xref: /freebsd/sys/kern/kern_exec.c (revision 9022e4ad9c19548cbcdf61eb527cf89807f4599f)
126f9a767SRodney W. Grimes /*
226f9a767SRodney W. Grimes  * Copyright (c) 1993, David Greenman
326f9a767SRodney W. Grimes  * All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
6df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
7df8bae1dSRodney W. Grimes  * are met:
8df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
9df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
10df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
11df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
12df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
13df8bae1dSRodney W. Grimes  * 3. All advertising materials mentioning features or use of this software
14df8bae1dSRodney W. Grimes  *    must display the following acknowledgement:
1526f9a767SRodney W. Grimes  *	This product includes software developed by David Greenman
1626f9a767SRodney W. Grimes  * 4. The name of the developer may not be used to endorse or promote products
1726f9a767SRodney W. Grimes  *    derived from this software without specific prior written permission.
18df8bae1dSRodney W. Grimes  *
1926f9a767SRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
20df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2226f9a767SRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
30df8bae1dSRodney W. Grimes  *
319022e4adSDavid Greenman  *	$Id: kern_exec.c,v 1.17 1995/03/19 23:08:12 davidg Exp $
32df8bae1dSRodney W. Grimes  */
33df8bae1dSRodney W. Grimes 
34df8bae1dSRodney W. Grimes #include <sys/param.h>
3526f9a767SRodney W. Grimes #include <sys/systm.h>
3626f9a767SRodney W. Grimes #include <sys/signalvar.h>
3726f9a767SRodney W. Grimes #include <sys/kernel.h>
3826f9a767SRodney W. Grimes #include <sys/mount.h>
39797f2d22SPoul-Henning Kamp #include <sys/filedesc.h>
4026f9a767SRodney W. Grimes #include <sys/file.h>
4126f9a767SRodney W. Grimes #include <sys/acct.h>
4226f9a767SRodney W. Grimes #include <sys/exec.h>
4326f9a767SRodney W. Grimes #include <sys/imgact.h>
4426f9a767SRodney W. Grimes #include <sys/wait.h>
4526f9a767SRodney W. Grimes #include <sys/malloc.h>
461e1e0b44SSøren Schmidt #include <sys/sysent.h>
4726f9a767SRodney W. Grimes #include <sys/syslog.h>
48797f2d22SPoul-Henning Kamp #include <sys/shm.h>
4926f9a767SRodney W. Grimes 
5026f9a767SRodney W. Grimes #include <vm/vm.h>
5126f9a767SRodney W. Grimes #include <vm/vm_kern.h>
5226f9a767SRodney W. Grimes 
5326f9a767SRodney W. Grimes #include <machine/reg.h>
5426f9a767SRodney W. Grimes 
5526f9a767SRodney W. Grimes int *exec_copyout_strings __P((struct image_params *));
56df8bae1dSRodney W. Grimes 
57f23b4c91SGarrett Wollman static int exec_check_permissions(struct image_params *);
58f23b4c91SGarrett Wollman 
59df8bae1dSRodney W. Grimes /*
6026f9a767SRodney W. Grimes  * execsw_set is constructed for us by the linker.  Each of the items
6126f9a767SRodney W. Grimes  * is a pointer to a `const struct execsw', hence the double pointer here.
62df8bae1dSRodney W. Grimes  */
6326f9a767SRodney W. Grimes const struct execsw **execsw = (const struct execsw **)&execsw_set.ls_items[0];
6426f9a767SRodney W. Grimes 
6526f9a767SRodney W. Grimes /*
6626f9a767SRodney W. Grimes  * execve() system call.
6726f9a767SRodney W. Grimes  */
6826f9a767SRodney W. Grimes int
6926f9a767SRodney W. Grimes execve(p, uap, retval)
7026f9a767SRodney W. Grimes 	struct proc *p;
7126f9a767SRodney W. Grimes 	register struct execve_args *uap;
7226f9a767SRodney W. Grimes 	int *retval;
73df8bae1dSRodney W. Grimes {
7426f9a767SRodney W. Grimes 	struct nameidata nd, *ndp;
7526f9a767SRodney W. Grimes 	int *stack_base;
76bb56ec4aSPoul-Henning Kamp 	int error, len, i;
7726f9a767SRodney W. Grimes 	struct image_params image_params, *iparams;
7826f9a767SRodney W. Grimes 	struct vnode *vnodep;
7926f9a767SRodney W. Grimes 	struct vattr attr;
8026f9a767SRodney W. Grimes 	char *image_header;
8126f9a767SRodney W. Grimes 
8226f9a767SRodney W. Grimes 	iparams = &image_params;
8326f9a767SRodney W. Grimes 	bzero((caddr_t)iparams, sizeof(struct image_params));
8426f9a767SRodney W. Grimes 	image_header = (char *)0;
85df8bae1dSRodney W. Grimes 
86df8bae1dSRodney W. Grimes 	/*
8726f9a767SRodney W. Grimes 	 * Initialize a few constants in the common area
88df8bae1dSRodney W. Grimes 	 */
8926f9a767SRodney W. Grimes 	iparams->proc = p;
9026f9a767SRodney W. Grimes 	iparams->uap = uap;
9126f9a767SRodney W. Grimes 	iparams->attr = &attr;
9226f9a767SRodney W. Grimes 
9326f9a767SRodney W. Grimes 	/*
9426f9a767SRodney W. Grimes 	 * Allocate temporary demand zeroed space for argument and
9526f9a767SRodney W. Grimes 	 *	environment strings
9626f9a767SRodney W. Grimes 	 */
9768940ac1SDavid Greenman 	iparams->stringbase = (char *)vm_map_min(exec_map);
9868940ac1SDavid Greenman 	error = vm_map_find(exec_map, NULL, 0, (vm_offset_t *)&iparams->stringbase,
9926f9a767SRodney W. Grimes 	    ARG_MAX, TRUE);
10026f9a767SRodney W. Grimes 	if (error) {
10126f9a767SRodney W. Grimes 		log(LOG_WARNING, "execve: failed to allocate string space\n");
10226f9a767SRodney W. Grimes 		return (error);
10326f9a767SRodney W. Grimes 	}
10426f9a767SRodney W. Grimes 
10526f9a767SRodney W. Grimes 	if (!iparams->stringbase) {
10626f9a767SRodney W. Grimes 		error = ENOMEM;
10726f9a767SRodney W. Grimes 		goto exec_fail;
10826f9a767SRodney W. Grimes 	}
10926f9a767SRodney W. Grimes 	iparams->stringp = iparams->stringbase;
11026f9a767SRodney W. Grimes 	iparams->stringspace = ARG_MAX;
11126f9a767SRodney W. Grimes 
11226f9a767SRodney W. Grimes 	/*
11326f9a767SRodney W. Grimes 	 * Translate the file name. namei() returns a vnode pointer
11426f9a767SRodney W. Grimes 	 *	in ni_vp amoung other things.
11526f9a767SRodney W. Grimes 	 */
11626f9a767SRodney W. Grimes 	ndp = &nd;
11726f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_nameiop = LOOKUP;
11826f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_flags = LOCKLEAF | FOLLOW | SAVENAME;
11926f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_proc = curproc;
12026f9a767SRodney W. Grimes 	ndp->ni_cnd.cn_cred = curproc->p_cred->pc_ucred;
12126f9a767SRodney W. Grimes 	ndp->ni_segflg = UIO_USERSPACE;
12226f9a767SRodney W. Grimes 	ndp->ni_dirp = uap->fname;
12326f9a767SRodney W. Grimes 
12426f9a767SRodney W. Grimes interpret:
12526f9a767SRodney W. Grimes 
12626f9a767SRodney W. Grimes 	error = namei(ndp);
12726f9a767SRodney W. Grimes 	if (error) {
12868940ac1SDavid Greenman 		vm_map_remove(exec_map, (vm_offset_t)iparams->stringbase,
12968940ac1SDavid Greenman 		    (vm_offset_t)iparams->stringbase + ARG_MAX);
13026f9a767SRodney W. Grimes 		goto exec_fail;
13126f9a767SRodney W. Grimes 	}
13226f9a767SRodney W. Grimes 
13326f9a767SRodney W. Grimes 	iparams->vnodep = vnodep = ndp->ni_vp;
13426f9a767SRodney W. Grimes 
13526f9a767SRodney W. Grimes 	if (vnodep == NULL) {
13626f9a767SRodney W. Grimes 		error = ENOEXEC;
13726f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
13826f9a767SRodney W. Grimes 	}
13926f9a767SRodney W. Grimes 
14026f9a767SRodney W. Grimes 	/*
1419022e4adSDavid Greenman 	 * Check file permissions (also 'opens' file)
1429022e4adSDavid Greenman 	 */
1439022e4adSDavid Greenman 	error = exec_check_permissions(iparams);
1449022e4adSDavid Greenman 
1459022e4adSDavid Greenman 	/*
1469022e4adSDavid Greenman 	 * Lose the lock on the vnode. It's no longer needed, and must not
147f5277ae7SDavid Greenman 	 * exist for the pagefault paging to work below.
148f5277ae7SDavid Greenman 	 */
149f5277ae7SDavid Greenman 	VOP_UNLOCK(vnodep);
150f5277ae7SDavid Greenman 
15126f9a767SRodney W. Grimes 	if (error)
15226f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
15326f9a767SRodney W. Grimes 
15426f9a767SRodney W. Grimes 	/*
15526f9a767SRodney W. Grimes 	 * Map the image header (first page) of the file into
15626f9a767SRodney W. Grimes 	 *	kernel address space
15726f9a767SRodney W. Grimes 	 */
15826f9a767SRodney W. Grimes 	error = vm_mmap(kernel_map,			/* map */
15926f9a767SRodney W. Grimes 			(vm_offset_t *)&image_header,	/* address */
16026f9a767SRodney W. Grimes 			PAGE_SIZE,			/* size */
16126f9a767SRodney W. Grimes 			VM_PROT_READ, 			/* protection */
16226f9a767SRodney W. Grimes 			VM_PROT_READ, 			/* max protection */
16326f9a767SRodney W. Grimes 			0,	 			/* flags */
16426f9a767SRodney W. Grimes 			(caddr_t)vnodep,		/* vnode */
16526f9a767SRodney W. Grimes 			0);				/* offset */
16626f9a767SRodney W. Grimes 	if (error) {
16726f9a767SRodney W. Grimes 		uprintf("mmap failed: %d\n",error);
16826f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
16926f9a767SRodney W. Grimes 	}
17026f9a767SRodney W. Grimes 	iparams->image_header = image_header;
17126f9a767SRodney W. Grimes 
17226f9a767SRodney W. Grimes 	/*
17326f9a767SRodney W. Grimes 	 * Loop through list of image activators, calling each one.
17426f9a767SRodney W. Grimes 	 *	If there is no match, the activator returns -1. If there
17526f9a767SRodney W. Grimes 	 *	is a match, but there was an error during the activation,
17626f9a767SRodney W. Grimes 	 *	the error is returned. Otherwise 0 means success. If the
17726f9a767SRodney W. Grimes 	 *	image is interpreted, loop back up and try activating
17826f9a767SRodney W. Grimes 	 *	the interpreter.
17926f9a767SRodney W. Grimes 	 */
18026f9a767SRodney W. Grimes 	for (i = 0; execsw[i]; ++i) {
18126f9a767SRodney W. Grimes 		if (execsw[i]->ex_imgact)
18226f9a767SRodney W. Grimes 			error = (*execsw[i]->ex_imgact)(iparams);
18326f9a767SRodney W. Grimes 		else
18426f9a767SRodney W. Grimes 			continue;
18526f9a767SRodney W. Grimes 
18626f9a767SRodney W. Grimes 		if (error == -1)
18726f9a767SRodney W. Grimes 			continue;
18826f9a767SRodney W. Grimes 		if (error)
18926f9a767SRodney W. Grimes 			goto exec_fail_dealloc;
19026f9a767SRodney W. Grimes 		if (iparams->interpreted) {
19126f9a767SRodney W. Grimes 			/* free old vnode and name buffer */
192f5277ae7SDavid Greenman 			vrele(ndp->ni_vp);
19326f9a767SRodney W. Grimes 			FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI);
19468940ac1SDavid Greenman 			if (vm_map_remove(kernel_map, (vm_offset_t)image_header,
19568940ac1SDavid Greenman 			    (vm_offset_t)image_header + PAGE_SIZE))
19626f9a767SRodney W. Grimes 				panic("execve: header dealloc failed (1)");
19726f9a767SRodney W. Grimes 
19826f9a767SRodney W. Grimes 			/* set new name to that of the interpreter */
19926f9a767SRodney W. Grimes 			ndp->ni_segflg = UIO_SYSSPACE;
20026f9a767SRodney W. Grimes 			ndp->ni_dirp = iparams->interpreter_name;
20126f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_nameiop = LOOKUP;
20226f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_flags = LOCKLEAF | FOLLOW | SAVENAME;
20326f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_proc = curproc;
20426f9a767SRodney W. Grimes 			ndp->ni_cnd.cn_cred = curproc->p_cred->pc_ucred;
20526f9a767SRodney W. Grimes 			goto interpret;
20626f9a767SRodney W. Grimes 		}
20726f9a767SRodney W. Grimes 		break;
20826f9a767SRodney W. Grimes 	}
20926f9a767SRodney W. Grimes 	/* If we made it through all the activators and none matched, exit. */
21026f9a767SRodney W. Grimes 	if (error == -1) {
21126f9a767SRodney W. Grimes 		error = ENOEXEC;
21226f9a767SRodney W. Grimes 		goto exec_fail_dealloc;
21326f9a767SRodney W. Grimes 	}
21426f9a767SRodney W. Grimes 
21526f9a767SRodney W. Grimes 	/*
21626f9a767SRodney W. Grimes 	 * Copy out strings (args and env) and initialize stack base
21726f9a767SRodney W. Grimes 	 */
21826f9a767SRodney W. Grimes 	stack_base = exec_copyout_strings(iparams);
21926f9a767SRodney W. Grimes 	p->p_vmspace->vm_minsaddr = (char *)stack_base;
22026f9a767SRodney W. Grimes 
22126f9a767SRodney W. Grimes 	/*
2221e1e0b44SSøren Schmidt 	 * If custom stack fixup routine present for this process
2231e1e0b44SSøren Schmidt 	 * let it do the stack setup.
2241e1e0b44SSøren Schmidt 	 * Else stuff argument count as first item on stack
22526f9a767SRodney W. Grimes 	 */
2261e1e0b44SSøren Schmidt 	if (p->p_sysent->sv_fixup)
2271e1e0b44SSøren Schmidt 		(*p->p_sysent->sv_fixup)(&stack_base, iparams);
2281e1e0b44SSøren Schmidt 	else
2293aed948bSDavid Greenman 		suword(--stack_base, iparams->argc);
23026f9a767SRodney W. Grimes 
23126f9a767SRodney W. Grimes 	/* close files on exec */
23226f9a767SRodney W. Grimes 	fdcloseexec(p);
23326f9a767SRodney W. Grimes 
23426f9a767SRodney W. Grimes 	/* reset caught signals */
23526f9a767SRodney W. Grimes 	execsigs(p);
23626f9a767SRodney W. Grimes 
23726f9a767SRodney W. Grimes 	/* name this process - nameiexec(p, ndp) */
23826f9a767SRodney W. Grimes 	len = min(ndp->ni_cnd.cn_namelen,MAXCOMLEN);
23926f9a767SRodney W. Grimes 	bcopy(ndp->ni_cnd.cn_nameptr, p->p_comm, len);
24026f9a767SRodney W. Grimes 	p->p_comm[len] = 0;
24126f9a767SRodney W. Grimes 
24226f9a767SRodney W. Grimes 	/*
24326f9a767SRodney W. Grimes 	 * mark as executable, wakeup any process that was vforked and tell
24426f9a767SRodney W. Grimes 	 * it that it now has it's own resources back
24526f9a767SRodney W. Grimes 	 */
24626f9a767SRodney W. Grimes 	p->p_flag |= P_EXEC;
24726f9a767SRodney W. Grimes 	if (p->p_pptr && (p->p_flag & P_PPWAIT)) {
24826f9a767SRodney W. Grimes 		p->p_flag &= ~P_PPWAIT;
24926f9a767SRodney W. Grimes 		wakeup((caddr_t)p->p_pptr);
25026f9a767SRodney W. Grimes 	}
25126f9a767SRodney W. Grimes 
25226f9a767SRodney W. Grimes 	/* implement set userid/groupid */
25326f9a767SRodney W. Grimes 	p->p_flag &= ~P_SUGID;
25426f9a767SRodney W. Grimes 
25526f9a767SRodney W. Grimes 	/*
25626f9a767SRodney W. Grimes 	 * Turn off kernel tracing for set-id programs, except for
25726f9a767SRodney W. Grimes 	 * root.
25826f9a767SRodney W. Grimes 	 */
25926f9a767SRodney W. Grimes 	if (p->p_tracep && (attr.va_mode & (VSUID | VSGID)) &&
26026f9a767SRodney W. Grimes 	    suser(p->p_ucred, &p->p_acflag)) {
26126f9a767SRodney W. Grimes 		p->p_traceflag = 0;
26226f9a767SRodney W. Grimes 		vrele(p->p_tracep);
26326f9a767SRodney W. Grimes 		p->p_tracep = 0;
26426f9a767SRodney W. Grimes 	}
26526f9a767SRodney W. Grimes 	if ((attr.va_mode & VSUID) && (p->p_flag & P_TRACED) == 0) {
26626f9a767SRodney W. Grimes 		p->p_ucred = crcopy(p->p_ucred);
26726f9a767SRodney W. Grimes 		p->p_ucred->cr_uid = attr.va_uid;
26826f9a767SRodney W. Grimes 		p->p_flag |= P_SUGID;
26926f9a767SRodney W. Grimes 	}
27026f9a767SRodney W. Grimes 	if ((attr.va_mode & VSGID) && (p->p_flag & P_TRACED) == 0) {
27126f9a767SRodney W. Grimes 		p->p_ucred = crcopy(p->p_ucred);
27226f9a767SRodney W. Grimes 		p->p_ucred->cr_groups[0] = attr.va_gid;
27326f9a767SRodney W. Grimes 		p->p_flag |= P_SUGID;
27426f9a767SRodney W. Grimes 	}
27526f9a767SRodney W. Grimes 
27626f9a767SRodney W. Grimes 	/*
27726f9a767SRodney W. Grimes 	 * Implement correct POSIX saved uid behavior.
27826f9a767SRodney W. Grimes 	 */
27926f9a767SRodney W. Grimes 	p->p_cred->p_svuid = p->p_ucred->cr_uid;
28026f9a767SRodney W. Grimes 	p->p_cred->p_svgid = p->p_ucred->cr_gid;
28126f9a767SRodney W. Grimes 
28226f9a767SRodney W. Grimes 	/* mark vnode pure text */
28326f9a767SRodney W. Grimes  	ndp->ni_vp->v_flag |= VTEXT;
28426f9a767SRodney W. Grimes 
28526f9a767SRodney W. Grimes 	/*
2862a531c80SDavid Greenman 	 * Store the vp for use in procfs
2872a531c80SDavid Greenman 	 */
2882a531c80SDavid Greenman 	if (p->p_textvp)		/* release old reference */
2892a531c80SDavid Greenman 		vrele(p->p_textvp);
2902a531c80SDavid Greenman 	VREF(ndp->ni_vp);
2912a531c80SDavid Greenman 	p->p_textvp = ndp->ni_vp;
2922a531c80SDavid Greenman 
2932a531c80SDavid Greenman 	/*
29426f9a767SRodney W. Grimes 	 * If tracing the process, trap to debugger so breakpoints
29526f9a767SRodney W. Grimes 	 * 	can be set before the program executes.
29626f9a767SRodney W. Grimes 	 */
29726f9a767SRodney W. Grimes 	if (p->p_flag & P_TRACED)
29826f9a767SRodney W. Grimes 		psignal(p, SIGTRAP);
29926f9a767SRodney W. Grimes 
30026f9a767SRodney W. Grimes 	/* clear "fork but no exec" flag, as we _are_ execing */
30126f9a767SRodney W. Grimes 	p->p_acflag &= ~AFORK;
30226f9a767SRodney W. Grimes 
30326f9a767SRodney W. Grimes 	/* Set entry address */
304797f2d22SPoul-Henning Kamp 	setregs(p, iparams->entry_addr, (u_long)stack_base);
30526f9a767SRodney W. Grimes 
30626f9a767SRodney W. Grimes 	/*
30726f9a767SRodney W. Grimes 	 * free various allocated resources
30826f9a767SRodney W. Grimes 	 */
30968940ac1SDavid Greenman 	if (vm_map_remove(exec_map, (vm_offset_t)iparams->stringbase,
31068940ac1SDavid Greenman 	    (vm_offset_t)iparams->stringbase + ARG_MAX))
31126f9a767SRodney W. Grimes 		panic("execve: string buffer dealloc failed (1)");
31268940ac1SDavid Greenman 	if (vm_map_remove(kernel_map, (vm_offset_t)image_header,
31368940ac1SDavid Greenman 	    (vm_offset_t)image_header + PAGE_SIZE))
31426f9a767SRodney W. Grimes 		panic("execve: header dealloc failed (2)");
315f5277ae7SDavid Greenman 	vrele(ndp->ni_vp);
31626f9a767SRodney W. Grimes 	FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI);
31726f9a767SRodney W. Grimes 
31826f9a767SRodney W. Grimes 	return (0);
31926f9a767SRodney W. Grimes 
32026f9a767SRodney W. Grimes exec_fail_dealloc:
32126f9a767SRodney W. Grimes 	if (iparams->stringbase && iparams->stringbase != (char *)-1)
32268940ac1SDavid Greenman 		if (vm_map_remove(exec_map, (vm_offset_t)iparams->stringbase,
32368940ac1SDavid Greenman 		    (vm_offset_t)iparams->stringbase + ARG_MAX))
32426f9a767SRodney W. Grimes 			panic("execve: string buffer dealloc failed (2)");
32526f9a767SRodney W. Grimes 	if (iparams->image_header && iparams->image_header != (char *)-1)
32668940ac1SDavid Greenman 		if (vm_map_remove(kernel_map, (vm_offset_t)image_header,
32768940ac1SDavid Greenman 		    (vm_offset_t)image_header + PAGE_SIZE))
32826f9a767SRodney W. Grimes 			panic("execve: header dealloc failed (3)");
329f5277ae7SDavid Greenman 	if (ndp->ni_vp)
330f5277ae7SDavid Greenman 		vrele(ndp->ni_vp);
33126f9a767SRodney W. Grimes 	FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI);
33226f9a767SRodney W. Grimes 
33326f9a767SRodney W. Grimes exec_fail:
33426f9a767SRodney W. Grimes 	if (iparams->vmspace_destroyed) {
33526f9a767SRodney W. Grimes 		/* sorry, no more process anymore. exit gracefully */
33626f9a767SRodney W. Grimes 		exit1(p, W_EXITCODE(0, SIGABRT));
33726f9a767SRodney W. Grimes 		/* NOT REACHED */
33826f9a767SRodney W. Grimes 		return(0);
33926f9a767SRodney W. Grimes 	} else {
34026f9a767SRodney W. Grimes 		return(error);
34126f9a767SRodney W. Grimes 	}
34226f9a767SRodney W. Grimes }
34326f9a767SRodney W. Grimes 
34426f9a767SRodney W. Grimes /*
34526f9a767SRodney W. Grimes  * Destroy old address space, and allocate a new stack
34626f9a767SRodney W. Grimes  *	The new stack is only SGROWSIZ large because it is grown
34726f9a767SRodney W. Grimes  *	automatically in trap.c.
34826f9a767SRodney W. Grimes  */
34926f9a767SRodney W. Grimes int
35026f9a767SRodney W. Grimes exec_new_vmspace(iparams)
35126f9a767SRodney W. Grimes 	struct image_params *iparams;
35226f9a767SRodney W. Grimes {
35326f9a767SRodney W. Grimes 	int error;
35426f9a767SRodney W. Grimes 	struct vmspace *vmspace = iparams->proc->p_vmspace;
35526f9a767SRodney W. Grimes 	caddr_t	stack_addr = (caddr_t) (USRSTACK - SGROWSIZ);
35626f9a767SRodney W. Grimes 
35726f9a767SRodney W. Grimes 	iparams->vmspace_destroyed = 1;
35826f9a767SRodney W. Grimes 
35926f9a767SRodney W. Grimes 	/* Blow away entire process VM */
360d74643dfSDavid Greenman #ifdef SYSVSHM
3613d903220SDoug Rabson 	if (vmspace->vm_shm)
3623d903220SDoug Rabson 		shmexit(iparams->proc);
363d74643dfSDavid Greenman #endif
36468940ac1SDavid Greenman 	vm_map_remove(&vmspace->vm_map, 0, USRSTACK);
36526f9a767SRodney W. Grimes 
36626f9a767SRodney W. Grimes 	/* Allocate a new stack */
36768940ac1SDavid Greenman 	error = vm_map_find(&vmspace->vm_map, NULL, 0, (vm_offset_t *)&stack_addr,
36826f9a767SRodney W. Grimes 	    SGROWSIZ, FALSE);
36926f9a767SRodney W. Grimes 	if (error)
37026f9a767SRodney W. Grimes 		return(error);
37126f9a767SRodney W. Grimes 
37226f9a767SRodney W. Grimes 	vmspace->vm_ssize = SGROWSIZ >> PAGE_SHIFT;
37326f9a767SRodney W. Grimes 
37426f9a767SRodney W. Grimes 	/* Initialize maximum stack address */
37526f9a767SRodney W. Grimes 	vmspace->vm_maxsaddr = (char *)USRSTACK - MAXSSIZ;
37626f9a767SRodney W. Grimes 
37726f9a767SRodney W. Grimes 	return(0);
37826f9a767SRodney W. Grimes }
37926f9a767SRodney W. Grimes 
38026f9a767SRodney W. Grimes /*
38126f9a767SRodney W. Grimes  * Copy out argument and environment strings from the old process
38226f9a767SRodney W. Grimes  *	address space into the temporary string buffer.
38326f9a767SRodney W. Grimes  */
38426f9a767SRodney W. Grimes int
38526f9a767SRodney W. Grimes exec_extract_strings(iparams)
38626f9a767SRodney W. Grimes 	struct image_params *iparams;
38726f9a767SRodney W. Grimes {
38826f9a767SRodney W. Grimes 	char	**argv, **envv;
38926f9a767SRodney W. Grimes 	char	*argp, *envp;
3900fd1a014SDavid Greenman 	int	error, length;
39126f9a767SRodney W. Grimes 
39226f9a767SRodney W. Grimes 	/*
39326f9a767SRodney W. Grimes 	 * extract arguments first
39426f9a767SRodney W. Grimes 	 */
39526f9a767SRodney W. Grimes 
39626f9a767SRodney W. Grimes 	argv = iparams->uap->argv;
39726f9a767SRodney W. Grimes 
3980fd1a014SDavid Greenman 	if (argv) {
399bb56ec4aSPoul-Henning Kamp 		while ((argp = (caddr_t) fuword(argv++))) {
40026f9a767SRodney W. Grimes 			if (argp == (caddr_t) -1)
40126f9a767SRodney W. Grimes 				return (EFAULT);
402bb56ec4aSPoul-Henning Kamp 			if ((error = copyinstr(argp, iparams->stringp,
403bb56ec4aSPoul-Henning Kamp 			    iparams->stringspace, &length))) {
4040fd1a014SDavid Greenman 				if (error == ENAMETOOLONG)
40526f9a767SRodney W. Grimes 					return(E2BIG);
4060fd1a014SDavid Greenman 				return (error);
4070fd1a014SDavid Greenman 			}
40826f9a767SRodney W. Grimes 			iparams->stringspace -= length;
40926f9a767SRodney W. Grimes 			iparams->stringp += length;
41026f9a767SRodney W. Grimes 			iparams->argc++;
41126f9a767SRodney W. Grimes 		}
4120fd1a014SDavid Greenman 	}
41326f9a767SRodney W. Grimes 
41426f9a767SRodney W. Grimes 	/*
41526f9a767SRodney W. Grimes 	 * extract environment strings
41626f9a767SRodney W. Grimes 	 */
41726f9a767SRodney W. Grimes 
41826f9a767SRodney W. Grimes 	envv = iparams->uap->envv;
41926f9a767SRodney W. Grimes 
4200fd1a014SDavid Greenman 	if (envv) {
421bb56ec4aSPoul-Henning Kamp 		while ((envp = (caddr_t) fuword(envv++))) {
42226f9a767SRodney W. Grimes 			if (envp == (caddr_t) -1)
42326f9a767SRodney W. Grimes 				return (EFAULT);
424bb56ec4aSPoul-Henning Kamp 			if ((error = copyinstr(envp, iparams->stringp,
425bb56ec4aSPoul-Henning Kamp 			    iparams->stringspace, &length))) {
4260fd1a014SDavid Greenman 				if (error == ENAMETOOLONG)
42726f9a767SRodney W. Grimes 					return(E2BIG);
4280fd1a014SDavid Greenman 				return (error);
4290fd1a014SDavid Greenman 			}
43026f9a767SRodney W. Grimes 			iparams->stringspace -= length;
43126f9a767SRodney W. Grimes 			iparams->stringp += length;
43226f9a767SRodney W. Grimes 			iparams->envc++;
43326f9a767SRodney W. Grimes 		}
4340fd1a014SDavid Greenman 	}
43526f9a767SRodney W. Grimes 
43626f9a767SRodney W. Grimes 	return (0);
43726f9a767SRodney W. Grimes }
43826f9a767SRodney W. Grimes 
43926f9a767SRodney W. Grimes /*
44026f9a767SRodney W. Grimes  * Copy strings out to the new process address space, constructing
44126f9a767SRodney W. Grimes  *	new arg and env vector tables. Return a pointer to the base
44226f9a767SRodney W. Grimes  *	so that it can be used as the initial stack pointer.
44326f9a767SRodney W. Grimes  */
44426f9a767SRodney W. Grimes int *
44526f9a767SRodney W. Grimes exec_copyout_strings(iparams)
44626f9a767SRodney W. Grimes 	struct image_params *iparams;
44726f9a767SRodney W. Grimes {
44826f9a767SRodney W. Grimes 	int argc, envc;
44926f9a767SRodney W. Grimes 	char **vectp;
45026f9a767SRodney W. Grimes 	char *stringp, *destp;
45126f9a767SRodney W. Grimes 	int *stack_base;
45293f6448cSDavid Greenman 	struct ps_strings *arginfo;
45326f9a767SRodney W. Grimes 
45426f9a767SRodney W. Grimes 	/*
45526f9a767SRodney W. Grimes 	 * Calculate string base and vector table pointers.
45626f9a767SRodney W. Grimes 	 */
45793f6448cSDavid Greenman 	arginfo = PS_STRINGS;
45893f6448cSDavid Greenman 	destp =	(caddr_t)arginfo - roundup((ARG_MAX - iparams->stringspace), sizeof(char *));
45926f9a767SRodney W. Grimes 	/*
46026f9a767SRodney W. Grimes 	 * The '+ 2' is for the null pointers at the end of each of the
46126f9a767SRodney W. Grimes 	 *	arg and	env vector sets
46226f9a767SRodney W. Grimes 	 */
46326f9a767SRodney W. Grimes 	vectp = (char **) (destp -
46426f9a767SRodney W. Grimes 		(iparams->argc + iparams->envc + 2) * sizeof(char *));
46526f9a767SRodney W. Grimes 
46626f9a767SRodney W. Grimes 	/*
46726f9a767SRodney W. Grimes 	 * vectp also becomes our initial stack base
46826f9a767SRodney W. Grimes 	 */
46926f9a767SRodney W. Grimes 	stack_base = (int *)vectp;
47026f9a767SRodney W. Grimes 
47126f9a767SRodney W. Grimes 	stringp = iparams->stringbase;
47226f9a767SRodney W. Grimes 	argc = iparams->argc;
47326f9a767SRodney W. Grimes 	envc = iparams->envc;
47426f9a767SRodney W. Grimes 
47593f6448cSDavid Greenman 	/*
4763aed948bSDavid Greenman 	 * Copy out strings - arguments and environment.
47793f6448cSDavid Greenman 	 */
4783aed948bSDavid Greenman 	copyout(stringp, destp, ARG_MAX - iparams->stringspace);
47993f6448cSDavid Greenman 
48093f6448cSDavid Greenman 	/*
4813aed948bSDavid Greenman 	 * Fill in "ps_strings" struct for ps, w, etc.
4823aed948bSDavid Greenman 	 */
4833aed948bSDavid Greenman 	suword(&arginfo->ps_argvstr, (int)destp);
4843aed948bSDavid Greenman 	suword(&arginfo->ps_nargvstr, argc);
4853aed948bSDavid Greenman 
4863aed948bSDavid Greenman 	/*
4873aed948bSDavid Greenman 	 * Fill in argument portion of vector table.
48893f6448cSDavid Greenman 	 */
48926f9a767SRodney W. Grimes 	for (; argc > 0; --argc) {
4903aed948bSDavid Greenman 		suword(vectp++, (int)destp);
4913aed948bSDavid Greenman 		while (*stringp++ != 0)
4923aed948bSDavid Greenman 			destp++;
4933aed948bSDavid Greenman 		destp++;
49426f9a767SRodney W. Grimes 	}
49526f9a767SRodney W. Grimes 
49626f9a767SRodney W. Grimes 	/* a null vector table pointer seperates the argp's from the envp's */
4973aed948bSDavid Greenman 	suword(vectp++, NULL);
49826f9a767SRodney W. Grimes 
4993aed948bSDavid Greenman 	suword(&arginfo->ps_envstr, (int)destp);
5003aed948bSDavid Greenman 	suword(&arginfo->ps_nenvstr, envc);
50193f6448cSDavid Greenman 
50293f6448cSDavid Greenman 	/*
5033aed948bSDavid Greenman 	 * Fill in environment portion of vector table.
50493f6448cSDavid Greenman 	 */
50526f9a767SRodney W. Grimes 	for (; envc > 0; --envc) {
5063aed948bSDavid Greenman 		suword(vectp++, (int)destp);
5073aed948bSDavid Greenman 		while (*stringp++ != 0)
5083aed948bSDavid Greenman 			destp++;
5093aed948bSDavid Greenman 		destp++;
51026f9a767SRodney W. Grimes 	}
51126f9a767SRodney W. Grimes 
51226f9a767SRodney W. Grimes 	/* end of vector table is a null pointer */
5133aed948bSDavid Greenman 	suword(vectp, NULL);
51426f9a767SRodney W. Grimes 
51526f9a767SRodney W. Grimes 	return (stack_base);
51626f9a767SRodney W. Grimes }
51726f9a767SRodney W. Grimes 
51826f9a767SRodney W. Grimes /*
51926f9a767SRodney W. Grimes  * Check permissions of file to execute.
52026f9a767SRodney W. Grimes  *	Return 0 for success or error code on failure.
52126f9a767SRodney W. Grimes  */
522f23b4c91SGarrett Wollman static int
52326f9a767SRodney W. Grimes exec_check_permissions(iparams)
52426f9a767SRodney W. Grimes 	struct image_params *iparams;
52526f9a767SRodney W. Grimes {
52626f9a767SRodney W. Grimes 	struct proc *p = iparams->proc;
52726f9a767SRodney W. Grimes 	struct vnode *vnodep = iparams->vnodep;
52826f9a767SRodney W. Grimes 	struct vattr *attr = iparams->attr;
52926f9a767SRodney W. Grimes 	int error;
53026f9a767SRodney W. Grimes 
53126f9a767SRodney W. Grimes 	/*
53226f9a767SRodney W. Grimes 	 * Check number of open-for-writes on the file and deny execution
53326f9a767SRodney W. Grimes 	 *	if there are any.
53426f9a767SRodney W. Grimes 	 */
53526f9a767SRodney W. Grimes 	if (vnodep->v_writecount) {
53626f9a767SRodney W. Grimes 		return (ETXTBSY);
53726f9a767SRodney W. Grimes 	}
53826f9a767SRodney W. Grimes 
53926f9a767SRodney W. Grimes 	/* Get file attributes */
54026f9a767SRodney W. Grimes 	error = VOP_GETATTR(vnodep, attr, p->p_ucred, p);
54126f9a767SRodney W. Grimes 	if (error)
54226f9a767SRodney W. Grimes 		return (error);
54326f9a767SRodney W. Grimes 
54426f9a767SRodney W. Grimes 	/*
54526f9a767SRodney W. Grimes 	 * 1) Check if file execution is disabled for the filesystem that this
54626f9a767SRodney W. Grimes 	 *	file resides on.
54726f9a767SRodney W. Grimes 	 * 2) Insure that at least one execute bit is on - otherwise root
54826f9a767SRodney W. Grimes 	 *	will always succeed, and we don't want to happen unless the
54926f9a767SRodney W. Grimes 	 *	file really is executable.
55026f9a767SRodney W. Grimes 	 * 3) Insure that the file is a regular file.
55126f9a767SRodney W. Grimes 	 */
55226f9a767SRodney W. Grimes 	if ((vnodep->v_mount->mnt_flag & MNT_NOEXEC) ||
55326f9a767SRodney W. Grimes 	    ((attr->va_mode & 0111) == 0) ||
55426f9a767SRodney W. Grimes 	    (attr->va_type != VREG)) {
55526f9a767SRodney W. Grimes 		return (EACCES);
55626f9a767SRodney W. Grimes 	}
55726f9a767SRodney W. Grimes 
55826f9a767SRodney W. Grimes 	/*
55926f9a767SRodney W. Grimes 	 * Zero length files can't be exec'd
56026f9a767SRodney W. Grimes 	 */
56126f9a767SRodney W. Grimes 	if (attr->va_size == 0)
56226f9a767SRodney W. Grimes 		return (ENOEXEC);
56326f9a767SRodney W. Grimes 
56426f9a767SRodney W. Grimes 	/*
56526f9a767SRodney W. Grimes 	 * Disable setuid/setgid if the filesystem prohibits it or if
56626f9a767SRodney W. Grimes 	 *	the process is being traced.
56726f9a767SRodney W. Grimes 	 */
56826f9a767SRodney W. Grimes         if ((vnodep->v_mount->mnt_flag & MNT_NOSUID) || (p->p_flag & P_TRACED))
56926f9a767SRodney W. Grimes 		attr->va_mode &= ~(VSUID | VSGID);
57026f9a767SRodney W. Grimes 
57126f9a767SRodney W. Grimes 	/*
57226f9a767SRodney W. Grimes 	 *  Check for execute permission to file based on current credentials.
57326f9a767SRodney W. Grimes 	 *	Then call filesystem specific open routine (which does nothing
57426f9a767SRodney W. Grimes 	 *	in the general case).
57526f9a767SRodney W. Grimes 	 */
57626f9a767SRodney W. Grimes 	error = VOP_ACCESS(vnodep, VEXEC, p->p_ucred, p);
57726f9a767SRodney W. Grimes 	if (error)
57826f9a767SRodney W. Grimes 		return (error);
57926f9a767SRodney W. Grimes 
58026f9a767SRodney W. Grimes 	error = VOP_OPEN(vnodep, FREAD, p->p_ucred, p);
58126f9a767SRodney W. Grimes 	if (error)
58226f9a767SRodney W. Grimes 		return (error);
58326f9a767SRodney W. Grimes 
58426f9a767SRodney W. Grimes 	return (0);
585df8bae1dSRodney W. Grimes }
586