EXECVE

Section: Linux Programmer's Manual (2)
Updated: 4 April 2000
Index Return to Main Contents
 

NAME

execve, execve_secure - execute a program  

SYNOPSIS

#include <unistd.h>

int execve (const char *filename, char *const argv [], char *const envp[]);

#include <proc_secure.h>

int execve (const char *filename, char *const argv [], char *const envp[], security_id_t sid);  

DESCRIPTION

execve() executes the program pointed to by filename. filename must be either a binary executable, or a script starting with a line of the form "#! interpreter [arg]". In the latter case, the interpreter must be a valid pathname for an executable which is not itself a script, which will be invoked as interpreter [arg] filename if the security policy will allow it.

execve_secure() is the same as execve except that it has an additional security identifier (SID) parameter. On success the process will be executing in the security context associated with that SID. A call to execve() may also cause a SID transition. A default transition is calculated based on the current SID of the process and the SID of the program being executed.

execve() does not return on success, and the text, data, bss, and stack of the calling process are overwritten by that of the program loaded. The program invoked inherits the calling process's PID, and any open file descriptors that are not set to close on exec or invalidated by the security policy because of a SID transition. Signals pending on the parent process are cleared. Any signals set to be caught by the calling process are reset to their default behaviour.

If the current program is being ptraced, a SIGTRAP is sent to it after a successful execve().

If the executable is an a.out dynamically-linked binary executable containing shared-library stubs, the Linux dynamic linker ld.so(8) is called at the start of execution to bring needed shared libraries into core and link the executable with them. The security policy must allow the process to execute from that shared library.

If the executable is a dynamically-linked ELF executable, the interpreter named in the PT_INTERP segment is used to load the needed shared libraries. This interpreter is typically /lib/ld-linux.so.1 for binaries linked with the Linux libc version 5, or /lib/ld-linux.so.2 for binaries linked with the GNU libc version 2. Appropriate permission checking is done to ensure that interpreter can be executed. Failure will result in a failure of the call.

 

RETURN VALUE

On success, execve() does not return, on error -1 is returned, and errno is set appropriately.  

ERRORS

EACCES
The file or a script interpreter is not a regular file.
EACCES
Execute permission is denied for the file or a script interpreter.
EACCES
The file system is mounted noexec.
EPERM
The file system is mounted nosuid, the user is not the superuser, and the file has an SUID or SGID bit set.
EPERM
The process is being traced, the user is not the superuser and the file has an SUID or SGID bit set.
E2BIG
The argument list is too big.
ENOEXEC
An executable is not in a recognised format, is for the wrong architecture, or has some other format error that means it cannot be executed.
EFAULT
filename points outside your accessible address space.
ENAMETOOLONG
filename is too long.
ENOENT
The file filename or a script or ELF interpreter does not exist.
ENOMEM
Insufficient kernel memory was available.
ENOTDIR
A component of the path prefix of filename or a script or ELF interpreter is not a directory.
EACCES
Search permission is denied on a component of the path prefix of filename or the name of a script interpreter.
ELOOP
Too many symbolic links were encountered in resolving filename or the name of a script or ELF interpreter.
ETXTBUSY
Executable was open for writing by one or more processes.
EIO
An I/O error occurred.
ENFILE
The limit on the total number of files open on the system has been reached.
EMFILE
The process has the maximum number of files open.
EINVAL
An ELF executable had more than one PT_INTERP segment (i.e., tried to name more than one interpreter).
EISDIR
An ELF interpreter was a directory.
ELIBBAD
An ELF interpreter was not in a recognised format.
 

CONFORMING TO

SVr4, SVID, X/OPEN, BSD 4.3. POSIX does not document the #! behavior but is otherwise compatible. SVr4 documents additional error conditions EAGAIN, EINTR, ELIBACC, ENOLINK, EMULTIHOP; POSIX does not document ETXTBSY, EPERM, EFAULT, ELOOP, EIO, ENFILE, EMFILE, EINVAL, EISDIR or ELIBBAD error conditions.  

NOTES

SUID and SGID processes can not be ptrace()d SUID or SGID.

A maximum line length of 127 characters is allowed for the first line in a #! executable shell script.

Linux ignores the SUID and SGID bits on scripts. SID transitions may not occur if the new program is a script.

 

SEE ALSO

ld.so(8), execl(3), fork(2), getsecsid(2), getosecsid(2)


 

Index

NAME
SYNOPSIS
DESCRIPTION
RETURN VALUE
ERRORS
CONFORMING TO
NOTES
SEE ALSO

This document was created by man2html, using the manual pages.
Time: 17:08:26 GMT, December 18, 2000