Contributors: 17
Author |
Tokens |
Token Proportion |
Commits |
Commit Proportion |
Paul Mundt |
250 |
59.24% |
3 |
9.09% |
Linus Torvalds |
45 |
10.66% |
1 |
3.03% |
Linus Torvalds (pre-git) |
42 |
9.95% |
15 |
45.45% |
Kaixiong Yu |
28 |
6.64% |
1 |
3.03% |
Christoph Hellwig |
19 |
4.50% |
1 |
3.03% |
Michal Hocko |
7 |
1.66% |
1 |
3.03% |
Art Haas |
6 |
1.42% |
1 |
3.03% |
Nicolas Bouchinet |
6 |
1.42% |
1 |
3.03% |
Andrew Morton |
6 |
1.42% |
1 |
3.03% |
Manuel Lauss |
3 |
0.71% |
1 |
3.03% |
Michel Lespinasse |
2 |
0.47% |
1 |
3.03% |
Kuninori Morimoto |
2 |
0.47% |
1 |
3.03% |
Hideaki Yoshifuji / 吉藤英明 |
2 |
0.47% |
1 |
3.03% |
Luis R. Rodriguez |
1 |
0.24% |
1 |
3.03% |
Martin Schwidefsky |
1 |
0.24% |
1 |
3.03% |
Cédric Le Goater |
1 |
0.24% |
1 |
3.03% |
Joel Granados |
1 |
0.24% |
1 |
3.03% |
Total |
422 |
|
33 |
|
// SPDX-License-Identifier: GPL-2.0
/*
* arch/sh/kernel/vsyscall/vsyscall.c
*
* Copyright (C) 2006 Paul Mundt
*
* vDSO randomization
* Copyright(C) 2005-2006, Red Hat, Inc., Ingo Molnar
*/
#include <linux/mm.h>
#include <linux/kernel.h>
#include <linux/init.h>
#include <linux/gfp.h>
#include <linux/module.h>
#include <linux/elf.h>
#include <linux/sched.h>
#include <linux/sysctl.h>
#include <linux/err.h>
/*
* Should the kernel map a VDSO page into processes and pass its
* address down to glibc upon exec()?
*/
unsigned int __read_mostly vdso_enabled = 1;
EXPORT_SYMBOL_GPL(vdso_enabled);
static int __init vdso_setup(char *s)
{
vdso_enabled = simple_strtoul(s, NULL, 0);
return 1;
}
__setup("vdso=", vdso_setup);
static const struct ctl_table vdso_table[] = {
{
.procname = "vdso_enabled",
.data = &vdso_enabled,
.maxlen = sizeof(vdso_enabled),
.mode = 0644,
.proc_handler = proc_dointvec_minmax,
.extra1 = SYSCTL_ZERO,
.extra2 = SYSCTL_ONE,
},
};
/*
* These symbols are defined by vsyscall.o to mark the bounds
* of the ELF DSO images included therein.
*/
extern const char vsyscall_trapa_start, vsyscall_trapa_end;
static struct page *syscall_pages[1];
static struct vm_special_mapping vdso_mapping = {
.name = "[vdso]",
.pages = syscall_pages,
};
int __init vsyscall_init(void)
{
void *syscall_page = (void *)get_zeroed_page(GFP_ATOMIC);
syscall_pages[0] = virt_to_page(syscall_page);
/*
* XXX: Map this page to a fixmap entry if we get around
* to adding the page to ELF core dumps
*/
memcpy(syscall_page,
&vsyscall_trapa_start,
&vsyscall_trapa_end - &vsyscall_trapa_start);
return 0;
}
static int __init vm_sysctl_init(void)
{
register_sysctl_init("vm", vdso_table);
return 0;
}
fs_initcall(vm_sysctl_init);
/* Setup a VMA at program startup for the vsyscall page */
int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
{
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma;
unsigned long addr;
int ret;
if (mmap_write_lock_killable(mm))
return -EINTR;
addr = get_unmapped_area(NULL, 0, PAGE_SIZE, 0, 0);
if (IS_ERR_VALUE(addr)) {
ret = addr;
goto up_fail;
}
vdso_mapping.pages = syscall_pages;
vma = _install_special_mapping(mm, addr, PAGE_SIZE,
VM_READ | VM_EXEC |
VM_MAYREAD | VM_MAYWRITE | VM_MAYEXEC,
&vdso_mapping);
ret = PTR_ERR(vma);
if (IS_ERR(vma))
goto up_fail;
current->mm->context.vdso = (void *)addr;
ret = 0;
up_fail:
mmap_write_unlock(mm);
return ret;
}
const char *arch_vma_name(struct vm_area_struct *vma)
{
if (vma->vm_mm && vma->vm_start == (long)vma->vm_mm->context.vdso)
return "[vdso]";
return NULL;
}