common.c 11.3 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-only
2 3 4 5 6 7 8 9 10 11
/*
 * common.c - C code for kernel entry and exit
 * Copyright (c) 2015 Andrew Lutomirski
 *
 * Based on asm and ptrace code by many authors.  The code here originated
 * in ptrace.c and signal.c.
 */

#include <linux/kernel.h>
#include <linux/sched.h>
12
#include <linux/sched/task_stack.h>
13 14 15 16 17 18 19 20 21 22 23
#include <linux/mm.h>
#include <linux/smp.h>
#include <linux/errno.h>
#include <linux/ptrace.h>
#include <linux/tracehook.h>
#include <linux/audit.h>
#include <linux/seccomp.h>
#include <linux/signal.h>
#include <linux/export.h>
#include <linux/context_tracking.h>
#include <linux/user-return-notifier.h>
24
#include <linux/nospec.h>
25
#include <linux/uprobes.h>
26
#include <linux/livepatch.h>
27
#include <linux/syscalls.h>
28
#include <linux/uaccess.h>
29 30 31

#include <asm/desc.h>
#include <asm/traps.h>
32
#include <asm/vdso.h>
33
#include <asm/cpufeature.h>
34
#include <asm/fpu/api.h>
35
#include <asm/nospec-branch.h>
36
#include <asm/io_bitmap.h>
37
#include <asm/syscall.h>
38 39 40 41

#define CREATE_TRACE_POINTS
#include <trace/events/syscalls.h>

42 43
#ifdef CONFIG_CONTEXT_TRACKING
/* Called on entry from user mode with IRQs off. */
44
__visible inline noinstr void enter_from_user_mode(void)
45 46
{
	CT_WARN_ON(ct_state() != CONTEXT_USER);
47
	user_exit_irqoff();
48
}
49 50
#else
static inline void enter_from_user_mode(void) {}
51 52
#endif

53 54 55 56 57 58 59 60 61 62 63 64 65 66 67
static void do_audit_syscall_entry(struct pt_regs *regs, u32 arch)
{
#ifdef CONFIG_X86_64
	if (arch == AUDIT_ARCH_X86_64) {
		audit_syscall_entry(regs->orig_ax, regs->di,
				    regs->si, regs->dx, regs->r10);
	} else
#endif
	{
		audit_syscall_entry(regs->orig_ax, regs->bx,
				    regs->cx, regs->dx, regs->si);
	}
}

/*
68 69
 * Returns the syscall nr to run (which should match regs->orig_ax) or -1
 * to skip the syscall.
70
 */
71
static long syscall_trace_enter(struct pt_regs *regs)
72
{
73 74
	u32 arch = in_ia32_syscall() ? AUDIT_ARCH_I386 : AUDIT_ARCH_X86_64;

75
	struct thread_info *ti = current_thread_info();
76 77 78
	unsigned long ret = 0;
	u32 work;

79 80
	if (IS_ENABLED(CONFIG_DEBUG_ENTRY))
		BUG_ON(regs != task_pt_regs(current));
81

82
	work = READ_ONCE(ti->flags);
83

84 85 86 87 88
	if (work & (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU)) {
		ret = tracehook_report_syscall_entry(regs);
		if (ret || (work & _TIF_SYSCALL_EMU))
			return -1L;
	}
K
Kees Cook 已提交
89

90 91
#ifdef CONFIG_SECCOMP
	/*
K
Kees Cook 已提交
92
	 * Do seccomp after ptrace, to catch any tracer changes.
93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118
	 */
	if (work & _TIF_SECCOMP) {
		struct seccomp_data sd;

		sd.arch = arch;
		sd.nr = regs->orig_ax;
		sd.instruction_pointer = regs->ip;
#ifdef CONFIG_X86_64
		if (arch == AUDIT_ARCH_X86_64) {
			sd.args[0] = regs->di;
			sd.args[1] = regs->si;
			sd.args[2] = regs->dx;
			sd.args[3] = regs->r10;
			sd.args[4] = regs->r8;
			sd.args[5] = regs->r9;
		} else
#endif
		{
			sd.args[0] = regs->bx;
			sd.args[1] = regs->cx;
			sd.args[2] = regs->dx;
			sd.args[3] = regs->si;
			sd.args[4] = regs->di;
			sd.args[5] = regs->bp;
		}

119 120 121
		ret = __secure_computing(&sd);
		if (ret == -1)
			return ret;
122 123 124 125 126 127 128 129 130 131 132
	}
#endif

	if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
		trace_sys_enter(regs, regs->orig_ax);

	do_audit_syscall_entry(regs, arch);

	return ret ?: regs->orig_ax;
}

133 134
#define EXIT_TO_USERMODE_LOOP_FLAGS				\
	(_TIF_SIGPENDING | _TIF_NOTIFY_RESUME | _TIF_UPROBE |	\
135
	 _TIF_NEED_RESCHED | _TIF_USER_RETURN_NOTIFY | _TIF_PATCH_PENDING)
136

137 138
static void exit_to_usermode_loop(struct pt_regs *regs, u32 cached_flags)
{
139 140
	/*
	 * In order to return to user mode, we need to have IRQs off with
141
	 * none of EXIT_TO_USERMODE_LOOP_FLAGS set.  Several of these flags
I
Ingo Molnar 已提交
142
	 * can be set at any time on preemptible kernels if we have IRQs on,
143 144 145 146 147 148 149 150 151 152 153 154 155
	 * so we need to loop.  Disabling preemption wouldn't help: doing the
	 * work to clear some of the flags can sleep.
	 */
	while (true) {
		/* We have work to do. */
		local_irq_enable();

		if (cached_flags & _TIF_NEED_RESCHED)
			schedule();

		if (cached_flags & _TIF_UPROBE)
			uprobe_notify_resume(regs);

156 157 158
		if (cached_flags & _TIF_PATCH_PENDING)
			klp_update_patch_state(current);

159 160 161 162 163 164 165
		/* deal with pending signal delivery */
		if (cached_flags & _TIF_SIGPENDING)
			do_signal(regs);

		if (cached_flags & _TIF_NOTIFY_RESUME) {
			clear_thread_flag(TIF_NOTIFY_RESUME);
			tracehook_notify_resume(regs);
166
			rseq_handle_notify_resume(NULL, regs);
167 168 169 170 171 172 173
		}

		if (cached_flags & _TIF_USER_RETURN_NOTIFY)
			fire_user_return_notifiers();

		/* Disable IRQs and retry */
		local_irq_disable();
174

175
		cached_flags = READ_ONCE(current_thread_info()->flags);
176 177 178

		if (!(cached_flags & EXIT_TO_USERMODE_LOOP_FLAGS))
			break;
179
	}
180 181 182 183 184
}

/* Called with IRQs disabled. */
__visible inline void prepare_exit_to_usermode(struct pt_regs *regs)
{
185
	struct thread_info *ti = current_thread_info();
186 187
	u32 cached_flags;

188 189
	addr_limit_user_check();

190
	lockdep_assert_irqs_disabled();
191 192
	lockdep_sys_exit();

193
	cached_flags = READ_ONCE(ti->flags);
194 195 196

	if (unlikely(cached_flags & EXIT_TO_USERMODE_LOOP_FLAGS))
		exit_to_usermode_loop(regs, cached_flags);
197

198 199 200
	/* Reload ti->flags; we may have rescheduled above. */
	cached_flags = READ_ONCE(ti->flags);

201 202 203
	if (unlikely(cached_flags & _TIF_IO_BITMAP))
		tss_update_io_bitmap();

204 205 206 207
	fpregs_assert_state_consistent();
	if (unlikely(cached_flags & _TIF_NEED_FPU_LOAD))
		switch_fpu_return();

208 209 210 211 212 213 214
#ifdef CONFIG_COMPAT
	/*
	 * Compat syscalls set TS_COMPAT.  Make sure we clear it before
	 * returning to user mode.  We need to clear it *after* signal
	 * handling, because syscall restart has a fixup for compat
	 * syscalls.  The fixup is exercised by the ptrace_syscall_32
	 * selftest.
215 216 217 218
	 *
	 * We also need to clear TS_REGS_POKED_I386: the 32-bit tracer
	 * special case only applies after poking regs and before the
	 * very next return to user mode.
219
	 */
220
	ti->status &= ~(TS_COMPAT|TS_I386_REGS_POKED);
221 222
#endif

223
	user_enter_irqoff();
224 225

	mds_user_clear_cpu_buffers();
226 227
}

228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253
#define SYSCALL_EXIT_WORK_FLAGS				\
	(_TIF_SYSCALL_TRACE | _TIF_SYSCALL_AUDIT |	\
	 _TIF_SINGLESTEP | _TIF_SYSCALL_TRACEPOINT)

static void syscall_slow_exit_work(struct pt_regs *regs, u32 cached_flags)
{
	bool step;

	audit_syscall_exit(regs);

	if (cached_flags & _TIF_SYSCALL_TRACEPOINT)
		trace_sys_exit(regs, regs->ax);

	/*
	 * If TIF_SYSCALL_EMU is set, we only get here because of
	 * TIF_SINGLESTEP (i.e. this is PTRACE_SYSEMU_SINGLESTEP).
	 * We already reported this syscall instruction in
	 * syscall_trace_enter().
	 */
	step = unlikely(
		(cached_flags & (_TIF_SINGLESTEP | _TIF_SYSCALL_EMU))
		== _TIF_SINGLESTEP);
	if (step || cached_flags & _TIF_SYSCALL_TRACE)
		tracehook_report_syscall_exit(regs, step);
}

254 255 256 257
/*
 * Called with IRQs on and fully valid regs.  Returns with IRQs off in a
 * state such that we can immediately switch to user mode.
 */
258
__visible inline void syscall_return_slowpath(struct pt_regs *regs)
259
{
260
	struct thread_info *ti = current_thread_info();
261 262 263 264
	u32 cached_flags = READ_ONCE(ti->flags);

	CT_WARN_ON(ct_state() != CONTEXT_KERNEL);

265 266
	if (IS_ENABLED(CONFIG_PROVE_LOCKING) &&
	    WARN(irqs_disabled(), "syscall %ld left IRQs disabled", regs->orig_ax))
267 268
		local_irq_enable();

269 270
	rseq_syscall(regs);

271 272 273 274
	/*
	 * First do one-time work.  If these work items are enabled, we
	 * want to run them exactly once per syscall exit with IRQs on.
	 */
275 276
	if (unlikely(cached_flags & SYSCALL_EXIT_WORK_FLAGS))
		syscall_slow_exit_work(regs, cached_flags);
277 278 279 280

	local_irq_disable();
	prepare_exit_to_usermode(regs);
}
281

282
#ifdef CONFIG_X86_64
283
__visible void do_syscall_64(unsigned long nr, struct pt_regs *regs)
284
{
285
	struct thread_info *ti;
286

287
	enter_from_user_mode();
288
	local_irq_enable();
289
	ti = current_thread_info();
290 291 292
	if (READ_ONCE(ti->flags) & _TIF_WORK_SYSCALL_ENTRY)
		nr = syscall_trace_enter(regs);

293 294
	if (likely(nr < NR_syscalls)) {
		nr = array_index_nospec(nr, NR_syscalls);
295
		regs->ax = sys_call_table[nr](regs);
296 297 298 299 300 301 302
#ifdef CONFIG_X86_X32_ABI
	} else if (likely((nr & __X32_SYSCALL_BIT) &&
			  (nr & ~__X32_SYSCALL_BIT) < X32_NR_syscalls)) {
		nr = array_index_nospec(nr & ~__X32_SYSCALL_BIT,
					X32_NR_syscalls);
		regs->ax = x32_sys_call_table[nr](regs);
#endif
303 304 305 306 307 308
	}

	syscall_return_slowpath(regs);
}
#endif

309 310
#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
/*
311 312 313
 * Does a 32-bit syscall.  Called with IRQs on in CONTEXT_KERNEL.  Does
 * all entry and exit work and returns with IRQs off.  This function is
 * extremely hot in workloads that use it, and it's usually called from
314
 * do_fast_syscall_32, so forcibly inline it to improve performance.
315
 */
316
static __always_inline void do_syscall_32_irqs_on(struct pt_regs *regs)
317
{
318
	struct thread_info *ti = current_thread_info();
319 320 321
	unsigned int nr = (unsigned int)regs->orig_ax;

#ifdef CONFIG_IA32_EMULATION
322
	ti->status |= TS_COMPAT;
323 324 325 326 327 328 329 330 331 332 333 334
#endif

	if (READ_ONCE(ti->flags) & _TIF_WORK_SYSCALL_ENTRY) {
		/*
		 * Subtlety here: if ptrace pokes something larger than
		 * 2^32-1 into orig_ax, this truncates it.  This may or
		 * may not be necessary, but it matches the old asm
		 * behavior.
		 */
		nr = syscall_trace_enter(regs);
	}

335
	if (likely(nr < IA32_NR_syscalls)) {
336
		nr = array_index_nospec(nr, IA32_NR_syscalls);
337
		regs->ax = ia32_sys_call_table[nr](regs);
338 339 340 341
	}

	syscall_return_slowpath(regs);
}
342

343 344
/* Handles int $0x80 */
__visible void do_int80_syscall_32(struct pt_regs *regs)
345
{
346
	enter_from_user_mode();
347 348 349 350
	local_irq_enable();
	do_syscall_32_irqs_on(regs);
}

351
/* Returns 0 to return using IRET or 1 to return using SYSEXIT/SYSRETL. */
352
__visible long do_fast_syscall_32(struct pt_regs *regs)
353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368
{
	/*
	 * Called using the internal vDSO SYSENTER/SYSCALL32 calling
	 * convention.  Adjust regs so it looks like we entered using int80.
	 */

	unsigned long landing_pad = (unsigned long)current->mm->context.vdso +
		vdso_image_32.sym_int80_landing_pad;

	/*
	 * SYSENTER loses EIP, and even SYSCALL32 needs us to skip forward
	 * so that 'regs->ip -= 2' lands back on an int $0x80 instruction.
	 * Fix it up.
	 */
	regs->ip = landing_pad;

369 370
	enter_from_user_mode();

371
	local_irq_enable();
372 373

	/* Fetch EBP from where the vDSO stashed it. */
374 375 376 377 378 379
	if (
#ifdef CONFIG_X86_64
		/*
		 * Micro-optimization: the pointer we're following is explicitly
		 * 32 bits, so it can't be out of range.
		 */
380
		__get_user(*(u32 *)&regs->bp,
381 382
			    (u32 __user __force *)(unsigned long)(u32)regs->sp)
#else
383
		get_user(*(u32 *)&regs->bp,
384 385 386 387
			 (u32 __user __force *)(unsigned long)(u32)regs->sp)
#endif
		) {

388 389 390 391
		/* User code screwed up. */
		local_irq_disable();
		regs->ax = -EFAULT;
		prepare_exit_to_usermode(regs);
392
		return 0;	/* Keep it simple: use IRET. */
393 394 395
	}

	/* Now this is just like a normal syscall. */
396
	do_syscall_32_irqs_on(regs);
397 398 399 400 401 402 403 404 405 406 407 408 409 410 411

#ifdef CONFIG_X86_64
	/*
	 * Opportunistic SYSRETL: if possible, try to return using SYSRETL.
	 * SYSRETL is available on all 64-bit CPUs, so we don't need to
	 * bother with SYSEXIT.
	 *
	 * Unlike 64-bit opportunistic SYSRET, we can't check that CX == IP,
	 * because the ECX fixup above will ensure that this is essentially
	 * never the case.
	 */
	return regs->cs == __USER32_CS && regs->ss == __USER_DS &&
		regs->ip == landing_pad &&
		(regs->flags & (X86_EFLAGS_RF | X86_EFLAGS_TF)) == 0;
#else
412 413 414 415 416 417 418 419 420 421 422 423 424 425
	/*
	 * Opportunistic SYSEXIT: if possible, try to return using SYSEXIT.
	 *
	 * Unlike 64-bit opportunistic SYSRET, we can't check that CX == IP,
	 * because the ECX fixup above will ensure that this is essentially
	 * never the case.
	 *
	 * We don't allow syscalls at all from VM86 mode, but we still
	 * need to check VM, because we might be returning from sys_vm86.
	 */
	return static_cpu_has(X86_FEATURE_SEP) &&
		regs->cs == __USER_CS && regs->ss == __USER_DS &&
		regs->ip == landing_pad &&
		(regs->flags & (X86_EFLAGS_RF | X86_EFLAGS_TF | X86_EFLAGS_VM)) == 0;
426
#endif
427
}
428
#endif
429 430 431 432 433

SYSCALL_DEFINE0(ni_syscall)
{
	return -ENOSYS;
}