18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 28c2ecf20Sopenharmony_ci/****************************************************************************** 38c2ecf20Sopenharmony_ci * privcmd.c 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Interface to privileged domain-0 commands. 68c2ecf20Sopenharmony_ci * 78c2ecf20Sopenharmony_ci * Copyright (c) 2002-2004, K A Fraser, B Dragovic 88c2ecf20Sopenharmony_ci */ 98c2ecf20Sopenharmony_ci 108c2ecf20Sopenharmony_ci#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt 118c2ecf20Sopenharmony_ci 128c2ecf20Sopenharmony_ci#include <linux/kernel.h> 138c2ecf20Sopenharmony_ci#include <linux/module.h> 148c2ecf20Sopenharmony_ci#include <linux/sched.h> 158c2ecf20Sopenharmony_ci#include <linux/slab.h> 168c2ecf20Sopenharmony_ci#include <linux/string.h> 178c2ecf20Sopenharmony_ci#include <linux/errno.h> 188c2ecf20Sopenharmony_ci#include <linux/mm.h> 198c2ecf20Sopenharmony_ci#include <linux/mman.h> 208c2ecf20Sopenharmony_ci#include <linux/uaccess.h> 218c2ecf20Sopenharmony_ci#include <linux/swap.h> 228c2ecf20Sopenharmony_ci#include <linux/highmem.h> 238c2ecf20Sopenharmony_ci#include <linux/pagemap.h> 248c2ecf20Sopenharmony_ci#include <linux/seq_file.h> 258c2ecf20Sopenharmony_ci#include <linux/miscdevice.h> 268c2ecf20Sopenharmony_ci#include <linux/moduleparam.h> 278c2ecf20Sopenharmony_ci 288c2ecf20Sopenharmony_ci#include <asm/xen/hypervisor.h> 298c2ecf20Sopenharmony_ci#include <asm/xen/hypercall.h> 308c2ecf20Sopenharmony_ci 318c2ecf20Sopenharmony_ci#include <xen/xen.h> 328c2ecf20Sopenharmony_ci#include <xen/privcmd.h> 338c2ecf20Sopenharmony_ci#include <xen/interface/xen.h> 348c2ecf20Sopenharmony_ci#include <xen/interface/memory.h> 358c2ecf20Sopenharmony_ci#include <xen/interface/hvm/dm_op.h> 368c2ecf20Sopenharmony_ci#include <xen/features.h> 378c2ecf20Sopenharmony_ci#include <xen/page.h> 388c2ecf20Sopenharmony_ci#include <xen/xen-ops.h> 398c2ecf20Sopenharmony_ci#include <xen/balloon.h> 408c2ecf20Sopenharmony_ci 418c2ecf20Sopenharmony_ci#include "privcmd.h" 428c2ecf20Sopenharmony_ci 438c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 448c2ecf20Sopenharmony_ci 458c2ecf20Sopenharmony_ci#define PRIV_VMA_LOCKED ((void *)1) 468c2ecf20Sopenharmony_ci 478c2ecf20Sopenharmony_cistatic unsigned int privcmd_dm_op_max_num = 16; 488c2ecf20Sopenharmony_cimodule_param_named(dm_op_max_nr_bufs, privcmd_dm_op_max_num, uint, 0644); 498c2ecf20Sopenharmony_ciMODULE_PARM_DESC(dm_op_max_nr_bufs, 508c2ecf20Sopenharmony_ci "Maximum number of buffers per dm_op hypercall"); 518c2ecf20Sopenharmony_ci 528c2ecf20Sopenharmony_cistatic unsigned int privcmd_dm_op_buf_max_size = 4096; 538c2ecf20Sopenharmony_cimodule_param_named(dm_op_buf_max_size, privcmd_dm_op_buf_max_size, uint, 548c2ecf20Sopenharmony_ci 0644); 558c2ecf20Sopenharmony_ciMODULE_PARM_DESC(dm_op_buf_max_size, 568c2ecf20Sopenharmony_ci "Maximum size of a dm_op hypercall buffer"); 578c2ecf20Sopenharmony_ci 588c2ecf20Sopenharmony_cistruct privcmd_data { 598c2ecf20Sopenharmony_ci domid_t domid; 608c2ecf20Sopenharmony_ci}; 618c2ecf20Sopenharmony_ci 628c2ecf20Sopenharmony_cistatic int privcmd_vma_range_is_mapped( 638c2ecf20Sopenharmony_ci struct vm_area_struct *vma, 648c2ecf20Sopenharmony_ci unsigned long addr, 658c2ecf20Sopenharmony_ci unsigned long nr_pages); 668c2ecf20Sopenharmony_ci 678c2ecf20Sopenharmony_cistatic long privcmd_ioctl_hypercall(struct file *file, void __user *udata) 688c2ecf20Sopenharmony_ci{ 698c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 708c2ecf20Sopenharmony_ci struct privcmd_hypercall hypercall; 718c2ecf20Sopenharmony_ci long ret; 728c2ecf20Sopenharmony_ci 738c2ecf20Sopenharmony_ci /* Disallow arbitrary hypercalls if restricted */ 748c2ecf20Sopenharmony_ci if (data->domid != DOMID_INVALID) 758c2ecf20Sopenharmony_ci return -EPERM; 768c2ecf20Sopenharmony_ci 778c2ecf20Sopenharmony_ci if (copy_from_user(&hypercall, udata, sizeof(hypercall))) 788c2ecf20Sopenharmony_ci return -EFAULT; 798c2ecf20Sopenharmony_ci 808c2ecf20Sopenharmony_ci xen_preemptible_hcall_begin(); 818c2ecf20Sopenharmony_ci ret = privcmd_call(hypercall.op, 828c2ecf20Sopenharmony_ci hypercall.arg[0], hypercall.arg[1], 838c2ecf20Sopenharmony_ci hypercall.arg[2], hypercall.arg[3], 848c2ecf20Sopenharmony_ci hypercall.arg[4]); 858c2ecf20Sopenharmony_ci xen_preemptible_hcall_end(); 868c2ecf20Sopenharmony_ci 878c2ecf20Sopenharmony_ci return ret; 888c2ecf20Sopenharmony_ci} 898c2ecf20Sopenharmony_ci 908c2ecf20Sopenharmony_cistatic void free_page_list(struct list_head *pages) 918c2ecf20Sopenharmony_ci{ 928c2ecf20Sopenharmony_ci struct page *p, *n; 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_ci list_for_each_entry_safe(p, n, pages, lru) 958c2ecf20Sopenharmony_ci __free_page(p); 968c2ecf20Sopenharmony_ci 978c2ecf20Sopenharmony_ci INIT_LIST_HEAD(pages); 988c2ecf20Sopenharmony_ci} 998c2ecf20Sopenharmony_ci 1008c2ecf20Sopenharmony_ci/* 1018c2ecf20Sopenharmony_ci * Given an array of items in userspace, return a list of pages 1028c2ecf20Sopenharmony_ci * containing the data. If copying fails, either because of memory 1038c2ecf20Sopenharmony_ci * allocation failure or a problem reading user memory, return an 1048c2ecf20Sopenharmony_ci * error code; its up to the caller to dispose of any partial list. 1058c2ecf20Sopenharmony_ci */ 1068c2ecf20Sopenharmony_cistatic int gather_array(struct list_head *pagelist, 1078c2ecf20Sopenharmony_ci unsigned nelem, size_t size, 1088c2ecf20Sopenharmony_ci const void __user *data) 1098c2ecf20Sopenharmony_ci{ 1108c2ecf20Sopenharmony_ci unsigned pageidx; 1118c2ecf20Sopenharmony_ci void *pagedata; 1128c2ecf20Sopenharmony_ci int ret; 1138c2ecf20Sopenharmony_ci 1148c2ecf20Sopenharmony_ci if (size > PAGE_SIZE) 1158c2ecf20Sopenharmony_ci return 0; 1168c2ecf20Sopenharmony_ci 1178c2ecf20Sopenharmony_ci pageidx = PAGE_SIZE; 1188c2ecf20Sopenharmony_ci pagedata = NULL; /* quiet, gcc */ 1198c2ecf20Sopenharmony_ci while (nelem--) { 1208c2ecf20Sopenharmony_ci if (pageidx > PAGE_SIZE-size) { 1218c2ecf20Sopenharmony_ci struct page *page = alloc_page(GFP_KERNEL); 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_ci ret = -ENOMEM; 1248c2ecf20Sopenharmony_ci if (page == NULL) 1258c2ecf20Sopenharmony_ci goto fail; 1268c2ecf20Sopenharmony_ci 1278c2ecf20Sopenharmony_ci pagedata = page_address(page); 1288c2ecf20Sopenharmony_ci 1298c2ecf20Sopenharmony_ci list_add_tail(&page->lru, pagelist); 1308c2ecf20Sopenharmony_ci pageidx = 0; 1318c2ecf20Sopenharmony_ci } 1328c2ecf20Sopenharmony_ci 1338c2ecf20Sopenharmony_ci ret = -EFAULT; 1348c2ecf20Sopenharmony_ci if (copy_from_user(pagedata + pageidx, data, size)) 1358c2ecf20Sopenharmony_ci goto fail; 1368c2ecf20Sopenharmony_ci 1378c2ecf20Sopenharmony_ci data += size; 1388c2ecf20Sopenharmony_ci pageidx += size; 1398c2ecf20Sopenharmony_ci } 1408c2ecf20Sopenharmony_ci 1418c2ecf20Sopenharmony_ci ret = 0; 1428c2ecf20Sopenharmony_ci 1438c2ecf20Sopenharmony_cifail: 1448c2ecf20Sopenharmony_ci return ret; 1458c2ecf20Sopenharmony_ci} 1468c2ecf20Sopenharmony_ci 1478c2ecf20Sopenharmony_ci/* 1488c2ecf20Sopenharmony_ci * Call function "fn" on each element of the array fragmented 1498c2ecf20Sopenharmony_ci * over a list of pages. 1508c2ecf20Sopenharmony_ci */ 1518c2ecf20Sopenharmony_cistatic int traverse_pages(unsigned nelem, size_t size, 1528c2ecf20Sopenharmony_ci struct list_head *pos, 1538c2ecf20Sopenharmony_ci int (*fn)(void *data, void *state), 1548c2ecf20Sopenharmony_ci void *state) 1558c2ecf20Sopenharmony_ci{ 1568c2ecf20Sopenharmony_ci void *pagedata; 1578c2ecf20Sopenharmony_ci unsigned pageidx; 1588c2ecf20Sopenharmony_ci int ret = 0; 1598c2ecf20Sopenharmony_ci 1608c2ecf20Sopenharmony_ci BUG_ON(size > PAGE_SIZE); 1618c2ecf20Sopenharmony_ci 1628c2ecf20Sopenharmony_ci pageidx = PAGE_SIZE; 1638c2ecf20Sopenharmony_ci pagedata = NULL; /* hush, gcc */ 1648c2ecf20Sopenharmony_ci 1658c2ecf20Sopenharmony_ci while (nelem--) { 1668c2ecf20Sopenharmony_ci if (pageidx > PAGE_SIZE-size) { 1678c2ecf20Sopenharmony_ci struct page *page; 1688c2ecf20Sopenharmony_ci pos = pos->next; 1698c2ecf20Sopenharmony_ci page = list_entry(pos, struct page, lru); 1708c2ecf20Sopenharmony_ci pagedata = page_address(page); 1718c2ecf20Sopenharmony_ci pageidx = 0; 1728c2ecf20Sopenharmony_ci } 1738c2ecf20Sopenharmony_ci 1748c2ecf20Sopenharmony_ci ret = (*fn)(pagedata + pageidx, state); 1758c2ecf20Sopenharmony_ci if (ret) 1768c2ecf20Sopenharmony_ci break; 1778c2ecf20Sopenharmony_ci pageidx += size; 1788c2ecf20Sopenharmony_ci } 1798c2ecf20Sopenharmony_ci 1808c2ecf20Sopenharmony_ci return ret; 1818c2ecf20Sopenharmony_ci} 1828c2ecf20Sopenharmony_ci 1838c2ecf20Sopenharmony_ci/* 1848c2ecf20Sopenharmony_ci * Similar to traverse_pages, but use each page as a "block" of 1858c2ecf20Sopenharmony_ci * data to be processed as one unit. 1868c2ecf20Sopenharmony_ci */ 1878c2ecf20Sopenharmony_cistatic int traverse_pages_block(unsigned nelem, size_t size, 1888c2ecf20Sopenharmony_ci struct list_head *pos, 1898c2ecf20Sopenharmony_ci int (*fn)(void *data, int nr, void *state), 1908c2ecf20Sopenharmony_ci void *state) 1918c2ecf20Sopenharmony_ci{ 1928c2ecf20Sopenharmony_ci void *pagedata; 1938c2ecf20Sopenharmony_ci int ret = 0; 1948c2ecf20Sopenharmony_ci 1958c2ecf20Sopenharmony_ci BUG_ON(size > PAGE_SIZE); 1968c2ecf20Sopenharmony_ci 1978c2ecf20Sopenharmony_ci while (nelem) { 1988c2ecf20Sopenharmony_ci int nr = (PAGE_SIZE/size); 1998c2ecf20Sopenharmony_ci struct page *page; 2008c2ecf20Sopenharmony_ci if (nr > nelem) 2018c2ecf20Sopenharmony_ci nr = nelem; 2028c2ecf20Sopenharmony_ci pos = pos->next; 2038c2ecf20Sopenharmony_ci page = list_entry(pos, struct page, lru); 2048c2ecf20Sopenharmony_ci pagedata = page_address(page); 2058c2ecf20Sopenharmony_ci ret = (*fn)(pagedata, nr, state); 2068c2ecf20Sopenharmony_ci if (ret) 2078c2ecf20Sopenharmony_ci break; 2088c2ecf20Sopenharmony_ci nelem -= nr; 2098c2ecf20Sopenharmony_ci } 2108c2ecf20Sopenharmony_ci 2118c2ecf20Sopenharmony_ci return ret; 2128c2ecf20Sopenharmony_ci} 2138c2ecf20Sopenharmony_ci 2148c2ecf20Sopenharmony_cistruct mmap_gfn_state { 2158c2ecf20Sopenharmony_ci unsigned long va; 2168c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 2178c2ecf20Sopenharmony_ci domid_t domain; 2188c2ecf20Sopenharmony_ci}; 2198c2ecf20Sopenharmony_ci 2208c2ecf20Sopenharmony_cistatic int mmap_gfn_range(void *data, void *state) 2218c2ecf20Sopenharmony_ci{ 2228c2ecf20Sopenharmony_ci struct privcmd_mmap_entry *msg = data; 2238c2ecf20Sopenharmony_ci struct mmap_gfn_state *st = state; 2248c2ecf20Sopenharmony_ci struct vm_area_struct *vma = st->vma; 2258c2ecf20Sopenharmony_ci int rc; 2268c2ecf20Sopenharmony_ci 2278c2ecf20Sopenharmony_ci /* Do not allow range to wrap the address space. */ 2288c2ecf20Sopenharmony_ci if ((msg->npages > (LONG_MAX >> PAGE_SHIFT)) || 2298c2ecf20Sopenharmony_ci ((unsigned long)(msg->npages << PAGE_SHIFT) >= -st->va)) 2308c2ecf20Sopenharmony_ci return -EINVAL; 2318c2ecf20Sopenharmony_ci 2328c2ecf20Sopenharmony_ci /* Range chunks must be contiguous in va space. */ 2338c2ecf20Sopenharmony_ci if ((msg->va != st->va) || 2348c2ecf20Sopenharmony_ci ((msg->va+(msg->npages<<PAGE_SHIFT)) > vma->vm_end)) 2358c2ecf20Sopenharmony_ci return -EINVAL; 2368c2ecf20Sopenharmony_ci 2378c2ecf20Sopenharmony_ci rc = xen_remap_domain_gfn_range(vma, 2388c2ecf20Sopenharmony_ci msg->va & PAGE_MASK, 2398c2ecf20Sopenharmony_ci msg->mfn, msg->npages, 2408c2ecf20Sopenharmony_ci vma->vm_page_prot, 2418c2ecf20Sopenharmony_ci st->domain, NULL); 2428c2ecf20Sopenharmony_ci if (rc < 0) 2438c2ecf20Sopenharmony_ci return rc; 2448c2ecf20Sopenharmony_ci 2458c2ecf20Sopenharmony_ci st->va += msg->npages << PAGE_SHIFT; 2468c2ecf20Sopenharmony_ci 2478c2ecf20Sopenharmony_ci return 0; 2488c2ecf20Sopenharmony_ci} 2498c2ecf20Sopenharmony_ci 2508c2ecf20Sopenharmony_cistatic long privcmd_ioctl_mmap(struct file *file, void __user *udata) 2518c2ecf20Sopenharmony_ci{ 2528c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 2538c2ecf20Sopenharmony_ci struct privcmd_mmap mmapcmd; 2548c2ecf20Sopenharmony_ci struct mm_struct *mm = current->mm; 2558c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 2568c2ecf20Sopenharmony_ci int rc; 2578c2ecf20Sopenharmony_ci LIST_HEAD(pagelist); 2588c2ecf20Sopenharmony_ci struct mmap_gfn_state state; 2598c2ecf20Sopenharmony_ci 2608c2ecf20Sopenharmony_ci /* We only support privcmd_ioctl_mmap_batch for auto translated. */ 2618c2ecf20Sopenharmony_ci if (xen_feature(XENFEAT_auto_translated_physmap)) 2628c2ecf20Sopenharmony_ci return -ENOSYS; 2638c2ecf20Sopenharmony_ci 2648c2ecf20Sopenharmony_ci if (copy_from_user(&mmapcmd, udata, sizeof(mmapcmd))) 2658c2ecf20Sopenharmony_ci return -EFAULT; 2668c2ecf20Sopenharmony_ci 2678c2ecf20Sopenharmony_ci /* If restriction is in place, check the domid matches */ 2688c2ecf20Sopenharmony_ci if (data->domid != DOMID_INVALID && data->domid != mmapcmd.dom) 2698c2ecf20Sopenharmony_ci return -EPERM; 2708c2ecf20Sopenharmony_ci 2718c2ecf20Sopenharmony_ci rc = gather_array(&pagelist, 2728c2ecf20Sopenharmony_ci mmapcmd.num, sizeof(struct privcmd_mmap_entry), 2738c2ecf20Sopenharmony_ci mmapcmd.entry); 2748c2ecf20Sopenharmony_ci 2758c2ecf20Sopenharmony_ci if (rc || list_empty(&pagelist)) 2768c2ecf20Sopenharmony_ci goto out; 2778c2ecf20Sopenharmony_ci 2788c2ecf20Sopenharmony_ci mmap_write_lock(mm); 2798c2ecf20Sopenharmony_ci 2808c2ecf20Sopenharmony_ci { 2818c2ecf20Sopenharmony_ci struct page *page = list_first_entry(&pagelist, 2828c2ecf20Sopenharmony_ci struct page, lru); 2838c2ecf20Sopenharmony_ci struct privcmd_mmap_entry *msg = page_address(page); 2848c2ecf20Sopenharmony_ci 2858c2ecf20Sopenharmony_ci vma = find_vma(mm, msg->va); 2868c2ecf20Sopenharmony_ci rc = -EINVAL; 2878c2ecf20Sopenharmony_ci 2888c2ecf20Sopenharmony_ci if (!vma || (msg->va != vma->vm_start) || vma->vm_private_data) 2898c2ecf20Sopenharmony_ci goto out_up; 2908c2ecf20Sopenharmony_ci vma->vm_private_data = PRIV_VMA_LOCKED; 2918c2ecf20Sopenharmony_ci } 2928c2ecf20Sopenharmony_ci 2938c2ecf20Sopenharmony_ci state.va = vma->vm_start; 2948c2ecf20Sopenharmony_ci state.vma = vma; 2958c2ecf20Sopenharmony_ci state.domain = mmapcmd.dom; 2968c2ecf20Sopenharmony_ci 2978c2ecf20Sopenharmony_ci rc = traverse_pages(mmapcmd.num, sizeof(struct privcmd_mmap_entry), 2988c2ecf20Sopenharmony_ci &pagelist, 2998c2ecf20Sopenharmony_ci mmap_gfn_range, &state); 3008c2ecf20Sopenharmony_ci 3018c2ecf20Sopenharmony_ci 3028c2ecf20Sopenharmony_ciout_up: 3038c2ecf20Sopenharmony_ci mmap_write_unlock(mm); 3048c2ecf20Sopenharmony_ci 3058c2ecf20Sopenharmony_ciout: 3068c2ecf20Sopenharmony_ci free_page_list(&pagelist); 3078c2ecf20Sopenharmony_ci 3088c2ecf20Sopenharmony_ci return rc; 3098c2ecf20Sopenharmony_ci} 3108c2ecf20Sopenharmony_ci 3118c2ecf20Sopenharmony_cistruct mmap_batch_state { 3128c2ecf20Sopenharmony_ci domid_t domain; 3138c2ecf20Sopenharmony_ci unsigned long va; 3148c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 3158c2ecf20Sopenharmony_ci int index; 3168c2ecf20Sopenharmony_ci /* A tristate: 3178c2ecf20Sopenharmony_ci * 0 for no errors 3188c2ecf20Sopenharmony_ci * 1 if at least one error has happened (and no 3198c2ecf20Sopenharmony_ci * -ENOENT errors have happened) 3208c2ecf20Sopenharmony_ci * -ENOENT if at least 1 -ENOENT has happened. 3218c2ecf20Sopenharmony_ci */ 3228c2ecf20Sopenharmony_ci int global_error; 3238c2ecf20Sopenharmony_ci int version; 3248c2ecf20Sopenharmony_ci 3258c2ecf20Sopenharmony_ci /* User-space gfn array to store errors in the second pass for V1. */ 3268c2ecf20Sopenharmony_ci xen_pfn_t __user *user_gfn; 3278c2ecf20Sopenharmony_ci /* User-space int array to store errors in the second pass for V2. */ 3288c2ecf20Sopenharmony_ci int __user *user_err; 3298c2ecf20Sopenharmony_ci}; 3308c2ecf20Sopenharmony_ci 3318c2ecf20Sopenharmony_ci/* auto translated dom0 note: if domU being created is PV, then gfn is 3328c2ecf20Sopenharmony_ci * mfn(addr on bus). If it's auto xlated, then gfn is pfn (input to HAP). 3338c2ecf20Sopenharmony_ci */ 3348c2ecf20Sopenharmony_cistatic int mmap_batch_fn(void *data, int nr, void *state) 3358c2ecf20Sopenharmony_ci{ 3368c2ecf20Sopenharmony_ci xen_pfn_t *gfnp = data; 3378c2ecf20Sopenharmony_ci struct mmap_batch_state *st = state; 3388c2ecf20Sopenharmony_ci struct vm_area_struct *vma = st->vma; 3398c2ecf20Sopenharmony_ci struct page **pages = vma->vm_private_data; 3408c2ecf20Sopenharmony_ci struct page **cur_pages = NULL; 3418c2ecf20Sopenharmony_ci int ret; 3428c2ecf20Sopenharmony_ci 3438c2ecf20Sopenharmony_ci if (xen_feature(XENFEAT_auto_translated_physmap)) 3448c2ecf20Sopenharmony_ci cur_pages = &pages[st->index]; 3458c2ecf20Sopenharmony_ci 3468c2ecf20Sopenharmony_ci BUG_ON(nr < 0); 3478c2ecf20Sopenharmony_ci ret = xen_remap_domain_gfn_array(st->vma, st->va & PAGE_MASK, gfnp, nr, 3488c2ecf20Sopenharmony_ci (int *)gfnp, st->vma->vm_page_prot, 3498c2ecf20Sopenharmony_ci st->domain, cur_pages); 3508c2ecf20Sopenharmony_ci 3518c2ecf20Sopenharmony_ci /* Adjust the global_error? */ 3528c2ecf20Sopenharmony_ci if (ret != nr) { 3538c2ecf20Sopenharmony_ci if (ret == -ENOENT) 3548c2ecf20Sopenharmony_ci st->global_error = -ENOENT; 3558c2ecf20Sopenharmony_ci else { 3568c2ecf20Sopenharmony_ci /* Record that at least one error has happened. */ 3578c2ecf20Sopenharmony_ci if (st->global_error == 0) 3588c2ecf20Sopenharmony_ci st->global_error = 1; 3598c2ecf20Sopenharmony_ci } 3608c2ecf20Sopenharmony_ci } 3618c2ecf20Sopenharmony_ci st->va += XEN_PAGE_SIZE * nr; 3628c2ecf20Sopenharmony_ci st->index += nr / XEN_PFN_PER_PAGE; 3638c2ecf20Sopenharmony_ci 3648c2ecf20Sopenharmony_ci return 0; 3658c2ecf20Sopenharmony_ci} 3668c2ecf20Sopenharmony_ci 3678c2ecf20Sopenharmony_cistatic int mmap_return_error(int err, struct mmap_batch_state *st) 3688c2ecf20Sopenharmony_ci{ 3698c2ecf20Sopenharmony_ci int ret; 3708c2ecf20Sopenharmony_ci 3718c2ecf20Sopenharmony_ci if (st->version == 1) { 3728c2ecf20Sopenharmony_ci if (err) { 3738c2ecf20Sopenharmony_ci xen_pfn_t gfn; 3748c2ecf20Sopenharmony_ci 3758c2ecf20Sopenharmony_ci ret = get_user(gfn, st->user_gfn); 3768c2ecf20Sopenharmony_ci if (ret < 0) 3778c2ecf20Sopenharmony_ci return ret; 3788c2ecf20Sopenharmony_ci /* 3798c2ecf20Sopenharmony_ci * V1 encodes the error codes in the 32bit top 3808c2ecf20Sopenharmony_ci * nibble of the gfn (with its known 3818c2ecf20Sopenharmony_ci * limitations vis-a-vis 64 bit callers). 3828c2ecf20Sopenharmony_ci */ 3838c2ecf20Sopenharmony_ci gfn |= (err == -ENOENT) ? 3848c2ecf20Sopenharmony_ci PRIVCMD_MMAPBATCH_PAGED_ERROR : 3858c2ecf20Sopenharmony_ci PRIVCMD_MMAPBATCH_MFN_ERROR; 3868c2ecf20Sopenharmony_ci return __put_user(gfn, st->user_gfn++); 3878c2ecf20Sopenharmony_ci } else 3888c2ecf20Sopenharmony_ci st->user_gfn++; 3898c2ecf20Sopenharmony_ci } else { /* st->version == 2 */ 3908c2ecf20Sopenharmony_ci if (err) 3918c2ecf20Sopenharmony_ci return __put_user(err, st->user_err++); 3928c2ecf20Sopenharmony_ci else 3938c2ecf20Sopenharmony_ci st->user_err++; 3948c2ecf20Sopenharmony_ci } 3958c2ecf20Sopenharmony_ci 3968c2ecf20Sopenharmony_ci return 0; 3978c2ecf20Sopenharmony_ci} 3988c2ecf20Sopenharmony_ci 3998c2ecf20Sopenharmony_cistatic int mmap_return_errors(void *data, int nr, void *state) 4008c2ecf20Sopenharmony_ci{ 4018c2ecf20Sopenharmony_ci struct mmap_batch_state *st = state; 4028c2ecf20Sopenharmony_ci int *errs = data; 4038c2ecf20Sopenharmony_ci int i; 4048c2ecf20Sopenharmony_ci int ret; 4058c2ecf20Sopenharmony_ci 4068c2ecf20Sopenharmony_ci for (i = 0; i < nr; i++) { 4078c2ecf20Sopenharmony_ci ret = mmap_return_error(errs[i], st); 4088c2ecf20Sopenharmony_ci if (ret < 0) 4098c2ecf20Sopenharmony_ci return ret; 4108c2ecf20Sopenharmony_ci } 4118c2ecf20Sopenharmony_ci return 0; 4128c2ecf20Sopenharmony_ci} 4138c2ecf20Sopenharmony_ci 4148c2ecf20Sopenharmony_ci/* Allocate pfns that are then mapped with gfns from foreign domid. Update 4158c2ecf20Sopenharmony_ci * the vma with the page info to use later. 4168c2ecf20Sopenharmony_ci * Returns: 0 if success, otherwise -errno 4178c2ecf20Sopenharmony_ci */ 4188c2ecf20Sopenharmony_cistatic int alloc_empty_pages(struct vm_area_struct *vma, int numpgs) 4198c2ecf20Sopenharmony_ci{ 4208c2ecf20Sopenharmony_ci int rc; 4218c2ecf20Sopenharmony_ci struct page **pages; 4228c2ecf20Sopenharmony_ci 4238c2ecf20Sopenharmony_ci pages = kcalloc(numpgs, sizeof(pages[0]), GFP_KERNEL); 4248c2ecf20Sopenharmony_ci if (pages == NULL) 4258c2ecf20Sopenharmony_ci return -ENOMEM; 4268c2ecf20Sopenharmony_ci 4278c2ecf20Sopenharmony_ci rc = xen_alloc_unpopulated_pages(numpgs, pages); 4288c2ecf20Sopenharmony_ci if (rc != 0) { 4298c2ecf20Sopenharmony_ci pr_warn("%s Could not alloc %d pfns rc:%d\n", __func__, 4308c2ecf20Sopenharmony_ci numpgs, rc); 4318c2ecf20Sopenharmony_ci kfree(pages); 4328c2ecf20Sopenharmony_ci return -ENOMEM; 4338c2ecf20Sopenharmony_ci } 4348c2ecf20Sopenharmony_ci BUG_ON(vma->vm_private_data != NULL); 4358c2ecf20Sopenharmony_ci vma->vm_private_data = pages; 4368c2ecf20Sopenharmony_ci 4378c2ecf20Sopenharmony_ci return 0; 4388c2ecf20Sopenharmony_ci} 4398c2ecf20Sopenharmony_ci 4408c2ecf20Sopenharmony_cistatic const struct vm_operations_struct privcmd_vm_ops; 4418c2ecf20Sopenharmony_ci 4428c2ecf20Sopenharmony_cistatic long privcmd_ioctl_mmap_batch( 4438c2ecf20Sopenharmony_ci struct file *file, void __user *udata, int version) 4448c2ecf20Sopenharmony_ci{ 4458c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 4468c2ecf20Sopenharmony_ci int ret; 4478c2ecf20Sopenharmony_ci struct privcmd_mmapbatch_v2 m; 4488c2ecf20Sopenharmony_ci struct mm_struct *mm = current->mm; 4498c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 4508c2ecf20Sopenharmony_ci unsigned long nr_pages; 4518c2ecf20Sopenharmony_ci LIST_HEAD(pagelist); 4528c2ecf20Sopenharmony_ci struct mmap_batch_state state; 4538c2ecf20Sopenharmony_ci 4548c2ecf20Sopenharmony_ci switch (version) { 4558c2ecf20Sopenharmony_ci case 1: 4568c2ecf20Sopenharmony_ci if (copy_from_user(&m, udata, sizeof(struct privcmd_mmapbatch))) 4578c2ecf20Sopenharmony_ci return -EFAULT; 4588c2ecf20Sopenharmony_ci /* Returns per-frame error in m.arr. */ 4598c2ecf20Sopenharmony_ci m.err = NULL; 4608c2ecf20Sopenharmony_ci if (!access_ok(m.arr, m.num * sizeof(*m.arr))) 4618c2ecf20Sopenharmony_ci return -EFAULT; 4628c2ecf20Sopenharmony_ci break; 4638c2ecf20Sopenharmony_ci case 2: 4648c2ecf20Sopenharmony_ci if (copy_from_user(&m, udata, sizeof(struct privcmd_mmapbatch_v2))) 4658c2ecf20Sopenharmony_ci return -EFAULT; 4668c2ecf20Sopenharmony_ci /* Returns per-frame error code in m.err. */ 4678c2ecf20Sopenharmony_ci if (!access_ok(m.err, m.num * (sizeof(*m.err)))) 4688c2ecf20Sopenharmony_ci return -EFAULT; 4698c2ecf20Sopenharmony_ci break; 4708c2ecf20Sopenharmony_ci default: 4718c2ecf20Sopenharmony_ci return -EINVAL; 4728c2ecf20Sopenharmony_ci } 4738c2ecf20Sopenharmony_ci 4748c2ecf20Sopenharmony_ci /* If restriction is in place, check the domid matches */ 4758c2ecf20Sopenharmony_ci if (data->domid != DOMID_INVALID && data->domid != m.dom) 4768c2ecf20Sopenharmony_ci return -EPERM; 4778c2ecf20Sopenharmony_ci 4788c2ecf20Sopenharmony_ci nr_pages = DIV_ROUND_UP(m.num, XEN_PFN_PER_PAGE); 4798c2ecf20Sopenharmony_ci if ((m.num <= 0) || (nr_pages > (LONG_MAX >> PAGE_SHIFT))) 4808c2ecf20Sopenharmony_ci return -EINVAL; 4818c2ecf20Sopenharmony_ci 4828c2ecf20Sopenharmony_ci ret = gather_array(&pagelist, m.num, sizeof(xen_pfn_t), m.arr); 4838c2ecf20Sopenharmony_ci 4848c2ecf20Sopenharmony_ci if (ret) 4858c2ecf20Sopenharmony_ci goto out; 4868c2ecf20Sopenharmony_ci if (list_empty(&pagelist)) { 4878c2ecf20Sopenharmony_ci ret = -EINVAL; 4888c2ecf20Sopenharmony_ci goto out; 4898c2ecf20Sopenharmony_ci } 4908c2ecf20Sopenharmony_ci 4918c2ecf20Sopenharmony_ci if (version == 2) { 4928c2ecf20Sopenharmony_ci /* Zero error array now to only copy back actual errors. */ 4938c2ecf20Sopenharmony_ci if (clear_user(m.err, sizeof(int) * m.num)) { 4948c2ecf20Sopenharmony_ci ret = -EFAULT; 4958c2ecf20Sopenharmony_ci goto out; 4968c2ecf20Sopenharmony_ci } 4978c2ecf20Sopenharmony_ci } 4988c2ecf20Sopenharmony_ci 4998c2ecf20Sopenharmony_ci mmap_write_lock(mm); 5008c2ecf20Sopenharmony_ci 5018c2ecf20Sopenharmony_ci vma = find_vma(mm, m.addr); 5028c2ecf20Sopenharmony_ci if (!vma || 5038c2ecf20Sopenharmony_ci vma->vm_ops != &privcmd_vm_ops) { 5048c2ecf20Sopenharmony_ci ret = -EINVAL; 5058c2ecf20Sopenharmony_ci goto out_unlock; 5068c2ecf20Sopenharmony_ci } 5078c2ecf20Sopenharmony_ci 5088c2ecf20Sopenharmony_ci /* 5098c2ecf20Sopenharmony_ci * Caller must either: 5108c2ecf20Sopenharmony_ci * 5118c2ecf20Sopenharmony_ci * Map the whole VMA range, which will also allocate all the 5128c2ecf20Sopenharmony_ci * pages required for the auto_translated_physmap case. 5138c2ecf20Sopenharmony_ci * 5148c2ecf20Sopenharmony_ci * Or 5158c2ecf20Sopenharmony_ci * 5168c2ecf20Sopenharmony_ci * Map unmapped holes left from a previous map attempt (e.g., 5178c2ecf20Sopenharmony_ci * because those foreign frames were previously paged out). 5188c2ecf20Sopenharmony_ci */ 5198c2ecf20Sopenharmony_ci if (vma->vm_private_data == NULL) { 5208c2ecf20Sopenharmony_ci if (m.addr != vma->vm_start || 5218c2ecf20Sopenharmony_ci m.addr + (nr_pages << PAGE_SHIFT) != vma->vm_end) { 5228c2ecf20Sopenharmony_ci ret = -EINVAL; 5238c2ecf20Sopenharmony_ci goto out_unlock; 5248c2ecf20Sopenharmony_ci } 5258c2ecf20Sopenharmony_ci if (xen_feature(XENFEAT_auto_translated_physmap)) { 5268c2ecf20Sopenharmony_ci ret = alloc_empty_pages(vma, nr_pages); 5278c2ecf20Sopenharmony_ci if (ret < 0) 5288c2ecf20Sopenharmony_ci goto out_unlock; 5298c2ecf20Sopenharmony_ci } else 5308c2ecf20Sopenharmony_ci vma->vm_private_data = PRIV_VMA_LOCKED; 5318c2ecf20Sopenharmony_ci } else { 5328c2ecf20Sopenharmony_ci if (m.addr < vma->vm_start || 5338c2ecf20Sopenharmony_ci m.addr + (nr_pages << PAGE_SHIFT) > vma->vm_end) { 5348c2ecf20Sopenharmony_ci ret = -EINVAL; 5358c2ecf20Sopenharmony_ci goto out_unlock; 5368c2ecf20Sopenharmony_ci } 5378c2ecf20Sopenharmony_ci if (privcmd_vma_range_is_mapped(vma, m.addr, nr_pages)) { 5388c2ecf20Sopenharmony_ci ret = -EINVAL; 5398c2ecf20Sopenharmony_ci goto out_unlock; 5408c2ecf20Sopenharmony_ci } 5418c2ecf20Sopenharmony_ci } 5428c2ecf20Sopenharmony_ci 5438c2ecf20Sopenharmony_ci state.domain = m.dom; 5448c2ecf20Sopenharmony_ci state.vma = vma; 5458c2ecf20Sopenharmony_ci state.va = m.addr; 5468c2ecf20Sopenharmony_ci state.index = 0; 5478c2ecf20Sopenharmony_ci state.global_error = 0; 5488c2ecf20Sopenharmony_ci state.version = version; 5498c2ecf20Sopenharmony_ci 5508c2ecf20Sopenharmony_ci BUILD_BUG_ON(((PAGE_SIZE / sizeof(xen_pfn_t)) % XEN_PFN_PER_PAGE) != 0); 5518c2ecf20Sopenharmony_ci /* mmap_batch_fn guarantees ret == 0 */ 5528c2ecf20Sopenharmony_ci BUG_ON(traverse_pages_block(m.num, sizeof(xen_pfn_t), 5538c2ecf20Sopenharmony_ci &pagelist, mmap_batch_fn, &state)); 5548c2ecf20Sopenharmony_ci 5558c2ecf20Sopenharmony_ci mmap_write_unlock(mm); 5568c2ecf20Sopenharmony_ci 5578c2ecf20Sopenharmony_ci if (state.global_error) { 5588c2ecf20Sopenharmony_ci /* Write back errors in second pass. */ 5598c2ecf20Sopenharmony_ci state.user_gfn = (xen_pfn_t *)m.arr; 5608c2ecf20Sopenharmony_ci state.user_err = m.err; 5618c2ecf20Sopenharmony_ci ret = traverse_pages_block(m.num, sizeof(xen_pfn_t), 5628c2ecf20Sopenharmony_ci &pagelist, mmap_return_errors, &state); 5638c2ecf20Sopenharmony_ci } else 5648c2ecf20Sopenharmony_ci ret = 0; 5658c2ecf20Sopenharmony_ci 5668c2ecf20Sopenharmony_ci /* If we have not had any EFAULT-like global errors then set the global 5678c2ecf20Sopenharmony_ci * error to -ENOENT if necessary. */ 5688c2ecf20Sopenharmony_ci if ((ret == 0) && (state.global_error == -ENOENT)) 5698c2ecf20Sopenharmony_ci ret = -ENOENT; 5708c2ecf20Sopenharmony_ci 5718c2ecf20Sopenharmony_ciout: 5728c2ecf20Sopenharmony_ci free_page_list(&pagelist); 5738c2ecf20Sopenharmony_ci return ret; 5748c2ecf20Sopenharmony_ci 5758c2ecf20Sopenharmony_ciout_unlock: 5768c2ecf20Sopenharmony_ci mmap_write_unlock(mm); 5778c2ecf20Sopenharmony_ci goto out; 5788c2ecf20Sopenharmony_ci} 5798c2ecf20Sopenharmony_ci 5808c2ecf20Sopenharmony_cistatic int lock_pages( 5818c2ecf20Sopenharmony_ci struct privcmd_dm_op_buf kbufs[], unsigned int num, 5828c2ecf20Sopenharmony_ci struct page *pages[], unsigned int nr_pages, unsigned int *pinned) 5838c2ecf20Sopenharmony_ci{ 5848c2ecf20Sopenharmony_ci unsigned int i, off = 0; 5858c2ecf20Sopenharmony_ci 5868c2ecf20Sopenharmony_ci for (i = 0; i < num; ) { 5878c2ecf20Sopenharmony_ci unsigned int requested; 5888c2ecf20Sopenharmony_ci int page_count; 5898c2ecf20Sopenharmony_ci 5908c2ecf20Sopenharmony_ci requested = DIV_ROUND_UP( 5918c2ecf20Sopenharmony_ci offset_in_page(kbufs[i].uptr) + kbufs[i].size, 5928c2ecf20Sopenharmony_ci PAGE_SIZE) - off; 5938c2ecf20Sopenharmony_ci if (requested > nr_pages) 5948c2ecf20Sopenharmony_ci return -ENOSPC; 5958c2ecf20Sopenharmony_ci 5968c2ecf20Sopenharmony_ci page_count = pin_user_pages_fast( 5978c2ecf20Sopenharmony_ci (unsigned long)kbufs[i].uptr + off * PAGE_SIZE, 5988c2ecf20Sopenharmony_ci requested, FOLL_WRITE, pages); 5998c2ecf20Sopenharmony_ci if (page_count <= 0) 6008c2ecf20Sopenharmony_ci return page_count ? : -EFAULT; 6018c2ecf20Sopenharmony_ci 6028c2ecf20Sopenharmony_ci *pinned += page_count; 6038c2ecf20Sopenharmony_ci nr_pages -= page_count; 6048c2ecf20Sopenharmony_ci pages += page_count; 6058c2ecf20Sopenharmony_ci 6068c2ecf20Sopenharmony_ci off = (requested == page_count) ? 0 : off + page_count; 6078c2ecf20Sopenharmony_ci i += !off; 6088c2ecf20Sopenharmony_ci } 6098c2ecf20Sopenharmony_ci 6108c2ecf20Sopenharmony_ci return 0; 6118c2ecf20Sopenharmony_ci} 6128c2ecf20Sopenharmony_ci 6138c2ecf20Sopenharmony_cistatic void unlock_pages(struct page *pages[], unsigned int nr_pages) 6148c2ecf20Sopenharmony_ci{ 6158c2ecf20Sopenharmony_ci unpin_user_pages_dirty_lock(pages, nr_pages, true); 6168c2ecf20Sopenharmony_ci} 6178c2ecf20Sopenharmony_ci 6188c2ecf20Sopenharmony_cistatic long privcmd_ioctl_dm_op(struct file *file, void __user *udata) 6198c2ecf20Sopenharmony_ci{ 6208c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 6218c2ecf20Sopenharmony_ci struct privcmd_dm_op kdata; 6228c2ecf20Sopenharmony_ci struct privcmd_dm_op_buf *kbufs; 6238c2ecf20Sopenharmony_ci unsigned int nr_pages = 0; 6248c2ecf20Sopenharmony_ci struct page **pages = NULL; 6258c2ecf20Sopenharmony_ci struct xen_dm_op_buf *xbufs = NULL; 6268c2ecf20Sopenharmony_ci unsigned int i; 6278c2ecf20Sopenharmony_ci long rc; 6288c2ecf20Sopenharmony_ci unsigned int pinned = 0; 6298c2ecf20Sopenharmony_ci 6308c2ecf20Sopenharmony_ci if (copy_from_user(&kdata, udata, sizeof(kdata))) 6318c2ecf20Sopenharmony_ci return -EFAULT; 6328c2ecf20Sopenharmony_ci 6338c2ecf20Sopenharmony_ci /* If restriction is in place, check the domid matches */ 6348c2ecf20Sopenharmony_ci if (data->domid != DOMID_INVALID && data->domid != kdata.dom) 6358c2ecf20Sopenharmony_ci return -EPERM; 6368c2ecf20Sopenharmony_ci 6378c2ecf20Sopenharmony_ci if (kdata.num == 0) 6388c2ecf20Sopenharmony_ci return 0; 6398c2ecf20Sopenharmony_ci 6408c2ecf20Sopenharmony_ci if (kdata.num > privcmd_dm_op_max_num) 6418c2ecf20Sopenharmony_ci return -E2BIG; 6428c2ecf20Sopenharmony_ci 6438c2ecf20Sopenharmony_ci kbufs = kcalloc(kdata.num, sizeof(*kbufs), GFP_KERNEL); 6448c2ecf20Sopenharmony_ci if (!kbufs) 6458c2ecf20Sopenharmony_ci return -ENOMEM; 6468c2ecf20Sopenharmony_ci 6478c2ecf20Sopenharmony_ci if (copy_from_user(kbufs, kdata.ubufs, 6488c2ecf20Sopenharmony_ci sizeof(*kbufs) * kdata.num)) { 6498c2ecf20Sopenharmony_ci rc = -EFAULT; 6508c2ecf20Sopenharmony_ci goto out; 6518c2ecf20Sopenharmony_ci } 6528c2ecf20Sopenharmony_ci 6538c2ecf20Sopenharmony_ci for (i = 0; i < kdata.num; i++) { 6548c2ecf20Sopenharmony_ci if (kbufs[i].size > privcmd_dm_op_buf_max_size) { 6558c2ecf20Sopenharmony_ci rc = -E2BIG; 6568c2ecf20Sopenharmony_ci goto out; 6578c2ecf20Sopenharmony_ci } 6588c2ecf20Sopenharmony_ci 6598c2ecf20Sopenharmony_ci if (!access_ok(kbufs[i].uptr, 6608c2ecf20Sopenharmony_ci kbufs[i].size)) { 6618c2ecf20Sopenharmony_ci rc = -EFAULT; 6628c2ecf20Sopenharmony_ci goto out; 6638c2ecf20Sopenharmony_ci } 6648c2ecf20Sopenharmony_ci 6658c2ecf20Sopenharmony_ci nr_pages += DIV_ROUND_UP( 6668c2ecf20Sopenharmony_ci offset_in_page(kbufs[i].uptr) + kbufs[i].size, 6678c2ecf20Sopenharmony_ci PAGE_SIZE); 6688c2ecf20Sopenharmony_ci } 6698c2ecf20Sopenharmony_ci 6708c2ecf20Sopenharmony_ci pages = kcalloc(nr_pages, sizeof(*pages), GFP_KERNEL); 6718c2ecf20Sopenharmony_ci if (!pages) { 6728c2ecf20Sopenharmony_ci rc = -ENOMEM; 6738c2ecf20Sopenharmony_ci goto out; 6748c2ecf20Sopenharmony_ci } 6758c2ecf20Sopenharmony_ci 6768c2ecf20Sopenharmony_ci xbufs = kcalloc(kdata.num, sizeof(*xbufs), GFP_KERNEL); 6778c2ecf20Sopenharmony_ci if (!xbufs) { 6788c2ecf20Sopenharmony_ci rc = -ENOMEM; 6798c2ecf20Sopenharmony_ci goto out; 6808c2ecf20Sopenharmony_ci } 6818c2ecf20Sopenharmony_ci 6828c2ecf20Sopenharmony_ci rc = lock_pages(kbufs, kdata.num, pages, nr_pages, &pinned); 6838c2ecf20Sopenharmony_ci if (rc < 0) 6848c2ecf20Sopenharmony_ci goto out; 6858c2ecf20Sopenharmony_ci 6868c2ecf20Sopenharmony_ci for (i = 0; i < kdata.num; i++) { 6878c2ecf20Sopenharmony_ci set_xen_guest_handle(xbufs[i].h, kbufs[i].uptr); 6888c2ecf20Sopenharmony_ci xbufs[i].size = kbufs[i].size; 6898c2ecf20Sopenharmony_ci } 6908c2ecf20Sopenharmony_ci 6918c2ecf20Sopenharmony_ci xen_preemptible_hcall_begin(); 6928c2ecf20Sopenharmony_ci rc = HYPERVISOR_dm_op(kdata.dom, kdata.num, xbufs); 6938c2ecf20Sopenharmony_ci xen_preemptible_hcall_end(); 6948c2ecf20Sopenharmony_ci 6958c2ecf20Sopenharmony_ciout: 6968c2ecf20Sopenharmony_ci unlock_pages(pages, pinned); 6978c2ecf20Sopenharmony_ci kfree(xbufs); 6988c2ecf20Sopenharmony_ci kfree(pages); 6998c2ecf20Sopenharmony_ci kfree(kbufs); 7008c2ecf20Sopenharmony_ci 7018c2ecf20Sopenharmony_ci return rc; 7028c2ecf20Sopenharmony_ci} 7038c2ecf20Sopenharmony_ci 7048c2ecf20Sopenharmony_cistatic long privcmd_ioctl_restrict(struct file *file, void __user *udata) 7058c2ecf20Sopenharmony_ci{ 7068c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 7078c2ecf20Sopenharmony_ci domid_t dom; 7088c2ecf20Sopenharmony_ci 7098c2ecf20Sopenharmony_ci if (copy_from_user(&dom, udata, sizeof(dom))) 7108c2ecf20Sopenharmony_ci return -EFAULT; 7118c2ecf20Sopenharmony_ci 7128c2ecf20Sopenharmony_ci /* Set restriction to the specified domain, or check it matches */ 7138c2ecf20Sopenharmony_ci if (data->domid == DOMID_INVALID) 7148c2ecf20Sopenharmony_ci data->domid = dom; 7158c2ecf20Sopenharmony_ci else if (data->domid != dom) 7168c2ecf20Sopenharmony_ci return -EINVAL; 7178c2ecf20Sopenharmony_ci 7188c2ecf20Sopenharmony_ci return 0; 7198c2ecf20Sopenharmony_ci} 7208c2ecf20Sopenharmony_ci 7218c2ecf20Sopenharmony_cistatic long privcmd_ioctl_mmap_resource(struct file *file, 7228c2ecf20Sopenharmony_ci struct privcmd_mmap_resource __user *udata) 7238c2ecf20Sopenharmony_ci{ 7248c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 7258c2ecf20Sopenharmony_ci struct mm_struct *mm = current->mm; 7268c2ecf20Sopenharmony_ci struct vm_area_struct *vma; 7278c2ecf20Sopenharmony_ci struct privcmd_mmap_resource kdata; 7288c2ecf20Sopenharmony_ci xen_pfn_t *pfns = NULL; 7298c2ecf20Sopenharmony_ci struct xen_mem_acquire_resource xdata = { }; 7308c2ecf20Sopenharmony_ci int rc; 7318c2ecf20Sopenharmony_ci 7328c2ecf20Sopenharmony_ci if (copy_from_user(&kdata, udata, sizeof(kdata))) 7338c2ecf20Sopenharmony_ci return -EFAULT; 7348c2ecf20Sopenharmony_ci 7358c2ecf20Sopenharmony_ci /* If restriction is in place, check the domid matches */ 7368c2ecf20Sopenharmony_ci if (data->domid != DOMID_INVALID && data->domid != kdata.dom) 7378c2ecf20Sopenharmony_ci return -EPERM; 7388c2ecf20Sopenharmony_ci 7398c2ecf20Sopenharmony_ci /* Both fields must be set or unset */ 7408c2ecf20Sopenharmony_ci if (!!kdata.addr != !!kdata.num) 7418c2ecf20Sopenharmony_ci return -EINVAL; 7428c2ecf20Sopenharmony_ci 7438c2ecf20Sopenharmony_ci xdata.domid = kdata.dom; 7448c2ecf20Sopenharmony_ci xdata.type = kdata.type; 7458c2ecf20Sopenharmony_ci xdata.id = kdata.id; 7468c2ecf20Sopenharmony_ci 7478c2ecf20Sopenharmony_ci if (!kdata.addr && !kdata.num) { 7488c2ecf20Sopenharmony_ci /* Query the size of the resource. */ 7498c2ecf20Sopenharmony_ci rc = HYPERVISOR_memory_op(XENMEM_acquire_resource, &xdata); 7508c2ecf20Sopenharmony_ci if (rc) 7518c2ecf20Sopenharmony_ci return rc; 7528c2ecf20Sopenharmony_ci return __put_user(xdata.nr_frames, &udata->num); 7538c2ecf20Sopenharmony_ci } 7548c2ecf20Sopenharmony_ci 7558c2ecf20Sopenharmony_ci mmap_write_lock(mm); 7568c2ecf20Sopenharmony_ci 7578c2ecf20Sopenharmony_ci vma = find_vma(mm, kdata.addr); 7588c2ecf20Sopenharmony_ci if (!vma || vma->vm_ops != &privcmd_vm_ops) { 7598c2ecf20Sopenharmony_ci rc = -EINVAL; 7608c2ecf20Sopenharmony_ci goto out; 7618c2ecf20Sopenharmony_ci } 7628c2ecf20Sopenharmony_ci 7638c2ecf20Sopenharmony_ci pfns = kcalloc(kdata.num, sizeof(*pfns), GFP_KERNEL | __GFP_NOWARN); 7648c2ecf20Sopenharmony_ci if (!pfns) { 7658c2ecf20Sopenharmony_ci rc = -ENOMEM; 7668c2ecf20Sopenharmony_ci goto out; 7678c2ecf20Sopenharmony_ci } 7688c2ecf20Sopenharmony_ci 7698c2ecf20Sopenharmony_ci if (IS_ENABLED(CONFIG_XEN_AUTO_XLATE) && 7708c2ecf20Sopenharmony_ci xen_feature(XENFEAT_auto_translated_physmap)) { 7718c2ecf20Sopenharmony_ci unsigned int nr = DIV_ROUND_UP(kdata.num, XEN_PFN_PER_PAGE); 7728c2ecf20Sopenharmony_ci struct page **pages; 7738c2ecf20Sopenharmony_ci unsigned int i; 7748c2ecf20Sopenharmony_ci 7758c2ecf20Sopenharmony_ci rc = alloc_empty_pages(vma, nr); 7768c2ecf20Sopenharmony_ci if (rc < 0) 7778c2ecf20Sopenharmony_ci goto out; 7788c2ecf20Sopenharmony_ci 7798c2ecf20Sopenharmony_ci pages = vma->vm_private_data; 7808c2ecf20Sopenharmony_ci for (i = 0; i < kdata.num; i++) { 7818c2ecf20Sopenharmony_ci xen_pfn_t pfn = 7828c2ecf20Sopenharmony_ci page_to_xen_pfn(pages[i / XEN_PFN_PER_PAGE]); 7838c2ecf20Sopenharmony_ci 7848c2ecf20Sopenharmony_ci pfns[i] = pfn + (i % XEN_PFN_PER_PAGE); 7858c2ecf20Sopenharmony_ci } 7868c2ecf20Sopenharmony_ci } else 7878c2ecf20Sopenharmony_ci vma->vm_private_data = PRIV_VMA_LOCKED; 7888c2ecf20Sopenharmony_ci 7898c2ecf20Sopenharmony_ci xdata.frame = kdata.idx; 7908c2ecf20Sopenharmony_ci xdata.nr_frames = kdata.num; 7918c2ecf20Sopenharmony_ci set_xen_guest_handle(xdata.frame_list, pfns); 7928c2ecf20Sopenharmony_ci 7938c2ecf20Sopenharmony_ci xen_preemptible_hcall_begin(); 7948c2ecf20Sopenharmony_ci rc = HYPERVISOR_memory_op(XENMEM_acquire_resource, &xdata); 7958c2ecf20Sopenharmony_ci xen_preemptible_hcall_end(); 7968c2ecf20Sopenharmony_ci 7978c2ecf20Sopenharmony_ci if (rc) 7988c2ecf20Sopenharmony_ci goto out; 7998c2ecf20Sopenharmony_ci 8008c2ecf20Sopenharmony_ci if (IS_ENABLED(CONFIG_XEN_AUTO_XLATE) && 8018c2ecf20Sopenharmony_ci xen_feature(XENFEAT_auto_translated_physmap)) { 8028c2ecf20Sopenharmony_ci rc = xen_remap_vma_range(vma, kdata.addr, kdata.num << PAGE_SHIFT); 8038c2ecf20Sopenharmony_ci } else { 8048c2ecf20Sopenharmony_ci unsigned int domid = 8058c2ecf20Sopenharmony_ci (xdata.flags & XENMEM_rsrc_acq_caller_owned) ? 8068c2ecf20Sopenharmony_ci DOMID_SELF : kdata.dom; 8078c2ecf20Sopenharmony_ci int num, *errs = (int *)pfns; 8088c2ecf20Sopenharmony_ci 8098c2ecf20Sopenharmony_ci BUILD_BUG_ON(sizeof(*errs) > sizeof(*pfns)); 8108c2ecf20Sopenharmony_ci num = xen_remap_domain_mfn_array(vma, 8118c2ecf20Sopenharmony_ci kdata.addr & PAGE_MASK, 8128c2ecf20Sopenharmony_ci pfns, kdata.num, errs, 8138c2ecf20Sopenharmony_ci vma->vm_page_prot, 8148c2ecf20Sopenharmony_ci domid, 8158c2ecf20Sopenharmony_ci vma->vm_private_data); 8168c2ecf20Sopenharmony_ci if (num < 0) 8178c2ecf20Sopenharmony_ci rc = num; 8188c2ecf20Sopenharmony_ci else if (num != kdata.num) { 8198c2ecf20Sopenharmony_ci unsigned int i; 8208c2ecf20Sopenharmony_ci 8218c2ecf20Sopenharmony_ci for (i = 0; i < num; i++) { 8228c2ecf20Sopenharmony_ci rc = errs[i]; 8238c2ecf20Sopenharmony_ci if (rc < 0) 8248c2ecf20Sopenharmony_ci break; 8258c2ecf20Sopenharmony_ci } 8268c2ecf20Sopenharmony_ci } else 8278c2ecf20Sopenharmony_ci rc = 0; 8288c2ecf20Sopenharmony_ci } 8298c2ecf20Sopenharmony_ci 8308c2ecf20Sopenharmony_ciout: 8318c2ecf20Sopenharmony_ci mmap_write_unlock(mm); 8328c2ecf20Sopenharmony_ci kfree(pfns); 8338c2ecf20Sopenharmony_ci 8348c2ecf20Sopenharmony_ci return rc; 8358c2ecf20Sopenharmony_ci} 8368c2ecf20Sopenharmony_ci 8378c2ecf20Sopenharmony_cistatic long privcmd_ioctl(struct file *file, 8388c2ecf20Sopenharmony_ci unsigned int cmd, unsigned long data) 8398c2ecf20Sopenharmony_ci{ 8408c2ecf20Sopenharmony_ci int ret = -ENOTTY; 8418c2ecf20Sopenharmony_ci void __user *udata = (void __user *) data; 8428c2ecf20Sopenharmony_ci 8438c2ecf20Sopenharmony_ci switch (cmd) { 8448c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_HYPERCALL: 8458c2ecf20Sopenharmony_ci ret = privcmd_ioctl_hypercall(file, udata); 8468c2ecf20Sopenharmony_ci break; 8478c2ecf20Sopenharmony_ci 8488c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_MMAP: 8498c2ecf20Sopenharmony_ci ret = privcmd_ioctl_mmap(file, udata); 8508c2ecf20Sopenharmony_ci break; 8518c2ecf20Sopenharmony_ci 8528c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_MMAPBATCH: 8538c2ecf20Sopenharmony_ci ret = privcmd_ioctl_mmap_batch(file, udata, 1); 8548c2ecf20Sopenharmony_ci break; 8558c2ecf20Sopenharmony_ci 8568c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_MMAPBATCH_V2: 8578c2ecf20Sopenharmony_ci ret = privcmd_ioctl_mmap_batch(file, udata, 2); 8588c2ecf20Sopenharmony_ci break; 8598c2ecf20Sopenharmony_ci 8608c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_DM_OP: 8618c2ecf20Sopenharmony_ci ret = privcmd_ioctl_dm_op(file, udata); 8628c2ecf20Sopenharmony_ci break; 8638c2ecf20Sopenharmony_ci 8648c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_RESTRICT: 8658c2ecf20Sopenharmony_ci ret = privcmd_ioctl_restrict(file, udata); 8668c2ecf20Sopenharmony_ci break; 8678c2ecf20Sopenharmony_ci 8688c2ecf20Sopenharmony_ci case IOCTL_PRIVCMD_MMAP_RESOURCE: 8698c2ecf20Sopenharmony_ci ret = privcmd_ioctl_mmap_resource(file, udata); 8708c2ecf20Sopenharmony_ci break; 8718c2ecf20Sopenharmony_ci 8728c2ecf20Sopenharmony_ci default: 8738c2ecf20Sopenharmony_ci break; 8748c2ecf20Sopenharmony_ci } 8758c2ecf20Sopenharmony_ci 8768c2ecf20Sopenharmony_ci return ret; 8778c2ecf20Sopenharmony_ci} 8788c2ecf20Sopenharmony_ci 8798c2ecf20Sopenharmony_cistatic int privcmd_open(struct inode *ino, struct file *file) 8808c2ecf20Sopenharmony_ci{ 8818c2ecf20Sopenharmony_ci struct privcmd_data *data = kzalloc(sizeof(*data), GFP_KERNEL); 8828c2ecf20Sopenharmony_ci 8838c2ecf20Sopenharmony_ci if (!data) 8848c2ecf20Sopenharmony_ci return -ENOMEM; 8858c2ecf20Sopenharmony_ci 8868c2ecf20Sopenharmony_ci /* DOMID_INVALID implies no restriction */ 8878c2ecf20Sopenharmony_ci data->domid = DOMID_INVALID; 8888c2ecf20Sopenharmony_ci 8898c2ecf20Sopenharmony_ci file->private_data = data; 8908c2ecf20Sopenharmony_ci return 0; 8918c2ecf20Sopenharmony_ci} 8928c2ecf20Sopenharmony_ci 8938c2ecf20Sopenharmony_cistatic int privcmd_release(struct inode *ino, struct file *file) 8948c2ecf20Sopenharmony_ci{ 8958c2ecf20Sopenharmony_ci struct privcmd_data *data = file->private_data; 8968c2ecf20Sopenharmony_ci 8978c2ecf20Sopenharmony_ci kfree(data); 8988c2ecf20Sopenharmony_ci return 0; 8998c2ecf20Sopenharmony_ci} 9008c2ecf20Sopenharmony_ci 9018c2ecf20Sopenharmony_cistatic void privcmd_close(struct vm_area_struct *vma) 9028c2ecf20Sopenharmony_ci{ 9038c2ecf20Sopenharmony_ci struct page **pages = vma->vm_private_data; 9048c2ecf20Sopenharmony_ci int numpgs = vma_pages(vma); 9058c2ecf20Sopenharmony_ci int numgfns = (vma->vm_end - vma->vm_start) >> XEN_PAGE_SHIFT; 9068c2ecf20Sopenharmony_ci int rc; 9078c2ecf20Sopenharmony_ci 9088c2ecf20Sopenharmony_ci if (!xen_feature(XENFEAT_auto_translated_physmap) || !numpgs || !pages) 9098c2ecf20Sopenharmony_ci return; 9108c2ecf20Sopenharmony_ci 9118c2ecf20Sopenharmony_ci rc = xen_unmap_domain_gfn_range(vma, numgfns, pages); 9128c2ecf20Sopenharmony_ci if (rc == 0) 9138c2ecf20Sopenharmony_ci xen_free_unpopulated_pages(numpgs, pages); 9148c2ecf20Sopenharmony_ci else 9158c2ecf20Sopenharmony_ci pr_crit("unable to unmap MFN range: leaking %d pages. rc=%d\n", 9168c2ecf20Sopenharmony_ci numpgs, rc); 9178c2ecf20Sopenharmony_ci kfree(pages); 9188c2ecf20Sopenharmony_ci} 9198c2ecf20Sopenharmony_ci 9208c2ecf20Sopenharmony_cistatic vm_fault_t privcmd_fault(struct vm_fault *vmf) 9218c2ecf20Sopenharmony_ci{ 9228c2ecf20Sopenharmony_ci printk(KERN_DEBUG "privcmd_fault: vma=%p %lx-%lx, pgoff=%lx, uv=%p\n", 9238c2ecf20Sopenharmony_ci vmf->vma, vmf->vma->vm_start, vmf->vma->vm_end, 9248c2ecf20Sopenharmony_ci vmf->pgoff, (void *)vmf->address); 9258c2ecf20Sopenharmony_ci 9268c2ecf20Sopenharmony_ci return VM_FAULT_SIGBUS; 9278c2ecf20Sopenharmony_ci} 9288c2ecf20Sopenharmony_ci 9298c2ecf20Sopenharmony_cistatic const struct vm_operations_struct privcmd_vm_ops = { 9308c2ecf20Sopenharmony_ci .close = privcmd_close, 9318c2ecf20Sopenharmony_ci .fault = privcmd_fault 9328c2ecf20Sopenharmony_ci}; 9338c2ecf20Sopenharmony_ci 9348c2ecf20Sopenharmony_cistatic int privcmd_mmap(struct file *file, struct vm_area_struct *vma) 9358c2ecf20Sopenharmony_ci{ 9368c2ecf20Sopenharmony_ci /* DONTCOPY is essential for Xen because copy_page_range doesn't know 9378c2ecf20Sopenharmony_ci * how to recreate these mappings */ 9388c2ecf20Sopenharmony_ci vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTCOPY | 9398c2ecf20Sopenharmony_ci VM_DONTEXPAND | VM_DONTDUMP; 9408c2ecf20Sopenharmony_ci vma->vm_ops = &privcmd_vm_ops; 9418c2ecf20Sopenharmony_ci vma->vm_private_data = NULL; 9428c2ecf20Sopenharmony_ci 9438c2ecf20Sopenharmony_ci return 0; 9448c2ecf20Sopenharmony_ci} 9458c2ecf20Sopenharmony_ci 9468c2ecf20Sopenharmony_ci/* 9478c2ecf20Sopenharmony_ci * For MMAPBATCH*. This allows asserting the singleshot mapping 9488c2ecf20Sopenharmony_ci * on a per pfn/pte basis. Mapping calls that fail with ENOENT 9498c2ecf20Sopenharmony_ci * can be then retried until success. 9508c2ecf20Sopenharmony_ci */ 9518c2ecf20Sopenharmony_cistatic int is_mapped_fn(pte_t *pte, unsigned long addr, void *data) 9528c2ecf20Sopenharmony_ci{ 9538c2ecf20Sopenharmony_ci return pte_none(*pte) ? 0 : -EBUSY; 9548c2ecf20Sopenharmony_ci} 9558c2ecf20Sopenharmony_ci 9568c2ecf20Sopenharmony_cistatic int privcmd_vma_range_is_mapped( 9578c2ecf20Sopenharmony_ci struct vm_area_struct *vma, 9588c2ecf20Sopenharmony_ci unsigned long addr, 9598c2ecf20Sopenharmony_ci unsigned long nr_pages) 9608c2ecf20Sopenharmony_ci{ 9618c2ecf20Sopenharmony_ci return apply_to_page_range(vma->vm_mm, addr, nr_pages << PAGE_SHIFT, 9628c2ecf20Sopenharmony_ci is_mapped_fn, NULL) != 0; 9638c2ecf20Sopenharmony_ci} 9648c2ecf20Sopenharmony_ci 9658c2ecf20Sopenharmony_ciconst struct file_operations xen_privcmd_fops = { 9668c2ecf20Sopenharmony_ci .owner = THIS_MODULE, 9678c2ecf20Sopenharmony_ci .unlocked_ioctl = privcmd_ioctl, 9688c2ecf20Sopenharmony_ci .open = privcmd_open, 9698c2ecf20Sopenharmony_ci .release = privcmd_release, 9708c2ecf20Sopenharmony_ci .mmap = privcmd_mmap, 9718c2ecf20Sopenharmony_ci}; 9728c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(xen_privcmd_fops); 9738c2ecf20Sopenharmony_ci 9748c2ecf20Sopenharmony_cistatic struct miscdevice privcmd_dev = { 9758c2ecf20Sopenharmony_ci .minor = MISC_DYNAMIC_MINOR, 9768c2ecf20Sopenharmony_ci .name = "xen/privcmd", 9778c2ecf20Sopenharmony_ci .fops = &xen_privcmd_fops, 9788c2ecf20Sopenharmony_ci}; 9798c2ecf20Sopenharmony_ci 9808c2ecf20Sopenharmony_cistatic int __init privcmd_init(void) 9818c2ecf20Sopenharmony_ci{ 9828c2ecf20Sopenharmony_ci int err; 9838c2ecf20Sopenharmony_ci 9848c2ecf20Sopenharmony_ci if (!xen_domain()) 9858c2ecf20Sopenharmony_ci return -ENODEV; 9868c2ecf20Sopenharmony_ci 9878c2ecf20Sopenharmony_ci err = misc_register(&privcmd_dev); 9888c2ecf20Sopenharmony_ci if (err != 0) { 9898c2ecf20Sopenharmony_ci pr_err("Could not register Xen privcmd device\n"); 9908c2ecf20Sopenharmony_ci return err; 9918c2ecf20Sopenharmony_ci } 9928c2ecf20Sopenharmony_ci 9938c2ecf20Sopenharmony_ci err = misc_register(&xen_privcmdbuf_dev); 9948c2ecf20Sopenharmony_ci if (err != 0) { 9958c2ecf20Sopenharmony_ci pr_err("Could not register Xen hypercall-buf device\n"); 9968c2ecf20Sopenharmony_ci misc_deregister(&privcmd_dev); 9978c2ecf20Sopenharmony_ci return err; 9988c2ecf20Sopenharmony_ci } 9998c2ecf20Sopenharmony_ci 10008c2ecf20Sopenharmony_ci return 0; 10018c2ecf20Sopenharmony_ci} 10028c2ecf20Sopenharmony_ci 10038c2ecf20Sopenharmony_cistatic void __exit privcmd_exit(void) 10048c2ecf20Sopenharmony_ci{ 10058c2ecf20Sopenharmony_ci misc_deregister(&privcmd_dev); 10068c2ecf20Sopenharmony_ci misc_deregister(&xen_privcmdbuf_dev); 10078c2ecf20Sopenharmony_ci} 10088c2ecf20Sopenharmony_ci 10098c2ecf20Sopenharmony_cimodule_init(privcmd_init); 10108c2ecf20Sopenharmony_cimodule_exit(privcmd_exit); 1011