cregit-Linux how code gets into the kernel

Release 4.14 arch/um/kernel/trap.c

Directory: arch/um/kernel
/*
 * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
 * Licensed under the GPL
 */

#include <linux/mm.h>
#include <linux/sched/signal.h>
#include <linux/hardirq.h>
#include <linux/module.h>
#include <linux/uaccess.h>
#include <linux/sched/debug.h>
#include <asm/current.h>
#include <asm/pgtable.h>
#include <asm/tlbflush.h>
#include <arch.h>
#include <as-layout.h>
#include <kern_util.h>
#include <os.h>
#include <skas.h>

/*
 * Note this is constrained to return 0, -EFAULT, -EACCESS, -ENOMEM by
 * segv().
 */

int handle_page_fault(unsigned long address, unsigned long ip, int is_write, int is_user, int *code_out) { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; pgd_t *pgd; pud_t *pud; pmd_t *pmd; pte_t *pte; int err = -EFAULT; unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE; *code_out = SEGV_MAPERR; /* * If the fault was with pagefaults disabled, don't take the fault, just * fail. */ if (faulthandler_disabled()) goto out_nosemaphore; if (is_user) flags |= FAULT_FLAG_USER; retry: down_read(&mm->mmap_sem); vma = find_vma(mm, address); if (!vma) goto out; else if (vma->vm_start <= address) goto good_area; else if (!(vma->vm_flags & VM_GROWSDOWN)) goto out; else if (is_user && !ARCH_IS_STACKGROW(address)) goto out; else if (expand_stack(vma, address)) goto out; good_area: *code_out = SEGV_ACCERR; if (is_write) { if (!(vma->vm_flags & VM_WRITE)) goto out; flags |= FAULT_FLAG_WRITE; } else { /* Don't require VM_READ|VM_EXEC for write faults! */ if (!(vma->vm_flags & (VM_READ | VM_EXEC))) goto out; } do { int fault; fault = handle_mm_fault(vma, address, flags); if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current)) goto out_nosemaphore; if (unlikely(fault & VM_FAULT_ERROR)) { if (fault & VM_FAULT_OOM) { goto out_of_memory; } else if (fault & VM_FAULT_SIGSEGV) { goto out; } else if (fault & VM_FAULT_SIGBUS) { err = -EACCES; goto out; } BUG(); } if (flags & FAULT_FLAG_ALLOW_RETRY) { if (fault & VM_FAULT_MAJOR) current->maj_flt++; else current->min_flt++; if (fault & VM_FAULT_RETRY) { flags &= ~FAULT_FLAG_ALLOW_RETRY; flags |= FAULT_FLAG_TRIED; goto retry; } } pgd = pgd_offset(mm, address); pud = pud_offset(pgd, address); pmd = pmd_offset(pud, address); pte = pte_offset_kernel(pmd, address); } while (!pte_present(*pte)); err = 0; /* * The below warning was added in place of * pte_mkyoung(); if (is_write) pte_mkdirty(); * If it's triggered, we'd see normally a hang here (a clean pte is * marked read-only to emulate the dirty bit). * However, the generic code can mark a PTE writable but clean on a * concurrent read fault, triggering this harmlessly. So comment it out. */ #if 0 WARN_ON(!pte_young(*pte) || (is_write && !pte_dirty(*pte))); #endif flush_tlb_page(vma, address); out: up_read(&mm->mmap_sem); out_nosemaphore: return err; out_of_memory: /* * We ran out of memory, call the OOM killer, and return the userspace * (which will retry the fault, or kill us if we got oom-killed). */ up_read(&mm->mmap_sem); if (!is_user) goto out_nosemaphore; pagefault_out_of_memory(); return 0; }

Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike26858.39%731.82%
Nicholas Piggin5612.20%29.09%
Kautuk Consul5111.11%14.55%
Johannes Weiner286.10%29.09%
Paolo 'Blaisorblade' Giarrusso265.66%627.27%
Bodo Stroesser122.61%14.55%
Linus Torvalds122.61%14.55%
Shaohua Li40.87%14.55%
David Hildenbrand20.44%14.55%
Total459100.00%22100.00%

EXPORT_SYMBOL(handle_page_fault);
static void show_segv_info(struct uml_pt_regs *regs) { struct task_struct *tsk = current; struct faultinfo *fi = UPT_FAULTINFO(regs); if (!unhandled_signal(tsk, SIGSEGV)) return; if (!printk_ratelimit()) return; printk("%s%s[%d]: segfault at %lx ip %p sp %p error %x", task_pid_nr(tsk) > 1 ? KERN_INFO : KERN_EMERG, tsk->comm, task_pid_nr(tsk), FAULT_ADDRESS(*fi), (void *)UPT_IP(regs), (void *)UPT_SP(regs), fi->error_code); print_vma_addr(KERN_CONT " in ", UPT_IP(regs)); printk(KERN_CONT "\n"); }

Contributors

PersonTokensPropCommitsCommitProp
Richard Weinberger116100.00%1100.00%
Total116100.00%1100.00%


static void bad_segv(struct faultinfo fi, unsigned long ip) { struct siginfo si; si.si_signo = SIGSEGV; si.si_code = SEGV_ACCERR; si.si_addr = (void __user *) FAULT_ADDRESS(fi); current->thread.arch.faultinfo = fi; force_sig_info(SIGSEGV, &si, current); }

Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike64100.00%1100.00%
Total64100.00%1100.00%


void fatal_sigsegv(void) { force_sigsegv(SIGSEGV, current); do_signal(&current->thread.regs); /* * This is to tell gcc that we're not returning - do_signal * can, in general, return, but in this case, it's not, since * we just got a fatal SIGSEGV queued. */ os_dump_core(); }

Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike2071.43%150.00%
Ingo Molnar828.57%150.00%
Total28100.00%2100.00%

/** * segv_handler() - the SIGSEGV handler * @sig: the signal number * @unused_si: the signal info struct; unused in this handler * @regs: the ptrace register information * * The handler first extracts the faultinfo from the UML ptrace regs struct. * If the userfault did not happen in an UML userspace process, bad_segv is called. * Otherwise the signal did happen in a cloned userspace process, handle it. */
void segv_handler(int sig, struct siginfo *unused_si, struct uml_pt_regs *regs) { struct faultinfo * fi = UPT_FAULTINFO(regs); if (UPT_IS_USER(regs) && !SEGV_IS_FIXABLE(fi)) { show_segv_info(regs); bad_segv(*fi, UPT_IP(regs)); return; } segv(*fi, UPT_IP(regs), UPT_IS_USER(regs), regs); }

Contributors

PersonTokensPropCommitsCommitProp
Gennady Sharapov6785.90%125.00%
Richard Weinberger56.41%125.00%
Martin Pärtel56.41%125.00%
Jeff Dike11.28%125.00%
Total78100.00%4100.00%

/* * We give a *copy* of the faultinfo in the regs to segv. * This must be done, since nesting SEGVs could overwrite * the info in the regs. A pointer to the info then would * give us bad data! */
unsigned long segv(struct faultinfo fi, unsigned long ip, int is_user, struct uml_pt_regs *regs) { struct siginfo si; jmp_buf *catcher; int err; int is_write = FAULT_WRITE(fi); unsigned long address = FAULT_ADDRESS(fi); if (!is_user && regs) current->thread.segv_regs = container_of(regs, struct pt_regs, regs); if (!is_user && (address >= start_vm) && (address < end_vm)) { flush_tlb_kernel_vm(); goto out; } else if (current->mm == NULL) { show_regs(container_of(regs, struct pt_regs, regs)); panic("Segfault with no mm"); } else if (!is_user && address > PAGE_SIZE && address < TASK_SIZE) { show_regs(container_of(regs, struct pt_regs, regs)); panic("Kernel tried to access user memory at addr 0x%lx, ip 0x%lx", address, ip); } if (SEGV_IS_FIXABLE(&fi)) err = handle_page_fault(address, ip, is_write, is_user, &si.si_code); else { err = -EFAULT; /* * A thread accessed NULL, we get a fault, but CR2 is invalid. * This code is used in __do_copy_from_user() of TT mode. * XXX tt mode is gone, so maybe this isn't needed any more */ address = 0; } catcher = current->thread.fault_catcher; if (!err) goto out; else if (catcher != NULL) { current->thread.fault_addr = (void *) address; UML_LONGJMP(catcher, 1); } else if (current->thread.fault_addr != NULL) panic("fault_addr set but no fault catcher"); else if (!is_user && arch_fixup(ip, regs)) goto out; if (!is_user) { show_regs(container_of(regs, struct pt_regs, regs)); panic("Kernel mode fault at addr 0x%lx, ip 0x%lx", address, ip); } show_segv_info(regs); if (err == -EACCES) { si.si_signo = SIGBUS; si.si_errno = 0; si.si_code = BUS_ADRERR; si.si_addr = (void __user *)address; current->thread.arch.faultinfo = fi; force_sig_info(SIGBUS, &si, current); } else { BUG_ON(err != -EFAULT); si.si_signo = SIGSEGV; si.si_addr = (void __user *) address; current->thread.arch.faultinfo = fi; force_sig_info(SIGSEGV, &si, current); } out: if (regs) current->thread.segv_regs = NULL; return 0; }

Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike27963.84%844.44%
Richard Weinberger8920.37%527.78%
Bodo Stroesser368.24%15.56%
Paolo 'Blaisorblade' Giarrusso317.09%316.67%
Al Viro20.46%15.56%
Total437100.00%18100.00%


void relay_signal(int sig, struct siginfo *si, struct uml_pt_regs *regs) { struct faultinfo *fi; struct siginfo clean_si; if (!UPT_IS_USER(regs)) { if (sig == SIGBUS) printk(KERN_ERR "Bus error - the host /dev/shm or /tmp " "mount likely just ran out of space\n"); panic("Kernel mode signal %d", sig); } arch_examine_signal(sig, regs); memset(&clean_si, 0, sizeof(clean_si)); clean_si.si_signo = si->si_signo; clean_si.si_errno = si->si_errno; clean_si.si_code = si->si_code; switch (sig) { case SIGILL: case SIGFPE: case SIGSEGV: case SIGBUS: case SIGTRAP: fi = UPT_FAULTINFO(regs); clean_si.si_addr = (void __user *) FAULT_ADDRESS(*fi); current->thread.arch.faultinfo = *fi; #ifdef __ARCH_SI_TRAPNO clean_si.si_trapno = si->si_trapno; #endif break; default: printk(KERN_ERR "Attempted to relay unknown signal %d (si_code = %d)\n", sig, si->si_code); } force_sig_info(sig, &clean_si, current); }

Contributors

PersonTokensPropCommitsCommitProp
Martin Pärtel12464.58%112.50%
Jeff Dike5629.17%675.00%
Bodo Stroesser126.25%112.50%
Total192100.00%8100.00%


void bus_handler(int sig, struct siginfo *si, struct uml_pt_regs *regs) { if (current->thread.fault_catcher != NULL) UML_LONGJMP(current->thread.fault_catcher, 1); else relay_signal(sig, si, regs); }

Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike4285.71%480.00%
Martin Pärtel714.29%120.00%
Total49100.00%5100.00%


void winch(int sig, struct siginfo *unused_si, struct uml_pt_regs *regs) { do_IRQ(WINCH_IRQ, regs); }

Contributors

PersonTokensPropCommitsCommitProp
Paolo 'Blaisorblade' Giarrusso1976.00%133.33%
Martin Pärtel520.00%133.33%
Jeff Dike14.00%133.33%
Total25100.00%3100.00%


void trap_init(void) { }

Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike6100.00%1100.00%
Total6100.00%1100.00%


Overall Contributors

PersonTokensPropCommitsCommitProp
Jeff Dike76050.50%1936.54%
Richard Weinberger21013.95%59.62%
Martin Pärtel1419.37%11.92%
Paolo 'Blaisorblade' Giarrusso785.18%815.38%
Gennady Sharapov714.72%11.92%
Bodo Stroesser614.05%23.85%
Nicholas Piggin563.72%23.85%
Kautuk Consul513.39%11.92%
Johannes Weiner281.86%23.85%
Al Viro151.00%35.77%
Ingo Molnar120.80%35.77%
Linus Torvalds120.80%11.92%
Shaohua Li40.27%11.92%
Peter Zijlstra30.20%11.92%
David Hildenbrand20.13%11.92%
Thomas Meyer10.07%11.92%
Total1505100.00%52100.00%
Directory: arch/um/kernel
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.