2 * Copyright (C) 2004-2006 Atmel Corporation
4 * Based on linux/arch/sh/mm/fault.c:
5 * Copyright (C) 1999 Niibe Yutaka
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
13 #include <linux/module.h>
14 #include <linux/pagemap.h>
15 #include <linux/kdebug.h>
16 #include <linux/kprobes.h>
18 #include <asm/mmu_context.h>
19 #include <asm/sysreg.h>
21 #include <asm/uaccess.h>
24 static inline int notify_page_fault(struct pt_regs *regs, int trap)
28 if (!user_mode(regs)) {
29 if (kprobe_running() && kprobe_fault_handler(regs, trap))
36 static inline int notify_page_fault(struct pt_regs *regs, int trap)
42 int exception_trace = 1;
45 * This routine handles page faults. It determines the address and the
46 * problem, and then passes it off to one of the appropriate routines.
48 * ecr is the Exception Cause Register. Possible values are:
49 * 6: Protection fault (instruction access)
50 * 15: Protection fault (read access)
51 * 16: Protection fault (write access)
52 * 20: Page not found (instruction access)
53 * 24: Page not found (read access)
54 * 28: Page not found (write access)
56 asmlinkage void do_page_fault(unsigned long ecr, struct pt_regs *regs)
58 struct task_struct *tsk;
60 struct vm_area_struct *vma;
61 const struct exception_table_entry *fixup;
62 unsigned long address;
67 unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
69 if (notify_page_fault(regs, ecr))
72 address = sysreg_read(TLBEAR);
81 * If we're in an interrupt or have no user context, we must
82 * not take the fault...
84 if (in_atomic() || !mm || regs->sr & SYSREG_BIT(GM))
90 flags |= FAULT_FLAG_USER;
92 down_read(&mm->mmap_sem);
94 vma = find_vma(mm, address);
97 if (vma->vm_start <= address)
99 if (!(vma->vm_flags & VM_GROWSDOWN))
101 if (expand_stack(vma, address))
105 * Ok, we have a good vm_area for this memory access, so we
112 case ECR_PROTECTION_X:
114 if (!(vma->vm_flags & VM_EXEC))
117 case ECR_PROTECTION_R:
119 if (!(vma->vm_flags & (VM_READ | VM_WRITE | VM_EXEC)))
122 case ECR_PROTECTION_W:
124 if (!(vma->vm_flags & VM_WRITE))
126 flags |= FAULT_FLAG_WRITE;
129 panic("Unhandled case %lu in do_page_fault!", ecr);
133 * If for any reason at all we couldn't handle the fault, make
134 * sure we exit gracefully rather than endlessly redo the
137 fault = handle_mm_fault(mm, vma, address, flags);
139 if ((fault & VM_FAULT_RETRY) && fatal_signal_pending(current))
142 if (unlikely(fault & VM_FAULT_ERROR)) {
143 if (fault & VM_FAULT_OOM)
145 else if (fault & VM_FAULT_SIGBUS)
150 if (flags & FAULT_FLAG_ALLOW_RETRY) {
151 if (fault & VM_FAULT_MAJOR)
155 if (fault & VM_FAULT_RETRY) {
156 flags &= ~FAULT_FLAG_ALLOW_RETRY;
157 flags |= FAULT_FLAG_TRIED;
160 * No need to up_read(&mm->mmap_sem) as we would have
161 * already released it in __lock_page_or_retry() in
168 up_read(&mm->mmap_sem);
172 * Something tried to access memory that isn't in our memory
173 * map. Fix it, but check if it's kernel or user first...
176 up_read(&mm->mmap_sem);
178 if (user_mode(regs)) {
179 if (exception_trace && printk_ratelimit())
180 printk("%s%s[%d]: segfault at %08lx pc %08lx "
181 "sp %08lx ecr %lu\n",
182 is_global_init(tsk) ? KERN_EMERG : KERN_INFO,
183 tsk->comm, tsk->pid, address, regs->pc,
185 _exception(SIGSEGV, regs, code, address);
190 /* Are we prepared to handle this kernel fault? */
191 fixup = search_exception_tables(regs->pc);
193 regs->pc = fixup->fixup;
198 * Oops. The kernel tried to access some bad page. We'll have
199 * to terminate things with extreme prejudice.
201 if (address < PAGE_SIZE)
203 "Unable to handle kernel NULL pointer dereference");
206 "Unable to handle kernel paging request");
207 printk(" at virtual address %08lx\n", address);
209 page = sysreg_read(PTBR);
210 printk(KERN_ALERT "ptbr = %08lx", page);
211 if (address >= TASK_SIZE)
212 page = (unsigned long)swapper_pg_dir;
214 page = ((unsigned long *)page)[address >> 22];
215 printk(" pgd = %08lx", page);
216 if (page & _PAGE_PRESENT) {
218 address &= 0x003ff000;
219 page = ((unsigned long *)__va(page))[address >> PAGE_SHIFT];
220 printk(" pte = %08lx", page);
224 die("Kernel access of bad area", regs, signr);
228 * We ran out of memory, or some other thing happened to us
229 * that made us unable to handle the page fault gracefully.
232 up_read(&mm->mmap_sem);
233 if (!user_mode(regs))
235 pagefault_out_of_memory();
239 up_read(&mm->mmap_sem);
241 /* Kernel mode? Handle exceptions or die */
244 if (!user_mode(regs))
248 printk("%s%s[%d]: bus error at %08lx pc %08lx "
249 "sp %08lx ecr %lu\n",
250 is_global_init(tsk) ? KERN_EMERG : KERN_INFO,
251 tsk->comm, tsk->pid, address, regs->pc,
254 _exception(SIGBUS, regs, BUS_ADRERR, address);
257 asmlinkage void do_bus_error(unsigned long addr, int write_access,
258 struct pt_regs *regs)
261 "Bus error at physical address 0x%08lx (%s access)\n",
262 addr, write_access ? "write" : "read");
263 printk(KERN_INFO "DTLB dump:\n");
265 die("Bus Error", regs, SIGKILL);