1 /* 2 * Copyright (C) 2002 Jeff Dike (jdike@karaya.com) 3 * Licensed under the GPL 4 */ 5 6 #include "linux/config.h" 7 #include "linux/sched.h" 8 #include "linux/list.h" 9 #include "linux/spinlock.h" 10 #include "linux/slab.h" 11 #include "linux/errno.h" 12 #include "linux/mm.h" 13 #include "asm/current.h" 14 #include "asm/segment.h" 15 #include "asm/mmu.h" 16 #include "asm/pgalloc.h" 17 #include "asm/pgtable.h" 18 #include "os.h" 19 #include "skas.h" 20 21 extern int __syscall_stub_start; 22 23 static int init_stub_pte(struct mm_struct *mm, unsigned long proc, 24 unsigned long kernel) 25 { 26 pgd_t *pgd; 27 pud_t *pud; 28 pmd_t *pmd; 29 pte_t *pte; 30 31 spin_lock(&mm->page_table_lock); 32 pgd = pgd_offset(mm, proc); 33 pud = pud_alloc(mm, pgd, proc); 34 if (!pud) 35 goto out; 36 37 pmd = pmd_alloc(mm, pud, proc); 38 if (!pmd) 39 goto out_pmd; 40 41 pte = pte_alloc_map(mm, pmd, proc); 42 if (!pte) 43 goto out_pte; 44 45 /* There's an interaction between the skas0 stub pages, stack 46 * randomization, and the BUG at the end of exit_mmap. exit_mmap 47 * checks that the number of page tables freed is the same as had 48 * been allocated. If the stack is on the last page table page, 49 * then the stack pte page will be freed, and if not, it won't. To 50 * avoid having to know where the stack is, or if the process mapped 51 * something at the top of its address space for some other reason, 52 * we set TASK_SIZE to end at the start of the last page table. 53 * This keeps exit_mmap off the last page, but introduces a leak 54 * of that page. So, we hang onto it here and free it in 55 * destroy_context_skas. 56 */ 57 58 mm->context.skas.last_page_table = pmd_page_kernel(*pmd); 59 60 *pte = mk_pte(virt_to_page(kernel), __pgprot(_PAGE_PRESENT)); 61 *pte = pte_mkexec(*pte); 62 *pte = pte_wrprotect(*pte); 63 spin_unlock(&mm->page_table_lock); 64 return(0); 65 66 out_pmd: 67 pud_free(pud); 68 out_pte: 69 pmd_free(pmd); 70 out: 71 spin_unlock(&mm->page_table_lock); 72 return(-ENOMEM); 73 } 74 75 int init_new_context_skas(struct task_struct *task, struct mm_struct *mm) 76 { 77 struct mm_struct *cur_mm = current->mm; 78 struct mm_id *cur_mm_id = &cur_mm->context.skas.id; 79 struct mm_id *mm_id = &mm->context.skas.id; 80 unsigned long stack; 81 int from, ret; 82 83 if(proc_mm){ 84 if((cur_mm != NULL) && (cur_mm != &init_mm)) 85 from = cur_mm->context.skas.id.u.mm_fd; 86 else from = -1; 87 88 ret = new_mm(from); 89 if(ret < 0){ 90 printk("init_new_context_skas - new_mm failed, " 91 "errno = %d\n", ret); 92 return ret; 93 } 94 mm_id->u.mm_fd = ret; 95 } 96 else { 97 /* This zeros the entry that pgd_alloc didn't, needed since 98 * we are about to reinitialize it, and want mm.nr_ptes to 99 * be accurate. 100 */ 101 mm->pgd[USER_PTRS_PER_PGD] = __pgd(0); 102 103 ret = init_stub_pte(mm, CONFIG_STUB_CODE, 104 (unsigned long) &__syscall_stub_start); 105 if(ret) 106 goto out; 107 108 ret = -ENOMEM; 109 stack = get_zeroed_page(GFP_KERNEL); 110 if(stack == 0) 111 goto out; 112 mm_id->stack = stack; 113 114 ret = init_stub_pte(mm, CONFIG_STUB_DATA, stack); 115 if(ret) 116 goto out_free; 117 118 mm->nr_ptes--; 119 120 if((cur_mm != NULL) && (cur_mm != &init_mm)) 121 mm_id->u.pid = copy_context_skas0(stack, 122 cur_mm_id->u.pid); 123 else mm_id->u.pid = start_userspace(stack); 124 } 125 126 return 0; 127 128 out_free: 129 free_page(mm_id->stack); 130 out: 131 return ret; 132 } 133 134 void destroy_context_skas(struct mm_struct *mm) 135 { 136 struct mmu_context_skas *mmu = &mm->context.skas; 137 138 if(proc_mm) 139 os_close_file(mmu->id.u.mm_fd); 140 else { 141 os_kill_ptraced_process(mmu->id.u.pid, 1); 142 free_page(mmu->id.stack); 143 free_page(mmu->last_page_table); 144 } 145 } 146