xref: /freebsd/sys/kern/kern_exec.c (revision 3aed948b886ad163da13c25a483b58255578ab99)
126f9a767SRodney W. Grimes /*
226f9a767SRodney W. Grimes  * Copyright (c) 1993, David Greenman
326f9a767SRodney W. Grimes  * All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13df8bae1dSRodney W. Grimes  * 3. All advertising materials mentioning features or use of this software
14df8bae1dSRodney W. Grimes  *    must display the following acknowledgement:
1526f9a767SRodney W. Grimes  *	This product includes software developed by David Greenman
1626f9a767SRodney W. Grimes  * 4. The name of the developer may not be used to endorse or promote products
1726f9a767SRodney W. Grimes  *    derived from this software without specific prior written permission.
18df8bae1dSRodney W. Grimes  *
1926f9a767SRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
20df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2226f9a767SRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
30df8bae1dSRodney W. Grimes  *
313aed948bSDavid Greenman  *	$Id: kern_exec.c,v 1.13 1995/02/20 22:23:11 davidg Exp $
32df8bae1dSRodney W. Grimes  */
33df8bae1dSRodney W. Grimes 
34df8bae1dSRodney W. Grimes #include <sys/param.h>
3526f9a767SRodney W. Grimes #include <sys/systm.h>
3626f9a767SRodney W. Grimes #include <sys/signalvar.h>
3726f9a767SRodney W. Grimes #include <sys/resourcevar.h>
3826f9a767SRodney W. Grimes #include <sys/kernel.h>
3926f9a767SRodney W. Grimes #include <sys/mount.h>
40797f2d22SPoul-Henning Kamp #include <sys/filedesc.h>
4126f9a767SRodney W. Grimes #include <sys/file.h>
4226f9a767SRodney W. Grimes #include <sys/acct.h>
4326f9a767SRodney W. Grimes #include <sys/exec.h>
4426f9a767SRodney W. Grimes #include <sys/imgact.h>
4526f9a767SRodney W. Grimes #include <sys/stat.h>
4626f9a767SRodney W. Grimes #include <sys/wait.h>
4726f9a767SRodney W. Grimes #include <sys/mman.h>
4826f9a767SRodney W. Grimes #include <sys/malloc.h>
491e1e0b44SSøren Schmidt #include <sys/sysent.h>
5026f9a767SRodney W. Grimes #include <sys/syslog.h>
51797f2d22SPoul-Henning Kamp #include <sys/shm.h>
5226f9a767SRodney W. Grimes 
5326f9a767SRodney W. Grimes #include <vm/vm.h>
5426f9a767SRodney W. Grimes #include <vm/vm_kern.h>
5526f9a767SRodney W. Grimes 
5626f9a767SRodney W. Grimes #include <machine/reg.h>
5726f9a767SRodney W. Grimes 
5826f9a767SRodney W. Grimes int *exec_copyout_strings __P((struct image_params *));
59df8bae1dSRodney W. Grimes 
60f23b4c91SGarrett Wollman static int exec_check_permissions(struct image_params *);
61f23b4c91SGarrett Wollman 
62df8bae1dSRodney W. Grimes /*
6326f9a767SRodney W. Grimes  * execsw_set is constructed for us by the linker.  Each of the items
6426f9a767SRodney W. Grimes  * is a pointer to a `const struct execsw', hence the double pointer here.
65df8bae1dSRodney W. Grimes  */
6626f9a767SRodney W. Grimes extern const struct linker_set execsw_set;
6726f9a767SRodney W. Grimes const struct execsw **execsw = (const struct execsw **)&execsw_set.ls_items[0];
6826f9a767SRodney W. Grimes 
6926f9a767SRodney W. Grimes /*
7026f9a767SRodney W. Grimes  * execve() system call.
7126f9a767SRodney W. Grimes  */
7226f9a767SRodney W. Grimes int
7326f9a767SRodney W. Grimes execve(p, uap, retval)
7426f9a767SRodney W. Grimes 	struct proc *p;
7526f9a767SRodney W. Grimes 	register struct execve_args *uap;
7626f9a767SRodney W. Grimes 	int *retval;
77df8bae1dSRodney W. Grimes {
7826f9a767SRodney W. Grimes 	struct nameidata nd, *ndp;
7926f9a767SRodney W. Grimes 	int *stack_base;
80bb56ec4aSPoul-Henning Kamp 	int error, len, i;
8126f9a767SRodney W. Grimes 	struct image_params image_params, *iparams;
8226f9a767SRodney W. Grimes 	struct vnode *vnodep;
8326f9a767SRodney W. Grimes 	struct vattr attr;
8426f9a767SRodney W. Grimes 	char *image_header;
8526f9a767SRodney W. Grimes 
8626f9a767SRodney W. Grimes 	iparams = &image_params;
8726f9a767SRodney W. Grimes 	bzero((caddr_t)iparams, sizeof(struct image_params));
8826f9a767SRodney W. Grimes 	image_header = (char *)0;
89df8bae1dSRodney W. Grimes 
90df8bae1dSRodney W. Grimes 	/*
9126f9a767SRodney W. Grimes 	 * Initialize a few constants in the common area
92df8bae1dSRodney W. Grimes 	 */
9326f9a767SRodney W. Grimes 	iparams->proc = p;
9426f9a767SRodney W. Grimes 	iparams->uap = uap;
9526f9a767SRodney W. Grimes 	iparams->attr = &attr;
9626f9a767SRodney W. Grimes 
9726f9a767SRodney W. Grimes 	/*
9826f9a767SRodney W. Grimes 	 * Allocate temporary demand zeroed space for argument and
9926f9a767SRodney W. Grimes 	 *	environment strings
10026f9a767SRodney W. Grimes 	 */
10168940ac1SDavid Greenman 	iparams->stringbase = (char *)vm_map_min(exec_map);
10268940ac1SDavid Greenman 	error = vm_map_find(exec_map, NULL, 0, (vm_offset_t *)&iparams->stringbase,
10326f9a767SRodney W. Grimes 	    ARG_MAX, TRUE);
10426f9a767SRodney W. Grimes 	if (error) {
10526f9a767SRodney W. Grimes 		log(LOG_WARNING, "execve: failed to allocate string space\n");
10626f9a767SRodney W. Grimes 		return (error);
10726f9a767SRodney W. Grimes 	}
10826f9a767SRodney W. Grimes 
10926f9a767SRodney W. Grimes 	if (!iparams->stringbase) {
11026f9a767SRodney W. Grimes 		error = ENOMEM;
11126f9a767SRodney W. Grimes 		goto exec_fail;
11226f9a767SRodney W. Grimes 	}
11326f9a767SRodney W. Grimes 	iparams->stringp = iparams->stringbase;
11426f9a767SRodney W. Grimes 	iparams->stringspace = ARG_MAX;
11526f9a767SRodney W. Grimes 
11626f9a767SRodney W. Grimes 	/*
11726f9a767SRodney W. Grimes 	 * Translate the file name. namei() returns a vnode pointer
11826f9a767SRodney W. Grimes 	 *	in ni_vp amoung other things.
11926f9a767SRodney W. Grimes 	 */
12026f9a767SRodney W. Grimes 	ndp = &nd;
12126f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_nameiop = LOOKUP;
12226f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_flags = LOCKLEAF | FOLLOW | SAVENAME;
12326f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_proc = curproc;
12426f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_cred = curproc->p_cred->pc_ucred;
12526f9a767SRodney W. Grimes 	ndp->ni_segflg = UIO_USERSPACE;
12626f9a767SRodney W. Grimes 	ndp->ni_dirp = uap->fname;
12726f9a767SRodney W. Grimes 
12826f9a767SRodney W. Grimes interpret:
12926f9a767SRodney W. Grimes 
13026f9a767SRodney W. Grimes 	error = namei(ndp);
13126f9a767SRodney W. Grimes 	if (error) {
13268940ac1SDavid Greenman 		vm_map_remove(exec_map, (vm_offset_t)iparams->stringbase,
13368940ac1SDavid Greenman 		    (vm_offset_t)iparams->stringbase + ARG_MAX);
13426f9a767SRodney W. Grimes 		goto exec_fail;
13526f9a767SRodney W. Grimes 	}
13626f9a767SRodney W. Grimes 
13726f9a767SRodney W. Grimes 	iparams->vnodep = vnodep = ndp->ni_vp;
13826f9a767SRodney W. Grimes 
13926f9a767SRodney W. Grimes 	if (vnodep == NULL) {
14026f9a767SRodney W. Grimes 		error = ENOEXEC;
14126f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
14226f9a767SRodney W. Grimes 	}
14326f9a767SRodney W. Grimes 
14426f9a767SRodney W. Grimes 	/*
14526f9a767SRodney W. Grimes 	 * Check file permissions (also 'opens' file)
14626f9a767SRodney W. Grimes 	 */
14726f9a767SRodney W. Grimes 	error = exec_check_permissions(iparams);
14826f9a767SRodney W. Grimes 	if (error)
14926f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
15026f9a767SRodney W. Grimes 
15126f9a767SRodney W. Grimes 	/*
15226f9a767SRodney W. Grimes 	 * Map the image header (first page) of the file into
15326f9a767SRodney W. Grimes 	 *	kernel address space
15426f9a767SRodney W. Grimes 	 */
15526f9a767SRodney W. Grimes 	error = vm_mmap(kernel_map,			/* map */
15626f9a767SRodney W. Grimes 			(vm_offset_t *)&image_header,	/* address */
15726f9a767SRodney W. Grimes 			PAGE_SIZE,			/* size */
15826f9a767SRodney W. Grimes 			VM_PROT_READ, 			/* protection */
15926f9a767SRodney W. Grimes 			VM_PROT_READ, 			/* max protection */
16026f9a767SRodney W. Grimes 			0,	 			/* flags */
16126f9a767SRodney W. Grimes 			(caddr_t)vnodep,		/* vnode */
16226f9a767SRodney W. Grimes 			0);				/* offset */
16326f9a767SRodney W. Grimes 	if (error) {
16426f9a767SRodney W. Grimes 		uprintf("mmap failed: %d\n",error);
16526f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
16626f9a767SRodney W. Grimes 	}
16726f9a767SRodney W. Grimes 	iparams->image_header = image_header;
16826f9a767SRodney W. Grimes 
16926f9a767SRodney W. Grimes 	/*
17026f9a767SRodney W. Grimes 	 * Loop through list of image activators, calling each one.
17126f9a767SRodney W. Grimes 	 *	If there is no match, the activator returns -1. If there
17226f9a767SRodney W. Grimes 	 *	is a match, but there was an error during the activation,
17326f9a767SRodney W. Grimes 	 *	the error is returned. Otherwise 0 means success. If the
17426f9a767SRodney W. Grimes 	 *	image is interpreted, loop back up and try activating
17526f9a767SRodney W. Grimes 	 *	the interpreter.
17626f9a767SRodney W. Grimes 	 */
17726f9a767SRodney W. Grimes 	for (i = 0; execsw[i]; ++i) {
17826f9a767SRodney W. Grimes 		if (execsw[i]->ex_imgact)
17926f9a767SRodney W. Grimes 			error = (*execsw[i]->ex_imgact)(iparams);
18026f9a767SRodney W. Grimes 		else
18126f9a767SRodney W. Grimes 			continue;
18226f9a767SRodney W. Grimes 
18326f9a767SRodney W. Grimes 		if (error == -1)
18426f9a767SRodney W. Grimes 			continue;
18526f9a767SRodney W. Grimes 		if (error)
18626f9a767SRodney W. Grimes 			goto exec_fail_dealloc;
18726f9a767SRodney W. Grimes 		if (iparams->interpreted) {
18826f9a767SRodney W. Grimes 			/* free old vnode and name buffer */
18926f9a767SRodney W. Grimes 			vput(ndp->ni_vp);
19026f9a767SRodney W. Grimes 			FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI);
19168940ac1SDavid Greenman 			if (vm_map_remove(kernel_map, (vm_offset_t)image_header,
19268940ac1SDavid Greenman 			    (vm_offset_t)image_header + PAGE_SIZE))
19326f9a767SRodney W. Grimes 				panic("execve: header dealloc failed (1)");
19426f9a767SRodney W. Grimes 
19526f9a767SRodney W. Grimes 			/* set new name to that of the interpreter */
19626f9a767SRodney W. Grimes 			ndp->ni_segflg = UIO_SYSSPACE;
19726f9a767SRodney W. Grimes 			ndp->ni_dirp = iparams->interpreter_name;
19826f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_nameiop = LOOKUP;
19926f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_flags = LOCKLEAF | FOLLOW | SAVENAME;
20026f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_proc = curproc;
20126f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_cred = curproc->p_cred->pc_ucred;
20226f9a767SRodney W. Grimes 			goto interpret;
20326f9a767SRodney W. Grimes 		}
20426f9a767SRodney W. Grimes 		break;
20526f9a767SRodney W. Grimes 	}
20626f9a767SRodney W. Grimes 	/* If we made it through all the activators and none matched, exit. */
20726f9a767SRodney W. Grimes 	if (error == -1) {
20826f9a767SRodney W. Grimes 		error = ENOEXEC;
20926f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
21026f9a767SRodney W. Grimes 	}
21126f9a767SRodney W. Grimes 
21226f9a767SRodney W. Grimes 	/*
21326f9a767SRodney W. Grimes 	 * Copy out strings (args and env) and initialize stack base
21426f9a767SRodney W. Grimes 	 */
21526f9a767SRodney W. Grimes 	stack_base = exec_copyout_strings(iparams);
21626f9a767SRodney W. Grimes 	p->p_vmspace->vm_minsaddr = (char *)stack_base;
21726f9a767SRodney W. Grimes 
21826f9a767SRodney W. Grimes 	/*
2191e1e0b44SSøren Schmidt 	 * If custom stack fixup routine present for this process
2201e1e0b44SSøren Schmidt 	 * let it do the stack setup.
2211e1e0b44SSøren Schmidt 	 * Else stuff argument count as first item on stack
22226f9a767SRodney W. Grimes 	 */
2231e1e0b44SSøren Schmidt 	if (p->p_sysent->sv_fixup)
2241e1e0b44SSøren Schmidt 		(*p->p_sysent->sv_fixup)(&stack_base, iparams);
2251e1e0b44SSøren Schmidt 	else
2263aed948bSDavid Greenman 		suword(--stack_base, iparams->argc);
22726f9a767SRodney W. Grimes 
22826f9a767SRodney W. Grimes 	/* close files on exec */
22926f9a767SRodney W. Grimes 	fdcloseexec(p);
23026f9a767SRodney W. Grimes 
23126f9a767SRodney W. Grimes 	/* reset caught signals */
23226f9a767SRodney W. Grimes 	execsigs(p);
23326f9a767SRodney W. Grimes 
23426f9a767SRodney W. Grimes 	/* name this process - nameiexec(p, ndp) */
23526f9a767SRodney W. Grimes 	len = min(ndp->ni_cnd.cn_namelen,MAXCOMLEN);
23626f9a767SRodney W. Grimes 	bcopy(ndp->ni_cnd.cn_nameptr, p->p_comm, len);
23726f9a767SRodney W. Grimes 	p->p_comm[len] = 0;
23826f9a767SRodney W. Grimes 
23926f9a767SRodney W. Grimes 	/*
24026f9a767SRodney W. Grimes 	 * mark as executable, wakeup any process that was vforked and tell
24126f9a767SRodney W. Grimes 	 * it that it now has it's own resources back
24226f9a767SRodney W. Grimes 	 */
24326f9a767SRodney W. Grimes 	p->p_flag |= P_EXEC;
24426f9a767SRodney W. Grimes 	if (p->p_pptr && (p->p_flag & P_PPWAIT)) {
24526f9a767SRodney W. Grimes 		p->p_flag &= ~P_PPWAIT;
24626f9a767SRodney W. Grimes 		wakeup((caddr_t)p->p_pptr);
24726f9a767SRodney W. Grimes 	}
24826f9a767SRodney W. Grimes 
24926f9a767SRodney W. Grimes 	/* implement set userid/groupid */
25026f9a767SRodney W. Grimes 	p->p_flag &= ~P_SUGID;
25126f9a767SRodney W. Grimes 
25226f9a767SRodney W. Grimes 	/*
25326f9a767SRodney W. Grimes 	 * Turn off kernel tracing for set-id programs, except for
25426f9a767SRodney W. Grimes 	 * root.
25526f9a767SRodney W. Grimes 	 */
25626f9a767SRodney W. Grimes 	if (p->p_tracep && (attr.va_mode & (VSUID | VSGID)) &&
25726f9a767SRodney W. Grimes 	    suser(p->p_ucred, &p->p_acflag)) {
25826f9a767SRodney W. Grimes 		p->p_traceflag = 0;
25926f9a767SRodney W. Grimes 		vrele(p->p_tracep);
26026f9a767SRodney W. Grimes 		p->p_tracep = 0;
26126f9a767SRodney W. Grimes 	}
26226f9a767SRodney W. Grimes 	if ((attr.va_mode & VSUID) && (p->p_flag & P_TRACED) == 0) {
26326f9a767SRodney W. Grimes 		p->p_ucred = crcopy(p->p_ucred);
26426f9a767SRodney W. Grimes 		p->p_ucred->cr_uid = attr.va_uid;
26526f9a767SRodney W. Grimes 		p->p_flag |= P_SUGID;
26626f9a767SRodney W. Grimes 	}
26726f9a767SRodney W. Grimes 	if ((attr.va_mode & VSGID) && (p->p_flag & P_TRACED) == 0) {
26826f9a767SRodney W. Grimes 		p->p_ucred = crcopy(p->p_ucred);
26926f9a767SRodney W. Grimes 		p->p_ucred->cr_groups[0] = attr.va_gid;
27026f9a767SRodney W. Grimes 		p->p_flag |= P_SUGID;
27126f9a767SRodney W. Grimes 	}
27226f9a767SRodney W. Grimes 
27326f9a767SRodney W. Grimes 	/*
27426f9a767SRodney W. Grimes 	 * Implement correct POSIX saved uid behavior.
27526f9a767SRodney W. Grimes 	 */
27626f9a767SRodney W. Grimes 	p->p_cred->p_svuid = p->p_ucred->cr_uid;
27726f9a767SRodney W. Grimes 	p->p_cred->p_svgid = p->p_ucred->cr_gid;
27826f9a767SRodney W. Grimes 
27926f9a767SRodney W. Grimes 	/* mark vnode pure text */
28026f9a767SRodney W. Grimes  	ndp->ni_vp->v_flag |= VTEXT;
28126f9a767SRodney W. Grimes 
28226f9a767SRodney W. Grimes 	/*
2832a531c80SDavid Greenman 	 * Store the vp for use in procfs
2842a531c80SDavid Greenman 	 */
2852a531c80SDavid Greenman 	if (p->p_textvp)		/* release old reference */
2862a531c80SDavid Greenman 		vrele(p->p_textvp);
2872a531c80SDavid Greenman 	VREF(ndp->ni_vp);
2882a531c80SDavid Greenman 	p->p_textvp = ndp->ni_vp;
2892a531c80SDavid Greenman 
2902a531c80SDavid Greenman 	/*
29126f9a767SRodney W. Grimes 	 * If tracing the process, trap to debugger so breakpoints
29226f9a767SRodney W. Grimes 	 * 	can be set before the program executes.
29326f9a767SRodney W. Grimes 	 */
29426f9a767SRodney W. Grimes 	if (p->p_flag & P_TRACED)
29526f9a767SRodney W. Grimes 		psignal(p, SIGTRAP);
29626f9a767SRodney W. Grimes 
29726f9a767SRodney W. Grimes 	/* clear "fork but no exec" flag, as we _are_ execing */
29826f9a767SRodney W. Grimes 	p->p_acflag &= ~AFORK;
29926f9a767SRodney W. Grimes 
30026f9a767SRodney W. Grimes 	/* Set entry address */
301797f2d22SPoul-Henning Kamp 	setregs(p, iparams->entry_addr, (u_long)stack_base);
30226f9a767SRodney W. Grimes 
30326f9a767SRodney W. Grimes 	/*
30426f9a767SRodney W. Grimes 	 * free various allocated resources
30526f9a767SRodney W. Grimes 	 */
30668940ac1SDavid Greenman 	if (vm_map_remove(exec_map, (vm_offset_t)iparams->stringbase,
30768940ac1SDavid Greenman 	    (vm_offset_t)iparams->stringbase + ARG_MAX))
30826f9a767SRodney W. Grimes 		panic("execve: string buffer dealloc failed (1)");
30968940ac1SDavid Greenman 	if (vm_map_remove(kernel_map, (vm_offset_t)image_header,
31068940ac1SDavid Greenman 	    (vm_offset_t)image_header + PAGE_SIZE))
31126f9a767SRodney W. Grimes 		panic("execve: header dealloc failed (2)");
31226f9a767SRodney W. Grimes 	vput(ndp->ni_vp);
31326f9a767SRodney W. Grimes 	FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI);
31426f9a767SRodney W. Grimes 
31526f9a767SRodney W. Grimes 	return (0);
31626f9a767SRodney W. Grimes 
31726f9a767SRodney W. Grimes exec_fail_dealloc:
31826f9a767SRodney W. Grimes 	if (iparams->stringbase && iparams->stringbase != (char *)-1)
31968940ac1SDavid Greenman 		if (vm_map_remove(exec_map, (vm_offset_t)iparams->stringbase,
32068940ac1SDavid Greenman 		    (vm_offset_t)iparams->stringbase + ARG_MAX))
32126f9a767SRodney W. Grimes 			panic("execve: string buffer dealloc failed (2)");
32226f9a767SRodney W. Grimes 	if (iparams->image_header && iparams->image_header != (char *)-1)
32368940ac1SDavid Greenman 		if (vm_map_remove(kernel_map, (vm_offset_t)image_header,
32468940ac1SDavid Greenman 		    (vm_offset_t)image_header + PAGE_SIZE))
32526f9a767SRodney W. Grimes 			panic("execve: header dealloc failed (3)");
32626f9a767SRodney W. Grimes 	vput(ndp->ni_vp);
32726f9a767SRodney W. Grimes 	FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI);
32826f9a767SRodney W. Grimes 
32926f9a767SRodney W. Grimes exec_fail:
33026f9a767SRodney W. Grimes 	if (iparams->vmspace_destroyed) {
33126f9a767SRodney W. Grimes 		/* sorry, no more process anymore. exit gracefully */
33226f9a767SRodney W. Grimes 		exit1(p, W_EXITCODE(0, SIGABRT));
33326f9a767SRodney W. Grimes 		/* NOT REACHED */
33426f9a767SRodney W. Grimes 		return(0);
33526f9a767SRodney W. Grimes 	} else {
33626f9a767SRodney W. Grimes 		return(error);
33726f9a767SRodney W. Grimes 	}
33826f9a767SRodney W. Grimes }
33926f9a767SRodney W. Grimes 
34026f9a767SRodney W. Grimes /*
34126f9a767SRodney W. Grimes  * Destroy old address space, and allocate a new stack
34226f9a767SRodney W. Grimes  *	The new stack is only SGROWSIZ large because it is grown
34326f9a767SRodney W. Grimes  *	automatically in trap.c.
34426f9a767SRodney W. Grimes  */
34526f9a767SRodney W. Grimes int
34626f9a767SRodney W. Grimes exec_new_vmspace(iparams)
34726f9a767SRodney W. Grimes 	struct image_params *iparams;
34826f9a767SRodney W. Grimes {
34926f9a767SRodney W. Grimes 	int error;
35026f9a767SRodney W. Grimes 	struct vmspace *vmspace = iparams->proc->p_vmspace;
35126f9a767SRodney W. Grimes 	caddr_t	stack_addr = (caddr_t) (USRSTACK - SGROWSIZ);
35226f9a767SRodney W. Grimes 
35326f9a767SRodney W. Grimes 	iparams->vmspace_destroyed = 1;
35426f9a767SRodney W. Grimes 
35526f9a767SRodney W. Grimes 	/* Blow away entire process VM */
356d74643dfSDavid Greenman #ifdef SYSVSHM
3573d903220SDoug Rabson 	if (vmspace->vm_shm)
3583d903220SDoug Rabson 		shmexit(iparams->proc);
359d74643dfSDavid Greenman #endif
36068940ac1SDavid Greenman 	vm_map_remove(&vmspace->vm_map, 0, USRSTACK);
36126f9a767SRodney W. Grimes 
36226f9a767SRodney W. Grimes 	/* Allocate a new stack */
36368940ac1SDavid Greenman 	error = vm_map_find(&vmspace->vm_map, NULL, 0, (vm_offset_t *)&stack_addr,
36426f9a767SRodney W. Grimes 	    SGROWSIZ, FALSE);
36526f9a767SRodney W. Grimes 	if (error)
36626f9a767SRodney W. Grimes 		return(error);
36726f9a767SRodney W. Grimes 
36826f9a767SRodney W. Grimes 	vmspace->vm_ssize = SGROWSIZ >> PAGE_SHIFT;
36926f9a767SRodney W. Grimes 
37026f9a767SRodney W. Grimes 	/* Initialize maximum stack address */
37126f9a767SRodney W. Grimes 	vmspace->vm_maxsaddr = (char *)USRSTACK - MAXSSIZ;
37226f9a767SRodney W. Grimes 
37326f9a767SRodney W. Grimes 	return(0);
37426f9a767SRodney W. Grimes }
37526f9a767SRodney W. Grimes 
37626f9a767SRodney W. Grimes /*
37726f9a767SRodney W. Grimes  * Copy out argument and environment strings from the old process
37826f9a767SRodney W. Grimes  *	address space into the temporary string buffer.
37926f9a767SRodney W. Grimes  */
38026f9a767SRodney W. Grimes int
38126f9a767SRodney W. Grimes exec_extract_strings(iparams)
38226f9a767SRodney W. Grimes 	struct image_params *iparams;
38326f9a767SRodney W. Grimes {
38426f9a767SRodney W. Grimes 	char	**argv, **envv;
38526f9a767SRodney W. Grimes 	char	*argp, *envp;
3860fd1a014SDavid Greenman 	int	error, length;
38726f9a767SRodney W. Grimes 
38826f9a767SRodney W. Grimes 	/*
38926f9a767SRodney W. Grimes 	 * extract arguments first
39026f9a767SRodney W. Grimes 	 */
39126f9a767SRodney W. Grimes 
39226f9a767SRodney W. Grimes 	argv = iparams->uap->argv;
39326f9a767SRodney W. Grimes 
3940fd1a014SDavid Greenman 	if (argv) {
395bb56ec4aSPoul-Henning Kamp 		while ((argp = (caddr_t) fuword(argv++))) {
39626f9a767SRodney W. Grimes 			if (argp == (caddr_t) -1)
39726f9a767SRodney W. Grimes 				return (EFAULT);
398bb56ec4aSPoul-Henning Kamp 			if ((error = copyinstr(argp, iparams->stringp,
399bb56ec4aSPoul-Henning Kamp 			    iparams->stringspace, &length))) {
4000fd1a014SDavid Greenman 				if (error == ENAMETOOLONG)
40126f9a767SRodney W. Grimes 					return(E2BIG);
4020fd1a014SDavid Greenman 				return (error);
4030fd1a014SDavid Greenman 			}
40426f9a767SRodney W. Grimes 			iparams->stringspace -= length;
40526f9a767SRodney W. Grimes 			iparams->stringp += length;
40626f9a767SRodney W. Grimes 			iparams->argc++;
40726f9a767SRodney W. Grimes 		}
4080fd1a014SDavid Greenman 	}
40926f9a767SRodney W. Grimes 
41026f9a767SRodney W. Grimes 	/*
41126f9a767SRodney W. Grimes 	 * extract environment strings
41226f9a767SRodney W. Grimes 	 */
41326f9a767SRodney W. Grimes 
41426f9a767SRodney W. Grimes 	envv = iparams->uap->envv;
41526f9a767SRodney W. Grimes 
4160fd1a014SDavid Greenman 	if (envv) {
417bb56ec4aSPoul-Henning Kamp 		while ((envp = (caddr_t) fuword(envv++))) {
41826f9a767SRodney W. Grimes 			if (envp == (caddr_t) -1)
41926f9a767SRodney W. Grimes 				return (EFAULT);
420bb56ec4aSPoul-Henning Kamp 			if ((error = copyinstr(envp, iparams->stringp,
421bb56ec4aSPoul-Henning Kamp 			    iparams->stringspace, &length))) {
4220fd1a014SDavid Greenman 				if (error == ENAMETOOLONG)
42326f9a767SRodney W. Grimes 					return(E2BIG);
4240fd1a014SDavid Greenman 				return (error);
4250fd1a014SDavid Greenman 			}
42626f9a767SRodney W. Grimes 			iparams->stringspace -= length;
42726f9a767SRodney W. Grimes 			iparams->stringp += length;
42826f9a767SRodney W. Grimes 			iparams->envc++;
42926f9a767SRodney W. Grimes 		}
4300fd1a014SDavid Greenman 	}
43126f9a767SRodney W. Grimes 
43226f9a767SRodney W. Grimes 	return (0);
43326f9a767SRodney W. Grimes }
43426f9a767SRodney W. Grimes 
43526f9a767SRodney W. Grimes /*
43626f9a767SRodney W. Grimes  * Copy strings out to the new process address space, constructing
43726f9a767SRodney W. Grimes  *	new arg and env vector tables. Return a pointer to the base
43826f9a767SRodney W. Grimes  *	so that it can be used as the initial stack pointer.
43926f9a767SRodney W. Grimes  */
44026f9a767SRodney W. Grimes int *
44126f9a767SRodney W. Grimes exec_copyout_strings(iparams)
44226f9a767SRodney W. Grimes 	struct image_params *iparams;
44326f9a767SRodney W. Grimes {
44426f9a767SRodney W. Grimes 	int argc, envc;
44526f9a767SRodney W. Grimes 	char **vectp;
44626f9a767SRodney W. Grimes 	char *stringp, *destp;
44726f9a767SRodney W. Grimes 	int *stack_base;
44893f6448cSDavid Greenman 	struct ps_strings *arginfo;
44926f9a767SRodney W. Grimes 
45026f9a767SRodney W. Grimes 	/*
45126f9a767SRodney W. Grimes 	 * Calculate string base and vector table pointers.
45226f9a767SRodney W. Grimes 	 */
45393f6448cSDavid Greenman 	arginfo = PS_STRINGS;
45493f6448cSDavid Greenman 	destp =	(caddr_t)arginfo - roundup((ARG_MAX - iparams->stringspace), sizeof(char *));
45526f9a767SRodney W. Grimes 	/*
45626f9a767SRodney W. Grimes 	 * The '+ 2' is for the null pointers at the end of each of the
45726f9a767SRodney W. Grimes 	 *	arg and	env vector sets
45826f9a767SRodney W. Grimes 	 */
45926f9a767SRodney W. Grimes 	vectp = (char **) (destp -
46026f9a767SRodney W. Grimes 		(iparams->argc + iparams->envc + 2) * sizeof(char *));
46126f9a767SRodney W. Grimes 
46226f9a767SRodney W. Grimes 	/*
46326f9a767SRodney W. Grimes 	 * vectp also becomes our initial stack base
46426f9a767SRodney W. Grimes 	 */
46526f9a767SRodney W. Grimes 	stack_base = (int *)vectp;
46626f9a767SRodney W. Grimes 
46726f9a767SRodney W. Grimes 	stringp = iparams->stringbase;
46826f9a767SRodney W. Grimes 	argc = iparams->argc;
46926f9a767SRodney W. Grimes 	envc = iparams->envc;
47026f9a767SRodney W. Grimes 
47193f6448cSDavid Greenman 	/*
4723aed948bSDavid Greenman 	 * Copy out strings - arguments and environment.
47393f6448cSDavid Greenman 	 */
4743aed948bSDavid Greenman 	copyout(stringp, destp, ARG_MAX - iparams->stringspace);
47593f6448cSDavid Greenman 
47693f6448cSDavid Greenman 	/*
4773aed948bSDavid Greenman 	 * Fill in "ps_strings" struct for ps, w, etc.
4783aed948bSDavid Greenman 	 */
4793aed948bSDavid Greenman 	suword(&arginfo->ps_argvstr, (int)destp);
4803aed948bSDavid Greenman 	suword(&arginfo->ps_nargvstr, argc);
4813aed948bSDavid Greenman 
4823aed948bSDavid Greenman 	/*
4833aed948bSDavid Greenman 	 * Fill in argument portion of vector table.
48493f6448cSDavid Greenman 	 */
48526f9a767SRodney W. Grimes 	for (; argc > 0; --argc) {
4863aed948bSDavid Greenman 		suword(vectp++, (int)destp);
4873aed948bSDavid Greenman 		while (*stringp++ != 0)
4883aed948bSDavid Greenman 			destp++;
4893aed948bSDavid Greenman 		destp++;
49026f9a767SRodney W. Grimes 	}
49126f9a767SRodney W. Grimes 
49226f9a767SRodney W. Grimes 	/* a null vector table pointer seperates the argp's from the envp's */
4933aed948bSDavid Greenman 	suword(vectp++, NULL);
49426f9a767SRodney W. Grimes 
4953aed948bSDavid Greenman 	suword(&arginfo->ps_envstr, (int)destp);
4963aed948bSDavid Greenman 	suword(&arginfo->ps_nenvstr, envc);
49793f6448cSDavid Greenman 
49893f6448cSDavid Greenman 	/*
4993aed948bSDavid Greenman 	 * Fill in environment portion of vector table.
50093f6448cSDavid Greenman 	 */
50126f9a767SRodney W. Grimes 	for (; envc > 0; --envc) {
5023aed948bSDavid Greenman 		suword(vectp++, (int)destp);
5033aed948bSDavid Greenman 		while (*stringp++ != 0)
5043aed948bSDavid Greenman 			destp++;
5053aed948bSDavid Greenman 		destp++;
50626f9a767SRodney W. Grimes 	}
50726f9a767SRodney W. Grimes 
50826f9a767SRodney W. Grimes 	/* end of vector table is a null pointer */
5093aed948bSDavid Greenman 	suword(vectp, NULL);
51026f9a767SRodney W. Grimes 
51126f9a767SRodney W. Grimes 	return (stack_base);
51226f9a767SRodney W. Grimes }
51326f9a767SRodney W. Grimes 
51426f9a767SRodney W. Grimes /*
51526f9a767SRodney W. Grimes  * Check permissions of file to execute.
51626f9a767SRodney W. Grimes  *	Return 0 for success or error code on failure.
51726f9a767SRodney W. Grimes  */
518f23b4c91SGarrett Wollman static int
51926f9a767SRodney W. Grimes exec_check_permissions(iparams)
52026f9a767SRodney W. Grimes 	struct image_params *iparams;
52126f9a767SRodney W. Grimes {
52226f9a767SRodney W. Grimes 	struct proc *p = iparams->proc;
52326f9a767SRodney W. Grimes 	struct vnode *vnodep = iparams->vnodep;
52426f9a767SRodney W. Grimes 	struct vattr *attr = iparams->attr;
52526f9a767SRodney W. Grimes 	int error;
52626f9a767SRodney W. Grimes 
52726f9a767SRodney W. Grimes 	/*
52826f9a767SRodney W. Grimes 	 * Check number of open-for-writes on the file and deny execution
52926f9a767SRodney W. Grimes 	 *	if there are any.
53026f9a767SRodney W. Grimes 	 */
53126f9a767SRodney W. Grimes 	if (vnodep->v_writecount) {
53226f9a767SRodney W. Grimes 		return (ETXTBSY);
53326f9a767SRodney W. Grimes 	}
53426f9a767SRodney W. Grimes 
53526f9a767SRodney W. Grimes 	/* Get file attributes */
53626f9a767SRodney W. Grimes 	error = VOP_GETATTR(vnodep, attr, p->p_ucred, p);
53726f9a767SRodney W. Grimes 	if (error)
53826f9a767SRodney W. Grimes 		return (error);
53926f9a767SRodney W. Grimes 
54026f9a767SRodney W. Grimes 	/*
54126f9a767SRodney W. Grimes 	 * 1) Check if file execution is disabled for the filesystem that this
54226f9a767SRodney W. Grimes 	 *	file resides on.
54326f9a767SRodney W. Grimes 	 * 2) Insure that at least one execute bit is on - otherwise root
54426f9a767SRodney W. Grimes 	 *	will always succeed, and we don't want to happen unless the
54526f9a767SRodney W. Grimes 	 *	file really is executable.
54626f9a767SRodney W. Grimes 	 * 3) Insure that the file is a regular file.
54726f9a767SRodney W. Grimes 	 */
54826f9a767SRodney W. Grimes 	if ((vnodep->v_mount->mnt_flag & MNT_NOEXEC) ||
54926f9a767SRodney W. Grimes 	    ((attr->va_mode & 0111) == 0) ||
55026f9a767SRodney W. Grimes 	    (attr->va_type != VREG)) {
55126f9a767SRodney W. Grimes 		return (EACCES);
55226f9a767SRodney W. Grimes 	}
55326f9a767SRodney W. Grimes 
55426f9a767SRodney W. Grimes 	/*
55526f9a767SRodney W. Grimes 	 * Zero length files can't be exec'd
55626f9a767SRodney W. Grimes 	 */
55726f9a767SRodney W. Grimes 	if (attr->va_size == 0)
55826f9a767SRodney W. Grimes 		return (ENOEXEC);
55926f9a767SRodney W. Grimes 
56026f9a767SRodney W. Grimes 	/*
56126f9a767SRodney W. Grimes 	 * Disable setuid/setgid if the filesystem prohibits it or if
56226f9a767SRodney W. Grimes 	 *	the process is being traced.
56326f9a767SRodney W. Grimes 	 */
56426f9a767SRodney W. Grimes         if ((vnodep->v_mount->mnt_flag & MNT_NOSUID) || (p->p_flag & P_TRACED))
56526f9a767SRodney W. Grimes 		attr->va_mode &= ~(VSUID | VSGID);
56626f9a767SRodney W. Grimes 
56726f9a767SRodney W. Grimes 	/*
56826f9a767SRodney W. Grimes 	 *  Check for execute permission to file based on current credentials.
56926f9a767SRodney W. Grimes 	 *	Then call filesystem specific open routine (which does nothing
57026f9a767SRodney W. Grimes 	 *	in the general case).
57126f9a767SRodney W. Grimes 	 */
57226f9a767SRodney W. Grimes 	error = VOP_ACCESS(vnodep, VEXEC, p->p_ucred, p);
57326f9a767SRodney W. Grimes 	if (error)
57426f9a767SRodney W. Grimes 		return (error);
57526f9a767SRodney W. Grimes 
57626f9a767SRodney W. Grimes 	error = VOP_OPEN(vnodep, FREAD, p->p_ucred, p);
57726f9a767SRodney W. Grimes 	if (error)
57826f9a767SRodney W. Grimes 		return (error);
57926f9a767SRodney W. Grimes 
58026f9a767SRodney W. Grimes 	return (0);
581df8bae1dSRodney W. Grimes }
582