2 * MMU fault handling support.
4 * Copyright (C) 1998-2002 Hewlett-Packard Co
5 * David Mosberger-Tang <davidm@hpl.hp.com>
7 #include <linux/sched.h>
8 #include <linux/kernel.h>
10 #include <linux/interrupt.h>
11 #include <linux/kprobes.h>
12 #include <linux/kdebug.h>
14 #include <asm/pgtable.h>
15 #include <asm/processor.h>
16 #include <asm/system.h>
17 #include <asm/uaccess.h>
19 extern void die (char *, struct pt_regs
*, long);
22 static inline int notify_page_fault(struct pt_regs
*regs
, int trap
)
26 if (!user_mode(regs
)) {
27 /* kprobe_running() needs smp_processor_id() */
29 if (kprobe_running() && kprobes_fault_handler(regs
, trap
))
37 static inline int notify_page_fault(struct pt_regs
*regs
, int trap
)
44 * Return TRUE if ADDRESS points at a page in the kernel's mapped segment
45 * (inside region 5, on ia64) and that page is present.
48 mapped_kernel_page_is_present (unsigned long address
)
55 pgd
= pgd_offset_k(address
);
56 if (pgd_none(*pgd
) || pgd_bad(*pgd
))
59 pud
= pud_offset(pgd
, address
);
60 if (pud_none(*pud
) || pud_bad(*pud
))
63 pmd
= pmd_offset(pud
, address
);
64 if (pmd_none(*pmd
) || pmd_bad(*pmd
))
67 ptep
= pte_offset_kernel(pmd
, address
);
72 return pte_present(pte
);
76 ia64_do_page_fault (unsigned long address
, unsigned long isr
, struct pt_regs
*regs
)
78 int signal
= SIGSEGV
, code
= SEGV_MAPERR
;
79 struct vm_area_struct
*vma
, *prev_vma
;
80 struct mm_struct
*mm
= current
->mm
;
84 /* mmap_sem is performance critical.... */
85 prefetchw(&mm
->mmap_sem
);
88 * If we're in an interrupt or have no user context, we must not take the fault..
90 if (in_atomic() || !mm
)
93 #ifdef CONFIG_VIRTUAL_MEM_MAP
95 * If fault is in region 5 and we are in the kernel, we may already
96 * have the mmap_sem (pfn_valid macro is called during mmap). There
97 * is no vma for region 5 addr's anyway, so skip getting the semaphore
98 * and go directly to the exception handling code.
101 if ((REGION_NUMBER(address
) == 5) && !user_mode(regs
))
106 * This is to handle the kprobes on user space access instructions
108 if (notify_page_fault(regs
, TRAP_BRKPT
))
111 down_read(&mm
->mmap_sem
);
113 vma
= find_vma_prev(mm
, address
, &prev_vma
);
117 /* find_vma_prev() returns vma such that address < vma->vm_end or NULL */
118 if (address
< vma
->vm_start
)
119 goto check_expansion
;
124 /* OK, we've got a good vm_area for this memory area. Check the access permissions: */
126 # define VM_READ_BIT 0
127 # define VM_WRITE_BIT 1
128 # define VM_EXEC_BIT 2
130 # if (((1 << VM_READ_BIT) != VM_READ || (1 << VM_WRITE_BIT) != VM_WRITE) \
131 || (1 << VM_EXEC_BIT) != VM_EXEC)
132 # error File is out of sync with <linux/mm.h>. Please update.
135 if (((isr
>> IA64_ISR_R_BIT
) & 1UL) && (!(vma
->vm_flags
& (VM_READ
| VM_WRITE
))))
138 mask
= ( (((isr
>> IA64_ISR_X_BIT
) & 1UL) << VM_EXEC_BIT
)
139 | (((isr
>> IA64_ISR_W_BIT
) & 1UL) << VM_WRITE_BIT
));
141 if ((vma
->vm_flags
& mask
) != mask
)
146 * If for any reason at all we couldn't handle the fault, make
147 * sure we exit gracefully rather than endlessly redo the
150 switch (handle_mm_fault(mm
, vma
, address
, (mask
& VM_WRITE
) != 0)) {
157 case VM_FAULT_SIGBUS
:
159 * We ran out of memory, or some other thing happened
160 * to us that made us unable to handle the page fault
170 up_read(&mm
->mmap_sem
);
174 if (!(prev_vma
&& (prev_vma
->vm_flags
& VM_GROWSUP
) && (address
== prev_vma
->vm_end
))) {
175 if (!(vma
->vm_flags
& VM_GROWSDOWN
))
177 if (REGION_NUMBER(address
) != REGION_NUMBER(vma
->vm_start
)
178 || REGION_OFFSET(address
) >= RGN_MAP_LIMIT
)
180 if (expand_stack(vma
, address
))
184 if (REGION_NUMBER(address
) != REGION_NUMBER(vma
->vm_start
)
185 || REGION_OFFSET(address
) >= RGN_MAP_LIMIT
)
188 * Since the register backing store is accessed sequentially,
189 * we disallow growing it by more than a page at a time.
191 if (address
> vma
->vm_end
+ PAGE_SIZE
- sizeof(long))
193 if (expand_upwards(vma
, address
))
199 up_read(&mm
->mmap_sem
);
200 #ifdef CONFIG_VIRTUAL_MEM_MAP
203 if ((isr
& IA64_ISR_SP
)
204 || ((isr
& IA64_ISR_NA
) && (isr
& IA64_ISR_CODE_MASK
) == IA64_ISR_CODE_LFETCH
))
207 * This fault was due to a speculative load or lfetch.fault, set the "ed"
208 * bit in the psr to ensure forward progress. (Target register will get a
209 * NaT for ld.s, lfetch will be canceled.)
211 ia64_psr(regs
)->ed
= 1;
214 if (user_mode(regs
)) {
215 si
.si_signo
= signal
;
218 si
.si_addr
= (void __user
*) address
;
220 si
.si_flags
= __ISR_VALID
;
221 force_sig_info(signal
, &si
, current
);
226 if ((isr
& IA64_ISR_SP
)
227 || ((isr
& IA64_ISR_NA
) && (isr
& IA64_ISR_CODE_MASK
) == IA64_ISR_CODE_LFETCH
))
230 * This fault was due to a speculative load or lfetch.fault, set the "ed"
231 * bit in the psr to ensure forward progress. (Target register will get a
232 * NaT for ld.s, lfetch will be canceled.)
234 ia64_psr(regs
)->ed
= 1;
239 * Since we have no vma's for region 5, we might get here even if the address is
240 * valid, due to the VHPT walker inserting a non present translation that becomes
241 * stale. If that happens, the non present fault handler already purged the stale
242 * translation, which fixed the problem. So, we check to see if the translation is
243 * valid, and return if it is.
245 if (REGION_NUMBER(address
) == 5 && mapped_kernel_page_is_present(address
))
248 if (ia64_done_with_exception(regs
))
252 * Oops. The kernel tried to access some bad page. We'll have to terminate things
253 * with extreme prejudice.
257 if (address
< PAGE_SIZE
)
258 printk(KERN_ALERT
"Unable to handle kernel NULL pointer dereference (address %016lx)\n", address
);
260 printk(KERN_ALERT
"Unable to handle kernel paging request at "
261 "virtual address %016lx\n", address
);
262 die("Oops", regs
, isr
);
268 up_read(&mm
->mmap_sem
);
269 if (is_init(current
)) {
271 down_read(&mm
->mmap_sem
);
274 printk(KERN_CRIT
"VM: killing process %s\n", current
->comm
);