forked from ~ljy/RK356X_SDK_RELEASE

hc
2023-12-08 01573e231f18eb2d99162747186f59511f56b64d
kernel/arch/mips/mm/mmap.c
....@@ -20,43 +20,6 @@
2020 unsigned long shm_align_mask = PAGE_SIZE - 1; /* Sane caches */
2121 EXPORT_SYMBOL(shm_align_mask);
2222
23
-/* gap between mmap and stack */
24
-#define MIN_GAP (128*1024*1024UL)
25
-#define MAX_GAP ((TASK_SIZE)/6*5)
26
-#define STACK_RND_MASK (0x7ff >> (PAGE_SHIFT - 12))
27
-
28
-static int mmap_is_legacy(struct rlimit *rlim_stack)
29
-{
30
- if (current->personality & ADDR_COMPAT_LAYOUT)
31
- return 1;
32
-
33
- if (rlim_stack->rlim_cur == RLIM_INFINITY)
34
- return 1;
35
-
36
- return sysctl_legacy_va_layout;
37
-}
38
-
39
-static unsigned long mmap_base(unsigned long rnd, struct rlimit *rlim_stack)
40
-{
41
- unsigned long gap = rlim_stack->rlim_cur;
42
- unsigned long pad = stack_guard_gap;
43
-
44
- /* Account for stack randomization if necessary */
45
- if (current->flags & PF_RANDOMIZE)
46
- pad += (STACK_RND_MASK << PAGE_SHIFT);
47
-
48
- /* Values close to RLIM_INFINITY can overflow. */
49
- if (gap + pad > gap)
50
- gap += pad;
51
-
52
- if (gap < MIN_GAP)
53
- gap = MIN_GAP;
54
- else if (gap > MAX_GAP)
55
- gap = MAX_GAP;
56
-
57
- return PAGE_ALIGN(TASK_SIZE - gap - rnd);
58
-}
59
-
6023 #define COLOUR_ALIGN(addr, pgoff) \
6124 ((((addr) + shm_align_mask) & ~shm_align_mask) + \
6225 (((pgoff) << PAGE_SHIFT) & shm_align_mask))
....@@ -154,69 +117,12 @@
154117 addr0, len, pgoff, flags, DOWN);
155118 }
156119
157
-unsigned long arch_mmap_rnd(void)
158
-{
159
- unsigned long rnd;
160
-
161
-#ifdef CONFIG_COMPAT
162
- if (TASK_IS_32BIT_ADDR)
163
- rnd = get_random_long() & ((1UL << mmap_rnd_compat_bits) - 1);
164
- else
165
-#endif /* CONFIG_COMPAT */
166
- rnd = get_random_long() & ((1UL << mmap_rnd_bits) - 1);
167
-
168
- return rnd << PAGE_SHIFT;
169
-}
170
-
171
-void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
172
-{
173
- unsigned long random_factor = 0UL;
174
-
175
- if (current->flags & PF_RANDOMIZE)
176
- random_factor = arch_mmap_rnd();
177
-
178
- if (mmap_is_legacy(rlim_stack)) {
179
- mm->mmap_base = TASK_UNMAPPED_BASE + random_factor;
180
- mm->get_unmapped_area = arch_get_unmapped_area;
181
- } else {
182
- mm->mmap_base = mmap_base(random_factor, rlim_stack);
183
- mm->get_unmapped_area = arch_get_unmapped_area_topdown;
184
- }
185
-}
186
-
187
-static inline unsigned long brk_rnd(void)
188
-{
189
- unsigned long rnd = get_random_long();
190
-
191
- rnd = rnd << PAGE_SHIFT;
192
- /* 8MB for 32bit, 256MB for 64bit */
193
- if (TASK_IS_32BIT_ADDR)
194
- rnd = rnd & 0x7ffffful;
195
- else
196
- rnd = rnd & 0xffffffful;
197
-
198
- return rnd;
199
-}
200
-
201
-unsigned long arch_randomize_brk(struct mm_struct *mm)
202
-{
203
- unsigned long base = mm->brk;
204
- unsigned long ret;
205
-
206
- ret = PAGE_ALIGN(base + brk_rnd());
207
-
208
- if (ret < mm->brk)
209
- return mm->brk;
210
-
211
- return ret;
212
-}
213
-
214
-int __virt_addr_valid(const volatile void *kaddr)
120
+bool __virt_addr_valid(const volatile void *kaddr)
215121 {
216122 unsigned long vaddr = (unsigned long)kaddr;
217123
218124 if ((vaddr < PAGE_OFFSET) || (vaddr >= MAP_BASE))
219
- return 0;
125
+ return false;
220126
221127 return pfn_valid(PFN_DOWN(virt_to_phys(kaddr)));
222128 }