Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 1 | /* |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 2 | * Copyright 2007 Andi Kleen, SUSE Labs. |
| 3 | * Subject to the GPL, v.2 |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 4 | * |
| 5 | * This contains most of the x86 vDSO kernel-side code. |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 6 | */ |
| 7 | #include <linux/mm.h> |
Alexey Dobriyan | 4e950f6 | 2007-07-30 02:36:13 +0400 | [diff] [blame] | 8 | #include <linux/err.h> |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 9 | #include <linux/sched.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 10 | #include <linux/slab.h> |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 11 | #include <linux/init.h> |
| 12 | #include <linux/random.h> |
Jaswinder Singh Rajput | 3fa89ca | 2009-04-12 20:37:25 +0530 | [diff] [blame] | 13 | #include <linux/elf.h> |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 14 | #include <linux/cpu.h> |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 15 | #include <linux/ptrace.h> |
Andy Lutomirski | cc1e24f | 2015-12-10 19:20:21 -0800 | [diff] [blame] | 16 | #include <asm/pvclock.h> |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 17 | #include <asm/vgtod.h> |
| 18 | #include <asm/proto.h> |
Roland McGrath | 7f3646a | 2008-01-30 13:30:41 +0100 | [diff] [blame] | 19 | #include <asm/vdso.h> |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 20 | #include <asm/vvar.h> |
Andy Lutomirski | aafade2 | 2011-07-21 15:47:10 -0400 | [diff] [blame] | 21 | #include <asm/page.h> |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 22 | #include <asm/desc.h> |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 23 | #include <asm/cpufeature.h> |
Roland McGrath | 7f3646a | 2008-01-30 13:30:41 +0100 | [diff] [blame] | 24 | |
Andy Lutomirski | b4b541a | 2014-03-17 23:22:08 +0100 | [diff] [blame] | 25 | #if defined(CONFIG_X86_64) |
Andy Lutomirski | 3d7ee96 | 2014-05-05 12:19:32 -0700 | [diff] [blame] | 26 | unsigned int __read_mostly vdso64_enabled = 1; |
Andy Lutomirski | b4b541a | 2014-03-17 23:22:08 +0100 | [diff] [blame] | 27 | #endif |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 28 | |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 29 | void __init init_vdso_image(const struct vdso_image *image) |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 30 | { |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 31 | BUG_ON(image->size % PAGE_SIZE != 0); |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 32 | |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 33 | apply_alternatives((struct alt_instr *)(image->data + image->alt), |
| 34 | (struct alt_instr *)(image->data + image->alt + |
| 35 | image->alt_len)); |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 36 | } |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 37 | |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 38 | struct linux_binprm; |
| 39 | |
Andy Lutomirski | 05ef76b | 2015-12-29 20:12:22 -0800 | [diff] [blame] | 40 | static int vdso_fault(const struct vm_special_mapping *sm, |
| 41 | struct vm_area_struct *vma, struct vm_fault *vmf) |
| 42 | { |
| 43 | const struct vdso_image *image = vma->vm_mm->context.vdso_image; |
| 44 | |
| 45 | if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size) |
| 46 | return VM_FAULT_SIGBUS; |
| 47 | |
| 48 | vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT)); |
| 49 | get_page(vmf->page); |
| 50 | return 0; |
| 51 | } |
| 52 | |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 53 | static void vdso_fix_landing(const struct vdso_image *image, |
| 54 | struct vm_area_struct *new_vma) |
| 55 | { |
| 56 | #if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION |
| 57 | if (in_ia32_syscall() && image == &vdso_image_32) { |
| 58 | struct pt_regs *regs = current_pt_regs(); |
| 59 | unsigned long vdso_land = image->sym_int80_landing_pad; |
| 60 | unsigned long old_land_addr = vdso_land + |
| 61 | (unsigned long)current->mm->context.vdso; |
| 62 | |
| 63 | /* Fixing userspace landing - look at do_fast_syscall_32 */ |
| 64 | if (regs->ip == old_land_addr) |
| 65 | regs->ip = new_vma->vm_start + vdso_land; |
| 66 | } |
| 67 | #endif |
| 68 | } |
| 69 | |
| 70 | static int vdso_mremap(const struct vm_special_mapping *sm, |
| 71 | struct vm_area_struct *new_vma) |
| 72 | { |
| 73 | unsigned long new_size = new_vma->vm_end - new_vma->vm_start; |
| 74 | const struct vdso_image *image = current->mm->context.vdso_image; |
| 75 | |
| 76 | if (image->size != new_size) |
| 77 | return -EINVAL; |
| 78 | |
| 79 | if (WARN_ON_ONCE(current->mm != new_vma->vm_mm)) |
| 80 | return -EFAULT; |
| 81 | |
| 82 | vdso_fix_landing(image, new_vma); |
| 83 | current->mm->context.vdso = (void __user *)new_vma->vm_start; |
| 84 | |
| 85 | return 0; |
| 86 | } |
Andy Lutomirski | 05ef76b | 2015-12-29 20:12:22 -0800 | [diff] [blame] | 87 | |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 88 | static int vvar_fault(const struct vm_special_mapping *sm, |
| 89 | struct vm_area_struct *vma, struct vm_fault *vmf) |
| 90 | { |
| 91 | const struct vdso_image *image = vma->vm_mm->context.vdso_image; |
| 92 | long sym_offset; |
| 93 | int ret = -EFAULT; |
| 94 | |
| 95 | if (!image) |
| 96 | return VM_FAULT_SIGBUS; |
| 97 | |
| 98 | sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) + |
| 99 | image->sym_vvar_start; |
| 100 | |
| 101 | /* |
| 102 | * Sanity check: a symbol offset of zero means that the page |
| 103 | * does not exist for this vdso image, not that the page is at |
| 104 | * offset zero relative to the text mapping. This should be |
| 105 | * impossible here, because sym_offset should only be zero for |
| 106 | * the page past the end of the vvar mapping. |
| 107 | */ |
| 108 | if (sym_offset == 0) |
| 109 | return VM_FAULT_SIGBUS; |
| 110 | |
| 111 | if (sym_offset == image->sym_vvar_page) { |
Jan Kara | 1a29d85 | 2016-12-14 15:07:01 -0800 | [diff] [blame^] | 112 | ret = vm_insert_pfn(vma, vmf->address, |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 113 | __pa_symbol(&__vvar_page) >> PAGE_SHIFT); |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 114 | } else if (sym_offset == image->sym_pvclock_page) { |
| 115 | struct pvclock_vsyscall_time_info *pvti = |
| 116 | pvclock_pvti_cpu0_va(); |
Andy Lutomirski | bd902c5 | 2015-12-29 20:12:24 -0800 | [diff] [blame] | 117 | if (pvti && vclock_was_used(VCLOCK_PVCLOCK)) { |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 118 | ret = vm_insert_pfn( |
| 119 | vma, |
Jan Kara | 1a29d85 | 2016-12-14 15:07:01 -0800 | [diff] [blame^] | 120 | vmf->address, |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 121 | __pa(pvti) >> PAGE_SHIFT); |
| 122 | } |
| 123 | } |
| 124 | |
| 125 | if (ret == 0 || ret == -EBUSY) |
| 126 | return VM_FAULT_NOPAGE; |
| 127 | |
| 128 | return VM_FAULT_SIGBUS; |
| 129 | } |
| 130 | |
Dmitry Safonov | 2eefd87 | 2016-09-05 16:33:05 +0300 | [diff] [blame] | 131 | static const struct vm_special_mapping vdso_mapping = { |
| 132 | .name = "[vdso]", |
| 133 | .fault = vdso_fault, |
| 134 | .mremap = vdso_mremap, |
| 135 | }; |
| 136 | static const struct vm_special_mapping vvar_mapping = { |
| 137 | .name = "[vvar]", |
| 138 | .fault = vvar_fault, |
| 139 | }; |
| 140 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 141 | /* |
| 142 | * Add vdso and vvar mappings to current process. |
| 143 | * @image - blob to map |
| 144 | * @addr - request a specific address (zero to map at free addr) |
| 145 | */ |
| 146 | static int map_vdso(const struct vdso_image *image, unsigned long addr) |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 147 | { |
| 148 | struct mm_struct *mm = current->mm; |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 149 | struct vm_area_struct *vma; |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 150 | unsigned long text_start; |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 151 | int ret = 0; |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 152 | |
Michal Hocko | 6904817 | 2016-05-23 16:25:54 -0700 | [diff] [blame] | 153 | if (down_write_killable(&mm->mmap_sem)) |
| 154 | return -EINTR; |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 155 | |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 156 | addr = get_unmapped_area(NULL, addr, |
| 157 | image->size - image->sym_vvar_start, 0, 0); |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 158 | if (IS_ERR_VALUE(addr)) { |
| 159 | ret = addr; |
| 160 | goto up_fail; |
| 161 | } |
| 162 | |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 163 | text_start = addr - image->sym_vvar_start; |
Peter Zijlstra | f7b6eb3 | 2009-06-05 14:04:51 +0200 | [diff] [blame] | 164 | |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 165 | /* |
| 166 | * MAYWRITE to allow gdb to COW and set breakpoints |
| 167 | */ |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 168 | vma = _install_special_mapping(mm, |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 169 | text_start, |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 170 | image->size, |
| 171 | VM_READ|VM_EXEC| |
| 172 | VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC, |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 173 | &vdso_mapping); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 174 | |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 175 | if (IS_ERR(vma)) { |
| 176 | ret = PTR_ERR(vma); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 177 | goto up_fail; |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 178 | } |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 179 | |
| 180 | vma = _install_special_mapping(mm, |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 181 | addr, |
| 182 | -image->sym_vvar_start, |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 183 | VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP| |
| 184 | VM_PFNMAP, |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 185 | &vvar_mapping); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 186 | |
| 187 | if (IS_ERR(vma)) { |
| 188 | ret = PTR_ERR(vma); |
Dmitry Safonov | e38447e | 2016-09-05 16:33:03 +0300 | [diff] [blame] | 189 | do_munmap(mm, text_start, image->size); |
Dmitry Safonov | 67dece7 | 2016-10-27 17:15:16 +0300 | [diff] [blame] | 190 | } else { |
| 191 | current->mm->context.vdso = (void __user *)text_start; |
| 192 | current->mm->context.vdso_image = image; |
Peter Zijlstra | f7b6eb3 | 2009-06-05 14:04:51 +0200 | [diff] [blame] | 193 | } |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 194 | |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 195 | up_fail: |
| 196 | up_write(&mm->mmap_sem); |
| 197 | return ret; |
| 198 | } |
| 199 | |
Ingo Molnar | 3947f49 | 2016-09-15 08:56:21 +0200 | [diff] [blame] | 200 | #ifdef CONFIG_X86_64 |
| 201 | /* |
| 202 | * Put the vdso above the (randomized) stack with another randomized |
| 203 | * offset. This way there is no hole in the middle of address space. |
| 204 | * To save memory make sure it is still in the same PTE as the stack |
| 205 | * top. This doesn't give that many random bits. |
| 206 | * |
| 207 | * Note that this algorithm is imperfect: the distribution of the vdso |
| 208 | * start address within a PMD is biased toward the end. |
| 209 | * |
| 210 | * Only used for the 64-bit and x32 vdsos. |
| 211 | */ |
| 212 | static unsigned long vdso_addr(unsigned long start, unsigned len) |
| 213 | { |
| 214 | unsigned long addr, end; |
| 215 | unsigned offset; |
| 216 | |
| 217 | /* |
| 218 | * Round up the start address. It can start out unaligned as a result |
| 219 | * of stack start randomization. |
| 220 | */ |
| 221 | start = PAGE_ALIGN(start); |
| 222 | |
| 223 | /* Round the lowest possible end address up to a PMD boundary. */ |
| 224 | end = (start + len + PMD_SIZE - 1) & PMD_MASK; |
| 225 | if (end >= TASK_SIZE_MAX) |
| 226 | end = TASK_SIZE_MAX; |
| 227 | end -= len; |
| 228 | |
| 229 | if (end > start) { |
| 230 | offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1); |
| 231 | addr = start + (offset << PAGE_SHIFT); |
| 232 | } else { |
| 233 | addr = start; |
| 234 | } |
| 235 | |
| 236 | /* |
| 237 | * Forcibly align the final address in case we have a hardware |
| 238 | * issue that requires alignment for performance reasons. |
| 239 | */ |
| 240 | addr = align_vdso_addr(addr); |
| 241 | |
| 242 | return addr; |
| 243 | } |
| 244 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 245 | static int map_vdso_randomized(const struct vdso_image *image) |
| 246 | { |
Ingo Molnar | 3947f49 | 2016-09-15 08:56:21 +0200 | [diff] [blame] | 247 | unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start); |
| 248 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 249 | return map_vdso(image, addr); |
| 250 | } |
Ingo Molnar | 3947f49 | 2016-09-15 08:56:21 +0200 | [diff] [blame] | 251 | #endif |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 252 | |
Dmitry Safonov | 2eefd87 | 2016-09-05 16:33:05 +0300 | [diff] [blame] | 253 | int map_vdso_once(const struct vdso_image *image, unsigned long addr) |
| 254 | { |
| 255 | struct mm_struct *mm = current->mm; |
| 256 | struct vm_area_struct *vma; |
| 257 | |
| 258 | down_write(&mm->mmap_sem); |
| 259 | /* |
| 260 | * Check if we have already mapped vdso blob - fail to prevent |
| 261 | * abusing from userspace install_speciall_mapping, which may |
| 262 | * not do accounting and rlimit right. |
| 263 | * We could search vma near context.vdso, but it's a slowpath, |
| 264 | * so let's explicitely check all VMAs to be completely sure. |
| 265 | */ |
| 266 | for (vma = mm->mmap; vma; vma = vma->vm_next) { |
| 267 | if (vma_is_special_mapping(vma, &vdso_mapping) || |
| 268 | vma_is_special_mapping(vma, &vvar_mapping)) { |
| 269 | up_write(&mm->mmap_sem); |
| 270 | return -EEXIST; |
| 271 | } |
| 272 | } |
| 273 | up_write(&mm->mmap_sem); |
| 274 | |
| 275 | return map_vdso(image, addr); |
| 276 | } |
| 277 | |
Brian Gerst | ab8b82ee6 | 2015-06-22 07:55:15 -0400 | [diff] [blame] | 278 | #if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION) |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 279 | static int load_vdso32(void) |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 280 | { |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 281 | if (vdso32_enabled != 1) /* Other values all mean "disabled" */ |
| 282 | return 0; |
| 283 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 284 | return map_vdso(&vdso_image_32, 0); |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 285 | } |
| 286 | #endif |
| 287 | |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 288 | #ifdef CONFIG_X86_64 |
| 289 | int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) |
| 290 | { |
| 291 | if (!vdso64_enabled) |
| 292 | return 0; |
| 293 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 294 | return map_vdso_randomized(&vdso_image_64); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 295 | } |
| 296 | |
| 297 | #ifdef CONFIG_COMPAT |
| 298 | int compat_arch_setup_additional_pages(struct linux_binprm *bprm, |
| 299 | int uses_interp) |
| 300 | { |
| 301 | #ifdef CONFIG_X86_X32_ABI |
| 302 | if (test_thread_flag(TIF_X32)) { |
| 303 | if (!vdso64_enabled) |
| 304 | return 0; |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 305 | return map_vdso_randomized(&vdso_image_x32); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 306 | } |
| 307 | #endif |
Brian Gerst | ab8b82ee6 | 2015-06-22 07:55:15 -0400 | [diff] [blame] | 308 | #ifdef CONFIG_IA32_EMULATION |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 309 | return load_vdso32(); |
Brian Gerst | ab8b82ee6 | 2015-06-22 07:55:15 -0400 | [diff] [blame] | 310 | #else |
| 311 | return 0; |
| 312 | #endif |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 313 | } |
| 314 | #endif |
| 315 | #else |
| 316 | int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) |
| 317 | { |
| 318 | return load_vdso32(); |
| 319 | } |
| 320 | #endif |
| 321 | |
| 322 | #ifdef CONFIG_X86_64 |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 323 | static __init int vdso_setup(char *s) |
| 324 | { |
Andy Lutomirski | 3d7ee96 | 2014-05-05 12:19:32 -0700 | [diff] [blame] | 325 | vdso64_enabled = simple_strtoul(s, NULL, 0); |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 326 | return 0; |
| 327 | } |
| 328 | __setup("vdso=", vdso_setup); |
Andy Lutomirski | b4b541a | 2014-03-17 23:22:08 +0100 | [diff] [blame] | 329 | #endif |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 330 | |
| 331 | #ifdef CONFIG_X86_64 |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 332 | static void vgetcpu_cpu_init(void *arg) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 333 | { |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 334 | int cpu = smp_processor_id(); |
Andrew Morton | a92f101 | 2014-11-01 21:18:26 +0100 | [diff] [blame] | 335 | struct desc_struct d = { }; |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 336 | unsigned long node = 0; |
| 337 | #ifdef CONFIG_NUMA |
| 338 | node = cpu_to_node(cpu); |
| 339 | #endif |
Borislav Petkov | 8c72530 | 2016-01-26 22:12:09 +0100 | [diff] [blame] | 340 | if (static_cpu_has(X86_FEATURE_RDTSCP)) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 341 | write_rdtscp_aux((node << 12) | cpu); |
| 342 | |
| 343 | /* |
Andy Lutomirski | 2588015 | 2014-09-23 10:50:53 -0700 | [diff] [blame] | 344 | * Store cpu number in limit so that it can be loaded |
| 345 | * quickly in user space in vgetcpu. (12 bits for the CPU |
| 346 | * and 8 bits for the node) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 347 | */ |
Andrew Morton | a92f101 | 2014-11-01 21:18:26 +0100 | [diff] [blame] | 348 | d.limit0 = cpu | ((node & 0xf) << 12); |
| 349 | d.limit = node >> 4; |
| 350 | d.type = 5; /* RO data, expand down, accessed */ |
| 351 | d.dpl = 3; /* Visible to user code */ |
| 352 | d.s = 1; /* Not a system segment */ |
| 353 | d.p = 1; /* Present */ |
| 354 | d.d = 1; /* 32-bit */ |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 355 | |
| 356 | write_gdt_entry(get_cpu_gdt_table(cpu), GDT_ENTRY_PER_CPU, &d, DESCTYPE_S); |
| 357 | } |
| 358 | |
Sebastian Andrzej Siewior | 07d36c9 | 2016-07-13 17:16:03 +0000 | [diff] [blame] | 359 | static int vgetcpu_online(unsigned int cpu) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 360 | { |
Sebastian Andrzej Siewior | 07d36c9 | 2016-07-13 17:16:03 +0000 | [diff] [blame] | 361 | return smp_call_function_single(cpu, vgetcpu_cpu_init, NULL, 1); |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 362 | } |
| 363 | |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 364 | static int __init init_vdso(void) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 365 | { |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 366 | init_vdso_image(&vdso_image_64); |
| 367 | |
| 368 | #ifdef CONFIG_X86_X32_ABI |
| 369 | init_vdso_image(&vdso_image_x32); |
| 370 | #endif |
| 371 | |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 372 | /* notifier priority > KVM */ |
Sebastian Andrzej Siewior | 07d36c9 | 2016-07-13 17:16:03 +0000 | [diff] [blame] | 373 | return cpuhp_setup_state(CPUHP_AP_X86_VDSO_VMA_ONLINE, |
| 374 | "AP_X86_VDSO_VMA_ONLINE", vgetcpu_online, NULL); |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 375 | } |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 376 | subsys_initcall(init_vdso); |
| 377 | #endif /* CONFIG_X86_64 */ |