patch-2.2.14 linux/arch/s390/mm/fault.c
Next file: linux/arch/s390/mm/init.c
Previous file: linux/arch/s390/mm/extable.c
Back to the patch index
Back to the overall index
- Lines: 204
- Date:
Tue Jan 4 10:12:12 2000
- Orig file:
v2.2.13/linux/arch/s390/mm/fault.c
- Orig date:
Wed Dec 31 16:00:00 1969
diff -u --recursive --new-file v2.2.13/linux/arch/s390/mm/fault.c linux/arch/s390/mm/fault.c
@@ -0,0 +1,203 @@
+/*
+ * arch/s390/mm/fault.c
+ *
+ * S390 version
+ * Copyright (C) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
+ * Author(s): Hartmut Penner (hp@de.ibm.com)
+ *
+ * Derived from "arch/i386/mm/fault.c"
+ * Copyright (C) 1995 Linus Torvalds
+ */
+
+#include <linux/signal.h>
+#include <linux/sched.h>
+#include <linux/kernel.h>
+#include <linux/errno.h>
+#include <linux/string.h>
+#include <linux/types.h>
+#include <linux/ptrace.h>
+#include <linux/mman.h>
+#include <linux/mm.h>
+#include <linux/smp.h>
+#include <linux/smp_lock.h>
+
+#include <asm/system.h>
+#include <asm/uaccess.h>
+#include <asm/pgtable.h>
+#include <asm/hardirq.h>
+
+extern void die(const char *,struct pt_regs *,long);
+
+/*
+ * This routine handles page faults. It determines the address,
+ * and the problem, and then passes it off to one of the appropriate
+ * routines.
+ *
+ * error_code:
+ * ****0004 Protection -> Write-Protection (suprression)
+ * ****0010 Segment translation -> Not present (nullification)
+ * ****0011 Page translation -> Not present (nullification)
+ */
+asmlinkage void do_page_fault(struct pt_regs *regs, unsigned long error_code)
+{
+ struct task_struct *tsk;
+ struct mm_struct *mm;
+ struct vm_area_struct * vma;
+ unsigned long address;
+ unsigned long fixup;
+ int write;
+ unsigned long psw_mask;
+ unsigned long psw_addr;
+
+ /*
+ * get psw mask of Program old psw to find out,
+ * if user or kernel mode
+ */
+
+ psw_mask = S390_lowcore.program_old_psw.mask;
+ psw_addr = S390_lowcore.program_old_psw.addr;
+
+ /*
+ * get the failing address
+ * more specific the segment and page table portion of
+ * the address
+ */
+
+ address = S390_lowcore.trans_exc_code&0x7ffff000;
+
+ if (atomic_read(&S390_lowcore.local_irq_count))
+ die("page fault from irq handler",regs,error_code);
+
+ tsk = current;
+ mm = tsk->mm;
+
+ down(&mm->mmap_sem);
+
+ vma = find_vma(mm, address);
+ if (!vma) {
+ printk("no vma for address %lX\n",address);
+ goto bad_area;
+ }
+ if (vma->vm_start <= address)
+ goto good_area;
+ if (!(vma->vm_flags & VM_GROWSDOWN)) {
+ printk("VM_GROWSDOWN not set, but address %lX \n",address);
+ printk("not in vma %p (start %lX end %lX)\n",vma,
+ vma->vm_start,vma->vm_end);
+ goto bad_area;
+ }
+ if (expand_stack(vma, address)) {
+ printk("expand of vma failed address %lX\n",address);
+ printk("vma %p (start %lX end %lX)\n",vma,
+ vma->vm_start,vma->vm_end);
+ goto bad_area;
+ }
+/*
+ * Ok, we have a good vm_area for this memory access, so
+ * we can handle it..
+ */
+good_area:
+ write = 0;
+ switch (error_code & 0xFF) {
+ case 0x04: /* write, present*/
+ write = 1;
+ break;
+ case 0x10: /* not present*/
+ case 0x11: /* not present*/
+ if (!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))) {
+ printk("flags %X of vma for address %lX wrong \n",
+ vma->vm_flags,address);
+ printk("vma %p (start %lX end %lX)\n",vma,
+ vma->vm_start,vma->vm_end);
+ goto bad_area;
+ }
+ break;
+ default:
+ printk("code should be 4, 10 or 11 (%lX) \n",error_code&0xFF);
+ goto bad_area;
+ }
+ handle_mm_fault(tsk, vma, address, write);
+
+ up(&mm->mmap_sem);
+ return;
+
+/*
+ * Something tried to access memory that isn't in our memory map..
+ * Fix it, but check if it's kernel or user first..
+ */
+bad_area:
+ up(&mm->mmap_sem);
+
+ /* User mode accesses just cause a SIGSEGV */
+ if (psw_mask & PSW_PROBLEM_STATE) {
+ tsk->tss.prot_addr = address;
+ tsk->tss.error_code = error_code;
+ tsk->tss.trap_no = 14;
+
+ printk("User process fault: interruption code 0x%lX\n",error_code);
+ printk("failing address: %lX\n",address);
+ show_crashed_task_info();
+ force_sig(SIGSEGV, tsk);
+ return;
+ }
+
+ /* Are we prepared to handle this kernel fault? */
+
+ if ((fixup = search_exception_table(regs->psw.addr)) != 0) {
+ regs->psw.addr = fixup;
+ return;
+ }
+
+/*
+ * Oops. The kernel tried to access some bad page. We'll have to
+ * terminate things with extreme prejudice.
+ *
+ * First we check if it was the bootup rw-test, though..
+ */
+ if (address < PAGE_SIZE)
+ printk(KERN_ALERT "Unable to handle kernel NULL pointer dereference");
+ else
+ printk(KERN_ALERT "Unable to handle kernel paging request");
+ printk(" at virtual address %08lx\n",address);
+/*
+ * need to define, which information is useful here
+ */
+
+ lock_kernel();
+ die("Oops", regs, error_code);
+ do_exit(SIGKILL);
+ unlock_kernel();
+}
+
+/*
+ {
+ char c;
+ int i,j;
+ char *addr;
+ addr = ((char*) psw_addr)-0x20;
+ for (i=0;i<16;i++) {
+ if (i == 2)
+ printk("\n");
+ printk ("%08X: ",(unsigned long) addr);
+ for (j=0;j<4;j++) {
+ printk("%08X ",*(unsigned long*)addr);
+ addr += 4;
+ }
+ addr -=0x10;
+ printk(" | ");
+ for (j=0;j<16;j++) {
+ printk("%c",(c=*addr++) < 0x20 ? '.' : c );
+ }
+
+ printk("\n");
+ }
+ printk("\n");
+ }
+
+*/
+
+
+
+
+
+
FUNET's LINUX-ADM group, linux-adm@nic.funet.fi
TCL-scripts by Sam Shen (who was at: slshen@lbl.gov)