| // SPDX-License-Identifier: GPL-2.0 | 
 | /* | 
 |  * This contains the io-permission bitmap code - written by obz, with changes | 
 |  * by Linus. 32/64 bits code unification by Miguel Botón. | 
 |  */ | 
 | #include <linux/capability.h> | 
 | #include <linux/security.h> | 
 | #include <linux/syscalls.h> | 
 | #include <linux/bitmap.h> | 
 | #include <linux/ioport.h> | 
 | #include <linux/sched.h> | 
 | #include <linux/slab.h> | 
 |  | 
 | #include <asm/io_bitmap.h> | 
 | #include <asm/desc.h> | 
 | #include <asm/syscalls.h> | 
 |  | 
 | #ifdef CONFIG_X86_IOPL_IOPERM | 
 |  | 
 | static atomic64_t io_bitmap_sequence; | 
 |  | 
 | void io_bitmap_share(struct task_struct *tsk) | 
 | { | 
 | 	/* Can be NULL when current->thread.iopl_emul == 3 */ | 
 | 	if (current->thread.io_bitmap) { | 
 | 		/* | 
 | 		 * Take a refcount on current's bitmap. It can be used by | 
 | 		 * both tasks as long as none of them changes the bitmap. | 
 | 		 */ | 
 | 		refcount_inc(¤t->thread.io_bitmap->refcnt); | 
 | 		tsk->thread.io_bitmap = current->thread.io_bitmap; | 
 | 	} | 
 | 	set_tsk_thread_flag(tsk, TIF_IO_BITMAP); | 
 | } | 
 |  | 
 | static void task_update_io_bitmap(struct task_struct *tsk) | 
 | { | 
 | 	struct thread_struct *t = &tsk->thread; | 
 |  | 
 | 	if (t->iopl_emul == 3 || t->io_bitmap) { | 
 | 		/* TSS update is handled on exit to user space */ | 
 | 		set_tsk_thread_flag(tsk, TIF_IO_BITMAP); | 
 | 	} else { | 
 | 		clear_tsk_thread_flag(tsk, TIF_IO_BITMAP); | 
 | 		/* Invalidate TSS */ | 
 | 		preempt_disable(); | 
 | 		tss_update_io_bitmap(); | 
 | 		preempt_enable(); | 
 | 	} | 
 | } | 
 |  | 
 | void io_bitmap_exit(struct task_struct *tsk) | 
 | { | 
 | 	struct io_bitmap *iobm = tsk->thread.io_bitmap; | 
 |  | 
 | 	tsk->thread.io_bitmap = NULL; | 
 | 	task_update_io_bitmap(tsk); | 
 | 	if (iobm && refcount_dec_and_test(&iobm->refcnt)) | 
 | 		kfree(iobm); | 
 | } | 
 |  | 
 | /* | 
 |  * This changes the io permissions bitmap in the current task. | 
 |  */ | 
 | long ksys_ioperm(unsigned long from, unsigned long num, int turn_on) | 
 | { | 
 | 	struct thread_struct *t = ¤t->thread; | 
 | 	unsigned int i, max_long; | 
 | 	struct io_bitmap *iobm; | 
 |  | 
 | 	if ((from + num <= from) || (from + num > IO_BITMAP_BITS)) | 
 | 		return -EINVAL; | 
 | 	if (turn_on && (!capable(CAP_SYS_RAWIO) || | 
 | 			security_locked_down(LOCKDOWN_IOPORT))) | 
 | 		return -EPERM; | 
 |  | 
 | 	/* | 
 | 	 * If it's the first ioperm() call in this thread's lifetime, set the | 
 | 	 * IO bitmap up. ioperm() is much less timing critical than clone(), | 
 | 	 * this is why we delay this operation until now: | 
 | 	 */ | 
 | 	iobm = t->io_bitmap; | 
 | 	if (!iobm) { | 
 | 		/* No point to allocate a bitmap just to clear permissions */ | 
 | 		if (!turn_on) | 
 | 			return 0; | 
 | 		iobm = kmalloc(sizeof(*iobm), GFP_KERNEL); | 
 | 		if (!iobm) | 
 | 			return -ENOMEM; | 
 |  | 
 | 		memset(iobm->bitmap, 0xff, sizeof(iobm->bitmap)); | 
 | 		refcount_set(&iobm->refcnt, 1); | 
 | 	} | 
 |  | 
 | 	/* | 
 | 	 * If the bitmap is not shared, then nothing can take a refcount as | 
 | 	 * current can obviously not fork at the same time. If it's shared | 
 | 	 * duplicate it and drop the refcount on the original one. | 
 | 	 */ | 
 | 	if (refcount_read(&iobm->refcnt) > 1) { | 
 | 		iobm = kmemdup(iobm, sizeof(*iobm), GFP_KERNEL); | 
 | 		if (!iobm) | 
 | 			return -ENOMEM; | 
 | 		refcount_set(&iobm->refcnt, 1); | 
 | 		io_bitmap_exit(current); | 
 | 	} | 
 |  | 
 | 	/* | 
 | 	 * Store the bitmap pointer (might be the same if the task already | 
 | 	 * head one). Must be done here so freeing the bitmap when all | 
 | 	 * permissions are dropped has the pointer set up. | 
 | 	 */ | 
 | 	t->io_bitmap = iobm; | 
 | 	/* Mark it active for context switching and exit to user mode */ | 
 | 	set_thread_flag(TIF_IO_BITMAP); | 
 |  | 
 | 	/* | 
 | 	 * Update the tasks bitmap. The update of the TSS bitmap happens on | 
 | 	 * exit to user mode. So this needs no protection. | 
 | 	 */ | 
 | 	if (turn_on) | 
 | 		bitmap_clear(iobm->bitmap, from, num); | 
 | 	else | 
 | 		bitmap_set(iobm->bitmap, from, num); | 
 |  | 
 | 	/* | 
 | 	 * Search for a (possibly new) maximum. This is simple and stupid, | 
 | 	 * to keep it obviously correct: | 
 | 	 */ | 
 | 	max_long = UINT_MAX; | 
 | 	for (i = 0; i < IO_BITMAP_LONGS; i++) { | 
 | 		if (iobm->bitmap[i] != ~0UL) | 
 | 			max_long = i; | 
 | 	} | 
 | 	/* All permissions dropped? */ | 
 | 	if (max_long == UINT_MAX) { | 
 | 		io_bitmap_exit(current); | 
 | 		return 0; | 
 | 	} | 
 |  | 
 | 	iobm->max = (max_long + 1) * sizeof(unsigned long); | 
 |  | 
 | 	/* | 
 | 	 * Update the sequence number to force a TSS update on return to | 
 | 	 * user mode. | 
 | 	 */ | 
 | 	iobm->sequence = atomic64_add_return(1, &io_bitmap_sequence); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | SYSCALL_DEFINE3(ioperm, unsigned long, from, unsigned long, num, int, turn_on) | 
 | { | 
 | 	return ksys_ioperm(from, num, turn_on); | 
 | } | 
 |  | 
 | /* | 
 |  * The sys_iopl functionality depends on the level argument, which if | 
 |  * granted for the task is used to enable access to all 65536 I/O ports. | 
 |  * | 
 |  * This does not use the IOPL mechanism provided by the CPU as that would | 
 |  * also allow the user space task to use the CLI/STI instructions. | 
 |  * | 
 |  * Disabling interrupts in a user space task is dangerous as it might lock | 
 |  * up the machine and the semantics vs. syscalls and exceptions is | 
 |  * undefined. | 
 |  * | 
 |  * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3 | 
 |  * 3 enables them. | 
 |  * | 
 |  * IOPL is strictly per thread and inherited on fork. | 
 |  */ | 
 | SYSCALL_DEFINE1(iopl, unsigned int, level) | 
 | { | 
 | 	struct thread_struct *t = ¤t->thread; | 
 | 	unsigned int old; | 
 |  | 
 | 	if (level > 3) | 
 | 		return -EINVAL; | 
 |  | 
 | 	old = t->iopl_emul; | 
 |  | 
 | 	/* No point in going further if nothing changes */ | 
 | 	if (level == old) | 
 | 		return 0; | 
 |  | 
 | 	/* Trying to gain more privileges? */ | 
 | 	if (level > old) { | 
 | 		if (!capable(CAP_SYS_RAWIO) || | 
 | 		    security_locked_down(LOCKDOWN_IOPORT)) | 
 | 			return -EPERM; | 
 | 	} | 
 |  | 
 | 	t->iopl_emul = level; | 
 | 	task_update_io_bitmap(current); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | #else /* CONFIG_X86_IOPL_IOPERM */ | 
 |  | 
 | long ksys_ioperm(unsigned long from, unsigned long num, int turn_on) | 
 | { | 
 | 	return -ENOSYS; | 
 | } | 
 | SYSCALL_DEFINE3(ioperm, unsigned long, from, unsigned long, num, int, turn_on) | 
 | { | 
 | 	return -ENOSYS; | 
 | } | 
 |  | 
 | SYSCALL_DEFINE1(iopl, unsigned int, level) | 
 | { | 
 | 	return -ENOSYS; | 
 | } | 
 | #endif |