mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-21 09:15:42 +07:00
5ad18b2e60
Pull force_sig() argument change from Eric Biederman: "A source of error over the years has been that force_sig has taken a task parameter when it is only safe to use force_sig with the current task. The force_sig function is built for delivering synchronous signals such as SIGSEGV where the userspace application caused a synchronous fault (such as a page fault) and the kernel responded with a signal. Because the name force_sig does not make this clear, and because the force_sig takes a task parameter the function force_sig has been abused for sending other kinds of signals over the years. Slowly those have been fixed when the oopses have been tracked down. This set of changes fixes the remaining abusers of force_sig and carefully rips out the task parameter from force_sig and friends making this kind of error almost impossible in the future" * 'siginfo-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace: (27 commits) signal/x86: Move tsk inside of CONFIG_MEMORY_FAILURE in do_sigbus signal: Remove the signal number and task parameters from force_sig_info signal: Factor force_sig_info_to_task out of force_sig_info signal: Generate the siginfo in force_sig signal: Move the computation of force into send_signal and correct it. signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal signal: Remove the task parameter from force_sig_fault signal: Use force_sig_fault_to_task for the two calls that don't deliver to current signal: Explicitly call force_sig_fault on current signal/unicore32: Remove tsk parameter from __do_user_fault signal/arm: Remove tsk parameter from __do_user_fault signal/arm: Remove tsk parameter from ptrace_break signal/nds32: Remove tsk parameter from send_sigtrap signal/riscv: Remove tsk parameter from do_trap signal/sh: Remove tsk parameter from force_sig_info_fault signal/um: Remove task parameter from send_sigtrap signal/x86: Remove task parameter from send_sigtrap signal: Remove task parameter from force_sig_mceerr signal: Remove task parameter from force_sig signal: Remove task parameter from force_sigsegv ...
185 lines
3.9 KiB
C
185 lines
3.9 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Memory fault handling for Hexagon
|
|
*
|
|
* Copyright (c) 2010-2011, The Linux Foundation. All rights reserved.
|
|
*/
|
|
|
|
/*
|
|
* Page fault handling for the Hexagon Virtual Machine.
|
|
* Can also be called by a native port emulating the HVM
|
|
* execptions.
|
|
*/
|
|
|
|
#include <asm/pgtable.h>
|
|
#include <asm/traps.h>
|
|
#include <linux/uaccess.h>
|
|
#include <linux/mm.h>
|
|
#include <linux/sched/signal.h>
|
|
#include <linux/signal.h>
|
|
#include <linux/extable.h>
|
|
#include <linux/hardirq.h>
|
|
|
|
/*
|
|
* Decode of hardware exception sends us to one of several
|
|
* entry points. At each, we generate canonical arguments
|
|
* for handling by the abstract memory management code.
|
|
*/
|
|
#define FLT_IFETCH -1
|
|
#define FLT_LOAD 0
|
|
#define FLT_STORE 1
|
|
|
|
|
|
/*
|
|
* Canonical page fault handler
|
|
*/
|
|
void do_page_fault(unsigned long address, long cause, struct pt_regs *regs)
|
|
{
|
|
struct vm_area_struct *vma;
|
|
struct mm_struct *mm = current->mm;
|
|
int si_signo;
|
|
int si_code = SEGV_MAPERR;
|
|
vm_fault_t fault;
|
|
const struct exception_table_entry *fixup;
|
|
unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
|
|
|
|
/*
|
|
* If we're in an interrupt or have no user context,
|
|
* then must not take the fault.
|
|
*/
|
|
if (unlikely(in_interrupt() || !mm))
|
|
goto no_context;
|
|
|
|
local_irq_enable();
|
|
|
|
if (user_mode(regs))
|
|
flags |= FAULT_FLAG_USER;
|
|
retry:
|
|
down_read(&mm->mmap_sem);
|
|
vma = find_vma(mm, address);
|
|
if (!vma)
|
|
goto bad_area;
|
|
|
|
if (vma->vm_start <= address)
|
|
goto good_area;
|
|
|
|
if (!(vma->vm_flags & VM_GROWSDOWN))
|
|
goto bad_area;
|
|
|
|
if (expand_stack(vma, address))
|
|
goto bad_area;
|
|
|
|
good_area:
|
|
/* Address space is OK. Now check access rights. */
|
|
si_code = SEGV_ACCERR;
|
|
|
|
switch (cause) {
|
|
case FLT_IFETCH:
|
|
if (!(vma->vm_flags & VM_EXEC))
|
|
goto bad_area;
|
|
break;
|
|
case FLT_LOAD:
|
|
if (!(vma->vm_flags & VM_READ))
|
|
goto bad_area;
|
|
break;
|
|
case FLT_STORE:
|
|
if (!(vma->vm_flags & VM_WRITE))
|
|
goto bad_area;
|
|
flags |= FAULT_FLAG_WRITE;
|
|
break;
|
|
}
|
|
|
|
fault = handle_mm_fault(vma, address, flags);
|
|
|
|
if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current))
|
|
return;
|
|
|
|
/* The most common case -- we are done. */
|
|
if (likely(!(fault & VM_FAULT_ERROR))) {
|
|
if (flags & FAULT_FLAG_ALLOW_RETRY) {
|
|
if (fault & VM_FAULT_MAJOR)
|
|
current->maj_flt++;
|
|
else
|
|
current->min_flt++;
|
|
if (fault & VM_FAULT_RETRY) {
|
|
flags &= ~FAULT_FLAG_ALLOW_RETRY;
|
|
flags |= FAULT_FLAG_TRIED;
|
|
goto retry;
|
|
}
|
|
}
|
|
|
|
up_read(&mm->mmap_sem);
|
|
return;
|
|
}
|
|
|
|
up_read(&mm->mmap_sem);
|
|
|
|
/* Handle copyin/out exception cases */
|
|
if (!user_mode(regs))
|
|
goto no_context;
|
|
|
|
if (fault & VM_FAULT_OOM) {
|
|
pagefault_out_of_memory();
|
|
return;
|
|
}
|
|
|
|
/* User-mode address is in the memory map, but we are
|
|
* unable to fix up the page fault.
|
|
*/
|
|
if (fault & VM_FAULT_SIGBUS) {
|
|
si_signo = SIGBUS;
|
|
si_code = BUS_ADRERR;
|
|
}
|
|
/* Address is not in the memory map */
|
|
else {
|
|
si_signo = SIGSEGV;
|
|
si_code = SEGV_ACCERR;
|
|
}
|
|
force_sig_fault(si_signo, si_code, (void __user *)address);
|
|
return;
|
|
|
|
bad_area:
|
|
up_read(&mm->mmap_sem);
|
|
|
|
if (user_mode(regs)) {
|
|
force_sig_fault(SIGSEGV, si_code, (void __user *)address);
|
|
return;
|
|
}
|
|
/* Kernel-mode fault falls through */
|
|
|
|
no_context:
|
|
fixup = search_exception_tables(pt_elr(regs));
|
|
if (fixup) {
|
|
pt_set_elr(regs, fixup->fixup);
|
|
return;
|
|
}
|
|
|
|
/* Things are looking very, very bad now */
|
|
bust_spinlocks(1);
|
|
printk(KERN_EMERG "Unable to handle kernel paging request at "
|
|
"virtual address 0x%08lx, regs %p\n", address, regs);
|
|
die("Bad Kernel VA", regs, SIGKILL);
|
|
}
|
|
|
|
|
|
void read_protection_fault(struct pt_regs *regs)
|
|
{
|
|
unsigned long badvadr = pt_badva(regs);
|
|
|
|
do_page_fault(badvadr, FLT_LOAD, regs);
|
|
}
|
|
|
|
void write_protection_fault(struct pt_regs *regs)
|
|
{
|
|
unsigned long badvadr = pt_badva(regs);
|
|
|
|
do_page_fault(badvadr, FLT_STORE, regs);
|
|
}
|
|
|
|
void execute_protection_fault(struct pt_regs *regs)
|
|
{
|
|
unsigned long badvadr = pt_badva(regs);
|
|
|
|
do_page_fault(badvadr, FLT_IFETCH, regs);
|
|
}
|