vm_area_operations: kill ->migrate()
[linux-2.6-block.git] / fs / binfmt_misc.c
CommitLineData
1da177e4 1/*
e6084d4a 2 * binfmt_misc.c
1da177e4 3 *
e6084d4a 4 * Copyright (C) 1997 Richard Günther
1da177e4 5 *
e6084d4a
MF
6 * binfmt_misc detects binaries via a magic or filename extension and invokes
7 * a specified wrapper. See Documentation/binfmt_misc.txt for more details.
1da177e4
LT
8 */
9
6b899c4e
MF
10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
11
1da177e4
LT
12#include <linux/module.h>
13#include <linux/init.h>
e8edc6e0 14#include <linux/sched.h>
b502bd11 15#include <linux/magic.h>
1da177e4
LT
16#include <linux/binfmts.h>
17#include <linux/slab.h>
18#include <linux/ctype.h>
8d82e180 19#include <linux/string_helpers.h>
1da177e4
LT
20#include <linux/file.h>
21#include <linux/pagemap.h>
22#include <linux/namei.h>
23#include <linux/mount.h>
24#include <linux/syscalls.h>
6e2c10a1 25#include <linux/fs.h>
6b899c4e 26#include <linux/uaccess.h>
1da177e4 27
6b899c4e
MF
28#ifdef DEBUG
29# define USE_DEBUG 1
30#else
31# define USE_DEBUG 0
32#endif
1da177e4
LT
33
34enum {
35 VERBOSE_STATUS = 1 /* make it zero to save 400 bytes kernel memory */
36};
37
38static LIST_HEAD(entries);
39static int enabled = 1;
40
41enum {Enabled, Magic};
e6084d4a
MF
42#define MISC_FMT_PRESERVE_ARGV0 (1 << 31)
43#define MISC_FMT_OPEN_BINARY (1 << 30)
44#define MISC_FMT_CREDENTIALS (1 << 29)
1da177e4
LT
45
46typedef struct {
47 struct list_head list;
48 unsigned long flags; /* type, status, etc. */
49 int offset; /* offset of magic */
50 int size; /* size of magic/mask */
51 char *magic; /* magic or filename extension */
52 char *mask; /* mask, NULL for exact match */
53 char *interpreter; /* filename of interpreter */
54 char *name;
55 struct dentry *dentry;
56} Node;
57
58static DEFINE_RWLOCK(entries_lock);
1f5ce9e9 59static struct file_system_type bm_fs_type;
1da177e4
LT
60static struct vfsmount *bm_mnt;
61static int entry_count;
62
bbaecc08
MF
63/*
64 * Max length of the register string. Determined by:
65 * - 7 delimiters
66 * - name: ~50 bytes
67 * - type: 1 byte
68 * - offset: 3 bytes (has to be smaller than BINPRM_BUF_SIZE)
69 * - magic: 128 bytes (512 in escaped form)
70 * - mask: 128 bytes (512 in escaped form)
71 * - interp: ~50 bytes
72 * - flags: 5 bytes
73 * Round that up a bit, and then back off to hold the internal data
74 * (like struct Node).
75 */
76#define MAX_REGISTER_LENGTH 1920
77
78/*
1da177e4
LT
79 * Check if we support the binfmt
80 * if we do, return the node, else NULL
81 * locking is done in load_misc_binary
82 */
83static Node *check_file(struct linux_binprm *bprm)
84{
85 char *p = strrchr(bprm->interp, '.');
86 struct list_head *l;
87
6b899c4e 88 /* Walk all the registered handlers. */
1da177e4
LT
89 list_for_each(l, &entries) {
90 Node *e = list_entry(l, Node, list);
91 char *s;
92 int j;
93
6b899c4e 94 /* Make sure this one is currently enabled. */
1da177e4
LT
95 if (!test_bit(Enabled, &e->flags))
96 continue;
97
6b899c4e 98 /* Do matching based on extension if applicable. */
1da177e4
LT
99 if (!test_bit(Magic, &e->flags)) {
100 if (p && !strcmp(e->magic, p + 1))
101 return e;
102 continue;
103 }
104
6b899c4e 105 /* Do matching based on magic & mask. */
1da177e4
LT
106 s = bprm->buf + e->offset;
107 if (e->mask) {
108 for (j = 0; j < e->size; j++)
109 if ((*s++ ^ e->magic[j]) & e->mask[j])
110 break;
111 } else {
112 for (j = 0; j < e->size; j++)
113 if ((*s++ ^ e->magic[j]))
114 break;
115 }
116 if (j == e->size)
117 return e;
118 }
119 return NULL;
120}
121
122/*
123 * the loader itself
124 */
71613c3b 125static int load_misc_binary(struct linux_binprm *bprm)
1da177e4
LT
126{
127 Node *fmt;
e6084d4a 128 struct file *interp_file = NULL;
1da177e4 129 char iname[BINPRM_BUF_SIZE];
d7627467 130 const char *iname_addr = iname;
1da177e4
LT
131 int retval;
132 int fd_binary = -1;
1da177e4
LT
133
134 retval = -ENOEXEC;
135 if (!enabled)
e6084d4a 136 goto ret;
1da177e4
LT
137
138 /* to keep locking time low, we copy the interpreter string */
139 read_lock(&entries_lock);
140 fmt = check_file(bprm);
141 if (fmt)
142 strlcpy(iname, fmt->interpreter, BINPRM_BUF_SIZE);
143 read_unlock(&entries_lock);
144 if (!fmt)
e6084d4a 145 goto ret;
1da177e4 146
51f39a1f
DD
147 /* Need to be able to load the file after exec */
148 if (bprm->interp_flags & BINPRM_FLAGS_PATH_INACCESSIBLE)
149 return -ENOENT;
150
1da177e4 151 if (!(fmt->flags & MISC_FMT_PRESERVE_ARGV0)) {
b6a2fea3
OW
152 retval = remove_arg_zero(bprm);
153 if (retval)
e6084d4a 154 goto ret;
1da177e4
LT
155 }
156
157 if (fmt->flags & MISC_FMT_OPEN_BINARY) {
158
1da177e4
LT
159 /* if the binary should be opened on behalf of the
160 * interpreter than keep it open and assign descriptor
e6084d4a
MF
161 * to it
162 */
c6cb898b 163 fd_binary = get_unused_fd_flags(0);
e6084d4a
MF
164 if (fd_binary < 0) {
165 retval = fd_binary;
166 goto ret;
167 }
168 fd_install(fd_binary, bprm->file);
1da177e4
LT
169
170 /* if the binary is not readable than enforce mm->dumpable=0
171 regardless of the interpreter's permissions */
1b5d783c 172 would_dump(bprm, bprm->file);
1da177e4
LT
173
174 allow_write_access(bprm->file);
175 bprm->file = NULL;
176
177 /* mark the bprm that fd should be passed to interp */
178 bprm->interp_flags |= BINPRM_FLAGS_EXECFD;
179 bprm->interp_data = fd_binary;
180
e6084d4a
MF
181 } else {
182 allow_write_access(bprm->file);
183 fput(bprm->file);
184 bprm->file = NULL;
185 }
1da177e4 186 /* make argv[1] be the path to the binary */
e6084d4a 187 retval = copy_strings_kernel(1, &bprm->interp, bprm);
1da177e4 188 if (retval < 0)
e6084d4a 189 goto error;
1da177e4
LT
190 bprm->argc++;
191
192 /* add the interp as argv[0] */
e6084d4a 193 retval = copy_strings_kernel(1, &iname_addr, bprm);
1da177e4 194 if (retval < 0)
e6084d4a
MF
195 goto error;
196 bprm->argc++;
1da177e4 197
b66c5984
KC
198 /* Update interp in case binfmt_script needs it. */
199 retval = bprm_change_interp(iname, bprm);
200 if (retval < 0)
e6084d4a 201 goto error;
1da177e4 202
e6084d4a
MF
203 interp_file = open_exec(iname);
204 retval = PTR_ERR(interp_file);
205 if (IS_ERR(interp_file))
206 goto error;
1da177e4
LT
207
208 bprm->file = interp_file;
209 if (fmt->flags & MISC_FMT_CREDENTIALS) {
210 /*
211 * No need to call prepare_binprm(), it's already been
212 * done. bprm->buf is stale, update from interp_file.
213 */
214 memset(bprm->buf, 0, BINPRM_BUF_SIZE);
215 retval = kernel_read(bprm->file, 0, bprm->buf, BINPRM_BUF_SIZE);
216 } else
e6084d4a 217 retval = prepare_binprm(bprm);
1da177e4
LT
218
219 if (retval < 0)
e6084d4a 220 goto error;
1da177e4 221
3c456bfc 222 retval = search_binary_handler(bprm);
1da177e4 223 if (retval < 0)
e6084d4a 224 goto error;
1da177e4 225
e6084d4a 226ret:
1da177e4 227 return retval;
e6084d4a 228error:
1da177e4
LT
229 if (fd_binary > 0)
230 sys_close(fd_binary);
231 bprm->interp_flags = 0;
232 bprm->interp_data = 0;
e6084d4a 233 goto ret;
1da177e4
LT
234}
235
236/* Command parsers */
237
238/*
239 * parses and copies one argument enclosed in del from *sp to *dp,
240 * recognising the \x special.
241 * returns pointer to the copied argument or NULL in case of an
242 * error (and sets err) or null argument length.
243 */
244static char *scanarg(char *s, char del)
245{
246 char c;
247
248 while ((c = *s++) != del) {
249 if (c == '\\' && *s == 'x') {
250 s++;
251 if (!isxdigit(*s++))
252 return NULL;
253 if (!isxdigit(*s++))
254 return NULL;
255 }
256 }
257 return s;
258}
259
e6084d4a 260static char *check_special_flags(char *sfs, Node *e)
1da177e4 261{
e6084d4a 262 char *p = sfs;
1da177e4
LT
263 int cont = 1;
264
265 /* special flags */
266 while (cont) {
267 switch (*p) {
e6084d4a
MF
268 case 'P':
269 pr_debug("register: flag: P (preserve argv0)\n");
270 p++;
271 e->flags |= MISC_FMT_PRESERVE_ARGV0;
272 break;
273 case 'O':
274 pr_debug("register: flag: O (open binary)\n");
275 p++;
276 e->flags |= MISC_FMT_OPEN_BINARY;
277 break;
278 case 'C':
279 pr_debug("register: flag: C (preserve creds)\n");
280 p++;
281 /* this flags also implies the
282 open-binary flag */
283 e->flags |= (MISC_FMT_CREDENTIALS |
284 MISC_FMT_OPEN_BINARY);
285 break;
286 default:
287 cont = 0;
1da177e4
LT
288 }
289 }
290
291 return p;
292}
e6084d4a 293
1da177e4
LT
294/*
295 * This registers a new binary format, it recognises the syntax
296 * ':name:type:offset:magic:mask:interpreter:flags'
297 * where the ':' is the IFS, that can be chosen with the first char
298 */
299static Node *create_entry(const char __user *buffer, size_t count)
300{
301 Node *e;
302 int memsize, err;
303 char *buf, *p;
304 char del;
305
6b899c4e
MF
306 pr_debug("register: received %zu bytes\n", count);
307
1da177e4
LT
308 /* some sanity checks */
309 err = -EINVAL;
bbaecc08 310 if ((count < 11) || (count > MAX_REGISTER_LENGTH))
1da177e4
LT
311 goto out;
312
313 err = -ENOMEM;
314 memsize = sizeof(Node) + count + 8;
f7e1ad1a 315 e = kmalloc(memsize, GFP_KERNEL);
1da177e4
LT
316 if (!e)
317 goto out;
318
319 p = buf = (char *)e + sizeof(Node);
320
321 memset(e, 0, sizeof(Node));
322 if (copy_from_user(buf, buffer, count))
e6084d4a 323 goto efault;
1da177e4
LT
324
325 del = *p++; /* delimeter */
326
6b899c4e
MF
327 pr_debug("register: delim: %#x {%c}\n", del, del);
328
329 /* Pad the buffer with the delim to simplify parsing below. */
e6084d4a 330 memset(buf + count, del, 8);
1da177e4 331
6b899c4e 332 /* Parse the 'name' field. */
1da177e4
LT
333 e->name = p;
334 p = strchr(p, del);
335 if (!p)
e6084d4a 336 goto einval;
1da177e4
LT
337 *p++ = '\0';
338 if (!e->name[0] ||
339 !strcmp(e->name, ".") ||
340 !strcmp(e->name, "..") ||
341 strchr(e->name, '/'))
e6084d4a 342 goto einval;
6b899c4e
MF
343
344 pr_debug("register: name: {%s}\n", e->name);
345
346 /* Parse the 'type' field. */
1da177e4 347 switch (*p++) {
6b899c4e
MF
348 case 'E':
349 pr_debug("register: type: E (extension)\n");
350 e->flags = 1 << Enabled;
351 break;
352 case 'M':
353 pr_debug("register: type: M (magic)\n");
354 e->flags = (1 << Enabled) | (1 << Magic);
355 break;
356 default:
e6084d4a 357 goto einval;
1da177e4
LT
358 }
359 if (*p++ != del)
e6084d4a 360 goto einval;
6b899c4e 361
1da177e4 362 if (test_bit(Magic, &e->flags)) {
6b899c4e
MF
363 /* Handle the 'M' (magic) format. */
364 char *s;
365
366 /* Parse the 'offset' field. */
367 s = strchr(p, del);
1da177e4 368 if (!s)
e6084d4a 369 goto einval;
1da177e4
LT
370 *s++ = '\0';
371 e->offset = simple_strtoul(p, &p, 10);
372 if (*p++)
e6084d4a 373 goto einval;
6b899c4e
MF
374 pr_debug("register: offset: %#x\n", e->offset);
375
376 /* Parse the 'magic' field. */
1da177e4
LT
377 e->magic = p;
378 p = scanarg(p, del);
379 if (!p)
e6084d4a 380 goto einval;
1da177e4 381 p[-1] = '\0';
6b899c4e 382 if (p == e->magic)
e6084d4a 383 goto einval;
6b899c4e
MF
384 if (USE_DEBUG)
385 print_hex_dump_bytes(
386 KBUILD_MODNAME ": register: magic[raw]: ",
387 DUMP_PREFIX_NONE, e->magic, p - e->magic);
388
389 /* Parse the 'mask' field. */
1da177e4
LT
390 e->mask = p;
391 p = scanarg(p, del);
392 if (!p)
e6084d4a 393 goto einval;
1da177e4 394 p[-1] = '\0';
6b899c4e 395 if (p == e->mask) {
1da177e4 396 e->mask = NULL;
6b899c4e
MF
397 pr_debug("register: mask[raw]: none\n");
398 } else if (USE_DEBUG)
399 print_hex_dump_bytes(
400 KBUILD_MODNAME ": register: mask[raw]: ",
401 DUMP_PREFIX_NONE, e->mask, p - e->mask);
402
403 /*
404 * Decode the magic & mask fields.
405 * Note: while we might have accepted embedded NUL bytes from
406 * above, the unescape helpers here will stop at the first one
407 * it encounters.
408 */
8d82e180
AS
409 e->size = string_unescape_inplace(e->magic, UNESCAPE_HEX);
410 if (e->mask &&
411 string_unescape_inplace(e->mask, UNESCAPE_HEX) != e->size)
e6084d4a 412 goto einval;
1da177e4 413 if (e->size + e->offset > BINPRM_BUF_SIZE)
e6084d4a 414 goto einval;
6b899c4e
MF
415 pr_debug("register: magic/mask length: %i\n", e->size);
416 if (USE_DEBUG) {
417 print_hex_dump_bytes(
418 KBUILD_MODNAME ": register: magic[decoded]: ",
419 DUMP_PREFIX_NONE, e->magic, e->size);
420
421 if (e->mask) {
422 int i;
f7e1ad1a 423 char *masked = kmalloc(e->size, GFP_KERNEL);
6b899c4e
MF
424
425 print_hex_dump_bytes(
426 KBUILD_MODNAME ": register: mask[decoded]: ",
427 DUMP_PREFIX_NONE, e->mask, e->size);
428
429 if (masked) {
430 for (i = 0; i < e->size; ++i)
431 masked[i] = e->magic[i] & e->mask[i];
432 print_hex_dump_bytes(
433 KBUILD_MODNAME ": register: magic[masked]: ",
434 DUMP_PREFIX_NONE, masked, e->size);
435
436 kfree(masked);
437 }
438 }
439 }
1da177e4 440 } else {
6b899c4e
MF
441 /* Handle the 'E' (extension) format. */
442
443 /* Skip the 'offset' field. */
1da177e4
LT
444 p = strchr(p, del);
445 if (!p)
e6084d4a 446 goto einval;
1da177e4 447 *p++ = '\0';
6b899c4e
MF
448
449 /* Parse the 'magic' field. */
1da177e4
LT
450 e->magic = p;
451 p = strchr(p, del);
452 if (!p)
e6084d4a 453 goto einval;
1da177e4
LT
454 *p++ = '\0';
455 if (!e->magic[0] || strchr(e->magic, '/'))
e6084d4a 456 goto einval;
6b899c4e
MF
457 pr_debug("register: extension: {%s}\n", e->magic);
458
459 /* Skip the 'mask' field. */
1da177e4
LT
460 p = strchr(p, del);
461 if (!p)
e6084d4a 462 goto einval;
1da177e4
LT
463 *p++ = '\0';
464 }
6b899c4e
MF
465
466 /* Parse the 'interpreter' field. */
1da177e4
LT
467 e->interpreter = p;
468 p = strchr(p, del);
469 if (!p)
e6084d4a 470 goto einval;
1da177e4
LT
471 *p++ = '\0';
472 if (!e->interpreter[0])
e6084d4a 473 goto einval;
6b899c4e 474 pr_debug("register: interpreter: {%s}\n", e->interpreter);
1da177e4 475
6b899c4e 476 /* Parse the 'flags' field. */
e6084d4a 477 p = check_special_flags(p, e);
1da177e4
LT
478 if (*p == '\n')
479 p++;
480 if (p != buf + count)
e6084d4a
MF
481 goto einval;
482
1da177e4
LT
483 return e;
484
485out:
486 return ERR_PTR(err);
487
e6084d4a 488efault:
1da177e4
LT
489 kfree(e);
490 return ERR_PTR(-EFAULT);
e6084d4a 491einval:
1da177e4
LT
492 kfree(e);
493 return ERR_PTR(-EINVAL);
494}
495
496/*
497 * Set status of entry/binfmt_misc:
498 * '1' enables, '0' disables and '-1' clears entry/binfmt_misc
499 */
500static int parse_command(const char __user *buffer, size_t count)
501{
502 char s[4];
503
1da177e4
LT
504 if (count > 3)
505 return -EINVAL;
506 if (copy_from_user(s, buffer, count))
507 return -EFAULT;
de8288b1
AB
508 if (!count)
509 return 0;
e6084d4a 510 if (s[count - 1] == '\n')
1da177e4
LT
511 count--;
512 if (count == 1 && s[0] == '0')
513 return 1;
514 if (count == 1 && s[0] == '1')
515 return 2;
516 if (count == 2 && s[0] == '-' && s[1] == '1')
517 return 3;
518 return -EINVAL;
519}
520
521/* generic stuff */
522
523static void entry_status(Node *e, char *page)
524{
525 char *dp;
526 char *status = "disabled";
e6084d4a 527 const char *flags = "flags: ";
1da177e4
LT
528
529 if (test_bit(Enabled, &e->flags))
530 status = "enabled";
531
532 if (!VERBOSE_STATUS) {
533 sprintf(page, "%s\n", status);
534 return;
535 }
536
537 sprintf(page, "%s\ninterpreter %s\n", status, e->interpreter);
538 dp = page + strlen(page);
539
540 /* print the special flags */
e6084d4a
MF
541 sprintf(dp, "%s", flags);
542 dp += strlen(flags);
543 if (e->flags & MISC_FMT_PRESERVE_ARGV0)
544 *dp++ = 'P';
545 if (e->flags & MISC_FMT_OPEN_BINARY)
546 *dp++ = 'O';
547 if (e->flags & MISC_FMT_CREDENTIALS)
548 *dp++ = 'C';
549 *dp++ = '\n';
1da177e4
LT
550
551 if (!test_bit(Magic, &e->flags)) {
552 sprintf(dp, "extension .%s\n", e->magic);
553 } else {
554 int i;
555
556 sprintf(dp, "offset %i\nmagic ", e->offset);
557 dp = page + strlen(page);
558 for (i = 0; i < e->size; i++) {
559 sprintf(dp, "%02x", 0xff & (int) (e->magic[i]));
560 dp += 2;
561 }
562 if (e->mask) {
563 sprintf(dp, "\nmask ");
564 dp += 6;
565 for (i = 0; i < e->size; i++) {
566 sprintf(dp, "%02x", 0xff & (int) (e->mask[i]));
567 dp += 2;
568 }
569 }
570 *dp++ = '\n';
571 *dp = '\0';
572 }
573}
574
575static struct inode *bm_get_inode(struct super_block *sb, int mode)
576{
e6084d4a 577 struct inode *inode = new_inode(sb);
1da177e4
LT
578
579 if (inode) {
85fe4025 580 inode->i_ino = get_next_ino();
1da177e4 581 inode->i_mode = mode;
1da177e4
LT
582 inode->i_atime = inode->i_mtime = inode->i_ctime =
583 current_fs_time(inode->i_sb);
584 }
585 return inode;
586}
587
b57922d9 588static void bm_evict_inode(struct inode *inode)
1da177e4 589{
dbd5768f 590 clear_inode(inode);
8e18e294 591 kfree(inode->i_private);
1da177e4
LT
592}
593
594static void kill_node(Node *e)
595{
596 struct dentry *dentry;
597
598 write_lock(&entries_lock);
599 dentry = e->dentry;
600 if (dentry) {
601 list_del_init(&e->list);
602 e->dentry = NULL;
603 }
604 write_unlock(&entries_lock);
605
606 if (dentry) {
6d6b77f1 607 drop_nlink(dentry->d_inode);
1da177e4
LT
608 d_drop(dentry);
609 dput(dentry);
610 simple_release_fs(&bm_mnt, &entry_count);
611 }
612}
613
614/* /<entry> */
615
616static ssize_t
e6084d4a 617bm_entry_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
1da177e4 618{
496ad9aa 619 Node *e = file_inode(file)->i_private;
1da177e4
LT
620 ssize_t res;
621 char *page;
1da177e4 622
e6084d4a
MF
623 page = (char *) __get_free_page(GFP_KERNEL);
624 if (!page)
1da177e4
LT
625 return -ENOMEM;
626
627 entry_status(e, page);
1da177e4 628
6e2c10a1
AM
629 res = simple_read_from_buffer(buf, nbytes, ppos, page, strlen(page));
630
1da177e4
LT
631 free_page((unsigned long) page);
632 return res;
633}
634
635static ssize_t bm_entry_write(struct file *file, const char __user *buffer,
636 size_t count, loff_t *ppos)
637{
638 struct dentry *root;
496ad9aa 639 Node *e = file_inode(file)->i_private;
1da177e4
LT
640 int res = parse_command(buffer, count);
641
642 switch (res) {
e6084d4a
MF
643 case 1:
644 /* Disable this handler. */
645 clear_bit(Enabled, &e->flags);
646 break;
647 case 2:
648 /* Enable this handler. */
649 set_bit(Enabled, &e->flags);
650 break;
651 case 3:
652 /* Delete this handler. */
653 root = dget(file->f_path.dentry->d_sb->s_root);
654 mutex_lock(&root->d_inode->i_mutex);
1da177e4 655
e6084d4a 656 kill_node(e);
1da177e4 657
e6084d4a
MF
658 mutex_unlock(&root->d_inode->i_mutex);
659 dput(root);
660 break;
661 default:
662 return res;
1da177e4 663 }
e6084d4a 664
1da177e4
LT
665 return count;
666}
667
4b6f5d20 668static const struct file_operations bm_entry_operations = {
1da177e4
LT
669 .read = bm_entry_read,
670 .write = bm_entry_write,
6038f373 671 .llseek = default_llseek,
1da177e4
LT
672};
673
674/* /register */
675
676static ssize_t bm_register_write(struct file *file, const char __user *buffer,
677 size_t count, loff_t *ppos)
678{
679 Node *e;
680 struct inode *inode;
681 struct dentry *root, *dentry;
d8c9584e 682 struct super_block *sb = file->f_path.dentry->d_sb;
1da177e4
LT
683 int err = 0;
684
685 e = create_entry(buffer, count);
686
687 if (IS_ERR(e))
688 return PTR_ERR(e);
689
690 root = dget(sb->s_root);
1b1dcc1b 691 mutex_lock(&root->d_inode->i_mutex);
1da177e4
LT
692 dentry = lookup_one_len(e->name, root, strlen(e->name));
693 err = PTR_ERR(dentry);
694 if (IS_ERR(dentry))
695 goto out;
696
697 err = -EEXIST;
698 if (dentry->d_inode)
699 goto out2;
700
701 inode = bm_get_inode(sb, S_IFREG | 0644);
702
703 err = -ENOMEM;
704 if (!inode)
705 goto out2;
706
1f5ce9e9 707 err = simple_pin_fs(&bm_fs_type, &bm_mnt, &entry_count);
1da177e4
LT
708 if (err) {
709 iput(inode);
710 inode = NULL;
711 goto out2;
712 }
713
714 e->dentry = dget(dentry);
8e18e294 715 inode->i_private = e;
1da177e4
LT
716 inode->i_fop = &bm_entry_operations;
717
718 d_instantiate(dentry, inode);
719 write_lock(&entries_lock);
720 list_add(&e->list, &entries);
721 write_unlock(&entries_lock);
722
723 err = 0;
724out2:
725 dput(dentry);
726out:
1b1dcc1b 727 mutex_unlock(&root->d_inode->i_mutex);
1da177e4
LT
728 dput(root);
729
730 if (err) {
731 kfree(e);
732 return -EINVAL;
733 }
734 return count;
735}
736
4b6f5d20 737static const struct file_operations bm_register_operations = {
1da177e4 738 .write = bm_register_write,
6038f373 739 .llseek = noop_llseek,
1da177e4
LT
740};
741
742/* /status */
743
744static ssize_t
745bm_status_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
746{
87113e80 747 char *s = enabled ? "enabled\n" : "disabled\n";
1da177e4 748
92f4c701 749 return simple_read_from_buffer(buf, nbytes, ppos, s, strlen(s));
1da177e4
LT
750}
751
e6084d4a 752static ssize_t bm_status_write(struct file *file, const char __user *buffer,
1da177e4
LT
753 size_t count, loff_t *ppos)
754{
755 int res = parse_command(buffer, count);
756 struct dentry *root;
757
758 switch (res) {
e6084d4a
MF
759 case 1:
760 /* Disable all handlers. */
761 enabled = 0;
762 break;
763 case 2:
764 /* Enable all handlers. */
765 enabled = 1;
766 break;
767 case 3:
768 /* Delete all handlers. */
769 root = dget(file->f_path.dentry->d_sb->s_root);
770 mutex_lock(&root->d_inode->i_mutex);
1da177e4 771
e6084d4a
MF
772 while (!list_empty(&entries))
773 kill_node(list_entry(entries.next, Node, list));
1da177e4 774
e6084d4a
MF
775 mutex_unlock(&root->d_inode->i_mutex);
776 dput(root);
777 break;
778 default:
779 return res;
1da177e4 780 }
e6084d4a 781
1da177e4
LT
782 return count;
783}
784
4b6f5d20 785static const struct file_operations bm_status_operations = {
1da177e4
LT
786 .read = bm_status_read,
787 .write = bm_status_write,
6038f373 788 .llseek = default_llseek,
1da177e4
LT
789};
790
791/* Superblock handling */
792
ee9b6d61 793static const struct super_operations s_ops = {
1da177e4 794 .statfs = simple_statfs,
b57922d9 795 .evict_inode = bm_evict_inode,
1da177e4
LT
796};
797
e6084d4a 798static int bm_fill_super(struct super_block *sb, void *data, int silent)
1da177e4 799{
e6084d4a 800 int err;
1da177e4 801 static struct tree_descr bm_files[] = {
1a1c9bb4
JL
802 [2] = {"status", &bm_status_operations, S_IWUSR|S_IRUGO},
803 [3] = {"register", &bm_register_operations, S_IWUSR},
1da177e4
LT
804 /* last one */ {""}
805 };
e6084d4a
MF
806
807 err = simple_fill_super(sb, BINFMTFS_MAGIC, bm_files);
1da177e4
LT
808 if (!err)
809 sb->s_op = &s_ops;
810 return err;
811}
812
fc14f2fe
AV
813static struct dentry *bm_mount(struct file_system_type *fs_type,
814 int flags, const char *dev_name, void *data)
1da177e4 815{
fc14f2fe 816 return mount_single(fs_type, flags, data, bm_fill_super);
1da177e4
LT
817}
818
819static struct linux_binfmt misc_format = {
820 .module = THIS_MODULE,
821 .load_binary = load_misc_binary,
822};
823
824static struct file_system_type bm_fs_type = {
825 .owner = THIS_MODULE,
826 .name = "binfmt_misc",
fc14f2fe 827 .mount = bm_mount,
1da177e4
LT
828 .kill_sb = kill_litter_super,
829};
7f78e035 830MODULE_ALIAS_FS("binfmt_misc");
1da177e4
LT
831
832static int __init init_misc_binfmt(void)
833{
834 int err = register_filesystem(&bm_fs_type);
8fc3dc5a
AV
835 if (!err)
836 insert_binfmt(&misc_format);
1da177e4
LT
837 return err;
838}
839
840static void __exit exit_misc_binfmt(void)
841{
842 unregister_binfmt(&misc_format);
843 unregister_filesystem(&bm_fs_type);
844}
845
846core_initcall(init_misc_binfmt);
847module_exit(exit_misc_binfmt);
848MODULE_LICENSE("GPL");