root/arch/hexagon/mm/vm_fault.c
// SPDX-License-Identifier: GPL-2.0-only
/*
 * Memory fault handling for Hexagon
 *
 * Copyright (c) 2010-2011, The Linux Foundation. All rights reserved.
 */

/*
 * Page fault handling for the Hexagon Virtual Machine.
 * Can also be called by a native port emulating the HVM
 * execptions.
 */

#include <asm/traps.h>
#include <asm/vm_fault.h>
#include <linux/uaccess.h>
#include <linux/mm.h>
#include <linux/sched/signal.h>
#include <linux/signal.h>
#include <linux/extable.h>
#include <linux/hardirq.h>
#include <linux/perf_event.h>

/*
 * Decode of hardware exception sends us to one of several
 * entry points.  At each, we generate canonical arguments
 * for handling by the abstract memory management code.
 */
#define FLT_IFETCH     -1
#define FLT_LOAD        0
#define FLT_STORE       1


/*
 * Canonical page fault handler
 */
static void do_page_fault(unsigned long address, long cause, struct pt_regs *regs)
{
        struct vm_area_struct *vma;
        struct mm_struct *mm = current->mm;
        int si_signo;
        int si_code = SEGV_MAPERR;
        vm_fault_t fault;
        const struct exception_table_entry *fixup;
        unsigned int flags = FAULT_FLAG_DEFAULT;

        /*
         * If we're in an interrupt or have no user context,
         * then must not take the fault.
         */
        if (unlikely(in_interrupt() || !mm))
                goto no_context;

        local_irq_enable();

        if (user_mode(regs))
                flags |= FAULT_FLAG_USER;

        perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
retry:
        vma = lock_mm_and_find_vma(mm, address, regs);
        if (unlikely(!vma))
                goto bad_area_nosemaphore;

        /* Address space is OK.  Now check access rights. */
        si_code = SEGV_ACCERR;

        switch (cause) {
        case FLT_IFETCH:
                if (!(vma->vm_flags & VM_EXEC))
                        goto bad_area;
                break;
        case FLT_LOAD:
                if (!(vma->vm_flags & VM_READ))
                        goto bad_area;
                break;
        case FLT_STORE:
                if (!(vma->vm_flags & VM_WRITE))
                        goto bad_area;
                flags |= FAULT_FLAG_WRITE;
                break;
        }

        fault = handle_mm_fault(vma, address, flags, regs);

        if (fault_signal_pending(fault, regs)) {
                if (!user_mode(regs))
                        goto no_context;
                return;
        }

        /* The fault is fully completed (including releasing mmap lock) */
        if (fault & VM_FAULT_COMPLETED)
                return;

        /* The most common case -- we are done. */
        if (likely(!(fault & VM_FAULT_ERROR))) {
                if (fault & VM_FAULT_RETRY) {
                        flags |= FAULT_FLAG_TRIED;
                        goto retry;
                }

                mmap_read_unlock(mm);
                return;
        }

        mmap_read_unlock(mm);

        /* Handle copyin/out exception cases */
        if (!user_mode(regs))
                goto no_context;

        if (fault & VM_FAULT_OOM) {
                pagefault_out_of_memory();
                return;
        }

        /* User-mode address is in the memory map, but we are
         * unable to fix up the page fault.
         */
        if (fault & VM_FAULT_SIGBUS) {
                si_signo = SIGBUS;
                si_code = BUS_ADRERR;
        }
        /* Address is not in the memory map */
        else {
                si_signo = SIGSEGV;
                si_code  = SEGV_ACCERR;
        }
        force_sig_fault(si_signo, si_code, (void __user *)address);
        return;

bad_area:
        mmap_read_unlock(mm);

bad_area_nosemaphore:
        if (user_mode(regs)) {
                force_sig_fault(SIGSEGV, si_code, (void __user *)address);
                return;
        }
        /* Kernel-mode fault falls through */

no_context:
        fixup = search_exception_tables(pt_elr(regs));
        if (fixup) {
                pt_set_elr(regs, fixup->fixup);
                return;
        }

        /* Things are looking very, very bad now */
        bust_spinlocks(1);
        printk(KERN_EMERG "Unable to handle kernel paging request at "
                "virtual address 0x%08lx, regs %p\n", address, regs);
        die("Bad Kernel VA", regs, SIGKILL);
}


void read_protection_fault(struct pt_regs *regs)
{
        unsigned long badvadr = pt_badva(regs);

        do_page_fault(badvadr, FLT_LOAD, regs);
}

void write_protection_fault(struct pt_regs *regs)
{
        unsigned long badvadr = pt_badva(regs);

        do_page_fault(badvadr, FLT_STORE, regs);
}

void execute_protection_fault(struct pt_regs *regs)
{
        unsigned long badvadr = pt_badva(regs);

        do_page_fault(badvadr, FLT_IFETCH, regs);
}