• Eric W. Biederman's avatar
    exec: Factor bprm_execve out of do_execve_common · 0c9cdff0
    Eric W. Biederman authored
    Currently it is necessary for the usermode helper code and the code
    that launches init to use set_fs so that pages coming from the kernel
    look like they are coming from userspace.
    
    To allow that usage of set_fs to be removed cleanly the argument
    copying from userspace needs to happen earlier.  Factor bprm_execve
    out of do_execve_common to separate out the copying of arguments
    to the newe stack, and the rest of exec.
    
    In separating bprm_execve from do_execve_common the copying
    of the arguments onto the new stack happens earlier.
    
    As the copying of the arguments does not depend any security hooks,
    files, the file table, current->in_execve, current->fs->in_exec,
    bprm->unsafe, or creds this is safe.
    
    Likewise the security hook security_creds_for_exec does not depend upon
    preventing the argument copying from happening.
    
    In addition to making it possible to implement kernel_execve that
    performs the copying differently, this separation of bprm_execve from
    do_execve_common makes for a nice separation of responsibilities making
    the exec code easier to navigate.
    Reviewed-by: default avatarKees Cook <keescook@chromium.org>
    Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
    Link: https://lkml.kernel.org/r/878sfm6x6x.fsf@x220.int.ebiederm.orgSigned-off-by: default avatar"Eric W. Biederman" <ebiederm@xmission.com>
    0c9cdff0
exec.c 49 KB