mm: always expand the stack with the mmap write lock held
[linux-2.6-block.git] / arch / ia64 / mm / fault.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * MMU fault handling support.
4 *
5 * Copyright (C) 1998-2002 Hewlett-Packard Co
6 * David Mosberger-Tang <davidm@hpl.hp.com>
7 */
3f07c014 8#include <linux/sched/signal.h>
1da177e4
LT
9#include <linux/kernel.h>
10#include <linux/mm.h>
e7088170 11#include <linux/extable.h>
1da177e4 12#include <linux/interrupt.h>
1f7ad57b 13#include <linux/kprobes.h>
1eeb66a1 14#include <linux/kdebug.h>
268bb0ce 15#include <linux/prefetch.h>
70ffdb93 16#include <linux/uaccess.h>
b444eed8 17#include <linux/perf_event.h>
1da177e4 18
1da177e4 19#include <asm/processor.h>
82ed1ac9 20#include <asm/exception.h>
1da177e4 21
620de2f5 22extern int die(char *, struct pt_regs *, long);
1da177e4 23
1da177e4
LT
24/*
25 * Return TRUE if ADDRESS points at a page in the kernel's mapped segment
26 * (inside region 5, on ia64) and that page is present.
27 */
28static int
29mapped_kernel_page_is_present (unsigned long address)
30{
31 pgd_t *pgd;
c03ab9e3 32 p4d_t *p4d;
1da177e4
LT
33 pud_t *pud;
34 pmd_t *pmd;
35 pte_t *ptep, pte;
36
37 pgd = pgd_offset_k(address);
38 if (pgd_none(*pgd) || pgd_bad(*pgd))
39 return 0;
40
c03ab9e3
MR
41 p4d = p4d_offset(pgd, address);
42 if (p4d_none(*p4d) || p4d_bad(*p4d))
43 return 0;
44
45 pud = pud_offset(p4d, address);
1da177e4
LT
46 if (pud_none(*pud) || pud_bad(*pud))
47 return 0;
48
49 pmd = pmd_offset(pud, address);
50 if (pmd_none(*pmd) || pmd_bad(*pmd))
51 return 0;
52
53 ptep = pte_offset_kernel(pmd, address);
54 if (!ptep)
55 return 0;
56
57 pte = *ptep;
58 return pte_present(pte);
59}
60
f28fa729
KC
61# define VM_READ_BIT 0
62# define VM_WRITE_BIT 1
63# define VM_EXEC_BIT 2
64
1f7ad57b 65void __kprobes
1da177e4
LT
66ia64_do_page_fault (unsigned long address, unsigned long isr, struct pt_regs *regs)
67{
68 int signal = SIGSEGV, code = SEGV_MAPERR;
69 struct vm_area_struct *vma, *prev_vma;
70 struct mm_struct *mm = current->mm;
1da177e4 71 unsigned long mask;
50a7ca3c 72 vm_fault_t fault;
dde16072 73 unsigned int flags = FAULT_FLAG_DEFAULT;
f28fa729
KC
74
75 mask = ((((isr >> IA64_ISR_X_BIT) & 1UL) << VM_EXEC_BIT)
76 | (((isr >> IA64_ISR_W_BIT) & 1UL) << VM_WRITE_BIT));
77
da1c55f1
ML
78 /* mmap_lock is performance critical.... */
79 prefetchw(&mm->mmap_lock);
0ffe9849 80
1da177e4
LT
81 /*
82 * If we're in an interrupt or have no user context, we must not take the fault..
83 */
70ffdb93 84 if (faulthandler_disabled() || !mm)
1da177e4
LT
85 goto no_context;
86
7213b252
AK
87 /*
88 * This is to handle the kprobes on user space access instructions
89 */
b98cca44 90 if (kprobe_page_fault(regs, TRAP_BRKPT))
7213b252
AK
91 return;
92
759496ba
JW
93 if (user_mode(regs))
94 flags |= FAULT_FLAG_USER;
95 if (mask & VM_WRITE)
96 flags |= FAULT_FLAG_WRITE;
b444eed8
PX
97
98 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
f28fa729 99retry:
d8ed45c5 100 mmap_read_lock(mm);
1da177e4
LT
101
102 vma = find_vma_prev(mm, address, &prev_vma);
e8c59c0c 103 if (!vma && !prev_vma )
1da177e4
LT
104 goto bad_area;
105
e8c59c0c
AB
106 /*
107 * find_vma_prev() returns vma such that address < vma->vm_end or NULL
108 *
109 * May find no vma, but could be that the last vm area is the
110 * register backing store that needs to expand upwards, in
111 * this case vma will be null, but prev_vma will ne non-null
112 */
8d7071af
LT
113 if (( !vma && prev_vma ) || (address < vma->vm_start) ) {
114 vma = expand_stack(mm, address);
115 if (!vma)
116 goto bad_area_nosemaphore;
117 }
1da177e4 118
1da177e4
LT
119 code = SEGV_ACCERR;
120
121 /* OK, we've got a good vm_area for this memory area. Check the access permissions: */
122
1da177e4
LT
123# if (((1 << VM_READ_BIT) != VM_READ || (1 << VM_WRITE_BIT) != VM_WRITE) \
124 || (1 << VM_EXEC_BIT) != VM_EXEC)
125# error File is out of sync with <linux/mm.h>. Please update.
126# endif
127
df67b3da
JB
128 if (((isr >> IA64_ISR_R_BIT) & 1UL) && (!(vma->vm_flags & (VM_READ | VM_WRITE))))
129 goto bad_area;
130
1da177e4
LT
131 if ((vma->vm_flags & mask) != mask)
132 goto bad_area;
133
1da177e4
LT
134 /*
135 * If for any reason at all we couldn't handle the fault, make
136 * sure we exit gracefully rather than endlessly redo the
137 * fault.
138 */
b444eed8 139 fault = handle_mm_fault(vma, address, flags, regs);
f28fa729 140
d088af1e
AV
141 if (fault_signal_pending(fault, regs)) {
142 if (!user_mode(regs))
143 goto no_context;
f28fa729 144 return;
d088af1e 145 }
f28fa729 146
d9272525
PX
147 /* The fault is fully completed (including releasing mmap lock) */
148 if (fault & VM_FAULT_COMPLETED)
149 return;
150
83c54070 151 if (unlikely(fault & VM_FAULT_ERROR)) {
1da177e4
LT
152 /*
153 * We ran out of memory, or some other thing happened
154 * to us that made us unable to handle the page fault
155 * gracefully.
156 */
83c54070
NP
157 if (fault & VM_FAULT_OOM) {
158 goto out_of_memory;
33692f27
LT
159 } else if (fault & VM_FAULT_SIGSEGV) {
160 goto bad_area;
83c54070
NP
161 } else if (fault & VM_FAULT_SIGBUS) {
162 signal = SIGBUS;
163 goto bad_area;
164 }
1da177e4
LT
165 BUG();
166 }
f28fa729 167
36ef159f
QZ
168 if (fault & VM_FAULT_RETRY) {
169 flags |= FAULT_FLAG_TRIED;
f28fa729 170
36ef159f
QZ
171 /* No need to mmap_read_unlock(mm) as we would
172 * have already released it in __lock_page_or_retry
173 * in mm/filemap.c.
174 */
f28fa729 175
36ef159f 176 goto retry;
f28fa729
KC
177 }
178
d8ed45c5 179 mmap_read_unlock(mm);
1da177e4
LT
180 return;
181
1da177e4 182 bad_area:
d8ed45c5 183 mmap_read_unlock(mm);
8d7071af 184 bad_area_nosemaphore:
1da177e4
LT
185 if ((isr & IA64_ISR_SP)
186 || ((isr & IA64_ISR_NA) && (isr & IA64_ISR_CODE_MASK) == IA64_ISR_CODE_LFETCH))
187 {
188 /*
189 * This fault was due to a speculative load or lfetch.fault, set the "ed"
190 * bit in the psr to ensure forward progress. (Target register will get a
191 * NaT for ld.s, lfetch will be canceled.)
192 */
193 ia64_psr(regs)->ed = 1;
194 return;
195 }
196 if (user_mode(regs)) {
a618a275 197 force_sig_fault(signal, code, (void __user *) address,
2e1661d2 198 0, __ISR_VALID, isr);
1da177e4
LT
199 return;
200 }
201
202 no_context:
f0a8d3c9
TL
203 if ((isr & IA64_ISR_SP)
204 || ((isr & IA64_ISR_NA) && (isr & IA64_ISR_CODE_MASK) == IA64_ISR_CODE_LFETCH))
205 {
1da177e4 206 /*
f0a8d3c9
TL
207 * This fault was due to a speculative load or lfetch.fault, set the "ed"
208 * bit in the psr to ensure forward progress. (Target register will get a
209 * NaT for ld.s, lfetch will be canceled.)
1da177e4
LT
210 */
211 ia64_psr(regs)->ed = 1;
212 return;
213 }
214
1da177e4
LT
215 /*
216 * Since we have no vma's for region 5, we might get here even if the address is
217 * valid, due to the VHPT walker inserting a non present translation that becomes
218 * stale. If that happens, the non present fault handler already purged the stale
219 * translation, which fixed the problem. So, we check to see if the translation is
220 * valid, and return if it is.
221 */
222 if (REGION_NUMBER(address) == 5 && mapped_kernel_page_is_present(address))
223 return;
224
63028aa7
KU
225 if (ia64_done_with_exception(regs))
226 return;
227
1da177e4
LT
228 /*
229 * Oops. The kernel tried to access some bad page. We'll have to terminate things
230 * with extreme prejudice.
231 */
232 bust_spinlocks(1);
233
234 if (address < PAGE_SIZE)
235 printk(KERN_ALERT "Unable to handle kernel NULL pointer dereference (address %016lx)\n", address);
236 else
237 printk(KERN_ALERT "Unable to handle kernel paging request at "
238 "virtual address %016lx\n", address);
620de2f5
JB
239 if (die("Oops", regs, isr))
240 regs = NULL;
1da177e4 241 bust_spinlocks(0);
620de2f5 242 if (regs)
0e25498f 243 make_task_dead(SIGKILL);
1da177e4
LT
244 return;
245
246 out_of_memory:
d8ed45c5 247 mmap_read_unlock(mm);
0c3b96e4 248 if (!user_mode(regs))
249 goto no_context;
250 pagefault_out_of_memory();
1da177e4 251}