binfmt_flat: replace flat_argvp_envp_on_stack with a Kconfig variable
[linux-2.6-block.git] / fs / binfmt_flat.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/****************************************************************************/
3/*
4 * linux/fs/binfmt_flat.c
5 *
6 * Copyright (C) 2000-2003 David McCullough <davidm@snapgear.com>
7 * Copyright (C) 2002 Greg Ungerer <gerg@snapgear.com>
8 * Copyright (C) 2002 SnapGear, by Paul Dale <pauli@snapgear.com>
9 * Copyright (C) 2000, 2001 Lineo, by David McCullough <davidm@lineo.com>
10 * based heavily on:
11 *
12 * linux/fs/binfmt_aout.c:
13 * Copyright (C) 1991, 1992, 1996 Linus Torvalds
14 * linux/fs/binfmt_flat.c for 2.0 kernel
15 * Copyright (C) 1998 Kenneth Albanowski <kjahds@kjahds.com>
16 * JAN/99 -- coded full program relocation (gerg@snapgear.com)
17 */
18
4adbb6ac
NP
19#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
20
1da177e4
LT
21#include <linux/kernel.h>
22#include <linux/sched.h>
68db0cf1 23#include <linux/sched/task_stack.h>
1da177e4
LT
24#include <linux/mm.h>
25#include <linux/mman.h>
1da177e4
LT
26#include <linux/errno.h>
27#include <linux/signal.h>
28#include <linux/string.h>
29#include <linux/fs.h>
30#include <linux/file.h>
1da177e4
LT
31#include <linux/ptrace.h>
32#include <linux/user.h>
33#include <linux/slab.h>
34#include <linux/binfmts.h>
35#include <linux/personality.h>
36#include <linux/init.h>
37#include <linux/flat.h>
13c3f50c 38#include <linux/uaccess.h>
472f95f3 39#include <linux/vmalloc.h>
1da177e4
LT
40
41#include <asm/byteorder.h>
1da177e4
LT
42#include <asm/unaligned.h>
43#include <asm/cacheflush.h>
c3dc5bec 44#include <asm/page.h>
1da177e4 45
02da2833
CH
46#ifndef flat_get_relocate_addr
47#define flat_get_relocate_addr(rel) (rel)
48#endif
49
1da177e4
LT
50/****************************************************************************/
51
c3dc5bec 52/*
2e94de8a
MF
53 * User data (data section and bss) needs to be aligned.
54 * We pick 0x20 here because it is the max value elf2flt has always
55 * used in producing FLAT files, and because it seems to be large
56 * enough to make all the gcc alignment related tests happy.
57 */
58#define FLAT_DATA_ALIGN (0x20)
59
60/*
61 * User data (stack) also needs to be aligned.
62 * Here we can be a bit looser than the data sections since this
63 * needs to only meet arch ABI requirements.
c3dc5bec 64 */
2952095c 65#define FLAT_STACK_ALIGN max_t(unsigned long, sizeof(void *), ARCH_SLAB_MINALIGN)
c3dc5bec 66
1da177e4
LT
67#define RELOC_FAILED 0xff00ff01 /* Relocation incorrect somewhere */
68#define UNLOADED_LIB 0x7ff000ff /* Placeholder for unused library */
69
70struct lib_info {
71 struct {
72 unsigned long start_code; /* Start of text segment */
73 unsigned long start_data; /* Start of data segment */
74 unsigned long start_brk; /* End of data segment */
75 unsigned long text_len; /* Length of text segment */
76 unsigned long entry; /* Start address for this module */
77 unsigned long build_date; /* When this one was compiled */
13c3f50c 78 bool loaded; /* Has this library been loaded? */
1da177e4
LT
79 } lib_list[MAX_SHARED_LIBS];
80};
81
82#ifdef CONFIG_BINFMT_SHARED_FLAT
83static int load_flat_shared_library(int id, struct lib_info *p);
84#endif
85
71613c3b 86static int load_flat_binary(struct linux_binprm *);
f6151dfe 87static int flat_core_dump(struct coredump_params *cprm);
1da177e4 88
1da177e4
LT
89static struct linux_binfmt flat_format = {
90 .module = THIS_MODULE,
91 .load_binary = load_flat_binary,
92 .core_dump = flat_core_dump,
93 .min_coredump = PAGE_SIZE
94};
95
96/****************************************************************************/
97/*
98 * Routine writes a core dump image in the current directory.
99 * Currently only a stub-function.
100 */
101
f6151dfe 102static int flat_core_dump(struct coredump_params *cprm)
1da177e4 103{
4adbb6ac
NP
104 pr_warn("Process %s:%d received signr %d and should have core dumped\n",
105 current->comm, current->pid, cprm->siginfo->si_signo);
13c3f50c 106 return 1;
1da177e4
LT
107}
108
109/****************************************************************************/
110/*
111 * create_flat_tables() parses the env- and arg-strings in new user
112 * memory and creates the pointer tables from them, and puts their
a97d157d 113 * addresses on the "stack", recording the new stack pointer value.
1da177e4
LT
114 */
115
a97d157d 116static int create_flat_tables(struct linux_binprm *bprm, unsigned long arg_start)
1da177e4 117{
a97d157d
NP
118 char __user *p;
119 unsigned long __user *sp;
120 long i, len;
1da177e4 121
a97d157d
NP
122 p = (char __user *)arg_start;
123 sp = (unsigned long __user *)current->mm->start_stack;
124
125 sp -= bprm->envc + 1;
126 sp -= bprm->argc + 1;
bdd15a28
CH
127 if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK))
128 sp -= 2; /* argvp + envp */
a97d157d
NP
129 sp -= 1; /* &argc */
130
131 current->mm->start_stack = (unsigned long)sp & -FLAT_STACK_ALIGN;
132 sp = (unsigned long __user *)current->mm->start_stack;
133
134 __put_user(bprm->argc, sp++);
bdd15a28 135 if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK)) {
a97d157d
NP
136 unsigned long argv, envp;
137 argv = (unsigned long)(sp + 2);
138 envp = (unsigned long)(sp + 2 + bprm->argc + 1);
139 __put_user(argv, sp++);
140 __put_user(envp, sp++);
141 }
142
143 current->mm->arg_start = (unsigned long)p;
144 for (i = bprm->argc; i > 0; i--) {
145 __put_user((unsigned long)p, sp++);
146 len = strnlen_user(p, MAX_ARG_STRLEN);
147 if (!len || len > MAX_ARG_STRLEN)
148 return -EINVAL;
149 p += len;
150 }
151 __put_user(0, sp++);
152 current->mm->arg_end = (unsigned long)p;
153
154 current->mm->env_start = (unsigned long) p;
155 for (i = bprm->envc; i > 0; i--) {
156 __put_user((unsigned long)p, sp++);
157 len = strnlen_user(p, MAX_ARG_STRLEN);
158 if (!len || len > MAX_ARG_STRLEN)
159 return -EINVAL;
160 p += len;
161 }
162 __put_user(0, sp++);
163 current->mm->env_end = (unsigned long)p;
164
165 return 0;
1da177e4
LT
166}
167
168/****************************************************************************/
169
170#ifdef CONFIG_BINFMT_ZFLAT
171
172#include <linux/zlib.h>
173
174#define LBUFSIZE 4000
175
176/* gzip flag byte */
177#define ASCII_FLAG 0x01 /* bit 0 set: file probably ASCII text */
178#define CONTINUATION 0x02 /* bit 1 set: continuation of multi-part gzip file */
179#define EXTRA_FIELD 0x04 /* bit 2 set: extra field present */
180#define ORIG_NAME 0x08 /* bit 3 set: original file name present */
181#define COMMENT 0x10 /* bit 4 set: file comment present */
182#define ENCRYPTED 0x20 /* bit 5 set: file is encrypted */
183#define RESERVED 0xC0 /* bit 6,7: reserved */
184
bdd1d2d3
CH
185static int decompress_exec(struct linux_binprm *bprm, loff_t fpos, char *dst,
186 long len, int fd)
1da177e4
LT
187{
188 unsigned char *buf;
189 z_stream strm;
1da177e4
LT
190 int ret, retval;
191
bdd1d2d3 192 pr_debug("decompress_exec(offset=%llx,buf=%p,len=%lx)\n", fpos, dst, len);
1da177e4
LT
193
194 memset(&strm, 0, sizeof(strm));
195 strm.workspace = kmalloc(zlib_inflate_workspacesize(), GFP_KERNEL);
9367bb73 196 if (!strm.workspace)
1da177e4 197 return -ENOMEM;
9367bb73 198
1da177e4 199 buf = kmalloc(LBUFSIZE, GFP_KERNEL);
9367bb73 200 if (!buf) {
1da177e4
LT
201 retval = -ENOMEM;
202 goto out_free;
203 }
204
205 /* Read in first chunk of data and parse gzip header. */
bdd1d2d3 206 ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos);
1da177e4
LT
207
208 strm.next_in = buf;
209 strm.avail_in = ret;
210 strm.total_in = 0;
211
212 retval = -ENOEXEC;
213
214 /* Check minimum size -- gzip header */
215 if (ret < 10) {
4adbb6ac 216 pr_debug("file too small?\n");
1da177e4
LT
217 goto out_free_buf;
218 }
219
220 /* Check gzip magic number */
221 if ((buf[0] != 037) || ((buf[1] != 0213) && (buf[1] != 0236))) {
4adbb6ac 222 pr_debug("unknown compression magic?\n");
1da177e4
LT
223 goto out_free_buf;
224 }
225
226 /* Check gzip method */
227 if (buf[2] != 8) {
4adbb6ac 228 pr_debug("unknown compression method?\n");
1da177e4
LT
229 goto out_free_buf;
230 }
231 /* Check gzip flags */
232 if ((buf[3] & ENCRYPTED) || (buf[3] & CONTINUATION) ||
233 (buf[3] & RESERVED)) {
4adbb6ac 234 pr_debug("unknown flags?\n");
1da177e4
LT
235 goto out_free_buf;
236 }
237
238 ret = 10;
239 if (buf[3] & EXTRA_FIELD) {
240 ret += 2 + buf[10] + (buf[11] << 8);
13c3f50c 241 if (unlikely(ret >= LBUFSIZE)) {
4adbb6ac 242 pr_debug("buffer overflow (EXTRA)?\n");
1da177e4
LT
243 goto out_free_buf;
244 }
245 }
246 if (buf[3] & ORIG_NAME) {
f4cfb18d 247 while (ret < LBUFSIZE && buf[ret++] != 0)
1da177e4 248 ;
13c3f50c 249 if (unlikely(ret == LBUFSIZE)) {
4adbb6ac 250 pr_debug("buffer overflow (ORIG_NAME)?\n");
1da177e4
LT
251 goto out_free_buf;
252 }
253 }
254 if (buf[3] & COMMENT) {
f4cfb18d 255 while (ret < LBUFSIZE && buf[ret++] != 0)
1da177e4 256 ;
13c3f50c 257 if (unlikely(ret == LBUFSIZE)) {
4adbb6ac 258 pr_debug("buffer overflow (COMMENT)?\n");
1da177e4
LT
259 goto out_free_buf;
260 }
261 }
262
263 strm.next_in += ret;
264 strm.avail_in -= ret;
265
266 strm.next_out = dst;
267 strm.avail_out = len;
268 strm.total_out = 0;
269
270 if (zlib_inflateInit2(&strm, -MAX_WBITS) != Z_OK) {
4adbb6ac 271 pr_debug("zlib init failed?\n");
1da177e4
LT
272 goto out_free_buf;
273 }
274
275 while ((ret = zlib_inflate(&strm, Z_NO_FLUSH)) == Z_OK) {
bdd1d2d3 276 ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos);
1da177e4
LT
277 if (ret <= 0)
278 break;
1da177e4
LT
279 len -= ret;
280
281 strm.next_in = buf;
282 strm.avail_in = ret;
283 strm.total_in = 0;
284 }
285
286 if (ret < 0) {
4adbb6ac 287 pr_debug("decompression failed (%d), %s\n",
1da177e4
LT
288 ret, strm.msg);
289 goto out_zlib;
290 }
291
292 retval = 0;
293out_zlib:
294 zlib_inflateEnd(&strm);
295out_free_buf:
296 kfree(buf);
297out_free:
298 kfree(strm.workspace);
1da177e4
LT
299 return retval;
300}
301
302#endif /* CONFIG_BINFMT_ZFLAT */
303
304/****************************************************************************/
305
306static unsigned long
307calc_reloc(unsigned long r, struct lib_info *p, int curid, int internalp)
308{
309 unsigned long addr;
310 int id;
311 unsigned long start_brk;
312 unsigned long start_data;
313 unsigned long text_len;
314 unsigned long start_code;
315
316#ifdef CONFIG_BINFMT_SHARED_FLAT
317 if (r == 0)
318 id = curid; /* Relocs of 0 are always self referring */
319 else {
320 id = (r >> 24) & 0xff; /* Find ID for this reloc */
321 r &= 0x00ffffff; /* Trim ID off here */
322 }
323 if (id >= MAX_SHARED_LIBS) {
4adbb6ac 324 pr_err("reference 0x%lx to shared library %d", r, id);
1da177e4
LT
325 goto failed;
326 }
327 if (curid != id) {
328 if (internalp) {
4adbb6ac
NP
329 pr_err("reloc address 0x%lx not in same module "
330 "(%d != %d)", r, curid, id);
1da177e4 331 goto failed;
13c3f50c
NP
332 } else if (!p->lib_list[id].loaded &&
333 load_flat_shared_library(id, p) < 0) {
4adbb6ac 334 pr_err("failed to load library %d", id);
1da177e4
LT
335 goto failed;
336 }
337 /* Check versioning information (i.e. time stamps) */
338 if (p->lib_list[id].build_date && p->lib_list[curid].build_date &&
339 p->lib_list[curid].build_date < p->lib_list[id].build_date) {
4adbb6ac 340 pr_err("library %d is younger than %d", id, curid);
1da177e4
LT
341 goto failed;
342 }
343 }
344#else
345 id = 0;
346#endif
347
348 start_brk = p->lib_list[id].start_brk;
349 start_data = p->lib_list[id].start_data;
350 start_code = p->lib_list[id].start_code;
351 text_len = p->lib_list[id].text_len;
352
9ee24b2a 353 if (r > start_brk - start_data + text_len) {
4adbb6ac 354 pr_err("reloc outside program 0x%lx (0 - 0x%lx/0x%lx)",
13c3f50c 355 r, start_brk-start_data+text_len, text_len);
1da177e4
LT
356 goto failed;
357 }
358
359 if (r < text_len) /* In text segment */
360 addr = r + start_code;
361 else /* In data segment */
362 addr = r - text_len + start_data;
363
364 /* Range checked already above so doing the range tests is redundant...*/
13c3f50c 365 return addr;
1da177e4
LT
366
367failed:
4adbb6ac 368 pr_cont(", killing %s!\n", current->comm);
1da177e4
LT
369 send_sig(SIGSEGV, current, 0);
370
371 return RELOC_FAILED;
372}
373
374/****************************************************************************/
375
34303435 376static void old_reloc(unsigned long rl)
1da177e4 377{
13c3f50c 378 static const char *segment[] = { "TEXT", "DATA", "BSS", "*UNKNOWN*" };
1da177e4 379 flat_v2_reloc_t r;
1b2ce442
NP
380 unsigned long __user *ptr;
381 unsigned long val;
13c3f50c 382
1da177e4
LT
383 r.value = rl;
384#if defined(CONFIG_COLDFIRE)
1b2ce442 385 ptr = (unsigned long __user *)(current->mm->start_code + r.reloc.offset);
1da177e4 386#else
1b2ce442 387 ptr = (unsigned long __user *)(current->mm->start_data + r.reloc.offset);
1da177e4 388#endif
1b2ce442 389 get_user(val, ptr);
1da177e4 390
4adbb6ac
NP
391 pr_debug("Relocation of variable at DATASEG+%x "
392 "(address %p, currently %lx) into segment %s\n",
1b2ce442 393 r.reloc.offset, ptr, val, segment[r.reloc.type]);
13c3f50c 394
1da177e4
LT
395 switch (r.reloc.type) {
396 case OLD_FLAT_RELOC_TYPE_TEXT:
1b2ce442 397 val += current->mm->start_code;
1da177e4
LT
398 break;
399 case OLD_FLAT_RELOC_TYPE_DATA:
1b2ce442 400 val += current->mm->start_data;
1da177e4
LT
401 break;
402 case OLD_FLAT_RELOC_TYPE_BSS:
1b2ce442 403 val += current->mm->end_data;
1da177e4
LT
404 break;
405 default:
4adbb6ac 406 pr_err("Unknown relocation type=%x\n", r.reloc.type);
1da177e4
LT
407 break;
408 }
1b2ce442 409 put_user(val, ptr);
1da177e4 410
1b2ce442 411 pr_debug("Relocation became %lx\n", val);
13c3f50c 412}
1da177e4
LT
413
414/****************************************************************************/
415
13c3f50c 416static int load_flat_file(struct linux_binprm *bprm,
1da177e4
LT
417 struct lib_info *libinfo, int id, unsigned long *extra_stack)
418{
13c3f50c
NP
419 struct flat_hdr *hdr;
420 unsigned long textpos, datapos, realdatastart;
468138d7 421 u32 text_len, data_len, bss_len, stack_len, full_data, flags;
13c3f50c 422 unsigned long len, memp, memp_size, extra, rlim;
468138d7 423 u32 __user *reloc, *rp;
1da177e4 424 struct inode *inode;
13c3f50c 425 int i, rev, relocs;
1da177e4
LT
426 loff_t fpos;
427 unsigned long start_code, end_code;
13c3f50c 428 ssize_t result;
1ad3dcc0 429 int ret;
1da177e4
LT
430
431 hdr = ((struct flat_hdr *) bprm->buf); /* exec-header */
496ad9aa 432 inode = file_inode(bprm->file);
1da177e4
LT
433
434 text_len = ntohl(hdr->data_start);
435 data_len = ntohl(hdr->data_end) - ntohl(hdr->data_start);
436 bss_len = ntohl(hdr->bss_end) - ntohl(hdr->data_end);
437 stack_len = ntohl(hdr->stack_size);
438 if (extra_stack) {
439 stack_len += *extra_stack;
440 *extra_stack = stack_len;
441 }
442 relocs = ntohl(hdr->reloc_count);
443 flags = ntohl(hdr->flags);
444 rev = ntohl(hdr->rev);
3dc20cb2 445 full_data = data_len + relocs * sizeof(unsigned long);
1da177e4 446
845884d3 447 if (strncmp(hdr->magic, "bFLT", 4)) {
1da177e4 448 /*
e2a366dc
MF
449 * Previously, here was a printk to tell people
450 * "BINFMT_FLAT: bad header magic".
451 * But for the kernel which also use ELF FD-PIC format, this
452 * error message is confusing.
1da177e4 453 * because a lot of people do not manage to produce good
1da177e4 454 */
1ad3dcc0
LY
455 ret = -ENOEXEC;
456 goto err;
845884d3
GU
457 }
458
459 if (flags & FLAT_FLAG_KTRACE)
4adbb6ac 460 pr_info("Loading file: %s\n", bprm->filename);
845884d3
GU
461
462 if (rev != FLAT_VERSION && rev != OLD_FLAT_VERSION) {
4adbb6ac
NP
463 pr_err("bad flat file version 0x%x (supported 0x%lx and 0x%lx)\n",
464 rev, FLAT_VERSION, OLD_FLAT_VERSION);
1ad3dcc0
LY
465 ret = -ENOEXEC;
466 goto err;
1da177e4 467 }
13c3f50c 468
1da177e4
LT
469 /* Don't allow old format executables to use shared libraries */
470 if (rev == OLD_FLAT_VERSION && id != 0) {
4adbb6ac
NP
471 pr_err("shared libraries are not available before rev 0x%lx\n",
472 FLAT_VERSION);
1ad3dcc0
LY
473 ret = -ENOEXEC;
474 goto err;
1da177e4
LT
475 }
476
c995ee28
NP
477 /*
478 * Make sure the header params are sane.
479 * 28 bits (256 MB) is way more than reasonable in this case.
480 * If some top bits are set we have probable binary corruption.
481 */
482 if ((text_len | data_len | bss_len | stack_len | full_data) >> 28) {
483 pr_err("bad header\n");
484 ret = -ENOEXEC;
485 goto err;
486 }
487
1da177e4
LT
488 /*
489 * fix up the flags for the older format, there were all kinds
490 * of endian hacks, this only works for the simple cases
491 */
1d52dca1
CH
492 if (rev == OLD_FLAT_VERSION &&
493 (flags || IS_ENABLED(CONFIG_BINFMT_FLAT_OLD_ALWAYS_RAM)))
1da177e4
LT
494 flags = FLAT_FLAG_RAM;
495
496#ifndef CONFIG_BINFMT_ZFLAT
497 if (flags & (FLAT_FLAG_GZIP|FLAT_FLAG_GZDATA)) {
4adbb6ac 498 pr_err("Support for ZFLAT executables is not enabled.\n");
1ad3dcc0
LY
499 ret = -ENOEXEC;
500 goto err;
1da177e4
LT
501 }
502#endif
503
504 /*
505 * Check initial limits. This avoids letting people circumvent
506 * size limits imposed on them by creating programs with large
507 * arrays in the data or bss.
508 */
d554ed89 509 rlim = rlimit(RLIMIT_DATA);
1da177e4
LT
510 if (rlim >= RLIM_INFINITY)
511 rlim = ~0;
1ad3dcc0
LY
512 if (data_len + bss_len > rlim) {
513 ret = -ENOMEM;
514 goto err;
515 }
516
1da177e4
LT
517 /* Flush all traces of the currently running executable */
518 if (id == 0) {
13c3f50c
NP
519 ret = flush_old_exec(bprm);
520 if (ret)
df88912a 521 goto err;
1da177e4
LT
522
523 /* OK, This is the point of no return */
fcc18e83 524 set_personality(PER_LINUX_32BIT);
221af7f8 525 setup_new_exec(bprm);
1da177e4
LT
526 }
527
528 /*
529 * calculate the extra space we need to map in
530 */
0e647c04
AM
531 extra = max_t(unsigned long, bss_len + stack_len,
532 relocs * sizeof(unsigned long));
1da177e4
LT
533
534 /*
535 * there are a couple of cases here, the separate code/data
536 * case, and then the fully copied to RAM case which lumps
537 * it all together.
538 */
015feacf 539 if (!IS_ENABLED(CONFIG_MMU) && !(flags & (FLAT_FLAG_RAM|FLAT_FLAG_GZIP))) {
1da177e4
LT
540 /*
541 * this should give us a ROM ptr, but if it doesn't we don't
542 * really care
543 */
4adbb6ac 544 pr_debug("ROM mapping of file (we hope)\n");
1da177e4 545
6be5ceb0 546 textpos = vm_mmap(bprm->file, 0, text_len, PROT_READ|PROT_EXEC,
925d1c40 547 MAP_PRIVATE|MAP_EXECUTABLE, 0);
0b8c78f2 548 if (!textpos || IS_ERR_VALUE(textpos)) {
1ad3dcc0 549 ret = textpos;
13c3f50c
NP
550 if (!textpos)
551 ret = -ENOMEM;
4adbb6ac 552 pr_err("Unable to mmap process text, errno %d\n", ret);
df88912a 553 goto err;
1da177e4
LT
554 }
555
72613e5f 556 len = data_len + extra + MAX_SHARED_LIBS * sizeof(unsigned long);
0f3e442a 557 len = PAGE_ALIGN(len);
13c3f50c 558 realdatastart = vm_mmap(NULL, 0, len,
72613e5f 559 PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE, 0);
1da177e4 560
0b8c78f2 561 if (realdatastart == 0 || IS_ERR_VALUE(realdatastart)) {
13c3f50c 562 ret = realdatastart;
1da177e4 563 if (!realdatastart)
13c3f50c 564 ret = -ENOMEM;
4adbb6ac 565 pr_err("Unable to allocate RAM for process data, "
13c3f50c 566 "errno %d\n", ret);
7696e0c3 567 vm_munmap(textpos, text_len);
df88912a 568 goto err;
1da177e4 569 }
c3dc5bec
OS
570 datapos = ALIGN(realdatastart +
571 MAX_SHARED_LIBS * sizeof(unsigned long),
572 FLAT_DATA_ALIGN);
1da177e4 573
a8605423 574 pr_debug("Allocated data+bss+stack (%u bytes): %lx\n",
4adbb6ac 575 data_len + bss_len + stack_len, datapos);
1da177e4
LT
576
577 fpos = ntohl(hdr->data_start);
578#ifdef CONFIG_BINFMT_ZFLAT
579 if (flags & FLAT_FLAG_GZDATA) {
13c3f50c 580 result = decompress_exec(bprm, fpos, (char *)datapos,
3dc20cb2 581 full_data, 0);
1da177e4
LT
582 } else
583#endif
584 {
3dc20cb2
AV
585 result = read_code(bprm->file, datapos, fpos,
586 full_data);
1da177e4 587 }
0b8c78f2 588 if (IS_ERR_VALUE(result)) {
13c3f50c 589 ret = result;
4adbb6ac 590 pr_err("Unable to read data+bss, errno %d\n", ret);
7696e0c3
AV
591 vm_munmap(textpos, text_len);
592 vm_munmap(realdatastart, len);
df88912a 593 goto err;
1da177e4
LT
594 }
595
468138d7 596 reloc = (u32 __user *)
13c3f50c 597 (datapos + (ntohl(hdr->reloc_start) - text_len));
1da177e4 598 memp = realdatastart;
0f3e442a 599 memp_size = len;
1da177e4
LT
600 } else {
601
468138d7 602 len = text_len + data_len + extra + MAX_SHARED_LIBS * sizeof(u32);
0f3e442a 603 len = PAGE_ALIGN(len);
13c3f50c 604 textpos = vm_mmap(NULL, 0, len,
72613e5f 605 PROT_READ | PROT_EXEC | PROT_WRITE, MAP_PRIVATE, 0);
72613e5f 606
0b8c78f2 607 if (!textpos || IS_ERR_VALUE(textpos)) {
1ad3dcc0 608 ret = textpos;
13c3f50c
NP
609 if (!textpos)
610 ret = -ENOMEM;
4adbb6ac 611 pr_err("Unable to allocate RAM for process text/data, "
13c3f50c 612 "errno %d\n", ret);
df88912a 613 goto err;
1da177e4
LT
614 }
615
616 realdatastart = textpos + ntohl(hdr->data_start);
c3dc5bec 617 datapos = ALIGN(realdatastart +
468138d7 618 MAX_SHARED_LIBS * sizeof(u32),
c3dc5bec
OS
619 FLAT_DATA_ALIGN);
620
468138d7 621 reloc = (u32 __user *)
c3dc5bec 622 (datapos + (ntohl(hdr->reloc_start) - text_len));
1da177e4 623 memp = textpos;
0f3e442a 624 memp_size = len;
1da177e4
LT
625#ifdef CONFIG_BINFMT_ZFLAT
626 /*
627 * load it all in and treat it like a RAM load from now on
628 */
629 if (flags & FLAT_FLAG_GZIP) {
472f95f3 630#ifndef CONFIG_MMU
13c3f50c
NP
631 result = decompress_exec(bprm, sizeof(struct flat_hdr),
632 (((char *)textpos) + sizeof(struct flat_hdr)),
3dc20cb2 633 (text_len + full_data
13c3f50c 634 - sizeof(struct flat_hdr)),
1da177e4
LT
635 0);
636 memmove((void *) datapos, (void *) realdatastart,
3dc20cb2 637 full_data);
472f95f3
NP
638#else
639 /*
640 * This is used on MMU systems mainly for testing.
641 * Let's use a kernel buffer to simplify things.
642 */
643 long unz_text_len = text_len - sizeof(struct flat_hdr);
644 long unz_len = unz_text_len + full_data;
645 char *unz_data = vmalloc(unz_len);
646 if (!unz_data) {
647 result = -ENOMEM;
648 } else {
649 result = decompress_exec(bprm, sizeof(struct flat_hdr),
650 unz_data, unz_len, 0);
651 if (result == 0 &&
652 (copy_to_user((void __user *)textpos + sizeof(struct flat_hdr),
653 unz_data, unz_text_len) ||
654 copy_to_user((void __user *)datapos,
655 unz_data + unz_text_len, full_data)))
656 result = -EFAULT;
657 vfree(unz_data);
658 }
659#endif
1da177e4 660 } else if (flags & FLAT_FLAG_GZDATA) {
3dc20cb2 661 result = read_code(bprm->file, textpos, 0, text_len);
472f95f3
NP
662 if (!IS_ERR_VALUE(result)) {
663#ifndef CONFIG_MMU
1da177e4 664 result = decompress_exec(bprm, text_len, (char *) datapos,
3dc20cb2 665 full_data, 0);
472f95f3
NP
666#else
667 char *unz_data = vmalloc(full_data);
668 if (!unz_data) {
669 result = -ENOMEM;
670 } else {
671 result = decompress_exec(bprm, text_len,
672 unz_data, full_data, 0);
673 if (result == 0 &&
674 copy_to_user((void __user *)datapos,
675 unz_data, full_data))
676 result = -EFAULT;
677 vfree(unz_data);
678 }
1da177e4 679#endif
472f95f3
NP
680 }
681 } else
682#endif /* CONFIG_BINFMT_ZFLAT */
1da177e4 683 {
3dc20cb2
AV
684 result = read_code(bprm->file, textpos, 0, text_len);
685 if (!IS_ERR_VALUE(result))
686 result = read_code(bprm->file, datapos,
687 ntohl(hdr->data_start),
688 full_data);
1da177e4 689 }
0b8c78f2 690 if (IS_ERR_VALUE(result)) {
13c3f50c 691 ret = result;
4adbb6ac 692 pr_err("Unable to read code+data+bss, errno %d\n", ret);
7696e0c3 693 vm_munmap(textpos, text_len + data_len + extra +
468138d7 694 MAX_SHARED_LIBS * sizeof(u32));
df88912a 695 goto err;
1da177e4
LT
696 }
697 }
698
13c3f50c
NP
699 start_code = textpos + sizeof(struct flat_hdr);
700 end_code = textpos + text_len;
701 text_len -= sizeof(struct flat_hdr); /* the real code len */
1da177e4
LT
702
703 /* The main program needs a little extra setup in the task structure */
1da177e4
LT
704 if (id == 0) {
705 current->mm->start_code = start_code;
706 current->mm->end_code = end_code;
707 current->mm->start_data = datapos;
708 current->mm->end_data = datapos + data_len;
709 /*
710 * set up the brk stuff, uses any slack left in data/bss/stack
711 * allocation. We put the brk after the bss (between the bss
712 * and stack) like other platforms.
0f3e442a
DH
713 * Userspace code relies on the stack pointer starting out at
714 * an address right at the end of a page.
1da177e4
LT
715 */
716 current->mm->start_brk = datapos + data_len + bss_len;
717 current->mm->brk = (current->mm->start_brk + 3) & ~3;
015feacf 718#ifndef CONFIG_MMU
0f3e442a 719 current->mm->context.end_brk = memp + memp_size - stack_len;
015feacf 720#endif
1da177e4
LT
721 }
722
13c3f50c 723 if (flags & FLAT_FLAG_KTRACE) {
4adbb6ac
NP
724 pr_info("Mapping is %lx, Entry point is %x, data_start is %x\n",
725 textpos, 0x00ffffff&ntohl(hdr->entry), ntohl(hdr->data_start));
726 pr_info("%s %s: TEXT=%lx-%lx DATA=%lx-%lx BSS=%lx-%lx\n",
727 id ? "Lib" : "Load", bprm->filename,
728 start_code, end_code, datapos, datapos + data_len,
729 datapos + data_len, (datapos + data_len + bss_len + 3) & ~3);
13c3f50c 730 }
1da177e4
LT
731
732 /* Store the current module values into the global library structure */
733 libinfo->lib_list[id].start_code = start_code;
734 libinfo->lib_list[id].start_data = datapos;
735 libinfo->lib_list[id].start_brk = datapos + data_len + bss_len;
736 libinfo->lib_list[id].text_len = text_len;
737 libinfo->lib_list[id].loaded = 1;
738 libinfo->lib_list[id].entry = (0x00ffffff & ntohl(hdr->entry)) + textpos;
739 libinfo->lib_list[id].build_date = ntohl(hdr->build_date);
13c3f50c 740
1da177e4
LT
741 /*
742 * We just load the allocations into some temporary memory to
743 * help simplify all this mumbo jumbo
744 *
745 * We've got two different sections of relocation entries.
25985edc 746 * The first is the GOT which resides at the beginning of the data segment
1da177e4
LT
747 * and is terminated with a -1. This one can be relocated in place.
748 * The second is the extra relocation entries tacked after the image's
749 * data segment. These require a little more processing as the entry is
750 * really an offset into the image which contains an offset into the
751 * image.
752 */
753 if (flags & FLAT_FLAG_GOTPIC) {
468138d7
AV
754 for (rp = (u32 __user *)datapos; ; rp++) {
755 u32 addr, rp_val;
6e572ffe
NP
756 if (get_user(rp_val, rp))
757 return -EFAULT;
758 if (rp_val == 0xffffffff)
759 break;
760 if (rp_val) {
761 addr = calc_reloc(rp_val, libinfo, id, 0);
1ad3dcc0
LY
762 if (addr == RELOC_FAILED) {
763 ret = -ENOEXEC;
df88912a 764 goto err;
1ad3dcc0 765 }
6e572ffe
NP
766 if (put_user(addr, rp))
767 return -EFAULT;
1da177e4
LT
768 }
769 }
770 }
771
772 /*
773 * Now run through the relocation entries.
774 * We've got to be careful here as C++ produces relocatable zero
775 * entries in the constructor and destructor tables which are then
776 * tested for being not zero (which will always occur unless we're
777 * based from address zero). This causes an endless loop as __start
778 * is at zero. The solution used is to not relocate zero addresses.
779 * This has the negative side effect of not allowing a global data
780 * reference to be statically initialised to _stext (I've moved
781 * __start to address 4 so that is okay).
782 */
783 if (rev > OLD_FLAT_VERSION) {
468138d7 784 u32 __maybe_unused persistent = 0;
13c3f50c 785 for (i = 0; i < relocs; i++) {
468138d7 786 u32 addr, relval;
1da177e4 787
13c3f50c
NP
788 /*
789 * Get the address of the pointer to be
790 * relocated (of course, the address has to be
791 * relocated first).
792 */
6e572ffe
NP
793 if (get_user(relval, reloc + i))
794 return -EFAULT;
795 relval = ntohl(relval);
1da177e4 796 addr = flat_get_relocate_addr(relval);
468138d7
AV
797 rp = (u32 __user *)calc_reloc(addr, libinfo, id, 1);
798 if (rp == (u32 __user *)RELOC_FAILED) {
1ad3dcc0 799 ret = -ENOEXEC;
df88912a 800 goto err;
1ad3dcc0 801 }
1da177e4
LT
802
803 /* Get the pointer's value. */
468138d7
AV
804 ret = flat_get_addr_from_rp(rp, relval, flags,
805 &addr, &persistent);
806 if (unlikely(ret))
807 goto err;
808
1da177e4
LT
809 if (addr != 0) {
810 /*
811 * Do the relocation. PIC relocs in the data section are
812 * already in target order
813 */
814 if ((flags & FLAT_FLAG_GOTPIC) == 0)
815 addr = ntohl(addr);
816 addr = calc_reloc(addr, libinfo, id, 0);
1ad3dcc0
LY
817 if (addr == RELOC_FAILED) {
818 ret = -ENOEXEC;
df88912a 819 goto err;
1ad3dcc0 820 }
1da177e4
LT
821
822 /* Write back the relocated pointer. */
468138d7
AV
823 ret = flat_put_addr_at_rp(rp, addr, relval);
824 if (unlikely(ret))
825 goto err;
1da177e4
LT
826 }
827 }
828 } else {
1b2ce442 829 for (i = 0; i < relocs; i++) {
468138d7 830 u32 relval;
1b2ce442
NP
831 if (get_user(relval, reloc + i))
832 return -EFAULT;
833 relval = ntohl(relval);
834 old_reloc(relval);
835 }
1da177e4 836 }
13c3f50c 837
1da177e4
LT
838 flush_icache_range(start_code, end_code);
839
840 /* zero the BSS, BRK and stack areas */
467aa146
NP
841 if (clear_user((void __user *)(datapos + data_len), bss_len +
842 (memp + memp_size - stack_len - /* end brk */
843 libinfo->lib_list[id].start_brk) + /* start brk */
844 stack_len))
845 return -EFAULT;
1da177e4
LT
846
847 return 0;
1ad3dcc0
LY
848err:
849 return ret;
1da177e4
LT
850}
851
852
853/****************************************************************************/
854#ifdef CONFIG_BINFMT_SHARED_FLAT
855
856/*
857 * Load a shared library into memory. The library gets its own data
858 * segment (including bss) but not argv/argc/environ.
859 */
860
861static int load_flat_shared_library(int id, struct lib_info *libs)
862{
863 struct linux_binprm bprm;
864 int res;
865 char buf[16];
866
3a852d3b
DH
867 memset(&bprm, 0, sizeof(bprm));
868
1da177e4
LT
869 /* Create the file name */
870 sprintf(buf, "/lib/lib%d.so", id);
871
872 /* Open the file up */
873 bprm.filename = buf;
874 bprm.file = open_exec(bprm.filename);
875 res = PTR_ERR(bprm.file);
876 if (IS_ERR(bprm.file))
877 return res;
878
3440625d
LT
879 bprm.cred = prepare_exec_creds();
880 res = -ENOMEM;
881 if (!bprm.cred)
882 goto out;
883
3a852d3b
DH
884 /* We don't really care about recalculating credentials at this point
885 * as we're past the point of no return and are dealing with shared
886 * libraries.
887 */
ddb4a144 888 bprm.called_set_creds = 1;
3a852d3b 889
1da177e4
LT
890 res = prepare_binprm(&bprm);
891
287980e4 892 if (!res)
1da177e4 893 res = load_flat_file(&bprm, libs, id, NULL);
3440625d
LT
894
895 abort_creds(bprm.cred);
896
897out:
898 allow_write_access(bprm.file);
899 fput(bprm.file);
900
13c3f50c 901 return res;
1da177e4
LT
902}
903
904#endif /* CONFIG_BINFMT_SHARED_FLAT */
905/****************************************************************************/
906
907/*
908 * These are the functions used to load flat style executables and shared
909 * libraries. There is no binary dependent code anywhere else.
910 */
911
13c3f50c 912static int load_flat_binary(struct linux_binprm *bprm)
1da177e4
LT
913{
914 struct lib_info libinfo;
71613c3b 915 struct pt_regs *regs = current_pt_regs();
015feacf 916 unsigned long stack_len = 0;
1da177e4 917 unsigned long start_addr;
1da177e4
LT
918 int res;
919 int i, j;
920
921 memset(&libinfo, 0, sizeof(libinfo));
13c3f50c 922
1da177e4
LT
923 /*
924 * We have to add the size of our arguments to our stack size
925 * otherwise it's too easy for users to create stack overflows
926 * by passing in a huge argument list. And yes, we have to be
927 * pedantic and include space for the argv/envp array as it may have
928 * a lot of entries.
929 */
015feacf
NP
930#ifndef CONFIG_MMU
931 stack_len += PAGE_SIZE * MAX_ARG_PAGES - bprm->p; /* the strings */
932#endif
a97d157d
NP
933 stack_len += (bprm->argc + 1) * sizeof(char *); /* the argv array */
934 stack_len += (bprm->envc + 1) * sizeof(char *); /* the envp array */
935 stack_len = ALIGN(stack_len, FLAT_STACK_ALIGN);
13c3f50c 936
1da177e4 937 res = load_flat_file(bprm, &libinfo, 0, &stack_len);
287980e4 938 if (res < 0)
1da177e4 939 return res;
13c3f50c 940
1da177e4 941 /* Update data segment pointers for all libraries */
af521f92
NP
942 for (i = 0; i < MAX_SHARED_LIBS; i++) {
943 if (!libinfo.lib_list[i].loaded)
944 continue;
945 for (j = 0; j < MAX_SHARED_LIBS; j++) {
946 unsigned long val = libinfo.lib_list[j].loaded ?
947 libinfo.lib_list[j].start_data : UNLOADED_LIB;
948 unsigned long __user *p = (unsigned long __user *)
949 libinfo.lib_list[i].start_data;
950 p -= j + 1;
951 if (put_user(val, p))
952 return -EFAULT;
953 }
954 }
1da177e4 955
a6f76f23 956 install_exec_creds(bprm);
1da177e4
LT
957
958 set_binfmt(&flat_format);
959
015feacf
NP
960#ifdef CONFIG_MMU
961 res = setup_arg_pages(bprm, STACK_TOP, EXSTACK_DEFAULT);
962 if (!res)
963 res = create_flat_tables(bprm, bprm->p);
964#else
a97d157d
NP
965 /* Stash our initial stack pointer into the mm structure */
966 current->mm->start_stack =
967 ((current->mm->context.end_brk + stack_len + 3) & ~3) - 4;
968 pr_debug("sp=%lx\n", current->mm->start_stack);
1da177e4 969
687fd773 970 /* copy the arg pages onto the stack */
a97d157d
NP
971 res = transfer_args_to_stack(bprm, &current->mm->start_stack);
972 if (!res)
973 res = create_flat_tables(bprm, current->mm->start_stack);
015feacf 974#endif
687fd773
NP
975 if (res)
976 return res;
1da177e4 977
1da177e4
LT
978 /* Fake some return addresses to ensure the call chain will
979 * initialise library in order for us. We are required to call
980 * lib 1 first, then 2, ... and finally the main program (id 0).
981 */
982 start_addr = libinfo.lib_list[0].entry;
983
984#ifdef CONFIG_BINFMT_SHARED_FLAT
13c3f50c 985 for (i = MAX_SHARED_LIBS-1; i > 0; i--) {
1da177e4
LT
986 if (libinfo.lib_list[i].loaded) {
987 /* Push previos first to call address */
a97d157d
NP
988 unsigned long __user *sp;
989 current->mm->start_stack -= sizeof(unsigned long);
990 sp = (unsigned long __user *)current->mm->start_stack;
991 __put_user(start_addr, sp);
1da177e4
LT
992 start_addr = libinfo.lib_list[i].entry;
993 }
994 }
995#endif
13c3f50c 996
74c27c43
TY
997#ifdef FLAT_PLAT_INIT
998 FLAT_PLAT_INIT(regs);
999#endif
13c3f50c 1000
b8383831 1001 finalize_exec(bprm);
4adbb6ac
NP
1002 pr_debug("start_thread(regs=0x%p, entry=0x%lx, start_stack=0x%lx)\n",
1003 regs, start_addr, current->mm->start_stack);
1da177e4
LT
1004 start_thread(regs, start_addr, current->mm->start_stack);
1005
1da177e4
LT
1006 return 0;
1007}
1008
1009/****************************************************************************/
1010
1011static int __init init_flat_binfmt(void)
1012{
8fc3dc5a
AV
1013 register_binfmt(&flat_format);
1014 return 0;
1da177e4 1015}
1da177e4 1016core_initcall(init_flat_binfmt);
1da177e4
LT
1017
1018/****************************************************************************/