Linux Audio

Check our new training course

Loading...
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * Copyright 2007 Andi Kleen, SUSE Labs.
  4 *
  5 * This contains most of the x86 vDSO kernel-side code.
  6 */
  7#include <linux/mm.h>
  8#include <linux/err.h>
  9#include <linux/sched.h>
 10#include <linux/sched/task_stack.h>
 11#include <linux/slab.h>
 12#include <linux/init.h>
 13#include <linux/random.h>
 14#include <linux/elf.h>
 15#include <linux/cpu.h>
 16#include <linux/ptrace.h>
 17#include <linux/time_namespace.h>
 18
 19#include <asm/pvclock.h>
 20#include <asm/vgtod.h>
 21#include <asm/proto.h>
 22#include <asm/vdso.h>
 23#include <asm/vvar.h>
 24#include <asm/tlb.h>
 25#include <asm/page.h>
 26#include <asm/desc.h>
 27#include <asm/cpufeature.h>
 28#include <clocksource/hyperv_timer.h>
 29
 30#undef _ASM_X86_VVAR_H
 31#define EMIT_VVAR(name, offset)	\
 32	const size_t name ## _offset = offset;
 33#include <asm/vvar.h>
 34
 35struct vdso_data *arch_get_vdso_data(void *vvar_page)
 36{
 37	return (struct vdso_data *)(vvar_page + _vdso_data_offset);
 38}
 39#undef EMIT_VVAR
 40
 41unsigned int vclocks_used __read_mostly;
 42
 43#if defined(CONFIG_X86_64)
 44unsigned int __read_mostly vdso64_enabled = 1;
 45#endif
 46
 47void __init init_vdso_image(const struct vdso_image *image)
 48{
 
 49	BUG_ON(image->size % PAGE_SIZE != 0);
 50
 51	apply_alternatives((struct alt_instr *)(image->data + image->alt),
 52			   (struct alt_instr *)(image->data + image->alt +
 53						image->alt_len));
 
 
 54}
 55
 56static const struct vm_special_mapping vvar_mapping;
 57struct linux_binprm;
 58
 59static vm_fault_t vdso_fault(const struct vm_special_mapping *sm,
 60		      struct vm_area_struct *vma, struct vm_fault *vmf)
 61{
 62	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
 63
 64	if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size)
 65		return VM_FAULT_SIGBUS;
 66
 67	vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT));
 68	get_page(vmf->page);
 69	return 0;
 70}
 71
 72static void vdso_fix_landing(const struct vdso_image *image,
 73		struct vm_area_struct *new_vma)
 74{
 75#if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
 76	if (in_ia32_syscall() && image == &vdso_image_32) {
 77		struct pt_regs *regs = current_pt_regs();
 78		unsigned long vdso_land = image->sym_int80_landing_pad;
 79		unsigned long old_land_addr = vdso_land +
 80			(unsigned long)current->mm->context.vdso;
 81
 82		/* Fixing userspace landing - look at do_fast_syscall_32 */
 83		if (regs->ip == old_land_addr)
 84			regs->ip = new_vma->vm_start + vdso_land;
 85	}
 86#endif
 87}
 88
 89static int vdso_mremap(const struct vm_special_mapping *sm,
 90		struct vm_area_struct *new_vma)
 91{
 92	const struct vdso_image *image = current->mm->context.vdso_image;
 93
 94	vdso_fix_landing(image, new_vma);
 95	current->mm->context.vdso = (void __user *)new_vma->vm_start;
 96
 97	return 0;
 98}
 99
100#ifdef CONFIG_TIME_NS
101static struct page *find_timens_vvar_page(struct vm_area_struct *vma)
102{
103	if (likely(vma->vm_mm == current->mm))
104		return current->nsproxy->time_ns->vvar_page;
105
106	/*
107	 * VM_PFNMAP | VM_IO protect .fault() handler from being called
108	 * through interfaces like /proc/$pid/mem or
109	 * process_vm_{readv,writev}() as long as there's no .access()
110	 * in special_mapping_vmops().
111	 * For more details check_vma_flags() and __access_remote_vm()
112	 */
113
114	WARN(1, "vvar_page accessed remotely");
115
116	return NULL;
117}
118
119/*
120 * The vvar page layout depends on whether a task belongs to the root or
121 * non-root time namespace. Whenever a task changes its namespace, the VVAR
122 * page tables are cleared and then they will re-faulted with a
123 * corresponding layout.
124 * See also the comment near timens_setup_vdso_data() for details.
125 */
126int vdso_join_timens(struct task_struct *task, struct time_namespace *ns)
127{
128	struct mm_struct *mm = task->mm;
129	struct vm_area_struct *vma;
 
130
131	mmap_read_lock(mm);
132
133	for (vma = mm->mmap; vma; vma = vma->vm_next) {
134		unsigned long size = vma->vm_end - vma->vm_start;
135
136		if (vma_is_special_mapping(vma, &vvar_mapping))
137			zap_page_range(vma, vma->vm_start, size);
138	}
139
140	mmap_read_unlock(mm);
 
141	return 0;
142}
143#else
144static inline struct page *find_timens_vvar_page(struct vm_area_struct *vma)
145{
146	return NULL;
147}
148#endif
149
150static vm_fault_t vvar_fault(const struct vm_special_mapping *sm,
151		      struct vm_area_struct *vma, struct vm_fault *vmf)
152{
153	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
154	unsigned long pfn;
155	long sym_offset;
156
157	if (!image)
158		return VM_FAULT_SIGBUS;
159
160	sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) +
161		image->sym_vvar_start;
162
163	/*
164	 * Sanity check: a symbol offset of zero means that the page
165	 * does not exist for this vdso image, not that the page is at
166	 * offset zero relative to the text mapping.  This should be
167	 * impossible here, because sym_offset should only be zero for
168	 * the page past the end of the vvar mapping.
169	 */
170	if (sym_offset == 0)
171		return VM_FAULT_SIGBUS;
172
173	if (sym_offset == image->sym_vvar_page) {
174		struct page *timens_page = find_timens_vvar_page(vma);
175
176		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
177
178		/*
179		 * If a task belongs to a time namespace then a namespace
180		 * specific VVAR is mapped with the sym_vvar_page offset and
181		 * the real VVAR page is mapped with the sym_timens_page
182		 * offset.
183		 * See also the comment near timens_setup_vdso_data().
184		 */
185		if (timens_page) {
186			unsigned long addr;
187			vm_fault_t err;
188
189			/*
190			 * Optimization: inside time namespace pre-fault
191			 * VVAR page too. As on timens page there are only
192			 * offsets for clocks on VVAR, it'll be faulted
193			 * shortly by VDSO code.
194			 */
195			addr = vmf->address + (image->sym_timens_page - sym_offset);
196			err = vmf_insert_pfn(vma, addr, pfn);
197			if (unlikely(err & VM_FAULT_ERROR))
198				return err;
199
200			pfn = page_to_pfn(timens_page);
201		}
202
203		return vmf_insert_pfn(vma, vmf->address, pfn);
204	} else if (sym_offset == image->sym_pvclock_page) {
205		struct pvclock_vsyscall_time_info *pvti =
206			pvclock_get_pvti_cpu0_va();
207		if (pvti && vclock_was_used(VDSO_CLOCKMODE_PVCLOCK)) {
208			return vmf_insert_pfn_prot(vma, vmf->address,
209					__pa(pvti) >> PAGE_SHIFT,
210					pgprot_decrypted(vma->vm_page_prot));
211		}
212	} else if (sym_offset == image->sym_hvclock_page) {
213		struct ms_hyperv_tsc_page *tsc_pg = hv_get_tsc_page();
214
215		if (tsc_pg && vclock_was_used(VDSO_CLOCKMODE_HVCLOCK))
216			return vmf_insert_pfn(vma, vmf->address,
217					virt_to_phys(tsc_pg) >> PAGE_SHIFT);
218	} else if (sym_offset == image->sym_timens_page) {
219		struct page *timens_page = find_timens_vvar_page(vma);
220
221		if (!timens_page)
222			return VM_FAULT_SIGBUS;
223
224		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
225		return vmf_insert_pfn(vma, vmf->address, pfn);
226	}
227
228	return VM_FAULT_SIGBUS;
229}
230
231static const struct vm_special_mapping vdso_mapping = {
232	.name = "[vdso]",
233	.fault = vdso_fault,
234	.mremap = vdso_mremap,
235};
236static const struct vm_special_mapping vvar_mapping = {
237	.name = "[vvar]",
238	.fault = vvar_fault,
239};
240
241/*
242 * Add vdso and vvar mappings to current process.
243 * @image          - blob to map
244 * @addr           - request a specific address (zero to map at free addr)
245 */
246static int map_vdso(const struct vdso_image *image, unsigned long addr)
247{
248	struct mm_struct *mm = current->mm;
249	struct vm_area_struct *vma;
250	unsigned long text_start;
251	int ret = 0;
252
253	if (mmap_write_lock_killable(mm))
254		return -EINTR;
255
256	addr = get_unmapped_area(NULL, addr,
257				 image->size - image->sym_vvar_start, 0, 0);
258	if (IS_ERR_VALUE(addr)) {
259		ret = addr;
260		goto up_fail;
261	}
262
263	text_start = addr - image->sym_vvar_start;
264
265	/*
266	 * MAYWRITE to allow gdb to COW and set breakpoints
267	 */
268	vma = _install_special_mapping(mm,
269				       text_start,
270				       image->size,
271				       VM_READ|VM_EXEC|
272				       VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
273				       &vdso_mapping);
274
275	if (IS_ERR(vma)) {
276		ret = PTR_ERR(vma);
277		goto up_fail;
278	}
279
280	vma = _install_special_mapping(mm,
281				       addr,
282				       -image->sym_vvar_start,
283				       VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
284				       VM_PFNMAP,
285				       &vvar_mapping);
286
287	if (IS_ERR(vma)) {
288		ret = PTR_ERR(vma);
289		do_munmap(mm, text_start, image->size, NULL);
290	} else {
291		current->mm->context.vdso = (void __user *)text_start;
292		current->mm->context.vdso_image = image;
293	}
294
295up_fail:
296	mmap_write_unlock(mm);
297	return ret;
298}
299
300#ifdef CONFIG_X86_64
301/*
302 * Put the vdso above the (randomized) stack with another randomized
303 * offset.  This way there is no hole in the middle of address space.
304 * To save memory make sure it is still in the same PTE as the stack
305 * top.  This doesn't give that many random bits.
306 *
307 * Note that this algorithm is imperfect: the distribution of the vdso
308 * start address within a PMD is biased toward the end.
309 *
310 * Only used for the 64-bit and x32 vdsos.
311 */
312static unsigned long vdso_addr(unsigned long start, unsigned len)
313{
314	unsigned long addr, end;
315	unsigned offset;
316
317	/*
318	 * Round up the start address.  It can start out unaligned as a result
319	 * of stack start randomization.
320	 */
321	start = PAGE_ALIGN(start);
322
323	/* Round the lowest possible end address up to a PMD boundary. */
324	end = (start + len + PMD_SIZE - 1) & PMD_MASK;
325	if (end >= TASK_SIZE_MAX)
326		end = TASK_SIZE_MAX;
327	end -= len;
328
329	if (end > start) {
330		offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1);
331		addr = start + (offset << PAGE_SHIFT);
332	} else {
333		addr = start;
334	}
335
336	/*
337	 * Forcibly align the final address in case we have a hardware
338	 * issue that requires alignment for performance reasons.
339	 */
340	addr = align_vdso_addr(addr);
341
342	return addr;
343}
344
345static int map_vdso_randomized(const struct vdso_image *image)
346{
347	unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start);
348
349	return map_vdso(image, addr);
350}
351#endif
352
353int map_vdso_once(const struct vdso_image *image, unsigned long addr)
354{
355	struct mm_struct *mm = current->mm;
356	struct vm_area_struct *vma;
 
357
358	mmap_write_lock(mm);
359	/*
360	 * Check if we have already mapped vdso blob - fail to prevent
361	 * abusing from userspace install_special_mapping, which may
362	 * not do accounting and rlimit right.
363	 * We could search vma near context.vdso, but it's a slowpath,
364	 * so let's explicitly check all VMAs to be completely sure.
365	 */
366	for (vma = mm->mmap; vma; vma = vma->vm_next) {
367		if (vma_is_special_mapping(vma, &vdso_mapping) ||
368				vma_is_special_mapping(vma, &vvar_mapping)) {
369			mmap_write_unlock(mm);
370			return -EEXIST;
371		}
372	}
373	mmap_write_unlock(mm);
374
375	return map_vdso(image, addr);
376}
377
378#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
379static int load_vdso32(void)
380{
381	if (vdso32_enabled != 1)  /* Other values all mean "disabled" */
382		return 0;
383
384	return map_vdso(&vdso_image_32, 0);
385}
386#endif
387
388#ifdef CONFIG_X86_64
389int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
390{
391	if (!vdso64_enabled)
392		return 0;
393
394	return map_vdso_randomized(&vdso_image_64);
395}
396
397#ifdef CONFIG_COMPAT
398int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
399				       int uses_interp, bool x32)
400{
401#ifdef CONFIG_X86_X32_ABI
402	if (x32) {
403		if (!vdso64_enabled)
404			return 0;
405		return map_vdso_randomized(&vdso_image_x32);
406	}
407#endif
408#ifdef CONFIG_IA32_EMULATION
409	return load_vdso32();
410#else
411	return 0;
412#endif
413}
414#endif
415#else
416int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
417{
418	return load_vdso32();
419}
420#endif
421
422bool arch_syscall_is_vdso_sigreturn(struct pt_regs *regs)
423{
424#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
425	const struct vdso_image *image = current->mm->context.vdso_image;
426	unsigned long vdso = (unsigned long) current->mm->context.vdso;
427
428	if (in_ia32_syscall() && image == &vdso_image_32) {
429		if (regs->ip == vdso + image->sym_vdso32_sigreturn_landing_pad ||
430		    regs->ip == vdso + image->sym_vdso32_rt_sigreturn_landing_pad)
431			return true;
432	}
433#endif
434	return false;
435}
436
437#ifdef CONFIG_X86_64
438static __init int vdso_setup(char *s)
439{
440	vdso64_enabled = simple_strtoul(s, NULL, 0);
441	return 0;
442}
443__setup("vdso=", vdso_setup);
444
445static int __init init_vdso(void)
446{
447	BUILD_BUG_ON(VDSO_CLOCKMODE_MAX >= 32);
448
449	init_vdso_image(&vdso_image_64);
450
451#ifdef CONFIG_X86_X32_ABI
452	init_vdso_image(&vdso_image_x32);
453#endif
454
455	return 0;
456}
457subsys_initcall(init_vdso);
458#endif /* CONFIG_X86_64 */
v6.8
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * Copyright 2007 Andi Kleen, SUSE Labs.
  4 *
  5 * This contains most of the x86 vDSO kernel-side code.
  6 */
  7#include <linux/mm.h>
  8#include <linux/err.h>
  9#include <linux/sched.h>
 10#include <linux/sched/task_stack.h>
 11#include <linux/slab.h>
 12#include <linux/init.h>
 13#include <linux/random.h>
 14#include <linux/elf.h>
 15#include <linux/cpu.h>
 16#include <linux/ptrace.h>
 17#include <linux/time_namespace.h>
 18
 19#include <asm/pvclock.h>
 20#include <asm/vgtod.h>
 21#include <asm/proto.h>
 22#include <asm/vdso.h>
 23#include <asm/vvar.h>
 24#include <asm/tlb.h>
 25#include <asm/page.h>
 26#include <asm/desc.h>
 27#include <asm/cpufeature.h>
 28#include <clocksource/hyperv_timer.h>
 29
 30#undef _ASM_X86_VVAR_H
 31#define EMIT_VVAR(name, offset)	\
 32	const size_t name ## _offset = offset;
 33#include <asm/vvar.h>
 34
 35struct vdso_data *arch_get_vdso_data(void *vvar_page)
 36{
 37	return (struct vdso_data *)(vvar_page + _vdso_data_offset);
 38}
 39#undef EMIT_VVAR
 40
 41unsigned int vclocks_used __read_mostly;
 42
 43#if defined(CONFIG_X86_64)
 44unsigned int __read_mostly vdso64_enabled = 1;
 45#endif
 46
 47int __init init_vdso_image(const struct vdso_image *image)
 48{
 49	BUILD_BUG_ON(VDSO_CLOCKMODE_MAX >= 32);
 50	BUG_ON(image->size % PAGE_SIZE != 0);
 51
 52	apply_alternatives((struct alt_instr *)(image->data + image->alt),
 53			   (struct alt_instr *)(image->data + image->alt +
 54						image->alt_len));
 55
 56	return 0;
 57}
 58
 59static const struct vm_special_mapping vvar_mapping;
 60struct linux_binprm;
 61
 62static vm_fault_t vdso_fault(const struct vm_special_mapping *sm,
 63		      struct vm_area_struct *vma, struct vm_fault *vmf)
 64{
 65	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
 66
 67	if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size)
 68		return VM_FAULT_SIGBUS;
 69
 70	vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT));
 71	get_page(vmf->page);
 72	return 0;
 73}
 74
 75static void vdso_fix_landing(const struct vdso_image *image,
 76		struct vm_area_struct *new_vma)
 77{
 78#if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
 79	if (in_ia32_syscall() && image == &vdso_image_32) {
 80		struct pt_regs *regs = current_pt_regs();
 81		unsigned long vdso_land = image->sym_int80_landing_pad;
 82		unsigned long old_land_addr = vdso_land +
 83			(unsigned long)current->mm->context.vdso;
 84
 85		/* Fixing userspace landing - look at do_fast_syscall_32 */
 86		if (regs->ip == old_land_addr)
 87			regs->ip = new_vma->vm_start + vdso_land;
 88	}
 89#endif
 90}
 91
 92static int vdso_mremap(const struct vm_special_mapping *sm,
 93		struct vm_area_struct *new_vma)
 94{
 95	const struct vdso_image *image = current->mm->context.vdso_image;
 96
 97	vdso_fix_landing(image, new_vma);
 98	current->mm->context.vdso = (void __user *)new_vma->vm_start;
 99
100	return 0;
101}
102
103#ifdef CONFIG_TIME_NS
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
104/*
105 * The vvar page layout depends on whether a task belongs to the root or
106 * non-root time namespace. Whenever a task changes its namespace, the VVAR
107 * page tables are cleared and then they will re-faulted with a
108 * corresponding layout.
109 * See also the comment near timens_setup_vdso_data() for details.
110 */
111int vdso_join_timens(struct task_struct *task, struct time_namespace *ns)
112{
113	struct mm_struct *mm = task->mm;
114	struct vm_area_struct *vma;
115	VMA_ITERATOR(vmi, mm, 0);
116
117	mmap_read_lock(mm);
118	for_each_vma(vmi, vma) {
 
 
 
119		if (vma_is_special_mapping(vma, &vvar_mapping))
120			zap_vma_pages(vma);
121	}
 
122	mmap_read_unlock(mm);
123
124	return 0;
125}
 
 
 
 
 
126#endif
127
128static vm_fault_t vvar_fault(const struct vm_special_mapping *sm,
129		      struct vm_area_struct *vma, struct vm_fault *vmf)
130{
131	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
132	unsigned long pfn;
133	long sym_offset;
134
135	if (!image)
136		return VM_FAULT_SIGBUS;
137
138	sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) +
139		image->sym_vvar_start;
140
141	/*
142	 * Sanity check: a symbol offset of zero means that the page
143	 * does not exist for this vdso image, not that the page is at
144	 * offset zero relative to the text mapping.  This should be
145	 * impossible here, because sym_offset should only be zero for
146	 * the page past the end of the vvar mapping.
147	 */
148	if (sym_offset == 0)
149		return VM_FAULT_SIGBUS;
150
151	if (sym_offset == image->sym_vvar_page) {
152		struct page *timens_page = find_timens_vvar_page(vma);
153
154		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
155
156		/*
157		 * If a task belongs to a time namespace then a namespace
158		 * specific VVAR is mapped with the sym_vvar_page offset and
159		 * the real VVAR page is mapped with the sym_timens_page
160		 * offset.
161		 * See also the comment near timens_setup_vdso_data().
162		 */
163		if (timens_page) {
164			unsigned long addr;
165			vm_fault_t err;
166
167			/*
168			 * Optimization: inside time namespace pre-fault
169			 * VVAR page too. As on timens page there are only
170			 * offsets for clocks on VVAR, it'll be faulted
171			 * shortly by VDSO code.
172			 */
173			addr = vmf->address + (image->sym_timens_page - sym_offset);
174			err = vmf_insert_pfn(vma, addr, pfn);
175			if (unlikely(err & VM_FAULT_ERROR))
176				return err;
177
178			pfn = page_to_pfn(timens_page);
179		}
180
181		return vmf_insert_pfn(vma, vmf->address, pfn);
182	} else if (sym_offset == image->sym_pvclock_page) {
183		struct pvclock_vsyscall_time_info *pvti =
184			pvclock_get_pvti_cpu0_va();
185		if (pvti && vclock_was_used(VDSO_CLOCKMODE_PVCLOCK)) {
186			return vmf_insert_pfn_prot(vma, vmf->address,
187					__pa(pvti) >> PAGE_SHIFT,
188					pgprot_decrypted(vma->vm_page_prot));
189		}
190	} else if (sym_offset == image->sym_hvclock_page) {
191		pfn = hv_get_tsc_pfn();
192
193		if (pfn && vclock_was_used(VDSO_CLOCKMODE_HVCLOCK))
194			return vmf_insert_pfn(vma, vmf->address, pfn);
 
195	} else if (sym_offset == image->sym_timens_page) {
196		struct page *timens_page = find_timens_vvar_page(vma);
197
198		if (!timens_page)
199			return VM_FAULT_SIGBUS;
200
201		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
202		return vmf_insert_pfn(vma, vmf->address, pfn);
203	}
204
205	return VM_FAULT_SIGBUS;
206}
207
208static const struct vm_special_mapping vdso_mapping = {
209	.name = "[vdso]",
210	.fault = vdso_fault,
211	.mremap = vdso_mremap,
212};
213static const struct vm_special_mapping vvar_mapping = {
214	.name = "[vvar]",
215	.fault = vvar_fault,
216};
217
218/*
219 * Add vdso and vvar mappings to current process.
220 * @image          - blob to map
221 * @addr           - request a specific address (zero to map at free addr)
222 */
223static int map_vdso(const struct vdso_image *image, unsigned long addr)
224{
225	struct mm_struct *mm = current->mm;
226	struct vm_area_struct *vma;
227	unsigned long text_start;
228	int ret = 0;
229
230	if (mmap_write_lock_killable(mm))
231		return -EINTR;
232
233	addr = get_unmapped_area(NULL, addr,
234				 image->size - image->sym_vvar_start, 0, 0);
235	if (IS_ERR_VALUE(addr)) {
236		ret = addr;
237		goto up_fail;
238	}
239
240	text_start = addr - image->sym_vvar_start;
241
242	/*
243	 * MAYWRITE to allow gdb to COW and set breakpoints
244	 */
245	vma = _install_special_mapping(mm,
246				       text_start,
247				       image->size,
248				       VM_READ|VM_EXEC|
249				       VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
250				       &vdso_mapping);
251
252	if (IS_ERR(vma)) {
253		ret = PTR_ERR(vma);
254		goto up_fail;
255	}
256
257	vma = _install_special_mapping(mm,
258				       addr,
259				       -image->sym_vvar_start,
260				       VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
261				       VM_PFNMAP,
262				       &vvar_mapping);
263
264	if (IS_ERR(vma)) {
265		ret = PTR_ERR(vma);
266		do_munmap(mm, text_start, image->size, NULL);
267	} else {
268		current->mm->context.vdso = (void __user *)text_start;
269		current->mm->context.vdso_image = image;
270	}
271
272up_fail:
273	mmap_write_unlock(mm);
274	return ret;
275}
276
277#ifdef CONFIG_X86_64
278/*
279 * Put the vdso above the (randomized) stack with another randomized
280 * offset.  This way there is no hole in the middle of address space.
281 * To save memory make sure it is still in the same PTE as the stack
282 * top.  This doesn't give that many random bits.
283 *
284 * Note that this algorithm is imperfect: the distribution of the vdso
285 * start address within a PMD is biased toward the end.
286 *
287 * Only used for the 64-bit and x32 vdsos.
288 */
289static unsigned long vdso_addr(unsigned long start, unsigned len)
290{
291	unsigned long addr, end;
292	unsigned offset;
293
294	/*
295	 * Round up the start address.  It can start out unaligned as a result
296	 * of stack start randomization.
297	 */
298	start = PAGE_ALIGN(start);
299
300	/* Round the lowest possible end address up to a PMD boundary. */
301	end = (start + len + PMD_SIZE - 1) & PMD_MASK;
302	if (end >= DEFAULT_MAP_WINDOW)
303		end = DEFAULT_MAP_WINDOW;
304	end -= len;
305
306	if (end > start) {
307		offset = get_random_u32_below(((end - start) >> PAGE_SHIFT) + 1);
308		addr = start + (offset << PAGE_SHIFT);
309	} else {
310		addr = start;
311	}
312
313	/*
314	 * Forcibly align the final address in case we have a hardware
315	 * issue that requires alignment for performance reasons.
316	 */
317	addr = align_vdso_addr(addr);
318
319	return addr;
320}
321
322static int map_vdso_randomized(const struct vdso_image *image)
323{
324	unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start);
325
326	return map_vdso(image, addr);
327}
328#endif
329
330int map_vdso_once(const struct vdso_image *image, unsigned long addr)
331{
332	struct mm_struct *mm = current->mm;
333	struct vm_area_struct *vma;
334	VMA_ITERATOR(vmi, mm, 0);
335
336	mmap_write_lock(mm);
337	/*
338	 * Check if we have already mapped vdso blob - fail to prevent
339	 * abusing from userspace install_special_mapping, which may
340	 * not do accounting and rlimit right.
341	 * We could search vma near context.vdso, but it's a slowpath,
342	 * so let's explicitly check all VMAs to be completely sure.
343	 */
344	for_each_vma(vmi, vma) {
345		if (vma_is_special_mapping(vma, &vdso_mapping) ||
346				vma_is_special_mapping(vma, &vvar_mapping)) {
347			mmap_write_unlock(mm);
348			return -EEXIST;
349		}
350	}
351	mmap_write_unlock(mm);
352
353	return map_vdso(image, addr);
354}
355
356#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
357static int load_vdso32(void)
358{
359	if (vdso32_enabled != 1)  /* Other values all mean "disabled" */
360		return 0;
361
362	return map_vdso(&vdso_image_32, 0);
363}
364#endif
365
366#ifdef CONFIG_X86_64
367int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
368{
369	if (!vdso64_enabled)
370		return 0;
371
372	return map_vdso_randomized(&vdso_image_64);
373}
374
375#ifdef CONFIG_COMPAT
376int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
377				       int uses_interp, bool x32)
378{
379#ifdef CONFIG_X86_X32_ABI
380	if (x32) {
381		if (!vdso64_enabled)
382			return 0;
383		return map_vdso_randomized(&vdso_image_x32);
384	}
385#endif
386#ifdef CONFIG_IA32_EMULATION
387	return load_vdso32();
388#else
389	return 0;
390#endif
391}
392#endif
393#else
394int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
395{
396	return load_vdso32();
397}
398#endif
399
400bool arch_syscall_is_vdso_sigreturn(struct pt_regs *regs)
401{
402#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
403	const struct vdso_image *image = current->mm->context.vdso_image;
404	unsigned long vdso = (unsigned long) current->mm->context.vdso;
405
406	if (in_ia32_syscall() && image == &vdso_image_32) {
407		if (regs->ip == vdso + image->sym_vdso32_sigreturn_landing_pad ||
408		    regs->ip == vdso + image->sym_vdso32_rt_sigreturn_landing_pad)
409			return true;
410	}
411#endif
412	return false;
413}
414
415#ifdef CONFIG_X86_64
416static __init int vdso_setup(char *s)
417{
418	vdso64_enabled = simple_strtoul(s, NULL, 0);
419	return 1;
420}
421__setup("vdso=", vdso_setup);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
422#endif /* CONFIG_X86_64 */