blob: aebf9183bedd15a36fce4c315b0eca1169cfbb9d [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * S390 version
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 1999
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 * Author(s): Hartmut Penner (hp@de.ibm.com)
6 * Ulrich Weigand (uweigand@de.ibm.com)
7 *
8 * Derived from "arch/i386/mm/fault.c"
9 * Copyright (C) 1995 Linus Torvalds
10 */
11
Heiko Carstens052ff462011-01-05 12:47:28 +010012#include <linux/kernel_stat.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020013#include <linux/perf_event.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/signal.h>
15#include <linux/sched.h>
Ingo Molnarb17b0152017-02-08 18:51:35 +010016#include <linux/sched/debug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/kernel.h>
18#include <linux/errno.h>
19#include <linux/string.h>
20#include <linux/types.h>
21#include <linux/ptrace.h>
22#include <linux/mman.h>
23#include <linux/mm.h>
Heiko Carstens77575912009-06-12 10:26:25 +020024#include <linux/compat.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#include <linux/smp.h>
Christoph Hellwig1eeb66a2007-05-08 00:27:03 -070026#include <linux/kdebug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/init.h>
28#include <linux/console.h>
Paul Gortmakerdcc096c2016-09-19 17:54:56 -040029#include <linux/extable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/hardirq.h>
Michael Grundy4ba069b2006-09-20 15:58:39 +020031#include <linux/kprobes.h>
Martin Schwidefskybe5ec362007-04-27 16:01:44 +020032#include <linux/uaccess.h>
Gerald Schaefer53492b12008-04-30 13:38:46 +020033#include <linux/hugetlb.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010034#include <asm/asm-offsets.h>
Martin Schwidefsky1ec27722015-08-20 17:28:44 +020035#include <asm/diag.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010036#include <asm/gmap.h>
Heiko Carstensd7b250e2011-05-26 09:48:24 +020037#include <asm/irq.h>
Martin Schwidefsky6252d702008-02-09 18:24:37 +010038#include <asm/mmu_context.h>
David Howellsa0616cd2012-03-28 18:30:02 +010039#include <asm/facility.h>
Vasily Gorbik084ea4d2020-01-21 09:43:10 +010040#include <asm/uv.h>
Heiko Carstensa8061702008-04-17 07:46:26 +020041#include "../kernel/entry.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
Linus Torvalds1da177e2005-04-16 15:20:36 -070043#define __FAIL_ADDR_MASK -4096L
Linus Torvalds1da177e2005-04-16 15:20:36 -070044#define __SUBCODE_MASK 0x0600
45#define __PF_RES_FIELD 0x8000000000000000ULL
Linus Torvalds1da177e2005-04-16 15:20:36 -070046
Christian Borntraeger12437752020-02-27 14:42:29 +010047#define VM_FAULT_BADCONTEXT ((__force vm_fault_t) 0x010000)
48#define VM_FAULT_BADMAP ((__force vm_fault_t) 0x020000)
49#define VM_FAULT_BADACCESS ((__force vm_fault_t) 0x040000)
50#define VM_FAULT_SIGNAL ((__force vm_fault_t) 0x080000)
51#define VM_FAULT_PFAULT ((__force vm_fault_t) 0x100000)
Martin Schwidefsky50d72802009-12-07 12:51:45 +010052
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020053enum fault_type {
54 KERNEL_FAULT,
55 USER_FAULT,
56 VDSO_FAULT,
57 GMAP_FAULT,
58};
59
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010060static unsigned long store_indication __read_mostly;
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020061
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010062static int __init fault_init(void)
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020063{
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010064 if (test_facility(75))
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020065 store_indication = 0xc00;
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010066 return 0;
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020067}
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010068early_initcall(fault_init);
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020069
Linus Torvalds1da177e2005-04-16 15:20:36 -070070/*
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020071 * Find out which address space caused the exception.
Linus Torvalds1da177e2005-04-16 15:20:36 -070072 */
Masahiro Yamadabf2f1ee2019-05-17 15:49:22 +090073static enum fault_type get_fault_type(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -070074{
Heiko Carstens457f2182014-03-21 10:42:25 +010075 unsigned long trans_exc_code;
76
Heiko Carstens457f2182014-03-21 10:42:25 +010077 trans_exc_code = regs->int_parm_long & 3;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020078 if (likely(trans_exc_code == 0)) {
79 /* primary space exception */
80 if (IS_ENABLED(CONFIG_PGSTE) &&
81 test_pt_regs_flag(regs, PIF_GUEST_FAULT))
82 return GMAP_FAULT;
83 if (current->thread.mm_segment == USER_DS)
84 return USER_FAULT;
85 return KERNEL_FAULT;
86 }
87 if (trans_exc_code == 2) {
88 /* secondary space exception */
89 if (current->thread.mm_segment & 1) {
90 if (current->thread.mm_segment == USER_DS_SACF)
91 return USER_FAULT;
92 return KERNEL_FAULT;
93 }
94 return VDSO_FAULT;
95 }
Gerald Schaefer962f0af2019-05-27 18:40:19 +020096 if (trans_exc_code == 1) {
97 /* access register mode, not used in the kernel */
98 return USER_FAULT;
99 }
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200100 /* home space exception -> access via kernel ASCE */
101 return KERNEL_FAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102}
103
Heiko Carstens3b7df342014-04-07 10:20:40 +0200104static int bad_address(void *p)
105{
106 unsigned long dummy;
107
Christoph Hellwig25f12ae2020-06-17 09:37:55 +0200108 return get_kernel_nofault(dummy, (unsigned long *)p);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200109}
110
Heiko Carstens3b7df342014-04-07 10:20:40 +0200111static void dump_pagetable(unsigned long asce, unsigned long address)
112{
Heiko Carstensfe7b2742017-05-22 13:16:00 +0200113 unsigned long *table = __va(asce & _ASCE_ORIGIN);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200114
115 pr_alert("AS:%016lx ", asce);
116 switch (asce & _ASCE_TYPE_MASK) {
117 case _ASCE_TYPE_REGION1:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200118 table += (address & _REGION1_INDEX) >> _REGION1_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200119 if (bad_address(table))
120 goto bad;
121 pr_cont("R1:%016lx ", *table);
122 if (*table & _REGION_ENTRY_INVALID)
123 goto out;
124 table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700125 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200126 case _ASCE_TYPE_REGION2:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200127 table += (address & _REGION2_INDEX) >> _REGION2_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200128 if (bad_address(table))
129 goto bad;
130 pr_cont("R2:%016lx ", *table);
131 if (*table & _REGION_ENTRY_INVALID)
132 goto out;
133 table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700134 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200135 case _ASCE_TYPE_REGION3:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200136 table += (address & _REGION3_INDEX) >> _REGION3_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200137 if (bad_address(table))
138 goto bad;
139 pr_cont("R3:%016lx ", *table);
140 if (*table & (_REGION_ENTRY_INVALID | _REGION3_ENTRY_LARGE))
141 goto out;
142 table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700143 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200144 case _ASCE_TYPE_SEGMENT:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200145 table += (address & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200146 if (bad_address(table))
147 goto bad;
Joe Perches91c08372015-01-05 04:29:18 -0800148 pr_cont("S:%016lx ", *table);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200149 if (*table & (_SEGMENT_ENTRY_INVALID | _SEGMENT_ENTRY_LARGE))
150 goto out;
151 table = (unsigned long *)(*table & _SEGMENT_ENTRY_ORIGIN);
152 }
Heiko Carstensf1c11742017-07-05 07:37:27 +0200153 table += (address & _PAGE_INDEX) >> _PAGE_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200154 if (bad_address(table))
155 goto bad;
156 pr_cont("P:%016lx ", *table);
157out:
158 pr_cont("\n");
159 return;
160bad:
161 pr_cont("BAD\n");
162}
163
Heiko Carstens3b7df342014-04-07 10:20:40 +0200164static void dump_fault_info(struct pt_regs *regs)
165{
166 unsigned long asce;
167
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100168 pr_alert("Failing address: %016lx TEID: %016lx\n",
169 regs->int_parm_long & __FAIL_ADDR_MASK, regs->int_parm_long);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200170 pr_alert("Fault in ");
171 switch (regs->int_parm_long & 3) {
172 case 3:
173 pr_cont("home space ");
174 break;
175 case 2:
176 pr_cont("secondary space ");
177 break;
178 case 1:
179 pr_cont("access register ");
180 break;
181 case 0:
182 pr_cont("primary space ");
183 break;
184 }
185 pr_cont("mode while using ");
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200186 switch (get_fault_type(regs)) {
187 case USER_FAULT:
Heiko Carstens3b7df342014-04-07 10:20:40 +0200188 asce = S390_lowcore.user_asce;
189 pr_cont("user ");
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200190 break;
191 case VDSO_FAULT:
192 asce = S390_lowcore.vdso_asce;
193 pr_cont("vdso ");
194 break;
195 case GMAP_FAULT:
196 asce = ((struct gmap *) S390_lowcore.gmap)->asce;
197 pr_cont("gmap ");
198 break;
199 case KERNEL_FAULT:
200 asce = S390_lowcore.kernel_asce;
201 pr_cont("kernel ");
202 break;
Masahiro Yamadabf2f1ee2019-05-17 15:49:22 +0900203 default:
204 unreachable();
Heiko Carstens3b7df342014-04-07 10:20:40 +0200205 }
206 pr_cont("ASCE.\n");
207 dump_pagetable(asce, regs->int_parm_long & __FAIL_ADDR_MASK);
208}
209
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100210int show_unhandled_signals = 1;
211
212void report_user_fault(struct pt_regs *regs, long signr, int is_mm_fault)
Heiko Carstensab3c68e2010-05-17 10:00:21 +0200213{
214 if ((task_pid_nr(current) > 1) && !show_unhandled_signals)
215 return;
216 if (!unhandled_signal(current, signr))
217 return;
218 if (!printk_ratelimit())
219 return;
Hendrik Bruecknerdb1177ee2015-01-29 14:38:38 +0100220 printk(KERN_ALERT "User process fault: interruption code %04x ilc:%d ",
Heiko Carstens413d4042014-11-19 13:31:08 +0100221 regs->int_code & 0xffff, regs->int_code >> 17);
Heiko Carstens9cb1cce2016-01-18 13:12:19 +0100222 print_vma_addr(KERN_CONT "in ", regs->psw.addr);
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100223 printk(KERN_CONT "\n");
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100224 if (is_mm_fault)
225 dump_fault_info(regs);
Heiko Carstensab3c68e2010-05-17 10:00:21 +0200226 show_regs(regs);
227}
228
Linus Torvalds1da177e2005-04-16 15:20:36 -0700229/*
230 * Send SIGSEGV to task. This is an external routine
231 * to keep the stack usage of do_page_fault small.
232 */
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100233static noinline void do_sigsegv(struct pt_regs *regs, int si_code)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700234{
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100235 report_user_fault(regs, SIGSEGV, 1);
Eric W. Biederman9507a5d2018-04-15 19:58:32 -0500236 force_sig_fault(SIGSEGV, si_code,
Eric W. Biederman2e1661d22019-05-23 11:04:24 -0500237 (void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700238}
239
Gerald Schaefera80313f2019-02-03 21:37:20 +0100240const struct exception_table_entry *s390_search_extables(unsigned long addr)
241{
242 const struct exception_table_entry *fixup;
243
244 fixup = search_extable(__start_dma_ex_table,
245 __stop_dma_ex_table - __start_dma_ex_table,
246 addr);
247 if (!fixup)
248 fixup = search_exception_tables(addr);
249 return fixup;
250}
251
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100252static noinline void do_no_context(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200253{
254 const struct exception_table_entry *fixup;
255
256 /* Are we prepared to handle this kernel fault? */
Gerald Schaefera80313f2019-02-03 21:37:20 +0100257 fixup = s390_search_extables(regs->psw.addr);
Ilya Leoshkevich05a68e82020-06-30 20:52:03 +0200258 if (fixup && ex_handle(fixup, regs))
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200259 return;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200260
261 /*
262 * Oops. The kernel tried to access some bad page. We'll have to
263 * terminate things with extreme prejudice.
264 */
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200265 if (get_fault_type(regs) == KERNEL_FAULT)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200266 printk(KERN_ALERT "Unable to handle kernel pointer dereference"
Heiko Carstens3b7df342014-04-07 10:20:40 +0200267 " in virtual kernel address space\n");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200268 else
269 printk(KERN_ALERT "Unable to handle kernel paging request"
Heiko Carstens3b7df342014-04-07 10:20:40 +0200270 " in virtual user address space\n");
Heiko Carstens3b7df342014-04-07 10:20:40 +0200271 dump_fault_info(regs);
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100272 die(regs, "Oops");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200273 do_exit(SIGKILL);
274}
275
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100276static noinline void do_low_address(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200277{
278 /* Low-address protection hit in kernel mode means
279 NULL pointer write access in kernel mode. */
280 if (regs->psw.mask & PSW_MASK_PSTATE) {
281 /* Low-address protection hit in user mode 'cannot happen'. */
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100282 die (regs, "Low-address protection");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200283 do_exit(SIGKILL);
284 }
285
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100286 do_no_context(regs);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200287}
288
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100289static noinline void do_sigbus(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200290{
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200291 /*
292 * Send a sigbus, regardless of whether we were in kernel
293 * or user mode.
294 */
Eric W. Biederman9507a5d2018-04-15 19:58:32 -0500295 force_sig_fault(SIGBUS, BUS_ADRERR,
Eric W. Biederman2e1661d22019-05-23 11:04:24 -0500296 (void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200297}
298
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100299static noinline int signal_return(struct pt_regs *regs)
300{
301 u16 instruction;
302 int rc;
303
304 rc = __get_user(instruction, (u16 __user *) regs->psw.addr);
305 if (rc)
306 return rc;
307 if (instruction == 0x0a77) {
308 set_pt_regs_flag(regs, PIF_SYSCALL);
309 regs->int_code = 0x00040077;
310 return 0;
311 } else if (instruction == 0x0aad) {
312 set_pt_regs_flag(regs, PIF_SYSCALL);
313 regs->int_code = 0x000400ad;
314 return 0;
315 }
316 return -EACCES;
317}
318
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700319static noinline void do_fault_error(struct pt_regs *regs, int access,
320 vm_fault_t fault)
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100321{
322 int si_code;
323
324 switch (fault) {
325 case VM_FAULT_BADACCESS:
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100326 if (access == VM_EXEC && signal_return(regs) == 0)
327 break;
Joe Perches2c7749b2020-03-10 13:47:30 -0700328 fallthrough;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100329 case VM_FAULT_BADMAP:
330 /* Bad memory access. Check if it is kernel or user space. */
Heiko Carstens7d256172012-07-27 10:31:12 +0200331 if (user_mode(regs)) {
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100332 /* User mode accesses just cause a SIGSEGV */
333 si_code = (fault == VM_FAULT_BADMAP) ?
334 SEGV_MAPERR : SEGV_ACCERR;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100335 do_sigsegv(regs, si_code);
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100336 break;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100337 }
Joe Perches2c7749b2020-03-10 13:47:30 -0700338 fallthrough;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100339 case VM_FAULT_BADCONTEXT:
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200340 case VM_FAULT_PFAULT:
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100341 do_no_context(regs);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100342 break;
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200343 case VM_FAULT_SIGNAL:
344 if (!user_mode(regs))
345 do_no_context(regs);
346 break;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100347 default: /* fault & VM_FAULT_ERROR */
Heiko Carstens99583182011-05-26 09:48:29 +0200348 if (fault & VM_FAULT_OOM) {
Heiko Carstens7d256172012-07-27 10:31:12 +0200349 if (!user_mode(regs))
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100350 do_no_context(regs);
Heiko Carstens99583182011-05-26 09:48:29 +0200351 else
352 pagefault_out_of_memory();
Linus Torvalds33692f22015-01-29 10:51:32 -0800353 } else if (fault & VM_FAULT_SIGSEGV) {
354 /* Kernel mode? Handle exceptions or die */
355 if (!user_mode(regs))
356 do_no_context(regs);
357 else
358 do_sigsegv(regs, SEGV_MAPERR);
Heiko Carstens99583182011-05-26 09:48:29 +0200359 } else if (fault & VM_FAULT_SIGBUS) {
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100360 /* Kernel mode? Handle exceptions or die */
Heiko Carstens7d256172012-07-27 10:31:12 +0200361 if (!user_mode(regs))
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100362 do_no_context(regs);
Martin Schwidefsky36bf9682010-10-25 16:10:35 +0200363 else
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100364 do_sigbus(regs);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100365 } else
366 BUG();
367 break;
368 }
369}
370
Linus Torvalds1da177e2005-04-16 15:20:36 -0700371/*
372 * This routine handles page faults. It determines the address,
373 * and the problem, and then passes it off to one of the appropriate
374 * routines.
375 *
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100376 * interruption code (int_code):
Heiko Carstens7904aaa2020-07-14 07:43:26 +0200377 * 04 Protection -> Write-Protection (suppression)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378 * 10 Segment translation -> Not present (nullification)
379 * 11 Page translation -> Not present (nullification)
380 * 3b Region third trans. -> Not present (nullification)
381 */
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700382static inline vm_fault_t do_exception(struct pt_regs *regs, int access)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700383{
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200384 struct gmap *gmap;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200385 struct task_struct *tsk;
386 struct mm_struct *mm;
387 struct vm_area_struct *vma;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200388 enum fault_type type;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100389 unsigned long trans_exc_code;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200390 unsigned long address;
Heiko Carstens33ce6142011-05-26 09:48:30 +0200391 unsigned int flags;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700392 vm_fault_t fault;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393
Martin Schwidefsky39efd4e2012-11-21 16:36:27 +0100394 tsk = current;
395 /*
396 * The instruction that caused the program check has
397 * been nullified. Don't signal single step via SIGTRAP.
398 */
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +0200399 clear_pt_regs_flag(regs, PIF_PER_TRAP);
Martin Schwidefsky39efd4e2012-11-21 16:36:27 +0100400
Anshuman Khandualb98cca42019-07-16 16:28:00 -0700401 if (kprobe_page_fault(regs, 14))
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100402 return 0;
Michael Grundy4ba069b2006-09-20 15:58:39 +0200403
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200404 mm = tsk->mm;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100405 trans_exc_code = regs->int_parm_long;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700406
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407 /*
408 * Verify that the fault happened in user space, that
409 * we are not in an interrupt and that there is a
410 * user context.
411 */
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100412 fault = VM_FAULT_BADCONTEXT;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200413 type = get_fault_type(regs);
414 switch (type) {
415 case KERNEL_FAULT:
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100416 goto out;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200417 case VDSO_FAULT:
418 fault = VM_FAULT_BADMAP;
419 goto out;
420 case USER_FAULT:
421 case GMAP_FAULT:
422 if (faulthandler_disabled() || !mm)
423 goto out;
424 break;
425 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700426
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100427 address = trans_exc_code & __FAIL_ADDR_MASK;
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200428 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Peter Xudde16072020-04-01 21:08:37 -0700429 flags = FAULT_FLAG_DEFAULT;
Johannes Weiner759496b2013-09-12 15:13:39 -0700430 if (user_mode(regs))
431 flags |= FAULT_FLAG_USER;
Heiko Carstens33ce6142011-05-26 09:48:30 +0200432 if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400)
433 flags |= FAULT_FLAG_WRITE;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700434 mmap_read_lock(mm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200436 gmap = NULL;
437 if (IS_ENABLED(CONFIG_PGSTE) && type == GMAP_FAULT) {
438 gmap = (struct gmap *) S390_lowcore.gmap;
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200439 current->thread.gmap_addr = address;
Martin Schwidefsky4be130a2016-03-08 12:12:18 +0100440 current->thread.gmap_write_flag = !!(flags & FAULT_FLAG_WRITE);
David Hildenbrand4a494432016-03-08 12:31:52 +0100441 current->thread.gmap_int_code = regs->int_code & 0xffff;
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200442 address = __gmap_translate(gmap, address);
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200443 if (address == -EFAULT) {
444 fault = VM_FAULT_BADMAP;
445 goto out_up;
446 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200447 if (gmap->pfault_enabled)
448 flags |= FAULT_FLAG_RETRY_NOWAIT;
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200449 }
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200450
451retry:
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100452 fault = VM_FAULT_BADMAP;
Gerald Schaefer482b05d2007-03-05 23:35:54 +0100453 vma = find_vma(mm, address);
454 if (!vma)
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100455 goto out_up;
Gerald Schaeferc1821c22007-02-05 21:18:17 +0100456
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100457 if (unlikely(vma->vm_start > address)) {
458 if (!(vma->vm_flags & VM_GROWSDOWN))
459 goto out_up;
460 if (expand_stack(vma, address))
461 goto out_up;
462 }
463
464 /*
465 * Ok, we have a good vm_area for this memory access, so
466 * we can handle it..
467 */
468 fault = VM_FAULT_BADACCESS;
Martin Schwidefsky1ab947d2009-12-07 12:51:46 +0100469 if (unlikely(!(vma->vm_flags & access)))
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100470 goto out_up;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700471
Gerald Schaefer53492b12008-04-30 13:38:46 +0200472 if (is_vm_hugetlb_page(vma))
473 address &= HPAGE_MASK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700474 /*
475 * If for any reason at all we couldn't handle the fault,
476 * make sure we exit gracefully rather than endlessly redo
477 * the fault.
478 */
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700479 fault = handle_mm_fault(vma, address, flags);
Peter Xu4ef87322020-04-01 21:08:06 -0700480 if (fault_signal_pending(fault, regs)) {
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200481 fault = VM_FAULT_SIGNAL;
Claudio Imbrenda306d6c42018-07-16 10:38:57 +0200482 if (flags & FAULT_FLAG_RETRY_NOWAIT)
483 goto out_up;
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200484 goto out;
485 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100486 if (unlikely(fault & VM_FAULT_ERROR))
487 goto out_up;
488
Heiko Carstens33ce6142011-05-26 09:48:30 +0200489 /*
490 * Major/minor page fault accounting is only done on the
491 * initial attempt. If we go through a retry, it is extremely
492 * likely that the page will be found in page cache at that point.
493 */
494 if (flags & FAULT_FLAG_ALLOW_RETRY) {
495 if (fault & VM_FAULT_MAJOR) {
496 tsk->maj_flt++;
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200497 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
Heiko Carstens33ce6142011-05-26 09:48:30 +0200498 regs, address);
499 } else {
500 tsk->min_flt++;
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200501 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
Heiko Carstens33ce6142011-05-26 09:48:30 +0200502 regs, address);
503 }
504 if (fault & VM_FAULT_RETRY) {
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200505 if (IS_ENABLED(CONFIG_PGSTE) && gmap &&
506 (flags & FAULT_FLAG_RETRY_NOWAIT)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200507 /* FAULT_FLAG_RETRY_NOWAIT has been set,
Michel Lespinassec1e8d7c2020-06-08 21:33:54 -0700508 * mmap_lock has not been released */
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200509 current->thread.gmap_pfault = 1;
510 fault = VM_FAULT_PFAULT;
511 goto out_up;
512 }
Peter Xu4064b982020-04-01 21:08:45 -0700513 flags &= ~FAULT_FLAG_RETRY_NOWAIT;
Shaohua Li45cac652012-10-08 16:32:19 -0700514 flags |= FAULT_FLAG_TRIED;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700515 mmap_read_lock(mm);
Heiko Carstens33ce6142011-05-26 09:48:30 +0200516 goto retry;
517 }
Heiko Carstensbde69af2009-09-11 10:29:06 +0200518 }
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200519 if (IS_ENABLED(CONFIG_PGSTE) && gmap) {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200520 address = __gmap_link(gmap, current->thread.gmap_addr,
521 address);
522 if (address == -EFAULT) {
523 fault = VM_FAULT_BADMAP;
524 goto out_up;
525 }
526 if (address == -ENOMEM) {
527 fault = VM_FAULT_OOM;
528 goto out_up;
529 }
530 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100531 fault = 0;
532out_up:
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700533 mmap_read_unlock(mm);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100534out:
535 return fault;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700536}
537
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200538void do_protection_exception(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539{
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100540 unsigned long trans_exc_code;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700541 int access;
542 vm_fault_t fault;
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100543
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100544 trans_exc_code = regs->int_parm_long;
Martin Schwidefskyf752ac42013-04-16 13:25:06 +0200545 /*
546 * Protection exceptions are suppressing, decrement psw address.
547 * The exception to this rule are aborted transactions, for these
548 * the PSW already points to the correct location.
549 */
550 if (!(regs->int_code & 0x200))
551 regs->psw.addr = __rewind_psw(regs->psw, regs->int_code >> 16);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200552 /*
553 * Check for low-address protection. This needs to be treated
554 * as a special case because the translation exception code
555 * field is not guaranteed to contain valid data in this case.
556 */
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100557 if (unlikely(!(trans_exc_code & 4))) {
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100558 do_low_address(regs);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200559 return;
560 }
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100561 if (unlikely(MACHINE_HAS_NX && (trans_exc_code & 0x80))) {
562 regs->int_parm_long = (trans_exc_code & ~PAGE_MASK) |
563 (regs->psw.addr & PAGE_MASK);
564 access = VM_EXEC;
565 fault = VM_FAULT_BADACCESS;
566 } else {
567 access = VM_WRITE;
568 fault = do_exception(regs, access);
569 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100570 if (unlikely(fault))
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100571 do_fault_error(regs, access, fault);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700572}
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200573NOKPROBE_SYMBOL(do_protection_exception);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200575void do_dat_exception(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700576{
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700577 int access;
578 vm_fault_t fault;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100579
Anshuman Khandual6cb4d9a2020-04-10 14:33:09 -0700580 access = VM_ACCESS_FLAGS;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100581 fault = do_exception(regs, access);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100582 if (unlikely(fault))
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100583 do_fault_error(regs, access, fault);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584}
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200585NOKPROBE_SYMBOL(do_dat_exception);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700586
Linus Torvalds1da177e2005-04-16 15:20:36 -0700587#ifdef CONFIG_PFAULT
588/*
589 * 'pfault' pseudo page faults routines.
590 */
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100591static int pfault_disable;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700592
593static int __init nopfault(char *str)
594{
595 pfault_disable = 1;
596 return 1;
597}
598
599__setup("nopfault", nopfault);
600
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200601struct pfault_refbk {
602 u16 refdiagc;
603 u16 reffcode;
604 u16 refdwlen;
605 u16 refversn;
606 u64 refgaddr;
607 u64 refselmk;
608 u64 refcmpmk;
609 u64 reserved;
610} __attribute__ ((packed, aligned(8)));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700611
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200612static struct pfault_refbk pfault_init_refbk = {
613 .refdiagc = 0x258,
614 .reffcode = 0,
615 .refdwlen = 5,
616 .refversn = 2,
617 .refgaddr = __LC_LPP,
618 .refselmk = 1ULL << 48,
619 .refcmpmk = 1ULL << 48,
620 .reserved = __PF_RES_FIELD
621};
622
Linus Torvalds1da177e2005-04-16 15:20:36 -0700623int pfault_init(void)
624{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700625 int rc;
626
Carsten Ottef32269a2011-12-27 11:27:11 +0100627 if (pfault_disable)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700628 return -1;
Martin Schwidefsky1ec27722015-08-20 17:28:44 +0200629 diag_stat_inc(DIAG_STAT_X258);
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200630 asm volatile(
631 " diag %1,%0,0x258\n"
632 "0: j 2f\n"
633 "1: la %0,8\n"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700634 "2:\n"
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200635 EX_TABLE(0b,1b)
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200636 : "=d" (rc)
637 : "a" (&pfault_init_refbk), "m" (pfault_init_refbk) : "cc");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700638 return rc;
639}
640
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200641static struct pfault_refbk pfault_fini_refbk = {
642 .refdiagc = 0x258,
643 .reffcode = 1,
644 .refdwlen = 5,
645 .refversn = 2,
646};
647
Linus Torvalds1da177e2005-04-16 15:20:36 -0700648void pfault_fini(void)
649{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650
Carsten Ottef32269a2011-12-27 11:27:11 +0100651 if (pfault_disable)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 return;
Martin Schwidefsky1ec27722015-08-20 17:28:44 +0200653 diag_stat_inc(DIAG_STAT_X258);
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200654 asm volatile(
655 " diag %0,0,0x258\n"
Heiko Carstens6c22c982016-06-10 09:57:05 +0200656 "0: nopr %%r7\n"
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200657 EX_TABLE(0b,0b)
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200658 : : "a" (&pfault_fini_refbk), "m" (pfault_fini_refbk) : "cc");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700659}
660
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200661static DEFINE_SPINLOCK(pfault_lock);
662static LIST_HEAD(pfault_list);
663
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100664#define PF_COMPLETE 0x0080
665
666/*
667 * The mechanism of our pfault code: if Linux is running as guest, runs a user
668 * space process and the user space process accesses a page that the host has
669 * paged out we get a pfault interrupt.
670 *
671 * This allows us, within the guest, to schedule a different process. Without
672 * this mechanism the host would have to suspend the whole virtual cpu until
673 * the page has been paged in.
674 *
675 * So when we get such an interrupt then we set the state of the current task
676 * to uninterruptible and also set the need_resched flag. Both happens within
677 * interrupt context(!). If we later on want to return to user space we
678 * recognize the need_resched flag and then call schedule(). It's not very
679 * obvious how this works...
680 *
681 * Of course we have a lot of additional fun with the completion interrupt (->
682 * host signals that a page of a process has been paged in and the process can
683 * continue to run). This interrupt can arrive on any cpu and, since we have
684 * virtual cpus, actually appear before the interrupt that signals that a page
685 * is missing.
686 */
Heiko Carstensfde15c32012-03-11 11:59:31 -0400687static void pfault_interrupt(struct ext_code ext_code,
Martin Schwidefskyf6649a72010-10-25 16:10:38 +0200688 unsigned int param32, unsigned long param64)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700689{
690 struct task_struct *tsk;
691 __u16 subcode;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200692 pid_t pid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700693
694 /*
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100695 * Get the external interruption subcode & pfault initial/completion
696 * signal bit. VM stores this in the 'cpu address' field associated
697 * with the external interrupt.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700698 */
Heiko Carstensfde15c32012-03-11 11:59:31 -0400699 subcode = ext_code.subcode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700700 if ((subcode & 0xff00) != __SUBCODE_MASK)
701 return;
Heiko Carstens420f42e2013-01-02 15:18:18 +0100702 inc_irq_stat(IRQEXT_PFL);
Heiko Carstens54c27792012-05-10 09:44:35 +0200703 /* Get the token (= pid of the affected task). */
Hendrik Brueckner544e8dd2016-03-08 14:00:23 +0100704 pid = param64 & LPP_PID_MASK;
Heiko Carstens54c27792012-05-10 09:44:35 +0200705 rcu_read_lock();
706 tsk = find_task_by_pid_ns(pid, &init_pid_ns);
707 if (tsk)
708 get_task_struct(tsk);
709 rcu_read_unlock();
710 if (!tsk)
711 return;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200712 spin_lock(&pfault_lock);
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100713 if (subcode & PF_COMPLETE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 /* signal bit is set -> a page has been swapped in by VM */
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200715 if (tsk->thread.pfault_wait == 1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700716 /* Initial interrupt was faster than the completion
717 * interrupt. pfault_wait is valid. Set pfault_wait
718 * back to zero and wake up the process. This can
719 * safely be done because the task is still sleeping
Martin Schwidefskyb6d09442005-09-03 15:58:02 -0700720 * and can't produce new pfaults. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700721 tsk->thread.pfault_wait = 0;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200722 list_del(&tsk->thread.list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700723 wake_up_process(tsk);
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200724 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200725 } else {
726 /* Completion interrupt was faster than initial
727 * interrupt. Set pfault_wait to -1 so the initial
Heiko Carstensfa2fb2f2011-11-14 11:19:01 +0100728 * interrupt doesn't put the task to sleep.
729 * If the task is not running, ignore the completion
730 * interrupt since it must be a leftover of a PFAULT
731 * CANCEL operation which didn't remove all pending
732 * completion interrupts. */
733 if (tsk->state == TASK_RUNNING)
734 tsk->thread.pfault_wait = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700735 }
736 } else {
737 /* signal bit not set -> a real page is missing. */
Heiko Carstensd49f47f2012-05-10 10:47:21 +0200738 if (WARN_ON_ONCE(tsk != current))
739 goto out;
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200740 if (tsk->thread.pfault_wait == 1) {
741 /* Already on the list with a reference: put to sleep */
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100742 goto block;
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200743 } else if (tsk->thread.pfault_wait == -1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700744 /* Completion interrupt was faster than the initial
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200745 * interrupt (pfault_wait == -1). Set pfault_wait
746 * back to zero and exit. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700747 tsk->thread.pfault_wait = 0;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200748 } else {
749 /* Initial interrupt arrived before completion
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200750 * interrupt. Let the task sleep.
751 * An extra task reference is needed since a different
752 * cpu may set the task state to TASK_RUNNING again
753 * before the scheduler is reached. */
754 get_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200755 tsk->thread.pfault_wait = 1;
756 list_add(&tsk->thread.list, &pfault_list);
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100757block:
758 /* Since this must be a userspace fault, there
759 * is no kernel task state to trample. Rely on the
760 * return to userspace schedule() to block. */
761 __set_current_state(TASK_UNINTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700762 set_tsk_need_resched(tsk);
Martin Schwidefskyc3601922016-10-25 12:21:44 +0200763 set_preempt_need_resched();
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200764 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700765 }
Heiko Carstensd49f47f2012-05-10 10:47:21 +0200766out:
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200767 spin_unlock(&pfault_lock);
Heiko Carstens54c27792012-05-10 09:44:35 +0200768 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200769}
770
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200771static int pfault_cpu_dead(unsigned int cpu)
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200772{
773 struct thread_struct *thread, *next;
774 struct task_struct *tsk;
775
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200776 spin_lock_irq(&pfault_lock);
777 list_for_each_entry_safe(thread, next, &pfault_list, list) {
778 thread->pfault_wait = 0;
779 list_del(&thread->list);
780 tsk = container_of(thread, struct task_struct, thread);
781 wake_up_process(tsk);
782 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200783 }
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200784 spin_unlock_irq(&pfault_lock);
785 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700786}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700787
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100788static int __init pfault_irq_init(void)
Heiko Carstens29b08d22006-12-04 15:40:40 +0100789{
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100790 int rc;
Heiko Carstens29b08d22006-12-04 15:40:40 +0100791
Thomas Huth1dad0932014-03-31 15:24:08 +0200792 rc = register_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200793 if (rc)
794 goto out_extint;
795 rc = pfault_init() == 0 ? 0 : -EOPNOTSUPP;
796 if (rc)
797 goto out_pfault;
Heiko Carstens82003c3e2013-09-04 13:35:45 +0200798 irq_subclass_register(IRQ_SUBCLASS_SERVICE_SIGNAL);
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200799 cpuhp_setup_state_nocalls(CPUHP_S390_PFAULT_DEAD, "s390/pfault:dead",
800 NULL, pfault_cpu_dead);
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100801 return 0;
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200802
803out_pfault:
Thomas Huth1dad0932014-03-31 15:24:08 +0200804 unregister_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200805out_extint:
806 pfault_disable = 1;
807 return rc;
Heiko Carstens29b08d22006-12-04 15:40:40 +0100808}
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100809early_initcall(pfault_irq_init);
810
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200811#endif /* CONFIG_PFAULT */
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100812
813#if IS_ENABLED(CONFIG_PGSTE)
814void do_secure_storage_access(struct pt_regs *regs)
815{
816 unsigned long addr = regs->int_parm_long & __FAIL_ADDR_MASK;
817 struct vm_area_struct *vma;
818 struct mm_struct *mm;
819 struct page *page;
820 int rc;
821
822 switch (get_fault_type(regs)) {
823 case USER_FAULT:
824 mm = current->mm;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700825 mmap_read_lock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100826 vma = find_vma(mm, addr);
827 if (!vma) {
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700828 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100829 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
830 break;
831 }
832 page = follow_page(vma, addr, FOLL_WRITE | FOLL_GET);
833 if (IS_ERR_OR_NULL(page)) {
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700834 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100835 break;
836 }
837 if (arch_make_page_accessible(page))
838 send_sig(SIGSEGV, current, 0);
839 put_page(page);
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700840 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100841 break;
842 case KERNEL_FAULT:
843 page = phys_to_page(addr);
844 if (unlikely(!try_get_page(page)))
845 break;
846 rc = arch_make_page_accessible(page);
847 put_page(page);
848 if (rc)
849 BUG();
850 break;
851 case VDSO_FAULT:
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100852 case GMAP_FAULT:
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100853 default:
854 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
855 WARN_ON_ONCE(1);
856 }
857}
858NOKPROBE_SYMBOL(do_secure_storage_access);
859
860void do_non_secure_storage_access(struct pt_regs *regs)
861{
862 unsigned long gaddr = regs->int_parm_long & __FAIL_ADDR_MASK;
863 struct gmap *gmap = (struct gmap *)S390_lowcore.gmap;
864
865 if (get_fault_type(regs) != GMAP_FAULT) {
866 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
867 WARN_ON_ONCE(1);
868 return;
869 }
870
871 if (gmap_convert_to_secure(gmap, gaddr) == -EINVAL)
872 send_sig(SIGSEGV, current, 0);
873}
874NOKPROBE_SYMBOL(do_non_secure_storage_access);
875
876#else
877void do_secure_storage_access(struct pt_regs *regs)
878{
879 default_trap_handler(regs);
880}
881
882void do_non_secure_storage_access(struct pt_regs *regs)
883{
884 default_trap_handler(regs);
885}
886#endif