Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/netbsd-1-4]: src/sys/compat/osf1 pull up rev(s) 1.1 (new file) from trun...
details: https://anonhg.NetBSD.org/src/rev/6e2f9a40af26
branches: netbsd-1-4
changeset: 468852:6e2f9a40af26
user: cgd <cgd%NetBSD.org@localhost>
date: Mon Jun 21 19:26:00 1999 +0000
description:
pull up rev(s) 1.1 (new file) from trunk. (cgd)
diffstat:
sys/compat/osf1/osf1_exec.c | 346 ++++++++++++++++++++++++++++++++++++++++++++
1 files changed, 346 insertions(+), 0 deletions(-)
diffs (truncated from 350 to 300 lines):
diff -r 0b55c494bd3d -r 6e2f9a40af26 sys/compat/osf1/osf1_exec.c
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/sys/compat/osf1/osf1_exec.c Mon Jun 21 19:26:00 1999 +0000
@@ -0,0 +1,346 @@
+/* $NetBSD: osf1_exec.c,v 1.10.4.2 1999/06/21 19:26:00 cgd Exp $ */
+
+/*
+ * Copyright (c) 1999 Christopher G. Demetriou. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ * must display the following acknowledgement:
+ * This product includes software developed by Christopher G. Demetriou
+ * for the NetBSD Project.
+ * 4. The name of the author may not be used to endorse or promote products
+ * derived from this software without specific prior written permission
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <sys/param.h>
+#include <sys/systm.h>
+#include <sys/kernel.h>
+#include <sys/proc.h>
+#include <sys/malloc.h>
+#include <sys/namei.h>
+#include <sys/vnode.h>
+#include <sys/mount.h>
+#include <sys/exec.h>
+#include <sys/exec_ecoff.h>
+#include <sys/signalvar.h>
+#include <sys/fcntl.h>
+#include <sys/stat.h>
+
+#include <compat/osf1/osf1.h>
+#include <compat/osf1/osf1_syscall.h>
+#include <compat/osf1/osf1_util.h>
+#include <compat/osf1/osf1_cvt.h>
+
+/* XXX BELONGS IN A 'PUBLIC' HEADER */
+int osf1_exec_ecoff_hook(struct proc *p, struct exec_package *epp);
+
+
+struct osf1_exec_emul_arg {
+ int flags;
+#define OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER 0x01
+
+ char exec_name[MAXPATHLEN+1];
+ char loader_name[MAXPATHLEN+1];
+};
+
+static void *osf1_copyargs(struct exec_package *pack,
+ struct ps_strings *arginfo, void *stack, void *argp);
+
+static int osf1_exec_ecoff_dynamic(struct proc *p, struct exec_package *epp);
+
+#define MAX_AUX_ENTRIES 4 /* max we'll ever push (right now) */
+
+extern struct sysent osf1_sysent[];
+extern char *osf1_syscallnames[];
+extern void cpu_exec_ecoff_setregs __P((struct proc *, struct exec_package *,
+ u_long));
+extern char osf1_sigcode[], osf1_esigcode[];
+
+struct emul emul_osf1 = {
+ "osf1",
+ (int *)osf1_errno_rxlist,
+ sendsig,
+ OSF1_SYS_syscall,
+ OSF1_SYS_MAXSYSCALL,
+ osf1_sysent,
+ osf1_syscallnames,
+ howmany(MAX_AUX_ENTRIES * sizeof (struct osf1_auxv) +
+ 2 * (MAXPATHLEN + 1), sizeof (char *)), /* exec & loader names */
+ osf1_copyargs,
+ cpu_exec_ecoff_setregs,
+ osf1_sigcode,
+ osf1_esigcode,
+};
+
+int
+osf1_exec_ecoff_hook(struct proc *p, struct exec_package *epp)
+{
+ struct ecoff_exechdr *execp = (struct ecoff_exechdr *)epp->ep_hdr;
+ struct osf1_exec_emul_arg *emul_arg;
+ int error;
+
+ /* if we're here and we're exec-able at all, we're an OSF/1 binary */
+ epp->ep_emul = &emul_osf1;
+
+ /* set up the exec package emul arg as appropriate */
+ emul_arg = malloc(sizeof *emul_arg, M_TEMP, M_WAITOK);
+ epp->ep_emul_arg = emul_arg;
+
+ emul_arg->flags = 0;
+ if (epp->ep_ndp->ni_segflg == UIO_SYSSPACE)
+ error = copystr(epp->ep_ndp->ni_dirp, emul_arg->exec_name,
+ MAXPATHLEN + 1, NULL);
+ else
+ error = copyinstr(epp->ep_ndp->ni_dirp, emul_arg->exec_name,
+ MAXPATHLEN + 1, NULL);
+#ifdef DIAGNOSTIC
+ if (error != 0)
+ panic("osf1_exec_ecoff_hook: copyinstr failed");
+#endif
+
+ /* do any special object file handling */
+ switch (execp->f.f_flags & ECOFF_FLAG_OBJECT_TYPE_MASK) {
+ case ECOFF_OBJECT_TYPE_SHARABLE:
+ /* can't exec a shared library! */
+#if 0
+ uprintf("can't execute OSF/1 shared libraries\n");
+#endif
+ error = ENOEXEC;
+ break;
+
+ case ECOFF_OBJECT_TYPE_CALL_SHARED:
+ error = osf1_exec_ecoff_dynamic(p, epp);
+ break;
+
+ default:
+ /* just let the normal ECOFF handlers deal with it. */
+ error = 0;
+ break;
+ }
+
+ if (error) {
+ free(epp->ep_emul_arg, M_TEMP);
+ epp->ep_emul_arg = NULL;
+ kill_vmcmds(&epp->ep_vmcmds); /* if any */
+ }
+
+ return (error);
+}
+
+/*
+ * copy arguments onto the stack in the normal way, then copy out
+ * any ELF-like AUX entries used by the dynamic loading scheme.
+ */
+static void *
+osf1_copyargs(pack, arginfo, stack, argp)
+ struct exec_package *pack;
+ struct ps_strings *arginfo;
+ void *stack;
+ void *argp;
+{
+ struct proc *p = curproc; /* XXX !!! */
+ struct osf1_exec_emul_arg *emul_arg = pack->ep_emul_arg;
+ struct osf1_auxv ai[MAX_AUX_ENTRIES], *a;
+ char *prognameloc, *loadernameloc;
+ size_t len;
+
+ stack = copyargs(pack, arginfo, stack, argp);
+ if (!stack)
+ goto bad;
+
+ a = ai;
+ memset(ai, 0, sizeof ai);
+
+ prognameloc = (char *)stack + sizeof ai;
+ if (copyoutstr(emul_arg->exec_name, prognameloc, MAXPATHLEN + 1, NULL))
+ goto bad;
+ a->a_type = OSF1_AT_EXEC_FILENAME;
+ a->a_un.a_ptr = prognameloc;
+ a++;
+
+ /*
+ * if there's a loader, push additional auxv entries on the stack.
+ */
+ if (emul_arg->flags & OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER) {
+
+ loadernameloc = prognameloc + MAXPATHLEN + 1;
+ if (copyoutstr(emul_arg->loader_name, loadernameloc,
+ MAXPATHLEN + 1, NULL))
+ goto bad;
+ a->a_type = OSF1_AT_EXEC_LOADER_FILENAME;
+ a->a_un.a_ptr = loadernameloc;
+ a++;
+
+ a->a_type = OSF1_AT_EXEC_LOADER_FLAGS;
+ a->a_un.a_val = 0;
+ if (pack->ep_vap->va_mode & S_ISUID)
+ a->a_un.a_val |= OSF1_LDR_EXEC_SETUID_F;
+ if (pack->ep_vap->va_mode & S_ISGID)
+ a->a_un.a_val |= OSF1_LDR_EXEC_SETGID_F;
+ if (p->p_flag & P_TRACED)
+ a->a_un.a_val |= OSF1_LDR_EXEC_PTRACE_F;
+ a++;
+ }
+
+ a->a_type = OSF1_AT_NULL;
+ a->a_un.a_val = 0;
+ a++;
+
+ len = (a - ai) * sizeof(struct osf1_auxv);
+ if (copyout(ai, stack, len))
+ goto bad;
+ stack = (caddr_t)stack + len;
+
+out:
+ free(pack->ep_emul_arg, M_TEMP);
+ pack->ep_emul_arg = NULL;
+ return stack;
+
+bad:
+ stack = NULL;
+ goto out;
+}
+
+static int
+osf1_exec_ecoff_dynamic(struct proc *p, struct exec_package *epp)
+{
+ struct osf1_exec_emul_arg *emul_arg = epp->ep_emul_arg;
+ struct ecoff_exechdr ldr_exechdr;
+ struct nameidata nd;
+ struct vnode *ldr_vp;
+ const char *pathbuf;
+ size_t resid;
+ int error;
+
+ /*
+ * locate the loader
+ */
+ error = emul_find(p, NULL, osf1_emul_path,
+ OSF1_LDR_EXEC_DEFAULT_LOADER, &pathbuf, 0);
+ /* includes /emul/osf1 if appropriate */
+ strncpy(emul_arg->loader_name, pathbuf, MAXPATHLEN + 1);
+ emul_arg->flags |= OSF1_EXEC_EMUL_FLAGS_HAVE_LOADER;
+ if (!error)
+ free((char *)pathbuf, M_TEMP);
+
+#if 0
+ uprintf("loader is %s\n", emul_arg->loader_name);
+#endif
+
+ /*
+ * open the loader, see if it's an ECOFF executable,
+ * make sure the object type is amenable, then arrange to
+ * load it up.
+ */
+ NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE,
+ emul_arg->loader_name, p);
+ if ((error = namei(&nd)) != 0)
+ goto bad_no_vp;
+ ldr_vp = nd.ni_vp;
+
+ /*
+ * Basic access checks. Reject if:
+ * not a regular file
+ * exec not allowed on binary
+ * exec not allowed on mount point
+ */
+ if (ldr_vp->v_type != VREG) {
+ error = EACCES;
+ goto badunlock;
+ }
+
+ if ((error = VOP_ACCESS(ldr_vp, VEXEC, p->p_ucred, p)) != 0)
+ goto badunlock;
+
+ if (ldr_vp->v_mount->mnt_flag & MNT_NOEXEC) {
+ error = EACCES;
+ goto badunlock;
+ }
+
+ /*
+ * If loader's mount point disallows set-id execution,
+ * disable set-id.
+ */
+ if (ldr_vp->v_mount->mnt_flag & MNT_NOSUID)
+ epp->ep_vap->va_mode &= ~(S_ISUID | S_ISGID);
+
+ VOP_UNLOCK(ldr_vp, 0);
+
+ /*
+ * read the header, and make sure we got all of it.
+ */
+ if ((error = vn_rdwr(UIO_READ, ldr_vp, (caddr_t)&ldr_exechdr,
+ sizeof ldr_exechdr, 0, UIO_SYSSPACE, 0, p->p_ucred,
+ &resid, p)) != 0)
+ goto bad;
+ if (resid != 0) {
+ error = ENOEXEC;
+ goto bad;
Home |
Main Index |
Thread Index |
Old Index