Date: Tue, 22 Jun 1999 10:26:10 -0400 (EDT) From: "Brian F. Feldman" <green@unixhelp.org> To: Kris Kennaway <kkennawa@physics.adelaide.edu.au> Cc: hackers@freebsd.org Subject: Re: cvs commit: src/sys/kern imgact_gzip.c Message-ID: <Pine.BSF.4.10.9906221023570.59616-100000@janus.syracuse.net> In-Reply-To: <Pine.OSF.4.10.9906222318080.28183-200000@bragg>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 22 Jun 1999, Kris Kennaway wrote:
> On Tue, 22 Jun 1999, Brian F. Feldman wrote:
>
> > Date: Tue, 22 Jun 1999 01:08:04 -0400 (EDT)
> > From: Brian F. Feldman <green@unixhelp.org>
> > To: Kris Kennaway <kkennawa@physics.adelaide.edu.au>
> > Cc: Peter Wemm <peter@netplex.com.au>, Jean-Marc Zucconi <jmz@freebsd.org>,
> hoek@freebsd.org, cvs-committers@freebsd.org, cvs-all@freebsd.org
> > Subject: Re: cvs commit: src/sys/kern imgact_gzip.c
> >
> > On Tue, 22 Jun 1999, Kris Kennaway wrote:
> >
> > > On Tue, 22 Jun 1999, Peter Wemm wrote:
> > >
> > > > Ahh yes, I forgot that / was read-write for MFS boots. However:
> > > >
> > > > #!/bin/sh
> > > > skip=18
> > > > if /usr/bin/tail +$skip $0 | gzip -cd > /tmp/gztmp$$; then
> > > > chmod 700 /tmp/gztmp$$
> > > > prog="`echo $0 | sed 's|^.*/||'`"
> > > > if /bin/ln /tmp/gztmp$$ "/tmp/$prog" 2>/dev/null; then
> > > > trap '/bin/rm -f /tmp/gztmp$$ "/tmp/$prog"; exit $res' 0
> > > > (/bin/sleep 5; /bin/rm -f /tmp/gztmp$$ "/tmp/$prog") 2>/dev/null &
> > > > /tmp/"$prog" ${1+"$@"}; res=$?
> > > > else
> > > > trap '/bin/rm -f /tmp/gztmp$$; exit $res' 0
> > > > (/bin/sleep 5; /bin/rm -f /tmp/gztmp$$) 2>/dev/null &
> > > > /tmp/gztmp$$ ${1+"$@"}; res=$?
> > > > fi
> > > > else
> > > > echo Cannot decompress $0; exit 1
> > > > fi; exit $res
> > >
> > > This is the unpatched (insecure) version of gzexe (all the /tmp/gztmp$$'s),
> > > but it's functionally the same.
> > >
> > > > Now, if tail, sh, gzip, chmod, ln, sleep, rm, etc are all in the gzexe'd
> > > > crunched linked binary, how is it supposed to decompress itself? "sh" itself
> > > > is part of the crunched binary, so what is going to decode sh when sh itself
> > > > is a shell script?
> > >
> > > Yes, that seems to be a problem - gzexe depends on those executables. However
> > > it shouldn't be too hard to recode this decompressor in C to perform the same
> > > job without any external dependencies. The question is whether that would be
> > > easier than fixing the kernel to handle gzipped ELF binaries transparently -
> > > almost certainly it would be.
> >
> > How's what I attached?
>
> [Context left in for cross-post to hackers]
>
> Hmm..I don't have a deflate on my system. This should be linked static as
> well, otherwise you need the runtime linker + libraries, and that has a 69k
> overhead (when stripped). Possibly this could be optimized further..I don't
> know if this is small enough to be useful however.
It's a proof of concept, it didn't need to be static. I don't have a program
to do deflate either. What I know is that you said it would be hard, but
it was not very hard to make a framework to do what gzexe does in C.
>
> Mike's suggestion of a gzipped MFS image is probably best for things like boot
> floppies.
>
> Kris
>
> > Brian Fundakowski Feldman _ __ ___ ____ ___ ___ ___
> > green@FreeBSD.org _ __ ___ | _ ) __| \
> > FreeBSD: The Power to Serve! _ __ | _ \._ \ |) |
> > http://www.FreeBSD.org/ _ |___/___/___/
> >
>
> -----
> "Never criticize anybody until you have walked a mile in their shoes,
> because by that time you will be a mile away and have their shoes."
> -- Unknown
>
Brian Fundakowski Feldman _ __ ___ ____ ___ ___ ___
green@FreeBSD.org _ __ ___ | _ ) __| \
FreeBSD: The Power to Serve! _ __ | _ \._ \ |) |
http://www.FreeBSD.org/ _ |___/___/___/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9906221023570.59616-100000>
