1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * VDSO implementations. 4 * 5 * Copyright (C) 2012 ARM Limited 6 * 7 * Author: Will Deacon <will.deacon@arm.com> 8 */ 9 10 #include <linux/cache.h> 11 #include <linux/clocksource.h> 12 #include <linux/elf.h> 13 #include <linux/err.h> 14 #include <linux/errno.h> 15 #include <linux/gfp.h> 16 #include <linux/kernel.h> 17 #include <linux/mm.h> 18 #include <linux/sched.h> 19 #include <linux/signal.h> 20 #include <linux/slab.h> 21 #include <linux/timekeeper_internal.h> 22 #include <linux/vmalloc.h> 23 #include <vdso/datapage.h> 24 #include <vdso/helpers.h> 25 #include <vdso/vsyscall.h> 26 27 #include <asm/cacheflush.h> 28 #include <asm/signal32.h> 29 #include <asm/vdso.h> 30 31 extern char vdso_start[], vdso_end[]; 32 #ifdef CONFIG_COMPAT_VDSO 33 extern char vdso32_start[], vdso32_end[]; 34 #endif /* CONFIG_COMPAT_VDSO */ 35 36 enum vdso_abi { 37 VDSO_ABI_AA64, 38 #ifdef CONFIG_COMPAT_VDSO 39 VDSO_ABI_AA32, 40 #endif /* CONFIG_COMPAT_VDSO */ 41 }; 42 43 struct vdso_abi_info { 44 const char *name; 45 const char *vdso_code_start; 46 const char *vdso_code_end; 47 unsigned long vdso_pages; 48 /* Data Mapping */ 49 struct vm_special_mapping *dm; 50 /* Code Mapping */ 51 struct vm_special_mapping *cm; 52 }; 53 54 static struct vdso_abi_info vdso_info[] __ro_after_init = { 55 [VDSO_ABI_AA64] = { 56 .name = "vdso", 57 .vdso_code_start = vdso_start, 58 .vdso_code_end = vdso_end, 59 }, 60 #ifdef CONFIG_COMPAT_VDSO 61 [VDSO_ABI_AA32] = { 62 .name = "vdso32", 63 .vdso_code_start = vdso32_start, 64 .vdso_code_end = vdso32_end, 65 }, 66 #endif /* CONFIG_COMPAT_VDSO */ 67 }; 68 69 /* 70 * The vDSO data page. 71 */ 72 static union { 73 struct vdso_data data[CS_BASES]; 74 u8 page[PAGE_SIZE]; 75 } vdso_data_store __page_aligned_data; 76 struct vdso_data *vdso_data = vdso_data_store.data; 77 78 static int __vdso_remap(enum vdso_abi abi, 79 const struct vm_special_mapping *sm, 80 struct vm_area_struct *new_vma) 81 { 82 unsigned long new_size = new_vma->vm_end - new_vma->vm_start; 83 unsigned long vdso_size = vdso_info[abi].vdso_code_end - 84 vdso_info[abi].vdso_code_start; 85 86 if (vdso_size != new_size) 87 return -EINVAL; 88 89 current->mm->context.vdso = (void *)new_vma->vm_start; 90 91 return 0; 92 } 93 94 static int __vdso_init(enum vdso_abi abi) 95 { 96 int i; 97 struct page **vdso_pagelist; 98 unsigned long pfn; 99 100 if (memcmp(vdso_info[abi].vdso_code_start, "\177ELF", 4)) { 101 pr_err("vDSO is not a valid ELF object!\n"); 102 return -EINVAL; 103 } 104 105 vdso_info[abi].vdso_pages = ( 106 vdso_info[abi].vdso_code_end - 107 vdso_info[abi].vdso_code_start) >> 108 PAGE_SHIFT; 109 110 /* Allocate the vDSO pagelist, plus a page for the data. */ 111 vdso_pagelist = kcalloc(vdso_info[abi].vdso_pages + 1, 112 sizeof(struct page *), 113 GFP_KERNEL); 114 if (vdso_pagelist == NULL) 115 return -ENOMEM; 116 117 /* Grab the vDSO data page. */ 118 vdso_pagelist[0] = phys_to_page(__pa_symbol(vdso_data)); 119 120 121 /* Grab the vDSO code pages. */ 122 pfn = sym_to_pfn(vdso_info[abi].vdso_code_start); 123 124 for (i = 0; i < vdso_info[abi].vdso_pages; i++) 125 vdso_pagelist[i + 1] = pfn_to_page(pfn + i); 126 127 vdso_info[abi].dm->pages = &vdso_pagelist[0]; 128 vdso_info[abi].cm->pages = &vdso_pagelist[1]; 129 130 return 0; 131 } 132 133 static int __setup_additional_pages(enum vdso_abi abi, 134 struct mm_struct *mm, 135 struct linux_binprm *bprm, 136 int uses_interp) 137 { 138 unsigned long vdso_base, vdso_text_len, vdso_mapping_len; 139 void *ret; 140 141 vdso_text_len = vdso_info[abi].vdso_pages << PAGE_SHIFT; 142 /* Be sure to map the data page */ 143 vdso_mapping_len = vdso_text_len + PAGE_SIZE; 144 145 vdso_base = get_unmapped_area(NULL, 0, vdso_mapping_len, 0, 0); 146 if (IS_ERR_VALUE(vdso_base)) { 147 ret = ERR_PTR(vdso_base); 148 goto up_fail; 149 } 150 151 ret = _install_special_mapping(mm, vdso_base, PAGE_SIZE, 152 VM_READ|VM_MAYREAD, 153 vdso_info[abi].dm); 154 if (IS_ERR(ret)) 155 goto up_fail; 156 157 vdso_base += PAGE_SIZE; 158 mm->context.vdso = (void *)vdso_base; 159 ret = _install_special_mapping(mm, vdso_base, vdso_text_len, 160 VM_READ|VM_EXEC| 161 VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC, 162 vdso_info[abi].cm); 163 if (IS_ERR(ret)) 164 goto up_fail; 165 166 return 0; 167 168 up_fail: 169 mm->context.vdso = NULL; 170 return PTR_ERR(ret); 171 } 172 173 #ifdef CONFIG_COMPAT 174 /* 175 * Create and map the vectors page for AArch32 tasks. 176 */ 177 #ifdef CONFIG_COMPAT_VDSO 178 static int aarch32_vdso_mremap(const struct vm_special_mapping *sm, 179 struct vm_area_struct *new_vma) 180 { 181 return __vdso_remap(VDSO_ABI_AA32, sm, new_vma); 182 } 183 #endif /* CONFIG_COMPAT_VDSO */ 184 185 enum aarch32_map { 186 AA32_MAP_VECTORS, /* kuser helpers */ 187 #ifdef CONFIG_COMPAT_VDSO 188 AA32_MAP_VVAR, 189 AA32_MAP_VDSO, 190 #else 191 AA32_MAP_SIGPAGE 192 #endif 193 }; 194 195 static struct page *aarch32_vectors_page __ro_after_init; 196 #ifndef CONFIG_COMPAT_VDSO 197 static struct page *aarch32_sig_page __ro_after_init; 198 #endif 199 200 static struct vm_special_mapping aarch32_vdso_maps[] = { 201 [AA32_MAP_VECTORS] = { 202 .name = "[vectors]", /* ABI */ 203 .pages = &aarch32_vectors_page, 204 }, 205 #ifdef CONFIG_COMPAT_VDSO 206 [AA32_MAP_VVAR] = { 207 .name = "[vvar]", 208 }, 209 [AA32_MAP_VDSO] = { 210 .name = "[vdso]", 211 .mremap = aarch32_vdso_mremap, 212 }, 213 #else 214 [AA32_MAP_SIGPAGE] = { 215 .name = "[sigpage]", /* ABI */ 216 .pages = &aarch32_sig_page, 217 }, 218 #endif /* CONFIG_COMPAT_VDSO */ 219 }; 220 221 static int aarch32_alloc_kuser_vdso_page(void) 222 { 223 extern char __kuser_helper_start[], __kuser_helper_end[]; 224 int kuser_sz = __kuser_helper_end - __kuser_helper_start; 225 unsigned long vdso_page; 226 227 if (!IS_ENABLED(CONFIG_KUSER_HELPERS)) 228 return 0; 229 230 vdso_page = get_zeroed_page(GFP_ATOMIC); 231 if (!vdso_page) 232 return -ENOMEM; 233 234 memcpy((void *)(vdso_page + 0x1000 - kuser_sz), __kuser_helper_start, 235 kuser_sz); 236 aarch32_vectors_page = virt_to_page(vdso_page); 237 flush_dcache_page(aarch32_vectors_page); 238 return 0; 239 } 240 241 #ifdef CONFIG_COMPAT_VDSO 242 static int __aarch32_alloc_vdso_pages(void) 243 { 244 int ret; 245 246 vdso_info[VDSO_ABI_AA32].dm = &aarch32_vdso_maps[AA32_MAP_VVAR]; 247 vdso_info[VDSO_ABI_AA32].cm = &aarch32_vdso_maps[AA32_MAP_VDSO]; 248 249 ret = __vdso_init(VDSO_ABI_AA32); 250 if (ret) 251 return ret; 252 253 return aarch32_alloc_kuser_vdso_page(); 254 } 255 #else 256 static int __aarch32_alloc_vdso_pages(void) 257 { 258 extern char __aarch32_sigret_code_start[], __aarch32_sigret_code_end[]; 259 int sigret_sz = __aarch32_sigret_code_end - __aarch32_sigret_code_start; 260 unsigned long sigpage; 261 int ret; 262 263 sigpage = get_zeroed_page(GFP_ATOMIC); 264 if (!sigpage) 265 return -ENOMEM; 266 267 memcpy((void *)sigpage, __aarch32_sigret_code_start, sigret_sz); 268 aarch32_sig_page = virt_to_page(sigpage); 269 flush_dcache_page(aarch32_sig_page); 270 271 ret = aarch32_alloc_kuser_vdso_page(); 272 if (ret) 273 free_page(sigpage); 274 275 return ret; 276 } 277 #endif /* CONFIG_COMPAT_VDSO */ 278 279 static int __init aarch32_alloc_vdso_pages(void) 280 { 281 return __aarch32_alloc_vdso_pages(); 282 } 283 arch_initcall(aarch32_alloc_vdso_pages); 284 285 static int aarch32_kuser_helpers_setup(struct mm_struct *mm) 286 { 287 void *ret; 288 289 if (!IS_ENABLED(CONFIG_KUSER_HELPERS)) 290 return 0; 291 292 /* 293 * Avoid VM_MAYWRITE for compatibility with arch/arm/, where it's 294 * not safe to CoW the page containing the CPU exception vectors. 295 */ 296 ret = _install_special_mapping(mm, AARCH32_VECTORS_BASE, PAGE_SIZE, 297 VM_READ | VM_EXEC | 298 VM_MAYREAD | VM_MAYEXEC, 299 &aarch32_vdso_maps[AA32_MAP_VECTORS]); 300 301 return PTR_ERR_OR_ZERO(ret); 302 } 303 304 #ifndef CONFIG_COMPAT_VDSO 305 static int aarch32_sigreturn_setup(struct mm_struct *mm) 306 { 307 unsigned long addr; 308 void *ret; 309 310 addr = get_unmapped_area(NULL, 0, PAGE_SIZE, 0, 0); 311 if (IS_ERR_VALUE(addr)) { 312 ret = ERR_PTR(addr); 313 goto out; 314 } 315 316 /* 317 * VM_MAYWRITE is required to allow gdb to Copy-on-Write and 318 * set breakpoints. 319 */ 320 ret = _install_special_mapping(mm, addr, PAGE_SIZE, 321 VM_READ | VM_EXEC | VM_MAYREAD | 322 VM_MAYWRITE | VM_MAYEXEC, 323 &aarch32_vdso_maps[AA32_MAP_SIGPAGE]); 324 if (IS_ERR(ret)) 325 goto out; 326 327 mm->context.vdso = (void *)addr; 328 329 out: 330 return PTR_ERR_OR_ZERO(ret); 331 } 332 #endif /* !CONFIG_COMPAT_VDSO */ 333 334 int aarch32_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) 335 { 336 struct mm_struct *mm = current->mm; 337 int ret; 338 339 if (down_write_killable(&mm->mmap_sem)) 340 return -EINTR; 341 342 ret = aarch32_kuser_helpers_setup(mm); 343 if (ret) 344 goto out; 345 346 #ifdef CONFIG_COMPAT_VDSO 347 ret = __setup_additional_pages(VDSO_ABI_AA32, 348 mm, 349 bprm, 350 uses_interp); 351 #else 352 ret = aarch32_sigreturn_setup(mm); 353 #endif /* CONFIG_COMPAT_VDSO */ 354 355 out: 356 up_write(&mm->mmap_sem); 357 return ret; 358 } 359 #endif /* CONFIG_COMPAT */ 360 361 static int vdso_mremap(const struct vm_special_mapping *sm, 362 struct vm_area_struct *new_vma) 363 { 364 return __vdso_remap(VDSO_ABI_AA64, sm, new_vma); 365 } 366 367 enum aarch64_map { 368 AA64_MAP_VVAR, 369 AA64_MAP_VDSO, 370 }; 371 372 static struct vm_special_mapping aarch64_vdso_maps[] __ro_after_init = { 373 [AA64_MAP_VVAR] = { 374 .name = "[vvar]", 375 }, 376 [AA64_MAP_VDSO] = { 377 .name = "[vdso]", 378 .mremap = vdso_mremap, 379 }, 380 }; 381 382 static int __init vdso_init(void) 383 { 384 vdso_info[VDSO_ABI_AA64].dm = &aarch64_vdso_maps[AA64_MAP_VVAR]; 385 vdso_info[VDSO_ABI_AA64].cm = &aarch64_vdso_maps[AA64_MAP_VDSO]; 386 387 return __vdso_init(VDSO_ABI_AA64); 388 } 389 arch_initcall(vdso_init); 390 391 int arch_setup_additional_pages(struct linux_binprm *bprm, 392 int uses_interp) 393 { 394 struct mm_struct *mm = current->mm; 395 int ret; 396 397 if (down_write_killable(&mm->mmap_sem)) 398 return -EINTR; 399 400 ret = __setup_additional_pages(VDSO_ABI_AA64, 401 mm, 402 bprm, 403 uses_interp); 404 405 up_write(&mm->mmap_sem); 406 407 return ret; 408 } 409