uaccess_pt.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476
  1. /*
  2. * arch/s390/lib/uaccess_pt.c
  3. *
  4. * User access functions based on page table walks for enhanced
  5. * system layout without hardware support.
  6. *
  7. * Copyright IBM Corp. 2006
  8. * Author(s): Gerald Schaefer (gerald.schaefer@de.ibm.com)
  9. */
  10. #include <linux/errno.h>
  11. #include <linux/hardirq.h>
  12. #include <linux/mm.h>
  13. #include <asm/uaccess.h>
  14. #include <asm/futex.h>
  15. #include "uaccess.h"
  16. static int __handle_fault(struct mm_struct *mm, unsigned long address,
  17. int write_access)
  18. {
  19. struct vm_area_struct *vma;
  20. int ret = -EFAULT;
  21. if (in_atomic())
  22. return ret;
  23. down_read(&mm->mmap_sem);
  24. vma = find_vma(mm, address);
  25. if (unlikely(!vma))
  26. goto out;
  27. if (unlikely(vma->vm_start > address)) {
  28. if (!(vma->vm_flags & VM_GROWSDOWN))
  29. goto out;
  30. if (expand_stack(vma, address))
  31. goto out;
  32. }
  33. if (!write_access) {
  34. /* page not present, check vm flags */
  35. if (!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE)))
  36. goto out;
  37. } else {
  38. if (!(vma->vm_flags & VM_WRITE))
  39. goto out;
  40. }
  41. survive:
  42. switch (handle_mm_fault(mm, vma, address, write_access)) {
  43. case VM_FAULT_MINOR:
  44. current->min_flt++;
  45. break;
  46. case VM_FAULT_MAJOR:
  47. current->maj_flt++;
  48. break;
  49. case VM_FAULT_SIGBUS:
  50. goto out_sigbus;
  51. case VM_FAULT_OOM:
  52. goto out_of_memory;
  53. default:
  54. BUG();
  55. }
  56. ret = 0;
  57. out:
  58. up_read(&mm->mmap_sem);
  59. return ret;
  60. out_of_memory:
  61. up_read(&mm->mmap_sem);
  62. if (is_init(current)) {
  63. yield();
  64. down_read(&mm->mmap_sem);
  65. goto survive;
  66. }
  67. printk("VM: killing process %s\n", current->comm);
  68. return ret;
  69. out_sigbus:
  70. up_read(&mm->mmap_sem);
  71. current->thread.prot_addr = address;
  72. current->thread.trap_no = 0x11;
  73. force_sig(SIGBUS, current);
  74. return ret;
  75. }
  76. static size_t __user_copy_pt(unsigned long uaddr, void *kptr,
  77. size_t n, int write_user)
  78. {
  79. struct mm_struct *mm = current->mm;
  80. unsigned long offset, pfn, done, size;
  81. pgd_t *pgd;
  82. pmd_t *pmd;
  83. pte_t *pte;
  84. void *from, *to;
  85. done = 0;
  86. retry:
  87. spin_lock(&mm->page_table_lock);
  88. do {
  89. pgd = pgd_offset(mm, uaddr);
  90. if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd)))
  91. goto fault;
  92. pmd = pmd_offset(pgd, uaddr);
  93. if (pmd_none(*pmd) || unlikely(pmd_bad(*pmd)))
  94. goto fault;
  95. pte = pte_offset_map(pmd, uaddr);
  96. if (!pte || !pte_present(*pte) ||
  97. (write_user && !pte_write(*pte)))
  98. goto fault;
  99. pfn = pte_pfn(*pte);
  100. if (!pfn_valid(pfn))
  101. goto out;
  102. offset = uaddr & (PAGE_SIZE - 1);
  103. size = min(n - done, PAGE_SIZE - offset);
  104. if (write_user) {
  105. to = (void *)((pfn << PAGE_SHIFT) + offset);
  106. from = kptr + done;
  107. } else {
  108. from = (void *)((pfn << PAGE_SHIFT) + offset);
  109. to = kptr + done;
  110. }
  111. memcpy(to, from, size);
  112. done += size;
  113. uaddr += size;
  114. } while (done < n);
  115. out:
  116. spin_unlock(&mm->page_table_lock);
  117. return n - done;
  118. fault:
  119. spin_unlock(&mm->page_table_lock);
  120. if (__handle_fault(mm, uaddr, write_user))
  121. return n - done;
  122. goto retry;
  123. }
  124. /*
  125. * Do DAT for user address by page table walk, return kernel address.
  126. * This function needs to be called with current->mm->page_table_lock held.
  127. */
  128. static unsigned long __dat_user_addr(unsigned long uaddr)
  129. {
  130. struct mm_struct *mm = current->mm;
  131. unsigned long pfn, ret;
  132. pgd_t *pgd;
  133. pmd_t *pmd;
  134. pte_t *pte;
  135. int rc;
  136. ret = 0;
  137. retry:
  138. pgd = pgd_offset(mm, uaddr);
  139. if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd)))
  140. goto fault;
  141. pmd = pmd_offset(pgd, uaddr);
  142. if (pmd_none(*pmd) || unlikely(pmd_bad(*pmd)))
  143. goto fault;
  144. pte = pte_offset_map(pmd, uaddr);
  145. if (!pte || !pte_present(*pte))
  146. goto fault;
  147. pfn = pte_pfn(*pte);
  148. if (!pfn_valid(pfn))
  149. goto out;
  150. ret = (pfn << PAGE_SHIFT) + (uaddr & (PAGE_SIZE - 1));
  151. out:
  152. return ret;
  153. fault:
  154. spin_unlock(&mm->page_table_lock);
  155. rc = __handle_fault(mm, uaddr, 0);
  156. spin_lock(&mm->page_table_lock);
  157. if (rc)
  158. goto out;
  159. goto retry;
  160. }
  161. size_t copy_from_user_pt(size_t n, const void __user *from, void *to)
  162. {
  163. size_t rc;
  164. if (segment_eq(get_fs(), KERNEL_DS)) {
  165. memcpy(to, (void __kernel __force *) from, n);
  166. return 0;
  167. }
  168. rc = __user_copy_pt((unsigned long) from, to, n, 0);
  169. if (unlikely(rc))
  170. memset(to + n - rc, 0, rc);
  171. return rc;
  172. }
  173. size_t copy_to_user_pt(size_t n, void __user *to, const void *from)
  174. {
  175. if (segment_eq(get_fs(), KERNEL_DS)) {
  176. memcpy((void __kernel __force *) to, from, n);
  177. return 0;
  178. }
  179. return __user_copy_pt((unsigned long) to, (void *) from, n, 1);
  180. }
  181. static size_t clear_user_pt(size_t n, void __user *to)
  182. {
  183. long done, size, ret;
  184. if (segment_eq(get_fs(), KERNEL_DS)) {
  185. memset((void __kernel __force *) to, 0, n);
  186. return 0;
  187. }
  188. done = 0;
  189. do {
  190. if (n - done > PAGE_SIZE)
  191. size = PAGE_SIZE;
  192. else
  193. size = n - done;
  194. ret = __user_copy_pt((unsigned long) to + done,
  195. &empty_zero_page, size, 1);
  196. done += size;
  197. if (ret)
  198. return ret + n - done;
  199. } while (done < n);
  200. return 0;
  201. }
  202. static size_t strnlen_user_pt(size_t count, const char __user *src)
  203. {
  204. char *addr;
  205. unsigned long uaddr = (unsigned long) src;
  206. struct mm_struct *mm = current->mm;
  207. unsigned long offset, pfn, done, len;
  208. pgd_t *pgd;
  209. pmd_t *pmd;
  210. pte_t *pte;
  211. size_t len_str;
  212. if (segment_eq(get_fs(), KERNEL_DS))
  213. return strnlen((const char __kernel __force *) src, count) + 1;
  214. done = 0;
  215. retry:
  216. spin_lock(&mm->page_table_lock);
  217. do {
  218. pgd = pgd_offset(mm, uaddr);
  219. if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd)))
  220. goto fault;
  221. pmd = pmd_offset(pgd, uaddr);
  222. if (pmd_none(*pmd) || unlikely(pmd_bad(*pmd)))
  223. goto fault;
  224. pte = pte_offset_map(pmd, uaddr);
  225. if (!pte || !pte_present(*pte))
  226. goto fault;
  227. pfn = pte_pfn(*pte);
  228. if (!pfn_valid(pfn)) {
  229. done = -1;
  230. goto out;
  231. }
  232. offset = uaddr & (PAGE_SIZE-1);
  233. addr = (char *)(pfn << PAGE_SHIFT) + offset;
  234. len = min(count - done, PAGE_SIZE - offset);
  235. len_str = strnlen(addr, len);
  236. done += len_str;
  237. uaddr += len_str;
  238. } while ((len_str == len) && (done < count));
  239. out:
  240. spin_unlock(&mm->page_table_lock);
  241. return done + 1;
  242. fault:
  243. spin_unlock(&mm->page_table_lock);
  244. if (__handle_fault(mm, uaddr, 0)) {
  245. return 0;
  246. }
  247. goto retry;
  248. }
  249. static size_t strncpy_from_user_pt(size_t count, const char __user *src,
  250. char *dst)
  251. {
  252. size_t n = strnlen_user_pt(count, src);
  253. if (!n)
  254. return -EFAULT;
  255. if (n > count)
  256. n = count;
  257. if (segment_eq(get_fs(), KERNEL_DS)) {
  258. memcpy(dst, (const char __kernel __force *) src, n);
  259. if (dst[n-1] == '\0')
  260. return n-1;
  261. else
  262. return n;
  263. }
  264. if (__user_copy_pt((unsigned long) src, dst, n, 0))
  265. return -EFAULT;
  266. if (dst[n-1] == '\0')
  267. return n-1;
  268. else
  269. return n;
  270. }
  271. static size_t copy_in_user_pt(size_t n, void __user *to,
  272. const void __user *from)
  273. {
  274. struct mm_struct *mm = current->mm;
  275. unsigned long offset_from, offset_to, offset_max, pfn_from, pfn_to,
  276. uaddr, done, size;
  277. unsigned long uaddr_from = (unsigned long) from;
  278. unsigned long uaddr_to = (unsigned long) to;
  279. pgd_t *pgd_from, *pgd_to;
  280. pmd_t *pmd_from, *pmd_to;
  281. pte_t *pte_from, *pte_to;
  282. int write_user;
  283. done = 0;
  284. retry:
  285. spin_lock(&mm->page_table_lock);
  286. do {
  287. pgd_from = pgd_offset(mm, uaddr_from);
  288. if (pgd_none(*pgd_from) || unlikely(pgd_bad(*pgd_from))) {
  289. uaddr = uaddr_from;
  290. write_user = 0;
  291. goto fault;
  292. }
  293. pgd_to = pgd_offset(mm, uaddr_to);
  294. if (pgd_none(*pgd_to) || unlikely(pgd_bad(*pgd_to))) {
  295. uaddr = uaddr_to;
  296. write_user = 1;
  297. goto fault;
  298. }
  299. pmd_from = pmd_offset(pgd_from, uaddr_from);
  300. if (pmd_none(*pmd_from) || unlikely(pmd_bad(*pmd_from))) {
  301. uaddr = uaddr_from;
  302. write_user = 0;
  303. goto fault;
  304. }
  305. pmd_to = pmd_offset(pgd_to, uaddr_to);
  306. if (pmd_none(*pmd_to) || unlikely(pmd_bad(*pmd_to))) {
  307. uaddr = uaddr_to;
  308. write_user = 1;
  309. goto fault;
  310. }
  311. pte_from = pte_offset_map(pmd_from, uaddr_from);
  312. if (!pte_from || !pte_present(*pte_from)) {
  313. uaddr = uaddr_from;
  314. write_user = 0;
  315. goto fault;
  316. }
  317. pte_to = pte_offset_map(pmd_to, uaddr_to);
  318. if (!pte_to || !pte_present(*pte_to) || !pte_write(*pte_to)) {
  319. uaddr = uaddr_to;
  320. write_user = 1;
  321. goto fault;
  322. }
  323. pfn_from = pte_pfn(*pte_from);
  324. if (!pfn_valid(pfn_from))
  325. goto out;
  326. pfn_to = pte_pfn(*pte_to);
  327. if (!pfn_valid(pfn_to))
  328. goto out;
  329. offset_from = uaddr_from & (PAGE_SIZE-1);
  330. offset_to = uaddr_from & (PAGE_SIZE-1);
  331. offset_max = max(offset_from, offset_to);
  332. size = min(n - done, PAGE_SIZE - offset_max);
  333. memcpy((void *)(pfn_to << PAGE_SHIFT) + offset_to,
  334. (void *)(pfn_from << PAGE_SHIFT) + offset_from, size);
  335. done += size;
  336. uaddr_from += size;
  337. uaddr_to += size;
  338. } while (done < n);
  339. out:
  340. spin_unlock(&mm->page_table_lock);
  341. return n - done;
  342. fault:
  343. spin_unlock(&mm->page_table_lock);
  344. if (__handle_fault(mm, uaddr, write_user))
  345. return n - done;
  346. goto retry;
  347. }
  348. #define __futex_atomic_op(insn, ret, oldval, newval, uaddr, oparg) \
  349. asm volatile("0: l %1,0(%6)\n" \
  350. "1: " insn \
  351. "2: cs %1,%2,0(%6)\n" \
  352. "3: jl 1b\n" \
  353. " lhi %0,0\n" \
  354. "4:\n" \
  355. EX_TABLE(0b,4b) EX_TABLE(2b,4b) EX_TABLE(3b,4b) \
  356. : "=d" (ret), "=&d" (oldval), "=&d" (newval), \
  357. "=m" (*uaddr) \
  358. : "0" (-EFAULT), "d" (oparg), "a" (uaddr), \
  359. "m" (*uaddr) : "cc" );
  360. int futex_atomic_op_pt(int op, int __user *uaddr, int oparg, int *old)
  361. {
  362. int oldval = 0, newval, ret;
  363. spin_lock(&current->mm->page_table_lock);
  364. uaddr = (int __user *) __dat_user_addr((unsigned long) uaddr);
  365. if (!uaddr) {
  366. spin_unlock(&current->mm->page_table_lock);
  367. return -EFAULT;
  368. }
  369. get_page(virt_to_page(uaddr));
  370. spin_unlock(&current->mm->page_table_lock);
  371. switch (op) {
  372. case FUTEX_OP_SET:
  373. __futex_atomic_op("lr %2,%5\n",
  374. ret, oldval, newval, uaddr, oparg);
  375. break;
  376. case FUTEX_OP_ADD:
  377. __futex_atomic_op("lr %2,%1\nar %2,%5\n",
  378. ret, oldval, newval, uaddr, oparg);
  379. break;
  380. case FUTEX_OP_OR:
  381. __futex_atomic_op("lr %2,%1\nor %2,%5\n",
  382. ret, oldval, newval, uaddr, oparg);
  383. break;
  384. case FUTEX_OP_ANDN:
  385. __futex_atomic_op("lr %2,%1\nnr %2,%5\n",
  386. ret, oldval, newval, uaddr, oparg);
  387. break;
  388. case FUTEX_OP_XOR:
  389. __futex_atomic_op("lr %2,%1\nxr %2,%5\n",
  390. ret, oldval, newval, uaddr, oparg);
  391. break;
  392. default:
  393. ret = -ENOSYS;
  394. }
  395. put_page(virt_to_page(uaddr));
  396. *old = oldval;
  397. return ret;
  398. }
  399. int futex_atomic_cmpxchg_pt(int __user *uaddr, int oldval, int newval)
  400. {
  401. int ret;
  402. spin_lock(&current->mm->page_table_lock);
  403. uaddr = (int __user *) __dat_user_addr((unsigned long) uaddr);
  404. if (!uaddr) {
  405. spin_unlock(&current->mm->page_table_lock);
  406. return -EFAULT;
  407. }
  408. get_page(virt_to_page(uaddr));
  409. spin_unlock(&current->mm->page_table_lock);
  410. asm volatile(" cs %1,%4,0(%5)\n"
  411. "0: lr %0,%1\n"
  412. "1:\n"
  413. EX_TABLE(0b,1b)
  414. : "=d" (ret), "+d" (oldval), "=m" (*uaddr)
  415. : "0" (-EFAULT), "d" (newval), "a" (uaddr), "m" (*uaddr)
  416. : "cc", "memory" );
  417. put_page(virt_to_page(uaddr));
  418. return ret;
  419. }
  420. struct uaccess_ops uaccess_pt = {
  421. .copy_from_user = copy_from_user_pt,
  422. .copy_from_user_small = copy_from_user_pt,
  423. .copy_to_user = copy_to_user_pt,
  424. .copy_to_user_small = copy_to_user_pt,
  425. .copy_in_user = copy_in_user_pt,
  426. .clear_user = clear_user_pt,
  427. .strnlen_user = strnlen_user_pt,
  428. .strncpy_from_user = strncpy_from_user_pt,
  429. .futex_atomic_op = futex_atomic_op_pt,
  430. .futex_atomic_cmpxchg = futex_atomic_cmpxchg_pt,
  431. };