/* $NetBSD: osf1_exec_ecoff.c,v 1.24 2012/02/03 20:11:54 matt Exp $ */ /* * Copyright (c) 1999 Christopher G. Demetriou. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Christopher G. Demetriou * for the NetBSD Project. * 4. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include __KERNEL_RCSID(0, "$NetBSD: osf1_exec_ecoff.c,v 1.24 2012/02/03 20:11:54 matt Exp $"); #include #include #include #include #include #include #include #include #include #include #include #include struct osf1_exec_emul_arg { int flags; #define OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER 0x01 char exec_name[MAXPATHLEN+1]; char loader_name[MAXPATHLEN+1]; }; static int osf1_exec_ecoff_dynamic(struct lwp *l, struct exec_package *epp); static void osf1_free_emul_arg(void *); int osf1_exec_ecoff_probe(struct lwp *l, struct exec_package *epp) { struct ecoff_exechdr *execp = (struct ecoff_exechdr *)epp->ep_hdr; struct osf1_exec_emul_arg *emul_arg; int error; /* check if the binary is osf1 ecoff */ if (execp->f.f_magic != ECOFF_MAGIC_ALPHA) return ENOEXEC; /* set up the exec package emul arg as appropriate */ emul_arg = kmem_alloc(sizeof(*emul_arg), KM_SLEEP); epp->ep_emul_arg = emul_arg; epp->ep_emul_arg_free = osf1_free_emul_arg; emul_arg->flags = 0; /* this cannot overflow because both are size PATH_MAX */ strcpy(emul_arg->exec_name, epp->ep_kname); /* do any special object file handling */ switch (execp->f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) { case ECOFF_OBJECT_TYPE_SHARABLE: /* can't exec a shared library! */ #if 0 uprintf("can't execute OSF/1 shared libraries\n"); #endif error = ENOEXEC; break; case ECOFF_OBJECT_TYPE_CALL_SHARED: error = osf1_exec_ecoff_dynamic(l, epp); break; default: /* just let the normal ECOFF handlers deal with it. */ error = 0; break; } if (error) { exec_free_emul_arg(epp); kill_vmcmds(&epp->ep_vmcmds); /* if any */ } return (error); } /* * copy arguments onto the stack in the normal way, then copy out * any ELF-like AUX entries used by the dynamic loading scheme. */ int osf1_copyargs(struct lwp *l, struct exec_package *pack, struct ps_strings *arginfo, char **stackp, void *argp) { struct osf1_exec_emul_arg *emul_arg = pack->ep_emul_arg; struct osf1_auxv ai[OSF1_MAX_AUX_ENTRIES], *a; char *prognameloc, *loadernameloc; size_t len; int error; if ((error = copyargs(l, pack, arginfo, stackp, argp)) != 0) goto out; a = ai; memset(ai, 0, sizeof ai); prognameloc = *stackp + sizeof ai; if ((error = copyoutstr(emul_arg->exec_name, prognameloc, MAXPATHLEN + 1, NULL)) != 0) goto out; a->a_type = OSF1_AT_EXEC_FILENAME; a->a_un.a_ptr = prognameloc; a++; /* * if there's a loader, push additional auxv entries on the stack. */ if (emul_arg->flags & OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER) { loadernameloc = prognameloc + MAXPATHLEN + 1; if ((error = copyoutstr(emul_arg->loader_name, loadernameloc, MAXPATHLEN + 1, NULL)) != 0) goto out; a->a_type = OSF1_AT_EXEC_LOADER_FILENAME; a->a_un.a_ptr = loadernameloc; a++; a->a_type = OSF1_AT_EXEC_LOADER_FLAGS; a->a_un.a_val = 0; if (pack->ep_vap->va_mode & S_ISUID) a->a_un.a_val |= OSF1_LDR_EXEC_SETUID_F; if (pack->ep_vap->va_mode & S_ISGID) a->a_un.a_val |= OSF1_LDR_EXEC_SETGID_F; if (l->l_proc->p_slflag & PSL_TRACED) a->a_un.a_val |= OSF1_LDR_EXEC_PTRACE_F; a++; } a->a_type = OSF1_AT_NULL; a->a_un.a_val = 0; a++; len = (a - ai) * sizeof(struct osf1_auxv); if ((error = copyout(ai, *stackp, len)) != 0) goto out; *stackp += len; out: exec_free_emul_arg(pack); return error; } static int osf1_exec_ecoff_dynamic(struct lwp *l, struct exec_package *epp) { struct osf1_exec_emul_arg *emul_arg = epp->ep_emul_arg; struct ecoff_exechdr ldr_exechdr; struct vnode *ldr_vp; size_t resid; int error; strncpy(emul_arg->loader_name, OSF1_LDR_EXEC_DEFAULT_LOADER, MAXPATHLEN + 1); /* * locate the loader * includes /emul/osf1 if appropriate */ error = emul_find_interp(LIST_FIRST(&l->l_proc->p_lwps), epp, emul_arg->loader_name); if (error) return error; emul_arg->flags |= OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER; #if 0 uprintf("loader is %s\n", emul_arg->loader_name); #endif /* * open the loader, see if it's an ECOFF executable, * make sure the object type is amenable, then arrange to * load it up. */ ldr_vp = epp->ep_interp; epp->ep_interp = NULL; vn_lock(ldr_vp, LK_EXCLUSIVE | LK_RETRY); /* * Basic access checks. Reject if: * not a regular file * exec not allowed on binary * exec not allowed on mount point */ if (ldr_vp->v_type != VREG) { error = EACCES; goto badunlock; } if ((error = VOP_ACCESS(ldr_vp, VEXEC, l->l_cred)) != 0) goto badunlock; if (ldr_vp->v_mount->mnt_flag & MNT_NOEXEC) { error = EACCES; goto badunlock; } /* * If loader's mount point disallows set-id execution, * disable set-id. */ if (ldr_vp->v_mount->mnt_flag & MNT_NOSUID) epp->ep_vap->va_mode &= ~(S_ISUID | S_ISGID); VOP_UNLOCK(ldr_vp); /* * read the header, and make sure we got all of it. */ if ((error = vn_rdwr(UIO_READ, ldr_vp, (void *)&ldr_exechdr, sizeof ldr_exechdr, 0, UIO_SYSSPACE, 0, l->l_cred, &resid, NULL)) != 0) goto bad; if (resid != 0) { error = ENOEXEC; goto bad; } /* * Check the magic. We expect it to be the native Alpha ECOFF * (Digital UNIX) magic number. Also make sure it's not a shared * lib or dynamically linked executable. */ if (ldr_exechdr.f.f_magic != ECOFF_MAGIC_ALPHA) { error = ENOEXEC; goto bad; } switch (ldr_exechdr.f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) { case ECOFF_OBJECT_TYPE_SHARABLE: case ECOFF_OBJECT_TYPE_CALL_SHARED: /* can't exec shared lib or dynamically linked executable. */ error = ENOEXEC; goto bad; } switch (ldr_exechdr.a.magic) { case ECOFF_OMAGIC: error = exec_ecoff_prep_omagic(l, epp, &ldr_exechdr, ldr_vp); break; case ECOFF_NMAGIC: error = exec_ecoff_prep_nmagic(l, epp, &ldr_exechdr, ldr_vp); break; case ECOFF_ZMAGIC: error = exec_ecoff_prep_zmagic(l, epp, &ldr_exechdr, ldr_vp); break; default: error = ENOEXEC; } if (error) goto bad; /* finally, set up the stack. */ error = (*epp->ep_esch->es_setup_stack)(l, epp); if (error) goto bad; vrele(ldr_vp); return (0); badunlock: VOP_UNLOCK(ldr_vp); bad: vrele(ldr_vp); return (error); } void osf1_free_emul_arg(void *arg) { struct osf1_exec_emul_arg *emul_arg = arg; KASSERT(emul_arg != NULL); kmem_free(emul_arg, sizeof(*emul_arg)); }