Linux Audio

Check our new training course

Loading...
v4.10.11
 
  1/*
  2 * binfmt_misc.c
  3 *
  4 * Copyright (C) 1997 Richard Günther
  5 *
  6 * binfmt_misc detects binaries via a magic or filename extension and invokes
  7 * a specified wrapper. See Documentation/binfmt_misc.txt for more details.
  8 */
  9
 10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 11
 12#include <linux/kernel.h>
 13#include <linux/module.h>
 14#include <linux/init.h>
 15#include <linux/sched.h>
 16#include <linux/magic.h>
 17#include <linux/binfmts.h>
 18#include <linux/slab.h>
 19#include <linux/ctype.h>
 20#include <linux/string_helpers.h>
 21#include <linux/file.h>
 22#include <linux/pagemap.h>
 23#include <linux/namei.h>
 24#include <linux/mount.h>
 
 25#include <linux/syscalls.h>
 26#include <linux/fs.h>
 27#include <linux/uaccess.h>
 28
 29#include "internal.h"
 30
 31#ifdef DEBUG
 32# define USE_DEBUG 1
 33#else
 34# define USE_DEBUG 0
 35#endif
 36
 37enum {
 38	VERBOSE_STATUS = 1 /* make it zero to save 400 bytes kernel memory */
 39};
 40
 41static LIST_HEAD(entries);
 42static int enabled = 1;
 43
 44enum {Enabled, Magic};
 45#define MISC_FMT_PRESERVE_ARGV0 (1 << 31)
 46#define MISC_FMT_OPEN_BINARY (1 << 30)
 47#define MISC_FMT_CREDENTIALS (1 << 29)
 48#define MISC_FMT_OPEN_FILE (1 << 28)
 49
 50typedef struct {
 51	struct list_head list;
 52	unsigned long flags;		/* type, status, etc. */
 53	int offset;			/* offset of magic */
 54	int size;			/* size of magic/mask */
 55	char *magic;			/* magic or filename extension */
 56	char *mask;			/* mask, NULL for exact match */
 57	char *interpreter;		/* filename of interpreter */
 58	char *name;
 59	struct dentry *dentry;
 60	struct file *interp_file;
 61} Node;
 62
 63static DEFINE_RWLOCK(entries_lock);
 64static struct file_system_type bm_fs_type;
 65static struct vfsmount *bm_mnt;
 66static int entry_count;
 67
 68/*
 69 * Max length of the register string.  Determined by:
 70 *  - 7 delimiters
 71 *  - name:   ~50 bytes
 72 *  - type:   1 byte
 73 *  - offset: 3 bytes (has to be smaller than BINPRM_BUF_SIZE)
 74 *  - magic:  128 bytes (512 in escaped form)
 75 *  - mask:   128 bytes (512 in escaped form)
 76 *  - interp: ~50 bytes
 77 *  - flags:  5 bytes
 78 * Round that up a bit, and then back off to hold the internal data
 79 * (like struct Node).
 80 */
 81#define MAX_REGISTER_LENGTH 1920
 82
 83/*
 84 * Check if we support the binfmt
 85 * if we do, return the node, else NULL
 86 * locking is done in load_misc_binary
 87 */
 88static Node *check_file(struct linux_binprm *bprm)
 89{
 90	char *p = strrchr(bprm->interp, '.');
 91	struct list_head *l;
 92
 93	/* Walk all the registered handlers. */
 94	list_for_each(l, &entries) {
 95		Node *e = list_entry(l, Node, list);
 96		char *s;
 97		int j;
 98
 99		/* Make sure this one is currently enabled. */
100		if (!test_bit(Enabled, &e->flags))
101			continue;
102
103		/* Do matching based on extension if applicable. */
104		if (!test_bit(Magic, &e->flags)) {
105			if (p && !strcmp(e->magic, p + 1))
106				return e;
107			continue;
108		}
109
110		/* Do matching based on magic & mask. */
111		s = bprm->buf + e->offset;
112		if (e->mask) {
113			for (j = 0; j < e->size; j++)
114				if ((*s++ ^ e->magic[j]) & e->mask[j])
115					break;
116		} else {
117			for (j = 0; j < e->size; j++)
118				if ((*s++ ^ e->magic[j]))
119					break;
120		}
121		if (j == e->size)
122			return e;
123	}
124	return NULL;
125}
126
127/*
128 * the loader itself
129 */
130static int load_misc_binary(struct linux_binprm *bprm)
131{
132	Node *fmt;
133	struct file *interp_file = NULL;
134	char iname[BINPRM_BUF_SIZE];
135	const char *iname_addr = iname;
136	int retval;
137	int fd_binary = -1;
138
139	retval = -ENOEXEC;
140	if (!enabled)
141		goto ret;
142
143	/* to keep locking time low, we copy the interpreter string */
144	read_lock(&entries_lock);
145	fmt = check_file(bprm);
146	if (fmt)
147		strlcpy(iname, fmt->interpreter, BINPRM_BUF_SIZE);
148	read_unlock(&entries_lock);
149	if (!fmt)
150		goto ret;
151
152	/* Need to be able to load the file after exec */
 
153	if (bprm->interp_flags & BINPRM_FLAGS_PATH_INACCESSIBLE)
154		return -ENOENT;
155
156	if (!(fmt->flags & MISC_FMT_PRESERVE_ARGV0)) {
 
 
157		retval = remove_arg_zero(bprm);
158		if (retval)
159			goto ret;
160	}
161
162	if (fmt->flags & MISC_FMT_OPEN_BINARY) {
163
164		/* if the binary should be opened on behalf of the
165		 * interpreter than keep it open and assign descriptor
166		 * to it
167		 */
168		fd_binary = get_unused_fd_flags(0);
169		if (fd_binary < 0) {
170			retval = fd_binary;
171			goto ret;
172		}
173		fd_install(fd_binary, bprm->file);
174
175		/* if the binary is not readable than enforce mm->dumpable=0
176		   regardless of the interpreter's permissions */
177		would_dump(bprm, bprm->file);
178
179		allow_write_access(bprm->file);
180		bprm->file = NULL;
181
182		/* mark the bprm that fd should be passed to interp */
183		bprm->interp_flags |= BINPRM_FLAGS_EXECFD;
184		bprm->interp_data = fd_binary;
185
186	} else {
187		allow_write_access(bprm->file);
188		fput(bprm->file);
189		bprm->file = NULL;
190	}
191	/* make argv[1] be the path to the binary */
192	retval = copy_strings_kernel(1, &bprm->interp, bprm);
193	if (retval < 0)
194		goto error;
195	bprm->argc++;
196
197	/* add the interp as argv[0] */
198	retval = copy_strings_kernel(1, &iname_addr, bprm);
199	if (retval < 0)
200		goto error;
201	bprm->argc++;
202
203	/* Update interp in case binfmt_script needs it. */
204	retval = bprm_change_interp(iname, bprm);
205	if (retval < 0)
206		goto error;
207
208	if (fmt->flags & MISC_FMT_OPEN_FILE && fmt->interp_file) {
209		interp_file = filp_clone_open(fmt->interp_file);
210		if (!IS_ERR(interp_file))
211			deny_write_access(interp_file);
212	} else {
213		interp_file = open_exec(iname);
214	}
215	retval = PTR_ERR(interp_file);
216	if (IS_ERR(interp_file))
217		goto error;
218
219	bprm->file = interp_file;
220	if (fmt->flags & MISC_FMT_CREDENTIALS) {
221		/*
222		 * No need to call prepare_binprm(), it's already been
223		 * done.  bprm->buf is stale, update from interp_file.
224		 */
225		memset(bprm->buf, 0, BINPRM_BUF_SIZE);
226		retval = kernel_read(bprm->file, 0, bprm->buf, BINPRM_BUF_SIZE);
227	} else
228		retval = prepare_binprm(bprm);
229
230	if (retval < 0)
231		goto error;
232
233	retval = search_binary_handler(bprm);
234	if (retval < 0)
235		goto error;
236
 
237ret:
 
238	return retval;
239error:
240	if (fd_binary > 0)
241		sys_close(fd_binary);
242	bprm->interp_flags = 0;
243	bprm->interp_data = 0;
244	goto ret;
245}
246
247/* Command parsers */
248
249/*
250 * parses and copies one argument enclosed in del from *sp to *dp,
251 * recognising the \x special.
252 * returns pointer to the copied argument or NULL in case of an
253 * error (and sets err) or null argument length.
254 */
255static char *scanarg(char *s, char del)
256{
257	char c;
258
259	while ((c = *s++) != del) {
260		if (c == '\\' && *s == 'x') {
261			s++;
262			if (!isxdigit(*s++))
263				return NULL;
264			if (!isxdigit(*s++))
265				return NULL;
266		}
267	}
268	s[-1] ='\0';
269	return s;
270}
271
272static char *check_special_flags(char *sfs, Node *e)
273{
274	char *p = sfs;
275	int cont = 1;
276
277	/* special flags */
278	while (cont) {
279		switch (*p) {
280		case 'P':
281			pr_debug("register: flag: P (preserve argv0)\n");
282			p++;
283			e->flags |= MISC_FMT_PRESERVE_ARGV0;
284			break;
285		case 'O':
286			pr_debug("register: flag: O (open binary)\n");
287			p++;
288			e->flags |= MISC_FMT_OPEN_BINARY;
289			break;
290		case 'C':
291			pr_debug("register: flag: C (preserve creds)\n");
292			p++;
293			/* this flags also implies the
294			   open-binary flag */
295			e->flags |= (MISC_FMT_CREDENTIALS |
296					MISC_FMT_OPEN_BINARY);
297			break;
298		case 'F':
299			pr_debug("register: flag: F: open interpreter file now\n");
300			p++;
301			e->flags |= MISC_FMT_OPEN_FILE;
302			break;
303		default:
304			cont = 0;
305		}
306	}
307
308	return p;
309}
310
311/*
312 * This registers a new binary format, it recognises the syntax
313 * ':name:type:offset:magic:mask:interpreter:flags'
314 * where the ':' is the IFS, that can be chosen with the first char
315 */
316static Node *create_entry(const char __user *buffer, size_t count)
317{
318	Node *e;
319	int memsize, err;
320	char *buf, *p;
321	char del;
322
323	pr_debug("register: received %zu bytes\n", count);
324
325	/* some sanity checks */
326	err = -EINVAL;
327	if ((count < 11) || (count > MAX_REGISTER_LENGTH))
328		goto out;
329
330	err = -ENOMEM;
331	memsize = sizeof(Node) + count + 8;
332	e = kmalloc(memsize, GFP_KERNEL);
333	if (!e)
334		goto out;
335
336	p = buf = (char *)e + sizeof(Node);
337
338	memset(e, 0, sizeof(Node));
339	if (copy_from_user(buf, buffer, count))
340		goto efault;
341
342	del = *p++;	/* delimeter */
343
344	pr_debug("register: delim: %#x {%c}\n", del, del);
345
346	/* Pad the buffer with the delim to simplify parsing below. */
347	memset(buf + count, del, 8);
348
349	/* Parse the 'name' field. */
350	e->name = p;
351	p = strchr(p, del);
352	if (!p)
353		goto einval;
354	*p++ = '\0';
355	if (!e->name[0] ||
356	    !strcmp(e->name, ".") ||
357	    !strcmp(e->name, "..") ||
358	    strchr(e->name, '/'))
359		goto einval;
360
361	pr_debug("register: name: {%s}\n", e->name);
362
363	/* Parse the 'type' field. */
364	switch (*p++) {
365	case 'E':
366		pr_debug("register: type: E (extension)\n");
367		e->flags = 1 << Enabled;
368		break;
369	case 'M':
370		pr_debug("register: type: M (magic)\n");
371		e->flags = (1 << Enabled) | (1 << Magic);
372		break;
373	default:
374		goto einval;
375	}
376	if (*p++ != del)
377		goto einval;
378
379	if (test_bit(Magic, &e->flags)) {
380		/* Handle the 'M' (magic) format. */
381		char *s;
382
383		/* Parse the 'offset' field. */
384		s = strchr(p, del);
385		if (!s)
386			goto einval;
387		*s++ = '\0';
388		e->offset = simple_strtoul(p, &p, 10);
 
 
 
 
 
389		if (*p++)
390			goto einval;
391		pr_debug("register: offset: %#x\n", e->offset);
392
393		/* Parse the 'magic' field. */
394		e->magic = p;
395		p = scanarg(p, del);
396		if (!p)
397			goto einval;
398		if (!e->magic[0])
399			goto einval;
400		if (USE_DEBUG)
401			print_hex_dump_bytes(
402				KBUILD_MODNAME ": register: magic[raw]: ",
403				DUMP_PREFIX_NONE, e->magic, p - e->magic);
404
405		/* Parse the 'mask' field. */
406		e->mask = p;
407		p = scanarg(p, del);
408		if (!p)
409			goto einval;
410		if (!e->mask[0]) {
411			e->mask = NULL;
412			pr_debug("register:  mask[raw]: none\n");
413		} else if (USE_DEBUG)
414			print_hex_dump_bytes(
415				KBUILD_MODNAME ": register:  mask[raw]: ",
416				DUMP_PREFIX_NONE, e->mask, p - e->mask);
417
418		/*
419		 * Decode the magic & mask fields.
420		 * Note: while we might have accepted embedded NUL bytes from
421		 * above, the unescape helpers here will stop at the first one
422		 * it encounters.
423		 */
424		e->size = string_unescape_inplace(e->magic, UNESCAPE_HEX);
425		if (e->mask &&
426		    string_unescape_inplace(e->mask, UNESCAPE_HEX) != e->size)
427			goto einval;
428		if (e->size + e->offset > BINPRM_BUF_SIZE)
 
429			goto einval;
430		pr_debug("register: magic/mask length: %i\n", e->size);
431		if (USE_DEBUG) {
432			print_hex_dump_bytes(
433				KBUILD_MODNAME ": register: magic[decoded]: ",
434				DUMP_PREFIX_NONE, e->magic, e->size);
435
436			if (e->mask) {
437				int i;
438				char *masked = kmalloc(e->size, GFP_KERNEL);
439
440				print_hex_dump_bytes(
441					KBUILD_MODNAME ": register:  mask[decoded]: ",
442					DUMP_PREFIX_NONE, e->mask, e->size);
443
444				if (masked) {
445					for (i = 0; i < e->size; ++i)
446						masked[i] = e->magic[i] & e->mask[i];
447					print_hex_dump_bytes(
448						KBUILD_MODNAME ": register:  magic[masked]: ",
449						DUMP_PREFIX_NONE, masked, e->size);
450
451					kfree(masked);
452				}
453			}
454		}
455	} else {
456		/* Handle the 'E' (extension) format. */
457
458		/* Skip the 'offset' field. */
459		p = strchr(p, del);
460		if (!p)
461			goto einval;
462		*p++ = '\0';
463
464		/* Parse the 'magic' field. */
465		e->magic = p;
466		p = strchr(p, del);
467		if (!p)
468			goto einval;
469		*p++ = '\0';
470		if (!e->magic[0] || strchr(e->magic, '/'))
471			goto einval;
472		pr_debug("register: extension: {%s}\n", e->magic);
473
474		/* Skip the 'mask' field. */
475		p = strchr(p, del);
476		if (!p)
477			goto einval;
478		*p++ = '\0';
479	}
480
481	/* Parse the 'interpreter' field. */
482	e->interpreter = p;
483	p = strchr(p, del);
484	if (!p)
485		goto einval;
486	*p++ = '\0';
487	if (!e->interpreter[0])
488		goto einval;
489	pr_debug("register: interpreter: {%s}\n", e->interpreter);
490
491	/* Parse the 'flags' field. */
492	p = check_special_flags(p, e);
493	if (*p == '\n')
494		p++;
495	if (p != buf + count)
496		goto einval;
497
498	return e;
499
500out:
501	return ERR_PTR(err);
502
503efault:
504	kfree(e);
505	return ERR_PTR(-EFAULT);
506einval:
507	kfree(e);
508	return ERR_PTR(-EINVAL);
509}
510
511/*
512 * Set status of entry/binfmt_misc:
513 * '1' enables, '0' disables and '-1' clears entry/binfmt_misc
514 */
515static int parse_command(const char __user *buffer, size_t count)
516{
517	char s[4];
518
519	if (count > 3)
520		return -EINVAL;
521	if (copy_from_user(s, buffer, count))
522		return -EFAULT;
523	if (!count)
524		return 0;
525	if (s[count - 1] == '\n')
526		count--;
527	if (count == 1 && s[0] == '0')
528		return 1;
529	if (count == 1 && s[0] == '1')
530		return 2;
531	if (count == 2 && s[0] == '-' && s[1] == '1')
532		return 3;
533	return -EINVAL;
534}
535
536/* generic stuff */
537
538static void entry_status(Node *e, char *page)
539{
540	char *dp = page;
541	const char *status = "disabled";
542
543	if (test_bit(Enabled, &e->flags))
544		status = "enabled";
545
546	if (!VERBOSE_STATUS) {
547		sprintf(page, "%s\n", status);
548		return;
549	}
550
551	dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter);
552
553	/* print the special flags */
554	dp += sprintf(dp, "flags: ");
555	if (e->flags & MISC_FMT_PRESERVE_ARGV0)
556		*dp++ = 'P';
557	if (e->flags & MISC_FMT_OPEN_BINARY)
558		*dp++ = 'O';
559	if (e->flags & MISC_FMT_CREDENTIALS)
560		*dp++ = 'C';
561	if (e->flags & MISC_FMT_OPEN_FILE)
562		*dp++ = 'F';
563	*dp++ = '\n';
564
565	if (!test_bit(Magic, &e->flags)) {
566		sprintf(dp, "extension .%s\n", e->magic);
567	} else {
568		dp += sprintf(dp, "offset %i\nmagic ", e->offset);
569		dp = bin2hex(dp, e->magic, e->size);
570		if (e->mask) {
571			dp += sprintf(dp, "\nmask ");
572			dp = bin2hex(dp, e->mask, e->size);
573		}
574		*dp++ = '\n';
575		*dp = '\0';
576	}
577}
578
579static struct inode *bm_get_inode(struct super_block *sb, int mode)
580{
581	struct inode *inode = new_inode(sb);
582
583	if (inode) {
584		inode->i_ino = get_next_ino();
585		inode->i_mode = mode;
586		inode->i_atime = inode->i_mtime = inode->i_ctime =
587			current_time(inode);
588	}
589	return inode;
590}
591
592static void bm_evict_inode(struct inode *inode)
593{
 
 
 
 
 
594	clear_inode(inode);
595	kfree(inode->i_private);
596}
597
598static void kill_node(Node *e)
599{
600	struct dentry *dentry;
601
602	write_lock(&entries_lock);
603	dentry = e->dentry;
604	if (dentry) {
605		list_del_init(&e->list);
606		e->dentry = NULL;
607	}
608	write_unlock(&entries_lock);
609
610	if ((e->flags & MISC_FMT_OPEN_FILE) && e->interp_file) {
611		filp_close(e->interp_file, NULL);
612		e->interp_file = NULL;
613	}
614
615	if (dentry) {
616		drop_nlink(d_inode(dentry));
617		d_drop(dentry);
618		dput(dentry);
619		simple_release_fs(&bm_mnt, &entry_count);
620	}
621}
622
623/* /<entry> */
624
625static ssize_t
626bm_entry_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
627{
628	Node *e = file_inode(file)->i_private;
629	ssize_t res;
630	char *page;
631
632	page = (char *) __get_free_page(GFP_KERNEL);
633	if (!page)
634		return -ENOMEM;
635
636	entry_status(e, page);
637
638	res = simple_read_from_buffer(buf, nbytes, ppos, page, strlen(page));
639
640	free_page((unsigned long) page);
641	return res;
642}
643
644static ssize_t bm_entry_write(struct file *file, const char __user *buffer,
645				size_t count, loff_t *ppos)
646{
647	struct dentry *root;
648	Node *e = file_inode(file)->i_private;
649	int res = parse_command(buffer, count);
650
651	switch (res) {
652	case 1:
653		/* Disable this handler. */
654		clear_bit(Enabled, &e->flags);
655		break;
656	case 2:
657		/* Enable this handler. */
658		set_bit(Enabled, &e->flags);
659		break;
660	case 3:
661		/* Delete this handler. */
662		root = file_inode(file)->i_sb->s_root;
663		inode_lock(d_inode(root));
664
665		kill_node(e);
 
666
667		inode_unlock(d_inode(root));
668		break;
669	default:
670		return res;
671	}
672
673	return count;
674}
675
676static const struct file_operations bm_entry_operations = {
677	.read		= bm_entry_read,
678	.write		= bm_entry_write,
679	.llseek		= default_llseek,
680};
681
682/* /register */
683
684static ssize_t bm_register_write(struct file *file, const char __user *buffer,
685			       size_t count, loff_t *ppos)
686{
687	Node *e;
688	struct inode *inode;
689	struct super_block *sb = file_inode(file)->i_sb;
690	struct dentry *root = sb->s_root, *dentry;
691	int err = 0;
 
692
693	e = create_entry(buffer, count);
694
695	if (IS_ERR(e))
696		return PTR_ERR(e);
697
 
 
 
 
 
 
 
 
 
 
 
698	inode_lock(d_inode(root));
699	dentry = lookup_one_len(e->name, root, strlen(e->name));
700	err = PTR_ERR(dentry);
701	if (IS_ERR(dentry))
702		goto out;
703
704	err = -EEXIST;
705	if (d_really_is_positive(dentry))
706		goto out2;
707
708	inode = bm_get_inode(sb, S_IFREG | 0644);
709
710	err = -ENOMEM;
711	if (!inode)
712		goto out2;
713
714	err = simple_pin_fs(&bm_fs_type, &bm_mnt, &entry_count);
715	if (err) {
716		iput(inode);
717		inode = NULL;
718		goto out2;
719	}
720
721	if (e->flags & MISC_FMT_OPEN_FILE) {
722		struct file *f;
723
724		f = open_exec(e->interpreter);
725		if (IS_ERR(f)) {
726			err = PTR_ERR(f);
727			pr_notice("register: failed to install interpreter file %s\n", e->interpreter);
728			simple_release_fs(&bm_mnt, &entry_count);
729			iput(inode);
730			inode = NULL;
731			goto out2;
732		}
733		e->interp_file = f;
734	}
735
736	e->dentry = dget(dentry);
737	inode->i_private = e;
738	inode->i_fop = &bm_entry_operations;
739
740	d_instantiate(dentry, inode);
741	write_lock(&entries_lock);
742	list_add(&e->list, &entries);
743	write_unlock(&entries_lock);
744
745	err = 0;
746out2:
747	dput(dentry);
748out:
749	inode_unlock(d_inode(root));
750
751	if (err) {
 
 
752		kfree(e);
753		return err;
754	}
755	return count;
756}
757
758static const struct file_operations bm_register_operations = {
759	.write		= bm_register_write,
760	.llseek		= noop_llseek,
761};
762
763/* /status */
764
765static ssize_t
766bm_status_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
767{
768	char *s = enabled ? "enabled\n" : "disabled\n";
769
770	return simple_read_from_buffer(buf, nbytes, ppos, s, strlen(s));
771}
772
773static ssize_t bm_status_write(struct file *file, const char __user *buffer,
774		size_t count, loff_t *ppos)
775{
776	int res = parse_command(buffer, count);
777	struct dentry *root;
778
779	switch (res) {
780	case 1:
781		/* Disable all handlers. */
782		enabled = 0;
783		break;
784	case 2:
785		/* Enable all handlers. */
786		enabled = 1;
787		break;
788	case 3:
789		/* Delete all handlers. */
790		root = file_inode(file)->i_sb->s_root;
791		inode_lock(d_inode(root));
792
793		while (!list_empty(&entries))
794			kill_node(list_entry(entries.next, Node, list));
795
796		inode_unlock(d_inode(root));
797		break;
798	default:
799		return res;
800	}
801
802	return count;
803}
804
805static const struct file_operations bm_status_operations = {
806	.read		= bm_status_read,
807	.write		= bm_status_write,
808	.llseek		= default_llseek,
809};
810
811/* Superblock handling */
812
813static const struct super_operations s_ops = {
814	.statfs		= simple_statfs,
815	.evict_inode	= bm_evict_inode,
816};
817
818static int bm_fill_super(struct super_block *sb, void *data, int silent)
819{
820	int err;
821	static struct tree_descr bm_files[] = {
822		[2] = {"status", &bm_status_operations, S_IWUSR|S_IRUGO},
823		[3] = {"register", &bm_register_operations, S_IWUSR},
824		/* last one */ {""}
825	};
826
827	err = simple_fill_super(sb, BINFMTFS_MAGIC, bm_files);
828	if (!err)
829		sb->s_op = &s_ops;
830	return err;
831}
832
833static struct dentry *bm_mount(struct file_system_type *fs_type,
834	int flags, const char *dev_name, void *data)
 
 
 
 
 
 
 
 
835{
836	return mount_single(fs_type, flags, data, bm_fill_super);
 
837}
838
839static struct linux_binfmt misc_format = {
840	.module = THIS_MODULE,
841	.load_binary = load_misc_binary,
842};
843
844static struct file_system_type bm_fs_type = {
845	.owner		= THIS_MODULE,
846	.name		= "binfmt_misc",
847	.mount		= bm_mount,
848	.kill_sb	= kill_litter_super,
849};
850MODULE_ALIAS_FS("binfmt_misc");
851
852static int __init init_misc_binfmt(void)
853{
854	int err = register_filesystem(&bm_fs_type);
855	if (!err)
856		insert_binfmt(&misc_format);
857	return err;
858}
859
860static void __exit exit_misc_binfmt(void)
861{
862	unregister_binfmt(&misc_format);
863	unregister_filesystem(&bm_fs_type);
864}
865
866core_initcall(init_misc_binfmt);
867module_exit(exit_misc_binfmt);
868MODULE_LICENSE("GPL");
v6.2
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * binfmt_misc.c
  4 *
  5 * Copyright (C) 1997 Richard Günther
  6 *
  7 * binfmt_misc detects binaries via a magic or filename extension and invokes
  8 * a specified wrapper. See Documentation/admin-guide/binfmt-misc.rst for more details.
  9 */
 10
 11#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 12
 13#include <linux/kernel.h>
 14#include <linux/module.h>
 15#include <linux/init.h>
 16#include <linux/sched/mm.h>
 17#include <linux/magic.h>
 18#include <linux/binfmts.h>
 19#include <linux/slab.h>
 20#include <linux/ctype.h>
 21#include <linux/string_helpers.h>
 22#include <linux/file.h>
 23#include <linux/pagemap.h>
 24#include <linux/namei.h>
 25#include <linux/mount.h>
 26#include <linux/fs_context.h>
 27#include <linux/syscalls.h>
 28#include <linux/fs.h>
 29#include <linux/uaccess.h>
 30
 31#include "internal.h"
 32
 33#ifdef DEBUG
 34# define USE_DEBUG 1
 35#else
 36# define USE_DEBUG 0
 37#endif
 38
 39enum {
 40	VERBOSE_STATUS = 1 /* make it zero to save 400 bytes kernel memory */
 41};
 42
 43static LIST_HEAD(entries);
 44static int enabled = 1;
 45
 46enum {Enabled, Magic};
 47#define MISC_FMT_PRESERVE_ARGV0 (1UL << 31)
 48#define MISC_FMT_OPEN_BINARY (1UL << 30)
 49#define MISC_FMT_CREDENTIALS (1UL << 29)
 50#define MISC_FMT_OPEN_FILE (1UL << 28)
 51
 52typedef struct {
 53	struct list_head list;
 54	unsigned long flags;		/* type, status, etc. */
 55	int offset;			/* offset of magic */
 56	int size;			/* size of magic/mask */
 57	char *magic;			/* magic or filename extension */
 58	char *mask;			/* mask, NULL for exact match */
 59	const char *interpreter;	/* filename of interpreter */
 60	char *name;
 61	struct dentry *dentry;
 62	struct file *interp_file;
 63} Node;
 64
 65static DEFINE_RWLOCK(entries_lock);
 66static struct file_system_type bm_fs_type;
 67static struct vfsmount *bm_mnt;
 68static int entry_count;
 69
 70/*
 71 * Max length of the register string.  Determined by:
 72 *  - 7 delimiters
 73 *  - name:   ~50 bytes
 74 *  - type:   1 byte
 75 *  - offset: 3 bytes (has to be smaller than BINPRM_BUF_SIZE)
 76 *  - magic:  128 bytes (512 in escaped form)
 77 *  - mask:   128 bytes (512 in escaped form)
 78 *  - interp: ~50 bytes
 79 *  - flags:  5 bytes
 80 * Round that up a bit, and then back off to hold the internal data
 81 * (like struct Node).
 82 */
 83#define MAX_REGISTER_LENGTH 1920
 84
 85/*
 86 * Check if we support the binfmt
 87 * if we do, return the node, else NULL
 88 * locking is done in load_misc_binary
 89 */
 90static Node *check_file(struct linux_binprm *bprm)
 91{
 92	char *p = strrchr(bprm->interp, '.');
 93	struct list_head *l;
 94
 95	/* Walk all the registered handlers. */
 96	list_for_each(l, &entries) {
 97		Node *e = list_entry(l, Node, list);
 98		char *s;
 99		int j;
100
101		/* Make sure this one is currently enabled. */
102		if (!test_bit(Enabled, &e->flags))
103			continue;
104
105		/* Do matching based on extension if applicable. */
106		if (!test_bit(Magic, &e->flags)) {
107			if (p && !strcmp(e->magic, p + 1))
108				return e;
109			continue;
110		}
111
112		/* Do matching based on magic & mask. */
113		s = bprm->buf + e->offset;
114		if (e->mask) {
115			for (j = 0; j < e->size; j++)
116				if ((*s++ ^ e->magic[j]) & e->mask[j])
117					break;
118		} else {
119			for (j = 0; j < e->size; j++)
120				if ((*s++ ^ e->magic[j]))
121					break;
122		}
123		if (j == e->size)
124			return e;
125	}
126	return NULL;
127}
128
129/*
130 * the loader itself
131 */
132static int load_misc_binary(struct linux_binprm *bprm)
133{
134	Node *fmt;
135	struct file *interp_file = NULL;
 
 
136	int retval;
 
137
138	retval = -ENOEXEC;
139	if (!enabled)
140		return retval;
141
142	/* to keep locking time low, we copy the interpreter string */
143	read_lock(&entries_lock);
144	fmt = check_file(bprm);
145	if (fmt)
146		dget(fmt->dentry);
147	read_unlock(&entries_lock);
148	if (!fmt)
149		return retval;
150
151	/* Need to be able to load the file after exec */
152	retval = -ENOENT;
153	if (bprm->interp_flags & BINPRM_FLAGS_PATH_INACCESSIBLE)
154		goto ret;
155
156	if (fmt->flags & MISC_FMT_PRESERVE_ARGV0) {
157		bprm->interp_flags |= BINPRM_FLAGS_PRESERVE_ARGV0;
158	} else {
159		retval = remove_arg_zero(bprm);
160		if (retval)
161			goto ret;
162	}
163
164	if (fmt->flags & MISC_FMT_OPEN_BINARY)
165		bprm->have_execfd = 1;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
166
 
 
 
 
 
167	/* make argv[1] be the path to the binary */
168	retval = copy_string_kernel(bprm->interp, bprm);
169	if (retval < 0)
170		goto ret;
171	bprm->argc++;
172
173	/* add the interp as argv[0] */
174	retval = copy_string_kernel(fmt->interpreter, bprm);
175	if (retval < 0)
176		goto ret;
177	bprm->argc++;
178
179	/* Update interp in case binfmt_script needs it. */
180	retval = bprm_change_interp(fmt->interpreter, bprm);
181	if (retval < 0)
182		goto ret;
183
184	if (fmt->flags & MISC_FMT_OPEN_FILE) {
185		interp_file = file_clone_open(fmt->interp_file);
186		if (!IS_ERR(interp_file))
187			deny_write_access(interp_file);
188	} else {
189		interp_file = open_exec(fmt->interpreter);
190	}
191	retval = PTR_ERR(interp_file);
192	if (IS_ERR(interp_file))
193		goto ret;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
194
195	bprm->interpreter = interp_file;
196	if (fmt->flags & MISC_FMT_CREDENTIALS)
197		bprm->execfd_creds = 1;
198
199	retval = 0;
200ret:
201	dput(fmt->dentry);
202	return retval;
 
 
 
 
 
 
203}
204
205/* Command parsers */
206
207/*
208 * parses and copies one argument enclosed in del from *sp to *dp,
209 * recognising the \x special.
210 * returns pointer to the copied argument or NULL in case of an
211 * error (and sets err) or null argument length.
212 */
213static char *scanarg(char *s, char del)
214{
215	char c;
216
217	while ((c = *s++) != del) {
218		if (c == '\\' && *s == 'x') {
219			s++;
220			if (!isxdigit(*s++))
221				return NULL;
222			if (!isxdigit(*s++))
223				return NULL;
224		}
225	}
226	s[-1] ='\0';
227	return s;
228}
229
230static char *check_special_flags(char *sfs, Node *e)
231{
232	char *p = sfs;
233	int cont = 1;
234
235	/* special flags */
236	while (cont) {
237		switch (*p) {
238		case 'P':
239			pr_debug("register: flag: P (preserve argv0)\n");
240			p++;
241			e->flags |= MISC_FMT_PRESERVE_ARGV0;
242			break;
243		case 'O':
244			pr_debug("register: flag: O (open binary)\n");
245			p++;
246			e->flags |= MISC_FMT_OPEN_BINARY;
247			break;
248		case 'C':
249			pr_debug("register: flag: C (preserve creds)\n");
250			p++;
251			/* this flags also implies the
252			   open-binary flag */
253			e->flags |= (MISC_FMT_CREDENTIALS |
254					MISC_FMT_OPEN_BINARY);
255			break;
256		case 'F':
257			pr_debug("register: flag: F: open interpreter file now\n");
258			p++;
259			e->flags |= MISC_FMT_OPEN_FILE;
260			break;
261		default:
262			cont = 0;
263		}
264	}
265
266	return p;
267}
268
269/*
270 * This registers a new binary format, it recognises the syntax
271 * ':name:type:offset:magic:mask:interpreter:flags'
272 * where the ':' is the IFS, that can be chosen with the first char
273 */
274static Node *create_entry(const char __user *buffer, size_t count)
275{
276	Node *e;
277	int memsize, err;
278	char *buf, *p;
279	char del;
280
281	pr_debug("register: received %zu bytes\n", count);
282
283	/* some sanity checks */
284	err = -EINVAL;
285	if ((count < 11) || (count > MAX_REGISTER_LENGTH))
286		goto out;
287
288	err = -ENOMEM;
289	memsize = sizeof(Node) + count + 8;
290	e = kmalloc(memsize, GFP_KERNEL);
291	if (!e)
292		goto out;
293
294	p = buf = (char *)e + sizeof(Node);
295
296	memset(e, 0, sizeof(Node));
297	if (copy_from_user(buf, buffer, count))
298		goto efault;
299
300	del = *p++;	/* delimeter */
301
302	pr_debug("register: delim: %#x {%c}\n", del, del);
303
304	/* Pad the buffer with the delim to simplify parsing below. */
305	memset(buf + count, del, 8);
306
307	/* Parse the 'name' field. */
308	e->name = p;
309	p = strchr(p, del);
310	if (!p)
311		goto einval;
312	*p++ = '\0';
313	if (!e->name[0] ||
314	    !strcmp(e->name, ".") ||
315	    !strcmp(e->name, "..") ||
316	    strchr(e->name, '/'))
317		goto einval;
318
319	pr_debug("register: name: {%s}\n", e->name);
320
321	/* Parse the 'type' field. */
322	switch (*p++) {
323	case 'E':
324		pr_debug("register: type: E (extension)\n");
325		e->flags = 1 << Enabled;
326		break;
327	case 'M':
328		pr_debug("register: type: M (magic)\n");
329		e->flags = (1 << Enabled) | (1 << Magic);
330		break;
331	default:
332		goto einval;
333	}
334	if (*p++ != del)
335		goto einval;
336
337	if (test_bit(Magic, &e->flags)) {
338		/* Handle the 'M' (magic) format. */
339		char *s;
340
341		/* Parse the 'offset' field. */
342		s = strchr(p, del);
343		if (!s)
344			goto einval;
345		*s = '\0';
346		if (p != s) {
347			int r = kstrtoint(p, 10, &e->offset);
348			if (r != 0 || e->offset < 0)
349				goto einval;
350		}
351		p = s;
352		if (*p++)
353			goto einval;
354		pr_debug("register: offset: %#x\n", e->offset);
355
356		/* Parse the 'magic' field. */
357		e->magic = p;
358		p = scanarg(p, del);
359		if (!p)
360			goto einval;
361		if (!e->magic[0])
362			goto einval;
363		if (USE_DEBUG)
364			print_hex_dump_bytes(
365				KBUILD_MODNAME ": register: magic[raw]: ",
366				DUMP_PREFIX_NONE, e->magic, p - e->magic);
367
368		/* Parse the 'mask' field. */
369		e->mask = p;
370		p = scanarg(p, del);
371		if (!p)
372			goto einval;
373		if (!e->mask[0]) {
374			e->mask = NULL;
375			pr_debug("register:  mask[raw]: none\n");
376		} else if (USE_DEBUG)
377			print_hex_dump_bytes(
378				KBUILD_MODNAME ": register:  mask[raw]: ",
379				DUMP_PREFIX_NONE, e->mask, p - e->mask);
380
381		/*
382		 * Decode the magic & mask fields.
383		 * Note: while we might have accepted embedded NUL bytes from
384		 * above, the unescape helpers here will stop at the first one
385		 * it encounters.
386		 */
387		e->size = string_unescape_inplace(e->magic, UNESCAPE_HEX);
388		if (e->mask &&
389		    string_unescape_inplace(e->mask, UNESCAPE_HEX) != e->size)
390			goto einval;
391		if (e->size > BINPRM_BUF_SIZE ||
392		    BINPRM_BUF_SIZE - e->size < e->offset)
393			goto einval;
394		pr_debug("register: magic/mask length: %i\n", e->size);
395		if (USE_DEBUG) {
396			print_hex_dump_bytes(
397				KBUILD_MODNAME ": register: magic[decoded]: ",
398				DUMP_PREFIX_NONE, e->magic, e->size);
399
400			if (e->mask) {
401				int i;
402				char *masked = kmalloc(e->size, GFP_KERNEL);
403
404				print_hex_dump_bytes(
405					KBUILD_MODNAME ": register:  mask[decoded]: ",
406					DUMP_PREFIX_NONE, e->mask, e->size);
407
408				if (masked) {
409					for (i = 0; i < e->size; ++i)
410						masked[i] = e->magic[i] & e->mask[i];
411					print_hex_dump_bytes(
412						KBUILD_MODNAME ": register:  magic[masked]: ",
413						DUMP_PREFIX_NONE, masked, e->size);
414
415					kfree(masked);
416				}
417			}
418		}
419	} else {
420		/* Handle the 'E' (extension) format. */
421
422		/* Skip the 'offset' field. */
423		p = strchr(p, del);
424		if (!p)
425			goto einval;
426		*p++ = '\0';
427
428		/* Parse the 'magic' field. */
429		e->magic = p;
430		p = strchr(p, del);
431		if (!p)
432			goto einval;
433		*p++ = '\0';
434		if (!e->magic[0] || strchr(e->magic, '/'))
435			goto einval;
436		pr_debug("register: extension: {%s}\n", e->magic);
437
438		/* Skip the 'mask' field. */
439		p = strchr(p, del);
440		if (!p)
441			goto einval;
442		*p++ = '\0';
443	}
444
445	/* Parse the 'interpreter' field. */
446	e->interpreter = p;
447	p = strchr(p, del);
448	if (!p)
449		goto einval;
450	*p++ = '\0';
451	if (!e->interpreter[0])
452		goto einval;
453	pr_debug("register: interpreter: {%s}\n", e->interpreter);
454
455	/* Parse the 'flags' field. */
456	p = check_special_flags(p, e);
457	if (*p == '\n')
458		p++;
459	if (p != buf + count)
460		goto einval;
461
462	return e;
463
464out:
465	return ERR_PTR(err);
466
467efault:
468	kfree(e);
469	return ERR_PTR(-EFAULT);
470einval:
471	kfree(e);
472	return ERR_PTR(-EINVAL);
473}
474
475/*
476 * Set status of entry/binfmt_misc:
477 * '1' enables, '0' disables and '-1' clears entry/binfmt_misc
478 */
479static int parse_command(const char __user *buffer, size_t count)
480{
481	char s[4];
482
483	if (count > 3)
484		return -EINVAL;
485	if (copy_from_user(s, buffer, count))
486		return -EFAULT;
487	if (!count)
488		return 0;
489	if (s[count - 1] == '\n')
490		count--;
491	if (count == 1 && s[0] == '0')
492		return 1;
493	if (count == 1 && s[0] == '1')
494		return 2;
495	if (count == 2 && s[0] == '-' && s[1] == '1')
496		return 3;
497	return -EINVAL;
498}
499
500/* generic stuff */
501
502static void entry_status(Node *e, char *page)
503{
504	char *dp = page;
505	const char *status = "disabled";
506
507	if (test_bit(Enabled, &e->flags))
508		status = "enabled";
509
510	if (!VERBOSE_STATUS) {
511		sprintf(page, "%s\n", status);
512		return;
513	}
514
515	dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter);
516
517	/* print the special flags */
518	dp += sprintf(dp, "flags: ");
519	if (e->flags & MISC_FMT_PRESERVE_ARGV0)
520		*dp++ = 'P';
521	if (e->flags & MISC_FMT_OPEN_BINARY)
522		*dp++ = 'O';
523	if (e->flags & MISC_FMT_CREDENTIALS)
524		*dp++ = 'C';
525	if (e->flags & MISC_FMT_OPEN_FILE)
526		*dp++ = 'F';
527	*dp++ = '\n';
528
529	if (!test_bit(Magic, &e->flags)) {
530		sprintf(dp, "extension .%s\n", e->magic);
531	} else {
532		dp += sprintf(dp, "offset %i\nmagic ", e->offset);
533		dp = bin2hex(dp, e->magic, e->size);
534		if (e->mask) {
535			dp += sprintf(dp, "\nmask ");
536			dp = bin2hex(dp, e->mask, e->size);
537		}
538		*dp++ = '\n';
539		*dp = '\0';
540	}
541}
542
543static struct inode *bm_get_inode(struct super_block *sb, int mode)
544{
545	struct inode *inode = new_inode(sb);
546
547	if (inode) {
548		inode->i_ino = get_next_ino();
549		inode->i_mode = mode;
550		inode->i_atime = inode->i_mtime = inode->i_ctime =
551			current_time(inode);
552	}
553	return inode;
554}
555
556static void bm_evict_inode(struct inode *inode)
557{
558	Node *e = inode->i_private;
559
560	if (e && e->flags & MISC_FMT_OPEN_FILE)
561		filp_close(e->interp_file, NULL);
562
563	clear_inode(inode);
564	kfree(e);
565}
566
567static void kill_node(Node *e)
568{
569	struct dentry *dentry;
570
571	write_lock(&entries_lock);
572	list_del_init(&e->list);
 
 
 
 
573	write_unlock(&entries_lock);
574
575	dentry = e->dentry;
576	drop_nlink(d_inode(dentry));
577	d_drop(dentry);
578	dput(dentry);
579	simple_release_fs(&bm_mnt, &entry_count);
 
 
 
 
 
 
580}
581
582/* /<entry> */
583
584static ssize_t
585bm_entry_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
586{
587	Node *e = file_inode(file)->i_private;
588	ssize_t res;
589	char *page;
590
591	page = (char *) __get_free_page(GFP_KERNEL);
592	if (!page)
593		return -ENOMEM;
594
595	entry_status(e, page);
596
597	res = simple_read_from_buffer(buf, nbytes, ppos, page, strlen(page));
598
599	free_page((unsigned long) page);
600	return res;
601}
602
603static ssize_t bm_entry_write(struct file *file, const char __user *buffer,
604				size_t count, loff_t *ppos)
605{
606	struct dentry *root;
607	Node *e = file_inode(file)->i_private;
608	int res = parse_command(buffer, count);
609
610	switch (res) {
611	case 1:
612		/* Disable this handler. */
613		clear_bit(Enabled, &e->flags);
614		break;
615	case 2:
616		/* Enable this handler. */
617		set_bit(Enabled, &e->flags);
618		break;
619	case 3:
620		/* Delete this handler. */
621		root = file_inode(file)->i_sb->s_root;
622		inode_lock(d_inode(root));
623
624		if (!list_empty(&e->list))
625			kill_node(e);
626
627		inode_unlock(d_inode(root));
628		break;
629	default:
630		return res;
631	}
632
633	return count;
634}
635
636static const struct file_operations bm_entry_operations = {
637	.read		= bm_entry_read,
638	.write		= bm_entry_write,
639	.llseek		= default_llseek,
640};
641
642/* /register */
643
644static ssize_t bm_register_write(struct file *file, const char __user *buffer,
645			       size_t count, loff_t *ppos)
646{
647	Node *e;
648	struct inode *inode;
649	struct super_block *sb = file_inode(file)->i_sb;
650	struct dentry *root = sb->s_root, *dentry;
651	int err = 0;
652	struct file *f = NULL;
653
654	e = create_entry(buffer, count);
655
656	if (IS_ERR(e))
657		return PTR_ERR(e);
658
659	if (e->flags & MISC_FMT_OPEN_FILE) {
660		f = open_exec(e->interpreter);
661		if (IS_ERR(f)) {
662			pr_notice("register: failed to install interpreter file %s\n",
663				 e->interpreter);
664			kfree(e);
665			return PTR_ERR(f);
666		}
667		e->interp_file = f;
668	}
669
670	inode_lock(d_inode(root));
671	dentry = lookup_one_len(e->name, root, strlen(e->name));
672	err = PTR_ERR(dentry);
673	if (IS_ERR(dentry))
674		goto out;
675
676	err = -EEXIST;
677	if (d_really_is_positive(dentry))
678		goto out2;
679
680	inode = bm_get_inode(sb, S_IFREG | 0644);
681
682	err = -ENOMEM;
683	if (!inode)
684		goto out2;
685
686	err = simple_pin_fs(&bm_fs_type, &bm_mnt, &entry_count);
687	if (err) {
688		iput(inode);
689		inode = NULL;
690		goto out2;
691	}
692
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
693	e->dentry = dget(dentry);
694	inode->i_private = e;
695	inode->i_fop = &bm_entry_operations;
696
697	d_instantiate(dentry, inode);
698	write_lock(&entries_lock);
699	list_add(&e->list, &entries);
700	write_unlock(&entries_lock);
701
702	err = 0;
703out2:
704	dput(dentry);
705out:
706	inode_unlock(d_inode(root));
707
708	if (err) {
709		if (f)
710			filp_close(f, NULL);
711		kfree(e);
712		return err;
713	}
714	return count;
715}
716
717static const struct file_operations bm_register_operations = {
718	.write		= bm_register_write,
719	.llseek		= noop_llseek,
720};
721
722/* /status */
723
724static ssize_t
725bm_status_read(struct file *file, char __user *buf, size_t nbytes, loff_t *ppos)
726{
727	char *s = enabled ? "enabled\n" : "disabled\n";
728
729	return simple_read_from_buffer(buf, nbytes, ppos, s, strlen(s));
730}
731
732static ssize_t bm_status_write(struct file *file, const char __user *buffer,
733		size_t count, loff_t *ppos)
734{
735	int res = parse_command(buffer, count);
736	struct dentry *root;
737
738	switch (res) {
739	case 1:
740		/* Disable all handlers. */
741		enabled = 0;
742		break;
743	case 2:
744		/* Enable all handlers. */
745		enabled = 1;
746		break;
747	case 3:
748		/* Delete all handlers. */
749		root = file_inode(file)->i_sb->s_root;
750		inode_lock(d_inode(root));
751
752		while (!list_empty(&entries))
753			kill_node(list_first_entry(&entries, Node, list));
754
755		inode_unlock(d_inode(root));
756		break;
757	default:
758		return res;
759	}
760
761	return count;
762}
763
764static const struct file_operations bm_status_operations = {
765	.read		= bm_status_read,
766	.write		= bm_status_write,
767	.llseek		= default_llseek,
768};
769
770/* Superblock handling */
771
772static const struct super_operations s_ops = {
773	.statfs		= simple_statfs,
774	.evict_inode	= bm_evict_inode,
775};
776
777static int bm_fill_super(struct super_block *sb, struct fs_context *fc)
778{
779	int err;
780	static const struct tree_descr bm_files[] = {
781		[2] = {"status", &bm_status_operations, S_IWUSR|S_IRUGO},
782		[3] = {"register", &bm_register_operations, S_IWUSR},
783		/* last one */ {""}
784	};
785
786	err = simple_fill_super(sb, BINFMTFS_MAGIC, bm_files);
787	if (!err)
788		sb->s_op = &s_ops;
789	return err;
790}
791
792static int bm_get_tree(struct fs_context *fc)
793{
794	return get_tree_single(fc, bm_fill_super);
795}
796
797static const struct fs_context_operations bm_context_ops = {
798	.get_tree	= bm_get_tree,
799};
800
801static int bm_init_fs_context(struct fs_context *fc)
802{
803	fc->ops = &bm_context_ops;
804	return 0;
805}
806
807static struct linux_binfmt misc_format = {
808	.module = THIS_MODULE,
809	.load_binary = load_misc_binary,
810};
811
812static struct file_system_type bm_fs_type = {
813	.owner		= THIS_MODULE,
814	.name		= "binfmt_misc",
815	.init_fs_context = bm_init_fs_context,
816	.kill_sb	= kill_litter_super,
817};
818MODULE_ALIAS_FS("binfmt_misc");
819
820static int __init init_misc_binfmt(void)
821{
822	int err = register_filesystem(&bm_fs_type);
823	if (!err)
824		insert_binfmt(&misc_format);
825	return err;
826}
827
828static void __exit exit_misc_binfmt(void)
829{
830	unregister_binfmt(&misc_format);
831	unregister_filesystem(&bm_fs_type);
832}
833
834core_initcall(init_misc_binfmt);
835module_exit(exit_misc_binfmt);
836MODULE_LICENSE("GPL");