From c644738bc56c2e10cd4eeaba9971ef5e953c4833 Mon Sep 17 00:00:00 2001 From: Roland McGrath Date: Wed, 18 Oct 1995 07:17:21 +0000 Subject: Initial revision --- exec/hashexec.c | 442 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 442 insertions(+) create mode 100644 exec/hashexec.c (limited to 'exec/hashexec.c') diff --git a/exec/hashexec.c b/exec/hashexec.c new file mode 100644 index 00000000..b7fc591a --- /dev/null +++ b/exec/hashexec.c @@ -0,0 +1,442 @@ +/* GNU Hurd standard exec server, #! script execution support. + Copyright (C) 1995 Free Software Foundation, Inc. + Written by Roland McGrath. + +This file is part of the GNU Hurd. + +The GNU Hurd is free software; you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation; either version 2, or (at your option) +any later version. + +The GNU Hurd is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with the GNU Hurd; see the file COPYING. If not, write to +the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. */ + + +#include "priv.h" +#include + +/* This is called to check E for a #! interpreter specification. E has + already been prepared (successfully) and checked (unsuccessfully). If + we return success, our caller just returns success for the RPC; we must + handle all the RPC argument details ourselves. If we return ENOEXEC, we + should leave everything as it was. If we return failure other than + ENOEXEC, our caller will just fail the RPC. */ + +void +check_hashbang (struct execdata *e, + file_t file, + task_t oldtask, + int flags, + char *argv, u_int argvlen, boolean_t argv_copy, + char *envp, u_int envplen, boolean_t envp_copy, + mach_port_t *dtable, u_int dtablesize, boolean_t dtable_copy, + mach_port_t *portarray, u_int nports, boolean_t portarray_copy, + int *intarray, u_int nints, boolean_t intarray_copy, + mach_port_t *deallocnames, u_int ndeallocnames, + mach_port_t *destroynames, u_int ndestroynames) +{ + char *ibuf = NULL; + size_t ibufsiz = 0; + char *p; + char *interp, *arg; /* Interpreter file name, and first argument */ + size_t interp_len, len; + file_t interp_file; /* Port open on the interpreter file. */ + FILE *f = &e->stream; + char *new_argv; + size_t new_argvlen; + mach_port_t *new_dtable = NULL; + u_int new_dtablesize; + + rewind (f); + + /* Check for our ``magic number''--"#!". */ + + errno = 0; + if (getc (f) != '#' || getc (f) != '!') + { + /* No `#!' here. If there was a read error (not including EOF), + return that error indication. Otherwise return ENOEXEC to + say it's not a file we know how to execute. */ + e->error = ferror (f) ? errno : ENOEXEC; + return; + } + + /* Read the rest of the first line of the file. */ + + interp_len = getline (&ibuf, &ibufsiz, f); + if (ferror (f)) + { + e->error = errno ?: EIO; + return; + } + if (ibuf[interp_len - 1] == '\n') + ibuf[--interp_len] = '\0'; + + /* Find the name of the interpreter. */ + p = ibuf + strspn (ibuf, " \t"); + interp = strsep (&p, " \t"); + /* Skip remaining blanks, and the rest of the line is the argument. */ + p += strspn (p, " \t"); + arg = p; + len = interp_len - (arg - interp); + if (len == 0) + arg = NULL; + else + ++len; /* Include the terminating null. */ + + { + file_t user_fd (int fd) + { + if (fd < 0 || fd >= dtablesize || + dtable[fd] == MACH_PORT_NULL) + { + errno = EBADF; + return MACH_PORT_NULL; + } + return dtable[fd]; + } + + file_t user_crdir, user_cwdir; + error_t user_port (int which, error_t (*operate) (mach_port_t)) + { + error_t reauthenticate (file_t unauth, file_t *result) + { + error_t err; + mach_port_t ref; + error_t uauth (auth_t auth) + { + return auth_user_authenticate (auth, + unauth, + ref, MACH_MSG_TYPE_MAKE_SEND, + result); + } + if (*result != MACH_PORT_NULL) + return 0; + ref = mach_reply_port (); + err = io_reauthenticate (unauth, ref, MACH_MSG_TYPE_MAKE_SEND); + if (!err) + err = user_port (INIT_PORT_AUTH, &uauth); + mach_port_destroy (mach_task_self (), ref); + return err; + } + + mach_port_t port = ((which < nports && + portarray[which] != MACH_PORT_NULL) + ? portarray[which] : + (flags & EXEC_DEFAULTS) ? std_ports[which] + : MACH_PORT_NULL); + + if ((flags & EXEC_SECURE) || port == std_ports[which]) + switch (which) + { + case INIT_PORT_CRDIR: + return (reauthenticate (INIT_PORT_CRDIR, &user_crdir) ?: + (*operate) (user_crdir)); + case INIT_PORT_CWDIR: + return (reauthenticate (INIT_PORT_CWDIR, &user_cwdir) ?: + (*operate) (user_cwdir)); + } + return (*operate) (port); + } + + user_crdir = user_cwdir = MACH_PORT_NULL; + + rwlock_reader_lock (&std_lock); + + /* Open a port on the interpreter file. */ + e->error = hurd_file_name_lookup (&user_port, &user_fd, + interp, O_EXEC, 0, + &interp_file); + + rwlock_reader_unlock (&std_lock); + + if (user_crdir != MACH_PORT_NULL) + mach_port_deallocate (mach_task_self (), user_crdir); + if (user_cwdir != MACH_PORT_NULL) + mach_port_deallocate (mach_task_self (), user_cwdir); + } + + if (! e->error) + { + /* This code is in a local function here for convenience. Some things in + this function need to be protected against faults while accessing ARGV + and ENVP; below, we register to preempt signals on these fault areas + before calling prepare_args, and unregister afterwards. When such a + fault is detected, the handler does `longjmp (args_faulted, 1)'. */ + + jmp_buf args_faulted; + + inline void prepare_args (void) + { + + char *file_name = NULL; + size_t namelen; + +#if 0 + if (! (flags & EXEC_SECURE)) + { + /* Try to figure out the file's name. We guess that if ARGV[0] + contains a slash, it might be the name of the file; and that + if it contains no slash, looking for files named by ARGV[0] in + the `PATH' environment variable might find it. */ + + size_t namelen; + error_t error; + char *name; + file_t name_file; + struct stat st; + int file_fstype; + fsid_t file_fsid; + ino_t file_fileno; + + if (error = io_stat (file, &st)) /* XXX insecure */ + goto out; + file_fstype = st.st_fstype; + file_fsid = st.st_fsid; + file_fileno = st.st_ino; + + if (memchr (argv, '\0', argvlen) == NULL) + { + name = alloca (argvlen + 1); + bcopy (argv, name, argvlen); + name[argvlen] = '\0'; + } + else + name = argv; + + if (strchr (name, '/') != NULL) + error = hurd_file_name_lookup (userport (INIT_PORT_CRDIR), + userport (INIT_PORT_CWDIR), + name, 0, 0, &name_file); + else if (! setjmp (args_faulted)) + { + /* Search PATH for it. If we fault accessing ENVP, setjmp + will return again, nonzero this time, and we give up. */ + + const char envar[] = "\0PATH="; + char *path, *p; + if (envplen >= sizeof (envar) && + !memcmp (&envar[1], envp, sizeof (envar) - 2)) + p = envp - 1; + else + p = memmem (envar, sizeof (envar) - 1, envp, envplen); + if (p != NULL) + { + size_t len; + p += sizeof (envar) - 1; + len = strlen (p) + 1; + path = alloca (len); + bcopy (p, path, len); + } + else + { + const size_t len = confstr (_CS_PATH, NULL, 0); + path = alloca (len); + confstr (_CS_PATH, path, len); + } + + while ((p = strsep (&path, ":")) != NULL) + { + file_t dir; + if (*p == '\0') + dir = portarray[INIT_PORT_CWDIR]; + else + if (hurd_path_lookup (portarray[INIT_PORT_CRDIR], + portarray[INIT_PORT_CWDIR], + p, O_EXEC, 0, &dir)) + continue; + error = hurd_path_lookup (portarray[INIT_PORT_CRDIR], dir, + name, O_EXEC, 0, &name_file); + if (*p != '\0') + mach_port_deallocate (mach_task_self (), dir); + if (!error) + { + if (*p != '\0') + { + size_t dirlen = strlen (p); + size_t namelen = strlen (name); + char *new = alloca (dirlen + 1 + namelen + 1); + memcpy (new, p, dirlen); + new[dirlen] = '/'; + memcpy (&new[dirlen + 1], name, namelen + 1); + name = new; + } + break; + } + } + } + else + name_file = MACH_PORT_NULL; + + if (!error && name_file != MACH_PORT_NULL) + { + if (!io_stat (name_file, &st) && /* XXX insecure */ + st.st_fstype == file_fstype && + st.st_fsid == file_fsid && + st.st_ino == file_ino) + file_name = name; + mach_port_deallocate (mach_task_self (), name_file); + } + } +#endif + + if (file_name == NULL) + { + /* We can't easily find the file. + Put it in a file descriptor and pass /dev/fd/N. */ + int fd; + + for (fd = 0; fd < dtablesize; ++fd) + if (dtable[fd] == MACH_PORT_NULL) + break; + if (fd == dtablesize) + { + /* Extend the descriptor table. */ + new_dtable = alloca ((dtablesize + 1) * sizeof (file_t)); + memcpy (new_dtable, dtable, dtablesize * sizeof (file_t)); + new_dtablesize = dtablesize + 1; + new_dtable[fd] = file; + } + else + dtable[fd] = file; + mach_port_mod_refs (mach_task_self (), file, + MACH_PORT_RIGHT_SEND, +1); + + file_name = alloca (100); + sprintf (file_name, "/dev/fd/%d", fd); + } + + /* Prepare the arguments to pass to the interpreter from the original + arguments and the name of the script file. The args will look + like `ARGV[0] {ARG} FILE_NAME ARGV[1..n]' (ARG might have been + omitted). */ + + namelen = strlen (file_name) + 1; + + if (! setjmp (args_faulted)) + { + /* XXX leaks below if fault */ + char *other_args; + new_argvlen = argvlen + len + namelen; + e->error = vm_allocate (mach_task_self (), + (vm_address_t *) &new_argv, + new_argvlen, 1); + if (e->error) + return; + other_args = memccpy (new_argv, argv, '\0', argvlen); + p = &new_argv[other_args ? other_args - new_argv : argvlen]; + if (arg) + { + memcpy (p, arg, len); + p += len; + } + memcpy (p, file_name, namelen); + p += namelen; + if (other_args) + memcpy (p, other_args, argvlen - (other_args - new_argv)); + } + else + { + /* We got a fault reading ARGV. So don't use it. */ + static const char loser[] + = "**fault in exec server reading argv[0]**"; + new_argvlen = sizeof (loser) + len + namelen; + new_argv = alloca (argvlen); + memcpy (new_argv, loser, sizeof (loser)); + memcpy (new_argv + sizeof (loser), arg, len); + memcpy (new_argv + sizeof (loser) + len, file_name, namelen); + } + } + + /* Preempt SIGSEGV signals for the address ranges of ARGV and ENVP. + When such a signal arrives, `preempter' is called to decide what + handler to run; it always returns `handler', which is then invoked + as a normal signal handler. Our handler always simply longjmps to + ARGS_FAULTED. */ + + void handler (int sig) + { + longjmp (args_faulted, 1); + } + const thread_t mythread = hurd_thread_self (); + sighandler_t preempter (thread_t thread, + int signo, long int sigcode, int sigerror) + { + return thread == mythread ? handler : SIG_DFL; + } + + struct hurd_signal_preempt argv_preempter, envp_preempter; + + /* Register the preemptions. */ + hurd_preempt_signals (&argv_preempter, SIGSEGV, + (long int) argv, (long int) argv + argvlen - 1, + preempter); + hurd_preempt_signals (&envp_preempter, SIGSEGV, + (long int) envp, (long int) envp + envplen - 1, + preempter); + + /* Do the work. Everywhere we might get a page fault inside ARGV or + ENVP, is inside the zero-return case of an `if' on setjmp + (ARGS_FAULTED). */ + prepare_args (); + + /* Unregister the preemptions. */ + hurd_unpreempt_signals (&argv_preempter, SIGSEGV); + hurd_unpreempt_signals (&envp_preempter, SIGSEGV); + } + + /* We are now done reading the script file. */ + finish (e, 0); + free (ibuf); + + if (e->error) + /* We cannot open the interpreter file to execute it. Lose! */ + return; + + /* Execute the interpreter program. */ + e->error = file_exec (interp_file, + oldtask, flags, + new_argv, new_argvlen, envp, envplen, + new_dtable ?: dtable, MACH_MSG_TYPE_COPY_SEND, + new_dtable ? new_dtablesize : dtablesize, + portarray, MACH_MSG_TYPE_COPY_SEND, nports, + intarray, nints, + deallocnames, ndeallocnames, + destroynames, ndestroynames); + mach_port_deallocate (mach_task_self (), interp_file); + + if (! e->error) + { + /* The exec of the interpreter succeeded! Deallocate the resources + we passed to that exec. We don't need to save them in a bootinfo + structure; the exec of the interpreter takes care of that. */ + u_int i; + mach_port_deallocate (mach_task_self (), file); + task_resume (oldtask); /* Our caller suspended it. */ + mach_port_deallocate (mach_task_self (), oldtask); + if (! argv_copy) + vm_deallocate (mach_task_self (), (vm_address_t) argv, argvlen); + if (! envp_copy) + vm_deallocate (mach_task_self (), (vm_address_t) envp, envplen); + for (i = 0; i < dtablesize; ++i) + mach_port_deallocate (mach_task_self (), dtable[i]); + if (! dtable_copy) + vm_deallocate (mach_task_self (), (vm_address_t) dtable, + dtablesize * sizeof *dtable); + for (i = 0; i < nports; ++i) + mach_port_deallocate (mach_task_self (), portarray[i]); + if (! portarray_copy) + vm_deallocate (mach_task_self (), (vm_address_t) portarray, + nports * sizeof *portarray); + if (! intarray_copy) + vm_deallocate (mach_task_self (), (vm_address_t) intarray, + nints * sizeof *intarray); + } +} -- cgit v1.2.3