Loading...
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Access kernel memory without faulting -- s390 specific implementation.
4 *
5 * Copyright IBM Corp. 2009, 2015
6 *
7 * Author(s): Heiko Carstens <heiko.carstens@de.ibm.com>,
8 *
9 */
10
11#include <linux/uaccess.h>
12#include <linux/kernel.h>
13#include <linux/types.h>
14#include <linux/errno.h>
15#include <linux/gfp.h>
16#include <linux/cpu.h>
17#include <asm/ctl_reg.h>
18#include <asm/io.h>
19#include <asm/stacktrace.h>
20
21static notrace long s390_kernel_write_odd(void *dst, const void *src, size_t size)
22{
23 unsigned long aligned, offset, count;
24 char tmp[8];
25
26 aligned = (unsigned long) dst & ~7UL;
27 offset = (unsigned long) dst & 7UL;
28 size = min(8UL - offset, size);
29 count = size - 1;
30 asm volatile(
31 " bras 1,0f\n"
32 " mvc 0(1,%4),0(%5)\n"
33 "0: mvc 0(8,%3),0(%0)\n"
34 " ex %1,0(1)\n"
35 " lg %1,0(%3)\n"
36 " lra %0,0(%0)\n"
37 " sturg %1,%0\n"
38 : "+&a" (aligned), "+&a" (count), "=m" (tmp)
39 : "a" (&tmp), "a" (&tmp[offset]), "a" (src)
40 : "cc", "memory", "1");
41 return size;
42}
43
44/*
45 * s390_kernel_write - write to kernel memory bypassing DAT
46 * @dst: destination address
47 * @src: source address
48 * @size: number of bytes to copy
49 *
50 * This function writes to kernel memory bypassing DAT and possible page table
51 * write protection. It writes to the destination using the sturg instruction.
52 * Therefore we have a read-modify-write sequence: the function reads eight
53 * bytes from destination at an eight byte boundary, modifies the bytes
54 * requested and writes the result back in a loop.
55 */
56static DEFINE_SPINLOCK(s390_kernel_write_lock);
57
58notrace void *s390_kernel_write(void *dst, const void *src, size_t size)
59{
60 void *tmp = dst;
61 unsigned long flags;
62 long copied;
63
64 spin_lock_irqsave(&s390_kernel_write_lock, flags);
65 if (!(flags & PSW_MASK_DAT)) {
66 memcpy(dst, src, size);
67 } else {
68 while (size) {
69 copied = s390_kernel_write_odd(tmp, src, size);
70 tmp += copied;
71 src += copied;
72 size -= copied;
73 }
74 }
75 spin_unlock_irqrestore(&s390_kernel_write_lock, flags);
76
77 return dst;
78}
79
80static int __no_sanitize_address __memcpy_real(void *dest, void *src, size_t count)
81{
82 register unsigned long _dest asm("2") = (unsigned long) dest;
83 register unsigned long _len1 asm("3") = (unsigned long) count;
84 register unsigned long _src asm("4") = (unsigned long) src;
85 register unsigned long _len2 asm("5") = (unsigned long) count;
86 int rc = -EFAULT;
87
88 asm volatile (
89 "0: mvcle %1,%2,0x0\n"
90 "1: jo 0b\n"
91 " lhi %0,0x0\n"
92 "2:\n"
93 EX_TABLE(1b,2b)
94 : "+d" (rc), "+d" (_dest), "+d" (_src), "+d" (_len1),
95 "+d" (_len2), "=m" (*((long *) dest))
96 : "m" (*((long *) src))
97 : "cc", "memory");
98 return rc;
99}
100
101static unsigned long __no_sanitize_address _memcpy_real(unsigned long dest,
102 unsigned long src,
103 unsigned long count)
104{
105 int irqs_disabled, rc;
106 unsigned long flags;
107
108 if (!count)
109 return 0;
110 flags = arch_local_irq_save();
111 irqs_disabled = arch_irqs_disabled_flags(flags);
112 if (!irqs_disabled)
113 trace_hardirqs_off();
114 __arch_local_irq_stnsm(0xf8); // disable DAT
115 rc = __memcpy_real((void *) dest, (void *) src, (size_t) count);
116 if (flags & PSW_MASK_DAT)
117 __arch_local_irq_stosm(0x04); // enable DAT
118 if (!irqs_disabled)
119 trace_hardirqs_on();
120 __arch_local_irq_ssm(flags);
121 return rc;
122}
123
124/*
125 * Copy memory in real mode (kernel to kernel)
126 */
127int memcpy_real(void *dest, void *src, size_t count)
128{
129 int rc;
130
131 if (S390_lowcore.nodat_stack != 0) {
132 preempt_disable();
133 rc = CALL_ON_STACK(_memcpy_real, S390_lowcore.nodat_stack, 3,
134 dest, src, count);
135 preempt_enable();
136 return rc;
137 }
138 /*
139 * This is a really early memcpy_real call, the stacks are
140 * not set up yet. Just call _memcpy_real on the early boot
141 * stack
142 */
143 return _memcpy_real((unsigned long) dest,(unsigned long) src,
144 (unsigned long) count);
145}
146
147/*
148 * Copy memory in absolute mode (kernel to kernel)
149 */
150void memcpy_absolute(void *dest, void *src, size_t count)
151{
152 unsigned long cr0, flags, prefix;
153
154 flags = arch_local_irq_save();
155 __ctl_store(cr0, 0, 0);
156 __ctl_clear_bit(0, 28); /* disable lowcore protection */
157 prefix = store_prefix();
158 if (prefix) {
159 local_mcck_disable();
160 set_prefix(0);
161 memcpy(dest, src, count);
162 set_prefix(prefix);
163 local_mcck_enable();
164 } else {
165 memcpy(dest, src, count);
166 }
167 __ctl_load(cr0, 0, 0);
168 arch_local_irq_restore(flags);
169}
170
171/*
172 * Copy memory from kernel (real) to user (virtual)
173 */
174int copy_to_user_real(void __user *dest, void *src, unsigned long count)
175{
176 int offs = 0, size, rc;
177 char *buf;
178
179 buf = (char *) __get_free_page(GFP_KERNEL);
180 if (!buf)
181 return -ENOMEM;
182 rc = -EFAULT;
183 while (offs < count) {
184 size = min(PAGE_SIZE, count - offs);
185 if (memcpy_real(buf, src + offs, size))
186 goto out;
187 if (copy_to_user(dest + offs, buf, size))
188 goto out;
189 offs += size;
190 }
191 rc = 0;
192out:
193 free_page((unsigned long) buf);
194 return rc;
195}
196
197/*
198 * Check if physical address is within prefix or zero page
199 */
200static int is_swapped(unsigned long addr)
201{
202 unsigned long lc;
203 int cpu;
204
205 if (addr < sizeof(struct lowcore))
206 return 1;
207 for_each_online_cpu(cpu) {
208 lc = (unsigned long) lowcore_ptr[cpu];
209 if (addr > lc + sizeof(struct lowcore) - 1 || addr < lc)
210 continue;
211 return 1;
212 }
213 return 0;
214}
215
216/*
217 * Convert a physical pointer for /dev/mem access
218 *
219 * For swapped prefix pages a new buffer is returned that contains a copy of
220 * the absolute memory. The buffer size is maximum one page large.
221 */
222void *xlate_dev_mem_ptr(phys_addr_t addr)
223{
224 void *bounce = (void *) addr;
225 unsigned long size;
226
227 get_online_cpus();
228 preempt_disable();
229 if (is_swapped(addr)) {
230 size = PAGE_SIZE - (addr & ~PAGE_MASK);
231 bounce = (void *) __get_free_page(GFP_ATOMIC);
232 if (bounce)
233 memcpy_absolute(bounce, (void *) addr, size);
234 }
235 preempt_enable();
236 put_online_cpus();
237 return bounce;
238}
239
240/*
241 * Free converted buffer for /dev/mem access (if necessary)
242 */
243void unxlate_dev_mem_ptr(phys_addr_t addr, void *buf)
244{
245 if ((void *) addr != buf)
246 free_page((unsigned long) buf);
247}
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Access kernel memory without faulting -- s390 specific implementation.
4 *
5 * Copyright IBM Corp. 2009, 2015
6 *
7 */
8
9#include <linux/uaccess.h>
10#include <linux/kernel.h>
11#include <linux/types.h>
12#include <linux/errno.h>
13#include <linux/gfp.h>
14#include <linux/cpu.h>
15#include <linux/uio.h>
16#include <linux/io.h>
17#include <asm/asm-extable.h>
18#include <asm/abs_lowcore.h>
19#include <asm/stacktrace.h>
20#include <asm/maccess.h>
21#include <asm/ctlreg.h>
22
23unsigned long __bootdata_preserved(__memcpy_real_area);
24pte_t *__bootdata_preserved(memcpy_real_ptep);
25static DEFINE_MUTEX(memcpy_real_mutex);
26
27static notrace long s390_kernel_write_odd(void *dst, const void *src, size_t size)
28{
29 unsigned long aligned, offset, count;
30 char tmp[8];
31
32 aligned = (unsigned long) dst & ~7UL;
33 offset = (unsigned long) dst & 7UL;
34 size = min(8UL - offset, size);
35 count = size - 1;
36 asm volatile(
37 " bras 1,0f\n"
38 " mvc 0(1,%4),0(%5)\n"
39 "0: mvc 0(8,%3),0(%0)\n"
40 " ex %1,0(1)\n"
41 " lg %1,0(%3)\n"
42 " lra %0,0(%0)\n"
43 " sturg %1,%0\n"
44 : "+&a" (aligned), "+&a" (count), "=m" (tmp)
45 : "a" (&tmp), "a" (&tmp[offset]), "a" (src)
46 : "cc", "memory", "1");
47 return size;
48}
49
50/*
51 * __s390_kernel_write - write to kernel memory bypassing DAT
52 * @dst: destination address
53 * @src: source address
54 * @size: number of bytes to copy
55 *
56 * This function writes to kernel memory bypassing DAT and possible page table
57 * write protection. It writes to the destination using the sturg instruction.
58 * Therefore we have a read-modify-write sequence: the function reads eight
59 * bytes from destination at an eight byte boundary, modifies the bytes
60 * requested and writes the result back in a loop.
61 */
62static DEFINE_SPINLOCK(s390_kernel_write_lock);
63
64notrace void *__s390_kernel_write(void *dst, const void *src, size_t size)
65{
66 void *tmp = dst;
67 unsigned long flags;
68 long copied;
69
70 spin_lock_irqsave(&s390_kernel_write_lock, flags);
71 while (size) {
72 copied = s390_kernel_write_odd(tmp, src, size);
73 tmp += copied;
74 src += copied;
75 size -= copied;
76 }
77 spin_unlock_irqrestore(&s390_kernel_write_lock, flags);
78
79 return dst;
80}
81
82size_t memcpy_real_iter(struct iov_iter *iter, unsigned long src, size_t count)
83{
84 size_t len, copied, res = 0;
85 unsigned long phys, offset;
86 void *chunk;
87 pte_t pte;
88
89 BUILD_BUG_ON(MEMCPY_REAL_SIZE != PAGE_SIZE);
90 while (count) {
91 phys = src & MEMCPY_REAL_MASK;
92 offset = src & ~MEMCPY_REAL_MASK;
93 chunk = (void *)(__memcpy_real_area + offset);
94 len = min(count, MEMCPY_REAL_SIZE - offset);
95 pte = mk_pte_phys(phys, PAGE_KERNEL_RO);
96
97 mutex_lock(&memcpy_real_mutex);
98 if (pte_val(pte) != pte_val(*memcpy_real_ptep)) {
99 __ptep_ipte(__memcpy_real_area, memcpy_real_ptep, 0, 0, IPTE_GLOBAL);
100 set_pte(memcpy_real_ptep, pte);
101 }
102 copied = copy_to_iter(chunk, len, iter);
103 mutex_unlock(&memcpy_real_mutex);
104
105 count -= copied;
106 src += copied;
107 res += copied;
108 if (copied < len)
109 break;
110 }
111 return res;
112}
113
114int memcpy_real(void *dest, unsigned long src, size_t count)
115{
116 struct iov_iter iter;
117 struct kvec kvec;
118
119 kvec.iov_base = dest;
120 kvec.iov_len = count;
121 iov_iter_kvec(&iter, ITER_DEST, &kvec, 1, count);
122 if (memcpy_real_iter(&iter, src, count) < count)
123 return -EFAULT;
124 return 0;
125}
126
127/*
128 * Find CPU that owns swapped prefix page
129 */
130static int get_swapped_owner(phys_addr_t addr)
131{
132 phys_addr_t lc;
133 int cpu;
134
135 for_each_online_cpu(cpu) {
136 lc = virt_to_phys(lowcore_ptr[cpu]);
137 if (addr > lc + sizeof(struct lowcore) - 1 || addr < lc)
138 continue;
139 return cpu;
140 }
141 return -1;
142}
143
144/*
145 * Convert a physical pointer for /dev/mem access
146 *
147 * For swapped prefix pages a new buffer is returned that contains a copy of
148 * the absolute memory. The buffer size is maximum one page large.
149 */
150void *xlate_dev_mem_ptr(phys_addr_t addr)
151{
152 void *ptr = phys_to_virt(addr);
153 void *bounce = ptr;
154 struct lowcore *abs_lc;
155 unsigned long size;
156 int this_cpu, cpu;
157
158 cpus_read_lock();
159 this_cpu = get_cpu();
160 if (addr >= sizeof(struct lowcore)) {
161 cpu = get_swapped_owner(addr);
162 if (cpu < 0)
163 goto out;
164 }
165 bounce = (void *)__get_free_page(GFP_ATOMIC);
166 if (!bounce)
167 goto out;
168 size = PAGE_SIZE - (addr & ~PAGE_MASK);
169 if (addr < sizeof(struct lowcore)) {
170 abs_lc = get_abs_lowcore();
171 ptr = (void *)abs_lc + addr;
172 memcpy(bounce, ptr, size);
173 put_abs_lowcore(abs_lc);
174 } else if (cpu == this_cpu) {
175 ptr = (void *)(addr - virt_to_phys(lowcore_ptr[cpu]));
176 memcpy(bounce, ptr, size);
177 } else {
178 memcpy(bounce, ptr, size);
179 }
180out:
181 put_cpu();
182 cpus_read_unlock();
183 return bounce;
184}
185
186/*
187 * Free converted buffer for /dev/mem access (if necessary)
188 */
189void unxlate_dev_mem_ptr(phys_addr_t addr, void *ptr)
190{
191 if (addr != virt_to_phys(ptr))
192 free_page((unsigned long)ptr);
193}