Linux Audio

Check our new training course

Loading...
v4.17
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 *  linux/arch/m68k/mm/fault.c
  4 *
  5 *  Copyright (C) 1995  Hamish Macdonald
  6 */
  7
  8#include <linux/mman.h>
  9#include <linux/mm.h>
 10#include <linux/kernel.h>
 11#include <linux/ptrace.h>
 12#include <linux/interrupt.h>
 13#include <linux/module.h>
 14#include <linux/uaccess.h>
 
 15
 16#include <asm/setup.h>
 17#include <asm/traps.h>
 18#include <asm/pgalloc.h>
 
 19
 20extern void die_if_kernel(char *, struct pt_regs *, long);
 21
 22int send_fault_sig(struct pt_regs *regs)
 23{
 24	siginfo_t siginfo;
 
 25
 26	clear_siginfo(&siginfo);
 27	siginfo.si_signo = current->thread.signo;
 28	siginfo.si_code = current->thread.code;
 29	siginfo.si_addr = (void *)current->thread.faddr;
 30	pr_debug("send_fault_sig: %p,%d,%d\n", siginfo.si_addr,
 31		 siginfo.si_signo, siginfo.si_code);
 32
 33	if (user_mode(regs)) {
 34		force_sig_info(siginfo.si_signo,
 35			       &siginfo, current);
 36	} else {
 37		if (fixup_exception(regs))
 38			return -1;
 39
 40		//if (siginfo.si_signo == SIGBUS)
 41		//	force_sig_info(siginfo.si_signo,
 42		//		       &siginfo, current);
 43
 44		/*
 45		 * Oops. The kernel tried to access some bad page. We'll have to
 46		 * terminate things with extreme prejudice.
 47		 */
 48		if ((unsigned long)siginfo.si_addr < PAGE_SIZE)
 49			pr_alert("Unable to handle kernel NULL pointer dereference");
 50		else
 51			pr_alert("Unable to handle kernel access");
 52		pr_cont(" at virtual address %p\n", siginfo.si_addr);
 53		die_if_kernel("Oops", regs, 0 /*error_code*/);
 54		do_exit(SIGKILL);
 55	}
 56
 57	return 1;
 58}
 59
 60/*
 61 * This routine handles page faults.  It determines the problem, and
 62 * then passes it off to one of the appropriate routines.
 63 *
 64 * error_code:
 65 *	bit 0 == 0 means no page found, 1 means protection fault
 66 *	bit 1 == 0 means read, 1 means write
 67 *
 68 * If this routine detects a bad access, it returns 1, otherwise it
 69 * returns 0.
 70 */
 71int do_page_fault(struct pt_regs *regs, unsigned long address,
 72			      unsigned long error_code)
 73{
 74	struct mm_struct *mm = current->mm;
 75	struct vm_area_struct * vma;
 76	int fault;
 77	unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
 78
 79	pr_debug("do page fault:\nregs->sr=%#x, regs->pc=%#lx, address=%#lx, %ld, %p\n",
 80		regs->sr, regs->pc, address, error_code, mm ? mm->pgd : NULL);
 81
 82	/*
 83	 * If we're in an interrupt or have no user
 84	 * context, we must not take the fault..
 85	 */
 86	if (faulthandler_disabled() || !mm)
 87		goto no_context;
 88
 89	if (user_mode(regs))
 90		flags |= FAULT_FLAG_USER;
 
 
 91retry:
 92	down_read(&mm->mmap_sem);
 93
 94	vma = find_vma(mm, address);
 95	if (!vma)
 96		goto map_err;
 97	if (vma->vm_flags & VM_IO)
 98		goto acc_err;
 99	if (vma->vm_start <= address)
100		goto good_area;
101	if (!(vma->vm_flags & VM_GROWSDOWN))
102		goto map_err;
103	if (user_mode(regs)) {
104		/* Accessing the stack below usp is always a bug.  The
105		   "+ 256" is there due to some instructions doing
106		   pre-decrement on the stack and that doesn't show up
107		   until later.  */
108		if (address + 256 < rdusp())
109			goto map_err;
110	}
111	if (expand_stack(vma, address))
112		goto map_err;
 
113
114/*
115 * Ok, we have a good vm_area for this memory access, so
116 * we can handle it..
117 */
118good_area:
119	pr_debug("do_page_fault: good_area\n");
120	switch (error_code & 3) {
121		default:	/* 3: write, present */
122			/* fall through */
123		case 2:		/* write, not present */
124			if (!(vma->vm_flags & VM_WRITE))
125				goto acc_err;
126			flags |= FAULT_FLAG_WRITE;
127			break;
128		case 1:		/* read, present */
129			goto acc_err;
130		case 0:		/* read, not present */
131			if (!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE)))
132				goto acc_err;
133	}
134
135	/*
136	 * If for any reason at all we couldn't handle the fault,
137	 * make sure we exit gracefully rather than endlessly redo
138	 * the fault.
139	 */
140
141	fault = handle_mm_fault(vma, address, flags);
142	pr_debug("handle_mm_fault returns %d\n", fault);
143
144	if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current))
 
 
 
 
 
 
 
145		return 0;
146
147	if (unlikely(fault & VM_FAULT_ERROR)) {
148		if (fault & VM_FAULT_OOM)
149			goto out_of_memory;
150		else if (fault & VM_FAULT_SIGSEGV)
151			goto map_err;
152		else if (fault & VM_FAULT_SIGBUS)
153			goto bus_err;
154		BUG();
155	}
156
157	/*
158	 * Major/minor page fault accounting is only done on the
159	 * initial attempt. If we go through a retry, it is extremely
160	 * likely that the page will be found in page cache at that point.
161	 */
162	if (flags & FAULT_FLAG_ALLOW_RETRY) {
163		if (fault & VM_FAULT_MAJOR)
164			current->maj_flt++;
165		else
166			current->min_flt++;
167		if (fault & VM_FAULT_RETRY) {
168			/* Clear FAULT_FLAG_ALLOW_RETRY to avoid any risk
169			 * of starvation. */
170			flags &= ~FAULT_FLAG_ALLOW_RETRY;
171			flags |= FAULT_FLAG_TRIED;
172
173			/*
174			 * No need to up_read(&mm->mmap_sem) as we would
175			 * have already released it in __lock_page_or_retry
176			 * in mm/filemap.c.
177			 */
178
179			goto retry;
180		}
 
 
 
 
 
181	}
182
183	up_read(&mm->mmap_sem);
184	return 0;
185
186/*
187 * We ran out of memory, or some other thing happened to us that made
188 * us unable to handle the page fault gracefully.
189 */
190out_of_memory:
191	up_read(&mm->mmap_sem);
192	if (!user_mode(regs))
193		goto no_context;
194	pagefault_out_of_memory();
195	return 0;
196
197no_context:
198	current->thread.signo = SIGBUS;
199	current->thread.faddr = address;
200	return send_fault_sig(regs);
201
202bus_err:
203	current->thread.signo = SIGBUS;
204	current->thread.code = BUS_ADRERR;
205	current->thread.faddr = address;
206	goto send_sig;
207
208map_err:
 
 
209	current->thread.signo = SIGSEGV;
210	current->thread.code = SEGV_MAPERR;
211	current->thread.faddr = address;
212	goto send_sig;
213
214acc_err:
215	current->thread.signo = SIGSEGV;
216	current->thread.code = SEGV_ACCERR;
217	current->thread.faddr = address;
218
219send_sig:
220	up_read(&mm->mmap_sem);
221	return send_fault_sig(regs);
222}
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 *  linux/arch/m68k/mm/fault.c
  4 *
  5 *  Copyright (C) 1995  Hamish Macdonald
  6 */
  7
  8#include <linux/mman.h>
  9#include <linux/mm.h>
 10#include <linux/kernel.h>
 11#include <linux/ptrace.h>
 12#include <linux/interrupt.h>
 13#include <linux/module.h>
 14#include <linux/uaccess.h>
 15#include <linux/perf_event.h>
 16
 17#include <asm/setup.h>
 18#include <asm/traps.h>
 19
 20#include "fault.h"
 21
 22extern void die_if_kernel(char *, struct pt_regs *, long);
 23
 24int send_fault_sig(struct pt_regs *regs)
 25{
 26	int signo, si_code;
 27	void __user *addr;
 28
 29	signo = current->thread.signo;
 30	si_code = current->thread.code;
 31	addr = (void __user *)current->thread.faddr;
 32	pr_debug("send_fault_sig: %p,%d,%d\n", addr, signo, si_code);
 
 
 33
 34	if (user_mode(regs)) {
 35		force_sig_fault(signo, si_code, addr);
 
 36	} else {
 37		if (fixup_exception(regs))
 38			return -1;
 39
 40		//if (signo == SIGBUS)
 41		//	force_sig_fault(si_signo, si_code, addr);
 
 42
 43		/*
 44		 * Oops. The kernel tried to access some bad page. We'll have to
 45		 * terminate things with extreme prejudice.
 46		 */
 47		if ((unsigned long)addr < PAGE_SIZE)
 48			pr_alert("Unable to handle kernel NULL pointer dereference");
 49		else
 50			pr_alert("Unable to handle kernel access");
 51		pr_cont(" at virtual address %p\n", addr);
 52		die_if_kernel("Oops", regs, 0 /*error_code*/);
 53		make_task_dead(SIGKILL);
 54	}
 55
 56	return 1;
 57}
 58
 59/*
 60 * This routine handles page faults.  It determines the problem, and
 61 * then passes it off to one of the appropriate routines.
 62 *
 63 * error_code:
 64 *	bit 0 == 0 means no page found, 1 means protection fault
 65 *	bit 1 == 0 means read, 1 means write
 66 *
 67 * If this routine detects a bad access, it returns 1, otherwise it
 68 * returns 0.
 69 */
 70int do_page_fault(struct pt_regs *regs, unsigned long address,
 71			      unsigned long error_code)
 72{
 73	struct mm_struct *mm = current->mm;
 74	struct vm_area_struct * vma;
 75	vm_fault_t fault;
 76	unsigned int flags = FAULT_FLAG_DEFAULT;
 77
 78	pr_debug("do page fault:\nregs->sr=%#x, regs->pc=%#lx, address=%#lx, %ld, %p\n",
 79		regs->sr, regs->pc, address, error_code, mm ? mm->pgd : NULL);
 80
 81	/*
 82	 * If we're in an interrupt or have no user
 83	 * context, we must not take the fault..
 84	 */
 85	if (faulthandler_disabled() || !mm)
 86		goto no_context;
 87
 88	if (user_mode(regs))
 89		flags |= FAULT_FLAG_USER;
 90
 91	perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
 92retry:
 93	mmap_read_lock(mm);
 94
 95	vma = find_vma(mm, address);
 96	if (!vma)
 97		goto map_err;
 
 
 98	if (vma->vm_start <= address)
 99		goto good_area;
100	if (!(vma->vm_flags & VM_GROWSDOWN))
101		goto map_err;
102	if (user_mode(regs)) {
103		/* Accessing the stack below usp is always a bug.  The
104		   "+ 256" is there due to some instructions doing
105		   pre-decrement on the stack and that doesn't show up
106		   until later.  */
107		if (address + 256 < rdusp())
108			goto map_err;
109	}
110	vma = expand_stack(mm, address);
111	if (!vma)
112		goto map_err_nosemaphore;
113
114/*
115 * Ok, we have a good vm_area for this memory access, so
116 * we can handle it..
117 */
118good_area:
119	pr_debug("do_page_fault: good_area\n");
120	switch (error_code & 3) {
121		default:	/* 3: write, present */
122			fallthrough;
123		case 2:		/* write, not present */
124			if (!(vma->vm_flags & VM_WRITE))
125				goto acc_err;
126			flags |= FAULT_FLAG_WRITE;
127			break;
128		case 1:		/* read, present */
129			goto acc_err;
130		case 0:		/* read, not present */
131			if (unlikely(!vma_is_accessible(vma)))
132				goto acc_err;
133	}
134
135	/*
136	 * If for any reason at all we couldn't handle the fault,
137	 * make sure we exit gracefully rather than endlessly redo
138	 * the fault.
139	 */
140
141	fault = handle_mm_fault(vma, address, flags, regs);
142	pr_debug("handle_mm_fault returns %x\n", fault);
143
144	if (fault_signal_pending(fault, regs)) {
145		if (!user_mode(regs))
146			goto no_context;
147		return 0;
148	}
149
150	/* The fault is fully completed (including releasing mmap lock) */
151	if (fault & VM_FAULT_COMPLETED)
152		return 0;
153
154	if (unlikely(fault & VM_FAULT_ERROR)) {
155		if (fault & VM_FAULT_OOM)
156			goto out_of_memory;
157		else if (fault & VM_FAULT_SIGSEGV)
158			goto map_err;
159		else if (fault & VM_FAULT_SIGBUS)
160			goto bus_err;
161		BUG();
162	}
163
164	if (fault & VM_FAULT_RETRY) {
165		flags |= FAULT_FLAG_TRIED;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
166
167		/*
168		 * No need to mmap_read_unlock(mm) as we would
169		 * have already released it in __lock_page_or_retry
170		 * in mm/filemap.c.
171		 */
172
173		goto retry;
174	}
175
176	mmap_read_unlock(mm);
177	return 0;
178
179/*
180 * We ran out of memory, or some other thing happened to us that made
181 * us unable to handle the page fault gracefully.
182 */
183out_of_memory:
184	mmap_read_unlock(mm);
185	if (!user_mode(regs))
186		goto no_context;
187	pagefault_out_of_memory();
188	return 0;
189
190no_context:
191	current->thread.signo = SIGBUS;
192	current->thread.faddr = address;
193	return send_fault_sig(regs);
194
195bus_err:
196	current->thread.signo = SIGBUS;
197	current->thread.code = BUS_ADRERR;
198	current->thread.faddr = address;
199	goto send_sig;
200
201map_err:
202	mmap_read_unlock(mm);
203map_err_nosemaphore:
204	current->thread.signo = SIGSEGV;
205	current->thread.code = SEGV_MAPERR;
206	current->thread.faddr = address;
207	return send_fault_sig(regs);
208
209acc_err:
210	current->thread.signo = SIGSEGV;
211	current->thread.code = SEGV_ACCERR;
212	current->thread.faddr = address;
213
214send_sig:
215	mmap_read_unlock(mm);
216	return send_fault_sig(regs);
217}