2 * (C) Copyright 2002 Linus Torvalds
3 * Portions based on the vdso-randomization code from exec-shield:
4 * Copyright(C) 2005-2006, Red Hat, Inc., Ingo Molnar
6 * This file contains the needed initializations to support sysenter.
9 #include <linux/init.h>
10 #include <linux/smp.h>
11 #include <linux/thread_info.h>
12 #include <linux/sched.h>
13 #include <linux/gfp.h>
14 #include <linux/string.h>
15 #include <linux/elf.h>
17 #include <linux/err.h>
18 #include <linux/module.h>
20 #include <asm/cpufeature.h>
22 #include <asm/pgtable.h>
23 #include <asm/unistd.h>
25 #include <asm/tlbflush.h>
27 #include <asm/proto.h>
35 #ifdef CONFIG_COMPAT_VDSO
36 #define VDSO_DEFAULT VDSO_COMPAT
38 #define VDSO_DEFAULT VDSO_ENABLED
42 #define vdso_enabled sysctl_vsyscall32
43 #define arch_setup_additional_pages syscall32_setup_pages
44 extern int sysctl_ldt16;
48 * This is the difference between the prelinked addresses in the vDSO images
49 * and the VDSO_HIGH_BASE address where CONFIG_COMPAT_VDSO places the vDSO
50 * in the user address space.
52 #define VDSO_ADDR_ADJUST (VDSO_HIGH_BASE - (unsigned long)VDSO32_PRELINK)
55 * Should the kernel map a VDSO page into processes and pass its
56 * address down to glibc upon exec()?
58 unsigned int __read_mostly vdso_enabled = VDSO_DEFAULT;
60 static int __init vdso_setup(char *s)
62 vdso_enabled = simple_strtoul(s, NULL, 0);
68 * For consistency, the argument vdso32=[012] affects the 32-bit vDSO
69 * behavior on both 64-bit and 32-bit kernels.
70 * On 32-bit kernels, vdso=[012] means the same thing.
72 __setup("vdso32=", vdso_setup);
75 __setup_param("vdso=", vdso32_setup, vdso_setup, 0);
77 EXPORT_SYMBOL_GPL(vdso_enabled);
80 static __init void reloc_symtab(Elf32_Ehdr *ehdr,
81 unsigned offset, unsigned size)
83 Elf32_Sym *sym = (void *)ehdr + offset;
84 unsigned nsym = size / sizeof(*sym);
87 for(i = 0; i < nsym; i++, sym++) {
88 if (sym->st_shndx == SHN_UNDEF ||
89 sym->st_shndx == SHN_ABS)
92 if (sym->st_shndx > SHN_LORESERVE) {
93 printk(KERN_INFO "VDSO: unexpected st_shndx %x\n",
98 switch(ELF_ST_TYPE(sym->st_info)) {
103 sym->st_value += VDSO_ADDR_ADJUST;
108 static __init void reloc_dyn(Elf32_Ehdr *ehdr, unsigned offset)
110 Elf32_Dyn *dyn = (void *)ehdr + offset;
112 for(; dyn->d_tag != DT_NULL; dyn++)
127 case DT_ADDRRNGLO ... DT_ADDRRNGHI:
128 /* definitely pointers needing relocation */
129 dyn->d_un.d_ptr += VDSO_ADDR_ADJUST;
132 case DT_ENCODING ... OLD_DT_LOOS-1:
133 case DT_LOOS ... DT_HIOS-1:
134 /* Tags above DT_ENCODING are pointers if
136 if (dyn->d_tag >= DT_ENCODING &&
137 (dyn->d_tag & 1) == 0)
138 dyn->d_un.d_ptr += VDSO_ADDR_ADJUST;
146 case DT_VALRNGLO ... DT_VALRNGHI:
147 /* definitely not pointers */
150 case OLD_DT_LOOS ... DT_LOOS-1:
151 case DT_HIOS ... DT_VALRNGLO-1:
153 if (dyn->d_tag > DT_ENCODING)
154 printk(KERN_INFO "VDSO: unexpected DT_tag %x\n",
160 static __init void relocate_vdso(Elf32_Ehdr *ehdr)
166 BUG_ON(memcmp(ehdr->e_ident, ELFMAG, SELFMAG) != 0 ||
167 !elf_check_arch_ia32(ehdr) ||
168 ehdr->e_type != ET_DYN);
170 ehdr->e_entry += VDSO_ADDR_ADJUST;
173 phdr = (void *)ehdr + ehdr->e_phoff;
174 for (i = 0; i < ehdr->e_phnum; i++) {
175 phdr[i].p_vaddr += VDSO_ADDR_ADJUST;
177 /* relocate dynamic stuff */
178 if (phdr[i].p_type == PT_DYNAMIC)
179 reloc_dyn(ehdr, phdr[i].p_offset);
182 /* rebase sections */
183 shdr = (void *)ehdr + ehdr->e_shoff;
184 for(i = 0; i < ehdr->e_shnum; i++) {
185 if (!(shdr[i].sh_flags & SHF_ALLOC))
188 shdr[i].sh_addr += VDSO_ADDR_ADJUST;
190 if (shdr[i].sh_type == SHT_SYMTAB ||
191 shdr[i].sh_type == SHT_DYNSYM)
192 reloc_symtab(ehdr, shdr[i].sh_offset,
197 static struct page *vdso32_pages[1];
201 #define vdso32_sysenter() (boot_cpu_has(X86_FEATURE_SYSENTER32))
202 #define vdso32_syscall() (boot_cpu_has(X86_FEATURE_SYSCALL32))
204 /* May not be __init: called during resume */
205 void syscall32_cpu_init(void)
207 /* Load these always in case some future AMD CPU supports
208 SYSENTER from compat mode too. */
209 wrmsrl_safe(MSR_IA32_SYSENTER_CS, (u64)__KERNEL_CS);
210 wrmsrl_safe(MSR_IA32_SYSENTER_ESP, 0ULL);
211 wrmsrl_safe(MSR_IA32_SYSENTER_EIP, (u64)ia32_sysenter_target);
213 wrmsrl(MSR_CSTAR, ia32_cstar_target);
216 #define compat_uses_vma 1
218 static inline void map_compat_vdso(int map)
222 #else /* CONFIG_X86_32 */
224 #define vdso32_sysenter() (boot_cpu_has(X86_FEATURE_SEP))
225 #define vdso32_syscall() (0)
227 void enable_sep_cpu(void)
230 struct tss_struct *tss = &per_cpu(init_tss, cpu);
232 if (!boot_cpu_has(X86_FEATURE_SEP)) {
237 tss->x86_tss.ss1 = __KERNEL_CS;
238 tss->x86_tss.sp1 = sizeof(struct tss_struct) + (unsigned long) tss;
239 wrmsr(MSR_IA32_SYSENTER_CS, __KERNEL_CS, 0);
240 wrmsr(MSR_IA32_SYSENTER_ESP, tss->x86_tss.sp1, 0);
241 wrmsr(MSR_IA32_SYSENTER_EIP, (unsigned long) ia32_sysenter_target, 0);
245 static struct vm_area_struct gate_vma;
247 static int __init gate_vma_init(void)
249 gate_vma.vm_mm = NULL;
250 gate_vma.vm_start = FIXADDR_USER_START;
251 gate_vma.vm_end = FIXADDR_USER_END;
252 gate_vma.vm_flags = VM_READ | VM_MAYREAD | VM_EXEC | VM_MAYEXEC;
253 gate_vma.vm_page_prot = __P101;
258 #define compat_uses_vma 0
260 static void map_compat_vdso(int map)
262 static int vdso_mapped;
264 if (map == vdso_mapped)
269 __set_fixmap(FIX_VDSO, page_to_pfn(vdso32_pages[0]) << PAGE_SHIFT,
270 map ? PAGE_READONLY_EXEC : PAGE_NONE);
272 /* flush stray tlbs */
276 #endif /* CONFIG_X86_64 */
278 int __init sysenter_setup(void)
280 void *syscall_page = (void *)get_zeroed_page(GFP_ATOMIC);
281 const void *vsyscall;
284 vdso32_pages[0] = virt_to_page(syscall_page);
290 if (vdso32_syscall()) {
291 vsyscall = &vdso32_syscall_start;
292 vsyscall_len = &vdso32_syscall_end - &vdso32_syscall_start;
293 } else if (vdso32_sysenter()){
294 vsyscall = &vdso32_sysenter_start;
295 vsyscall_len = &vdso32_sysenter_end - &vdso32_sysenter_start;
297 vsyscall = &vdso32_int80_start;
298 vsyscall_len = &vdso32_int80_end - &vdso32_int80_start;
301 memcpy(syscall_page, vsyscall, vsyscall_len);
302 relocate_vdso(syscall_page);
307 /* Setup a VMA at program startup for the vsyscall page */
308 int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
310 struct mm_struct *mm = current->mm;
315 #ifdef CONFIG_X86_X32_ABI
316 if (test_thread_flag(TIF_X32))
317 return x32_setup_additional_pages(bprm, uses_interp);
320 if (vdso_enabled == VDSO_DISABLED)
323 down_write(&mm->mmap_sem);
325 /* Test compat mode once here, in case someone
326 changes it via sysctl */
327 compat = (vdso_enabled == VDSO_COMPAT);
329 map_compat_vdso(compat);
332 addr = VDSO_HIGH_BASE;
334 addr = get_unmapped_area(NULL, 0, PAGE_SIZE, 0, 0);
335 if (IS_ERR_VALUE(addr)) {
341 current->mm->context.vdso = (void *)addr;
343 if (compat_uses_vma || !compat) {
345 * MAYWRITE to allow gdb to COW and set breakpoints
347 ret = install_special_mapping(mm, addr, PAGE_SIZE,
349 VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
356 current_thread_info()->sysenter_return =
357 VDSO32_SYMBOL(addr, SYSENTER_RETURN);
361 current->mm->context.vdso = NULL;
363 up_write(&mm->mmap_sem);
370 subsys_initcall(sysenter_setup);
373 /* Register vsyscall32 into the ABI table */
374 #include <linux/sysctl.h>
376 static ctl_table abi_table2[] = {
378 .procname = "vsyscall32",
379 .data = &sysctl_vsyscall32,
380 .maxlen = sizeof(int),
382 .proc_handler = proc_dointvec
386 .data = &sysctl_ldt16,
387 .maxlen = sizeof(int),
389 .proc_handler = proc_dointvec
394 static ctl_table abi_root_table2[] = {
403 static __init int ia32_binfmt_init(void)
405 register_sysctl_table(abi_root_table2);
408 __initcall(ia32_binfmt_init);
411 #else /* CONFIG_X86_32 */
413 const char *arch_vma_name(struct vm_area_struct *vma)
415 if (vma->vm_mm && vma->vm_start == (long)vma->vm_mm->context.vdso)
420 struct vm_area_struct *get_gate_vma(struct mm_struct *mm)
423 * Check to see if the corresponding task was created in compat vdso
426 if (mm && mm->context.vdso == (void *)VDSO_HIGH_BASE)
431 int in_gate_area(struct mm_struct *mm, unsigned long addr)
433 const struct vm_area_struct *vma = get_gate_vma(mm);
435 return vma && addr >= vma->vm_start && addr < vma->vm_end;
438 int in_gate_area_no_mm(unsigned long addr)
443 #endif /* CONFIG_X86_64 */