#include <cputypes.h>
#include <machine/reg.h>
#include <sys/param.h>
#include <sys/systm.h>
#include <sys/filedesc.h>
#include <sys/kernel.h>
#include <sys/proc.h>
#include <sys/user.h>
#include <sys/buf.h>
#include <sys/socketvar.h>
#include <sys/malloc.h>
#include <sys/namei.h>
#include <sys/mount.h>
#include <sys/vnode.h>
#include <sys/file.h>
#include <sys/stat.h>
#include <sys/uio.h>
#include <sys/acct.h>
#include <sys/exec.h>
#include <sys/kdebug.h>
#include <sys/signal.h>
#include <mach/vm_param.h>
#include <vm/vm_map.h>
#include <vm/vm_kern.h>
#include <kern/thread.h>
#include <kern/task.h>
#include <kern/ast.h>
#include <kern/mach_loader.h>
#include <mach-o/fat.h>
#include <mach-o/loader.h>
#include <machine/vmparam.h>
extern vm_map_t bsd_pageable_map;
#define ROUND_PTR(type, addr) \
(type *)( ( (unsigned)(addr) + 16 - 1) \
& ~(16 - 1) )
static int load_return_to_errno(load_return_t lrtn);
int execve(struct proc *p, struct execve_args *uap, register_t *retval);
int
execv(p, args, retval)
struct proc *p;
void *args;
int *retval;
{
((struct execve_args *)args)->envp = NULL;
return (execve(p, args, retval));
}
int
execve(p, uap, retval)
register struct proc *p;
register struct execve_args *uap;
register_t *retval;
{
register struct ucred *cred = p->p_ucred;
register struct filedesc *fdp = p->p_fd;
register nc;
register char *cp;
int na, ne, ucp, ap, cc;
unsigned len;
int indir;
char *sharg;
char *execnamep;
struct vnode *vp;
struct vattr vattr;
struct vattr origvattr;
vm_offset_t execargs;
struct nameidata nd;
struct ps_strings ps;
#define SHSIZE 512
char cfarg[SHSIZE];
boolean_t is_fat;
kern_return_t ret;
struct mach_header *mach_header;
struct fat_header *fat_header;
struct fat_arch fat_arch;
load_return_t lret;
load_result_t load_result;
struct uthread *uthread;
int i;
union {
char ex_shell[SHSIZE];
struct mach_header mach_header;
struct fat_header fat_header;
char pad[512];
} exdata;
int resid, error;
char *savedpath;
int savedpathlen = 0;
vm_offset_t *execargsp;
char *cpnospace;
task_t tsk;
int numthreads;
tsk = current_task();
if(tsk != kernel_task) {
numthreads = get_task_numacts(tsk);
if (numthreads <= 0 )
return(EINVAL);
if (numthreads > 1) {
return(EOPNOTSUPP);
}
}
ret = kmem_alloc_pageable(bsd_pageable_map, &execargs, NCARGS);
if (ret != KERN_SUCCESS)
return(ENOMEM);
uthread = get_bsdthread_info(current_act());
savedpath = execargs;
error = copyinstr(uap->fname, savedpath, MAXPATHLEN, &savedpathlen);
if (error)
return (error);
execargsp = (vm_offset_t *)((char *)(execargs) + savedpathlen);
NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | SAVENAME,
UIO_USERSPACE, uap->fname, p);
if ((error = namei(&nd)))
goto bad1;
vp = nd.ni_vp;
VOP_LEASE(vp, p, p->p_ucred, LEASE_READ);
if ((error = VOP_GETATTR(vp, &origvattr, p->p_ucred, p)))
goto bad;
if (vp->v_mount->mnt_flag & MNT_NOEXEC) {
error = EACCES;
goto bad;
}
indir = 0;
if ((vp->v_mount->mnt_flag & MNT_NOSUID) || (p->p_flag & P_TRACED))
origvattr.va_mode &= ~(VSUID | VSGID);
*(&vattr) = *(&origvattr);
again:
error = check_exec_access(p, vp, &vattr);
if (error)
goto bad;
exdata.ex_shell[0] = '\0';
error = vn_rdwr(UIO_READ, vp, (caddr_t)&exdata, sizeof (exdata), 0,
UIO_SYSSPACE, IO_NODELOCKED, p->p_ucred, &resid, p);
if (error)
goto bad;
#ifndef lint
if (resid > sizeof(exdata) - min(sizeof(exdata.mach_header),
sizeof(exdata.fat_header))
&& exdata.ex_shell[0] != '#') {
error = ENOEXEC;
goto bad;
}
#endif
mach_header = &exdata.mach_header;
fat_header = &exdata.fat_header;
if (mach_header->magic == MH_MAGIC)
is_fat = FALSE;
else if (fat_header->magic == FAT_MAGIC ||
fat_header->magic == FAT_CIGAM)
is_fat = TRUE;
else if (mach_header->magic == MH_CIGAM) {
error = EBADARCH;
goto bad;
} else {
if (exdata.ex_shell[0] != '#' ||
exdata.ex_shell[1] != '!' ||
indir) {
error = ENOEXEC;
goto bad;
}
cp = &exdata.ex_shell[2];
while (cp < &exdata.ex_shell[SHSIZE]) {
if (*cp == '\t')
*cp = ' ';
else if (*cp == '\n') {
*cp = '\0';
break;
}
cp++;
}
if (*cp != '\0') {
error = ENOEXEC;
goto bad;
}
cp = &exdata.ex_shell[2];
while (*cp == ' ')
cp++;
execnamep = cp;
while (*cp && *cp != ' ')
cp++;
cfarg[0] = '\0';
cpnospace = cp;
if (*cp) {
*cp++ = '\0';
while (*cp == ' ')
cp++;
if (*cp)
bcopy((caddr_t)cp, (caddr_t)cfarg, SHSIZE);
}
savedpathlen = (cpnospace - execnamep + 1);
error = copystr(execnamep, savedpath, savedpathlen, &savedpathlen);
if (error)
goto bad;
execargsp = (vm_offset_t *)((char *)(execargs) + savedpathlen);
indir = 1;
vput(vp);
nd.ni_cnd.cn_nameiop = LOOKUP;
nd.ni_cnd.cn_flags = (nd.ni_cnd.cn_flags & HASBUF) |
(FOLLOW | LOCKLEAF | SAVENAME);
nd.ni_segflg = UIO_SYSSPACE;
nd.ni_dirp = execnamep;
if ((error = namei(&nd)))
goto bad1;
vp = nd.ni_vp;
VOP_LEASE(vp, p, cred, LEASE_READ);
if ((error = VOP_GETATTR(vp, &vattr, p->p_ucred, p)))
goto bad;
goto again;
}
na = 0;
ne = 0;
nc = 0;
cc = 0;
cp = (char *) execargsp;
cc = NCARGS - savedpathlen - 2*NBPW;
if (uap->argp) for (;;) {
ap = NULL;
sharg = NULL;
if (indir && na == 0) {
sharg = nd.ni_cnd.cn_nameptr;
ap = (int)sharg;
uap->argp++;
} else if (indir && (na == 1 && cfarg[0])) {
sharg = cfarg;
ap = (int)sharg;
} else if (indir && (na == 1 || (na == 2 && cfarg[0])))
ap = (int)uap->fname;
else if (uap->argp) {
ap = fuword((caddr_t)uap->argp);
uap->argp++;
}
if (ap == NULL && uap->envp) {
uap->argp = NULL;
if ((ap = fuword((caddr_t)uap->envp)) != NULL)
uap->envp++, ne++;
}
if (ap == NULL)
break;
na++;
if (ap == -1) {
error = EFAULT;
break;
}
do {
if (nc >= (NCARGS - savedpathlen - 2*NBPW -1)) {
error = E2BIG;
break;
}
if (sharg) {
error = copystr(sharg, cp, (unsigned)cc, &len);
sharg += len;
} else {
error = copyinstr((caddr_t)ap, cp, (unsigned)cc,
&len);
ap += len;
}
cp += len;
nc += len;
cc -= len;
} while (error == ENAMETOOLONG);
if (error) {
goto bad;
}
}
nc = (nc + NBPW-1) & ~(NBPW-1);
if (is_fat) {
lret = fatfile_getarch(vp, (vm_offset_t)fat_header, &fat_arch);
if (lret != LOAD_SUCCESS) {
error = load_return_to_errno(lret);
goto bad;
}
error = vn_rdwr(UIO_READ, vp, (caddr_t)&exdata.mach_header,
sizeof (exdata.mach_header),
fat_arch.offset,
UIO_SYSSPACE, (IO_UNIT|IO_NODELOCKED), cred, &resid, p);
if (error) {
goto bad;
}
if (resid) {
error = EBADEXEC;
goto bad;
}
if (mach_header->magic != MH_MAGIC) {
error = ENOEXEC;
goto bad;
}
VOP_UNLOCK(vp, 0, p);
lret = load_machfile(vp, mach_header, fat_arch.offset,
fat_arch.size, &load_result);
} else {
VOP_UNLOCK(vp, 0, p);
lret = load_machfile(vp, mach_header, 0,
(u_long)vattr.va_size, &load_result);
}
if (lret != LOAD_SUCCESS) {
error = load_return_to_errno(lret);
goto bad;
}
ubc_map(vp);
p->p_flag &= ~P_SUGID;
if (((origvattr.va_mode & VSUID) != 0 &&
p->p_ucred->cr_uid != origvattr.va_uid)
|| (origvattr.va_mode & VSGID) != 0 &&
p->p_ucred->cr_gid != origvattr.va_gid) {
p->p_ucred = crcopy(cred);
#if KTRACE
if (p->p_tracep && !(p->p_traceflag & KTRFAC_ROOT)) {
vrele(p->p_tracep);
p->p_tracep = NULL;
p->p_traceflag = 0;
}
#endif
if (origvattr.va_mode & VSUID)
p->p_ucred->cr_uid = origvattr.va_uid;
if (origvattr.va_mode & VSGID)
p->p_ucred->cr_gid = origvattr.va_gid;
set_security_token(p);
p->p_flag |= P_SUGID;
for (i = 0; i < 3; i++) {
extern struct fileops vnops;
struct nameidata nd1;
struct file *fp;
int indx;
if (p->p_fd->fd_ofiles[i] == NULL) {
if ((error = falloc(p, &fp, &indx)) != 0)
continue;
NDINIT(&nd1, LOOKUP, FOLLOW, UIO_SYSSPACE,
"/dev/null", p);
if ((error = vn_open(&nd1, FREAD, 0)) != 0) {
ffree(fp);
p->p_fd->fd_ofiles[indx] = NULL;
break;
}
fp->f_flag = FREAD;
fp->f_type = DTYPE_VNODE;
fp->f_ops = &vnops;
fp->f_data = (caddr_t)nd1.ni_vp;
VOP_UNLOCK(nd1.ni_vp, 0, p);
}
}
}
p->p_cred->p_svuid = p->p_ucred->cr_uid;
p->p_cred->p_svgid = p->p_ucred->cr_gid;
if (p->p_flag & P_TRACED) {
psignal(p, SIGTRAP);
#ifdef BSD_USE_APC
thread_apc_set(current_act(), bsd_ast);
#else
ast_on(AST_BSD);
#endif
}
if (error) {
goto bad;
}
VOP_LOCK(vp, LK_EXCLUSIVE | LK_RETRY, p);
vput(vp);
vp = NULL;
if (load_result.unixproc &&
create_unix_stack(current_map(),
load_result.user_stack, p)) {
error = load_return_to_errno(LOAD_NOSPACE);
goto bad;
}
ucp = p->user_stack;
if (load_result.unixproc) {
int pathptr;
ucp = ucp - nc - NBPW;
savedpathlen = (savedpathlen + NBPW-1) & ~(NBPW-1);
len = 0;
pathptr = ucp - savedpathlen;
error = copyoutstr(savedpath, (caddr_t)pathptr,
(unsigned)savedpathlen, &len);
if (error)
goto bad;
(void) suword((caddr_t)(pathptr - NBPW), 0);
(void) suword((caddr_t)(pathptr - 2*NBPW), pathptr);
ap = ucp - na*NBPW - 3*NBPW - savedpathlen - 2*NBPW;
uthread->uu_ar0[SP] = ap;
(void) suword((caddr_t)ap, na-ne);
nc = 0;
cc = 0;
cp = (char *) execargsp;
cc = NCARGS - savedpathlen - 2*NBPW;
ps.ps_argvstr = (char *)ucp;
ps.ps_nargvstr = na - ne;
for (;;) {
ap += NBPW;
if (na == ne) {
(void) suword((caddr_t)ap, 0);
ap += NBPW;
ps.ps_envstr = (char *)ucp;
ps.ps_nenvstr = ne;
}
if (--na < 0)
break;
(void) suword((caddr_t)ap, ucp);
do {
error = copyoutstr(cp, (caddr_t)ucp,
(unsigned)cc, &len);
ucp += len;
cp += len;
nc += len;
cc -= len;
} while (error == ENAMETOOLONG);
if (error == EFAULT)
break;
}
(void) suword((caddr_t)ap, 0);
}
if (load_result.dynlinker) {
ap = uthread->uu_ar0[SP] -= 4;
(void) suword((caddr_t)ap, load_result.mach_header);
}
#if defined(i386) || defined(ppc)
uthread->uu_ar0[PC] = load_result.entry_point;
#else
#error architecture not implemented!
#endif
stopprofclock(p);
execsigs(p);
fdexec(p);
if (p->vm_shm)
shmexit(p);
p->p_acflag &= ~AFORK;
if (nd.ni_cnd.cn_namelen > MAXCOMLEN)
nd.ni_cnd.cn_namelen = MAXCOMLEN;
bcopy((caddr_t)nd.ni_cnd.cn_nameptr, (caddr_t)p->p_comm,
(unsigned)nd.ni_cnd.cn_namelen);
p->p_comm[nd.ni_cnd.cn_namelen] = '\0';
{
long dbg_arg1, dbg_arg2, dbg_arg3, dbg_arg4;
kdbg_trace_string(p, &dbg_arg1, &dbg_arg2, &dbg_arg3, &dbg_arg4);
KERNEL_DEBUG_CONSTANT((TRACEDBG_CODE(DBG_TRACE_STRING, 2)) | DBG_FUNC_NONE,
dbg_arg1, dbg_arg2, dbg_arg3, dbg_arg4, 0);
}
p->p_flag |= P_EXEC;
if (p->p_pptr && (p->p_flag & P_PPWAIT)) {
p->p_flag &= ~P_PPWAIT;
wakeup((caddr_t)p->p_pptr);
}
bad:
FREE_ZONE(nd.ni_cnd.cn_pnbuf, nd.ni_cnd.cn_pnlen, M_NAMEI);
if (vp)
vput(vp);
bad1:
#if FIXME
if (execargs)
kmem_free_wakeup(bsd_pageable_map, execargs, NCARGS);
#else
if (execargs)
kmem_free(bsd_pageable_map, execargs, NCARGS);
#endif
return(error);
}
#define unix_stack_size(p) (p->p_rlimit[RLIMIT_STACK].rlim_cur)
kern_return_t
create_unix_stack(map, user_stack, p)
vm_map_t map;
vm_offset_t user_stack;
struct proc *p;
{
vm_size_t size;
vm_offset_t addr;
p->user_stack = user_stack;
size = round_page(unix_stack_size(p));
#if STACK_GROWTH_UP
addr = user_stack;
#else STACK_GROWTH_UP
addr = trunc_page(user_stack - size);
#endif
return (vm_allocate(map,&addr, size, FALSE));
}
#include <sys/reboot.h>
char init_program_name[128] = "/sbin/mach_init\0";
char init_args[128] = "";
struct execve_args init_exec_args;
int init_attempts = 0;
void
load_init_program(p)
struct proc *p;
{
vm_offset_t init_addr;
int *old_ap;
char *argv[3];
int error;
register_t retval[2];
struct uthread * ut;
unix_master();
error = 0;
do {
if (boothowto & RB_INITNAME) {
printf("init program? ");
#if FIXME
gets(init_program_name, init_program_name);
#endif
}
if (error && ((boothowto & RB_INITNAME) == 0) &&
(init_attempts == 1)) {
static char other_init[] = "/etc/mach_init";
printf("Load of %s, errno %d, trying %s\n",
init_program_name, error, other_init);
error = 0;
bcopy(other_init, init_program_name,
sizeof(other_init));
}
init_attempts++;
if (error) {
printf("Load of %s failed, errno %d\n",
init_program_name, error);
error = 0;
boothowto |= RB_INITNAME;
continue;
}
init_addr = VM_MIN_ADDRESS;
(void) vm_allocate(current_map(), &init_addr,
PAGE_SIZE, TRUE);
if (init_addr == 0)
init_addr++;
(void) copyout((caddr_t) init_program_name,
(caddr_t) (init_addr),
(unsigned) sizeof(init_program_name)+1);
argv[0] = (char *) init_addr;
init_addr += sizeof(init_program_name);
init_addr = (vm_offset_t)ROUND_PTR(char, init_addr);
(void) copyout((caddr_t) init_args,
(caddr_t) (init_addr),
(unsigned) sizeof(init_args));
argv[1] = (char *) init_addr;
init_addr += sizeof(init_args);
init_addr = (vm_offset_t)ROUND_PTR(char, init_addr);
argv[2] = (char *) 0;
(void) copyout((caddr_t) argv,
(caddr_t) (init_addr),
(unsigned) sizeof(argv));
init_exec_args.fname = argv[0];
init_exec_args.argp = (char **) init_addr;
init_exec_args.envp = 0;
set_security_token(p);
error = execve(p,&init_exec_args,retval);
} while (error);
unix_release();
}
static int
load_return_to_errno(load_return_t lrtn)
{
switch (lrtn) {
case LOAD_SUCCESS:
return 0;
case LOAD_BADARCH:
return EBADARCH;
case LOAD_BADMACHO:
return EBADMACHO;
case LOAD_SHLIB:
return ESHLIBVERS;
case LOAD_NOSPACE:
return ENOMEM;
case LOAD_PROTECT:
return EACCES;
case LOAD_RESOURCE:
case LOAD_FAILURE:
default:
return EBADEXEC;
}
}
int
check_exec_access(p, vp, vap)
struct proc *p;
struct vnode *vp;
struct vattr *vap;
{
int flag;
int error;
if (error = VOP_ACCESS(vp, VEXEC, p->p_ucred, p))
return (error);
flag = p->p_flag;
if (flag & P_TRACED) {
if (error = VOP_ACCESS(vp, VREAD, p->p_ucred, p))
return (error);
}
if (vp->v_type != VREG ||
(vap->va_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) == 0)
return (EACCES);
return (0);
}