blob: 6a24751557f0efaa1d29811619507f08ed2429fe [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * S390 version
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 1999
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 * Author(s): Hartmut Penner (hp@de.ibm.com)
6 * Ulrich Weigand (uweigand@de.ibm.com)
7 *
8 * Derived from "arch/i386/mm/fault.c"
9 * Copyright (C) 1995 Linus Torvalds
10 */
11
Heiko Carstens052ff462011-01-05 12:47:28 +010012#include <linux/kernel_stat.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020013#include <linux/perf_event.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/signal.h>
15#include <linux/sched.h>
Ingo Molnarb17b0152017-02-08 18:51:35 +010016#include <linux/sched/debug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/kernel.h>
18#include <linux/errno.h>
19#include <linux/string.h>
20#include <linux/types.h>
21#include <linux/ptrace.h>
22#include <linux/mman.h>
23#include <linux/mm.h>
Heiko Carstens77575912009-06-12 10:26:25 +020024#include <linux/compat.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#include <linux/smp.h>
Christoph Hellwig1eeb66a2007-05-08 00:27:03 -070026#include <linux/kdebug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/init.h>
28#include <linux/console.h>
Paul Gortmakerdcc096c2016-09-19 17:54:56 -040029#include <linux/extable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/hardirq.h>
Michael Grundy4ba069b2006-09-20 15:58:39 +020031#include <linux/kprobes.h>
Martin Schwidefskybe5ec362007-04-27 16:01:44 +020032#include <linux/uaccess.h>
Gerald Schaefer53492b12008-04-30 13:38:46 +020033#include <linux/hugetlb.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010034#include <asm/asm-offsets.h>
Martin Schwidefsky1ec27722015-08-20 17:28:44 +020035#include <asm/diag.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010036#include <asm/gmap.h>
Heiko Carstensd7b250e2011-05-26 09:48:24 +020037#include <asm/irq.h>
Martin Schwidefsky6252d702008-02-09 18:24:37 +010038#include <asm/mmu_context.h>
David Howellsa0616cd2012-03-28 18:30:02 +010039#include <asm/facility.h>
Vasily Gorbik084ea4d2020-01-21 09:43:10 +010040#include <asm/uv.h>
Heiko Carstensa8061702008-04-17 07:46:26 +020041#include "../kernel/entry.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
Linus Torvalds1da177e2005-04-16 15:20:36 -070043#define __FAIL_ADDR_MASK -4096L
Linus Torvalds1da177e2005-04-16 15:20:36 -070044#define __SUBCODE_MASK 0x0600
45#define __PF_RES_FIELD 0x8000000000000000ULL
Linus Torvalds1da177e2005-04-16 15:20:36 -070046
Christian Borntraeger12437752020-02-27 14:42:29 +010047#define VM_FAULT_BADCONTEXT ((__force vm_fault_t) 0x010000)
48#define VM_FAULT_BADMAP ((__force vm_fault_t) 0x020000)
49#define VM_FAULT_BADACCESS ((__force vm_fault_t) 0x040000)
50#define VM_FAULT_SIGNAL ((__force vm_fault_t) 0x080000)
51#define VM_FAULT_PFAULT ((__force vm_fault_t) 0x100000)
Martin Schwidefsky50d72802009-12-07 12:51:45 +010052
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020053enum fault_type {
54 KERNEL_FAULT,
55 USER_FAULT,
56 VDSO_FAULT,
57 GMAP_FAULT,
58};
59
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010060static unsigned long store_indication __read_mostly;
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020061
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010062static int __init fault_init(void)
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020063{
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010064 if (test_facility(75))
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020065 store_indication = 0xc00;
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010066 return 0;
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020067}
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010068early_initcall(fault_init);
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020069
Linus Torvalds1da177e2005-04-16 15:20:36 -070070/*
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020071 * Find out which address space caused the exception.
Linus Torvalds1da177e2005-04-16 15:20:36 -070072 */
Masahiro Yamadabf2f1ee2019-05-17 15:49:22 +090073static enum fault_type get_fault_type(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -070074{
Heiko Carstens457f2182014-03-21 10:42:25 +010075 unsigned long trans_exc_code;
76
Heiko Carstens457f2182014-03-21 10:42:25 +010077 trans_exc_code = regs->int_parm_long & 3;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020078 if (likely(trans_exc_code == 0)) {
79 /* primary space exception */
80 if (IS_ENABLED(CONFIG_PGSTE) &&
81 test_pt_regs_flag(regs, PIF_GUEST_FAULT))
82 return GMAP_FAULT;
83 if (current->thread.mm_segment == USER_DS)
84 return USER_FAULT;
85 return KERNEL_FAULT;
86 }
87 if (trans_exc_code == 2) {
88 /* secondary space exception */
89 if (current->thread.mm_segment & 1) {
90 if (current->thread.mm_segment == USER_DS_SACF)
91 return USER_FAULT;
92 return KERNEL_FAULT;
93 }
94 return VDSO_FAULT;
95 }
Gerald Schaefer962f0af2019-05-27 18:40:19 +020096 if (trans_exc_code == 1) {
97 /* access register mode, not used in the kernel */
98 return USER_FAULT;
99 }
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200100 /* home space exception -> access via kernel ASCE */
101 return KERNEL_FAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102}
103
Heiko Carstens3b7df342014-04-07 10:20:40 +0200104static int bad_address(void *p)
105{
106 unsigned long dummy;
107
108 return probe_kernel_address((unsigned long *)p, dummy);
109}
110
Heiko Carstens3b7df342014-04-07 10:20:40 +0200111static void dump_pagetable(unsigned long asce, unsigned long address)
112{
Heiko Carstensfe7b2742017-05-22 13:16:00 +0200113 unsigned long *table = __va(asce & _ASCE_ORIGIN);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200114
115 pr_alert("AS:%016lx ", asce);
116 switch (asce & _ASCE_TYPE_MASK) {
117 case _ASCE_TYPE_REGION1:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200118 table += (address & _REGION1_INDEX) >> _REGION1_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200119 if (bad_address(table))
120 goto bad;
121 pr_cont("R1:%016lx ", *table);
122 if (*table & _REGION_ENTRY_INVALID)
123 goto out;
124 table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700125 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200126 case _ASCE_TYPE_REGION2:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200127 table += (address & _REGION2_INDEX) >> _REGION2_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200128 if (bad_address(table))
129 goto bad;
130 pr_cont("R2:%016lx ", *table);
131 if (*table & _REGION_ENTRY_INVALID)
132 goto out;
133 table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700134 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200135 case _ASCE_TYPE_REGION3:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200136 table += (address & _REGION3_INDEX) >> _REGION3_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200137 if (bad_address(table))
138 goto bad;
139 pr_cont("R3:%016lx ", *table);
140 if (*table & (_REGION_ENTRY_INVALID | _REGION3_ENTRY_LARGE))
141 goto out;
142 table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700143 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200144 case _ASCE_TYPE_SEGMENT:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200145 table += (address & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200146 if (bad_address(table))
147 goto bad;
Joe Perches91c08372015-01-05 04:29:18 -0800148 pr_cont("S:%016lx ", *table);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200149 if (*table & (_SEGMENT_ENTRY_INVALID | _SEGMENT_ENTRY_LARGE))
150 goto out;
151 table = (unsigned long *)(*table & _SEGMENT_ENTRY_ORIGIN);
152 }
Heiko Carstensf1c11742017-07-05 07:37:27 +0200153 table += (address & _PAGE_INDEX) >> _PAGE_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200154 if (bad_address(table))
155 goto bad;
156 pr_cont("P:%016lx ", *table);
157out:
158 pr_cont("\n");
159 return;
160bad:
161 pr_cont("BAD\n");
162}
163
Heiko Carstens3b7df342014-04-07 10:20:40 +0200164static void dump_fault_info(struct pt_regs *regs)
165{
166 unsigned long asce;
167
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100168 pr_alert("Failing address: %016lx TEID: %016lx\n",
169 regs->int_parm_long & __FAIL_ADDR_MASK, regs->int_parm_long);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200170 pr_alert("Fault in ");
171 switch (regs->int_parm_long & 3) {
172 case 3:
173 pr_cont("home space ");
174 break;
175 case 2:
176 pr_cont("secondary space ");
177 break;
178 case 1:
179 pr_cont("access register ");
180 break;
181 case 0:
182 pr_cont("primary space ");
183 break;
184 }
185 pr_cont("mode while using ");
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200186 switch (get_fault_type(regs)) {
187 case USER_FAULT:
Heiko Carstens3b7df342014-04-07 10:20:40 +0200188 asce = S390_lowcore.user_asce;
189 pr_cont("user ");
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200190 break;
191 case VDSO_FAULT:
192 asce = S390_lowcore.vdso_asce;
193 pr_cont("vdso ");
194 break;
195 case GMAP_FAULT:
196 asce = ((struct gmap *) S390_lowcore.gmap)->asce;
197 pr_cont("gmap ");
198 break;
199 case KERNEL_FAULT:
200 asce = S390_lowcore.kernel_asce;
201 pr_cont("kernel ");
202 break;
Masahiro Yamadabf2f1ee2019-05-17 15:49:22 +0900203 default:
204 unreachable();
Heiko Carstens3b7df342014-04-07 10:20:40 +0200205 }
206 pr_cont("ASCE.\n");
207 dump_pagetable(asce, regs->int_parm_long & __FAIL_ADDR_MASK);
208}
209
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100210int show_unhandled_signals = 1;
211
212void report_user_fault(struct pt_regs *regs, long signr, int is_mm_fault)
Heiko Carstensab3c68e2010-05-17 10:00:21 +0200213{
214 if ((task_pid_nr(current) > 1) && !show_unhandled_signals)
215 return;
216 if (!unhandled_signal(current, signr))
217 return;
218 if (!printk_ratelimit())
219 return;
Hendrik Bruecknerdb1177ee2015-01-29 14:38:38 +0100220 printk(KERN_ALERT "User process fault: interruption code %04x ilc:%d ",
Heiko Carstens413d4042014-11-19 13:31:08 +0100221 regs->int_code & 0xffff, regs->int_code >> 17);
Heiko Carstens9cb1cce2016-01-18 13:12:19 +0100222 print_vma_addr(KERN_CONT "in ", regs->psw.addr);
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100223 printk(KERN_CONT "\n");
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100224 if (is_mm_fault)
225 dump_fault_info(regs);
Heiko Carstensab3c68e2010-05-17 10:00:21 +0200226 show_regs(regs);
227}
228
Linus Torvalds1da177e2005-04-16 15:20:36 -0700229/*
230 * Send SIGSEGV to task. This is an external routine
231 * to keep the stack usage of do_page_fault small.
232 */
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100233static noinline void do_sigsegv(struct pt_regs *regs, int si_code)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700234{
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100235 report_user_fault(regs, SIGSEGV, 1);
Eric W. Biederman9507a5d2018-04-15 19:58:32 -0500236 force_sig_fault(SIGSEGV, si_code,
Eric W. Biederman2e1661d22019-05-23 11:04:24 -0500237 (void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700238}
239
Gerald Schaefera80313f2019-02-03 21:37:20 +0100240const struct exception_table_entry *s390_search_extables(unsigned long addr)
241{
242 const struct exception_table_entry *fixup;
243
244 fixup = search_extable(__start_dma_ex_table,
245 __stop_dma_ex_table - __start_dma_ex_table,
246 addr);
247 if (!fixup)
248 fixup = search_exception_tables(addr);
249 return fixup;
250}
251
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100252static noinline void do_no_context(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200253{
254 const struct exception_table_entry *fixup;
255
256 /* Are we prepared to handle this kernel fault? */
Gerald Schaefera80313f2019-02-03 21:37:20 +0100257 fixup = s390_search_extables(regs->psw.addr);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200258 if (fixup) {
Heiko Carstensfecc868a2016-01-18 12:49:44 +0100259 regs->psw.addr = extable_fixup(fixup);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200260 return;
261 }
262
263 /*
264 * Oops. The kernel tried to access some bad page. We'll have to
265 * terminate things with extreme prejudice.
266 */
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200267 if (get_fault_type(regs) == KERNEL_FAULT)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200268 printk(KERN_ALERT "Unable to handle kernel pointer dereference"
Heiko Carstens3b7df342014-04-07 10:20:40 +0200269 " in virtual kernel address space\n");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200270 else
271 printk(KERN_ALERT "Unable to handle kernel paging request"
Heiko Carstens3b7df342014-04-07 10:20:40 +0200272 " in virtual user address space\n");
Heiko Carstens3b7df342014-04-07 10:20:40 +0200273 dump_fault_info(regs);
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100274 die(regs, "Oops");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200275 do_exit(SIGKILL);
276}
277
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100278static noinline void do_low_address(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200279{
280 /* Low-address protection hit in kernel mode means
281 NULL pointer write access in kernel mode. */
282 if (regs->psw.mask & PSW_MASK_PSTATE) {
283 /* Low-address protection hit in user mode 'cannot happen'. */
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100284 die (regs, "Low-address protection");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200285 do_exit(SIGKILL);
286 }
287
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100288 do_no_context(regs);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200289}
290
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100291static noinline void do_sigbus(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200292{
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200293 /*
294 * Send a sigbus, regardless of whether we were in kernel
295 * or user mode.
296 */
Eric W. Biederman9507a5d2018-04-15 19:58:32 -0500297 force_sig_fault(SIGBUS, BUS_ADRERR,
Eric W. Biederman2e1661d22019-05-23 11:04:24 -0500298 (void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200299}
300
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100301static noinline int signal_return(struct pt_regs *regs)
302{
303 u16 instruction;
304 int rc;
305
306 rc = __get_user(instruction, (u16 __user *) regs->psw.addr);
307 if (rc)
308 return rc;
309 if (instruction == 0x0a77) {
310 set_pt_regs_flag(regs, PIF_SYSCALL);
311 regs->int_code = 0x00040077;
312 return 0;
313 } else if (instruction == 0x0aad) {
314 set_pt_regs_flag(regs, PIF_SYSCALL);
315 regs->int_code = 0x000400ad;
316 return 0;
317 }
318 return -EACCES;
319}
320
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700321static noinline void do_fault_error(struct pt_regs *regs, int access,
322 vm_fault_t fault)
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100323{
324 int si_code;
325
326 switch (fault) {
327 case VM_FAULT_BADACCESS:
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100328 if (access == VM_EXEC && signal_return(regs) == 0)
329 break;
Joe Perches2c7749b2020-03-10 13:47:30 -0700330 fallthrough;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100331 case VM_FAULT_BADMAP:
332 /* Bad memory access. Check if it is kernel or user space. */
Heiko Carstens7d256172012-07-27 10:31:12 +0200333 if (user_mode(regs)) {
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100334 /* User mode accesses just cause a SIGSEGV */
335 si_code = (fault == VM_FAULT_BADMAP) ?
336 SEGV_MAPERR : SEGV_ACCERR;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100337 do_sigsegv(regs, si_code);
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100338 break;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100339 }
Joe Perches2c7749b2020-03-10 13:47:30 -0700340 fallthrough;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100341 case VM_FAULT_BADCONTEXT:
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200342 case VM_FAULT_PFAULT:
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100343 do_no_context(regs);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100344 break;
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200345 case VM_FAULT_SIGNAL:
346 if (!user_mode(regs))
347 do_no_context(regs);
348 break;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100349 default: /* fault & VM_FAULT_ERROR */
Heiko Carstens99583182011-05-26 09:48:29 +0200350 if (fault & VM_FAULT_OOM) {
Heiko Carstens7d256172012-07-27 10:31:12 +0200351 if (!user_mode(regs))
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100352 do_no_context(regs);
Heiko Carstens99583182011-05-26 09:48:29 +0200353 else
354 pagefault_out_of_memory();
Linus Torvalds33692f22015-01-29 10:51:32 -0800355 } else if (fault & VM_FAULT_SIGSEGV) {
356 /* Kernel mode? Handle exceptions or die */
357 if (!user_mode(regs))
358 do_no_context(regs);
359 else
360 do_sigsegv(regs, SEGV_MAPERR);
Heiko Carstens99583182011-05-26 09:48:29 +0200361 } else if (fault & VM_FAULT_SIGBUS) {
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100362 /* Kernel mode? Handle exceptions or die */
Heiko Carstens7d256172012-07-27 10:31:12 +0200363 if (!user_mode(regs))
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100364 do_no_context(regs);
Martin Schwidefsky36bf9682010-10-25 16:10:35 +0200365 else
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100366 do_sigbus(regs);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100367 } else
368 BUG();
369 break;
370 }
371}
372
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373/*
374 * This routine handles page faults. It determines the address,
375 * and the problem, and then passes it off to one of the appropriate
376 * routines.
377 *
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100378 * interruption code (int_code):
Linus Torvalds1da177e2005-04-16 15:20:36 -0700379 * 04 Protection -> Write-Protection (suprression)
380 * 10 Segment translation -> Not present (nullification)
381 * 11 Page translation -> Not present (nullification)
382 * 3b Region third trans. -> Not present (nullification)
383 */
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700384static inline vm_fault_t do_exception(struct pt_regs *regs, int access)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385{
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200386 struct gmap *gmap;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200387 struct task_struct *tsk;
388 struct mm_struct *mm;
389 struct vm_area_struct *vma;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200390 enum fault_type type;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100391 unsigned long trans_exc_code;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200392 unsigned long address;
Heiko Carstens33ce6142011-05-26 09:48:30 +0200393 unsigned int flags;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700394 vm_fault_t fault;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395
Martin Schwidefsky39efd4e2012-11-21 16:36:27 +0100396 tsk = current;
397 /*
398 * The instruction that caused the program check has
399 * been nullified. Don't signal single step via SIGTRAP.
400 */
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +0200401 clear_pt_regs_flag(regs, PIF_PER_TRAP);
Martin Schwidefsky39efd4e2012-11-21 16:36:27 +0100402
Anshuman Khandualb98cca42019-07-16 16:28:00 -0700403 if (kprobe_page_fault(regs, 14))
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100404 return 0;
Michael Grundy4ba069b2006-09-20 15:58:39 +0200405
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200406 mm = tsk->mm;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100407 trans_exc_code = regs->int_parm_long;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700408
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 /*
410 * Verify that the fault happened in user space, that
411 * we are not in an interrupt and that there is a
412 * user context.
413 */
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100414 fault = VM_FAULT_BADCONTEXT;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200415 type = get_fault_type(regs);
416 switch (type) {
417 case KERNEL_FAULT:
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100418 goto out;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200419 case VDSO_FAULT:
420 fault = VM_FAULT_BADMAP;
421 goto out;
422 case USER_FAULT:
423 case GMAP_FAULT:
424 if (faulthandler_disabled() || !mm)
425 goto out;
426 break;
427 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700428
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100429 address = trans_exc_code & __FAIL_ADDR_MASK;
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200430 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Peter Xudde16072020-04-01 21:08:37 -0700431 flags = FAULT_FLAG_DEFAULT;
Johannes Weiner759496b2013-09-12 15:13:39 -0700432 if (user_mode(regs))
433 flags |= FAULT_FLAG_USER;
Heiko Carstens33ce6142011-05-26 09:48:30 +0200434 if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400)
435 flags |= FAULT_FLAG_WRITE;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700436 mmap_read_lock(mm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200438 gmap = NULL;
439 if (IS_ENABLED(CONFIG_PGSTE) && type == GMAP_FAULT) {
440 gmap = (struct gmap *) S390_lowcore.gmap;
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200441 current->thread.gmap_addr = address;
Martin Schwidefsky4be130a2016-03-08 12:12:18 +0100442 current->thread.gmap_write_flag = !!(flags & FAULT_FLAG_WRITE);
David Hildenbrand4a494432016-03-08 12:31:52 +0100443 current->thread.gmap_int_code = regs->int_code & 0xffff;
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200444 address = __gmap_translate(gmap, address);
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200445 if (address == -EFAULT) {
446 fault = VM_FAULT_BADMAP;
447 goto out_up;
448 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200449 if (gmap->pfault_enabled)
450 flags |= FAULT_FLAG_RETRY_NOWAIT;
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200451 }
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200452
453retry:
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100454 fault = VM_FAULT_BADMAP;
Gerald Schaefer482b05d2007-03-05 23:35:54 +0100455 vma = find_vma(mm, address);
456 if (!vma)
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100457 goto out_up;
Gerald Schaeferc1821c22007-02-05 21:18:17 +0100458
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100459 if (unlikely(vma->vm_start > address)) {
460 if (!(vma->vm_flags & VM_GROWSDOWN))
461 goto out_up;
462 if (expand_stack(vma, address))
463 goto out_up;
464 }
465
466 /*
467 * Ok, we have a good vm_area for this memory access, so
468 * we can handle it..
469 */
470 fault = VM_FAULT_BADACCESS;
Martin Schwidefsky1ab947d2009-12-07 12:51:46 +0100471 if (unlikely(!(vma->vm_flags & access)))
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100472 goto out_up;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700473
Gerald Schaefer53492b12008-04-30 13:38:46 +0200474 if (is_vm_hugetlb_page(vma))
475 address &= HPAGE_MASK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700476 /*
477 * If for any reason at all we couldn't handle the fault,
478 * make sure we exit gracefully rather than endlessly redo
479 * the fault.
480 */
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700481 fault = handle_mm_fault(vma, address, flags);
Peter Xu4ef87322020-04-01 21:08:06 -0700482 if (fault_signal_pending(fault, regs)) {
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200483 fault = VM_FAULT_SIGNAL;
Claudio Imbrenda306d6c42018-07-16 10:38:57 +0200484 if (flags & FAULT_FLAG_RETRY_NOWAIT)
485 goto out_up;
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200486 goto out;
487 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100488 if (unlikely(fault & VM_FAULT_ERROR))
489 goto out_up;
490
Heiko Carstens33ce6142011-05-26 09:48:30 +0200491 /*
492 * Major/minor page fault accounting is only done on the
493 * initial attempt. If we go through a retry, it is extremely
494 * likely that the page will be found in page cache at that point.
495 */
496 if (flags & FAULT_FLAG_ALLOW_RETRY) {
497 if (fault & VM_FAULT_MAJOR) {
498 tsk->maj_flt++;
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200499 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
Heiko Carstens33ce6142011-05-26 09:48:30 +0200500 regs, address);
501 } else {
502 tsk->min_flt++;
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200503 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
Heiko Carstens33ce6142011-05-26 09:48:30 +0200504 regs, address);
505 }
506 if (fault & VM_FAULT_RETRY) {
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200507 if (IS_ENABLED(CONFIG_PGSTE) && gmap &&
508 (flags & FAULT_FLAG_RETRY_NOWAIT)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200509 /* FAULT_FLAG_RETRY_NOWAIT has been set,
Michel Lespinassec1e8d7c2020-06-08 21:33:54 -0700510 * mmap_lock has not been released */
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200511 current->thread.gmap_pfault = 1;
512 fault = VM_FAULT_PFAULT;
513 goto out_up;
514 }
Peter Xu4064b982020-04-01 21:08:45 -0700515 flags &= ~FAULT_FLAG_RETRY_NOWAIT;
Shaohua Li45cac652012-10-08 16:32:19 -0700516 flags |= FAULT_FLAG_TRIED;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700517 mmap_read_lock(mm);
Heiko Carstens33ce6142011-05-26 09:48:30 +0200518 goto retry;
519 }
Heiko Carstensbde69af2009-09-11 10:29:06 +0200520 }
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200521 if (IS_ENABLED(CONFIG_PGSTE) && gmap) {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200522 address = __gmap_link(gmap, current->thread.gmap_addr,
523 address);
524 if (address == -EFAULT) {
525 fault = VM_FAULT_BADMAP;
526 goto out_up;
527 }
528 if (address == -ENOMEM) {
529 fault = VM_FAULT_OOM;
530 goto out_up;
531 }
532 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100533 fault = 0;
534out_up:
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700535 mmap_read_unlock(mm);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100536out:
537 return fault;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700538}
539
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200540void do_protection_exception(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700541{
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100542 unsigned long trans_exc_code;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700543 int access;
544 vm_fault_t fault;
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100545
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100546 trans_exc_code = regs->int_parm_long;
Martin Schwidefskyf752ac42013-04-16 13:25:06 +0200547 /*
548 * Protection exceptions are suppressing, decrement psw address.
549 * The exception to this rule are aborted transactions, for these
550 * the PSW already points to the correct location.
551 */
552 if (!(regs->int_code & 0x200))
553 regs->psw.addr = __rewind_psw(regs->psw, regs->int_code >> 16);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200554 /*
555 * Check for low-address protection. This needs to be treated
556 * as a special case because the translation exception code
557 * field is not guaranteed to contain valid data in this case.
558 */
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100559 if (unlikely(!(trans_exc_code & 4))) {
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100560 do_low_address(regs);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200561 return;
562 }
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100563 if (unlikely(MACHINE_HAS_NX && (trans_exc_code & 0x80))) {
564 regs->int_parm_long = (trans_exc_code & ~PAGE_MASK) |
565 (regs->psw.addr & PAGE_MASK);
566 access = VM_EXEC;
567 fault = VM_FAULT_BADACCESS;
568 } else {
569 access = VM_WRITE;
570 fault = do_exception(regs, access);
571 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100572 if (unlikely(fault))
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100573 do_fault_error(regs, access, fault);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574}
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200575NOKPROBE_SYMBOL(do_protection_exception);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700576
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200577void do_dat_exception(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700578{
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700579 int access;
580 vm_fault_t fault;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100581
Anshuman Khandual6cb4d9a2020-04-10 14:33:09 -0700582 access = VM_ACCESS_FLAGS;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100583 fault = do_exception(regs, access);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100584 if (unlikely(fault))
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100585 do_fault_error(regs, access, fault);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700586}
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200587NOKPROBE_SYMBOL(do_dat_exception);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700588
Linus Torvalds1da177e2005-04-16 15:20:36 -0700589#ifdef CONFIG_PFAULT
590/*
591 * 'pfault' pseudo page faults routines.
592 */
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100593static int pfault_disable;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700594
595static int __init nopfault(char *str)
596{
597 pfault_disable = 1;
598 return 1;
599}
600
601__setup("nopfault", nopfault);
602
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200603struct pfault_refbk {
604 u16 refdiagc;
605 u16 reffcode;
606 u16 refdwlen;
607 u16 refversn;
608 u64 refgaddr;
609 u64 refselmk;
610 u64 refcmpmk;
611 u64 reserved;
612} __attribute__ ((packed, aligned(8)));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700613
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200614static struct pfault_refbk pfault_init_refbk = {
615 .refdiagc = 0x258,
616 .reffcode = 0,
617 .refdwlen = 5,
618 .refversn = 2,
619 .refgaddr = __LC_LPP,
620 .refselmk = 1ULL << 48,
621 .refcmpmk = 1ULL << 48,
622 .reserved = __PF_RES_FIELD
623};
624
Linus Torvalds1da177e2005-04-16 15:20:36 -0700625int pfault_init(void)
626{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700627 int rc;
628
Carsten Ottef32269a2011-12-27 11:27:11 +0100629 if (pfault_disable)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700630 return -1;
Martin Schwidefsky1ec27722015-08-20 17:28:44 +0200631 diag_stat_inc(DIAG_STAT_X258);
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200632 asm volatile(
633 " diag %1,%0,0x258\n"
634 "0: j 2f\n"
635 "1: la %0,8\n"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700636 "2:\n"
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200637 EX_TABLE(0b,1b)
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200638 : "=d" (rc)
639 : "a" (&pfault_init_refbk), "m" (pfault_init_refbk) : "cc");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700640 return rc;
641}
642
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200643static struct pfault_refbk pfault_fini_refbk = {
644 .refdiagc = 0x258,
645 .reffcode = 1,
646 .refdwlen = 5,
647 .refversn = 2,
648};
649
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650void pfault_fini(void)
651{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652
Carsten Ottef32269a2011-12-27 11:27:11 +0100653 if (pfault_disable)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700654 return;
Martin Schwidefsky1ec27722015-08-20 17:28:44 +0200655 diag_stat_inc(DIAG_STAT_X258);
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200656 asm volatile(
657 " diag %0,0,0x258\n"
Heiko Carstens6c22c982016-06-10 09:57:05 +0200658 "0: nopr %%r7\n"
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200659 EX_TABLE(0b,0b)
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200660 : : "a" (&pfault_fini_refbk), "m" (pfault_fini_refbk) : "cc");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700661}
662
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200663static DEFINE_SPINLOCK(pfault_lock);
664static LIST_HEAD(pfault_list);
665
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100666#define PF_COMPLETE 0x0080
667
668/*
669 * The mechanism of our pfault code: if Linux is running as guest, runs a user
670 * space process and the user space process accesses a page that the host has
671 * paged out we get a pfault interrupt.
672 *
673 * This allows us, within the guest, to schedule a different process. Without
674 * this mechanism the host would have to suspend the whole virtual cpu until
675 * the page has been paged in.
676 *
677 * So when we get such an interrupt then we set the state of the current task
678 * to uninterruptible and also set the need_resched flag. Both happens within
679 * interrupt context(!). If we later on want to return to user space we
680 * recognize the need_resched flag and then call schedule(). It's not very
681 * obvious how this works...
682 *
683 * Of course we have a lot of additional fun with the completion interrupt (->
684 * host signals that a page of a process has been paged in and the process can
685 * continue to run). This interrupt can arrive on any cpu and, since we have
686 * virtual cpus, actually appear before the interrupt that signals that a page
687 * is missing.
688 */
Heiko Carstensfde15c32012-03-11 11:59:31 -0400689static void pfault_interrupt(struct ext_code ext_code,
Martin Schwidefskyf6649a72010-10-25 16:10:38 +0200690 unsigned int param32, unsigned long param64)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700691{
692 struct task_struct *tsk;
693 __u16 subcode;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200694 pid_t pid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700695
696 /*
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100697 * Get the external interruption subcode & pfault initial/completion
698 * signal bit. VM stores this in the 'cpu address' field associated
699 * with the external interrupt.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700700 */
Heiko Carstensfde15c32012-03-11 11:59:31 -0400701 subcode = ext_code.subcode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700702 if ((subcode & 0xff00) != __SUBCODE_MASK)
703 return;
Heiko Carstens420f42e2013-01-02 15:18:18 +0100704 inc_irq_stat(IRQEXT_PFL);
Heiko Carstens54c27792012-05-10 09:44:35 +0200705 /* Get the token (= pid of the affected task). */
Hendrik Brueckner544e8dd2016-03-08 14:00:23 +0100706 pid = param64 & LPP_PID_MASK;
Heiko Carstens54c27792012-05-10 09:44:35 +0200707 rcu_read_lock();
708 tsk = find_task_by_pid_ns(pid, &init_pid_ns);
709 if (tsk)
710 get_task_struct(tsk);
711 rcu_read_unlock();
712 if (!tsk)
713 return;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200714 spin_lock(&pfault_lock);
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100715 if (subcode & PF_COMPLETE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700716 /* signal bit is set -> a page has been swapped in by VM */
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200717 if (tsk->thread.pfault_wait == 1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718 /* Initial interrupt was faster than the completion
719 * interrupt. pfault_wait is valid. Set pfault_wait
720 * back to zero and wake up the process. This can
721 * safely be done because the task is still sleeping
Martin Schwidefskyb6d09442005-09-03 15:58:02 -0700722 * and can't produce new pfaults. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700723 tsk->thread.pfault_wait = 0;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200724 list_del(&tsk->thread.list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725 wake_up_process(tsk);
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200726 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200727 } else {
728 /* Completion interrupt was faster than initial
729 * interrupt. Set pfault_wait to -1 so the initial
Heiko Carstensfa2fb2f2011-11-14 11:19:01 +0100730 * interrupt doesn't put the task to sleep.
731 * If the task is not running, ignore the completion
732 * interrupt since it must be a leftover of a PFAULT
733 * CANCEL operation which didn't remove all pending
734 * completion interrupts. */
735 if (tsk->state == TASK_RUNNING)
736 tsk->thread.pfault_wait = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700737 }
738 } else {
739 /* signal bit not set -> a real page is missing. */
Heiko Carstensd49f47f2012-05-10 10:47:21 +0200740 if (WARN_ON_ONCE(tsk != current))
741 goto out;
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200742 if (tsk->thread.pfault_wait == 1) {
743 /* Already on the list with a reference: put to sleep */
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100744 goto block;
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200745 } else if (tsk->thread.pfault_wait == -1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700746 /* Completion interrupt was faster than the initial
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200747 * interrupt (pfault_wait == -1). Set pfault_wait
748 * back to zero and exit. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700749 tsk->thread.pfault_wait = 0;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200750 } else {
751 /* Initial interrupt arrived before completion
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200752 * interrupt. Let the task sleep.
753 * An extra task reference is needed since a different
754 * cpu may set the task state to TASK_RUNNING again
755 * before the scheduler is reached. */
756 get_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200757 tsk->thread.pfault_wait = 1;
758 list_add(&tsk->thread.list, &pfault_list);
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100759block:
760 /* Since this must be a userspace fault, there
761 * is no kernel task state to trample. Rely on the
762 * return to userspace schedule() to block. */
763 __set_current_state(TASK_UNINTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700764 set_tsk_need_resched(tsk);
Martin Schwidefskyc3601922016-10-25 12:21:44 +0200765 set_preempt_need_resched();
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200766 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700767 }
Heiko Carstensd49f47f2012-05-10 10:47:21 +0200768out:
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200769 spin_unlock(&pfault_lock);
Heiko Carstens54c27792012-05-10 09:44:35 +0200770 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200771}
772
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200773static int pfault_cpu_dead(unsigned int cpu)
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200774{
775 struct thread_struct *thread, *next;
776 struct task_struct *tsk;
777
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200778 spin_lock_irq(&pfault_lock);
779 list_for_each_entry_safe(thread, next, &pfault_list, list) {
780 thread->pfault_wait = 0;
781 list_del(&thread->list);
782 tsk = container_of(thread, struct task_struct, thread);
783 wake_up_process(tsk);
784 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200785 }
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200786 spin_unlock_irq(&pfault_lock);
787 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700788}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700789
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100790static int __init pfault_irq_init(void)
Heiko Carstens29b08d22006-12-04 15:40:40 +0100791{
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100792 int rc;
Heiko Carstens29b08d22006-12-04 15:40:40 +0100793
Thomas Huth1dad0932014-03-31 15:24:08 +0200794 rc = register_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200795 if (rc)
796 goto out_extint;
797 rc = pfault_init() == 0 ? 0 : -EOPNOTSUPP;
798 if (rc)
799 goto out_pfault;
Heiko Carstens82003c3e2013-09-04 13:35:45 +0200800 irq_subclass_register(IRQ_SUBCLASS_SERVICE_SIGNAL);
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200801 cpuhp_setup_state_nocalls(CPUHP_S390_PFAULT_DEAD, "s390/pfault:dead",
802 NULL, pfault_cpu_dead);
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100803 return 0;
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200804
805out_pfault:
Thomas Huth1dad0932014-03-31 15:24:08 +0200806 unregister_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200807out_extint:
808 pfault_disable = 1;
809 return rc;
Heiko Carstens29b08d22006-12-04 15:40:40 +0100810}
Heiko Carstensfb0a9d7e2011-01-05 12:47:39 +0100811early_initcall(pfault_irq_init);
812
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200813#endif /* CONFIG_PFAULT */
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100814
815#if IS_ENABLED(CONFIG_PGSTE)
816void do_secure_storage_access(struct pt_regs *regs)
817{
818 unsigned long addr = regs->int_parm_long & __FAIL_ADDR_MASK;
819 struct vm_area_struct *vma;
820 struct mm_struct *mm;
821 struct page *page;
822 int rc;
823
824 switch (get_fault_type(regs)) {
825 case USER_FAULT:
826 mm = current->mm;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700827 mmap_read_lock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100828 vma = find_vma(mm, addr);
829 if (!vma) {
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700830 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100831 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
832 break;
833 }
834 page = follow_page(vma, addr, FOLL_WRITE | FOLL_GET);
835 if (IS_ERR_OR_NULL(page)) {
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700836 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100837 break;
838 }
839 if (arch_make_page_accessible(page))
840 send_sig(SIGSEGV, current, 0);
841 put_page(page);
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700842 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100843 break;
844 case KERNEL_FAULT:
845 page = phys_to_page(addr);
846 if (unlikely(!try_get_page(page)))
847 break;
848 rc = arch_make_page_accessible(page);
849 put_page(page);
850 if (rc)
851 BUG();
852 break;
853 case VDSO_FAULT:
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100854 case GMAP_FAULT:
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100855 default:
856 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
857 WARN_ON_ONCE(1);
858 }
859}
860NOKPROBE_SYMBOL(do_secure_storage_access);
861
862void do_non_secure_storage_access(struct pt_regs *regs)
863{
864 unsigned long gaddr = regs->int_parm_long & __FAIL_ADDR_MASK;
865 struct gmap *gmap = (struct gmap *)S390_lowcore.gmap;
866
867 if (get_fault_type(regs) != GMAP_FAULT) {
868 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
869 WARN_ON_ONCE(1);
870 return;
871 }
872
873 if (gmap_convert_to_secure(gmap, gaddr) == -EINVAL)
874 send_sig(SIGSEGV, current, 0);
875}
876NOKPROBE_SYMBOL(do_non_secure_storage_access);
877
878#else
879void do_secure_storage_access(struct pt_regs *regs)
880{
881 default_trap_handler(regs);
882}
883
884void do_non_secure_storage_access(struct pt_regs *regs)
885{
886 default_trap_handler(regs);
887}
888#endif