blob: 28e22839c665d8badf9c9aa359ed555fc3f8539e [file] [log] [blame]
Paul Mundt26ff6c12006-09-27 15:13:36 +09001/*
2 * Page fault handler for SH with an MMU.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 * Copyright (C) 1999 Niibe Yutaka
Paul Mundt0f60bb22009-07-05 03:18:47 +09005 * Copyright (C) 2003 - 2009 Paul Mundt
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
7 * Based on linux/arch/i386/mm/fault.c:
8 * Copyright (C) 1995 Linus Torvalds
Paul Mundt26ff6c12006-09-27 15:13:36 +09009 *
10 * This file is subject to the terms and conditions of the GNU General Public
11 * License. See the file "COPYING" in the main directory of this archive
12 * for more details.
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/mm.h>
Paul Mundt0f08f332006-09-27 17:03:56 +090016#include <linux/hardirq.h>
17#include <linux/kprobes.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020018#include <linux/perf_event.h>
Magnus Damme7cc9a72008-02-07 20:18:21 +090019#include <asm/io_trapped.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <asm/system.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include <asm/mmu_context.h>
Paul Mundtdb2e1fa2007-02-14 14:13:10 +090022#include <asm/tlbflush.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023
Paul Mundt7433ab7702009-06-25 02:30:10 +090024static inline int notify_page_fault(struct pt_regs *regs, int trap)
25{
26 int ret = 0;
27
Paul Mundtc63c3102009-07-05 02:50:10 +090028 if (kprobes_built_in() && !user_mode(regs)) {
Paul Mundt7433ab7702009-06-25 02:30:10 +090029 preempt_disable();
30 if (kprobe_running() && kprobe_fault_handler(regs, trap))
31 ret = 1;
32 preempt_enable();
33 }
Paul Mundt7433ab7702009-06-25 02:30:10 +090034
35 return ret;
36}
37
Paul Mundt0f60bb22009-07-05 03:18:47 +090038static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
39{
40 unsigned index = pgd_index(address);
41 pgd_t *pgd_k;
42 pud_t *pud, *pud_k;
43 pmd_t *pmd, *pmd_k;
44
45 pgd += index;
46 pgd_k = init_mm.pgd + index;
47
48 if (!pgd_present(*pgd_k))
49 return NULL;
50
51 pud = pud_offset(pgd, address);
52 pud_k = pud_offset(pgd_k, address);
53 if (!pud_present(*pud_k))
54 return NULL;
55
Matt Fleming5d9b4b12009-12-13 14:38:50 +000056 if (!pud_present(*pud))
57 set_pud(pud, *pud_k);
58
Paul Mundt0f60bb22009-07-05 03:18:47 +090059 pmd = pmd_offset(pud, address);
60 pmd_k = pmd_offset(pud_k, address);
61 if (!pmd_present(*pmd_k))
62 return NULL;
63
64 if (!pmd_present(*pmd))
65 set_pmd(pmd, *pmd_k);
Matt Fleming05dd2cd2009-07-13 11:38:04 +000066 else {
67 /*
68 * The page tables are fully synchronised so there must
69 * be another reason for the fault. Return NULL here to
70 * signal that we have not taken care of the fault.
71 */
Paul Mundt0f60bb22009-07-05 03:18:47 +090072 BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
Matt Fleming05dd2cd2009-07-13 11:38:04 +000073 return NULL;
74 }
Paul Mundt0f60bb22009-07-05 03:18:47 +090075
76 return pmd_k;
77}
78
79/*
80 * Handle a fault on the vmalloc or module mapping area
81 */
82static noinline int vmalloc_fault(unsigned long address)
83{
84 pgd_t *pgd_k;
85 pmd_t *pmd_k;
86 pte_t *pte_k;
87
Paul Mundt0906a3a2009-09-03 17:21:10 +090088 /* Make sure we are in vmalloc/module/P3 area: */
89 if (!(address >= VMALLOC_START && address < P3_ADDR_MAX))
Paul Mundt0f60bb22009-07-05 03:18:47 +090090 return -1;
91
92 /*
93 * Synchronize this task's top level page-table
94 * with the 'reference' page table.
95 *
96 * Do _not_ use "current" here. We might be inside
97 * an interrupt in the middle of a task switch..
98 */
99 pgd_k = get_TTB();
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000100 pmd_k = vmalloc_sync_one(pgd_k, address);
Paul Mundt0f60bb22009-07-05 03:18:47 +0900101 if (!pmd_k)
102 return -1;
103
104 pte_k = pte_offset_kernel(pmd_k, address);
105 if (!pte_present(*pte_k))
106 return -1;
107
108 return 0;
109}
110
111static int fault_in_kernel_space(unsigned long address)
112{
113 return address >= TASK_SIZE;
114}
115
Linus Torvalds1da177e2005-04-16 15:20:36 -0700116/*
117 * This routine handles page faults. It determines the address,
118 * and the problem, and then passes it off to one of the appropriate
119 * routines.
120 */
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900121asmlinkage void __kprobes do_page_fault(struct pt_regs *regs,
122 unsigned long writeaccess,
123 unsigned long address)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700124{
Paul Mundt0f60bb22009-07-05 03:18:47 +0900125 unsigned long vec;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126 struct task_struct *tsk;
127 struct mm_struct *mm;
128 struct vm_area_struct * vma;
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900129 int si_code;
Nick Piggin83c54072007-07-19 01:47:05 -0700130 int fault;
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900131 siginfo_t info;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 tsk = current;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900134 mm = tsk->mm;
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900135 si_code = SEGV_MAPERR;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900136 vec = lookup_exception_vector();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137
Paul Mundt0f60bb22009-07-05 03:18:47 +0900138 /*
139 * We fault-in kernel-space virtual memory on-demand. The
140 * 'reference' page table is init_mm.pgd.
141 *
142 * NOTE! We MUST NOT take any locks for this case. We may
143 * be in an interrupt or a critical region, and should
144 * only copy the information from the master page table,
145 * nothing more.
146 */
147 if (unlikely(fault_in_kernel_space(address))) {
148 if (vmalloc_fault(address) >= 0)
Stuart Menefy99a596f2006-11-21 15:38:05 +0900149 return;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900150 if (notify_page_fault(regs, vec))
Stuart Menefy96e14e52008-09-05 16:17:15 +0900151 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900152
Paul Mundt0f60bb22009-07-05 03:18:47 +0900153 goto bad_area_nosemaphore;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900154 }
155
Paul Mundt0f60bb22009-07-05 03:18:47 +0900156 if (unlikely(notify_page_fault(regs, vec)))
Paul Mundt7433ab7702009-06-25 02:30:10 +0900157 return;
158
159 /* Only enable interrupts if they were on before the fault */
160 if ((regs->sr & SR_IMASK) != SR_IMASK)
161 local_irq_enable();
162
Ingo Molnarcdd6c482009-09-21 12:02:48 +0200163 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, 0, regs, address);
Paul Mundt7433ab7702009-06-25 02:30:10 +0900164
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165 /*
Paul Mundt0f60bb22009-07-05 03:18:47 +0900166 * If we're in an interrupt, have no user context or are running
167 * in an atomic region then we must not take the fault:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700168 */
169 if (in_atomic() || !mm)
170 goto no_context;
171
172 down_read(&mm->mmap_sem);
173
174 vma = find_vma(mm, address);
175 if (!vma)
176 goto bad_area;
177 if (vma->vm_start <= address)
178 goto good_area;
179 if (!(vma->vm_flags & VM_GROWSDOWN))
180 goto bad_area;
181 if (expand_stack(vma, address))
182 goto bad_area;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900183
184 /*
185 * Ok, we have a good vm_area for this memory access, so
186 * we can handle it..
187 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188good_area:
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900189 si_code = SEGV_ACCERR;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190 if (writeaccess) {
191 if (!(vma->vm_flags & VM_WRITE))
192 goto bad_area;
193 } else {
Jason Barondf67b3d2006-09-29 01:58:58 -0700194 if (!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195 goto bad_area;
196 }
197
198 /*
199 * If for any reason at all we couldn't handle the fault,
200 * make sure we exit gracefully rather than endlessly redo
201 * the fault.
202 */
203survive:
Linus Torvaldsd06063c2009-04-10 09:01:23 -0700204 fault = handle_mm_fault(mm, vma, address, writeaccess ? FAULT_FLAG_WRITE : 0);
Nick Piggin83c54072007-07-19 01:47:05 -0700205 if (unlikely(fault & VM_FAULT_ERROR)) {
206 if (fault & VM_FAULT_OOM)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700207 goto out_of_memory;
Nick Piggin83c54072007-07-19 01:47:05 -0700208 else if (fault & VM_FAULT_SIGBUS)
209 goto do_sigbus;
210 BUG();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211 }
Paul Mundt7433ab7702009-06-25 02:30:10 +0900212 if (fault & VM_FAULT_MAJOR) {
Nick Piggin83c54072007-07-19 01:47:05 -0700213 tsk->maj_flt++;
Ingo Molnarcdd6c482009-09-21 12:02:48 +0200214 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1, 0,
Paul Mundt7433ab7702009-06-25 02:30:10 +0900215 regs, address);
216 } else {
Nick Piggin83c54072007-07-19 01:47:05 -0700217 tsk->min_flt++;
Ingo Molnarcdd6c482009-09-21 12:02:48 +0200218 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1, 0,
Paul Mundt7433ab7702009-06-25 02:30:10 +0900219 regs, address);
220 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700221
222 up_read(&mm->mmap_sem);
223 return;
224
Paul Mundt0f60bb22009-07-05 03:18:47 +0900225 /*
226 * Something tried to access memory that isn't in our memory map..
227 * Fix it, but check if it's kernel or user first..
228 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700229bad_area:
230 up_read(&mm->mmap_sem);
231
Stuart Menefy99a596f2006-11-21 15:38:05 +0900232bad_area_nosemaphore:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700233 if (user_mode(regs)) {
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900234 info.si_signo = SIGSEGV;
235 info.si_errno = 0;
236 info.si_code = si_code;
237 info.si_addr = (void *) address;
238 force_sig_info(SIGSEGV, &info, tsk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239 return;
240 }
241
242no_context:
243 /* Are we prepared to handle this kernel fault? */
244 if (fixup_exception(regs))
245 return;
246
Magnus Damme7cc9a72008-02-07 20:18:21 +0900247 if (handle_trapped_io(regs, address))
248 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700249/*
250 * Oops. The kernel tried to access some bad page. We'll have to
251 * terminate things with extreme prejudice.
252 *
253 */
Paul Mundt0630e452007-06-18 19:02:47 +0900254
255 bust_spinlocks(1);
256
257 if (oops_may_print()) {
Paul Mundtb62ad832008-01-10 14:07:03 +0900258 unsigned long page;
Paul Mundt0630e452007-06-18 19:02:47 +0900259
260 if (address < PAGE_SIZE)
261 printk(KERN_ALERT "Unable to handle kernel NULL "
262 "pointer dereference");
263 else
264 printk(KERN_ALERT "Unable to handle kernel paging "
265 "request");
266 printk(" at virtual address %08lx\n", address);
267 printk(KERN_ALERT "pc = %08lx\n", regs->pc);
268 page = (unsigned long)get_TTB();
269 if (page) {
Paul Mundt06f862c2007-08-01 16:39:51 +0900270 page = ((__typeof__(page) *)page)[address >> PGDIR_SHIFT];
Paul Mundt0630e452007-06-18 19:02:47 +0900271 printk(KERN_ALERT "*pde = %08lx\n", page);
272 if (page & _PAGE_PRESENT) {
273 page &= PAGE_MASK;
274 address &= 0x003ff000;
275 page = ((__typeof__(page) *)
276 __va(page))[address >>
277 PAGE_SHIFT];
278 printk(KERN_ALERT "*pte = %08lx\n", page);
279 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700280 }
281 }
Paul Mundt0630e452007-06-18 19:02:47 +0900282
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283 die("Oops", regs, writeaccess);
Paul Mundt0630e452007-06-18 19:02:47 +0900284 bust_spinlocks(0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 do_exit(SIGKILL);
286
287/*
288 * We ran out of memory, or some other thing happened to us that made
289 * us unable to handle the page fault gracefully.
290 */
291out_of_memory:
292 up_read(&mm->mmap_sem);
Serge E. Hallynb460cbc2007-10-18 23:39:52 -0700293 if (is_global_init(current)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700294 yield();
295 down_read(&mm->mmap_sem);
296 goto survive;
297 }
298 printk("VM: killing process %s\n", tsk->comm);
299 if (user_mode(regs))
Will Schmidtdcca2bd2007-10-16 01:24:18 -0700300 do_group_exit(SIGKILL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700301 goto no_context;
302
303do_sigbus:
304 up_read(&mm->mmap_sem);
305
306 /*
307 * Send a sigbus, regardless of whether we were in kernel
308 * or user mode.
309 */
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900310 info.si_signo = SIGBUS;
311 info.si_errno = 0;
312 info.si_code = BUS_ADRERR;
313 info.si_addr = (void *)address;
314 force_sig_info(SIGBUS, &info, tsk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700315
316 /* Kernel mode? Handle exceptions or die */
317 if (!user_mode(regs))
318 goto no_context;
319}
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900320
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900321/*
322 * Called with interrupts disabled.
323 */
Paul Mundt112e5842009-08-15 02:49:40 +0900324asmlinkage int __kprobes
325handle_tlbmiss(struct pt_regs *regs, unsigned long writeaccess,
326 unsigned long address)
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900327{
328 pgd_t *pgd;
329 pud_t *pud;
330 pmd_t *pmd;
331 pte_t *pte;
332 pte_t entry;
Paul Mundt3d586952008-09-21 13:56:39 +0900333
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900334 /*
335 * We don't take page faults for P1, P2, and parts of P4, these
336 * are always mapped, whether it be due to legacy behaviour in
337 * 29-bit mode, or due to PMB configuration in 32-bit mode.
338 */
339 if (address >= P3SEG && address < P3_ADDR_MAX) {
340 pgd = pgd_offset_k(address);
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900341 } else {
Paul Mundt0f1a3942007-11-19 13:05:18 +0900342 if (unlikely(address >= TASK_SIZE || !current->mm))
Paul Mundt8010fbe2009-08-15 03:06:41 +0900343 return 1;
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900344
Paul Mundt0f1a3942007-11-19 13:05:18 +0900345 pgd = pgd_offset(current->mm, address);
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900346 }
347
348 pud = pud_offset(pgd, address);
349 if (pud_none_or_clear_bad(pud))
Paul Mundt8010fbe2009-08-15 03:06:41 +0900350 return 1;
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900351 pmd = pmd_offset(pud, address);
352 if (pmd_none_or_clear_bad(pmd))
Paul Mundt8010fbe2009-08-15 03:06:41 +0900353 return 1;
Paul Mundt0f1a3942007-11-19 13:05:18 +0900354 pte = pte_offset_kernel(pmd, address);
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900355 entry = *pte;
356 if (unlikely(pte_none(entry) || pte_not_present(entry)))
Paul Mundt8010fbe2009-08-15 03:06:41 +0900357 return 1;
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900358 if (unlikely(writeaccess && !pte_write(entry)))
Paul Mundt8010fbe2009-08-15 03:06:41 +0900359 return 1;
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900360
361 if (writeaccess)
362 entry = pte_mkdirty(entry);
363 entry = pte_mkyoung(entry);
364
Paul Mundt8010fbe2009-08-15 03:06:41 +0900365 set_pte(pte, entry);
366
Hideo Saitoa602cc02008-02-14 14:45:08 +0900367#if defined(CONFIG_CPU_SH4) && !defined(CONFIG_SMP)
368 /*
Paul Mundt8010fbe2009-08-15 03:06:41 +0900369 * SH-4 does not set MMUCR.RC to the corresponding TLB entry in
370 * the case of an initial page write exception, so we need to
371 * flush it in order to avoid potential TLB entry duplication.
Hideo Saitoa602cc02008-02-14 14:45:08 +0900372 */
Paul Mundt8010fbe2009-08-15 03:06:41 +0900373 if (writeaccess == 2)
374 local_flush_tlb_one(get_asid(), address & PAGE_MASK);
Hideo Saitoa602cc02008-02-14 14:45:08 +0900375#endif
376
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900377 update_mmu_cache(NULL, address, entry);
Paul Mundt0f1a3942007-11-19 13:05:18 +0900378
Paul Mundt8010fbe2009-08-15 03:06:41 +0900379 return 0;
Paul Mundtdb2e1fa2007-02-14 14:13:10 +0900380}