Merge branch 'pm-docs'
[linux-block.git] / include / linux / binfmts.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef _LINUX_BINFMTS_H
3#define _LINUX_BINFMTS_H
4
96e02d15 5#include <linux/sched.h>
282124d1 6#include <linux/unistd.h>
826eba4d 7#include <asm/exec.h>
607ca46e 8#include <uapi/linux/binfmts.h>
1da177e4 9
28851755
IM
10struct filename;
11
71ce92f3
DA
12#define CORENAME_MAX_SIZE 128
13
1da177e4
LT
14/*
15 * This structure is used to hold the arguments that are used when loading binaries.
16 */
f670d0ec 17struct linux_binprm {
b6a2fea3
OW
18#ifdef CONFIG_MMU
19 struct vm_area_struct *vma;
3c77f845 20 unsigned long vma_pages;
b6a2fea3
OW
21#else
22# define MAX_ARG_PAGES 32
1da177e4 23 struct page *page[MAX_ARG_PAGES];
b6a2fea3 24#endif
1da177e4
LT
25 struct mm_struct *mm;
26 unsigned long p; /* current top of mem */
655c16a8 27 unsigned long argmin; /* rlimit marker for copy_strings() */
a50b0aa4 28 unsigned int
b8a61c9e
EB
29 /* Should an execfd be passed to userspace? */
30 have_execfd:1,
31
56305aa9
EB
32 /* Use the creds of a script (see binfmt_misc) */
33 execfd_creds:1,
c425e189 34 /*
b8bff599
EB
35 * Set by bprm_creds_for_exec hook to indicate a
36 * privilege-gaining exec has happened. Used to set
37 * AT_SECURE auxv for glibc.
c425e189 38 */
eea96732
EB
39 secureexec:1,
40 /*
1507b7a3
EB
41 * Set when errors can no longer be returned to the
42 * original userspace.
eea96732 43 */
1507b7a3 44 point_of_no_return:1;
53112488
KS
45#ifdef __alpha__
46 unsigned int taso:1;
47#endif
9746c9be
EB
48 struct file *executable; /* Executable to pass to the interpreter */
49 struct file *interpreter;
50 struct file *file;
a6f76f23
DH
51 struct cred *cred; /* new credentials */
52 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */
53 unsigned int per_clear; /* bits to clear in current->personality */
1da177e4 54 int argc, envc;
9746c9be
EB
55 const char *filename; /* Name of binary as seen by procps */
56 const char *interp; /* Name of the binary really executed. Most
1da177e4
LT
57 of the time same as filename, but could be
58 different for binfmt_{misc,script} */
60d9ad1d 59 const char *fdpath; /* generated filename for execveat */
1da177e4 60 unsigned interp_flags;
b8a61c9e 61 int execfd; /* File descriptor of the executable */
1da177e4 62 unsigned long loader, exec;
c31dbb14
KC
63
64 struct rlimit rlim_stack; /* Saved RLIMIT_STACK used during exec. */
a6231d19
AD
65
66 char buf[BINPRM_BUF_SIZE];
3859a271 67} __randomize_layout;
1da177e4
LT
68
69#define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
70#define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
71
51f39a1f
DD
72/* filename of the binary will be inaccessible after exec */
73#define BINPRM_FLAGS_PATH_INACCESSIBLE_BIT 2
74#define BINPRM_FLAGS_PATH_INACCESSIBLE (1 << BINPRM_FLAGS_PATH_INACCESSIBLE_BIT)
75
2347961b
LV
76/* preserve argv0 for the interpreter */
77#define BINPRM_FLAGS_PRESERVE_ARGV0_BIT 3
78#define BINPRM_FLAGS_PRESERVE_ARGV0 (1 << BINPRM_FLAGS_PRESERVE_ARGV0_BIT)
79
f6151dfe
MH
80/* Function parameter for binfmt->coredump */
81struct coredump_params {
ae7795bc 82 const kernel_siginfo_t *siginfo;
f6151dfe
MH
83 struct pt_regs *regs;
84 struct file *file;
85 unsigned long limit;
30736a4d 86 unsigned long mm_flags;
ecc8c772 87 loff_t written;
1607f09c 88 loff_t pos;
d0f1088b 89 loff_t to_skip;
f6151dfe
MH
90};
91
1da177e4
LT
92/*
93 * This structure defines the functions that are used to load the binary formats that
94 * linux accepts.
95 */
96struct linux_binfmt {
e4dc1b14 97 struct list_head lh;
1da177e4 98 struct module *module;
71613c3b 99 int (*load_binary)(struct linux_binprm *);
1da177e4 100 int (*load_shlib)(struct file *);
f6151dfe 101 int (*core_dump)(struct coredump_params *cprm);
1da177e4 102 unsigned long min_coredump; /* minimal dump size */
3859a271 103} __randomize_layout;
1da177e4 104
8fc3dc5a 105extern void __register_binfmt(struct linux_binfmt *fmt, int insert);
74641f58
IK
106
107/* Registration of default binfmt handlers */
8fc3dc5a 108static inline void register_binfmt(struct linux_binfmt *fmt)
74641f58 109{
8fc3dc5a 110 __register_binfmt(fmt, 0);
74641f58
IK
111}
112/* Same as above, but adds a new binfmt at the top of the list */
8fc3dc5a 113static inline void insert_binfmt(struct linux_binfmt *fmt)
74641f58 114{
8fc3dc5a 115 __register_binfmt(fmt, 1);
74641f58
IK
116}
117
f6b450d4 118extern void unregister_binfmt(struct linux_binfmt *);
1da177e4 119
b6a2fea3 120extern int __must_check remove_arg_zero(struct linux_binprm *);
2388777a 121extern int begin_new_exec(struct linux_binprm * bprm);
221af7f8 122extern void setup_new_exec(struct linux_binprm * bprm);
b8383831 123extern void finalize_exec(struct linux_binprm *bprm);
1b5d783c 124extern void would_dump(struct linux_binprm *, struct file *);
1da177e4 125
d6e71144 126extern int suid_dumpable;
d6e71144 127
1da177e4
LT
128/* Stack area protections */
129#define EXSTACK_DEFAULT 0 /* Whatever the arch defaults to */
130#define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
131#define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
132
133extern int setup_arg_pages(struct linux_binprm * bprm,
134 unsigned long stack_top,
135 int executable_stack);
7e7ec6a9
NP
136extern int transfer_args_to_stack(struct linux_binprm *bprm,
137 unsigned long *sp_location);
c2315c18 138extern int bprm_change_interp(const char *interp, struct linux_binprm *bprm);
986db2d1 139int copy_string_kernel(const char *arg, struct linux_binprm *bprm);
964ee7df 140extern void set_binfmt(struct linux_binfmt *new);
3dc20cb2 141extern ssize_t read_code(struct file *, unsigned long, loff_t, size_t);
1da177e4 142
be619f7f
EB
143int kernel_execve(const char *filename,
144 const char *const *argv, const char *const *envp);
28851755 145
1da177e4 146#endif /* _LINUX_BINFMTS_H */