Files
kernel_xiaomi_raphael/include/linux/binfmts.h
kondors1995 8b165b0bc1 treewide: remove blocker changes
Squashed commit of the following:

commit 811cf86e5630b6683e461e5ee456d4ffe2eb36b2
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:21:29 2020 +0000

    Revert "cpufreq: schedutil: Apply init protection to default configuration options"

    This reverts commit 4ecb29c3df.

commit b541ba1f2b0543761d962d36380f04139becf16a
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:08:13 2020 +0000

    Revert "kernel: introduce CPUSets Assist"

    This reverts commit c45e65572c.

commit 886a836d499dd2a19b93f08be7e68f6f6baa2e6b
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:08:03 2020 +0000

    Revert "cpuset: Refactor cpuset assist code"

    This reverts commit 04eada3a89.

commit 9bdcbf7576aabdea6639e98d576cf63f8804f6d6
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:07:57 2020 +0000

    Revert "cpuset: Move cpuset override values to Kconfig"

    This reverts commit edbf67e199.

commit f9a4600e0bc63e7ea2bdc3a23ef3e1e1848f5d56
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:07:51 2020 +0000

    Revert "cpuset: guard CPUSETS_ASSISTANT code properly"

    This reverts commit 068236c13a.

commit adf6f1f9c99161593af8c88f9875730823ece72c
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:06:39 2020 +0000

    Revert "exec: Add node tampering blacklist function"

    This reverts commit ce392dfd95.

commit a8c8bf6cd51e6c1eaf2c533604aa9672ea3e605f
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:06:32 2020 +0000

    Revert "exec: Extend task_is_booster check to cover OxygenOS userspace HALs"

    This reverts commit 9e18f0f556.

commit 49f0c5e402345ec5d25a46a573de09d967a3d298
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:06:25 2020 +0000

    Revert "exec: Add power@2.0 and IOP to tampering blacklist"

    This reverts commit a94abe8d8e.

commit df04db7ce215e1b90559bdfd59a7cc7b0a3128c1
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:02:19 2020 +0000

    Revert "cpufreq: Kill userspace CPU boosting entirely"

    This reverts commit 3588cb8f72.

commit b56ca8721a22b3f0ce870485084578de6d2e4bf1
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:01:59 2020 +0000

    Revert "cpufreq: Allow configuring default minimum frequencies in Kconfig"

    This reverts commit c52d0b68a4.

commit 3683571e22dec49b2e9585c9bf67e26c3f90c62d
Author: kondors1995 <normandija1945@gmail.com>
Date:   Wed Sep 9 07:01:52 2020 +0000

    Revert "cpufreq: schedutil: Expose default rate-limits as config options"

    This reverts commit 8e639c1f3f.
2020-09-11 09:40:30 +00:00

152 lines
4.8 KiB
C

/* SPDX-License-Identifier: GPL-2.0 */
#ifndef _LINUX_BINFMTS_H
#define _LINUX_BINFMTS_H
#include <linux/sched.h>
#include <linux/unistd.h>
#include <asm/exec.h>
#include <uapi/linux/binfmts.h>
struct filename;
#define CORENAME_MAX_SIZE 128
/*
* This structure is used to hold the arguments that are used when loading binaries.
*/
struct linux_binprm {
char buf[BINPRM_BUF_SIZE];
#ifdef CONFIG_MMU
struct vm_area_struct *vma;
unsigned long vma_pages;
#else
# define MAX_ARG_PAGES 32
struct page *page[MAX_ARG_PAGES];
#endif
struct mm_struct *mm;
unsigned long p; /* current top of mem */
unsigned int
/*
* True after the bprm_set_creds hook has been called once
* (multiple calls can be made via prepare_binprm() for
* binfmt_script/misc).
*/
called_set_creds:1,
/*
* True if most recent call to the commoncaps bprm_set_creds
* hook (due to multiple prepare_binprm() calls from the
* binfmt_script/misc handlers) resulted in elevated
* privileges.
*/
cap_elevated:1,
/*
* Set by bprm_set_creds hook to indicate a privilege-gaining
* exec has happened. Used to sanitize execution environment
* and to set AT_SECURE auxv for glibc.
*/
secureexec:1;
#ifdef __alpha__
unsigned int taso:1;
#endif
unsigned int recursion_depth; /* only for search_binary_handler() */
struct file * file;
struct cred *cred; /* new credentials */
int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */
unsigned int per_clear; /* bits to clear in current->personality */
int argc, envc;
const char * filename; /* Name of binary as seen by procps */
const char * interp; /* Name of the binary really executed. Most
of the time same as filename, but could be
different for binfmt_{misc,script} */
unsigned interp_flags;
unsigned interp_data;
unsigned long loader, exec;
} __randomize_layout;
#define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
#define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
/* fd of the binary should be passed to the interpreter */
#define BINPRM_FLAGS_EXECFD_BIT 1
#define BINPRM_FLAGS_EXECFD (1 << BINPRM_FLAGS_EXECFD_BIT)
/* filename of the binary will be inaccessible after exec */
#define BINPRM_FLAGS_PATH_INACCESSIBLE_BIT 2
#define BINPRM_FLAGS_PATH_INACCESSIBLE (1 << BINPRM_FLAGS_PATH_INACCESSIBLE_BIT)
/* Function parameter for binfmt->coredump */
struct coredump_params {
const siginfo_t *siginfo;
struct pt_regs *regs;
struct file *file;
unsigned long limit;
unsigned long mm_flags;
loff_t written;
loff_t pos;
};
/*
* This structure defines the functions that are used to load the binary formats that
* linux accepts.
*/
struct linux_binfmt {
struct list_head lh;
struct module *module;
int (*load_binary)(struct linux_binprm *);
int (*load_shlib)(struct file *);
int (*core_dump)(struct coredump_params *cprm);
unsigned long min_coredump; /* minimal dump size */
} __randomize_layout;
extern void __register_binfmt(struct linux_binfmt *fmt, int insert);
/* Registration of default binfmt handlers */
static inline void register_binfmt(struct linux_binfmt *fmt)
{
__register_binfmt(fmt, 0);
}
/* Same as above, but adds a new binfmt at the top of the list */
static inline void insert_binfmt(struct linux_binfmt *fmt)
{
__register_binfmt(fmt, 1);
}
extern void unregister_binfmt(struct linux_binfmt *);
extern int prepare_binprm(struct linux_binprm *);
extern int __must_check remove_arg_zero(struct linux_binprm *);
extern int search_binary_handler(struct linux_binprm *);
extern int flush_old_exec(struct linux_binprm * bprm);
extern void setup_new_exec(struct linux_binprm * bprm);
extern void would_dump(struct linux_binprm *, struct file *);
extern int suid_dumpable;
/* Stack area protections */
#define EXSTACK_DEFAULT 0 /* Whatever the arch defaults to */
#define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
#define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
extern int setup_arg_pages(struct linux_binprm * bprm,
unsigned long stack_top,
int executable_stack);
extern int transfer_args_to_stack(struct linux_binprm *bprm,
unsigned long *sp_location);
extern int bprm_change_interp(const char *interp, struct linux_binprm *bprm);
extern int copy_strings_kernel(int argc, const char *const *argv,
struct linux_binprm *bprm);
extern int prepare_bprm_creds(struct linux_binprm *bprm);
extern void install_exec_creds(struct linux_binprm *bprm);
extern void set_binfmt(struct linux_binfmt *new);
extern ssize_t read_code(struct file *, unsigned long, loff_t, size_t);
extern int do_execve(struct filename *,
const char __user * const __user *,
const char __user * const __user *);
extern int do_execveat(int, struct filename *,
const char __user * const __user *,
const char __user * const __user *,
int);
#endif /* _LINUX_BINFMTS_H */