xref: /openbmc/linux/arch/s390/mm/fault.c (revision cd4d3d5f)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  *  S390 version
4a53c8fabSHeiko Carstens  *    Copyright IBM Corp. 1999
51da177e4SLinus Torvalds  *    Author(s): Hartmut Penner (hp@de.ibm.com)
61da177e4SLinus Torvalds  *               Ulrich Weigand (uweigand@de.ibm.com)
71da177e4SLinus Torvalds  *
81da177e4SLinus Torvalds  *  Derived from "arch/i386/mm/fault.c"
91da177e4SLinus Torvalds  *    Copyright (C) 1995  Linus Torvalds
101da177e4SLinus Torvalds  */
111da177e4SLinus Torvalds 
12052ff461SHeiko Carstens #include <linux/kernel_stat.h>
13cdd6c482SIngo Molnar #include <linux/perf_event.h>
141da177e4SLinus Torvalds #include <linux/signal.h>
151da177e4SLinus Torvalds #include <linux/sched.h>
16b17b0153SIngo Molnar #include <linux/sched/debug.h>
171da177e4SLinus Torvalds #include <linux/kernel.h>
181da177e4SLinus Torvalds #include <linux/errno.h>
191da177e4SLinus Torvalds #include <linux/string.h>
201da177e4SLinus Torvalds #include <linux/types.h>
211da177e4SLinus Torvalds #include <linux/ptrace.h>
221da177e4SLinus Torvalds #include <linux/mman.h>
231da177e4SLinus Torvalds #include <linux/mm.h>
247757591aSHeiko Carstens #include <linux/compat.h>
251da177e4SLinus Torvalds #include <linux/smp.h>
261eeb66a1SChristoph Hellwig #include <linux/kdebug.h>
271da177e4SLinus Torvalds #include <linux/init.h>
281da177e4SLinus Torvalds #include <linux/console.h>
29dcc096c5SPaul Gortmaker #include <linux/extable.h>
301da177e4SLinus Torvalds #include <linux/hardirq.h>
314ba069b8SMichael Grundy #include <linux/kprobes.h>
32be5ec363SMartin Schwidefsky #include <linux/uaccess.h>
3353492b1dSGerald Schaefer #include <linux/hugetlb.h>
34cbb870c8SHeiko Carstens #include <asm/asm-offsets.h>
351ec2772eSMartin Schwidefsky #include <asm/diag.h>
361e133ab2SMartin Schwidefsky #include <asm/gmap.h>
37d7b250e2SHeiko Carstens #include <asm/irq.h>
386252d702SMartin Schwidefsky #include <asm/mmu_context.h>
39a0616cdeSDavid Howells #include <asm/facility.h>
40084ea4d6SVasily Gorbik #include <asm/uv.h>
41a806170eSHeiko Carstens #include "../kernel/entry.h"
421da177e4SLinus Torvalds 
431da177e4SLinus Torvalds #define __FAIL_ADDR_MASK -4096L
441da177e4SLinus Torvalds #define __SUBCODE_MASK 0x0600
451da177e4SLinus Torvalds #define __PF_RES_FIELD 0x8000000000000000ULL
461da177e4SLinus Torvalds 
4712437759SChristian Borntraeger #define VM_FAULT_BADCONTEXT	((__force vm_fault_t) 0x010000)
4812437759SChristian Borntraeger #define VM_FAULT_BADMAP		((__force vm_fault_t) 0x020000)
4912437759SChristian Borntraeger #define VM_FAULT_BADACCESS	((__force vm_fault_t) 0x040000)
5012437759SChristian Borntraeger #define VM_FAULT_SIGNAL		((__force vm_fault_t) 0x080000)
5112437759SChristian Borntraeger #define VM_FAULT_PFAULT		((__force vm_fault_t) 0x100000)
5250d7280dSMartin Schwidefsky 
530aaba41bSMartin Schwidefsky enum fault_type {
540aaba41bSMartin Schwidefsky 	KERNEL_FAULT,
550aaba41bSMartin Schwidefsky 	USER_FAULT,
560aaba41bSMartin Schwidefsky 	VDSO_FAULT,
570aaba41bSMartin Schwidefsky 	GMAP_FAULT,
580aaba41bSMartin Schwidefsky };
590aaba41bSMartin Schwidefsky 
60a4f32bdbSHeiko Carstens static unsigned long store_indication __read_mostly;
6192f842eaSMartin Schwidefsky 
62a4f32bdbSHeiko Carstens static int __init fault_init(void)
6392f842eaSMartin Schwidefsky {
64a4f32bdbSHeiko Carstens 	if (test_facility(75))
6592f842eaSMartin Schwidefsky 		store_indication = 0xc00;
66a4f32bdbSHeiko Carstens 	return 0;
6792f842eaSMartin Schwidefsky }
68a4f32bdbSHeiko Carstens early_initcall(fault_init);
6992f842eaSMartin Schwidefsky 
701da177e4SLinus Torvalds /*
710aaba41bSMartin Schwidefsky  * Find out which address space caused the exception.
721da177e4SLinus Torvalds  */
73bf2f1eeeSMasahiro Yamada static enum fault_type get_fault_type(struct pt_regs *regs)
741da177e4SLinus Torvalds {
75457f2180SHeiko Carstens 	unsigned long trans_exc_code;
76457f2180SHeiko Carstens 
77457f2180SHeiko Carstens 	trans_exc_code = regs->int_parm_long & 3;
780aaba41bSMartin Schwidefsky 	if (likely(trans_exc_code == 0)) {
790aaba41bSMartin Schwidefsky 		/* primary space exception */
800aaba41bSMartin Schwidefsky 		if (IS_ENABLED(CONFIG_PGSTE) &&
810aaba41bSMartin Schwidefsky 		    test_pt_regs_flag(regs, PIF_GUEST_FAULT))
820aaba41bSMartin Schwidefsky 			return GMAP_FAULT;
830aaba41bSMartin Schwidefsky 		if (current->thread.mm_segment == USER_DS)
840aaba41bSMartin Schwidefsky 			return USER_FAULT;
850aaba41bSMartin Schwidefsky 		return KERNEL_FAULT;
860aaba41bSMartin Schwidefsky 	}
870aaba41bSMartin Schwidefsky 	if (trans_exc_code == 2) {
880aaba41bSMartin Schwidefsky 		/* secondary space exception */
890aaba41bSMartin Schwidefsky 		if (current->thread.mm_segment & 1) {
900aaba41bSMartin Schwidefsky 			if (current->thread.mm_segment == USER_DS_SACF)
910aaba41bSMartin Schwidefsky 				return USER_FAULT;
920aaba41bSMartin Schwidefsky 			return KERNEL_FAULT;
930aaba41bSMartin Schwidefsky 		}
940aaba41bSMartin Schwidefsky 		return VDSO_FAULT;
950aaba41bSMartin Schwidefsky 	}
96962f0af8SGerald Schaefer 	if (trans_exc_code == 1) {
97962f0af8SGerald Schaefer 		/* access register mode, not used in the kernel */
98962f0af8SGerald Schaefer 		return USER_FAULT;
99962f0af8SGerald Schaefer 	}
1000aaba41bSMartin Schwidefsky 	/* home space exception -> access via kernel ASCE */
1010aaba41bSMartin Schwidefsky 	return KERNEL_FAULT;
1021da177e4SLinus Torvalds }
1031da177e4SLinus Torvalds 
1043b7df342SHeiko Carstens static int bad_address(void *p)
1053b7df342SHeiko Carstens {
1063b7df342SHeiko Carstens 	unsigned long dummy;
1073b7df342SHeiko Carstens 
10825f12ae4SChristoph Hellwig 	return get_kernel_nofault(dummy, (unsigned long *)p);
1093b7df342SHeiko Carstens }
1103b7df342SHeiko Carstens 
1113b7df342SHeiko Carstens static void dump_pagetable(unsigned long asce, unsigned long address)
1123b7df342SHeiko Carstens {
113fe7b2747SHeiko Carstens 	unsigned long *table = __va(asce & _ASCE_ORIGIN);
1143b7df342SHeiko Carstens 
1153b7df342SHeiko Carstens 	pr_alert("AS:%016lx ", asce);
1163b7df342SHeiko Carstens 	switch (asce & _ASCE_TYPE_MASK) {
1173b7df342SHeiko Carstens 	case _ASCE_TYPE_REGION1:
118f1c1174fSHeiko Carstens 		table += (address & _REGION1_INDEX) >> _REGION1_SHIFT;
1193b7df342SHeiko Carstens 		if (bad_address(table))
1203b7df342SHeiko Carstens 			goto bad;
1213b7df342SHeiko Carstens 		pr_cont("R1:%016lx ", *table);
1223b7df342SHeiko Carstens 		if (*table & _REGION_ENTRY_INVALID)
1233b7df342SHeiko Carstens 			goto out;
1243b7df342SHeiko Carstens 		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
1252c7749b9SJoe Perches 		fallthrough;
1263b7df342SHeiko Carstens 	case _ASCE_TYPE_REGION2:
127f1c1174fSHeiko Carstens 		table += (address & _REGION2_INDEX) >> _REGION2_SHIFT;
1283b7df342SHeiko Carstens 		if (bad_address(table))
1293b7df342SHeiko Carstens 			goto bad;
1303b7df342SHeiko Carstens 		pr_cont("R2:%016lx ", *table);
1313b7df342SHeiko Carstens 		if (*table & _REGION_ENTRY_INVALID)
1323b7df342SHeiko Carstens 			goto out;
1333b7df342SHeiko Carstens 		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
1342c7749b9SJoe Perches 		fallthrough;
1353b7df342SHeiko Carstens 	case _ASCE_TYPE_REGION3:
136f1c1174fSHeiko Carstens 		table += (address & _REGION3_INDEX) >> _REGION3_SHIFT;
1373b7df342SHeiko Carstens 		if (bad_address(table))
1383b7df342SHeiko Carstens 			goto bad;
1393b7df342SHeiko Carstens 		pr_cont("R3:%016lx ", *table);
1403b7df342SHeiko Carstens 		if (*table & (_REGION_ENTRY_INVALID | _REGION3_ENTRY_LARGE))
1413b7df342SHeiko Carstens 			goto out;
1423b7df342SHeiko Carstens 		table = (unsigned long *)(*table & _REGION_ENTRY_ORIGIN);
1432c7749b9SJoe Perches 		fallthrough;
1443b7df342SHeiko Carstens 	case _ASCE_TYPE_SEGMENT:
145f1c1174fSHeiko Carstens 		table += (address & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
1463b7df342SHeiko Carstens 		if (bad_address(table))
1473b7df342SHeiko Carstens 			goto bad;
14891c0837eSJoe Perches 		pr_cont("S:%016lx ", *table);
1493b7df342SHeiko Carstens 		if (*table & (_SEGMENT_ENTRY_INVALID | _SEGMENT_ENTRY_LARGE))
1503b7df342SHeiko Carstens 			goto out;
1513b7df342SHeiko Carstens 		table = (unsigned long *)(*table & _SEGMENT_ENTRY_ORIGIN);
1523b7df342SHeiko Carstens 	}
153f1c1174fSHeiko Carstens 	table += (address & _PAGE_INDEX) >> _PAGE_SHIFT;
1543b7df342SHeiko Carstens 	if (bad_address(table))
1553b7df342SHeiko Carstens 		goto bad;
1563b7df342SHeiko Carstens 	pr_cont("P:%016lx ", *table);
1573b7df342SHeiko Carstens out:
1583b7df342SHeiko Carstens 	pr_cont("\n");
1593b7df342SHeiko Carstens 	return;
1603b7df342SHeiko Carstens bad:
1613b7df342SHeiko Carstens 	pr_cont("BAD\n");
1623b7df342SHeiko Carstens }
1633b7df342SHeiko Carstens 
1643b7df342SHeiko Carstens static void dump_fault_info(struct pt_regs *regs)
1653b7df342SHeiko Carstens {
1663b7df342SHeiko Carstens 	unsigned long asce;
1673b7df342SHeiko Carstens 
1685d7eccecSHeiko Carstens 	pr_alert("Failing address: %016lx TEID: %016lx\n",
1695d7eccecSHeiko Carstens 		 regs->int_parm_long & __FAIL_ADDR_MASK, regs->int_parm_long);
1703b7df342SHeiko Carstens 	pr_alert("Fault in ");
1713b7df342SHeiko Carstens 	switch (regs->int_parm_long & 3) {
1723b7df342SHeiko Carstens 	case 3:
1733b7df342SHeiko Carstens 		pr_cont("home space ");
1743b7df342SHeiko Carstens 		break;
1753b7df342SHeiko Carstens 	case 2:
1763b7df342SHeiko Carstens 		pr_cont("secondary space ");
1773b7df342SHeiko Carstens 		break;
1783b7df342SHeiko Carstens 	case 1:
1793b7df342SHeiko Carstens 		pr_cont("access register ");
1803b7df342SHeiko Carstens 		break;
1813b7df342SHeiko Carstens 	case 0:
1823b7df342SHeiko Carstens 		pr_cont("primary space ");
1833b7df342SHeiko Carstens 		break;
1843b7df342SHeiko Carstens 	}
1853b7df342SHeiko Carstens 	pr_cont("mode while using ");
1860aaba41bSMartin Schwidefsky 	switch (get_fault_type(regs)) {
1870aaba41bSMartin Schwidefsky 	case USER_FAULT:
1883b7df342SHeiko Carstens 		asce = S390_lowcore.user_asce;
1893b7df342SHeiko Carstens 		pr_cont("user ");
1900aaba41bSMartin Schwidefsky 		break;
1910aaba41bSMartin Schwidefsky 	case VDSO_FAULT:
1920aaba41bSMartin Schwidefsky 		asce = S390_lowcore.vdso_asce;
1930aaba41bSMartin Schwidefsky 		pr_cont("vdso ");
1940aaba41bSMartin Schwidefsky 		break;
1950aaba41bSMartin Schwidefsky 	case GMAP_FAULT:
1960aaba41bSMartin Schwidefsky 		asce = ((struct gmap *) S390_lowcore.gmap)->asce;
1970aaba41bSMartin Schwidefsky 		pr_cont("gmap ");
1980aaba41bSMartin Schwidefsky 		break;
1990aaba41bSMartin Schwidefsky 	case KERNEL_FAULT:
2000aaba41bSMartin Schwidefsky 		asce = S390_lowcore.kernel_asce;
2010aaba41bSMartin Schwidefsky 		pr_cont("kernel ");
2020aaba41bSMartin Schwidefsky 		break;
203bf2f1eeeSMasahiro Yamada 	default:
204bf2f1eeeSMasahiro Yamada 		unreachable();
2053b7df342SHeiko Carstens 	}
2063b7df342SHeiko Carstens 	pr_cont("ASCE.\n");
2073b7df342SHeiko Carstens 	dump_pagetable(asce, regs->int_parm_long & __FAIL_ADDR_MASK);
2083b7df342SHeiko Carstens }
2093b7df342SHeiko Carstens 
2105d7eccecSHeiko Carstens int show_unhandled_signals = 1;
2115d7eccecSHeiko Carstens 
2125d7eccecSHeiko Carstens void report_user_fault(struct pt_regs *regs, long signr, int is_mm_fault)
213ab3c68eeSHeiko Carstens {
214ab3c68eeSHeiko Carstens 	if ((task_pid_nr(current) > 1) && !show_unhandled_signals)
215ab3c68eeSHeiko Carstens 		return;
216ab3c68eeSHeiko Carstens 	if (!unhandled_signal(current, signr))
217ab3c68eeSHeiko Carstens 		return;
218ab3c68eeSHeiko Carstens 	if (!printk_ratelimit())
219ab3c68eeSHeiko Carstens 		return;
220413d4047SHeiko Carstens 	printk(KERN_ALERT "User process fault: interruption code %04x ilc:%d ",
221413d4047SHeiko Carstens 	       regs->int_code & 0xffff, regs->int_code >> 17);
2229cb1ccecSHeiko Carstens 	print_vma_addr(KERN_CONT "in ", regs->psw.addr);
223aa33c8cbSMartin Schwidefsky 	printk(KERN_CONT "\n");
2245d7eccecSHeiko Carstens 	if (is_mm_fault)
2253b7df342SHeiko Carstens 		dump_fault_info(regs);
226ab3c68eeSHeiko Carstens 	show_regs(regs);
227ab3c68eeSHeiko Carstens }
228ab3c68eeSHeiko Carstens 
2291da177e4SLinus Torvalds /*
2301da177e4SLinus Torvalds  * Send SIGSEGV to task.  This is an external routine
2311da177e4SLinus Torvalds  * to keep the stack usage of do_page_fault small.
2321da177e4SLinus Torvalds  */
233aa33c8cbSMartin Schwidefsky static noinline void do_sigsegv(struct pt_regs *regs, int si_code)
2341da177e4SLinus Torvalds {
2355d7eccecSHeiko Carstens 	report_user_fault(regs, SIGSEGV, 1);
2369507a5d0SEric W. Biederman 	force_sig_fault(SIGSEGV, si_code,
2372e1661d2SEric W. Biederman 			(void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
2381da177e4SLinus Torvalds }
2391da177e4SLinus Torvalds 
240a80313ffSGerald Schaefer const struct exception_table_entry *s390_search_extables(unsigned long addr)
241a80313ffSGerald Schaefer {
242a80313ffSGerald Schaefer 	const struct exception_table_entry *fixup;
243a80313ffSGerald Schaefer 
244a80313ffSGerald Schaefer 	fixup = search_extable(__start_dma_ex_table,
245a80313ffSGerald Schaefer 			       __stop_dma_ex_table - __start_dma_ex_table,
246a80313ffSGerald Schaefer 			       addr);
247a80313ffSGerald Schaefer 	if (!fixup)
248a80313ffSGerald Schaefer 		fixup = search_exception_tables(addr);
249a80313ffSGerald Schaefer 	return fixup;
250a80313ffSGerald Schaefer }
251a80313ffSGerald Schaefer 
252aa33c8cbSMartin Schwidefsky static noinline void do_no_context(struct pt_regs *regs)
25310c1031fSMartin Schwidefsky {
25410c1031fSMartin Schwidefsky 	const struct exception_table_entry *fixup;
25510c1031fSMartin Schwidefsky 
25610c1031fSMartin Schwidefsky 	/* Are we prepared to handle this kernel fault?  */
257a80313ffSGerald Schaefer 	fixup = s390_search_extables(regs->psw.addr);
25805a68e89SIlya Leoshkevich 	if (fixup && ex_handle(fixup, regs))
25910c1031fSMartin Schwidefsky 		return;
26010c1031fSMartin Schwidefsky 
26110c1031fSMartin Schwidefsky 	/*
26210c1031fSMartin Schwidefsky 	 * Oops. The kernel tried to access some bad page. We'll have to
26310c1031fSMartin Schwidefsky 	 * terminate things with extreme prejudice.
26410c1031fSMartin Schwidefsky 	 */
2650aaba41bSMartin Schwidefsky 	if (get_fault_type(regs) == KERNEL_FAULT)
26610c1031fSMartin Schwidefsky 		printk(KERN_ALERT "Unable to handle kernel pointer dereference"
2673b7df342SHeiko Carstens 		       " in virtual kernel address space\n");
26810c1031fSMartin Schwidefsky 	else
26910c1031fSMartin Schwidefsky 		printk(KERN_ALERT "Unable to handle kernel paging request"
2703b7df342SHeiko Carstens 		       " in virtual user address space\n");
2713b7df342SHeiko Carstens 	dump_fault_info(regs);
272aa33c8cbSMartin Schwidefsky 	die(regs, "Oops");
27310c1031fSMartin Schwidefsky 	do_exit(SIGKILL);
27410c1031fSMartin Schwidefsky }
27510c1031fSMartin Schwidefsky 
276aa33c8cbSMartin Schwidefsky static noinline void do_low_address(struct pt_regs *regs)
27710c1031fSMartin Schwidefsky {
27810c1031fSMartin Schwidefsky 	/* Low-address protection hit in kernel mode means
27910c1031fSMartin Schwidefsky 	   NULL pointer write access in kernel mode.  */
28010c1031fSMartin Schwidefsky 	if (regs->psw.mask & PSW_MASK_PSTATE) {
28110c1031fSMartin Schwidefsky 		/* Low-address protection hit in user mode 'cannot happen'. */
282aa33c8cbSMartin Schwidefsky 		die (regs, "Low-address protection");
28310c1031fSMartin Schwidefsky 		do_exit(SIGKILL);
28410c1031fSMartin Schwidefsky 	}
28510c1031fSMartin Schwidefsky 
286aa33c8cbSMartin Schwidefsky 	do_no_context(regs);
28710c1031fSMartin Schwidefsky }
28810c1031fSMartin Schwidefsky 
289aa33c8cbSMartin Schwidefsky static noinline void do_sigbus(struct pt_regs *regs)
29010c1031fSMartin Schwidefsky {
29110c1031fSMartin Schwidefsky 	/*
29210c1031fSMartin Schwidefsky 	 * Send a sigbus, regardless of whether we were in kernel
29310c1031fSMartin Schwidefsky 	 * or user mode.
29410c1031fSMartin Schwidefsky 	 */
2959507a5d0SEric W. Biederman 	force_sig_fault(SIGBUS, BUS_ADRERR,
2962e1661d2SEric W. Biederman 			(void __user *)(regs->int_parm_long & __FAIL_ADDR_MASK));
29710c1031fSMartin Schwidefsky }
29810c1031fSMartin Schwidefsky 
29957d7f939SMartin Schwidefsky static noinline int signal_return(struct pt_regs *regs)
30057d7f939SMartin Schwidefsky {
30157d7f939SMartin Schwidefsky 	u16 instruction;
30257d7f939SMartin Schwidefsky 	int rc;
30357d7f939SMartin Schwidefsky 
30457d7f939SMartin Schwidefsky 	rc = __get_user(instruction, (u16 __user *) regs->psw.addr);
30557d7f939SMartin Schwidefsky 	if (rc)
30657d7f939SMartin Schwidefsky 		return rc;
30757d7f939SMartin Schwidefsky 	if (instruction == 0x0a77) {
30857d7f939SMartin Schwidefsky 		set_pt_regs_flag(regs, PIF_SYSCALL);
30957d7f939SMartin Schwidefsky 		regs->int_code = 0x00040077;
31057d7f939SMartin Schwidefsky 		return 0;
31157d7f939SMartin Schwidefsky 	} else if (instruction == 0x0aad) {
31257d7f939SMartin Schwidefsky 		set_pt_regs_flag(regs, PIF_SYSCALL);
31357d7f939SMartin Schwidefsky 		regs->int_code = 0x000400ad;
31457d7f939SMartin Schwidefsky 		return 0;
31557d7f939SMartin Schwidefsky 	}
31657d7f939SMartin Schwidefsky 	return -EACCES;
31757d7f939SMartin Schwidefsky }
31857d7f939SMartin Schwidefsky 
31950a7ca3cSSouptick Joarder static noinline void do_fault_error(struct pt_regs *regs, int access,
32050a7ca3cSSouptick Joarder 					vm_fault_t fault)
32150d7280dSMartin Schwidefsky {
32250d7280dSMartin Schwidefsky 	int si_code;
32350d7280dSMartin Schwidefsky 
32450d7280dSMartin Schwidefsky 	switch (fault) {
32550d7280dSMartin Schwidefsky 	case VM_FAULT_BADACCESS:
32657d7f939SMartin Schwidefsky 		if (access == VM_EXEC && signal_return(regs) == 0)
32757d7f939SMartin Schwidefsky 			break;
3282c7749b9SJoe Perches 		fallthrough;
32950d7280dSMartin Schwidefsky 	case VM_FAULT_BADMAP:
33050d7280dSMartin Schwidefsky 		/* Bad memory access. Check if it is kernel or user space. */
3317d256175SHeiko Carstens 		if (user_mode(regs)) {
33250d7280dSMartin Schwidefsky 			/* User mode accesses just cause a SIGSEGV */
33350d7280dSMartin Schwidefsky 			si_code = (fault == VM_FAULT_BADMAP) ?
33450d7280dSMartin Schwidefsky 				SEGV_MAPERR : SEGV_ACCERR;
335aa33c8cbSMartin Schwidefsky 			do_sigsegv(regs, si_code);
33657d7f939SMartin Schwidefsky 			break;
33750d7280dSMartin Schwidefsky 		}
3382c7749b9SJoe Perches 		fallthrough;
33950d7280dSMartin Schwidefsky 	case VM_FAULT_BADCONTEXT:
34024eb3a82SDominik Dingel 	case VM_FAULT_PFAULT:
341aa33c8cbSMartin Schwidefsky 		do_no_context(regs);
34250d7280dSMartin Schwidefsky 		break;
343f2c76e3bSHeiko Carstens 	case VM_FAULT_SIGNAL:
344f2c76e3bSHeiko Carstens 		if (!user_mode(regs))
345f2c76e3bSHeiko Carstens 			do_no_context(regs);
346f2c76e3bSHeiko Carstens 		break;
34750d7280dSMartin Schwidefsky 	default: /* fault & VM_FAULT_ERROR */
34899583181SHeiko Carstens 		if (fault & VM_FAULT_OOM) {
3497d256175SHeiko Carstens 			if (!user_mode(regs))
350aa33c8cbSMartin Schwidefsky 				do_no_context(regs);
35199583181SHeiko Carstens 			else
35250d7280dSMartin Schwidefsky 				pagefault_out_of_memory();
35333692f27SLinus Torvalds 		} else if (fault & VM_FAULT_SIGSEGV) {
35433692f27SLinus Torvalds 			/* Kernel mode? Handle exceptions or die */
35533692f27SLinus Torvalds 			if (!user_mode(regs))
35633692f27SLinus Torvalds 				do_no_context(regs);
35733692f27SLinus Torvalds 			else
35833692f27SLinus Torvalds 				do_sigsegv(regs, SEGV_MAPERR);
35999583181SHeiko Carstens 		} else if (fault & VM_FAULT_SIGBUS) {
36050d7280dSMartin Schwidefsky 			/* Kernel mode? Handle exceptions or die */
3617d256175SHeiko Carstens 			if (!user_mode(regs))
362aa33c8cbSMartin Schwidefsky 				do_no_context(regs);
36336bf9680SMartin Schwidefsky 			else
364aa33c8cbSMartin Schwidefsky 				do_sigbus(regs);
36550d7280dSMartin Schwidefsky 		} else
36650d7280dSMartin Schwidefsky 			BUG();
36750d7280dSMartin Schwidefsky 		break;
36850d7280dSMartin Schwidefsky 	}
36950d7280dSMartin Schwidefsky }
37050d7280dSMartin Schwidefsky 
3711da177e4SLinus Torvalds /*
3721da177e4SLinus Torvalds  * This routine handles page faults.  It determines the address,
3731da177e4SLinus Torvalds  * and the problem, and then passes it off to one of the appropriate
3741da177e4SLinus Torvalds  * routines.
3751da177e4SLinus Torvalds  *
37650d7280dSMartin Schwidefsky  * interruption code (int_code):
3777904aaa8SHeiko Carstens  *   04       Protection           ->  Write-Protection  (suppression)
3781da177e4SLinus Torvalds  *   10       Segment translation  ->  Not present       (nullification)
3791da177e4SLinus Torvalds  *   11       Page translation     ->  Not present       (nullification)
3801da177e4SLinus Torvalds  *   3b       Region third trans.  ->  Not present       (nullification)
3811da177e4SLinus Torvalds  */
38250a7ca3cSSouptick Joarder static inline vm_fault_t do_exception(struct pt_regs *regs, int access)
3831da177e4SLinus Torvalds {
38424eb3a82SDominik Dingel 	struct gmap *gmap;
3851da177e4SLinus Torvalds 	struct task_struct *tsk;
3861da177e4SLinus Torvalds 	struct mm_struct *mm;
3871da177e4SLinus Torvalds 	struct vm_area_struct *vma;
3880aaba41bSMartin Schwidefsky 	enum fault_type type;
389aa33c8cbSMartin Schwidefsky 	unsigned long trans_exc_code;
3901da177e4SLinus Torvalds 	unsigned long address;
39133ce6140SHeiko Carstens 	unsigned int flags;
39250a7ca3cSSouptick Joarder 	vm_fault_t fault;
39310c1031fSMartin Schwidefsky 
39439efd4ecSMartin Schwidefsky 	tsk = current;
39539efd4ecSMartin Schwidefsky 	/*
39639efd4ecSMartin Schwidefsky 	 * The instruction that caused the program check has
39739efd4ecSMartin Schwidefsky 	 * been nullified. Don't signal single step via SIGTRAP.
39839efd4ecSMartin Schwidefsky 	 */
399d3a73acbSMartin Schwidefsky 	clear_pt_regs_flag(regs, PIF_PER_TRAP);
40039efd4ecSMartin Schwidefsky 
401b98cca44SAnshuman Khandual 	if (kprobe_page_fault(regs, 14))
40250d7280dSMartin Schwidefsky 		return 0;
4031da177e4SLinus Torvalds 
4041da177e4SLinus Torvalds 	mm = tsk->mm;
405aa33c8cbSMartin Schwidefsky 	trans_exc_code = regs->int_parm_long;
4061da177e4SLinus Torvalds 
4071da177e4SLinus Torvalds 	/*
4081da177e4SLinus Torvalds 	 * Verify that the fault happened in user space, that
4091da177e4SLinus Torvalds 	 * we are not in an interrupt and that there is a
4101da177e4SLinus Torvalds 	 * user context.
4111da177e4SLinus Torvalds 	 */
41250d7280dSMartin Schwidefsky 	fault = VM_FAULT_BADCONTEXT;
4130aaba41bSMartin Schwidefsky 	type = get_fault_type(regs);
4140aaba41bSMartin Schwidefsky 	switch (type) {
4150aaba41bSMartin Schwidefsky 	case KERNEL_FAULT:
41650d7280dSMartin Schwidefsky 		goto out;
4170aaba41bSMartin Schwidefsky 	case VDSO_FAULT:
4180aaba41bSMartin Schwidefsky 		fault = VM_FAULT_BADMAP;
4190aaba41bSMartin Schwidefsky 		goto out;
4200aaba41bSMartin Schwidefsky 	case USER_FAULT:
4210aaba41bSMartin Schwidefsky 	case GMAP_FAULT:
4220aaba41bSMartin Schwidefsky 		if (faulthandler_disabled() || !mm)
4230aaba41bSMartin Schwidefsky 			goto out;
4240aaba41bSMartin Schwidefsky 		break;
4250aaba41bSMartin Schwidefsky 	}
4261da177e4SLinus Torvalds 
42761365e13SMartin Schwidefsky 	address = trans_exc_code & __FAIL_ADDR_MASK;
428a8b0ca17SPeter Zijlstra 	perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
429dde16072SPeter Xu 	flags = FAULT_FLAG_DEFAULT;
430759496baSJohannes Weiner 	if (user_mode(regs))
431759496baSJohannes Weiner 		flags |= FAULT_FLAG_USER;
43233ce6140SHeiko Carstens 	if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400)
43333ce6140SHeiko Carstens 		flags |= FAULT_FLAG_WRITE;
434d8ed45c5SMichel Lespinasse 	mmap_read_lock(mm);
4351da177e4SLinus Torvalds 
4360aaba41bSMartin Schwidefsky 	gmap = NULL;
4370aaba41bSMartin Schwidefsky 	if (IS_ENABLED(CONFIG_PGSTE) && type == GMAP_FAULT) {
4380aaba41bSMartin Schwidefsky 		gmap = (struct gmap *) S390_lowcore.gmap;
439527e30b4SMartin Schwidefsky 		current->thread.gmap_addr = address;
4404be130a0SMartin Schwidefsky 		current->thread.gmap_write_flag = !!(flags & FAULT_FLAG_WRITE);
4414a494439SDavid Hildenbrand 		current->thread.gmap_int_code = regs->int_code & 0xffff;
442527e30b4SMartin Schwidefsky 		address = __gmap_translate(gmap, address);
443e5992f2eSMartin Schwidefsky 		if (address == -EFAULT) {
444e5992f2eSMartin Schwidefsky 			fault = VM_FAULT_BADMAP;
445e5992f2eSMartin Schwidefsky 			goto out_up;
446e5992f2eSMartin Schwidefsky 		}
44724eb3a82SDominik Dingel 		if (gmap->pfault_enabled)
44824eb3a82SDominik Dingel 			flags |= FAULT_FLAG_RETRY_NOWAIT;
449e5992f2eSMartin Schwidefsky 	}
450e5992f2eSMartin Schwidefsky 
451e5992f2eSMartin Schwidefsky retry:
45250d7280dSMartin Schwidefsky 	fault = VM_FAULT_BADMAP;
4531da177e4SLinus Torvalds 	vma = find_vma(mm, address);
4541da177e4SLinus Torvalds 	if (!vma)
45550d7280dSMartin Schwidefsky 		goto out_up;
456c1821c2eSGerald Schaefer 
45750d7280dSMartin Schwidefsky 	if (unlikely(vma->vm_start > address)) {
4581da177e4SLinus Torvalds 		if (!(vma->vm_flags & VM_GROWSDOWN))
45950d7280dSMartin Schwidefsky 			goto out_up;
4601da177e4SLinus Torvalds 		if (expand_stack(vma, address))
46150d7280dSMartin Schwidefsky 			goto out_up;
46250d7280dSMartin Schwidefsky 	}
46350d7280dSMartin Schwidefsky 
4641da177e4SLinus Torvalds 	/*
4651da177e4SLinus Torvalds 	 * Ok, we have a good vm_area for this memory access, so
4661da177e4SLinus Torvalds 	 * we can handle it..
4671da177e4SLinus Torvalds 	 */
46850d7280dSMartin Schwidefsky 	fault = VM_FAULT_BADACCESS;
4691ab947deSMartin Schwidefsky 	if (unlikely(!(vma->vm_flags & access)))
47050d7280dSMartin Schwidefsky 		goto out_up;
4711da177e4SLinus Torvalds 
47253492b1dSGerald Schaefer 	if (is_vm_hugetlb_page(vma))
47353492b1dSGerald Schaefer 		address &= HPAGE_MASK;
4741da177e4SLinus Torvalds 	/*
4751da177e4SLinus Torvalds 	 * If for any reason at all we couldn't handle the fault,
4761da177e4SLinus Torvalds 	 * make sure we exit gracefully rather than endlessly redo
4771da177e4SLinus Torvalds 	 * the fault.
4781da177e4SLinus Torvalds 	 */
47935e45f3eSPeter Xu 	fault = handle_mm_fault(vma, address, flags, regs);
4804ef87322SPeter Xu 	if (fault_signal_pending(fault, regs)) {
481f2c76e3bSHeiko Carstens 		fault = VM_FAULT_SIGNAL;
482306d6c49SClaudio Imbrenda 		if (flags & FAULT_FLAG_RETRY_NOWAIT)
483306d6c49SClaudio Imbrenda 			goto out_up;
484f2c76e3bSHeiko Carstens 		goto out;
485f2c76e3bSHeiko Carstens 	}
48650d7280dSMartin Schwidefsky 	if (unlikely(fault & VM_FAULT_ERROR))
48750d7280dSMartin Schwidefsky 		goto out_up;
48850d7280dSMartin Schwidefsky 
48933ce6140SHeiko Carstens 	if (flags & FAULT_FLAG_ALLOW_RETRY) {
49033ce6140SHeiko Carstens 		if (fault & VM_FAULT_RETRY) {
4910aaba41bSMartin Schwidefsky 			if (IS_ENABLED(CONFIG_PGSTE) && gmap &&
4920aaba41bSMartin Schwidefsky 			    (flags & FAULT_FLAG_RETRY_NOWAIT)) {
49324eb3a82SDominik Dingel 				/* FAULT_FLAG_RETRY_NOWAIT has been set,
494c1e8d7c6SMichel Lespinasse 				 * mmap_lock has not been released */
49524eb3a82SDominik Dingel 				current->thread.gmap_pfault = 1;
49624eb3a82SDominik Dingel 				fault = VM_FAULT_PFAULT;
49724eb3a82SDominik Dingel 				goto out_up;
49824eb3a82SDominik Dingel 			}
4994064b982SPeter Xu 			flags &= ~FAULT_FLAG_RETRY_NOWAIT;
50045cac65bSShaohua Li 			flags |= FAULT_FLAG_TRIED;
501d8ed45c5SMichel Lespinasse 			mmap_read_lock(mm);
50233ce6140SHeiko Carstens 			goto retry;
50333ce6140SHeiko Carstens 		}
50433ce6140SHeiko Carstens 	}
5050aaba41bSMartin Schwidefsky 	if (IS_ENABLED(CONFIG_PGSTE) && gmap) {
506527e30b4SMartin Schwidefsky 		address =  __gmap_link(gmap, current->thread.gmap_addr,
507527e30b4SMartin Schwidefsky 				       address);
508527e30b4SMartin Schwidefsky 		if (address == -EFAULT) {
509527e30b4SMartin Schwidefsky 			fault = VM_FAULT_BADMAP;
510527e30b4SMartin Schwidefsky 			goto out_up;
511527e30b4SMartin Schwidefsky 		}
512527e30b4SMartin Schwidefsky 		if (address == -ENOMEM) {
513527e30b4SMartin Schwidefsky 			fault = VM_FAULT_OOM;
514527e30b4SMartin Schwidefsky 			goto out_up;
515527e30b4SMartin Schwidefsky 		}
516527e30b4SMartin Schwidefsky 	}
51750d7280dSMartin Schwidefsky 	fault = 0;
51850d7280dSMartin Schwidefsky out_up:
519d8ed45c5SMichel Lespinasse 	mmap_read_unlock(mm);
52050d7280dSMartin Schwidefsky out:
52150d7280dSMartin Schwidefsky 	return fault;
5221da177e4SLinus Torvalds }
5231da177e4SLinus Torvalds 
5247a5388deSHeiko Carstens void do_protection_exception(struct pt_regs *regs)
5251da177e4SLinus Torvalds {
526aa33c8cbSMartin Schwidefsky 	unsigned long trans_exc_code;
52750a7ca3cSSouptick Joarder 	int access;
52850a7ca3cSSouptick Joarder 	vm_fault_t fault;
52961365e13SMartin Schwidefsky 
530aa33c8cbSMartin Schwidefsky 	trans_exc_code = regs->int_parm_long;
531f752ac4dSMartin Schwidefsky 	/*
532f752ac4dSMartin Schwidefsky 	 * Protection exceptions are suppressing, decrement psw address.
533f752ac4dSMartin Schwidefsky 	 * The exception to this rule are aborted transactions, for these
534f752ac4dSMartin Schwidefsky 	 * the PSW already points to the correct location.
535f752ac4dSMartin Schwidefsky 	 */
536f752ac4dSMartin Schwidefsky 	if (!(regs->int_code & 0x200))
537aa33c8cbSMartin Schwidefsky 		regs->psw.addr = __rewind_psw(regs->psw, regs->int_code >> 16);
53810c1031fSMartin Schwidefsky 	/*
53910c1031fSMartin Schwidefsky 	 * Check for low-address protection.  This needs to be treated
54010c1031fSMartin Schwidefsky 	 * as a special case because the translation exception code
54110c1031fSMartin Schwidefsky 	 * field is not guaranteed to contain valid data in this case.
54210c1031fSMartin Schwidefsky 	 */
54361365e13SMartin Schwidefsky 	if (unlikely(!(trans_exc_code & 4))) {
544aa33c8cbSMartin Schwidefsky 		do_low_address(regs);
54510c1031fSMartin Schwidefsky 		return;
54610c1031fSMartin Schwidefsky 	}
54757d7f939SMartin Schwidefsky 	if (unlikely(MACHINE_HAS_NX && (trans_exc_code & 0x80))) {
54857d7f939SMartin Schwidefsky 		regs->int_parm_long = (trans_exc_code & ~PAGE_MASK) |
54957d7f939SMartin Schwidefsky 					(regs->psw.addr & PAGE_MASK);
55057d7f939SMartin Schwidefsky 		access = VM_EXEC;
55157d7f939SMartin Schwidefsky 		fault = VM_FAULT_BADACCESS;
55257d7f939SMartin Schwidefsky 	} else {
55357d7f939SMartin Schwidefsky 		access = VM_WRITE;
55457d7f939SMartin Schwidefsky 		fault = do_exception(regs, access);
55557d7f939SMartin Schwidefsky 	}
55650d7280dSMartin Schwidefsky 	if (unlikely(fault))
55757d7f939SMartin Schwidefsky 		do_fault_error(regs, access, fault);
5581da177e4SLinus Torvalds }
5597a5388deSHeiko Carstens NOKPROBE_SYMBOL(do_protection_exception);
5601da177e4SLinus Torvalds 
5617a5388deSHeiko Carstens void do_dat_exception(struct pt_regs *regs)
5621da177e4SLinus Torvalds {
56350a7ca3cSSouptick Joarder 	int access;
56450a7ca3cSSouptick Joarder 	vm_fault_t fault;
56550d7280dSMartin Schwidefsky 
5666cb4d9a2SAnshuman Khandual 	access = VM_ACCESS_FLAGS;
567aa33c8cbSMartin Schwidefsky 	fault = do_exception(regs, access);
56850d7280dSMartin Schwidefsky 	if (unlikely(fault))
56957d7f939SMartin Schwidefsky 		do_fault_error(regs, access, fault);
5701da177e4SLinus Torvalds }
5717a5388deSHeiko Carstens NOKPROBE_SYMBOL(do_dat_exception);
5721da177e4SLinus Torvalds 
5731da177e4SLinus Torvalds #ifdef CONFIG_PFAULT
5741da177e4SLinus Torvalds /*
5751da177e4SLinus Torvalds  * 'pfault' pseudo page faults routines.
5761da177e4SLinus Torvalds  */
577fb0a9d7eSHeiko Carstens static int pfault_disable;
5781da177e4SLinus Torvalds 
5791da177e4SLinus Torvalds static int __init nopfault(char *str)
5801da177e4SLinus Torvalds {
5811da177e4SLinus Torvalds 	pfault_disable = 1;
5821da177e4SLinus Torvalds 	return 1;
5831da177e4SLinus Torvalds }
5841da177e4SLinus Torvalds 
5851da177e4SLinus Torvalds __setup("nopfault", nopfault);
5861da177e4SLinus Torvalds 
5877dd8fe1fSHeiko Carstens struct pfault_refbk {
5887dd8fe1fSHeiko Carstens 	u16 refdiagc;
5897dd8fe1fSHeiko Carstens 	u16 reffcode;
5907dd8fe1fSHeiko Carstens 	u16 refdwlen;
5917dd8fe1fSHeiko Carstens 	u16 refversn;
5927dd8fe1fSHeiko Carstens 	u64 refgaddr;
5937dd8fe1fSHeiko Carstens 	u64 refselmk;
5947dd8fe1fSHeiko Carstens 	u64 refcmpmk;
5957dd8fe1fSHeiko Carstens 	u64 reserved;
5967dd8fe1fSHeiko Carstens } __attribute__ ((packed, aligned(8)));
5971da177e4SLinus Torvalds 
59800e9e664SMartin Schwidefsky static struct pfault_refbk pfault_init_refbk = {
5997dd8fe1fSHeiko Carstens 	.refdiagc = 0x258,
6007dd8fe1fSHeiko Carstens 	.reffcode = 0,
6017dd8fe1fSHeiko Carstens 	.refdwlen = 5,
6027dd8fe1fSHeiko Carstens 	.refversn = 2,
603e22cf8caSChristian Borntraeger 	.refgaddr = __LC_LPP,
6047dd8fe1fSHeiko Carstens 	.refselmk = 1ULL << 48,
6057dd8fe1fSHeiko Carstens 	.refcmpmk = 1ULL << 48,
60600e9e664SMartin Schwidefsky 	.reserved = __PF_RES_FIELD
60700e9e664SMartin Schwidefsky };
60800e9e664SMartin Schwidefsky 
60900e9e664SMartin Schwidefsky int pfault_init(void)
61000e9e664SMartin Schwidefsky {
6111da177e4SLinus Torvalds         int rc;
6121da177e4SLinus Torvalds 
613f32269a0SCarsten Otte 	if (pfault_disable)
6141da177e4SLinus Torvalds 		return -1;
6151ec2772eSMartin Schwidefsky 	diag_stat_inc(DIAG_STAT_X258);
61694c12cc7SMartin Schwidefsky 	asm volatile(
6171da177e4SLinus Torvalds 		"	diag	%1,%0,0x258\n"
6181da177e4SLinus Torvalds 		"0:	j	2f\n"
6191da177e4SLinus Torvalds 		"1:	la	%0,8\n"
6201da177e4SLinus Torvalds 		"2:\n"
62194c12cc7SMartin Schwidefsky 		EX_TABLE(0b,1b)
62200e9e664SMartin Schwidefsky 		: "=d" (rc)
62300e9e664SMartin Schwidefsky 		: "a" (&pfault_init_refbk), "m" (pfault_init_refbk) : "cc");
6241da177e4SLinus Torvalds         return rc;
6251da177e4SLinus Torvalds }
6261da177e4SLinus Torvalds 
62700e9e664SMartin Schwidefsky static struct pfault_refbk pfault_fini_refbk = {
6287dd8fe1fSHeiko Carstens 	.refdiagc = 0x258,
6297dd8fe1fSHeiko Carstens 	.reffcode = 1,
6307dd8fe1fSHeiko Carstens 	.refdwlen = 5,
6317dd8fe1fSHeiko Carstens 	.refversn = 2,
6327dd8fe1fSHeiko Carstens };
6331da177e4SLinus Torvalds 
63400e9e664SMartin Schwidefsky void pfault_fini(void)
63500e9e664SMartin Schwidefsky {
63600e9e664SMartin Schwidefsky 
637f32269a0SCarsten Otte 	if (pfault_disable)
6381da177e4SLinus Torvalds 		return;
6391ec2772eSMartin Schwidefsky 	diag_stat_inc(DIAG_STAT_X258);
64094c12cc7SMartin Schwidefsky 	asm volatile(
6411da177e4SLinus Torvalds 		"	diag	%0,0,0x258\n"
6426c22c986SHeiko Carstens 		"0:	nopr	%%r7\n"
64394c12cc7SMartin Schwidefsky 		EX_TABLE(0b,0b)
64400e9e664SMartin Schwidefsky 		: : "a" (&pfault_fini_refbk), "m" (pfault_fini_refbk) : "cc");
6451da177e4SLinus Torvalds }
6461da177e4SLinus Torvalds 
647f2db2e6cSHeiko Carstens static DEFINE_SPINLOCK(pfault_lock);
648f2db2e6cSHeiko Carstens static LIST_HEAD(pfault_list);
649f2db2e6cSHeiko Carstens 
6500227f7c4SPeter Zijlstra #define PF_COMPLETE	0x0080
6510227f7c4SPeter Zijlstra 
6520227f7c4SPeter Zijlstra /*
6530227f7c4SPeter Zijlstra  * The mechanism of our pfault code: if Linux is running as guest, runs a user
6540227f7c4SPeter Zijlstra  * space process and the user space process accesses a page that the host has
6550227f7c4SPeter Zijlstra  * paged out we get a pfault interrupt.
6560227f7c4SPeter Zijlstra  *
6570227f7c4SPeter Zijlstra  * This allows us, within the guest, to schedule a different process. Without
6580227f7c4SPeter Zijlstra  * this mechanism the host would have to suspend the whole virtual cpu until
6590227f7c4SPeter Zijlstra  * the page has been paged in.
6600227f7c4SPeter Zijlstra  *
6610227f7c4SPeter Zijlstra  * So when we get such an interrupt then we set the state of the current task
6620227f7c4SPeter Zijlstra  * to uninterruptible and also set the need_resched flag. Both happens within
6630227f7c4SPeter Zijlstra  * interrupt context(!). If we later on want to return to user space we
6640227f7c4SPeter Zijlstra  * recognize the need_resched flag and then call schedule().  It's not very
6650227f7c4SPeter Zijlstra  * obvious how this works...
6660227f7c4SPeter Zijlstra  *
6670227f7c4SPeter Zijlstra  * Of course we have a lot of additional fun with the completion interrupt (->
6680227f7c4SPeter Zijlstra  * host signals that a page of a process has been paged in and the process can
6690227f7c4SPeter Zijlstra  * continue to run). This interrupt can arrive on any cpu and, since we have
6700227f7c4SPeter Zijlstra  * virtual cpus, actually appear before the interrupt that signals that a page
6710227f7c4SPeter Zijlstra  * is missing.
6720227f7c4SPeter Zijlstra  */
673fde15c3aSHeiko Carstens static void pfault_interrupt(struct ext_code ext_code,
674f6649a7eSMartin Schwidefsky 			     unsigned int param32, unsigned long param64)
6751da177e4SLinus Torvalds {
6761da177e4SLinus Torvalds 	struct task_struct *tsk;
6771da177e4SLinus Torvalds 	__u16 subcode;
678f2db2e6cSHeiko Carstens 	pid_t pid;
6791da177e4SLinus Torvalds 
6801da177e4SLinus Torvalds 	/*
6810227f7c4SPeter Zijlstra 	 * Get the external interruption subcode & pfault initial/completion
6820227f7c4SPeter Zijlstra 	 * signal bit. VM stores this in the 'cpu address' field associated
6830227f7c4SPeter Zijlstra 	 * with the external interrupt.
6841da177e4SLinus Torvalds 	 */
685fde15c3aSHeiko Carstens 	subcode = ext_code.subcode;
6861da177e4SLinus Torvalds 	if ((subcode & 0xff00) != __SUBCODE_MASK)
6871da177e4SLinus Torvalds 		return;
688420f42ecSHeiko Carstens 	inc_irq_stat(IRQEXT_PFL);
689f2db2e6cSHeiko Carstens 	/* Get the token (= pid of the affected task). */
690544e8dd7SHendrik Brueckner 	pid = param64 & LPP_PID_MASK;
691f2db2e6cSHeiko Carstens 	rcu_read_lock();
692f2db2e6cSHeiko Carstens 	tsk = find_task_by_pid_ns(pid, &init_pid_ns);
693f2db2e6cSHeiko Carstens 	if (tsk)
694f2db2e6cSHeiko Carstens 		get_task_struct(tsk);
695f2db2e6cSHeiko Carstens 	rcu_read_unlock();
696f2db2e6cSHeiko Carstens 	if (!tsk)
697f2db2e6cSHeiko Carstens 		return;
698f2db2e6cSHeiko Carstens 	spin_lock(&pfault_lock);
6990227f7c4SPeter Zijlstra 	if (subcode & PF_COMPLETE) {
7001da177e4SLinus Torvalds 		/* signal bit is set -> a page has been swapped in by VM */
701f2db2e6cSHeiko Carstens 		if (tsk->thread.pfault_wait == 1) {
7021da177e4SLinus Torvalds 			/* Initial interrupt was faster than the completion
7031da177e4SLinus Torvalds 			 * interrupt. pfault_wait is valid. Set pfault_wait
7041da177e4SLinus Torvalds 			 * back to zero and wake up the process. This can
7051da177e4SLinus Torvalds 			 * safely be done because the task is still sleeping
706b6d09449SMartin Schwidefsky 			 * and can't produce new pfaults. */
7071da177e4SLinus Torvalds 			tsk->thread.pfault_wait = 0;
708f2db2e6cSHeiko Carstens 			list_del(&tsk->thread.list);
7091da177e4SLinus Torvalds 			wake_up_process(tsk);
710d5e50a51SHeiko Carstens 			put_task_struct(tsk);
711f2db2e6cSHeiko Carstens 		} else {
712f2db2e6cSHeiko Carstens 			/* Completion interrupt was faster than initial
713f2db2e6cSHeiko Carstens 			 * interrupt. Set pfault_wait to -1 so the initial
714fa2fb2f4SHeiko Carstens 			 * interrupt doesn't put the task to sleep.
715fa2fb2f4SHeiko Carstens 			 * If the task is not running, ignore the completion
716fa2fb2f4SHeiko Carstens 			 * interrupt since it must be a leftover of a PFAULT
717fa2fb2f4SHeiko Carstens 			 * CANCEL operation which didn't remove all pending
718fa2fb2f4SHeiko Carstens 			 * completion interrupts. */
719fa2fb2f4SHeiko Carstens 			if (tsk->state == TASK_RUNNING)
720f2db2e6cSHeiko Carstens 				tsk->thread.pfault_wait = -1;
7211da177e4SLinus Torvalds 		}
7221da177e4SLinus Torvalds 	} else {
7231da177e4SLinus Torvalds 		/* signal bit not set -> a real page is missing. */
724d49f47f8SHeiko Carstens 		if (WARN_ON_ONCE(tsk != current))
725d49f47f8SHeiko Carstens 			goto out;
726d5e50a51SHeiko Carstens 		if (tsk->thread.pfault_wait == 1) {
727d5e50a51SHeiko Carstens 			/* Already on the list with a reference: put to sleep */
7280227f7c4SPeter Zijlstra 			goto block;
729d5e50a51SHeiko Carstens 		} else if (tsk->thread.pfault_wait == -1) {
7301da177e4SLinus Torvalds 			/* Completion interrupt was faster than the initial
731f2db2e6cSHeiko Carstens 			 * interrupt (pfault_wait == -1). Set pfault_wait
732f2db2e6cSHeiko Carstens 			 * back to zero and exit. */
7331da177e4SLinus Torvalds 			tsk->thread.pfault_wait = 0;
734f2db2e6cSHeiko Carstens 		} else {
735f2db2e6cSHeiko Carstens 			/* Initial interrupt arrived before completion
736d5e50a51SHeiko Carstens 			 * interrupt. Let the task sleep.
737d5e50a51SHeiko Carstens 			 * An extra task reference is needed since a different
738d5e50a51SHeiko Carstens 			 * cpu may set the task state to TASK_RUNNING again
739d5e50a51SHeiko Carstens 			 * before the scheduler is reached. */
740d5e50a51SHeiko Carstens 			get_task_struct(tsk);
741f2db2e6cSHeiko Carstens 			tsk->thread.pfault_wait = 1;
742f2db2e6cSHeiko Carstens 			list_add(&tsk->thread.list, &pfault_list);
7430227f7c4SPeter Zijlstra block:
7440227f7c4SPeter Zijlstra 			/* Since this must be a userspace fault, there
7450227f7c4SPeter Zijlstra 			 * is no kernel task state to trample. Rely on the
7460227f7c4SPeter Zijlstra 			 * return to userspace schedule() to block. */
7470227f7c4SPeter Zijlstra 			__set_current_state(TASK_UNINTERRUPTIBLE);
7481da177e4SLinus Torvalds 			set_tsk_need_resched(tsk);
749c360192bSMartin Schwidefsky 			set_preempt_need_resched();
7501da177e4SLinus Torvalds 		}
7511da177e4SLinus Torvalds 	}
752d49f47f8SHeiko Carstens out:
753f2db2e6cSHeiko Carstens 	spin_unlock(&pfault_lock);
75454c27791SHeiko Carstens 	put_task_struct(tsk);
755f2db2e6cSHeiko Carstens }
756f2db2e6cSHeiko Carstens 
75784c9ceefSSebastian Andrzej Siewior static int pfault_cpu_dead(unsigned int cpu)
758f2db2e6cSHeiko Carstens {
759f2db2e6cSHeiko Carstens 	struct thread_struct *thread, *next;
760f2db2e6cSHeiko Carstens 	struct task_struct *tsk;
761f2db2e6cSHeiko Carstens 
762f2db2e6cSHeiko Carstens 	spin_lock_irq(&pfault_lock);
763f2db2e6cSHeiko Carstens 	list_for_each_entry_safe(thread, next, &pfault_list, list) {
764f2db2e6cSHeiko Carstens 		thread->pfault_wait = 0;
765f2db2e6cSHeiko Carstens 		list_del(&thread->list);
766f2db2e6cSHeiko Carstens 		tsk = container_of(thread, struct task_struct, thread);
767f2db2e6cSHeiko Carstens 		wake_up_process(tsk);
768d5e50a51SHeiko Carstens 		put_task_struct(tsk);
769f2db2e6cSHeiko Carstens 	}
770f2db2e6cSHeiko Carstens 	spin_unlock_irq(&pfault_lock);
77184c9ceefSSebastian Andrzej Siewior 	return 0;
772f2db2e6cSHeiko Carstens }
7731da177e4SLinus Torvalds 
774fb0a9d7eSHeiko Carstens static int __init pfault_irq_init(void)
77529b08d2bSHeiko Carstens {
776fb0a9d7eSHeiko Carstens 	int rc;
77729b08d2bSHeiko Carstens 
7781dad093bSThomas Huth 	rc = register_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
7797dd8fe1fSHeiko Carstens 	if (rc)
7807dd8fe1fSHeiko Carstens 		goto out_extint;
7817dd8fe1fSHeiko Carstens 	rc = pfault_init() == 0 ? 0 : -EOPNOTSUPP;
7827dd8fe1fSHeiko Carstens 	if (rc)
7837dd8fe1fSHeiko Carstens 		goto out_pfault;
78482003c3eSHeiko Carstens 	irq_subclass_register(IRQ_SUBCLASS_SERVICE_SIGNAL);
78584c9ceefSSebastian Andrzej Siewior 	cpuhp_setup_state_nocalls(CPUHP_S390_PFAULT_DEAD, "s390/pfault:dead",
78684c9ceefSSebastian Andrzej Siewior 				  NULL, pfault_cpu_dead);
7877dd8fe1fSHeiko Carstens 	return 0;
7887dd8fe1fSHeiko Carstens 
7897dd8fe1fSHeiko Carstens out_pfault:
7901dad093bSThomas Huth 	unregister_external_irq(EXT_IRQ_CP_SERVICE, pfault_interrupt);
7917dd8fe1fSHeiko Carstens out_extint:
792fb0a9d7eSHeiko Carstens 	pfault_disable = 1;
793fb0a9d7eSHeiko Carstens 	return rc;
794fb0a9d7eSHeiko Carstens }
795fb0a9d7eSHeiko Carstens early_initcall(pfault_irq_init);
796fb0a9d7eSHeiko Carstens 
7977dd8fe1fSHeiko Carstens #endif /* CONFIG_PFAULT */
798084ea4d6SVasily Gorbik 
799084ea4d6SVasily Gorbik #if IS_ENABLED(CONFIG_PGSTE)
800084ea4d6SVasily Gorbik void do_secure_storage_access(struct pt_regs *regs)
801084ea4d6SVasily Gorbik {
802084ea4d6SVasily Gorbik 	unsigned long addr = regs->int_parm_long & __FAIL_ADDR_MASK;
803084ea4d6SVasily Gorbik 	struct vm_area_struct *vma;
804084ea4d6SVasily Gorbik 	struct mm_struct *mm;
805084ea4d6SVasily Gorbik 	struct page *page;
806084ea4d6SVasily Gorbik 	int rc;
807084ea4d6SVasily Gorbik 
808084ea4d6SVasily Gorbik 	switch (get_fault_type(regs)) {
809084ea4d6SVasily Gorbik 	case USER_FAULT:
810084ea4d6SVasily Gorbik 		mm = current->mm;
811d8ed45c5SMichel Lespinasse 		mmap_read_lock(mm);
812084ea4d6SVasily Gorbik 		vma = find_vma(mm, addr);
813084ea4d6SVasily Gorbik 		if (!vma) {
814d8ed45c5SMichel Lespinasse 			mmap_read_unlock(mm);
815084ea4d6SVasily Gorbik 			do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
816084ea4d6SVasily Gorbik 			break;
817084ea4d6SVasily Gorbik 		}
818084ea4d6SVasily Gorbik 		page = follow_page(vma, addr, FOLL_WRITE | FOLL_GET);
819084ea4d6SVasily Gorbik 		if (IS_ERR_OR_NULL(page)) {
820d8ed45c5SMichel Lespinasse 			mmap_read_unlock(mm);
821084ea4d6SVasily Gorbik 			break;
822084ea4d6SVasily Gorbik 		}
823084ea4d6SVasily Gorbik 		if (arch_make_page_accessible(page))
824084ea4d6SVasily Gorbik 			send_sig(SIGSEGV, current, 0);
825084ea4d6SVasily Gorbik 		put_page(page);
826d8ed45c5SMichel Lespinasse 		mmap_read_unlock(mm);
827084ea4d6SVasily Gorbik 		break;
828084ea4d6SVasily Gorbik 	case KERNEL_FAULT:
829084ea4d6SVasily Gorbik 		page = phys_to_page(addr);
830084ea4d6SVasily Gorbik 		if (unlikely(!try_get_page(page)))
831084ea4d6SVasily Gorbik 			break;
832084ea4d6SVasily Gorbik 		rc = arch_make_page_accessible(page);
833084ea4d6SVasily Gorbik 		put_page(page);
834084ea4d6SVasily Gorbik 		if (rc)
835084ea4d6SVasily Gorbik 			BUG();
836084ea4d6SVasily Gorbik 		break;
837084ea4d6SVasily Gorbik 	case VDSO_FAULT:
838084ea4d6SVasily Gorbik 	case GMAP_FAULT:
839084ea4d6SVasily Gorbik 	default:
840084ea4d6SVasily Gorbik 		do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
841084ea4d6SVasily Gorbik 		WARN_ON_ONCE(1);
842084ea4d6SVasily Gorbik 	}
843084ea4d6SVasily Gorbik }
844084ea4d6SVasily Gorbik NOKPROBE_SYMBOL(do_secure_storage_access);
845084ea4d6SVasily Gorbik 
846084ea4d6SVasily Gorbik void do_non_secure_storage_access(struct pt_regs *regs)
847084ea4d6SVasily Gorbik {
848084ea4d6SVasily Gorbik 	unsigned long gaddr = regs->int_parm_long & __FAIL_ADDR_MASK;
849084ea4d6SVasily Gorbik 	struct gmap *gmap = (struct gmap *)S390_lowcore.gmap;
850084ea4d6SVasily Gorbik 
851084ea4d6SVasily Gorbik 	if (get_fault_type(regs) != GMAP_FAULT) {
852084ea4d6SVasily Gorbik 		do_fault_error(regs, VM_READ | VM_WRITE, VM_FAULT_BADMAP);
853084ea4d6SVasily Gorbik 		WARN_ON_ONCE(1);
854084ea4d6SVasily Gorbik 		return;
855084ea4d6SVasily Gorbik 	}
856084ea4d6SVasily Gorbik 
857084ea4d6SVasily Gorbik 	if (gmap_convert_to_secure(gmap, gaddr) == -EINVAL)
858084ea4d6SVasily Gorbik 		send_sig(SIGSEGV, current, 0);
859084ea4d6SVasily Gorbik }
860084ea4d6SVasily Gorbik NOKPROBE_SYMBOL(do_non_secure_storage_access);
861084ea4d6SVasily Gorbik 
862cd4d3d5fSJanosch Frank void do_secure_storage_violation(struct pt_regs *regs)
863cd4d3d5fSJanosch Frank {
864cd4d3d5fSJanosch Frank 	/*
865cd4d3d5fSJanosch Frank 	 * Either KVM messed up the secure guest mapping or the same
866cd4d3d5fSJanosch Frank 	 * page is mapped into multiple secure guests.
867cd4d3d5fSJanosch Frank 	 *
868cd4d3d5fSJanosch Frank 	 * This exception is only triggered when a guest 2 is running
869cd4d3d5fSJanosch Frank 	 * and can therefore never occur in kernel context.
870cd4d3d5fSJanosch Frank 	 */
871cd4d3d5fSJanosch Frank 	printk_ratelimited(KERN_WARNING
872cd4d3d5fSJanosch Frank 			   "Secure storage violation in task: %s, pid %d\n",
873cd4d3d5fSJanosch Frank 			   current->comm, current->pid);
874cd4d3d5fSJanosch Frank 	send_sig(SIGSEGV, current, 0);
875cd4d3d5fSJanosch Frank }
876cd4d3d5fSJanosch Frank 
877084ea4d6SVasily Gorbik #else
878084ea4d6SVasily Gorbik void do_secure_storage_access(struct pt_regs *regs)
879084ea4d6SVasily Gorbik {
880084ea4d6SVasily Gorbik 	default_trap_handler(regs);
881084ea4d6SVasily Gorbik }
882084ea4d6SVasily Gorbik 
883084ea4d6SVasily Gorbik void do_non_secure_storage_access(struct pt_regs *regs)
884084ea4d6SVasily Gorbik {
885084ea4d6SVasily Gorbik 	default_trap_handler(regs);
886084ea4d6SVasily Gorbik }
887cd4d3d5fSJanosch Frank 
888cd4d3d5fSJanosch Frank void do_secure_storage_violation(struct pt_regs *regs)
889cd4d3d5fSJanosch Frank {
890cd4d3d5fSJanosch Frank 	default_trap_handler(regs);
891cd4d3d5fSJanosch Frank }
892084ea4d6SVasily Gorbik #endif
893