2019-06-04 10:11:33 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* linux/arch/arm/mm/fault.c
|
|
|
|
*
|
|
|
|
* Copyright (C) 1995 Linus Torvalds
|
|
|
|
* Modifications for ARM processor (c) 1995-2004 Russell King
|
|
|
|
*/
|
2016-07-23 14:01:45 -04:00
|
|
|
#include <linux/extable.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include <linux/signal.h>
|
|
|
|
#include <linux/mm.h>
|
2008-12-14 18:01:44 +00:00
|
|
|
#include <linux/hardirq.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include <linux/init.h>
|
2007-12-03 15:21:57 -05:00
|
|
|
#include <linux/kprobes.h>
|
2008-09-06 11:35:55 +01:00
|
|
|
#include <linux/uaccess.h>
|
2008-09-11 11:52:02 -04:00
|
|
|
#include <linux/page-flags.h>
|
2017-02-08 18:51:30 +01:00
|
|
|
#include <linux/sched/signal.h>
|
2017-02-08 18:51:35 +01:00
|
|
|
#include <linux/sched/debug.h>
|
2009-08-17 20:02:06 +01:00
|
|
|
#include <linux/highmem.h>
|
2010-02-02 20:24:58 +01:00
|
|
|
#include <linux/perf_event.h>
|
2021-12-03 10:26:33 +01:00
|
|
|
#include <linux/kfence.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2012-03-28 18:30:01 +01:00
|
|
|
#include <asm/system_misc.h>
|
|
|
|
#include <asm/system_info.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include <asm/tlbflush.h>
|
|
|
|
|
|
|
|
#include "fault.h"
|
|
|
|
|
2024-02-01 18:32:58 +01:00
|
|
|
bool copy_from_kernel_nofault_allowed(const void *unsafe_src, size_t size)
|
|
|
|
{
|
|
|
|
unsigned long addr = (unsigned long)unsafe_src;
|
|
|
|
|
|
|
|
return addr >= TASK_SIZE && ULONG_MAX - addr >= size;
|
|
|
|
}
|
|
|
|
|
2009-07-24 12:34:55 +01:00
|
|
|
#ifdef CONFIG_MMU
|
2007-12-03 15:21:57 -05:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* This is useful to dump out the page tables associated with
|
|
|
|
* 'addr' in mm 'mm'.
|
|
|
|
*/
|
2019-01-29 15:44:38 +00:00
|
|
|
void show_pte(const char *lvl, struct mm_struct *mm, unsigned long addr)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
pgd_t *pgd;
|
|
|
|
|
|
|
|
if (!mm)
|
|
|
|
mm = &init_mm;
|
|
|
|
|
|
|
|
pgd = pgd_offset(mm, addr);
|
2019-01-29 15:44:38 +00:00
|
|
|
printk("%s[%08lx] *pgd=%08llx", lvl, addr, (long long)pgd_val(*pgd));
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
do {
|
2020-06-04 16:46:19 -07:00
|
|
|
p4d_t *p4d;
|
2010-11-21 16:27:49 +00:00
|
|
|
pud_t *pud;
|
2005-04-16 15:20:36 -07:00
|
|
|
pmd_t *pmd;
|
|
|
|
pte_t *pte;
|
|
|
|
|
2020-06-04 16:46:19 -07:00
|
|
|
p4d = p4d_offset(pgd, addr);
|
|
|
|
if (p4d_none(*p4d))
|
2005-04-16 15:20:36 -07:00
|
|
|
break;
|
|
|
|
|
2020-06-04 16:46:19 -07:00
|
|
|
if (p4d_bad(*p4d)) {
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont("(bad)");
|
2005-04-16 15:20:36 -07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-06-04 16:46:19 -07:00
|
|
|
pud = pud_offset(p4d, addr);
|
2010-11-21 16:27:49 +00:00
|
|
|
if (PTRS_PER_PUD != 1)
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont(", *pud=%08llx", (long long)pud_val(*pud));
|
2010-11-21 16:27:49 +00:00
|
|
|
|
|
|
|
if (pud_none(*pud))
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (pud_bad(*pud)) {
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont("(bad)");
|
2010-11-21 16:27:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
pmd = pmd_offset(pud, addr);
|
2008-09-30 16:10:11 +01:00
|
|
|
if (PTRS_PER_PMD != 1)
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont(", *pmd=%08llx", (long long)pmd_val(*pmd));
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (pmd_none(*pmd))
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (pmd_bad(*pmd)) {
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont("(bad)");
|
2005-04-16 15:20:36 -07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We must not map this if we have highmem enabled */
|
2008-09-11 11:52:02 -04:00
|
|
|
if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT)))
|
|
|
|
break;
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
pte = pte_offset_map(pmd, addr);
|
arm: allow pte_offset_map[_lock]() to fail
Patch series "arch: allow pte_offset_map[_lock]() to fail", v2.
What is it all about? Some mmap_lock avoidance i.e. latency reduction.
Initially just for the case of collapsing shmem or file pages to THPs; but
likely to be relied upon later in other contexts e.g. freeing of empty
page tables (but that's not work I'm doing). mmap_write_lock avoidance
when collapsing to anon THPs? Perhaps, but again that's not work I've
done: a quick attempt was not as easy as the shmem/file case.
I would much prefer not to have to make these small but wide-ranging
changes for such a niche case; but failed to find another way, and have
heard that shmem MADV_COLLAPSE's usefulness is being limited by that
mmap_write_lock it currently requires.
These changes (though of course not these exact patches, and not all of
these architectures!) have been in Google's data centre kernel for three
years now: we do rely upon them.
What are the per-arch changes about? Generally, two things.
One: the current mmap locking may not be enough to guard against that
tricky transition between pmd entry pointing to page table, and empty pmd
entry, and pmd entry pointing to huge page: pte_offset_map() will have to
validate the pmd entry for itself, returning NULL if no page table is
there. What to do about that varies: often the nearby error handling
indicates just to skip it; but in some cases a "goto again" looks
appropriate (and if that risks an infinite loop, then there must have been
an oops, or pfn 0 mistaken for page table, before).
Deeper study of each site might show that 90% of them here in arch code
could only fail if there's corruption e.g. a transition to THP would be
surprising on an arch without HAVE_ARCH_TRANSPARENT_HUGEPAGE. But given
the likely extension to freeing empty page tables, I have not limited this
set of changes to THP; and it has been easier, and sets a better example,
if each site is given appropriate handling.
Two: pte_offset_map() will need to do an rcu_read_lock(), with the
corresponding rcu_read_unlock() in pte_unmap(). But most architectures
never supported CONFIG_HIGHPTE, so some don't always call pte_unmap()
after pte_offset_map(), or have used userspace pte_offset_map() where
pte_offset_kernel() is more correct. No problem in the current tree, but
a problem once an rcu_read_unlock() will be needed to keep balance.
A common special case of that comes in arch/*/mm/hugetlbpage.c, if the
architecture supports hugetlb pages down at the lowest PTE level.
huge_pte_alloc() uses pte_alloc_map(), but generic hugetlb code does no
corresponding pte_unmap(); similarly for huge_pte_offset().
In rare transient cases, not yet made possible, pte_offset_map() and
pte_offset_map_lock() may not find a page table: handle appropriately.
Link: https://lkml.kernel.org/r/a4963be9-7aa6-350-66d0-2ba843e1af44@google.com
Link: https://lkml.kernel.org/r/813429a1-204a-1844-eeae-7fd72826c28@google.com
Signed-off-by: Hugh Dickins <hughd@google.com>
Cc: Alexander Gordeev <agordeev@linux.ibm.com>
Cc: Alexandre Ghiti <alexghiti@rivosinc.com>
Cc: Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Christian Borntraeger <borntraeger@linux.ibm.com>
Cc: Chris Zankel <chris@zankel.net>
Cc: Claudio Imbrenda <imbrenda@linux.ibm.com>
Cc: David Hildenbrand <david@redhat.com>
Cc: "David S. Miller" <davem@davemloft.net>
Cc: Geert Uytterhoeven <geert@linux-m68k.org>
Cc: Greg Ungerer <gerg@linux-m68k.org>
Cc: Heiko Carstens <hca@linux.ibm.com>
Cc: Helge Deller <deller@gmx.de>
Cc: John David Anglin <dave.anglin@bell.net>
Cc: John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
Cc: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Cc: Matthew Wilcox (Oracle) <willy@infradead.org>
Cc: Max Filippov <jcmvbkbc@gmail.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Michal Simek <monstr@monstr.eu>
Cc: Mike Kravetz <mike.kravetz@oracle.com>
Cc: Mike Rapoport (IBM) <rppt@kernel.org>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Qi Zheng <zhengqi.arch@bytedance.com>
Cc: Russell King <linux@armlinux.org.uk>
Cc: Suren Baghdasaryan <surenb@google.com>
Cc: Thomas Bogendoerfer <tsbogend@alpha.franken.de>
Cc: Will Deacon <will@kernel.org>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
2023-06-08 12:10:57 -07:00
|
|
|
if (!pte)
|
|
|
|
break;
|
|
|
|
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont(", *pte=%08llx", (long long)pte_val(*pte));
|
2011-11-22 17:30:31 +00:00
|
|
|
#ifndef CONFIG_ARM_LPAE
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont(", *ppte=%08llx",
|
2011-02-15 14:31:37 +01:00
|
|
|
(long long)pte_val(pte[PTE_HWTABLE_PTRS]));
|
2011-11-22 17:30:31 +00:00
|
|
|
#endif
|
2005-04-16 15:20:36 -07:00
|
|
|
pte_unmap(pte);
|
|
|
|
} while(0);
|
|
|
|
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_cont("\n");
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2009-07-24 12:34:55 +01:00
|
|
|
#else /* CONFIG_MMU */
|
2019-01-29 15:44:38 +00:00
|
|
|
void show_pte(const char *lvl, struct mm_struct *mm, unsigned long addr)
|
2009-07-24 12:34:55 +01:00
|
|
|
{ }
|
|
|
|
#endif /* CONFIG_MMU */
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2021-12-03 10:26:32 +01:00
|
|
|
static inline bool is_write_fault(unsigned int fsr)
|
|
|
|
{
|
|
|
|
return (fsr & FSR_WRITE) && !(fsr & FSR_CM);
|
|
|
|
}
|
|
|
|
|
2022-12-04 04:46:20 +01:00
|
|
|
static inline bool is_translation_fault(unsigned int fsr)
|
|
|
|
{
|
|
|
|
int fs = fsr_fs(fsr);
|
|
|
|
#ifdef CONFIG_ARM_LPAE
|
|
|
|
if ((fs & FS_MMU_NOLL_MASK) == FS_TRANS_NOLL)
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
if (fs == FS_L1_TRANS || fs == FS_L2_TRANS)
|
|
|
|
return true;
|
|
|
|
#endif
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-09-22 14:56:31 +01:00
|
|
|
static void die_kernel_fault(const char *msg, struct mm_struct *mm,
|
|
|
|
unsigned long addr, unsigned int fsr,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
bust_spinlocks(1);
|
|
|
|
pr_alert("8<--- cut here ---\n");
|
2022-10-11 02:34:05 +01:00
|
|
|
pr_alert("Unable to handle kernel %s at virtual address %08lx when %s\n",
|
|
|
|
msg, addr, fsr & FSR_LNX_PF ? "execute" :
|
|
|
|
fsr & FSR_WRITE ? "write" : "read");
|
2021-09-22 14:56:31 +01:00
|
|
|
|
|
|
|
show_pte(KERN_ALERT, mm, addr);
|
|
|
|
die("Oops", regs, fsr);
|
|
|
|
bust_spinlocks(0);
|
2021-06-28 14:52:01 -05:00
|
|
|
make_task_dead(SIGKILL);
|
2021-09-22 14:56:31 +01:00
|
|
|
}
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* Oops. The kernel tried to access some page that wasn't present.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
__do_kernel_fault(struct mm_struct *mm, unsigned long addr, unsigned int fsr,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
2021-09-22 14:56:31 +01:00
|
|
|
const char *msg;
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* Are we prepared to handle this kernel fault?
|
|
|
|
*/
|
|
|
|
if (fixup_exception(regs))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No handler, we'll have to terminate things with extreme prejudice.
|
|
|
|
*/
|
2021-12-03 10:26:33 +01:00
|
|
|
if (addr < PAGE_SIZE) {
|
2021-09-22 14:56:31 +01:00
|
|
|
msg = "NULL pointer dereference";
|
2021-12-03 10:26:33 +01:00
|
|
|
} else {
|
2022-12-04 04:46:20 +01:00
|
|
|
if (is_translation_fault(fsr) &&
|
|
|
|
kfence_handle_page_fault(addr, is_write_fault(fsr), regs))
|
2021-12-03 10:26:33 +01:00
|
|
|
return;
|
|
|
|
|
2021-09-22 14:56:31 +01:00
|
|
|
msg = "paging request";
|
2021-12-03 10:26:33 +01:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2021-09-22 14:56:31 +01:00
|
|
|
die_kernel_fault(msg, mm, addr, fsr, regs);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Something tried to access memory that isn't in our memory map..
|
|
|
|
* User mode accesses just cause a SIGSEGV
|
|
|
|
*/
|
|
|
|
static void
|
2019-02-05 19:39:11 -06:00
|
|
|
__do_user_fault(unsigned long addr, unsigned int fsr, unsigned int sig,
|
|
|
|
int code, struct pt_regs *regs)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2019-02-05 19:39:11 -06:00
|
|
|
struct task_struct *tsk = current;
|
|
|
|
|
2018-05-14 14:20:21 +01:00
|
|
|
if (addr > TASK_SIZE)
|
|
|
|
harden_branch_predictor();
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
#ifdef CONFIG_DEBUG_USER
|
2012-02-06 15:45:36 +01:00
|
|
|
if (((user_debug & UDBG_SEGV) && (sig == SIGSEGV)) ||
|
|
|
|
((user_debug & UDBG_BUS) && (sig == SIGBUS))) {
|
2019-01-29 14:07:58 +00:00
|
|
|
pr_err("8<--- cut here ---\n");
|
2019-01-29 15:44:38 +00:00
|
|
|
pr_err("%s: unhandled page fault (%d) at 0x%08lx, code 0x%03x\n",
|
2005-04-16 15:23:55 -07:00
|
|
|
tsk->comm, sig, addr, fsr);
|
2019-01-29 15:44:38 +00:00
|
|
|
show_pte(KERN_ERR, tsk->mm, addr);
|
2005-04-16 15:20:36 -07:00
|
|
|
show_regs(regs);
|
|
|
|
}
|
|
|
|
#endif
|
2018-10-31 23:53:12 +01:00
|
|
|
#ifndef CONFIG_KUSER_HELPERS
|
|
|
|
if ((sig == SIGSEGV) && ((addr & PAGE_MASK) == 0xffff0000))
|
|
|
|
printk_ratelimited(KERN_DEBUG
|
|
|
|
"%s: CONFIG_KUSER_HELPERS disabled at 0x%08lx\n",
|
|
|
|
tsk->comm, addr);
|
|
|
|
#endif
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
tsk->thread.address = addr;
|
|
|
|
tsk->thread.error_code = fsr;
|
|
|
|
tsk->thread.trap_no = 14;
|
2019-05-23 11:04:24 -05:00
|
|
|
force_sig_fault(sig, code, (void __user *)addr);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-09-27 16:13:48 +01:00
|
|
|
void do_bad_area(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-09-27 16:13:48 +01:00
|
|
|
struct task_struct *tsk = current;
|
|
|
|
struct mm_struct *mm = tsk->active_mm;
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* If we are in kernel mode at this point, we
|
|
|
|
* have no context to handle this fault with.
|
|
|
|
*/
|
|
|
|
if (user_mode(regs))
|
2019-02-05 19:39:11 -06:00
|
|
|
__do_user_fault(addr, fsr, SIGSEGV, SEGV_MAPERR, regs);
|
2005-04-16 15:20:36 -07:00
|
|
|
else
|
|
|
|
__do_kernel_fault(mm, addr, fsr, regs);
|
|
|
|
}
|
|
|
|
|
2009-07-24 12:34:55 +01:00
|
|
|
#ifdef CONFIG_MMU
|
2021-09-22 14:56:32 +01:00
|
|
|
static inline bool is_permission_fault(unsigned int fsr)
|
|
|
|
{
|
|
|
|
int fs = fsr_fs(fsr);
|
|
|
|
#ifdef CONFIG_ARM_LPAE
|
2022-12-04 04:46:20 +01:00
|
|
|
if ((fs & FS_MMU_NOLL_MASK) == FS_PERM_NOLL)
|
2021-09-22 14:56:32 +01:00
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
if (fs == FS_L1_PERM || fs == FS_L2_PERM)
|
|
|
|
return true;
|
|
|
|
#endif
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2024-03-25 08:31:13 +01:00
|
|
|
#ifdef CONFIG_CPU_TTBR0_PAN
|
|
|
|
static inline bool ttbr0_usermode_access_allowed(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
struct svc_pt_regs *svcregs;
|
|
|
|
|
|
|
|
/* If we are in user mode: permission granted */
|
|
|
|
if (user_mode(regs))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
/* uaccess state saved above pt_regs on SVC exception entry */
|
|
|
|
svcregs = to_svc_pt_regs(regs);
|
|
|
|
|
|
|
|
return !(svcregs->ttbcr & TTBCR_EPD0);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static inline bool ttbr0_usermode_access_allowed(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-12-03 15:27:56 -05:00
|
|
|
static int __kprobes
|
2005-04-16 15:20:36 -07:00
|
|
|
do_page_fault(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
|
|
|
|
{
|
2021-09-22 14:56:28 +01:00
|
|
|
struct mm_struct *mm = current->mm;
|
2023-06-22 21:24:30 +02:00
|
|
|
struct vm_area_struct *vma;
|
2018-08-17 15:44:47 -07:00
|
|
|
int sig, code;
|
|
|
|
vm_fault_t fault;
|
2020-04-01 21:08:37 -07:00
|
|
|
unsigned int flags = FAULT_FLAG_DEFAULT;
|
2021-09-22 14:56:29 +01:00
|
|
|
unsigned long vm_flags = VM_ACCESS_FLAGS;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2019-07-16 16:28:00 -07:00
|
|
|
if (kprobe_page_fault(regs, fsr))
|
2007-12-03 15:21:57 -05:00
|
|
|
return 0;
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2011-06-25 11:44:06 +01:00
|
|
|
/* Enable interrupts if they were enabled in the parent context. */
|
|
|
|
if (interrupts_enabled(regs))
|
|
|
|
local_irq_enable();
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* If we're in an interrupt or have no user
|
|
|
|
* context, we must not take the fault..
|
|
|
|
*/
|
2015-05-11 17:52:11 +02:00
|
|
|
if (faulthandler_disabled() || !mm)
|
2005-04-16 15:20:36 -07:00
|
|
|
goto no_context;
|
|
|
|
|
2013-09-12 15:13:39 -07:00
|
|
|
if (user_mode(regs))
|
|
|
|
flags |= FAULT_FLAG_USER;
|
2021-09-22 14:56:29 +01:00
|
|
|
|
2021-12-03 10:26:32 +01:00
|
|
|
if (is_write_fault(fsr)) {
|
2013-09-12 15:13:39 -07:00
|
|
|
flags |= FAULT_FLAG_WRITE;
|
2021-09-22 14:56:29 +01:00
|
|
|
vm_flags = VM_WRITE;
|
|
|
|
}
|
|
|
|
|
2021-09-22 14:56:32 +01:00
|
|
|
if (fsr & FSR_LNX_PF) {
|
2021-09-22 14:56:29 +01:00
|
|
|
vm_flags = VM_EXEC;
|
2013-09-12 15:13:39 -07:00
|
|
|
|
2021-09-22 14:56:32 +01:00
|
|
|
if (is_permission_fault(fsr) && !user_mode(regs))
|
|
|
|
die_kernel_fault("execution of memory",
|
|
|
|
mm, addr, fsr, regs);
|
|
|
|
}
|
|
|
|
|
2020-08-11 18:37:54 -07:00
|
|
|
perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, addr);
|
|
|
|
|
2024-03-25 08:31:13 +01:00
|
|
|
/*
|
|
|
|
* Privileged access aborts with CONFIG_CPU_TTBR0_PAN enabled are
|
|
|
|
* routed via the translation fault mechanism. Check whether uaccess
|
|
|
|
* is disabled while in kernel mode.
|
|
|
|
*/
|
|
|
|
if (!ttbr0_usermode_access_allowed(regs))
|
|
|
|
goto no_context;
|
|
|
|
|
2023-10-19 12:21:35 +01:00
|
|
|
if (!(flags & FAULT_FLAG_USER))
|
|
|
|
goto lock_mmap;
|
|
|
|
|
|
|
|
vma = lock_vma_under_rcu(mm, addr);
|
|
|
|
if (!vma)
|
|
|
|
goto lock_mmap;
|
|
|
|
|
|
|
|
if (!(vma->vm_flags & vm_flags)) {
|
|
|
|
vma_end_read(vma);
|
2024-04-03 16:38:01 +08:00
|
|
|
count_vm_vma_lock_event(VMA_LOCK_SUCCESS);
|
2024-04-11 21:09:25 +08:00
|
|
|
fault = 0;
|
|
|
|
code = SEGV_ACCERR;
|
2024-04-03 16:38:01 +08:00
|
|
|
goto bad_area;
|
2023-10-19 12:21:35 +01:00
|
|
|
}
|
|
|
|
fault = handle_mm_fault(vma, addr, flags | FAULT_FLAG_VMA_LOCK, regs);
|
|
|
|
if (!(fault & (VM_FAULT_RETRY | VM_FAULT_COMPLETED)))
|
|
|
|
vma_end_read(vma);
|
|
|
|
|
|
|
|
if (!(fault & VM_FAULT_RETRY)) {
|
|
|
|
count_vm_vma_lock_event(VMA_LOCK_SUCCESS);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
count_vm_vma_lock_event(VMA_LOCK_RETRY);
|
2024-01-22 22:43:05 -08:00
|
|
|
if (fault & VM_FAULT_MAJOR)
|
|
|
|
flags |= FAULT_FLAG_TRIED;
|
2023-10-19 12:21:35 +01:00
|
|
|
|
|
|
|
/* Quick path to respond to signals */
|
|
|
|
if (fault_signal_pending(fault, regs)) {
|
|
|
|
if (!user_mode(regs))
|
|
|
|
goto no_context;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
lock_mmap:
|
|
|
|
|
2011-11-27 17:49:50 +01:00
|
|
|
retry:
|
2023-06-22 21:24:30 +02:00
|
|
|
vma = lock_mm_and_find_vma(mm, addr, regs);
|
|
|
|
if (unlikely(!vma)) {
|
2024-04-11 21:09:25 +08:00
|
|
|
fault = 0;
|
|
|
|
code = SEGV_MAPERR;
|
2023-06-22 21:24:30 +02:00
|
|
|
goto bad_area;
|
2005-09-20 17:52:13 +01:00
|
|
|
}
|
|
|
|
|
2023-06-22 21:24:30 +02:00
|
|
|
/*
|
|
|
|
* ok, we have a good vm_area for this memory access, check the
|
|
|
|
* permissions on the VMA allow for the fault which occurred.
|
|
|
|
*/
|
2024-04-11 21:09:25 +08:00
|
|
|
if (!(vma->vm_flags & vm_flags)) {
|
|
|
|
mmap_read_unlock(mm);
|
|
|
|
fault = 0;
|
|
|
|
code = SEGV_ACCERR;
|
|
|
|
goto bad_area;
|
|
|
|
}
|
|
|
|
|
|
|
|
fault = handle_mm_fault(vma, addr & PAGE_MASK, flags, regs);
|
2011-11-27 17:49:50 +01:00
|
|
|
|
|
|
|
/* If we need to retry but a fatal signal is pending, handle the
|
2020-06-08 21:33:54 -07:00
|
|
|
* signal first. We do not need to release the mmap_lock because
|
2011-11-27 17:49:50 +01:00
|
|
|
* it would already be released in __lock_page_or_retry in
|
|
|
|
* mm/filemap.c. */
|
2020-04-01 21:08:06 -07:00
|
|
|
if (fault_signal_pending(fault, regs)) {
|
ARM: 8692/1: mm: abort uaccess retries upon fatal signal
When there's a fatal signal pending, arm's do_page_fault()
implementation returns 0. The intent is that we'll return to the
faulting userspace instruction, delivering the signal on the way.
However, if we take a fatal signal during fixing up a uaccess, this
results in a return to the faulting kernel instruction, which will be
instantly retried, resulting in the same fault being taken forever. As
the task never reaches userspace, the signal is not delivered, and the
task is left unkillable. While the task is stuck in this state, it can
inhibit the forward progress of the system.
To avoid this, we must ensure that when a fatal signal is pending, we
apply any necessary fixup for a faulting kernel instruction. Thus we
will return to an error path, and it is up to that code to make forward
progress towards delivering the fatal signal.
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Reviewed-by: Steve Capper <steve.capper@arm.com>
Cc: stable@vger.kernel.org
Signed-off-by: Russell King <rmk+kernel@armlinux.org.uk>
2017-08-22 11:36:17 +01:00
|
|
|
if (!user_mode(regs))
|
|
|
|
goto no_context;
|
2011-11-27 17:49:50 +01:00
|
|
|
return 0;
|
ARM: 8692/1: mm: abort uaccess retries upon fatal signal
When there's a fatal signal pending, arm's do_page_fault()
implementation returns 0. The intent is that we'll return to the
faulting userspace instruction, delivering the signal on the way.
However, if we take a fatal signal during fixing up a uaccess, this
results in a return to the faulting kernel instruction, which will be
instantly retried, resulting in the same fault being taken forever. As
the task never reaches userspace, the signal is not delivered, and the
task is left unkillable. While the task is stuck in this state, it can
inhibit the forward progress of the system.
To avoid this, we must ensure that when a fatal signal is pending, we
apply any necessary fixup for a faulting kernel instruction. Thus we
will return to an error path, and it is up to that code to make forward
progress towards delivering the fatal signal.
Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Reviewed-by: Steve Capper <steve.capper@arm.com>
Cc: stable@vger.kernel.org
Signed-off-by: Russell King <rmk+kernel@armlinux.org.uk>
2017-08-22 11:36:17 +01:00
|
|
|
}
|
2011-11-27 17:49:50 +01:00
|
|
|
|
mm: avoid unnecessary page fault retires on shared memory types
I observed that for each of the shared file-backed page faults, we're very
likely to retry one more time for the 1st write fault upon no page. It's
because we'll need to release the mmap lock for dirty rate limit purpose
with balance_dirty_pages_ratelimited() (in fault_dirty_shared_page()).
Then after that throttling we return VM_FAULT_RETRY.
We did that probably because VM_FAULT_RETRY is the only way we can return
to the fault handler at that time telling it we've released the mmap lock.
However that's not ideal because it's very likely the fault does not need
to be retried at all since the pgtable was well installed before the
throttling, so the next continuous fault (including taking mmap read lock,
walk the pgtable, etc.) could be in most cases unnecessary.
It's not only slowing down page faults for shared file-backed, but also add
more mmap lock contention which is in most cases not needed at all.
To observe this, one could try to write to some shmem page and look at
"pgfault" value in /proc/vmstat, then we should expect 2 counts for each
shmem write simply because we retried, and vm event "pgfault" will capture
that.
To make it more efficient, add a new VM_FAULT_COMPLETED return code just to
show that we've completed the whole fault and released the lock. It's also
a hint that we should very possibly not need another fault immediately on
this page because we've just completed it.
This patch provides a ~12% perf boost on my aarch64 test VM with a simple
program sequentially dirtying 400MB shmem file being mmap()ed and these are
the time it needs:
Before: 650.980 ms (+-1.94%)
After: 569.396 ms (+-1.38%)
I believe it could help more than that.
We need some special care on GUP and the s390 pgfault handler (for gmap
code before returning from pgfault), the rest changes in the page fault
handlers should be relatively straightforward.
Another thing to mention is that mm_account_fault() does take this new
fault as a generic fault to be accounted, unlike VM_FAULT_RETRY.
I explicitly didn't touch hmm_vma_fault() and break_ksm() because they do
not handle VM_FAULT_RETRY even with existing code, so I'm literally keeping
them as-is.
Link: https://lkml.kernel.org/r/20220530183450.42886-1-peterx@redhat.com
Signed-off-by: Peter Xu <peterx@redhat.com>
Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Acked-by: Johannes Weiner <hannes@cmpxchg.org>
Acked-by: Vineet Gupta <vgupta@kernel.org>
Acked-by: Guo Ren <guoren@kernel.org>
Acked-by: Max Filippov <jcmvbkbc@gmail.com>
Acked-by: Christian Borntraeger <borntraeger@linux.ibm.com>
Acked-by: Michael Ellerman <mpe@ellerman.id.au> (powerpc)
Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Reviewed-by: Alistair Popple <apopple@nvidia.com>
Reviewed-by: Ingo Molnar <mingo@kernel.org>
Acked-by: Russell King (Oracle) <rmk+kernel@armlinux.org.uk> [arm part]
Acked-by: Heiko Carstens <hca@linux.ibm.com>
Cc: Vasily Gorbik <gor@linux.ibm.com>
Cc: Stafford Horne <shorne@gmail.com>
Cc: David S. Miller <davem@davemloft.net>
Cc: Johannes Berg <johannes@sipsolutions.net>
Cc: Brian Cain <bcain@quicinc.com>
Cc: Richard Henderson <rth@twiddle.net>
Cc: Richard Weinberger <richard@nod.at>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Janosch Frank <frankja@linux.ibm.com>
Cc: Albert Ou <aou@eecs.berkeley.edu>
Cc: Anton Ivanov <anton.ivanov@cambridgegreys.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Sven Schnelle <svens@linux.ibm.com>
Cc: Andrea Arcangeli <aarcange@redhat.com>
Cc: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: Alexander Gordeev <agordeev@linux.ibm.com>
Cc: Jonas Bonn <jonas@southpole.se>
Cc: Will Deacon <will@kernel.org>
Cc: Vlastimil Babka <vbabka@suse.cz>
Cc: Michal Simek <monstr@monstr.eu>
Cc: Matt Turner <mattst88@gmail.com>
Cc: Paul Mackerras <paulus@samba.org>
Cc: David Hildenbrand <david@redhat.com>
Cc: Nicholas Piggin <npiggin@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Stefan Kristiansson <stefan.kristiansson@saunalahti.fi>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Ivan Kokshaysky <ink@jurassic.park.msu.ru>
Cc: Chris Zankel <chris@zankel.net>
Cc: Hugh Dickins <hughd@google.com>
Cc: Dinh Nguyen <dinguyen@kernel.org>
Cc: Rich Felker <dalias@libc.org>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Thomas Bogendoerfer <tsbogend@alpha.franken.de>
Cc: Helge Deller <deller@gmx.de>
Cc: Yoshinori Sato <ysato@users.osdn.me>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
2022-05-30 14:34:50 -04:00
|
|
|
/* The fault is fully completed (including releasing mmap lock) */
|
|
|
|
if (fault & VM_FAULT_COMPLETED)
|
|
|
|
return 0;
|
|
|
|
|
2022-01-14 14:05:51 -08:00
|
|
|
if (!(fault & VM_FAULT_ERROR)) {
|
2011-11-27 17:49:50 +01:00
|
|
|
if (fault & VM_FAULT_RETRY) {
|
2012-10-08 16:32:19 -07:00
|
|
|
flags |= FAULT_FLAG_TRIED;
|
2011-11-27 17:49:50 +01:00
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-08 21:33:25 -07:00
|
|
|
mmap_read_unlock(mm);
|
2023-10-19 12:21:35 +01:00
|
|
|
done:
|
2010-02-02 20:24:58 +01:00
|
|
|
|
2024-04-11 21:09:25 +08:00
|
|
|
/* Handle the "normal" case first */
|
|
|
|
if (likely(!(fault & VM_FAULT_ERROR)))
|
2005-04-16 15:20:36 -07:00
|
|
|
return 0;
|
|
|
|
|
2024-04-11 21:09:25 +08:00
|
|
|
code = SEGV_MAPERR;
|
2023-06-22 21:24:30 +02:00
|
|
|
bad_area:
|
2013-09-12 15:13:38 -07:00
|
|
|
/*
|
|
|
|
* If we are in kernel mode at this point, we
|
|
|
|
* have no context to handle this fault with.
|
|
|
|
*/
|
|
|
|
if (!user_mode(regs))
|
|
|
|
goto no_context;
|
|
|
|
|
2009-09-20 12:47:40 +01:00
|
|
|
if (fault & VM_FAULT_OOM) {
|
|
|
|
/*
|
|
|
|
* We ran out of memory, call the OOM killer, and return to
|
|
|
|
* userspace (which will retry the fault, or kill us if we
|
|
|
|
* got oom-killed)
|
|
|
|
*/
|
|
|
|
pagefault_out_of_memory();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-07-19 01:47:05 -07:00
|
|
|
if (fault & VM_FAULT_SIGBUS) {
|
2005-04-16 15:23:55 -07:00
|
|
|
/*
|
|
|
|
* We had some memory, but were unable to
|
|
|
|
* successfully fix up this page fault.
|
|
|
|
*/
|
|
|
|
sig = SIGBUS;
|
|
|
|
code = BUS_ADRERR;
|
2007-07-19 01:47:05 -07:00
|
|
|
} else {
|
2005-04-16 15:23:55 -07:00
|
|
|
/*
|
|
|
|
* Something tried to access memory that
|
|
|
|
* isn't in our memory map..
|
|
|
|
*/
|
|
|
|
sig = SIGSEGV;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2019-02-05 19:39:11 -06:00
|
|
|
__do_user_fault(addr, fsr, sig, code, regs);
|
2005-04-16 15:23:55 -07:00
|
|
|
return 0;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
no_context:
|
|
|
|
__do_kernel_fault(mm, addr, fsr, regs);
|
|
|
|
return 0;
|
|
|
|
}
|
2009-07-24 12:34:55 +01:00
|
|
|
#else /* CONFIG_MMU */
|
|
|
|
static int
|
|
|
|
do_page_fault(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_MMU */
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* First Level Translation Fault Handler
|
|
|
|
*
|
|
|
|
* We enter here because the first level page table doesn't contain
|
|
|
|
* a valid entry for the address.
|
|
|
|
*
|
|
|
|
* If the address is in kernel space (>= TASK_SIZE), then we are
|
|
|
|
* probably faulting in the vmalloc() area.
|
|
|
|
*
|
|
|
|
* If the init_task's first level page tables contains the relevant
|
|
|
|
* entry, we copy the it to this task. If not, we send the process
|
|
|
|
* a signal, fixup the exception, or oops the kernel.
|
|
|
|
*
|
|
|
|
* NOTE! We MUST NOT take any locks for this case. We may be in an
|
|
|
|
* interrupt or a critical region, and should only copy the information
|
|
|
|
* from the master page table, nothing more.
|
|
|
|
*/
|
2009-07-24 12:34:55 +01:00
|
|
|
#ifdef CONFIG_MMU
|
2007-12-03 15:27:56 -05:00
|
|
|
static int __kprobes
|
2005-04-16 15:20:36 -07:00
|
|
|
do_translation_fault(unsigned long addr, unsigned int fsr,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
unsigned int index;
|
|
|
|
pgd_t *pgd, *pgd_k;
|
2020-06-04 16:46:19 -07:00
|
|
|
p4d_t *p4d, *p4d_k;
|
2010-11-21 16:27:49 +00:00
|
|
|
pud_t *pud, *pud_k;
|
2005-04-16 15:20:36 -07:00
|
|
|
pmd_t *pmd, *pmd_k;
|
|
|
|
|
|
|
|
if (addr < TASK_SIZE)
|
|
|
|
return do_page_fault(addr, fsr, regs);
|
|
|
|
|
2010-06-08 15:16:49 +01:00
|
|
|
if (user_mode(regs))
|
|
|
|
goto bad_area;
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
index = pgd_index(addr);
|
|
|
|
|
|
|
|
pgd = cpu_get_pgd() + index;
|
|
|
|
pgd_k = init_mm.pgd + index;
|
|
|
|
|
2020-06-04 16:46:19 -07:00
|
|
|
p4d = p4d_offset(pgd, addr);
|
|
|
|
p4d_k = p4d_offset(pgd_k, addr);
|
|
|
|
|
|
|
|
if (p4d_none(*p4d_k))
|
2005-04-16 15:20:36 -07:00
|
|
|
goto bad_area;
|
2020-06-04 16:46:19 -07:00
|
|
|
if (!p4d_present(*p4d))
|
|
|
|
set_p4d(p4d, *p4d_k);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2020-06-04 16:46:19 -07:00
|
|
|
pud = pud_offset(p4d, addr);
|
|
|
|
pud_k = pud_offset(p4d_k, addr);
|
2010-11-21 16:27:49 +00:00
|
|
|
|
|
|
|
if (pud_none(*pud_k))
|
|
|
|
goto bad_area;
|
|
|
|
if (!pud_present(*pud))
|
|
|
|
set_pud(pud, *pud_k);
|
|
|
|
|
|
|
|
pmd = pmd_offset(pud, addr);
|
|
|
|
pmd_k = pmd_offset(pud_k, addr);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2011-11-22 17:30:31 +00:00
|
|
|
#ifdef CONFIG_ARM_LPAE
|
|
|
|
/*
|
|
|
|
* Only one hardware entry per PMD with LPAE.
|
|
|
|
*/
|
|
|
|
index = 0;
|
|
|
|
#else
|
2010-07-22 13:20:22 +01:00
|
|
|
/*
|
|
|
|
* On ARM one Linux PGD entry contains two hardware entries (see page
|
|
|
|
* tables layout in pgtable.h). We normally guarantee that we always
|
|
|
|
* fill both L1 entries. But create_mapping() doesn't follow the rule.
|
|
|
|
* It can create inidividual L1 entries, so here we have to call
|
|
|
|
* pmd_none() check for the entry really corresponded to address, not
|
|
|
|
* for the first of pair.
|
|
|
|
*/
|
|
|
|
index = (addr >> SECTION_SHIFT) & 1;
|
2011-11-22 17:30:31 +00:00
|
|
|
#endif
|
2010-07-22 13:20:22 +01:00
|
|
|
if (pmd_none(pmd_k[index]))
|
2005-04-16 15:20:36 -07:00
|
|
|
goto bad_area;
|
|
|
|
|
|
|
|
copy_pmd(pmd, pmd_k);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
bad_area:
|
2006-09-27 16:13:48 +01:00
|
|
|
do_bad_area(addr, fsr, regs);
|
2005-04-16 15:20:36 -07:00
|
|
|
return 0;
|
|
|
|
}
|
2009-07-24 12:34:55 +01:00
|
|
|
#else /* CONFIG_MMU */
|
|
|
|
static int
|
|
|
|
do_translation_fault(unsigned long addr, unsigned int fsr,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_MMU */
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Some section permission faults need to be handled gracefully.
|
|
|
|
* They can happen due to a __{get,put}_user during an oops.
|
|
|
|
*/
|
2013-06-25 08:45:51 +01:00
|
|
|
#ifndef CONFIG_ARM_LPAE
|
2005-04-16 15:20:36 -07:00
|
|
|
static int
|
|
|
|
do_sect_fault(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
|
|
|
|
{
|
2006-09-27 16:13:48 +01:00
|
|
|
do_bad_area(addr, fsr, regs);
|
2005-04-16 15:20:36 -07:00
|
|
|
return 0;
|
|
|
|
}
|
2013-06-25 08:45:51 +01:00
|
|
|
#endif /* CONFIG_ARM_LPAE */
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* This abort handler always returns "fault".
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
do_bad(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2011-11-22 17:30:28 +00:00
|
|
|
struct fsr_info {
|
2005-04-16 15:20:36 -07:00
|
|
|
int (*fn)(unsigned long addr, unsigned int fsr, struct pt_regs *regs);
|
|
|
|
int sig;
|
2005-06-30 11:06:49 +01:00
|
|
|
int code;
|
2005-04-16 15:20:36 -07:00
|
|
|
const char *name;
|
|
|
|
};
|
|
|
|
|
2011-11-22 17:30:28 +00:00
|
|
|
/* FSR definition */
|
2011-11-22 17:30:31 +00:00
|
|
|
#ifdef CONFIG_ARM_LPAE
|
|
|
|
#include "fsr-3level.c"
|
|
|
|
#else
|
2011-11-22 17:30:28 +00:00
|
|
|
#include "fsr-2level.c"
|
2011-11-22 17:30:31 +00:00
|
|
|
#endif
|
2011-11-22 17:30:28 +00:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
void __init
|
|
|
|
hook_fault_code(int nr, int (*fn)(unsigned long, unsigned int, struct pt_regs *),
|
2010-07-22 13:18:19 +01:00
|
|
|
int sig, int code, const char *name)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2010-07-22 13:18:19 +01:00
|
|
|
if (nr < 0 || nr >= ARRAY_SIZE(fsr_info))
|
|
|
|
BUG();
|
|
|
|
|
|
|
|
fsr_info[nr].fn = fn;
|
|
|
|
fsr_info[nr].sig = sig;
|
|
|
|
fsr_info[nr].code = code;
|
|
|
|
fsr_info[nr].name = name;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Dispatch a data abort to the relevant handler.
|
|
|
|
*/
|
2017-11-24 23:54:22 +00:00
|
|
|
asmlinkage void
|
2005-04-16 15:20:36 -07:00
|
|
|
do_DataAbort(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
|
|
|
|
{
|
2009-09-20 12:41:58 +01:00
|
|
|
const struct fsr_info *inf = fsr_info + fsr_fs(fsr);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2009-09-20 13:18:47 +01:00
|
|
|
if (!inf->fn(addr, fsr & ~FSR_LNX_PF, regs))
|
2005-04-16 15:20:36 -07:00
|
|
|
return;
|
|
|
|
|
2019-01-29 14:07:58 +00:00
|
|
|
pr_alert("8<--- cut here ---\n");
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_alert("Unhandled fault: %s (0x%03x) at 0x%08lx\n",
|
2005-04-16 15:20:36 -07:00
|
|
|
inf->name, fsr, addr);
|
2019-01-29 15:44:38 +00:00
|
|
|
show_pte(KERN_ALERT, current->mm, addr);
|
2005-06-30 11:06:49 +01:00
|
|
|
|
2018-04-16 13:25:24 -05:00
|
|
|
arm_notify_die("", regs, inf->sig, inf->code, (void __user *)addr,
|
|
|
|
fsr, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2010-09-03 10:39:59 +01:00
|
|
|
void __init
|
|
|
|
hook_ifault_code(int nr, int (*fn)(unsigned long, unsigned int, struct pt_regs *),
|
|
|
|
int sig, int code, const char *name)
|
|
|
|
{
|
|
|
|
if (nr < 0 || nr >= ARRAY_SIZE(ifsr_info))
|
|
|
|
BUG();
|
|
|
|
|
|
|
|
ifsr_info[nr].fn = fn;
|
|
|
|
ifsr_info[nr].sig = sig;
|
|
|
|
ifsr_info[nr].code = code;
|
|
|
|
ifsr_info[nr].name = name;
|
|
|
|
}
|
|
|
|
|
2017-11-24 23:54:22 +00:00
|
|
|
asmlinkage void
|
2009-09-25 13:39:47 +01:00
|
|
|
do_PrefetchAbort(unsigned long addr, unsigned int ifsr, struct pt_regs *regs)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2009-09-25 13:40:49 +01:00
|
|
|
const struct fsr_info *inf = ifsr_info + fsr_fs(ifsr);
|
|
|
|
|
|
|
|
if (!inf->fn(addr, ifsr | FSR_LNX_PF, regs))
|
|
|
|
return;
|
|
|
|
|
2024-02-01 18:32:23 +01:00
|
|
|
pr_alert("8<--- cut here ---\n");
|
2014-10-28 11:26:42 +00:00
|
|
|
pr_alert("Unhandled prefetch abort: %s (0x%03x) at 0x%08lx\n",
|
2009-09-25 13:40:49 +01:00
|
|
|
inf->name, ifsr, addr);
|
|
|
|
|
2018-04-16 13:25:24 -05:00
|
|
|
arm_notify_die("", regs, inf->sig, inf->code, (void __user *)addr,
|
|
|
|
ifsr, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2015-10-19 13:38:09 +01:00
|
|
|
/*
|
|
|
|
* Abort handler to be used only during first unmasking of asynchronous aborts
|
|
|
|
* on the boot CPU. This makes sure that the machine will not die if the
|
|
|
|
* firmware/bootloader left an imprecise abort pending for us to trip over.
|
|
|
|
*/
|
|
|
|
static int __init early_abort_handler(unsigned long addr, unsigned int fsr,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
pr_warn("Hit pending asynchronous external abort (FSR=0x%08x) during "
|
|
|
|
"first unmask, this is most likely caused by a "
|
|
|
|
"firmware/bootloader bug.\n", fsr);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void __init early_abt_enable(void)
|
|
|
|
{
|
2017-01-17 21:10:11 +01:00
|
|
|
fsr_info[FSR_FS_AEA].fn = early_abort_handler;
|
2015-10-19 13:38:09 +01:00
|
|
|
local_abt_enable();
|
2017-01-17 21:10:11 +01:00
|
|
|
fsr_info[FSR_FS_AEA].fn = do_bad;
|
2015-10-19 13:38:09 +01:00
|
|
|
}
|
|
|
|
|
2011-11-22 17:30:31 +00:00
|
|
|
#ifndef CONFIG_ARM_LPAE
|
2010-07-22 13:23:25 +01:00
|
|
|
static int __init exceptions_init(void)
|
|
|
|
{
|
|
|
|
if (cpu_architecture() >= CPU_ARCH_ARMv6) {
|
|
|
|
hook_fault_code(4, do_translation_fault, SIGSEGV, SEGV_MAPERR,
|
|
|
|
"I-cache maintenance fault");
|
|
|
|
}
|
|
|
|
|
2010-07-26 11:20:41 +01:00
|
|
|
if (cpu_architecture() >= CPU_ARCH_ARMv7) {
|
|
|
|
/*
|
|
|
|
* TODO: Access flag faults introduced in ARMv6K.
|
|
|
|
* Runtime check for 'K' extension is needed
|
|
|
|
*/
|
|
|
|
hook_fault_code(3, do_bad, SIGSEGV, SEGV_MAPERR,
|
|
|
|
"section access flag fault");
|
|
|
|
hook_fault_code(6, do_bad, SIGSEGV, SEGV_MAPERR,
|
|
|
|
"section access flag fault");
|
|
|
|
}
|
|
|
|
|
2010-07-22 13:23:25 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
arch_initcall(exceptions_init);
|
2011-11-22 17:30:31 +00:00
|
|
|
#endif
|