Skip to content
Snippets Groups Projects
exec.c 37.8 KiB
Newer Older
  • Learn to ignore specific revisions
  • Linus Torvalds's avatar
    Linus Torvalds committed
    	task_lock(tsk);
    	strncpy(buf, tsk->comm, sizeof(tsk->comm));
    	task_unlock(tsk);
    
    	return buf;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    }
    
    EXPORT_SYMBOL_GPL(get_task_comm);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    /*
     * These functions flushes out all traces of the currently running executable
     * so that a new one can be started
     */
    
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    void set_task_comm(struct task_struct *tsk, char *buf)
    {
    	task_lock(tsk);
    
    	/*
    	 * Threads may access current->comm without holding
    	 * the task lock, so write the string carefully.
    	 * Readers without a lock may see incomplete new
    	 * names but are safe from non-terminating string reads.
    	 */
    	memset(tsk->comm, 0, TASK_COMM_LEN);
    	wmb();
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	strlcpy(tsk->comm, buf, sizeof(tsk->comm));
    	task_unlock(tsk);
    
    static void filename_to_taskname(char *tcomm, const char *fn, unsigned int len)
    {
    	int i, ch;
    
    	/* Copies the binary name from after last slash */
    	for (i = 0; (ch = *(fn++)) != '\0';) {
    		if (ch == '/')
    			i = 0; /* overwrite what we wrote */
    		else
    			if (i < len - 1)
    				tcomm[i++] = ch;
    	}
    	tcomm[i] = '\0';
    }
    
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    int flush_old_exec(struct linux_binprm * bprm)
    {
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    	/*
    	 * Make sure we have a private signal table and that
    	 * we are unassociated from the previous thread group.
    	 */
    	retval = de_thread(current);
    	if (retval)
    		goto out;
    
    
    Matt Helsley's avatar
    Matt Helsley committed
    	set_mm_exe_file(bprm->mm, bprm->file);
    
    
    	filename_to_taskname(bprm->tcomm, bprm->filename, sizeof(bprm->tcomm));
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	/*
    	 * Release all of the old mmap stuff
    	 */
    
    	acct_arg_size(bprm, 0);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	retval = exec_mmap(bprm->mm);
    	if (retval)
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    	bprm->mm = NULL;		/* We're using it now */
    
    	current->flags &= ~(PF_RANDOMIZE | PF_FORKNOEXEC | PF_KTHREAD);
    
    	flush_thread();
    	current->personality &= ~bprm->per_clear;
    
    
    	return 0;
    
    out:
    	return retval;
    }
    EXPORT_SYMBOL(flush_old_exec);
    
    
    void would_dump(struct linux_binprm *bprm, struct file *file)
    {
    	if (inode_permission(file->f_path.dentry->d_inode, MAY_READ) < 0)
    		bprm->interp_flags |= BINPRM_FLAGS_ENFORCE_NONDUMP;
    }
    EXPORT_SYMBOL(would_dump);
    
    
    void setup_new_exec(struct linux_binprm * bprm)
    {
    	arch_pick_mmap_layout(current->mm);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    	/* This is the point of no return */
    	current->sas_ss_sp = current->sas_ss_size = 0;
    
    
    	if (uid_eq(current_euid(), current_uid()) && gid_eq(current_egid(), current_gid()))
    
    Alan Cox's avatar
    Alan Cox committed
    	else
    
    		set_dumpable(current->mm, suid_dumpable);
    
    	set_task_comm(current, bprm->tcomm);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	/* Set the new mm task size. We have to do that late because it may
    	 * depend on TIF_32BIT which is only updated in flush_thread() on
    	 * some architectures like powerpc
    	 */
    	current->mm->task_size = TASK_SIZE;
    
    
    	/* install the new credentials */
    
    	if (!uid_eq(bprm->cred->uid, current_euid()) ||
    	    !gid_eq(bprm->cred->gid, current_egid())) {
    
    		current->pdeath_signal = 0;
    
    	} else {
    		would_dump(bprm, bprm->file);
    		if (bprm->interp_flags & BINPRM_FLAGS_ENFORCE_NONDUMP)
    			set_dumpable(current->mm, suid_dumpable);
    
    	/*
    	 * Flush performance counters when crossing a
    	 * security domain:
    	 */
    	if (!get_dumpable(current->mm))
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	/* An exec changes our domain. We are no longer part of the thread
    	   group */
    
    	current->self_exec_id++;
    			
    	flush_signal_handlers(current, 0);
    
    	do_close_on_exec(current->files);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    }
    
    EXPORT_SYMBOL(setup_new_exec);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    /*
     * Prepare credentials and lock ->cred_guard_mutex.
     * install_exec_creds() commits the new creds and drops the lock.
     * Or, if exec fails before, free_bprm() should release ->cred and
     * and unlock.
     */
    int prepare_bprm_creds(struct linux_binprm *bprm)
    {
    
    	if (mutex_lock_interruptible(&current->signal->cred_guard_mutex))
    
    		return -ERESTARTNOINTR;
    
    	bprm->cred = prepare_exec_creds();
    	if (likely(bprm->cred))
    		return 0;
    
    
    	mutex_unlock(&current->signal->cred_guard_mutex);
    
    	return -ENOMEM;
    }
    
    void free_bprm(struct linux_binprm *bprm)
    {
    	free_arg_pages(bprm);
    	if (bprm->cred) {
    
    		mutex_unlock(&current->signal->cred_guard_mutex);
    
    /*
     * install the new credentials for this executable
     */
    void install_exec_creds(struct linux_binprm *bprm)
    {
    	security_bprm_committing_creds(bprm);
    
    	commit_creds(bprm->cred);
    	bprm->cred = NULL;
    
    	/*
    	 * cred_guard_mutex must be held at least to this point to prevent
    
    	 * ptrace_attach() from altering our determination of the task's
    
    	 * credentials; any time after this it may be unlocked.
    	 */
    
    	security_bprm_committed_creds(bprm);
    
    	mutex_unlock(&current->signal->cred_guard_mutex);
    
    }
    EXPORT_SYMBOL(install_exec_creds);
    
    /*
     * determine how safe it is to execute the proposed program
    
     * - the caller must hold ->cred_guard_mutex to protect against
    
    Al Viro's avatar
    Al Viro committed
    static int check_unsafe_exec(struct linux_binprm *bprm)
    
    	struct task_struct *p = current, *t;
    
    	int res = 0;
    
    	if (p->ptrace) {
    		if (p->ptrace & PT_PTRACE_CAP)
    			bprm->unsafe |= LSM_UNSAFE_PTRACE_CAP;
    		else
    			bprm->unsafe |= LSM_UNSAFE_PTRACE;
    	}
    
    	/*
    	 * This isn't strictly necessary, but it makes it harder for LSMs to
    	 * mess up.
    	 */
    	if (current->no_new_privs)
    		bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS;
    
    
    	n_fs = 1;
    
    	spin_lock(&p->fs->lock);
    
    	for (t = next_thread(p); t != p; t = next_thread(t)) {
    		if (t->fs == p->fs)
    			n_fs++;
    	}
    
    	if (p->fs->users > n_fs) {
    
    		bprm->unsafe |= LSM_UNSAFE_SHARE;
    
    	} else {
    
    		res = -EAGAIN;
    		if (!p->fs->in_exec) {
    			p->fs->in_exec = 1;
    			res = 1;
    		}
    
    	spin_unlock(&p->fs->lock);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    /* 
     * Fill the binprm structure from the inode. 
     * Check permissions, then read the first 128 (BINPRM_BUF_SIZE) bytes
    
     *
     * This may be called multiple times for binary chains (scripts for example).
    
    Linus Torvalds's avatar
    Linus Torvalds committed
     */
    int prepare_binprm(struct linux_binprm *bprm)
    {
    
    	struct inode * inode = bprm->file->f_path.dentry->d_inode;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	int retval;
    
    	mode = inode->i_mode;
    	if (bprm->file->f_op == NULL)
    		return -EACCES;
    
    
    	/* clear any previous set[ug]id data from a previous binary */
    	bprm->cred->euid = current_euid();
    	bprm->cred->egid = current_egid();
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	if (!(bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID) &&
    	    !current->no_new_privs) {
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    		/* Set-uid? */
    		if (mode & S_ISUID) {
    
    			if (!kuid_has_mapping(bprm->cred->user_ns, inode->i_uid))
    				return -EPERM;
    
    			bprm->per_clear |= PER_CLEAR_ON_SETID;
    			bprm->cred->euid = inode->i_uid;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    		}
    
    		/* Set-gid? */
    		/*
    		 * If setgid is set but no group execute bit then this
    		 * is a candidate for mandatory locking, not a setgid
    		 * executable.
    		 */
    		if ((mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
    
    			if (!kgid_has_mapping(bprm->cred->user_ns, inode->i_gid))
    				return -EPERM;
    
    			bprm->per_clear |= PER_CLEAR_ON_SETID;
    			bprm->cred->egid = inode->i_gid;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    		}
    	}
    
    	/* fill in binprm security blob */
    
    	retval = security_bprm_set_creds(bprm);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	if (retval)
    		return retval;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	memset(bprm->buf, 0, BINPRM_BUF_SIZE);
    	return kernel_read(bprm->file, 0, bprm->buf, BINPRM_BUF_SIZE);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    }
    
    EXPORT_SYMBOL(prepare_binprm);
    
    
    /*
     * Arguments are '\0' separated strings found at the location bprm->p
     * points to; chop off the first by relocating brpm->p to right after
     * the first '\0' encountered.
     */
    
    int remove_arg_zero(struct linux_binprm *bprm)
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    {
    
    	int ret = 0;
    	unsigned long offset;
    	char *kaddr;
    	struct page *page;
    
    	if (!bprm->argc)
    		return 0;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	do {
    		offset = bprm->p & ~PAGE_MASK;
    		page = get_arg_page(bprm, bprm->p, 0);
    		if (!page) {
    			ret = -EFAULT;
    			goto out;
    		}
    
    		kaddr = kmap_atomic(page);
    
    		for (; offset < PAGE_SIZE && kaddr[offset];
    				offset++, bprm->p++)
    			;
    
    		kunmap_atomic(kaddr);
    
    		put_arg_page(page);
    
    		if (offset == PAGE_SIZE)
    			free_arg_page(bprm, (bprm->p >> PAGE_SHIFT) - 1);
    	} while (offset == PAGE_SIZE);
    
    	bprm->p++;
    	bprm->argc--;
    	ret = 0;
    
    out:
    	return ret;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    }
    EXPORT_SYMBOL(remove_arg_zero);
    
    /*
     * cycle the list of binary formats handler, until one recognizes the image
     */
    int search_binary_handler(struct linux_binprm *bprm,struct pt_regs *regs)
    {
    
    	unsigned int depth = bprm->recursion_depth;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	int try,retval;
    	struct linux_binfmt *fmt;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    	retval = security_bprm_check(bprm);
    	if (retval)
    		return retval;
    
    
    Al Viro's avatar
    Al Viro committed
    	retval = audit_bprm(bprm);
    	if (retval)
    		return retval;
    
    
    	/* Need to fetch pid before load_binary changes it */
    
    	old_vpid = task_pid_nr_ns(current, task_active_pid_ns(current->parent));
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	retval = -ENOENT;
    	for (try=0; try<2; try++) {
    		read_lock(&binfmt_lock);
    
    		list_for_each_entry(fmt, &formats, lh) {
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    			int (*fn)(struct linux_binprm *, struct pt_regs *) = fmt->load_binary;
    			if (!fn)
    				continue;
    			if (!try_module_get(fmt->module))
    				continue;
    			read_unlock(&binfmt_lock);
    			retval = fn(bprm, regs);
    
    			/*
    			 * Restore the depth counter to its starting value
    			 * in this call, so we don't have to rely on every
    			 * load_binary function to restore it on return.
    			 */
    			bprm->recursion_depth = depth;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    			if (retval >= 0) {
    
    				if (depth == 0) {
    					trace_sched_process_exec(current, old_pid, bprm);
    
    					ptrace_event(PTRACE_EVENT_EXEC, old_vpid);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    				put_binfmt(fmt);
    				allow_write_access(bprm->file);
    				if (bprm->file)
    					fput(bprm->file);
    				bprm->file = NULL;
    				current->did_exec = 1;
    
    				proc_exec_connector(current);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    				return retval;
    			}
    			read_lock(&binfmt_lock);
    			put_binfmt(fmt);
    			if (retval != -ENOEXEC || bprm->mm == NULL)
    				break;
    			if (!bprm->file) {
    				read_unlock(&binfmt_lock);
    				return retval;
    			}
    		}
    		read_unlock(&binfmt_lock);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    		if (retval != -ENOEXEC || bprm->mm == NULL) {
    			break;
    
    		} else {
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    #define printable(c) (((c)=='\t') || ((c)=='\n') || (0x20<=(c) && (c)<=0x7e))
    			if (printable(bprm->buf[0]) &&
    			    printable(bprm->buf[1]) &&
    			    printable(bprm->buf[2]) &&
    			    printable(bprm->buf[3]))
    				break; /* -ENOEXEC */
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    			request_module("binfmt-%04x", *(unsigned short *)(&bprm->buf[2]));
    		}
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	}
    	return retval;
    }
    
    EXPORT_SYMBOL(search_binary_handler);
    
    /*
     * sys_execve() executes a new program.
     */
    
    static int do_execve_common(const char *filename,
    				struct user_arg_ptr argv,
    				struct user_arg_ptr envp,
    				struct pt_regs *regs)
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    {
    	struct linux_binprm *bprm;
    	struct file *file;
    
    	struct files_struct *displaced;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	int retval;
    
    	const struct cred *cred = current_cred();
    
    	/*
    	 * We move the actual failure in case of RLIMIT_NPROC excess from
    	 * set*uid() to execve() because too many poorly written programs
    	 * don't check setuid() return code.  Here we additionally recheck
    	 * whether NPROC limit is still exceeded.
    	 */
    	if ((current->flags & PF_NPROC_EXCEEDED) &&
    	    atomic_read(&cred->user->processes) > rlimit(RLIMIT_NPROC)) {
    		retval = -EAGAIN;
    		goto out_ret;
    	}
    
    	/* We're below the limit (still or again), so we don't want to make
    	 * further execve() calls fail. */
    	current->flags &= ~PF_NPROC_EXCEEDED;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	retval = unshare_files(&displaced);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	retval = -ENOMEM;
    
    	bprm = kzalloc(sizeof(*bprm), GFP_KERNEL);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	if (!bprm)
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	retval = prepare_bprm_creds(bprm);
    	if (retval)
    
    
    	retval = check_unsafe_exec(bprm);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	file = open_exec(filename);
    	retval = PTR_ERR(file);
    	if (IS_ERR(file))
    
    		goto out_unmark;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    	sched_exec();
    
    	bprm->file = file;
    	bprm->filename = filename;
    	bprm->interp = filename;
    
    
    	retval = bprm_mm_init(bprm);
    	if (retval)
    		goto out_file;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	bprm->argc = count(argv, MAX_ARG_STRINGS);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	if ((retval = bprm->argc) < 0)
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	bprm->envc = count(envp, MAX_ARG_STRINGS);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    	if ((retval = bprm->envc) < 0)
    		goto out;
    
    	retval = prepare_binprm(bprm);
    	if (retval < 0)
    		goto out;
    
    	retval = copy_strings_kernel(1, &bprm->filename, bprm);
    	if (retval < 0)
    		goto out;
    
    	bprm->exec = bprm->p;
    	retval = copy_strings(bprm->envc, envp, bprm);
    	if (retval < 0)
    		goto out;
    
    	retval = copy_strings(bprm->argc, argv, bprm);
    	if (retval < 0)
    		goto out;
    
    	retval = search_binary_handler(bprm,regs);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	current->fs->in_exec = 0;
    
    	current->in_execve = 0;
    
    	acct_update_integrals(current);
    	free_bprm(bprm);
    	if (displaced)
    		put_files_struct(displaced);
    	return retval;
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	if (bprm->mm) {
    		acct_arg_size(bprm, 0);
    		mmput(bprm->mm);
    	}
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    out_file:
    	if (bprm->file) {
    		allow_write_access(bprm->file);
    		fput(bprm->file);
    	}
    
    out_unmark:
    
    	if (clear_in_exec)
    		current->fs->in_exec = 0;
    
    	current->in_execve = 0;
    
    	free_bprm(bprm);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	if (displaced)
    		reset_files_struct(displaced);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    out_ret:
    	return retval;
    }
    
    
    int do_execve(const char *filename,
    	const char __user *const __user *__argv,
    	const char __user *const __user *__envp,
    	struct pt_regs *regs)
    {
    
    	struct user_arg_ptr argv = { .ptr.native = __argv };
    	struct user_arg_ptr envp = { .ptr.native = __envp };
    	return do_execve_common(filename, argv, envp, regs);
    }
    
    #ifdef CONFIG_COMPAT
    int compat_do_execve(char *filename,
    	compat_uptr_t __user *__argv,
    	compat_uptr_t __user *__envp,
    	struct pt_regs *regs)
    {
    	struct user_arg_ptr argv = {
    		.is_compat = true,
    		.ptr.compat = __argv,
    	};
    	struct user_arg_ptr envp = {
    		.is_compat = true,
    		.ptr.compat = __envp,
    	};
    
    	return do_execve_common(filename, argv, envp, regs);
    }
    
    void set_binfmt(struct linux_binfmt *new)
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    {
    
    	struct mm_struct *mm = current->mm;
    
    	if (mm->binfmt)
    		module_put(mm->binfmt->module);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    
    
    	if (new)
    		__module_get(new->module);
    
    Linus Torvalds's avatar
    Linus Torvalds committed
    }
    
    EXPORT_SYMBOL(set_binfmt);
    
    
    /*
     * set_dumpable converts traditional three-value dumpable to two flags and
     * stores them into mm->flags.  It modifies lower two bits of mm->flags, but
     * these bits are not changed atomically.  So get_dumpable can observe the
     * intermediate state.  To avoid doing unexpected behavior, get get_dumpable
     * return either old dumpable or new one by paying attention to the order of
     * modifying the bits.
     *
     * dumpable |   mm->flags (binary)
     * old  new | initial interim  final
     * ---------+-----------------------
     *  0    1  |   00      01      01
     *  0    2  |   00      10(*)   11
     *  1    0  |   01      00      00
     *  1    2  |   01      11      11
     *  2    0  |   11      10(*)   00
     *  2    1  |   11      11      01
     *
     * (*) get_dumpable regards interim value of 10 as 11.
     */
    void set_dumpable(struct mm_struct *mm, int value)
    {
    	switch (value) {
    
    	case SUID_DUMPABLE_DISABLED:
    
    		clear_bit(MMF_DUMPABLE, &mm->flags);
    		smp_wmb();
    		clear_bit(MMF_DUMP_SECURELY, &mm->flags);
    		break;
    
    	case SUID_DUMPABLE_ENABLED:
    
    		set_bit(MMF_DUMPABLE, &mm->flags);
    		smp_wmb();
    		clear_bit(MMF_DUMP_SECURELY, &mm->flags);
    		break;
    
    		set_bit(MMF_DUMP_SECURELY, &mm->flags);
    		smp_wmb();
    		set_bit(MMF_DUMPABLE, &mm->flags);
    		break;
    	}
    }
    
    
    int __get_dumpable(unsigned long mm_flags)
    
    	ret = mm_flags & MMF_DUMPABLE_MASK;
    
    	return (ret > SUID_DUMPABLE_ENABLED) ? SUID_DUMPABLE_SAFE : ret;
    
    int get_dumpable(struct mm_struct *mm)
    {
    	return __get_dumpable(mm->flags);
    }