// SPDX-License-Identifier: GPL-2.0 /* * Copyright (C) 2021 Benjamin Berg * Copyright (C) 2002 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "../internal.h" extern char __syscall_stub_start[]; void syscall_stub_dump_error(struct mm_id *mm_idp) { struct stub_data *proc_data = (void *)mm_idp->stack; struct stub_syscall *sc; if (proc_data->syscall_data_len < 0 || proc_data->syscall_data_len >= ARRAY_SIZE(proc_data->syscall_data)) panic("Syscall data was corrupted by stub (len is: %d, expected maximum: %d)!", proc_data->syscall_data_len, mm_idp->syscall_data_len); sc = &proc_data->syscall_data[proc_data->syscall_data_len]; printk(UM_KERN_ERR "%s : length = %d, last offset = %d", __func__, mm_idp->syscall_data_len, proc_data->syscall_data_len); printk(UM_KERN_ERR "%s : stub syscall type %d failed, return value = 0x%lx\n", __func__, sc->syscall, proc_data->err); print_hex_dump(UM_KERN_ERR, " syscall data: ", 0, 16, 4, sc, sizeof(*sc), 0); } static inline unsigned long *check_init_stack(struct mm_id * mm_idp, unsigned long *stack) { if (stack == NULL) { stack = (unsigned long *) mm_idp->stack + 2; *stack = 0; } return stack; } static unsigned long syscall_regs[MAX_REG_NR]; static int __init init_syscall_regs(void) { get_safe_registers(syscall_regs, NULL); syscall_regs[REGS_IP_INDEX] = STUB_CODE + ((unsigned long) stub_syscall_handler - (unsigned long) __syscall_stub_start); syscall_regs[REGS_SP_INDEX] = STUB_DATA + offsetof(struct stub_data, sigstack) + sizeof(((struct stub_data *) 0)->sigstack) - sizeof(void *); return 0; } __initcall(init_syscall_regs); static inline long do_syscall_stub(struct mm_id *mm_idp) { struct stub_data *proc_data = (void *)mm_idp->stack; int n, i; int err, pid = mm_idp->u.pid; n = ptrace_setregs(pid, syscall_regs); if (n < 0) { printk(UM_KERN_ERR "Registers - \n"); for (i = 0; i < MAX_REG_NR; i++) printk(UM_KERN_ERR "\t%d\t0x%lx\n", i, syscall_regs[i]); panic("%s : PTRACE_SETREGS failed, errno = %d\n", __func__, -n); } /* Inform process how much we have filled in. */ proc_data->syscall_data_len = mm_idp->syscall_data_len; err = ptrace(PTRACE_CONT, pid, 0, 0); if (err) panic("Failed to continue stub, pid = %d, errno = %d\n", pid, errno); wait_stub_done(pid); /* * proc_data->err will be non-zero if there was an (unexpected) error. * In that case, syscall_data_len points to the last executed syscall, * otherwise it will be zero (but we do not need to rely on that). */ if (proc_data->err < 0) { syscall_stub_dump_error(mm_idp); /* Store error code in case someone tries to add more syscalls */ mm_idp->syscall_data_len = proc_data->err; } else { mm_idp->syscall_data_len = 0; } return mm_idp->syscall_data_len; } int syscall_stub_flush(struct mm_id *mm_idp) { int res; if (mm_idp->syscall_data_len == 0) return 0; /* If an error happened already, report it and reset the state. */ if (mm_idp->syscall_data_len < 0) { res = mm_idp->syscall_data_len; mm_idp->syscall_data_len = 0; return res; } res = do_syscall_stub(mm_idp); mm_idp->syscall_data_len = 0; return res; } struct stub_syscall *syscall_stub_alloc(struct mm_id *mm_idp) { struct stub_syscall *sc; struct stub_data *proc_data = (struct stub_data *) mm_idp->stack; if (mm_idp->syscall_data_len > 0 && mm_idp->syscall_data_len == ARRAY_SIZE(proc_data->syscall_data)) do_syscall_stub(mm_idp); if (mm_idp->syscall_data_len < 0) { /* Return dummy to retain error state. */ sc = &proc_data->syscall_data[0]; } else { sc = &proc_data->syscall_data[mm_idp->syscall_data_len]; mm_idp->syscall_data_len += 1; } memset(sc, 0, sizeof(*sc)); return sc; } static struct stub_syscall *syscall_stub_get_previous(struct mm_id *mm_idp, int syscall_type, unsigned long virt) { if (mm_idp->syscall_data_len > 0) { struct stub_data *proc_data = (void *) mm_idp->stack; struct stub_syscall *sc; sc = &proc_data->syscall_data[mm_idp->syscall_data_len - 1]; if (sc->syscall == syscall_type && sc->mem.addr + sc->mem.length == virt) return sc; } return NULL; } int map(struct mm_id *mm_idp, unsigned long virt, unsigned long len, int prot, int phys_fd, unsigned long long offset) { struct stub_syscall *sc; /* Compress with previous syscall if that is possible */ sc = syscall_stub_get_previous(mm_idp, STUB_SYSCALL_MMAP, virt); if (sc && sc->mem.prot == prot && sc->mem.fd == phys_fd && sc->mem.offset == MMAP_OFFSET(offset - sc->mem.length)) { sc->mem.length += len; return 0; } sc = syscall_stub_alloc(mm_idp); sc->syscall = STUB_SYSCALL_MMAP; sc->mem.addr = virt; sc->mem.length = len; sc->mem.prot = prot; sc->mem.fd = phys_fd; sc->mem.offset = MMAP_OFFSET(offset); return 0; } int unmap(struct mm_id *mm_idp, unsigned long addr, unsigned long len) { struct stub_syscall *sc; /* Compress with previous syscall if that is possible */ sc = syscall_stub_get_previous(mm_idp, STUB_SYSCALL_MUNMAP, addr); if (sc) { sc->mem.length += len; return 0; } sc = syscall_stub_alloc(mm_idp); sc->syscall = STUB_SYSCALL_MUNMAP; sc->mem.addr = addr; sc->mem.length = len; return 0; } int protect(struct mm_id *mm_idp, unsigned long addr, unsigned long len, unsigned int prot) { struct stub_syscall *sc; /* Compress with previous syscall if that is possible */ sc = syscall_stub_get_previous(mm_idp, STUB_SYSCALL_MPROTECT, addr); if (sc && sc->mem.prot == prot) { sc->mem.length += len; return 0; } sc = syscall_stub_alloc(mm_idp); sc->syscall = STUB_SYSCALL_MPROTECT; sc->mem.addr = addr; sc->mem.length = len; sc->mem.prot = prot; return 0; }