NetBSD/sys/compat/osf1/osf1_exec.c

347 lines
9.3 KiB
C
Raw Normal View History

/* $NetBSD: osf1_exec.c,v 1.10 1999/05/28 04:39:14 cgd Exp $ */
/*
* Copyright (c) 1999 Christopher G. Demetriou. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by Christopher G. Demetriou
* for the NetBSD Project.
* 4. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/kernel.h>
#include <sys/proc.h>
#include <sys/malloc.h>
#include <sys/namei.h>
#include <sys/vnode.h>
#include <sys/mount.h>
#include <sys/exec.h>
#include <sys/exec_ecoff.h>
#include <sys/signalvar.h>
#include <sys/fcntl.h>
#include <sys/stat.h>
#include <compat/osf1/osf1.h>
#include <compat/osf1/osf1_syscall.h>
#include <compat/osf1/osf1_util.h>
#include <compat/osf1/osf1_cvt.h>
/* XXX BELONGS IN A 'PUBLIC' HEADER */
int osf1_exec_ecoff_hook(struct proc *p, struct exec_package *epp);
struct osf1_exec_emul_arg {
int flags;
#define OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER 0x01
char exec_name[MAXPATHLEN+1];
char loader_name[MAXPATHLEN+1];
};
static void *osf1_copyargs(struct exec_package *pack,
struct ps_strings *arginfo, void *stack, void *argp);
static int osf1_exec_ecoff_dynamic(struct proc *p, struct exec_package *epp);
#define MAX_AUX_ENTRIES 4 /* max we'll ever push (right now) */
extern struct sysent osf1_sysent[];
extern char *osf1_syscallnames[];
extern void cpu_exec_ecoff_setregs __P((struct proc *, struct exec_package *,
u_long));
1999-04-30 05:46:09 +04:00
extern char osf1_sigcode[], osf1_esigcode[];
struct emul emul_osf1 = {
"osf1",
(int *)osf1_errno_rxlist,
sendsig,
OSF1_SYS_syscall,
OSF1_SYS_MAXSYSCALL,
osf1_sysent,
osf1_syscallnames,
howmany(MAX_AUX_ENTRIES * sizeof (struct osf1_auxv) +
2 * (MAXPATHLEN + 1), sizeof (char *)), /* exec & loader names */
osf1_copyargs,
cpu_exec_ecoff_setregs,
1999-04-30 05:46:09 +04:00
osf1_sigcode,
osf1_esigcode,
};
int
osf1_exec_ecoff_hook(struct proc *p, struct exec_package *epp)
{
struct ecoff_exechdr *execp = (struct ecoff_exechdr *)epp->ep_hdr;
struct osf1_exec_emul_arg *emul_arg;
int error;
/* if we're here and we're exec-able at all, we're an OSF/1 binary */
epp->ep_emul = &emul_osf1;
/* set up the exec package emul arg as appropriate */
emul_arg = malloc(sizeof *emul_arg, M_TEMP, M_WAITOK);
epp->ep_emul_arg = emul_arg;
emul_arg->flags = 0;
if (epp->ep_ndp->ni_segflg == UIO_SYSSPACE)
error = copystr(epp->ep_ndp->ni_dirp, emul_arg->exec_name,
MAXPATHLEN + 1, NULL);
else
error = copyinstr(epp->ep_ndp->ni_dirp, emul_arg->exec_name,
MAXPATHLEN + 1, NULL);
#ifdef DIAGNOSTIC
if (error != 0)
panic("osf1_exec_ecoff_hook: copyinstr failed");
#endif
/* do any special object file handling */
switch (execp->f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) {
case ECOFF_OBJECT_TYPE_SHARABLE:
/* can't exec a shared library! */
#if 0
uprintf("can't execute OSF/1 shared libraries\n");
#endif
error = ENOEXEC;
break;
case ECOFF_OBJECT_TYPE_CALL_SHARED:
error = osf1_exec_ecoff_dynamic(p, epp);
break;
default:
/* just let the normal ECOFF handlers deal with it. */
error = 0;
break;
}
if (error) {
free(epp->ep_emul_arg, M_TEMP);
epp->ep_emul_arg = NULL;
kill_vmcmds(&epp->ep_vmcmds); /* if any */
}
return (error);
}
1999-05-05 05:51:31 +04:00
/*
* copy arguments onto the stack in the normal way, then copy out
* any ELF-like AUX entries used by the dynamic loading scheme.
*/
static void *
osf1_copyargs(pack, arginfo, stack, argp)
struct exec_package *pack;
struct ps_strings *arginfo;
void *stack;
void *argp;
{
struct proc *p = curproc; /* XXX !!! */
struct osf1_exec_emul_arg *emul_arg = pack->ep_emul_arg;
struct osf1_auxv ai[MAX_AUX_ENTRIES], *a;
char *prognameloc, *loadernameloc;
size_t len;
stack = copyargs(pack, arginfo, stack, argp);
if (!stack)
goto bad;
a = ai;
memset(ai, 0, sizeof ai);
prognameloc = (char *)stack + sizeof ai;
if (copyoutstr(emul_arg->exec_name, prognameloc, MAXPATHLEN + 1, NULL))
goto bad;
a->a_type = OSF1_AT_EXEC_FILENAME;
a->a_un.a_ptr = prognameloc;
a++;
/*
* if there's a loader, push additional auxv entries on the stack.
*/
if (emul_arg->flags & OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER) {
loadernameloc = prognameloc + MAXPATHLEN + 1;
if (copyoutstr(emul_arg->loader_name, loadernameloc,
MAXPATHLEN + 1, NULL))
goto bad;
a->a_type = OSF1_AT_EXEC_LOADER_FILENAME;
a->a_un.a_ptr = loadernameloc;
a++;
a->a_type = OSF1_AT_EXEC_LOADER_FLAGS;
a->a_un.a_val = 0;
if (pack->ep_vap->va_mode & S_ISUID)
a->a_un.a_val |= OSF1_LDR_EXEC_SETUID_F;
if (pack->ep_vap->va_mode & S_ISGID)
a->a_un.a_val |= OSF1_LDR_EXEC_SETGID_F;
if (p->p_flag & P_TRACED)
a->a_un.a_val |= OSF1_LDR_EXEC_PTRACE_F;
a++;
}
a->a_type = OSF1_AT_NULL;
a->a_un.a_val = 0;
a++;
len = (a - ai) * sizeof(struct osf1_auxv);
if (copyout(ai, stack, len))
goto bad;
stack = (caddr_t)stack + len;
out:
free(pack->ep_emul_arg, M_TEMP);
pack->ep_emul_arg = NULL;
return stack;
bad:
stack = NULL;
goto out;
}
static int
osf1_exec_ecoff_dynamic(struct proc *p, struct exec_package *epp)
{
struct osf1_exec_emul_arg *emul_arg = epp->ep_emul_arg;
struct ecoff_exechdr ldr_exechdr;
struct nameidata nd;
struct vnode *ldr_vp;
const char *pathbuf;
size_t resid;
int error;
/*
* locate the loader
*/
error = emul_find(p, NULL, osf1_emul_path,
OSF1_LDR_EXEC_DEFAULT_LOADER, &pathbuf, 0);
/* includes /emul/osf1 if appropriate */
strncpy(emul_arg->loader_name, pathbuf, MAXPATHLEN + 1);
emul_arg->flags |= OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER;
if (!error)
free((char *)pathbuf, M_TEMP);
#if 0
uprintf("loader is %s\n", emul_arg->loader_name);
#endif
/*
* open the loader, see if it's an ECOFF executable,
* make sure the object type is amenable, then arrange to
* load it up.
*/
NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE,
emul_arg->loader_name, p);
if ((error = namei(&nd)) != 0)
goto bad_no_vp;
ldr_vp = nd.ni_vp;
/*
* Basic access checks. Reject if:
* not a regular file
* exec not allowed on binary
* exec not allowed on mount point
*/
if (ldr_vp->v_type != VREG) {
error = EACCES;
goto badunlock;
}
if ((error = VOP_ACCESS(ldr_vp, VEXEC, p->p_ucred, p)) != 0)
goto badunlock;
if (ldr_vp->v_mount->mnt_flag & MNT_NOEXEC) {
error = EACCES;
goto badunlock;
}
/*
* If loader's mount point disallows set-id execution,
* disable set-id.
*/
if (ldr_vp->v_mount->mnt_flag & MNT_NOSUID)
epp->ep_vap->va_mode &= ~(S_ISUID | S_ISGID);
VOP_UNLOCK(ldr_vp, 0);
/*
* read the header, and make sure we got all of it.
*/
if ((error = vn_rdwr(UIO_READ, ldr_vp, (caddr_t)&ldr_exechdr,
sizeof ldr_exechdr, 0, UIO_SYSSPACE, 0, p->p_ucred,
&resid, p)) != 0)
goto bad;
if (resid != 0) {
error = ENOEXEC;
goto bad;
}
/*
* Check the magic. We expect it to be the native Alpha ECOFF
* (Digital UNIX) magic number. Also make sure it's not a shared
* lib or dynamically linked executable.
*/
if (ldr_exechdr.f.f_magic != ECOFF_MAGIC_ALPHA) {
error = ENOEXEC;
goto bad;
}
switch (ldr_exechdr.f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) {
case ECOFF_OBJECT_TYPE_SHARABLE:
case ECOFF_OBJECT_TYPE_CALL_SHARED:
/* can't exec shared lib or dynamically linked executable. */
error = ENOEXEC;
goto bad;
}
switch (ldr_exechdr.a.magic) {
case ECOFF_OMAGIC:
error = exec_ecoff_prep_omagic(p, epp, &ldr_exechdr, ldr_vp);
break;
case ECOFF_NMAGIC:
error = exec_ecoff_prep_nmagic(p, epp, &ldr_exechdr, ldr_vp);
break;
case ECOFF_ZMAGIC:
error = exec_ecoff_prep_zmagic(p, epp, &ldr_exechdr, ldr_vp);
break;
default:
error = ENOEXEC;
}
if (error)
goto bad;
/* finally, set up the stack. */
error = exec_ecoff_setup_stack(p, epp);
if (error)
goto bad;
vrele(ldr_vp);
return (0);
badunlock:
VOP_UNLOCK(ldr_vp, 0);
bad:
vrele(ldr_vp);
bad_no_vp:
return (error);
}