2009-07-12 20:43:59 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* binfmt/binfmt_exec.c
|
|
|
|
*
|
2021-02-03 14:47:23 +01:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
2021-02-03 14:47:23 +01:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
2021-02-03 14:47:23 +01:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <debug.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
2013-01-17 19:32:13 +01:00
|
|
|
#include <nuttx/kmalloc.h>
|
2018-08-05 16:09:54 +02:00
|
|
|
#include <nuttx/sched.h>
|
2012-10-24 22:19:44 +02:00
|
|
|
#include <nuttx/binfmt/binfmt.h>
|
2009-07-12 20:43:59 +02:00
|
|
|
|
2015-11-14 14:29:47 +01:00
|
|
|
#include "binfmt.h"
|
2009-07-12 20:43:59 +02:00
|
|
|
|
|
|
|
#ifndef CONFIG_BINFMT_DISABLE
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2020-02-20 13:16:32 +01:00
|
|
|
* Name: exec_spawn
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2020-02-20 13:16:32 +01:00
|
|
|
* exec() configurable version, delivery the spawn attribute if this
|
|
|
|
* process has special customization.
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
2017-10-03 15:52:05 +02:00
|
|
|
* Input Parameters:
|
|
|
|
* filename - The path to the program to be executed. If
|
2021-08-01 09:27:08 +02:00
|
|
|
* CONFIG_LIBC_ENVPATH is defined in the configuration, then
|
2017-10-03 15:52:05 +02:00
|
|
|
* this may be a relative path from the current working
|
|
|
|
* directory. Otherwise, path must be the absolute path to the
|
|
|
|
* program.
|
|
|
|
* argv - A pointer to an array of string arguments. The end of the
|
|
|
|
* array is indicated with a NULL entry.
|
2022-04-04 12:11:06 +02:00
|
|
|
* envp - A pointer to an array of environment strings. Terminated with
|
|
|
|
* a NULL entry.
|
2017-10-03 15:52:05 +02:00
|
|
|
* exports - The address of the start of the caller-provided symbol
|
|
|
|
* table. This symbol table contains the addresses of symbols
|
|
|
|
* exported by the caller and made available for linking the
|
|
|
|
* module into the system.
|
|
|
|
* nexports - The number of symbols in the exports table.
|
2020-02-20 13:16:32 +01:00
|
|
|
* attr - The spawn attributes.
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
2013-01-17 15:43:55 +01:00
|
|
|
* It returns the PID of the exec'ed module. On failure, it returns
|
2020-05-03 13:33:42 +02:00
|
|
|
* the negative errno value appropriately.
|
2009-07-12 20:43:59 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-02-20 13:16:32 +01:00
|
|
|
int exec_spawn(FAR const char *filename, FAR char * const *argv,
|
2022-04-04 12:11:06 +02:00
|
|
|
FAR char * const *envp, FAR const struct symtab_s *exports,
|
|
|
|
int nexports, FAR const posix_spawnattr_t *attr)
|
2009-07-12 20:43:59 +02:00
|
|
|
{
|
2013-01-17 15:43:55 +01:00
|
|
|
FAR struct binary_s *bin;
|
2013-01-17 19:32:13 +01:00
|
|
|
int pid;
|
2013-01-17 15:43:55 +01:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Allocate the load information */
|
|
|
|
|
2014-09-01 01:34:44 +02:00
|
|
|
bin = (FAR struct binary_s *)kmm_zalloc(sizeof(struct binary_s));
|
2013-01-17 15:43:55 +01:00
|
|
|
if (!bin)
|
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
berr("ERROR: Failed to allocate binary_s\n");
|
2020-05-03 13:33:42 +02:00
|
|
|
ret = -ENOMEM;
|
2014-09-07 20:09:30 +02:00
|
|
|
goto errout;
|
2013-01-17 15:43:55 +01:00
|
|
|
}
|
|
|
|
|
2014-09-14 22:10:23 +02:00
|
|
|
/* Load the module into memory */
|
|
|
|
|
2021-05-24 11:12:06 +02:00
|
|
|
ret = load_module(bin, filename, exports, nexports);
|
2013-01-17 15:43:55 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2020-05-03 13:33:42 +02:00
|
|
|
berr("ERROR: Failed to load program '%s': %d\n", filename, ret);
|
2021-05-24 09:06:29 +02:00
|
|
|
goto errout_with_bin;
|
2013-01-17 15:43:55 +01:00
|
|
|
}
|
|
|
|
|
2020-02-20 13:16:32 +01:00
|
|
|
/* Update the spawn attribute */
|
|
|
|
|
|
|
|
if (attr)
|
|
|
|
{
|
|
|
|
if (attr->priority > 0)
|
|
|
|
{
|
|
|
|
bin->priority = attr->priority;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (attr->stacksize > 0)
|
|
|
|
{
|
|
|
|
bin->stacksize = attr->stacksize;
|
|
|
|
}
|
2022-10-19 21:27:21 +02:00
|
|
|
|
|
|
|
#ifndef CONFIG_BUILD_KERNEL
|
|
|
|
if (attr->stackaddr != NULL)
|
|
|
|
{
|
|
|
|
bin->stackaddr = attr->stackaddr;
|
|
|
|
}
|
|
|
|
#endif
|
2020-02-20 13:16:32 +01:00
|
|
|
}
|
|
|
|
|
2013-01-17 15:43:55 +01:00
|
|
|
/* Disable pre-emption so that the executed module does
|
|
|
|
* not return until we get a chance to connect the on_exit
|
|
|
|
* handler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
sched_lock();
|
|
|
|
|
|
|
|
/* Then start the module */
|
|
|
|
|
2022-04-04 12:11:06 +02:00
|
|
|
pid = exec_module(bin, filename, argv, envp);
|
2013-01-17 19:32:13 +01:00
|
|
|
if (pid < 0)
|
2013-01-17 15:43:55 +01:00
|
|
|
{
|
2020-05-03 13:33:42 +02:00
|
|
|
ret = pid;
|
2018-08-05 16:09:54 +02:00
|
|
|
berr("ERROR: Failed to execute program '%s': %d\n",
|
2020-05-03 13:33:42 +02:00
|
|
|
filename, ret);
|
2014-09-07 20:09:30 +02:00
|
|
|
goto errout_with_lock;
|
2013-01-17 15:43:55 +01:00
|
|
|
}
|
|
|
|
|
2018-08-05 16:09:54 +02:00
|
|
|
#ifdef CONFIG_BINFMT_LOADABLE
|
2013-01-17 15:43:55 +01:00
|
|
|
/* Set up to unload the module (and free the binary_s structure)
|
|
|
|
* when the task exists.
|
|
|
|
*/
|
|
|
|
|
2018-08-05 16:09:54 +02:00
|
|
|
ret = group_exitinfo(pid, bin);
|
2013-01-17 15:43:55 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2017-10-02 23:30:55 +02:00
|
|
|
berr("ERROR: Failed to schedule unload '%s': %d\n", filename, ret);
|
2013-01-17 15:43:55 +01:00
|
|
|
}
|
2018-08-05 16:09:54 +02:00
|
|
|
|
2018-07-26 15:40:28 +02:00
|
|
|
#else
|
|
|
|
/* Free the binary_s structure here */
|
|
|
|
|
|
|
|
kmm_free(bin);
|
|
|
|
|
|
|
|
/* TODO: How does the module get unloaded in this case? */
|
2020-01-11 17:10:49 +01:00
|
|
|
|
2018-07-26 15:40:28 +02:00
|
|
|
#endif
|
2013-01-17 15:43:55 +01:00
|
|
|
|
|
|
|
sched_unlock();
|
2013-01-17 19:32:13 +01:00
|
|
|
return pid;
|
2014-09-07 20:09:30 +02:00
|
|
|
|
|
|
|
errout_with_lock:
|
|
|
|
sched_unlock();
|
2020-01-02 17:49:34 +01:00
|
|
|
unload_module(bin);
|
2014-09-07 20:09:30 +02:00
|
|
|
errout_with_bin:
|
|
|
|
kmm_free(bin);
|
|
|
|
errout:
|
2020-05-03 13:33:42 +02:00
|
|
|
return ret;
|
2009-07-12 20:43:59 +02:00
|
|
|
}
|
|
|
|
|
2020-02-20 13:16:32 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: exec
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This is a convenience function that wraps load_ and exec_module into
|
|
|
|
* one call. If CONFIG_BINFMT_LOADABLE is defined, this function will
|
|
|
|
* schedule to unload the module when task exits.
|
|
|
|
*
|
|
|
|
* This non-standard, NuttX function is similar to execv() and
|
|
|
|
* posix_spawn() but differs in the following ways;
|
|
|
|
*
|
|
|
|
* - Unlike execv() and posix_spawn() this function accepts symbol table
|
|
|
|
* information as input parameters. This means that the symbol table
|
|
|
|
* used to link the application prior to execution is provided by the
|
|
|
|
* caller, not by the system.
|
|
|
|
* - Unlike execv(), this function always returns.
|
|
|
|
*
|
|
|
|
* This non-standard interface is included as a official NuttX API only
|
|
|
|
* because it is needed in certain build modes: exec() is probably the
|
|
|
|
* only way to load programs in the PROTECTED mode. Other file execution
|
|
|
|
* APIs rely on a symbol table provided by the OS. In the PROTECTED build
|
|
|
|
* mode, the OS cannot provide any meaningful symbolic information for
|
|
|
|
* execution of code in the user-space blob so that is the exec() function
|
|
|
|
* is really needed in that build case
|
|
|
|
*
|
|
|
|
* The interface is available in the FLAT build mode although it is not
|
|
|
|
* really necessary in that case. It is currently used by some example
|
|
|
|
* code under the apps/ that that generate their own symbol tables for
|
|
|
|
* linking test programs. So although it is not necessary, it can still
|
|
|
|
* be useful.
|
|
|
|
*
|
|
|
|
* The interface would be completely useless and will not be supported in
|
|
|
|
* in the KERNEL build mode where the contrary is true: An application
|
|
|
|
* process cannot provide any meaningful symbolic information for use in
|
|
|
|
* linking a different process.
|
|
|
|
*
|
|
|
|
* NOTE: This function is flawed and useless without CONFIG_BINFMT_LOADABLE
|
|
|
|
* because without that features there is then no mechanism to unload the
|
|
|
|
* module once it exits.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* filename - The path to the program to be executed. If
|
2021-08-01 09:27:08 +02:00
|
|
|
* CONFIG_LIBC_ENVPATH is defined in the configuration, then
|
2020-02-20 13:16:32 +01:00
|
|
|
* this may be a relative path from the current working
|
|
|
|
* directory. Otherwise, path must be the absolute path to the
|
|
|
|
* program.
|
|
|
|
* argv - A pointer to an array of string arguments. The end of the
|
|
|
|
* array is indicated with a NULL entry.
|
2022-04-20 14:53:05 +02:00
|
|
|
* envp - An array of character pointers to null-terminated strings
|
|
|
|
* that provide the environment for the new process image.
|
|
|
|
* The environment array is terminated by a null pointer.
|
2020-02-20 13:16:32 +01:00
|
|
|
* exports - The address of the start of the caller-provided symbol
|
|
|
|
* table. This symbol table contains the addresses of symbols
|
|
|
|
* exported by the caller and made available for linking the
|
|
|
|
* module into the system.
|
|
|
|
* nexports - The number of symbols in the exports table.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* This is an end-user function, so it follows the normal convention:
|
|
|
|
* It returns the PID of the exec'ed module. On failure, it returns
|
|
|
|
* -1 (ERROR) and sets errno appropriately.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int exec(FAR const char *filename, FAR char * const *argv,
|
2022-04-20 14:53:05 +02:00
|
|
|
FAR char * const *envp, FAR const struct symtab_s *exports,
|
|
|
|
int nexports)
|
2020-02-20 13:16:32 +01:00
|
|
|
{
|
2020-05-03 13:33:42 +02:00
|
|
|
int ret;
|
|
|
|
|
2022-04-20 14:53:05 +02:00
|
|
|
ret = exec_spawn(filename, argv, envp, exports, nexports, NULL);
|
2020-05-03 13:33:42 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
set_errno(-ret);
|
|
|
|
ret = ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2020-02-20 13:16:32 +01:00
|
|
|
}
|
|
|
|
|
2014-07-11 19:58:46 +02:00
|
|
|
#endif /* !CONFIG_BINFMT_DISABLE */
|