fault_32.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. /*
  2. * fault.c: Page fault handlers for the Sparc.
  3. *
  4. * Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)
  5. * Copyright (C) 1996 Eddie C. Dost (ecd@skynet.be)
  6. * Copyright (C) 1997 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
  7. */
  8. #include <asm/head.h>
  9. #include <linux/string.h>
  10. #include <linux/types.h>
  11. #include <linux/sched.h>
  12. #include <linux/ptrace.h>
  13. #include <linux/mman.h>
  14. #include <linux/threads.h>
  15. #include <linux/kernel.h>
  16. #include <linux/signal.h>
  17. #include <linux/mm.h>
  18. #include <linux/smp.h>
  19. #include <linux/perf_event.h>
  20. #include <linux/interrupt.h>
  21. #include <linux/kdebug.h>
  22. #include <asm/page.h>
  23. #include <asm/pgtable.h>
  24. #include <asm/memreg.h>
  25. #include <asm/openprom.h>
  26. #include <asm/oplib.h>
  27. #include <asm/smp.h>
  28. #include <asm/traps.h>
  29. #include <asm/uaccess.h>
  30. extern int prom_node_root;
  31. int show_unhandled_signals = 1;
  32. /* At boot time we determine these two values necessary for setting
  33. * up the segment maps and page table entries (pte's).
  34. */
  35. int num_segmaps, num_contexts;
  36. int invalid_segment;
  37. /* various Virtual Address Cache parameters we find at boot time... */
  38. int vac_size, vac_linesize, vac_do_hw_vac_flushes;
  39. int vac_entries_per_context, vac_entries_per_segment;
  40. int vac_entries_per_page;
  41. /* Return how much physical memory we have. */
  42. unsigned long probe_memory(void)
  43. {
  44. unsigned long total = 0;
  45. int i;
  46. for (i = 0; sp_banks[i].num_bytes; i++)
  47. total += sp_banks[i].num_bytes;
  48. return total;
  49. }
  50. /* Whee, a level 15 NMI interrupt memory error. Let's have fun... */
  51. asmlinkage void sparc_lvl15_nmi(struct pt_regs *regs, unsigned long serr,
  52. unsigned long svaddr, unsigned long aerr,
  53. unsigned long avaddr)
  54. {
  55. printk("FAULT: NMI received\n");
  56. printk("SREGS: Synchronous Error %08lx\n", serr);
  57. printk(" Synchronous Vaddr %08lx\n", svaddr);
  58. printk(" Asynchronous Error %08lx\n", aerr);
  59. printk(" Asynchronous Vaddr %08lx\n", avaddr);
  60. if (sun4c_memerr_reg)
  61. printk(" Memory Parity Error %08lx\n", *sun4c_memerr_reg);
  62. printk("REGISTER DUMP:\n");
  63. show_regs(regs);
  64. prom_halt();
  65. }
  66. static void unhandled_fault(unsigned long, struct task_struct *,
  67. struct pt_regs *) __attribute__ ((noreturn));
  68. static void unhandled_fault(unsigned long address, struct task_struct *tsk,
  69. struct pt_regs *regs)
  70. {
  71. if((unsigned long) address < PAGE_SIZE) {
  72. printk(KERN_ALERT
  73. "Unable to handle kernel NULL pointer dereference\n");
  74. } else {
  75. printk(KERN_ALERT "Unable to handle kernel paging request "
  76. "at virtual address %08lx\n", address);
  77. }
  78. printk(KERN_ALERT "tsk->{mm,active_mm}->context = %08lx\n",
  79. (tsk->mm ? tsk->mm->context : tsk->active_mm->context));
  80. printk(KERN_ALERT "tsk->{mm,active_mm}->pgd = %08lx\n",
  81. (tsk->mm ? (unsigned long) tsk->mm->pgd :
  82. (unsigned long) tsk->active_mm->pgd));
  83. die_if_kernel("Oops", regs);
  84. }
  85. asmlinkage int lookup_fault(unsigned long pc, unsigned long ret_pc,
  86. unsigned long address)
  87. {
  88. struct pt_regs regs;
  89. unsigned long g2;
  90. unsigned int insn;
  91. int i;
  92. i = search_extables_range(ret_pc, &g2);
  93. switch (i) {
  94. case 3:
  95. /* load & store will be handled by fixup */
  96. return 3;
  97. case 1:
  98. /* store will be handled by fixup, load will bump out */
  99. /* for _to_ macros */
  100. insn = *((unsigned int *) pc);
  101. if ((insn >> 21) & 1)
  102. return 1;
  103. break;
  104. case 2:
  105. /* load will be handled by fixup, store will bump out */
  106. /* for _from_ macros */
  107. insn = *((unsigned int *) pc);
  108. if (!((insn >> 21) & 1) || ((insn>>19)&0x3f) == 15)
  109. return 2;
  110. break;
  111. default:
  112. break;
  113. }
  114. memset(&regs, 0, sizeof (regs));
  115. regs.pc = pc;
  116. regs.npc = pc + 4;
  117. __asm__ __volatile__(
  118. "rd %%psr, %0\n\t"
  119. "nop\n\t"
  120. "nop\n\t"
  121. "nop\n" : "=r" (regs.psr));
  122. unhandled_fault(address, current, &regs);
  123. /* Not reached */
  124. return 0;
  125. }
  126. static inline void
  127. show_signal_msg(struct pt_regs *regs, int sig, int code,
  128. unsigned long address, struct task_struct *tsk)
  129. {
  130. if (!unhandled_signal(tsk, sig))
  131. return;
  132. if (!printk_ratelimit())
  133. return;
  134. printk("%s%s[%d]: segfault at %lx ip %p (rpc %p) sp %p error %x",
  135. task_pid_nr(tsk) > 1 ? KERN_INFO : KERN_EMERG,
  136. tsk->comm, task_pid_nr(tsk), address,
  137. (void *)regs->pc, (void *)regs->u_regs[UREG_I7],
  138. (void *)regs->u_regs[UREG_FP], code);
  139. print_vma_addr(KERN_CONT " in ", regs->pc);
  140. printk(KERN_CONT "\n");
  141. }
  142. static void __do_fault_siginfo(int code, int sig, struct pt_regs *regs,
  143. unsigned long addr)
  144. {
  145. siginfo_t info;
  146. info.si_signo = sig;
  147. info.si_code = code;
  148. info.si_errno = 0;
  149. info.si_addr = (void __user *) addr;
  150. info.si_trapno = 0;
  151. if (unlikely(show_unhandled_signals))
  152. show_signal_msg(regs, sig, info.si_code,
  153. addr, current);
  154. force_sig_info (sig, &info, current);
  155. }
  156. extern unsigned long safe_compute_effective_address(struct pt_regs *,
  157. unsigned int);
  158. static unsigned long compute_si_addr(struct pt_regs *regs, int text_fault)
  159. {
  160. unsigned int insn;
  161. if (text_fault)
  162. return regs->pc;
  163. if (regs->psr & PSR_PS) {
  164. insn = *(unsigned int *) regs->pc;
  165. } else {
  166. __get_user(insn, (unsigned int *) regs->pc);
  167. }
  168. return safe_compute_effective_address(regs, insn);
  169. }
  170. static noinline void do_fault_siginfo(int code, int sig, struct pt_regs *regs,
  171. int text_fault)
  172. {
  173. unsigned long addr = compute_si_addr(regs, text_fault);
  174. __do_fault_siginfo(code, sig, regs, addr);
  175. }
  176. asmlinkage void do_sparc_fault(struct pt_regs *regs, int text_fault, int write,
  177. unsigned long address)
  178. {
  179. struct vm_area_struct *vma;
  180. struct task_struct *tsk = current;
  181. struct mm_struct *mm = tsk->mm;
  182. unsigned int fixup;
  183. unsigned long g2;
  184. int from_user = !(regs->psr & PSR_PS);
  185. int fault, code;
  186. unsigned int flags = (FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE |
  187. (write ? FAULT_FLAG_WRITE : 0));
  188. if(text_fault)
  189. address = regs->pc;
  190. /*
  191. * We fault-in kernel-space virtual memory on-demand. The
  192. * 'reference' page table is init_mm.pgd.
  193. *
  194. * NOTE! We MUST NOT take any locks for this case. We may
  195. * be in an interrupt or a critical region, and should
  196. * only copy the information from the master page table,
  197. * nothing more.
  198. */
  199. code = SEGV_MAPERR;
  200. if (!ARCH_SUN4C && address >= TASK_SIZE)
  201. goto vmalloc_fault;
  202. /*
  203. * If we're in an interrupt or have no user
  204. * context, we must not take the fault..
  205. */
  206. if (in_atomic() || !mm)
  207. goto no_context;
  208. perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
  209. retry:
  210. down_read(&mm->mmap_sem);
  211. /*
  212. * The kernel referencing a bad kernel pointer can lock up
  213. * a sun4c machine completely, so we must attempt recovery.
  214. */
  215. if(!from_user && address >= PAGE_OFFSET)
  216. goto bad_area;
  217. vma = find_vma(mm, address);
  218. if(!vma)
  219. goto bad_area;
  220. if(vma->vm_start <= address)
  221. goto good_area;
  222. if(!(vma->vm_flags & VM_GROWSDOWN))
  223. goto bad_area;
  224. if(expand_stack(vma, address))
  225. goto bad_area;
  226. /*
  227. * Ok, we have a good vm_area for this memory access, so
  228. * we can handle it..
  229. */
  230. good_area:
  231. code = SEGV_ACCERR;
  232. if(write) {
  233. if(!(vma->vm_flags & VM_WRITE))
  234. goto bad_area;
  235. } else {
  236. /* Allow reads even for write-only mappings */
  237. if(!(vma->vm_flags & (VM_READ | VM_EXEC)))
  238. goto bad_area;
  239. }
  240. /*
  241. * If for any reason at all we couldn't handle the fault,
  242. * make sure we exit gracefully rather than endlessly redo
  243. * the fault.
  244. */
  245. fault = handle_mm_fault(mm, vma, address, flags);
  246. if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current))
  247. return;
  248. if (unlikely(fault & VM_FAULT_ERROR)) {
  249. if (fault & VM_FAULT_OOM)
  250. goto out_of_memory;
  251. else if (fault & VM_FAULT_SIGBUS)
  252. goto do_sigbus;
  253. BUG();
  254. }
  255. if (flags & FAULT_FLAG_ALLOW_RETRY) {
  256. if (fault & VM_FAULT_MAJOR) {
  257. current->maj_flt++;
  258. perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ,
  259. 1, regs, address);
  260. } else {
  261. current->min_flt++;
  262. perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN,
  263. 1, regs, address);
  264. }
  265. if (fault & VM_FAULT_RETRY) {
  266. flags &= ~FAULT_FLAG_ALLOW_RETRY;
  267. /* No need to up_read(&mm->mmap_sem) as we would
  268. * have already released it in __lock_page_or_retry
  269. * in mm/filemap.c.
  270. */
  271. goto retry;
  272. }
  273. }
  274. up_read(&mm->mmap_sem);
  275. return;
  276. /*
  277. * Something tried to access memory that isn't in our memory map..
  278. * Fix it, but check if it's kernel or user first..
  279. */
  280. bad_area:
  281. up_read(&mm->mmap_sem);
  282. bad_area_nosemaphore:
  283. /* User mode accesses just cause a SIGSEGV */
  284. if (from_user) {
  285. do_fault_siginfo(code, SIGSEGV, regs, text_fault);
  286. return;
  287. }
  288. /* Is this in ex_table? */
  289. no_context:
  290. g2 = regs->u_regs[UREG_G2];
  291. if (!from_user) {
  292. fixup = search_extables_range(regs->pc, &g2);
  293. if (fixup > 10) { /* Values below are reserved for other things */
  294. extern const unsigned __memset_start[];
  295. extern const unsigned __memset_end[];
  296. extern const unsigned __csum_partial_copy_start[];
  297. extern const unsigned __csum_partial_copy_end[];
  298. #ifdef DEBUG_EXCEPTIONS
  299. printk("Exception: PC<%08lx> faddr<%08lx>\n", regs->pc, address);
  300. printk("EX_TABLE: insn<%08lx> fixup<%08x> g2<%08lx>\n",
  301. regs->pc, fixup, g2);
  302. #endif
  303. if ((regs->pc >= (unsigned long)__memset_start &&
  304. regs->pc < (unsigned long)__memset_end) ||
  305. (regs->pc >= (unsigned long)__csum_partial_copy_start &&
  306. regs->pc < (unsigned long)__csum_partial_copy_end)) {
  307. regs->u_regs[UREG_I4] = address;
  308. regs->u_regs[UREG_I5] = regs->pc;
  309. }
  310. regs->u_regs[UREG_G2] = g2;
  311. regs->pc = fixup;
  312. regs->npc = regs->pc + 4;
  313. return;
  314. }
  315. }
  316. unhandled_fault (address, tsk, regs);
  317. do_exit(SIGKILL);
  318. /*
  319. * We ran out of memory, or some other thing happened to us that made
  320. * us unable to handle the page fault gracefully.
  321. */
  322. out_of_memory:
  323. up_read(&mm->mmap_sem);
  324. if (from_user) {
  325. pagefault_out_of_memory();
  326. return;
  327. }
  328. goto no_context;
  329. do_sigbus:
  330. up_read(&mm->mmap_sem);
  331. do_fault_siginfo(BUS_ADRERR, SIGBUS, regs, text_fault);
  332. if (!from_user)
  333. goto no_context;
  334. vmalloc_fault:
  335. {
  336. /*
  337. * Synchronize this task's top level page-table
  338. * with the 'reference' page table.
  339. */
  340. int offset = pgd_index(address);
  341. pgd_t *pgd, *pgd_k;
  342. pmd_t *pmd, *pmd_k;
  343. pgd = tsk->active_mm->pgd + offset;
  344. pgd_k = init_mm.pgd + offset;
  345. if (!pgd_present(*pgd)) {
  346. if (!pgd_present(*pgd_k))
  347. goto bad_area_nosemaphore;
  348. pgd_val(*pgd) = pgd_val(*pgd_k);
  349. return;
  350. }
  351. pmd = pmd_offset(pgd, address);
  352. pmd_k = pmd_offset(pgd_k, address);
  353. if (pmd_present(*pmd) || !pmd_present(*pmd_k))
  354. goto bad_area_nosemaphore;
  355. *pmd = *pmd_k;
  356. return;
  357. }
  358. }
  359. asmlinkage void do_sun4c_fault(struct pt_regs *regs, int text_fault, int write,
  360. unsigned long address)
  361. {
  362. extern void sun4c_update_mmu_cache(struct vm_area_struct *,
  363. unsigned long,pte_t *);
  364. extern pte_t *sun4c_pte_offset_kernel(pmd_t *,unsigned long);
  365. struct task_struct *tsk = current;
  366. struct mm_struct *mm = tsk->mm;
  367. pgd_t *pgdp;
  368. pte_t *ptep;
  369. if (text_fault) {
  370. address = regs->pc;
  371. } else if (!write &&
  372. !(regs->psr & PSR_PS)) {
  373. unsigned int insn, __user *ip;
  374. ip = (unsigned int __user *)regs->pc;
  375. if (!get_user(insn, ip)) {
  376. if ((insn & 0xc1680000) == 0xc0680000)
  377. write = 1;
  378. }
  379. }
  380. if (!mm) {
  381. /* We are oopsing. */
  382. do_sparc_fault(regs, text_fault, write, address);
  383. BUG(); /* P3 Oops already, you bitch */
  384. }
  385. pgdp = pgd_offset(mm, address);
  386. ptep = sun4c_pte_offset_kernel((pmd_t *) pgdp, address);
  387. if (pgd_val(*pgdp)) {
  388. if (write) {
  389. if ((pte_val(*ptep) & (_SUN4C_PAGE_WRITE|_SUN4C_PAGE_PRESENT))
  390. == (_SUN4C_PAGE_WRITE|_SUN4C_PAGE_PRESENT)) {
  391. unsigned long flags;
  392. *ptep = __pte(pte_val(*ptep) | _SUN4C_PAGE_ACCESSED |
  393. _SUN4C_PAGE_MODIFIED |
  394. _SUN4C_PAGE_VALID |
  395. _SUN4C_PAGE_DIRTY);
  396. local_irq_save(flags);
  397. if (sun4c_get_segmap(address) != invalid_segment) {
  398. sun4c_put_pte(address, pte_val(*ptep));
  399. local_irq_restore(flags);
  400. return;
  401. }
  402. local_irq_restore(flags);
  403. }
  404. } else {
  405. if ((pte_val(*ptep) & (_SUN4C_PAGE_READ|_SUN4C_PAGE_PRESENT))
  406. == (_SUN4C_PAGE_READ|_SUN4C_PAGE_PRESENT)) {
  407. unsigned long flags;
  408. *ptep = __pte(pte_val(*ptep) | _SUN4C_PAGE_ACCESSED |
  409. _SUN4C_PAGE_VALID);
  410. local_irq_save(flags);
  411. if (sun4c_get_segmap(address) != invalid_segment) {
  412. sun4c_put_pte(address, pte_val(*ptep));
  413. local_irq_restore(flags);
  414. return;
  415. }
  416. local_irq_restore(flags);
  417. }
  418. }
  419. }
  420. /* This conditional is 'interesting'. */
  421. if (pgd_val(*pgdp) && !(write && !(pte_val(*ptep) & _SUN4C_PAGE_WRITE))
  422. && (pte_val(*ptep) & _SUN4C_PAGE_VALID))
  423. /* Note: It is safe to not grab the MMAP semaphore here because
  424. * we know that update_mmu_cache() will not sleep for
  425. * any reason (at least not in the current implementation)
  426. * and therefore there is no danger of another thread getting
  427. * on the CPU and doing a shrink_mmap() on this vma.
  428. */
  429. sun4c_update_mmu_cache (find_vma(current->mm, address), address,
  430. ptep);
  431. else
  432. do_sparc_fault(regs, text_fault, write, address);
  433. }
  434. /* This always deals with user addresses. */
  435. static void force_user_fault(unsigned long address, int write)
  436. {
  437. struct vm_area_struct *vma;
  438. struct task_struct *tsk = current;
  439. struct mm_struct *mm = tsk->mm;
  440. int code;
  441. code = SEGV_MAPERR;
  442. down_read(&mm->mmap_sem);
  443. vma = find_vma(mm, address);
  444. if(!vma)
  445. goto bad_area;
  446. if(vma->vm_start <= address)
  447. goto good_area;
  448. if(!(vma->vm_flags & VM_GROWSDOWN))
  449. goto bad_area;
  450. if(expand_stack(vma, address))
  451. goto bad_area;
  452. good_area:
  453. code = SEGV_ACCERR;
  454. if(write) {
  455. if(!(vma->vm_flags & VM_WRITE))
  456. goto bad_area;
  457. } else {
  458. if(!(vma->vm_flags & (VM_READ | VM_EXEC)))
  459. goto bad_area;
  460. }
  461. switch (handle_mm_fault(mm, vma, address, write ? FAULT_FLAG_WRITE : 0)) {
  462. case VM_FAULT_SIGBUS:
  463. case VM_FAULT_OOM:
  464. goto do_sigbus;
  465. }
  466. up_read(&mm->mmap_sem);
  467. return;
  468. bad_area:
  469. up_read(&mm->mmap_sem);
  470. __do_fault_siginfo(code, SIGSEGV, tsk->thread.kregs, address);
  471. return;
  472. do_sigbus:
  473. up_read(&mm->mmap_sem);
  474. __do_fault_siginfo(BUS_ADRERR, SIGBUS, tsk->thread.kregs, address);
  475. }
  476. static void check_stack_aligned(unsigned long sp)
  477. {
  478. if (sp & 0x7UL)
  479. force_sig(SIGILL, current);
  480. }
  481. void window_overflow_fault(void)
  482. {
  483. unsigned long sp;
  484. sp = current_thread_info()->rwbuf_stkptrs[0];
  485. if(((sp + 0x38) & PAGE_MASK) != (sp & PAGE_MASK))
  486. force_user_fault(sp + 0x38, 1);
  487. force_user_fault(sp, 1);
  488. check_stack_aligned(sp);
  489. }
  490. void window_underflow_fault(unsigned long sp)
  491. {
  492. if(((sp + 0x38) & PAGE_MASK) != (sp & PAGE_MASK))
  493. force_user_fault(sp + 0x38, 0);
  494. force_user_fault(sp, 0);
  495. check_stack_aligned(sp);
  496. }
  497. void window_ret_fault(struct pt_regs *regs)
  498. {
  499. unsigned long sp;
  500. sp = regs->u_regs[UREG_FP];
  501. if(((sp + 0x38) & PAGE_MASK) != (sp & PAGE_MASK))
  502. force_user_fault(sp + 0x38, 0);
  503. force_user_fault(sp, 0);
  504. check_stack_aligned(sp);
  505. }