Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Jul 2008 14:02:47 +0300
From:      Kostik Belousov <kostikbel@gmail.com>
To:        Rick Macklem <rmacklem@uoguelph.ca>
Cc:        freebsd-fs@freebsd.org
Subject:   Re: executable open until unmount
Message-ID:  <20080717110247.GI17123@deviant.kiev.zoral.com.ua>
In-Reply-To: <20080716154407.GG17123@deviant.kiev.zoral.com.ua>
References:  <Pine.GSO.4.63.0807151453130.12638@muncher.cs.uoguelph.ca> <20080715203641.GA17123@deviant.kiev.zoral.com.ua> <Pine.GSO.4.63.0807161131280.5149@muncher.cs.uoguelph.ca> <20080716154407.GG17123@deviant.kiev.zoral.com.ua>

next in thread | previous in thread | raw e-mail | index | archive | help

--9DMGLuUwtsONN52s
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Jul 16, 2008 at 06:44:07PM +0300, Kostik Belousov wrote:
> On Wed, Jul 16, 2008 at 11:32:28AM -0400, Rick Macklem wrote:
> > Patch looks good. It fixed my problem and hasn't crashed the system yet=
;-)
> Did you tested both elf executables and #!-scripts ?
>=20
> >=20
> > Thanks, rick

And, in fact, the patch has a problem. Namely, it does not properly
track the opened status of the text vnode, because exec_check_permission()
could not opened it in case of error.

Please, retest the change below.

diff --git a/sys/kern/kern_exec.c b/sys/kern/kern_exec.c
index f4335a2..e31ca37 100644
--- a/sys/kern/kern_exec.c
+++ b/sys/kern/kern_exec.c
@@ -369,6 +369,7 @@ do_execve(td, args, mac_p)
 	imgp->entry_addr =3D 0;
 	imgp->vmspace_destroyed =3D 0;
 	imgp->interpreted =3D 0;
+	imgp->opened =3D 0;
 	imgp->interpreter_name =3D args->buf + PATH_MAX + ARG_MAX;
 	imgp->auxargs =3D NULL;
 	imgp->vp =3D NULL;
@@ -496,6 +497,10 @@ interpret:
 		interplabel =3D mac_vnode_label_alloc();
 		mac_vnode_copy_label(binvp->v_label, interplabel);
 #endif
+		if (imgp->opened) {
+			VOP_CLOSE(binvp, FREAD, td->td_ucred, td);
+			imgp->opened =3D 0;
+		}
 		vput(binvp);
 		vm_object_deallocate(imgp->object);
 		imgp->object =3D NULL;
@@ -845,6 +850,8 @@ exec_fail_dealloc:
 	if (imgp->vp !=3D NULL) {
 		if (args->fname)
 			NDFREE(ndp, NDF_ONLY_PNBUF);
+		if (imgp->opened)
+			VOP_CLOSE(imgp->vp, FREAD, td->td_ucred, td);
 		vput(imgp->vp);
 	}
=20
@@ -1326,6 +1333,8 @@ exec_check_permissions(imgp)
 	 * general case).
 	 */
 	error =3D VOP_OPEN(vp, FREAD, td->td_ucred, td, NULL);
+	if (error =3D=3D 0)
+		imgp->opened =3D 1;
 	return (error);
 }
=20
diff --git a/sys/sys/imgact.h b/sys/sys/imgact.h
index 85eaea8..011a7ae 100644
--- a/sys/sys/imgact.h
+++ b/sys/sys/imgact.h
@@ -58,6 +58,7 @@ struct image_params {
 	unsigned long entry_addr; /* entry address of target executable */
 	char vmspace_destroyed;	/* flag - we've blown away original vm space */
 	char interpreted;	/* flag - this executable is interpreted */
+	char opened;		/* flag - we have opened executable vnode */
 	char *interpreter_name;	/* name of the interpreter */
 	void *auxargs;		/* ELF Auxinfo structure pointer */
 	struct sf_buf *firstpage;	/* first page that we mapped */

--9DMGLuUwtsONN52s
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (FreeBSD)

iEYEARECAAYFAkh/JtcACgkQC3+MBN1Mb4jh7wCeIKzpRRAfC8k8vjZb/rcvxqZi
UUAAnRZ3AMVIOjAINZaEImONn8TVrHXQ
=7ID2
-----END PGP SIGNATURE-----

--9DMGLuUwtsONN52s--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080717110247.GI17123>