]> git.ipfire.org Git - people/ms/linux.git/blame - fs/binfmt_flat.c
binfmt_flat: Drop vestiges of coredump support
[people/ms/linux.git] / fs / binfmt_flat.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/****************************************************************************/
3/*
4 * linux/fs/binfmt_flat.c
5 *
6 * Copyright (C) 2000-2003 David McCullough <davidm@snapgear.com>
7 * Copyright (C) 2002 Greg Ungerer <gerg@snapgear.com>
8 * Copyright (C) 2002 SnapGear, by Paul Dale <pauli@snapgear.com>
9 * Copyright (C) 2000, 2001 Lineo, by David McCullough <davidm@lineo.com>
10 * based heavily on:
11 *
12 * linux/fs/binfmt_aout.c:
13 * Copyright (C) 1991, 1992, 1996 Linus Torvalds
14 * linux/fs/binfmt_flat.c for 2.0 kernel
15 * Copyright (C) 1998 Kenneth Albanowski <kjahds@kjahds.com>
16 * JAN/99 -- coded full program relocation (gerg@snapgear.com)
17 */
18
4adbb6ac
NP
19#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
20
1da177e4
LT
21#include <linux/kernel.h>
22#include <linux/sched.h>
68db0cf1 23#include <linux/sched/task_stack.h>
1da177e4
LT
24#include <linux/mm.h>
25#include <linux/mman.h>
1da177e4
LT
26#include <linux/errno.h>
27#include <linux/signal.h>
28#include <linux/string.h>
29#include <linux/fs.h>
30#include <linux/file.h>
1da177e4
LT
31#include <linux/ptrace.h>
32#include <linux/user.h>
33#include <linux/slab.h>
34#include <linux/binfmts.h>
35#include <linux/personality.h>
36#include <linux/init.h>
37#include <linux/flat.h>
13c3f50c 38#include <linux/uaccess.h>
472f95f3 39#include <linux/vmalloc.h>
1da177e4
LT
40
41#include <asm/byteorder.h>
1da177e4
LT
42#include <asm/unaligned.h>
43#include <asm/cacheflush.h>
c3dc5bec 44#include <asm/page.h>
06d2bfed 45#include <asm/flat.h>
1da177e4 46
02da2833
CH
47#ifndef flat_get_relocate_addr
48#define flat_get_relocate_addr(rel) (rel)
49#endif
1da177e4
LT
50
51/****************************************************************************/
52
c3dc5bec 53/*
2e94de8a
MF
54 * User data (data section and bss) needs to be aligned.
55 * We pick 0x20 here because it is the max value elf2flt has always
56 * used in producing FLAT files, and because it seems to be large
57 * enough to make all the gcc alignment related tests happy.
58 */
59#define FLAT_DATA_ALIGN (0x20)
60
61/*
62 * User data (stack) also needs to be aligned.
63 * Here we can be a bit looser than the data sections since this
64 * needs to only meet arch ABI requirements.
c3dc5bec 65 */
2952095c 66#define FLAT_STACK_ALIGN max_t(unsigned long, sizeof(void *), ARCH_SLAB_MINALIGN)
c3dc5bec 67
1da177e4
LT
68#define RELOC_FAILED 0xff00ff01 /* Relocation incorrect somewhere */
69#define UNLOADED_LIB 0x7ff000ff /* Placeholder for unused library */
70
a445d988
CH
71#ifdef CONFIG_BINFMT_SHARED_FLAT
72#define MAX_SHARED_LIBS (4)
73#else
74#define MAX_SHARED_LIBS (1)
75#endif
76
04d82a6d
DLM
77#ifdef CONFIG_BINFMT_FLAT_NO_DATA_START_OFFSET
78#define DATA_START_OFFSET_WORDS (0)
79#else
80#define DATA_START_OFFSET_WORDS (MAX_SHARED_LIBS)
81#endif
82
1da177e4
LT
83struct lib_info {
84 struct {
85 unsigned long start_code; /* Start of text segment */
86 unsigned long start_data; /* Start of data segment */
87 unsigned long start_brk; /* End of data segment */
88 unsigned long text_len; /* Length of text segment */
89 unsigned long entry; /* Start address for this module */
90 unsigned long build_date; /* When this one was compiled */
13c3f50c 91 bool loaded; /* Has this library been loaded? */
1da177e4
LT
92 } lib_list[MAX_SHARED_LIBS];
93};
94
95#ifdef CONFIG_BINFMT_SHARED_FLAT
96static int load_flat_shared_library(int id, struct lib_info *p);
97#endif
98
71613c3b 99static int load_flat_binary(struct linux_binprm *);
1da177e4 100
1da177e4
LT
101static struct linux_binfmt flat_format = {
102 .module = THIS_MODULE,
103 .load_binary = load_flat_binary,
1da177e4
LT
104};
105
1da177e4
LT
106
107/****************************************************************************/
108/*
109 * create_flat_tables() parses the env- and arg-strings in new user
110 * memory and creates the pointer tables from them, and puts their
a97d157d 111 * addresses on the "stack", recording the new stack pointer value.
1da177e4
LT
112 */
113
a97d157d 114static int create_flat_tables(struct linux_binprm *bprm, unsigned long arg_start)
1da177e4 115{
a97d157d
NP
116 char __user *p;
117 unsigned long __user *sp;
118 long i, len;
1da177e4 119
a97d157d
NP
120 p = (char __user *)arg_start;
121 sp = (unsigned long __user *)current->mm->start_stack;
122
123 sp -= bprm->envc + 1;
124 sp -= bprm->argc + 1;
bdd15a28
CH
125 if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK))
126 sp -= 2; /* argvp + envp */
a97d157d
NP
127 sp -= 1; /* &argc */
128
129 current->mm->start_stack = (unsigned long)sp & -FLAT_STACK_ALIGN;
130 sp = (unsigned long __user *)current->mm->start_stack;
131
8861fd57
AV
132 if (put_user(bprm->argc, sp++))
133 return -EFAULT;
bdd15a28 134 if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK)) {
a97d157d
NP
135 unsigned long argv, envp;
136 argv = (unsigned long)(sp + 2);
137 envp = (unsigned long)(sp + 2 + bprm->argc + 1);
8861fd57
AV
138 if (put_user(argv, sp++) || put_user(envp, sp++))
139 return -EFAULT;
a97d157d
NP
140 }
141
142 current->mm->arg_start = (unsigned long)p;
143 for (i = bprm->argc; i > 0; i--) {
8861fd57
AV
144 if (put_user((unsigned long)p, sp++))
145 return -EFAULT;
a97d157d
NP
146 len = strnlen_user(p, MAX_ARG_STRLEN);
147 if (!len || len > MAX_ARG_STRLEN)
148 return -EINVAL;
149 p += len;
150 }
8861fd57
AV
151 if (put_user(0, sp++))
152 return -EFAULT;
a97d157d
NP
153 current->mm->arg_end = (unsigned long)p;
154
155 current->mm->env_start = (unsigned long) p;
156 for (i = bprm->envc; i > 0; i--) {
8861fd57
AV
157 if (put_user((unsigned long)p, sp++))
158 return -EFAULT;
a97d157d
NP
159 len = strnlen_user(p, MAX_ARG_STRLEN);
160 if (!len || len > MAX_ARG_STRLEN)
161 return -EINVAL;
162 p += len;
163 }
8861fd57
AV
164 if (put_user(0, sp++))
165 return -EFAULT;
a97d157d
NP
166 current->mm->env_end = (unsigned long)p;
167
168 return 0;
1da177e4
LT
169}
170
171/****************************************************************************/
172
173#ifdef CONFIG_BINFMT_ZFLAT
174
175#include <linux/zlib.h>
176
177#define LBUFSIZE 4000
178
179/* gzip flag byte */
180#define ASCII_FLAG 0x01 /* bit 0 set: file probably ASCII text */
181#define CONTINUATION 0x02 /* bit 1 set: continuation of multi-part gzip file */
182#define EXTRA_FIELD 0x04 /* bit 2 set: extra field present */
183#define ORIG_NAME 0x08 /* bit 3 set: original file name present */
184#define COMMENT 0x10 /* bit 4 set: file comment present */
185#define ENCRYPTED 0x20 /* bit 5 set: file is encrypted */
186#define RESERVED 0xC0 /* bit 6,7: reserved */
187
bdd1d2d3
CH
188static int decompress_exec(struct linux_binprm *bprm, loff_t fpos, char *dst,
189 long len, int fd)
1da177e4
LT
190{
191 unsigned char *buf;
192 z_stream strm;
1da177e4
LT
193 int ret, retval;
194
bdd1d2d3 195 pr_debug("decompress_exec(offset=%llx,buf=%p,len=%lx)\n", fpos, dst, len);
1da177e4
LT
196
197 memset(&strm, 0, sizeof(strm));
198 strm.workspace = kmalloc(zlib_inflate_workspacesize(), GFP_KERNEL);
9367bb73 199 if (!strm.workspace)
1da177e4 200 return -ENOMEM;
9367bb73 201
1da177e4 202 buf = kmalloc(LBUFSIZE, GFP_KERNEL);
9367bb73 203 if (!buf) {
1da177e4
LT
204 retval = -ENOMEM;
205 goto out_free;
206 }
207
208 /* Read in first chunk of data and parse gzip header. */
bdd1d2d3 209 ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos);
1da177e4
LT
210
211 strm.next_in = buf;
212 strm.avail_in = ret;
213 strm.total_in = 0;
214
215 retval = -ENOEXEC;
216
217 /* Check minimum size -- gzip header */
218 if (ret < 10) {
4adbb6ac 219 pr_debug("file too small?\n");
1da177e4
LT
220 goto out_free_buf;
221 }
222
223 /* Check gzip magic number */
224 if ((buf[0] != 037) || ((buf[1] != 0213) && (buf[1] != 0236))) {
4adbb6ac 225 pr_debug("unknown compression magic?\n");
1da177e4
LT
226 goto out_free_buf;
227 }
228
229 /* Check gzip method */
230 if (buf[2] != 8) {
4adbb6ac 231 pr_debug("unknown compression method?\n");
1da177e4
LT
232 goto out_free_buf;
233 }
234 /* Check gzip flags */
235 if ((buf[3] & ENCRYPTED) || (buf[3] & CONTINUATION) ||
236 (buf[3] & RESERVED)) {
4adbb6ac 237 pr_debug("unknown flags?\n");
1da177e4
LT
238 goto out_free_buf;
239 }
240
241 ret = 10;
242 if (buf[3] & EXTRA_FIELD) {
243 ret += 2 + buf[10] + (buf[11] << 8);
13c3f50c 244 if (unlikely(ret >= LBUFSIZE)) {
4adbb6ac 245 pr_debug("buffer overflow (EXTRA)?\n");
1da177e4
LT
246 goto out_free_buf;
247 }
248 }
249 if (buf[3] & ORIG_NAME) {
f4cfb18d 250 while (ret < LBUFSIZE && buf[ret++] != 0)
1da177e4 251 ;
13c3f50c 252 if (unlikely(ret == LBUFSIZE)) {
4adbb6ac 253 pr_debug("buffer overflow (ORIG_NAME)?\n");
1da177e4
LT
254 goto out_free_buf;
255 }
256 }
257 if (buf[3] & COMMENT) {
f4cfb18d 258 while (ret < LBUFSIZE && buf[ret++] != 0)
1da177e4 259 ;
13c3f50c 260 if (unlikely(ret == LBUFSIZE)) {
4adbb6ac 261 pr_debug("buffer overflow (COMMENT)?\n");
1da177e4
LT
262 goto out_free_buf;
263 }
264 }
265
266 strm.next_in += ret;
267 strm.avail_in -= ret;
268
269 strm.next_out = dst;
270 strm.avail_out = len;
271 strm.total_out = 0;
272
273 if (zlib_inflateInit2(&strm, -MAX_WBITS) != Z_OK) {
4adbb6ac 274 pr_debug("zlib init failed?\n");
1da177e4
LT
275 goto out_free_buf;
276 }
277
278 while ((ret = zlib_inflate(&strm, Z_NO_FLUSH)) == Z_OK) {
bdd1d2d3 279 ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos);
1da177e4
LT
280 if (ret <= 0)
281 break;
1da177e4
LT
282 len -= ret;
283
284 strm.next_in = buf;
285 strm.avail_in = ret;
286 strm.total_in = 0;
287 }
288
289 if (ret < 0) {
4adbb6ac 290 pr_debug("decompression failed (%d), %s\n",
1da177e4
LT
291 ret, strm.msg);
292 goto out_zlib;
293 }
294
295 retval = 0;
296out_zlib:
297 zlib_inflateEnd(&strm);
298out_free_buf:
299 kfree(buf);
300out_free:
301 kfree(strm.workspace);
1da177e4
LT
302 return retval;
303}
304
305#endif /* CONFIG_BINFMT_ZFLAT */
306
307/****************************************************************************/
308
309static unsigned long
310calc_reloc(unsigned long r, struct lib_info *p, int curid, int internalp)
311{
312 unsigned long addr;
313 int id;
314 unsigned long start_brk;
315 unsigned long start_data;
316 unsigned long text_len;
317 unsigned long start_code;
318
319#ifdef CONFIG_BINFMT_SHARED_FLAT
320 if (r == 0)
321 id = curid; /* Relocs of 0 are always self referring */
322 else {
323 id = (r >> 24) & 0xff; /* Find ID for this reloc */
324 r &= 0x00ffffff; /* Trim ID off here */
325 }
326 if (id >= MAX_SHARED_LIBS) {
4adbb6ac 327 pr_err("reference 0x%lx to shared library %d", r, id);
1da177e4
LT
328 goto failed;
329 }
330 if (curid != id) {
331 if (internalp) {
4adbb6ac
NP
332 pr_err("reloc address 0x%lx not in same module "
333 "(%d != %d)", r, curid, id);
1da177e4 334 goto failed;
13c3f50c
NP
335 } else if (!p->lib_list[id].loaded &&
336 load_flat_shared_library(id, p) < 0) {
4adbb6ac 337 pr_err("failed to load library %d", id);
1da177e4
LT
338 goto failed;
339 }
340 /* Check versioning information (i.e. time stamps) */
341 if (p->lib_list[id].build_date && p->lib_list[curid].build_date &&
342 p->lib_list[curid].build_date < p->lib_list[id].build_date) {
4adbb6ac 343 pr_err("library %d is younger than %d", id, curid);
1da177e4
LT
344 goto failed;
345 }
346 }
347#else
348 id = 0;
349#endif
350
351 start_brk = p->lib_list[id].start_brk;
352 start_data = p->lib_list[id].start_data;
353 start_code = p->lib_list[id].start_code;
354 text_len = p->lib_list[id].text_len;
355
9ee24b2a 356 if (r > start_brk - start_data + text_len) {
4adbb6ac 357 pr_err("reloc outside program 0x%lx (0 - 0x%lx/0x%lx)",
13c3f50c 358 r, start_brk-start_data+text_len, text_len);
1da177e4
LT
359 goto failed;
360 }
361
362 if (r < text_len) /* In text segment */
363 addr = r + start_code;
364 else /* In data segment */
365 addr = r - text_len + start_data;
366
367 /* Range checked already above so doing the range tests is redundant...*/
13c3f50c 368 return addr;
1da177e4
LT
369
370failed:
4adbb6ac 371 pr_cont(", killing %s!\n", current->comm);
1da177e4
LT
372 send_sig(SIGSEGV, current, 0);
373
374 return RELOC_FAILED;
375}
376
377/****************************************************************************/
378
cf9a566c 379#ifdef CONFIG_BINFMT_FLAT_OLD
34303435 380static void old_reloc(unsigned long rl)
1da177e4 381{
13c3f50c 382 static const char *segment[] = { "TEXT", "DATA", "BSS", "*UNKNOWN*" };
1da177e4 383 flat_v2_reloc_t r;
1b2ce442
NP
384 unsigned long __user *ptr;
385 unsigned long val;
13c3f50c 386
1da177e4
LT
387 r.value = rl;
388#if defined(CONFIG_COLDFIRE)
1b2ce442 389 ptr = (unsigned long __user *)(current->mm->start_code + r.reloc.offset);
1da177e4 390#else
1b2ce442 391 ptr = (unsigned long __user *)(current->mm->start_data + r.reloc.offset);
1da177e4 392#endif
1b2ce442 393 get_user(val, ptr);
1da177e4 394
4adbb6ac
NP
395 pr_debug("Relocation of variable at DATASEG+%x "
396 "(address %p, currently %lx) into segment %s\n",
1b2ce442 397 r.reloc.offset, ptr, val, segment[r.reloc.type]);
13c3f50c 398
1da177e4
LT
399 switch (r.reloc.type) {
400 case OLD_FLAT_RELOC_TYPE_TEXT:
1b2ce442 401 val += current->mm->start_code;
1da177e4
LT
402 break;
403 case OLD_FLAT_RELOC_TYPE_DATA:
1b2ce442 404 val += current->mm->start_data;
1da177e4
LT
405 break;
406 case OLD_FLAT_RELOC_TYPE_BSS:
1b2ce442 407 val += current->mm->end_data;
1da177e4
LT
408 break;
409 default:
4adbb6ac 410 pr_err("Unknown relocation type=%x\n", r.reloc.type);
1da177e4
LT
411 break;
412 }
1b2ce442 413 put_user(val, ptr);
1da177e4 414
1b2ce442 415 pr_debug("Relocation became %lx\n", val);
13c3f50c 416}
cf9a566c 417#endif /* CONFIG_BINFMT_FLAT_OLD */
1da177e4
LT
418
419/****************************************************************************/
420
6045ab5f
NC
421static inline u32 __user *skip_got_header(u32 __user *rp)
422{
423 if (IS_ENABLED(CONFIG_RISCV)) {
424 /*
425 * RISC-V has a 16 byte GOT PLT header for elf64-riscv
426 * and 8 byte GOT PLT header for elf32-riscv.
427 * Skip the whole GOT PLT header, since it is reserved
428 * for the dynamic linker (ld.so).
429 */
430 u32 rp_val0, rp_val1;
431
432 if (get_user(rp_val0, rp))
433 return rp;
434 if (get_user(rp_val1, rp + 1))
435 return rp;
436
437 if (rp_val0 == 0xffffffff && rp_val1 == 0xffffffff)
438 rp += 4;
439 else if (rp_val0 == 0xffffffff)
440 rp += 2;
441 }
442 return rp;
443}
444
13c3f50c 445static int load_flat_file(struct linux_binprm *bprm,
1da177e4
LT
446 struct lib_info *libinfo, int id, unsigned long *extra_stack)
447{
13c3f50c
NP
448 struct flat_hdr *hdr;
449 unsigned long textpos, datapos, realdatastart;
468138d7 450 u32 text_len, data_len, bss_len, stack_len, full_data, flags;
13c3f50c 451 unsigned long len, memp, memp_size, extra, rlim;
3b977718
CH
452 __be32 __user *reloc;
453 u32 __user *rp;
13c3f50c 454 int i, rev, relocs;
1da177e4
LT
455 loff_t fpos;
456 unsigned long start_code, end_code;
13c3f50c 457 ssize_t result;
1ad3dcc0 458 int ret;
1da177e4
LT
459
460 hdr = ((struct flat_hdr *) bprm->buf); /* exec-header */
1da177e4
LT
461
462 text_len = ntohl(hdr->data_start);
463 data_len = ntohl(hdr->data_end) - ntohl(hdr->data_start);
464 bss_len = ntohl(hdr->bss_end) - ntohl(hdr->data_end);
465 stack_len = ntohl(hdr->stack_size);
466 if (extra_stack) {
467 stack_len += *extra_stack;
468 *extra_stack = stack_len;
469 }
470 relocs = ntohl(hdr->reloc_count);
471 flags = ntohl(hdr->flags);
472 rev = ntohl(hdr->rev);
3dc20cb2 473 full_data = data_len + relocs * sizeof(unsigned long);
1da177e4 474
845884d3 475 if (strncmp(hdr->magic, "bFLT", 4)) {
1da177e4 476 /*
e2a366dc
MF
477 * Previously, here was a printk to tell people
478 * "BINFMT_FLAT: bad header magic".
479 * But for the kernel which also use ELF FD-PIC format, this
480 * error message is confusing.
1da177e4 481 * because a lot of people do not manage to produce good
1da177e4 482 */
1ad3dcc0
LY
483 ret = -ENOEXEC;
484 goto err;
845884d3
GU
485 }
486
487 if (flags & FLAT_FLAG_KTRACE)
4adbb6ac 488 pr_info("Loading file: %s\n", bprm->filename);
845884d3 489
cf9a566c 490#ifdef CONFIG_BINFMT_FLAT_OLD
845884d3 491 if (rev != FLAT_VERSION && rev != OLD_FLAT_VERSION) {
4adbb6ac
NP
492 pr_err("bad flat file version 0x%x (supported 0x%lx and 0x%lx)\n",
493 rev, FLAT_VERSION, OLD_FLAT_VERSION);
1ad3dcc0
LY
494 ret = -ENOEXEC;
495 goto err;
1da177e4 496 }
13c3f50c 497
1da177e4
LT
498 /* Don't allow old format executables to use shared libraries */
499 if (rev == OLD_FLAT_VERSION && id != 0) {
4adbb6ac
NP
500 pr_err("shared libraries are not available before rev 0x%lx\n",
501 FLAT_VERSION);
1ad3dcc0
LY
502 ret = -ENOEXEC;
503 goto err;
1da177e4
LT
504 }
505
cf9a566c
CH
506 /*
507 * fix up the flags for the older format, there were all kinds
508 * of endian hacks, this only works for the simple cases
509 */
510 if (rev == OLD_FLAT_VERSION &&
511 (flags || IS_ENABLED(CONFIG_BINFMT_FLAT_OLD_ALWAYS_RAM)))
512 flags = FLAT_FLAG_RAM;
513
514#else /* CONFIG_BINFMT_FLAT_OLD */
515 if (rev != FLAT_VERSION) {
516 pr_err("bad flat file version 0x%x (supported 0x%lx)\n",
517 rev, FLAT_VERSION);
518 ret = -ENOEXEC;
519 goto err;
520 }
521#endif /* !CONFIG_BINFMT_FLAT_OLD */
522
c995ee28
NP
523 /*
524 * Make sure the header params are sane.
525 * 28 bits (256 MB) is way more than reasonable in this case.
526 * If some top bits are set we have probable binary corruption.
527 */
528 if ((text_len | data_len | bss_len | stack_len | full_data) >> 28) {
529 pr_err("bad header\n");
530 ret = -ENOEXEC;
531 goto err;
532 }
533
1da177e4
LT
534#ifndef CONFIG_BINFMT_ZFLAT
535 if (flags & (FLAT_FLAG_GZIP|FLAT_FLAG_GZDATA)) {
4adbb6ac 536 pr_err("Support for ZFLAT executables is not enabled.\n");
1ad3dcc0
LY
537 ret = -ENOEXEC;
538 goto err;
1da177e4
LT
539 }
540#endif
541
542 /*
543 * Check initial limits. This avoids letting people circumvent
544 * size limits imposed on them by creating programs with large
545 * arrays in the data or bss.
546 */
d554ed89 547 rlim = rlimit(RLIMIT_DATA);
1da177e4
LT
548 if (rlim >= RLIM_INFINITY)
549 rlim = ~0;
1ad3dcc0
LY
550 if (data_len + bss_len > rlim) {
551 ret = -ENOMEM;
552 goto err;
553 }
554
1da177e4
LT
555 /* Flush all traces of the currently running executable */
556 if (id == 0) {
2388777a 557 ret = begin_new_exec(bprm);
13c3f50c 558 if (ret)
df88912a 559 goto err;
1da177e4
LT
560
561 /* OK, This is the point of no return */
fcc18e83 562 set_personality(PER_LINUX_32BIT);
221af7f8 563 setup_new_exec(bprm);
1da177e4
LT
564 }
565
566 /*
567 * calculate the extra space we need to map in
568 */
0e647c04
AM
569 extra = max_t(unsigned long, bss_len + stack_len,
570 relocs * sizeof(unsigned long));
1da177e4
LT
571
572 /*
573 * there are a couple of cases here, the separate code/data
574 * case, and then the fully copied to RAM case which lumps
575 * it all together.
576 */
015feacf 577 if (!IS_ENABLED(CONFIG_MMU) && !(flags & (FLAT_FLAG_RAM|FLAT_FLAG_GZIP))) {
1da177e4
LT
578 /*
579 * this should give us a ROM ptr, but if it doesn't we don't
580 * really care
581 */
4adbb6ac 582 pr_debug("ROM mapping of file (we hope)\n");
1da177e4 583
6be5ceb0 584 textpos = vm_mmap(bprm->file, 0, text_len, PROT_READ|PROT_EXEC,
a4eec6a3 585 MAP_PRIVATE, 0);
0b8c78f2 586 if (!textpos || IS_ERR_VALUE(textpos)) {
1ad3dcc0 587 ret = textpos;
13c3f50c
NP
588 if (!textpos)
589 ret = -ENOMEM;
4adbb6ac 590 pr_err("Unable to mmap process text, errno %d\n", ret);
df88912a 591 goto err;
1da177e4
LT
592 }
593
04d82a6d
DLM
594 len = data_len + extra +
595 DATA_START_OFFSET_WORDS * sizeof(unsigned long);
0f3e442a 596 len = PAGE_ALIGN(len);
13c3f50c 597 realdatastart = vm_mmap(NULL, 0, len,
72613e5f 598 PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE, 0);
1da177e4 599
0b8c78f2 600 if (realdatastart == 0 || IS_ERR_VALUE(realdatastart)) {
13c3f50c 601 ret = realdatastart;
1da177e4 602 if (!realdatastart)
13c3f50c 603 ret = -ENOMEM;
4adbb6ac 604 pr_err("Unable to allocate RAM for process data, "
13c3f50c 605 "errno %d\n", ret);
7696e0c3 606 vm_munmap(textpos, text_len);
df88912a 607 goto err;
1da177e4 608 }
2217b982 609 datapos = ALIGN(realdatastart +
04d82a6d 610 DATA_START_OFFSET_WORDS * sizeof(unsigned long),
2217b982 611 FLAT_DATA_ALIGN);
1da177e4 612
a8605423 613 pr_debug("Allocated data+bss+stack (%u bytes): %lx\n",
4adbb6ac 614 data_len + bss_len + stack_len, datapos);
1da177e4
LT
615
616 fpos = ntohl(hdr->data_start);
617#ifdef CONFIG_BINFMT_ZFLAT
618 if (flags & FLAT_FLAG_GZDATA) {
13c3f50c 619 result = decompress_exec(bprm, fpos, (char *)datapos,
3dc20cb2 620 full_data, 0);
1da177e4
LT
621 } else
622#endif
623 {
3dc20cb2
AV
624 result = read_code(bprm->file, datapos, fpos,
625 full_data);
1da177e4 626 }
0b8c78f2 627 if (IS_ERR_VALUE(result)) {
13c3f50c 628 ret = result;
4adbb6ac 629 pr_err("Unable to read data+bss, errno %d\n", ret);
7696e0c3
AV
630 vm_munmap(textpos, text_len);
631 vm_munmap(realdatastart, len);
df88912a 632 goto err;
1da177e4
LT
633 }
634
3b977718 635 reloc = (__be32 __user *)
13c3f50c 636 (datapos + (ntohl(hdr->reloc_start) - text_len));
1da177e4 637 memp = realdatastart;
0f3e442a 638 memp_size = len;
1da177e4
LT
639 } else {
640
04d82a6d
DLM
641 len = text_len + data_len + extra +
642 DATA_START_OFFSET_WORDS * sizeof(u32);
0f3e442a 643 len = PAGE_ALIGN(len);
13c3f50c 644 textpos = vm_mmap(NULL, 0, len,
72613e5f 645 PROT_READ | PROT_EXEC | PROT_WRITE, MAP_PRIVATE, 0);
72613e5f 646
0b8c78f2 647 if (!textpos || IS_ERR_VALUE(textpos)) {
1ad3dcc0 648 ret = textpos;
13c3f50c
NP
649 if (!textpos)
650 ret = -ENOMEM;
4adbb6ac 651 pr_err("Unable to allocate RAM for process text/data, "
13c3f50c 652 "errno %d\n", ret);
df88912a 653 goto err;
1da177e4
LT
654 }
655
656 realdatastart = textpos + ntohl(hdr->data_start);
2217b982 657 datapos = ALIGN(realdatastart +
04d82a6d 658 DATA_START_OFFSET_WORDS * sizeof(u32),
2217b982 659 FLAT_DATA_ALIGN);
c3dc5bec 660
3b977718 661 reloc = (__be32 __user *)
c3dc5bec 662 (datapos + (ntohl(hdr->reloc_start) - text_len));
1da177e4 663 memp = textpos;
0f3e442a 664 memp_size = len;
1da177e4
LT
665#ifdef CONFIG_BINFMT_ZFLAT
666 /*
667 * load it all in and treat it like a RAM load from now on
668 */
669 if (flags & FLAT_FLAG_GZIP) {
472f95f3 670#ifndef CONFIG_MMU
13c3f50c
NP
671 result = decompress_exec(bprm, sizeof(struct flat_hdr),
672 (((char *)textpos) + sizeof(struct flat_hdr)),
3dc20cb2 673 (text_len + full_data
13c3f50c 674 - sizeof(struct flat_hdr)),
1da177e4 675 0);
2217b982
MF
676 memmove((void *) datapos, (void *) realdatastart,
677 full_data);
472f95f3
NP
678#else
679 /*
680 * This is used on MMU systems mainly for testing.
681 * Let's use a kernel buffer to simplify things.
682 */
683 long unz_text_len = text_len - sizeof(struct flat_hdr);
684 long unz_len = unz_text_len + full_data;
685 char *unz_data = vmalloc(unz_len);
686 if (!unz_data) {
687 result = -ENOMEM;
688 } else {
689 result = decompress_exec(bprm, sizeof(struct flat_hdr),
690 unz_data, unz_len, 0);
691 if (result == 0 &&
692 (copy_to_user((void __user *)textpos + sizeof(struct flat_hdr),
693 unz_data, unz_text_len) ||
694 copy_to_user((void __user *)datapos,
695 unz_data + unz_text_len, full_data)))
696 result = -EFAULT;
697 vfree(unz_data);
698 }
699#endif
1da177e4 700 } else if (flags & FLAT_FLAG_GZDATA) {
3dc20cb2 701 result = read_code(bprm->file, textpos, 0, text_len);
472f95f3
NP
702 if (!IS_ERR_VALUE(result)) {
703#ifndef CONFIG_MMU
1da177e4 704 result = decompress_exec(bprm, text_len, (char *) datapos,
3dc20cb2 705 full_data, 0);
472f95f3
NP
706#else
707 char *unz_data = vmalloc(full_data);
708 if (!unz_data) {
709 result = -ENOMEM;
710 } else {
711 result = decompress_exec(bprm, text_len,
712 unz_data, full_data, 0);
713 if (result == 0 &&
714 copy_to_user((void __user *)datapos,
715 unz_data, full_data))
716 result = -EFAULT;
717 vfree(unz_data);
718 }
1da177e4 719#endif
472f95f3
NP
720 }
721 } else
722#endif /* CONFIG_BINFMT_ZFLAT */
1da177e4 723 {
3dc20cb2
AV
724 result = read_code(bprm->file, textpos, 0, text_len);
725 if (!IS_ERR_VALUE(result))
726 result = read_code(bprm->file, datapos,
727 ntohl(hdr->data_start),
728 full_data);
1da177e4 729 }
0b8c78f2 730 if (IS_ERR_VALUE(result)) {
13c3f50c 731 ret = result;
4adbb6ac 732 pr_err("Unable to read code+data+bss, errno %d\n", ret);
2217b982 733 vm_munmap(textpos, text_len + data_len + extra +
04d82a6d 734 DATA_START_OFFSET_WORDS * sizeof(u32));
df88912a 735 goto err;
1da177e4
LT
736 }
737 }
738
13c3f50c
NP
739 start_code = textpos + sizeof(struct flat_hdr);
740 end_code = textpos + text_len;
741 text_len -= sizeof(struct flat_hdr); /* the real code len */
1da177e4
LT
742
743 /* The main program needs a little extra setup in the task structure */
1da177e4
LT
744 if (id == 0) {
745 current->mm->start_code = start_code;
746 current->mm->end_code = end_code;
747 current->mm->start_data = datapos;
748 current->mm->end_data = datapos + data_len;
749 /*
750 * set up the brk stuff, uses any slack left in data/bss/stack
751 * allocation. We put the brk after the bss (between the bss
752 * and stack) like other platforms.
0f3e442a
DH
753 * Userspace code relies on the stack pointer starting out at
754 * an address right at the end of a page.
1da177e4
LT
755 */
756 current->mm->start_brk = datapos + data_len + bss_len;
757 current->mm->brk = (current->mm->start_brk + 3) & ~3;
015feacf 758#ifndef CONFIG_MMU
0f3e442a 759 current->mm->context.end_brk = memp + memp_size - stack_len;
015feacf 760#endif
1da177e4
LT
761 }
762
13c3f50c 763 if (flags & FLAT_FLAG_KTRACE) {
4adbb6ac
NP
764 pr_info("Mapping is %lx, Entry point is %x, data_start is %x\n",
765 textpos, 0x00ffffff&ntohl(hdr->entry), ntohl(hdr->data_start));
766 pr_info("%s %s: TEXT=%lx-%lx DATA=%lx-%lx BSS=%lx-%lx\n",
767 id ? "Lib" : "Load", bprm->filename,
768 start_code, end_code, datapos, datapos + data_len,
769 datapos + data_len, (datapos + data_len + bss_len + 3) & ~3);
13c3f50c 770 }
1da177e4
LT
771
772 /* Store the current module values into the global library structure */
773 libinfo->lib_list[id].start_code = start_code;
774 libinfo->lib_list[id].start_data = datapos;
775 libinfo->lib_list[id].start_brk = datapos + data_len + bss_len;
776 libinfo->lib_list[id].text_len = text_len;
777 libinfo->lib_list[id].loaded = 1;
778 libinfo->lib_list[id].entry = (0x00ffffff & ntohl(hdr->entry)) + textpos;
779 libinfo->lib_list[id].build_date = ntohl(hdr->build_date);
13c3f50c 780
1da177e4
LT
781 /*
782 * We just load the allocations into some temporary memory to
783 * help simplify all this mumbo jumbo
784 *
785 * We've got two different sections of relocation entries.
25985edc 786 * The first is the GOT which resides at the beginning of the data segment
1da177e4
LT
787 * and is terminated with a -1. This one can be relocated in place.
788 * The second is the extra relocation entries tacked after the image's
789 * data segment. These require a little more processing as the entry is
790 * really an offset into the image which contains an offset into the
791 * image.
792 */
793 if (flags & FLAT_FLAG_GOTPIC) {
6045ab5f
NC
794 rp = skip_got_header((u32 __user *) datapos);
795 for (; ; rp++) {
468138d7 796 u32 addr, rp_val;
6e572ffe
NP
797 if (get_user(rp_val, rp))
798 return -EFAULT;
799 if (rp_val == 0xffffffff)
800 break;
801 if (rp_val) {
802 addr = calc_reloc(rp_val, libinfo, id, 0);
1ad3dcc0
LY
803 if (addr == RELOC_FAILED) {
804 ret = -ENOEXEC;
df88912a 805 goto err;
1ad3dcc0 806 }
6e572ffe
NP
807 if (put_user(addr, rp))
808 return -EFAULT;
1da177e4
LT
809 }
810 }
811 }
812
813 /*
814 * Now run through the relocation entries.
815 * We've got to be careful here as C++ produces relocatable zero
816 * entries in the constructor and destructor tables which are then
817 * tested for being not zero (which will always occur unless we're
818 * based from address zero). This causes an endless loop as __start
819 * is at zero. The solution used is to not relocate zero addresses.
820 * This has the negative side effect of not allowing a global data
821 * reference to be statically initialised to _stext (I've moved
822 * __start to address 4 so that is okay).
823 */
824 if (rev > OLD_FLAT_VERSION) {
13c3f50c 825 for (i = 0; i < relocs; i++) {
468138d7 826 u32 addr, relval;
3b977718 827 __be32 tmp;
1da177e4 828
13c3f50c
NP
829 /*
830 * Get the address of the pointer to be
831 * relocated (of course, the address has to be
832 * relocated first).
833 */
3b977718 834 if (get_user(tmp, reloc + i))
6e572ffe 835 return -EFAULT;
3b977718 836 relval = ntohl(tmp);
1da177e4 837 addr = flat_get_relocate_addr(relval);
468138d7
AV
838 rp = (u32 __user *)calc_reloc(addr, libinfo, id, 1);
839 if (rp == (u32 __user *)RELOC_FAILED) {
1ad3dcc0 840 ret = -ENOEXEC;
df88912a 841 goto err;
1ad3dcc0 842 }
1da177e4
LT
843
844 /* Get the pointer's value. */
6843d8aa 845 ret = flat_get_addr_from_rp(rp, relval, flags, &addr);
468138d7
AV
846 if (unlikely(ret))
847 goto err;
848
1da177e4
LT
849 if (addr != 0) {
850 /*
851 * Do the relocation. PIC relocs in the data section are
852 * already in target order
853 */
3b977718
CH
854 if ((flags & FLAT_FLAG_GOTPIC) == 0) {
855 /*
856 * Meh, the same value can have a different
857 * byte order based on a flag..
858 */
859 addr = ntohl((__force __be32)addr);
860 }
1da177e4 861 addr = calc_reloc(addr, libinfo, id, 0);
1ad3dcc0
LY
862 if (addr == RELOC_FAILED) {
863 ret = -ENOEXEC;
df88912a 864 goto err;
1ad3dcc0 865 }
1da177e4
LT
866
867 /* Write back the relocated pointer. */
468138d7
AV
868 ret = flat_put_addr_at_rp(rp, addr, relval);
869 if (unlikely(ret))
870 goto err;
1da177e4
LT
871 }
872 }
cf9a566c 873#ifdef CONFIG_BINFMT_FLAT_OLD
1da177e4 874 } else {
1b2ce442 875 for (i = 0; i < relocs; i++) {
3b977718 876 __be32 relval;
1b2ce442
NP
877 if (get_user(relval, reloc + i))
878 return -EFAULT;
3b977718 879 old_reloc(ntohl(relval));
1b2ce442 880 }
cf9a566c 881#endif /* CONFIG_BINFMT_FLAT_OLD */
1da177e4 882 }
13c3f50c 883
79ef1e1f 884 flush_icache_user_range(start_code, end_code);
1da177e4
LT
885
886 /* zero the BSS, BRK and stack areas */
467aa146
NP
887 if (clear_user((void __user *)(datapos + data_len), bss_len +
888 (memp + memp_size - stack_len - /* end brk */
889 libinfo->lib_list[id].start_brk) + /* start brk */
890 stack_len))
891 return -EFAULT;
1da177e4
LT
892
893 return 0;
1ad3dcc0
LY
894err:
895 return ret;
1da177e4
LT
896}
897
898
899/****************************************************************************/
900#ifdef CONFIG_BINFMT_SHARED_FLAT
901
902/*
903 * Load a shared library into memory. The library gets its own data
904 * segment (including bss) but not argv/argc/environ.
905 */
906
907static int load_flat_shared_library(int id, struct lib_info *libs)
908{
867bfa4a
JH
909 /*
910 * This is a fake bprm struct; only the members "buf", "file" and
911 * "filename" are actually used.
912 */
1da177e4
LT
913 struct linux_binprm bprm;
914 int res;
915 char buf[16];
867bfa4a 916 loff_t pos = 0;
1da177e4 917
3a852d3b
DH
918 memset(&bprm, 0, sizeof(bprm));
919
1da177e4
LT
920 /* Create the file name */
921 sprintf(buf, "/lib/lib%d.so", id);
922
923 /* Open the file up */
924 bprm.filename = buf;
925 bprm.file = open_exec(bprm.filename);
926 res = PTR_ERR(bprm.file);
927 if (IS_ERR(bprm.file))
928 return res;
929
867bfa4a 930 res = kernel_read(bprm.file, bprm.buf, BINPRM_BUF_SIZE, &pos);
1da177e4 931
867bfa4a 932 if (res >= 0)
1da177e4 933 res = load_flat_file(&bprm, libs, id, NULL);
3440625d 934
3440625d
LT
935 allow_write_access(bprm.file);
936 fput(bprm.file);
937
13c3f50c 938 return res;
1da177e4
LT
939}
940
941#endif /* CONFIG_BINFMT_SHARED_FLAT */
942/****************************************************************************/
943
944/*
945 * These are the functions used to load flat style executables and shared
946 * libraries. There is no binary dependent code anywhere else.
947 */
948
13c3f50c 949static int load_flat_binary(struct linux_binprm *bprm)
1da177e4
LT
950{
951 struct lib_info libinfo;
71613c3b 952 struct pt_regs *regs = current_pt_regs();
015feacf 953 unsigned long stack_len = 0;
1da177e4 954 unsigned long start_addr;
1da177e4
LT
955 int res;
956 int i, j;
957
958 memset(&libinfo, 0, sizeof(libinfo));
13c3f50c 959
1da177e4
LT
960 /*
961 * We have to add the size of our arguments to our stack size
962 * otherwise it's too easy for users to create stack overflows
963 * by passing in a huge argument list. And yes, we have to be
964 * pedantic and include space for the argv/envp array as it may have
965 * a lot of entries.
966 */
015feacf
NP
967#ifndef CONFIG_MMU
968 stack_len += PAGE_SIZE * MAX_ARG_PAGES - bprm->p; /* the strings */
969#endif
a97d157d
NP
970 stack_len += (bprm->argc + 1) * sizeof(char *); /* the argv array */
971 stack_len += (bprm->envc + 1) * sizeof(char *); /* the envp array */
972 stack_len = ALIGN(stack_len, FLAT_STACK_ALIGN);
13c3f50c 973
1da177e4 974 res = load_flat_file(bprm, &libinfo, 0, &stack_len);
287980e4 975 if (res < 0)
1da177e4 976 return res;
13c3f50c 977
1da177e4 978 /* Update data segment pointers for all libraries */
af521f92
NP
979 for (i = 0; i < MAX_SHARED_LIBS; i++) {
980 if (!libinfo.lib_list[i].loaded)
981 continue;
982 for (j = 0; j < MAX_SHARED_LIBS; j++) {
983 unsigned long val = libinfo.lib_list[j].loaded ?
984 libinfo.lib_list[j].start_data : UNLOADED_LIB;
985 unsigned long __user *p = (unsigned long __user *)
986 libinfo.lib_list[i].start_data;
987 p -= j + 1;
988 if (put_user(val, p))
989 return -EFAULT;
990 }
991 }
1da177e4 992
1da177e4
LT
993 set_binfmt(&flat_format);
994
015feacf
NP
995#ifdef CONFIG_MMU
996 res = setup_arg_pages(bprm, STACK_TOP, EXSTACK_DEFAULT);
997 if (!res)
998 res = create_flat_tables(bprm, bprm->p);
999#else
a97d157d
NP
1000 /* Stash our initial stack pointer into the mm structure */
1001 current->mm->start_stack =
1002 ((current->mm->context.end_brk + stack_len + 3) & ~3) - 4;
1003 pr_debug("sp=%lx\n", current->mm->start_stack);
1da177e4 1004
687fd773 1005 /* copy the arg pages onto the stack */
a97d157d
NP
1006 res = transfer_args_to_stack(bprm, &current->mm->start_stack);
1007 if (!res)
1008 res = create_flat_tables(bprm, current->mm->start_stack);
015feacf 1009#endif
687fd773
NP
1010 if (res)
1011 return res;
1da177e4 1012
1da177e4
LT
1013 /* Fake some return addresses to ensure the call chain will
1014 * initialise library in order for us. We are required to call
1015 * lib 1 first, then 2, ... and finally the main program (id 0).
1016 */
1017 start_addr = libinfo.lib_list[0].entry;
1018
1019#ifdef CONFIG_BINFMT_SHARED_FLAT
13c3f50c 1020 for (i = MAX_SHARED_LIBS-1; i > 0; i--) {
1da177e4
LT
1021 if (libinfo.lib_list[i].loaded) {
1022 /* Push previos first to call address */
a97d157d
NP
1023 unsigned long __user *sp;
1024 current->mm->start_stack -= sizeof(unsigned long);
1025 sp = (unsigned long __user *)current->mm->start_stack;
8861fd57
AV
1026 if (put_user(start_addr, sp))
1027 return -EFAULT;
1da177e4
LT
1028 start_addr = libinfo.lib_list[i].entry;
1029 }
1030 }
1031#endif
13c3f50c 1032
74c27c43
TY
1033#ifdef FLAT_PLAT_INIT
1034 FLAT_PLAT_INIT(regs);
1035#endif
13c3f50c 1036
b8383831 1037 finalize_exec(bprm);
4adbb6ac
NP
1038 pr_debug("start_thread(regs=0x%p, entry=0x%lx, start_stack=0x%lx)\n",
1039 regs, start_addr, current->mm->start_stack);
1da177e4
LT
1040 start_thread(regs, start_addr, current->mm->start_stack);
1041
1da177e4
LT
1042 return 0;
1043}
1044
1045/****************************************************************************/
1046
1047static int __init init_flat_binfmt(void)
1048{
8fc3dc5a
AV
1049 register_binfmt(&flat_format);
1050 return 0;
1da177e4 1051}
1da177e4 1052core_initcall(init_flat_binfmt);
1da177e4
LT
1053
1054/****************************************************************************/