Merge tag 'fbdev-for-6.4-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/deller...
[linux-block.git] / include / linux / binfmts.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef _LINUX_BINFMTS_H
3#define _LINUX_BINFMTS_H
4
96e02d15 5#include <linux/sched.h>
282124d1 6#include <linux/unistd.h>
826eba4d 7#include <asm/exec.h>
607ca46e 8#include <uapi/linux/binfmts.h>
1da177e4 9
28851755 10struct filename;
a99a3e2e 11struct coredump_params;
28851755 12
71ce92f3
DA
13#define CORENAME_MAX_SIZE 128
14
1da177e4
LT
15/*
16 * This structure is used to hold the arguments that are used when loading binaries.
17 */
f670d0ec 18struct linux_binprm {
b6a2fea3
OW
19#ifdef CONFIG_MMU
20 struct vm_area_struct *vma;
3c77f845 21 unsigned long vma_pages;
b6a2fea3
OW
22#else
23# define MAX_ARG_PAGES 32
1da177e4 24 struct page *page[MAX_ARG_PAGES];
b6a2fea3 25#endif
1da177e4
LT
26 struct mm_struct *mm;
27 unsigned long p; /* current top of mem */
655c16a8 28 unsigned long argmin; /* rlimit marker for copy_strings() */
a50b0aa4 29 unsigned int
b8a61c9e
EB
30 /* Should an execfd be passed to userspace? */
31 have_execfd:1,
32
56305aa9
EB
33 /* Use the creds of a script (see binfmt_misc) */
34 execfd_creds:1,
c425e189 35 /*
b8bff599
EB
36 * Set by bprm_creds_for_exec hook to indicate a
37 * privilege-gaining exec has happened. Used to set
38 * AT_SECURE auxv for glibc.
c425e189 39 */
eea96732
EB
40 secureexec:1,
41 /*
1507b7a3
EB
42 * Set when errors can no longer be returned to the
43 * original userspace.
eea96732 44 */
1507b7a3 45 point_of_no_return:1;
9746c9be
EB
46 struct file *executable; /* Executable to pass to the interpreter */
47 struct file *interpreter;
48 struct file *file;
a6f76f23
DH
49 struct cred *cred; /* new credentials */
50 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */
51 unsigned int per_clear; /* bits to clear in current->personality */
1da177e4 52 int argc, envc;
9746c9be
EB
53 const char *filename; /* Name of binary as seen by procps */
54 const char *interp; /* Name of the binary really executed. Most
1da177e4
LT
55 of the time same as filename, but could be
56 different for binfmt_{misc,script} */
60d9ad1d 57 const char *fdpath; /* generated filename for execveat */
1da177e4 58 unsigned interp_flags;
b8a61c9e 59 int execfd; /* File descriptor of the executable */
1da177e4 60 unsigned long loader, exec;
c31dbb14
KC
61
62 struct rlimit rlim_stack; /* Saved RLIMIT_STACK used during exec. */
a6231d19
AD
63
64 char buf[BINPRM_BUF_SIZE];
3859a271 65} __randomize_layout;
1da177e4
LT
66
67#define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
68#define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
69
51f39a1f
DD
70/* filename of the binary will be inaccessible after exec */
71#define BINPRM_FLAGS_PATH_INACCESSIBLE_BIT 2
72#define BINPRM_FLAGS_PATH_INACCESSIBLE (1 << BINPRM_FLAGS_PATH_INACCESSIBLE_BIT)
73
2347961b
LV
74/* preserve argv0 for the interpreter */
75#define BINPRM_FLAGS_PRESERVE_ARGV0_BIT 3
76#define BINPRM_FLAGS_PRESERVE_ARGV0 (1 << BINPRM_FLAGS_PRESERVE_ARGV0_BIT)
77
1da177e4
LT
78/*
79 * This structure defines the functions that are used to load the binary formats that
80 * linux accepts.
81 */
82struct linux_binfmt {
e4dc1b14 83 struct list_head lh;
1da177e4 84 struct module *module;
71613c3b 85 int (*load_binary)(struct linux_binprm *);
1da177e4 86 int (*load_shlib)(struct file *);
d65bc29b 87#ifdef CONFIG_COREDUMP
f6151dfe 88 int (*core_dump)(struct coredump_params *cprm);
1da177e4 89 unsigned long min_coredump; /* minimal dump size */
d65bc29b 90#endif
3859a271 91} __randomize_layout;
1da177e4 92
8fc3dc5a 93extern void __register_binfmt(struct linux_binfmt *fmt, int insert);
74641f58
IK
94
95/* Registration of default binfmt handlers */
8fc3dc5a 96static inline void register_binfmt(struct linux_binfmt *fmt)
74641f58 97{
8fc3dc5a 98 __register_binfmt(fmt, 0);
74641f58
IK
99}
100/* Same as above, but adds a new binfmt at the top of the list */
8fc3dc5a 101static inline void insert_binfmt(struct linux_binfmt *fmt)
74641f58 102{
8fc3dc5a 103 __register_binfmt(fmt, 1);
74641f58
IK
104}
105
f6b450d4 106extern void unregister_binfmt(struct linux_binfmt *);
1da177e4 107
b6a2fea3 108extern int __must_check remove_arg_zero(struct linux_binprm *);
2388777a 109extern int begin_new_exec(struct linux_binprm * bprm);
221af7f8 110extern void setup_new_exec(struct linux_binprm * bprm);
b8383831 111extern void finalize_exec(struct linux_binprm *bprm);
1b5d783c 112extern void would_dump(struct linux_binprm *, struct file *);
1da177e4 113
d6e71144 114extern int suid_dumpable;
d6e71144 115
1da177e4
LT
116/* Stack area protections */
117#define EXSTACK_DEFAULT 0 /* Whatever the arch defaults to */
118#define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
119#define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
120
121extern int setup_arg_pages(struct linux_binprm * bprm,
122 unsigned long stack_top,
123 int executable_stack);
7e7ec6a9
NP
124extern int transfer_args_to_stack(struct linux_binprm *bprm,
125 unsigned long *sp_location);
c2315c18 126extern int bprm_change_interp(const char *interp, struct linux_binprm *bprm);
986db2d1 127int copy_string_kernel(const char *arg, struct linux_binprm *bprm);
964ee7df 128extern void set_binfmt(struct linux_binfmt *new);
3dc20cb2 129extern ssize_t read_code(struct file *, unsigned long, loff_t, size_t);
1da177e4 130
be619f7f
EB
131int kernel_execve(const char *filename,
132 const char *const *argv, const char *const *envp);
28851755 133
1da177e4 134#endif /* _LINUX_BINFMTS_H */