Return to BSD News archive
Path: sserve!newshost.anu.edu.au!munnari.oz.au!constellation!osuunx.ucc.okstate.edu!moe.ksu.ksu.edu!ux1.cso.uiuc.edu!howland.reston.ans.net!noc.near.net!uunet!mcsun!Germany.EU.net!news.dfn.de!urmel.informatik.rwth-aachen.de!acds.physik.rwth-aachen.de!kuku From: kuku@acds.physik.rwth-aachen.de (Christoph Kukulies) Newsgroups: comp.os.386bsd.bugs Subject: kern_execve.c (was: Re: Strange behavier on #! interpretation) Date: 21 Jun 1993 09:41:46 GMT Organization: I.Physikalisches Institut RWTH-Aachen Lines: 597 Distribution: world Message-ID: <203voq$ka1@urmel.informatik.rwth-aachen.de> References: <1vjtib$725@lucy.ee.und.ac.za> <MARUYAMA.93Jun21121714@sunnm.ism.ac.jp> Reply-To: kuku@acds.physik.rwth-aachen.de NNTP-Posting-Host: acds.physik.rwth-aachen.de Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit > >In article <1vjtib$725@lucy.ee.und.ac.za> > >>I recommend Maarten Litmaath's "indir" wrapper, available from all good >>comp.sources.unix archives. indir is a small SUID root program, and > >But it doesn't work on 386BSD patch 0.2.3! It always results the >following message. > > indir: -[ugbn] option expected > >The reason for this may be found by the following tests. Let "listarg" > > main(argc, argv) > int argc; > char **argv; > { int i; > printf("Test\n"); > printf("%d\n",argc); > for (i=0;i<argc; i++) > { printf("%s\n", argv[i]);} > } >Then the script (which I named it t1) > > #!/home/maruyama/listarg foo bar > >produces no output! But if I change the name of the executable to >"a.out", then the script (which I named it t2) > > #!/home/maruyama/a.out foo bar > >produces the output > > Test > 2 > /home.maruyama/a.out > t2 > >Moreover, the next script (which I named t3) > > #!/home/maruyama/listarg > >prduces > > Test > 2 > /home/maruyama/listarg I posted a fix to this #!/bin/sh options handling somewhere last December but somehow it didn't make it's way into the patchkits: Here again my current kern_execve.c (excuse if this is not a diff, it's an addition to a 0.2.3 patched version - maybe someone from the patchkit people may diff this against the current version, please). ;!wE}7W?tM}8&5f=j >maruyama@ism.ac.jp >-- >1993年06月21日(月) >-------- >丸山彫苳殺苳算@統計数理研瘢雹究所 >maruyama@ism.ac.jp > -- --Chris Christoph P. U. Kukulies kuku@acds.physik.rwth-aachen.de *** Error code 1 Stop. ======================= my present /sys/kern/kern_ececve.c ================ /* * Copyright (c) 1989, 1990, 1991, 1992 William F. Jolitz, TeleMuse * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This software is a component of "386BSD" developed by * William F. Jolitz, TeleMuse. * 4. Neither the name of the developer nor the name "386BSD" * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS A COMPONENT OF 386BSD DEVELOPED BY WILLIAM F. JOLITZ * AND IS INTENDED FOR RESEARCH AND EDUCATIONAL PURPOSES ONLY. THIS * SOFTWARE SHOULD NOT BE CONSIDERED TO BE A COMMERCIAL PRODUCT. * THE DEVELOPER URGES THAT USERS WHO REQUIRE A COMMERCIAL PRODUCT * NOT MAKE USE OF THIS WORK. * * FOR USERS WHO WISH TO UNDERSTAND THE 386BSD SYSTEM DEVELOPED * BY WILLIAM F. JOLITZ, WE RECOMMEND THE USER STUDY WRITTEN * REFERENCES SUCH AS THE "PORTING UNIX TO THE 386" SERIES * (BEGINNING JANUARY 1991 "DR. DOBBS JOURNAL", USA AND BEGINNING * JUNE 1991 "UNIX MAGAZIN", GERMANY) BY WILLIAM F. JOLITZ AND * LYNNE GREER JOLITZ, AS WELL AS OTHER BOOKS ON UNIX AND THE * ON-LINE 386BSD USER MANUAL BEFORE USE. A BOOK DISCUSSING THE INTERNALS * OF 386BSD ENTITLED "386BSD FROM THE INSIDE OUT" WILL BE AVAILABLE LATE 1992. * * THIS SOFTWARE IS PROVIDED BY THE DEVELOPER ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE DEVELOPER BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * This procedure implements a minimal program execution facility for * 386BSD. It interfaces to the BSD kernel as the execve system call. * Significant limitations and lack of compatiblity with POSIX are * present with this version, to make its basic operation more clear. * * PATCHES MAGIC LEVEL PATCH THAT GOT US HERE * -------------------- ----- ---------------------- * CURRENT PATCH LEVEL: 4 00137 !patchkit maintainer,change this! * -------------------- ----- ---------------------- * * 05 Aug 92 Paul Kranenburg Fixed #! as a magic number * 29 Jul 92 Mark Tinguely Fixed execute permission enforcement * 15 Aug 92 Terry Lambert Fixed CMOS RAM size bug * 12 Dec 92 Julians Elischer Place argc into user address space * correctly * 10 Aug 92 Yoval Yarom Fix for busy text on executables * 21 May 93 Christoph Kukulies Fixed Year number in above line, * was 93 :-) * #!/usr/local/bin/wish -f did not work */ #include "param.h" #include "systm.h" #include "signalvar.h" #include "resourcevar.h" #include "proc.h" #include "mount.h" #include "namei.h" #include "vnode.h" #include "file.h" #include "exec.h" #include "stat.h" #include "wait.h" #include "mman.h" #include "malloc.h" #include "vm/vm.h" #include "vm/vm_param.h" #include "vm/vm_map.h" #include "vm/vm_kern.h" #include "machine/reg.h" extern int dostacklimits; #define copyinoutstr copyinstr /* * execve() system call. */ /* ARGSUSED */ execve(p, uap, retval) struct proc *p; register struct args { char *fname; char **argp; char **envp; } *uap; int *retval; { register struct nameidata *ndp; struct nameidata nd; char **argbuf, **argbufp, *stringbuf, *stringbufp; char **vectp, *ep; int needsenv, limitonargs, stringlen, addr, size, len, rv, amt, argc, tsize, dsize, bsize, cnt, foff; struct vattr attr; struct vmspace *vs; caddr_t newframe; char shellname[MAXINTERP]; /* 05 Aug 92*/ char rest_of_line[MAXINTERP]; union { char ex_shell[MAXINTERP]; /* #! and interpreter name */ struct exec ex_hdr; } exdata; int indir = 0; /* * Step 1. Lookup filename to see if we have something to execute. */ ndp = &nd; ndp->ni_segflg = UIO_USERSPACE; ndp->ni_dirp = uap->fname; again: /* 05 Aug 92*/ ndp->ni_nameiop = LOOKUP | LOCKLEAF | FOLLOW | SAVENAME; /* is it there? */ if (rv = namei(ndp, p)) return (rv); /* does it have any attributes? */ rv = VOP_GETATTR(ndp->ni_vp, &attr, p->p_ucred, p); if (rv) goto exec_fail; if (ndp->ni_vp->v_mount->mnt_flag & MNT_NOEXEC) { /* no exec on fs ?*/ rv = EACCES; goto exec_fail; } /* is it executable, and a regular file? */ if ((ndp->ni_vp->v_mount->mnt_flag & MNT_NOEXEC) || /* 29 Jul 92*/ (VOP_ACCESS(ndp->ni_vp, VEXEC, p->p_ucred, p)) || ((attr.va_mode & 0111) == 0) || (attr.va_type != VREG)) { rv = EACCES; goto exec_fail; } /* * Step 2. Does the file contain a format we can * understand and execute * * XXX 05 Aug 92 * Read in first few bytes of file for segment sizes, magic number: * ZMAGIC = demand paged RO text * Also an ASCII line beginning with #! is * the file name of a ``shell'' and arguments may be prepended * to the argument list if given here. */ exdata.ex_shell[0] = '¥0'; /* for zero length files */ rv = vn_rdwr(UIO_READ, ndp->ni_vp, (caddr_t)&exdata, sizeof(exdata), 0, UIO_SYSSPACE, IO_NODELOCKED, p->p_ucred, &amt, p); /* big enough to hold a header? */ if (rv) goto exec_fail; /* ... that we recognize? */ rv = ENOEXEC; if (exdata.ex_hdr.a_magic != ZMAGIC) { char *cp, *sp; if (exdata.ex_shell[0] != '#' || exdata.ex_shell[1] != '!' || indir) { rv = ENOEXEC; goto exec_fail; } for (cp = &exdata.ex_shell[2];; ++cp) { if (cp >= &exdata.ex_shell[MAXINTERP]) { rv = ENOEXEC; goto exec_fail; } if (*cp == '¥n') { *cp = '¥0'; break; } if (*cp == '¥t') *cp = ' '; } cp = &exdata.ex_shell[2]; /* get shell interpreter name */ while (*cp == ' ') cp++; sp = shellname; while (*cp && *cp != ' ') *sp++ = *cp++; *sp = '¥0'; if(*cp) { /* if there is something following the #!/shell */ while ( *cp == ' ' ) cp++; sp = rest_of_line; while ( *cp) *sp++ = *cp++; *sp = '¥0'; indir = 2; /* indicate this is a script file with args*/ } else indir = 1; /* indicate this is a script file */ vput(ndp->ni_vp); FREE(ndp->ni_pnbuf, M_NAMEI); ndp->ni_dirp = shellname; /* find shell interpreter */ ndp->ni_segflg = UIO_SYSSPACE; goto again; } /* sanity check "ain't not such thing as a sanity clause" -groucho */ rv = ENOMEM; if (/*exdata.ex_hdr.a_text == 0 || */ exdata.ex_hdr.a_text > MAXTSIZ || exdata.ex_hdr.a_text % NBPG || exdata.ex_hdr.a_text > attr.va_size) goto exec_fail; if (exdata.ex_hdr.a_data == 0 || exdata.ex_hdr.a_data > DFLDSIZ || exdata.ex_hdr.a_data > attr.va_size || exdata.ex_hdr.a_data + exdata.ex_hdr.a_text > attr.va_size) goto exec_fail; if (exdata.ex_hdr.a_bss > MAXDSIZ) goto exec_fail; if (exdata.ex_hdr.a_text + exdata.ex_hdr.a_data + exdata.ex_hdr.a_bss > MAXTSIZ + MAXDSIZ) goto exec_fail; if (exdata.ex_hdr.a_data + exdata.ex_hdr.a_bss > p->p_rlimit[RLIMIT_DATA].rlim_cur) goto exec_fail; if (exdata.ex_hdr.a_entry > exdata.ex_hdr.a_text + exdata.ex_hdr.a_data) goto exec_fail; /* * Step 3. File and header are valid. Now, dig out the strings * out of the old process image. */ /* * We implement a single-pass algorithm that builds a new stack * frame within the address space of the "old" process image, * avoiding the second pass entirely. Thus, the new frame is * in position to be run. This consumes much virtual address space, * and two pages more of 'real' memory, such are the costs. * [Also, note the cache wipe that's avoided!] */ /* create anonymous memory region for new stack */ vs = p->p_vmspace; if ((unsigned)vs->vm_maxsaddr + MAXSSIZ < USRSTACK) newframe = (caddr_t) USRSTACK - MAXSSIZ; else vs->vm_maxsaddr = newframe = (caddr_t) USRSTACK - 2*MAXSSIZ; /* don't do stack limit checking on traps temporarily XXX*/ dostacklimits = 0; rv = vm_allocate(&vs->vm_map, &newframe, MAXSSIZ, FALSE); if (rv) goto exec_fail; /* allocate string buffer and arg buffer */ argbuf = (char **) (newframe + MAXSSIZ - 3*ARG_MAX); stringbuf = stringbufp = ((char *)argbuf) + 2*ARG_MAX; argbufp = argbuf; /* first, do args */ vectp = uap->argp; needsenv = 1; limitonargs = ARG_MAX; cnt = 0; /* first, do (shell name if any then) args */ if (indir) { ep = shellname; threetimes: if (ep) { /* did we outgrow initial argbuf, if so, die */ if (argbufp >= (char **)stringbuf) { rv = E2BIG; goto exec_dealloc; } if (rv = copyoutstr(ep, stringbufp, (u_int)limitonargs, (u_int *)&stringlen)) { if (rv == ENAMETOOLONG) rv = E2BIG; goto exec_dealloc; } suword(argbufp++, (int)stringbufp); cnt++; stringbufp += stringlen; limitonargs -= stringlen; } if (indir == 2 ) { indir = 1; ep = rest_of_line; goto threetimes; } if (indir == 1) { indir = 0; /* orginal executable is 1st argument with scripts */ ep = uap->fname; goto threetimes; } /* terminate in case no more args to script */ suword(argbufp, 0); if (vectp = uap->argp) vectp++; /* manually doing the first argument with scripts */ } do_env_as_well: if(vectp == 0) goto dont_bother; /* for each envp, copy in string */ do { /* did we outgrow initial argbuf, if so, die */ if (argbufp == (char **)stringbuf) { rv = E2BIG; goto exec_dealloc; } /* get an string pointer */ ep = (char *)fuword(vectp++); if (ep == (char *)-1) { rv = EFAULT; goto exec_dealloc; } /* if not a null pointer, copy string */ if (ep) { if (rv = copyinoutstr(ep, stringbufp, (u_int)limitonargs, (u_int *) &stringlen)) { if (rv == ENAMETOOLONG) rv = E2BIG; goto exec_dealloc; } suword(argbufp++, (int)stringbufp); cnt++; stringbufp += stringlen; limitonargs -= stringlen; } else { suword(argbufp++, 0); break; } } while (limitonargs > 0); dont_bother: if (limitonargs <= 0) { rv = E2BIG; goto exec_dealloc; } /* have we done the environment yet ? */ if (needsenv) { /* remember the arg count for later */ argc = cnt; vectp = uap->envp; needsenv = 0; goto do_env_as_well; } /* At this point, one could optionally implement a * second pass to condense the strings, arguement vectors, * and stack to fit the fewest pages. * * One might selectively do this when copying was cheaper * than leaving allocated two more pages per process. */ /* stuff arg count on top of "new" stack */ /* argbuf[-1] = (char *)argc;*/ suword(argbuf-1,argc); /* * Step 4. Build the new processes image. * * At this point, we are committed -- destroy old executable! */ /* blow away all address space, except the stack */ rv = vm_deallocate(&vs->vm_map, 0, USRSTACK - 2*MAXSSIZ); if (rv) goto exec_abort; /* destroy "old" stack */ if ((unsigned)newframe < USRSTACK - MAXSSIZ) { rv = vm_deallocate(&vs->vm_map, USRSTACK - MAXSSIZ, MAXSSIZ); if (rv) goto exec_abort; } else { rv = vm_deallocate(&vs->vm_map, USRSTACK - 2*MAXSSIZ, MAXSSIZ); if (rv) goto exec_abort; } /* build a new address space */ addr = 0; /* screwball mode -- special case of 413 to save space for floppy */ if (exdata.ex_hdr.a_text == 0) { foff = tsize = 0; exdata.ex_hdr.a_data += exdata.ex_hdr.a_text; } else { tsize = roundup(exdata.ex_hdr.a_text, NBPG); foff = NBPG; } /* treat text and data in terms of integral page size */ dsize = roundup(exdata.ex_hdr.a_data, NBPG); bsize = roundup(exdata.ex_hdr.a_bss + dsize, NBPG); bsize -= dsize; /* map text & data in file, as being "paged in" on demand */ rv = vm_mmap(&vs->vm_map, &addr, tsize+dsize, VM_PROT_ALL, MAP_FILE|MAP_COPY|MAP_FIXED, (caddr_t)ndp->ni_vp, foff); if (rv) goto exec_abort; /* mark pages r/w data, r/o text */ if (tsize) { addr = 0; rv = vm_protect(&vs->vm_map, addr, tsize, FALSE, VM_PROT_READ|VM_PROT_EXECUTE); if (rv) goto exec_abort; } /* create anonymous memory region for bss */ addr = dsize + tsize; rv = vm_allocate(&vs->vm_map, &addr, bsize, FALSE); if (rv) goto exec_abort; /* * Step 5. Prepare process for execution. */ /* touchup process information -- vm system is unfinished! */ vs->vm_tsize = tsize/NBPG; /* text size (pages) XXX */ vs->vm_dsize = (dsize+bsize)/NBPG; /* data size (pages) XXX */ vs->vm_taddr = 0; /* user virtual address of text XXX */ vs->vm_daddr = (caddr_t)tsize; /* user virtual address of data XXX */ vs->vm_maxsaddr = newframe; /* user VA at max stack growth XXX */ vs->vm_ssize = ((unsigned)vs->vm_maxsaddr + MAXSSIZ - (unsigned)argbuf)/ NBPG + 1; /* stack size (pages) */ dostacklimits = 1; /* allow stack limits to be enforced XXX */ /* close files on exec, fixup signals */ fdcloseexec(p); execsigs(p); /* name this process - nameiexec(p, ndp) */ len = MIN(ndp->ni_namelen,MAXCOMLEN); bcopy(ndp->ni_ptr, p->p_comm, len); p->p_comm[len] = 0; /* mark as executable, wakeup any process that was vforked and tell * it that it now has it's own resources back */ p->p_flag |= SEXEC; if (p->p_pptr && (p->p_flag & SPPWAIT)) { p->p_flag &= ‾SPPWAIT; wakeup(p->p_pptr); } /* implement set userid/groupid */ if ((attr.va_mode&VSUID) && (p->p_flag & STRC) == 0) { p->p_ucred = crcopy(p->p_ucred); p->p_cred->p_svuid = p->p_ucred->cr_uid = attr.va_uid; } if ((attr.va_mode&VSGID) && (p->p_flag & STRC) == 0) { p->p_ucred = crcopy(p->p_ucred); p->p_cred->p_svgid = p->p_ucred->cr_groups[0] = attr.va_gid; } /* setup initial register state */ p->p_regs[SP] = (unsigned) (argbuf - 1); setregs(p, exdata.ex_hdr.a_entry); ndp->ni_vp->v_flag |= VTEXT; /* mark vnode pure text */ vput(ndp->ni_vp); FREE(ndp->ni_pnbuf, M_NAMEI); /* if tracing process, pass control back to debugger so breakpoints can be set before the program "runs" */ if (p->p_flag & STRC) psignal(p, SIGTRAP); return (0); exec_dealloc: /* remove interim "new" stack frame we were building */ vm_deallocate(&vs->vm_map, newframe, MAXSSIZ); exec_fail: dostacklimits = 1; vput(ndp->ni_vp); FREE(ndp->ni_pnbuf, M_NAMEI); return(rv); exec_abort: /* sorry, no more process anymore. exit gracefully */ vm_deallocate(&vs->vm_map, newframe, MAXSSIZ); vput(ndp->ni_vp); FREE(ndp->ni_pnbuf, M_NAMEI); exit(p, W_EXITCODE(0, SIGABRT)); /* NOTREACHED */ return(0); }