xref: /linux/arch/um/kernel/skas/mmu.c (revision 20d0021394c1b070bf04b22c5bc8fdb437edd4c5)
1 /*
2  * Copyright (C) 2002 Jeff Dike (jdike@karaya.com)
3  * Licensed under the GPL
4  */
5 
6 #include "linux/config.h"
7 #include "linux/sched.h"
8 #include "linux/list.h"
9 #include "linux/spinlock.h"
10 #include "linux/slab.h"
11 #include "linux/errno.h"
12 #include "linux/mm.h"
13 #include "asm/current.h"
14 #include "asm/segment.h"
15 #include "asm/mmu.h"
16 #include "asm/pgalloc.h"
17 #include "asm/pgtable.h"
18 #include "os.h"
19 #include "skas.h"
20 
21 extern int __syscall_stub_start;
22 
23 static int init_stub_pte(struct mm_struct *mm, unsigned long proc,
24 			 unsigned long kernel)
25 {
26 	pgd_t *pgd;
27 	pud_t *pud;
28 	pmd_t *pmd;
29 	pte_t *pte;
30 
31 	spin_lock(&mm->page_table_lock);
32 	pgd = pgd_offset(mm, proc);
33 	pud = pud_alloc(mm, pgd, proc);
34 	if (!pud)
35 		goto out;
36 
37 	pmd = pmd_alloc(mm, pud, proc);
38 	if (!pmd)
39 		goto out_pmd;
40 
41 	pte = pte_alloc_map(mm, pmd, proc);
42 	if (!pte)
43 		goto out_pte;
44 
45 	/* There's an interaction between the skas0 stub pages, stack
46 	 * randomization, and the BUG at the end of exit_mmap.  exit_mmap
47          * checks that the number of page tables freed is the same as had
48          * been allocated.  If the stack is on the last page table page,
49 	 * then the stack pte page will be freed, and if not, it won't.  To
50 	 * avoid having to know where the stack is, or if the process mapped
51 	 * something at the top of its address space for some other reason,
52 	 * we set TASK_SIZE to end at the start of the last page table.
53 	 * This keeps exit_mmap off the last page, but introduces a leak
54 	 * of that page.  So, we hang onto it here and free it in
55 	 * destroy_context_skas.
56 	 */
57 
58         mm->context.skas.last_page_table = pmd_page_kernel(*pmd);
59 
60 	*pte = mk_pte(virt_to_page(kernel), __pgprot(_PAGE_PRESENT));
61 	*pte = pte_mkexec(*pte);
62 	*pte = pte_wrprotect(*pte);
63 	spin_unlock(&mm->page_table_lock);
64 	return(0);
65 
66  out_pmd:
67 	pud_free(pud);
68  out_pte:
69 	pmd_free(pmd);
70  out:
71 	spin_unlock(&mm->page_table_lock);
72 	return(-ENOMEM);
73 }
74 
75 int init_new_context_skas(struct task_struct *task, struct mm_struct *mm)
76 {
77 	struct mm_struct *cur_mm = current->mm;
78 	struct mm_id *cur_mm_id = &cur_mm->context.skas.id;
79 	struct mm_id *mm_id = &mm->context.skas.id;
80 	unsigned long stack;
81 	int from, ret;
82 
83 	if(proc_mm){
84 		if((cur_mm != NULL) && (cur_mm != &init_mm))
85 			from = cur_mm->context.skas.id.u.mm_fd;
86 		else from = -1;
87 
88 		ret = new_mm(from);
89 		if(ret < 0){
90 			printk("init_new_context_skas - new_mm failed, "
91 			       "errno = %d\n", ret);
92 			return ret;
93 		}
94 		mm_id->u.mm_fd = ret;
95 	}
96 	else {
97 		/* This zeros the entry that pgd_alloc didn't, needed since
98 		 * we are about to reinitialize it, and want mm.nr_ptes to
99 		 * be accurate.
100 		 */
101 		mm->pgd[USER_PTRS_PER_PGD] = __pgd(0);
102 
103 		ret = init_stub_pte(mm, CONFIG_STUB_CODE,
104 				    (unsigned long) &__syscall_stub_start);
105 		if(ret)
106 			goto out;
107 
108 		ret = -ENOMEM;
109 		stack = get_zeroed_page(GFP_KERNEL);
110 		if(stack == 0)
111 			goto out;
112 		mm_id->stack = stack;
113 
114 		ret = init_stub_pte(mm, CONFIG_STUB_DATA, stack);
115 		if(ret)
116 			goto out_free;
117 
118 		mm->nr_ptes--;
119 
120 		if((cur_mm != NULL) && (cur_mm != &init_mm))
121 			mm_id->u.pid = copy_context_skas0(stack,
122 							  cur_mm_id->u.pid);
123 		else mm_id->u.pid = start_userspace(stack);
124 	}
125 
126 	return 0;
127 
128  out_free:
129 	free_page(mm_id->stack);
130  out:
131 	return ret;
132 }
133 
134 void destroy_context_skas(struct mm_struct *mm)
135 {
136 	struct mmu_context_skas *mmu = &mm->context.skas;
137 
138 	if(proc_mm)
139 		os_close_file(mmu->id.u.mm_fd);
140 	else {
141 		os_kill_ptraced_process(mmu->id.u.pid, 1);
142 		free_page(mmu->id.stack);
143 		free_page(mmu->last_page_table);
144 	}
145 }
146