]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86_64/kernel/vsyscall.c
[PATCH] i386: Replace broken serialize_cpu in microcode driver with correct sync_core
[mirror_ubuntu-artful-kernel.git] / arch / x86_64 / kernel / vsyscall.c
CommitLineData
1da177e4
LT
1/*
2 * linux/arch/x86_64/kernel/vsyscall.c
3 *
4 * Copyright (C) 2001 Andrea Arcangeli <andrea@suse.de> SuSE
5 * Copyright 2003 Andi Kleen, SuSE Labs.
6 *
7 * Thanks to hpa@transmeta.com for some useful hint.
8 * Special thanks to Ingo Molnar for his early experience with
9 * a different vsyscall implementation for Linux/IA32 and for the name.
10 *
11 * vsyscall 1 is located at -10Mbyte, vsyscall 2 is located
12 * at virtual address -10Mbyte+1024bytes etc... There are at max 4
13 * vsyscalls. One vsyscall can reserve more than 1 slot to avoid
14 * jumping out of line if necessary. We cannot add more with this
15 * mechanism because older kernels won't return -ENOSYS.
16 * If we want more than four we need a vDSO.
17 *
18 * Note: the concept clashes with user mode linux. If you use UML and
19 * want per guest time just set the kernel.vsyscall64 sysctl to 0.
20 */
21
22#include <linux/time.h>
23#include <linux/init.h>
24#include <linux/kernel.h>
25#include <linux/timer.h>
26#include <linux/seqlock.h>
27#include <linux/jiffies.h>
28#include <linux/sysctl.h>
29
30#include <asm/vsyscall.h>
31#include <asm/pgtable.h>
32#include <asm/page.h>
33#include <asm/fixmap.h>
34#include <asm/errno.h>
35#include <asm/io.h>
36
37#define __vsyscall(nr) __attribute__ ((unused,__section__(".vsyscall_" #nr)))
38#define force_inline __attribute__((always_inline)) inline
39
40int __sysctl_vsyscall __section_sysctl_vsyscall = 1;
41seqlock_t __xtime_lock __section_xtime_lock = SEQLOCK_UNLOCKED;
42
43#include <asm/unistd.h>
44
45static force_inline void timeval_normalize(struct timeval * tv)
46{
47 time_t __sec;
48
49 __sec = tv->tv_usec / 1000000;
50 if (__sec) {
51 tv->tv_usec %= 1000000;
52 tv->tv_sec += __sec;
53 }
54}
55
56static force_inline void do_vgettimeofday(struct timeval * tv)
57{
58 long sequence, t;
59 unsigned long sec, usec;
60
61 do {
62 sequence = read_seqbegin(&__xtime_lock);
63
64 sec = __xtime.tv_sec;
65 usec = (__xtime.tv_nsec / 1000) +
66 (__jiffies - __wall_jiffies) * (1000000 / HZ);
67
312df5f1 68 if (__vxtime.mode != VXTIME_HPET) {
c818a181 69 t = get_cycles_sync();
1da177e4
LT
70 if (t < __vxtime.last_tsc)
71 t = __vxtime.last_tsc;
72 usec += ((t - __vxtime.last_tsc) *
73 __vxtime.tsc_quot) >> 32;
74 /* See comment in x86_64 do_gettimeofday. */
75 } else {
76 usec += ((readl((void *)fix_to_virt(VSYSCALL_HPET) + 0xf0) -
77 __vxtime.last) * __vxtime.quot) >> 32;
78 }
79 } while (read_seqretry(&__xtime_lock, sequence));
80
81 tv->tv_sec = sec + usec / 1000000;
82 tv->tv_usec = usec % 1000000;
83}
84
85/* RED-PEN may want to readd seq locking, but then the variable should be write-once. */
86static force_inline void do_get_tz(struct timezone * tz)
87{
88 *tz = __sys_tz;
89}
90
91static force_inline int gettimeofday(struct timeval *tv, struct timezone *tz)
92{
93 int ret;
94 asm volatile("vsysc2: syscall"
95 : "=a" (ret)
96 : "0" (__NR_gettimeofday),"D" (tv),"S" (tz) : __syscall_clobber );
97 return ret;
98}
99
100static force_inline long time_syscall(long *t)
101{
102 long secs;
103 asm volatile("vsysc1: syscall"
104 : "=a" (secs)
105 : "0" (__NR_time),"D" (t) : __syscall_clobber);
106 return secs;
107}
108
2e8ad43e 109int __vsyscall(0) vgettimeofday(struct timeval * tv, struct timezone * tz)
1da177e4
LT
110{
111 if (unlikely(!__sysctl_vsyscall))
112 return gettimeofday(tv,tz);
113 if (tv)
114 do_vgettimeofday(tv);
115 if (tz)
116 do_get_tz(tz);
117 return 0;
118}
119
120/* This will break when the xtime seconds get inaccurate, but that is
121 * unlikely */
2e8ad43e 122time_t __vsyscall(1) vtime(time_t *t)
1da177e4
LT
123{
124 if (unlikely(!__sysctl_vsyscall))
125 return time_syscall(t);
126 else if (t)
127 *t = __xtime.tv_sec;
128 return __xtime.tv_sec;
129}
130
2e8ad43e 131long __vsyscall(2) venosys_0(void)
1da177e4
LT
132{
133 return -ENOSYS;
134}
135
2e8ad43e 136long __vsyscall(3) venosys_1(void)
1da177e4
LT
137{
138 return -ENOSYS;
139}
140
141#ifdef CONFIG_SYSCTL
142
143#define SYSCALL 0x050f
144#define NOP2 0x9090
145
146/*
147 * NOP out syscall in vsyscall page when not needed.
148 */
149static int vsyscall_sysctl_change(ctl_table *ctl, int write, struct file * filp,
150 void __user *buffer, size_t *lenp, loff_t *ppos)
151{
152 extern u16 vsysc1, vsysc2;
153 u16 *map1, *map2;
154 int ret = proc_dointvec(ctl, write, filp, buffer, lenp, ppos);
155 if (!write)
156 return ret;
157 /* gcc has some trouble with __va(__pa()), so just do it this
158 way. */
159 map1 = ioremap(__pa_symbol(&vsysc1), 2);
160 if (!map1)
161 return -ENOMEM;
162 map2 = ioremap(__pa_symbol(&vsysc2), 2);
163 if (!map2) {
164 ret = -ENOMEM;
165 goto out;
166 }
167 if (!sysctl_vsyscall) {
168 *map1 = SYSCALL;
169 *map2 = SYSCALL;
170 } else {
171 *map1 = NOP2;
172 *map2 = NOP2;
173 }
174 iounmap(map2);
175out:
176 iounmap(map1);
177 return ret;
178}
179
180static int vsyscall_sysctl_nostrat(ctl_table *t, int __user *name, int nlen,
181 void __user *oldval, size_t __user *oldlenp,
182 void __user *newval, size_t newlen,
183 void **context)
184{
185 return -ENOSYS;
186}
187
188static ctl_table kernel_table2[] = {
189 { .ctl_name = 99, .procname = "vsyscall64",
190 .data = &sysctl_vsyscall, .maxlen = sizeof(int), .mode = 0644,
191 .strategy = vsyscall_sysctl_nostrat,
192 .proc_handler = vsyscall_sysctl_change },
193 { 0, }
194};
195
196static ctl_table kernel_root_table2[] = {
197 { .ctl_name = CTL_KERN, .procname = "kernel", .mode = 0555,
198 .child = kernel_table2 },
199 { 0 },
200};
201
202#endif
203
204static void __init map_vsyscall(void)
205{
206 extern char __vsyscall_0;
207 unsigned long physaddr_page0 = __pa_symbol(&__vsyscall_0);
208
209 __set_fixmap(VSYSCALL_FIRST_PAGE, physaddr_page0, PAGE_KERNEL_VSYSCALL);
210}
211
212static int __init vsyscall_init(void)
213{
214 BUG_ON(((unsigned long) &vgettimeofday !=
215 VSYSCALL_ADDR(__NR_vgettimeofday)));
216 BUG_ON((unsigned long) &vtime != VSYSCALL_ADDR(__NR_vtime));
217 BUG_ON((VSYSCALL_ADDR(0) != __fix_to_virt(VSYSCALL_FIRST_PAGE)));
218 map_vsyscall();
f3c5f5e7 219#ifdef CONFIG_SYSCTL
1da177e4 220 register_sysctl_table(kernel_root_table2, 0);
f3c5f5e7 221#endif
1da177e4
LT
222 return 0;
223}
224
225__initcall(vsyscall_init);