Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 1 | /* |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 2 | * Copyright 2007 Andi Kleen, SUSE Labs. |
| 3 | * Subject to the GPL, v.2 |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 4 | * |
| 5 | * This contains most of the x86 vDSO kernel-side code. |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 6 | */ |
| 7 | #include <linux/mm.h> |
Alexey Dobriyan | 4e950f6 | 2007-07-30 02:36:13 +0400 | [diff] [blame] | 8 | #include <linux/err.h> |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 9 | #include <linux/sched.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 10 | #include <linux/slab.h> |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 11 | #include <linux/init.h> |
| 12 | #include <linux/random.h> |
Jaswinder Singh Rajput | 3fa89ca | 2009-04-12 20:37:25 +0530 | [diff] [blame] | 13 | #include <linux/elf.h> |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 14 | #include <linux/cpu.h> |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 15 | #include <linux/ptrace.h> |
Andy Lutomirski | cc1e24f | 2015-12-10 19:20:21 -0800 | [diff] [blame] | 16 | #include <asm/pvclock.h> |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 17 | #include <asm/vgtod.h> |
| 18 | #include <asm/proto.h> |
Roland McGrath | 7f3646a | 2008-01-30 13:30:41 +0100 | [diff] [blame] | 19 | #include <asm/vdso.h> |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 20 | #include <asm/vvar.h> |
Andy Lutomirski | aafade2 | 2011-07-21 15:47:10 -0400 | [diff] [blame] | 21 | #include <asm/page.h> |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 22 | #include <asm/desc.h> |
Borislav Petkov | cd4d09e | 2016-01-26 22:12:04 +0100 | [diff] [blame] | 23 | #include <asm/cpufeature.h> |
Roland McGrath | 7f3646a | 2008-01-30 13:30:41 +0100 | [diff] [blame] | 24 | |
Andy Lutomirski | b4b541a | 2014-03-17 23:22:08 +0100 | [diff] [blame] | 25 | #if defined(CONFIG_X86_64) |
Andy Lutomirski | 3d7ee96 | 2014-05-05 12:19:32 -0700 | [diff] [blame] | 26 | unsigned int __read_mostly vdso64_enabled = 1; |
Andy Lutomirski | b4b541a | 2014-03-17 23:22:08 +0100 | [diff] [blame] | 27 | #endif |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 28 | |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 29 | void __init init_vdso_image(const struct vdso_image *image) |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 30 | { |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 31 | BUG_ON(image->size % PAGE_SIZE != 0); |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 32 | |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 33 | apply_alternatives((struct alt_instr *)(image->data + image->alt), |
| 34 | (struct alt_instr *)(image->data + image->alt + |
| 35 | image->alt_len)); |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 36 | } |
Andy Lutomirski | 6f121e5 | 2014-05-05 12:19:34 -0700 | [diff] [blame] | 37 | |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 38 | struct linux_binprm; |
| 39 | |
Andy Lutomirski | 394f56f | 2014-12-19 16:04:11 -0800 | [diff] [blame] | 40 | /* |
| 41 | * Put the vdso above the (randomized) stack with another randomized |
| 42 | * offset. This way there is no hole in the middle of address space. |
| 43 | * To save memory make sure it is still in the same PTE as the stack |
| 44 | * top. This doesn't give that many random bits. |
| 45 | * |
| 46 | * Note that this algorithm is imperfect: the distribution of the vdso |
| 47 | * start address within a PMD is biased toward the end. |
| 48 | * |
| 49 | * Only used for the 64-bit and x32 vdsos. |
| 50 | */ |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 51 | static unsigned long vdso_addr(unsigned long start, unsigned len) |
| 52 | { |
Jan Beulich | d093601 | 2014-07-03 15:35:07 +0100 | [diff] [blame] | 53 | #ifdef CONFIG_X86_32 |
| 54 | return 0; |
| 55 | #else |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 56 | unsigned long addr, end; |
| 57 | unsigned offset; |
Andy Lutomirski | 394f56f | 2014-12-19 16:04:11 -0800 | [diff] [blame] | 58 | |
| 59 | /* |
| 60 | * Round up the start address. It can start out unaligned as a result |
| 61 | * of stack start randomization. |
| 62 | */ |
| 63 | start = PAGE_ALIGN(start); |
| 64 | |
| 65 | /* Round the lowest possible end address up to a PMD boundary. */ |
| 66 | end = (start + len + PMD_SIZE - 1) & PMD_MASK; |
Ingo Molnar | d951734 | 2009-02-20 23:32:28 +0100 | [diff] [blame] | 67 | if (end >= TASK_SIZE_MAX) |
| 68 | end = TASK_SIZE_MAX; |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 69 | end -= len; |
Andy Lutomirski | 394f56f | 2014-12-19 16:04:11 -0800 | [diff] [blame] | 70 | |
| 71 | if (end > start) { |
| 72 | offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1); |
| 73 | addr = start + (offset << PAGE_SHIFT); |
| 74 | } else { |
| 75 | addr = start; |
| 76 | } |
Borislav Petkov | dfb09f9 | 2011-08-05 15:15:08 +0200 | [diff] [blame] | 77 | |
| 78 | /* |
Andy Lutomirski | 394f56f | 2014-12-19 16:04:11 -0800 | [diff] [blame] | 79 | * Forcibly align the final address in case we have a hardware |
| 80 | * issue that requires alignment for performance reasons. |
Borislav Petkov | dfb09f9 | 2011-08-05 15:15:08 +0200 | [diff] [blame] | 81 | */ |
Michel Lespinasse | f9902472 | 2012-12-11 16:01:52 -0800 | [diff] [blame] | 82 | addr = align_vdso_addr(addr); |
Borislav Petkov | dfb09f9 | 2011-08-05 15:15:08 +0200 | [diff] [blame] | 83 | |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 84 | return addr; |
Jan Beulich | d093601 | 2014-07-03 15:35:07 +0100 | [diff] [blame] | 85 | #endif |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 86 | } |
| 87 | |
Andy Lutomirski | 05ef76b | 2015-12-29 20:12:22 -0800 | [diff] [blame] | 88 | static int vdso_fault(const struct vm_special_mapping *sm, |
| 89 | struct vm_area_struct *vma, struct vm_fault *vmf) |
| 90 | { |
| 91 | const struct vdso_image *image = vma->vm_mm->context.vdso_image; |
| 92 | |
| 93 | if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size) |
| 94 | return VM_FAULT_SIGBUS; |
| 95 | |
| 96 | vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT)); |
| 97 | get_page(vmf->page); |
| 98 | return 0; |
| 99 | } |
| 100 | |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 101 | static void vdso_fix_landing(const struct vdso_image *image, |
| 102 | struct vm_area_struct *new_vma) |
| 103 | { |
| 104 | #if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION |
| 105 | if (in_ia32_syscall() && image == &vdso_image_32) { |
| 106 | struct pt_regs *regs = current_pt_regs(); |
| 107 | unsigned long vdso_land = image->sym_int80_landing_pad; |
| 108 | unsigned long old_land_addr = vdso_land + |
| 109 | (unsigned long)current->mm->context.vdso; |
| 110 | |
| 111 | /* Fixing userspace landing - look at do_fast_syscall_32 */ |
| 112 | if (regs->ip == old_land_addr) |
| 113 | regs->ip = new_vma->vm_start + vdso_land; |
| 114 | } |
| 115 | #endif |
| 116 | } |
| 117 | |
| 118 | static int vdso_mremap(const struct vm_special_mapping *sm, |
| 119 | struct vm_area_struct *new_vma) |
| 120 | { |
| 121 | unsigned long new_size = new_vma->vm_end - new_vma->vm_start; |
| 122 | const struct vdso_image *image = current->mm->context.vdso_image; |
| 123 | |
| 124 | if (image->size != new_size) |
| 125 | return -EINVAL; |
| 126 | |
| 127 | if (WARN_ON_ONCE(current->mm != new_vma->vm_mm)) |
| 128 | return -EFAULT; |
| 129 | |
| 130 | vdso_fix_landing(image, new_vma); |
| 131 | current->mm->context.vdso = (void __user *)new_vma->vm_start; |
| 132 | |
| 133 | return 0; |
| 134 | } |
Andy Lutomirski | 05ef76b | 2015-12-29 20:12:22 -0800 | [diff] [blame] | 135 | |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 136 | static int vvar_fault(const struct vm_special_mapping *sm, |
| 137 | struct vm_area_struct *vma, struct vm_fault *vmf) |
| 138 | { |
| 139 | const struct vdso_image *image = vma->vm_mm->context.vdso_image; |
| 140 | long sym_offset; |
| 141 | int ret = -EFAULT; |
| 142 | |
| 143 | if (!image) |
| 144 | return VM_FAULT_SIGBUS; |
| 145 | |
| 146 | sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) + |
| 147 | image->sym_vvar_start; |
| 148 | |
| 149 | /* |
| 150 | * Sanity check: a symbol offset of zero means that the page |
| 151 | * does not exist for this vdso image, not that the page is at |
| 152 | * offset zero relative to the text mapping. This should be |
| 153 | * impossible here, because sym_offset should only be zero for |
| 154 | * the page past the end of the vvar mapping. |
| 155 | */ |
| 156 | if (sym_offset == 0) |
| 157 | return VM_FAULT_SIGBUS; |
| 158 | |
| 159 | if (sym_offset == image->sym_vvar_page) { |
| 160 | ret = vm_insert_pfn(vma, (unsigned long)vmf->virtual_address, |
| 161 | __pa_symbol(&__vvar_page) >> PAGE_SHIFT); |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 162 | } else if (sym_offset == image->sym_pvclock_page) { |
| 163 | struct pvclock_vsyscall_time_info *pvti = |
| 164 | pvclock_pvti_cpu0_va(); |
Andy Lutomirski | bd902c5 | 2015-12-29 20:12:24 -0800 | [diff] [blame] | 165 | if (pvti && vclock_was_used(VCLOCK_PVCLOCK)) { |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 166 | ret = vm_insert_pfn( |
| 167 | vma, |
| 168 | (unsigned long)vmf->virtual_address, |
| 169 | __pa(pvti) >> PAGE_SHIFT); |
| 170 | } |
| 171 | } |
| 172 | |
| 173 | if (ret == 0 || ret == -EBUSY) |
| 174 | return VM_FAULT_NOPAGE; |
| 175 | |
| 176 | return VM_FAULT_SIGBUS; |
| 177 | } |
| 178 | |
Dmitry Safonov | 2eefd87 | 2016-09-05 16:33:05 +0300 | [diff] [blame^] | 179 | static const struct vm_special_mapping vdso_mapping = { |
| 180 | .name = "[vdso]", |
| 181 | .fault = vdso_fault, |
| 182 | .mremap = vdso_mremap, |
| 183 | }; |
| 184 | static const struct vm_special_mapping vvar_mapping = { |
| 185 | .name = "[vvar]", |
| 186 | .fault = vvar_fault, |
| 187 | }; |
| 188 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 189 | /* |
| 190 | * Add vdso and vvar mappings to current process. |
| 191 | * @image - blob to map |
| 192 | * @addr - request a specific address (zero to map at free addr) |
| 193 | */ |
| 194 | static int map_vdso(const struct vdso_image *image, unsigned long addr) |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 195 | { |
| 196 | struct mm_struct *mm = current->mm; |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 197 | struct vm_area_struct *vma; |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 198 | unsigned long text_start; |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 199 | int ret = 0; |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 200 | |
Michal Hocko | 6904817 | 2016-05-23 16:25:54 -0700 | [diff] [blame] | 201 | if (down_write_killable(&mm->mmap_sem)) |
| 202 | return -EINTR; |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 203 | |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 204 | addr = get_unmapped_area(NULL, addr, |
| 205 | image->size - image->sym_vvar_start, 0, 0); |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 206 | if (IS_ERR_VALUE(addr)) { |
| 207 | ret = addr; |
| 208 | goto up_fail; |
| 209 | } |
| 210 | |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 211 | text_start = addr - image->sym_vvar_start; |
| 212 | current->mm->context.vdso = (void __user *)text_start; |
Andy Lutomirski | 352b78c | 2015-12-29 20:12:21 -0800 | [diff] [blame] | 213 | current->mm->context.vdso_image = image; |
Peter Zijlstra | f7b6eb3 | 2009-06-05 14:04:51 +0200 | [diff] [blame] | 214 | |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 215 | /* |
| 216 | * MAYWRITE to allow gdb to COW and set breakpoints |
| 217 | */ |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 218 | vma = _install_special_mapping(mm, |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 219 | text_start, |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 220 | image->size, |
| 221 | VM_READ|VM_EXEC| |
| 222 | VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC, |
Dmitry Safonov | b059a45 | 2016-06-28 14:35:38 +0300 | [diff] [blame] | 223 | &vdso_mapping); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 224 | |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 225 | if (IS_ERR(vma)) { |
| 226 | ret = PTR_ERR(vma); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 227 | goto up_fail; |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 228 | } |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 229 | |
| 230 | vma = _install_special_mapping(mm, |
Andy Lutomirski | e6577a7 | 2014-07-10 18:13:15 -0700 | [diff] [blame] | 231 | addr, |
| 232 | -image->sym_vvar_start, |
Andy Lutomirski | a48a704 | 2015-12-29 20:12:23 -0800 | [diff] [blame] | 233 | VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP| |
| 234 | VM_PFNMAP, |
Andy Lutomirski | a62c34b | 2014-05-19 15:58:33 -0700 | [diff] [blame] | 235 | &vvar_mapping); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 236 | |
| 237 | if (IS_ERR(vma)) { |
| 238 | ret = PTR_ERR(vma); |
Dmitry Safonov | e38447e | 2016-09-05 16:33:03 +0300 | [diff] [blame] | 239 | do_munmap(mm, text_start, image->size); |
Peter Zijlstra | f7b6eb3 | 2009-06-05 14:04:51 +0200 | [diff] [blame] | 240 | } |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 241 | |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 242 | up_fail: |
Dmitry Safonov | e38447e | 2016-09-05 16:33:03 +0300 | [diff] [blame] | 243 | if (ret) { |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 244 | current->mm->context.vdso = NULL; |
Dmitry Safonov | e38447e | 2016-09-05 16:33:03 +0300 | [diff] [blame] | 245 | current->mm->context.vdso_image = NULL; |
| 246 | } |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 247 | |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 248 | up_write(&mm->mmap_sem); |
| 249 | return ret; |
| 250 | } |
| 251 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 252 | static int map_vdso_randomized(const struct vdso_image *image) |
| 253 | { |
| 254 | unsigned long addr = vdso_addr(current->mm->start_stack, |
| 255 | image->size - image->sym_vvar_start); |
| 256 | return map_vdso(image, addr); |
| 257 | } |
| 258 | |
Dmitry Safonov | 2eefd87 | 2016-09-05 16:33:05 +0300 | [diff] [blame^] | 259 | int map_vdso_once(const struct vdso_image *image, unsigned long addr) |
| 260 | { |
| 261 | struct mm_struct *mm = current->mm; |
| 262 | struct vm_area_struct *vma; |
| 263 | |
| 264 | down_write(&mm->mmap_sem); |
| 265 | /* |
| 266 | * Check if we have already mapped vdso blob - fail to prevent |
| 267 | * abusing from userspace install_speciall_mapping, which may |
| 268 | * not do accounting and rlimit right. |
| 269 | * We could search vma near context.vdso, but it's a slowpath, |
| 270 | * so let's explicitely check all VMAs to be completely sure. |
| 271 | */ |
| 272 | for (vma = mm->mmap; vma; vma = vma->vm_next) { |
| 273 | if (vma_is_special_mapping(vma, &vdso_mapping) || |
| 274 | vma_is_special_mapping(vma, &vvar_mapping)) { |
| 275 | up_write(&mm->mmap_sem); |
| 276 | return -EEXIST; |
| 277 | } |
| 278 | } |
| 279 | up_write(&mm->mmap_sem); |
| 280 | |
| 281 | return map_vdso(image, addr); |
| 282 | } |
| 283 | |
Brian Gerst | ab8b82ee6 | 2015-06-22 07:55:15 -0400 | [diff] [blame] | 284 | #if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION) |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 285 | static int load_vdso32(void) |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 286 | { |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 287 | if (vdso32_enabled != 1) /* Other values all mean "disabled" */ |
| 288 | return 0; |
| 289 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 290 | return map_vdso(&vdso_image_32, 0); |
H. J. Lu | 1a21d4e | 2012-02-19 11:38:06 -0800 | [diff] [blame] | 291 | } |
| 292 | #endif |
| 293 | |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 294 | #ifdef CONFIG_X86_64 |
| 295 | int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) |
| 296 | { |
| 297 | if (!vdso64_enabled) |
| 298 | return 0; |
| 299 | |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 300 | return map_vdso_randomized(&vdso_image_64); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 301 | } |
| 302 | |
| 303 | #ifdef CONFIG_COMPAT |
| 304 | int compat_arch_setup_additional_pages(struct linux_binprm *bprm, |
| 305 | int uses_interp) |
| 306 | { |
| 307 | #ifdef CONFIG_X86_X32_ABI |
| 308 | if (test_thread_flag(TIF_X32)) { |
| 309 | if (!vdso64_enabled) |
| 310 | return 0; |
Dmitry Safonov | 576ebfe | 2016-09-05 16:33:04 +0300 | [diff] [blame] | 311 | return map_vdso_randomized(&vdso_image_x32); |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 312 | } |
| 313 | #endif |
Brian Gerst | ab8b82ee6 | 2015-06-22 07:55:15 -0400 | [diff] [blame] | 314 | #ifdef CONFIG_IA32_EMULATION |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 315 | return load_vdso32(); |
Brian Gerst | ab8b82ee6 | 2015-06-22 07:55:15 -0400 | [diff] [blame] | 316 | #else |
| 317 | return 0; |
| 318 | #endif |
Andy Lutomirski | 18d0a6f | 2014-05-05 12:19:35 -0700 | [diff] [blame] | 319 | } |
| 320 | #endif |
| 321 | #else |
| 322 | int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) |
| 323 | { |
| 324 | return load_vdso32(); |
| 325 | } |
| 326 | #endif |
| 327 | |
| 328 | #ifdef CONFIG_X86_64 |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 329 | static __init int vdso_setup(char *s) |
| 330 | { |
Andy Lutomirski | 3d7ee96 | 2014-05-05 12:19:32 -0700 | [diff] [blame] | 331 | vdso64_enabled = simple_strtoul(s, NULL, 0); |
Andi Kleen | 2aae950 | 2007-07-21 17:10:01 +0200 | [diff] [blame] | 332 | return 0; |
| 333 | } |
| 334 | __setup("vdso=", vdso_setup); |
Andy Lutomirski | b4b541a | 2014-03-17 23:22:08 +0100 | [diff] [blame] | 335 | #endif |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 336 | |
| 337 | #ifdef CONFIG_X86_64 |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 338 | static void vgetcpu_cpu_init(void *arg) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 339 | { |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 340 | int cpu = smp_processor_id(); |
Andrew Morton | a92f101 | 2014-11-01 21:18:26 +0100 | [diff] [blame] | 341 | struct desc_struct d = { }; |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 342 | unsigned long node = 0; |
| 343 | #ifdef CONFIG_NUMA |
| 344 | node = cpu_to_node(cpu); |
| 345 | #endif |
Borislav Petkov | 8c72530 | 2016-01-26 22:12:09 +0100 | [diff] [blame] | 346 | if (static_cpu_has(X86_FEATURE_RDTSCP)) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 347 | write_rdtscp_aux((node << 12) | cpu); |
| 348 | |
| 349 | /* |
Andy Lutomirski | 2588015 | 2014-09-23 10:50:53 -0700 | [diff] [blame] | 350 | * Store cpu number in limit so that it can be loaded |
| 351 | * quickly in user space in vgetcpu. (12 bits for the CPU |
| 352 | * and 8 bits for the node) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 353 | */ |
Andrew Morton | a92f101 | 2014-11-01 21:18:26 +0100 | [diff] [blame] | 354 | d.limit0 = cpu | ((node & 0xf) << 12); |
| 355 | d.limit = node >> 4; |
| 356 | d.type = 5; /* RO data, expand down, accessed */ |
| 357 | d.dpl = 3; /* Visible to user code */ |
| 358 | d.s = 1; /* Not a system segment */ |
| 359 | d.p = 1; /* Present */ |
| 360 | d.d = 1; /* 32-bit */ |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 361 | |
| 362 | write_gdt_entry(get_cpu_gdt_table(cpu), GDT_ENTRY_PER_CPU, &d, DESCTYPE_S); |
| 363 | } |
| 364 | |
Sebastian Andrzej Siewior | 07d36c9 | 2016-07-13 17:16:03 +0000 | [diff] [blame] | 365 | static int vgetcpu_online(unsigned int cpu) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 366 | { |
Sebastian Andrzej Siewior | 07d36c9 | 2016-07-13 17:16:03 +0000 | [diff] [blame] | 367 | return smp_call_function_single(cpu, vgetcpu_cpu_init, NULL, 1); |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 368 | } |
| 369 | |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 370 | static int __init init_vdso(void) |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 371 | { |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 372 | init_vdso_image(&vdso_image_64); |
| 373 | |
| 374 | #ifdef CONFIG_X86_X32_ABI |
| 375 | init_vdso_image(&vdso_image_x32); |
| 376 | #endif |
| 377 | |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 378 | /* notifier priority > KVM */ |
Sebastian Andrzej Siewior | 07d36c9 | 2016-07-13 17:16:03 +0000 | [diff] [blame] | 379 | return cpuhp_setup_state(CPUHP_AP_X86_VDSO_VMA_ONLINE, |
| 380 | "AP_X86_VDSO_VMA_ONLINE", vgetcpu_online, NULL); |
Andy Lutomirski | d4f829d | 2014-09-23 10:50:52 -0700 | [diff] [blame] | 381 | } |
Andy Lutomirski | 1c0c1b9 | 2014-09-23 10:50:57 -0700 | [diff] [blame] | 382 | subsys_initcall(init_vdso); |
| 383 | #endif /* CONFIG_X86_64 */ |