;
++
+ word_t entry_point;
+
+ size_t script_size;
+@@ -190,10 +193,22 @@ static int transfer_load_script(Tracee *tracee)
+ void *buffer;
+ size_t buffer_size;
+
++ bool needs_executable_stack;
+ LoadStatement *statement;
+ void *cursor;
+ int status;
+
++ if (page_size == 0) {
++ page_size = sysconf(_SC_PAGE_SIZE);
++ if ((int) page_size <= 0)
++ page_size = 0x1000;
++ page_mask = ~(page_size - 1);
++ }
++
++ needs_executable_stack = (tracee->load_info->needs_executable_stack
++ || ( tracee->load_info->interp != NULL
++ && tracee->load_info->interp->needs_executable_stack));
++
+ /* Strings addresses are required to generate the load script,
+ * for "open" actions. Since I want to generate it in one
+ * pass, these strings will be put right below the current
+@@ -208,7 +223,7 @@ static int transfer_load_script(Tracee *tracee)
+ : strlen(tracee->load_info->raw_path) + 1);
+
+ /* A padding will be appended at the end of the load script
+- * (a.k.a "strings area") to ensure this latter is aligned on
++ * (a.k.a "strings area") to ensure this latter is aligned to
+ * a word boundary, for sake of performance. */
+ padding_size = (stack_pointer - string1_size - string2_size - string3_size)
+ % sizeof_word(tracee);
+@@ -229,6 +244,7 @@ static int transfer_load_script(Tracee *tracee)
+ : LOAD_STATEMENT_SIZE(*statement, open)
+ + (LOAD_STATEMENT_SIZE(*statement, mmap)
+ * talloc_array_length(tracee->load_info->interp->mappings)))
++ + (needs_executable_stack ? LOAD_STATEMENT_SIZE(*statement, make_stack_exec) : 0)
+ + LOAD_STATEMENT_SIZE(*statement, start);
+
+ /* Allocate enough room for both the load script and the
+@@ -266,6 +282,16 @@ static int transfer_load_script(Tracee *tracee)
+ else
+ entry_point = ELF_FIELD(tracee->load_info->elf_header, entry);
+
++ if (needs_executable_stack) {
++ /* Load script statement: stack_exec. */
++ statement = cursor;
++
++ statement->action = LOAD_ACTION_MAKE_STACK_EXEC;
++ statement->make_stack_exec.start = stack_pointer & page_mask;
++
++ cursor += LOAD_STATEMENT_SIZE(*statement, make_stack_exec);
++ }
++
+ /* Load script statement: start. */
+ statement = cursor;
+
+@@ -352,7 +378,7 @@ static int transfer_load_script(Tracee *tracee)
+ * | mmap file |
+ * +------------+
+ * | open |
+- * +------------+ <- stack pointer, sysarg1 (word aligned)
++ * +------------+ <- stack pointer, userarg1 (word aligned)
+ */
+
+ /* Remember we are in the sysexit stage, so be sure the
+diff --git a/src/loader/assembly-arm.h b/src/loader/assembly-arm.h
+index ee5bb85..59a7fe0 100644
+--- a/src/loader/assembly-arm.h
++++ b/src/loader/assembly-arm.h
+@@ -89,4 +89,5 @@
+ #define EXECVE 11
+ #define EXIT 1
+ #define PRCTL 172
++#define MPROTECT 125
+
+diff --git a/src/loader/assembly-x86.h b/src/loader/assembly-x86.h
+index c83b3ef..4045144 100644
+--- a/src/loader/assembly-x86.h
++++ b/src/loader/assembly-x86.h
+@@ -65,3 +65,4 @@ extern word_t syscall_1(word_t number, word_t arg1);
+ #define EXECVE 11
+ #define EXIT 1
+ #define PRCTL 172
++#define MPROTECT 125
+diff --git a/src/loader/assembly-x86_64.h b/src/loader/assembly-x86_64.h
+index c581208..6f431be 100644
+--- a/src/loader/assembly-x86_64.h
++++ b/src/loader/assembly-x86_64.h
+@@ -93,3 +93,4 @@
+ #define EXECVE 59
+ #define EXIT 60
+ #define PRCTL 157
++#define MPROTECT 10
+diff --git a/src/loader/loader.c b/src/loader/loader.c
+index 5b31b02..9c2037b 100644
+--- a/src/loader/loader.c
++++ b/src/loader/loader.c
+@@ -171,6 +171,14 @@ void _start(void *cursor)
+ cursor += LOAD_STATEMENT_SIZE(*stmt, mmap);
+ break;
+
++ case LOAD_ACTION_MAKE_STACK_EXEC:
++ SYSCALL(MPROTECT, 3,
++ stmt->make_stack_exec.start, 1,
++ PROT_READ | PROT_WRITE | PROT_EXEC | PROT_GROWSDOWN);
++
++ cursor += LOAD_STATEMENT_SIZE(*stmt, make_stack_exec);
++ break;
++
+ case LOAD_ACTION_START_TRACED:
+ traced = true;
+ /* Fall through. */
+diff --git a/src/loader/script.h b/src/loader/script.h
+index bb48af5..6ae7621 100644
+--- a/src/loader/script.h
++++ b/src/loader/script.h
+@@ -42,6 +42,10 @@ struct load_statement {
+ word_t clear_length;
+ } mmap;
+
++ struct {
++ word_t start;
++ } make_stack_exec;
++
+ struct {
+ word_t stack_pointer;
+ word_t entry_point;
+@@ -67,7 +71,8 @@ typedef struct load_statement LoadStatement;
+ #define LOAD_ACTION_OPEN 1
+ #define LOAD_ACTION_MMAP_FILE 2
+ #define LOAD_ACTION_MMAP_ANON 3
+-#define LOAD_ACTION_START_TRACED 4
+-#define LOAD_ACTION_START 5
++#define LOAD_ACTION_MAKE_STACK_EXEC 4
++#define LOAD_ACTION_START_TRACED 5
++#define LOAD_ACTION_START 6
+
+ #endif /* SCRIPT */
+
+commit d649854ddb66779950954aac99d960379c631a71
+Author: Nicolas Cornu <ncornu@aldebaran.com>
+Date: Wed Jul 29 14:52:57 2015 +0200
+
+ Fix use of size
+
+diff --git a/src/execve/enter.c b/src/execve/enter.c
+index 8f22d9c..4c163a1 100644
+--- a/src/execve/enter.c
++++ b/src/execve/enter.c
+@@ -454,10 +454,10 @@ static int expand_runner(Tracee* tracee, char host_path[PATH_MAX], char user_pat
+ }
+
+ extern unsigned char _binary_loader_exe_start;
+-extern unsigned char _binary_loader_exe_size;
++extern unsigned char _binary_loader_exe_end;
+
+ extern unsigned char WEAK _binary_loader_m32_exe_start;
+-extern unsigned char WEAK _binary_loader_m32_exe_size;
++extern unsigned char WEAK _binary_loader_m32_exe_end;
+
+ /**
+ * Extract the built-in loader. This function returns NULL if an
+@@ -483,11 +483,11 @@ static char *extract_loader(const Tracee *tracee, bool wants_32bit_version)
+
+ if (wants_32bit_version) {
+ start = (void *) &_binary_loader_m32_exe_start;
+- size = (size_t) &_binary_loader_m32_exe_size;
++ size = (size_t)(&_binary_loader_m32_exe_end-&_binary_loader_m32_exe_start);
+ }
+ else {
+ start = (void *) &_binary_loader_exe_start;
+- size = (size_t) &_binary_loader_exe_size;
++ size = (size_t) (&_binary_loader_exe_end-&_binary_loader_exe_start);
+ }
+
+ status2 = write(fd, start, size);
diff --git a/sys-apps/proot/files/proot-5.1.0-makefile.patch b/sys-apps/proot/files/proot-5.1.0-makefile.patch
new file mode 100644
index 000000000000..414cb29010cb
--- /dev/null
+++ b/sys-apps/proot/files/proot-5.1.0-makefile.patch
@@ -0,0 +1,22 @@
+--- a/src/GNUmakefile 2018-08-01 16:30:00.957743804 +0300
++++ b/src/GNUmakefile 2018-08-01 16:30:34.876741798 +0300
+@@ -15,8 +15,8 @@
+ OBJDUMP = $(CROSS_COMPILE)objdump
+
+ CPPFLAGS += -D_FILE_OFFSET_BITS=64 -D_GNU_SOURCE -I. -I$(VPATH)
+-CFLAGS += -Wall -Wextra -O2
+-LDFLAGS += -ltalloc
++CFLAGS += -Wall -Wextra
++LDFLAGS += -ltalloc -Wl,-z,noexecstack
+
+ CARE_LDFLAGS = -larchive
+
+@@ -182,7 +182,7 @@
+ $(eval $(call define_from_arch.h,$1,LOADER_ADDRESS))
+
+ LOADER_CFLAGS$1 += -fPIC -ffreestanding $(LOADER_ARCH_CFLAGS$1)
+-LOADER_LDFLAGS$1 += -static -nostdlib -Wl$(BUILD_ID_NONE),-Ttext=$(LOADER_ADDRESS$1)
++LOADER_LDFLAGS$1 += -static -nostdlib -Wl$(BUILD_ID_NONE),-Ttext=$(LOADER_ADDRESS$1),-z,noexecstack
+
+ loader/loader$1.o: loader/loader.c
+ @mkdir -p $$(dir $$@)