1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) 4 */ 5 6 #include <linux/mm.h> 7 #include <linux/sched/signal.h> 8 #include <linux/hardirq.h> 9 #include <linux/module.h> 10 #include <linux/uaccess.h> 11 #include <linux/sched/debug.h> 12 #include <asm/current.h> 13 #include <asm/tlbflush.h> 14 #include <arch.h> 15 #include <as-layout.h> 16 #include <kern_util.h> 17 #include <os.h> 18 #include <skas.h> 19 20 /* 21 * Note this is constrained to return 0, -EFAULT, -EACCES, -ENOMEM by 22 * segv(). 23 */ 24 int handle_page_fault(unsigned long address, unsigned long ip, 25 int is_write, int is_user, int *code_out) 26 { 27 struct mm_struct *mm = current->mm; 28 struct vm_area_struct *vma; 29 pmd_t *pmd; 30 pte_t *pte; 31 int err = -EFAULT; 32 unsigned int flags = FAULT_FLAG_DEFAULT; 33 34 *code_out = SEGV_MAPERR; 35 36 /* 37 * If the fault was with pagefaults disabled, don't take the fault, just 38 * fail. 39 */ 40 if (faulthandler_disabled()) 41 goto out_nosemaphore; 42 43 if (is_user) 44 flags |= FAULT_FLAG_USER; 45 retry: 46 mmap_read_lock(mm); 47 vma = find_vma(mm, address); 48 if (!vma) 49 goto out; 50 else if (vma->vm_start <= address) 51 goto good_area; 52 else if (!(vma->vm_flags & VM_GROWSDOWN)) 53 goto out; 54 else if (is_user && !ARCH_IS_STACKGROW(address)) 55 goto out; 56 else if (expand_stack(vma, address)) 57 goto out; 58 59 good_area: 60 *code_out = SEGV_ACCERR; 61 if (is_write) { 62 if (!(vma->vm_flags & VM_WRITE)) 63 goto out; 64 flags |= FAULT_FLAG_WRITE; 65 } else { 66 /* Don't require VM_READ|VM_EXEC for write faults! */ 67 if (!(vma->vm_flags & (VM_READ | VM_EXEC))) 68 goto out; 69 } 70 71 do { 72 vm_fault_t fault; 73 74 fault = handle_mm_fault(vma, address, flags, NULL); 75 76 if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current)) 77 goto out_nosemaphore; 78 79 if (unlikely(fault & VM_FAULT_ERROR)) { 80 if (fault & VM_FAULT_OOM) { 81 goto out_of_memory; 82 } else if (fault & VM_FAULT_SIGSEGV) { 83 goto out; 84 } else if (fault & VM_FAULT_SIGBUS) { 85 err = -EACCES; 86 goto out; 87 } 88 BUG(); 89 } 90 if (fault & VM_FAULT_RETRY) { 91 flags |= FAULT_FLAG_TRIED; 92 93 goto retry; 94 } 95 96 pmd = pmd_off(mm, address); 97 pte = pte_offset_kernel(pmd, address); 98 } while (!pte_present(*pte)); 99 err = 0; 100 /* 101 * The below warning was added in place of 102 * pte_mkyoung(); if (is_write) pte_mkdirty(); 103 * If it's triggered, we'd see normally a hang here (a clean pte is 104 * marked read-only to emulate the dirty bit). 105 * However, the generic code can mark a PTE writable but clean on a 106 * concurrent read fault, triggering this harmlessly. So comment it out. 107 */ 108 #if 0 109 WARN_ON(!pte_young(*pte) || (is_write && !pte_dirty(*pte))); 110 #endif 111 flush_tlb_page(vma, address); 112 out: 113 mmap_read_unlock(mm); 114 out_nosemaphore: 115 return err; 116 117 out_of_memory: 118 /* 119 * We ran out of memory, call the OOM killer, and return the userspace 120 * (which will retry the fault, or kill us if we got oom-killed). 121 */ 122 mmap_read_unlock(mm); 123 if (!is_user) 124 goto out_nosemaphore; 125 pagefault_out_of_memory(); 126 return 0; 127 } 128 EXPORT_SYMBOL(handle_page_fault); 129 130 static void show_segv_info(struct uml_pt_regs *regs) 131 { 132 struct task_struct *tsk = current; 133 struct faultinfo *fi = UPT_FAULTINFO(regs); 134 135 if (!unhandled_signal(tsk, SIGSEGV)) 136 return; 137 138 if (!printk_ratelimit()) 139 return; 140 141 printk("%s%s[%d]: segfault at %lx ip %px sp %px error %x", 142 task_pid_nr(tsk) > 1 ? KERN_INFO : KERN_EMERG, 143 tsk->comm, task_pid_nr(tsk), FAULT_ADDRESS(*fi), 144 (void *)UPT_IP(regs), (void *)UPT_SP(regs), 145 fi->error_code); 146 147 print_vma_addr(KERN_CONT " in ", UPT_IP(regs)); 148 printk(KERN_CONT "\n"); 149 } 150 151 static void bad_segv(struct faultinfo fi, unsigned long ip) 152 { 153 current->thread.arch.faultinfo = fi; 154 force_sig_fault(SIGSEGV, SEGV_ACCERR, (void __user *) FAULT_ADDRESS(fi)); 155 } 156 157 void fatal_sigsegv(void) 158 { 159 force_fatal_sig(SIGSEGV); 160 do_signal(¤t->thread.regs); 161 /* 162 * This is to tell gcc that we're not returning - do_signal 163 * can, in general, return, but in this case, it's not, since 164 * we just got a fatal SIGSEGV queued. 165 */ 166 os_dump_core(); 167 } 168 169 /** 170 * segv_handler() - the SIGSEGV handler 171 * @sig: the signal number 172 * @unused_si: the signal info struct; unused in this handler 173 * @regs: the ptrace register information 174 * 175 * The handler first extracts the faultinfo from the UML ptrace regs struct. 176 * If the userfault did not happen in an UML userspace process, bad_segv is called. 177 * Otherwise the signal did happen in a cloned userspace process, handle it. 178 */ 179 void segv_handler(int sig, struct siginfo *unused_si, struct uml_pt_regs *regs) 180 { 181 struct faultinfo * fi = UPT_FAULTINFO(regs); 182 183 if (UPT_IS_USER(regs) && !SEGV_IS_FIXABLE(fi)) { 184 show_segv_info(regs); 185 bad_segv(*fi, UPT_IP(regs)); 186 return; 187 } 188 segv(*fi, UPT_IP(regs), UPT_IS_USER(regs), regs); 189 } 190 191 /* 192 * We give a *copy* of the faultinfo in the regs to segv. 193 * This must be done, since nesting SEGVs could overwrite 194 * the info in the regs. A pointer to the info then would 195 * give us bad data! 196 */ 197 unsigned long segv(struct faultinfo fi, unsigned long ip, int is_user, 198 struct uml_pt_regs *regs) 199 { 200 jmp_buf *catcher; 201 int si_code; 202 int err; 203 int is_write = FAULT_WRITE(fi); 204 unsigned long address = FAULT_ADDRESS(fi); 205 206 if (!is_user && regs) 207 current->thread.segv_regs = container_of(regs, struct pt_regs, regs); 208 209 if (!is_user && (address >= start_vm) && (address < end_vm)) { 210 flush_tlb_kernel_vm(); 211 goto out; 212 } 213 else if (current->mm == NULL) { 214 show_regs(container_of(regs, struct pt_regs, regs)); 215 panic("Segfault with no mm"); 216 } 217 else if (!is_user && address > PAGE_SIZE && address < TASK_SIZE) { 218 show_regs(container_of(regs, struct pt_regs, regs)); 219 panic("Kernel tried to access user memory at addr 0x%lx, ip 0x%lx", 220 address, ip); 221 } 222 223 if (SEGV_IS_FIXABLE(&fi)) 224 err = handle_page_fault(address, ip, is_write, is_user, 225 &si_code); 226 else { 227 err = -EFAULT; 228 /* 229 * A thread accessed NULL, we get a fault, but CR2 is invalid. 230 * This code is used in __do_copy_from_user() of TT mode. 231 * XXX tt mode is gone, so maybe this isn't needed any more 232 */ 233 address = 0; 234 } 235 236 catcher = current->thread.fault_catcher; 237 if (!err) 238 goto out; 239 else if (catcher != NULL) { 240 current->thread.fault_addr = (void *) address; 241 UML_LONGJMP(catcher, 1); 242 } 243 else if (current->thread.fault_addr != NULL) 244 panic("fault_addr set but no fault catcher"); 245 else if (!is_user && arch_fixup(ip, regs)) 246 goto out; 247 248 if (!is_user) { 249 show_regs(container_of(regs, struct pt_regs, regs)); 250 panic("Kernel mode fault at addr 0x%lx, ip 0x%lx", 251 address, ip); 252 } 253 254 show_segv_info(regs); 255 256 if (err == -EACCES) { 257 current->thread.arch.faultinfo = fi; 258 force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *)address); 259 } else { 260 BUG_ON(err != -EFAULT); 261 current->thread.arch.faultinfo = fi; 262 force_sig_fault(SIGSEGV, si_code, (void __user *) address); 263 } 264 265 out: 266 if (regs) 267 current->thread.segv_regs = NULL; 268 269 return 0; 270 } 271 272 void relay_signal(int sig, struct siginfo *si, struct uml_pt_regs *regs) 273 { 274 int code, err; 275 if (!UPT_IS_USER(regs)) { 276 if (sig == SIGBUS) 277 printk(KERN_ERR "Bus error - the host /dev/shm or /tmp " 278 "mount likely just ran out of space\n"); 279 panic("Kernel mode signal %d", sig); 280 } 281 282 arch_examine_signal(sig, regs); 283 284 /* Is the signal layout for the signal known? 285 * Signal data must be scrubbed to prevent information leaks. 286 */ 287 code = si->si_code; 288 err = si->si_errno; 289 if ((err == 0) && (siginfo_layout(sig, code) == SIL_FAULT)) { 290 struct faultinfo *fi = UPT_FAULTINFO(regs); 291 current->thread.arch.faultinfo = *fi; 292 force_sig_fault(sig, code, (void __user *)FAULT_ADDRESS(*fi)); 293 } else { 294 printk(KERN_ERR "Attempted to relay unknown signal %d (si_code = %d) with errno %d\n", 295 sig, code, err); 296 force_sig(sig); 297 } 298 } 299 300 void bus_handler(int sig, struct siginfo *si, struct uml_pt_regs *regs) 301 { 302 if (current->thread.fault_catcher != NULL) 303 UML_LONGJMP(current->thread.fault_catcher, 1); 304 else 305 relay_signal(sig, si, regs); 306 } 307 308 void winch(int sig, struct siginfo *unused_si, struct uml_pt_regs *regs) 309 { 310 do_IRQ(WINCH_IRQ, regs); 311 } 312