aboutsummaryrefslogtreecommitdiff
path: root/sys/arm64
diff options
context:
space:
mode:
authorAndrew Turner <andrew@FreeBSD.org>2018-05-30 15:25:48 +0000
committerAndrew Turner <andrew@FreeBSD.org>2018-05-30 15:25:48 +0000
commite2b8bf0a18a5e97ba1c0050b82d0327ad415ce29 (patch)
treea98f9dc0ea54196338848e6ac4f23d0379cbeda9 /sys/arm64
parentb98d2b35dff9bff4380986818b0c6d93a751752c (diff)
downloadsrc-e2b8bf0a18a5e97ba1c0050b82d0327ad415ce29.tar.gz
src-e2b8bf0a18a5e97ba1c0050b82d0327ad415ce29.zip
Further limit when we call pmap_fault.
We should only call pmap_fault in the kernel when accessing a userspace address. As this should always happen through specific functions that set a fault handler we can use this to limit calls to pmap_fault to when this is set. This should help with NULL pointer dereferences when we are unable to sleep so we fall into the correct case. Sponsored by: DARPA, AFRL
Notes
Notes: svn path=/head/; revision=334385
Diffstat (limited to 'sys/arm64')
-rw-r--r--sys/arm64/arm64/trap.c30
1 files changed, 23 insertions, 7 deletions
diff --git a/sys/arm64/arm64/trap.c b/sys/arm64/arm64/trap.c
index 54f116f2f7b0..22d21bde4cf4 100644
--- a/sys/arm64/arm64/trap.c
+++ b/sys/arm64/arm64/trap.c
@@ -190,16 +190,32 @@ data_abort(struct thread *td, struct trapframe *frame, uint64_t esr,
}
/*
- * We may fault from userspace or when in a DMAP region due to
- * a superpage being unmapped when the access took place. In these
- * cases we need to wait for the pmap to be unlocked and check
- * if the translation is still invalid.
+ * The call to pmap_fault can be dangerous when coming from the
+ * kernel as it may be not be able to lock the pmap to check if
+ * the address is now valid. Because of this we filter the cases
+ * when we are not going to see superpage activity.
*/
- if (map != kernel_map || VIRT_IN_DMAP(far)) {
- if (pmap_fault(map->pmap, esr, far) == KERN_SUCCESS)
- return;
+ if (!lower) {
+ /*
+ * We may fault in a DMAP region due to a superpage being
+ * unmapped when the access took place.
+ */
+ if (map == kernel_map && !VIRT_IN_DMAP(far))
+ goto no_pmap_fault;
+ /*
+ * We can also fault in the userspace handling functions,
+ * e.g. copyin. In these cases we will have set a fault
+ * handler so we can check if this is set before calling
+ * pmap_fault.
+ */
+ if (map != kernel_map && pcb->pcb_onfault == 0)
+ goto no_pmap_fault;
}
+ if (pmap_fault(map->pmap, esr, far) == KERN_SUCCESS)
+ return;
+
+no_pmap_fault:
KASSERT(td->td_md.md_spinlock_count == 0,
("data abort with spinlock held"));
if (td->td_critnest != 0 || WITNESS_CHECK(WARN_SLEEPOK |