Linux Audio

Check our new training course

Linux kernel drivers training

May 6-19, 2025
Register
Loading...
v4.10.11
 
  1/*
  2 * binfmt_misc.c
  3 *
  4 * Copyright (C) 1997 Richard Günther
  5 *
  6 * binfmt_misc detects binaries via a magic or filename extension and invokes
  7 * a specified wrapper. See Documentation/binfmt_misc.txt for more details.
  8 */
  9
 10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 11
 12#include <linux/kernel.h>
 13#include <linux/module.h>
 14#include <linux/init.h>
 15#include <linux/sched.h>
 16#include <linux/magic.h>
 17#include <linux/binfmts.h>
 18#include <linux/slab.h>
 19#include <linux/ctype.h>
 20#include <linux/string_helpers.h>
 21#include <linux/file.h>
 22#include <linux/pagemap.h>
 23#include <linux/namei.h>
 24#include <linux/mount.h>
 
 25#include <linux/syscalls.h>
 26#include <linux/fs.h>
 27#include <linux/uaccess.h>
 28
 29#include "internal.h"
 30
 31#ifdef DEBUG
 32# define USE_DEBUG 1
 33#else
 34# define USE_DEBUG 0
 35#endif
 36
 37enum {
 38	VERBOSE_STATUS = 1 /* make it zero to save 400 bytes kernel memory */
 39};
 40
 41static LIST_HEAD(entries);
 42static int enabled = 1;
 43
 44enum {Enabled, Magic};
 45#define MISC_FMT_PRESERVE_ARGV0 (1 << 31)
 46#define MISC_FMT_OPEN_BINARY (1 << 30)
 47#define MISC_FMT_CREDENTIALS (1 << 29)
 48#define MISC_FMT_OPEN_FILE (1 << 28)
 49
 50typedef struct {
 51	struct list_head list;
 52	unsigned long flags;		/* type, status, etc. */
 53	int offset;			/* offset of magic */
 54	int size;			/* size of magic/mask */
 55	char *magic;			/* magic or filename extension */
 56	char *mask;			/* mask, NULL for exact match */
 57	char *interpreter;		/* filename of interpreter */
 58	char *name;
 59	struct dentry *dentry;
 60	struct file *interp_file;
 61} Node;
 62
 63static DEFINE_RWLOCK(entries_lock);
 64static struct file_system_type bm_fs_type;
 65static struct vfsmount *bm_mnt;
 66static int entry_count;
 67
 68/*
 69 * Max length of the register string.  Determined by:
 70 *  - 7 delimiters
 71 *  - name:   ~50 bytes
 72 *  - type:   1 byte
 73 *  - offset: 3 bytes (has to be smaller than BINPRM_BUF_SIZE)
 74 *  - magic:  128 bytes (512 in escaped form)
 75 *  - mask:   128 bytes (512 in escaped form)
 76 *  - interp: ~50 bytes
 77 *  - flags:  5 bytes
 78 * Round that up a bit, and then back off to hold the internal data
 79 * (like struct Node).
 80 */
 81#define MAX_REGISTER_LENGTH 1920
 82
 83/*
 84 * Check if we support the binfmt
 85 * if we do, return the node, else NULL
 86 * locking is done in load_misc_binary
 87 */
 88static Node *check_file(struct linux_binprm *bprm)
 89{
 90	char *p = strrchr(bprm->interp, '.');
 91	struct list_head *l;
 92
 93	/* Walk all the registered handlers. */
 94	list_for_each(l, &entries) {
 95		Node *e = list_entry(l, Node, list);
 96		char *s;
 97		int j;
 98
 99		/* Make sure this one is currently enabled. */
100		if (!test_bit(Enabled, &e->flags))
101			continue;
102
103		/* Do matching based on extension if applicable. */
104		if (!test_bit(Magic, &e->flags)) {
105			if (p && !strcmp(e->magic, p + 1))
106				return e;
107			continue;
108		}
109
110		/* Do matching based on magic & mask. */
111		s = bprm->buf + e->offset;
112		if (e->mask) {
113			for (j = 0; j < e->size; j++)
114				if ((*s++ ^ e->magic[j]) & e->mask[j])
115					break;
116		} else {
117			for (j = 0; j < e->size; j++)
118				if ((*s++ ^ e->magic[j]))
119					break;
120		}
121		if (j == e->size)
122			return e;
123	}
124	return NULL;
125}
126
127/*
128 * the loader itself
129 */
130static int load_misc_binary(struct linux_binprm *bprm)
131{
132	Node *fmt;
133	struct file *interp_file = NULL;
134	char iname[BINPRM_BUF_SIZE];
135	const char *iname_addr = iname;
136	int retval;
137	int fd_binary = -1;
138
139	retval = -ENOEXEC;
140	if (!enabled)
141		goto ret;
142
143	/* to keep locking time low, we copy the interpreter string */
144	read_lock(&entries_lock);
145	fmt = check_file(bprm);
146	if (fmt)
147		strlcpy(iname, fmt->interpreter, BINPRM_BUF_SIZE);
148	read_unlock(&entries_lock);
149	if (!fmt)
150		goto ret;
151
152	/* Need to be able to load the file after exec */
 
153	if (bprm->interp_flags & BINPRM_FLAGS_PATH_INACCESSIBLE)
154		return -ENOENT;
155
156	if (!(fmt->flags & MISC_FMT_PRESERVE_ARGV0)) {
157		retval = remove_arg_zero(bprm);
158		if (retval)
159			goto ret;
160	}
161
162	if (fmt->flags & MISC_FMT_OPEN_BINARY) {
163
164		/* if the binary should be opened on behalf of the
165		 * interpreter than keep it open and assign descriptor
166		 * to it
167		 */
168		fd_binary = get_unused_fd_flags(0);
169		if (fd_binary < 0) {
170			retval = fd_binary;
171			goto ret;
172		}
173		fd_install(fd_binary, bprm->file);
174
175		/* if the binary is not readable than enforce mm->dumpable=0
176		   regardless of the interpreter's permissions */
177		would_dump(bprm, bprm->file);
178
179		allow_write_access(bprm->file);
180		bprm->file = NULL;
181
182		/* mark the bprm that fd should be passed to interp */
183		bprm->interp_flags |= BINPRM_FLAGS_EXECFD;
184		bprm->interp_data = fd_binary;
185
186	} else {
187		allow_write_access(bprm->file);
188		fput(bprm->file);
189		bprm->file = NULL;
190	}
191	/* make argv[1] be the path to the binary */
192	retval = copy_strings_kernel(1, &bprm->interp, bprm);
193	if (retval < 0)
194		goto error;
195	bprm->argc++;
196
197	/* add the interp as argv[0] */
198	retval = copy_strings_kernel(1, &iname_addr, bprm);
199	if (retval < 0)
200		goto error;
201	bprm->argc++;
202
203	/* Update interp in case binfmt_script needs it. */
204	retval = bprm_change_interp(iname, bprm);
205	if (retval < 0)
206		goto error;
207
208	if (fmt->flags & MISC_FMT_OPEN_FILE && fmt->interp_file) {
209		interp_file = filp_clone_open(fmt->interp_file);
210		if (!IS_ERR(interp_file))
211			deny_write_access(interp_file);
212	} else {
213		interp_file = open_exec(iname);
214	}
215	retval = PTR_ERR(interp_file);
216	if (IS_ERR(interp_file))
217		goto error;
218
219	bprm->file = interp_file;
220	if (fmt->flags & MISC_FMT_CREDENTIALS) {
221		/*
222		 * No need to call prepare_binprm(), it's already been
223		 * done.  bprm->buf is stale, update from interp_file.
224		 */
225		memset(bprm->buf, 0, BINPRM_BUF_SIZE);
226		retval = kernel_read(bprm->file, 0, bprm->buf, BINPRM_BUF_SIZE);
227	} else
228		retval = prepare_binprm(bprm);
229
230	if (retval < 0)
231		goto error;
232
233	retval = search_binary_handler(bprm);
234	if (retval < 0)
235		goto error;
236
 
237ret:
 
238	return retval;
239error:
240	if (fd_binary > 0)
241		sys_close(fd_binary);
242	bprm->interp_flags = 0;
243	bprm->interp_data = 0;
244	goto ret;
245}
246
247/* Command parsers */
248
249/*
250 * parses and copies one argument enclosed in del from *sp to *dp,
251 * recognising the \x special.
252 * returns pointer to the copied argument or NULL in case of an
253 * error (and sets err) or null argument length.
254 */
255static char *scanarg(char *s, char del)
256{
257	char c;
258
259	while ((c = *s++) != del) {
260		if (c == '\\' && *s == 'x') {
261			s++;
262			if (!isxdigit(*s++))
263				return NULL;
264			if (!isxdigit(*s++))
265				return NULL;
266		}
267	}
268	s[-1] ='\0';
269	return s;
270}
271
272static char *check_special_flags(char *sfs, Node *e)
273{
274	char *p = sfs;
275	int cont = 1;
276
277	/* special flags */
278	while (cont) {
279		switch (*p) {
280		case 'P':
281			pr_debug("register: flag: P (preserve argv0)\n");
282			p++;
283			e->flags |= MISC_FMT_PRESERVE_ARGV0;
284			break;
285		case 'O':
286			pr_debug("register: flag: O (open binary)\n");
287			p++;
288			e->flags |= MISC_FMT_OPEN_BINARY;
289			break;
290		case 'C':
291			pr_debug("register: flag: C (preserve creds)\n");
292			p++;
293			/* this flags also implies the
294			   open-binary flag */
295			e->flags |= (MISC_FMT_CREDENTIALS |
296					MISC_FMT_OPEN_BINARY);
297			break;
298		case 'F':
299			pr_debug("register: flag: F: open interpreter file now\n");
300			p++;
301			e->flags |= MISC_FMT_OPEN_FILE;
302			break;
303		default:
304			cont = 0;
305		}
306	}
307
308	return p;
309}
310
311/*
312 * This registers a new binary format, it recognises the syntax
313 * ':name:type:offset:magic:mask:interpreter:flags'
314 * where the ':' is the IFS, that can be chosen with the first char
315 */
316static Node *create_entry(const char __user *buffer, size_t count)
317{
318	Node *e;
319	int memsize, err;
320	char *buf, *p;
321	char del;
322
323	pr_debug("register: received %zu bytes\n", count);
324
325	/* some sanity checks */
326	err = -EINVAL;
327	if ((count < 11) || (count > MAX_REGISTER_LENGTH))
328		goto out;
329
330	err = -ENOMEM;
331	memsize = sizeof(Node) + count + 8;
332	e = kmalloc(memsize, GFP_KERNEL);
333	if (!e)
334		goto out;
335
336	p = buf = (char *)e + sizeof(Node);
337
338	memset(e, 0, sizeof(Node));
339	if (copy_from_user(buf, buffer, count))
340		goto efault;
341
342	del = *p++;	/* delimeter */
343
344	pr_debug("register: delim: %#x {%c}\n", del, del);
345
346	/* Pad the buffer with the delim to simplify parsing below. */
347	memset(buf + count, del, 8);
348
349	/* Parse the 'name' field. */
350	e->name = p;
351	p = strchr(p, del);
352	if (!p)
353		goto einval;
354	*p++ = '\0';
355	if (!e->name[0] ||
356	    !strcmp(e->name, ".") ||
357	    !strcmp(e->name, "..") ||
358	    strchr(e->name, '/'))
359		goto einval;
360
361	pr_debug("register: name: {%s}\n", e->name);
362
363	/* Parse the 'type' field. */
364	switch (*p++) {
365	case 'E':
366		pr_debug("register: type: E (extension)\n");
367		e->flags = 1 << Enabled;
368		break;
369	case 'M':
370		pr_debug("register: type: M (magic)\n");
371		e->flags = (1 << Enabled) | (1 << Magic);
372		break;
373	default:
374		goto einval;
375	}
376	if (*p++ != del)
377		goto einval;
378
379	if (test_bit(Magic, &e->flags)) {
380		/* Handle the 'M' (magic) format. */
381		char *s;
382
383		/* Parse the 'offset' field. */
384		s = strchr(p, del);
385		if (!s)
386			goto einval;
387		*s++ = '\0';
388		e->offset = simple_strtoul(p, &p, 10);
 
 
 
 
 
389		if (*p++)
390			goto einval;
391		pr_debug("register: offset: %#x\n", e->offset);
392
393		/* Parse the 'magic' field. */
394		e->magic = p;
395		p = scanarg(p, del);
396		if (!p)
397			goto einval;
398		if (!e->magic[0])
399			goto einval;
400		if (USE_DEBUG)
401			print_hex_dump_bytes(
402				KBUILD_MODNAME ": register: magic[raw]: ",
403				DUMP_PREFIX_NONE, e->magic, p - e->magic);
404
405		/* Parse the 'mask' field. */
406		e->mask = p;
407		p = scanarg(p, del);
408		if (!p)
409			goto einval;
410		if (!e->mask[0]) {
411			e->mask = NULL;
412			pr_debug("register:  mask[raw]: none\n");
413		} else if (USE_DEBUG)
414			print_hex_dump_bytes(
415				KBUILD_MODNAME ": register:  mask[raw]: ",
416				DUMP_PREFIX_NONE, e->mask, p - e->mask);
417
418		/*
419		 * Decode the magic & mask fields.
420		 * Note: while we might have accepted embedded NUL bytes from
421		 * above, the unescape helpers here will stop at the first one
422		 * it encounters.
423		 */
424		e->size = string_unescape_inplace(e->magic, UNESCAPE_HEX);
425		if (e->mask &&
426		    string_unescape_inplace(e->mask, UNESCAPE_HEX) != e->size)
427			goto einval;
428		if (e->size + e->offset > BINPRM_BUF_SIZE)
 
429			goto einval;
430		pr_debug("register: magic/mask length: %i\n", e->size);
431		if (USE_DEBUG) {
432			print_hex_dump_bytes(
433				KBUILD_MODNAME ": register: magic[decoded]: ",
434				DUMP_PREFIX_NONE, e->magic, e->size);
435
436			if (e->mask) {
437				int i;
438				char *masked = kmalloc(e->size, GFP_KERNEL);
439
440				print_hex_dump_bytes(
441					KBUILD_MODNAME ": register:  mask[decoded]: ",
442					DUMP_PREFIX_NONE, e->mask, e->size);
443
444				if (masked) {
445					for (i = 0; i < e->size; ++i)
446						masked[i] = e->magic[i] & e->mask[i];
447					print_hex_dump_bytes(
448						KBUILD_MODNAME ": register:  magic[masked]: ",
449						DUMP_PREFIX_NONE, masked, e->size);
450
451					kfree(masked);
452				}
453			}
454		}
455	} else {
456		/* Handle the 'E' (extension) format. */
457
458		/* Skip the 'offset' field. */
459		p = strchr(p, del);
460		if (!p)
461			goto einval;
462		*p++ = '\0';
463
464		/* Parse the 'magic' field. */
465		e->magic = p;
466		p = strchr(p, del);
467		if (!p)
468			goto einval;
469		*p++ = '\0';
470		if (!e->magic[0] || strchr(e->magic, '/'))
471			goto einval;
472		pr_debug("register: extension: {%s}\n", e->magic);
473
474		/* Skip the 'mask' field. */
475		p = strchr(p, del);
476		if (!p)
477			goto einval;
478		*p++ = '\0';
479	}
480
481	/* Parse the 'interpreter' field. */
482	e->interpreter = p;
483	p = strchr(p, del);
484	if (!p)
485		goto einval;
486	*p++ = '\0';
487	if (!e->interpreter[0])
488		goto einval;
489	pr_debug("register: interpreter: {%s}\n", e->interpreter);
490
491	/* Parse the 'flags' field. */
492	p = check_special_flags(p, e);
493	if (*p == '\n')
494		p++;
495	if (p != buf + count)
496		goto einval;
497
498	return e;
499
500out:
501	return ERR_PTR(err);
502
503efault:
504	kfree(e);
505	return ERR_PTR(-EFAULT);
506einval:
507	kfree(e);
508	return ERR_PTR(-EINVAL);
509}
510
511/*
512 * Set status of entry/binfmt_misc:
513 * '1' enables, '0' disables and '-1' clears entry/binfmt_misc
514 */
515static int parse_command(const char __user *buffer, size_t count)
516{
517	char s[4];
518
519	if (count > 3)
520		return -EINVAL;
521	if (copy_from_user(s, buffer, count))
522		return -EFAULT;
523	if (!count)
524		return 0;
525	if (s[count - 1] == '\n')
526		count--;
527	if (count == 1 && s[0] == '0')
528		return 1;
529	if (count == 1 && s[0] == '1')
530		return 2;
531	if (count == 2 && s[0] == '-' && s[1] == '1')
532		return 3;
533	return -EINVAL;
534}
535
536/* generic stuff */
537
538static void entry_status(Node *e, char *page)
539{
540	char *dp = page;
541	const char *status = "disabled";
542
543	if (test_bit(Enabled, &e->flags))
544		status = "enabled";
545
546	if (!VERBOSE_STATUS) {
547		sprintf(page, "%s\n", status);
548		return;
549	}
550
551	dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter);
552
553	/* print the special flags */
554	dp += sprintf(dp, "flags: ");
555	if (e->flags & MISC_FMT_PRESERVE_ARGV0)
556		*dp++ = 'P';
557	if (e->flags & MISC_FMT_OPEN_BINARY)
558		*dp++ = 'O';
559	if (e->flags & MISC_FMT_CREDENTIALS)
560		*dp++ = 'C';
561	if (e->flags & MISC_FMT_OPEN_FILE)
562		*dp++ = 'F';
563	*dp++ = '\n';
564
565	if (!test_bit(Magic, &e->flags)) {
566		sprintf(dp, "extension .%s\n", e->magic);
567	} else {
568		dp += sprintf(dp, "offset %i\nmagic ", e->offset);
569		dp = bin2hex(dp, e->magic, e->size);
570		if (e->mask) {
571			dp += sprintf(dp, "\nmask ");
572			dp = bin2hex(dp, e->mask, e->size);
573		}
574		*dp++ = '\n';
575		*dp = '\0';
576	}
577}
578
579static struct inode *bm_get_inode(struct super_block *sb, int mode)
580{
581	struct inode *inode = new_inode(sb);
582
583	if (inode) {
584		inode->i_ino = get_next_ino();
585		inode->i_mode = mode;
586		inode->i_atime = inode->i_mtime = inode->i_ctime =
587			current_time(inode);
588	}
589	return inode;
590}
591
592static void bm_evict_inode(struct inode *inode)
593{
 
 
 
 
 
594	clear_inode(inode);
595	kfree(inode->i_private);
596}
597
598static void kill_node(Node *e)
599{
600	struct dentry *dentry;
601
602	write_lock(&entries_lock);
603	dentry = e->dentry;
604	if (dentry) {
605		list_del_init(&e->list);
606		e->dentry = NULL;
607	}
608	write_unlock(&entries_lock);
609
610	if ((e->flags & MISC_FMT_OPEN_FILE) && e->interp_file) {
611		filp_close(e->interp_file, NULL);
612		e->interp_file = NULL;
613	}
614
615	if (dentry) {
616		drop_nlink(d_inode(dentry));
617		d_drop(dentry);
618		dput(dentry);
619		simple_release_fs(&bm_mnt, &entry_count);
620	}
621}
622
623/* /<entry> */
624
625static ssize_t
626bm_entry_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
627{
628	Node *e = file_inode(file)->i_private;
629	ssize_t res;
630	char *page;
631
632	page = (char *) __get_free_page(GFP_KERNEL);
633	if (!page)
634		return -ENOMEM;
635
636	entry_status(e, page);
637
638	res = simple_read_from_buffer(buf, nbytes, ppos, page, strlen(page));
639
640	free_page((unsigned long) page);
641	return res;
642}
643
644static ssize_t bm_entry_write(struct file *file, const char __user *buffer,
645				size_t count, loff_t *ppos)
646{
647	struct dentry *root;
648	Node *e = file_inode(file)->i_private;
649	int res = parse_command(buffer, count);
650
651	switch (res) {
652	case 1:
653		/* Disable this handler. */
654		clear_bit(Enabled, &e->flags);
655		break;
656	case 2:
657		/* Enable this handler. */
658		set_bit(Enabled, &e->flags);
659		break;
660	case 3:
661		/* Delete this handler. */
662		root = file_inode(file)->i_sb->s_root;
663		inode_lock(d_inode(root));
664
665		kill_node(e);
 
666
667		inode_unlock(d_inode(root));
668		break;
669	default:
670		return res;
671	}
672
673	return count;
674}
675
676static const struct file_operations bm_entry_operations = {
677	.read		= bm_entry_read,
678	.write		= bm_entry_write,
679	.llseek		= default_llseek,
680};
681
682/* /register */
683
684static ssize_t bm_register_write(struct file *file, const char __user *buffer,
685			       size_t count, loff_t *ppos)
686{
687	Node *e;
688	struct inode *inode;
689	struct super_block *sb = file_inode(file)->i_sb;
690	struct dentry *root = sb->s_root, *dentry;
691	int err = 0;
692
693	e = create_entry(buffer, count);
694
695	if (IS_ERR(e))
696		return PTR_ERR(e);
697
698	inode_lock(d_inode(root));
699	dentry = lookup_one_len(e->name, root, strlen(e->name));
700	err = PTR_ERR(dentry);
701	if (IS_ERR(dentry))
702		goto out;
703
704	err = -EEXIST;
705	if (d_really_is_positive(dentry))
706		goto out2;
707
708	inode = bm_get_inode(sb, S_IFREG | 0644);
709
710	err = -ENOMEM;
711	if (!inode)
712		goto out2;
713
714	err = simple_pin_fs(&bm_fs_type, &bm_mnt, &entry_count);
715	if (err) {
716		iput(inode);
717		inode = NULL;
718		goto out2;
719	}
720
721	if (e->flags & MISC_FMT_OPEN_FILE) {
722		struct file *f;
723
724		f = open_exec(e->interpreter);
725		if (IS_ERR(f)) {
726			err = PTR_ERR(f);
727			pr_notice("register: failed to install interpreter file %s\n", e->interpreter);
728			simple_release_fs(&bm_mnt, &entry_count);
729			iput(inode);
730			inode = NULL;
731			goto out2;
732		}
733		e->interp_file = f;
734	}
735
736	e->dentry = dget(dentry);
737	inode->i_private = e;
738	inode->i_fop = &bm_entry_operations;
739
740	d_instantiate(dentry, inode);
741	write_lock(&entries_lock);
742	list_add(&e->list, &entries);
743	write_unlock(&entries_lock);
744
745	err = 0;
746out2:
747	dput(dentry);
748out:
749	inode_unlock(d_inode(root));
750
751	if (err) {
752		kfree(e);
753		return err;
754	}
755	return count;
756}
757
758static const struct file_operations bm_register_operations = {
759	.write		= bm_register_write,
760	.llseek		= noop_llseek,
761};
762
763/* /status */
764
765static ssize_t
766bm_status_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
767{
768	char *s = enabled ? "enabled\n" : "disabled\n";
769
770	return simple_read_from_buffer(buf, nbytes, ppos, s, strlen(s));
771}
772
773static ssize_t bm_status_write(struct file *file, const char __user *buffer,
774		size_t count, loff_t *ppos)
775{
776	int res = parse_command(buffer, count);
777	struct dentry *root;
778
779	switch (res) {
780	case 1:
781		/* Disable all handlers. */
782		enabled = 0;
783		break;
784	case 2:
785		/* Enable all handlers. */
786		enabled = 1;
787		break;
788	case 3:
789		/* Delete all handlers. */
790		root = file_inode(file)->i_sb->s_root;
791		inode_lock(d_inode(root));
792
793		while (!list_empty(&entries))
794			kill_node(list_entry(entries.next, Node, list));
795
796		inode_unlock(d_inode(root));
797		break;
798	default:
799		return res;
800	}
801
802	return count;
803}
804
805static const struct file_operations bm_status_operations = {
806	.read		= bm_status_read,
807	.write		= bm_status_write,
808	.llseek		= default_llseek,
809};
810
811/* Superblock handling */
812
813static const struct super_operations s_ops = {
814	.statfs		= simple_statfs,
815	.evict_inode	= bm_evict_inode,
816};
817
818static int bm_fill_super(struct super_block *sb, void *data, int silent)
819{
820	int err;
821	static struct tree_descr bm_files[] = {
822		[2] = {"status", &bm_status_operations, S_IWUSR|S_IRUGO},
823		[3] = {"register", &bm_register_operations, S_IWUSR},
824		/* last one */ {""}
825	};
826
827	err = simple_fill_super(sb, BINFMTFS_MAGIC, bm_files);
828	if (!err)
829		sb->s_op = &s_ops;
830	return err;
831}
832
833static struct dentry *bm_mount(struct file_system_type *fs_type,
834	int flags, const char *dev_name, void *data)
 
 
 
 
 
 
 
 
835{
836	return mount_single(fs_type, flags, data, bm_fill_super);
 
837}
838
839static struct linux_binfmt misc_format = {
840	.module = THIS_MODULE,
841	.load_binary = load_misc_binary,
842};
843
844static struct file_system_type bm_fs_type = {
845	.owner		= THIS_MODULE,
846	.name		= "binfmt_misc",
847	.mount		= bm_mount,
848	.kill_sb	= kill_litter_super,
849};
850MODULE_ALIAS_FS("binfmt_misc");
851
852static int __init init_misc_binfmt(void)
853{
854	int err = register_filesystem(&bm_fs_type);
855	if (!err)
856		insert_binfmt(&misc_format);
857	return err;
858}
859
860static void __exit exit_misc_binfmt(void)
861{
862	unregister_binfmt(&misc_format);
863	unregister_filesystem(&bm_fs_type);
864}
865
866core_initcall(init_misc_binfmt);
867module_exit(exit_misc_binfmt);
868MODULE_LICENSE("GPL");
v5.9
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * binfmt_misc.c
  4 *
  5 * Copyright (C) 1997 Richard Günther
  6 *
  7 * binfmt_misc detects binaries via a magic or filename extension and invokes
  8 * a specified wrapper. See Documentation/admin-guide/binfmt-misc.rst for more details.
  9 */
 10
 11#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 12
 13#include <linux/kernel.h>
 14#include <linux/module.h>
 15#include <linux/init.h>
 16#include <linux/sched/mm.h>
 17#include <linux/magic.h>
 18#include <linux/binfmts.h>
 19#include <linux/slab.h>
 20#include <linux/ctype.h>
 21#include <linux/string_helpers.h>
 22#include <linux/file.h>
 23#include <linux/pagemap.h>
 24#include <linux/namei.h>
 25#include <linux/mount.h>
 26#include <linux/fs_context.h>
 27#include <linux/syscalls.h>
 28#include <linux/fs.h>
 29#include <linux/uaccess.h>
 30
 31#include "internal.h"
 32
 33#ifdef DEBUG
 34# define USE_DEBUG 1
 35#else
 36# define USE_DEBUG 0
 37#endif
 38
 39enum {
 40	VERBOSE_STATUS = 1 /* make it zero to save 400 bytes kernel memory */
 41};
 42
 43static LIST_HEAD(entries);
 44static int enabled = 1;
 45
 46enum {Enabled, Magic};
 47#define MISC_FMT_PRESERVE_ARGV0 (1 << 31)
 48#define MISC_FMT_OPEN_BINARY (1 << 30)
 49#define MISC_FMT_CREDENTIALS (1 << 29)
 50#define MISC_FMT_OPEN_FILE (1 << 28)
 51
 52typedef struct {
 53	struct list_head list;
 54	unsigned long flags;		/* type, status, etc. */
 55	int offset;			/* offset of magic */
 56	int size;			/* size of magic/mask */
 57	char *magic;			/* magic or filename extension */
 58	char *mask;			/* mask, NULL for exact match */
 59	const char *interpreter;	/* filename of interpreter */
 60	char *name;
 61	struct dentry *dentry;
 62	struct file *interp_file;
 63} Node;
 64
 65static DEFINE_RWLOCK(entries_lock);
 66static struct file_system_type bm_fs_type;
 67static struct vfsmount *bm_mnt;
 68static int entry_count;
 69
 70/*
 71 * Max length of the register string.  Determined by:
 72 *  - 7 delimiters
 73 *  - name:   ~50 bytes
 74 *  - type:   1 byte
 75 *  - offset: 3 bytes (has to be smaller than BINPRM_BUF_SIZE)
 76 *  - magic:  128 bytes (512 in escaped form)
 77 *  - mask:   128 bytes (512 in escaped form)
 78 *  - interp: ~50 bytes
 79 *  - flags:  5 bytes
 80 * Round that up a bit, and then back off to hold the internal data
 81 * (like struct Node).
 82 */
 83#define MAX_REGISTER_LENGTH 1920
 84
 85/*
 86 * Check if we support the binfmt
 87 * if we do, return the node, else NULL
 88 * locking is done in load_misc_binary
 89 */
 90static Node *check_file(struct linux_binprm *bprm)
 91{
 92	char *p = strrchr(bprm->interp, '.');
 93	struct list_head *l;
 94
 95	/* Walk all the registered handlers. */
 96	list_for_each(l, &entries) {
 97		Node *e = list_entry(l, Node, list);
 98		char *s;
 99		int j;
100
101		/* Make sure this one is currently enabled. */
102		if (!test_bit(Enabled, &e->flags))
103			continue;
104
105		/* Do matching based on extension if applicable. */
106		if (!test_bit(Magic, &e->flags)) {
107			if (p && !strcmp(e->magic, p + 1))
108				return e;
109			continue;
110		}
111
112		/* Do matching based on magic & mask. */
113		s = bprm->buf + e->offset;
114		if (e->mask) {
115			for (j = 0; j < e->size; j++)
116				if ((*s++ ^ e->magic[j]) & e->mask[j])
117					break;
118		} else {
119			for (j = 0; j < e->size; j++)
120				if ((*s++ ^ e->magic[j]))
121					break;
122		}
123		if (j == e->size)
124			return e;
125	}
126	return NULL;
127}
128
129/*
130 * the loader itself
131 */
132static int load_misc_binary(struct linux_binprm *bprm)
133{
134	Node *fmt;
135	struct file *interp_file = NULL;
 
 
136	int retval;
 
137
138	retval = -ENOEXEC;
139	if (!enabled)
140		return retval;
141
142	/* to keep locking time low, we copy the interpreter string */
143	read_lock(&entries_lock);
144	fmt = check_file(bprm);
145	if (fmt)
146		dget(fmt->dentry);
147	read_unlock(&entries_lock);
148	if (!fmt)
149		return retval;
150
151	/* Need to be able to load the file after exec */
152	retval = -ENOENT;
153	if (bprm->interp_flags & BINPRM_FLAGS_PATH_INACCESSIBLE)
154		goto ret;
155
156	if (!(fmt->flags & MISC_FMT_PRESERVE_ARGV0)) {
157		retval = remove_arg_zero(bprm);
158		if (retval)
159			goto ret;
160	}
161
162	if (fmt->flags & MISC_FMT_OPEN_BINARY)
163		bprm->have_execfd = 1;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
164
 
 
 
 
 
165	/* make argv[1] be the path to the binary */
166	retval = copy_string_kernel(bprm->interp, bprm);
167	if (retval < 0)
168		goto ret;
169	bprm->argc++;
170
171	/* add the interp as argv[0] */
172	retval = copy_string_kernel(fmt->interpreter, bprm);
173	if (retval < 0)
174		goto ret;
175	bprm->argc++;
176
177	/* Update interp in case binfmt_script needs it. */
178	retval = bprm_change_interp(fmt->interpreter, bprm);
179	if (retval < 0)
180		goto ret;
181
182	if (fmt->flags & MISC_FMT_OPEN_FILE) {
183		interp_file = file_clone_open(fmt->interp_file);
184		if (!IS_ERR(interp_file))
185			deny_write_access(interp_file);
186	} else {
187		interp_file = open_exec(fmt->interpreter);
188	}
189	retval = PTR_ERR(interp_file);
190	if (IS_ERR(interp_file))
191		goto ret;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
192
193	bprm->interpreter = interp_file;
194	if (fmt->flags & MISC_FMT_CREDENTIALS)
195		bprm->execfd_creds = 1;
196
197	retval = 0;
198ret:
199	dput(fmt->dentry);
200	return retval;
 
 
 
 
 
 
201}
202
203/* Command parsers */
204
205/*
206 * parses and copies one argument enclosed in del from *sp to *dp,
207 * recognising the \x special.
208 * returns pointer to the copied argument or NULL in case of an
209 * error (and sets err) or null argument length.
210 */
211static char *scanarg(char *s, char del)
212{
213	char c;
214
215	while ((c = *s++) != del) {
216		if (c == '\\' && *s == 'x') {
217			s++;
218			if (!isxdigit(*s++))
219				return NULL;
220			if (!isxdigit(*s++))
221				return NULL;
222		}
223	}
224	s[-1] ='\0';
225	return s;
226}
227
228static char *check_special_flags(char *sfs, Node *e)
229{
230	char *p = sfs;
231	int cont = 1;
232
233	/* special flags */
234	while (cont) {
235		switch (*p) {
236		case 'P':
237			pr_debug("register: flag: P (preserve argv0)\n");
238			p++;
239			e->flags |= MISC_FMT_PRESERVE_ARGV0;
240			break;
241		case 'O':
242			pr_debug("register: flag: O (open binary)\n");
243			p++;
244			e->flags |= MISC_FMT_OPEN_BINARY;
245			break;
246		case 'C':
247			pr_debug("register: flag: C (preserve creds)\n");
248			p++;
249			/* this flags also implies the
250			   open-binary flag */
251			e->flags |= (MISC_FMT_CREDENTIALS |
252					MISC_FMT_OPEN_BINARY);
253			break;
254		case 'F':
255			pr_debug("register: flag: F: open interpreter file now\n");
256			p++;
257			e->flags |= MISC_FMT_OPEN_FILE;
258			break;
259		default:
260			cont = 0;
261		}
262	}
263
264	return p;
265}
266
267/*
268 * This registers a new binary format, it recognises the syntax
269 * ':name:type:offset:magic:mask:interpreter:flags'
270 * where the ':' is the IFS, that can be chosen with the first char
271 */
272static Node *create_entry(const char __user *buffer, size_t count)
273{
274	Node *e;
275	int memsize, err;
276	char *buf, *p;
277	char del;
278
279	pr_debug("register: received %zu bytes\n", count);
280
281	/* some sanity checks */
282	err = -EINVAL;
283	if ((count < 11) || (count > MAX_REGISTER_LENGTH))
284		goto out;
285
286	err = -ENOMEM;
287	memsize = sizeof(Node) + count + 8;
288	e = kmalloc(memsize, GFP_KERNEL);
289	if (!e)
290		goto out;
291
292	p = buf = (char *)e + sizeof(Node);
293
294	memset(e, 0, sizeof(Node));
295	if (copy_from_user(buf, buffer, count))
296		goto efault;
297
298	del = *p++;	/* delimeter */
299
300	pr_debug("register: delim: %#x {%c}\n", del, del);
301
302	/* Pad the buffer with the delim to simplify parsing below. */
303	memset(buf + count, del, 8);
304
305	/* Parse the 'name' field. */
306	e->name = p;
307	p = strchr(p, del);
308	if (!p)
309		goto einval;
310	*p++ = '\0';
311	if (!e->name[0] ||
312	    !strcmp(e->name, ".") ||
313	    !strcmp(e->name, "..") ||
314	    strchr(e->name, '/'))
315		goto einval;
316
317	pr_debug("register: name: {%s}\n", e->name);
318
319	/* Parse the 'type' field. */
320	switch (*p++) {
321	case 'E':
322		pr_debug("register: type: E (extension)\n");
323		e->flags = 1 << Enabled;
324		break;
325	case 'M':
326		pr_debug("register: type: M (magic)\n");
327		e->flags = (1 << Enabled) | (1 << Magic);
328		break;
329	default:
330		goto einval;
331	}
332	if (*p++ != del)
333		goto einval;
334
335	if (test_bit(Magic, &e->flags)) {
336		/* Handle the 'M' (magic) format. */
337		char *s;
338
339		/* Parse the 'offset' field. */
340		s = strchr(p, del);
341		if (!s)
342			goto einval;
343		*s = '\0';
344		if (p != s) {
345			int r = kstrtoint(p, 10, &e->offset);
346			if (r != 0 || e->offset < 0)
347				goto einval;
348		}
349		p = s;
350		if (*p++)
351			goto einval;
352		pr_debug("register: offset: %#x\n", e->offset);
353
354		/* Parse the 'magic' field. */
355		e->magic = p;
356		p = scanarg(p, del);
357		if (!p)
358			goto einval;
359		if (!e->magic[0])
360			goto einval;
361		if (USE_DEBUG)
362			print_hex_dump_bytes(
363				KBUILD_MODNAME ": register: magic[raw]: ",
364				DUMP_PREFIX_NONE, e->magic, p - e->magic);
365
366		/* Parse the 'mask' field. */
367		e->mask = p;
368		p = scanarg(p, del);
369		if (!p)
370			goto einval;
371		if (!e->mask[0]) {
372			e->mask = NULL;
373			pr_debug("register:  mask[raw]: none\n");
374		} else if (USE_DEBUG)
375			print_hex_dump_bytes(
376				KBUILD_MODNAME ": register:  mask[raw]: ",
377				DUMP_PREFIX_NONE, e->mask, p - e->mask);
378
379		/*
380		 * Decode the magic & mask fields.
381		 * Note: while we might have accepted embedded NUL bytes from
382		 * above, the unescape helpers here will stop at the first one
383		 * it encounters.
384		 */
385		e->size = string_unescape_inplace(e->magic, UNESCAPE_HEX);
386		if (e->mask &&
387		    string_unescape_inplace(e->mask, UNESCAPE_HEX) != e->size)
388			goto einval;
389		if (e->size > BINPRM_BUF_SIZE ||
390		    BINPRM_BUF_SIZE - e->size < e->offset)
391			goto einval;
392		pr_debug("register: magic/mask length: %i\n", e->size);
393		if (USE_DEBUG) {
394			print_hex_dump_bytes(
395				KBUILD_MODNAME ": register: magic[decoded]: ",
396				DUMP_PREFIX_NONE, e->magic, e->size);
397
398			if (e->mask) {
399				int i;
400				char *masked = kmalloc(e->size, GFP_KERNEL);
401
402				print_hex_dump_bytes(
403					KBUILD_MODNAME ": register:  mask[decoded]: ",
404					DUMP_PREFIX_NONE, e->mask, e->size);
405
406				if (masked) {
407					for (i = 0; i < e->size; ++i)
408						masked[i] = e->magic[i] & e->mask[i];
409					print_hex_dump_bytes(
410						KBUILD_MODNAME ": register:  magic[masked]: ",
411						DUMP_PREFIX_NONE, masked, e->size);
412
413					kfree(masked);
414				}
415			}
416		}
417	} else {
418		/* Handle the 'E' (extension) format. */
419
420		/* Skip the 'offset' field. */
421		p = strchr(p, del);
422		if (!p)
423			goto einval;
424		*p++ = '\0';
425
426		/* Parse the 'magic' field. */
427		e->magic = p;
428		p = strchr(p, del);
429		if (!p)
430			goto einval;
431		*p++ = '\0';
432		if (!e->magic[0] || strchr(e->magic, '/'))
433			goto einval;
434		pr_debug("register: extension: {%s}\n", e->magic);
435
436		/* Skip the 'mask' field. */
437		p = strchr(p, del);
438		if (!p)
439			goto einval;
440		*p++ = '\0';
441	}
442
443	/* Parse the 'interpreter' field. */
444	e->interpreter = p;
445	p = strchr(p, del);
446	if (!p)
447		goto einval;
448	*p++ = '\0';
449	if (!e->interpreter[0])
450		goto einval;
451	pr_debug("register: interpreter: {%s}\n", e->interpreter);
452
453	/* Parse the 'flags' field. */
454	p = check_special_flags(p, e);
455	if (*p == '\n')
456		p++;
457	if (p != buf + count)
458		goto einval;
459
460	return e;
461
462out:
463	return ERR_PTR(err);
464
465efault:
466	kfree(e);
467	return ERR_PTR(-EFAULT);
468einval:
469	kfree(e);
470	return ERR_PTR(-EINVAL);
471}
472
473/*
474 * Set status of entry/binfmt_misc:
475 * '1' enables, '0' disables and '-1' clears entry/binfmt_misc
476 */
477static int parse_command(const char __user *buffer, size_t count)
478{
479	char s[4];
480
481	if (count > 3)
482		return -EINVAL;
483	if (copy_from_user(s, buffer, count))
484		return -EFAULT;
485	if (!count)
486		return 0;
487	if (s[count - 1] == '\n')
488		count--;
489	if (count == 1 && s[0] == '0')
490		return 1;
491	if (count == 1 && s[0] == '1')
492		return 2;
493	if (count == 2 && s[0] == '-' && s[1] == '1')
494		return 3;
495	return -EINVAL;
496}
497
498/* generic stuff */
499
500static void entry_status(Node *e, char *page)
501{
502	char *dp = page;
503	const char *status = "disabled";
504
505	if (test_bit(Enabled, &e->flags))
506		status = "enabled";
507
508	if (!VERBOSE_STATUS) {
509		sprintf(page, "%s\n", status);
510		return;
511	}
512
513	dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter);
514
515	/* print the special flags */
516	dp += sprintf(dp, "flags: ");
517	if (e->flags & MISC_FMT_PRESERVE_ARGV0)
518		*dp++ = 'P';
519	if (e->flags & MISC_FMT_OPEN_BINARY)
520		*dp++ = 'O';
521	if (e->flags & MISC_FMT_CREDENTIALS)
522		*dp++ = 'C';
523	if (e->flags & MISC_FMT_OPEN_FILE)
524		*dp++ = 'F';
525	*dp++ = '\n';
526
527	if (!test_bit(Magic, &e->flags)) {
528		sprintf(dp, "extension .%s\n", e->magic);
529	} else {
530		dp += sprintf(dp, "offset %i\nmagic ", e->offset);
531		dp = bin2hex(dp, e->magic, e->size);
532		if (e->mask) {
533			dp += sprintf(dp, "\nmask ");
534			dp = bin2hex(dp, e->mask, e->size);
535		}
536		*dp++ = '\n';
537		*dp = '\0';
538	}
539}
540
541static struct inode *bm_get_inode(struct super_block *sb, int mode)
542{
543	struct inode *inode = new_inode(sb);
544
545	if (inode) {
546		inode->i_ino = get_next_ino();
547		inode->i_mode = mode;
548		inode->i_atime = inode->i_mtime = inode->i_ctime =
549			current_time(inode);
550	}
551	return inode;
552}
553
554static void bm_evict_inode(struct inode *inode)
555{
556	Node *e = inode->i_private;
557
558	if (e && e->flags & MISC_FMT_OPEN_FILE)
559		filp_close(e->interp_file, NULL);
560
561	clear_inode(inode);
562	kfree(e);
563}
564
565static void kill_node(Node *e)
566{
567	struct dentry *dentry;
568
569	write_lock(&entries_lock);
570	list_del_init(&e->list);
 
 
 
 
571	write_unlock(&entries_lock);
572
573	dentry = e->dentry;
574	drop_nlink(d_inode(dentry));
575	d_drop(dentry);
576	dput(dentry);
577	simple_release_fs(&bm_mnt, &entry_count);
 
 
 
 
 
 
578}
579
580/* /<entry> */
581
582static ssize_t
583bm_entry_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
584{
585	Node *e = file_inode(file)->i_private;
586	ssize_t res;
587	char *page;
588
589	page = (char *) __get_free_page(GFP_KERNEL);
590	if (!page)
591		return -ENOMEM;
592
593	entry_status(e, page);
594
595	res = simple_read_from_buffer(buf, nbytes, ppos, page, strlen(page));
596
597	free_page((unsigned long) page);
598	return res;
599}
600
601static ssize_t bm_entry_write(struct file *file, const char __user *buffer,
602				size_t count, loff_t *ppos)
603{
604	struct dentry *root;
605	Node *e = file_inode(file)->i_private;
606	int res = parse_command(buffer, count);
607
608	switch (res) {
609	case 1:
610		/* Disable this handler. */
611		clear_bit(Enabled, &e->flags);
612		break;
613	case 2:
614		/* Enable this handler. */
615		set_bit(Enabled, &e->flags);
616		break;
617	case 3:
618		/* Delete this handler. */
619		root = file_inode(file)->i_sb->s_root;
620		inode_lock(d_inode(root));
621
622		if (!list_empty(&e->list))
623			kill_node(e);
624
625		inode_unlock(d_inode(root));
626		break;
627	default:
628		return res;
629	}
630
631	return count;
632}
633
634static const struct file_operations bm_entry_operations = {
635	.read		= bm_entry_read,
636	.write		= bm_entry_write,
637	.llseek		= default_llseek,
638};
639
640/* /register */
641
642static ssize_t bm_register_write(struct file *file, const char __user *buffer,
643			       size_t count, loff_t *ppos)
644{
645	Node *e;
646	struct inode *inode;
647	struct super_block *sb = file_inode(file)->i_sb;
648	struct dentry *root = sb->s_root, *dentry;
649	int err = 0;
650
651	e = create_entry(buffer, count);
652
653	if (IS_ERR(e))
654		return PTR_ERR(e);
655
656	inode_lock(d_inode(root));
657	dentry = lookup_one_len(e->name, root, strlen(e->name));
658	err = PTR_ERR(dentry);
659	if (IS_ERR(dentry))
660		goto out;
661
662	err = -EEXIST;
663	if (d_really_is_positive(dentry))
664		goto out2;
665
666	inode = bm_get_inode(sb, S_IFREG | 0644);
667
668	err = -ENOMEM;
669	if (!inode)
670		goto out2;
671
672	err = simple_pin_fs(&bm_fs_type, &bm_mnt, &entry_count);
673	if (err) {
674		iput(inode);
675		inode = NULL;
676		goto out2;
677	}
678
679	if (e->flags & MISC_FMT_OPEN_FILE) {
680		struct file *f;
681
682		f = open_exec(e->interpreter);
683		if (IS_ERR(f)) {
684			err = PTR_ERR(f);
685			pr_notice("register: failed to install interpreter file %s\n", e->interpreter);
686			simple_release_fs(&bm_mnt, &entry_count);
687			iput(inode);
688			inode = NULL;
689			goto out2;
690		}
691		e->interp_file = f;
692	}
693
694	e->dentry = dget(dentry);
695	inode->i_private = e;
696	inode->i_fop = &bm_entry_operations;
697
698	d_instantiate(dentry, inode);
699	write_lock(&entries_lock);
700	list_add(&e->list, &entries);
701	write_unlock(&entries_lock);
702
703	err = 0;
704out2:
705	dput(dentry);
706out:
707	inode_unlock(d_inode(root));
708
709	if (err) {
710		kfree(e);
711		return err;
712	}
713	return count;
714}
715
716static const struct file_operations bm_register_operations = {
717	.write		= bm_register_write,
718	.llseek		= noop_llseek,
719};
720
721/* /status */
722
723static ssize_t
724bm_status_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
725{
726	char *s = enabled ? "enabled\n" : "disabled\n";
727
728	return simple_read_from_buffer(buf, nbytes, ppos, s, strlen(s));
729}
730
731static ssize_t bm_status_write(struct file *file, const char __user *buffer,
732		size_t count, loff_t *ppos)
733{
734	int res = parse_command(buffer, count);
735	struct dentry *root;
736
737	switch (res) {
738	case 1:
739		/* Disable all handlers. */
740		enabled = 0;
741		break;
742	case 2:
743		/* Enable all handlers. */
744		enabled = 1;
745		break;
746	case 3:
747		/* Delete all handlers. */
748		root = file_inode(file)->i_sb->s_root;
749		inode_lock(d_inode(root));
750
751		while (!list_empty(&entries))
752			kill_node(list_first_entry(&entries, Node, list));
753
754		inode_unlock(d_inode(root));
755		break;
756	default:
757		return res;
758	}
759
760	return count;
761}
762
763static const struct file_operations bm_status_operations = {
764	.read		= bm_status_read,
765	.write		= bm_status_write,
766	.llseek		= default_llseek,
767};
768
769/* Superblock handling */
770
771static const struct super_operations s_ops = {
772	.statfs		= simple_statfs,
773	.evict_inode	= bm_evict_inode,
774};
775
776static int bm_fill_super(struct super_block *sb, struct fs_context *fc)
777{
778	int err;
779	static const struct tree_descr bm_files[] = {
780		[2] = {"status", &bm_status_operations, S_IWUSR|S_IRUGO},
781		[3] = {"register", &bm_register_operations, S_IWUSR},
782		/* last one */ {""}
783	};
784
785	err = simple_fill_super(sb, BINFMTFS_MAGIC, bm_files);
786	if (!err)
787		sb->s_op = &s_ops;
788	return err;
789}
790
791static int bm_get_tree(struct fs_context *fc)
792{
793	return get_tree_single(fc, bm_fill_super);
794}
795
796static const struct fs_context_operations bm_context_ops = {
797	.get_tree	= bm_get_tree,
798};
799
800static int bm_init_fs_context(struct fs_context *fc)
801{
802	fc->ops = &bm_context_ops;
803	return 0;
804}
805
806static struct linux_binfmt misc_format = {
807	.module = THIS_MODULE,
808	.load_binary = load_misc_binary,
809};
810
811static struct file_system_type bm_fs_type = {
812	.owner		= THIS_MODULE,
813	.name		= "binfmt_misc",
814	.init_fs_context = bm_init_fs_context,
815	.kill_sb	= kill_litter_super,
816};
817MODULE_ALIAS_FS("binfmt_misc");
818
819static int __init init_misc_binfmt(void)
820{
821	int err = register_filesystem(&bm_fs_type);
822	if (!err)
823		insert_binfmt(&misc_format);
824	return err;
825}
826
827static void __exit exit_misc_binfmt(void)
828{
829	unregister_binfmt(&misc_format);
830	unregister_filesystem(&bm_fs_type);
831}
832
833core_initcall(init_misc_binfmt);
834module_exit(exit_misc_binfmt);
835MODULE_LICENSE("GPL");