1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Copyright (C) 2009 Sunplus Core Technology Co., Ltd.
4*4882a593Smuzhiyun * Lennox Wu <lennox.wu@sunplusct.com>
5*4882a593Smuzhiyun * Chen Liqin <liqin.chen@sunplusct.com>
6*4882a593Smuzhiyun * Copyright (C) 2012 Regents of the University of California
7*4882a593Smuzhiyun */
8*4882a593Smuzhiyun
9*4882a593Smuzhiyun
10*4882a593Smuzhiyun #include <linux/mm.h>
11*4882a593Smuzhiyun #include <linux/kernel.h>
12*4882a593Smuzhiyun #include <linux/interrupt.h>
13*4882a593Smuzhiyun #include <linux/perf_event.h>
14*4882a593Smuzhiyun #include <linux/signal.h>
15*4882a593Smuzhiyun #include <linux/uaccess.h>
16*4882a593Smuzhiyun
17*4882a593Smuzhiyun #include <asm/ptrace.h>
18*4882a593Smuzhiyun #include <asm/tlbflush.h>
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun #include "../kernel/head.h"
21*4882a593Smuzhiyun
no_context(struct pt_regs * regs,unsigned long addr)22*4882a593Smuzhiyun static inline void no_context(struct pt_regs *regs, unsigned long addr)
23*4882a593Smuzhiyun {
24*4882a593Smuzhiyun /* Are we prepared to handle this kernel fault? */
25*4882a593Smuzhiyun if (fixup_exception(regs))
26*4882a593Smuzhiyun return;
27*4882a593Smuzhiyun
28*4882a593Smuzhiyun /*
29*4882a593Smuzhiyun * Oops. The kernel tried to access some bad page. We'll have to
30*4882a593Smuzhiyun * terminate things with extreme prejudice.
31*4882a593Smuzhiyun */
32*4882a593Smuzhiyun bust_spinlocks(1);
33*4882a593Smuzhiyun pr_alert("Unable to handle kernel %s at virtual address " REG_FMT "\n",
34*4882a593Smuzhiyun (addr < PAGE_SIZE) ? "NULL pointer dereference" :
35*4882a593Smuzhiyun "paging request", addr);
36*4882a593Smuzhiyun die(regs, "Oops");
37*4882a593Smuzhiyun do_exit(SIGKILL);
38*4882a593Smuzhiyun }
39*4882a593Smuzhiyun
mm_fault_error(struct pt_regs * regs,unsigned long addr,vm_fault_t fault)40*4882a593Smuzhiyun static inline void mm_fault_error(struct pt_regs *regs, unsigned long addr, vm_fault_t fault)
41*4882a593Smuzhiyun {
42*4882a593Smuzhiyun if (fault & VM_FAULT_OOM) {
43*4882a593Smuzhiyun /*
44*4882a593Smuzhiyun * We ran out of memory, call the OOM killer, and return the userspace
45*4882a593Smuzhiyun * (which will retry the fault, or kill us if we got oom-killed).
46*4882a593Smuzhiyun */
47*4882a593Smuzhiyun if (!user_mode(regs)) {
48*4882a593Smuzhiyun no_context(regs, addr);
49*4882a593Smuzhiyun return;
50*4882a593Smuzhiyun }
51*4882a593Smuzhiyun pagefault_out_of_memory();
52*4882a593Smuzhiyun return;
53*4882a593Smuzhiyun } else if (fault & VM_FAULT_SIGBUS) {
54*4882a593Smuzhiyun /* Kernel mode? Handle exceptions or die */
55*4882a593Smuzhiyun if (!user_mode(regs)) {
56*4882a593Smuzhiyun no_context(regs, addr);
57*4882a593Smuzhiyun return;
58*4882a593Smuzhiyun }
59*4882a593Smuzhiyun do_trap(regs, SIGBUS, BUS_ADRERR, addr);
60*4882a593Smuzhiyun return;
61*4882a593Smuzhiyun }
62*4882a593Smuzhiyun BUG();
63*4882a593Smuzhiyun }
64*4882a593Smuzhiyun
bad_area(struct pt_regs * regs,struct mm_struct * mm,int code,unsigned long addr)65*4882a593Smuzhiyun static inline void bad_area(struct pt_regs *regs, struct mm_struct *mm, int code, unsigned long addr)
66*4882a593Smuzhiyun {
67*4882a593Smuzhiyun /*
68*4882a593Smuzhiyun * Something tried to access memory that isn't in our memory map.
69*4882a593Smuzhiyun * Fix it, but check if it's kernel or user first.
70*4882a593Smuzhiyun */
71*4882a593Smuzhiyun mmap_read_unlock(mm);
72*4882a593Smuzhiyun /* User mode accesses just cause a SIGSEGV */
73*4882a593Smuzhiyun if (user_mode(regs)) {
74*4882a593Smuzhiyun do_trap(regs, SIGSEGV, code, addr);
75*4882a593Smuzhiyun return;
76*4882a593Smuzhiyun }
77*4882a593Smuzhiyun
78*4882a593Smuzhiyun no_context(regs, addr);
79*4882a593Smuzhiyun }
80*4882a593Smuzhiyun
vmalloc_fault(struct pt_regs * regs,int code,unsigned long addr)81*4882a593Smuzhiyun static inline void vmalloc_fault(struct pt_regs *regs, int code, unsigned long addr)
82*4882a593Smuzhiyun {
83*4882a593Smuzhiyun pgd_t *pgd, *pgd_k;
84*4882a593Smuzhiyun pud_t *pud, *pud_k;
85*4882a593Smuzhiyun p4d_t *p4d, *p4d_k;
86*4882a593Smuzhiyun pmd_t *pmd, *pmd_k;
87*4882a593Smuzhiyun pte_t *pte_k;
88*4882a593Smuzhiyun int index;
89*4882a593Smuzhiyun unsigned long pfn;
90*4882a593Smuzhiyun
91*4882a593Smuzhiyun /* User mode accesses just cause a SIGSEGV */
92*4882a593Smuzhiyun if (user_mode(regs))
93*4882a593Smuzhiyun return do_trap(regs, SIGSEGV, code, addr);
94*4882a593Smuzhiyun
95*4882a593Smuzhiyun /*
96*4882a593Smuzhiyun * Synchronize this task's top level page-table
97*4882a593Smuzhiyun * with the 'reference' page table.
98*4882a593Smuzhiyun *
99*4882a593Smuzhiyun * Do _not_ use "tsk->active_mm->pgd" here.
100*4882a593Smuzhiyun * We might be inside an interrupt in the middle
101*4882a593Smuzhiyun * of a task switch.
102*4882a593Smuzhiyun */
103*4882a593Smuzhiyun index = pgd_index(addr);
104*4882a593Smuzhiyun pfn = csr_read(CSR_SATP) & SATP_PPN;
105*4882a593Smuzhiyun pgd = (pgd_t *)pfn_to_virt(pfn) + index;
106*4882a593Smuzhiyun pgd_k = init_mm.pgd + index;
107*4882a593Smuzhiyun
108*4882a593Smuzhiyun if (!pgd_present(*pgd_k)) {
109*4882a593Smuzhiyun no_context(regs, addr);
110*4882a593Smuzhiyun return;
111*4882a593Smuzhiyun }
112*4882a593Smuzhiyun set_pgd(pgd, *pgd_k);
113*4882a593Smuzhiyun
114*4882a593Smuzhiyun p4d = p4d_offset(pgd, addr);
115*4882a593Smuzhiyun p4d_k = p4d_offset(pgd_k, addr);
116*4882a593Smuzhiyun if (!p4d_present(*p4d_k)) {
117*4882a593Smuzhiyun no_context(regs, addr);
118*4882a593Smuzhiyun return;
119*4882a593Smuzhiyun }
120*4882a593Smuzhiyun
121*4882a593Smuzhiyun pud = pud_offset(p4d, addr);
122*4882a593Smuzhiyun pud_k = pud_offset(p4d_k, addr);
123*4882a593Smuzhiyun if (!pud_present(*pud_k)) {
124*4882a593Smuzhiyun no_context(regs, addr);
125*4882a593Smuzhiyun return;
126*4882a593Smuzhiyun }
127*4882a593Smuzhiyun
128*4882a593Smuzhiyun /*
129*4882a593Smuzhiyun * Since the vmalloc area is global, it is unnecessary
130*4882a593Smuzhiyun * to copy individual PTEs
131*4882a593Smuzhiyun */
132*4882a593Smuzhiyun pmd = pmd_offset(pud, addr);
133*4882a593Smuzhiyun pmd_k = pmd_offset(pud_k, addr);
134*4882a593Smuzhiyun if (!pmd_present(*pmd_k)) {
135*4882a593Smuzhiyun no_context(regs, addr);
136*4882a593Smuzhiyun return;
137*4882a593Smuzhiyun }
138*4882a593Smuzhiyun set_pmd(pmd, *pmd_k);
139*4882a593Smuzhiyun
140*4882a593Smuzhiyun /*
141*4882a593Smuzhiyun * Make sure the actual PTE exists as well to
142*4882a593Smuzhiyun * catch kernel vmalloc-area accesses to non-mapped
143*4882a593Smuzhiyun * addresses. If we don't do this, this will just
144*4882a593Smuzhiyun * silently loop forever.
145*4882a593Smuzhiyun */
146*4882a593Smuzhiyun pte_k = pte_offset_kernel(pmd_k, addr);
147*4882a593Smuzhiyun if (!pte_present(*pte_k)) {
148*4882a593Smuzhiyun no_context(regs, addr);
149*4882a593Smuzhiyun return;
150*4882a593Smuzhiyun }
151*4882a593Smuzhiyun
152*4882a593Smuzhiyun /*
153*4882a593Smuzhiyun * The kernel assumes that TLBs don't cache invalid
154*4882a593Smuzhiyun * entries, but in RISC-V, SFENCE.VMA specifies an
155*4882a593Smuzhiyun * ordering constraint, not a cache flush; it is
156*4882a593Smuzhiyun * necessary even after writing invalid entries.
157*4882a593Smuzhiyun */
158*4882a593Smuzhiyun local_flush_tlb_page(addr);
159*4882a593Smuzhiyun }
160*4882a593Smuzhiyun
access_error(unsigned long cause,struct vm_area_struct * vma)161*4882a593Smuzhiyun static inline bool access_error(unsigned long cause, struct vm_area_struct *vma)
162*4882a593Smuzhiyun {
163*4882a593Smuzhiyun switch (cause) {
164*4882a593Smuzhiyun case EXC_INST_PAGE_FAULT:
165*4882a593Smuzhiyun if (!(vma->vm_flags & VM_EXEC)) {
166*4882a593Smuzhiyun return true;
167*4882a593Smuzhiyun }
168*4882a593Smuzhiyun break;
169*4882a593Smuzhiyun case EXC_LOAD_PAGE_FAULT:
170*4882a593Smuzhiyun /* Write implies read */
171*4882a593Smuzhiyun if (!(vma->vm_flags & (VM_READ | VM_WRITE))) {
172*4882a593Smuzhiyun return true;
173*4882a593Smuzhiyun }
174*4882a593Smuzhiyun break;
175*4882a593Smuzhiyun case EXC_STORE_PAGE_FAULT:
176*4882a593Smuzhiyun if (!(vma->vm_flags & VM_WRITE)) {
177*4882a593Smuzhiyun return true;
178*4882a593Smuzhiyun }
179*4882a593Smuzhiyun break;
180*4882a593Smuzhiyun default:
181*4882a593Smuzhiyun panic("%s: unhandled cause %lu", __func__, cause);
182*4882a593Smuzhiyun }
183*4882a593Smuzhiyun return false;
184*4882a593Smuzhiyun }
185*4882a593Smuzhiyun
186*4882a593Smuzhiyun /*
187*4882a593Smuzhiyun * This routine handles page faults. It determines the address and the
188*4882a593Smuzhiyun * problem, and then passes it off to one of the appropriate routines.
189*4882a593Smuzhiyun */
do_page_fault(struct pt_regs * regs)190*4882a593Smuzhiyun asmlinkage void do_page_fault(struct pt_regs *regs)
191*4882a593Smuzhiyun {
192*4882a593Smuzhiyun struct task_struct *tsk;
193*4882a593Smuzhiyun struct vm_area_struct *vma;
194*4882a593Smuzhiyun struct mm_struct *mm;
195*4882a593Smuzhiyun unsigned long addr, cause;
196*4882a593Smuzhiyun unsigned int flags = FAULT_FLAG_DEFAULT;
197*4882a593Smuzhiyun int code = SEGV_MAPERR;
198*4882a593Smuzhiyun vm_fault_t fault;
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun cause = regs->cause;
201*4882a593Smuzhiyun addr = regs->badaddr;
202*4882a593Smuzhiyun
203*4882a593Smuzhiyun tsk = current;
204*4882a593Smuzhiyun mm = tsk->mm;
205*4882a593Smuzhiyun
206*4882a593Smuzhiyun /*
207*4882a593Smuzhiyun * Fault-in kernel-space virtual memory on-demand.
208*4882a593Smuzhiyun * The 'reference' page table is init_mm.pgd.
209*4882a593Smuzhiyun *
210*4882a593Smuzhiyun * NOTE! We MUST NOT take any locks for this case. We may
211*4882a593Smuzhiyun * be in an interrupt or a critical region, and should
212*4882a593Smuzhiyun * only copy the information from the master page table,
213*4882a593Smuzhiyun * nothing more.
214*4882a593Smuzhiyun */
215*4882a593Smuzhiyun if (unlikely((addr >= VMALLOC_START) && (addr <= VMALLOC_END))) {
216*4882a593Smuzhiyun vmalloc_fault(regs, code, addr);
217*4882a593Smuzhiyun return;
218*4882a593Smuzhiyun }
219*4882a593Smuzhiyun
220*4882a593Smuzhiyun /* Enable interrupts if they were enabled in the parent context. */
221*4882a593Smuzhiyun if (likely(regs->status & SR_PIE))
222*4882a593Smuzhiyun local_irq_enable();
223*4882a593Smuzhiyun
224*4882a593Smuzhiyun /*
225*4882a593Smuzhiyun * If we're in an interrupt, have no user context, or are running
226*4882a593Smuzhiyun * in an atomic region, then we must not take the fault.
227*4882a593Smuzhiyun */
228*4882a593Smuzhiyun if (unlikely(faulthandler_disabled() || !mm)) {
229*4882a593Smuzhiyun no_context(regs, addr);
230*4882a593Smuzhiyun return;
231*4882a593Smuzhiyun }
232*4882a593Smuzhiyun
233*4882a593Smuzhiyun if (user_mode(regs))
234*4882a593Smuzhiyun flags |= FAULT_FLAG_USER;
235*4882a593Smuzhiyun
236*4882a593Smuzhiyun perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, addr);
237*4882a593Smuzhiyun
238*4882a593Smuzhiyun if (cause == EXC_STORE_PAGE_FAULT)
239*4882a593Smuzhiyun flags |= FAULT_FLAG_WRITE;
240*4882a593Smuzhiyun else if (cause == EXC_INST_PAGE_FAULT)
241*4882a593Smuzhiyun flags |= FAULT_FLAG_INSTRUCTION;
242*4882a593Smuzhiyun retry:
243*4882a593Smuzhiyun mmap_read_lock(mm);
244*4882a593Smuzhiyun vma = find_vma(mm, addr);
245*4882a593Smuzhiyun if (unlikely(!vma)) {
246*4882a593Smuzhiyun bad_area(regs, mm, code, addr);
247*4882a593Smuzhiyun return;
248*4882a593Smuzhiyun }
249*4882a593Smuzhiyun if (likely(vma->vm_start <= addr))
250*4882a593Smuzhiyun goto good_area;
251*4882a593Smuzhiyun if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) {
252*4882a593Smuzhiyun bad_area(regs, mm, code, addr);
253*4882a593Smuzhiyun return;
254*4882a593Smuzhiyun }
255*4882a593Smuzhiyun if (unlikely(expand_stack(vma, addr))) {
256*4882a593Smuzhiyun bad_area(regs, mm, code, addr);
257*4882a593Smuzhiyun return;
258*4882a593Smuzhiyun }
259*4882a593Smuzhiyun
260*4882a593Smuzhiyun /*
261*4882a593Smuzhiyun * Ok, we have a good vm_area for this memory access, so
262*4882a593Smuzhiyun * we can handle it.
263*4882a593Smuzhiyun */
264*4882a593Smuzhiyun good_area:
265*4882a593Smuzhiyun code = SEGV_ACCERR;
266*4882a593Smuzhiyun
267*4882a593Smuzhiyun if (unlikely(access_error(cause, vma))) {
268*4882a593Smuzhiyun bad_area(regs, mm, code, addr);
269*4882a593Smuzhiyun return;
270*4882a593Smuzhiyun }
271*4882a593Smuzhiyun
272*4882a593Smuzhiyun /*
273*4882a593Smuzhiyun * If for any reason at all we could not handle the fault,
274*4882a593Smuzhiyun * make sure we exit gracefully rather than endlessly redo
275*4882a593Smuzhiyun * the fault.
276*4882a593Smuzhiyun */
277*4882a593Smuzhiyun fault = handle_mm_fault(vma, addr, flags, regs);
278*4882a593Smuzhiyun
279*4882a593Smuzhiyun /*
280*4882a593Smuzhiyun * If we need to retry but a fatal signal is pending, handle the
281*4882a593Smuzhiyun * signal first. We do not need to release the mmap_lock because it
282*4882a593Smuzhiyun * would already be released in __lock_page_or_retry in mm/filemap.c.
283*4882a593Smuzhiyun */
284*4882a593Smuzhiyun if (fault_signal_pending(fault, regs))
285*4882a593Smuzhiyun return;
286*4882a593Smuzhiyun
287*4882a593Smuzhiyun if (unlikely((fault & VM_FAULT_RETRY) && (flags & FAULT_FLAG_ALLOW_RETRY))) {
288*4882a593Smuzhiyun flags |= FAULT_FLAG_TRIED;
289*4882a593Smuzhiyun
290*4882a593Smuzhiyun /*
291*4882a593Smuzhiyun * No need to mmap_read_unlock(mm) as we would
292*4882a593Smuzhiyun * have already released it in __lock_page_or_retry
293*4882a593Smuzhiyun * in mm/filemap.c.
294*4882a593Smuzhiyun */
295*4882a593Smuzhiyun goto retry;
296*4882a593Smuzhiyun }
297*4882a593Smuzhiyun
298*4882a593Smuzhiyun mmap_read_unlock(mm);
299*4882a593Smuzhiyun
300*4882a593Smuzhiyun if (unlikely(fault & VM_FAULT_ERROR)) {
301*4882a593Smuzhiyun mm_fault_error(regs, addr, fault);
302*4882a593Smuzhiyun return;
303*4882a593Smuzhiyun }
304*4882a593Smuzhiyun return;
305*4882a593Smuzhiyun }
306