cregit-Linux how code gets into the kernel

Release 4.14 arch/x86/entry/vdso/vma.c

/*
 * Copyright 2007 Andi Kleen, SUSE Labs.
 * Subject to the GPL, v.2
 *
 * This contains most of the x86 vDSO kernel-side code.
 */
#include <linux/mm.h>
#include <linux/err.h>
#include <linux/sched.h>
#include <linux/sched/task_stack.h>
#include <linux/slab.h>
#include <linux/init.h>
#include <linux/random.h>
#include <linux/elf.h>
#include <linux/cpu.h>
#include <linux/ptrace.h>
#include <asm/pvclock.h>
#include <asm/vgtod.h>
#include <asm/proto.h>
#include <asm/vdso.h>
#include <asm/vvar.h>
#include <asm/page.h>
#include <asm/desc.h>
#include <asm/cpufeature.h>
#include <asm/mshyperv.h>

#if defined(CONFIG_X86_64)

unsigned int __read_mostly vdso64_enabled = 1;
#endif


void __init init_vdso_image(const struct vdso_image *image) { BUG_ON(image->size % PAGE_SIZE != 0); apply_alternatives((struct alt_instr *)(image->data + image->alt), (struct alt_instr *)(image->data + image->alt + image->alt_len)); }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski4778.33%266.67%
H. J. Lu1321.67%133.33%
Total60100.00%3100.00%

struct linux_binprm;
static int vdso_fault(const struct vm_special_mapping *sm, struct vm_area_struct *vma, struct vm_fault *vmf) { const struct vdso_image *image = vma->vm_mm->context.vdso_image; if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size) return VM_FAULT_SIGBUS; vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT)); get_page(vmf->page); return 0; }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski85100.00%1100.00%
Total85100.00%1100.00%


static void vdso_fix_landing(const struct vdso_image *image, struct vm_area_struct *new_vma) { #if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION if (in_ia32_syscall() && image == &vdso_image_32) { struct pt_regs *regs = current_pt_regs(); unsigned long vdso_land = image->sym_int80_landing_pad; unsigned long old_land_addr = vdso_land + (unsigned long)current->mm->context.vdso; /* Fixing userspace landing - look at do_fast_syscall_32 */ if (regs->ip == old_land_addr) regs->ip = new_vma->vm_start + vdso_land; } #endif }

Contributors

PersonTokensPropCommitsCommitProp
Dmitry Safonov8593.41%150.00%
Andrew Lutomirski66.59%150.00%
Total91100.00%2100.00%


static int vdso_mremap(const struct vm_special_mapping *sm, struct vm_area_struct *new_vma) { unsigned long new_size = new_vma->vm_end - new_vma->vm_start; const struct vdso_image *image = current->mm->context.vdso_image; if (image->size != new_size) return -EINVAL; vdso_fix_landing(image, new_vma); current->mm->context.vdso = (void __user *)new_vma->vm_start; return 0; }

Contributors

PersonTokensPropCommitsCommitProp
Dmitry Safonov8097.56%150.00%
Andrew Lutomirski22.44%150.00%
Total82100.00%2100.00%


static int vvar_fault(const struct vm_special_mapping *sm, struct vm_area_struct *vma, struct vm_fault *vmf) { const struct vdso_image *image = vma->vm_mm->context.vdso_image; long sym_offset; int ret = -EFAULT; if (!image) return VM_FAULT_SIGBUS; sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) + image->sym_vvar_start; /* * Sanity check: a symbol offset of zero means that the page * does not exist for this vdso image, not that the page is at * offset zero relative to the text mapping. This should be * impossible here, because sym_offset should only be zero for * the page past the end of the vvar mapping. */ if (sym_offset == 0) return VM_FAULT_SIGBUS; if (sym_offset == image->sym_vvar_page) { ret = vm_insert_pfn(vma, vmf->address, __pa_symbol(&__vvar_page) >> PAGE_SHIFT); } else if (sym_offset == image->sym_pvclock_page) { struct pvclock_vsyscall_time_info *pvti = pvclock_pvti_cpu0_va(); if (pvti && vclock_was_used(VCLOCK_PVCLOCK)) { ret = vm_insert_pfn( vma, vmf->address, __pa(pvti) >> PAGE_SHIFT); } } else if (sym_offset == image->sym_hvclock_page) { struct ms_hyperv_tsc_page *tsc_pg = hv_get_tsc_page(); if (tsc_pg && vclock_was_used(VCLOCK_HVCLOCK)) ret = vm_insert_pfn(vma, vmf->address, vmalloc_to_pfn(tsc_pg)); } if (ret == 0 || ret == -EBUSY) return VM_FAULT_NOPAGE; return VM_FAULT_SIGBUS; }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski17278.90%250.00%
Vitaly Kuznetsov4420.18%125.00%
Jan Kara20.92%125.00%
Total218100.00%4100.00%

static const struct vm_special_mapping vdso_mapping = { .name = "[vdso]", .fault = vdso_fault, .mremap = vdso_mremap, }; static const struct vm_special_mapping vvar_mapping = { .name = "[vvar]", .fault = vvar_fault, }; /* * Add vdso and vvar mappings to current process. * @image - blob to map * @addr - request a specific address (zero to map at free addr) */
static int map_vdso(const struct vdso_image *image, unsigned long addr) { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; unsigned long text_start; int ret = 0; if (down_write_killable(&mm->mmap_sem)) return -EINTR; addr = get_unmapped_area(NULL, addr, image->size - image->sym_vvar_start, 0, 0); if (IS_ERR_VALUE(addr)) { ret = addr; goto up_fail; } text_start = addr - image->sym_vvar_start; /* * MAYWRITE to allow gdb to COW and set breakpoints */ vma = _install_special_mapping(mm, text_start, image->size, VM_READ|VM_EXEC| VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC, &vdso_mapping); if (IS_ERR(vma)) { ret = PTR_ERR(vma); goto up_fail; } vma = _install_special_mapping(mm, addr, -image->sym_vvar_start, VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP| VM_PFNMAP, &vvar_mapping); if (IS_ERR(vma)) { ret = PTR_ERR(vma); do_munmap(mm, text_start, image->size, NULL); } else { current->mm->context.vdso = (void __user *)text_start; current->mm->context.vdso_image = image; } up_fail: up_write(&mm->mmap_sem); return ret; }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski10342.74%535.71%
Andi Kleen8936.93%17.14%
Dmitry Safonov3614.94%428.57%
Michal Hocko62.49%17.14%
H. J. Lu41.66%17.14%
Mike Rapoport20.83%17.14%
Peter Zijlstra10.41%17.14%
Total241100.00%14100.00%

#ifdef CONFIG_X86_64 /* * Put the vdso above the (randomized) stack with another randomized * offset. This way there is no hole in the middle of address space. * To save memory make sure it is still in the same PTE as the stack * top. This doesn't give that many random bits. * * Note that this algorithm is imperfect: the distribution of the vdso * start address within a PMD is biased toward the end. * * Only used for the 64-bit and x32 vdsos. */
static unsigned long vdso_addr(unsigned long start, unsigned len) { unsigned long addr, end; unsigned offset; /* * Round up the start address. It can start out unaligned as a result * of stack start randomization. */ start = PAGE_ALIGN(start); /* Round the lowest possible end address up to a PMD boundary. */ end = (start + len + PMD_SIZE - 1) & PMD_MASK; if (end >= TASK_SIZE_MAX) end = TASK_SIZE_MAX; end -= len; if (end > start) { offset = get_random_int() % (((end - start) >> PAGE_SHIFT) + 1); addr = start + (offset << PAGE_SHIFT); } else { addr = start; } /* * Forcibly align the final address in case we have a hardware * issue that requires alignment for performance reasons. */ addr = align_vdso_addr(addr); return addr; }

Contributors

PersonTokensPropCommitsCommitProp
Ingo Molnar115100.00%1100.00%
Total115100.00%1100.00%


static int map_vdso_randomized(const struct vdso_image *image) { unsigned long addr = vdso_addr(current->mm->start_stack, image->size-image->sym_vvar_start); return map_vdso(image, addr); }

Contributors

PersonTokensPropCommitsCommitProp
Dmitry Safonov41100.00%1100.00%
Total41100.00%1100.00%

#endif
int map_vdso_once(const struct vdso_image *image, unsigned long addr) { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; down_write(&mm->mmap_sem); /* * Check if we have already mapped vdso blob - fail to prevent * abusing from userspace install_speciall_mapping, which may * not do accounting and rlimit right. * We could search vma near context.vdso, but it's a slowpath, * so let's explicitely check all VMAs to be completely sure. */ for (vma = mm->mmap; vma; vma = vma->vm_next) { if (vma_is_special_mapping(vma, &vdso_mapping) || vma_is_special_mapping(vma, &vvar_mapping)) { up_write(&mm->mmap_sem); return -EEXIST; } } up_write(&mm->mmap_sem); return map_vdso(image, addr); }

Contributors

PersonTokensPropCommitsCommitProp
Dmitry Safonov104100.00%1100.00%
Total104100.00%1100.00%

#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
static int load_vdso32(void) { if (vdso32_enabled != 1) /* Other values all mean "disabled" */ return 0; return map_vdso(&vdso_image_32, 0); }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski2696.30%266.67%
Dmitry Safonov13.70%133.33%
Total27100.00%3100.00%

#endif #ifdef CONFIG_X86_64
int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) { if (!vdso64_enabled) return 0; return map_vdso_randomized(&vdso_image_64); }

Contributors

PersonTokensPropCommitsCommitProp
H. J. Lu1760.71%125.00%
Andrew Lutomirski1035.71%250.00%
Dmitry Safonov13.57%125.00%
Total28100.00%4100.00%

#ifdef CONFIG_COMPAT
int compat_arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) { #ifdef CONFIG_X86_X32_ABI if (test_thread_flag(TIF_X32)) { if (!vdso64_enabled) return 0; return map_vdso_randomized(&vdso_image_x32); } #endif #ifdef CONFIG_IA32_EMULATION return load_vdso32(); #else return 0; #endif }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski2951.79%240.00%
H. J. Lu1628.57%120.00%
Brian Gerst1017.86%120.00%
Dmitry Safonov11.79%120.00%
Total56100.00%5100.00%

#endif #else
int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp) { return load_vdso32(); }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski17100.00%1100.00%
Total17100.00%1100.00%

#endif #ifdef CONFIG_X86_64
static __init int vdso_setup(char *s) { vdso64_enabled = simple_strtoul(s, NULL, 0); return 0; }

Contributors

PersonTokensPropCommitsCommitProp
Andi Kleen2496.00%150.00%
Andrew Lutomirski14.00%150.00%
Total25100.00%2100.00%

__setup("vdso=", vdso_setup); #endif #ifdef CONFIG_X86_64
static void vgetcpu_cpu_init(void *arg) { int cpu = smp_processor_id(); struct desc_struct d = { }; unsigned long node = 0; #ifdef CONFIG_NUMA node = cpu_to_node(cpu); #endif if (static_cpu_has(X86_FEATURE_RDTSCP)) write_rdtscp_aux((node << 12) | cpu); /* * Store cpu number in limit so that it can be loaded * quickly in user space in vgetcpu. (12 bits for the CPU * and 8 bits for the node) */ d.limit0 = cpu | ((node & 0xf) << 12); d.limit1 = node >> 4; d.type = 5; /* RO data, expand down, accessed */ d.dpl = 3; /* Visible to user code */ d.s = 1; /* Not a system segment */ d.p = 1; /* Present */ d.d = 1; /* 32-bit */ write_gdt_entry(get_cpu_gdt_rw(cpu), GDT_ENTRY_PER_CPU, &d, DESCTYPE_S); }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski11586.47%555.56%
Andrew Morton1511.28%111.11%
Thomas Garnier10.75%111.11%
Borislav Petkov10.75%111.11%
Thomas Gleixner10.75%111.11%
Total133100.00%9100.00%


static int vgetcpu_online(unsigned int cpu) { return smp_call_function_single(cpu, vgetcpu_cpu_init, NULL, 1); }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski1881.82%266.67%
Sebastian Andrzej Siewior418.18%133.33%
Total22100.00%3100.00%


static int __init init_vdso(void) { init_vdso_image(&vdso_image_64); #ifdef CONFIG_X86_X32_ABI init_vdso_image(&vdso_image_x32); #endif /* notifier priority > KVM */ return cpuhp_setup_state(CPUHP_AP_X86_VDSO_VMA_ONLINE, "x86/vdso/vma:online", vgetcpu_online, NULL); }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski3282.05%250.00%
Sebastian Andrzej Siewior615.38%125.00%
Thomas Gleixner12.56%125.00%
Total39100.00%4100.00%

subsys_initcall(init_vdso); #endif /* CONFIG_X86_64 */

Overall Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski72546.59%1941.30%
Dmitry Safonov39425.32%510.87%
Andi Kleen1439.19%12.17%
Ingo Molnar1247.97%24.35%
H. J. Lu543.47%12.17%
Vitaly Kuznetsov473.02%12.17%
Andrew Morton150.96%12.17%
Brian Gerst110.71%12.17%
Sebastian Andrzej Siewior100.64%12.17%
Michal Hocko60.39%12.17%
Borislav Petkov40.26%24.35%
Roland McGrath40.26%12.17%
Tejun Heo30.19%12.17%
Jaswinder Singh Rajput30.19%12.17%
Alexey Dobriyan30.19%12.17%
Thomas Gleixner20.13%24.35%
Mike Rapoport20.13%12.17%
Jan Kara20.13%12.17%
Hirofumi Ogawa20.13%12.17%
Thomas Garnier10.06%12.17%
Peter Zijlstra10.06%12.17%
Total1556100.00%46100.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.