Linux Audio

Check our new training course

Loading...
v6.2
  1// SPDX-License-Identifier: GPL-2.0
  2
  3#include <linux/context_tracking.h>
  4#include <linux/entry-common.h>
  5#include <linux/resume_user_mode.h>
  6#include <linux/highmem.h>
  7#include <linux/jump_label.h>
  8#include <linux/kmsan.h>
  9#include <linux/livepatch.h>
 10#include <linux/audit.h>
 11#include <linux/tick.h>
 12
 13#include "common.h"
 14
 15#define CREATE_TRACE_POINTS
 16#include <trace/events/syscalls.h>
 17
 18/* See comment for enter_from_user_mode() in entry-common.h */
 19static __always_inline void __enter_from_user_mode(struct pt_regs *regs)
 20{
 21	arch_enter_from_user_mode(regs);
 22	lockdep_hardirqs_off(CALLER_ADDR0);
 23
 24	CT_WARN_ON(ct_state() != CONTEXT_USER);
 25	user_exit_irqoff();
 26
 27	instrumentation_begin();
 28	kmsan_unpoison_entry_regs(regs);
 29	trace_hardirqs_off_finish();
 30	instrumentation_end();
 31}
 32
 33void noinstr enter_from_user_mode(struct pt_regs *regs)
 34{
 35	__enter_from_user_mode(regs);
 36}
 37
 38static inline void syscall_enter_audit(struct pt_regs *regs, long syscall)
 39{
 40	if (unlikely(audit_context())) {
 41		unsigned long args[6];
 42
 43		syscall_get_arguments(current, regs, args);
 44		audit_syscall_entry(syscall, args[0], args[1], args[2], args[3]);
 45	}
 46}
 47
 48static long syscall_trace_enter(struct pt_regs *regs, long syscall,
 49				unsigned long work)
 50{
 51	long ret = 0;
 52
 53	/*
 54	 * Handle Syscall User Dispatch.  This must comes first, since
 55	 * the ABI here can be something that doesn't make sense for
 56	 * other syscall_work features.
 57	 */
 58	if (work & SYSCALL_WORK_SYSCALL_USER_DISPATCH) {
 59		if (syscall_user_dispatch(regs))
 60			return -1L;
 61	}
 62
 63	/* Handle ptrace */
 64	if (work & (SYSCALL_WORK_SYSCALL_TRACE | SYSCALL_WORK_SYSCALL_EMU)) {
 65		ret = ptrace_report_syscall_entry(regs);
 66		if (ret || (work & SYSCALL_WORK_SYSCALL_EMU))
 67			return -1L;
 68	}
 69
 70	/* Do seccomp after ptrace, to catch any tracer changes. */
 71	if (work & SYSCALL_WORK_SECCOMP) {
 72		ret = __secure_computing(NULL);
 73		if (ret == -1L)
 74			return ret;
 75	}
 76
 77	/* Either of the above might have changed the syscall number */
 78	syscall = syscall_get_nr(current, regs);
 79
 80	if (unlikely(work & SYSCALL_WORK_SYSCALL_TRACEPOINT))
 81		trace_sys_enter(regs, syscall);
 
 
 
 
 
 
 82
 83	syscall_enter_audit(regs, syscall);
 84
 85	return ret ? : syscall;
 86}
 87
 88static __always_inline long
 89__syscall_enter_from_user_work(struct pt_regs *regs, long syscall)
 90{
 91	unsigned long work = READ_ONCE(current_thread_info()->syscall_work);
 92
 93	if (work & SYSCALL_WORK_ENTER)
 94		syscall = syscall_trace_enter(regs, syscall, work);
 95
 96	return syscall;
 97}
 98
 99long syscall_enter_from_user_mode_work(struct pt_regs *regs, long syscall)
100{
101	return __syscall_enter_from_user_work(regs, syscall);
102}
103
104noinstr long syscall_enter_from_user_mode(struct pt_regs *regs, long syscall)
105{
106	long ret;
107
108	__enter_from_user_mode(regs);
109
110	instrumentation_begin();
111	local_irq_enable();
112	ret = __syscall_enter_from_user_work(regs, syscall);
113	instrumentation_end();
114
115	return ret;
116}
117
118noinstr void syscall_enter_from_user_mode_prepare(struct pt_regs *regs)
119{
120	__enter_from_user_mode(regs);
121	instrumentation_begin();
122	local_irq_enable();
123	instrumentation_end();
124}
125
126/* See comment for exit_to_user_mode() in entry-common.h */
127static __always_inline void __exit_to_user_mode(void)
128{
129	instrumentation_begin();
130	trace_hardirqs_on_prepare();
131	lockdep_hardirqs_on_prepare();
132	instrumentation_end();
133
134	user_enter_irqoff();
135	arch_exit_to_user_mode();
136	lockdep_hardirqs_on(CALLER_ADDR0);
137}
138
139void noinstr exit_to_user_mode(void)
140{
141	__exit_to_user_mode();
142}
143
144/* Workaround to allow gradual conversion of architecture code */
145void __weak arch_do_signal_or_restart(struct pt_regs *regs) { }
146
147static unsigned long exit_to_user_mode_loop(struct pt_regs *regs,
148					    unsigned long ti_work)
 
 
 
 
 
149{
150	/*
151	 * Before returning to user space ensure that all pending work
152	 * items have been completed.
153	 */
154	while (ti_work & EXIT_TO_USER_MODE_WORK) {
155
156		local_irq_enable_exit_to_user(ti_work);
157
158		if (ti_work & _TIF_NEED_RESCHED)
159			schedule();
160
161		if (ti_work & _TIF_UPROBE)
162			uprobe_notify_resume(regs);
163
164		if (ti_work & _TIF_PATCH_PENDING)
165			klp_update_patch_state(current);
166
167		if (ti_work & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL))
168			arch_do_signal_or_restart(regs);
169
170		if (ti_work & _TIF_NOTIFY_RESUME)
171			resume_user_mode_work(regs);
172
173		/* Architecture specific TIF work */
174		arch_exit_to_user_mode_work(regs, ti_work);
175
176		/*
177		 * Disable interrupts and reevaluate the work flags as they
178		 * might have changed while interrupts and preemption was
179		 * enabled above.
180		 */
181		local_irq_disable_exit_to_user();
182
183		/* Check if any of the above work has queued a deferred wakeup */
184		tick_nohz_user_enter_prepare();
185
186		ti_work = read_thread_flags();
187	}
188
189	/* Return the latest work state for arch_exit_to_user_mode() */
190	return ti_work;
191}
192
193static void exit_to_user_mode_prepare(struct pt_regs *regs)
194{
195	unsigned long ti_work = read_thread_flags();
196
197	lockdep_assert_irqs_disabled();
198
199	/* Flush pending rcuog wakeup before the last need_resched() check */
200	tick_nohz_user_enter_prepare();
201
202	if (unlikely(ti_work & EXIT_TO_USER_MODE_WORK))
203		ti_work = exit_to_user_mode_loop(regs, ti_work);
204
205	arch_exit_to_user_mode_prepare(regs, ti_work);
206
207	/* Ensure that the address limit is intact and no locks are held */
208	addr_limit_user_check();
209	kmap_assert_nomap();
210	lockdep_assert_irqs_disabled();
211	lockdep_sys_exit();
212}
213
214/*
215 * If SYSCALL_EMU is set, then the only reason to report is when
216 * SINGLESTEP is set (i.e. PTRACE_SYSEMU_SINGLESTEP).  This syscall
217 * instruction has been already reported in syscall_enter_from_user_mode().
218 */
219static inline bool report_single_step(unsigned long work)
220{
221	if (work & SYSCALL_WORK_SYSCALL_EMU)
222		return false;
223
224	return work & SYSCALL_WORK_SYSCALL_EXIT_TRAP;
225}
226
227static void syscall_exit_work(struct pt_regs *regs, unsigned long work)
228{
229	bool step;
230
231	/*
232	 * If the syscall was rolled back due to syscall user dispatching,
233	 * then the tracers below are not invoked for the same reason as
234	 * the entry side was not invoked in syscall_trace_enter(): The ABI
235	 * of these syscalls is unknown.
236	 */
237	if (work & SYSCALL_WORK_SYSCALL_USER_DISPATCH) {
238		if (unlikely(current->syscall_dispatch.on_dispatch)) {
239			current->syscall_dispatch.on_dispatch = false;
240			return;
241		}
242	}
243
244	audit_syscall_exit(regs);
245
246	if (work & SYSCALL_WORK_SYSCALL_TRACEPOINT)
247		trace_sys_exit(regs, syscall_get_return_value(current, regs));
248
249	step = report_single_step(work);
250	if (step || work & SYSCALL_WORK_SYSCALL_TRACE)
251		ptrace_report_syscall_exit(regs, step);
252}
253
254/*
255 * Syscall specific exit to user mode preparation. Runs with interrupts
256 * enabled.
257 */
258static void syscall_exit_to_user_mode_prepare(struct pt_regs *regs)
259{
260	unsigned long work = READ_ONCE(current_thread_info()->syscall_work);
261	unsigned long nr = syscall_get_nr(current, regs);
262
263	CT_WARN_ON(ct_state() != CONTEXT_KERNEL);
264
265	if (IS_ENABLED(CONFIG_PROVE_LOCKING)) {
266		if (WARN(irqs_disabled(), "syscall %lu left IRQs disabled", nr))
267			local_irq_enable();
268	}
269
270	rseq_syscall(regs);
271
272	/*
273	 * Do one-time syscall specific work. If these work items are
274	 * enabled, we want to run them exactly once per syscall exit with
275	 * interrupts enabled.
276	 */
277	if (unlikely(work & SYSCALL_WORK_EXIT))
278		syscall_exit_work(regs, work);
279}
280
281static __always_inline void __syscall_exit_to_user_mode_work(struct pt_regs *regs)
282{
283	syscall_exit_to_user_mode_prepare(regs);
284	local_irq_disable_exit_to_user();
285	exit_to_user_mode_prepare(regs);
286}
287
288void syscall_exit_to_user_mode_work(struct pt_regs *regs)
289{
290	__syscall_exit_to_user_mode_work(regs);
291}
292
293__visible noinstr void syscall_exit_to_user_mode(struct pt_regs *regs)
294{
295	instrumentation_begin();
296	__syscall_exit_to_user_mode_work(regs);
297	instrumentation_end();
298	__exit_to_user_mode();
299}
300
301noinstr void irqentry_enter_from_user_mode(struct pt_regs *regs)
302{
303	__enter_from_user_mode(regs);
304}
305
306noinstr void irqentry_exit_to_user_mode(struct pt_regs *regs)
307{
308	instrumentation_begin();
309	exit_to_user_mode_prepare(regs);
310	instrumentation_end();
311	__exit_to_user_mode();
312}
313
314noinstr irqentry_state_t irqentry_enter(struct pt_regs *regs)
315{
316	irqentry_state_t ret = {
317		.exit_rcu = false,
318	};
319
320	if (user_mode(regs)) {
321		irqentry_enter_from_user_mode(regs);
322		return ret;
323	}
324
325	/*
326	 * If this entry hit the idle task invoke ct_irq_enter() whether
327	 * RCU is watching or not.
328	 *
329	 * Interrupts can nest when the first interrupt invokes softirq
330	 * processing on return which enables interrupts.
331	 *
332	 * Scheduler ticks in the idle task can mark quiescent state and
333	 * terminate a grace period, if and only if the timer interrupt is
334	 * not nested into another interrupt.
335	 *
336	 * Checking for rcu_is_watching() here would prevent the nesting
337	 * interrupt to invoke ct_irq_enter(). If that nested interrupt is
338	 * the tick then rcu_flavor_sched_clock_irq() would wrongfully
339	 * assume that it is the first interrupt and eventually claim
340	 * quiescent state and end grace periods prematurely.
341	 *
342	 * Unconditionally invoke ct_irq_enter() so RCU state stays
343	 * consistent.
344	 *
345	 * TINY_RCU does not support EQS, so let the compiler eliminate
346	 * this part when enabled.
347	 */
348	if (!IS_ENABLED(CONFIG_TINY_RCU) && is_idle_task(current)) {
349		/*
350		 * If RCU is not watching then the same careful
351		 * sequence vs. lockdep and tracing is required
352		 * as in irqentry_enter_from_user_mode().
353		 */
354		lockdep_hardirqs_off(CALLER_ADDR0);
355		ct_irq_enter();
356		instrumentation_begin();
357		kmsan_unpoison_entry_regs(regs);
358		trace_hardirqs_off_finish();
359		instrumentation_end();
360
361		ret.exit_rcu = true;
362		return ret;
363	}
364
365	/*
366	 * If RCU is watching then RCU only wants to check whether it needs
367	 * to restart the tick in NOHZ mode. rcu_irq_enter_check_tick()
368	 * already contains a warning when RCU is not watching, so no point
369	 * in having another one here.
370	 */
371	lockdep_hardirqs_off(CALLER_ADDR0);
372	instrumentation_begin();
373	kmsan_unpoison_entry_regs(regs);
374	rcu_irq_enter_check_tick();
375	trace_hardirqs_off_finish();
376	instrumentation_end();
377
378	return ret;
379}
380
381void raw_irqentry_exit_cond_resched(void)
382{
383	if (!preempt_count()) {
384		/* Sanity check RCU and thread stack */
385		rcu_irq_exit_check_preempt();
386		if (IS_ENABLED(CONFIG_DEBUG_ENTRY))
387			WARN_ON_ONCE(!on_thread_stack());
388		if (need_resched())
389			preempt_schedule_irq();
390	}
391}
392#ifdef CONFIG_PREEMPT_DYNAMIC
393#if defined(CONFIG_HAVE_PREEMPT_DYNAMIC_CALL)
394DEFINE_STATIC_CALL(irqentry_exit_cond_resched, raw_irqentry_exit_cond_resched);
395#elif defined(CONFIG_HAVE_PREEMPT_DYNAMIC_KEY)
396DEFINE_STATIC_KEY_TRUE(sk_dynamic_irqentry_exit_cond_resched);
397void dynamic_irqentry_exit_cond_resched(void)
398{
399	if (!static_branch_unlikely(&sk_dynamic_irqentry_exit_cond_resched))
400		return;
401	raw_irqentry_exit_cond_resched();
402}
403#endif
404#endif
405
406noinstr void irqentry_exit(struct pt_regs *regs, irqentry_state_t state)
407{
408	lockdep_assert_irqs_disabled();
409
410	/* Check whether this returns to user mode */
411	if (user_mode(regs)) {
412		irqentry_exit_to_user_mode(regs);
413	} else if (!regs_irqs_disabled(regs)) {
414		/*
415		 * If RCU was not watching on entry this needs to be done
416		 * carefully and needs the same ordering of lockdep/tracing
417		 * and RCU as the return to user mode path.
418		 */
419		if (state.exit_rcu) {
420			instrumentation_begin();
421			/* Tell the tracer that IRET will enable interrupts */
422			trace_hardirqs_on_prepare();
423			lockdep_hardirqs_on_prepare();
424			instrumentation_end();
425			ct_irq_exit();
426			lockdep_hardirqs_on(CALLER_ADDR0);
427			return;
428		}
429
430		instrumentation_begin();
431		if (IS_ENABLED(CONFIG_PREEMPTION))
432			irqentry_exit_cond_resched();
433
434		/* Covers both tracing and lockdep */
435		trace_hardirqs_on();
436		instrumentation_end();
437	} else {
438		/*
439		 * IRQ flags state is correct already. Just tell RCU if it
440		 * was not watching on entry.
441		 */
442		if (state.exit_rcu)
443			ct_irq_exit();
444	}
445}
446
447irqentry_state_t noinstr irqentry_nmi_enter(struct pt_regs *regs)
448{
449	irqentry_state_t irq_state;
450
451	irq_state.lockdep = lockdep_hardirqs_enabled();
452
453	__nmi_enter();
454	lockdep_hardirqs_off(CALLER_ADDR0);
455	lockdep_hardirq_enter();
456	ct_nmi_enter();
457
458	instrumentation_begin();
459	kmsan_unpoison_entry_regs(regs);
460	trace_hardirqs_off_finish();
461	ftrace_nmi_enter();
462	instrumentation_end();
463
464	return irq_state;
465}
466
467void noinstr irqentry_nmi_exit(struct pt_regs *regs, irqentry_state_t irq_state)
468{
469	instrumentation_begin();
470	ftrace_nmi_exit();
471	if (irq_state.lockdep) {
472		trace_hardirqs_on_prepare();
473		lockdep_hardirqs_on_prepare();
474	}
475	instrumentation_end();
476
477	ct_nmi_exit();
478	lockdep_hardirq_exit();
479	if (irq_state.lockdep)
480		lockdep_hardirqs_on(CALLER_ADDR0);
481	__nmi_exit();
482}
v6.9.4
  1// SPDX-License-Identifier: GPL-2.0
  2
  3#include <linux/context_tracking.h>
  4#include <linux/entry-common.h>
  5#include <linux/resume_user_mode.h>
  6#include <linux/highmem.h>
  7#include <linux/jump_label.h>
  8#include <linux/kmsan.h>
  9#include <linux/livepatch.h>
 10#include <linux/audit.h>
 11#include <linux/tick.h>
 12
 13#include "common.h"
 14
 15#define CREATE_TRACE_POINTS
 16#include <trace/events/syscalls.h>
 17
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 18static inline void syscall_enter_audit(struct pt_regs *regs, long syscall)
 19{
 20	if (unlikely(audit_context())) {
 21		unsigned long args[6];
 22
 23		syscall_get_arguments(current, regs, args);
 24		audit_syscall_entry(syscall, args[0], args[1], args[2], args[3]);
 25	}
 26}
 27
 28long syscall_trace_enter(struct pt_regs *regs, long syscall,
 29				unsigned long work)
 30{
 31	long ret = 0;
 32
 33	/*
 34	 * Handle Syscall User Dispatch.  This must comes first, since
 35	 * the ABI here can be something that doesn't make sense for
 36	 * other syscall_work features.
 37	 */
 38	if (work & SYSCALL_WORK_SYSCALL_USER_DISPATCH) {
 39		if (syscall_user_dispatch(regs))
 40			return -1L;
 41	}
 42
 43	/* Handle ptrace */
 44	if (work & (SYSCALL_WORK_SYSCALL_TRACE | SYSCALL_WORK_SYSCALL_EMU)) {
 45		ret = ptrace_report_syscall_entry(regs);
 46		if (ret || (work & SYSCALL_WORK_SYSCALL_EMU))
 47			return -1L;
 48	}
 49
 50	/* Do seccomp after ptrace, to catch any tracer changes. */
 51	if (work & SYSCALL_WORK_SECCOMP) {
 52		ret = __secure_computing(NULL);
 53		if (ret == -1L)
 54			return ret;
 55	}
 56
 57	/* Either of the above might have changed the syscall number */
 58	syscall = syscall_get_nr(current, regs);
 59
 60	if (unlikely(work & SYSCALL_WORK_SYSCALL_TRACEPOINT)) {
 61		trace_sys_enter(regs, syscall);
 62		/*
 63		 * Probes or BPF hooks in the tracepoint may have changed the
 64		 * system call number as well.
 65		 */
 66		syscall = syscall_get_nr(current, regs);
 67	}
 68
 69	syscall_enter_audit(regs, syscall);
 70
 71	return ret ? : syscall;
 72}
 73
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 74noinstr void syscall_enter_from_user_mode_prepare(struct pt_regs *regs)
 75{
 76	enter_from_user_mode(regs);
 77	instrumentation_begin();
 78	local_irq_enable();
 79	instrumentation_end();
 80}
 81
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 82/* Workaround to allow gradual conversion of architecture code */
 83void __weak arch_do_signal_or_restart(struct pt_regs *regs) { }
 84
 85/**
 86 * exit_to_user_mode_loop - do any pending work before leaving to user space
 87 * @regs:	Pointer to pt_regs on entry stack
 88 * @ti_work:	TIF work flags as read by the caller
 89 */
 90__always_inline unsigned long exit_to_user_mode_loop(struct pt_regs *regs,
 91						     unsigned long ti_work)
 92{
 93	/*
 94	 * Before returning to user space ensure that all pending work
 95	 * items have been completed.
 96	 */
 97	while (ti_work & EXIT_TO_USER_MODE_WORK) {
 98
 99		local_irq_enable_exit_to_user(ti_work);
100
101		if (ti_work & _TIF_NEED_RESCHED)
102			schedule();
103
104		if (ti_work & _TIF_UPROBE)
105			uprobe_notify_resume(regs);
106
107		if (ti_work & _TIF_PATCH_PENDING)
108			klp_update_patch_state(current);
109
110		if (ti_work & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL))
111			arch_do_signal_or_restart(regs);
112
113		if (ti_work & _TIF_NOTIFY_RESUME)
114			resume_user_mode_work(regs);
115
116		/* Architecture specific TIF work */
117		arch_exit_to_user_mode_work(regs, ti_work);
118
119		/*
120		 * Disable interrupts and reevaluate the work flags as they
121		 * might have changed while interrupts and preemption was
122		 * enabled above.
123		 */
124		local_irq_disable_exit_to_user();
125
126		/* Check if any of the above work has queued a deferred wakeup */
127		tick_nohz_user_enter_prepare();
128
129		ti_work = read_thread_flags();
130	}
131
132	/* Return the latest work state for arch_exit_to_user_mode() */
133	return ti_work;
134}
135
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
136/*
137 * If SYSCALL_EMU is set, then the only reason to report is when
138 * SINGLESTEP is set (i.e. PTRACE_SYSEMU_SINGLESTEP).  This syscall
139 * instruction has been already reported in syscall_enter_from_user_mode().
140 */
141static inline bool report_single_step(unsigned long work)
142{
143	if (work & SYSCALL_WORK_SYSCALL_EMU)
144		return false;
145
146	return work & SYSCALL_WORK_SYSCALL_EXIT_TRAP;
147}
148
149static void syscall_exit_work(struct pt_regs *regs, unsigned long work)
150{
151	bool step;
152
153	/*
154	 * If the syscall was rolled back due to syscall user dispatching,
155	 * then the tracers below are not invoked for the same reason as
156	 * the entry side was not invoked in syscall_trace_enter(): The ABI
157	 * of these syscalls is unknown.
158	 */
159	if (work & SYSCALL_WORK_SYSCALL_USER_DISPATCH) {
160		if (unlikely(current->syscall_dispatch.on_dispatch)) {
161			current->syscall_dispatch.on_dispatch = false;
162			return;
163		}
164	}
165
166	audit_syscall_exit(regs);
167
168	if (work & SYSCALL_WORK_SYSCALL_TRACEPOINT)
169		trace_sys_exit(regs, syscall_get_return_value(current, regs));
170
171	step = report_single_step(work);
172	if (step || work & SYSCALL_WORK_SYSCALL_TRACE)
173		ptrace_report_syscall_exit(regs, step);
174}
175
176/*
177 * Syscall specific exit to user mode preparation. Runs with interrupts
178 * enabled.
179 */
180static void syscall_exit_to_user_mode_prepare(struct pt_regs *regs)
181{
182	unsigned long work = READ_ONCE(current_thread_info()->syscall_work);
183	unsigned long nr = syscall_get_nr(current, regs);
184
185	CT_WARN_ON(ct_state() != CONTEXT_KERNEL);
186
187	if (IS_ENABLED(CONFIG_PROVE_LOCKING)) {
188		if (WARN(irqs_disabled(), "syscall %lu left IRQs disabled", nr))
189			local_irq_enable();
190	}
191
192	rseq_syscall(regs);
193
194	/*
195	 * Do one-time syscall specific work. If these work items are
196	 * enabled, we want to run them exactly once per syscall exit with
197	 * interrupts enabled.
198	 */
199	if (unlikely(work & SYSCALL_WORK_EXIT))
200		syscall_exit_work(regs, work);
201}
202
203static __always_inline void __syscall_exit_to_user_mode_work(struct pt_regs *regs)
204{
205	syscall_exit_to_user_mode_prepare(regs);
206	local_irq_disable_exit_to_user();
207	exit_to_user_mode_prepare(regs);
208}
209
210void syscall_exit_to_user_mode_work(struct pt_regs *regs)
211{
212	__syscall_exit_to_user_mode_work(regs);
213}
214
215__visible noinstr void syscall_exit_to_user_mode(struct pt_regs *regs)
216{
217	instrumentation_begin();
218	__syscall_exit_to_user_mode_work(regs);
219	instrumentation_end();
220	exit_to_user_mode();
221}
222
223noinstr void irqentry_enter_from_user_mode(struct pt_regs *regs)
224{
225	enter_from_user_mode(regs);
226}
227
228noinstr void irqentry_exit_to_user_mode(struct pt_regs *regs)
229{
230	instrumentation_begin();
231	exit_to_user_mode_prepare(regs);
232	instrumentation_end();
233	exit_to_user_mode();
234}
235
236noinstr irqentry_state_t irqentry_enter(struct pt_regs *regs)
237{
238	irqentry_state_t ret = {
239		.exit_rcu = false,
240	};
241
242	if (user_mode(regs)) {
243		irqentry_enter_from_user_mode(regs);
244		return ret;
245	}
246
247	/*
248	 * If this entry hit the idle task invoke ct_irq_enter() whether
249	 * RCU is watching or not.
250	 *
251	 * Interrupts can nest when the first interrupt invokes softirq
252	 * processing on return which enables interrupts.
253	 *
254	 * Scheduler ticks in the idle task can mark quiescent state and
255	 * terminate a grace period, if and only if the timer interrupt is
256	 * not nested into another interrupt.
257	 *
258	 * Checking for rcu_is_watching() here would prevent the nesting
259	 * interrupt to invoke ct_irq_enter(). If that nested interrupt is
260	 * the tick then rcu_flavor_sched_clock_irq() would wrongfully
261	 * assume that it is the first interrupt and eventually claim
262	 * quiescent state and end grace periods prematurely.
263	 *
264	 * Unconditionally invoke ct_irq_enter() so RCU state stays
265	 * consistent.
266	 *
267	 * TINY_RCU does not support EQS, so let the compiler eliminate
268	 * this part when enabled.
269	 */
270	if (!IS_ENABLED(CONFIG_TINY_RCU) && is_idle_task(current)) {
271		/*
272		 * If RCU is not watching then the same careful
273		 * sequence vs. lockdep and tracing is required
274		 * as in irqentry_enter_from_user_mode().
275		 */
276		lockdep_hardirqs_off(CALLER_ADDR0);
277		ct_irq_enter();
278		instrumentation_begin();
279		kmsan_unpoison_entry_regs(regs);
280		trace_hardirqs_off_finish();
281		instrumentation_end();
282
283		ret.exit_rcu = true;
284		return ret;
285	}
286
287	/*
288	 * If RCU is watching then RCU only wants to check whether it needs
289	 * to restart the tick in NOHZ mode. rcu_irq_enter_check_tick()
290	 * already contains a warning when RCU is not watching, so no point
291	 * in having another one here.
292	 */
293	lockdep_hardirqs_off(CALLER_ADDR0);
294	instrumentation_begin();
295	kmsan_unpoison_entry_regs(regs);
296	rcu_irq_enter_check_tick();
297	trace_hardirqs_off_finish();
298	instrumentation_end();
299
300	return ret;
301}
302
303void raw_irqentry_exit_cond_resched(void)
304{
305	if (!preempt_count()) {
306		/* Sanity check RCU and thread stack */
307		rcu_irq_exit_check_preempt();
308		if (IS_ENABLED(CONFIG_DEBUG_ENTRY))
309			WARN_ON_ONCE(!on_thread_stack());
310		if (need_resched())
311			preempt_schedule_irq();
312	}
313}
314#ifdef CONFIG_PREEMPT_DYNAMIC
315#if defined(CONFIG_HAVE_PREEMPT_DYNAMIC_CALL)
316DEFINE_STATIC_CALL(irqentry_exit_cond_resched, raw_irqentry_exit_cond_resched);
317#elif defined(CONFIG_HAVE_PREEMPT_DYNAMIC_KEY)
318DEFINE_STATIC_KEY_TRUE(sk_dynamic_irqentry_exit_cond_resched);
319void dynamic_irqentry_exit_cond_resched(void)
320{
321	if (!static_branch_unlikely(&sk_dynamic_irqentry_exit_cond_resched))
322		return;
323	raw_irqentry_exit_cond_resched();
324}
325#endif
326#endif
327
328noinstr void irqentry_exit(struct pt_regs *regs, irqentry_state_t state)
329{
330	lockdep_assert_irqs_disabled();
331
332	/* Check whether this returns to user mode */
333	if (user_mode(regs)) {
334		irqentry_exit_to_user_mode(regs);
335	} else if (!regs_irqs_disabled(regs)) {
336		/*
337		 * If RCU was not watching on entry this needs to be done
338		 * carefully and needs the same ordering of lockdep/tracing
339		 * and RCU as the return to user mode path.
340		 */
341		if (state.exit_rcu) {
342			instrumentation_begin();
343			/* Tell the tracer that IRET will enable interrupts */
344			trace_hardirqs_on_prepare();
345			lockdep_hardirqs_on_prepare();
346			instrumentation_end();
347			ct_irq_exit();
348			lockdep_hardirqs_on(CALLER_ADDR0);
349			return;
350		}
351
352		instrumentation_begin();
353		if (IS_ENABLED(CONFIG_PREEMPTION))
354			irqentry_exit_cond_resched();
355
356		/* Covers both tracing and lockdep */
357		trace_hardirqs_on();
358		instrumentation_end();
359	} else {
360		/*
361		 * IRQ flags state is correct already. Just tell RCU if it
362		 * was not watching on entry.
363		 */
364		if (state.exit_rcu)
365			ct_irq_exit();
366	}
367}
368
369irqentry_state_t noinstr irqentry_nmi_enter(struct pt_regs *regs)
370{
371	irqentry_state_t irq_state;
372
373	irq_state.lockdep = lockdep_hardirqs_enabled();
374
375	__nmi_enter();
376	lockdep_hardirqs_off(CALLER_ADDR0);
377	lockdep_hardirq_enter();
378	ct_nmi_enter();
379
380	instrumentation_begin();
381	kmsan_unpoison_entry_regs(regs);
382	trace_hardirqs_off_finish();
383	ftrace_nmi_enter();
384	instrumentation_end();
385
386	return irq_state;
387}
388
389void noinstr irqentry_nmi_exit(struct pt_regs *regs, irqentry_state_t irq_state)
390{
391	instrumentation_begin();
392	ftrace_nmi_exit();
393	if (irq_state.lockdep) {
394		trace_hardirqs_on_prepare();
395		lockdep_hardirqs_on_prepare();
396	}
397	instrumentation_end();
398
399	ct_nmi_exit();
400	lockdep_hardirq_exit();
401	if (irq_state.lockdep)
402		lockdep_hardirqs_on(CALLER_ADDR0);
403	__nmi_exit();
404}