195 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			195 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* This file handles the EXEC system call.  It performs the work as follows:
 | |
|  *    - see if the permissions allow the file to be executed
 | |
|  *    - read the header and extract the sizes
 | |
|  *    - fetch the initial args and environment from the user space
 | |
|  *    - allocate the memory for the new process
 | |
|  *    - copy the initial stack from PM to the process
 | |
|  *    - read in the text and data segments and copy to the process
 | |
|  *    - take care of setuid and setgid bits
 | |
|  *    - fix up 'mproc' table
 | |
|  *    - tell kernel about EXEC
 | |
|  *    - save offset to initial argc (for ps)
 | |
|  *
 | |
|  * The entry points into this file are:
 | |
|  *   do_exec:	 perform the EXEC system call
 | |
|  *   exec_newmem: allocate new memory map for a process that tries to exec
 | |
|  *   do_execrestart: finish the special exec call for RS
 | |
|  *   exec_restart: finish a regular exec call
 | |
|  *   find_share: find a process whose text segment can be shared
 | |
|  */
 | |
| 
 | |
| #include "pm.h"
 | |
| #include <sys/stat.h>
 | |
| #include <minix/callnr.h>
 | |
| #include <minix/endpoint.h>
 | |
| #include <minix/com.h>
 | |
| #include <minix/vm.h>
 | |
| #include <a.out.h>
 | |
| #include <signal.h>
 | |
| #include <string.h>
 | |
| #include "mproc.h"
 | |
| #include "param.h"
 | |
| 
 | |
| #define ESCRIPT	(-2000)	/* Returned by read_header for a #! script. */
 | |
| #define PTRSIZE	sizeof(char *) /* Size of pointers in argv[] and envp[]. */
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *				do_exec					     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_exec()
 | |
| {
 | |
| 	int r;
 | |
| 
 | |
| 	/* Save parameters */
 | |
| 	mp->mp_exec_path= m_in.exec_name;
 | |
| 	mp->mp_exec_path_len= m_in.exec_len;
 | |
| 	mp->mp_exec_frame= m_in.stack_ptr;
 | |
| 	mp->mp_exec_frame_len= m_in.stack_bytes;
 | |
| 
 | |
| 	/* Forward call to FS */
 | |
| 	if (mp->mp_fs_call != PM_IDLE)
 | |
| 	{
 | |
| 		panic(__FILE__, "do_exec: not idle", mp->mp_fs_call);
 | |
| 	}
 | |
| 	mp->mp_fs_call= PM_EXEC;
 | |
| 	r= notify(FS_PROC_NR);
 | |
| 	if (r != OK)
 | |
| 		panic(__FILE__, "do_getset: unable to notify FS", r);
 | |
| 
 | |
| 	/* Do not reply */
 | |
| 	return SUSPEND;
 | |
| }
 | |
| 
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *				exec_newmem				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int exec_newmem()
 | |
| {
 | |
| 	int proc_e, proc_n, allow_setuid;
 | |
| 	char *ptr;
 | |
| 	struct mproc *rmp;
 | |
| 	struct exec_newmem args;
 | |
| 	int r, flags;
 | |
| 	char *stack_top;
 | |
| 
 | |
| 	if (who_e != FS_PROC_NR && who_e != RS_PROC_NR)
 | |
| 		return EPERM;
 | |
| 
 | |
| 	proc_e= m_in.EXC_NM_PROC;
 | |
| 	if (pm_isokendpt(proc_e, &proc_n) != OK)
 | |
| 	{
 | |
| 		panic(__FILE__, "exec_newmem: got bad endpoint",
 | |
| 			proc_e);
 | |
| 	}
 | |
| 	rmp= &mproc[proc_n];
 | |
| 	ptr= m_in.EXC_NM_PTR;
 | |
| 	r= sys_datacopy(who_e, (vir_bytes)ptr,
 | |
| 		SELF, (vir_bytes)&args, sizeof(args));
 | |
| 	if (r != OK)
 | |
| 		panic(__FILE__, "exec_newmem: sys_datacopy failed", r);
 | |
| 
 | |
| 	if((r=vm_exec_newmem(proc_e, &args, sizeof(args), &stack_top, &flags)) == OK) {
 | |
| 		allow_setuid= 0;                /* Do not allow setuid execution */  
 | |
| 
 | |
| 		if ((rmp->mp_flags & TRACED) == 0) {
 | |
| 			/* Okay, setuid execution is allowed */
 | |
| 			allow_setuid= 1;
 | |
| 			rmp->mp_effuid = args.new_uid;
 | |
| 			rmp->mp_effgid = args.new_gid;
 | |
| 		}
 | |
| 
 | |
| 		/* System will save command line for debugging, ps(1) output, etc. */
 | |
| 		strncpy(rmp->mp_name, args.progname, PROC_NAME_LEN-1);
 | |
| 		rmp->mp_name[PROC_NAME_LEN-1] = '\0';
 | |
| 
 | |
| 		/* Save offset to initial argc (for ps) */
 | |
| 		rmp->mp_procargs = (vir_bytes) stack_top - args.args_bytes;
 | |
| 
 | |
| 		/* Kill process if something goes wrong after this point. */
 | |
| 		rmp->mp_flags |= PARTIAL_EXEC;
 | |
| 
 | |
| 		mp->mp_reply.reply_res2= (vir_bytes) stack_top;
 | |
| 		mp->mp_reply.reply_res3= flags;
 | |
| 		if (allow_setuid)
 | |
| 			mp->mp_reply.reply_res3 |= EXC_NM_RF_ALLOW_SETUID;
 | |
| 	}
 | |
| 	return r;
 | |
| }
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *				do_execrestart				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_execrestart()
 | |
| {
 | |
| 	int proc_e, proc_n, result;
 | |
| 	struct mproc *rmp;
 | |
| 
 | |
| 	if (who_e != RS_PROC_NR)
 | |
| 		return EPERM;
 | |
| 
 | |
| 	proc_e= m_in.EXC_RS_PROC;
 | |
| 	if (pm_isokendpt(proc_e, &proc_n) != OK)
 | |
| 	{
 | |
| 		panic(__FILE__, "do_execrestart: got bad endpoint",
 | |
| 			proc_e);
 | |
| 	}
 | |
| 	rmp= &mproc[proc_n];
 | |
| 	result= m_in.EXC_RS_RESULT;
 | |
| 
 | |
| 	exec_restart(rmp, result);
 | |
| 
 | |
| 	return OK;
 | |
| }
 | |
| 
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *				exec_restart				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC void exec_restart(rmp, result)
 | |
| struct mproc *rmp;
 | |
| int result;
 | |
| {
 | |
| 	int r, sn;
 | |
| 	vir_bytes pc;
 | |
| 	char *new_sp;
 | |
| 
 | |
| 	if (result != OK)
 | |
| 	{
 | |
| 		if (rmp->mp_flags & PARTIAL_EXEC)
 | |
| 		{
 | |
| 			printf("partial exec; killing process\n");
 | |
| 
 | |
| 			/* Use SIGILL signal that something went wrong */
 | |
| 			rmp->mp_sigstatus = SIGILL;
 | |
| 			pm_exit(rmp, 0, FALSE /*!for_trace*/);
 | |
| 			return;
 | |
| 		}
 | |
| 		setreply(rmp-mproc, result);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	rmp->mp_flags &= ~PARTIAL_EXEC;
 | |
| 
 | |
| 	/* Fix 'mproc' fields, tell kernel that exec is done, reset caught
 | |
| 	 * sigs.
 | |
| 	 */
 | |
| 	for (sn = 1; sn <= _NSIG; sn++) {
 | |
| 		if (sigismember(&rmp->mp_catch, sn)) {
 | |
| 			sigdelset(&rmp->mp_catch, sn);
 | |
| 			rmp->mp_sigact[sn].sa_handler = SIG_DFL;
 | |
| 			sigemptyset(&rmp->mp_sigact[sn].sa_mask);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 
 | |
| 	new_sp= (char *)rmp->mp_procargs;
 | |
| 	pc= 0;	/* for now */
 | |
| 	r= sys_exec(rmp->mp_endpoint, new_sp, rmp->mp_name, pc);
 | |
| 	if (r != OK) panic(__FILE__, "sys_exec failed", r);
 | |
| 
 | |
| 	/* Cause a signal if this process is traced. */
 | |
| 	if (rmp->mp_flags & TRACED) check_sig(rmp->mp_pid, SIGTRAP);
 | |
| }
 | |
| 
 | 
