Linux Audio

Check our new training course

Loading...
v4.6
 
  1/*
  2 * Access kernel memory without faulting -- s390 specific implementation.
  3 *
  4 * Copyright IBM Corp. 2009, 2015
  5 *
  6 *   Author(s): Heiko Carstens <heiko.carstens@de.ibm.com>,
  7 *
  8 */
  9
 10#include <linux/uaccess.h>
 11#include <linux/kernel.h>
 12#include <linux/types.h>
 13#include <linux/errno.h>
 14#include <linux/gfp.h>
 15#include <linux/cpu.h>
 16#include <asm/ctl_reg.h>
 17#include <asm/io.h>
 18
 19static notrace long s390_kernel_write_odd(void *dst, const void *src, size_t size)
 20{
 21	unsigned long aligned, offset, count;
 22	char tmp[8];
 23
 24	aligned = (unsigned long) dst & ~7UL;
 25	offset = (unsigned long) dst & 7UL;
 26	size = min(8UL - offset, size);
 27	count = size - 1;
 28	asm volatile(
 29		"	bras	1,0f\n"
 30		"	mvc	0(1,%4),0(%5)\n"
 31		"0:	mvc	0(8,%3),0(%0)\n"
 32		"	ex	%1,0(1)\n"
 33		"	lg	%1,0(%3)\n"
 34		"	lra	%0,0(%0)\n"
 35		"	sturg	%1,%0\n"
 36		: "+&a" (aligned), "+&a" (count), "=m" (tmp)
 37		: "a" (&tmp), "a" (&tmp[offset]), "a" (src)
 38		: "cc", "memory", "1");
 39	return size;
 40}
 41
 42/*
 43 * s390_kernel_write - write to kernel memory bypassing DAT
 44 * @dst: destination address
 45 * @src: source address
 46 * @size: number of bytes to copy
 47 *
 48 * This function writes to kernel memory bypassing DAT and possible page table
 49 * write protection. It writes to the destination using the sturg instruction.
 50 * Therefore we have a read-modify-write sequence: the function reads eight
 51 * bytes from destination at an eight byte boundary, modifies the bytes
 52 * requested and writes the result back in a loop.
 53 *
 54 * Note: this means that this function may not be called concurrently on
 55 *	 several cpus with overlapping words, since this may potentially
 56 *	 cause data corruption.
 57 */
 58void notrace s390_kernel_write(void *dst, const void *src, size_t size)
 59{
 60	long copied;
 61
 62	while (size) {
 63		copied = s390_kernel_write_odd(dst, src, size);
 64		dst += copied;
 65		src += copied;
 66		size -= copied;
 67	}
 68}
 69
 70static int __memcpy_real(void *dest, void *src, size_t count)
 71{
 72	register unsigned long _dest asm("2") = (unsigned long) dest;
 73	register unsigned long _len1 asm("3") = (unsigned long) count;
 74	register unsigned long _src  asm("4") = (unsigned long) src;
 75	register unsigned long _len2 asm("5") = (unsigned long) count;
 76	int rc = -EFAULT;
 77
 78	asm volatile (
 79		"0:	mvcle	%1,%2,0x0\n"
 80		"1:	jo	0b\n"
 81		"	lhi	%0,0x0\n"
 82		"2:\n"
 83		EX_TABLE(1b,2b)
 84		: "+d" (rc), "+d" (_dest), "+d" (_src), "+d" (_len1),
 85		  "+d" (_len2), "=m" (*((long *) dest))
 86		: "m" (*((long *) src))
 87		: "cc", "memory");
 88	return rc;
 89}
 90
 91/*
 92 * Copy memory in real mode (kernel to kernel)
 93 */
 94int memcpy_real(void *dest, void *src, size_t count)
 95{
 96	int irqs_disabled, rc;
 97	unsigned long flags;
 98
 99	if (!count)
100		return 0;
101	flags = __arch_local_irq_stnsm(0xf8UL);
102	irqs_disabled = arch_irqs_disabled_flags(flags);
103	if (!irqs_disabled)
104		trace_hardirqs_off();
105	rc = __memcpy_real(dest, src, count);
106	if (!irqs_disabled)
107		trace_hardirqs_on();
108	__arch_local_irq_ssm(flags);
109	return rc;
110}
111
112/*
113 * Copy memory in absolute mode (kernel to kernel)
114 */
115void memcpy_absolute(void *dest, void *src, size_t count)
116{
117	unsigned long cr0, flags, prefix;
118
119	flags = arch_local_irq_save();
120	__ctl_store(cr0, 0, 0);
121	__ctl_clear_bit(0, 28); /* disable lowcore protection */
122	prefix = store_prefix();
123	if (prefix) {
124		local_mcck_disable();
125		set_prefix(0);
126		memcpy(dest, src, count);
127		set_prefix(prefix);
128		local_mcck_enable();
129	} else {
130		memcpy(dest, src, count);
131	}
132	__ctl_load(cr0, 0, 0);
133	arch_local_irq_restore(flags);
134}
135
136/*
137 * Copy memory from kernel (real) to user (virtual)
138 */
139int copy_to_user_real(void __user *dest, void *src, unsigned long count)
140{
141	int offs = 0, size, rc;
142	char *buf;
143
144	buf = (char *) __get_free_page(GFP_KERNEL);
145	if (!buf)
146		return -ENOMEM;
147	rc = -EFAULT;
148	while (offs < count) {
149		size = min(PAGE_SIZE, count - offs);
150		if (memcpy_real(buf, src + offs, size))
151			goto out;
152		if (copy_to_user(dest + offs, buf, size))
153			goto out;
154		offs += size;
155	}
156	rc = 0;
157out:
158	free_page((unsigned long) buf);
159	return rc;
160}
161
162/*
163 * Check if physical address is within prefix or zero page
164 */
165static int is_swapped(unsigned long addr)
166{
167	unsigned long lc;
168	int cpu;
169
170	if (addr < sizeof(struct lowcore))
171		return 1;
172	for_each_online_cpu(cpu) {
173		lc = (unsigned long) lowcore_ptr[cpu];
174		if (addr > lc + sizeof(struct lowcore) - 1 || addr < lc)
175			continue;
176		return 1;
177	}
178	return 0;
179}
180
181/*
182 * Convert a physical pointer for /dev/mem access
183 *
184 * For swapped prefix pages a new buffer is returned that contains a copy of
185 * the absolute memory. The buffer size is maximum one page large.
186 */
187void *xlate_dev_mem_ptr(phys_addr_t addr)
188{
189	void *bounce = (void *) addr;
190	unsigned long size;
191
192	get_online_cpus();
193	preempt_disable();
194	if (is_swapped(addr)) {
195		size = PAGE_SIZE - (addr & ~PAGE_MASK);
196		bounce = (void *) __get_free_page(GFP_ATOMIC);
197		if (bounce)
198			memcpy_absolute(bounce, (void *) addr, size);
199	}
200	preempt_enable();
201	put_online_cpus();
202	return bounce;
203}
204
205/*
206 * Free converted buffer for /dev/mem access (if necessary)
207 */
208void unxlate_dev_mem_ptr(phys_addr_t addr, void *buf)
209{
210	if ((void *) addr != buf)
211		free_page((unsigned long) buf);
212}
v4.17
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 * Access kernel memory without faulting -- s390 specific implementation.
  4 *
  5 * Copyright IBM Corp. 2009, 2015
  6 *
  7 *   Author(s): Heiko Carstens <heiko.carstens@de.ibm.com>,
  8 *
  9 */
 10
 11#include <linux/uaccess.h>
 12#include <linux/kernel.h>
 13#include <linux/types.h>
 14#include <linux/errno.h>
 15#include <linux/gfp.h>
 16#include <linux/cpu.h>
 17#include <asm/ctl_reg.h>
 18#include <asm/io.h>
 19
 20static notrace long s390_kernel_write_odd(void *dst, const void *src, size_t size)
 21{
 22	unsigned long aligned, offset, count;
 23	char tmp[8];
 24
 25	aligned = (unsigned long) dst & ~7UL;
 26	offset = (unsigned long) dst & 7UL;
 27	size = min(8UL - offset, size);
 28	count = size - 1;
 29	asm volatile(
 30		"	bras	1,0f\n"
 31		"	mvc	0(1,%4),0(%5)\n"
 32		"0:	mvc	0(8,%3),0(%0)\n"
 33		"	ex	%1,0(1)\n"
 34		"	lg	%1,0(%3)\n"
 35		"	lra	%0,0(%0)\n"
 36		"	sturg	%1,%0\n"
 37		: "+&a" (aligned), "+&a" (count), "=m" (tmp)
 38		: "a" (&tmp), "a" (&tmp[offset]), "a" (src)
 39		: "cc", "memory", "1");
 40	return size;
 41}
 42
 43/*
 44 * s390_kernel_write - write to kernel memory bypassing DAT
 45 * @dst: destination address
 46 * @src: source address
 47 * @size: number of bytes to copy
 48 *
 49 * This function writes to kernel memory bypassing DAT and possible page table
 50 * write protection. It writes to the destination using the sturg instruction.
 51 * Therefore we have a read-modify-write sequence: the function reads eight
 52 * bytes from destination at an eight byte boundary, modifies the bytes
 53 * requested and writes the result back in a loop.
 54 *
 55 * Note: this means that this function may not be called concurrently on
 56 *	 several cpus with overlapping words, since this may potentially
 57 *	 cause data corruption.
 58 */
 59void notrace s390_kernel_write(void *dst, const void *src, size_t size)
 60{
 61	long copied;
 62
 63	while (size) {
 64		copied = s390_kernel_write_odd(dst, src, size);
 65		dst += copied;
 66		src += copied;
 67		size -= copied;
 68	}
 69}
 70
 71static int __memcpy_real(void *dest, void *src, size_t count)
 72{
 73	register unsigned long _dest asm("2") = (unsigned long) dest;
 74	register unsigned long _len1 asm("3") = (unsigned long) count;
 75	register unsigned long _src  asm("4") = (unsigned long) src;
 76	register unsigned long _len2 asm("5") = (unsigned long) count;
 77	int rc = -EFAULT;
 78
 79	asm volatile (
 80		"0:	mvcle	%1,%2,0x0\n"
 81		"1:	jo	0b\n"
 82		"	lhi	%0,0x0\n"
 83		"2:\n"
 84		EX_TABLE(1b,2b)
 85		: "+d" (rc), "+d" (_dest), "+d" (_src), "+d" (_len1),
 86		  "+d" (_len2), "=m" (*((long *) dest))
 87		: "m" (*((long *) src))
 88		: "cc", "memory");
 89	return rc;
 90}
 91
 92/*
 93 * Copy memory in real mode (kernel to kernel)
 94 */
 95int memcpy_real(void *dest, void *src, size_t count)
 96{
 97	int irqs_disabled, rc;
 98	unsigned long flags;
 99
100	if (!count)
101		return 0;
102	flags = __arch_local_irq_stnsm(0xf8UL);
103	irqs_disabled = arch_irqs_disabled_flags(flags);
104	if (!irqs_disabled)
105		trace_hardirqs_off();
106	rc = __memcpy_real(dest, src, count);
107	if (!irqs_disabled)
108		trace_hardirqs_on();
109	__arch_local_irq_ssm(flags);
110	return rc;
111}
112
113/*
114 * Copy memory in absolute mode (kernel to kernel)
115 */
116void memcpy_absolute(void *dest, void *src, size_t count)
117{
118	unsigned long cr0, flags, prefix;
119
120	flags = arch_local_irq_save();
121	__ctl_store(cr0, 0, 0);
122	__ctl_clear_bit(0, 28); /* disable lowcore protection */
123	prefix = store_prefix();
124	if (prefix) {
125		local_mcck_disable();
126		set_prefix(0);
127		memcpy(dest, src, count);
128		set_prefix(prefix);
129		local_mcck_enable();
130	} else {
131		memcpy(dest, src, count);
132	}
133	__ctl_load(cr0, 0, 0);
134	arch_local_irq_restore(flags);
135}
136
137/*
138 * Copy memory from kernel (real) to user (virtual)
139 */
140int copy_to_user_real(void __user *dest, void *src, unsigned long count)
141{
142	int offs = 0, size, rc;
143	char *buf;
144
145	buf = (char *) __get_free_page(GFP_KERNEL);
146	if (!buf)
147		return -ENOMEM;
148	rc = -EFAULT;
149	while (offs < count) {
150		size = min(PAGE_SIZE, count - offs);
151		if (memcpy_real(buf, src + offs, size))
152			goto out;
153		if (copy_to_user(dest + offs, buf, size))
154			goto out;
155		offs += size;
156	}
157	rc = 0;
158out:
159	free_page((unsigned long) buf);
160	return rc;
161}
162
163/*
164 * Check if physical address is within prefix or zero page
165 */
166static int is_swapped(unsigned long addr)
167{
168	unsigned long lc;
169	int cpu;
170
171	if (addr < sizeof(struct lowcore))
172		return 1;
173	for_each_online_cpu(cpu) {
174		lc = (unsigned long) lowcore_ptr[cpu];
175		if (addr > lc + sizeof(struct lowcore) - 1 || addr < lc)
176			continue;
177		return 1;
178	}
179	return 0;
180}
181
182/*
183 * Convert a physical pointer for /dev/mem access
184 *
185 * For swapped prefix pages a new buffer is returned that contains a copy of
186 * the absolute memory. The buffer size is maximum one page large.
187 */
188void *xlate_dev_mem_ptr(phys_addr_t addr)
189{
190	void *bounce = (void *) addr;
191	unsigned long size;
192
193	get_online_cpus();
194	preempt_disable();
195	if (is_swapped(addr)) {
196		size = PAGE_SIZE - (addr & ~PAGE_MASK);
197		bounce = (void *) __get_free_page(GFP_ATOMIC);
198		if (bounce)
199			memcpy_absolute(bounce, (void *) addr, size);
200	}
201	preempt_enable();
202	put_online_cpus();
203	return bounce;
204}
205
206/*
207 * Free converted buffer for /dev/mem access (if necessary)
208 */
209void unxlate_dev_mem_ptr(phys_addr_t addr, void *buf)
210{
211	if ((void *) addr != buf)
212		free_page((unsigned long) buf);
213}