xref: /linux/arch/x86/entry/vsyscall/vsyscall_64.c (revision 02b670c1)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
200398a00SIngo Molnar /*
300398a00SIngo Molnar  * Copyright (c) 2012-2014 Andy Lutomirski <luto@amacapital.net>
400398a00SIngo Molnar  *
500398a00SIngo Molnar  * Based on the original implementation which is:
600398a00SIngo Molnar  *  Copyright (C) 2001 Andrea Arcangeli <andrea@suse.de> SuSE
700398a00SIngo Molnar  *  Copyright 2003 Andi Kleen, SuSE Labs.
800398a00SIngo Molnar  *
900398a00SIngo Molnar  *  Parts of the original code have been moved to arch/x86/vdso/vma.c
1000398a00SIngo Molnar  *
1100398a00SIngo Molnar  * This file implements vsyscall emulation.  vsyscalls are a legacy ABI:
1200398a00SIngo Molnar  * Userspace can request certain kernel services by calling fixed
1300398a00SIngo Molnar  * addresses.  This concept is problematic:
1400398a00SIngo Molnar  *
1500398a00SIngo Molnar  * - It interferes with ASLR.
1600398a00SIngo Molnar  * - It's awkward to write code that lives in kernel addresses but is
1700398a00SIngo Molnar  *   callable by userspace at fixed addresses.
1800398a00SIngo Molnar  * - The whole concept is impossible for 32-bit compat userspace.
1900398a00SIngo Molnar  * - UML cannot easily virtualize a vsyscall.
2000398a00SIngo Molnar  *
2100398a00SIngo Molnar  * As of mid-2014, I believe that there is no new userspace code that
2200398a00SIngo Molnar  * will use a vsyscall if the vDSO is present.  I hope that there will
2300398a00SIngo Molnar  * soon be no new userspace code that will ever use a vsyscall.
2400398a00SIngo Molnar  *
2500398a00SIngo Molnar  * The code in this file emulates vsyscalls when notified of a page
2600398a00SIngo Molnar  * fault to a vsyscall address.
2700398a00SIngo Molnar  */
2800398a00SIngo Molnar 
2900398a00SIngo Molnar #include <linux/kernel.h>
3000398a00SIngo Molnar #include <linux/timer.h>
313f07c014SIngo Molnar #include <linux/sched/signal.h>
32589ee628SIngo Molnar #include <linux/mm_types.h>
3300398a00SIngo Molnar #include <linux/syscalls.h>
3400398a00SIngo Molnar #include <linux/ratelimit.h>
3500398a00SIngo Molnar 
3600398a00SIngo Molnar #include <asm/vsyscall.h>
3700398a00SIngo Molnar #include <asm/unistd.h>
3800398a00SIngo Molnar #include <asm/fixmap.h>
3900398a00SIngo Molnar #include <asm/traps.h>
4049275fefSAndy Lutomirski #include <asm/paravirt.h>
4100398a00SIngo Molnar 
4200398a00SIngo Molnar #define CREATE_TRACE_POINTS
4300398a00SIngo Molnar #include "vsyscall_trace.h"
4400398a00SIngo Molnar 
45441cedabSAndy Lutomirski static enum { EMULATE, XONLY, NONE } vsyscall_mode __ro_after_init =
46076ca272SAndy Lutomirski #ifdef CONFIG_LEGACY_VSYSCALL_NONE
473dc33bd3SKees Cook 	NONE;
48bd49e16eSAndy Lutomirski #elif defined(CONFIG_LEGACY_VSYSCALL_XONLY)
49bd49e16eSAndy Lutomirski 	XONLY;
503dc33bd3SKees Cook #else
51bf00745eSAndy Lutomirski 	#error VSYSCALL config is broken
523dc33bd3SKees Cook #endif
5300398a00SIngo Molnar 
vsyscall_setup(char * str)5400398a00SIngo Molnar static int __init vsyscall_setup(char *str)
5500398a00SIngo Molnar {
5600398a00SIngo Molnar 	if (str) {
5700398a00SIngo Molnar 		if (!strcmp("emulate", str))
5800398a00SIngo Molnar 			vsyscall_mode = EMULATE;
59bd49e16eSAndy Lutomirski 		else if (!strcmp("xonly", str))
60bd49e16eSAndy Lutomirski 			vsyscall_mode = XONLY;
6100398a00SIngo Molnar 		else if (!strcmp("none", str))
6200398a00SIngo Molnar 			vsyscall_mode = NONE;
6300398a00SIngo Molnar 		else
6400398a00SIngo Molnar 			return -EINVAL;
6500398a00SIngo Molnar 
6600398a00SIngo Molnar 		return 0;
6700398a00SIngo Molnar 	}
6800398a00SIngo Molnar 
6900398a00SIngo Molnar 	return -EINVAL;
7000398a00SIngo Molnar }
7100398a00SIngo Molnar early_param("vsyscall", vsyscall_setup);
7200398a00SIngo Molnar 
warn_bad_vsyscall(const char * level,struct pt_regs * regs,const char * message)7300398a00SIngo Molnar static void warn_bad_vsyscall(const char *level, struct pt_regs *regs,
7400398a00SIngo Molnar 			      const char *message)
7500398a00SIngo Molnar {
7600398a00SIngo Molnar 	if (!show_unhandled_signals)
7700398a00SIngo Molnar 		return;
7800398a00SIngo Molnar 
79ee63291aSXin Li 	printk_ratelimited("%s%s[%d] %s ip:%lx cs:%x sp:%lx ax:%lx si:%lx di:%lx\n",
8000398a00SIngo Molnar 			   level, current->comm, task_pid_nr(current),
8100398a00SIngo Molnar 			   message, regs->ip, regs->cs,
8200398a00SIngo Molnar 			   regs->sp, regs->ax, regs->si, regs->di);
8300398a00SIngo Molnar }
8400398a00SIngo Molnar 
addr_to_vsyscall_nr(unsigned long addr)8500398a00SIngo Molnar static int addr_to_vsyscall_nr(unsigned long addr)
8600398a00SIngo Molnar {
8700398a00SIngo Molnar 	int nr;
8800398a00SIngo Molnar 
8900398a00SIngo Molnar 	if ((addr & ~0xC00UL) != VSYSCALL_ADDR)
9000398a00SIngo Molnar 		return -EINVAL;
9100398a00SIngo Molnar 
9200398a00SIngo Molnar 	nr = (addr & 0xC00UL) >> 10;
9300398a00SIngo Molnar 	if (nr >= 3)
9400398a00SIngo Molnar 		return -EINVAL;
9500398a00SIngo Molnar 
9600398a00SIngo Molnar 	return nr;
9700398a00SIngo Molnar }
9800398a00SIngo Molnar 
write_ok_or_segv(unsigned long ptr,size_t size)9900398a00SIngo Molnar static bool write_ok_or_segv(unsigned long ptr, size_t size)
10000398a00SIngo Molnar {
10196d4f267SLinus Torvalds 	if (!access_ok((void __user *)ptr, size)) {
10200398a00SIngo Molnar 		struct thread_struct *thread = &current->thread;
10300398a00SIngo Molnar 
104af2ebdcfSAndy Lutomirski 		thread->error_code	= X86_PF_USER | X86_PF_WRITE;
10500398a00SIngo Molnar 		thread->cr2		= ptr;
10600398a00SIngo Molnar 		thread->trap_nr		= X86_TRAP_PF;
10700398a00SIngo Molnar 
1082e1661d2SEric W. Biederman 		force_sig_fault(SIGSEGV, SEGV_MAPERR, (void __user *)ptr);
10900398a00SIngo Molnar 		return false;
11000398a00SIngo Molnar 	} else {
11100398a00SIngo Molnar 		return true;
11200398a00SIngo Molnar 	}
11300398a00SIngo Molnar }
11400398a00SIngo Molnar 
emulate_vsyscall(unsigned long error_code,struct pt_regs * regs,unsigned long address)115918ce325SAndy Lutomirski bool emulate_vsyscall(unsigned long error_code,
116918ce325SAndy Lutomirski 		      struct pt_regs *regs, unsigned long address)
11700398a00SIngo Molnar {
11800398a00SIngo Molnar 	unsigned long caller;
11900398a00SIngo Molnar 	int vsyscall_nr, syscall_nr, tmp;
12000398a00SIngo Molnar 	long ret;
121fa697140SDominik Brodowski 	unsigned long orig_dx;
12200398a00SIngo Molnar 
123918ce325SAndy Lutomirski 	/* Write faults or kernel-privilege faults never get fixed up. */
124918ce325SAndy Lutomirski 	if ((error_code & (X86_PF_WRITE | X86_PF_USER)) != X86_PF_USER)
125918ce325SAndy Lutomirski 		return false;
126918ce325SAndy Lutomirski 
127918ce325SAndy Lutomirski 	if (!(error_code & X86_PF_INSTR)) {
128918ce325SAndy Lutomirski 		/* Failed vsyscall read */
129918ce325SAndy Lutomirski 		if (vsyscall_mode == EMULATE)
130918ce325SAndy Lutomirski 			return false;
131918ce325SAndy Lutomirski 
132918ce325SAndy Lutomirski 		/*
133918ce325SAndy Lutomirski 		 * User code tried and failed to read the vsyscall page.
134918ce325SAndy Lutomirski 		 */
135918ce325SAndy Lutomirski 		warn_bad_vsyscall(KERN_INFO, regs, "vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround");
136918ce325SAndy Lutomirski 		return false;
137918ce325SAndy Lutomirski 	}
138918ce325SAndy Lutomirski 
13900398a00SIngo Molnar 	/*
14000398a00SIngo Molnar 	 * No point in checking CS -- the only way to get here is a user mode
14100398a00SIngo Molnar 	 * trap to a high address, which means that we're in 64-bit user code.
14200398a00SIngo Molnar 	 */
14300398a00SIngo Molnar 
14400398a00SIngo Molnar 	WARN_ON_ONCE(address != regs->ip);
14500398a00SIngo Molnar 
14600398a00SIngo Molnar 	if (vsyscall_mode == NONE) {
14700398a00SIngo Molnar 		warn_bad_vsyscall(KERN_INFO, regs,
14800398a00SIngo Molnar 				  "vsyscall attempted with vsyscall=none");
14900398a00SIngo Molnar 		return false;
15000398a00SIngo Molnar 	}
15100398a00SIngo Molnar 
15200398a00SIngo Molnar 	vsyscall_nr = addr_to_vsyscall_nr(address);
15300398a00SIngo Molnar 
15400398a00SIngo Molnar 	trace_emulate_vsyscall(vsyscall_nr);
15500398a00SIngo Molnar 
15600398a00SIngo Molnar 	if (vsyscall_nr < 0) {
15700398a00SIngo Molnar 		warn_bad_vsyscall(KERN_WARNING, regs,
15800398a00SIngo Molnar 				  "misaligned vsyscall (exploit attempt or buggy program) -- look up the vsyscall kernel parameter if you need a workaround");
15900398a00SIngo Molnar 		goto sigsegv;
16000398a00SIngo Molnar 	}
16100398a00SIngo Molnar 
16200398a00SIngo Molnar 	if (get_user(caller, (unsigned long __user *)regs->sp) != 0) {
16300398a00SIngo Molnar 		warn_bad_vsyscall(KERN_WARNING, regs,
16400398a00SIngo Molnar 				  "vsyscall with bad stack (exploit attempt?)");
16500398a00SIngo Molnar 		goto sigsegv;
16600398a00SIngo Molnar 	}
16700398a00SIngo Molnar 
16800398a00SIngo Molnar 	/*
16900398a00SIngo Molnar 	 * Check for access_ok violations and find the syscall nr.
17000398a00SIngo Molnar 	 *
17100398a00SIngo Molnar 	 * NULL is a valid user pointer (in the access_ok sense) on 32-bit and
17200398a00SIngo Molnar 	 * 64-bit, so we don't need to special-case it here.  For all the
17300398a00SIngo Molnar 	 * vsyscalls, NULL means "don't write anything" not "write it at
17400398a00SIngo Molnar 	 * address 0".
17500398a00SIngo Molnar 	 */
17600398a00SIngo Molnar 	switch (vsyscall_nr) {
17700398a00SIngo Molnar 	case 0:
178ddccf40fSArnd Bergmann 		if (!write_ok_or_segv(regs->di, sizeof(struct __kernel_old_timeval)) ||
17900398a00SIngo Molnar 		    !write_ok_or_segv(regs->si, sizeof(struct timezone))) {
18000398a00SIngo Molnar 			ret = -EFAULT;
18100398a00SIngo Molnar 			goto check_fault;
18200398a00SIngo Molnar 		}
18300398a00SIngo Molnar 
18400398a00SIngo Molnar 		syscall_nr = __NR_gettimeofday;
18500398a00SIngo Molnar 		break;
18600398a00SIngo Molnar 
18700398a00SIngo Molnar 	case 1:
18821346564SArnd Bergmann 		if (!write_ok_or_segv(regs->di, sizeof(__kernel_old_time_t))) {
18900398a00SIngo Molnar 			ret = -EFAULT;
19000398a00SIngo Molnar 			goto check_fault;
19100398a00SIngo Molnar 		}
19200398a00SIngo Molnar 
19300398a00SIngo Molnar 		syscall_nr = __NR_time;
19400398a00SIngo Molnar 		break;
19500398a00SIngo Molnar 
19600398a00SIngo Molnar 	case 2:
19700398a00SIngo Molnar 		if (!write_ok_or_segv(regs->di, sizeof(unsigned)) ||
19800398a00SIngo Molnar 		    !write_ok_or_segv(regs->si, sizeof(unsigned))) {
19900398a00SIngo Molnar 			ret = -EFAULT;
20000398a00SIngo Molnar 			goto check_fault;
20100398a00SIngo Molnar 		}
20200398a00SIngo Molnar 
20300398a00SIngo Molnar 		syscall_nr = __NR_getcpu;
20400398a00SIngo Molnar 		break;
20500398a00SIngo Molnar 	}
20600398a00SIngo Molnar 
20700398a00SIngo Molnar 	/*
20800398a00SIngo Molnar 	 * Handle seccomp.  regs->ip must be the original value.
2095fb94e9cSMauro Carvalho Chehab 	 * See seccomp_send_sigsys and Documentation/userspace-api/seccomp_filter.rst.
21000398a00SIngo Molnar 	 *
21100398a00SIngo Molnar 	 * We could optimize the seccomp disabled case, but performance
21200398a00SIngo Molnar 	 * here doesn't matter.
21300398a00SIngo Molnar 	 */
21400398a00SIngo Molnar 	regs->orig_ax = syscall_nr;
21500398a00SIngo Molnar 	regs->ax = -ENOSYS;
216fefad9efSChristian Brauner 	tmp = secure_computing();
21700398a00SIngo Molnar 	if ((!tmp && regs->orig_ax != syscall_nr) || regs->ip != address) {
21800398a00SIngo Molnar 		warn_bad_vsyscall(KERN_DEBUG, regs,
21900398a00SIngo Molnar 				  "seccomp tried to change syscall nr or ip");
220fcb116bcSEric W. Biederman 		force_exit_sig(SIGSYS);
221695dd0d6SEric W. Biederman 		return true;
22200398a00SIngo Molnar 	}
22300398a00SIngo Molnar 	regs->orig_ax = -1;
22400398a00SIngo Molnar 	if (tmp)
22500398a00SIngo Molnar 		goto do_ret;  /* skip requested */
22600398a00SIngo Molnar 
22700398a00SIngo Molnar 	/*
228*02b670c1SLinus Torvalds 	 * With a real vsyscall, page faults cause SIGSEGV.
22900398a00SIngo Molnar 	 */
23000398a00SIngo Molnar 	ret = -EFAULT;
23100398a00SIngo Molnar 	switch (vsyscall_nr) {
23200398a00SIngo Molnar 	case 0:
233fa697140SDominik Brodowski 		/* this decodes regs->di and regs->si on its own */
234d5a00528SDominik Brodowski 		ret = __x64_sys_gettimeofday(regs);
23500398a00SIngo Molnar 		break;
23600398a00SIngo Molnar 
23700398a00SIngo Molnar 	case 1:
238fa697140SDominik Brodowski 		/* this decodes regs->di on its own */
239d5a00528SDominik Brodowski 		ret = __x64_sys_time(regs);
24000398a00SIngo Molnar 		break;
24100398a00SIngo Molnar 
24200398a00SIngo Molnar 	case 2:
243fa697140SDominik Brodowski 		/* while we could clobber regs->dx, we didn't in the past... */
244fa697140SDominik Brodowski 		orig_dx = regs->dx;
245fa697140SDominik Brodowski 		regs->dx = 0;
246fa697140SDominik Brodowski 		/* this decodes regs->di, regs->si and regs->dx on its own */
247d5a00528SDominik Brodowski 		ret = __x64_sys_getcpu(regs);
248fa697140SDominik Brodowski 		regs->dx = orig_dx;
24900398a00SIngo Molnar 		break;
25000398a00SIngo Molnar 	}
25100398a00SIngo Molnar 
25200398a00SIngo Molnar check_fault:
25300398a00SIngo Molnar 	if (ret == -EFAULT) {
25400398a00SIngo Molnar 		/* Bad news -- userspace fed a bad pointer to a vsyscall. */
25500398a00SIngo Molnar 		warn_bad_vsyscall(KERN_INFO, regs,
25600398a00SIngo Molnar 				  "vsyscall fault (exploit attempt?)");
25700398a00SIngo Molnar 		goto sigsegv;
25800398a00SIngo Molnar 	}
25900398a00SIngo Molnar 
26000398a00SIngo Molnar 	regs->ax = ret;
26100398a00SIngo Molnar 
26200398a00SIngo Molnar do_ret:
26300398a00SIngo Molnar 	/* Emulate a ret instruction. */
26400398a00SIngo Molnar 	regs->ip = caller;
26500398a00SIngo Molnar 	regs->sp += 8;
26600398a00SIngo Molnar 	return true;
26700398a00SIngo Molnar 
26800398a00SIngo Molnar sigsegv:
2693cf5d076SEric W. Biederman 	force_sig(SIGSEGV);
27000398a00SIngo Molnar 	return true;
27100398a00SIngo Molnar }
27200398a00SIngo Molnar 
27300398a00SIngo Molnar /*
27400398a00SIngo Molnar  * A pseudo VMA to allow ptrace access for the vsyscall page.  This only
27500398a00SIngo Molnar  * covers the 64bit vsyscall page now. 32bit has a real VMA now and does
27600398a00SIngo Molnar  * not need special handling anymore:
27700398a00SIngo Molnar  */
gate_vma_name(struct vm_area_struct * vma)27800398a00SIngo Molnar static const char *gate_vma_name(struct vm_area_struct *vma)
27900398a00SIngo Molnar {
28000398a00SIngo Molnar 	return "[vsyscall]";
28100398a00SIngo Molnar }
2827cbea8dcSKirill A. Shutemov static const struct vm_operations_struct gate_vma_ops = {
28300398a00SIngo Molnar 	.name = gate_vma_name,
28400398a00SIngo Molnar };
285441cedabSAndy Lutomirski static struct vm_area_struct gate_vma __ro_after_init = {
28600398a00SIngo Molnar 	.vm_start	= VSYSCALL_ADDR,
28700398a00SIngo Molnar 	.vm_end		= VSYSCALL_ADDR + PAGE_SIZE,
28800398a00SIngo Molnar 	.vm_page_prot	= PAGE_READONLY_EXEC,
28900398a00SIngo Molnar 	.vm_flags	= VM_READ | VM_EXEC,
29000398a00SIngo Molnar 	.vm_ops		= &gate_vma_ops,
29100398a00SIngo Molnar };
29200398a00SIngo Molnar 
get_gate_vma(struct mm_struct * mm)29300398a00SIngo Molnar struct vm_area_struct *get_gate_vma(struct mm_struct *mm)
29400398a00SIngo Molnar {
295c338867dSBrian Gerst #ifdef CONFIG_COMPAT
2965ef495e5SKirill A. Shutemov 	if (!mm || !test_bit(MM_CONTEXT_HAS_VSYSCALL, &mm->context.flags))
29700398a00SIngo Molnar 		return NULL;
29800398a00SIngo Molnar #endif
29900398a00SIngo Molnar 	if (vsyscall_mode == NONE)
30000398a00SIngo Molnar 		return NULL;
30100398a00SIngo Molnar 	return &gate_vma;
30200398a00SIngo Molnar }
30300398a00SIngo Molnar 
in_gate_area(struct mm_struct * mm,unsigned long addr)30400398a00SIngo Molnar int in_gate_area(struct mm_struct *mm, unsigned long addr)
30500398a00SIngo Molnar {
30600398a00SIngo Molnar 	struct vm_area_struct *vma = get_gate_vma(mm);
30700398a00SIngo Molnar 
30800398a00SIngo Molnar 	if (!vma)
30900398a00SIngo Molnar 		return 0;
31000398a00SIngo Molnar 
31100398a00SIngo Molnar 	return (addr >= vma->vm_start) && (addr < vma->vm_end);
31200398a00SIngo Molnar }
31300398a00SIngo Molnar 
31400398a00SIngo Molnar /*
31500398a00SIngo Molnar  * Use this when you have no reliable mm, typically from interrupt
31600398a00SIngo Molnar  * context. It is less reliable than using a task's mm and may give
31700398a00SIngo Molnar  * false positives.
31800398a00SIngo Molnar  */
in_gate_area_no_mm(unsigned long addr)31900398a00SIngo Molnar int in_gate_area_no_mm(unsigned long addr)
32000398a00SIngo Molnar {
32100398a00SIngo Molnar 	return vsyscall_mode != NONE && (addr & PAGE_MASK) == VSYSCALL_ADDR;
32200398a00SIngo Molnar }
32300398a00SIngo Molnar 
32449275fefSAndy Lutomirski /*
32549275fefSAndy Lutomirski  * The VSYSCALL page is the only user-accessible page in the kernel address
32649275fefSAndy Lutomirski  * range.  Normally, the kernel page tables can have _PAGE_USER clear, but
32749275fefSAndy Lutomirski  * the tables covering VSYSCALL_ADDR need _PAGE_USER set if vsyscalls
32849275fefSAndy Lutomirski  * are enabled.
32949275fefSAndy Lutomirski  *
33049275fefSAndy Lutomirski  * Some day we may create a "minimal" vsyscall mode in which we emulate
33149275fefSAndy Lutomirski  * vsyscalls but leave the page not present.  If so, we skip calling
33249275fefSAndy Lutomirski  * this.
33349275fefSAndy Lutomirski  */
set_vsyscall_pgtable_user_bits(pgd_t * root)33485900ea5SAndy Lutomirski void __init set_vsyscall_pgtable_user_bits(pgd_t *root)
33549275fefSAndy Lutomirski {
33649275fefSAndy Lutomirski 	pgd_t *pgd;
33749275fefSAndy Lutomirski 	p4d_t *p4d;
33849275fefSAndy Lutomirski 	pud_t *pud;
33949275fefSAndy Lutomirski 	pmd_t *pmd;
34049275fefSAndy Lutomirski 
34185900ea5SAndy Lutomirski 	pgd = pgd_offset_pgd(root, VSYSCALL_ADDR);
34249275fefSAndy Lutomirski 	set_pgd(pgd, __pgd(pgd_val(*pgd) | _PAGE_USER));
34349275fefSAndy Lutomirski 	p4d = p4d_offset(pgd, VSYSCALL_ADDR);
34449275fefSAndy Lutomirski #if CONFIG_PGTABLE_LEVELS >= 5
34531ad7f8eSBoris Ostrovsky 	set_p4d(p4d, __p4d(p4d_val(*p4d) | _PAGE_USER));
34649275fefSAndy Lutomirski #endif
34749275fefSAndy Lutomirski 	pud = pud_offset(p4d, VSYSCALL_ADDR);
34849275fefSAndy Lutomirski 	set_pud(pud, __pud(pud_val(*pud) | _PAGE_USER));
34949275fefSAndy Lutomirski 	pmd = pmd_offset(pud, VSYSCALL_ADDR);
35049275fefSAndy Lutomirski 	set_pmd(pmd, __pmd(pmd_val(*pmd) | _PAGE_USER));
35149275fefSAndy Lutomirski }
35249275fefSAndy Lutomirski 
map_vsyscall(void)35300398a00SIngo Molnar void __init map_vsyscall(void)
35400398a00SIngo Molnar {
35500398a00SIngo Molnar 	extern char __vsyscall_page;
35600398a00SIngo Molnar 	unsigned long physaddr_vsyscall = __pa_symbol(&__vsyscall_page);
35700398a00SIngo Molnar 
358bd49e16eSAndy Lutomirski 	/*
359bd49e16eSAndy Lutomirski 	 * For full emulation, the page needs to exist for real.  In
360bd49e16eSAndy Lutomirski 	 * execute-only mode, there is no PTE at all backing the vsyscall
361bd49e16eSAndy Lutomirski 	 * page.
362bd49e16eSAndy Lutomirski 	 */
363bd49e16eSAndy Lutomirski 	if (vsyscall_mode == EMULATE) {
36400398a00SIngo Molnar 		__set_fixmap(VSYSCALL_PAGE, physaddr_vsyscall,
365076ca272SAndy Lutomirski 			     PAGE_KERNEL_VVAR);
36685900ea5SAndy Lutomirski 		set_vsyscall_pgtable_user_bits(swapper_pg_dir);
36749275fefSAndy Lutomirski 	}
36800398a00SIngo Molnar 
369bd49e16eSAndy Lutomirski 	if (vsyscall_mode == XONLY)
3701c71222eSSuren Baghdasaryan 		vm_flags_init(&gate_vma, VM_EXEC);
371bd49e16eSAndy Lutomirski 
37200398a00SIngo Molnar 	BUILD_BUG_ON((unsigned long)__fix_to_virt(VSYSCALL_PAGE) !=
37300398a00SIngo Molnar 		     (unsigned long)VSYSCALL_ADDR);
37400398a00SIngo Molnar }
375