common.c 11.1 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11
/*
 * common.c - C code for kernel entry and exit
 * Copyright (c) 2015 Andrew Lutomirski
 * GPL v2
 *
 * Based on asm and ptrace code by many authors.  The code here originated
 * in ptrace.c and signal.c.
 */

#include <linux/kernel.h>
#include <linux/sched.h>
12
#include <linux/sched/task_stack.h>
13 14 15 16 17 18 19 20 21 22 23 24
#include <linux/mm.h>
#include <linux/smp.h>
#include <linux/errno.h>
#include <linux/ptrace.h>
#include <linux/tracehook.h>
#include <linux/audit.h>
#include <linux/seccomp.h>
#include <linux/signal.h>
#include <linux/export.h>
#include <linux/context_tracking.h>
#include <linux/user-return-notifier.h>
#include <linux/uprobes.h>
25
#include <linux/livepatch.h>
26
#include <linux/syscalls.h>
27 28 29

#include <asm/desc.h>
#include <asm/traps.h>
30
#include <asm/vdso.h>
31
#include <linux/uaccess.h>
32
#include <asm/cpufeature.h>
33 34 35 36

#define CREATE_TRACE_POINTS
#include <trace/events/syscalls.h>

37 38
#ifdef CONFIG_CONTEXT_TRACKING
/* Called on entry from user mode with IRQs off. */
39
__visible inline void enter_from_user_mode(void)
40 41
{
	CT_WARN_ON(ct_state() != CONTEXT_USER);
42
	user_exit_irqoff();
43
}
44 45
#else
static inline void enter_from_user_mode(void) {}
46 47
#endif

48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
static void do_audit_syscall_entry(struct pt_regs *regs, u32 arch)
{
#ifdef CONFIG_X86_64
	if (arch == AUDIT_ARCH_X86_64) {
		audit_syscall_entry(regs->orig_ax, regs->di,
				    regs->si, regs->dx, regs->r10);
	} else
#endif
	{
		audit_syscall_entry(regs->orig_ax, regs->bx,
				    regs->cx, regs->dx, regs->si);
	}
}

/*
63 64
 * Returns the syscall nr to run (which should match regs->orig_ax) or -1
 * to skip the syscall.
65
 */
66
static long syscall_trace_enter(struct pt_regs *regs)
67
{
68 69
	u32 arch = in_ia32_syscall() ? AUDIT_ARCH_I386 : AUDIT_ARCH_X86_64;

70
	struct thread_info *ti = current_thread_info();
71
	unsigned long ret = 0;
K
Kees Cook 已提交
72
	bool emulated = false;
73 74
	u32 work;

75 76
	if (IS_ENABLED(CONFIG_DEBUG_ENTRY))
		BUG_ON(regs != task_pt_regs(current));
77

78
	work = READ_ONCE(ti->flags) & _TIF_WORK_SYSCALL_ENTRY;
79

K
Kees Cook 已提交
80 81 82 83 84 85 86 87 88 89
	if (unlikely(work & _TIF_SYSCALL_EMU))
		emulated = true;

	if ((emulated || (work & _TIF_SYSCALL_TRACE)) &&
	    tracehook_report_syscall_entry(regs))
		return -1L;

	if (emulated)
		return -1L;

90 91
#ifdef CONFIG_SECCOMP
	/*
K
Kees Cook 已提交
92
	 * Do seccomp after ptrace, to catch any tracer changes.
93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118
	 */
	if (work & _TIF_SECCOMP) {
		struct seccomp_data sd;

		sd.arch = arch;
		sd.nr = regs->orig_ax;
		sd.instruction_pointer = regs->ip;
#ifdef CONFIG_X86_64
		if (arch == AUDIT_ARCH_X86_64) {
			sd.args[0] = regs->di;
			sd.args[1] = regs->si;
			sd.args[2] = regs->dx;
			sd.args[3] = regs->r10;
			sd.args[4] = regs->r8;
			sd.args[5] = regs->r9;
		} else
#endif
		{
			sd.args[0] = regs->bx;
			sd.args[1] = regs->cx;
			sd.args[2] = regs->dx;
			sd.args[3] = regs->si;
			sd.args[4] = regs->di;
			sd.args[5] = regs->bp;
		}

119 120 121
		ret = __secure_computing(&sd);
		if (ret == -1)
			return ret;
122 123 124 125 126 127 128 129 130 131 132
	}
#endif

	if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
		trace_sys_enter(regs, regs->orig_ax);

	do_audit_syscall_entry(regs, arch);

	return ret ?: regs->orig_ax;
}

133 134
#define EXIT_TO_USERMODE_LOOP_FLAGS				\
	(_TIF_SIGPENDING | _TIF_NOTIFY_RESUME | _TIF_UPROBE |	\
135
	 _TIF_NEED_RESCHED | _TIF_USER_RETURN_NOTIFY | _TIF_PATCH_PENDING)
136

137 138
static void exit_to_usermode_loop(struct pt_regs *regs, u32 cached_flags)
{
139 140
	/*
	 * In order to return to user mode, we need to have IRQs off with
141
	 * none of EXIT_TO_USERMODE_LOOP_FLAGS set.  Several of these flags
142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167
	 * can be set at any time on preemptable kernels if we have IRQs on,
	 * so we need to loop.  Disabling preemption wouldn't help: doing the
	 * work to clear some of the flags can sleep.
	 */
	while (true) {
		/* We have work to do. */
		local_irq_enable();

		if (cached_flags & _TIF_NEED_RESCHED)
			schedule();

		if (cached_flags & _TIF_UPROBE)
			uprobe_notify_resume(regs);

		/* deal with pending signal delivery */
		if (cached_flags & _TIF_SIGPENDING)
			do_signal(regs);

		if (cached_flags & _TIF_NOTIFY_RESUME) {
			clear_thread_flag(TIF_NOTIFY_RESUME);
			tracehook_notify_resume(regs);
		}

		if (cached_flags & _TIF_USER_RETURN_NOTIFY)
			fire_user_return_notifiers();

168 169 170
		if (cached_flags & _TIF_PATCH_PENDING)
			klp_update_patch_state(current);

171 172
		/* Disable IRQs and retry */
		local_irq_disable();
173

174
		cached_flags = READ_ONCE(current_thread_info()->flags);
175 176 177

		if (!(cached_flags & EXIT_TO_USERMODE_LOOP_FLAGS))
			break;
178
	}
179 180 181 182 183
}

/* Called with IRQs disabled. */
__visible inline void prepare_exit_to_usermode(struct pt_regs *regs)
{
184
	struct thread_info *ti = current_thread_info();
185 186
	u32 cached_flags;

187 188
	addr_limit_user_check();

189
	lockdep_assert_irqs_disabled();
190 191
	lockdep_sys_exit();

192
	cached_flags = READ_ONCE(ti->flags);
193 194 195

	if (unlikely(cached_flags & EXIT_TO_USERMODE_LOOP_FLAGS))
		exit_to_usermode_loop(regs, cached_flags);
196

197 198 199 200 201 202 203
#ifdef CONFIG_COMPAT
	/*
	 * Compat syscalls set TS_COMPAT.  Make sure we clear it before
	 * returning to user mode.  We need to clear it *after* signal
	 * handling, because syscall restart has a fixup for compat
	 * syscalls.  The fixup is exercised by the ptrace_syscall_32
	 * selftest.
204 205 206 207
	 *
	 * We also need to clear TS_REGS_POKED_I386: the 32-bit tracer
	 * special case only applies after poking regs and before the
	 * very next return to user mode.
208
	 */
209
	current->thread.status &= ~(TS_COMPAT|TS_I386_REGS_POKED);
210 211
#endif

212
	user_enter_irqoff();
213 214
}

215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240
#define SYSCALL_EXIT_WORK_FLAGS				\
	(_TIF_SYSCALL_TRACE | _TIF_SYSCALL_AUDIT |	\
	 _TIF_SINGLESTEP | _TIF_SYSCALL_TRACEPOINT)

static void syscall_slow_exit_work(struct pt_regs *regs, u32 cached_flags)
{
	bool step;

	audit_syscall_exit(regs);

	if (cached_flags & _TIF_SYSCALL_TRACEPOINT)
		trace_sys_exit(regs, regs->ax);

	/*
	 * If TIF_SYSCALL_EMU is set, we only get here because of
	 * TIF_SINGLESTEP (i.e. this is PTRACE_SYSEMU_SINGLESTEP).
	 * We already reported this syscall instruction in
	 * syscall_trace_enter().
	 */
	step = unlikely(
		(cached_flags & (_TIF_SINGLESTEP | _TIF_SYSCALL_EMU))
		== _TIF_SINGLESTEP);
	if (step || cached_flags & _TIF_SYSCALL_TRACE)
		tracehook_report_syscall_exit(regs, step);
}

241 242 243 244
/*
 * Called with IRQs on and fully valid regs.  Returns with IRQs off in a
 * state such that we can immediately switch to user mode.
 */
245
__visible inline void syscall_return_slowpath(struct pt_regs *regs)
246
{
247
	struct thread_info *ti = current_thread_info();
248 249 250 251
	u32 cached_flags = READ_ONCE(ti->flags);

	CT_WARN_ON(ct_state() != CONTEXT_KERNEL);

252 253
	if (IS_ENABLED(CONFIG_PROVE_LOCKING) &&
	    WARN(irqs_disabled(), "syscall %ld left IRQs disabled", regs->orig_ax))
254 255 256 257 258 259
		local_irq_enable();

	/*
	 * First do one-time work.  If these work items are enabled, we
	 * want to run them exactly once per syscall exit with IRQs on.
	 */
260 261
	if (unlikely(cached_flags & SYSCALL_EXIT_WORK_FLAGS))
		syscall_slow_exit_work(regs, cached_flags);
262 263 264 265

	local_irq_disable();
	prepare_exit_to_usermode(regs);
}
266

267 268 269
#ifdef CONFIG_X86_64
__visible void do_syscall_64(struct pt_regs *regs)
{
270
	struct thread_info *ti = current_thread_info();
271 272
	unsigned long nr = regs->orig_ax;

273
	enter_from_user_mode();
274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293
	local_irq_enable();

	if (READ_ONCE(ti->flags) & _TIF_WORK_SYSCALL_ENTRY)
		nr = syscall_trace_enter(regs);

	/*
	 * NB: Native and x32 syscalls are dispatched from the same
	 * table.  The only functional difference is the x32 bit in
	 * regs->orig_ax, which changes the behavior of some syscalls.
	 */
	if (likely((nr & __SYSCALL_MASK) < NR_syscalls)) {
		regs->ax = sys_call_table[nr & __SYSCALL_MASK](
			regs->di, regs->si, regs->dx,
			regs->r10, regs->r8, regs->r9);
	}

	syscall_return_slowpath(regs);
}
#endif

294 295
#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
/*
296 297 298
 * Does a 32-bit syscall.  Called with IRQs on in CONTEXT_KERNEL.  Does
 * all entry and exit work and returns with IRQs off.  This function is
 * extremely hot in workloads that use it, and it's usually called from
299
 * do_fast_syscall_32, so forcibly inline it to improve performance.
300
 */
301
static __always_inline void do_syscall_32_irqs_on(struct pt_regs *regs)
302
{
303
	struct thread_info *ti = current_thread_info();
304 305 306
	unsigned int nr = (unsigned int)regs->orig_ax;

#ifdef CONFIG_IA32_EMULATION
307
	current->thread.status |= TS_COMPAT;
308 309 310 311 312 313 314 315 316 317 318 319
#endif

	if (READ_ONCE(ti->flags) & _TIF_WORK_SYSCALL_ENTRY) {
		/*
		 * Subtlety here: if ptrace pokes something larger than
		 * 2^32-1 into orig_ax, this truncates it.  This may or
		 * may not be necessary, but it matches the old asm
		 * behavior.
		 */
		nr = syscall_trace_enter(regs);
	}

320
	if (likely(nr < IA32_NR_syscalls)) {
321 322 323 324 325 326 327 328 329 330 331 332 333 334
		/*
		 * It's possible that a 32-bit syscall implementation
		 * takes a 64-bit parameter but nonetheless assumes that
		 * the high bits are zero.  Make sure we zero-extend all
		 * of the args.
		 */
		regs->ax = ia32_sys_call_table[nr](
			(unsigned int)regs->bx, (unsigned int)regs->cx,
			(unsigned int)regs->dx, (unsigned int)regs->si,
			(unsigned int)regs->di, (unsigned int)regs->bp);
	}

	syscall_return_slowpath(regs);
}
335

336 337
/* Handles int $0x80 */
__visible void do_int80_syscall_32(struct pt_regs *regs)
338
{
339
	enter_from_user_mode();
340 341 342 343
	local_irq_enable();
	do_syscall_32_irqs_on(regs);
}

344
/* Returns 0 to return using IRET or 1 to return using SYSEXIT/SYSRETL. */
345
__visible long do_fast_syscall_32(struct pt_regs *regs)
346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
{
	/*
	 * Called using the internal vDSO SYSENTER/SYSCALL32 calling
	 * convention.  Adjust regs so it looks like we entered using int80.
	 */

	unsigned long landing_pad = (unsigned long)current->mm->context.vdso +
		vdso_image_32.sym_int80_landing_pad;

	/*
	 * SYSENTER loses EIP, and even SYSCALL32 needs us to skip forward
	 * so that 'regs->ip -= 2' lands back on an int $0x80 instruction.
	 * Fix it up.
	 */
	regs->ip = landing_pad;

362 363
	enter_from_user_mode();

364
	local_irq_enable();
365 366

	/* Fetch EBP from where the vDSO stashed it. */
367 368 369 370 371 372
	if (
#ifdef CONFIG_X86_64
		/*
		 * Micro-optimization: the pointer we're following is explicitly
		 * 32 bits, so it can't be out of range.
		 */
373
		__get_user(*(u32 *)&regs->bp,
374 375
			    (u32 __user __force *)(unsigned long)(u32)regs->sp)
#else
376
		get_user(*(u32 *)&regs->bp,
377 378 379 380
			 (u32 __user __force *)(unsigned long)(u32)regs->sp)
#endif
		) {

381 382 383 384
		/* User code screwed up. */
		local_irq_disable();
		regs->ax = -EFAULT;
		prepare_exit_to_usermode(regs);
385
		return 0;	/* Keep it simple: use IRET. */
386 387 388
	}

	/* Now this is just like a normal syscall. */
389
	do_syscall_32_irqs_on(regs);
390 391 392 393 394 395 396 397 398 399 400 401 402 403 404

#ifdef CONFIG_X86_64
	/*
	 * Opportunistic SYSRETL: if possible, try to return using SYSRETL.
	 * SYSRETL is available on all 64-bit CPUs, so we don't need to
	 * bother with SYSEXIT.
	 *
	 * Unlike 64-bit opportunistic SYSRET, we can't check that CX == IP,
	 * because the ECX fixup above will ensure that this is essentially
	 * never the case.
	 */
	return regs->cs == __USER32_CS && regs->ss == __USER_DS &&
		regs->ip == landing_pad &&
		(regs->flags & (X86_EFLAGS_RF | X86_EFLAGS_TF)) == 0;
#else
405 406 407 408 409 410 411 412 413 414 415 416 417 418
	/*
	 * Opportunistic SYSEXIT: if possible, try to return using SYSEXIT.
	 *
	 * Unlike 64-bit opportunistic SYSRET, we can't check that CX == IP,
	 * because the ECX fixup above will ensure that this is essentially
	 * never the case.
	 *
	 * We don't allow syscalls at all from VM86 mode, but we still
	 * need to check VM, because we might be returning from sys_vm86.
	 */
	return static_cpu_has(X86_FEATURE_SEP) &&
		regs->cs == __USER_CS && regs->ss == __USER_DS &&
		regs->ip == landing_pad &&
		(regs->flags & (X86_EFLAGS_RF | X86_EFLAGS_TF | X86_EFLAGS_VM)) == 0;
419
#endif
420
}
421
#endif