Linux Audio

Check our new training course

Loading...
v6.2
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * Copyright 2007 Andi Kleen, SUSE Labs.
  4 *
  5 * This contains most of the x86 vDSO kernel-side code.
  6 */
  7#include <linux/mm.h>
  8#include <linux/err.h>
  9#include <linux/sched.h>
 10#include <linux/sched/task_stack.h>
 11#include <linux/slab.h>
 12#include <linux/init.h>
 13#include <linux/random.h>
 14#include <linux/elf.h>
 15#include <linux/cpu.h>
 16#include <linux/ptrace.h>
 17#include <linux/time_namespace.h>
 18
 19#include <asm/pvclock.h>
 20#include <asm/vgtod.h>
 21#include <asm/proto.h>
 22#include <asm/vdso.h>
 23#include <asm/vvar.h>
 24#include <asm/tlb.h>
 25#include <asm/page.h>
 26#include <asm/desc.h>
 27#include <asm/cpufeature.h>
 28#include <clocksource/hyperv_timer.h>
 29
 30#undef _ASM_X86_VVAR_H
 31#define EMIT_VVAR(name, offset)	\
 32	const size_t name ## _offset = offset;
 33#include <asm/vvar.h>
 34
 35struct vdso_data *arch_get_vdso_data(void *vvar_page)
 36{
 37	return (struct vdso_data *)(vvar_page + _vdso_data_offset);
 38}
 39#undef EMIT_VVAR
 40
 41unsigned int vclocks_used __read_mostly;
 42
 43#if defined(CONFIG_X86_64)
 44unsigned int __read_mostly vdso64_enabled = 1;
 45#endif
 46
 47void __init init_vdso_image(const struct vdso_image *image)
 48{
 49	BUG_ON(image->size % PAGE_SIZE != 0);
 50
 51	apply_alternatives((struct alt_instr *)(image->data + image->alt),
 52			   (struct alt_instr *)(image->data + image->alt +
 53						image->alt_len));
 54}
 55
 56static const struct vm_special_mapping vvar_mapping;
 57struct linux_binprm;
 58
 59static vm_fault_t vdso_fault(const struct vm_special_mapping *sm,
 60		      struct vm_area_struct *vma, struct vm_fault *vmf)
 61{
 62	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
 63
 64	if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size)
 65		return VM_FAULT_SIGBUS;
 66
 67	vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT));
 68	get_page(vmf->page);
 69	return 0;
 70}
 71
 72static void vdso_fix_landing(const struct vdso_image *image,
 73		struct vm_area_struct *new_vma)
 74{
 75#if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
 76	if (in_ia32_syscall() && image == &vdso_image_32) {
 77		struct pt_regs *regs = current_pt_regs();
 78		unsigned long vdso_land = image->sym_int80_landing_pad;
 79		unsigned long old_land_addr = vdso_land +
 80			(unsigned long)current->mm->context.vdso;
 81
 82		/* Fixing userspace landing - look at do_fast_syscall_32 */
 83		if (regs->ip == old_land_addr)
 84			regs->ip = new_vma->vm_start + vdso_land;
 85	}
 86#endif
 87}
 88
 89static int vdso_mremap(const struct vm_special_mapping *sm,
 90		struct vm_area_struct *new_vma)
 91{
 
 92	const struct vdso_image *image = current->mm->context.vdso_image;
 93
 
 
 
 94	vdso_fix_landing(image, new_vma);
 95	current->mm->context.vdso = (void __user *)new_vma->vm_start;
 96
 97	return 0;
 98}
 99
100#ifdef CONFIG_TIME_NS
101/*
102 * The vvar page layout depends on whether a task belongs to the root or
103 * non-root time namespace. Whenever a task changes its namespace, the VVAR
104 * page tables are cleared and then they will re-faulted with a
105 * corresponding layout.
106 * See also the comment near timens_setup_vdso_data() for details.
107 */
108int vdso_join_timens(struct task_struct *task, struct time_namespace *ns)
109{
110	struct mm_struct *mm = task->mm;
111	struct vm_area_struct *vma;
112	VMA_ITERATOR(vmi, mm, 0);
113
114	mmap_read_lock(mm);
115	for_each_vma(vmi, vma) {
116		unsigned long size = vma->vm_end - vma->vm_start;
117
118		if (vma_is_special_mapping(vma, &vvar_mapping))
119			zap_page_range(vma, vma->vm_start, size);
120	}
121	mmap_read_unlock(mm);
122
123	return 0;
124}
125#endif
126
127static vm_fault_t vvar_fault(const struct vm_special_mapping *sm,
128		      struct vm_area_struct *vma, struct vm_fault *vmf)
129{
130	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
131	unsigned long pfn;
132	long sym_offset;
133
134	if (!image)
135		return VM_FAULT_SIGBUS;
136
137	sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) +
138		image->sym_vvar_start;
139
140	/*
141	 * Sanity check: a symbol offset of zero means that the page
142	 * does not exist for this vdso image, not that the page is at
143	 * offset zero relative to the text mapping.  This should be
144	 * impossible here, because sym_offset should only be zero for
145	 * the page past the end of the vvar mapping.
146	 */
147	if (sym_offset == 0)
148		return VM_FAULT_SIGBUS;
149
150	if (sym_offset == image->sym_vvar_page) {
151		struct page *timens_page = find_timens_vvar_page(vma);
152
153		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
154
155		/*
156		 * If a task belongs to a time namespace then a namespace
157		 * specific VVAR is mapped with the sym_vvar_page offset and
158		 * the real VVAR page is mapped with the sym_timens_page
159		 * offset.
160		 * See also the comment near timens_setup_vdso_data().
161		 */
162		if (timens_page) {
163			unsigned long addr;
164			vm_fault_t err;
165
166			/*
167			 * Optimization: inside time namespace pre-fault
168			 * VVAR page too. As on timens page there are only
169			 * offsets for clocks on VVAR, it'll be faulted
170			 * shortly by VDSO code.
171			 */
172			addr = vmf->address + (image->sym_timens_page - sym_offset);
173			err = vmf_insert_pfn(vma, addr, pfn);
174			if (unlikely(err & VM_FAULT_ERROR))
175				return err;
176
177			pfn = page_to_pfn(timens_page);
178		}
179
180		return vmf_insert_pfn(vma, vmf->address, pfn);
181	} else if (sym_offset == image->sym_pvclock_page) {
182		struct pvclock_vsyscall_time_info *pvti =
183			pvclock_get_pvti_cpu0_va();
184		if (pvti && vclock_was_used(VDSO_CLOCKMODE_PVCLOCK)) {
185			return vmf_insert_pfn_prot(vma, vmf->address,
186					__pa(pvti) >> PAGE_SHIFT,
187					pgprot_decrypted(vma->vm_page_prot));
188		}
189	} else if (sym_offset == image->sym_hvclock_page) {
190		pfn = hv_get_tsc_pfn();
191
192		if (pfn && vclock_was_used(VDSO_CLOCKMODE_HVCLOCK))
193			return vmf_insert_pfn(vma, vmf->address, pfn);
194	} else if (sym_offset == image->sym_timens_page) {
195		struct page *timens_page = find_timens_vvar_page(vma);
196
197		if (!timens_page)
198			return VM_FAULT_SIGBUS;
199
200		pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT;
201		return vmf_insert_pfn(vma, vmf->address, pfn);
 
202	}
203
204	return VM_FAULT_SIGBUS;
205}
206
207static const struct vm_special_mapping vdso_mapping = {
208	.name = "[vdso]",
209	.fault = vdso_fault,
210	.mremap = vdso_mremap,
211};
212static const struct vm_special_mapping vvar_mapping = {
213	.name = "[vvar]",
214	.fault = vvar_fault,
215};
216
217/*
218 * Add vdso and vvar mappings to current process.
219 * @image          - blob to map
220 * @addr           - request a specific address (zero to map at free addr)
221 */
222static int map_vdso(const struct vdso_image *image, unsigned long addr)
223{
224	struct mm_struct *mm = current->mm;
225	struct vm_area_struct *vma;
226	unsigned long text_start;
227	int ret = 0;
228
229	if (mmap_write_lock_killable(mm))
230		return -EINTR;
231
232	addr = get_unmapped_area(NULL, addr,
233				 image->size - image->sym_vvar_start, 0, 0);
234	if (IS_ERR_VALUE(addr)) {
235		ret = addr;
236		goto up_fail;
237	}
238
239	text_start = addr - image->sym_vvar_start;
240
241	/*
242	 * MAYWRITE to allow gdb to COW and set breakpoints
243	 */
244	vma = _install_special_mapping(mm,
245				       text_start,
246				       image->size,
247				       VM_READ|VM_EXEC|
248				       VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
249				       &vdso_mapping);
250
251	if (IS_ERR(vma)) {
252		ret = PTR_ERR(vma);
253		goto up_fail;
254	}
255
256	vma = _install_special_mapping(mm,
257				       addr,
258				       -image->sym_vvar_start,
259				       VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
260				       VM_PFNMAP,
261				       &vvar_mapping);
262
263	if (IS_ERR(vma)) {
264		ret = PTR_ERR(vma);
265		do_munmap(mm, text_start, image->size, NULL);
266	} else {
267		current->mm->context.vdso = (void __user *)text_start;
268		current->mm->context.vdso_image = image;
269	}
270
271up_fail:
272	mmap_write_unlock(mm);
273	return ret;
274}
275
276#ifdef CONFIG_X86_64
277/*
278 * Put the vdso above the (randomized) stack with another randomized
279 * offset.  This way there is no hole in the middle of address space.
280 * To save memory make sure it is still in the same PTE as the stack
281 * top.  This doesn't give that many random bits.
282 *
283 * Note that this algorithm is imperfect: the distribution of the vdso
284 * start address within a PMD is biased toward the end.
285 *
286 * Only used for the 64-bit and x32 vdsos.
287 */
288static unsigned long vdso_addr(unsigned long start, unsigned len)
289{
290	unsigned long addr, end;
291	unsigned offset;
292
293	/*
294	 * Round up the start address.  It can start out unaligned as a result
295	 * of stack start randomization.
296	 */
297	start = PAGE_ALIGN(start);
298
299	/* Round the lowest possible end address up to a PMD boundary. */
300	end = (start + len + PMD_SIZE - 1) & PMD_MASK;
301	if (end >= TASK_SIZE_MAX)
302		end = TASK_SIZE_MAX;
303	end -= len;
304
305	if (end > start) {
306		offset = get_random_u32_below(((end - start) >> PAGE_SHIFT) + 1);
307		addr = start + (offset << PAGE_SHIFT);
308	} else {
309		addr = start;
310	}
311
312	/*
313	 * Forcibly align the final address in case we have a hardware
314	 * issue that requires alignment for performance reasons.
315	 */
316	addr = align_vdso_addr(addr);
317
318	return addr;
319}
320
321static int map_vdso_randomized(const struct vdso_image *image)
322{
323	unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start);
324
325	return map_vdso(image, addr);
326}
327#endif
328
329int map_vdso_once(const struct vdso_image *image, unsigned long addr)
330{
331	struct mm_struct *mm = current->mm;
332	struct vm_area_struct *vma;
333	VMA_ITERATOR(vmi, mm, 0);
334
335	mmap_write_lock(mm);
336	/*
337	 * Check if we have already mapped vdso blob - fail to prevent
338	 * abusing from userspace install_special_mapping, which may
339	 * not do accounting and rlimit right.
340	 * We could search vma near context.vdso, but it's a slowpath,
341	 * so let's explicitly check all VMAs to be completely sure.
342	 */
343	for_each_vma(vmi, vma) {
344		if (vma_is_special_mapping(vma, &vdso_mapping) ||
345				vma_is_special_mapping(vma, &vvar_mapping)) {
346			mmap_write_unlock(mm);
347			return -EEXIST;
348		}
349	}
350	mmap_write_unlock(mm);
351
352	return map_vdso(image, addr);
353}
354
355#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
356static int load_vdso32(void)
357{
358	if (vdso32_enabled != 1)  /* Other values all mean "disabled" */
359		return 0;
360
361	return map_vdso(&vdso_image_32, 0);
362}
363#endif
364
365#ifdef CONFIG_X86_64
366int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
367{
368	if (!vdso64_enabled)
369		return 0;
370
371	return map_vdso_randomized(&vdso_image_64);
372}
373
374#ifdef CONFIG_COMPAT
375int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
376				       int uses_interp, bool x32)
377{
378#ifdef CONFIG_X86_X32_ABI
379	if (x32) {
380		if (!vdso64_enabled)
381			return 0;
382		return map_vdso_randomized(&vdso_image_x32);
383	}
384#endif
385#ifdef CONFIG_IA32_EMULATION
386	return load_vdso32();
387#else
388	return 0;
389#endif
390}
391#endif
392#else
393int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
394{
395	return load_vdso32();
396}
397#endif
398
399bool arch_syscall_is_vdso_sigreturn(struct pt_regs *regs)
400{
401#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
402	const struct vdso_image *image = current->mm->context.vdso_image;
403	unsigned long vdso = (unsigned long) current->mm->context.vdso;
404
405	if (in_ia32_syscall() && image == &vdso_image_32) {
406		if (regs->ip == vdso + image->sym_vdso32_sigreturn_landing_pad ||
407		    regs->ip == vdso + image->sym_vdso32_rt_sigreturn_landing_pad)
408			return true;
409	}
410#endif
411	return false;
412}
413
414#ifdef CONFIG_X86_64
415static __init int vdso_setup(char *s)
416{
417	vdso64_enabled = simple_strtoul(s, NULL, 0);
418	return 1;
419}
420__setup("vdso=", vdso_setup);
421
422static int __init init_vdso(void)
423{
424	BUILD_BUG_ON(VDSO_CLOCKMODE_MAX >= 32);
425
426	init_vdso_image(&vdso_image_64);
427
428#ifdef CONFIG_X86_X32_ABI
429	init_vdso_image(&vdso_image_x32);
430#endif
431
432	return 0;
433}
434subsys_initcall(init_vdso);
435#endif /* CONFIG_X86_64 */
v5.4
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * Copyright 2007 Andi Kleen, SUSE Labs.
  4 *
  5 * This contains most of the x86 vDSO kernel-side code.
  6 */
  7#include <linux/mm.h>
  8#include <linux/err.h>
  9#include <linux/sched.h>
 10#include <linux/sched/task_stack.h>
 11#include <linux/slab.h>
 12#include <linux/init.h>
 13#include <linux/random.h>
 14#include <linux/elf.h>
 15#include <linux/cpu.h>
 16#include <linux/ptrace.h>
 
 
 17#include <asm/pvclock.h>
 18#include <asm/vgtod.h>
 19#include <asm/proto.h>
 20#include <asm/vdso.h>
 21#include <asm/vvar.h>
 
 22#include <asm/page.h>
 23#include <asm/desc.h>
 24#include <asm/cpufeature.h>
 25#include <clocksource/hyperv_timer.h>
 26
 
 
 
 
 
 
 
 
 
 
 
 
 
 27#if defined(CONFIG_X86_64)
 28unsigned int __read_mostly vdso64_enabled = 1;
 29#endif
 30
 31void __init init_vdso_image(const struct vdso_image *image)
 32{
 33	BUG_ON(image->size % PAGE_SIZE != 0);
 34
 35	apply_alternatives((struct alt_instr *)(image->data + image->alt),
 36			   (struct alt_instr *)(image->data + image->alt +
 37						image->alt_len));
 38}
 39
 
 40struct linux_binprm;
 41
 42static vm_fault_t vdso_fault(const struct vm_special_mapping *sm,
 43		      struct vm_area_struct *vma, struct vm_fault *vmf)
 44{
 45	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
 46
 47	if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size)
 48		return VM_FAULT_SIGBUS;
 49
 50	vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT));
 51	get_page(vmf->page);
 52	return 0;
 53}
 54
 55static void vdso_fix_landing(const struct vdso_image *image,
 56		struct vm_area_struct *new_vma)
 57{
 58#if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
 59	if (in_ia32_syscall() && image == &vdso_image_32) {
 60		struct pt_regs *regs = current_pt_regs();
 61		unsigned long vdso_land = image->sym_int80_landing_pad;
 62		unsigned long old_land_addr = vdso_land +
 63			(unsigned long)current->mm->context.vdso;
 64
 65		/* Fixing userspace landing - look at do_fast_syscall_32 */
 66		if (regs->ip == old_land_addr)
 67			regs->ip = new_vma->vm_start + vdso_land;
 68	}
 69#endif
 70}
 71
 72static int vdso_mremap(const struct vm_special_mapping *sm,
 73		struct vm_area_struct *new_vma)
 74{
 75	unsigned long new_size = new_vma->vm_end - new_vma->vm_start;
 76	const struct vdso_image *image = current->mm->context.vdso_image;
 77
 78	if (image->size != new_size)
 79		return -EINVAL;
 80
 81	vdso_fix_landing(image, new_vma);
 82	current->mm->context.vdso = (void __user *)new_vma->vm_start;
 83
 84	return 0;
 85}
 86
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 87static vm_fault_t vvar_fault(const struct vm_special_mapping *sm,
 88		      struct vm_area_struct *vma, struct vm_fault *vmf)
 89{
 90	const struct vdso_image *image = vma->vm_mm->context.vdso_image;
 
 91	long sym_offset;
 92
 93	if (!image)
 94		return VM_FAULT_SIGBUS;
 95
 96	sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) +
 97		image->sym_vvar_start;
 98
 99	/*
100	 * Sanity check: a symbol offset of zero means that the page
101	 * does not exist for this vdso image, not that the page is at
102	 * offset zero relative to the text mapping.  This should be
103	 * impossible here, because sym_offset should only be zero for
104	 * the page past the end of the vvar mapping.
105	 */
106	if (sym_offset == 0)
107		return VM_FAULT_SIGBUS;
108
109	if (sym_offset == image->sym_vvar_page) {
110		return vmf_insert_pfn(vma, vmf->address,
111				__pa_symbol(&__vvar_page) >> PAGE_SHIFT);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
112	} else if (sym_offset == image->sym_pvclock_page) {
113		struct pvclock_vsyscall_time_info *pvti =
114			pvclock_get_pvti_cpu0_va();
115		if (pvti && vclock_was_used(VCLOCK_PVCLOCK)) {
116			return vmf_insert_pfn_prot(vma, vmf->address,
117					__pa(pvti) >> PAGE_SHIFT,
118					pgprot_decrypted(vma->vm_page_prot));
119		}
120	} else if (sym_offset == image->sym_hvclock_page) {
121		struct ms_hyperv_tsc_page *tsc_pg = hv_get_tsc_page();
 
 
 
 
 
 
 
 
122
123		if (tsc_pg && vclock_was_used(VCLOCK_HVCLOCK))
124			return vmf_insert_pfn(vma, vmf->address,
125					virt_to_phys(tsc_pg) >> PAGE_SHIFT);
126	}
127
128	return VM_FAULT_SIGBUS;
129}
130
131static const struct vm_special_mapping vdso_mapping = {
132	.name = "[vdso]",
133	.fault = vdso_fault,
134	.mremap = vdso_mremap,
135};
136static const struct vm_special_mapping vvar_mapping = {
137	.name = "[vvar]",
138	.fault = vvar_fault,
139};
140
141/*
142 * Add vdso and vvar mappings to current process.
143 * @image          - blob to map
144 * @addr           - request a specific address (zero to map at free addr)
145 */
146static int map_vdso(const struct vdso_image *image, unsigned long addr)
147{
148	struct mm_struct *mm = current->mm;
149	struct vm_area_struct *vma;
150	unsigned long text_start;
151	int ret = 0;
152
153	if (down_write_killable(&mm->mmap_sem))
154		return -EINTR;
155
156	addr = get_unmapped_area(NULL, addr,
157				 image->size - image->sym_vvar_start, 0, 0);
158	if (IS_ERR_VALUE(addr)) {
159		ret = addr;
160		goto up_fail;
161	}
162
163	text_start = addr - image->sym_vvar_start;
164
165	/*
166	 * MAYWRITE to allow gdb to COW and set breakpoints
167	 */
168	vma = _install_special_mapping(mm,
169				       text_start,
170				       image->size,
171				       VM_READ|VM_EXEC|
172				       VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
173				       &vdso_mapping);
174
175	if (IS_ERR(vma)) {
176		ret = PTR_ERR(vma);
177		goto up_fail;
178	}
179
180	vma = _install_special_mapping(mm,
181				       addr,
182				       -image->sym_vvar_start,
183				       VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
184				       VM_PFNMAP,
185				       &vvar_mapping);
186
187	if (IS_ERR(vma)) {
188		ret = PTR_ERR(vma);
189		do_munmap(mm, text_start, image->size, NULL);
190	} else {
191		current->mm->context.vdso = (void __user *)text_start;
192		current->mm->context.vdso_image = image;
193	}
194
195up_fail:
196	up_write(&mm->mmap_sem);
197	return ret;
198}
199
200#ifdef CONFIG_X86_64
201/*
202 * Put the vdso above the (randomized) stack with another randomized
203 * offset.  This way there is no hole in the middle of address space.
204 * To save memory make sure it is still in the same PTE as the stack
205 * top.  This doesn't give that many random bits.
206 *
207 * Note that this algorithm is imperfect: the distribution of the vdso
208 * start address within a PMD is biased toward the end.
209 *
210 * Only used for the 64-bit and x32 vdsos.
211 */
212static unsigned long vdso_addr(unsigned long start, unsigned len)
213{
214	unsigned long addr, end;
215	unsigned offset;
216
217	/*
218	 * Round up the start address.  It can start out unaligned as a result
219	 * of stack start randomization.
220	 */
221	start = PAGE_ALIGN(start);
222
223	/* Round the lowest possible end address up to a PMD boundary. */
224	end = (start + len + PMD_SIZE - 1) & PMD_MASK;
225	if (end >= TASK_SIZE_MAX)
226		end = TASK_SIZE_MAX;
227	end -= len;
228
229	if (end > start) {
230		offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1);
231		addr = start + (offset << PAGE_SHIFT);
232	} else {
233		addr = start;
234	}
235
236	/*
237	 * Forcibly align the final address in case we have a hardware
238	 * issue that requires alignment for performance reasons.
239	 */
240	addr = align_vdso_addr(addr);
241
242	return addr;
243}
244
245static int map_vdso_randomized(const struct vdso_image *image)
246{
247	unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start);
248
249	return map_vdso(image, addr);
250}
251#endif
252
253int map_vdso_once(const struct vdso_image *image, unsigned long addr)
254{
255	struct mm_struct *mm = current->mm;
256	struct vm_area_struct *vma;
 
257
258	down_write(&mm->mmap_sem);
259	/*
260	 * Check if we have already mapped vdso blob - fail to prevent
261	 * abusing from userspace install_speciall_mapping, which may
262	 * not do accounting and rlimit right.
263	 * We could search vma near context.vdso, but it's a slowpath,
264	 * so let's explicitly check all VMAs to be completely sure.
265	 */
266	for (vma = mm->mmap; vma; vma = vma->vm_next) {
267		if (vma_is_special_mapping(vma, &vdso_mapping) ||
268				vma_is_special_mapping(vma, &vvar_mapping)) {
269			up_write(&mm->mmap_sem);
270			return -EEXIST;
271		}
272	}
273	up_write(&mm->mmap_sem);
274
275	return map_vdso(image, addr);
276}
277
278#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
279static int load_vdso32(void)
280{
281	if (vdso32_enabled != 1)  /* Other values all mean "disabled" */
282		return 0;
283
284	return map_vdso(&vdso_image_32, 0);
285}
286#endif
287
288#ifdef CONFIG_X86_64
289int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
290{
291	if (!vdso64_enabled)
292		return 0;
293
294	return map_vdso_randomized(&vdso_image_64);
295}
296
297#ifdef CONFIG_COMPAT
298int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
299				       int uses_interp)
300{
301#ifdef CONFIG_X86_X32_ABI
302	if (test_thread_flag(TIF_X32)) {
303		if (!vdso64_enabled)
304			return 0;
305		return map_vdso_randomized(&vdso_image_x32);
306	}
307#endif
308#ifdef CONFIG_IA32_EMULATION
309	return load_vdso32();
310#else
311	return 0;
312#endif
313}
314#endif
315#else
316int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
317{
318	return load_vdso32();
319}
320#endif
321
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
322#ifdef CONFIG_X86_64
323static __init int vdso_setup(char *s)
324{
325	vdso64_enabled = simple_strtoul(s, NULL, 0);
326	return 0;
327}
328__setup("vdso=", vdso_setup);
329
330static int __init init_vdso(void)
331{
 
 
332	init_vdso_image(&vdso_image_64);
333
334#ifdef CONFIG_X86_X32_ABI
335	init_vdso_image(&vdso_image_x32);
336#endif
337
338	return 0;
339}
340subsys_initcall(init_vdso);
341#endif /* CONFIG_X86_64 */