blob: 6ed2886fc014b19846ed3d3b804054e0b839bd06 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * S390 version
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 1999
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 * Author(s): Hartmut Penner (hp@de.ibm.com)
6 * Ulrich Weigand (uweigand@de.ibm.com)
7 *
8 * Derived from "arch/i386/mm/fault.c"
9 * Copyright (C) 1995 Linus Torvalds
10 */
11
Heiko Carstens052ff462011-01-05 12:47:28 +010012#include <linux/kernel_stat.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020013#include <linux/perf_event.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/signal.h>
15#include <linux/sched.h>
Ingo Molnarb17b0152017-02-08 18:51:35 +010016#include <linux/sched/debug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/kernel.h>
18#include <linux/errno.h>
19#include <linux/string.h>
20#include <linux/types.h>
21#include <linux/ptrace.h>
22#include <linux/mman.h>
23#include <linux/mm.h>
Heiko Carstens77575912009-06-12 10:26:25 +020024#include <linux/compat.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#include <linux/smp.h>
Christoph Hellwig1eeb66a2007-05-08 00:27:03 -070026#include <linux/kdebug.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/init.h>
28#include <linux/console.h>
Paul Gortmakerdcc096c2016-09-19 17:54:56 -040029#include <linux/extable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/hardirq.h>
Michael Grundy4ba069b2006-09-20 15:58:39 +020031#include <linux/kprobes.h>
Martin Schwidefskybe5ec362007-04-27 16:01:44 +020032#include <linux/uaccess.h>
Gerald Schaefer53492b12008-04-30 13:38:46 +020033#include <linux/hugetlb.h>
Sven Schnellee41ba112021-07-28 21:02:53 +020034#include <linux/kfence.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010035#include <asm/asm-offsets.h>
Martin Schwidefsky1ec27722015-08-20 17:28:44 +020036#include <asm/diag.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010037#include <asm/gmap.h>
Heiko Carstensd7b250e2011-05-26 09:48:24 +020038#include <asm/irq.h>
Martin Schwidefsky6252d702008-02-09 18:24:37 +010039#include <asm/mmu_context.h>
David Howellsa0616cd2012-03-28 18:30:02 +010040#include <asm/facility.h>
Vasily Gorbik084ea4d2020-01-21 09:43:10 +010041#include <asm/uv.h>
Heiko Carstensa8061702008-04-17 07:46:26 +020042#include "../kernel/entry.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070043
Linus Torvalds1da177e2005-04-16 15:20:36 -070044#define __FAIL_ADDR_MASK -4096L
Linus Torvalds1da177e2005-04-16 15:20:36 -070045#define __SUBCODE_MASK 0x0600
46#define __PF_RES_FIELD 0x8000000000000000ULL
Linus Torvalds1da177e2005-04-16 15:20:36 -070047
Christian Borntraeger12437752020-02-27 14:42:29 +010048#define VM_FAULT_BADCONTEXT ((__force vm_fault_t) 0x010000)
49#define VM_FAULT_BADMAP ((__force vm_fault_t) 0x020000)
50#define VM_FAULT_BADACCESS ((__force vm_fault_t) 0x040000)
51#define VM_FAULT_SIGNAL ((__force vm_fault_t) 0x080000)
52#define VM_FAULT_PFAULT ((__force vm_fault_t) 0x100000)
Martin Schwidefsky50d72802009-12-07 12:51:45 +010053
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020054enum fault_type {
55 KERNEL_FAULT,
56 USER_FAULT,
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020057 GMAP_FAULT,
58};
59
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010060static unsigned long store_indication __read_mostly;
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020061
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010062static int __init fault_init(void)
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020063{
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010064 if (test_facility(75))
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020065 store_indication = 0xc00;
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010066 return 0;
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020067}
Heiko Carstensa4f32bd2012-10-30 14:49:37 +010068early_initcall(fault_init);
Martin Schwidefsky92f842e2010-10-25 16:10:13 +020069
Linus Torvalds1da177e2005-04-16 15:20:36 -070070/*
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020071 * Find out which address space caused the exception.
Linus Torvalds1da177e2005-04-16 15:20:36 -070072 */
Masahiro Yamadabf2f1ee2019-05-17 15:49:22 +090073static enum fault_type get_fault_type(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -070074{
Heiko Carstens457f2182014-03-21 10:42:25 +010075 unsigned long trans_exc_code;
76
Heiko Carstens457f2182014-03-21 10:42:25 +010077 trans_exc_code = regs->int_parm_long & 3;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020078 if (likely(trans_exc_code == 0)) {
79 /* primary space exception */
Heiko Carstens87d59862020-11-16 08:06:40 +010080 if (user_mode(regs))
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020081 return USER_FAULT;
Heiko Carstens87d59862020-11-16 08:06:40 +010082 if (!IS_ENABLED(CONFIG_PGSTE))
83 return KERNEL_FAULT;
84 if (test_pt_regs_flag(regs, PIF_GUEST_FAULT))
85 return GMAP_FAULT;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020086 return KERNEL_FAULT;
87 }
Heiko Carstens87d59862020-11-16 08:06:40 +010088 if (trans_exc_code == 2)
89 return USER_FAULT;
Gerald Schaefer962f0af2019-05-27 18:40:19 +020090 if (trans_exc_code == 1) {
91 /* access register mode, not used in the kernel */
92 return USER_FAULT;
93 }
Martin Schwidefsky0aaba412017-08-22 12:08:22 +020094 /* home space exception -> access via kernel ASCE */
95 return KERNEL_FAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -070096}
97
Heiko Carstens3b7df342014-04-07 10:20:40 +020098static int bad_address(void *p)
99{
100 unsigned long dummy;
101
Christoph Hellwig25f12ae2020-06-17 09:37:55 +0200102 return get_kernel_nofault(dummy, (unsigned long *)p);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200103}
104
Heiko Carstens3b7df342014-04-07 10:20:40 +0200105static void dump_pagetable(unsigned long asce, unsigned long address)
106{
Heiko Carstensfe7b2742017-05-22 13:16:00 +0200107 unsigned long *table = __va(asce & _ASCE_ORIGIN);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200108
109 pr_alert("AS:%016lx ", asce);
110 switch (asce & _ASCE_TYPE_MASK) {
111 case _ASCE_TYPE_REGION1:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200112 table += (address & _REGION1_INDEX) >> _REGION1_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200113 if (bad_address(table))
114 goto bad;
115 pr_cont("R1:%016lx ", *table);
116 if (*table & _REGION_ENTRY_INVALID)
117 goto out;
Heiko Carstensd2f29492021-12-06 18:55:21 +0100118 table = __va(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700119 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200120 case _ASCE_TYPE_REGION2:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200121 table += (address & _REGION2_INDEX) >> _REGION2_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200122 if (bad_address(table))
123 goto bad;
124 pr_cont("R2:%016lx ", *table);
125 if (*table & _REGION_ENTRY_INVALID)
126 goto out;
Heiko Carstensd2f29492021-12-06 18:55:21 +0100127 table = __va(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700128 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200129 case _ASCE_TYPE_REGION3:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200130 table += (address & _REGION3_INDEX) >> _REGION3_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200131 if (bad_address(table))
132 goto bad;
133 pr_cont("R3:%016lx ", *table);
134 if (*table & (_REGION_ENTRY_INVALID | _REGION3_ENTRY_LARGE))
135 goto out;
Heiko Carstensd2f29492021-12-06 18:55:21 +0100136 table = __va(*table & _REGION_ENTRY_ORIGIN);
Joe Perches2c7749b2020-03-10 13:47:30 -0700137 fallthrough;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200138 case _ASCE_TYPE_SEGMENT:
Heiko Carstensf1c11742017-07-05 07:37:27 +0200139 table += (address & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200140 if (bad_address(table))
141 goto bad;
Joe Perches91c08372015-01-05 04:29:18 -0800142 pr_cont("S:%016lx ", *table);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200143 if (*table & (_SEGMENT_ENTRY_INVALID | _SEGMENT_ENTRY_LARGE))
144 goto out;
Heiko Carstensd2f29492021-12-06 18:55:21 +0100145 table = __va(*table & _SEGMENT_ENTRY_ORIGIN);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200146 }
Heiko Carstensf1c11742017-07-05 07:37:27 +0200147 table += (address & _PAGE_INDEX) >> _PAGE_SHIFT;
Heiko Carstens3b7df342014-04-07 10:20:40 +0200148 if (bad_address(table))
149 goto bad;
150 pr_cont("P:%016lx ", *table);
151out:
152 pr_cont("\n");
153 return;
154bad:
155 pr_cont("BAD\n");
156}
157
Heiko Carstens3b7df342014-04-07 10:20:40 +0200158static void dump_fault_info(struct pt_regs *regs)
159{
160 unsigned long asce;
161
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100162 pr_alert("Failing address: %016lx TEID: %016lx\n",
163 regs->int_parm_long & __FAIL_ADDR_MASK, regs->int_parm_long);
Heiko Carstens3b7df342014-04-07 10:20:40 +0200164 pr_alert("Fault in ");
165 switch (regs->int_parm_long & 3) {
166 case 3:
167 pr_cont("home space ");
168 break;
169 case 2:
170 pr_cont("secondary space ");
171 break;
172 case 1:
173 pr_cont("access register ");
174 break;
175 case 0:
176 pr_cont("primary space ");
177 break;
178 }
179 pr_cont("mode while using ");
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200180 switch (get_fault_type(regs)) {
181 case USER_FAULT:
Heiko Carstens3b7df342014-04-07 10:20:40 +0200182 asce = S390_lowcore.user_asce;
183 pr_cont("user ");
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200184 break;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200185 case GMAP_FAULT:
186 asce = ((struct gmap *) S390_lowcore.gmap)->asce;
187 pr_cont("gmap ");
188 break;
189 case KERNEL_FAULT:
190 asce = S390_lowcore.kernel_asce;
191 pr_cont("kernel ");
192 break;
Masahiro Yamadabf2f1ee2019-05-17 15:49:22 +0900193 default:
194 unreachable();
Heiko Carstens3b7df342014-04-07 10:20:40 +0200195 }
196 pr_cont("ASCE.\n");
197 dump_pagetable(asce, regs->int_parm_long & __FAIL_ADDR_MASK);
198}
199
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100200int show_unhandled_signals = 1;
201
202void report_user_fault(struct pt_regs *regs, long signr, int is_mm_fault)
Heiko Carstensab3c68e2010-05-17 10:00:21 +0200203{
204 if ((task_pid_nr(current) > 1) && !show_unhandled_signals)
205 return;
206 if (!unhandled_signal(current, signr))
207 return;
208 if (!printk_ratelimit())
209 return;
Hendrik Bruecknerdb1177ee2015-01-29 14:38:38 +0100210 printk(KERN_ALERT "User process fault: interruption code %04x ilc:%d ",
Heiko Carstens413d4042014-11-19 13:31:08 +0100211 regs->int_code & 0xffff, regs->int_code >> 17);
Heiko Carstens9cb1cce2016-01-18 13:12:19 +0100212 print_vma_addr(KERN_CONT "in ", regs->psw.addr);
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100213 printk(KERN_CONT "\n");
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100214 if (is_mm_fault)
215 dump_fault_info(regs);
Heiko Carstensab3c68e2010-05-17 10:00:21 +0200216 show_regs(regs);
217}
218
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219/*
220 * Send SIGSEGV to task. This is an external routine
221 * to keep the stack usage of do_page_fault small.
222 */
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100223static noinline void do_sigsegv(struct pt_regs *regs, int si_code)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224{
Heiko Carstens5d7ecce2016-02-24 14:27:46 +0100225 report_user_fault(regs, SIGSEGV, 1);
Eric W. Biederman9507a5d2018-04-15 19:58:32 -0500226 force_sig_fault(SIGSEGV, si_code,
Eric W. Biederman2e1661d22019-05-23 11:04:24 -0500227 (void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700228}
229
Gerald Schaefera80313f2019-02-03 21:37:20 +0100230const struct exception_table_entry *s390_search_extables(unsigned long addr)
231{
232 const struct exception_table_entry *fixup;
233
Heiko Carstensc78d0c72021-08-04 13:40:31 +0200234 fixup = search_extable(__start_amode31_ex_table,
235 __stop_amode31_ex_table - __start_amode31_ex_table,
Gerald Schaefera80313f2019-02-03 21:37:20 +0100236 addr);
237 if (!fixup)
238 fixup = search_exception_tables(addr);
239 return fixup;
240}
241
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100242static noinline void do_no_context(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200243{
244 const struct exception_table_entry *fixup;
245
246 /* Are we prepared to handle this kernel fault? */
Gerald Schaefera80313f2019-02-03 21:37:20 +0100247 fixup = s390_search_extables(regs->psw.addr);
Ilya Leoshkevich05a68e82020-06-30 20:52:03 +0200248 if (fixup && ex_handle(fixup, regs))
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200249 return;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200250
251 /*
252 * Oops. The kernel tried to access some bad page. We'll have to
253 * terminate things with extreme prejudice.
254 */
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200255 if (get_fault_type(regs) == KERNEL_FAULT)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200256 printk(KERN_ALERT "Unable to handle kernel pointer dereference"
Heiko Carstens3b7df342014-04-07 10:20:40 +0200257 " in virtual kernel address space\n");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200258 else
259 printk(KERN_ALERT "Unable to handle kernel paging request"
Heiko Carstens3b7df342014-04-07 10:20:40 +0200260 " in virtual user address space\n");
Heiko Carstens3b7df342014-04-07 10:20:40 +0200261 dump_fault_info(regs);
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100262 die(regs, "Oops");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200263}
264
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100265static noinline void do_low_address(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200266{
267 /* Low-address protection hit in kernel mode means
268 NULL pointer write access in kernel mode. */
269 if (regs->psw.mask & PSW_MASK_PSTATE) {
270 /* Low-address protection hit in user mode 'cannot happen'. */
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100271 die (regs, "Low-address protection");
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200272 }
273
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100274 do_no_context(regs);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200275}
276
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100277static noinline void do_sigbus(struct pt_regs *regs)
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200278{
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200279 /*
280 * Send a sigbus, regardless of whether we were in kernel
281 * or user mode.
282 */
Eric W. Biederman9507a5d2018-04-15 19:58:32 -0500283 force_sig_fault(SIGBUS, BUS_ADRERR,
Eric W. Biederman2e1661d22019-05-23 11:04:24 -0500284 (void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200285}
286
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700287static noinline void do_fault_error(struct pt_regs *regs, int access,
288 vm_fault_t fault)
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100289{
290 int si_code;
291
292 switch (fault) {
293 case VM_FAULT_BADACCESS:
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100294 case VM_FAULT_BADMAP:
295 /* Bad memory access. Check if it is kernel or user space. */
Heiko Carstens7d256172012-07-27 10:31:12 +0200296 if (user_mode(regs)) {
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100297 /* User mode accesses just cause a SIGSEGV */
298 si_code = (fault == VM_FAULT_BADMAP) ?
299 SEGV_MAPERR : SEGV_ACCERR;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100300 do_sigsegv(regs, si_code);
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100301 break;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100302 }
Joe Perches2c7749b2020-03-10 13:47:30 -0700303 fallthrough;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100304 case VM_FAULT_BADCONTEXT:
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200305 case VM_FAULT_PFAULT:
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100306 do_no_context(regs);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100307 break;
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200308 case VM_FAULT_SIGNAL:
309 if (!user_mode(regs))
310 do_no_context(regs);
311 break;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100312 default: /* fault & VM_FAULT_ERROR */
Heiko Carstens99583182011-05-26 09:48:29 +0200313 if (fault & VM_FAULT_OOM) {
Heiko Carstens7d256172012-07-27 10:31:12 +0200314 if (!user_mode(regs))
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100315 do_no_context(regs);
Heiko Carstens99583182011-05-26 09:48:29 +0200316 else
317 pagefault_out_of_memory();
Linus Torvalds33692f22015-01-29 10:51:32 -0800318 } else if (fault & VM_FAULT_SIGSEGV) {
319 /* Kernel mode? Handle exceptions or die */
320 if (!user_mode(regs))
321 do_no_context(regs);
322 else
323 do_sigsegv(regs, SEGV_MAPERR);
Heiko Carstens99583182011-05-26 09:48:29 +0200324 } else if (fault & VM_FAULT_SIGBUS) {
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100325 /* Kernel mode? Handle exceptions or die */
Heiko Carstens7d256172012-07-27 10:31:12 +0200326 if (!user_mode(regs))
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100327 do_no_context(regs);
Martin Schwidefsky36bf9682010-10-25 16:10:35 +0200328 else
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100329 do_sigbus(regs);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100330 } else
331 BUG();
332 break;
333 }
334}
335
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336/*
337 * This routine handles page faults. It determines the address,
338 * and the problem, and then passes it off to one of the appropriate
339 * routines.
340 *
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100341 * interruption code (int_code):
Heiko Carstens7904aaa2020-07-14 07:43:26 +0200342 * 04 Protection -> Write-Protection (suppression)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700343 * 10 Segment translation -> Not present (nullification)
344 * 11 Page translation -> Not present (nullification)
345 * 3b Region third trans. -> Not present (nullification)
346 */
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700347static inline vm_fault_t do_exception(struct pt_regs *regs, int access)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700348{
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200349 struct gmap *gmap;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200350 struct task_struct *tsk;
351 struct mm_struct *mm;
352 struct vm_area_struct *vma;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200353 enum fault_type type;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100354 unsigned long trans_exc_code;
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200355 unsigned long address;
Heiko Carstens33ce6142011-05-26 09:48:30 +0200356 unsigned int flags;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700357 vm_fault_t fault;
Sven Schnellee41ba112021-07-28 21:02:53 +0200358 bool is_write;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700359
Martin Schwidefsky39efd4e2012-11-21 16:36:27 +0100360 tsk = current;
361 /*
362 * The instruction that caused the program check has
363 * been nullified. Don't signal single step via SIGTRAP.
364 */
Sven Schnelle56e62a72020-11-21 11:14:56 +0100365 clear_thread_flag(TIF_PER_TRAP);
Martin Schwidefsky39efd4e2012-11-21 16:36:27 +0100366
Anshuman Khandualb98cca42019-07-16 16:28:00 -0700367 if (kprobe_page_fault(regs, 14))
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100368 return 0;
Michael Grundy4ba069b2006-09-20 15:58:39 +0200369
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200370 mm = tsk->mm;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100371 trans_exc_code = regs->int_parm_long;
Sven Schnellee41ba112021-07-28 21:02:53 +0200372 address = trans_exc_code & __FAIL_ADDR_MASK;
373 is_write = (trans_exc_code & store_indication) == 0x400;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700374
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375 /*
376 * Verify that the fault happened in user space, that
377 * we are not in an interrupt and that there is a
378 * user context.
379 */
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100380 fault = VM_FAULT_BADCONTEXT;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200381 type = get_fault_type(regs);
382 switch (type) {
383 case KERNEL_FAULT:
Sven Schnellee41ba112021-07-28 21:02:53 +0200384 if (kfence_handle_page_fault(address, is_write, regs))
385 return 0;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100386 goto out;
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200387 case USER_FAULT:
388 case GMAP_FAULT:
389 if (faulthandler_disabled() || !mm)
390 goto out;
391 break;
392 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200394 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Peter Xudde16072020-04-01 21:08:37 -0700395 flags = FAULT_FLAG_DEFAULT;
Johannes Weiner759496b2013-09-12 15:13:39 -0700396 if (user_mode(regs))
397 flags |= FAULT_FLAG_USER;
Sven Schnellee41ba112021-07-28 21:02:53 +0200398 if (access == VM_WRITE || is_write)
Heiko Carstens33ce6142011-05-26 09:48:30 +0200399 flags |= FAULT_FLAG_WRITE;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700400 mmap_read_lock(mm);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200402 gmap = NULL;
403 if (IS_ENABLED(CONFIG_PGSTE) && type == GMAP_FAULT) {
404 gmap = (struct gmap *) S390_lowcore.gmap;
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200405 current->thread.gmap_addr = address;
Martin Schwidefsky4be130a2016-03-08 12:12:18 +0100406 current->thread.gmap_write_flag = !!(flags & FAULT_FLAG_WRITE);
David Hildenbrand4a494432016-03-08 12:31:52 +0100407 current->thread.gmap_int_code = regs->int_code & 0xffff;
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200408 address = __gmap_translate(gmap, address);
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200409 if (address == -EFAULT) {
410 fault = VM_FAULT_BADMAP;
411 goto out_up;
412 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200413 if (gmap->pfault_enabled)
414 flags |= FAULT_FLAG_RETRY_NOWAIT;
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200415 }
Martin Schwidefskye5992f22011-07-24 10:48:20 +0200416
417retry:
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100418 fault = VM_FAULT_BADMAP;
Gerald Schaefer482b05d2007-03-05 23:35:54 +0100419 vma = find_vma(mm, address);
420 if (!vma)
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100421 goto out_up;
Gerald Schaeferc1821c22007-02-05 21:18:17 +0100422
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100423 if (unlikely(vma->vm_start > address)) {
424 if (!(vma->vm_flags & VM_GROWSDOWN))
425 goto out_up;
426 if (expand_stack(vma, address))
427 goto out_up;
428 }
429
430 /*
431 * Ok, we have a good vm_area for this memory access, so
432 * we can handle it..
433 */
434 fault = VM_FAULT_BADACCESS;
Martin Schwidefsky1ab947d2009-12-07 12:51:46 +0100435 if (unlikely(!(vma->vm_flags & access)))
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100436 goto out_up;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437
Gerald Schaefer53492b12008-04-30 13:38:46 +0200438 if (is_vm_hugetlb_page(vma))
439 address &= HPAGE_MASK;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 /*
441 * If for any reason at all we couldn't handle the fault,
442 * make sure we exit gracefully rather than endlessly redo
443 * the fault.
444 */
Peter Xu35e45f32020-08-11 18:38:37 -0700445 fault = handle_mm_fault(vma, address, flags, regs);
Peter Xu4ef87322020-04-01 21:08:06 -0700446 if (fault_signal_pending(fault, regs)) {
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200447 fault = VM_FAULT_SIGNAL;
Claudio Imbrenda306d6c42018-07-16 10:38:57 +0200448 if (flags & FAULT_FLAG_RETRY_NOWAIT)
449 goto out_up;
Heiko Carstensf2c76e32012-07-27 08:54:20 +0200450 goto out;
451 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100452 if (unlikely(fault & VM_FAULT_ERROR))
453 goto out_up;
454
Heiko Carstens33ce6142011-05-26 09:48:30 +0200455 if (flags & FAULT_FLAG_ALLOW_RETRY) {
Heiko Carstens33ce6142011-05-26 09:48:30 +0200456 if (fault & VM_FAULT_RETRY) {
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200457 if (IS_ENABLED(CONFIG_PGSTE) && gmap &&
458 (flags & FAULT_FLAG_RETRY_NOWAIT)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200459 /* FAULT_FLAG_RETRY_NOWAIT has been set,
Michel Lespinassec1e8d7c2020-06-08 21:33:54 -0700460 * mmap_lock has not been released */
Dominik Dingel24eb3a82013-06-17 16:25:18 +0200461 current->thread.gmap_pfault = 1;
462 fault = VM_FAULT_PFAULT;
463 goto out_up;
464 }
Peter Xu4064b982020-04-01 21:08:45 -0700465 flags &= ~FAULT_FLAG_RETRY_NOWAIT;
Shaohua Li45cac652012-10-08 16:32:19 -0700466 flags |= FAULT_FLAG_TRIED;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700467 mmap_read_lock(mm);
Heiko Carstens33ce6142011-05-26 09:48:30 +0200468 goto retry;
469 }
Heiko Carstensbde69af2009-09-11 10:29:06 +0200470 }
Martin Schwidefsky0aaba412017-08-22 12:08:22 +0200471 if (IS_ENABLED(CONFIG_PGSTE) && gmap) {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +0200472 address = __gmap_link(gmap, current->thread.gmap_addr,
473 address);
474 if (address == -EFAULT) {
475 fault = VM_FAULT_BADMAP;
476 goto out_up;
477 }
478 if (address == -ENOMEM) {
479 fault = VM_FAULT_OOM;
480 goto out_up;
481 }
482 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100483 fault = 0;
484out_up:
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700485 mmap_read_unlock(mm);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100486out:
487 return fault;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488}
489
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200490void do_protection_exception(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491{
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100492 unsigned long trans_exc_code;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700493 int access;
494 vm_fault_t fault;
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100495
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100496 trans_exc_code = regs->int_parm_long;
Martin Schwidefskyf752ac42013-04-16 13:25:06 +0200497 /*
498 * Protection exceptions are suppressing, decrement psw address.
499 * The exception to this rule are aborted transactions, for these
500 * the PSW already points to the correct location.
501 */
502 if (!(regs->int_code & 0x200))
503 regs->psw.addr = __rewind_psw(regs->psw, regs->int_code >> 16);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200504 /*
505 * Check for low-address protection. This needs to be treated
506 * as a special case because the translation exception code
507 * field is not guaranteed to contain valid data in this case.
508 */
Martin Schwidefsky61365e12009-12-07 12:51:42 +0100509 if (unlikely(!(trans_exc_code & 4))) {
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100510 do_low_address(regs);
Martin Schwidefsky10c10312007-04-27 16:01:43 +0200511 return;
512 }
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100513 if (unlikely(MACHINE_HAS_NX && (trans_exc_code & 0x80))) {
514 regs->int_parm_long = (trans_exc_code & ~PAGE_MASK) |
515 (regs->psw.addr & PAGE_MASK);
516 access = VM_EXEC;
517 fault = VM_FAULT_BADACCESS;
518 } else {
519 access = VM_WRITE;
520 fault = do_exception(regs, access);
521 }
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100522 if (unlikely(fault))
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100523 do_fault_error(regs, access, fault);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700524}
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200525NOKPROBE_SYMBOL(do_protection_exception);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700526
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200527void do_dat_exception(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528{
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700529 int access;
530 vm_fault_t fault;
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100531
Anshuman Khandual6cb4d9a2020-04-10 14:33:09 -0700532 access = VM_ACCESS_FLAGS;
Martin Schwidefskyaa33c8c2011-12-27 11:27:18 +0100533 fault = do_exception(regs, access);
Martin Schwidefsky50d72802009-12-07 12:51:45 +0100534 if (unlikely(fault))
Martin Schwidefsky57d7f932016-03-22 10:54:24 +0100535 do_fault_error(regs, access, fault);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700536}
Heiko Carstens7a5388d2014-10-22 12:42:38 +0200537NOKPROBE_SYMBOL(do_dat_exception);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700538
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539#ifdef CONFIG_PFAULT
540/*
541 * 'pfault' pseudo page faults routines.
542 */
Heiko Carstensfb0a9d72011-01-05 12:47:39 +0100543static int pfault_disable;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700544
545static int __init nopfault(char *str)
546{
547 pfault_disable = 1;
548 return 1;
549}
550
551__setup("nopfault", nopfault);
552
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200553struct pfault_refbk {
554 u16 refdiagc;
555 u16 reffcode;
556 u16 refdwlen;
557 u16 refversn;
558 u64 refgaddr;
559 u64 refselmk;
560 u64 refcmpmk;
561 u64 reserved;
562} __attribute__ ((packed, aligned(8)));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700563
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200564static struct pfault_refbk pfault_init_refbk = {
565 .refdiagc = 0x258,
566 .reffcode = 0,
567 .refdwlen = 5,
568 .refversn = 2,
569 .refgaddr = __LC_LPP,
570 .refselmk = 1ULL << 48,
571 .refcmpmk = 1ULL << 48,
572 .reserved = __PF_RES_FIELD
573};
574
Linus Torvalds1da177e2005-04-16 15:20:36 -0700575int pfault_init(void)
576{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577 int rc;
578
Carsten Ottef32269a2011-12-27 11:27:11 +0100579 if (pfault_disable)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700580 return -1;
Martin Schwidefsky1ec27722015-08-20 17:28:44 +0200581 diag_stat_inc(DIAG_STAT_X258);
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200582 asm volatile(
583 " diag %1,%0,0x258\n"
584 "0: j 2f\n"
585 "1: la %0,8\n"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700586 "2:\n"
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200587 EX_TABLE(0b,1b)
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200588 : "=d" (rc)
589 : "a" (&pfault_init_refbk), "m" (pfault_init_refbk) : "cc");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700590 return rc;
591}
592
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200593static struct pfault_refbk pfault_fini_refbk = {
594 .refdiagc = 0x258,
595 .reffcode = 1,
596 .refdwlen = 5,
597 .refversn = 2,
598};
599
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600void pfault_fini(void)
601{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700602
Carsten Ottef32269a2011-12-27 11:27:11 +0100603 if (pfault_disable)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604 return;
Martin Schwidefsky1ec27722015-08-20 17:28:44 +0200605 diag_stat_inc(DIAG_STAT_X258);
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200606 asm volatile(
607 " diag %0,0,0x258\n"
Heiko Carstens6c22c982016-06-10 09:57:05 +0200608 "0: nopr %%r7\n"
Martin Schwidefsky94c12cc2006-09-28 16:56:43 +0200609 EX_TABLE(0b,0b)
Martin Schwidefsky00e9e662018-09-07 11:20:08 +0200610 : : "a" (&pfault_fini_refbk), "m" (pfault_fini_refbk) : "cc");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700611}
612
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200613static DEFINE_SPINLOCK(pfault_lock);
614static LIST_HEAD(pfault_list);
615
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100616#define PF_COMPLETE 0x0080
617
618/*
619 * The mechanism of our pfault code: if Linux is running as guest, runs a user
620 * space process and the user space process accesses a page that the host has
621 * paged out we get a pfault interrupt.
622 *
623 * This allows us, within the guest, to schedule a different process. Without
624 * this mechanism the host would have to suspend the whole virtual cpu until
625 * the page has been paged in.
626 *
627 * So when we get such an interrupt then we set the state of the current task
628 * to uninterruptible and also set the need_resched flag. Both happens within
629 * interrupt context(!). If we later on want to return to user space we
630 * recognize the need_resched flag and then call schedule(). It's not very
631 * obvious how this works...
632 *
633 * Of course we have a lot of additional fun with the completion interrupt (->
634 * host signals that a page of a process has been paged in and the process can
635 * continue to run). This interrupt can arrive on any cpu and, since we have
636 * virtual cpus, actually appear before the interrupt that signals that a page
637 * is missing.
638 */
Heiko Carstensfde15c32012-03-11 11:59:31 -0400639static void pfault_interrupt(struct ext_code ext_code,
Martin Schwidefskyf6649a72010-10-25 16:10:38 +0200640 unsigned int param32, unsigned long param64)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700641{
642 struct task_struct *tsk;
643 __u16 subcode;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200644 pid_t pid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700645
646 /*
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100647 * Get the external interruption subcode & pfault initial/completion
648 * signal bit. VM stores this in the 'cpu address' field associated
649 * with the external interrupt.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650 */
Heiko Carstensfde15c32012-03-11 11:59:31 -0400651 subcode = ext_code.subcode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 if ((subcode & 0xff00) != __SUBCODE_MASK)
653 return;
Heiko Carstens420f42e2013-01-02 15:18:18 +0100654 inc_irq_stat(IRQEXT_PFL);
Heiko Carstens54c27792012-05-10 09:44:35 +0200655 /* Get the token (= pid of the affected task). */
Hendrik Brueckner544e8dd2016-03-08 14:00:23 +0100656 pid = param64 & LPP_PID_MASK;
Heiko Carstens54c27792012-05-10 09:44:35 +0200657 rcu_read_lock();
658 tsk = find_task_by_pid_ns(pid, &init_pid_ns);
659 if (tsk)
660 get_task_struct(tsk);
661 rcu_read_unlock();
662 if (!tsk)
663 return;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200664 spin_lock(&pfault_lock);
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100665 if (subcode & PF_COMPLETE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700666 /* signal bit is set -> a page has been swapped in by VM */
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200667 if (tsk->thread.pfault_wait == 1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700668 /* Initial interrupt was faster than the completion
669 * interrupt. pfault_wait is valid. Set pfault_wait
670 * back to zero and wake up the process. This can
671 * safely be done because the task is still sleeping
Martin Schwidefskyb6d09442005-09-03 15:58:02 -0700672 * and can't produce new pfaults. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700673 tsk->thread.pfault_wait = 0;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200674 list_del(&tsk->thread.list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700675 wake_up_process(tsk);
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200676 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200677 } else {
678 /* Completion interrupt was faster than initial
679 * interrupt. Set pfault_wait to -1 so the initial
Heiko Carstensfa2fb2f2011-11-14 11:19:01 +0100680 * interrupt doesn't put the task to sleep.
681 * If the task is not running, ignore the completion
682 * interrupt since it must be a leftover of a PFAULT
683 * CANCEL operation which didn't remove all pending
684 * completion interrupts. */
Peter Zijlstrab03fbd42021-06-11 10:28:12 +0200685 if (task_is_running(tsk))
Heiko Carstensfa2fb2f2011-11-14 11:19:01 +0100686 tsk->thread.pfault_wait = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700687 }
688 } else {
689 /* signal bit not set -> a real page is missing. */
Heiko Carstensd49f47f2012-05-10 10:47:21 +0200690 if (WARN_ON_ONCE(tsk != current))
691 goto out;
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200692 if (tsk->thread.pfault_wait == 1) {
693 /* Already on the list with a reference: put to sleep */
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100694 goto block;
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200695 } else if (tsk->thread.pfault_wait == -1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700696 /* Completion interrupt was faster than the initial
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200697 * interrupt (pfault_wait == -1). Set pfault_wait
698 * back to zero and exit. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699 tsk->thread.pfault_wait = 0;
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200700 } else {
701 /* Initial interrupt arrived before completion
Heiko Carstensd5e50a52012-05-09 09:37:30 +0200702 * interrupt. Let the task sleep.
703 * An extra task reference is needed since a different
704 * cpu may set the task state to TASK_RUNNING again
705 * before the scheduler is reached. */
706 get_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200707 tsk->thread.pfault_wait = 1;
708 list_add(&tsk->thread.list, &pfault_list);
Peter Zijlstra0227f7c2016-03-22 21:42:53 +0100709block:
710 /* Since this must be a userspace fault, there
711 * is no kernel task state to trample. Rely on the
712 * return to userspace schedule() to block. */
713 __set_current_state(TASK_UNINTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714 set_tsk_need_resched(tsk);
Martin Schwidefskyc3601922016-10-25 12:21:44 +0200715 set_preempt_need_resched();
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200716 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700717 }
Heiko Carstensd49f47f2012-05-10 10:47:21 +0200718out:
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200719 spin_unlock(&pfault_lock);
Heiko Carstens54c27792012-05-10 09:44:35 +0200720 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200721}
722
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200723static int pfault_cpu_dead(unsigned int cpu)
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200724{
725 struct thread_struct *thread, *next;
726 struct task_struct *tsk;
727
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200728 spin_lock_irq(&pfault_lock);
729 list_for_each_entry_safe(thread, next, &pfault_list, list) {
730 thread->pfault_wait = 0;
731 list_del(&thread->list);
732 tsk = container_of(thread, struct task_struct, thread);
733 wake_up_process(tsk);
734 put_task_struct(tsk);
Heiko Carstensf2db2e62011-05-23 10:24:34 +0200735 }
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200736 spin_unlock_irq(&pfault_lock);
737 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700738}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700739
Heiko Carstensfb0a9d72011-01-05 12:47:39 +0100740static int __init pfault_irq_init(void)
Heiko Carstens29b08d22006-12-04 15:40:40 +0100741{
Heiko Carstensfb0a9d72011-01-05 12:47:39 +0100742 int rc;
Heiko Carstens29b08d22006-12-04 15:40:40 +0100743
Thomas Huth1dad0932014-03-31 15:24:08 +0200744 rc = register_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200745 if (rc)
746 goto out_extint;
747 rc = pfault_init() == 0 ? 0 : -EOPNOTSUPP;
748 if (rc)
749 goto out_pfault;
Heiko Carstens82003c3e2013-09-04 13:35:45 +0200750 irq_subclass_register(IRQ_SUBCLASS_SERVICE_SIGNAL);
Sebastian Andrzej Siewior84c9cee2016-09-06 19:04:53 +0200751 cpuhp_setup_state_nocalls(CPUHP_S390_PFAULT_DEAD, "s390/pfault:dead",
752 NULL, pfault_cpu_dead);
Heiko Carstensfb0a9d72011-01-05 12:47:39 +0100753 return 0;
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200754
755out_pfault:
Thomas Huth1dad0932014-03-31 15:24:08 +0200756 unregister_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200757out_extint:
758 pfault_disable = 1;
759 return rc;
Heiko Carstens29b08d22006-12-04 15:40:40 +0100760}
Heiko Carstensfb0a9d72011-01-05 12:47:39 +0100761early_initcall(pfault_irq_init);
762
Heiko Carstens7dd8fe12011-05-23 10:24:35 +0200763#endif /* CONFIG_PFAULT */
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100764
765#if IS_ENABLED(CONFIG_PGSTE)
Heiko Carstens17a363d2021-04-09 10:34:43 +0200766
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100767void do_secure_storage_access(struct pt_regs *regs)
768{
769 unsigned long addr = regs->int_parm_long & __FAIL_ADDR_MASK;
770 struct vm_area_struct *vma;
771 struct mm_struct *mm;
772 struct page *page;
773 int rc;
774
Janosch Frank85b18d7b2021-01-12 05:40:53 -0500775 /*
776 * bit 61 tells us if the address is valid, if it's not we
777 * have a major problem and should stop the kernel or send a
778 * SIGSEGV to the process. Unfortunately bit 61 is not
779 * reliable without the misc UV feature so we need to check
780 * for that as well.
781 */
782 if (test_bit_inv(BIT_UV_FEAT_MISC, &uv_info.uv_feature_indications) &&
783 !test_bit_inv(61, &regs->int_parm_long)) {
784 /*
785 * When this happens, userspace did something that it
786 * was not supposed to do, e.g. branching into secure
787 * memory. Trigger a segmentation fault.
788 */
789 if (user_mode(regs)) {
790 send_sig(SIGSEGV, current, 0);
791 return;
792 }
793
794 /*
795 * The kernel should never run into this case and we
796 * have no way out of this situation.
797 */
798 panic("Unexpected PGM 0x3d with TEID bit 61=0");
799 }
800
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100801 switch (get_fault_type(regs)) {
802 case USER_FAULT:
803 mm = current->mm;
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700804 mmap_read_lock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100805 vma = find_vma(mm, addr);
806 if (!vma) {
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700807 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100808 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
809 break;
810 }
811 page = follow_page(vma, addr, FOLL_WRITE | FOLL_GET);
812 if (IS_ERR_OR_NULL(page)) {
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700813 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100814 break;
815 }
816 if (arch_make_page_accessible(page))
817 send_sig(SIGSEGV, current, 0);
818 put_page(page);
Michel Lespinassed8ed45c2020-06-08 21:33:25 -0700819 mmap_read_unlock(mm);
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100820 break;
821 case KERNEL_FAULT:
822 page = phys_to_page(addr);
Linus Torvaldscd1adf12021-09-07 11:03:45 -0700823 if (unlikely(!try_get_page(page)))
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100824 break;
825 rc = arch_make_page_accessible(page);
826 put_page(page);
827 if (rc)
828 BUG();
829 break;
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100830 case GMAP_FAULT:
Vasily Gorbik084ea4d2020-01-21 09:43:10 +0100831 default:
832 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
833 WARN_ON_ONCE(1);
834 }
835}
836NOKPROBE_SYMBOL(do_secure_storage_access);
837
838void do_non_secure_storage_access(struct pt_regs *regs)
839{
840 unsigned long gaddr = regs->int_parm_long & __FAIL_ADDR_MASK;
841 struct gmap *gmap = (struct gmap *)S390_lowcore.gmap;
842
843 if (get_fault_type(regs) != GMAP_FAULT) {
844 do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
845 WARN_ON_ONCE(1);
846 return;
847 }
848
849 if (gmap_convert_to_secure(gmap, gaddr) == -EINVAL)
850 send_sig(SIGSEGV, current, 0);
851}
852NOKPROBE_SYMBOL(do_non_secure_storage_access);
853
Janosch Frankcd4d3d52020-09-08 09:05:04 -0400854void do_secure_storage_violation(struct pt_regs *regs)
855{
856 /*
857 * Either KVM messed up the secure guest mapping or the same
858 * page is mapped into multiple secure guests.
859 *
860 * This exception is only triggered when a guest 2 is running
861 * and can therefore never occur in kernel context.
862 */
863 printk_ratelimited(KERN_WARNING
864 "Secure storage violation in task: %s, pid %d\n",
865 current->comm, current->pid);
866 send_sig(SIGSEGV, current, 0);
867}
868
Heiko Carstens17a363d2021-04-09 10:34:43 +0200869#endif /* CONFIG_PGSTE */