/* $OpenBSD: osf1_exec.c,v 1.5 2004/06/22 23:52:18 jfb Exp $ */ /* $NetBSD$ */ /* * Copyright (c) 1999 Christopher G. Demetriou. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Christopher G. Demetriou * for the NetBSD Project. * 4. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include extern int scdebug; extern char *osf1_syscallnames[]; struct osf1_exec_emul_arg { int flags; #define OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER 0x01 char exec_name[MAXPATHLEN+1]; char loader_name[MAXPATHLEN+1]; }; static void *osf1_copyargs(struct exec_package *pack, struct ps_strings *arginfo, void *stack, void *argp); int osf1_exec_ecoff_hook(struct proc *, struct exec_package *); static int osf1_exec_ecoff_dynamic(struct proc *, struct exec_package *); #define MAX_AUX_ENTRIES 4 /* max we'll ever push (right now) */ extern struct sysent osf1_sysent[]; extern void cpu_exec_ecoff_setregs(struct proc *, struct exec_package *, u_long, register_t *); extern char osf1_sigcode[], osf1_esigcode[]; struct emul emul_osf1 = { "osf1", NULL, sendsig, OSF1_SYS_syscall, OSF1_SYS_MAXSYSCALL, osf1_sysent, #ifdef SYSCALL_DEBUG osf1_syscallnames, #else NULL, #endif 0, osf1_copyargs, cpu_exec_ecoff_setregs, NULL, osf1_sigcode, osf1_esigcode, }; int osf1_exec_ecoff_hook(struct proc *p, struct exec_package *epp) { struct ecoff_exechdr *execp = (struct ecoff_exechdr *)epp->ep_hdr; struct osf1_exec_emul_arg *emul_arg; int error; /* if we're here and we're exec-able at all, we're an OSF/1 binary */ epp->ep_emul = &emul_osf1; /* set up the exec package emul arg as appropriate */ emul_arg = malloc(sizeof *emul_arg, M_TEMP, M_WAITOK); epp->ep_emul_arg = emul_arg; emul_arg->flags = 0; if (epp->ep_ndp->ni_segflg == UIO_SYSSPACE) error = copystr(epp->ep_ndp->ni_dirp, emul_arg->exec_name, MAXPATHLEN + 1, NULL); else error = copyinstr(epp->ep_ndp->ni_dirp, emul_arg->exec_name, MAXPATHLEN + 1, NULL); #ifdef DIAGNOSTIC if (error != 0) panic("osf1_exec_ecoff_hook: copyinstr failed"); #endif /* do any special object file handling */ switch (execp->f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) { case ECOFF_OBJECT_TYPE_SHARABLE: /* can't exec a shared library! */ uprintf("can't execute OSF/1 shared libraries\n"); error = ENOEXEC; break; case ECOFF_OBJECT_TYPE_CALL_SHARED: error = osf1_exec_ecoff_dynamic(p, epp); break; default: /* just let the normal ECOFF handlers deal with it. */ error = 0; break; } if (error) { free(epp->ep_emul_arg, M_TEMP); epp->ep_emul_arg = NULL; kill_vmcmds(&epp->ep_vmcmds); /* if any */ } return (error); } /* * copy arguments onto the stack in the normal way, then copy out * any ELF-like AUX entries used by the dynamic loading scheme. */ static void * osf1_copyargs(pack, arginfo, stack, argp) struct exec_package *pack; struct ps_strings *arginfo; void *stack; void *argp; { struct proc *p = curproc; /* XXX !!! */ struct osf1_exec_emul_arg *emul_arg = pack->ep_emul_arg; struct osf1_auxv ai[MAX_AUX_ENTRIES], *a; char *prognameloc, *loadernameloc; size_t len; stack = copyargs(pack, arginfo, stack, argp); if (!stack) goto bad; a = ai; memset(ai, 0, sizeof ai); prognameloc = (char *)stack + sizeof ai; if (copyoutstr(emul_arg->exec_name, prognameloc, MAXPATHLEN + 1, NULL)) goto bad; a->a_type = OSF1_AT_EXEC_FILENAME; a->a_un.a_ptr = prognameloc; a++; /* * if there's a loader, push additional auxv entries on the stack. */ if (emul_arg->flags & OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER) { loadernameloc = prognameloc + MAXPATHLEN + 1; if (copyoutstr(emul_arg->loader_name, loadernameloc, MAXPATHLEN + 1, NULL)) goto bad; a->a_type = OSF1_AT_EXEC_LOADER_FILENAME; a->a_un.a_ptr = loadernameloc; a++; a->a_type = OSF1_AT_EXEC_LOADER_FLAGS; a->a_un.a_val = 0; if (pack->ep_vap->va_mode & S_ISUID) a->a_un.a_val |= OSF1_LDR_EXEC_SETUID_F; if (pack->ep_vap->va_mode & S_ISGID) a->a_un.a_val |= OSF1_LDR_EXEC_SETGID_F; if (p->p_flag & P_TRACED) a->a_un.a_val |= OSF1_LDR_EXEC_PTRACE_F; a++; } a->a_type = OSF1_AT_NULL; a->a_un.a_val = 0; a++; len = (a - ai) * sizeof(struct osf1_auxv); if (copyout(ai, stack, len)) goto bad; stack = (caddr_t)stack + len; out: free(pack->ep_emul_arg, M_TEMP); pack->ep_emul_arg = NULL; return stack; bad: stack = NULL; goto out; } static int osf1_exec_ecoff_dynamic(struct proc *p, struct exec_package *epp) { struct osf1_exec_emul_arg *emul_arg = epp->ep_emul_arg; struct ecoff_exechdr ldr_exechdr; struct nameidata nd; struct vnode *ldr_vp; char *pathbuf; size_t resid; int error; /* * locate the loader */ error = emul_find(p, NULL, osf1_emul_path, OSF1_LDR_EXEC_DEFAULT_LOADER, &pathbuf, 0); /* includes /emul/osf1 if appropriate */ strlcpy(emul_arg->loader_name, pathbuf, sizeof(emul_arg->loader_name)); emul_arg->flags |= OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER; if (!error) free((char *)pathbuf, M_TEMP); uprintf("loader is %s\n", emul_arg->loader_name); /* * open the loader, see if it's an ECOFF executable, * make sure the object type is amenable, then arrange to * load it up. */ NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE, emul_arg->loader_name, p); if ((error = namei(&nd)) != 0) goto bad_no_vp; ldr_vp = nd.ni_vp; /* * Basic access checks. Reject if: * not a regular file * exec not allowed on binary * exec not allowed on mount point */ if (ldr_vp->v_type != VREG) { error = EACCES; goto badunlock; } if ((error = VOP_ACCESS(ldr_vp, VEXEC, p->p_ucred, p)) != 0) goto badunlock; if (ldr_vp->v_mount->mnt_flag & MNT_NOEXEC) { error = EACCES; goto badunlock; } /* * If loader's mount point disallows set-id execution, * disable set-id. */ if (ldr_vp->v_mount->mnt_flag & MNT_NOSUID) epp->ep_vap->va_mode &= ~(S_ISUID | S_ISGID); VOP_UNLOCK(ldr_vp, 0, p); /* * read the header, and make sure we got all of it. */ if ((error = vn_rdwr(UIO_READ, ldr_vp, (caddr_t)&ldr_exechdr, sizeof ldr_exechdr, 0, UIO_SYSSPACE, 0, p->p_ucred, &resid, p)) != 0) goto bad; if (resid != 0) { error = ENOEXEC; goto bad; } /* * Check the magic. We expect it to be the native Alpha ECOFF * (Digital UNIX) magic number. Also make sure it's not a shared * lib or dynamically linked executable. */ if (ldr_exechdr.f.f_magic != ECOFF_MAGIC_ALPHA) { error = ENOEXEC; goto bad; } switch (ldr_exechdr.f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) { case ECOFF_OBJECT_TYPE_SHARABLE: case ECOFF_OBJECT_TYPE_CALL_SHARED: /* can't exec shared lib or dynamically linked executable. */ error = ENOEXEC; goto bad; } switch (ldr_exechdr.a.magic) { case ECOFF_OMAGIC: error = exec_ecoff_prep_omagic(p, epp); break; case ECOFF_NMAGIC: error = exec_ecoff_prep_nmagic(p, epp); break; case ECOFF_ZMAGIC: error = exec_ecoff_prep_zmagic(p, epp); break; default: error = ENOEXEC; } if (error) goto bad; vrele(ldr_vp); return (0); badunlock: VOP_UNLOCK(ldr_vp, 0, p); bad: vrele(ldr_vp); bad_no_vp: return (error); }