|  | // SPDX-License-Identifier: GPL-2.0 | 
|  | #include <linux/export.h> | 
|  | #include <linux/sched.h> | 
|  | #include <linux/personality.h> | 
|  | #include <linux/binfmts.h> | 
|  | #include <linux/elf.h> | 
|  | #include <linux/elf-fdpic.h> | 
|  | #include <asm/system_info.h> | 
|  |  | 
|  | int elf_check_arch(const struct elf32_hdr *x) | 
|  | { | 
|  | unsigned int eflags; | 
|  |  | 
|  | /* Make sure it's an ARM executable */ | 
|  | if (x->e_machine != EM_ARM) | 
|  | return 0; | 
|  |  | 
|  | /* Make sure the entry address is reasonable */ | 
|  | if (x->e_entry & 1) { | 
|  | if (!(elf_hwcap & HWCAP_THUMB)) | 
|  | return 0; | 
|  | } else if (x->e_entry & 3) | 
|  | return 0; | 
|  |  | 
|  | eflags = x->e_flags; | 
|  | if ((eflags & EF_ARM_EABI_MASK) == EF_ARM_EABI_UNKNOWN) { | 
|  | unsigned int flt_fmt; | 
|  |  | 
|  | /* APCS26 is only allowed if the CPU supports it */ | 
|  | if ((eflags & EF_ARM_APCS_26) && !(elf_hwcap & HWCAP_26BIT)) | 
|  | return 0; | 
|  |  | 
|  | flt_fmt = eflags & (EF_ARM_VFP_FLOAT | EF_ARM_SOFT_FLOAT); | 
|  |  | 
|  | /* VFP requires the supporting code */ | 
|  | if (flt_fmt == EF_ARM_VFP_FLOAT && !(elf_hwcap & HWCAP_VFP)) | 
|  | return 0; | 
|  | } | 
|  | return 1; | 
|  | } | 
|  | EXPORT_SYMBOL(elf_check_arch); | 
|  |  | 
|  | void elf_set_personality(const struct elf32_hdr *x) | 
|  | { | 
|  | unsigned int eflags = x->e_flags; | 
|  | unsigned int personality = current->personality & ~PER_MASK; | 
|  |  | 
|  | /* | 
|  | * We only support Linux ELF executables, so always set the | 
|  | * personality to LINUX. | 
|  | */ | 
|  | personality |= PER_LINUX; | 
|  |  | 
|  | /* | 
|  | * APCS-26 is only valid for OABI executables | 
|  | */ | 
|  | if ((eflags & EF_ARM_EABI_MASK) == EF_ARM_EABI_UNKNOWN && | 
|  | (eflags & EF_ARM_APCS_26)) | 
|  | personality &= ~ADDR_LIMIT_32BIT; | 
|  | else | 
|  | personality |= ADDR_LIMIT_32BIT; | 
|  |  | 
|  | set_personality(personality); | 
|  |  | 
|  | /* | 
|  | * Since the FPA coprocessor uses CP1 and CP2, and iWMMXt uses CP0 | 
|  | * and CP1, we only enable access to the iWMMXt coprocessor if the | 
|  | * binary is EABI or softfloat (and thus, guaranteed not to use | 
|  | * FPA instructions.) | 
|  | */ | 
|  | if (elf_hwcap & HWCAP_IWMMXT && | 
|  | eflags & (EF_ARM_EABI_MASK | EF_ARM_SOFT_FLOAT)) { | 
|  | set_thread_flag(TIF_USING_IWMMXT); | 
|  | } else { | 
|  | clear_thread_flag(TIF_USING_IWMMXT); | 
|  | } | 
|  | } | 
|  | EXPORT_SYMBOL(elf_set_personality); | 
|  |  | 
|  | /* | 
|  | * An executable for which elf_read_implies_exec() returns TRUE will | 
|  | * have the READ_IMPLIES_EXEC personality flag set automatically. | 
|  | * | 
|  | * The decision process for determining the results are: | 
|  | * | 
|  | *                 CPU: | lacks NX*  | has NX     | | 
|  | * ELF:                 |            |            | | 
|  | * ---------------------|------------|------------| | 
|  | * missing PT_GNU_STACK | exec-all   | exec-all   | | 
|  | * PT_GNU_STACK == RWX  | exec-all   | exec-stack | | 
|  | * PT_GNU_STACK == RW   | exec-all   | exec-none  | | 
|  | * | 
|  | *  exec-all  : all PROT_READ user mappings are executable, except when | 
|  | *              backed by files on a noexec-filesystem. | 
|  | *  exec-none : only PROT_EXEC user mappings are executable. | 
|  | *  exec-stack: only the stack and PROT_EXEC user mappings are executable. | 
|  | * | 
|  | *  *this column has no architectural effect: NX markings are ignored by | 
|  | *   hardware, but may have behavioral effects when "wants X" collides with | 
|  | *   "cannot be X" constraints in memory permission flags, as in | 
|  | *   https://lkml.kernel.org/r/20190418055759.GA3155@mellanox.com | 
|  | * | 
|  | */ | 
|  | int arm_elf_read_implies_exec(int executable_stack) | 
|  | { | 
|  | if (executable_stack == EXSTACK_DEFAULT) | 
|  | return 1; | 
|  | if (cpu_architecture() < CPU_ARCH_ARMv6) | 
|  | return 1; | 
|  | return 0; | 
|  | } | 
|  | EXPORT_SYMBOL(arm_elf_read_implies_exec); | 
|  |  | 
|  | #if defined(CONFIG_MMU) && defined(CONFIG_BINFMT_ELF_FDPIC) | 
|  |  | 
|  | void elf_fdpic_arch_lay_out_mm(struct elf_fdpic_params *exec_params, | 
|  | struct elf_fdpic_params *interp_params, | 
|  | unsigned long *start_stack, | 
|  | unsigned long *start_brk) | 
|  | { | 
|  | elf_set_personality(&exec_params->hdr); | 
|  |  | 
|  | exec_params->load_addr = 0x8000; | 
|  | interp_params->load_addr = ELF_ET_DYN_BASE; | 
|  | *start_stack = TASK_SIZE - SZ_16M; | 
|  |  | 
|  | if ((exec_params->flags & ELF_FDPIC_FLAG_ARRANGEMENT) == ELF_FDPIC_FLAG_INDEPENDENT) { | 
|  | exec_params->flags &= ~ELF_FDPIC_FLAG_ARRANGEMENT; | 
|  | exec_params->flags |= ELF_FDPIC_FLAG_CONSTDISP; | 
|  | } | 
|  | } | 
|  |  | 
|  | #endif |