License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 22:07:57 +08:00
|
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2008-10-23 13:26:29 +08:00
|
|
|
|
#ifndef _ASM_X86_ELF_H
|
|
|
|
|
#define _ASM_X86_ELF_H
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* ELF register definitions..
|
|
|
|
|
*/
|
2011-08-05 21:15:08 +08:00
|
|
|
|
#include <linux/thread_info.h>
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
#include <asm/ptrace.h>
|
|
|
|
|
#include <asm/user.h>
|
|
|
|
|
#include <asm/auxvec.h>
|
2018-09-19 07:08:55 +08:00
|
|
|
|
#include <asm/fsgsbase.h>
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
typedef unsigned long elf_greg_t;
|
|
|
|
|
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define ELF_NGREG (sizeof(struct user_regs_struct) / sizeof(elf_greg_t))
|
2007-10-24 04:37:23 +08:00
|
|
|
|
typedef elf_greg_t elf_gregset_t[ELF_NGREG];
|
|
|
|
|
|
|
|
|
|
typedef struct user_i387_struct elf_fpregset_t;
|
|
|
|
|
|
|
|
|
|
#ifdef __i386__
|
|
|
|
|
|
|
|
|
|
#define R_386_NONE 0
|
|
|
|
|
#define R_386_32 1
|
|
|
|
|
#define R_386_PC32 2
|
|
|
|
|
#define R_386_GOT32 3
|
|
|
|
|
#define R_386_PLT32 4
|
|
|
|
|
#define R_386_COPY 5
|
|
|
|
|
#define R_386_GLOB_DAT 6
|
|
|
|
|
#define R_386_JMP_SLOT 7
|
|
|
|
|
#define R_386_RELATIVE 8
|
|
|
|
|
#define R_386_GOTOFF 9
|
|
|
|
|
#define R_386_GOTPC 10
|
|
|
|
|
#define R_386_NUM 11
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* These are used to set parameters in the core dumps.
|
|
|
|
|
*/
|
|
|
|
|
#define ELF_CLASS ELFCLASS32
|
|
|
|
|
#define ELF_DATA ELFDATA2LSB
|
|
|
|
|
#define ELF_ARCH EM_386
|
|
|
|
|
|
2007-10-11 17:20:03 +08:00
|
|
|
|
#else
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
/* x86-64 relocation types */
|
|
|
|
|
#define R_X86_64_NONE 0 /* No reloc */
|
|
|
|
|
#define R_X86_64_64 1 /* Direct 64 bit */
|
|
|
|
|
#define R_X86_64_PC32 2 /* PC relative 32 bit signed */
|
|
|
|
|
#define R_X86_64_GOT32 3 /* 32 bit GOT entry */
|
|
|
|
|
#define R_X86_64_PLT32 4 /* 32 bit PLT address */
|
|
|
|
|
#define R_X86_64_COPY 5 /* Copy symbol at runtime */
|
|
|
|
|
#define R_X86_64_GLOB_DAT 6 /* Create GOT entry */
|
|
|
|
|
#define R_X86_64_JUMP_SLOT 7 /* Create PLT entry */
|
|
|
|
|
#define R_X86_64_RELATIVE 8 /* Adjust by program base */
|
|
|
|
|
#define R_X86_64_GOTPCREL 9 /* 32 bit signed pc relative
|
|
|
|
|
offset to GOT */
|
|
|
|
|
#define R_X86_64_32 10 /* Direct 32 bit zero extended */
|
|
|
|
|
#define R_X86_64_32S 11 /* Direct 32 bit sign extended */
|
|
|
|
|
#define R_X86_64_16 12 /* Direct 16 bit zero extended */
|
|
|
|
|
#define R_X86_64_PC16 13 /* 16 bit sign extended pc relative */
|
|
|
|
|
#define R_X86_64_8 14 /* Direct 8 bit sign extended */
|
|
|
|
|
#define R_X86_64_PC8 15 /* 8 bit sign extended pc relative */
|
2018-09-19 14:51:39 +08:00
|
|
|
|
#define R_X86_64_PC64 24 /* Place relative 64-bit signed */
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* These are used to set parameters in the core dumps.
|
|
|
|
|
*/
|
|
|
|
|
#define ELF_CLASS ELFCLASS64
|
|
|
|
|
#define ELF_DATA ELFDATA2LSB
|
|
|
|
|
#define ELF_ARCH EM_X86_64
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
2008-01-30 20:31:55 +08:00
|
|
|
|
#include <asm/vdso.h>
|
|
|
|
|
|
2014-05-06 03:19:32 +08:00
|
|
|
|
#ifdef CONFIG_X86_64
|
|
|
|
|
extern unsigned int vdso64_enabled;
|
|
|
|
|
#endif
|
2015-06-22 19:55:15 +08:00
|
|
|
|
#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
|
2014-05-06 03:19:32 +08:00
|
|
|
|
extern unsigned int vdso32_enabled;
|
|
|
|
|
#endif
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
2008-01-30 20:30:43 +08:00
|
|
|
|
/*
|
|
|
|
|
* This is used to ensure we don't load something for the wrong architecture.
|
|
|
|
|
*/
|
|
|
|
|
#define elf_check_arch_ia32(x) \
|
|
|
|
|
(((x)->e_machine == EM_386) || ((x)->e_machine == EM_486))
|
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
#include <asm/processor.h>
|
2008-03-10 03:35:00 +08:00
|
|
|
|
|
|
|
|
|
#ifdef CONFIG_X86_32
|
2007-10-24 04:37:23 +08:00
|
|
|
|
#include <asm/desc.h>
|
|
|
|
|
|
2008-01-30 20:30:43 +08:00
|
|
|
|
#define elf_check_arch(x) elf_check_arch_ia32(x)
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
/* SVR4/i386 ABI (pages 3-31, 3-32) says that when the program starts %edx
|
|
|
|
|
contains a pointer to a function which might be registered using `atexit'.
|
|
|
|
|
This provides a mean for the dynamic linker to call DT_FINI functions for
|
|
|
|
|
shared libraries that have been loaded before the code runs.
|
|
|
|
|
|
|
|
|
|
A value of 0 tells we have no such handler.
|
|
|
|
|
|
|
|
|
|
We might as well make sure everything else is cleared too (except for %esp),
|
|
|
|
|
just to make things more deterministic.
|
|
|
|
|
*/
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define ELF_PLAT_INIT(_r, load_addr) \
|
|
|
|
|
do { \
|
|
|
|
|
_r->bx = 0; _r->cx = 0; _r->dx = 0; \
|
|
|
|
|
_r->si = 0; _r->di = 0; _r->bp = 0; \
|
|
|
|
|
_r->ax = 0; \
|
2007-10-24 04:37:23 +08:00
|
|
|
|
} while (0)
|
|
|
|
|
|
2008-01-30 20:33:16 +08:00
|
|
|
|
/*
|
|
|
|
|
* regs is struct pt_regs, pr_reg is elf_gregset_t (which is
|
|
|
|
|
* now struct_user_regs, they are different)
|
|
|
|
|
*/
|
|
|
|
|
|
2009-02-09 21:17:40 +08:00
|
|
|
|
#define ELF_CORE_COPY_REGS_COMMON(pr_reg, regs) \
|
2008-03-23 16:02:08 +08:00
|
|
|
|
do { \
|
|
|
|
|
pr_reg[0] = regs->bx; \
|
|
|
|
|
pr_reg[1] = regs->cx; \
|
|
|
|
|
pr_reg[2] = regs->dx; \
|
|
|
|
|
pr_reg[3] = regs->si; \
|
|
|
|
|
pr_reg[4] = regs->di; \
|
|
|
|
|
pr_reg[5] = regs->bp; \
|
|
|
|
|
pr_reg[6] = regs->ax; \
|
2017-07-28 21:00:32 +08:00
|
|
|
|
pr_reg[7] = regs->ds; \
|
|
|
|
|
pr_reg[8] = regs->es; \
|
|
|
|
|
pr_reg[9] = regs->fs; \
|
2008-03-23 16:02:08 +08:00
|
|
|
|
pr_reg[11] = regs->orig_ax; \
|
|
|
|
|
pr_reg[12] = regs->ip; \
|
2017-07-28 21:00:32 +08:00
|
|
|
|
pr_reg[13] = regs->cs; \
|
2008-03-23 16:02:08 +08:00
|
|
|
|
pr_reg[14] = regs->flags; \
|
|
|
|
|
pr_reg[15] = regs->sp; \
|
2017-07-28 21:00:32 +08:00
|
|
|
|
pr_reg[16] = regs->ss; \
|
2008-01-30 20:33:16 +08:00
|
|
|
|
} while (0);
|
|
|
|
|
|
2009-02-09 21:17:40 +08:00
|
|
|
|
#define ELF_CORE_COPY_REGS(pr_reg, regs) \
|
|
|
|
|
do { \
|
|
|
|
|
ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\
|
|
|
|
|
pr_reg[10] = get_user_gs(regs); \
|
|
|
|
|
} while (0);
|
|
|
|
|
|
|
|
|
|
#define ELF_CORE_COPY_KERNEL_REGS(pr_reg, regs) \
|
|
|
|
|
do { \
|
|
|
|
|
ELF_CORE_COPY_REGS_COMMON(pr_reg, regs);\
|
|
|
|
|
savesegment(gs, pr_reg[10]); \
|
|
|
|
|
} while (0);
|
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
#define ELF_PLATFORM (utsname()->machine)
|
|
|
|
|
#define set_personality_64bit() do { } while (0)
|
|
|
|
|
|
|
|
|
|
#else /* CONFIG_X86_32 */
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* This is used to ensure we don't load something for the wrong architecture.
|
|
|
|
|
*/
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define elf_check_arch(x) \
|
2007-10-24 04:37:23 +08:00
|
|
|
|
((x)->e_machine == EM_X86_64)
|
|
|
|
|
|
2014-09-08 04:05:05 +08:00
|
|
|
|
#define compat_elf_check_arch(x) \
|
|
|
|
|
(elf_check_arch_ia32(x) || \
|
|
|
|
|
(IS_ENABLED(CONFIG_X86_X32_ABI) && (x)->e_machine == EM_X86_64))
|
2012-02-20 02:06:34 +08:00
|
|
|
|
|
|
|
|
|
#if __USER32_DS != __USER_DS
|
|
|
|
|
# error "The following code assumes __USER32_DS == __USER_DS"
|
|
|
|
|
#endif
|
2008-01-30 20:31:55 +08:00
|
|
|
|
|
|
|
|
|
static inline void elf_common_init(struct thread_struct *t,
|
|
|
|
|
struct pt_regs *regs, const u16 ds)
|
|
|
|
|
{
|
2015-10-06 08:48:00 +08:00
|
|
|
|
/* ax gets execve's return value. */
|
|
|
|
|
/*regs->ax = */ regs->bx = regs->cx = regs->dx = 0;
|
|
|
|
|
regs->si = regs->di = regs->bp = 0;
|
2008-01-30 20:31:55 +08:00
|
|
|
|
regs->r8 = regs->r9 = regs->r10 = regs->r11 = 0;
|
2015-10-06 08:48:00 +08:00
|
|
|
|
regs->r12 = regs->r13 = regs->r14 = regs->r15 = 0;
|
2016-04-27 03:23:29 +08:00
|
|
|
|
t->fsbase = t->gsbase = 0;
|
2008-01-30 20:31:55 +08:00
|
|
|
|
t->fsindex = t->gsindex = 0;
|
|
|
|
|
t->ds = t->es = ds;
|
|
|
|
|
}
|
|
|
|
|
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define ELF_PLAT_INIT(_r, load_addr) \
|
2010-02-16 22:24:01 +08:00
|
|
|
|
elf_common_init(¤t->thread, _r, 0)
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define COMPAT_ELF_PLAT_INIT(regs, load_addr) \
|
2008-01-30 20:31:55 +08:00
|
|
|
|
elf_common_init(¤t->thread, regs, __USER_DS)
|
2008-03-23 16:02:08 +08:00
|
|
|
|
|
2020-10-04 11:25:32 +08:00
|
|
|
|
void compat_start_thread(struct pt_regs *regs, u32 new_ip, u32 new_sp, bool x32);
|
|
|
|
|
#define COMPAT_START_THREAD(ex, regs, new_ip, new_sp) \
|
|
|
|
|
compat_start_thread(regs, new_ip, new_sp, ex->e_machine == EM_X86_64)
|
2008-03-23 16:02:08 +08:00
|
|
|
|
|
2012-02-20 02:06:34 +08:00
|
|
|
|
void set_personality_ia32(bool);
|
|
|
|
|
#define COMPAT_SET_PERSONALITY(ex) \
|
|
|
|
|
set_personality_ia32((ex).e_machine == EM_X86_64)
|
2008-03-23 16:02:08 +08:00
|
|
|
|
|
2008-01-30 20:31:55 +08:00
|
|
|
|
#define COMPAT_ELF_PLATFORM ("i686")
|
|
|
|
|
|
2008-01-30 20:33:16 +08:00
|
|
|
|
/*
|
|
|
|
|
* regs is struct pt_regs, pr_reg is elf_gregset_t (which is
|
|
|
|
|
* now struct_user_regs, they are different). Assumes current is the process
|
|
|
|
|
* getting dumped.
|
|
|
|
|
*/
|
|
|
|
|
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define ELF_CORE_COPY_REGS(pr_reg, regs) \
|
|
|
|
|
do { \
|
2008-01-30 20:33:16 +08:00
|
|
|
|
unsigned v; \
|
|
|
|
|
(pr_reg)[0] = (regs)->r15; \
|
|
|
|
|
(pr_reg)[1] = (regs)->r14; \
|
|
|
|
|
(pr_reg)[2] = (regs)->r13; \
|
|
|
|
|
(pr_reg)[3] = (regs)->r12; \
|
|
|
|
|
(pr_reg)[4] = (regs)->bp; \
|
|
|
|
|
(pr_reg)[5] = (regs)->bx; \
|
|
|
|
|
(pr_reg)[6] = (regs)->r11; \
|
|
|
|
|
(pr_reg)[7] = (regs)->r10; \
|
|
|
|
|
(pr_reg)[8] = (regs)->r9; \
|
|
|
|
|
(pr_reg)[9] = (regs)->r8; \
|
|
|
|
|
(pr_reg)[10] = (regs)->ax; \
|
|
|
|
|
(pr_reg)[11] = (regs)->cx; \
|
|
|
|
|
(pr_reg)[12] = (regs)->dx; \
|
|
|
|
|
(pr_reg)[13] = (regs)->si; \
|
|
|
|
|
(pr_reg)[14] = (regs)->di; \
|
|
|
|
|
(pr_reg)[15] = (regs)->orig_ax; \
|
|
|
|
|
(pr_reg)[16] = (regs)->ip; \
|
|
|
|
|
(pr_reg)[17] = (regs)->cs; \
|
|
|
|
|
(pr_reg)[18] = (regs)->flags; \
|
|
|
|
|
(pr_reg)[19] = (regs)->sp; \
|
|
|
|
|
(pr_reg)[20] = (regs)->ss; \
|
2018-09-19 07:08:55 +08:00
|
|
|
|
(pr_reg)[21] = x86_fsbase_read_cpu(); \
|
|
|
|
|
(pr_reg)[22] = x86_gsbase_read_cpu_inactive(); \
|
2008-01-30 20:33:16 +08:00
|
|
|
|
asm("movl %%ds,%0" : "=r" (v)); (pr_reg)[23] = v; \
|
|
|
|
|
asm("movl %%es,%0" : "=r" (v)); (pr_reg)[24] = v; \
|
|
|
|
|
asm("movl %%fs,%0" : "=r" (v)); (pr_reg)[25] = v; \
|
|
|
|
|
asm("movl %%gs,%0" : "=r" (v)); (pr_reg)[26] = v; \
|
|
|
|
|
} while (0);
|
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
/* I'm not sure if we can use '-' here */
|
|
|
|
|
#define ELF_PLATFORM ("x86_64")
|
|
|
|
|
extern void set_personality_64bit(void);
|
2008-01-30 20:31:55 +08:00
|
|
|
|
extern unsigned int sysctl_vsyscall32;
|
|
|
|
|
extern int force_personality32;
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
#endif /* !CONFIG_X86_32 */
|
|
|
|
|
|
2008-01-30 20:31:54 +08:00
|
|
|
|
#define CORE_DUMP_USE_REGSET
|
2007-10-24 04:37:23 +08:00
|
|
|
|
#define ELF_EXEC_PAGESIZE 4096
|
|
|
|
|
|
binfmt_elf: use ELF_ET_DYN_BASE only for PIE
The ELF_ET_DYN_BASE position was originally intended to keep loaders
away from ET_EXEC binaries. (For example, running "/lib/ld-linux.so.2
/bin/cat" might cause the subsequent load of /bin/cat into where the
loader had been loaded.)
With the advent of PIE (ET_DYN binaries with an INTERP Program Header),
ELF_ET_DYN_BASE continued to be used since the kernel was only looking
at ET_DYN. However, since ELF_ET_DYN_BASE is traditionally set at the
top 1/3rd of the TASK_SIZE, a substantial portion of the address space
is unused.
For 32-bit tasks when RLIMIT_STACK is set to RLIM_INFINITY, programs are
loaded above the mmap region. This means they can be made to collide
(CVE-2017-1000370) or nearly collide (CVE-2017-1000371) with
pathological stack regions.
Lowering ELF_ET_DYN_BASE solves both by moving programs below the mmap
region in all cases, and will now additionally avoid programs falling
back to the mmap region by enforcing MAP_FIXED for program loads (i.e.
if it would have collided with the stack, now it will fail to load
instead of falling back to the mmap region).
To allow for a lower ELF_ET_DYN_BASE, loaders (ET_DYN without INTERP)
are loaded into the mmap region, leaving space available for either an
ET_EXEC binary with a fixed location or PIE being loaded into mmap by
the loader. Only PIE programs are loaded offset from ELF_ET_DYN_BASE,
which means architectures can now safely lower their values without risk
of loaders colliding with their subsequently loaded programs.
For 64-bit, ELF_ET_DYN_BASE is best set to 4GB to allow runtimes to use
the entire 32-bit address space for 32-bit pointers.
Thanks to PaX Team, Daniel Micay, and Rik van Riel for inspiration and
suggestions on how to implement this solution.
Fixes: d1fd836dcf00 ("mm: split ET_DYN ASLR from mmap ASLR")
Link: http://lkml.kernel.org/r/20170621173201.GA114489@beast
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Rik van Riel <riel@redhat.com>
Cc: Daniel Micay <danielmicay@gmail.com>
Cc: Qualys Security Advisory <qsa@qualys.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Dmitry Safonov <dsafonov@virtuozzo.com>
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Grzegorz Andrejczuk <grzegorz.andrejczuk@intel.com>
Cc: Masahiro Yamada <yamada.masahiro@socionext.com>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: James Hogan <james.hogan@imgtec.com>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Paul Mackerras <paulus@samba.org>
Cc: Pratyush Anand <panand@redhat.com>
Cc: Russell King <linux@armlinux.org.uk>
Cc: Will Deacon <will.deacon@arm.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2017-07-11 06:52:37 +08:00
|
|
|
|
/*
|
|
|
|
|
* This is the base location for PIE (ET_DYN with INTERP) loads. On
|
2017-08-19 06:16:31 +08:00
|
|
|
|
* 64-bit, this is above 4GB to leave the entire 32-bit address
|
binfmt_elf: use ELF_ET_DYN_BASE only for PIE
The ELF_ET_DYN_BASE position was originally intended to keep loaders
away from ET_EXEC binaries. (For example, running "/lib/ld-linux.so.2
/bin/cat" might cause the subsequent load of /bin/cat into where the
loader had been loaded.)
With the advent of PIE (ET_DYN binaries with an INTERP Program Header),
ELF_ET_DYN_BASE continued to be used since the kernel was only looking
at ET_DYN. However, since ELF_ET_DYN_BASE is traditionally set at the
top 1/3rd of the TASK_SIZE, a substantial portion of the address space
is unused.
For 32-bit tasks when RLIMIT_STACK is set to RLIM_INFINITY, programs are
loaded above the mmap region. This means they can be made to collide
(CVE-2017-1000370) or nearly collide (CVE-2017-1000371) with
pathological stack regions.
Lowering ELF_ET_DYN_BASE solves both by moving programs below the mmap
region in all cases, and will now additionally avoid programs falling
back to the mmap region by enforcing MAP_FIXED for program loads (i.e.
if it would have collided with the stack, now it will fail to load
instead of falling back to the mmap region).
To allow for a lower ELF_ET_DYN_BASE, loaders (ET_DYN without INTERP)
are loaded into the mmap region, leaving space available for either an
ET_EXEC binary with a fixed location or PIE being loaded into mmap by
the loader. Only PIE programs are loaded offset from ELF_ET_DYN_BASE,
which means architectures can now safely lower their values without risk
of loaders colliding with their subsequently loaded programs.
For 64-bit, ELF_ET_DYN_BASE is best set to 4GB to allow runtimes to use
the entire 32-bit address space for 32-bit pointers.
Thanks to PaX Team, Daniel Micay, and Rik van Riel for inspiration and
suggestions on how to implement this solution.
Fixes: d1fd836dcf00 ("mm: split ET_DYN ASLR from mmap ASLR")
Link: http://lkml.kernel.org/r/20170621173201.GA114489@beast
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Rik van Riel <riel@redhat.com>
Cc: Daniel Micay <danielmicay@gmail.com>
Cc: Qualys Security Advisory <qsa@qualys.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Dmitry Safonov <dsafonov@virtuozzo.com>
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Grzegorz Andrejczuk <grzegorz.andrejczuk@intel.com>
Cc: Masahiro Yamada <yamada.masahiro@socionext.com>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: James Hogan <james.hogan@imgtec.com>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Paul Mackerras <paulus@samba.org>
Cc: Pratyush Anand <panand@redhat.com>
Cc: Russell King <linux@armlinux.org.uk>
Cc: Will Deacon <will.deacon@arm.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2017-07-11 06:52:37 +08:00
|
|
|
|
* space open for things that want to use the area for 32-bit pointers.
|
|
|
|
|
*/
|
|
|
|
|
#define ELF_ET_DYN_BASE (mmap_is_ia32() ? 0x000400000UL : \
|
2017-11-07 18:38:04 +08:00
|
|
|
|
(DEFAULT_MAP_WINDOW / 3 * 2))
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
/* This yields a mask that user programs can use to figure out what
|
|
|
|
|
instruction set this CPU supports. This could be done in user space,
|
|
|
|
|
but it's not easy, and we've already done it here. */
|
|
|
|
|
|
2016-01-26 03:41:47 +08:00
|
|
|
|
#define ELF_HWCAP (boot_cpu_data.x86_capability[CPUID_1_EDX])
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
2017-01-20 21:22:34 +08:00
|
|
|
|
extern u32 elf_hwcap2;
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* HWCAP2 supplies mask with kernel enabled CPU features, so that
|
|
|
|
|
* the application can discover that it can safely use them.
|
|
|
|
|
* The bits are defined in uapi/asm/hwcap2.h.
|
|
|
|
|
*/
|
|
|
|
|
#define ELF_HWCAP2 (elf_hwcap2)
|
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
/* This yields a string that ld.so will use to load implementation
|
|
|
|
|
specific libraries for optimization. This is more specific in
|
|
|
|
|
intent than poking at uname or /proc/cpuinfo.
|
|
|
|
|
|
|
|
|
|
For the moment, we have only optimizations for the Intel generations,
|
|
|
|
|
but that could change... */
|
|
|
|
|
|
2008-10-16 21:39:57 +08:00
|
|
|
|
#define SET_PERSONALITY(ex) set_personality_64bit()
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* An executable for which elf_read_implies_exec() returns TRUE will
|
|
|
|
|
* have the READ_IMPLIES_EXEC personality flag set automatically.
|
2020-03-27 14:48:15 +08:00
|
|
|
|
*
|
|
|
|
|
* The decision process for determining the results are:
|
|
|
|
|
*
|
|
|
|
|
* CPU: | lacks NX* | has NX, ia32 | has NX, x86_64 |
|
|
|
|
|
* ELF: | | | |
|
|
|
|
|
* ---------------------|------------|------------------|----------------|
|
2020-03-27 14:48:17 +08:00
|
|
|
|
* missing PT_GNU_STACK | exec-all | exec-all | exec-none |
|
2020-03-27 14:48:16 +08:00
|
|
|
|
* PT_GNU_STACK == RWX | exec-stack | exec-stack | exec-stack |
|
2020-03-27 14:48:15 +08:00
|
|
|
|
* PT_GNU_STACK == RW | exec-none | exec-none | exec-none |
|
|
|
|
|
*
|
|
|
|
|
* exec-all : all PROT_READ user mappings are executable, except when
|
|
|
|
|
* backed by files on a noexec-filesystem.
|
|
|
|
|
* exec-none : only PROT_EXEC user mappings are executable.
|
2020-03-27 14:48:16 +08:00
|
|
|
|
* exec-stack: only the stack and PROT_EXEC user mappings are executable.
|
2020-03-27 14:48:15 +08:00
|
|
|
|
*
|
|
|
|
|
* *this column has no architectural effect: NX markings are ignored by
|
|
|
|
|
* hardware, but may have behavioral effects when "wants X" collides with
|
|
|
|
|
* "cannot be X" constraints in memory permission flags, as in
|
|
|
|
|
* https://lkml.kernel.org/r/20190418055759.GA3155@mellanox.com
|
|
|
|
|
*
|
2007-10-24 04:37:23 +08:00
|
|
|
|
*/
|
|
|
|
|
#define elf_read_implies_exec(ex, executable_stack) \
|
2020-03-27 14:48:17 +08:00
|
|
|
|
(mmap_is_ia32() && executable_stack == EXSTACK_DEFAULT)
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
struct task_struct;
|
|
|
|
|
|
2014-05-06 03:19:32 +08:00
|
|
|
|
#define ARCH_DLINFO_IA32 \
|
2008-03-23 16:02:08 +08:00
|
|
|
|
do { \
|
2017-04-10 23:14:28 +08:00
|
|
|
|
if (VDSO_CURRENT_BASE) { \
|
2008-01-30 20:31:55 +08:00
|
|
|
|
NEW_AUX_ENT(AT_SYSINFO, VDSO_ENTRY); \
|
|
|
|
|
NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_CURRENT_BASE); \
|
2008-03-23 16:02:08 +08:00
|
|
|
|
} \
|
2008-01-30 20:31:55 +08:00
|
|
|
|
} while (0)
|
|
|
|
|
|
2017-03-06 22:17:18 +08:00
|
|
|
|
/*
|
|
|
|
|
* True on X86_32 or when emulating IA32 on X86_64
|
|
|
|
|
*/
|
|
|
|
|
static inline int mmap_is_ia32(void)
|
|
|
|
|
{
|
|
|
|
|
return IS_ENABLED(CONFIG_X86_32) ||
|
|
|
|
|
(IS_ENABLED(CONFIG_COMPAT) &&
|
|
|
|
|
test_thread_flag(TIF_ADDR32));
|
|
|
|
|
}
|
|
|
|
|
|
2017-07-17 06:59:50 +08:00
|
|
|
|
extern unsigned long task_size_32bit(void);
|
2017-07-17 06:59:52 +08:00
|
|
|
|
extern unsigned long task_size_64bit(int full_addr_space);
|
2017-03-14 19:41:26 +08:00
|
|
|
|
extern unsigned long get_mmap_base(int is_legacy);
|
2017-11-15 22:36:06 +08:00
|
|
|
|
extern bool mmap_address_hint_valid(unsigned long addr, unsigned long len);
|
2017-03-06 22:17:19 +08:00
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
|
|
2017-03-06 22:17:18 +08:00
|
|
|
|
#define __STACK_RND_MASK(is32bit) (0x7ff)
|
2009-09-08 17:01:55 +08:00
|
|
|
|
#define STACK_RND_MASK (0x7ff)
|
|
|
|
|
|
2014-05-06 03:19:32 +08:00
|
|
|
|
#define ARCH_DLINFO ARCH_DLINFO_IA32
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
2008-01-30 20:31:55 +08:00
|
|
|
|
/* update AT_VECTOR_SIZE_ARCH if the number of NEW_AUX_ENT entries changes */
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
|
|
|
|
#else /* CONFIG_X86_32 */
|
|
|
|
|
|
|
|
|
|
/* 1GB for 64bit, 8MB for 32bit */
|
2017-03-06 22:17:18 +08:00
|
|
|
|
#define __STACK_RND_MASK(is32bit) ((is32bit) ? 0x7ff : 0x3fffff)
|
|
|
|
|
#define STACK_RND_MASK __STACK_RND_MASK(mmap_is_ia32())
|
2007-10-24 04:37:23 +08:00
|
|
|
|
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define ARCH_DLINFO \
|
|
|
|
|
do { \
|
2014-05-06 03:19:32 +08:00
|
|
|
|
if (vdso64_enabled) \
|
2008-03-23 16:02:08 +08:00
|
|
|
|
NEW_AUX_ENT(AT_SYSINFO_EHDR, \
|
x86, vdso: Reimplement vdso.so preparation in build-time C
Currently, vdso.so files are prepared and analyzed by a combination
of objcopy, nm, some linker script tricks, and some simple ELF
parsers in the kernel. Replace all of that with plain C code that
runs at build time.
All five vdso images now generate .c files that are compiled and
linked in to the kernel image.
This should cause only one userspace-visible change: the loaded vDSO
images are stripped more heavily than they used to be. Everything
outside the loadable segment is dropped. In particular, this causes
the section table and section name strings to be missing. This
should be fine: real dynamic loaders don't load or inspect these
tables anyway. The result is roughly equivalent to eu-strip's
--strip-sections option.
The purpose of this change is to enable the vvar and hpet mappings
to be moved to the page following the vDSO load segment. Currently,
it is possible for the section table to extend into the page after
the load segment, so, if we map it, it risks overlapping the vvar or
hpet page. This happens whenever the load segment is just under a
multiple of PAGE_SIZE.
The only real subtlety here is that the old code had a C file with
inline assembler that did 'call VDSO32_vsyscall' and a linker script
that defined 'VDSO32_vsyscall = __kernel_vsyscall'. This most
likely worked by accident: the linker script entry defines a symbol
associated with an address as opposed to an alias for the real
dynamic symbol __kernel_vsyscall. That caused ld to relocate the
reference at link time instead of leaving an interposable dynamic
relocation. Since the VDSO32_vsyscall hack is no longer needed, I
now use 'call __kernel_vsyscall', and I added -Bsymbolic to make it
work. vdso2c will generate an error and abort the build if the
resulting image contains any dynamic relocations, so we won't
silently generate bad vdso images.
(Dynamic relocations are a problem because nothing will even attempt
to relocate the vdso.)
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Link: http://lkml.kernel.org/r/2c4fcf45524162a34d87fdda1eb046b2a5cecee7.1399317206.git.luto@amacapital.net
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2014-05-06 03:19:34 +08:00
|
|
|
|
(unsigned long __force)current->mm->context.vdso); \
|
2007-10-24 04:37:23 +08:00
|
|
|
|
} while (0)
|
|
|
|
|
|
2014-05-06 03:19:32 +08:00
|
|
|
|
/* As a historical oddity, the x32 and x86_64 vDSOs are controlled together. */
|
2012-02-20 02:06:34 +08:00
|
|
|
|
#define ARCH_DLINFO_X32 \
|
|
|
|
|
do { \
|
2014-05-06 03:19:32 +08:00
|
|
|
|
if (vdso64_enabled) \
|
2012-02-20 02:06:34 +08:00
|
|
|
|
NEW_AUX_ENT(AT_SYSINFO_EHDR, \
|
x86, vdso: Reimplement vdso.so preparation in build-time C
Currently, vdso.so files are prepared and analyzed by a combination
of objcopy, nm, some linker script tricks, and some simple ELF
parsers in the kernel. Replace all of that with plain C code that
runs at build time.
All five vdso images now generate .c files that are compiled and
linked in to the kernel image.
This should cause only one userspace-visible change: the loaded vDSO
images are stripped more heavily than they used to be. Everything
outside the loadable segment is dropped. In particular, this causes
the section table and section name strings to be missing. This
should be fine: real dynamic loaders don't load or inspect these
tables anyway. The result is roughly equivalent to eu-strip's
--strip-sections option.
The purpose of this change is to enable the vvar and hpet mappings
to be moved to the page following the vDSO load segment. Currently,
it is possible for the section table to extend into the page after
the load segment, so, if we map it, it risks overlapping the vvar or
hpet page. This happens whenever the load segment is just under a
multiple of PAGE_SIZE.
The only real subtlety here is that the old code had a C file with
inline assembler that did 'call VDSO32_vsyscall' and a linker script
that defined 'VDSO32_vsyscall = __kernel_vsyscall'. This most
likely worked by accident: the linker script entry defines a symbol
associated with an address as opposed to an alias for the real
dynamic symbol __kernel_vsyscall. That caused ld to relocate the
reference at link time instead of leaving an interposable dynamic
relocation. Since the VDSO32_vsyscall hack is no longer needed, I
now use 'call __kernel_vsyscall', and I added -Bsymbolic to make it
work. vdso2c will generate an error and abort the build if the
resulting image contains any dynamic relocations, so we won't
silently generate bad vdso images.
(Dynamic relocations are a problem because nothing will even attempt
to relocate the vdso.)
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Link: http://lkml.kernel.org/r/2c4fcf45524162a34d87fdda1eb046b2a5cecee7.1399317206.git.luto@amacapital.net
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2014-05-06 03:19:34 +08:00
|
|
|
|
(unsigned long __force)current->mm->context.vdso); \
|
2012-02-20 02:06:34 +08:00
|
|
|
|
} while (0)
|
|
|
|
|
|
2008-01-30 20:31:55 +08:00
|
|
|
|
#define AT_SYSINFO 32
|
|
|
|
|
|
2012-02-20 02:06:34 +08:00
|
|
|
|
#define COMPAT_ARCH_DLINFO \
|
2020-10-04 11:25:30 +08:00
|
|
|
|
if (exec->e_machine == EM_X86_64) \
|
2012-02-20 02:06:34 +08:00
|
|
|
|
ARCH_DLINFO_X32; \
|
|
|
|
|
else \
|
2014-05-06 03:19:32 +08:00
|
|
|
|
ARCH_DLINFO_IA32
|
2008-01-30 20:31:55 +08:00
|
|
|
|
|
|
|
|
|
#define COMPAT_ELF_ET_DYN_BASE (TASK_UNMAPPED_BASE + 0x1000000)
|
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
#endif /* !CONFIG_X86_32 */
|
|
|
|
|
|
2008-01-30 20:30:43 +08:00
|
|
|
|
#define VDSO_CURRENT_BASE ((unsigned long)current->mm->context.vdso)
|
|
|
|
|
|
2008-03-23 16:02:08 +08:00
|
|
|
|
#define VDSO_ENTRY \
|
x86, vdso: Reimplement vdso.so preparation in build-time C
Currently, vdso.so files are prepared and analyzed by a combination
of objcopy, nm, some linker script tricks, and some simple ELF
parsers in the kernel. Replace all of that with plain C code that
runs at build time.
All five vdso images now generate .c files that are compiled and
linked in to the kernel image.
This should cause only one userspace-visible change: the loaded vDSO
images are stripped more heavily than they used to be. Everything
outside the loadable segment is dropped. In particular, this causes
the section table and section name strings to be missing. This
should be fine: real dynamic loaders don't load or inspect these
tables anyway. The result is roughly equivalent to eu-strip's
--strip-sections option.
The purpose of this change is to enable the vvar and hpet mappings
to be moved to the page following the vDSO load segment. Currently,
it is possible for the section table to extend into the page after
the load segment, so, if we map it, it risks overlapping the vvar or
hpet page. This happens whenever the load segment is just under a
multiple of PAGE_SIZE.
The only real subtlety here is that the old code had a C file with
inline assembler that did 'call VDSO32_vsyscall' and a linker script
that defined 'VDSO32_vsyscall = __kernel_vsyscall'. This most
likely worked by accident: the linker script entry defines a symbol
associated with an address as opposed to an alias for the real
dynamic symbol __kernel_vsyscall. That caused ld to relocate the
reference at link time instead of leaving an interposable dynamic
relocation. Since the VDSO32_vsyscall hack is no longer needed, I
now use 'call __kernel_vsyscall', and I added -Bsymbolic to make it
work. vdso2c will generate an error and abort the build if the
resulting image contains any dynamic relocations, so we won't
silently generate bad vdso images.
(Dynamic relocations are a problem because nothing will even attempt
to relocate the vdso.)
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Link: http://lkml.kernel.org/r/2c4fcf45524162a34d87fdda1eb046b2a5cecee7.1399317206.git.luto@amacapital.net
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2014-05-06 03:19:34 +08:00
|
|
|
|
((unsigned long)current->mm->context.vdso + \
|
2015-10-06 08:47:56 +08:00
|
|
|
|
vdso_image_32.sym___kernel_vsyscall)
|
2008-01-30 20:30:43 +08:00
|
|
|
|
|
2007-10-24 04:37:23 +08:00
|
|
|
|
struct linux_binprm;
|
|
|
|
|
|
|
|
|
|
#define ARCH_HAS_SETUP_ADDITIONAL_PAGES 1
|
|
|
|
|
extern int arch_setup_additional_pages(struct linux_binprm *bprm,
|
2008-12-25 20:38:35 +08:00
|
|
|
|
int uses_interp);
|
2014-05-06 03:19:35 +08:00
|
|
|
|
extern int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
|
2020-10-04 11:25:34 +08:00
|
|
|
|
int uses_interp, bool x32);
|
|
|
|
|
#define COMPAT_ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \
|
|
|
|
|
compat_arch_setup_additional_pages(bprm, interpreter, \
|
|
|
|
|
(ex->e_machine == EM_X86_64))
|
2008-01-30 20:31:55 +08:00
|
|
|
|
|
2012-12-12 08:01:52 +08:00
|
|
|
|
/* Do not change the values. See get_align_mask() */
|
2011-08-05 21:15:08 +08:00
|
|
|
|
enum align_flags {
|
|
|
|
|
ALIGN_VA_32 = BIT(0),
|
|
|
|
|
ALIGN_VA_64 = BIT(1),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct va_alignment {
|
|
|
|
|
int flags;
|
|
|
|
|
unsigned long mask;
|
2015-03-27 19:38:21 +08:00
|
|
|
|
unsigned long bits;
|
2011-08-05 21:15:08 +08:00
|
|
|
|
} ____cacheline_aligned;
|
|
|
|
|
|
|
|
|
|
extern struct va_alignment va_align;
|
2012-12-12 08:01:52 +08:00
|
|
|
|
extern unsigned long align_vdso_addr(unsigned long);
|
2008-10-23 13:26:29 +08:00
|
|
|
|
#endif /* _ASM_X86_ELF_H */
|