126f9a767SRodney W. Grimes /* 226f9a767SRodney W. Grimes * Copyright (c) 1993, David Greenman 326f9a767SRodney W. Grimes * All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 14df8bae1dSRodney W. Grimes * must display the following acknowledgement: 1526f9a767SRodney W. Grimes * This product includes software developed by David Greenman 1626f9a767SRodney W. Grimes * 4. The name of the developer may not be used to endorse or promote products 1726f9a767SRodney W. Grimes * derived from this software without specific prior written permission. 18df8bae1dSRodney W. Grimes * 1926f9a767SRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 20df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2226f9a767SRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 23df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29df8bae1dSRodney W. Grimes * SUCH DAMAGE. 30df8bae1dSRodney W. Grimes * 31c52007c2SDavid Greenman * $Id: kern_exec.c,v 1.24 1995/10/21 08:38:11 davidg Exp $ 32df8bae1dSRodney W. Grimes */ 33df8bae1dSRodney W. Grimes 34df8bae1dSRodney W. Grimes #include <sys/param.h> 3526f9a767SRodney W. Grimes #include <sys/systm.h> 3626f9a767SRodney W. Grimes #include <sys/signalvar.h> 3726f9a767SRodney W. Grimes #include <sys/kernel.h> 3826f9a767SRodney W. Grimes #include <sys/mount.h> 39797f2d22SPoul-Henning Kamp #include <sys/filedesc.h> 40079cc25bSDavid Greenman #include <sys/fcntl.h> 4126f9a767SRodney W. Grimes #include <sys/acct.h> 4226f9a767SRodney W. Grimes #include <sys/exec.h> 4326f9a767SRodney W. Grimes #include <sys/imgact.h> 4426f9a767SRodney W. Grimes #include <sys/wait.h> 4526f9a767SRodney W. Grimes #include <sys/malloc.h> 461e1e0b44SSøren Schmidt #include <sys/sysent.h> 4726f9a767SRodney W. Grimes #include <sys/syslog.h> 48797f2d22SPoul-Henning Kamp #include <sys/shm.h> 4926f9a767SRodney W. Grimes 5026f9a767SRodney W. Grimes #include <vm/vm.h> 5126f9a767SRodney W. Grimes #include <vm/vm_kern.h> 5226f9a767SRodney W. Grimes 5326f9a767SRodney W. Grimes #include <machine/reg.h> 5426f9a767SRodney W. Grimes 5526f9a767SRodney W. Grimes int *exec_copyout_strings __P((struct image_params *)); 56df8bae1dSRodney W. Grimes 57f23b4c91SGarrett Wollman static int exec_check_permissions(struct image_params *); 58f23b4c91SGarrett Wollman 59df8bae1dSRodney W. Grimes /* 6026f9a767SRodney W. Grimes * execsw_set is constructed for us by the linker. Each of the items 6126f9a767SRodney W. Grimes * is a pointer to a `const struct execsw', hence the double pointer here. 62df8bae1dSRodney W. Grimes */ 6326f9a767SRodney W. Grimes const struct execsw **execsw = (const struct execsw **)&execsw_set.ls_items[0]; 6426f9a767SRodney W. Grimes 65ad7507e2SSteven Wallace struct execve_args { 66ad7507e2SSteven Wallace char *fname; 67ad7507e2SSteven Wallace char **argv; 68ad7507e2SSteven Wallace char **envv; 69ad7507e2SSteven Wallace }; 70ad7507e2SSteven Wallace 7126f9a767SRodney W. Grimes /* 7226f9a767SRodney W. Grimes * execve() system call. 7326f9a767SRodney W. Grimes */ 7426f9a767SRodney W. Grimes int 7526f9a767SRodney W. Grimes execve(p, uap, retval) 7626f9a767SRodney W. Grimes struct proc *p; 7726f9a767SRodney W. Grimes register struct execve_args *uap; 7826f9a767SRodney W. Grimes int *retval; 79df8bae1dSRodney W. Grimes { 8026f9a767SRodney W. Grimes struct nameidata nd, *ndp; 8126f9a767SRodney W. Grimes int *stack_base; 82bb56ec4aSPoul-Henning Kamp int error, len, i; 83c52007c2SDavid Greenman struct image_params image_params, *imgp; 8426f9a767SRodney W. Grimes struct vattr attr; 8526f9a767SRodney W. Grimes 86c52007c2SDavid Greenman imgp = &image_params; 87df8bae1dSRodney W. Grimes 88df8bae1dSRodney W. Grimes /* 89c52007c2SDavid Greenman * Initialize part of the common data 90df8bae1dSRodney W. Grimes */ 91c52007c2SDavid Greenman imgp->proc = p; 92c52007c2SDavid Greenman imgp->uap = uap; 93c52007c2SDavid Greenman imgp->attr = &attr; 94c52007c2SDavid Greenman imgp->image_header = NULL; 95c52007c2SDavid Greenman imgp->argc = imgp->envc = 0; 96c52007c2SDavid Greenman imgp->entry_addr = 0; 97c52007c2SDavid Greenman imgp->vmspace_destroyed = 0; 98c52007c2SDavid Greenman imgp->interpreted = 0; 99c52007c2SDavid Greenman imgp->interpreter_name[0] = '\0'; 10026f9a767SRodney W. Grimes 10126f9a767SRodney W. Grimes /* 10226f9a767SRodney W. Grimes * Allocate temporary demand zeroed space for argument and 10326f9a767SRodney W. Grimes * environment strings 10426f9a767SRodney W. Grimes */ 105c52007c2SDavid Greenman imgp->stringbase = (char *)vm_map_min(exec_map); 106c52007c2SDavid Greenman error = vm_map_find(exec_map, NULL, 0, (vm_offset_t *)&imgp->stringbase, 10726f9a767SRodney W. Grimes ARG_MAX, TRUE); 10826f9a767SRodney W. Grimes if (error) { 10926f9a767SRodney W. Grimes log(LOG_WARNING, "execve: failed to allocate string space\n"); 11026f9a767SRodney W. Grimes return (error); 11126f9a767SRodney W. Grimes } 11226f9a767SRodney W. Grimes 113c52007c2SDavid Greenman if (!imgp->stringbase) { 11426f9a767SRodney W. Grimes error = ENOMEM; 11526f9a767SRodney W. Grimes goto exec_fail; 11626f9a767SRodney W. Grimes } 117c52007c2SDavid Greenman imgp->stringp = imgp->stringbase; 118c52007c2SDavid Greenman imgp->stringspace = ARG_MAX; 11926f9a767SRodney W. Grimes 12026f9a767SRodney W. Grimes /* 12126f9a767SRodney W. Grimes * Translate the file name. namei() returns a vnode pointer 12226f9a767SRodney W. Grimes * in ni_vp amoung other things. 12326f9a767SRodney W. Grimes */ 12426f9a767SRodney W. Grimes ndp = &nd; 125b35ba931SDavid Greenman NDINIT(ndp, LOOKUP, LOCKLEAF | FOLLOW | SAVENAME, 1263ed8a403SDavid Greenman UIO_USERSPACE, uap->fname, p); 12726f9a767SRodney W. Grimes 12826f9a767SRodney W. Grimes interpret: 12926f9a767SRodney W. Grimes 13026f9a767SRodney W. Grimes error = namei(ndp); 13126f9a767SRodney W. Grimes if (error) { 132c52007c2SDavid Greenman vm_map_remove(exec_map, (vm_offset_t)imgp->stringbase, 133c52007c2SDavid Greenman (vm_offset_t)imgp->stringbase + ARG_MAX); 13426f9a767SRodney W. Grimes goto exec_fail; 13526f9a767SRodney W. Grimes } 13626f9a767SRodney W. Grimes 137c52007c2SDavid Greenman imgp->vp = ndp->ni_vp; 138c52007c2SDavid Greenman if (imgp->vp == NULL) { 13926f9a767SRodney W. Grimes error = ENOEXEC; 14026f9a767SRodney W. Grimes goto exec_fail_dealloc; 14126f9a767SRodney W. Grimes } 14226f9a767SRodney W. Grimes 14326f9a767SRodney W. Grimes /* 1449022e4adSDavid Greenman * Check file permissions (also 'opens' file) 1459022e4adSDavid Greenman */ 146c52007c2SDavid Greenman error = exec_check_permissions(imgp); 1479022e4adSDavid Greenman 1489022e4adSDavid Greenman /* 1499022e4adSDavid Greenman * Lose the lock on the vnode. It's no longer needed, and must not 150f5277ae7SDavid Greenman * exist for the pagefault paging to work below. 151f5277ae7SDavid Greenman */ 152c52007c2SDavid Greenman VOP_UNLOCK(imgp->vp); 153f5277ae7SDavid Greenman 15426f9a767SRodney W. Grimes if (error) 15526f9a767SRodney W. Grimes goto exec_fail_dealloc; 15626f9a767SRodney W. Grimes 15726f9a767SRodney W. Grimes /* 15826f9a767SRodney W. Grimes * Map the image header (first page) of the file into 15926f9a767SRodney W. Grimes * kernel address space 16026f9a767SRodney W. Grimes */ 16126f9a767SRodney W. Grimes error = vm_mmap(kernel_map, /* map */ 162c52007c2SDavid Greenman (vm_offset_t *)&imgp->image_header, /* address */ 16326f9a767SRodney W. Grimes PAGE_SIZE, /* size */ 16426f9a767SRodney W. Grimes VM_PROT_READ, /* protection */ 16526f9a767SRodney W. Grimes VM_PROT_READ, /* max protection */ 16626f9a767SRodney W. Grimes 0, /* flags */ 167c52007c2SDavid Greenman (caddr_t)imgp->vp, /* vnode */ 16826f9a767SRodney W. Grimes 0); /* offset */ 16926f9a767SRodney W. Grimes if (error) { 17026f9a767SRodney W. Grimes uprintf("mmap failed: %d\n",error); 17126f9a767SRodney W. Grimes goto exec_fail_dealloc; 17226f9a767SRodney W. Grimes } 17326f9a767SRodney W. Grimes 17426f9a767SRodney W. Grimes /* 17526f9a767SRodney W. Grimes * Loop through list of image activators, calling each one. 17626f9a767SRodney W. Grimes * If there is no match, the activator returns -1. If there 17726f9a767SRodney W. Grimes * is a match, but there was an error during the activation, 17826f9a767SRodney W. Grimes * the error is returned. Otherwise 0 means success. If the 17926f9a767SRodney W. Grimes * image is interpreted, loop back up and try activating 18026f9a767SRodney W. Grimes * the interpreter. 18126f9a767SRodney W. Grimes */ 18226f9a767SRodney W. Grimes for (i = 0; execsw[i]; ++i) { 18326f9a767SRodney W. Grimes if (execsw[i]->ex_imgact) 184c52007c2SDavid Greenman error = (*execsw[i]->ex_imgact)(imgp); 18526f9a767SRodney W. Grimes else 18626f9a767SRodney W. Grimes continue; 18726f9a767SRodney W. Grimes 18826f9a767SRodney W. Grimes if (error == -1) 18926f9a767SRodney W. Grimes continue; 19026f9a767SRodney W. Grimes if (error) 19126f9a767SRodney W. Grimes goto exec_fail_dealloc; 192c52007c2SDavid Greenman if (imgp->interpreted) { 19326f9a767SRodney W. Grimes /* free old vnode and name buffer */ 194f5277ae7SDavid Greenman vrele(ndp->ni_vp); 19526f9a767SRodney W. Grimes FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI); 196c52007c2SDavid Greenman if (vm_map_remove(kernel_map, (vm_offset_t)imgp->image_header, 197c52007c2SDavid Greenman (vm_offset_t)imgp->image_header + PAGE_SIZE)) 19826f9a767SRodney W. Grimes panic("execve: header dealloc failed (1)"); 19926f9a767SRodney W. Grimes 20026f9a767SRodney W. Grimes /* set new name to that of the interpreter */ 201b35ba931SDavid Greenman NDINIT(ndp, LOOKUP, LOCKLEAF | FOLLOW | SAVENAME, 202c52007c2SDavid Greenman UIO_SYSSPACE, imgp->interpreter_name, p); 20326f9a767SRodney W. Grimes goto interpret; 20426f9a767SRodney W. Grimes } 20526f9a767SRodney W. Grimes break; 20626f9a767SRodney W. Grimes } 20726f9a767SRodney W. Grimes /* If we made it through all the activators and none matched, exit. */ 20826f9a767SRodney W. Grimes if (error == -1) { 20926f9a767SRodney W. Grimes error = ENOEXEC; 21026f9a767SRodney W. Grimes goto exec_fail_dealloc; 21126f9a767SRodney W. Grimes } 21226f9a767SRodney W. Grimes 21326f9a767SRodney W. Grimes /* 21426f9a767SRodney W. Grimes * Copy out strings (args and env) and initialize stack base 21526f9a767SRodney W. Grimes */ 216c52007c2SDavid Greenman stack_base = exec_copyout_strings(imgp); 21726f9a767SRodney W. Grimes p->p_vmspace->vm_minsaddr = (char *)stack_base; 21826f9a767SRodney W. Grimes 21926f9a767SRodney W. Grimes /* 2201e1e0b44SSøren Schmidt * If custom stack fixup routine present for this process 2211e1e0b44SSøren Schmidt * let it do the stack setup. 2221e1e0b44SSøren Schmidt * Else stuff argument count as first item on stack 22326f9a767SRodney W. Grimes */ 2241e1e0b44SSøren Schmidt if (p->p_sysent->sv_fixup) 225c52007c2SDavid Greenman (*p->p_sysent->sv_fixup)(&stack_base, imgp); 2261e1e0b44SSøren Schmidt else 227c52007c2SDavid Greenman suword(--stack_base, imgp->argc); 22826f9a767SRodney W. Grimes 22926f9a767SRodney W. Grimes /* close files on exec */ 23026f9a767SRodney W. Grimes fdcloseexec(p); 23126f9a767SRodney W. Grimes 23226f9a767SRodney W. Grimes /* reset caught signals */ 23326f9a767SRodney W. Grimes execsigs(p); 23426f9a767SRodney W. Grimes 23526f9a767SRodney W. Grimes /* name this process - nameiexec(p, ndp) */ 23626f9a767SRodney W. Grimes len = min(ndp->ni_cnd.cn_namelen,MAXCOMLEN); 23726f9a767SRodney W. Grimes bcopy(ndp->ni_cnd.cn_nameptr, p->p_comm, len); 23826f9a767SRodney W. Grimes p->p_comm[len] = 0; 23926f9a767SRodney W. Grimes 24026f9a767SRodney W. Grimes /* 24126f9a767SRodney W. Grimes * mark as executable, wakeup any process that was vforked and tell 24226f9a767SRodney W. Grimes * it that it now has it's own resources back 24326f9a767SRodney W. Grimes */ 24426f9a767SRodney W. Grimes p->p_flag |= P_EXEC; 24526f9a767SRodney W. Grimes if (p->p_pptr && (p->p_flag & P_PPWAIT)) { 24626f9a767SRodney W. Grimes p->p_flag &= ~P_PPWAIT; 24726f9a767SRodney W. Grimes wakeup((caddr_t)p->p_pptr); 24826f9a767SRodney W. Grimes } 24926f9a767SRodney W. Grimes 25026f9a767SRodney W. Grimes /* 251c52007c2SDavid Greenman * Implement image setuid/setgid. Disallow if the process is 252c52007c2SDavid Greenman * being traced. 253c52007c2SDavid Greenman */ 254c52007c2SDavid Greenman if ((attr.va_mode & (VSUID | VSGID)) && 255c52007c2SDavid Greenman (p->p_flag & P_TRACED) == 0) { 256c52007c2SDavid Greenman /* 257c52007c2SDavid Greenman * Turn off syscall tracing for set-id programs, except for 25826f9a767SRodney W. Grimes * root. 25926f9a767SRodney W. Grimes */ 260c52007c2SDavid Greenman if (p->p_tracep && suser(p->p_ucred, &p->p_acflag)) { 26126f9a767SRodney W. Grimes p->p_traceflag = 0; 26226f9a767SRodney W. Grimes vrele(p->p_tracep); 263c52007c2SDavid Greenman p->p_tracep = NULL; 26426f9a767SRodney W. Grimes } 265c52007c2SDavid Greenman /* 266c52007c2SDavid Greenman * Set the new credentials. 267c52007c2SDavid Greenman */ 26826f9a767SRodney W. Grimes p->p_ucred = crcopy(p->p_ucred); 269c52007c2SDavid Greenman if (attr.va_mode & VSUID) 27026f9a767SRodney W. Grimes p->p_ucred->cr_uid = attr.va_uid; 271c52007c2SDavid Greenman if (attr.va_mode & VSGID) 27226f9a767SRodney W. Grimes p->p_ucred->cr_groups[0] = attr.va_gid; 27326f9a767SRodney W. Grimes p->p_flag |= P_SUGID; 274c52007c2SDavid Greenman } else { 275c52007c2SDavid Greenman p->p_flag &= ~P_SUGID; 27626f9a767SRodney W. Grimes } 27726f9a767SRodney W. Grimes 27826f9a767SRodney W. Grimes /* 279c52007c2SDavid Greenman * Implement correct POSIX saved-id behavior. 28026f9a767SRodney W. Grimes */ 28126f9a767SRodney W. Grimes p->p_cred->p_svuid = p->p_ucred->cr_uid; 28226f9a767SRodney W. Grimes p->p_cred->p_svgid = p->p_ucred->cr_gid; 28326f9a767SRodney W. Grimes 28426f9a767SRodney W. Grimes /* 2852a531c80SDavid Greenman * Store the vp for use in procfs 2862a531c80SDavid Greenman */ 2872a531c80SDavid Greenman if (p->p_textvp) /* release old reference */ 2882a531c80SDavid Greenman vrele(p->p_textvp); 2892a531c80SDavid Greenman VREF(ndp->ni_vp); 2902a531c80SDavid Greenman p->p_textvp = ndp->ni_vp; 2912a531c80SDavid Greenman 2922a531c80SDavid Greenman /* 29326f9a767SRodney W. Grimes * If tracing the process, trap to debugger so breakpoints 29426f9a767SRodney W. Grimes * can be set before the program executes. 29526f9a767SRodney W. Grimes */ 29626f9a767SRodney W. Grimes if (p->p_flag & P_TRACED) 29726f9a767SRodney W. Grimes psignal(p, SIGTRAP); 29826f9a767SRodney W. Grimes 29926f9a767SRodney W. Grimes /* clear "fork but no exec" flag, as we _are_ execing */ 30026f9a767SRodney W. Grimes p->p_acflag &= ~AFORK; 30126f9a767SRodney W. Grimes 30226f9a767SRodney W. Grimes /* Set entry address */ 303c52007c2SDavid Greenman setregs(p, imgp->entry_addr, (u_long)stack_base); 30426f9a767SRodney W. Grimes 30526f9a767SRodney W. Grimes /* 30626f9a767SRodney W. Grimes * free various allocated resources 30726f9a767SRodney W. Grimes */ 308c52007c2SDavid Greenman if (vm_map_remove(exec_map, (vm_offset_t)imgp->stringbase, 309c52007c2SDavid Greenman (vm_offset_t)imgp->stringbase + ARG_MAX)) 31026f9a767SRodney W. Grimes panic("execve: string buffer dealloc failed (1)"); 311c52007c2SDavid Greenman if (vm_map_remove(kernel_map, (vm_offset_t)imgp->image_header, 312c52007c2SDavid Greenman (vm_offset_t)imgp->image_header + PAGE_SIZE)) 31326f9a767SRodney W. Grimes panic("execve: header dealloc failed (2)"); 314f5277ae7SDavid Greenman vrele(ndp->ni_vp); 31526f9a767SRodney W. Grimes FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI); 31626f9a767SRodney W. Grimes 31726f9a767SRodney W. Grimes return (0); 31826f9a767SRodney W. Grimes 31926f9a767SRodney W. Grimes exec_fail_dealloc: 320c52007c2SDavid Greenman if (imgp->stringbase && imgp->stringbase != (char *)-1) 321c52007c2SDavid Greenman if (vm_map_remove(exec_map, (vm_offset_t)imgp->stringbase, 322c52007c2SDavid Greenman (vm_offset_t)imgp->stringbase + ARG_MAX)) 32326f9a767SRodney W. Grimes panic("execve: string buffer dealloc failed (2)"); 324c52007c2SDavid Greenman if (imgp->image_header && imgp->image_header != (char *)-1) 325c52007c2SDavid Greenman if (vm_map_remove(kernel_map, (vm_offset_t)imgp->image_header, 326c52007c2SDavid Greenman (vm_offset_t)imgp->image_header + PAGE_SIZE)) 32726f9a767SRodney W. Grimes panic("execve: header dealloc failed (3)"); 328f5277ae7SDavid Greenman if (ndp->ni_vp) 329f5277ae7SDavid Greenman vrele(ndp->ni_vp); 33026f9a767SRodney W. Grimes FREE(ndp->ni_cnd.cn_pnbuf, M_NAMEI); 33126f9a767SRodney W. Grimes 33226f9a767SRodney W. Grimes exec_fail: 333c52007c2SDavid Greenman if (imgp->vmspace_destroyed) { 33426f9a767SRodney W. Grimes /* sorry, no more process anymore. exit gracefully */ 33526f9a767SRodney W. Grimes exit1(p, W_EXITCODE(0, SIGABRT)); 33626f9a767SRodney W. Grimes /* NOT REACHED */ 33726f9a767SRodney W. Grimes return(0); 33826f9a767SRodney W. Grimes } else { 33926f9a767SRodney W. Grimes return(error); 34026f9a767SRodney W. Grimes } 34126f9a767SRodney W. Grimes } 34226f9a767SRodney W. Grimes 34326f9a767SRodney W. Grimes /* 34426f9a767SRodney W. Grimes * Destroy old address space, and allocate a new stack 34526f9a767SRodney W. Grimes * The new stack is only SGROWSIZ large because it is grown 34626f9a767SRodney W. Grimes * automatically in trap.c. 34726f9a767SRodney W. Grimes */ 34826f9a767SRodney W. Grimes int 349c52007c2SDavid Greenman exec_new_vmspace(imgp) 350c52007c2SDavid Greenman struct image_params *imgp; 35126f9a767SRodney W. Grimes { 35226f9a767SRodney W. Grimes int error; 353c52007c2SDavid Greenman struct vmspace *vmspace = imgp->proc->p_vmspace; 35426f9a767SRodney W. Grimes caddr_t stack_addr = (caddr_t) (USRSTACK - SGROWSIZ); 35526f9a767SRodney W. Grimes 356c52007c2SDavid Greenman imgp->vmspace_destroyed = 1; 35726f9a767SRodney W. Grimes 35826f9a767SRodney W. Grimes /* Blow away entire process VM */ 359d74643dfSDavid Greenman #ifdef SYSVSHM 3603d903220SDoug Rabson if (vmspace->vm_shm) 361c52007c2SDavid Greenman shmexit(imgp->proc); 362d74643dfSDavid Greenman #endif 36368940ac1SDavid Greenman vm_map_remove(&vmspace->vm_map, 0, USRSTACK); 36426f9a767SRodney W. Grimes 36526f9a767SRodney W. Grimes /* Allocate a new stack */ 36668940ac1SDavid Greenman error = vm_map_find(&vmspace->vm_map, NULL, 0, (vm_offset_t *)&stack_addr, 36726f9a767SRodney W. Grimes SGROWSIZ, FALSE); 36826f9a767SRodney W. Grimes if (error) 36926f9a767SRodney W. Grimes return(error); 37026f9a767SRodney W. Grimes 37126f9a767SRodney W. Grimes vmspace->vm_ssize = SGROWSIZ >> PAGE_SHIFT; 37226f9a767SRodney W. Grimes 37326f9a767SRodney W. Grimes /* Initialize maximum stack address */ 37426f9a767SRodney W. Grimes vmspace->vm_maxsaddr = (char *)USRSTACK - MAXSSIZ; 37526f9a767SRodney W. Grimes 37626f9a767SRodney W. Grimes return(0); 37726f9a767SRodney W. Grimes } 37826f9a767SRodney W. Grimes 37926f9a767SRodney W. Grimes /* 38026f9a767SRodney W. Grimes * Copy out argument and environment strings from the old process 38126f9a767SRodney W. Grimes * address space into the temporary string buffer. 38226f9a767SRodney W. Grimes */ 38326f9a767SRodney W. Grimes int 384c52007c2SDavid Greenman exec_extract_strings(imgp) 385c52007c2SDavid Greenman struct image_params *imgp; 38626f9a767SRodney W. Grimes { 38726f9a767SRodney W. Grimes char **argv, **envv; 38826f9a767SRodney W. Grimes char *argp, *envp; 3890fd1a014SDavid Greenman int error, length; 39026f9a767SRodney W. Grimes 39126f9a767SRodney W. Grimes /* 39226f9a767SRodney W. Grimes * extract arguments first 39326f9a767SRodney W. Grimes */ 39426f9a767SRodney W. Grimes 395c52007c2SDavid Greenman argv = imgp->uap->argv; 39626f9a767SRodney W. Grimes 3970fd1a014SDavid Greenman if (argv) { 398bb56ec4aSPoul-Henning Kamp while ((argp = (caddr_t) fuword(argv++))) { 39926f9a767SRodney W. Grimes if (argp == (caddr_t) -1) 40026f9a767SRodney W. Grimes return (EFAULT); 401c52007c2SDavid Greenman if ((error = copyinstr(argp, imgp->stringp, 402c52007c2SDavid Greenman imgp->stringspace, &length))) { 4030fd1a014SDavid Greenman if (error == ENAMETOOLONG) 40426f9a767SRodney W. Grimes return(E2BIG); 4050fd1a014SDavid Greenman return (error); 4060fd1a014SDavid Greenman } 407c52007c2SDavid Greenman imgp->stringspace -= length; 408c52007c2SDavid Greenman imgp->stringp += length; 409c52007c2SDavid Greenman imgp->argc++; 41026f9a767SRodney W. Grimes } 4110fd1a014SDavid Greenman } 41226f9a767SRodney W. Grimes 41326f9a767SRodney W. Grimes /* 41426f9a767SRodney W. Grimes * extract environment strings 41526f9a767SRodney W. Grimes */ 41626f9a767SRodney W. Grimes 417c52007c2SDavid Greenman envv = imgp->uap->envv; 41826f9a767SRodney W. Grimes 4190fd1a014SDavid Greenman if (envv) { 420bb56ec4aSPoul-Henning Kamp while ((envp = (caddr_t) fuword(envv++))) { 42126f9a767SRodney W. Grimes if (envp == (caddr_t) -1) 42226f9a767SRodney W. Grimes return (EFAULT); 423c52007c2SDavid Greenman if ((error = copyinstr(envp, imgp->stringp, 424c52007c2SDavid Greenman imgp->stringspace, &length))) { 4250fd1a014SDavid Greenman if (error == ENAMETOOLONG) 42626f9a767SRodney W. Grimes return(E2BIG); 4270fd1a014SDavid Greenman return (error); 4280fd1a014SDavid Greenman } 429c52007c2SDavid Greenman imgp->stringspace -= length; 430c52007c2SDavid Greenman imgp->stringp += length; 431c52007c2SDavid Greenman imgp->envc++; 43226f9a767SRodney W. Grimes } 4330fd1a014SDavid Greenman } 43426f9a767SRodney W. Grimes 43526f9a767SRodney W. Grimes return (0); 43626f9a767SRodney W. Grimes } 43726f9a767SRodney W. Grimes 43826f9a767SRodney W. Grimes /* 43926f9a767SRodney W. Grimes * Copy strings out to the new process address space, constructing 44026f9a767SRodney W. Grimes * new arg and env vector tables. Return a pointer to the base 44126f9a767SRodney W. Grimes * so that it can be used as the initial stack pointer. 44226f9a767SRodney W. Grimes */ 44326f9a767SRodney W. Grimes int * 444c52007c2SDavid Greenman exec_copyout_strings(imgp) 445c52007c2SDavid Greenman struct image_params *imgp; 44626f9a767SRodney W. Grimes { 44726f9a767SRodney W. Grimes int argc, envc; 44826f9a767SRodney W. Grimes char **vectp; 44926f9a767SRodney W. Grimes char *stringp, *destp; 45026f9a767SRodney W. Grimes int *stack_base; 45193f6448cSDavid Greenman struct ps_strings *arginfo; 45226f9a767SRodney W. Grimes 45326f9a767SRodney W. Grimes /* 45426f9a767SRodney W. Grimes * Calculate string base and vector table pointers. 45526f9a767SRodney W. Grimes */ 45693f6448cSDavid Greenman arginfo = PS_STRINGS; 457c52007c2SDavid Greenman destp = (caddr_t)arginfo - roundup((ARG_MAX - imgp->stringspace), sizeof(char *)); 45826f9a767SRodney W. Grimes /* 45926f9a767SRodney W. Grimes * The '+ 2' is for the null pointers at the end of each of the 46026f9a767SRodney W. Grimes * arg and env vector sets 46126f9a767SRodney W. Grimes */ 46226f9a767SRodney W. Grimes vectp = (char **) (destp - 463c52007c2SDavid Greenman (imgp->argc + imgp->envc + 2) * sizeof(char *)); 46426f9a767SRodney W. Grimes 46526f9a767SRodney W. Grimes /* 46626f9a767SRodney W. Grimes * vectp also becomes our initial stack base 46726f9a767SRodney W. Grimes */ 46826f9a767SRodney W. Grimes stack_base = (int *)vectp; 46926f9a767SRodney W. Grimes 470c52007c2SDavid Greenman stringp = imgp->stringbase; 471c52007c2SDavid Greenman argc = imgp->argc; 472c52007c2SDavid Greenman envc = imgp->envc; 47326f9a767SRodney W. Grimes 47493f6448cSDavid Greenman /* 4753aed948bSDavid Greenman * Copy out strings - arguments and environment. 47693f6448cSDavid Greenman */ 477c52007c2SDavid Greenman copyout(stringp, destp, ARG_MAX - imgp->stringspace); 47893f6448cSDavid Greenman 47993f6448cSDavid Greenman /* 4803aed948bSDavid Greenman * Fill in "ps_strings" struct for ps, w, etc. 4813aed948bSDavid Greenman */ 4823aed948bSDavid Greenman suword(&arginfo->ps_argvstr, (int)destp); 4833aed948bSDavid Greenman suword(&arginfo->ps_nargvstr, argc); 4843aed948bSDavid Greenman 4853aed948bSDavid Greenman /* 4863aed948bSDavid Greenman * Fill in argument portion of vector table. 48793f6448cSDavid Greenman */ 48826f9a767SRodney W. Grimes for (; argc > 0; --argc) { 4893aed948bSDavid Greenman suword(vectp++, (int)destp); 4903aed948bSDavid Greenman while (*stringp++ != 0) 4913aed948bSDavid Greenman destp++; 4923aed948bSDavid Greenman destp++; 49326f9a767SRodney W. Grimes } 49426f9a767SRodney W. Grimes 49526f9a767SRodney W. Grimes /* a null vector table pointer seperates the argp's from the envp's */ 4963aed948bSDavid Greenman suword(vectp++, NULL); 49726f9a767SRodney W. Grimes 4983aed948bSDavid Greenman suword(&arginfo->ps_envstr, (int)destp); 4993aed948bSDavid Greenman suword(&arginfo->ps_nenvstr, envc); 50093f6448cSDavid Greenman 50193f6448cSDavid Greenman /* 5023aed948bSDavid Greenman * Fill in environment portion of vector table. 50393f6448cSDavid Greenman */ 50426f9a767SRodney W. Grimes for (; envc > 0; --envc) { 5053aed948bSDavid Greenman suword(vectp++, (int)destp); 5063aed948bSDavid Greenman while (*stringp++ != 0) 5073aed948bSDavid Greenman destp++; 5083aed948bSDavid Greenman destp++; 50926f9a767SRodney W. Grimes } 51026f9a767SRodney W. Grimes 51126f9a767SRodney W. Grimes /* end of vector table is a null pointer */ 5123aed948bSDavid Greenman suword(vectp, NULL); 51326f9a767SRodney W. Grimes 51426f9a767SRodney W. Grimes return (stack_base); 51526f9a767SRodney W. Grimes } 51626f9a767SRodney W. Grimes 51726f9a767SRodney W. Grimes /* 51826f9a767SRodney W. Grimes * Check permissions of file to execute. 51926f9a767SRodney W. Grimes * Return 0 for success or error code on failure. 52026f9a767SRodney W. Grimes */ 521f23b4c91SGarrett Wollman static int 522c52007c2SDavid Greenman exec_check_permissions(imgp) 523c52007c2SDavid Greenman struct image_params *imgp; 52426f9a767SRodney W. Grimes { 525c52007c2SDavid Greenman struct proc *p = imgp->proc; 526c52007c2SDavid Greenman struct vnode *vp = imgp->vp; 527c52007c2SDavid Greenman struct vattr *attr = imgp->attr; 52826f9a767SRodney W. Grimes int error; 52926f9a767SRodney W. Grimes 53026f9a767SRodney W. Grimes /* 53126f9a767SRodney W. Grimes * Check number of open-for-writes on the file and deny execution 53226f9a767SRodney W. Grimes * if there are any. 53326f9a767SRodney W. Grimes */ 534c52007c2SDavid Greenman if (vp->v_writecount) { 53526f9a767SRodney W. Grimes return (ETXTBSY); 53626f9a767SRodney W. Grimes } 53726f9a767SRodney W. Grimes 53826f9a767SRodney W. Grimes /* Get file attributes */ 539c52007c2SDavid Greenman error = VOP_GETATTR(vp, attr, p->p_ucred, p); 54026f9a767SRodney W. Grimes if (error) 54126f9a767SRodney W. Grimes return (error); 54226f9a767SRodney W. Grimes 54326f9a767SRodney W. Grimes /* 54426f9a767SRodney W. Grimes * 1) Check if file execution is disabled for the filesystem that this 54526f9a767SRodney W. Grimes * file resides on. 54626f9a767SRodney W. Grimes * 2) Insure that at least one execute bit is on - otherwise root 54726f9a767SRodney W. Grimes * will always succeed, and we don't want to happen unless the 54826f9a767SRodney W. Grimes * file really is executable. 54926f9a767SRodney W. Grimes * 3) Insure that the file is a regular file. 55026f9a767SRodney W. Grimes */ 551c52007c2SDavid Greenman if ((vp->v_mount->mnt_flag & MNT_NOEXEC) || 55226f9a767SRodney W. Grimes ((attr->va_mode & 0111) == 0) || 55326f9a767SRodney W. Grimes (attr->va_type != VREG)) { 55426f9a767SRodney W. Grimes return (EACCES); 55526f9a767SRodney W. Grimes } 55626f9a767SRodney W. Grimes 55726f9a767SRodney W. Grimes /* 55826f9a767SRodney W. Grimes * Zero length files can't be exec'd 55926f9a767SRodney W. Grimes */ 56026f9a767SRodney W. Grimes if (attr->va_size == 0) 56126f9a767SRodney W. Grimes return (ENOEXEC); 56226f9a767SRodney W. Grimes 56326f9a767SRodney W. Grimes /* 56426f9a767SRodney W. Grimes * Disable setuid/setgid if the filesystem prohibits it or if 56526f9a767SRodney W. Grimes * the process is being traced. 56626f9a767SRodney W. Grimes */ 567c52007c2SDavid Greenman if ((vp->v_mount->mnt_flag & MNT_NOSUID) || (p->p_flag & P_TRACED)) 56826f9a767SRodney W. Grimes attr->va_mode &= ~(VSUID | VSGID); 56926f9a767SRodney W. Grimes 57026f9a767SRodney W. Grimes /* 57126f9a767SRodney W. Grimes * Check for execute permission to file based on current credentials. 57226f9a767SRodney W. Grimes * Then call filesystem specific open routine (which does nothing 57326f9a767SRodney W. Grimes * in the general case). 57426f9a767SRodney W. Grimes */ 575c52007c2SDavid Greenman error = VOP_ACCESS(vp, VEXEC, p->p_ucred, p); 57626f9a767SRodney W. Grimes if (error) 57726f9a767SRodney W. Grimes return (error); 57826f9a767SRodney W. Grimes 579c52007c2SDavid Greenman error = VOP_OPEN(vp, FREAD, p->p_ucred, p); 58026f9a767SRodney W. Grimes if (error) 58126f9a767SRodney W. Grimes return (error); 58226f9a767SRodney W. Grimes 58326f9a767SRodney W. Grimes return (0); 584df8bae1dSRodney W. Grimes } 585