1 // SPDX-License-Identifier: GPL-2.0
2 // Copyright (C) 2018 Hangzhou C-SKY Microsystems co.,ltd.
4 #include <linux/signal.h>
5 #include <linux/module.h>
6 #include <linux/sched.h>
7 #include <linux/interrupt.h>
8 #include <linux/kernel.h>
9 #include <linux/errno.h>
10 #include <linux/string.h>
11 #include <linux/types.h>
12 #include <linux/ptrace.h>
13 #include <linux/mman.h>
15 #include <linux/smp.h>
16 #include <linux/version.h>
17 #include <linux/vt_kern.h>
18 #include <linux/extable.h>
19 #include <linux/uaccess.h>
20 #include <linux/perf_event.h>
21 #include <linux/kprobes.h>
23 #include <asm/hardirq.h>
24 #include <asm/mmu_context.h>
25 #include <asm/traps.h>
28 int fixup_exception(struct pt_regs
*regs
)
30 const struct exception_table_entry
*fixup
;
32 fixup
= search_exception_tables(instruction_pointer(regs
));
34 regs
->pc
= fixup
->nextinsn
;
43 * This routine handles page faults. It determines the address,
44 * and the problem, and then passes it off to one of the appropriate
47 asmlinkage
void do_page_fault(struct pt_regs
*regs
, unsigned long write
,
48 unsigned long mmu_meh
)
50 struct vm_area_struct
*vma
= NULL
;
51 struct task_struct
*tsk
= current
;
52 struct mm_struct
*mm
= tsk
->mm
;
55 unsigned long address
= mmu_meh
& PAGE_MASK
;
57 if (kprobe_page_fault(regs
, tsk
->thread
.trap_no
))
60 si_code
= SEGV_MAPERR
;
62 #ifndef CONFIG_CPU_HAS_TLBI
64 * We fault-in kernel-space virtual memory on-demand. The
65 * 'reference' page table is init_mm.pgd.
67 * NOTE! We MUST NOT take any locks for this case. We may
68 * be in an interrupt or a critical region, and should
69 * only copy the information from the master page table,
72 if (unlikely(address
>= VMALLOC_START
) &&
73 unlikely(address
<= VMALLOC_END
)) {
75 * Synchronize this task's top level page-table
76 * with the 'reference' page table.
78 * Do _not_ use "tsk" here. We might be inside
79 * an interrupt in the middle of a task switch..
81 int offset
= pgd_index(address
);
87 unsigned long pgd_base
;
89 pgd_base
= (unsigned long)__va(get_pgd());
90 pgd
= (pgd_t
*)pgd_base
+ offset
;
91 pgd_k
= init_mm
.pgd
+ offset
;
93 if (!pgd_present(*pgd_k
))
98 pud_k
= (pud_t
*)pgd_k
;
99 if (!pud_present(*pud_k
))
102 pmd
= pmd_offset(pud
, address
);
103 pmd_k
= pmd_offset(pud_k
, address
);
104 if (!pmd_present(*pmd_k
))
106 set_pmd(pmd
, *pmd_k
);
108 pte_k
= pte_offset_kernel(pmd_k
, address
);
109 if (!pte_present(*pte_k
))
115 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS
, 1, regs
, address
);
117 * If we're in an interrupt or have no user
118 * context, we must not take the fault..
120 if (in_atomic() || !mm
)
121 goto bad_area_nosemaphore
;
124 vma
= find_vma(mm
, address
);
127 if (vma
->vm_start
<= address
)
129 if (!(vma
->vm_flags
& VM_GROWSDOWN
))
131 if (expand_stack(vma
, address
))
134 * Ok, we have a good vm_area for this memory access, so
138 si_code
= SEGV_ACCERR
;
141 if (!(vma
->vm_flags
& VM_WRITE
))
144 if (unlikely(!vma_is_accessible(vma
)))
149 * If for any reason at all we couldn't handle the fault,
150 * make sure we exit gracefully rather than endlessly redo
153 fault
= handle_mm_fault(vma
, address
, write
? FAULT_FLAG_WRITE
: 0,
155 if (unlikely(fault
& VM_FAULT_ERROR
)) {
156 if (fault
& VM_FAULT_OOM
)
158 else if (fault
& VM_FAULT_SIGBUS
)
160 else if (fault
& VM_FAULT_SIGSEGV
)
164 mmap_read_unlock(mm
);
168 * Something tried to access memory that isn't in our memory map..
169 * Fix it, but check if it's kernel or user first..
172 mmap_read_unlock(mm
);
174 bad_area_nosemaphore
:
175 /* User mode accesses just cause a SIGSEGV */
176 if (user_mode(regs
)) {
177 tsk
->thread
.trap_no
= trap_no(regs
);
178 force_sig_fault(SIGSEGV
, si_code
, (void __user
*)address
);
183 tsk
->thread
.trap_no
= trap_no(regs
);
185 /* Are we prepared to handle this kernel fault? */
186 if (fixup_exception(regs
))
190 * Oops. The kernel tried to access some bad page. We'll have to
191 * terminate things with extreme prejudice.
194 pr_alert("Unable to handle kernel paging request at virtual "
195 "address 0x%08lx, pc: 0x%08lx\n", address
, regs
->pc
);
199 tsk
->thread
.trap_no
= trap_no(regs
);
202 * We ran out of memory, call the OOM killer, and return the userspace
203 * (which will retry the fault, or kill us if we got oom-killed).
205 pagefault_out_of_memory();
209 tsk
->thread
.trap_no
= trap_no(regs
);
211 mmap_read_unlock(mm
);
213 /* Kernel mode? Handle exceptions or die */
214 if (!user_mode(regs
))
217 force_sig_fault(SIGBUS
, BUS_ADRERR
, (void __user
*)address
);