fault.c 22.1 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
L
Linus Torvalds 已提交
2 3
/*
 *  S390 version
4
 *    Copyright IBM Corp. 1999
L
Linus Torvalds 已提交
5 6 7 8 9 10 11
 *    Author(s): Hartmut Penner (hp@de.ibm.com)
 *               Ulrich Weigand (uweigand@de.ibm.com)
 *
 *  Derived from "arch/i386/mm/fault.c"
 *    Copyright (C) 1995  Linus Torvalds
 */

12
#include <linux/kernel_stat.h>
13
#include <linux/perf_event.h>
L
Linus Torvalds 已提交
14 15
#include <linux/signal.h>
#include <linux/sched.h>
16
#include <linux/sched/debug.h>
L
Linus Torvalds 已提交
17 18 19 20 21 22 23
#include <linux/kernel.h>
#include <linux/errno.h>
#include <linux/string.h>
#include <linux/types.h>
#include <linux/ptrace.h>
#include <linux/mman.h>
#include <linux/mm.h>
H
Heiko Carstens 已提交
24
#include <linux/compat.h>
L
Linus Torvalds 已提交
25
#include <linux/smp.h>
26
#include <linux/kdebug.h>
L
Linus Torvalds 已提交
27 28
#include <linux/init.h>
#include <linux/console.h>
29
#include <linux/extable.h>
L
Linus Torvalds 已提交
30
#include <linux/hardirq.h>
M
Michael Grundy 已提交
31
#include <linux/kprobes.h>
32
#include <linux/uaccess.h>
33
#include <linux/hugetlb.h>
34
#include <asm/asm-offsets.h>
35
#include <asm/diag.h>
36
#include <asm/gmap.h>
37
#include <asm/irq.h>
M
Martin Schwidefsky 已提交
38
#include <asm/mmu_context.h>
39
#include <asm/facility.h>
40
#include <asm/uv.h>
41
#include "../kernel/entry.h"
L
Linus Torvalds 已提交
42 43 44 45 46

#define __FAIL_ADDR_MASK -4096L
#define __SUBCODE_MASK 0x0600
#define __PF_RES_FIELD 0x8000000000000000ULL

47 48 49 50 51
#define VM_FAULT_BADCONTEXT	((__force vm_fault_t) 0x010000)
#define VM_FAULT_BADMAP		((__force vm_fault_t) 0x020000)
#define VM_FAULT_BADACCESS	((__force vm_fault_t) 0x040000)
#define VM_FAULT_SIGNAL		((__force vm_fault_t) 0x080000)
#define VM_FAULT_PFAULT		((__force vm_fault_t) 0x100000)
52

53 54 55 56 57 58
enum fault_type {
	KERNEL_FAULT,
	USER_FAULT,
	GMAP_FAULT,
};

59
static unsigned long store_indication __read_mostly;
60

61
static int __init fault_init(void)
62
{
63
	if (test_facility(75))
64
		store_indication = 0xc00;
65
	return 0;
66
}
67
early_initcall(fault_init);
68

L
Linus Torvalds 已提交
69
/*
70
 * Find out which address space caused the exception.
L
Linus Torvalds 已提交
71
 */
72
static enum fault_type get_fault_type(struct pt_regs *regs)
L
Linus Torvalds 已提交
73
{
74 75 76
	unsigned long trans_exc_code;

	trans_exc_code = regs->int_parm_long & 3;
77 78
	if (likely(trans_exc_code == 0)) {
		/* primary space exception */
79
		if (user_mode(regs))
80
			return USER_FAULT;
81
		if (!IS_ENABLED(CONFIG_PGSTE))
82
			return KERNEL_FAULT;
83 84 85
		if (test_pt_regs_flag(regs, PIF_GUEST_FAULT))
			return GMAP_FAULT;
		return KERNEL_FAULT;
86
	}
87 88
	if (trans_exc_code == 2)
		return USER_FAULT;
89 90 91 92
	if (trans_exc_code == 1) {
		/* access register mode, not used in the kernel */
		return USER_FAULT;
	}
93 94
	/* home space exception -> access via kernel ASCE */
	return KERNEL_FAULT;
L
Linus Torvalds 已提交
95 96
}

97 98 99 100
static int bad_address(void *p)
{
	unsigned long dummy;

101
	return get_kernel_nofault(dummy, (unsigned long *)p);
102 103 104 105
}

static void dump_pagetable(unsigned long asce, unsigned long address)
{
106
	unsigned long *table = __va(asce & _ASCE_ORIGIN);
107 108 109 110

	pr_alert("AS:%016lx ", asce);
	switch (asce & _ASCE_TYPE_MASK) {
	case _ASCE_TYPE_REGION1:
111
		table += (address & _REGION1_INDEX) >> _REGION1_SHIFT;
112 113 114 115 116 117
		if (bad_address(table))
			goto bad;
		pr_cont("R1:%016lx ", *table);
		if (*table & _REGION_ENTRY_INVALID)
			goto out;
		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
J
Joe Perches 已提交
118
		fallthrough;
119
	case _ASCE_TYPE_REGION2:
120
		table += (address & _REGION2_INDEX) >> _REGION2_SHIFT;
121 122 123 124 125 126
		if (bad_address(table))
			goto bad;
		pr_cont("R2:%016lx ", *table);
		if (*table & _REGION_ENTRY_INVALID)
			goto out;
		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
J
Joe Perches 已提交
127
		fallthrough;
128
	case _ASCE_TYPE_REGION3:
129
		table += (address & _REGION3_INDEX) >> _REGION3_SHIFT;
130 131 132 133 134 135
		if (bad_address(table))
			goto bad;
		pr_cont("R3:%016lx ", *table);
		if (*table & (_REGION_ENTRY_INVALID | _REGION3_ENTRY_LARGE))
			goto out;
		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
J
Joe Perches 已提交
136
		fallthrough;
137
	case _ASCE_TYPE_SEGMENT:
138
		table += (address & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
139 140
		if (bad_address(table))
			goto bad;
J
Joe Perches 已提交
141
		pr_cont("S:%016lx ", *table);
142 143 144 145
		if (*table & (_SEGMENT_ENTRY_INVALID | _SEGMENT_ENTRY_LARGE))
			goto out;
		table = (unsigned long *)(*table & _SEGMENT_ENTRY_ORIGIN);
	}
146
	table += (address & _PAGE_INDEX) >> _PAGE_SHIFT;
147 148 149 150 151 152 153 154 155 156 157 158 159 160
	if (bad_address(table))
		goto bad;
	pr_cont("P:%016lx ", *table);
out:
	pr_cont("\n");
	return;
bad:
	pr_cont("BAD\n");
}

static void dump_fault_info(struct pt_regs *regs)
{
	unsigned long asce;

161 162
	pr_alert("Failing address: %016lx TEID: %016lx\n",
		 regs->int_parm_long & __FAIL_ADDR_MASK, regs->int_parm_long);
163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178
	pr_alert("Fault in ");
	switch (regs->int_parm_long & 3) {
	case 3:
		pr_cont("home space ");
		break;
	case 2:
		pr_cont("secondary space ");
		break;
	case 1:
		pr_cont("access register ");
		break;
	case 0:
		pr_cont("primary space ");
		break;
	}
	pr_cont("mode while using ");
179 180
	switch (get_fault_type(regs)) {
	case USER_FAULT:
181 182
		asce = S390_lowcore.user_asce;
		pr_cont("user ");
183 184 185 186 187 188 189 190 191
		break;
	case GMAP_FAULT:
		asce = ((struct gmap *) S390_lowcore.gmap)->asce;
		pr_cont("gmap ");
		break;
	case KERNEL_FAULT:
		asce = S390_lowcore.kernel_asce;
		pr_cont("kernel ");
		break;
192 193
	default:
		unreachable();
194 195 196 197 198
	}
	pr_cont("ASCE.\n");
	dump_pagetable(asce, regs->int_parm_long & __FAIL_ADDR_MASK);
}

199 200 201
int show_unhandled_signals = 1;

void report_user_fault(struct pt_regs *regs, long signr, int is_mm_fault)
202 203 204 205 206 207 208
{
	if ((task_pid_nr(current) > 1) && !show_unhandled_signals)
		return;
	if (!unhandled_signal(current, signr))
		return;
	if (!printk_ratelimit())
		return;
209
	printk(KERN_ALERT "User process fault: interruption code %04x ilc:%d ",
210
	       regs->int_code & 0xffff, regs->int_code >> 17);
211
	print_vma_addr(KERN_CONT "in ", regs->psw.addr);
M
Martin Schwidefsky 已提交
212
	printk(KERN_CONT "\n");
213 214
	if (is_mm_fault)
		dump_fault_info(regs);
215 216 217
	show_regs(regs);
}

L
Linus Torvalds 已提交
218 219 220 221
/*
 * Send SIGSEGV to task.  This is an external routine
 * to keep the stack usage of do_page_fault small.
 */
M
Martin Schwidefsky 已提交
222
static noinline void do_sigsegv(struct pt_regs *regs, int si_code)
L
Linus Torvalds 已提交
223
{
224
	report_user_fault(regs, SIGSEGV, 1);
225
	force_sig_fault(SIGSEGV, si_code,
226
			(void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
L
Linus Torvalds 已提交
227 228
}

229 230 231 232 233 234 235 236 237 238 239 240
const struct exception_table_entry *s390_search_extables(unsigned long addr)
{
	const struct exception_table_entry *fixup;

	fixup = search_extable(__start_dma_ex_table,
			       __stop_dma_ex_table - __start_dma_ex_table,
			       addr);
	if (!fixup)
		fixup = search_exception_tables(addr);
	return fixup;
}

M
Martin Schwidefsky 已提交
241
static noinline void do_no_context(struct pt_regs *regs)
242 243 244 245
{
	const struct exception_table_entry *fixup;

	/* Are we prepared to handle this kernel fault?  */
246
	fixup = s390_search_extables(regs->psw.addr);
247
	if (fixup && ex_handle(fixup, regs))
248 249 250 251 252 253
		return;

	/*
	 * Oops. The kernel tried to access some bad page. We'll have to
	 * terminate things with extreme prejudice.
	 */
254
	if (get_fault_type(regs) == KERNEL_FAULT)
255
		printk(KERN_ALERT "Unable to handle kernel pointer dereference"
256
		       " in virtual kernel address space\n");
257 258
	else
		printk(KERN_ALERT "Unable to handle kernel paging request"
259 260
		       " in virtual user address space\n");
	dump_fault_info(regs);
M
Martin Schwidefsky 已提交
261
	die(regs, "Oops");
262 263 264
	do_exit(SIGKILL);
}

M
Martin Schwidefsky 已提交
265
static noinline void do_low_address(struct pt_regs *regs)
266 267 268 269 270
{
	/* Low-address protection hit in kernel mode means
	   NULL pointer write access in kernel mode.  */
	if (regs->psw.mask & PSW_MASK_PSTATE) {
		/* Low-address protection hit in user mode 'cannot happen'. */
M
Martin Schwidefsky 已提交
271
		die (regs, "Low-address protection");
272 273 274
		do_exit(SIGKILL);
	}

M
Martin Schwidefsky 已提交
275
	do_no_context(regs);
276 277
}

M
Martin Schwidefsky 已提交
278
static noinline void do_sigbus(struct pt_regs *regs)
279 280 281 282 283
{
	/*
	 * Send a sigbus, regardless of whether we were in kernel
	 * or user mode.
	 */
284
	force_sig_fault(SIGBUS, BUS_ADRERR,
285
			(void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
286 287
}

288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307
static noinline int signal_return(struct pt_regs *regs)
{
	u16 instruction;
	int rc;

	rc = __get_user(instruction, (u16 __user *) regs->psw.addr);
	if (rc)
		return rc;
	if (instruction == 0x0a77) {
		set_pt_regs_flag(regs, PIF_SYSCALL);
		regs->int_code = 0x00040077;
		return 0;
	} else if (instruction == 0x0aad) {
		set_pt_regs_flag(regs, PIF_SYSCALL);
		regs->int_code = 0x000400ad;
		return 0;
	}
	return -EACCES;
}

308 309
static noinline void do_fault_error(struct pt_regs *regs, int access,
					vm_fault_t fault)
310 311 312 313 314
{
	int si_code;

	switch (fault) {
	case VM_FAULT_BADACCESS:
315 316
		if (access == VM_EXEC && signal_return(regs) == 0)
			break;
J
Joe Perches 已提交
317
		fallthrough;
318 319
	case VM_FAULT_BADMAP:
		/* Bad memory access. Check if it is kernel or user space. */
320
		if (user_mode(regs)) {
321 322 323
			/* User mode accesses just cause a SIGSEGV */
			si_code = (fault == VM_FAULT_BADMAP) ?
				SEGV_MAPERR : SEGV_ACCERR;
M
Martin Schwidefsky 已提交
324
			do_sigsegv(regs, si_code);
325
			break;
326
		}
J
Joe Perches 已提交
327
		fallthrough;
328
	case VM_FAULT_BADCONTEXT:
329
	case VM_FAULT_PFAULT:
M
Martin Schwidefsky 已提交
330
		do_no_context(regs);
331
		break;
332 333 334 335
	case VM_FAULT_SIGNAL:
		if (!user_mode(regs))
			do_no_context(regs);
		break;
336
	default: /* fault & VM_FAULT_ERROR */
337
		if (fault & VM_FAULT_OOM) {
338
			if (!user_mode(regs))
M
Martin Schwidefsky 已提交
339
				do_no_context(regs);
340 341
			else
				pagefault_out_of_memory();
342 343 344 345 346 347
		} else if (fault & VM_FAULT_SIGSEGV) {
			/* Kernel mode? Handle exceptions or die */
			if (!user_mode(regs))
				do_no_context(regs);
			else
				do_sigsegv(regs, SEGV_MAPERR);
348
		} else if (fault & VM_FAULT_SIGBUS) {
349
			/* Kernel mode? Handle exceptions or die */
350
			if (!user_mode(regs))
M
Martin Schwidefsky 已提交
351
				do_no_context(regs);
M
Martin Schwidefsky 已提交
352
			else
M
Martin Schwidefsky 已提交
353
				do_sigbus(regs);
354 355 356 357 358 359
		} else
			BUG();
		break;
	}
}

L
Linus Torvalds 已提交
360 361 362 363 364
/*
 * This routine handles page faults.  It determines the address,
 * and the problem, and then passes it off to one of the appropriate
 * routines.
 *
365
 * interruption code (int_code):
H
Heiko Carstens 已提交
366
 *   04       Protection           ->  Write-Protection  (suppression)
L
Linus Torvalds 已提交
367 368 369 370
 *   10       Segment translation  ->  Not present       (nullification)
 *   11       Page translation     ->  Not present       (nullification)
 *   3b       Region third trans.  ->  Not present       (nullification)
 */
371
static inline vm_fault_t do_exception(struct pt_regs *regs, int access)
L
Linus Torvalds 已提交
372
{
373
	struct gmap *gmap;
374 375 376
	struct task_struct *tsk;
	struct mm_struct *mm;
	struct vm_area_struct *vma;
377
	enum fault_type type;
M
Martin Schwidefsky 已提交
378
	unsigned long trans_exc_code;
379
	unsigned long address;
380
	unsigned int flags;
381
	vm_fault_t fault;
L
Linus Torvalds 已提交
382

383 384 385 386 387
	tsk = current;
	/*
	 * The instruction that caused the program check has
	 * been nullified. Don't signal single step via SIGTRAP.
	 */
388
	clear_pt_regs_flag(regs, PIF_PER_TRAP);
389

390
	if (kprobe_page_fault(regs, 14))
391
		return 0;
M
Michael Grundy 已提交
392

393
	mm = tsk->mm;
M
Martin Schwidefsky 已提交
394
	trans_exc_code = regs->int_parm_long;
L
Linus Torvalds 已提交
395 396 397 398 399 400

	/*
	 * Verify that the fault happened in user space, that
	 * we are not in an interrupt and that there is a 
	 * user context.
	 */
401
	fault = VM_FAULT_BADCONTEXT;
402 403 404 405 406 407 408 409 410 411
	type = get_fault_type(regs);
	switch (type) {
	case KERNEL_FAULT:
		goto out;
	case USER_FAULT:
	case GMAP_FAULT:
		if (faulthandler_disabled() || !mm)
			goto out;
		break;
	}
L
Linus Torvalds 已提交
412

413
	address = trans_exc_code & __FAIL_ADDR_MASK;
414
	perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
P
Peter Xu 已提交
415
	flags = FAULT_FLAG_DEFAULT;
416 417
	if (user_mode(regs))
		flags |= FAULT_FLAG_USER;
418 419
	if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400)
		flags |= FAULT_FLAG_WRITE;
420
	mmap_read_lock(mm);
L
Linus Torvalds 已提交
421

422 423 424
	gmap = NULL;
	if (IS_ENABLED(CONFIG_PGSTE) && type == GMAP_FAULT) {
		gmap = (struct gmap *) S390_lowcore.gmap;
425
		current->thread.gmap_addr = address;
426
		current->thread.gmap_write_flag = !!(flags & FAULT_FLAG_WRITE);
427
		current->thread.gmap_int_code = regs->int_code & 0xffff;
428
		address = __gmap_translate(gmap, address);
429 430 431 432
		if (address == -EFAULT) {
			fault = VM_FAULT_BADMAP;
			goto out_up;
		}
433 434
		if (gmap->pfault_enabled)
			flags |= FAULT_FLAG_RETRY_NOWAIT;
435 436 437
	}

retry:
438
	fault = VM_FAULT_BADMAP;
439 440
	vma = find_vma(mm, address);
	if (!vma)
441
		goto out_up;
G
Gerald Schaefer 已提交
442

443 444 445 446 447 448 449 450 451 452 453 454
	if (unlikely(vma->vm_start > address)) {
		if (!(vma->vm_flags & VM_GROWSDOWN))
			goto out_up;
		if (expand_stack(vma, address))
			goto out_up;
	}

	/*
	 * Ok, we have a good vm_area for this memory access, so
	 * we can handle it..
	 */
	fault = VM_FAULT_BADACCESS;
455
	if (unlikely(!(vma->vm_flags & access)))
456
		goto out_up;
L
Linus Torvalds 已提交
457

458 459
	if (is_vm_hugetlb_page(vma))
		address &= HPAGE_MASK;
L
Linus Torvalds 已提交
460 461 462 463 464
	/*
	 * If for any reason at all we couldn't handle the fault,
	 * make sure we exit gracefully rather than endlessly redo
	 * the fault.
	 */
465
	fault = handle_mm_fault(vma, address, flags, regs);
P
Peter Xu 已提交
466
	if (fault_signal_pending(fault, regs)) {
467
		fault = VM_FAULT_SIGNAL;
468 469
		if (flags & FAULT_FLAG_RETRY_NOWAIT)
			goto out_up;
470 471
		goto out;
	}
472 473 474
	if (unlikely(fault & VM_FAULT_ERROR))
		goto out_up;

475 476
	if (flags & FAULT_FLAG_ALLOW_RETRY) {
		if (fault & VM_FAULT_RETRY) {
477 478
			if (IS_ENABLED(CONFIG_PGSTE) && gmap &&
			    (flags & FAULT_FLAG_RETRY_NOWAIT)) {
479
				/* FAULT_FLAG_RETRY_NOWAIT has been set,
480
				 * mmap_lock has not been released */
481 482 483 484
				current->thread.gmap_pfault = 1;
				fault = VM_FAULT_PFAULT;
				goto out_up;
			}
485
			flags &= ~FAULT_FLAG_RETRY_NOWAIT;
486
			flags |= FAULT_FLAG_TRIED;
487
			mmap_read_lock(mm);
488 489
			goto retry;
		}
490
	}
491
	if (IS_ENABLED(CONFIG_PGSTE) && gmap) {
492 493 494 495 496 497 498 499 500 501 502
		address =  __gmap_link(gmap, current->thread.gmap_addr,
				       address);
		if (address == -EFAULT) {
			fault = VM_FAULT_BADMAP;
			goto out_up;
		}
		if (address == -ENOMEM) {
			fault = VM_FAULT_OOM;
			goto out_up;
		}
	}
503 504
	fault = 0;
out_up:
505
	mmap_read_unlock(mm);
506 507
out:
	return fault;
L
Linus Torvalds 已提交
508 509
}

510
void do_protection_exception(struct pt_regs *regs)
L
Linus Torvalds 已提交
511
{
M
Martin Schwidefsky 已提交
512
	unsigned long trans_exc_code;
513 514
	int access;
	vm_fault_t fault;
515

M
Martin Schwidefsky 已提交
516
	trans_exc_code = regs->int_parm_long;
517 518 519 520 521 522 523
	/*
	 * Protection exceptions are suppressing, decrement psw address.
	 * The exception to this rule are aborted transactions, for these
	 * the PSW already points to the correct location.
	 */
	if (!(regs->int_code & 0x200))
		regs->psw.addr = __rewind_psw(regs->psw, regs->int_code >> 16);
524 525 526 527 528
	/*
	 * Check for low-address protection.  This needs to be treated
	 * as a special case because the translation exception code
	 * field is not guaranteed to contain valid data in this case.
	 */
529
	if (unlikely(!(trans_exc_code & 4))) {
M
Martin Schwidefsky 已提交
530
		do_low_address(regs);
531 532
		return;
	}
533 534 535 536 537 538 539 540 541
	if (unlikely(MACHINE_HAS_NX && (trans_exc_code & 0x80))) {
		regs->int_parm_long = (trans_exc_code & ~PAGE_MASK) |
					(regs->psw.addr & PAGE_MASK);
		access = VM_EXEC;
		fault = VM_FAULT_BADACCESS;
	} else {
		access = VM_WRITE;
		fault = do_exception(regs, access);
	}
542
	if (unlikely(fault))
543
		do_fault_error(regs, access, fault);
L
Linus Torvalds 已提交
544
}
545
NOKPROBE_SYMBOL(do_protection_exception);
L
Linus Torvalds 已提交
546

547
void do_dat_exception(struct pt_regs *regs)
L
Linus Torvalds 已提交
548
{
549 550
	int access;
	vm_fault_t fault;
551

552
	access = VM_ACCESS_FLAGS;
M
Martin Schwidefsky 已提交
553
	fault = do_exception(regs, access);
554
	if (unlikely(fault))
555
		do_fault_error(regs, access, fault);
L
Linus Torvalds 已提交
556
}
557
NOKPROBE_SYMBOL(do_dat_exception);
L
Linus Torvalds 已提交
558 559 560 561 562

#ifdef CONFIG_PFAULT 
/*
 * 'pfault' pseudo page faults routines.
 */
563
static int pfault_disable;
L
Linus Torvalds 已提交
564 565 566 567 568 569 570 571 572

static int __init nopfault(char *str)
{
	pfault_disable = 1;
	return 1;
}

__setup("nopfault", nopfault);

H
Heiko Carstens 已提交
573 574 575 576 577 578 579 580 581 582
struct pfault_refbk {
	u16 refdiagc;
	u16 reffcode;
	u16 refdwlen;
	u16 refversn;
	u64 refgaddr;
	u64 refselmk;
	u64 refcmpmk;
	u64 reserved;
} __attribute__ ((packed, aligned(8)));
L
Linus Torvalds 已提交
583

584 585 586 587 588 589 590 591 592 593 594
static struct pfault_refbk pfault_init_refbk = {
	.refdiagc = 0x258,
	.reffcode = 0,
	.refdwlen = 5,
	.refversn = 2,
	.refgaddr = __LC_LPP,
	.refselmk = 1ULL << 48,
	.refcmpmk = 1ULL << 48,
	.reserved = __PF_RES_FIELD
};

L
Linus Torvalds 已提交
595 596 597 598
int pfault_init(void)
{
        int rc;

599
	if (pfault_disable)
L
Linus Torvalds 已提交
600
		return -1;
601
	diag_stat_inc(DIAG_STAT_X258);
602 603 604 605
	asm volatile(
		"	diag	%1,%0,0x258\n"
		"0:	j	2f\n"
		"1:	la	%0,8\n"
L
Linus Torvalds 已提交
606
		"2:\n"
607
		EX_TABLE(0b,1b)
608 609
		: "=d" (rc)
		: "a" (&pfault_init_refbk), "m" (pfault_init_refbk) : "cc");
L
Linus Torvalds 已提交
610 611 612
        return rc;
}

613 614 615 616 617 618 619
static struct pfault_refbk pfault_fini_refbk = {
	.refdiagc = 0x258,
	.reffcode = 1,
	.refdwlen = 5,
	.refversn = 2,
};

L
Linus Torvalds 已提交
620 621 622
void pfault_fini(void)
{

623
	if (pfault_disable)
L
Linus Torvalds 已提交
624
		return;
625
	diag_stat_inc(DIAG_STAT_X258);
626 627
	asm volatile(
		"	diag	%0,0,0x258\n"
H
Heiko Carstens 已提交
628
		"0:	nopr	%%r7\n"
629
		EX_TABLE(0b,0b)
630
		: : "a" (&pfault_fini_refbk), "m" (pfault_fini_refbk) : "cc");
L
Linus Torvalds 已提交
631 632
}

633 634 635
static DEFINE_SPINLOCK(pfault_lock);
static LIST_HEAD(pfault_list);

636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658
#define PF_COMPLETE	0x0080

/*
 * The mechanism of our pfault code: if Linux is running as guest, runs a user
 * space process and the user space process accesses a page that the host has
 * paged out we get a pfault interrupt.
 *
 * This allows us, within the guest, to schedule a different process. Without
 * this mechanism the host would have to suspend the whole virtual cpu until
 * the page has been paged in.
 *
 * So when we get such an interrupt then we set the state of the current task
 * to uninterruptible and also set the need_resched flag. Both happens within
 * interrupt context(!). If we later on want to return to user space we
 * recognize the need_resched flag and then call schedule().  It's not very
 * obvious how this works...
 *
 * Of course we have a lot of additional fun with the completion interrupt (->
 * host signals that a page of a process has been paged in and the process can
 * continue to run). This interrupt can arrive on any cpu and, since we have
 * virtual cpus, actually appear before the interrupt that signals that a page
 * is missing.
 */
659
static void pfault_interrupt(struct ext_code ext_code,
660
			     unsigned int param32, unsigned long param64)
L
Linus Torvalds 已提交
661 662 663
{
	struct task_struct *tsk;
	__u16 subcode;
664
	pid_t pid;
L
Linus Torvalds 已提交
665 666

	/*
667 668 669
	 * Get the external interruption subcode & pfault initial/completion
	 * signal bit. VM stores this in the 'cpu address' field associated
	 * with the external interrupt.
L
Linus Torvalds 已提交
670
	 */
671
	subcode = ext_code.subcode;
L
Linus Torvalds 已提交
672 673
	if ((subcode & 0xff00) != __SUBCODE_MASK)
		return;
674
	inc_irq_stat(IRQEXT_PFL);
675
	/* Get the token (= pid of the affected task). */
676
	pid = param64 & LPP_PID_MASK;
677 678 679 680 681 682 683
	rcu_read_lock();
	tsk = find_task_by_pid_ns(pid, &init_pid_ns);
	if (tsk)
		get_task_struct(tsk);
	rcu_read_unlock();
	if (!tsk)
		return;
684
	spin_lock(&pfault_lock);
685
	if (subcode & PF_COMPLETE) {
L
Linus Torvalds 已提交
686
		/* signal bit is set -> a page has been swapped in by VM */
687
		if (tsk->thread.pfault_wait == 1) {
L
Linus Torvalds 已提交
688 689 690 691
			/* Initial interrupt was faster than the completion
			 * interrupt. pfault_wait is valid. Set pfault_wait
			 * back to zero and wake up the process. This can
			 * safely be done because the task is still sleeping
692
			 * and can't produce new pfaults. */
L
Linus Torvalds 已提交
693
			tsk->thread.pfault_wait = 0;
694
			list_del(&tsk->thread.list);
L
Linus Torvalds 已提交
695
			wake_up_process(tsk);
696
			put_task_struct(tsk);
697 698 699
		} else {
			/* Completion interrupt was faster than initial
			 * interrupt. Set pfault_wait to -1 so the initial
700 701 702 703 704 705 706
			 * interrupt doesn't put the task to sleep.
			 * If the task is not running, ignore the completion
			 * interrupt since it must be a leftover of a PFAULT
			 * CANCEL operation which didn't remove all pending
			 * completion interrupts. */
			if (tsk->state == TASK_RUNNING)
				tsk->thread.pfault_wait = -1;
L
Linus Torvalds 已提交
707 708 709
		}
	} else {
		/* signal bit not set -> a real page is missing. */
H
Heiko Carstens 已提交
710 711
		if (WARN_ON_ONCE(tsk != current))
			goto out;
712 713
		if (tsk->thread.pfault_wait == 1) {
			/* Already on the list with a reference: put to sleep */
714
			goto block;
715
		} else if (tsk->thread.pfault_wait == -1) {
L
Linus Torvalds 已提交
716
			/* Completion interrupt was faster than the initial
717 718
			 * interrupt (pfault_wait == -1). Set pfault_wait
			 * back to zero and exit. */
L
Linus Torvalds 已提交
719
			tsk->thread.pfault_wait = 0;
720 721
		} else {
			/* Initial interrupt arrived before completion
722 723 724 725 726
			 * interrupt. Let the task sleep.
			 * An extra task reference is needed since a different
			 * cpu may set the task state to TASK_RUNNING again
			 * before the scheduler is reached. */
			get_task_struct(tsk);
727 728
			tsk->thread.pfault_wait = 1;
			list_add(&tsk->thread.list, &pfault_list);
729 730 731 732 733
block:
			/* Since this must be a userspace fault, there
			 * is no kernel task state to trample. Rely on the
			 * return to userspace schedule() to block. */
			__set_current_state(TASK_UNINTERRUPTIBLE);
L
Linus Torvalds 已提交
734
			set_tsk_need_resched(tsk);
735
			set_preempt_need_resched();
736 737
		}
	}
H
Heiko Carstens 已提交
738
out:
739
	spin_unlock(&pfault_lock);
740
	put_task_struct(tsk);
741 742
}

743
static int pfault_cpu_dead(unsigned int cpu)
744 745 746 747
{
	struct thread_struct *thread, *next;
	struct task_struct *tsk;

748 749 750 751 752 753 754
	spin_lock_irq(&pfault_lock);
	list_for_each_entry_safe(thread, next, &pfault_list, list) {
		thread->pfault_wait = 0;
		list_del(&thread->list);
		tsk = container_of(thread, struct task_struct, thread);
		wake_up_process(tsk);
		put_task_struct(tsk);
L
Linus Torvalds 已提交
755
	}
756 757
	spin_unlock_irq(&pfault_lock);
	return 0;
L
Linus Torvalds 已提交
758 759
}

760
static int __init pfault_irq_init(void)
H
Heiko Carstens 已提交
761
{
762
	int rc;
H
Heiko Carstens 已提交
763

764
	rc = register_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
H
Heiko Carstens 已提交
765 766 767 768 769
	if (rc)
		goto out_extint;
	rc = pfault_init() == 0 ? 0 : -EOPNOTSUPP;
	if (rc)
		goto out_pfault;
770
	irq_subclass_register(IRQ_SUBCLASS_SERVICE_SIGNAL);
771 772
	cpuhp_setup_state_nocalls(CPUHP_S390_PFAULT_DEAD, "s390/pfault:dead",
				  NULL, pfault_cpu_dead);
H
Heiko Carstens 已提交
773
	return 0;
H
Heiko Carstens 已提交
774

H
Heiko Carstens 已提交
775
out_pfault:
776
	unregister_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
H
Heiko Carstens 已提交
777 778 779
out_extint:
	pfault_disable = 1;
	return rc;
H
Heiko Carstens 已提交
780
}
781 782
early_initcall(pfault_irq_init);

H
Heiko Carstens 已提交
783
#endif /* CONFIG_PFAULT */
784 785 786 787 788 789 790 791 792 793 794 795 796

#if IS_ENABLED(CONFIG_PGSTE)
void do_secure_storage_access(struct pt_regs *regs)
{
	unsigned long addr = regs->int_parm_long & __FAIL_ADDR_MASK;
	struct vm_area_struct *vma;
	struct mm_struct *mm;
	struct page *page;
	int rc;

	switch (get_fault_type(regs)) {
	case USER_FAULT:
		mm = current->mm;
797
		mmap_read_lock(mm);
798 799
		vma = find_vma(mm, addr);
		if (!vma) {
800
			mmap_read_unlock(mm);
801 802 803 804 805
			do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
			break;
		}
		page = follow_page(vma, addr, FOLL_WRITE | FOLL_GET);
		if (IS_ERR_OR_NULL(page)) {
806
			mmap_read_unlock(mm);
807 808 809 810 811
			break;
		}
		if (arch_make_page_accessible(page))
			send_sig(SIGSEGV, current, 0);
		put_page(page);
812
		mmap_read_unlock(mm);
813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846
		break;
	case KERNEL_FAULT:
		page = phys_to_page(addr);
		if (unlikely(!try_get_page(page)))
			break;
		rc = arch_make_page_accessible(page);
		put_page(page);
		if (rc)
			BUG();
		break;
	case GMAP_FAULT:
	default:
		do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
		WARN_ON_ONCE(1);
	}
}
NOKPROBE_SYMBOL(do_secure_storage_access);

void do_non_secure_storage_access(struct pt_regs *regs)
{
	unsigned long gaddr = regs->int_parm_long & __FAIL_ADDR_MASK;
	struct gmap *gmap = (struct gmap *)S390_lowcore.gmap;

	if (get_fault_type(regs) != GMAP_FAULT) {
		do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
		WARN_ON_ONCE(1);
		return;
	}

	if (gmap_convert_to_secure(gmap, gaddr) == -EINVAL)
		send_sig(SIGSEGV, current, 0);
}
NOKPROBE_SYMBOL(do_non_secure_storage_access);

847 848 849 850 851 852 853 854 855 856 857 858 859 860 861
void do_secure_storage_violation(struct pt_regs *regs)
{
	/*
	 * Either KVM messed up the secure guest mapping or the same
	 * page is mapped into multiple secure guests.
	 *
	 * This exception is only triggered when a guest 2 is running
	 * and can therefore never occur in kernel context.
	 */
	printk_ratelimited(KERN_WARNING
			   "Secure storage violation in task: %s, pid %d\n",
			   current->comm, current->pid);
	send_sig(SIGSEGV, current, 0);
}

862 863 864 865 866 867 868 869 870 871
#else
void do_secure_storage_access(struct pt_regs *regs)
{
	default_trap_handler(regs);
}

void do_non_secure_storage_access(struct pt_regs *regs)
{
	default_trap_handler(regs);
}
872 873 874 875 876

void do_secure_storage_violation(struct pt_regs *regs)
{
	default_trap_handler(regs);
}
877
#endif