]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - include/linux/binfmts.h
Merge tag 'nfs-for-4.14-1' of git://git.linux-nfs.org/projects/trondmy/linux-nfs
[mirror_ubuntu-bionic-kernel.git] / include / linux / binfmts.h
CommitLineData
1da177e4
LT
1#ifndef _LINUX_BINFMTS_H
2#define _LINUX_BINFMTS_H
3
96e02d15 4#include <linux/sched.h>
282124d1 5#include <linux/unistd.h>
826eba4d 6#include <asm/exec.h>
607ca46e 7#include <uapi/linux/binfmts.h>
1da177e4 8
28851755
IM
9struct filename;
10
71ce92f3
DA
11#define CORENAME_MAX_SIZE 128
12
1da177e4
LT
13/*
14 * This structure is used to hold the arguments that are used when loading binaries.
15 */
f670d0ec 16struct linux_binprm {
1da177e4 17 char buf[BINPRM_BUF_SIZE];
b6a2fea3
OW
18#ifdef CONFIG_MMU
19 struct vm_area_struct *vma;
3c77f845 20 unsigned long vma_pages;
b6a2fea3
OW
21#else
22# define MAX_ARG_PAGES 32
1da177e4 23 struct page *page[MAX_ARG_PAGES];
b6a2fea3 24#endif
1da177e4
LT
25 struct mm_struct *mm;
26 unsigned long p; /* current top of mem */
a50b0aa4 27 unsigned int
ddb4a144
KC
28 /*
29 * True after the bprm_set_creds hook has been called once
30 * (multiple calls can be made via prepare_binprm() for
31 * binfmt_script/misc).
32 */
33 called_set_creds:1,
46d98eb4
KC
34 /*
35 * True if most recent call to the commoncaps bprm_set_creds
36 * hook (due to multiple prepare_binprm() calls from the
37 * binfmt_script/misc handlers) resulted in elevated
38 * privileges.
39 */
40 cap_elevated:1,
c425e189
KC
41 /*
42 * Set by bprm_set_creds hook to indicate a privilege-gaining
43 * exec has happened. Used to sanitize execution environment
44 * and to set AT_SECURE auxv for glibc.
45 */
46 secureexec:1;
53112488
KS
47#ifdef __alpha__
48 unsigned int taso:1;
49#endif
131b2f9f 50 unsigned int recursion_depth; /* only for search_binary_handler() */
1da177e4 51 struct file * file;
a6f76f23
DH
52 struct cred *cred; /* new credentials */
53 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */
54 unsigned int per_clear; /* bits to clear in current->personality */
1da177e4 55 int argc, envc;
d7627467
DH
56 const char * filename; /* Name of binary as seen by procps */
57 const char * interp; /* Name of the binary really executed. Most
1da177e4
LT
58 of the time same as filename, but could be
59 different for binfmt_{misc,script} */
60 unsigned interp_flags;
61 unsigned interp_data;
62 unsigned long loader, exec;
3859a271 63} __randomize_layout;
1da177e4
LT
64
65#define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
66#define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
67
68/* fd of the binary should be passed to the interpreter */
69#define BINPRM_FLAGS_EXECFD_BIT 1
70#define BINPRM_FLAGS_EXECFD (1 << BINPRM_FLAGS_EXECFD_BIT)
71
51f39a1f
DD
72/* filename of the binary will be inaccessible after exec */
73#define BINPRM_FLAGS_PATH_INACCESSIBLE_BIT 2
74#define BINPRM_FLAGS_PATH_INACCESSIBLE (1 << BINPRM_FLAGS_PATH_INACCESSIBLE_BIT)
75
f6151dfe
MH
76/* Function parameter for binfmt->coredump */
77struct coredump_params {
ec57941e 78 const siginfo_t *siginfo;
f6151dfe
MH
79 struct pt_regs *regs;
80 struct file *file;
81 unsigned long limit;
30736a4d 82 unsigned long mm_flags;
ecc8c772 83 loff_t written;
1607f09c 84 loff_t pos;
f6151dfe
MH
85};
86
1da177e4
LT
87/*
88 * This structure defines the functions that are used to load the binary formats that
89 * linux accepts.
90 */
91struct linux_binfmt {
e4dc1b14 92 struct list_head lh;
1da177e4 93 struct module *module;
71613c3b 94 int (*load_binary)(struct linux_binprm *);
1da177e4 95 int (*load_shlib)(struct file *);
f6151dfe 96 int (*core_dump)(struct coredump_params *cprm);
1da177e4 97 unsigned long min_coredump; /* minimal dump size */
3859a271 98} __randomize_layout;
1da177e4 99
8fc3dc5a 100extern void __register_binfmt(struct linux_binfmt *fmt, int insert);
74641f58
IK
101
102/* Registration of default binfmt handlers */
8fc3dc5a 103static inline void register_binfmt(struct linux_binfmt *fmt)
74641f58 104{
8fc3dc5a 105 __register_binfmt(fmt, 0);
74641f58
IK
106}
107/* Same as above, but adds a new binfmt at the top of the list */
8fc3dc5a 108static inline void insert_binfmt(struct linux_binfmt *fmt)
74641f58 109{
8fc3dc5a 110 __register_binfmt(fmt, 1);
74641f58
IK
111}
112
f6b450d4 113extern void unregister_binfmt(struct linux_binfmt *);
1da177e4
LT
114
115extern int prepare_binprm(struct linux_binprm *);
b6a2fea3 116extern int __must_check remove_arg_zero(struct linux_binprm *);
3c456bfc 117extern int search_binary_handler(struct linux_binprm *);
1da177e4 118extern int flush_old_exec(struct linux_binprm * bprm);
221af7f8 119extern void setup_new_exec(struct linux_binprm * bprm);
1b5d783c 120extern void would_dump(struct linux_binprm *, struct file *);
1da177e4 121
d6e71144 122extern int suid_dumpable;
d6e71144 123
1da177e4
LT
124/* Stack area protections */
125#define EXSTACK_DEFAULT 0 /* Whatever the arch defaults to */
126#define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
127#define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
128
129extern int setup_arg_pages(struct linux_binprm * bprm,
130 unsigned long stack_top,
131 int executable_stack);
7e7ec6a9
NP
132extern int transfer_args_to_stack(struct linux_binprm *bprm,
133 unsigned long *sp_location);
b66c5984 134extern int bprm_change_interp(char *interp, struct linux_binprm *bprm);
d7627467
DH
135extern int copy_strings_kernel(int argc, const char *const *argv,
136 struct linux_binprm *bprm);
a2a8474c 137extern int prepare_bprm_creds(struct linux_binprm *bprm);
a6f76f23 138extern void install_exec_creds(struct linux_binprm *bprm);
964ee7df 139extern void set_binfmt(struct linux_binfmt *new);
3dc20cb2 140extern ssize_t read_code(struct file *, unsigned long, loff_t, size_t);
1da177e4 141
28851755
IM
142extern int do_execve(struct filename *,
143 const char __user * const __user *,
144 const char __user * const __user *);
145extern int do_execveat(int, struct filename *,
146 const char __user * const __user *,
147 const char __user * const __user *,
148 int);
149
1da177e4 150#endif /* _LINUX_BINFMTS_H */