Lines Matching refs:bprm
78 static int bprm_creds_from_file(struct linux_binprm *bprm);
186 static void acct_arg_size(struct linux_binprm *bprm, unsigned long pages) in acct_arg_size() argument
189 long diff = (long)(pages - bprm->vma_pages); in acct_arg_size()
194 bprm->vma_pages = pages; in acct_arg_size()
198 static struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos, in get_arg_page() argument
207 ret = expand_downwards(bprm->vma, pos); in get_arg_page()
220 mmap_read_lock(bprm->mm); in get_arg_page()
221 ret = get_user_pages_remote(bprm->mm, pos, 1, gup_flags, in get_arg_page()
223 mmap_read_unlock(bprm->mm); in get_arg_page()
228 acct_arg_size(bprm, vma_pages(bprm->vma)); in get_arg_page()
238 static void free_arg_pages(struct linux_binprm *bprm) in free_arg_pages() argument
242 static void flush_arg_page(struct linux_binprm *bprm, unsigned long pos, in flush_arg_page() argument
245 flush_cache_page(bprm->vma, pos, page_to_pfn(page)); in flush_arg_page()
248 static int __bprm_mm_init(struct linux_binprm *bprm) in __bprm_mm_init() argument
252 struct mm_struct *mm = bprm->mm; in __bprm_mm_init()
254 bprm->vma = vma = vm_area_alloc(mm); in __bprm_mm_init()
282 bprm->p = vma->vm_end - sizeof(void *); in __bprm_mm_init()
287 bprm->vma = NULL; in __bprm_mm_init()
292 static bool valid_arg_len(struct linux_binprm *bprm, long len) in valid_arg_len() argument
299 static inline void acct_arg_size(struct linux_binprm *bprm, unsigned long pages) in acct_arg_size() argument
303 static struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos, in get_arg_page() argument
308 page = bprm->page[pos / PAGE_SIZE]; in get_arg_page()
313 bprm->page[pos / PAGE_SIZE] = page; in get_arg_page()
323 static void free_arg_page(struct linux_binprm *bprm, int i) in free_arg_page() argument
325 if (bprm->page[i]) { in free_arg_page()
326 __free_page(bprm->page[i]); in free_arg_page()
327 bprm->page[i] = NULL; in free_arg_page()
331 static void free_arg_pages(struct linux_binprm *bprm) in free_arg_pages() argument
336 free_arg_page(bprm, i); in free_arg_pages()
339 static void flush_arg_page(struct linux_binprm *bprm, unsigned long pos, in flush_arg_page() argument
344 static int __bprm_mm_init(struct linux_binprm *bprm) in __bprm_mm_init() argument
346 bprm->p = PAGE_SIZE * MAX_ARG_PAGES - sizeof(void *); in __bprm_mm_init()
350 static bool valid_arg_len(struct linux_binprm *bprm, long len) in valid_arg_len() argument
352 return len <= bprm->p; in valid_arg_len()
363 static int bprm_mm_init(struct linux_binprm *bprm) in bprm_mm_init() argument
368 bprm->mm = mm = mm_alloc(); in bprm_mm_init()
375 bprm->rlim_stack = current->signal->rlim[RLIMIT_STACK]; in bprm_mm_init()
378 err = __bprm_mm_init(bprm); in bprm_mm_init()
386 bprm->mm = NULL; in bprm_mm_init()
472 static int bprm_stack_limits(struct linux_binprm *bprm) in bprm_stack_limits() argument
485 limit = min(limit, bprm->rlim_stack.rlim_cur / 4); in bprm_stack_limits()
498 ptr_size = (bprm->argc + bprm->envc) * sizeof(void *); in bprm_stack_limits()
503 bprm->argmin = bprm->p - limit; in bprm_stack_limits()
513 struct linux_binprm *bprm) in copy_strings() argument
535 if (!valid_arg_len(bprm, len)) in copy_strings()
539 pos = bprm->p; in copy_strings()
541 bprm->p -= len; in copy_strings()
543 if (bprm->p < bprm->argmin) in copy_strings()
572 page = get_arg_page(bprm, pos, 1); in copy_strings()
586 flush_arg_page(bprm, kpos, kmapped_page); in copy_strings()
607 int copy_string_kernel(const char *arg, struct linux_binprm *bprm) in copy_string_kernel() argument
610 unsigned long pos = bprm->p; in copy_string_kernel()
614 if (!valid_arg_len(bprm, len)) in copy_string_kernel()
619 bprm->p -= len; in copy_string_kernel()
620 if (IS_ENABLED(CONFIG_MMU) && bprm->p < bprm->argmin) in copy_string_kernel()
633 page = get_arg_page(bprm, pos, 1); in copy_string_kernel()
637 flush_arg_page(bprm, pos & PAGE_MASK, page); in copy_string_kernel()
649 struct linux_binprm *bprm) in copy_strings_kernel() argument
652 int ret = copy_string_kernel(argv[argc], bprm); in copy_strings_kernel()
741 int setup_arg_pages(struct linux_binprm *bprm, in setup_arg_pages() argument
748 struct vm_area_struct *vma = bprm->vma; in setup_arg_pages()
758 stack_base = bprm->rlim_stack.rlim_max; in setup_arg_pages()
772 mm->arg_start = bprm->p - stack_shift; in setup_arg_pages()
773 bprm->p = vma->vm_end - stack_shift; in setup_arg_pages()
784 bprm->p -= stack_shift; in setup_arg_pages()
785 mm->arg_start = bprm->p; in setup_arg_pages()
788 if (bprm->loader) in setup_arg_pages()
789 bprm->loader -= stack_shift; in setup_arg_pages()
790 bprm->exec -= stack_shift; in setup_arg_pages()
817 bprm->file); in setup_arg_pages()
836 rlim_stack = bprm->rlim_stack.rlim_cur & PAGE_MASK; in setup_arg_pages()
848 current->mm->start_stack = bprm->p; in setup_arg_pages()
865 int transfer_args_to_stack(struct linux_binprm *bprm, in transfer_args_to_stack() argument
871 stop = bprm->p >> PAGE_SHIFT; in transfer_args_to_stack()
875 unsigned int offset = index == stop ? bprm->p & ~PAGE_MASK : 0; in transfer_args_to_stack()
876 char *src = kmap(bprm->page[index]) + offset; in transfer_args_to_stack()
880 kunmap(bprm->page[index]); in transfer_args_to_stack()
1236 int begin_new_exec(struct linux_binprm * bprm) in begin_new_exec() argument
1242 retval = bprm_creds_from_file(bprm); in begin_new_exec()
1249 bprm->point_of_no_return = true; in begin_new_exec()
1273 retval = set_mm_exe_file(bprm->mm, bprm->file); in begin_new_exec()
1278 would_dump(bprm, bprm->file); in begin_new_exec()
1279 if (bprm->have_execfd) in begin_new_exec()
1280 would_dump(bprm, bprm->executable); in begin_new_exec()
1285 acct_arg_size(bprm, 0); in begin_new_exec()
1286 retval = exec_mmap(bprm->mm); in begin_new_exec()
1290 bprm->mm = NULL; in begin_new_exec()
1313 me->personality &= ~bprm->per_clear; in begin_new_exec()
1325 if (bprm->secureexec) { in begin_new_exec()
1336 if (bprm->rlim_stack.rlim_cur > _STK_LIM) in begin_new_exec()
1337 bprm->rlim_stack.rlim_cur = _STK_LIM; in begin_new_exec()
1347 if (bprm->interp_flags & BINPRM_FLAGS_ENFORCE_NONDUMP || in begin_new_exec()
1355 __set_task_comm(me, kbasename(bprm->filename), true); in begin_new_exec()
1362 retval = set_cred_ucounts(bprm->cred); in begin_new_exec()
1369 security_bprm_committing_creds(bprm); in begin_new_exec()
1371 commit_creds(bprm->cred); in begin_new_exec()
1372 bprm->cred = NULL; in begin_new_exec()
1387 security_bprm_committed_creds(bprm); in begin_new_exec()
1390 if (bprm->have_execfd) { in begin_new_exec()
1394 fd_install(retval, bprm->executable); in begin_new_exec()
1395 bprm->executable = NULL; in begin_new_exec()
1396 bprm->execfd = retval; in begin_new_exec()
1407 void would_dump(struct linux_binprm *bprm, struct file *file) in would_dump() argument
1413 bprm->interp_flags |= BINPRM_FLAGS_ENFORCE_NONDUMP; in would_dump()
1416 user_ns = old = bprm->mm->user_ns; in would_dump()
1422 bprm->mm->user_ns = get_user_ns(user_ns); in would_dump()
1429 void setup_new_exec(struct linux_binprm * bprm) in setup_new_exec() argument
1434 arch_pick_mmap_layout(me->mm, &bprm->rlim_stack); in setup_new_exec()
1449 void finalize_exec(struct linux_binprm *bprm) in finalize_exec() argument
1453 current->signal->rlim[RLIMIT_STACK] = bprm->rlim_stack; in finalize_exec()
1464 static int prepare_bprm_creds(struct linux_binprm *bprm) in prepare_bprm_creds() argument
1469 bprm->cred = prepare_exec_creds(); in prepare_bprm_creds()
1470 if (likely(bprm->cred)) in prepare_bprm_creds()
1477 static void free_bprm(struct linux_binprm *bprm) in free_bprm() argument
1479 if (bprm->mm) { in free_bprm()
1480 acct_arg_size(bprm, 0); in free_bprm()
1481 mmput(bprm->mm); in free_bprm()
1483 free_arg_pages(bprm); in free_bprm()
1484 if (bprm->cred) { in free_bprm()
1486 abort_creds(bprm->cred); in free_bprm()
1488 if (bprm->file) { in free_bprm()
1489 allow_write_access(bprm->file); in free_bprm()
1490 fput(bprm->file); in free_bprm()
1492 if (bprm->executable) in free_bprm()
1493 fput(bprm->executable); in free_bprm()
1495 if (bprm->interp != bprm->filename) in free_bprm()
1496 kfree(bprm->interp); in free_bprm()
1497 kfree(bprm->fdpath); in free_bprm()
1498 kfree(bprm); in free_bprm()
1503 struct linux_binprm *bprm = kzalloc(sizeof(*bprm), GFP_KERNEL); in alloc_bprm() local
1505 if (!bprm) in alloc_bprm()
1509 bprm->filename = filename->name; in alloc_bprm()
1512 bprm->fdpath = kasprintf(GFP_KERNEL, "/dev/fd/%d", fd); in alloc_bprm()
1514 bprm->fdpath = kasprintf(GFP_KERNEL, "/dev/fd/%d/%s", in alloc_bprm()
1516 if (!bprm->fdpath) in alloc_bprm()
1519 bprm->filename = bprm->fdpath; in alloc_bprm()
1521 bprm->interp = bprm->filename; in alloc_bprm()
1523 retval = bprm_mm_init(bprm); in alloc_bprm()
1526 return bprm; in alloc_bprm()
1529 free_bprm(bprm); in alloc_bprm()
1534 int bprm_change_interp(const char *interp, struct linux_binprm *bprm) in bprm_change_interp() argument
1537 if (bprm->interp != bprm->filename) in bprm_change_interp()
1538 kfree(bprm->interp); in bprm_change_interp()
1539 bprm->interp = kstrdup(interp, GFP_KERNEL); in bprm_change_interp()
1540 if (!bprm->interp) in bprm_change_interp()
1551 static void check_unsafe_exec(struct linux_binprm *bprm) in check_unsafe_exec() argument
1557 bprm->unsafe |= LSM_UNSAFE_PTRACE; in check_unsafe_exec()
1564 bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS; in check_unsafe_exec()
1577 bprm->unsafe |= LSM_UNSAFE_SHARE; in check_unsafe_exec()
1583 static void bprm_fill_uid(struct linux_binprm *bprm, struct file *file) in bprm_fill_uid() argument
1615 if (!kuid_has_mapping(bprm->cred->user_ns, uid) || in bprm_fill_uid()
1616 !kgid_has_mapping(bprm->cred->user_ns, gid)) in bprm_fill_uid()
1620 bprm->per_clear |= PER_CLEAR_ON_SETID; in bprm_fill_uid()
1621 bprm->cred->euid = uid; in bprm_fill_uid()
1625 bprm->per_clear |= PER_CLEAR_ON_SETID; in bprm_fill_uid()
1626 bprm->cred->egid = gid; in bprm_fill_uid()
1633 static int bprm_creds_from_file(struct linux_binprm *bprm) in bprm_creds_from_file() argument
1636 struct file *file = bprm->execfd_creds ? bprm->executable : bprm->file; in bprm_creds_from_file()
1638 bprm_fill_uid(bprm, file); in bprm_creds_from_file()
1639 return security_bprm_creds_from_file(bprm, file); in bprm_creds_from_file()
1648 static int prepare_binprm(struct linux_binprm *bprm) in prepare_binprm() argument
1652 memset(bprm->buf, 0, BINPRM_BUF_SIZE); in prepare_binprm()
1653 return kernel_read(bprm->file, bprm->buf, BINPRM_BUF_SIZE, &pos); in prepare_binprm()
1661 int remove_arg_zero(struct linux_binprm *bprm) in remove_arg_zero() argument
1668 if (!bprm->argc) in remove_arg_zero()
1672 offset = bprm->p & ~PAGE_MASK; in remove_arg_zero()
1673 page = get_arg_page(bprm, bprm->p, 0); in remove_arg_zero()
1681 offset++, bprm->p++) in remove_arg_zero()
1688 bprm->p++; in remove_arg_zero()
1689 bprm->argc--; in remove_arg_zero()
1701 static int search_binary_handler(struct linux_binprm *bprm) in search_binary_handler() argument
1707 retval = prepare_binprm(bprm); in search_binary_handler()
1711 retval = security_bprm_check(bprm); in search_binary_handler()
1723 retval = fmt->load_binary(bprm); in search_binary_handler()
1727 if (bprm->point_of_no_return || (retval != -ENOEXEC)) { in search_binary_handler()
1735 if (printable(bprm->buf[0]) && printable(bprm->buf[1]) && in search_binary_handler()
1736 printable(bprm->buf[2]) && printable(bprm->buf[3])) in search_binary_handler()
1738 if (request_module("binfmt-%04x", *(ushort *)(bprm->buf + 2)) < 0) in search_binary_handler()
1747 static int exec_binprm(struct linux_binprm *bprm) in exec_binprm() argument
1764 ret = search_binary_handler(bprm); in exec_binprm()
1767 if (!bprm->interpreter) in exec_binprm()
1770 exec = bprm->file; in exec_binprm()
1771 bprm->file = bprm->interpreter; in exec_binprm()
1772 bprm->interpreter = NULL; in exec_binprm()
1775 if (unlikely(bprm->have_execfd)) { in exec_binprm()
1776 if (bprm->executable) { in exec_binprm()
1780 bprm->executable = exec; in exec_binprm()
1785 audit_bprm(bprm); in exec_binprm()
1786 trace_sched_process_exec(current, old_pid, bprm); in exec_binprm()
1795 static int bprm_execve(struct linux_binprm *bprm, in bprm_execve() argument
1801 retval = prepare_bprm_creds(bprm); in bprm_execve()
1805 check_unsafe_exec(bprm); in bprm_execve()
1815 bprm->file = file; in bprm_execve()
1825 if (bprm->fdpath && get_close_on_exec(fd)) in bprm_execve()
1826 bprm->interp_flags |= BINPRM_FLAGS_PATH_INACCESSIBLE; in bprm_execve()
1829 retval = security_bprm_creds_for_exec(bprm); in bprm_execve()
1833 retval = exec_binprm(bprm); in bprm_execve()
1852 if (bprm->point_of_no_return && !fatal_signal_pending(current)) in bprm_execve()
1867 struct linux_binprm *bprm; in do_execveat_common() local
1889 bprm = alloc_bprm(fd, filename); in do_execveat_common()
1890 if (IS_ERR(bprm)) { in do_execveat_common()
1891 retval = PTR_ERR(bprm); in do_execveat_common()
1898 bprm->argc = retval; in do_execveat_common()
1903 bprm->envc = retval; in do_execveat_common()
1905 retval = bprm_stack_limits(bprm); in do_execveat_common()
1909 retval = copy_string_kernel(bprm->filename, bprm); in do_execveat_common()
1912 bprm->exec = bprm->p; in do_execveat_common()
1914 retval = copy_strings(bprm->envc, envp, bprm); in do_execveat_common()
1918 retval = copy_strings(bprm->argc, argv, bprm); in do_execveat_common()
1922 retval = bprm_execve(bprm, fd, filename, flags); in do_execveat_common()
1924 free_bprm(bprm); in do_execveat_common()
1935 struct linux_binprm *bprm; in kernel_execve() local
1943 bprm = alloc_bprm(fd, filename); in kernel_execve()
1944 if (IS_ERR(bprm)) { in kernel_execve()
1945 retval = PTR_ERR(bprm); in kernel_execve()
1952 bprm->argc = retval; in kernel_execve()
1957 bprm->envc = retval; in kernel_execve()
1959 retval = bprm_stack_limits(bprm); in kernel_execve()
1963 retval = copy_string_kernel(bprm->filename, bprm); in kernel_execve()
1966 bprm->exec = bprm->p; in kernel_execve()
1968 retval = copy_strings_kernel(bprm->envc, envp, bprm); in kernel_execve()
1972 retval = copy_strings_kernel(bprm->argc, argv, bprm); in kernel_execve()
1976 retval = bprm_execve(bprm, fd, filename, 0); in kernel_execve()
1978 free_bprm(bprm); in kernel_execve()