fault.c 22.1 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
L
Linus Torvalds 已提交
2 3
/*
 *  S390 version
4
 *    Copyright IBM Corp. 1999
L
Linus Torvalds 已提交
5 6 7 8 9 10 11
 *    Author(s): Hartmut Penner (hp@de.ibm.com)
 *               Ulrich Weigand (uweigand@de.ibm.com)
 *
 *  Derived from "arch/i386/mm/fault.c"
 *    Copyright (C) 1995  Linus Torvalds
 */

12
#include <linux/kernel_stat.h>
13
#include <linux/perf_event.h>
L
Linus Torvalds 已提交
14 15
#include <linux/signal.h>
#include <linux/sched.h>
16
#include <linux/sched/debug.h>
L
Linus Torvalds 已提交
17 18 19 20 21 22 23
#include <linux/kernel.h>
#include <linux/errno.h>
#include <linux/string.h>
#include <linux/types.h>
#include <linux/ptrace.h>
#include <linux/mman.h>
#include <linux/mm.h>
H
Heiko Carstens 已提交
24
#include <linux/compat.h>
L
Linus Torvalds 已提交
25
#include <linux/smp.h>
26
#include <linux/kdebug.h>
L
Linus Torvalds 已提交
27 28
#include <linux/init.h>
#include <linux/console.h>
29
#include <linux/extable.h>
L
Linus Torvalds 已提交
30
#include <linux/hardirq.h>
M
Michael Grundy 已提交
31
#include <linux/kprobes.h>
32
#include <linux/uaccess.h>
33
#include <linux/hugetlb.h>
34
#include <asm/asm-offsets.h>
35
#include <asm/diag.h>
36
#include <asm/gmap.h>
37
#include <asm/irq.h>
M
Martin Schwidefsky 已提交
38
#include <asm/mmu_context.h>
39
#include <asm/facility.h>
40
#include <asm/uv.h>
41
#include "../kernel/entry.h"
L
Linus Torvalds 已提交
42 43 44 45 46

#define __FAIL_ADDR_MASK -4096L
#define __SUBCODE_MASK 0x0600
#define __PF_RES_FIELD 0x8000000000000000ULL

47 48 49 50 51
#define VM_FAULT_BADCONTEXT	((__force vm_fault_t) 0x010000)
#define VM_FAULT_BADMAP		((__force vm_fault_t) 0x020000)
#define VM_FAULT_BADACCESS	((__force vm_fault_t) 0x040000)
#define VM_FAULT_SIGNAL		((__force vm_fault_t) 0x080000)
#define VM_FAULT_PFAULT		((__force vm_fault_t) 0x100000)
52

53 54 55 56 57 58
enum fault_type {
	KERNEL_FAULT,
	USER_FAULT,
	GMAP_FAULT,
};

59
static unsigned long store_indication __read_mostly;
60

61
static int __init fault_init(void)
62
{
63
	if (test_facility(75))
64
		store_indication = 0xc00;
65
	return 0;
66
}
67
early_initcall(fault_init);
68

L
Linus Torvalds 已提交
69
/*
70
 * Find out which address space caused the exception.
L
Linus Torvalds 已提交
71
 */
72
static enum fault_type get_fault_type(struct pt_regs *regs)
L
Linus Torvalds 已提交
73
{
74 75 76
	unsigned long trans_exc_code;

	trans_exc_code = regs->int_parm_long & 3;
77 78
	if (likely(trans_exc_code == 0)) {
		/* primary space exception */
79
		if (user_mode(regs))
80
			return USER_FAULT;
81
		if (!IS_ENABLED(CONFIG_PGSTE))
82
			return KERNEL_FAULT;
83 84 85
		if (test_pt_regs_flag(regs, PIF_GUEST_FAULT))
			return GMAP_FAULT;
		return KERNEL_FAULT;
86
	}
87 88
	if (trans_exc_code == 2)
		return USER_FAULT;
89 90 91 92
	if (trans_exc_code == 1) {
		/* access register mode, not used in the kernel */
		return USER_FAULT;
	}
93 94
	/* home space exception -> access via kernel ASCE */
	return KERNEL_FAULT;
L
Linus Torvalds 已提交
95 96
}

97 98 99 100
static int bad_address(void *p)
{
	unsigned long dummy;

101
	return get_kernel_nofault(dummy, (unsigned long *)p);
102 103 104 105
}

static void dump_pagetable(unsigned long asce, unsigned long address)
{
106
	unsigned long *table = __va(asce & _ASCE_ORIGIN);
107 108 109 110

	pr_alert("AS:%016lx ", asce);
	switch (asce & _ASCE_TYPE_MASK) {
	case _ASCE_TYPE_REGION1:
111
		table += (address & _REGION1_INDEX) >> _REGION1_SHIFT;
112 113 114 115 116 117
		if (bad_address(table))
			goto bad;
		pr_cont("R1:%016lx ", *table);
		if (*table & _REGION_ENTRY_INVALID)
			goto out;
		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
J
Joe Perches 已提交
118
		fallthrough;
119
	case _ASCE_TYPE_REGION2:
120
		table += (address & _REGION2_INDEX) >> _REGION2_SHIFT;
121 122 123 124 125 126
		if (bad_address(table))
			goto bad;
		pr_cont("R2:%016lx ", *table);
		if (*table & _REGION_ENTRY_INVALID)
			goto out;
		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
J
Joe Perches 已提交
127
		fallthrough;
128
	case _ASCE_TYPE_REGION3:
129
		table += (address & _REGION3_INDEX) >> _REGION3_SHIFT;
130 131 132 133 134 135
		if (bad_address(table))
			goto bad;
		pr_cont("R3:%016lx ", *table);
		if (*table & (_REGION_ENTRY_INVALID | _REGION3_ENTRY_LARGE))
			goto out;
		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
J
Joe Perches 已提交
136
		fallthrough;
137
	case _ASCE_TYPE_SEGMENT:
138
		table += (address & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
139 140
		if (bad_address(table))
			goto bad;
J
Joe Perches 已提交
141
		pr_cont("S:%016lx ", *table);
142 143 144 145
		if (*table & (_SEGMENT_ENTRY_INVALID | _SEGMENT_ENTRY_LARGE))
			goto out;
		table = (unsigned long *)(*table & _SEGMENT_ENTRY_ORIGIN);
	}
146
	table += (address & _PAGE_INDEX) >> _PAGE_SHIFT;
147 148 149 150 151 152 153 154 155 156 157 158 159 160
	if (bad_address(table))
		goto bad;
	pr_cont("P:%016lx ", *table);
out:
	pr_cont("\n");
	return;
bad:
	pr_cont("BAD\n");
}

static void dump_fault_info(struct pt_regs *regs)
{
	unsigned long asce;

161 162
	pr_alert("Failing address: %016lx TEID: %016lx\n",
		 regs->int_parm_long & __FAIL_ADDR_MASK, regs->int_parm_long);
163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178
	pr_alert("Fault in ");
	switch (regs->int_parm_long & 3) {
	case 3:
		pr_cont("home space ");
		break;
	case 2:
		pr_cont("secondary space ");
		break;
	case 1:
		pr_cont("access register ");
		break;
	case 0:
		pr_cont("primary space ");
		break;
	}
	pr_cont("mode while using ");
179 180
	switch (get_fault_type(regs)) {
	case USER_FAULT:
181 182
		asce = S390_lowcore.user_asce;
		pr_cont("user ");
183 184 185 186 187 188 189 190 191
		break;
	case GMAP_FAULT:
		asce = ((struct gmap *) S390_lowcore.gmap)->asce;
		pr_cont("gmap ");
		break;
	case KERNEL_FAULT:
		asce = S390_lowcore.kernel_asce;
		pr_cont("kernel ");
		break;
192 193
	default:
		unreachable();
194 195 196 197 198
	}
	pr_cont("ASCE.\n");
	dump_pagetable(asce, regs->int_parm_long & __FAIL_ADDR_MASK);
}

199 200 201
int show_unhandled_signals = 1;

void report_user_fault(struct pt_regs *regs, long signr, int is_mm_fault)
202 203 204 205 206 207 208
{
	if ((task_pid_nr(current) > 1) && !show_unhandled_signals)
		return;
	if (!unhandled_signal(current, signr))
		return;
	if (!printk_ratelimit())
		return;
209
	printk(KERN_ALERT "User process fault: interruption code %04x ilc:%d ",
210
	       regs->int_code & 0xffff, regs->int_code >> 17);
211
	print_vma_addr(KERN_CONT "in ", regs->psw.addr);
M
Martin Schwidefsky 已提交
212
	printk(KERN_CONT "\n");
213 214
	if (is_mm_fault)
		dump_fault_info(regs);
215 216 217
	show_regs(regs);
}

L
Linus Torvalds 已提交
218 219 220 221
/*
 * Send SIGSEGV to task.  This is an external routine
 * to keep the stack usage of do_page_fault small.
 */
M
Martin Schwidefsky 已提交
222
static noinline void do_sigsegv(struct pt_regs *regs, int si_code)
L
Linus Torvalds 已提交
223
{
224
	report_user_fault(regs, SIGSEGV, 1);
225
	force_sig_fault(SIGSEGV, si_code,
226
			(void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
L
Linus Torvalds 已提交
227 228
}

229 230 231 232 233 234 235 236 237 238 239 240
const struct exception_table_entry *s390_search_extables(unsigned long addr)
{
	const struct exception_table_entry *fixup;

	fixup = search_extable(__start_dma_ex_table,
			       __stop_dma_ex_table - __start_dma_ex_table,
			       addr);
	if (!fixup)
		fixup = search_exception_tables(addr);
	return fixup;
}

M
Martin Schwidefsky 已提交
241
static noinline void do_no_context(struct pt_regs *regs)
242 243 244 245
{
	const struct exception_table_entry *fixup;

	/* Are we prepared to handle this kernel fault?  */
246
	fixup = s390_search_extables(regs->psw.addr);
247
	if (fixup && ex_handle(fixup, regs))
248 249 250 251 252 253
		return;

	/*
	 * Oops. The kernel tried to access some bad page. We'll have to
	 * terminate things with extreme prejudice.
	 */
254
	if (get_fault_type(regs) == KERNEL_FAULT)
255
		printk(KERN_ALERT "Unable to handle kernel pointer dereference"
256
		       " in virtual kernel address space\n");
257 258
	else
		printk(KERN_ALERT "Unable to handle kernel paging request"
259 260
		       " in virtual user address space\n");
	dump_fault_info(regs);
M
Martin Schwidefsky 已提交
261
	die(regs, "Oops");
262 263 264
	do_exit(SIGKILL);
}

M
Martin Schwidefsky 已提交
265
static noinline void do_low_address(struct pt_regs *regs)
266 267 268 269 270
{
	/* Low-address protection hit in kernel mode means
	   NULL pointer write access in kernel mode.  */
	if (regs->psw.mask & PSW_MASK_PSTATE) {
		/* Low-address protection hit in user mode 'cannot happen'. */
M
Martin Schwidefsky 已提交
271
		die (regs, "Low-address protection");
272 273 274
		do_exit(SIGKILL);
	}

M
Martin Schwidefsky 已提交
275
	do_no_context(regs);
276 277
}

M
Martin Schwidefsky 已提交
278
static noinline void do_sigbus(struct pt_regs *regs)
279 280 281 282 283
{
	/*
	 * Send a sigbus, regardless of whether we were in kernel
	 * or user mode.
	 */
284
	force_sig_fault(SIGBUS, BUS_ADRERR,
285
			(void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
286 287
}

288 289
static noinline void do_fault_error(struct pt_regs *regs, int access,
					vm_fault_t fault)
290 291 292 293 294 295 296
{
	int si_code;

	switch (fault) {
	case VM_FAULT_BADACCESS:
	case VM_FAULT_BADMAP:
		/* Bad memory access. Check if it is kernel or user space. */
297
		if (user_mode(regs)) {
298 299 300
			/* User mode accesses just cause a SIGSEGV */
			si_code = (fault == VM_FAULT_BADMAP) ?
				SEGV_MAPERR : SEGV_ACCERR;
M
Martin Schwidefsky 已提交
301
			do_sigsegv(regs, si_code);
302
			break;
303
		}
J
Joe Perches 已提交
304
		fallthrough;
305
	case VM_FAULT_BADCONTEXT:
306
	case VM_FAULT_PFAULT:
M
Martin Schwidefsky 已提交
307
		do_no_context(regs);
308
		break;
309 310 311 312
	case VM_FAULT_SIGNAL:
		if (!user_mode(regs))
			do_no_context(regs);
		break;
313
	default: /* fault & VM_FAULT_ERROR */
314
		if (fault & VM_FAULT_OOM) {
315
			if (!user_mode(regs))
M
Martin Schwidefsky 已提交
316
				do_no_context(regs);
317 318
			else
				pagefault_out_of_memory();
319 320 321 322 323 324
		} else if (fault & VM_FAULT_SIGSEGV) {
			/* Kernel mode? Handle exceptions or die */
			if (!user_mode(regs))
				do_no_context(regs);
			else
				do_sigsegv(regs, SEGV_MAPERR);
325
		} else if (fault & VM_FAULT_SIGBUS) {
326
			/* Kernel mode? Handle exceptions or die */
327
			if (!user_mode(regs))
M
Martin Schwidefsky 已提交
328
				do_no_context(regs);
M
Martin Schwidefsky 已提交
329
			else
M
Martin Schwidefsky 已提交
330
				do_sigbus(regs);
331 332 333 334 335 336
		} else
			BUG();
		break;
	}
}

L
Linus Torvalds 已提交
337 338 339 340 341
/*
 * This routine handles page faults.  It determines the address,
 * and the problem, and then passes it off to one of the appropriate
 * routines.
 *
342
 * interruption code (int_code):
H
Heiko Carstens 已提交
343
 *   04       Protection           ->  Write-Protection  (suppression)
L
Linus Torvalds 已提交
344 345 346 347
 *   10       Segment translation  ->  Not present       (nullification)
 *   11       Page translation     ->  Not present       (nullification)
 *   3b       Region third trans.  ->  Not present       (nullification)
 */
348
static inline vm_fault_t do_exception(struct pt_regs *regs, int access)
L
Linus Torvalds 已提交
349
{
350
	struct gmap *gmap;
351 352 353
	struct task_struct *tsk;
	struct mm_struct *mm;
	struct vm_area_struct *vma;
354
	enum fault_type type;
M
Martin Schwidefsky 已提交
355
	unsigned long trans_exc_code;
356
	unsigned long address;
357
	unsigned int flags;
358
	vm_fault_t fault;
L
Linus Torvalds 已提交
359

360 361 362 363 364
	tsk = current;
	/*
	 * The instruction that caused the program check has
	 * been nullified. Don't signal single step via SIGTRAP.
	 */
S
Sven Schnelle 已提交
365
	clear_thread_flag(TIF_PER_TRAP);
366

367
	if (kprobe_page_fault(regs, 14))
368
		return 0;
M
Michael Grundy 已提交
369

370
	mm = tsk->mm;
M
Martin Schwidefsky 已提交
371
	trans_exc_code = regs->int_parm_long;
L
Linus Torvalds 已提交
372 373 374 375 376 377

	/*
	 * Verify that the fault happened in user space, that
	 * we are not in an interrupt and that there is a 
	 * user context.
	 */
378
	fault = VM_FAULT_BADCONTEXT;
379 380 381 382 383 384 385 386 387 388
	type = get_fault_type(regs);
	switch (type) {
	case KERNEL_FAULT:
		goto out;
	case USER_FAULT:
	case GMAP_FAULT:
		if (faulthandler_disabled() || !mm)
			goto out;
		break;
	}
L
Linus Torvalds 已提交
389

390
	address = trans_exc_code & __FAIL_ADDR_MASK;
391
	perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
P
Peter Xu 已提交
392
	flags = FAULT_FLAG_DEFAULT;
393 394
	if (user_mode(regs))
		flags |= FAULT_FLAG_USER;
395 396
	if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400)
		flags |= FAULT_FLAG_WRITE;
397
	mmap_read_lock(mm);
L
Linus Torvalds 已提交
398

399 400 401
	gmap = NULL;
	if (IS_ENABLED(CONFIG_PGSTE) && type == GMAP_FAULT) {
		gmap = (struct gmap *) S390_lowcore.gmap;
402
		current->thread.gmap_addr = address;
403
		current->thread.gmap_write_flag = !!(flags & FAULT_FLAG_WRITE);
404
		current->thread.gmap_int_code = regs->int_code & 0xffff;
405
		address = __gmap_translate(gmap, address);
406 407 408 409
		if (address == -EFAULT) {
			fault = VM_FAULT_BADMAP;
			goto out_up;
		}
410 411
		if (gmap->pfault_enabled)
			flags |= FAULT_FLAG_RETRY_NOWAIT;
412 413 414
	}

retry:
415
	fault = VM_FAULT_BADMAP;
416 417
	vma = find_vma(mm, address);
	if (!vma)
418
		goto out_up;
G
Gerald Schaefer 已提交
419

420 421 422 423 424 425 426 427 428 429 430 431
	if (unlikely(vma->vm_start > address)) {
		if (!(vma->vm_flags & VM_GROWSDOWN))
			goto out_up;
		if (expand_stack(vma, address))
			goto out_up;
	}

	/*
	 * Ok, we have a good vm_area for this memory access, so
	 * we can handle it..
	 */
	fault = VM_FAULT_BADACCESS;
432
	if (unlikely(!(vma->vm_flags & access)))
433
		goto out_up;
L
Linus Torvalds 已提交
434

435 436
	if (is_vm_hugetlb_page(vma))
		address &= HPAGE_MASK;
L
Linus Torvalds 已提交
437 438 439 440 441
	/*
	 * If for any reason at all we couldn't handle the fault,
	 * make sure we exit gracefully rather than endlessly redo
	 * the fault.
	 */
442
	fault = handle_mm_fault(vma, address, flags, regs);
P
Peter Xu 已提交
443
	if (fault_signal_pending(fault, regs)) {
444
		fault = VM_FAULT_SIGNAL;
445 446
		if (flags & FAULT_FLAG_RETRY_NOWAIT)
			goto out_up;
447 448
		goto out;
	}
449 450 451
	if (unlikely(fault & VM_FAULT_ERROR))
		goto out_up;

452 453
	if (flags & FAULT_FLAG_ALLOW_RETRY) {
		if (fault & VM_FAULT_RETRY) {
454 455
			if (IS_ENABLED(CONFIG_PGSTE) && gmap &&
			    (flags & FAULT_FLAG_RETRY_NOWAIT)) {
456
				/* FAULT_FLAG_RETRY_NOWAIT has been set,
457
				 * mmap_lock has not been released */
458 459 460 461
				current->thread.gmap_pfault = 1;
				fault = VM_FAULT_PFAULT;
				goto out_up;
			}
462
			flags &= ~FAULT_FLAG_RETRY_NOWAIT;
463
			flags |= FAULT_FLAG_TRIED;
464
			mmap_read_lock(mm);
465 466
			goto retry;
		}
467
	}
468
	if (IS_ENABLED(CONFIG_PGSTE) && gmap) {
469 470 471 472 473 474 475 476 477 478 479
		address =  __gmap_link(gmap, current->thread.gmap_addr,
				       address);
		if (address == -EFAULT) {
			fault = VM_FAULT_BADMAP;
			goto out_up;
		}
		if (address == -ENOMEM) {
			fault = VM_FAULT_OOM;
			goto out_up;
		}
	}
480 481
	fault = 0;
out_up:
482
	mmap_read_unlock(mm);
483 484
out:
	return fault;
L
Linus Torvalds 已提交
485 486
}

487
void do_protection_exception(struct pt_regs *regs)
L
Linus Torvalds 已提交
488
{
M
Martin Schwidefsky 已提交
489
	unsigned long trans_exc_code;
490 491
	int access;
	vm_fault_t fault;
492

M
Martin Schwidefsky 已提交
493
	trans_exc_code = regs->int_parm_long;
494 495 496 497 498 499 500
	/*
	 * Protection exceptions are suppressing, decrement psw address.
	 * The exception to this rule are aborted transactions, for these
	 * the PSW already points to the correct location.
	 */
	if (!(regs->int_code & 0x200))
		regs->psw.addr = __rewind_psw(regs->psw, regs->int_code >> 16);
501 502 503 504 505
	/*
	 * Check for low-address protection.  This needs to be treated
	 * as a special case because the translation exception code
	 * field is not guaranteed to contain valid data in this case.
	 */
506
	if (unlikely(!(trans_exc_code & 4))) {
M
Martin Schwidefsky 已提交
507
		do_low_address(regs);
508 509
		return;
	}
510 511 512 513 514 515 516 517 518
	if (unlikely(MACHINE_HAS_NX && (trans_exc_code & 0x80))) {
		regs->int_parm_long = (trans_exc_code & ~PAGE_MASK) |
					(regs->psw.addr & PAGE_MASK);
		access = VM_EXEC;
		fault = VM_FAULT_BADACCESS;
	} else {
		access = VM_WRITE;
		fault = do_exception(regs, access);
	}
519
	if (unlikely(fault))
520
		do_fault_error(regs, access, fault);
L
Linus Torvalds 已提交
521
}
522
NOKPROBE_SYMBOL(do_protection_exception);
L
Linus Torvalds 已提交
523

524
void do_dat_exception(struct pt_regs *regs)
L
Linus Torvalds 已提交
525
{
526 527
	int access;
	vm_fault_t fault;
528

529
	access = VM_ACCESS_FLAGS;
M
Martin Schwidefsky 已提交
530
	fault = do_exception(regs, access);
531
	if (unlikely(fault))
532
		do_fault_error(regs, access, fault);
L
Linus Torvalds 已提交
533
}
534
NOKPROBE_SYMBOL(do_dat_exception);
L
Linus Torvalds 已提交
535 536 537 538 539

#ifdef CONFIG_PFAULT 
/*
 * 'pfault' pseudo page faults routines.
 */
540
static int pfault_disable;
L
Linus Torvalds 已提交
541 542 543 544 545 546 547 548 549

static int __init nopfault(char *str)
{
	pfault_disable = 1;
	return 1;
}

__setup("nopfault", nopfault);

H
Heiko Carstens 已提交
550 551 552 553 554 555 556 557 558 559
struct pfault_refbk {
	u16 refdiagc;
	u16 reffcode;
	u16 refdwlen;
	u16 refversn;
	u64 refgaddr;
	u64 refselmk;
	u64 refcmpmk;
	u64 reserved;
} __attribute__ ((packed, aligned(8)));
L
Linus Torvalds 已提交
560

561 562 563 564 565 566 567 568 569 570 571
static struct pfault_refbk pfault_init_refbk = {
	.refdiagc = 0x258,
	.reffcode = 0,
	.refdwlen = 5,
	.refversn = 2,
	.refgaddr = __LC_LPP,
	.refselmk = 1ULL << 48,
	.refcmpmk = 1ULL << 48,
	.reserved = __PF_RES_FIELD
};

L
Linus Torvalds 已提交
572 573 574 575
int pfault_init(void)
{
        int rc;

576
	if (pfault_disable)
L
Linus Torvalds 已提交
577
		return -1;
578
	diag_stat_inc(DIAG_STAT_X258);
579 580 581 582
	asm volatile(
		"	diag	%1,%0,0x258\n"
		"0:	j	2f\n"
		"1:	la	%0,8\n"
L
Linus Torvalds 已提交
583
		"2:\n"
584
		EX_TABLE(0b,1b)
585 586
		: "=d" (rc)
		: "a" (&pfault_init_refbk), "m" (pfault_init_refbk) : "cc");
L
Linus Torvalds 已提交
587 588 589
        return rc;
}

590 591 592 593 594 595 596
static struct pfault_refbk pfault_fini_refbk = {
	.refdiagc = 0x258,
	.reffcode = 1,
	.refdwlen = 5,
	.refversn = 2,
};

L
Linus Torvalds 已提交
597 598 599
void pfault_fini(void)
{

600
	if (pfault_disable)
L
Linus Torvalds 已提交
601
		return;
602
	diag_stat_inc(DIAG_STAT_X258);
603 604
	asm volatile(
		"	diag	%0,0,0x258\n"
H
Heiko Carstens 已提交
605
		"0:	nopr	%%r7\n"
606
		EX_TABLE(0b,0b)
607
		: : "a" (&pfault_fini_refbk), "m" (pfault_fini_refbk) : "cc");
L
Linus Torvalds 已提交
608 609
}

610 611 612
static DEFINE_SPINLOCK(pfault_lock);
static LIST_HEAD(pfault_list);

613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635
#define PF_COMPLETE	0x0080

/*
 * The mechanism of our pfault code: if Linux is running as guest, runs a user
 * space process and the user space process accesses a page that the host has
 * paged out we get a pfault interrupt.
 *
 * This allows us, within the guest, to schedule a different process. Without
 * this mechanism the host would have to suspend the whole virtual cpu until
 * the page has been paged in.
 *
 * So when we get such an interrupt then we set the state of the current task
 * to uninterruptible and also set the need_resched flag. Both happens within
 * interrupt context(!). If we later on want to return to user space we
 * recognize the need_resched flag and then call schedule().  It's not very
 * obvious how this works...
 *
 * Of course we have a lot of additional fun with the completion interrupt (->
 * host signals that a page of a process has been paged in and the process can
 * continue to run). This interrupt can arrive on any cpu and, since we have
 * virtual cpus, actually appear before the interrupt that signals that a page
 * is missing.
 */
636
static void pfault_interrupt(struct ext_code ext_code,
637
			     unsigned int param32, unsigned long param64)
L
Linus Torvalds 已提交
638 639 640
{
	struct task_struct *tsk;
	__u16 subcode;
641
	pid_t pid;
L
Linus Torvalds 已提交
642 643

	/*
644 645 646
	 * Get the external interruption subcode & pfault initial/completion
	 * signal bit. VM stores this in the 'cpu address' field associated
	 * with the external interrupt.
L
Linus Torvalds 已提交
647
	 */
648
	subcode = ext_code.subcode;
L
Linus Torvalds 已提交
649 650
	if ((subcode & 0xff00) != __SUBCODE_MASK)
		return;
651
	inc_irq_stat(IRQEXT_PFL);
652
	/* Get the token (= pid of the affected task). */
653
	pid = param64 & LPP_PID_MASK;
654 655 656 657 658 659 660
	rcu_read_lock();
	tsk = find_task_by_pid_ns(pid, &init_pid_ns);
	if (tsk)
		get_task_struct(tsk);
	rcu_read_unlock();
	if (!tsk)
		return;
661
	spin_lock(&pfault_lock);
662
	if (subcode & PF_COMPLETE) {
L
Linus Torvalds 已提交
663
		/* signal bit is set -> a page has been swapped in by VM */
664
		if (tsk->thread.pfault_wait == 1) {
L
Linus Torvalds 已提交
665 666 667 668
			/* Initial interrupt was faster than the completion
			 * interrupt. pfault_wait is valid. Set pfault_wait
			 * back to zero and wake up the process. This can
			 * safely be done because the task is still sleeping
669
			 * and can't produce new pfaults. */
L
Linus Torvalds 已提交
670
			tsk->thread.pfault_wait = 0;
671
			list_del(&tsk->thread.list);
L
Linus Torvalds 已提交
672
			wake_up_process(tsk);
673
			put_task_struct(tsk);
674 675 676
		} else {
			/* Completion interrupt was faster than initial
			 * interrupt. Set pfault_wait to -1 so the initial
677 678 679 680 681
			 * interrupt doesn't put the task to sleep.
			 * If the task is not running, ignore the completion
			 * interrupt since it must be a leftover of a PFAULT
			 * CANCEL operation which didn't remove all pending
			 * completion interrupts. */
682
			if (task_is_running(tsk))
683
				tsk->thread.pfault_wait = -1;
L
Linus Torvalds 已提交
684 685 686
		}
	} else {
		/* signal bit not set -> a real page is missing. */
H
Heiko Carstens 已提交
687 688
		if (WARN_ON_ONCE(tsk != current))
			goto out;
689 690
		if (tsk->thread.pfault_wait == 1) {
			/* Already on the list with a reference: put to sleep */
691
			goto block;
692
		} else if (tsk->thread.pfault_wait == -1) {
L
Linus Torvalds 已提交
693
			/* Completion interrupt was faster than the initial
694 695
			 * interrupt (pfault_wait == -1). Set pfault_wait
			 * back to zero and exit. */
L
Linus Torvalds 已提交
696
			tsk->thread.pfault_wait = 0;
697 698
		} else {
			/* Initial interrupt arrived before completion
699 700 701 702 703
			 * interrupt. Let the task sleep.
			 * An extra task reference is needed since a different
			 * cpu may set the task state to TASK_RUNNING again
			 * before the scheduler is reached. */
			get_task_struct(tsk);
704 705
			tsk->thread.pfault_wait = 1;
			list_add(&tsk->thread.list, &pfault_list);
706 707 708 709 710
block:
			/* Since this must be a userspace fault, there
			 * is no kernel task state to trample. Rely on the
			 * return to userspace schedule() to block. */
			__set_current_state(TASK_UNINTERRUPTIBLE);
L
Linus Torvalds 已提交
711
			set_tsk_need_resched(tsk);
712
			set_preempt_need_resched();
713 714
		}
	}
H
Heiko Carstens 已提交
715
out:
716
	spin_unlock(&pfault_lock);
717
	put_task_struct(tsk);
718 719
}

720
static int pfault_cpu_dead(unsigned int cpu)
721 722 723 724
{
	struct thread_struct *thread, *next;
	struct task_struct *tsk;

725 726 727 728 729 730 731
	spin_lock_irq(&pfault_lock);
	list_for_each_entry_safe(thread, next, &pfault_list, list) {
		thread->pfault_wait = 0;
		list_del(&thread->list);
		tsk = container_of(thread, struct task_struct, thread);
		wake_up_process(tsk);
		put_task_struct(tsk);
L
Linus Torvalds 已提交
732
	}
733 734
	spin_unlock_irq(&pfault_lock);
	return 0;
L
Linus Torvalds 已提交
735 736
}

737
static int __init pfault_irq_init(void)
H
Heiko Carstens 已提交
738
{
739
	int rc;
H
Heiko Carstens 已提交
740

741
	rc = register_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
H
Heiko Carstens 已提交
742 743 744 745 746
	if (rc)
		goto out_extint;
	rc = pfault_init() == 0 ? 0 : -EOPNOTSUPP;
	if (rc)
		goto out_pfault;
747
	irq_subclass_register(IRQ_SUBCLASS_SERVICE_SIGNAL);
748 749
	cpuhp_setup_state_nocalls(CPUHP_S390_PFAULT_DEAD, "s390/pfault:dead",
				  NULL, pfault_cpu_dead);
H
Heiko Carstens 已提交
750
	return 0;
H
Heiko Carstens 已提交
751

H
Heiko Carstens 已提交
752
out_pfault:
753
	unregister_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
H
Heiko Carstens 已提交
754 755 756
out_extint:
	pfault_disable = 1;
	return rc;
H
Heiko Carstens 已提交
757
}
758 759
early_initcall(pfault_irq_init);

H
Heiko Carstens 已提交
760
#endif /* CONFIG_PFAULT */
761 762

#if IS_ENABLED(CONFIG_PGSTE)
763

764 765 766 767 768 769 770 771
void do_secure_storage_access(struct pt_regs *regs)
{
	unsigned long addr = regs->int_parm_long & __FAIL_ADDR_MASK;
	struct vm_area_struct *vma;
	struct mm_struct *mm;
	struct page *page;
	int rc;

772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797
	/*
	 * bit 61 tells us if the address is valid, if it's not we
	 * have a major problem and should stop the kernel or send a
	 * SIGSEGV to the process. Unfortunately bit 61 is not
	 * reliable without the misc UV feature so we need to check
	 * for that as well.
	 */
	if (test_bit_inv(BIT_UV_FEAT_MISC, &uv_info.uv_feature_indications) &&
	    !test_bit_inv(61, &regs->int_parm_long)) {
		/*
		 * When this happens, userspace did something that it
		 * was not supposed to do, e.g. branching into secure
		 * memory. Trigger a segmentation fault.
		 */
		if (user_mode(regs)) {
			send_sig(SIGSEGV, current, 0);
			return;
		}

		/*
		 * The kernel should never run into this case and we
		 * have no way out of this situation.
		 */
		panic("Unexpected PGM 0x3d with TEID bit 61=0");
	}

798 799 800
	switch (get_fault_type(regs)) {
	case USER_FAULT:
		mm = current->mm;
801
		mmap_read_lock(mm);
802 803
		vma = find_vma(mm, addr);
		if (!vma) {
804
			mmap_read_unlock(mm);
805 806 807 808 809
			do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
			break;
		}
		page = follow_page(vma, addr, FOLL_WRITE | FOLL_GET);
		if (IS_ERR_OR_NULL(page)) {
810
			mmap_read_unlock(mm);
811 812 813 814 815
			break;
		}
		if (arch_make_page_accessible(page))
			send_sig(SIGSEGV, current, 0);
		put_page(page);
816
		mmap_read_unlock(mm);
817 818 819
		break;
	case KERNEL_FAULT:
		page = phys_to_page(addr);
820
		if (unlikely(!try_get_compound_head(page, 1)))
821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850
			break;
		rc = arch_make_page_accessible(page);
		put_page(page);
		if (rc)
			BUG();
		break;
	case GMAP_FAULT:
	default:
		do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
		WARN_ON_ONCE(1);
	}
}
NOKPROBE_SYMBOL(do_secure_storage_access);

void do_non_secure_storage_access(struct pt_regs *regs)
{
	unsigned long gaddr = regs->int_parm_long & __FAIL_ADDR_MASK;
	struct gmap *gmap = (struct gmap *)S390_lowcore.gmap;

	if (get_fault_type(regs) != GMAP_FAULT) {
		do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
		WARN_ON_ONCE(1);
		return;
	}

	if (gmap_convert_to_secure(gmap, gaddr) == -EINVAL)
		send_sig(SIGSEGV, current, 0);
}
NOKPROBE_SYMBOL(do_non_secure_storage_access);

851 852 853 854 855 856 857 858 859 860 861 862 863 864 865
void do_secure_storage_violation(struct pt_regs *regs)
{
	/*
	 * Either KVM messed up the secure guest mapping or the same
	 * page is mapped into multiple secure guests.
	 *
	 * This exception is only triggered when a guest 2 is running
	 * and can therefore never occur in kernel context.
	 */
	printk_ratelimited(KERN_WARNING
			   "Secure storage violation in task: %s, pid %d\n",
			   current->comm, current->pid);
	send_sig(SIGSEGV, current, 0);
}

866
#endif /* CONFIG_PGSTE */