fault_32.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480
  1. /*
  2. * fault.c: Page fault handlers for the Sparc.
  3. *
  4. * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)
  5. * Copyright (C) 1996 Eddie C. Dost (ecd@skynet.be)
  6. * Copyright (C) 1997 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
  7. */
  8. #include <asm/head.h>
  9. #include <linux/string.h>
  10. #include <linux/types.h>
  11. #include <linux/sched.h>
  12. #include <linux/ptrace.h>
  13. #include <linux/mman.h>
  14. #include <linux/threads.h>
  15. #include <linux/kernel.h>
  16. #include <linux/signal.h>
  17. #include <linux/mm.h>
  18. #include <linux/smp.h>
  19. #include <linux/perf_event.h>
  20. #include <linux/interrupt.h>
  21. #include <linux/kdebug.h>
  22. #include <asm/page.h>
  23. #include <asm/pgtable.h>
  24. #include <asm/openprom.h>
  25. #include <asm/oplib.h>
  26. #include <asm/smp.h>
  27. #include <asm/traps.h>
  28. #include <asm/uaccess.h>
  29. int show_unhandled_signals = 1;
  30. /* At boot time we determine these two values necessary for setting
  31. * up the segment maps and page table entries (pte's).
  32. */
  33. int num_contexts;
  34. /* Return how much physical memory we have. */
  35. unsigned long probe_memory(void)
  36. {
  37. unsigned long total = 0;
  38. int i;
  39. for (i = 0; sp_banks[i].num_bytes; i++)
  40. total += sp_banks[i].num_bytes;
  41. return total;
  42. }
  43. static void unhandled_fault(unsigned long, struct task_struct *,
  44. struct pt_regs *) __attribute__ ((noreturn));
  45. static void __noreturn unhandled_fault(unsigned long address,
  46. struct task_struct *tsk,
  47. struct pt_regs *regs)
  48. {
  49. if ((unsigned long) address < PAGE_SIZE) {
  50. printk(KERN_ALERT
  51. "Unable to handle kernel NULL pointer dereference\n");
  52. } else {
  53. printk(KERN_ALERT "Unable to handle kernel paging request at virtual address %08lx\n",
  54. address);
  55. }
  56. printk(KERN_ALERT "tsk->{mm,active_mm}->context = %08lx\n",
  57. (tsk->mm ? tsk->mm->context : tsk->active_mm->context));
  58. printk(KERN_ALERT "tsk->{mm,active_mm}->pgd = %08lx\n",
  59. (tsk->mm ? (unsigned long) tsk->mm->pgd :
  60. (unsigned long) tsk->active_mm->pgd));
  61. die_if_kernel("Oops", regs);
  62. }
  63. asmlinkage int lookup_fault(unsigned long pc, unsigned long ret_pc,
  64. unsigned long address)
  65. {
  66. struct pt_regs regs;
  67. unsigned long g2;
  68. unsigned int insn;
  69. int i;
  70. i = search_extables_range(ret_pc, &g2);
  71. switch (i) {
  72. case 3:
  73. /* load & store will be handled by fixup */
  74. return 3;
  75. case 1:
  76. /* store will be handled by fixup, load will bump out */
  77. /* for _to_ macros */
  78. insn = *((unsigned int *) pc);
  79. if ((insn >> 21) & 1)
  80. return 1;
  81. break;
  82. case 2:
  83. /* load will be handled by fixup, store will bump out */
  84. /* for _from_ macros */
  85. insn = *((unsigned int *) pc);
  86. if (!((insn >> 21) & 1) || ((insn>>19)&0x3f) == 15)
  87. return 2;
  88. break;
  89. default:
  90. break;
  91. }
  92. memset(&regs, 0, sizeof(regs));
  93. regs.pc = pc;
  94. regs.npc = pc + 4;
  95. __asm__ __volatile__(
  96. "rd %%psr, %0\n\t"
  97. "nop\n\t"
  98. "nop\n\t"
  99. "nop\n" : "=r" (regs.psr));
  100. unhandled_fault(address, current, &regs);
  101. /* Not reached */
  102. return 0;
  103. }
  104. static inline void
  105. show_signal_msg(struct pt_regs *regs, int sig, int code,
  106. unsigned long address, struct task_struct *tsk)
  107. {
  108. if (!unhandled_signal(tsk, sig))
  109. return;
  110. if (!printk_ratelimit())
  111. return;
  112. printk("%s%s[%d]: segfault at %lx ip %p (rpc %p) sp %p error %x",
  113. task_pid_nr(tsk) > 1 ? KERN_INFO : KERN_EMERG,
  114. tsk->comm, task_pid_nr(tsk), address,
  115. (void *)regs->pc, (void *)regs->u_regs[UREG_I7],
  116. (void *)regs->u_regs[UREG_FP], code);
  117. print_vma_addr(KERN_CONT " in ", regs->pc);
  118. printk(KERN_CONT "\n");
  119. }
  120. static void __do_fault_siginfo(int code, int sig, struct pt_regs *regs,
  121. unsigned long addr)
  122. {
  123. siginfo_t info;
  124. info.si_signo = sig;
  125. info.si_code = code;
  126. info.si_errno = 0;
  127. info.si_addr = (void __user *) addr;
  128. info.si_trapno = 0;
  129. if (unlikely(show_unhandled_signals))
  130. show_signal_msg(regs, sig, info.si_code,
  131. addr, current);
  132. force_sig_info (sig, &info, current);
  133. }
  134. extern unsigned long safe_compute_effective_address(struct pt_regs *,
  135. unsigned int);
  136. static unsigned long compute_si_addr(struct pt_regs *regs, int text_fault)
  137. {
  138. unsigned int insn;
  139. if (text_fault)
  140. return regs->pc;
  141. if (regs->psr & PSR_PS)
  142. insn = *(unsigned int *) regs->pc;
  143. else
  144. __get_user(insn, (unsigned int *) regs->pc);
  145. return safe_compute_effective_address(regs, insn);
  146. }
  147. static noinline void do_fault_siginfo(int code, int sig, struct pt_regs *regs,
  148. int text_fault)
  149. {
  150. unsigned long addr = compute_si_addr(regs, text_fault);
  151. __do_fault_siginfo(code, sig, regs, addr);
  152. }
  153. asmlinkage void do_sparc_fault(struct pt_regs *regs, int text_fault, int write,
  154. unsigned long address)
  155. {
  156. struct vm_area_struct *vma;
  157. struct task_struct *tsk = current;
  158. struct mm_struct *mm = tsk->mm;
  159. unsigned int fixup;
  160. unsigned long g2;
  161. int from_user = !(regs->psr & PSR_PS);
  162. int fault, code;
  163. unsigned int flags = (FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE |
  164. (write ? FAULT_FLAG_WRITE : 0));
  165. if (text_fault)
  166. address = regs->pc;
  167. /*
  168. * We fault-in kernel-space virtual memory on-demand. The
  169. * 'reference' page table is init_mm.pgd.
  170. *
  171. * NOTE! We MUST NOT take any locks for this case. We may
  172. * be in an interrupt or a critical region, and should
  173. * only copy the information from the master page table,
  174. * nothing more.
  175. */
  176. code = SEGV_MAPERR;
  177. if (address >= TASK_SIZE)
  178. goto vmalloc_fault;
  179. /*
  180. * If we're in an interrupt or have no user
  181. * context, we must not take the fault..
  182. */
  183. if (in_atomic() || !mm)
  184. goto no_context;
  185. perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
  186. retry:
  187. down_read(&mm->mmap_sem);
  188. if (!from_user && address >= PAGE_OFFSET)
  189. goto bad_area;
  190. vma = find_vma(mm, address);
  191. if (!vma)
  192. goto bad_area;
  193. if (vma->vm_start <= address)
  194. goto good_area;
  195. if (!(vma->vm_flags & VM_GROWSDOWN))
  196. goto bad_area;
  197. if (expand_stack(vma, address))
  198. goto bad_area;
  199. /*
  200. * Ok, we have a good vm_area for this memory access, so
  201. * we can handle it..
  202. */
  203. good_area:
  204. code = SEGV_ACCERR;
  205. if (write) {
  206. if (!(vma->vm_flags & VM_WRITE))
  207. goto bad_area;
  208. } else {
  209. /* Allow reads even for write-only mappings */
  210. if (!(vma->vm_flags & (VM_READ | VM_EXEC)))
  211. goto bad_area;
  212. }
  213. /*
  214. * If for any reason at all we couldn't handle the fault,
  215. * make sure we exit gracefully rather than endlessly redo
  216. * the fault.
  217. */
  218. fault = handle_mm_fault(mm, vma, address, flags);
  219. if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current))
  220. return;
  221. if (unlikely(fault & VM_FAULT_ERROR)) {
  222. if (fault & VM_FAULT_OOM)
  223. goto out_of_memory;
  224. else if (fault & VM_FAULT_SIGBUS)
  225. goto do_sigbus;
  226. BUG();
  227. }
  228. if (flags & FAULT_FLAG_ALLOW_RETRY) {
  229. if (fault & VM_FAULT_MAJOR) {
  230. current->maj_flt++;
  231. perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ,
  232. 1, regs, address);
  233. } else {
  234. current->min_flt++;
  235. perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN,
  236. 1, regs, address);
  237. }
  238. if (fault & VM_FAULT_RETRY) {
  239. flags &= ~FAULT_FLAG_ALLOW_RETRY;
  240. /* No need to up_read(&mm->mmap_sem) as we would
  241. * have already released it in __lock_page_or_retry
  242. * in mm/filemap.c.
  243. */
  244. goto retry;
  245. }
  246. }
  247. up_read(&mm->mmap_sem);
  248. return;
  249. /*
  250. * Something tried to access memory that isn't in our memory map..
  251. * Fix it, but check if it's kernel or user first..
  252. */
  253. bad_area:
  254. up_read(&mm->mmap_sem);
  255. bad_area_nosemaphore:
  256. /* User mode accesses just cause a SIGSEGV */
  257. if (from_user) {
  258. do_fault_siginfo(code, SIGSEGV, regs, text_fault);
  259. return;
  260. }
  261. /* Is this in ex_table? */
  262. no_context:
  263. g2 = regs->u_regs[UREG_G2];
  264. if (!from_user) {
  265. fixup = search_extables_range(regs->pc, &g2);
  266. /* Values below 10 are reserved for other things */
  267. if (fixup > 10) {
  268. extern const unsigned __memset_start[];
  269. extern const unsigned __memset_end[];
  270. extern const unsigned __csum_partial_copy_start[];
  271. extern const unsigned __csum_partial_copy_end[];
  272. #ifdef DEBUG_EXCEPTIONS
  273. printk("Exception: PC<%08lx> faddr<%08lx>\n",
  274. regs->pc, address);
  275. printk("EX_TABLE: insn<%08lx> fixup<%08x> g2<%08lx>\n",
  276. regs->pc, fixup, g2);
  277. #endif
  278. if ((regs->pc >= (unsigned long)__memset_start &&
  279. regs->pc < (unsigned long)__memset_end) ||
  280. (regs->pc >= (unsigned long)__csum_partial_copy_start &&
  281. regs->pc < (unsigned long)__csum_partial_copy_end)) {
  282. regs->u_regs[UREG_I4] = address;
  283. regs->u_regs[UREG_I5] = regs->pc;
  284. }
  285. regs->u_regs[UREG_G2] = g2;
  286. regs->pc = fixup;
  287. regs->npc = regs->pc + 4;
  288. return;
  289. }
  290. }
  291. unhandled_fault(address, tsk, regs);
  292. do_exit(SIGKILL);
  293. /*
  294. * We ran out of memory, or some other thing happened to us that made
  295. * us unable to handle the page fault gracefully.
  296. */
  297. out_of_memory:
  298. up_read(&mm->mmap_sem);
  299. if (from_user) {
  300. pagefault_out_of_memory();
  301. return;
  302. }
  303. goto no_context;
  304. do_sigbus:
  305. up_read(&mm->mmap_sem);
  306. do_fault_siginfo(BUS_ADRERR, SIGBUS, regs, text_fault);
  307. if (!from_user)
  308. goto no_context;
  309. vmalloc_fault:
  310. {
  311. /*
  312. * Synchronize this task's top level page-table
  313. * with the 'reference' page table.
  314. */
  315. int offset = pgd_index(address);
  316. pgd_t *pgd, *pgd_k;
  317. pmd_t *pmd, *pmd_k;
  318. pgd = tsk->active_mm->pgd + offset;
  319. pgd_k = init_mm.pgd + offset;
  320. if (!pgd_present(*pgd)) {
  321. if (!pgd_present(*pgd_k))
  322. goto bad_area_nosemaphore;
  323. pgd_val(*pgd) = pgd_val(*pgd_k);
  324. return;
  325. }
  326. pmd = pmd_offset(pgd, address);
  327. pmd_k = pmd_offset(pgd_k, address);
  328. if (pmd_present(*pmd) || !pmd_present(*pmd_k))
  329. goto bad_area_nosemaphore;
  330. *pmd = *pmd_k;
  331. return;
  332. }
  333. }
  334. /* This always deals with user addresses. */
  335. static void force_user_fault(unsigned long address, int write)
  336. {
  337. struct vm_area_struct *vma;
  338. struct task_struct *tsk = current;
  339. struct mm_struct *mm = tsk->mm;
  340. int code;
  341. code = SEGV_MAPERR;
  342. down_read(&mm->mmap_sem);
  343. vma = find_vma(mm, address);
  344. if (!vma)
  345. goto bad_area;
  346. if (vma->vm_start <= address)
  347. goto good_area;
  348. if (!(vma->vm_flags & VM_GROWSDOWN))
  349. goto bad_area;
  350. if (expand_stack(vma, address))
  351. goto bad_area;
  352. good_area:
  353. code = SEGV_ACCERR;
  354. if (write) {
  355. if (!(vma->vm_flags & VM_WRITE))
  356. goto bad_area;
  357. } else {
  358. if (!(vma->vm_flags & (VM_READ | VM_EXEC)))
  359. goto bad_area;
  360. }
  361. switch (handle_mm_fault(mm, vma, address, write ? FAULT_FLAG_WRITE : 0)) {
  362. case VM_FAULT_SIGBUS:
  363. case VM_FAULT_OOM:
  364. goto do_sigbus;
  365. }
  366. up_read(&mm->mmap_sem);
  367. return;
  368. bad_area:
  369. up_read(&mm->mmap_sem);
  370. __do_fault_siginfo(code, SIGSEGV, tsk->thread.kregs, address);
  371. return;
  372. do_sigbus:
  373. up_read(&mm->mmap_sem);
  374. __do_fault_siginfo(BUS_ADRERR, SIGBUS, tsk->thread.kregs, address);
  375. }
  376. static void check_stack_aligned(unsigned long sp)
  377. {
  378. if (sp & 0x7UL)
  379. force_sig(SIGILL, current);
  380. }
  381. void window_overflow_fault(void)
  382. {
  383. unsigned long sp;
  384. sp = current_thread_info()->rwbuf_stkptrs[0];
  385. if (((sp + 0x38) & PAGE_MASK) != (sp & PAGE_MASK))
  386. force_user_fault(sp + 0x38, 1);
  387. force_user_fault(sp, 1);
  388. check_stack_aligned(sp);
  389. }
  390. void window_underflow_fault(unsigned long sp)
  391. {
  392. if (((sp + 0x38) & PAGE_MASK) != (sp & PAGE_MASK))
  393. force_user_fault(sp + 0x38, 0);
  394. force_user_fault(sp, 0);
  395. check_stack_aligned(sp);
  396. }
  397. void window_ret_fault(struct pt_regs *regs)
  398. {
  399. unsigned long sp;
  400. sp = regs->u_regs[UREG_FP];
  401. if (((sp + 0x38) & PAGE_MASK) != (sp & PAGE_MASK))
  402. force_user_fault(sp + 0x38, 0);
  403. force_user_fault(sp, 0);
  404. check_stack_aligned(sp);
  405. }