xref: /openbmc/linux/kernel/entry/common.c (revision 4da46308)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 #include <linux/context_tracking.h>
4 #include <linux/entry-common.h>
5 #include <linux/resume_user_mode.h>
6 #include <linux/highmem.h>
7 #include <linux/jump_label.h>
8 #include <linux/kmsan.h>
9 #include <linux/livepatch.h>
10 #include <linux/audit.h>
11 #include <linux/tick.h>
12 
13 #include "common.h"
14 
15 #define CREATE_TRACE_POINTS
16 #include <trace/events/syscalls.h>
17 
18 /* See comment for enter_from_user_mode() in entry-common.h */
__enter_from_user_mode(struct pt_regs * regs)19 static __always_inline void __enter_from_user_mode(struct pt_regs *regs)
20 {
21 	arch_enter_from_user_mode(regs);
22 	lockdep_hardirqs_off(CALLER_ADDR0);
23 
24 	CT_WARN_ON(__ct_state() != CONTEXT_USER);
25 	user_exit_irqoff();
26 
27 	instrumentation_begin();
28 	kmsan_unpoison_entry_regs(regs);
29 	trace_hardirqs_off_finish();
30 	instrumentation_end();
31 }
32 
enter_from_user_mode(struct pt_regs * regs)33 void noinstr enter_from_user_mode(struct pt_regs *regs)
34 {
35 	__enter_from_user_mode(regs);
36 }
37 
syscall_enter_audit(struct pt_regs * regs,long syscall)38 static inline void syscall_enter_audit(struct pt_regs *regs, long syscall)
39 {
40 	if (unlikely(audit_context())) {
41 		unsigned long args[6];
42 
43 		syscall_get_arguments(current, regs, args);
44 		audit_syscall_entry(syscall, args[0], args[1], args[2], args[3]);
45 	}
46 }
47 
syscall_trace_enter(struct pt_regs * regs,long syscall,unsigned long work)48 static long syscall_trace_enter(struct pt_regs *regs, long syscall,
49 				unsigned long work)
50 {
51 	long ret = 0;
52 
53 	/*
54 	 * Handle Syscall User Dispatch.  This must comes first, since
55 	 * the ABI here can be something that doesn't make sense for
56 	 * other syscall_work features.
57 	 */
58 	if (work & SYSCALL_WORK_SYSCALL_USER_DISPATCH) {
59 		if (syscall_user_dispatch(regs))
60 			return -1L;
61 	}
62 
63 	/* Handle ptrace */
64 	if (work & (SYSCALL_WORK_SYSCALL_TRACE | SYSCALL_WORK_SYSCALL_EMU)) {
65 		ret = ptrace_report_syscall_entry(regs);
66 		if (ret || (work & SYSCALL_WORK_SYSCALL_EMU))
67 			return -1L;
68 	}
69 
70 	/* Do seccomp after ptrace, to catch any tracer changes. */
71 	if (work & SYSCALL_WORK_SECCOMP) {
72 		ret = __secure_computing(NULL);
73 		if (ret == -1L)
74 			return ret;
75 	}
76 
77 	/* Either of the above might have changed the syscall number */
78 	syscall = syscall_get_nr(current, regs);
79 
80 	if (unlikely(work & SYSCALL_WORK_SYSCALL_TRACEPOINT)) {
81 		trace_sys_enter(regs, syscall);
82 		/*
83 		 * Probes or BPF hooks in the tracepoint may have changed the
84 		 * system call number as well.
85 		 */
86 		syscall = syscall_get_nr(current, regs);
87 	}
88 
89 	syscall_enter_audit(regs, syscall);
90 
91 	return ret ? : syscall;
92 }
93 
94 static __always_inline long
__syscall_enter_from_user_work(struct pt_regs * regs,long syscall)95 __syscall_enter_from_user_work(struct pt_regs *regs, long syscall)
96 {
97 	unsigned long work = READ_ONCE(current_thread_info()->syscall_work);
98 
99 	if (work & SYSCALL_WORK_ENTER)
100 		syscall = syscall_trace_enter(regs, syscall, work);
101 
102 	return syscall;
103 }
104 
syscall_enter_from_user_mode_work(struct pt_regs * regs,long syscall)105 long syscall_enter_from_user_mode_work(struct pt_regs *regs, long syscall)
106 {
107 	return __syscall_enter_from_user_work(regs, syscall);
108 }
109 
syscall_enter_from_user_mode(struct pt_regs * regs,long syscall)110 noinstr long syscall_enter_from_user_mode(struct pt_regs *regs, long syscall)
111 {
112 	long ret;
113 
114 	__enter_from_user_mode(regs);
115 
116 	instrumentation_begin();
117 	local_irq_enable();
118 	ret = __syscall_enter_from_user_work(regs, syscall);
119 	instrumentation_end();
120 
121 	return ret;
122 }
123 
syscall_enter_from_user_mode_prepare(struct pt_regs * regs)124 noinstr void syscall_enter_from_user_mode_prepare(struct pt_regs *regs)
125 {
126 	__enter_from_user_mode(regs);
127 	instrumentation_begin();
128 	local_irq_enable();
129 	instrumentation_end();
130 }
131 
132 /* See comment for exit_to_user_mode() in entry-common.h */
__exit_to_user_mode(void)133 static __always_inline void __exit_to_user_mode(void)
134 {
135 	instrumentation_begin();
136 	trace_hardirqs_on_prepare();
137 	lockdep_hardirqs_on_prepare();
138 	instrumentation_end();
139 
140 	user_enter_irqoff();
141 	arch_exit_to_user_mode();
142 	lockdep_hardirqs_on(CALLER_ADDR0);
143 }
144 
exit_to_user_mode(void)145 void noinstr exit_to_user_mode(void)
146 {
147 	__exit_to_user_mode();
148 }
149 
150 /* Workaround to allow gradual conversion of architecture code */
arch_do_signal_or_restart(struct pt_regs * regs)151 void __weak arch_do_signal_or_restart(struct pt_regs *regs) { }
152 
exit_to_user_mode_loop(struct pt_regs * regs,unsigned long ti_work)153 static unsigned long exit_to_user_mode_loop(struct pt_regs *regs,
154 					    unsigned long ti_work)
155 {
156 	/*
157 	 * Before returning to user space ensure that all pending work
158 	 * items have been completed.
159 	 */
160 	while (ti_work & EXIT_TO_USER_MODE_WORK) {
161 
162 		local_irq_enable_exit_to_user(ti_work);
163 
164 		if (ti_work & _TIF_NEED_RESCHED)
165 			schedule();
166 
167 		if (ti_work & _TIF_UPROBE)
168 			uprobe_notify_resume(regs);
169 
170 		if (ti_work & _TIF_PATCH_PENDING)
171 			klp_update_patch_state(current);
172 
173 		if (ti_work & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL))
174 			arch_do_signal_or_restart(regs);
175 
176 		if (ti_work & _TIF_NOTIFY_RESUME)
177 			resume_user_mode_work(regs);
178 
179 		/* Architecture specific TIF work */
180 		arch_exit_to_user_mode_work(regs, ti_work);
181 
182 		/*
183 		 * Disable interrupts and reevaluate the work flags as they
184 		 * might have changed while interrupts and preemption was
185 		 * enabled above.
186 		 */
187 		local_irq_disable_exit_to_user();
188 
189 		/* Check if any of the above work has queued a deferred wakeup */
190 		tick_nohz_user_enter_prepare();
191 
192 		ti_work = read_thread_flags();
193 	}
194 
195 	/* Return the latest work state for arch_exit_to_user_mode() */
196 	return ti_work;
197 }
198 
exit_to_user_mode_prepare(struct pt_regs * regs)199 static void exit_to_user_mode_prepare(struct pt_regs *regs)
200 {
201 	unsigned long ti_work;
202 
203 	lockdep_assert_irqs_disabled();
204 
205 	/* Flush pending rcuog wakeup before the last need_resched() check */
206 	tick_nohz_user_enter_prepare();
207 
208 	ti_work = read_thread_flags();
209 	if (unlikely(ti_work & EXIT_TO_USER_MODE_WORK))
210 		ti_work = exit_to_user_mode_loop(regs, ti_work);
211 
212 	arch_exit_to_user_mode_prepare(regs, ti_work);
213 
214 	/* Ensure that kernel state is sane for a return to userspace */
215 	kmap_assert_nomap();
216 	lockdep_assert_irqs_disabled();
217 	lockdep_sys_exit();
218 }
219 
220 /*
221  * If SYSCALL_EMU is set, then the only reason to report is when
222  * SINGLESTEP is set (i.e. PTRACE_SYSEMU_SINGLESTEP).  This syscall
223  * instruction has been already reported in syscall_enter_from_user_mode().
224  */
report_single_step(unsigned long work)225 static inline bool report_single_step(unsigned long work)
226 {
227 	if (work & SYSCALL_WORK_SYSCALL_EMU)
228 		return false;
229 
230 	return work & SYSCALL_WORK_SYSCALL_EXIT_TRAP;
231 }
232 
syscall_exit_work(struct pt_regs * regs,unsigned long work)233 static void syscall_exit_work(struct pt_regs *regs, unsigned long work)
234 {
235 	bool step;
236 
237 	/*
238 	 * If the syscall was rolled back due to syscall user dispatching,
239 	 * then the tracers below are not invoked for the same reason as
240 	 * the entry side was not invoked in syscall_trace_enter(): The ABI
241 	 * of these syscalls is unknown.
242 	 */
243 	if (work & SYSCALL_WORK_SYSCALL_USER_DISPATCH) {
244 		if (unlikely(current->syscall_dispatch.on_dispatch)) {
245 			current->syscall_dispatch.on_dispatch = false;
246 			return;
247 		}
248 	}
249 
250 	audit_syscall_exit(regs);
251 
252 	if (work & SYSCALL_WORK_SYSCALL_TRACEPOINT)
253 		trace_sys_exit(regs, syscall_get_return_value(current, regs));
254 
255 	step = report_single_step(work);
256 	if (step || work & SYSCALL_WORK_SYSCALL_TRACE)
257 		ptrace_report_syscall_exit(regs, step);
258 }
259 
260 /*
261  * Syscall specific exit to user mode preparation. Runs with interrupts
262  * enabled.
263  */
syscall_exit_to_user_mode_prepare(struct pt_regs * regs)264 static void syscall_exit_to_user_mode_prepare(struct pt_regs *regs)
265 {
266 	unsigned long work = READ_ONCE(current_thread_info()->syscall_work);
267 	unsigned long nr = syscall_get_nr(current, regs);
268 
269 	CT_WARN_ON(ct_state() != CONTEXT_KERNEL);
270 
271 	if (IS_ENABLED(CONFIG_PROVE_LOCKING)) {
272 		if (WARN(irqs_disabled(), "syscall %lu left IRQs disabled", nr))
273 			local_irq_enable();
274 	}
275 
276 	rseq_syscall(regs);
277 
278 	/*
279 	 * Do one-time syscall specific work. If these work items are
280 	 * enabled, we want to run them exactly once per syscall exit with
281 	 * interrupts enabled.
282 	 */
283 	if (unlikely(work & SYSCALL_WORK_EXIT))
284 		syscall_exit_work(regs, work);
285 }
286 
__syscall_exit_to_user_mode_work(struct pt_regs * regs)287 static __always_inline void __syscall_exit_to_user_mode_work(struct pt_regs *regs)
288 {
289 	syscall_exit_to_user_mode_prepare(regs);
290 	local_irq_disable_exit_to_user();
291 	exit_to_user_mode_prepare(regs);
292 }
293 
syscall_exit_to_user_mode_work(struct pt_regs * regs)294 void syscall_exit_to_user_mode_work(struct pt_regs *regs)
295 {
296 	__syscall_exit_to_user_mode_work(regs);
297 }
298 
syscall_exit_to_user_mode(struct pt_regs * regs)299 __visible noinstr void syscall_exit_to_user_mode(struct pt_regs *regs)
300 {
301 	instrumentation_begin();
302 	__syscall_exit_to_user_mode_work(regs);
303 	instrumentation_end();
304 	__exit_to_user_mode();
305 }
306 
irqentry_enter_from_user_mode(struct pt_regs * regs)307 noinstr void irqentry_enter_from_user_mode(struct pt_regs *regs)
308 {
309 	__enter_from_user_mode(regs);
310 }
311 
irqentry_exit_to_user_mode(struct pt_regs * regs)312 noinstr void irqentry_exit_to_user_mode(struct pt_regs *regs)
313 {
314 	instrumentation_begin();
315 	exit_to_user_mode_prepare(regs);
316 	instrumentation_end();
317 	__exit_to_user_mode();
318 }
319 
irqentry_enter(struct pt_regs * regs)320 noinstr irqentry_state_t irqentry_enter(struct pt_regs *regs)
321 {
322 	irqentry_state_t ret = {
323 		.exit_rcu = false,
324 	};
325 
326 	if (user_mode(regs)) {
327 		irqentry_enter_from_user_mode(regs);
328 		return ret;
329 	}
330 
331 	/*
332 	 * If this entry hit the idle task invoke ct_irq_enter() whether
333 	 * RCU is watching or not.
334 	 *
335 	 * Interrupts can nest when the first interrupt invokes softirq
336 	 * processing on return which enables interrupts.
337 	 *
338 	 * Scheduler ticks in the idle task can mark quiescent state and
339 	 * terminate a grace period, if and only if the timer interrupt is
340 	 * not nested into another interrupt.
341 	 *
342 	 * Checking for rcu_is_watching() here would prevent the nesting
343 	 * interrupt to invoke ct_irq_enter(). If that nested interrupt is
344 	 * the tick then rcu_flavor_sched_clock_irq() would wrongfully
345 	 * assume that it is the first interrupt and eventually claim
346 	 * quiescent state and end grace periods prematurely.
347 	 *
348 	 * Unconditionally invoke ct_irq_enter() so RCU state stays
349 	 * consistent.
350 	 *
351 	 * TINY_RCU does not support EQS, so let the compiler eliminate
352 	 * this part when enabled.
353 	 */
354 	if (!IS_ENABLED(CONFIG_TINY_RCU) && is_idle_task(current)) {
355 		/*
356 		 * If RCU is not watching then the same careful
357 		 * sequence vs. lockdep and tracing is required
358 		 * as in irqentry_enter_from_user_mode().
359 		 */
360 		lockdep_hardirqs_off(CALLER_ADDR0);
361 		ct_irq_enter();
362 		instrumentation_begin();
363 		kmsan_unpoison_entry_regs(regs);
364 		trace_hardirqs_off_finish();
365 		instrumentation_end();
366 
367 		ret.exit_rcu = true;
368 		return ret;
369 	}
370 
371 	/*
372 	 * If RCU is watching then RCU only wants to check whether it needs
373 	 * to restart the tick in NOHZ mode. rcu_irq_enter_check_tick()
374 	 * already contains a warning when RCU is not watching, so no point
375 	 * in having another one here.
376 	 */
377 	lockdep_hardirqs_off(CALLER_ADDR0);
378 	instrumentation_begin();
379 	kmsan_unpoison_entry_regs(regs);
380 	rcu_irq_enter_check_tick();
381 	trace_hardirqs_off_finish();
382 	instrumentation_end();
383 
384 	return ret;
385 }
386 
raw_irqentry_exit_cond_resched(void)387 void raw_irqentry_exit_cond_resched(void)
388 {
389 	if (!preempt_count()) {
390 		/* Sanity check RCU and thread stack */
391 		rcu_irq_exit_check_preempt();
392 		if (IS_ENABLED(CONFIG_DEBUG_ENTRY))
393 			WARN_ON_ONCE(!on_thread_stack());
394 		if (need_resched())
395 			preempt_schedule_irq();
396 	}
397 }
398 #ifdef CONFIG_PREEMPT_DYNAMIC
399 #if defined(CONFIG_HAVE_PREEMPT_DYNAMIC_CALL)
400 DEFINE_STATIC_CALL(irqentry_exit_cond_resched, raw_irqentry_exit_cond_resched);
401 #elif defined(CONFIG_HAVE_PREEMPT_DYNAMIC_KEY)
402 DEFINE_STATIC_KEY_TRUE(sk_dynamic_irqentry_exit_cond_resched);
dynamic_irqentry_exit_cond_resched(void)403 void dynamic_irqentry_exit_cond_resched(void)
404 {
405 	if (!static_branch_unlikely(&sk_dynamic_irqentry_exit_cond_resched))
406 		return;
407 	raw_irqentry_exit_cond_resched();
408 }
409 #endif
410 #endif
411 
irqentry_exit(struct pt_regs * regs,irqentry_state_t state)412 noinstr void irqentry_exit(struct pt_regs *regs, irqentry_state_t state)
413 {
414 	lockdep_assert_irqs_disabled();
415 
416 	/* Check whether this returns to user mode */
417 	if (user_mode(regs)) {
418 		irqentry_exit_to_user_mode(regs);
419 	} else if (!regs_irqs_disabled(regs)) {
420 		/*
421 		 * If RCU was not watching on entry this needs to be done
422 		 * carefully and needs the same ordering of lockdep/tracing
423 		 * and RCU as the return to user mode path.
424 		 */
425 		if (state.exit_rcu) {
426 			instrumentation_begin();
427 			/* Tell the tracer that IRET will enable interrupts */
428 			trace_hardirqs_on_prepare();
429 			lockdep_hardirqs_on_prepare();
430 			instrumentation_end();
431 			ct_irq_exit();
432 			lockdep_hardirqs_on(CALLER_ADDR0);
433 			return;
434 		}
435 
436 		instrumentation_begin();
437 		if (IS_ENABLED(CONFIG_PREEMPTION))
438 			irqentry_exit_cond_resched();
439 
440 		/* Covers both tracing and lockdep */
441 		trace_hardirqs_on();
442 		instrumentation_end();
443 	} else {
444 		/*
445 		 * IRQ flags state is correct already. Just tell RCU if it
446 		 * was not watching on entry.
447 		 */
448 		if (state.exit_rcu)
449 			ct_irq_exit();
450 	}
451 }
452 
irqentry_nmi_enter(struct pt_regs * regs)453 irqentry_state_t noinstr irqentry_nmi_enter(struct pt_regs *regs)
454 {
455 	irqentry_state_t irq_state;
456 
457 	irq_state.lockdep = lockdep_hardirqs_enabled();
458 
459 	__nmi_enter();
460 	lockdep_hardirqs_off(CALLER_ADDR0);
461 	lockdep_hardirq_enter();
462 	ct_nmi_enter();
463 
464 	instrumentation_begin();
465 	kmsan_unpoison_entry_regs(regs);
466 	trace_hardirqs_off_finish();
467 	ftrace_nmi_enter();
468 	instrumentation_end();
469 
470 	return irq_state;
471 }
472 
irqentry_nmi_exit(struct pt_regs * regs,irqentry_state_t irq_state)473 void noinstr irqentry_nmi_exit(struct pt_regs *regs, irqentry_state_t irq_state)
474 {
475 	instrumentation_begin();
476 	ftrace_nmi_exit();
477 	if (irq_state.lockdep) {
478 		trace_hardirqs_on_prepare();
479 		lockdep_hardirqs_on_prepare();
480 	}
481 	instrumentation_end();
482 
483 	ct_nmi_exit();
484 	lockdep_hardirq_exit();
485 	if (irq_state.lockdep)
486 		lockdep_hardirqs_on(CALLER_ADDR0);
487 	__nmi_exit();
488 }
489