3 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
5 * Derived from "arch/i386/mm/fault.c"
6 * Copyright (C) 1991, 1992, 1993, 1994 Linus Torvalds
8 * Modified by Cort Dougan and Paul Mackerras.
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version
13 * 2 of the License, or (at your option) any later version.
16 #include <linux/config.h>
17 #include <linux/signal.h>
18 #include <linux/sched.h>
19 #include <linux/kernel.h>
20 #include <linux/errno.h>
21 #include <linux/string.h>
22 #include <linux/types.h>
23 #include <linux/ptrace.h>
24 #include <linux/mman.h>
26 #include <linux/interrupt.h>
27 #include <linux/highmem.h>
28 #include <linux/module.h>
31 #include <asm/pgtable.h>
33 #include <asm/mmu_context.h>
34 #include <asm/system.h>
35 #include <asm/uaccess.h>
36 #include <asm/tlbflush.h>
38 #if defined(CONFIG_XMON) || defined(CONFIG_KGDB)
39 extern void (*debugger)(struct pt_regs *);
40 extern void (*debugger_fault_handler)(struct pt_regs *);
41 extern int (*debugger_dabr_match)(struct pt_regs *);
42 int debugger_kernel_faults = 1;
45 unsigned long htab_reloads; /* updated by hashtable.S:hash_page() */
46 unsigned long htab_evicts; /* updated by hashtable.S:hash_page() */
47 unsigned long htab_preloads; /* updated by hashtable.S:add_hash_page() */
48 unsigned long pte_misses; /* updated by do_page_fault() */
49 unsigned long pte_errors; /* updated by do_page_fault() */
50 unsigned int probingmem;
53 * Check whether the instruction at regs->nip is a store using
54 * an update addressing form which will update r1.
56 static int store_updates_sp(struct pt_regs *regs)
60 if (get_user(inst, (unsigned int __user *)regs->nip))
62 /* check for 1 in the rA field */
63 if (((inst >> 16) & 0x1f) != 1)
65 /* check major opcode */
74 /* check minor opcode */
75 switch ((inst >> 1) & 0x3ff) {
79 case 695: /* stfsux */
80 case 759: /* stfdux */
88 * For 600- and 800-family processors, the error_code parameter is DSISR
89 * for a data fault, SRR1 for an instruction fault. For 400-family processors
90 * the error_code parameter is ESR for a data fault, 0 for an instruction
93 int do_page_fault(struct pt_regs *regs, unsigned long address,
94 unsigned long error_code)
96 struct vm_area_struct * vma;
97 struct mm_struct *mm = current->mm;
99 int code = SEGV_MAPERR;
100 #if defined(CONFIG_4xx) || defined (CONFIG_BOOKE)
101 int is_write = error_code & ESR_DST;
106 * Fortunately the bit assignments in SRR1 for an instruction
107 * fault and DSISR for a data fault are mostly the same for the
108 * bits we are interested in. But there are some bits which
109 * indicate errors in DSISR but can validly be set in SRR1.
111 if (TRAP(regs) == 0x400)
112 error_code &= 0x48200000;
114 is_write = error_code & 0x02000000;
115 #endif /* CONFIG_4xx || CONFIG_BOOKE */
117 #if defined(CONFIG_XMON) || defined(CONFIG_KGDB)
118 if (debugger_fault_handler && TRAP(regs) == 0x300) {
119 debugger_fault_handler(regs);
122 #if !(defined(CONFIG_4xx) || defined(CONFIG_BOOKE))
123 if (error_code & 0x00400000) {
125 if (debugger_dabr_match(regs))
128 #endif /* !(CONFIG_4xx || CONFIG_BOOKE)*/
129 #endif /* CONFIG_XMON || CONFIG_KGDB */
131 if (in_atomic() || mm == NULL)
134 down_read(&mm->mmap_sem);
135 vma = find_vma(mm, address);
138 if (vma->vm_start <= address)
140 if (!(vma->vm_flags & VM_GROWSDOWN))
146 * N.B. The rs6000/xcoff ABI allows programs to access up to
147 * a few hundred bytes below the stack pointer.
148 * The kernel signal delivery code writes up to about 1.5kB
149 * below the stack pointer (r1) before decrementing it.
150 * The exec code can write slightly over 640kB to the stack
151 * before setting the user r1. Thus we allow the stack to
152 * expand to 1MB without further checks.
154 if (address + 0x100000 < vma->vm_end) {
155 /* get user regs even if this fault is in kernel mode */
156 struct pt_regs *uregs = current->thread.regs;
161 * A user-mode access to an address a long way below
162 * the stack pointer is only valid if the instruction
163 * is one which would update the stack pointer to the
164 * address accessed if the instruction completed,
165 * i.e. either stwu rs,n(r1) or stwux rs,r1,rb
166 * (or the byte, halfword, float or double forms).
168 * If we don't check this then any write to the area
169 * between the last mapped region and the stack will
170 * expand the stack rather than segfaulting.
172 if (address + 2048 < uregs->gpr[1]
173 && (!user_mode(regs) || !store_updates_sp(regs)))
176 if (expand_stack(vma, address))
181 #if defined(CONFIG_6xx)
182 if (error_code & 0x95700000)
183 /* an error such as lwarx to I/O controller space,
184 address matching DABR, eciwx, etc. */
186 #endif /* CONFIG_6xx */
187 #if defined(CONFIG_8xx)
188 /* The MPC8xx seems to always set 0x80000000, which is
189 * "undefined". Of those that can be set, this is the only
190 * one which seems bad.
192 if (error_code & 0x10000000)
193 /* Guarded storage error. */
195 #endif /* CONFIG_8xx */
199 if (!(vma->vm_flags & VM_WRITE))
201 #if defined(CONFIG_4xx) || defined(CONFIG_BOOKE)
202 /* an exec - 4xx/Book-E allows for per-page execute permission */
203 } else if (TRAP(regs) == 0x400) {
208 /* It would be nice to actually enforce the VM execute
209 permission on CPUs which can do so, but far too
210 much stuff in userspace doesn't get the permissions
211 right, so we let any page be executed for now. */
212 if (! (vma->vm_flags & VM_EXEC))
216 /* Since 4xx/Book-E supports per-page execute permission,
217 * we lazily flush dcache to icache. */
219 if (get_pteptr(mm, address, &ptep, &pmdp)) {
220 spinlock_t *ptl = pte_lockptr(mm, pmdp);
222 if (pte_present(*ptep)) {
223 struct page *page = pte_page(*ptep);
225 if (!test_bit(PG_arch_1, &page->flags)) {
226 flush_dcache_icache_page(page);
227 set_bit(PG_arch_1, &page->flags);
229 pte_update(ptep, 0, _PAGE_HWEXEC);
231 pte_unmap_unlock(ptep, ptl);
232 up_read(&mm->mmap_sem);
235 pte_unmap_unlock(ptep, ptl);
240 /* protection fault */
241 if (error_code & 0x08000000)
243 if (!(vma->vm_flags & (VM_READ | VM_EXEC)))
248 * If for any reason at all we couldn't handle the fault,
249 * make sure we exit gracefully rather than endlessly redo
253 switch (handle_mm_fault(mm, vma, address, is_write)) {
260 case VM_FAULT_SIGBUS:
268 up_read(&mm->mmap_sem);
270 * keep track of tlb+htab misses that are good addrs but
271 * just need pte's created via handle_mm_fault()
278 up_read(&mm->mmap_sem);
281 /* User mode accesses cause a SIGSEGV */
282 if (user_mode(regs)) {
283 _exception(SIGSEGV, regs, code, address);
290 * We ran out of memory, or some other thing happened to us that made
291 * us unable to handle the page fault gracefully.
294 up_read(&mm->mmap_sem);
295 if (current->pid == 1) {
297 down_read(&mm->mmap_sem);
300 printk("VM: killing process %s\n", current->comm);
306 up_read(&mm->mmap_sem);
307 info.si_signo = SIGBUS;
309 info.si_code = BUS_ADRERR;
310 info.si_addr = (void __user *)address;
311 force_sig_info (SIGBUS, &info, current);
312 if (!user_mode(regs))
318 * bad_page_fault is called when we have a bad access from the kernel.
319 * It is called from the DSI and ISI handlers in head.S and from some
320 * of the procedures in traps.c.
323 bad_page_fault(struct pt_regs *regs, unsigned long address, int sig)
325 const struct exception_table_entry *entry;
327 /* Are we prepared to handle this fault? */
328 if ((entry = search_exception_tables(regs->nip)) != NULL) {
329 regs->nip = entry->fixup;
333 /* kernel has accessed a bad area */
334 #if defined(CONFIG_XMON) || defined(CONFIG_KGDB)
335 if (debugger_kernel_faults)
338 die("kernel access of bad area", regs, sig);
343 /* The pgtable.h claims some functions generically exist, but I
344 * can't find them......
346 pte_t *va_to_pte(unsigned long address)
352 if (address < TASK_SIZE)
355 dir = pgd_offset(&init_mm, address);
357 pmd = pmd_offset(dir, address & PAGE_MASK);
358 if (pmd && pmd_present(*pmd)) {
359 pte = pte_offset_kernel(pmd, address & PAGE_MASK);
360 if (pte && pte_present(*pte))
367 unsigned long va_to_phys(unsigned long address)
371 pte = va_to_pte(address);
373 return(((unsigned long)(pte_val(*pte)) & PAGE_MASK) | (address & ~(PAGE_MASK)));
378 print_8xx_pte(struct mm_struct *mm, unsigned long addr)
384 printk(" pte @ 0x%8lx: ", addr);
385 pgd = pgd_offset(mm, addr & PAGE_MASK);
387 pmd = pmd_offset(pgd, addr & PAGE_MASK);
388 if (pmd && pmd_present(*pmd)) {
389 pte = pte_offset_kernel(pmd, addr & PAGE_MASK);
391 printk(" (0x%08lx)->(0x%08lx)->0x%08lx\n",
392 (long)pgd, (long)pte, (long)pte_val(*pte));
393 #define pp ((long)pte_val(*pte))
394 printk(" RPN: %05lx PP: %lx SPS: %lx SH: %lx "
398 (pp>>3)&1, /* small */
399 (pp>>2)&1, /* shared */
400 (pp>>1)&1, /* cache inhibit */
419 get_8xx_pte(struct mm_struct *mm, unsigned long addr)
426 pgd = pgd_offset(mm, addr & PAGE_MASK);
428 pmd = pmd_offset(pgd, addr & PAGE_MASK);
429 if (pmd && pmd_present(*pmd)) {
430 pte = pte_offset_kernel(pmd, addr & PAGE_MASK);
432 retval = (int)pte_val(*pte);
438 #endif /* CONFIG_8xx */