blob: 0571701ab1c57cc0d3dcddb119ea0c503e1ba641 [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef _LINUX_BINFMTS_H
3#define _LINUX_BINFMTS_H
4
5#include <linux/sched.h>
6#include <linux/unistd.h>
7#include <asm/exec.h>
8#include <uapi/linux/binfmts.h>
9
10struct filename;
11
12#define CORENAME_MAX_SIZE 128
13
14/*
15 * This structure is used to hold the arguments that are used when loading binaries.
16 */
17struct linux_binprm {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000018#ifdef CONFIG_MMU
19 struct vm_area_struct *vma;
20 unsigned long vma_pages;
21#else
22# define MAX_ARG_PAGES 32
23 struct page *page[MAX_ARG_PAGES];
24#endif
25 struct mm_struct *mm;
26 unsigned long p; /* current top of mem */
David Brazdil0f672f62019-12-10 10:32:29 +000027 unsigned long argmin; /* rlimit marker for copy_strings() */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000028 unsigned int
Olivier Deprez157378f2022-04-04 15:47:50 +020029 /* Should an execfd be passed to userspace? */
30 have_execfd:1,
31
32 /* Use the creds of a script (see binfmt_misc) */
33 execfd_creds:1,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000034 /*
Olivier Deprez157378f2022-04-04 15:47:50 +020035 * Set by bprm_creds_for_exec hook to indicate a
36 * privilege-gaining exec has happened. Used to set
37 * AT_SECURE auxv for glibc.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000038 */
Olivier Deprez0e641232021-09-23 10:07:05 +020039 secureexec:1,
40 /*
Olivier Deprez157378f2022-04-04 15:47:50 +020041 * Set when errors can no longer be returned to the
42 * original userspace.
Olivier Deprez0e641232021-09-23 10:07:05 +020043 */
Olivier Deprez157378f2022-04-04 15:47:50 +020044 point_of_no_return:1;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000045#ifdef __alpha__
46 unsigned int taso:1;
47#endif
Olivier Deprez157378f2022-04-04 15:47:50 +020048 struct file *executable; /* Executable to pass to the interpreter */
49 struct file *interpreter;
50 struct file *file;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000051 struct cred *cred; /* new credentials */
52 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */
53 unsigned int per_clear; /* bits to clear in current->personality */
54 int argc, envc;
Olivier Deprez157378f2022-04-04 15:47:50 +020055 const char *filename; /* Name of binary as seen by procps */
56 const char *interp; /* Name of the binary really executed. Most
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000057 of the time same as filename, but could be
58 different for binfmt_{misc,script} */
Olivier Deprez157378f2022-04-04 15:47:50 +020059 const char *fdpath; /* generated filename for execveat */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000060 unsigned interp_flags;
Olivier Deprez157378f2022-04-04 15:47:50 +020061 int execfd; /* File descriptor of the executable */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000062 unsigned long loader, exec;
63
64 struct rlimit rlim_stack; /* Saved RLIMIT_STACK used during exec. */
David Brazdil0f672f62019-12-10 10:32:29 +000065
66 char buf[BINPRM_BUF_SIZE];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000067} __randomize_layout;
68
69#define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
70#define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
71
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000072/* filename of the binary will be inaccessible after exec */
73#define BINPRM_FLAGS_PATH_INACCESSIBLE_BIT 2
74#define BINPRM_FLAGS_PATH_INACCESSIBLE (1 << BINPRM_FLAGS_PATH_INACCESSIBLE_BIT)
75
76/* Function parameter for binfmt->coredump */
77struct coredump_params {
David Brazdil0f672f62019-12-10 10:32:29 +000078 const kernel_siginfo_t *siginfo;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000079 struct pt_regs *regs;
80 struct file *file;
81 unsigned long limit;
82 unsigned long mm_flags;
83 loff_t written;
84 loff_t pos;
85};
86
87/*
88 * This structure defines the functions that are used to load the binary formats that
89 * linux accepts.
90 */
91struct linux_binfmt {
92 struct list_head lh;
93 struct module *module;
94 int (*load_binary)(struct linux_binprm *);
95 int (*load_shlib)(struct file *);
96 int (*core_dump)(struct coredump_params *cprm);
97 unsigned long min_coredump; /* minimal dump size */
98} __randomize_layout;
99
100extern void __register_binfmt(struct linux_binfmt *fmt, int insert);
101
102/* Registration of default binfmt handlers */
103static inline void register_binfmt(struct linux_binfmt *fmt)
104{
105 __register_binfmt(fmt, 0);
106}
107/* Same as above, but adds a new binfmt at the top of the list */
108static inline void insert_binfmt(struct linux_binfmt *fmt)
109{
110 __register_binfmt(fmt, 1);
111}
112
113extern void unregister_binfmt(struct linux_binfmt *);
114
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000115extern int __must_check remove_arg_zero(struct linux_binprm *);
Olivier Deprez157378f2022-04-04 15:47:50 +0200116extern int begin_new_exec(struct linux_binprm * bprm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000117extern void setup_new_exec(struct linux_binprm * bprm);
118extern void finalize_exec(struct linux_binprm *bprm);
119extern void would_dump(struct linux_binprm *, struct file *);
120
121extern int suid_dumpable;
122
123/* Stack area protections */
124#define EXSTACK_DEFAULT 0 /* Whatever the arch defaults to */
125#define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
126#define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
127
128extern int setup_arg_pages(struct linux_binprm * bprm,
129 unsigned long stack_top,
130 int executable_stack);
131extern int transfer_args_to_stack(struct linux_binprm *bprm,
132 unsigned long *sp_location);
133extern int bprm_change_interp(const char *interp, struct linux_binprm *bprm);
Olivier Deprez157378f2022-04-04 15:47:50 +0200134int copy_string_kernel(const char *arg, struct linux_binprm *bprm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000135extern void set_binfmt(struct linux_binfmt *new);
136extern ssize_t read_code(struct file *, unsigned long, loff_t, size_t);
137
Olivier Deprez157378f2022-04-04 15:47:50 +0200138int kernel_execve(const char *filename,
139 const char *const *argv, const char *const *envp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000140
141#endif /* _LINUX_BINFMTS_H */