Merge tag 'regmap-fix-v5.8-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git...
[linux-block.git] / include / linux / binfmts.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef _LINUX_BINFMTS_H
3#define _LINUX_BINFMTS_H
4
96e02d15 5#include <linux/sched.h>
282124d1 6#include <linux/unistd.h>
826eba4d 7#include <asm/exec.h>
607ca46e 8#include <uapi/linux/binfmts.h>
1da177e4 9
28851755
IM
10struct filename;
11
71ce92f3
DA
12#define CORENAME_MAX_SIZE 128
13
1da177e4
LT
14/*
15 * This structure is used to hold the arguments that are used when loading binaries.
16 */
f670d0ec 17struct linux_binprm {
b6a2fea3
OW
18#ifdef CONFIG_MMU
19 struct vm_area_struct *vma;
3c77f845 20 unsigned long vma_pages;
b6a2fea3
OW
21#else
22# define MAX_ARG_PAGES 32
1da177e4 23 struct page *page[MAX_ARG_PAGES];
b6a2fea3 24#endif
1da177e4
LT
25 struct mm_struct *mm;
26 unsigned long p; /* current top of mem */
655c16a8 27 unsigned long argmin; /* rlimit marker for copy_strings() */
a50b0aa4 28 unsigned int
b8a61c9e
EB
29 /* Should an execfd be passed to userspace? */
30 have_execfd:1,
31
56305aa9
EB
32 /* Use the creds of a script (see binfmt_misc) */
33 execfd_creds:1,
c425e189 34 /*
b8bff599
EB
35 * Set by bprm_creds_for_exec hook to indicate a
36 * privilege-gaining exec has happened. Used to set
37 * AT_SECURE auxv for glibc.
c425e189 38 */
eea96732
EB
39 secureexec:1,
40 /*
1507b7a3
EB
41 * Set when errors can no longer be returned to the
42 * original userspace.
eea96732 43 */
1507b7a3 44 point_of_no_return:1;
53112488
KS
45#ifdef __alpha__
46 unsigned int taso:1;
47#endif
b8a61c9e 48 struct file * executable; /* Executable to pass to the interpreter */
bc2bf338 49 struct file * interpreter;
1da177e4 50 struct file * file;
a6f76f23
DH
51 struct cred *cred; /* new credentials */
52 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */
53 unsigned int per_clear; /* bits to clear in current->personality */
1da177e4 54 int argc, envc;
d7627467
DH
55 const char * filename; /* Name of binary as seen by procps */
56 const char * interp; /* Name of the binary really executed. Most
1da177e4
LT
57 of the time same as filename, but could be
58 different for binfmt_{misc,script} */
59 unsigned interp_flags;
b8a61c9e 60 int execfd; /* File descriptor of the executable */
1da177e4 61 unsigned long loader, exec;
c31dbb14
KC
62
63 struct rlimit rlim_stack; /* Saved RLIMIT_STACK used during exec. */
a6231d19
AD
64
65 char buf[BINPRM_BUF_SIZE];
3859a271 66} __randomize_layout;
1da177e4
LT
67
68#define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
69#define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
70
51f39a1f
DD
71/* filename of the binary will be inaccessible after exec */
72#define BINPRM_FLAGS_PATH_INACCESSIBLE_BIT 2
73#define BINPRM_FLAGS_PATH_INACCESSIBLE (1 << BINPRM_FLAGS_PATH_INACCESSIBLE_BIT)
74
f6151dfe
MH
75/* Function parameter for binfmt->coredump */
76struct coredump_params {
ae7795bc 77 const kernel_siginfo_t *siginfo;
f6151dfe
MH
78 struct pt_regs *regs;
79 struct file *file;
80 unsigned long limit;
30736a4d 81 unsigned long mm_flags;
ecc8c772 82 loff_t written;
1607f09c 83 loff_t pos;
f6151dfe
MH
84};
85
1da177e4
LT
86/*
87 * This structure defines the functions that are used to load the binary formats that
88 * linux accepts.
89 */
90struct linux_binfmt {
e4dc1b14 91 struct list_head lh;
1da177e4 92 struct module *module;
71613c3b 93 int (*load_binary)(struct linux_binprm *);
1da177e4 94 int (*load_shlib)(struct file *);
f6151dfe 95 int (*core_dump)(struct coredump_params *cprm);
1da177e4 96 unsigned long min_coredump; /* minimal dump size */
3859a271 97} __randomize_layout;
1da177e4 98
8fc3dc5a 99extern void __register_binfmt(struct linux_binfmt *fmt, int insert);
74641f58
IK
100
101/* Registration of default binfmt handlers */
8fc3dc5a 102static inline void register_binfmt(struct linux_binfmt *fmt)
74641f58 103{
8fc3dc5a 104 __register_binfmt(fmt, 0);
74641f58
IK
105}
106/* Same as above, but adds a new binfmt at the top of the list */
8fc3dc5a 107static inline void insert_binfmt(struct linux_binfmt *fmt)
74641f58 108{
8fc3dc5a 109 __register_binfmt(fmt, 1);
74641f58
IK
110}
111
f6b450d4 112extern void unregister_binfmt(struct linux_binfmt *);
1da177e4 113
b6a2fea3 114extern int __must_check remove_arg_zero(struct linux_binprm *);
2388777a 115extern int begin_new_exec(struct linux_binprm * bprm);
221af7f8 116extern void setup_new_exec(struct linux_binprm * bprm);
b8383831 117extern void finalize_exec(struct linux_binprm *bprm);
1b5d783c 118extern void would_dump(struct linux_binprm *, struct file *);
1da177e4 119
d6e71144 120extern int suid_dumpable;
d6e71144 121
1da177e4
LT
122/* Stack area protections */
123#define EXSTACK_DEFAULT 0 /* Whatever the arch defaults to */
124#define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
125#define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
126
127extern int setup_arg_pages(struct linux_binprm * bprm,
128 unsigned long stack_top,
129 int executable_stack);
7e7ec6a9
NP
130extern int transfer_args_to_stack(struct linux_binprm *bprm,
131 unsigned long *sp_location);
c2315c18 132extern int bprm_change_interp(const char *interp, struct linux_binprm *bprm);
986db2d1 133int copy_string_kernel(const char *arg, struct linux_binprm *bprm);
964ee7df 134extern void set_binfmt(struct linux_binfmt *new);
3dc20cb2 135extern ssize_t read_code(struct file *, unsigned long, loff_t, size_t);
1da177e4 136
28851755
IM
137extern int do_execve(struct filename *,
138 const char __user * const __user *,
139 const char __user * const __user *);
140extern int do_execveat(int, struct filename *,
141 const char __user * const __user *,
142 const char __user * const __user *,
143 int);
449325b5 144int do_execve_file(struct file *file, void *__argv, void *__envp);
28851755 145
1da177e4 146#endif /* _LINUX_BINFMTS_H */