1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright 2007 Andi Kleen, SUSE Labs. 4 * 5 * This contains most of the x86 vDSO kernel-side code. 6 */ 7 #include <linux/mm.h> 8 #include <linux/err.h> 9 #include <linux/sched.h> 10 #include <linux/sched/task_stack.h> 11 #include <linux/slab.h> 12 #include <linux/init.h> 13 #include <linux/random.h> 14 #include <linux/elf.h> 15 #include <linux/cpu.h> 16 #include <linux/ptrace.h> 17 #include <linux/time_namespace.h> 18 19 #include <asm/pvclock.h> 20 #include <asm/vgtod.h> 21 #include <asm/proto.h> 22 #include <asm/vdso.h> 23 #include <asm/vvar.h> 24 #include <asm/tlb.h> 25 #include <asm/page.h> 26 #include <asm/desc.h> 27 #include <asm/cpufeature.h> 28 #include <clocksource/hyperv_timer.h> 29 30 #undef _ASM_X86_VVAR_H 31 #define EMIT_VVAR(name, offset) \ 32 const size_t name ## _offset = offset; 33 #include <asm/vvar.h> 34 35 struct vdso_data *arch_get_vdso_data(void *vvar_page) 36 { 37 return (struct vdso_data *)(vvar_page + _vdso_data_offset); 38 } 39 #undef EMIT_VVAR 40 41 unsigned int vclocks_used __read_mostly; 42 43 #if defined(CONFIG_X86_64) 44 unsigned int __read_mostly vdso64_enabled = 1; 45 #endif 46 47 void __init init_vdso_image(const struct vdso_image *image) 48 { 49 BUG_ON(image->size % PAGE_SIZE != 0); 50 51 apply_alternatives((struct alt_instr *)(image->data + image->alt), 52 (struct alt_instr *)(image->data + image->alt + 53 image->alt_len)); 54 } 55 56 static const struct vm_special_mapping vvar_mapping; 57 struct linux_binprm; 58 59 static vm_fault_t vdso_fault(const struct vm_special_mapping *sm, 60 struct vm_area_struct *vma, struct vm_fault *vmf) 61 { 62 const struct vdso_image *image = vma->vm_mm->context.vdso_image; 63 64 if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size) 65 return VM_FAULT_SIGBUS; 66 67 vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT)); 68 get_page(vmf->page); 69 return 0; 70 } 71 72 static void vdso_fix_landing(const struct vdso_image *image, 73 struct vm_area_struct *new_vma) 74 { 75 #if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION 76 if (in_ia32_syscall() && image == &vdso_image_32) { 77 struct pt_regs *regs = current_pt_regs(); 78 unsigned long vdso_land = image->sym_int80_landing_pad; 79 unsigned long old_land_addr = vdso_land + 80 (unsigned long)current->mm->context.vdso; 81 82 /* Fixing userspace landing - look at do_fast_syscall_32 */ 83 if (regs->ip == old_land_addr) 84 regs->ip = new_vma->vm_start + vdso_land; 85 } 86 #endif 87 } 88 89 static int vdso_mremap(const struct vm_special_mapping *sm, 90 struct vm_area_struct *new_vma) 91 { 92 const struct vdso_image *image = current->mm->context.vdso_image; 93 94 vdso_fix_landing(image, new_vma); 95 current->mm->context.vdso = (void __user *)new_vma->vm_start; 96 97 return 0; 98 } 99 100 #ifdef CONFIG_TIME_NS 101 static struct page *find_timens_vvar_page(struct vm_area_struct *vma) 102 { 103 if (likely(vma->vm_mm == current->mm)) 104 return current->nsproxy->time_ns->vvar_page; 105 106 /* 107 * VM_PFNMAP | VM_IO protect .fault() handler from being called 108 * through interfaces like /proc/$pid/mem or 109 * process_vm_{readv,writev}() as long as there's no .access() 110 * in special_mapping_vmops(). 111 * For more details check_vma_flags() and __access_remote_vm() 112 */ 113 114 WARN(1, "vvar_page accessed remotely"); 115 116 return NULL; 117 } 118 119 /* 120 * The vvar page layout depends on whether a task belongs to the root or 121 * non-root time namespace. Whenever a task changes its namespace, the VVAR 122 * page tables are cleared and then they will re-faulted with a 123 * corresponding layout. 124 * See also the comment near timens_setup_vdso_data() for details. 125 */ 126 int vdso_join_timens(struct task_struct *task, struct time_namespace *ns) 127 { 128 struct mm_struct *mm = task->mm; 129 struct vm_area_struct *vma; 130 131 mmap_read_lock(mm); 132 133 for (vma = mm->mmap; vma; vma = vma->vm_next) { 134 unsigned long size = vma->vm_end - vma->vm_start; 135 136 if (vma_is_special_mapping(vma, &vvar_mapping)) 137 zap_page_range(vma, vma->vm_start, size); 138 } 139 140 mmap_read_unlock(mm); 141 return 0; 142 } 143 #else 144 static inline struct page *find_timens_vvar_page(struct vm_area_struct *vma) 145 { 146 return NULL; 147 } 148 #endif 149 150 static vm_fault_t vvar_fault(const struct vm_special_mapping *sm, 151 struct vm_area_struct *vma, struct vm_fault *vmf) 152 { 153 const struct vdso_image *image = vma->vm_mm->context.vdso_image; 154 unsigned long pfn; 155 long sym_offset; 156 157 if (!image) 158 return VM_FAULT_SIGBUS; 159 160 sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) + 161 image->sym_vvar_start; 162 163 /* 164 * Sanity check: a symbol offset of zero means that the page 165 * does not exist for this vdso image, not that the page is at 166 * offset zero relative to the text mapping. This should be 167 * impossible here, because sym_offset should only be zero for 168 * the page past the end of the vvar mapping. 169 */ 170 if (sym_offset == 0) 171 return VM_FAULT_SIGBUS; 172 173 if (sym_offset == image->sym_vvar_page) { 174 struct page *timens_page = find_timens_vvar_page(vma); 175 176 pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT; 177 178 /* 179 * If a task belongs to a time namespace then a namespace 180 * specific VVAR is mapped with the sym_vvar_page offset and 181 * the real VVAR page is mapped with the sym_timens_page 182 * offset. 183 * See also the comment near timens_setup_vdso_data(). 184 */ 185 if (timens_page) { 186 unsigned long addr; 187 vm_fault_t err; 188 189 /* 190 * Optimization: inside time namespace pre-fault 191 * VVAR page too. As on timens page there are only 192 * offsets for clocks on VVAR, it'll be faulted 193 * shortly by VDSO code. 194 */ 195 addr = vmf->address + (image->sym_timens_page - sym_offset); 196 err = vmf_insert_pfn(vma, addr, pfn); 197 if (unlikely(err & VM_FAULT_ERROR)) 198 return err; 199 200 pfn = page_to_pfn(timens_page); 201 } 202 203 return vmf_insert_pfn(vma, vmf->address, pfn); 204 } else if (sym_offset == image->sym_pvclock_page) { 205 struct pvclock_vsyscall_time_info *pvti = 206 pvclock_get_pvti_cpu0_va(); 207 if (pvti && vclock_was_used(VDSO_CLOCKMODE_PVCLOCK)) { 208 return vmf_insert_pfn_prot(vma, vmf->address, 209 __pa(pvti) >> PAGE_SHIFT, 210 pgprot_decrypted(vma->vm_page_prot)); 211 } 212 } else if (sym_offset == image->sym_hvclock_page) { 213 struct ms_hyperv_tsc_page *tsc_pg = hv_get_tsc_page(); 214 215 if (tsc_pg && vclock_was_used(VDSO_CLOCKMODE_HVCLOCK)) 216 return vmf_insert_pfn(vma, vmf->address, 217 virt_to_phys(tsc_pg) >> PAGE_SHIFT); 218 } else if (sym_offset == image->sym_timens_page) { 219 struct page *timens_page = find_timens_vvar_page(vma); 220 221 if (!timens_page) 222 return VM_FAULT_SIGBUS; 223 224 pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT; 225 return vmf_insert_pfn(vma, vmf->address, pfn); 226 } 227 228 return VM_FAULT_SIGBUS; 229 } 230 231 static const struct vm_special_mapping vdso_mapping = { 232 .name = "[vdso]", 233 .fault = vdso_fault, 234 .mremap = vdso_mremap, 235 }; 236 static const struct vm_special_mapping vvar_mapping = { 237 .name = "[vvar]", 238 .fault = vvar_fault, 239 }; 240 241 /* 242 * Add vdso and vvar mappings to current process. 243 * @image - blob to map 244 * @addr - request a specific address (zero to map at free addr) 245 */ 246 static int map_vdso(const struct vdso_image *image, unsigned long addr) 247 { 248 struct mm_struct *mm = current->mm; 249 struct vm_area_struct *vma; 250 unsigned long text_start; 251 int ret = 0; 252 253 if (mmap_write_lock_killable(mm)) 254 return -EINTR; 255 256 addr = get_unmapped_area(NULL, addr, 257 image->size - image->sym_vvar_start, 0, 0); 258 if (IS_ERR_VALUE(addr)) { 259 ret = addr; 260 goto up_fail; 261 } 262 263 text_start = addr - image->sym_vvar_start; 264 265 /* 266 * MAYWRITE to allow gdb to COW and set breakpoints 267 */ 268 vma = _install_special_mapping(mm, 269 text_start, 270 image->size, 271 VM_READ|VM_EXEC| 272 VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC, 273 &vdso_mapping); 274 275 if (IS_ERR(vma)) { 276 ret = PTR_ERR(vma); 277 goto up_fail; 278 } 279 280 vma = _install_special_mapping(mm, 281 addr, 282 -image->sym_vvar_start, 283 VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP| 284 VM_PFNMAP, 285 &vvar_mapping); 286 287 if (IS_ERR(vma)) { 288 ret = PTR_ERR(vma); 289 do_munmap(mm, text_start, image->size, NULL); 290 } else { 291 current->mm->context.vdso = (void __user *)text_start; 292 current->mm->context.vdso_image = image; 293 } 294 295 up_fail: 296 mmap_write_unlock(mm); 297 return ret; 298 } 299 300 #ifdef CONFIG_X86_64 301 /* 302 * Put the vdso above the (randomized) stack with another randomized 303 * offset. This way there is no hole in the middle of address space. 304 * To save memory make sure it is still in the same PTE as the stack 305 * top. This doesn't give that many random bits. 306 * 307 * Note that this algorithm is imperfect: the distribution of the vdso 308 * start address within a PMD is biased toward the end. 309 * 310 * Only used for the 64-bit and x32 vdsos. 311 */ 312 static unsigned long vdso_addr(unsigned long start, unsigned len) 313 { 314 unsigned long addr, end; 315 unsigned offset; 316 317 /* 318 * Round up the start address. It can start out unaligned as a result 319 * of stack start randomization. 320 */ 321 start = PAGE_ALIGN(start); 322 323 /* Round the lowest possible end address up to a PMD boundary. */ 324 end = (start + len + PMD_SIZE - 1) & PMD_MASK; 325 if (end >= TASK_SIZE_MAX) 326 end = TASK_SIZE_MAX; 327 end -= len; 328 329 if (end > start) { 330 offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1); 331 addr = start + (offset << PAGE_SHIFT); 332 } else { 333 addr = start; 334 } 335 336 /* 337 * Forcibly align the final address in case we have a hardware 338 * issue that requires alignment for performance reasons. 339 */ 340 addr = align_vdso_addr(addr); 341 342 return addr; 343 } 344 345 static int map_vdso_randomized(const struct vdso_image *image) 346 { 347 unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start); 348 349 return map_vdso(image, addr); 350 } 351 #endif 352 353 int map_vdso_once(const struct vdso_image *image, unsigned long addr) 354 { 355 struct mm_struct *mm = current->mm; 356 struct vm_area_struct *vma; 357 358 mmap_write_lock(mm); 359 /* 360 * Check if we have already mapped vdso blob - fail to prevent 361 * abusing from userspace install_special_mapping, which may 362 * not do accounting and rlimit right. 363 * We could search vma near context.vdso, but it's a slowpath, 364 * so let's explicitly check all VMAs to be completely sure. 365 */ 366 for (vma = mm->mmap; vma; vma = vma->vm_next) { 367 if (vma_is_special_mapping(vma, &vdso_mapping) || 368 vma_is_special_mapping(vma, &vvar_mapping)) { 369 mmap_write_unlock(mm); 370 return -EEXIST; 371 } 372 } 373 mmap_write_unlock(mm); 374 375 return map_vdso(image, addr); 376 } 377 378 #if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION) 379 static int load_vdso32(void) 380 { 381 if (vdso32_enabled != 1) /* Other values all mean "disabled" */ 382 return 0; 383 384 return map_vdso(&vdso_image_32, 0); 385 } 386 #endif 387 388 #ifdef CONFIG_X86_64 389 int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) 390 { 391 if (!vdso64_enabled) 392 return 0; 393 394 return map_vdso_randomized(&vdso_image_64); 395 } 396 397 #ifdef CONFIG_COMPAT 398 int compat_arch_setup_additional_pages(struct linux_binprm *bprm, 399 int uses_interp, bool x32) 400 { 401 #ifdef CONFIG_X86_X32_ABI 402 if (x32) { 403 if (!vdso64_enabled) 404 return 0; 405 return map_vdso_randomized(&vdso_image_x32); 406 } 407 #endif 408 #ifdef CONFIG_IA32_EMULATION 409 return load_vdso32(); 410 #else 411 return 0; 412 #endif 413 } 414 #endif 415 #else 416 int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) 417 { 418 return load_vdso32(); 419 } 420 #endif 421 422 bool arch_syscall_is_vdso_sigreturn(struct pt_regs *regs) 423 { 424 #if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION) 425 const struct vdso_image *image = current->mm->context.vdso_image; 426 unsigned long vdso = (unsigned long) current->mm->context.vdso; 427 428 if (in_ia32_syscall() && image == &vdso_image_32) { 429 if (regs->ip == vdso + image->sym_vdso32_sigreturn_landing_pad || 430 regs->ip == vdso + image->sym_vdso32_rt_sigreturn_landing_pad) 431 return true; 432 } 433 #endif 434 return false; 435 } 436 437 #ifdef CONFIG_X86_64 438 static __init int vdso_setup(char *s) 439 { 440 vdso64_enabled = simple_strtoul(s, NULL, 0); 441 return 1; 442 } 443 __setup("vdso=", vdso_setup); 444 445 static int __init init_vdso(void) 446 { 447 BUILD_BUG_ON(VDSO_CLOCKMODE_MAX >= 32); 448 449 init_vdso_image(&vdso_image_64); 450 451 #ifdef CONFIG_X86_X32_ABI 452 init_vdso_image(&vdso_image_x32); 453 #endif 454 455 return 0; 456 } 457 subsys_initcall(init_vdso); 458 #endif /* CONFIG_X86_64 */ 459