]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /****************************************************************************/ |
3 | /* | |
4 | * linux/fs/binfmt_flat.c | |
5 | * | |
6 | * Copyright (C) 2000-2003 David McCullough <[email protected]> | |
7 | * Copyright (C) 2002 Greg Ungerer <[email protected]> | |
8 | * Copyright (C) 2002 SnapGear, by Paul Dale <[email protected]> | |
9 | * Copyright (C) 2000, 2001 Lineo, by David McCullough <[email protected]> | |
10 | * based heavily on: | |
11 | * | |
12 | * linux/fs/binfmt_aout.c: | |
13 | * Copyright (C) 1991, 1992, 1996 Linus Torvalds | |
14 | * linux/fs/binfmt_flat.c for 2.0 kernel | |
15 | * Copyright (C) 1998 Kenneth Albanowski <[email protected]> | |
16 | * JAN/99 -- coded full program relocation ([email protected]) | |
17 | */ | |
18 | ||
4adbb6ac NP |
19 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
20 | ||
1da177e4 LT |
21 | #include <linux/kernel.h> |
22 | #include <linux/sched.h> | |
68db0cf1 | 23 | #include <linux/sched/task_stack.h> |
1da177e4 LT |
24 | #include <linux/mm.h> |
25 | #include <linux/mman.h> | |
1da177e4 LT |
26 | #include <linux/errno.h> |
27 | #include <linux/signal.h> | |
28 | #include <linux/string.h> | |
29 | #include <linux/fs.h> | |
30 | #include <linux/file.h> | |
1da177e4 LT |
31 | #include <linux/ptrace.h> |
32 | #include <linux/user.h> | |
33 | #include <linux/slab.h> | |
34 | #include <linux/binfmts.h> | |
35 | #include <linux/personality.h> | |
36 | #include <linux/init.h> | |
37 | #include <linux/flat.h> | |
13c3f50c | 38 | #include <linux/uaccess.h> |
472f95f3 | 39 | #include <linux/vmalloc.h> |
1da177e4 LT |
40 | |
41 | #include <asm/byteorder.h> | |
1da177e4 LT |
42 | #include <asm/unaligned.h> |
43 | #include <asm/cacheflush.h> | |
c3dc5bec | 44 | #include <asm/page.h> |
06d2bfed | 45 | #include <asm/flat.h> |
1da177e4 | 46 | |
02da2833 CH |
47 | #ifndef flat_get_relocate_addr |
48 | #define flat_get_relocate_addr(rel) (rel) | |
49 | #endif | |
1da177e4 LT |
50 | |
51 | /****************************************************************************/ | |
52 | ||
c3dc5bec | 53 | /* |
2e94de8a MF |
54 | * User data (data section and bss) needs to be aligned. |
55 | * We pick 0x20 here because it is the max value elf2flt has always | |
56 | * used in producing FLAT files, and because it seems to be large | |
57 | * enough to make all the gcc alignment related tests happy. | |
58 | */ | |
59 | #define FLAT_DATA_ALIGN (0x20) | |
60 | ||
61 | /* | |
62 | * User data (stack) also needs to be aligned. | |
63 | * Here we can be a bit looser than the data sections since this | |
64 | * needs to only meet arch ABI requirements. | |
c3dc5bec | 65 | */ |
2952095c | 66 | #define FLAT_STACK_ALIGN max_t(unsigned long, sizeof(void *), ARCH_SLAB_MINALIGN) |
c3dc5bec | 67 | |
1da177e4 LT |
68 | #define RELOC_FAILED 0xff00ff01 /* Relocation incorrect somewhere */ |
69 | #define UNLOADED_LIB 0x7ff000ff /* Placeholder for unused library */ | |
70 | ||
70578ff3 | 71 | #define MAX_SHARED_LIBS (1) |
a445d988 | 72 | |
04d82a6d DLM |
73 | #ifdef CONFIG_BINFMT_FLAT_NO_DATA_START_OFFSET |
74 | #define DATA_START_OFFSET_WORDS (0) | |
3eb3cd59 | 75 | #define MAX_SHARED_LIBS_UPDATE (0) |
04d82a6d DLM |
76 | #else |
77 | #define DATA_START_OFFSET_WORDS (MAX_SHARED_LIBS) | |
3eb3cd59 | 78 | #define MAX_SHARED_LIBS_UPDATE (MAX_SHARED_LIBS) |
04d82a6d DLM |
79 | #endif |
80 | ||
1da177e4 LT |
81 | struct lib_info { |
82 | struct { | |
83 | unsigned long start_code; /* Start of text segment */ | |
84 | unsigned long start_data; /* Start of data segment */ | |
85 | unsigned long start_brk; /* End of data segment */ | |
86 | unsigned long text_len; /* Length of text segment */ | |
87 | unsigned long entry; /* Start address for this module */ | |
88 | unsigned long build_date; /* When this one was compiled */ | |
13c3f50c | 89 | bool loaded; /* Has this library been loaded? */ |
1da177e4 LT |
90 | } lib_list[MAX_SHARED_LIBS]; |
91 | }; | |
92 | ||
71613c3b | 93 | static int load_flat_binary(struct linux_binprm *); |
1da177e4 | 94 | |
1da177e4 LT |
95 | static struct linux_binfmt flat_format = { |
96 | .module = THIS_MODULE, | |
97 | .load_binary = load_flat_binary, | |
1da177e4 LT |
98 | }; |
99 | ||
1da177e4 LT |
100 | |
101 | /****************************************************************************/ | |
102 | /* | |
103 | * create_flat_tables() parses the env- and arg-strings in new user | |
104 | * memory and creates the pointer tables from them, and puts their | |
a97d157d | 105 | * addresses on the "stack", recording the new stack pointer value. |
1da177e4 LT |
106 | */ |
107 | ||
a97d157d | 108 | static int create_flat_tables(struct linux_binprm *bprm, unsigned long arg_start) |
1da177e4 | 109 | { |
a97d157d NP |
110 | char __user *p; |
111 | unsigned long __user *sp; | |
112 | long i, len; | |
1da177e4 | 113 | |
a97d157d NP |
114 | p = (char __user *)arg_start; |
115 | sp = (unsigned long __user *)current->mm->start_stack; | |
116 | ||
117 | sp -= bprm->envc + 1; | |
118 | sp -= bprm->argc + 1; | |
bdd15a28 CH |
119 | if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK)) |
120 | sp -= 2; /* argvp + envp */ | |
a97d157d NP |
121 | sp -= 1; /* &argc */ |
122 | ||
123 | current->mm->start_stack = (unsigned long)sp & -FLAT_STACK_ALIGN; | |
124 | sp = (unsigned long __user *)current->mm->start_stack; | |
125 | ||
8861fd57 AV |
126 | if (put_user(bprm->argc, sp++)) |
127 | return -EFAULT; | |
bdd15a28 | 128 | if (IS_ENABLED(CONFIG_BINFMT_FLAT_ARGVP_ENVP_ON_STACK)) { |
a97d157d NP |
129 | unsigned long argv, envp; |
130 | argv = (unsigned long)(sp + 2); | |
131 | envp = (unsigned long)(sp + 2 + bprm->argc + 1); | |
8861fd57 AV |
132 | if (put_user(argv, sp++) || put_user(envp, sp++)) |
133 | return -EFAULT; | |
a97d157d NP |
134 | } |
135 | ||
136 | current->mm->arg_start = (unsigned long)p; | |
137 | for (i = bprm->argc; i > 0; i--) { | |
8861fd57 AV |
138 | if (put_user((unsigned long)p, sp++)) |
139 | return -EFAULT; | |
a97d157d NP |
140 | len = strnlen_user(p, MAX_ARG_STRLEN); |
141 | if (!len || len > MAX_ARG_STRLEN) | |
142 | return -EINVAL; | |
143 | p += len; | |
144 | } | |
8861fd57 AV |
145 | if (put_user(0, sp++)) |
146 | return -EFAULT; | |
a97d157d NP |
147 | current->mm->arg_end = (unsigned long)p; |
148 | ||
149 | current->mm->env_start = (unsigned long) p; | |
150 | for (i = bprm->envc; i > 0; i--) { | |
8861fd57 AV |
151 | if (put_user((unsigned long)p, sp++)) |
152 | return -EFAULT; | |
a97d157d NP |
153 | len = strnlen_user(p, MAX_ARG_STRLEN); |
154 | if (!len || len > MAX_ARG_STRLEN) | |
155 | return -EINVAL; | |
156 | p += len; | |
157 | } | |
8861fd57 AV |
158 | if (put_user(0, sp++)) |
159 | return -EFAULT; | |
a97d157d NP |
160 | current->mm->env_end = (unsigned long)p; |
161 | ||
162 | return 0; | |
1da177e4 LT |
163 | } |
164 | ||
165 | /****************************************************************************/ | |
166 | ||
167 | #ifdef CONFIG_BINFMT_ZFLAT | |
168 | ||
169 | #include <linux/zlib.h> | |
170 | ||
171 | #define LBUFSIZE 4000 | |
172 | ||
173 | /* gzip flag byte */ | |
174 | #define ASCII_FLAG 0x01 /* bit 0 set: file probably ASCII text */ | |
175 | #define CONTINUATION 0x02 /* bit 1 set: continuation of multi-part gzip file */ | |
176 | #define EXTRA_FIELD 0x04 /* bit 2 set: extra field present */ | |
177 | #define ORIG_NAME 0x08 /* bit 3 set: original file name present */ | |
178 | #define COMMENT 0x10 /* bit 4 set: file comment present */ | |
179 | #define ENCRYPTED 0x20 /* bit 5 set: file is encrypted */ | |
180 | #define RESERVED 0xC0 /* bit 6,7: reserved */ | |
181 | ||
bdd1d2d3 CH |
182 | static int decompress_exec(struct linux_binprm *bprm, loff_t fpos, char *dst, |
183 | long len, int fd) | |
1da177e4 LT |
184 | { |
185 | unsigned char *buf; | |
186 | z_stream strm; | |
1da177e4 LT |
187 | int ret, retval; |
188 | ||
bdd1d2d3 | 189 | pr_debug("decompress_exec(offset=%llx,buf=%p,len=%lx)\n", fpos, dst, len); |
1da177e4 LT |
190 | |
191 | memset(&strm, 0, sizeof(strm)); | |
192 | strm.workspace = kmalloc(zlib_inflate_workspacesize(), GFP_KERNEL); | |
9367bb73 | 193 | if (!strm.workspace) |
1da177e4 | 194 | return -ENOMEM; |
9367bb73 | 195 | |
1da177e4 | 196 | buf = kmalloc(LBUFSIZE, GFP_KERNEL); |
9367bb73 | 197 | if (!buf) { |
1da177e4 LT |
198 | retval = -ENOMEM; |
199 | goto out_free; | |
200 | } | |
201 | ||
202 | /* Read in first chunk of data and parse gzip header. */ | |
bdd1d2d3 | 203 | ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos); |
1da177e4 LT |
204 | |
205 | strm.next_in = buf; | |
206 | strm.avail_in = ret; | |
207 | strm.total_in = 0; | |
208 | ||
209 | retval = -ENOEXEC; | |
210 | ||
211 | /* Check minimum size -- gzip header */ | |
212 | if (ret < 10) { | |
4adbb6ac | 213 | pr_debug("file too small?\n"); |
1da177e4 LT |
214 | goto out_free_buf; |
215 | } | |
216 | ||
217 | /* Check gzip magic number */ | |
218 | if ((buf[0] != 037) || ((buf[1] != 0213) && (buf[1] != 0236))) { | |
4adbb6ac | 219 | pr_debug("unknown compression magic?\n"); |
1da177e4 LT |
220 | goto out_free_buf; |
221 | } | |
222 | ||
223 | /* Check gzip method */ | |
224 | if (buf[2] != 8) { | |
4adbb6ac | 225 | pr_debug("unknown compression method?\n"); |
1da177e4 LT |
226 | goto out_free_buf; |
227 | } | |
228 | /* Check gzip flags */ | |
229 | if ((buf[3] & ENCRYPTED) || (buf[3] & CONTINUATION) || | |
230 | (buf[3] & RESERVED)) { | |
4adbb6ac | 231 | pr_debug("unknown flags?\n"); |
1da177e4 LT |
232 | goto out_free_buf; |
233 | } | |
234 | ||
235 | ret = 10; | |
236 | if (buf[3] & EXTRA_FIELD) { | |
237 | ret += 2 + buf[10] + (buf[11] << 8); | |
13c3f50c | 238 | if (unlikely(ret >= LBUFSIZE)) { |
4adbb6ac | 239 | pr_debug("buffer overflow (EXTRA)?\n"); |
1da177e4 LT |
240 | goto out_free_buf; |
241 | } | |
242 | } | |
243 | if (buf[3] & ORIG_NAME) { | |
f4cfb18d | 244 | while (ret < LBUFSIZE && buf[ret++] != 0) |
1da177e4 | 245 | ; |
13c3f50c | 246 | if (unlikely(ret == LBUFSIZE)) { |
4adbb6ac | 247 | pr_debug("buffer overflow (ORIG_NAME)?\n"); |
1da177e4 LT |
248 | goto out_free_buf; |
249 | } | |
250 | } | |
251 | if (buf[3] & COMMENT) { | |
f4cfb18d | 252 | while (ret < LBUFSIZE && buf[ret++] != 0) |
1da177e4 | 253 | ; |
13c3f50c | 254 | if (unlikely(ret == LBUFSIZE)) { |
4adbb6ac | 255 | pr_debug("buffer overflow (COMMENT)?\n"); |
1da177e4 LT |
256 | goto out_free_buf; |
257 | } | |
258 | } | |
259 | ||
260 | strm.next_in += ret; | |
261 | strm.avail_in -= ret; | |
262 | ||
263 | strm.next_out = dst; | |
264 | strm.avail_out = len; | |
265 | strm.total_out = 0; | |
266 | ||
267 | if (zlib_inflateInit2(&strm, -MAX_WBITS) != Z_OK) { | |
4adbb6ac | 268 | pr_debug("zlib init failed?\n"); |
1da177e4 LT |
269 | goto out_free_buf; |
270 | } | |
271 | ||
272 | while ((ret = zlib_inflate(&strm, Z_NO_FLUSH)) == Z_OK) { | |
bdd1d2d3 | 273 | ret = kernel_read(bprm->file, buf, LBUFSIZE, &fpos); |
1da177e4 LT |
274 | if (ret <= 0) |
275 | break; | |
1da177e4 LT |
276 | len -= ret; |
277 | ||
278 | strm.next_in = buf; | |
279 | strm.avail_in = ret; | |
280 | strm.total_in = 0; | |
281 | } | |
282 | ||
283 | if (ret < 0) { | |
4adbb6ac | 284 | pr_debug("decompression failed (%d), %s\n", |
1da177e4 LT |
285 | ret, strm.msg); |
286 | goto out_zlib; | |
287 | } | |
288 | ||
289 | retval = 0; | |
290 | out_zlib: | |
291 | zlib_inflateEnd(&strm); | |
292 | out_free_buf: | |
293 | kfree(buf); | |
294 | out_free: | |
295 | kfree(strm.workspace); | |
1da177e4 LT |
296 | return retval; |
297 | } | |
298 | ||
299 | #endif /* CONFIG_BINFMT_ZFLAT */ | |
300 | ||
301 | /****************************************************************************/ | |
302 | ||
303 | static unsigned long | |
70578ff3 | 304 | calc_reloc(unsigned long r, struct lib_info *p) |
1da177e4 LT |
305 | { |
306 | unsigned long addr; | |
1da177e4 LT |
307 | unsigned long start_brk; |
308 | unsigned long start_data; | |
309 | unsigned long text_len; | |
310 | unsigned long start_code; | |
311 | ||
70578ff3 EB |
312 | start_brk = p->lib_list[0].start_brk; |
313 | start_data = p->lib_list[0].start_data; | |
314 | start_code = p->lib_list[0].start_code; | |
315 | text_len = p->lib_list[0].text_len; | |
1da177e4 | 316 | |
9ee24b2a | 317 | if (r > start_brk - start_data + text_len) { |
4adbb6ac | 318 | pr_err("reloc outside program 0x%lx (0 - 0x%lx/0x%lx)", |
13c3f50c | 319 | r, start_brk-start_data+text_len, text_len); |
1da177e4 LT |
320 | goto failed; |
321 | } | |
322 | ||
323 | if (r < text_len) /* In text segment */ | |
324 | addr = r + start_code; | |
325 | else /* In data segment */ | |
326 | addr = r - text_len + start_data; | |
327 | ||
328 | /* Range checked already above so doing the range tests is redundant...*/ | |
13c3f50c | 329 | return addr; |
1da177e4 LT |
330 | |
331 | failed: | |
4adbb6ac | 332 | pr_cont(", killing %s!\n", current->comm); |
1da177e4 LT |
333 | send_sig(SIGSEGV, current, 0); |
334 | ||
335 | return RELOC_FAILED; | |
336 | } | |
337 | ||
338 | /****************************************************************************/ | |
339 | ||
cf9a566c | 340 | #ifdef CONFIG_BINFMT_FLAT_OLD |
34303435 | 341 | static void old_reloc(unsigned long rl) |
1da177e4 | 342 | { |
13c3f50c | 343 | static const char *segment[] = { "TEXT", "DATA", "BSS", "*UNKNOWN*" }; |
1da177e4 | 344 | flat_v2_reloc_t r; |
1b2ce442 NP |
345 | unsigned long __user *ptr; |
346 | unsigned long val; | |
13c3f50c | 347 | |
1da177e4 LT |
348 | r.value = rl; |
349 | #if defined(CONFIG_COLDFIRE) | |
1b2ce442 | 350 | ptr = (unsigned long __user *)(current->mm->start_code + r.reloc.offset); |
1da177e4 | 351 | #else |
1b2ce442 | 352 | ptr = (unsigned long __user *)(current->mm->start_data + r.reloc.offset); |
1da177e4 | 353 | #endif |
1b2ce442 | 354 | get_user(val, ptr); |
1da177e4 | 355 | |
4adbb6ac NP |
356 | pr_debug("Relocation of variable at DATASEG+%x " |
357 | "(address %p, currently %lx) into segment %s\n", | |
1b2ce442 | 358 | r.reloc.offset, ptr, val, segment[r.reloc.type]); |
13c3f50c | 359 | |
1da177e4 LT |
360 | switch (r.reloc.type) { |
361 | case OLD_FLAT_RELOC_TYPE_TEXT: | |
1b2ce442 | 362 | val += current->mm->start_code; |
1da177e4 LT |
363 | break; |
364 | case OLD_FLAT_RELOC_TYPE_DATA: | |
1b2ce442 | 365 | val += current->mm->start_data; |
1da177e4 LT |
366 | break; |
367 | case OLD_FLAT_RELOC_TYPE_BSS: | |
1b2ce442 | 368 | val += current->mm->end_data; |
1da177e4 LT |
369 | break; |
370 | default: | |
4adbb6ac | 371 | pr_err("Unknown relocation type=%x\n", r.reloc.type); |
1da177e4 LT |
372 | break; |
373 | } | |
1b2ce442 | 374 | put_user(val, ptr); |
1da177e4 | 375 | |
1b2ce442 | 376 | pr_debug("Relocation became %lx\n", val); |
13c3f50c | 377 | } |
cf9a566c | 378 | #endif /* CONFIG_BINFMT_FLAT_OLD */ |
1da177e4 LT |
379 | |
380 | /****************************************************************************/ | |
381 | ||
6045ab5f NC |
382 | static inline u32 __user *skip_got_header(u32 __user *rp) |
383 | { | |
384 | if (IS_ENABLED(CONFIG_RISCV)) { | |
385 | /* | |
386 | * RISC-V has a 16 byte GOT PLT header for elf64-riscv | |
387 | * and 8 byte GOT PLT header for elf32-riscv. | |
388 | * Skip the whole GOT PLT header, since it is reserved | |
389 | * for the dynamic linker (ld.so). | |
390 | */ | |
391 | u32 rp_val0, rp_val1; | |
392 | ||
393 | if (get_user(rp_val0, rp)) | |
394 | return rp; | |
395 | if (get_user(rp_val1, rp + 1)) | |
396 | return rp; | |
397 | ||
398 | if (rp_val0 == 0xffffffff && rp_val1 == 0xffffffff) | |
399 | rp += 4; | |
400 | else if (rp_val0 == 0xffffffff) | |
401 | rp += 2; | |
402 | } | |
403 | return rp; | |
404 | } | |
405 | ||
13c3f50c | 406 | static int load_flat_file(struct linux_binprm *bprm, |
70578ff3 | 407 | struct lib_info *libinfo, unsigned long *extra_stack) |
1da177e4 | 408 | { |
13c3f50c NP |
409 | struct flat_hdr *hdr; |
410 | unsigned long textpos, datapos, realdatastart; | |
468138d7 | 411 | u32 text_len, data_len, bss_len, stack_len, full_data, flags; |
13c3f50c | 412 | unsigned long len, memp, memp_size, extra, rlim; |
3b977718 CH |
413 | __be32 __user *reloc; |
414 | u32 __user *rp; | |
13c3f50c | 415 | int i, rev, relocs; |
1da177e4 LT |
416 | loff_t fpos; |
417 | unsigned long start_code, end_code; | |
13c3f50c | 418 | ssize_t result; |
1ad3dcc0 | 419 | int ret; |
1da177e4 LT |
420 | |
421 | hdr = ((struct flat_hdr *) bprm->buf); /* exec-header */ | |
1da177e4 LT |
422 | |
423 | text_len = ntohl(hdr->data_start); | |
424 | data_len = ntohl(hdr->data_end) - ntohl(hdr->data_start); | |
425 | bss_len = ntohl(hdr->bss_end) - ntohl(hdr->data_end); | |
426 | stack_len = ntohl(hdr->stack_size); | |
427 | if (extra_stack) { | |
428 | stack_len += *extra_stack; | |
429 | *extra_stack = stack_len; | |
430 | } | |
431 | relocs = ntohl(hdr->reloc_count); | |
432 | flags = ntohl(hdr->flags); | |
433 | rev = ntohl(hdr->rev); | |
3dc20cb2 | 434 | full_data = data_len + relocs * sizeof(unsigned long); |
1da177e4 | 435 | |
845884d3 | 436 | if (strncmp(hdr->magic, "bFLT", 4)) { |
1da177e4 | 437 | /* |
e2a366dc MF |
438 | * Previously, here was a printk to tell people |
439 | * "BINFMT_FLAT: bad header magic". | |
440 | * But for the kernel which also use ELF FD-PIC format, this | |
441 | * error message is confusing. | |
1da177e4 | 442 | * because a lot of people do not manage to produce good |
1da177e4 | 443 | */ |
1ad3dcc0 LY |
444 | ret = -ENOEXEC; |
445 | goto err; | |
845884d3 GU |
446 | } |
447 | ||
448 | if (flags & FLAT_FLAG_KTRACE) | |
4adbb6ac | 449 | pr_info("Loading file: %s\n", bprm->filename); |
845884d3 | 450 | |
cf9a566c | 451 | #ifdef CONFIG_BINFMT_FLAT_OLD |
845884d3 | 452 | if (rev != FLAT_VERSION && rev != OLD_FLAT_VERSION) { |
4adbb6ac NP |
453 | pr_err("bad flat file version 0x%x (supported 0x%lx and 0x%lx)\n", |
454 | rev, FLAT_VERSION, OLD_FLAT_VERSION); | |
1ad3dcc0 LY |
455 | ret = -ENOEXEC; |
456 | goto err; | |
1da177e4 | 457 | } |
13c3f50c | 458 | |
cf9a566c CH |
459 | /* |
460 | * fix up the flags for the older format, there were all kinds | |
461 | * of endian hacks, this only works for the simple cases | |
462 | */ | |
463 | if (rev == OLD_FLAT_VERSION && | |
464 | (flags || IS_ENABLED(CONFIG_BINFMT_FLAT_OLD_ALWAYS_RAM))) | |
465 | flags = FLAT_FLAG_RAM; | |
466 | ||
467 | #else /* CONFIG_BINFMT_FLAT_OLD */ | |
468 | if (rev != FLAT_VERSION) { | |
469 | pr_err("bad flat file version 0x%x (supported 0x%lx)\n", | |
470 | rev, FLAT_VERSION); | |
471 | ret = -ENOEXEC; | |
472 | goto err; | |
473 | } | |
474 | #endif /* !CONFIG_BINFMT_FLAT_OLD */ | |
475 | ||
c995ee28 NP |
476 | /* |
477 | * Make sure the header params are sane. | |
478 | * 28 bits (256 MB) is way more than reasonable in this case. | |
479 | * If some top bits are set we have probable binary corruption. | |
480 | */ | |
481 | if ((text_len | data_len | bss_len | stack_len | full_data) >> 28) { | |
482 | pr_err("bad header\n"); | |
483 | ret = -ENOEXEC; | |
484 | goto err; | |
485 | } | |
486 | ||
1da177e4 LT |
487 | #ifndef CONFIG_BINFMT_ZFLAT |
488 | if (flags & (FLAT_FLAG_GZIP|FLAT_FLAG_GZDATA)) { | |
4adbb6ac | 489 | pr_err("Support for ZFLAT executables is not enabled.\n"); |
1ad3dcc0 LY |
490 | ret = -ENOEXEC; |
491 | goto err; | |
1da177e4 LT |
492 | } |
493 | #endif | |
494 | ||
495 | /* | |
496 | * Check initial limits. This avoids letting people circumvent | |
497 | * size limits imposed on them by creating programs with large | |
498 | * arrays in the data or bss. | |
499 | */ | |
d554ed89 | 500 | rlim = rlimit(RLIMIT_DATA); |
1da177e4 LT |
501 | if (rlim >= RLIM_INFINITY) |
502 | rlim = ~0; | |
1ad3dcc0 LY |
503 | if (data_len + bss_len > rlim) { |
504 | ret = -ENOMEM; | |
505 | goto err; | |
506 | } | |
507 | ||
1da177e4 | 508 | /* Flush all traces of the currently running executable */ |
70578ff3 EB |
509 | ret = begin_new_exec(bprm); |
510 | if (ret) | |
511 | goto err; | |
1da177e4 | 512 | |
70578ff3 EB |
513 | /* OK, This is the point of no return */ |
514 | set_personality(PER_LINUX_32BIT); | |
515 | setup_new_exec(bprm); | |
1da177e4 LT |
516 | |
517 | /* | |
518 | * calculate the extra space we need to map in | |
519 | */ | |
0e647c04 AM |
520 | extra = max_t(unsigned long, bss_len + stack_len, |
521 | relocs * sizeof(unsigned long)); | |
1da177e4 LT |
522 | |
523 | /* | |
524 | * there are a couple of cases here, the separate code/data | |
525 | * case, and then the fully copied to RAM case which lumps | |
526 | * it all together. | |
527 | */ | |
015feacf | 528 | if (!IS_ENABLED(CONFIG_MMU) && !(flags & (FLAT_FLAG_RAM|FLAT_FLAG_GZIP))) { |
1da177e4 LT |
529 | /* |
530 | * this should give us a ROM ptr, but if it doesn't we don't | |
531 | * really care | |
532 | */ | |
4adbb6ac | 533 | pr_debug("ROM mapping of file (we hope)\n"); |
1da177e4 | 534 | |
6be5ceb0 | 535 | textpos = vm_mmap(bprm->file, 0, text_len, PROT_READ|PROT_EXEC, |
a4eec6a3 | 536 | MAP_PRIVATE, 0); |
0b8c78f2 | 537 | if (!textpos || IS_ERR_VALUE(textpos)) { |
1ad3dcc0 | 538 | ret = textpos; |
13c3f50c NP |
539 | if (!textpos) |
540 | ret = -ENOMEM; | |
4adbb6ac | 541 | pr_err("Unable to mmap process text, errno %d\n", ret); |
df88912a | 542 | goto err; |
1da177e4 LT |
543 | } |
544 | ||
04d82a6d DLM |
545 | len = data_len + extra + |
546 | DATA_START_OFFSET_WORDS * sizeof(unsigned long); | |
0f3e442a | 547 | len = PAGE_ALIGN(len); |
13c3f50c | 548 | realdatastart = vm_mmap(NULL, 0, len, |
72613e5f | 549 | PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE, 0); |
1da177e4 | 550 | |
0b8c78f2 | 551 | if (realdatastart == 0 || IS_ERR_VALUE(realdatastart)) { |
13c3f50c | 552 | ret = realdatastart; |
1da177e4 | 553 | if (!realdatastart) |
13c3f50c | 554 | ret = -ENOMEM; |
4adbb6ac | 555 | pr_err("Unable to allocate RAM for process data, " |
13c3f50c | 556 | "errno %d\n", ret); |
7696e0c3 | 557 | vm_munmap(textpos, text_len); |
df88912a | 558 | goto err; |
1da177e4 | 559 | } |
2217b982 | 560 | datapos = ALIGN(realdatastart + |
04d82a6d | 561 | DATA_START_OFFSET_WORDS * sizeof(unsigned long), |
2217b982 | 562 | FLAT_DATA_ALIGN); |
1da177e4 | 563 | |
a8605423 | 564 | pr_debug("Allocated data+bss+stack (%u bytes): %lx\n", |
4adbb6ac | 565 | data_len + bss_len + stack_len, datapos); |
1da177e4 LT |
566 | |
567 | fpos = ntohl(hdr->data_start); | |
568 | #ifdef CONFIG_BINFMT_ZFLAT | |
569 | if (flags & FLAT_FLAG_GZDATA) { | |
13c3f50c | 570 | result = decompress_exec(bprm, fpos, (char *)datapos, |
3dc20cb2 | 571 | full_data, 0); |
1da177e4 LT |
572 | } else |
573 | #endif | |
574 | { | |
3dc20cb2 AV |
575 | result = read_code(bprm->file, datapos, fpos, |
576 | full_data); | |
1da177e4 | 577 | } |
0b8c78f2 | 578 | if (IS_ERR_VALUE(result)) { |
13c3f50c | 579 | ret = result; |
4adbb6ac | 580 | pr_err("Unable to read data+bss, errno %d\n", ret); |
7696e0c3 AV |
581 | vm_munmap(textpos, text_len); |
582 | vm_munmap(realdatastart, len); | |
df88912a | 583 | goto err; |
1da177e4 LT |
584 | } |
585 | ||
3b977718 | 586 | reloc = (__be32 __user *) |
13c3f50c | 587 | (datapos + (ntohl(hdr->reloc_start) - text_len)); |
1da177e4 | 588 | memp = realdatastart; |
0f3e442a | 589 | memp_size = len; |
1da177e4 LT |
590 | } else { |
591 | ||
04d82a6d DLM |
592 | len = text_len + data_len + extra + |
593 | DATA_START_OFFSET_WORDS * sizeof(u32); | |
0f3e442a | 594 | len = PAGE_ALIGN(len); |
13c3f50c | 595 | textpos = vm_mmap(NULL, 0, len, |
72613e5f | 596 | PROT_READ | PROT_EXEC | PROT_WRITE, MAP_PRIVATE, 0); |
72613e5f | 597 | |
0b8c78f2 | 598 | if (!textpos || IS_ERR_VALUE(textpos)) { |
1ad3dcc0 | 599 | ret = textpos; |
13c3f50c NP |
600 | if (!textpos) |
601 | ret = -ENOMEM; | |
4adbb6ac | 602 | pr_err("Unable to allocate RAM for process text/data, " |
13c3f50c | 603 | "errno %d\n", ret); |
df88912a | 604 | goto err; |
1da177e4 LT |
605 | } |
606 | ||
607 | realdatastart = textpos + ntohl(hdr->data_start); | |
2217b982 | 608 | datapos = ALIGN(realdatastart + |
04d82a6d | 609 | DATA_START_OFFSET_WORDS * sizeof(u32), |
2217b982 | 610 | FLAT_DATA_ALIGN); |
c3dc5bec | 611 | |
3b977718 | 612 | reloc = (__be32 __user *) |
c3dc5bec | 613 | (datapos + (ntohl(hdr->reloc_start) - text_len)); |
1da177e4 | 614 | memp = textpos; |
0f3e442a | 615 | memp_size = len; |
1da177e4 LT |
616 | #ifdef CONFIG_BINFMT_ZFLAT |
617 | /* | |
618 | * load it all in and treat it like a RAM load from now on | |
619 | */ | |
620 | if (flags & FLAT_FLAG_GZIP) { | |
472f95f3 | 621 | #ifndef CONFIG_MMU |
13c3f50c NP |
622 | result = decompress_exec(bprm, sizeof(struct flat_hdr), |
623 | (((char *)textpos) + sizeof(struct flat_hdr)), | |
3dc20cb2 | 624 | (text_len + full_data |
13c3f50c | 625 | - sizeof(struct flat_hdr)), |
1da177e4 | 626 | 0); |
2217b982 MF |
627 | memmove((void *) datapos, (void *) realdatastart, |
628 | full_data); | |
472f95f3 NP |
629 | #else |
630 | /* | |
631 | * This is used on MMU systems mainly for testing. | |
632 | * Let's use a kernel buffer to simplify things. | |
633 | */ | |
634 | long unz_text_len = text_len - sizeof(struct flat_hdr); | |
635 | long unz_len = unz_text_len + full_data; | |
636 | char *unz_data = vmalloc(unz_len); | |
637 | if (!unz_data) { | |
638 | result = -ENOMEM; | |
639 | } else { | |
640 | result = decompress_exec(bprm, sizeof(struct flat_hdr), | |
641 | unz_data, unz_len, 0); | |
642 | if (result == 0 && | |
643 | (copy_to_user((void __user *)textpos + sizeof(struct flat_hdr), | |
644 | unz_data, unz_text_len) || | |
645 | copy_to_user((void __user *)datapos, | |
646 | unz_data + unz_text_len, full_data))) | |
647 | result = -EFAULT; | |
648 | vfree(unz_data); | |
649 | } | |
650 | #endif | |
1da177e4 | 651 | } else if (flags & FLAT_FLAG_GZDATA) { |
3dc20cb2 | 652 | result = read_code(bprm->file, textpos, 0, text_len); |
472f95f3 NP |
653 | if (!IS_ERR_VALUE(result)) { |
654 | #ifndef CONFIG_MMU | |
1da177e4 | 655 | result = decompress_exec(bprm, text_len, (char *) datapos, |
3dc20cb2 | 656 | full_data, 0); |
472f95f3 NP |
657 | #else |
658 | char *unz_data = vmalloc(full_data); | |
659 | if (!unz_data) { | |
660 | result = -ENOMEM; | |
661 | } else { | |
662 | result = decompress_exec(bprm, text_len, | |
663 | unz_data, full_data, 0); | |
664 | if (result == 0 && | |
665 | copy_to_user((void __user *)datapos, | |
666 | unz_data, full_data)) | |
667 | result = -EFAULT; | |
668 | vfree(unz_data); | |
669 | } | |
1da177e4 | 670 | #endif |
472f95f3 NP |
671 | } |
672 | } else | |
673 | #endif /* CONFIG_BINFMT_ZFLAT */ | |
1da177e4 | 674 | { |
3dc20cb2 AV |
675 | result = read_code(bprm->file, textpos, 0, text_len); |
676 | if (!IS_ERR_VALUE(result)) | |
677 | result = read_code(bprm->file, datapos, | |
678 | ntohl(hdr->data_start), | |
679 | full_data); | |
1da177e4 | 680 | } |
0b8c78f2 | 681 | if (IS_ERR_VALUE(result)) { |
13c3f50c | 682 | ret = result; |
4adbb6ac | 683 | pr_err("Unable to read code+data+bss, errno %d\n", ret); |
2217b982 | 684 | vm_munmap(textpos, text_len + data_len + extra + |
04d82a6d | 685 | DATA_START_OFFSET_WORDS * sizeof(u32)); |
df88912a | 686 | goto err; |
1da177e4 LT |
687 | } |
688 | } | |
689 | ||
13c3f50c NP |
690 | start_code = textpos + sizeof(struct flat_hdr); |
691 | end_code = textpos + text_len; | |
692 | text_len -= sizeof(struct flat_hdr); /* the real code len */ | |
1da177e4 LT |
693 | |
694 | /* The main program needs a little extra setup in the task structure */ | |
70578ff3 EB |
695 | current->mm->start_code = start_code; |
696 | current->mm->end_code = end_code; | |
697 | current->mm->start_data = datapos; | |
698 | current->mm->end_data = datapos + data_len; | |
699 | /* | |
700 | * set up the brk stuff, uses any slack left in data/bss/stack | |
701 | * allocation. We put the brk after the bss (between the bss | |
702 | * and stack) like other platforms. | |
703 | * Userspace code relies on the stack pointer starting out at | |
704 | * an address right at the end of a page. | |
705 | */ | |
706 | current->mm->start_brk = datapos + data_len + bss_len; | |
707 | current->mm->brk = (current->mm->start_brk + 3) & ~3; | |
015feacf | 708 | #ifndef CONFIG_MMU |
70578ff3 | 709 | current->mm->context.end_brk = memp + memp_size - stack_len; |
015feacf | 710 | #endif |
1da177e4 | 711 | |
13c3f50c | 712 | if (flags & FLAT_FLAG_KTRACE) { |
4adbb6ac NP |
713 | pr_info("Mapping is %lx, Entry point is %x, data_start is %x\n", |
714 | textpos, 0x00ffffff&ntohl(hdr->entry), ntohl(hdr->data_start)); | |
715 | pr_info("%s %s: TEXT=%lx-%lx DATA=%lx-%lx BSS=%lx-%lx\n", | |
70578ff3 | 716 | "Load", bprm->filename, |
4adbb6ac NP |
717 | start_code, end_code, datapos, datapos + data_len, |
718 | datapos + data_len, (datapos + data_len + bss_len + 3) & ~3); | |
13c3f50c | 719 | } |
1da177e4 LT |
720 | |
721 | /* Store the current module values into the global library structure */ | |
70578ff3 EB |
722 | libinfo->lib_list[0].start_code = start_code; |
723 | libinfo->lib_list[0].start_data = datapos; | |
724 | libinfo->lib_list[0].start_brk = datapos + data_len + bss_len; | |
725 | libinfo->lib_list[0].text_len = text_len; | |
726 | libinfo->lib_list[0].loaded = 1; | |
727 | libinfo->lib_list[0].entry = (0x00ffffff & ntohl(hdr->entry)) + textpos; | |
728 | libinfo->lib_list[0].build_date = ntohl(hdr->build_date); | |
13c3f50c | 729 | |
1da177e4 LT |
730 | /* |
731 | * We just load the allocations into some temporary memory to | |
732 | * help simplify all this mumbo jumbo | |
733 | * | |
734 | * We've got two different sections of relocation entries. | |
25985edc | 735 | * The first is the GOT which resides at the beginning of the data segment |
1da177e4 LT |
736 | * and is terminated with a -1. This one can be relocated in place. |
737 | * The second is the extra relocation entries tacked after the image's | |
738 | * data segment. These require a little more processing as the entry is | |
739 | * really an offset into the image which contains an offset into the | |
740 | * image. | |
741 | */ | |
742 | if (flags & FLAT_FLAG_GOTPIC) { | |
6045ab5f NC |
743 | rp = skip_got_header((u32 __user *) datapos); |
744 | for (; ; rp++) { | |
468138d7 | 745 | u32 addr, rp_val; |
6e572ffe NP |
746 | if (get_user(rp_val, rp)) |
747 | return -EFAULT; | |
748 | if (rp_val == 0xffffffff) | |
749 | break; | |
750 | if (rp_val) { | |
70578ff3 | 751 | addr = calc_reloc(rp_val, libinfo); |
1ad3dcc0 LY |
752 | if (addr == RELOC_FAILED) { |
753 | ret = -ENOEXEC; | |
df88912a | 754 | goto err; |
1ad3dcc0 | 755 | } |
6e572ffe NP |
756 | if (put_user(addr, rp)) |
757 | return -EFAULT; | |
1da177e4 LT |
758 | } |
759 | } | |
760 | } | |
761 | ||
762 | /* | |
763 | * Now run through the relocation entries. | |
764 | * We've got to be careful here as C++ produces relocatable zero | |
765 | * entries in the constructor and destructor tables which are then | |
766 | * tested for being not zero (which will always occur unless we're | |
767 | * based from address zero). This causes an endless loop as __start | |
768 | * is at zero. The solution used is to not relocate zero addresses. | |
769 | * This has the negative side effect of not allowing a global data | |
770 | * reference to be statically initialised to _stext (I've moved | |
771 | * __start to address 4 so that is okay). | |
772 | */ | |
773 | if (rev > OLD_FLAT_VERSION) { | |
13c3f50c | 774 | for (i = 0; i < relocs; i++) { |
468138d7 | 775 | u32 addr, relval; |
3b977718 | 776 | __be32 tmp; |
1da177e4 | 777 | |
13c3f50c NP |
778 | /* |
779 | * Get the address of the pointer to be | |
780 | * relocated (of course, the address has to be | |
781 | * relocated first). | |
782 | */ | |
3b977718 | 783 | if (get_user(tmp, reloc + i)) |
6e572ffe | 784 | return -EFAULT; |
3b977718 | 785 | relval = ntohl(tmp); |
1da177e4 | 786 | addr = flat_get_relocate_addr(relval); |
70578ff3 | 787 | rp = (u32 __user *)calc_reloc(addr, libinfo); |
468138d7 | 788 | if (rp == (u32 __user *)RELOC_FAILED) { |
1ad3dcc0 | 789 | ret = -ENOEXEC; |
df88912a | 790 | goto err; |
1ad3dcc0 | 791 | } |
1da177e4 LT |
792 | |
793 | /* Get the pointer's value. */ | |
6843d8aa | 794 | ret = flat_get_addr_from_rp(rp, relval, flags, &addr); |
468138d7 AV |
795 | if (unlikely(ret)) |
796 | goto err; | |
797 | ||
1da177e4 LT |
798 | if (addr != 0) { |
799 | /* | |
800 | * Do the relocation. PIC relocs in the data section are | |
801 | * already in target order | |
802 | */ | |
3b977718 CH |
803 | if ((flags & FLAT_FLAG_GOTPIC) == 0) { |
804 | /* | |
805 | * Meh, the same value can have a different | |
806 | * byte order based on a flag.. | |
807 | */ | |
808 | addr = ntohl((__force __be32)addr); | |
809 | } | |
70578ff3 | 810 | addr = calc_reloc(addr, libinfo); |
1ad3dcc0 LY |
811 | if (addr == RELOC_FAILED) { |
812 | ret = -ENOEXEC; | |
df88912a | 813 | goto err; |
1ad3dcc0 | 814 | } |
1da177e4 LT |
815 | |
816 | /* Write back the relocated pointer. */ | |
468138d7 AV |
817 | ret = flat_put_addr_at_rp(rp, addr, relval); |
818 | if (unlikely(ret)) | |
819 | goto err; | |
1da177e4 LT |
820 | } |
821 | } | |
cf9a566c | 822 | #ifdef CONFIG_BINFMT_FLAT_OLD |
1da177e4 | 823 | } else { |
1b2ce442 | 824 | for (i = 0; i < relocs; i++) { |
3b977718 | 825 | __be32 relval; |
1b2ce442 NP |
826 | if (get_user(relval, reloc + i)) |
827 | return -EFAULT; | |
3b977718 | 828 | old_reloc(ntohl(relval)); |
1b2ce442 | 829 | } |
cf9a566c | 830 | #endif /* CONFIG_BINFMT_FLAT_OLD */ |
1da177e4 | 831 | } |
13c3f50c | 832 | |
79ef1e1f | 833 | flush_icache_user_range(start_code, end_code); |
1da177e4 LT |
834 | |
835 | /* zero the BSS, BRK and stack areas */ | |
467aa146 NP |
836 | if (clear_user((void __user *)(datapos + data_len), bss_len + |
837 | (memp + memp_size - stack_len - /* end brk */ | |
70578ff3 | 838 | libinfo->lib_list[0].start_brk) + /* start brk */ |
467aa146 NP |
839 | stack_len)) |
840 | return -EFAULT; | |
1da177e4 LT |
841 | |
842 | return 0; | |
1ad3dcc0 LY |
843 | err: |
844 | return ret; | |
1da177e4 LT |
845 | } |
846 | ||
847 | ||
1da177e4 LT |
848 | /****************************************************************************/ |
849 | ||
850 | /* | |
851 | * These are the functions used to load flat style executables and shared | |
852 | * libraries. There is no binary dependent code anywhere else. | |
853 | */ | |
854 | ||
13c3f50c | 855 | static int load_flat_binary(struct linux_binprm *bprm) |
1da177e4 LT |
856 | { |
857 | struct lib_info libinfo; | |
71613c3b | 858 | struct pt_regs *regs = current_pt_regs(); |
015feacf | 859 | unsigned long stack_len = 0; |
1da177e4 | 860 | unsigned long start_addr; |
1da177e4 LT |
861 | int res; |
862 | int i, j; | |
863 | ||
864 | memset(&libinfo, 0, sizeof(libinfo)); | |
13c3f50c | 865 | |
1da177e4 LT |
866 | /* |
867 | * We have to add the size of our arguments to our stack size | |
868 | * otherwise it's too easy for users to create stack overflows | |
869 | * by passing in a huge argument list. And yes, we have to be | |
870 | * pedantic and include space for the argv/envp array as it may have | |
871 | * a lot of entries. | |
872 | */ | |
015feacf NP |
873 | #ifndef CONFIG_MMU |
874 | stack_len += PAGE_SIZE * MAX_ARG_PAGES - bprm->p; /* the strings */ | |
875 | #endif | |
a97d157d NP |
876 | stack_len += (bprm->argc + 1) * sizeof(char *); /* the argv array */ |
877 | stack_len += (bprm->envc + 1) * sizeof(char *); /* the envp array */ | |
878 | stack_len = ALIGN(stack_len, FLAT_STACK_ALIGN); | |
13c3f50c | 879 | |
70578ff3 | 880 | res = load_flat_file(bprm, &libinfo, &stack_len); |
287980e4 | 881 | if (res < 0) |
1da177e4 | 882 | return res; |
13c3f50c | 883 | |
1da177e4 | 884 | /* Update data segment pointers for all libraries */ |
3eb3cd59 | 885 | for (i = 0; i < MAX_SHARED_LIBS_UPDATE; i++) { |
af521f92 NP |
886 | if (!libinfo.lib_list[i].loaded) |
887 | continue; | |
888 | for (j = 0; j < MAX_SHARED_LIBS; j++) { | |
889 | unsigned long val = libinfo.lib_list[j].loaded ? | |
890 | libinfo.lib_list[j].start_data : UNLOADED_LIB; | |
891 | unsigned long __user *p = (unsigned long __user *) | |
892 | libinfo.lib_list[i].start_data; | |
893 | p -= j + 1; | |
894 | if (put_user(val, p)) | |
895 | return -EFAULT; | |
896 | } | |
897 | } | |
1da177e4 | 898 | |
1da177e4 LT |
899 | set_binfmt(&flat_format); |
900 | ||
015feacf NP |
901 | #ifdef CONFIG_MMU |
902 | res = setup_arg_pages(bprm, STACK_TOP, EXSTACK_DEFAULT); | |
903 | if (!res) | |
904 | res = create_flat_tables(bprm, bprm->p); | |
905 | #else | |
a97d157d NP |
906 | /* Stash our initial stack pointer into the mm structure */ |
907 | current->mm->start_stack = | |
908 | ((current->mm->context.end_brk + stack_len + 3) & ~3) - 4; | |
909 | pr_debug("sp=%lx\n", current->mm->start_stack); | |
1da177e4 | 910 | |
687fd773 | 911 | /* copy the arg pages onto the stack */ |
a97d157d NP |
912 | res = transfer_args_to_stack(bprm, ¤t->mm->start_stack); |
913 | if (!res) | |
914 | res = create_flat_tables(bprm, current->mm->start_stack); | |
015feacf | 915 | #endif |
687fd773 NP |
916 | if (res) |
917 | return res; | |
1da177e4 | 918 | |
1da177e4 LT |
919 | /* Fake some return addresses to ensure the call chain will |
920 | * initialise library in order for us. We are required to call | |
921 | * lib 1 first, then 2, ... and finally the main program (id 0). | |
922 | */ | |
923 | start_addr = libinfo.lib_list[0].entry; | |
924 | ||
74c27c43 TY |
925 | #ifdef FLAT_PLAT_INIT |
926 | FLAT_PLAT_INIT(regs); | |
927 | #endif | |
13c3f50c | 928 | |
b8383831 | 929 | finalize_exec(bprm); |
4adbb6ac NP |
930 | pr_debug("start_thread(regs=0x%p, entry=0x%lx, start_stack=0x%lx)\n", |
931 | regs, start_addr, current->mm->start_stack); | |
1da177e4 LT |
932 | start_thread(regs, start_addr, current->mm->start_stack); |
933 | ||
1da177e4 LT |
934 | return 0; |
935 | } | |
936 | ||
937 | /****************************************************************************/ | |
938 | ||
939 | static int __init init_flat_binfmt(void) | |
940 | { | |
8fc3dc5a AV |
941 | register_binfmt(&flat_format); |
942 | return 0; | |
1da177e4 | 943 | } |
1da177e4 | 944 | core_initcall(init_flat_binfmt); |
1da177e4 LT |
945 | |
946 | /****************************************************************************/ |