xref: /OK3568_Linux_fs/kernel/arch/x86/entry/vdso/vma.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Copyright 2007 Andi Kleen, SUSE Labs.
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * This contains most of the x86 vDSO kernel-side code.
6*4882a593Smuzhiyun  */
7*4882a593Smuzhiyun #include <linux/mm.h>
8*4882a593Smuzhiyun #include <linux/err.h>
9*4882a593Smuzhiyun #include <linux/sched.h>
10*4882a593Smuzhiyun #include <linux/sched/task_stack.h>
11*4882a593Smuzhiyun #include <linux/slab.h>
12*4882a593Smuzhiyun #include <linux/init.h>
13*4882a593Smuzhiyun #include <linux/random.h>
14*4882a593Smuzhiyun #include <linux/elf.h>
15*4882a593Smuzhiyun #include <linux/cpu.h>
16*4882a593Smuzhiyun #include <linux/ptrace.h>
17*4882a593Smuzhiyun #include <linux/time_namespace.h>
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #include <asm/pvclock.h>
20*4882a593Smuzhiyun #include <asm/vgtod.h>
21*4882a593Smuzhiyun #include <asm/proto.h>
22*4882a593Smuzhiyun #include <asm/vdso.h>
23*4882a593Smuzhiyun #include <asm/vvar.h>
24*4882a593Smuzhiyun #include <asm/tlb.h>
25*4882a593Smuzhiyun #include <asm/page.h>
26*4882a593Smuzhiyun #include <asm/desc.h>
27*4882a593Smuzhiyun #include <asm/cpufeature.h>
28*4882a593Smuzhiyun #include <clocksource/hyperv_timer.h>
29*4882a593Smuzhiyun 
30*4882a593Smuzhiyun #undef _ASM_X86_VVAR_H
31*4882a593Smuzhiyun #define EMIT_VVAR(name, offset)	\
32*4882a593Smuzhiyun 	const size_t name ## _offset = offset;
33*4882a593Smuzhiyun #include <asm/vvar.h>
34*4882a593Smuzhiyun 
arch_get_vdso_data(void * vvar_page)35*4882a593Smuzhiyun struct vdso_data *arch_get_vdso_data(void *vvar_page)
36*4882a593Smuzhiyun {
37*4882a593Smuzhiyun 	return (struct vdso_data *)(vvar_page + _vdso_data_offset);
38*4882a593Smuzhiyun }
39*4882a593Smuzhiyun #undef EMIT_VVAR
40*4882a593Smuzhiyun 
41*4882a593Smuzhiyun unsigned int vclocks_used __read_mostly;
42*4882a593Smuzhiyun 
43*4882a593Smuzhiyun #if defined(CONFIG_X86_64)
44*4882a593Smuzhiyun unsigned int __read_mostly vdso64_enabled = 1;
45*4882a593Smuzhiyun #endif
46*4882a593Smuzhiyun 
init_vdso_image(const struct vdso_image * image)47*4882a593Smuzhiyun void __init init_vdso_image(const struct vdso_image *image)
48*4882a593Smuzhiyun {
49*4882a593Smuzhiyun 	BUG_ON(image->size % PAGE_SIZE != 0);
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun 	apply_alternatives((struct alt_instr *)(image->data + image->alt),
52*4882a593Smuzhiyun 			   (struct alt_instr *)(image->data + image->alt +
53*4882a593Smuzhiyun 						image->alt_len));
54*4882a593Smuzhiyun }
55*4882a593Smuzhiyun 
56*4882a593Smuzhiyun static const struct vm_special_mapping vvar_mapping;
57*4882a593Smuzhiyun struct linux_binprm;
58*4882a593Smuzhiyun 
vdso_fault(const struct vm_special_mapping * sm,struct vm_area_struct * vma,struct vm_fault * vmf)59*4882a593Smuzhiyun static vm_fault_t vdso_fault(const struct vm_special_mapping *sm,
60*4882a593Smuzhiyun 		      struct vm_area_struct *vma, struct vm_fault *vmf)
61*4882a593Smuzhiyun {
62*4882a593Smuzhiyun 	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
63*4882a593Smuzhiyun 
64*4882a593Smuzhiyun 	if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size)
65*4882a593Smuzhiyun 		return VM_FAULT_SIGBUS;
66*4882a593Smuzhiyun 
67*4882a593Smuzhiyun 	vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT));
68*4882a593Smuzhiyun 	get_page(vmf->page);
69*4882a593Smuzhiyun 	return 0;
70*4882a593Smuzhiyun }
71*4882a593Smuzhiyun 
vdso_fix_landing(const struct vdso_image * image,struct vm_area_struct * new_vma)72*4882a593Smuzhiyun static void vdso_fix_landing(const struct vdso_image *image,
73*4882a593Smuzhiyun 		struct vm_area_struct *new_vma)
74*4882a593Smuzhiyun {
75*4882a593Smuzhiyun #if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
76*4882a593Smuzhiyun 	if (in_ia32_syscall() && image == &vdso_image_32) {
77*4882a593Smuzhiyun 		struct pt_regs *regs = current_pt_regs();
78*4882a593Smuzhiyun 		unsigned long vdso_land = image->sym_int80_landing_pad;
79*4882a593Smuzhiyun 		unsigned long old_land_addr = vdso_land +
80*4882a593Smuzhiyun 			(unsigned long)current->mm->context.vdso;
81*4882a593Smuzhiyun 
82*4882a593Smuzhiyun 		/* Fixing userspace landing - look at do_fast_syscall_32 */
83*4882a593Smuzhiyun 		if (regs->ip == old_land_addr)
84*4882a593Smuzhiyun 			regs->ip = new_vma->vm_start + vdso_land;
85*4882a593Smuzhiyun 	}
86*4882a593Smuzhiyun #endif
87*4882a593Smuzhiyun }
88*4882a593Smuzhiyun 
vdso_mremap(const struct vm_special_mapping * sm,struct vm_area_struct * new_vma)89*4882a593Smuzhiyun static int vdso_mremap(const struct vm_special_mapping *sm,
90*4882a593Smuzhiyun 		struct vm_area_struct *new_vma)
91*4882a593Smuzhiyun {
92*4882a593Smuzhiyun 	unsigned long new_size = new_vma->vm_end - new_vma->vm_start;
93*4882a593Smuzhiyun 	const struct vdso_image *image = current->mm->context.vdso_image;
94*4882a593Smuzhiyun 
95*4882a593Smuzhiyun 	if (image->size != new_size)
96*4882a593Smuzhiyun 		return -EINVAL;
97*4882a593Smuzhiyun 
98*4882a593Smuzhiyun 	vdso_fix_landing(image, new_vma);
99*4882a593Smuzhiyun 	current->mm->context.vdso = (void __user *)new_vma->vm_start;
100*4882a593Smuzhiyun 
101*4882a593Smuzhiyun 	return 0;
102*4882a593Smuzhiyun }
103*4882a593Smuzhiyun 
vvar_mremap(const struct vm_special_mapping * sm,struct vm_area_struct * new_vma)104*4882a593Smuzhiyun static int vvar_mremap(const struct vm_special_mapping *sm,
105*4882a593Smuzhiyun 		struct vm_area_struct *new_vma)
106*4882a593Smuzhiyun {
107*4882a593Smuzhiyun 	const struct vdso_image *image = new_vma->vm_mm->context.vdso_image;
108*4882a593Smuzhiyun 	unsigned long new_size = new_vma->vm_end - new_vma->vm_start;
109*4882a593Smuzhiyun 
110*4882a593Smuzhiyun 	if (new_size != -image->sym_vvar_start)
111*4882a593Smuzhiyun 		return -EINVAL;
112*4882a593Smuzhiyun 
113*4882a593Smuzhiyun 	return 0;
114*4882a593Smuzhiyun }
115*4882a593Smuzhiyun 
116*4882a593Smuzhiyun #ifdef CONFIG_TIME_NS
find_timens_vvar_page(struct vm_area_struct * vma)117*4882a593Smuzhiyun static struct page *find_timens_vvar_page(struct vm_area_struct *vma)
118*4882a593Smuzhiyun {
119*4882a593Smuzhiyun 	if (likely(vma->vm_mm == current->mm))
120*4882a593Smuzhiyun 		return current->nsproxy->time_ns->vvar_page;
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun 	/*
123*4882a593Smuzhiyun 	 * VM_PFNMAP | VM_IO protect .fault() handler from being called
124*4882a593Smuzhiyun 	 * through interfaces like /proc/$pid/mem or
125*4882a593Smuzhiyun 	 * process_vm_{readv,writev}() as long as there's no .access()
126*4882a593Smuzhiyun 	 * in special_mapping_vmops().
127*4882a593Smuzhiyun 	 * For more details check_vma_flags() and __access_remote_vm()
128*4882a593Smuzhiyun 	 */
129*4882a593Smuzhiyun 
130*4882a593Smuzhiyun 	WARN(1, "vvar_page accessed remotely");
131*4882a593Smuzhiyun 
132*4882a593Smuzhiyun 	return NULL;
133*4882a593Smuzhiyun }
134*4882a593Smuzhiyun 
135*4882a593Smuzhiyun /*
136*4882a593Smuzhiyun  * The vvar page layout depends on whether a task belongs to the root or
137*4882a593Smuzhiyun  * non-root time namespace. Whenever a task changes its namespace, the VVAR
138*4882a593Smuzhiyun  * page tables are cleared and then they will re-faulted with a
139*4882a593Smuzhiyun  * corresponding layout.
140*4882a593Smuzhiyun  * See also the comment near timens_setup_vdso_data() for details.
141*4882a593Smuzhiyun  */
vdso_join_timens(struct task_struct * task,struct time_namespace * ns)142*4882a593Smuzhiyun int vdso_join_timens(struct task_struct *task, struct time_namespace *ns)
143*4882a593Smuzhiyun {
144*4882a593Smuzhiyun 	struct mm_struct *mm = task->mm;
145*4882a593Smuzhiyun 	struct vm_area_struct *vma;
146*4882a593Smuzhiyun 
147*4882a593Smuzhiyun 	mmap_read_lock(mm);
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	for (vma = mm->mmap; vma; vma = vma->vm_next) {
150*4882a593Smuzhiyun 		unsigned long size = vma->vm_end - vma->vm_start;
151*4882a593Smuzhiyun 
152*4882a593Smuzhiyun 		if (vma_is_special_mapping(vma, &vvar_mapping))
153*4882a593Smuzhiyun 			zap_page_range(vma, vma->vm_start, size);
154*4882a593Smuzhiyun 	}
155*4882a593Smuzhiyun 
156*4882a593Smuzhiyun 	mmap_read_unlock(mm);
157*4882a593Smuzhiyun 	return 0;
158*4882a593Smuzhiyun }
159*4882a593Smuzhiyun #else
find_timens_vvar_page(struct vm_area_struct * vma)160*4882a593Smuzhiyun static inline struct page *find_timens_vvar_page(struct vm_area_struct *vma)
161*4882a593Smuzhiyun {
162*4882a593Smuzhiyun 	return NULL;
163*4882a593Smuzhiyun }
164*4882a593Smuzhiyun #endif
165*4882a593Smuzhiyun 
vvar_fault(const struct vm_special_mapping * sm,struct vm_area_struct * vma,struct vm_fault * vmf)166*4882a593Smuzhiyun static vm_fault_t vvar_fault(const struct vm_special_mapping *sm,
167*4882a593Smuzhiyun 		      struct vm_area_struct *vma, struct vm_fault *vmf)
168*4882a593Smuzhiyun {
169*4882a593Smuzhiyun 	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
170*4882a593Smuzhiyun 	unsigned long pfn;
171*4882a593Smuzhiyun 	long sym_offset;
172*4882a593Smuzhiyun 
173*4882a593Smuzhiyun 	if (!image)
174*4882a593Smuzhiyun 		return VM_FAULT_SIGBUS;
175*4882a593Smuzhiyun 
176*4882a593Smuzhiyun 	sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) +
177*4882a593Smuzhiyun 		image->sym_vvar_start;
178*4882a593Smuzhiyun 
179*4882a593Smuzhiyun 	/*
180*4882a593Smuzhiyun 	 * Sanity check: a symbol offset of zero means that the page
181*4882a593Smuzhiyun 	 * does not exist for this vdso image, not that the page is at
182*4882a593Smuzhiyun 	 * offset zero relative to the text mapping.  This should be
183*4882a593Smuzhiyun 	 * impossible here, because sym_offset should only be zero for
184*4882a593Smuzhiyun 	 * the page past the end of the vvar mapping.
185*4882a593Smuzhiyun 	 */
186*4882a593Smuzhiyun 	if (sym_offset == 0)
187*4882a593Smuzhiyun 		return VM_FAULT_SIGBUS;
188*4882a593Smuzhiyun 
189*4882a593Smuzhiyun 	if (sym_offset == image->sym_vvar_page) {
190*4882a593Smuzhiyun 		struct page *timens_page = find_timens_vvar_page(vma);
191*4882a593Smuzhiyun 
192*4882a593Smuzhiyun 		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun 		/*
195*4882a593Smuzhiyun 		 * If a task belongs to a time namespace then a namespace
196*4882a593Smuzhiyun 		 * specific VVAR is mapped with the sym_vvar_page offset and
197*4882a593Smuzhiyun 		 * the real VVAR page is mapped with the sym_timens_page
198*4882a593Smuzhiyun 		 * offset.
199*4882a593Smuzhiyun 		 * See also the comment near timens_setup_vdso_data().
200*4882a593Smuzhiyun 		 */
201*4882a593Smuzhiyun 		if (timens_page) {
202*4882a593Smuzhiyun 			unsigned long addr;
203*4882a593Smuzhiyun 			vm_fault_t err;
204*4882a593Smuzhiyun 
205*4882a593Smuzhiyun 			/*
206*4882a593Smuzhiyun 			 * Optimization: inside time namespace pre-fault
207*4882a593Smuzhiyun 			 * VVAR page too. As on timens page there are only
208*4882a593Smuzhiyun 			 * offsets for clocks on VVAR, it'll be faulted
209*4882a593Smuzhiyun 			 * shortly by VDSO code.
210*4882a593Smuzhiyun 			 */
211*4882a593Smuzhiyun 			addr = vmf->address + (image->sym_timens_page - sym_offset);
212*4882a593Smuzhiyun 			err = vmf_insert_pfn(vma, addr, pfn);
213*4882a593Smuzhiyun 			if (unlikely(err & VM_FAULT_ERROR))
214*4882a593Smuzhiyun 				return err;
215*4882a593Smuzhiyun 
216*4882a593Smuzhiyun 			pfn = page_to_pfn(timens_page);
217*4882a593Smuzhiyun 		}
218*4882a593Smuzhiyun 
219*4882a593Smuzhiyun 		return vmf_insert_pfn(vma, vmf->address, pfn);
220*4882a593Smuzhiyun 	} else if (sym_offset == image->sym_pvclock_page) {
221*4882a593Smuzhiyun 		struct pvclock_vsyscall_time_info *pvti =
222*4882a593Smuzhiyun 			pvclock_get_pvti_cpu0_va();
223*4882a593Smuzhiyun 		if (pvti && vclock_was_used(VDSO_CLOCKMODE_PVCLOCK)) {
224*4882a593Smuzhiyun 			return vmf_insert_pfn_prot(vma, vmf->address,
225*4882a593Smuzhiyun 					__pa(pvti) >> PAGE_SHIFT,
226*4882a593Smuzhiyun 					pgprot_decrypted(vma->vm_page_prot));
227*4882a593Smuzhiyun 		}
228*4882a593Smuzhiyun 	} else if (sym_offset == image->sym_hvclock_page) {
229*4882a593Smuzhiyun 		struct ms_hyperv_tsc_page *tsc_pg = hv_get_tsc_page();
230*4882a593Smuzhiyun 
231*4882a593Smuzhiyun 		if (tsc_pg && vclock_was_used(VDSO_CLOCKMODE_HVCLOCK))
232*4882a593Smuzhiyun 			return vmf_insert_pfn(vma, vmf->address,
233*4882a593Smuzhiyun 					virt_to_phys(tsc_pg) >> PAGE_SHIFT);
234*4882a593Smuzhiyun 	} else if (sym_offset == image->sym_timens_page) {
235*4882a593Smuzhiyun 		struct page *timens_page = find_timens_vvar_page(vma);
236*4882a593Smuzhiyun 
237*4882a593Smuzhiyun 		if (!timens_page)
238*4882a593Smuzhiyun 			return VM_FAULT_SIGBUS;
239*4882a593Smuzhiyun 
240*4882a593Smuzhiyun 		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
241*4882a593Smuzhiyun 		return vmf_insert_pfn(vma, vmf->address, pfn);
242*4882a593Smuzhiyun 	}
243*4882a593Smuzhiyun 
244*4882a593Smuzhiyun 	return VM_FAULT_SIGBUS;
245*4882a593Smuzhiyun }
246*4882a593Smuzhiyun 
247*4882a593Smuzhiyun static const struct vm_special_mapping vdso_mapping = {
248*4882a593Smuzhiyun 	.name = "[vdso]",
249*4882a593Smuzhiyun 	.fault = vdso_fault,
250*4882a593Smuzhiyun 	.mremap = vdso_mremap,
251*4882a593Smuzhiyun };
252*4882a593Smuzhiyun static const struct vm_special_mapping vvar_mapping = {
253*4882a593Smuzhiyun 	.name = "[vvar]",
254*4882a593Smuzhiyun 	.fault = vvar_fault,
255*4882a593Smuzhiyun 	.mremap = vvar_mremap,
256*4882a593Smuzhiyun };
257*4882a593Smuzhiyun 
258*4882a593Smuzhiyun /*
259*4882a593Smuzhiyun  * Add vdso and vvar mappings to current process.
260*4882a593Smuzhiyun  * @image          - blob to map
261*4882a593Smuzhiyun  * @addr           - request a specific address (zero to map at free addr)
262*4882a593Smuzhiyun  */
map_vdso(const struct vdso_image * image,unsigned long addr)263*4882a593Smuzhiyun static int map_vdso(const struct vdso_image *image, unsigned long addr)
264*4882a593Smuzhiyun {
265*4882a593Smuzhiyun 	struct mm_struct *mm = current->mm;
266*4882a593Smuzhiyun 	struct vm_area_struct *vma;
267*4882a593Smuzhiyun 	unsigned long text_start;
268*4882a593Smuzhiyun 	int ret = 0;
269*4882a593Smuzhiyun 
270*4882a593Smuzhiyun 	if (mmap_write_lock_killable(mm))
271*4882a593Smuzhiyun 		return -EINTR;
272*4882a593Smuzhiyun 
273*4882a593Smuzhiyun 	addr = get_unmapped_area(NULL, addr,
274*4882a593Smuzhiyun 				 image->size - image->sym_vvar_start, 0, 0);
275*4882a593Smuzhiyun 	if (IS_ERR_VALUE(addr)) {
276*4882a593Smuzhiyun 		ret = addr;
277*4882a593Smuzhiyun 		goto up_fail;
278*4882a593Smuzhiyun 	}
279*4882a593Smuzhiyun 
280*4882a593Smuzhiyun 	text_start = addr - image->sym_vvar_start;
281*4882a593Smuzhiyun 
282*4882a593Smuzhiyun 	/*
283*4882a593Smuzhiyun 	 * MAYWRITE to allow gdb to COW and set breakpoints
284*4882a593Smuzhiyun 	 */
285*4882a593Smuzhiyun 	vma = _install_special_mapping(mm,
286*4882a593Smuzhiyun 				       text_start,
287*4882a593Smuzhiyun 				       image->size,
288*4882a593Smuzhiyun 				       VM_READ|VM_EXEC|
289*4882a593Smuzhiyun 				       VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
290*4882a593Smuzhiyun 				       &vdso_mapping);
291*4882a593Smuzhiyun 
292*4882a593Smuzhiyun 	if (IS_ERR(vma)) {
293*4882a593Smuzhiyun 		ret = PTR_ERR(vma);
294*4882a593Smuzhiyun 		goto up_fail;
295*4882a593Smuzhiyun 	}
296*4882a593Smuzhiyun 
297*4882a593Smuzhiyun 	vma = _install_special_mapping(mm,
298*4882a593Smuzhiyun 				       addr,
299*4882a593Smuzhiyun 				       -image->sym_vvar_start,
300*4882a593Smuzhiyun 				       VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
301*4882a593Smuzhiyun 				       VM_PFNMAP,
302*4882a593Smuzhiyun 				       &vvar_mapping);
303*4882a593Smuzhiyun 
304*4882a593Smuzhiyun 	if (IS_ERR(vma)) {
305*4882a593Smuzhiyun 		ret = PTR_ERR(vma);
306*4882a593Smuzhiyun 		do_munmap(mm, text_start, image->size, NULL);
307*4882a593Smuzhiyun 	} else {
308*4882a593Smuzhiyun 		current->mm->context.vdso = (void __user *)text_start;
309*4882a593Smuzhiyun 		current->mm->context.vdso_image = image;
310*4882a593Smuzhiyun 	}
311*4882a593Smuzhiyun 
312*4882a593Smuzhiyun up_fail:
313*4882a593Smuzhiyun 	mmap_write_unlock(mm);
314*4882a593Smuzhiyun 	return ret;
315*4882a593Smuzhiyun }
316*4882a593Smuzhiyun 
317*4882a593Smuzhiyun #ifdef CONFIG_X86_64
318*4882a593Smuzhiyun /*
319*4882a593Smuzhiyun  * Put the vdso above the (randomized) stack with another randomized
320*4882a593Smuzhiyun  * offset.  This way there is no hole in the middle of address space.
321*4882a593Smuzhiyun  * To save memory make sure it is still in the same PTE as the stack
322*4882a593Smuzhiyun  * top.  This doesn't give that many random bits.
323*4882a593Smuzhiyun  *
324*4882a593Smuzhiyun  * Note that this algorithm is imperfect: the distribution of the vdso
325*4882a593Smuzhiyun  * start address within a PMD is biased toward the end.
326*4882a593Smuzhiyun  *
327*4882a593Smuzhiyun  * Only used for the 64-bit and x32 vdsos.
328*4882a593Smuzhiyun  */
vdso_addr(unsigned long start,unsigned len)329*4882a593Smuzhiyun static unsigned long vdso_addr(unsigned long start, unsigned len)
330*4882a593Smuzhiyun {
331*4882a593Smuzhiyun 	unsigned long addr, end;
332*4882a593Smuzhiyun 	unsigned offset;
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun 	/*
335*4882a593Smuzhiyun 	 * Round up the start address.  It can start out unaligned as a result
336*4882a593Smuzhiyun 	 * of stack start randomization.
337*4882a593Smuzhiyun 	 */
338*4882a593Smuzhiyun 	start = PAGE_ALIGN(start);
339*4882a593Smuzhiyun 
340*4882a593Smuzhiyun 	/* Round the lowest possible end address up to a PMD boundary. */
341*4882a593Smuzhiyun 	end = (start + len + PMD_SIZE - 1) & PMD_MASK;
342*4882a593Smuzhiyun 	if (end >= TASK_SIZE_MAX)
343*4882a593Smuzhiyun 		end = TASK_SIZE_MAX;
344*4882a593Smuzhiyun 	end -= len;
345*4882a593Smuzhiyun 
346*4882a593Smuzhiyun 	if (end > start) {
347*4882a593Smuzhiyun 		offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1);
348*4882a593Smuzhiyun 		addr = start + (offset << PAGE_SHIFT);
349*4882a593Smuzhiyun 	} else {
350*4882a593Smuzhiyun 		addr = start;
351*4882a593Smuzhiyun 	}
352*4882a593Smuzhiyun 
353*4882a593Smuzhiyun 	/*
354*4882a593Smuzhiyun 	 * Forcibly align the final address in case we have a hardware
355*4882a593Smuzhiyun 	 * issue that requires alignment for performance reasons.
356*4882a593Smuzhiyun 	 */
357*4882a593Smuzhiyun 	addr = align_vdso_addr(addr);
358*4882a593Smuzhiyun 
359*4882a593Smuzhiyun 	return addr;
360*4882a593Smuzhiyun }
361*4882a593Smuzhiyun 
map_vdso_randomized(const struct vdso_image * image)362*4882a593Smuzhiyun static int map_vdso_randomized(const struct vdso_image *image)
363*4882a593Smuzhiyun {
364*4882a593Smuzhiyun 	unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start);
365*4882a593Smuzhiyun 
366*4882a593Smuzhiyun 	return map_vdso(image, addr);
367*4882a593Smuzhiyun }
368*4882a593Smuzhiyun #endif
369*4882a593Smuzhiyun 
map_vdso_once(const struct vdso_image * image,unsigned long addr)370*4882a593Smuzhiyun int map_vdso_once(const struct vdso_image *image, unsigned long addr)
371*4882a593Smuzhiyun {
372*4882a593Smuzhiyun 	struct mm_struct *mm = current->mm;
373*4882a593Smuzhiyun 	struct vm_area_struct *vma;
374*4882a593Smuzhiyun 
375*4882a593Smuzhiyun 	mmap_write_lock(mm);
376*4882a593Smuzhiyun 	/*
377*4882a593Smuzhiyun 	 * Check if we have already mapped vdso blob - fail to prevent
378*4882a593Smuzhiyun 	 * abusing from userspace install_speciall_mapping, which may
379*4882a593Smuzhiyun 	 * not do accounting and rlimit right.
380*4882a593Smuzhiyun 	 * We could search vma near context.vdso, but it's a slowpath,
381*4882a593Smuzhiyun 	 * so let's explicitly check all VMAs to be completely sure.
382*4882a593Smuzhiyun 	 */
383*4882a593Smuzhiyun 	for (vma = mm->mmap; vma; vma = vma->vm_next) {
384*4882a593Smuzhiyun 		if (vma_is_special_mapping(vma, &vdso_mapping) ||
385*4882a593Smuzhiyun 				vma_is_special_mapping(vma, &vvar_mapping)) {
386*4882a593Smuzhiyun 			mmap_write_unlock(mm);
387*4882a593Smuzhiyun 			return -EEXIST;
388*4882a593Smuzhiyun 		}
389*4882a593Smuzhiyun 	}
390*4882a593Smuzhiyun 	mmap_write_unlock(mm);
391*4882a593Smuzhiyun 
392*4882a593Smuzhiyun 	return map_vdso(image, addr);
393*4882a593Smuzhiyun }
394*4882a593Smuzhiyun 
395*4882a593Smuzhiyun #if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
load_vdso32(void)396*4882a593Smuzhiyun static int load_vdso32(void)
397*4882a593Smuzhiyun {
398*4882a593Smuzhiyun 	if (vdso32_enabled != 1)  /* Other values all mean "disabled" */
399*4882a593Smuzhiyun 		return 0;
400*4882a593Smuzhiyun 
401*4882a593Smuzhiyun 	return map_vdso(&vdso_image_32, 0);
402*4882a593Smuzhiyun }
403*4882a593Smuzhiyun #endif
404*4882a593Smuzhiyun 
405*4882a593Smuzhiyun #ifdef CONFIG_X86_64
arch_setup_additional_pages(struct linux_binprm * bprm,int uses_interp)406*4882a593Smuzhiyun int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
407*4882a593Smuzhiyun {
408*4882a593Smuzhiyun 	if (!vdso64_enabled)
409*4882a593Smuzhiyun 		return 0;
410*4882a593Smuzhiyun 
411*4882a593Smuzhiyun 	return map_vdso_randomized(&vdso_image_64);
412*4882a593Smuzhiyun }
413*4882a593Smuzhiyun 
414*4882a593Smuzhiyun #ifdef CONFIG_COMPAT
compat_arch_setup_additional_pages(struct linux_binprm * bprm,int uses_interp)415*4882a593Smuzhiyun int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
416*4882a593Smuzhiyun 				       int uses_interp)
417*4882a593Smuzhiyun {
418*4882a593Smuzhiyun #ifdef CONFIG_X86_X32_ABI
419*4882a593Smuzhiyun 	if (test_thread_flag(TIF_X32)) {
420*4882a593Smuzhiyun 		if (!vdso64_enabled)
421*4882a593Smuzhiyun 			return 0;
422*4882a593Smuzhiyun 		return map_vdso_randomized(&vdso_image_x32);
423*4882a593Smuzhiyun 	}
424*4882a593Smuzhiyun #endif
425*4882a593Smuzhiyun #ifdef CONFIG_IA32_EMULATION
426*4882a593Smuzhiyun 	return load_vdso32();
427*4882a593Smuzhiyun #else
428*4882a593Smuzhiyun 	return 0;
429*4882a593Smuzhiyun #endif
430*4882a593Smuzhiyun }
431*4882a593Smuzhiyun #endif
432*4882a593Smuzhiyun #else
arch_setup_additional_pages(struct linux_binprm * bprm,int uses_interp)433*4882a593Smuzhiyun int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
434*4882a593Smuzhiyun {
435*4882a593Smuzhiyun 	return load_vdso32();
436*4882a593Smuzhiyun }
437*4882a593Smuzhiyun #endif
438*4882a593Smuzhiyun 
439*4882a593Smuzhiyun #ifdef CONFIG_X86_64
vdso_setup(char * s)440*4882a593Smuzhiyun static __init int vdso_setup(char *s)
441*4882a593Smuzhiyun {
442*4882a593Smuzhiyun 	vdso64_enabled = simple_strtoul(s, NULL, 0);
443*4882a593Smuzhiyun 	return 1;
444*4882a593Smuzhiyun }
445*4882a593Smuzhiyun __setup("vdso=", vdso_setup);
446*4882a593Smuzhiyun 
init_vdso(void)447*4882a593Smuzhiyun static int __init init_vdso(void)
448*4882a593Smuzhiyun {
449*4882a593Smuzhiyun 	BUILD_BUG_ON(VDSO_CLOCKMODE_MAX >= 32);
450*4882a593Smuzhiyun 
451*4882a593Smuzhiyun 	init_vdso_image(&vdso_image_64);
452*4882a593Smuzhiyun 
453*4882a593Smuzhiyun #ifdef CONFIG_X86_X32_ABI
454*4882a593Smuzhiyun 	init_vdso_image(&vdso_image_x32);
455*4882a593Smuzhiyun #endif
456*4882a593Smuzhiyun 
457*4882a593Smuzhiyun 	return 0;
458*4882a593Smuzhiyun }
459*4882a593Smuzhiyun subsys_initcall(init_vdso);
460*4882a593Smuzhiyun #endif /* CONFIG_X86_64 */
461