xref: /openbmc/linux/arch/sh/mm/fault.c (revision 3f07c0144132e4f59d88055ac8ff3e691a5fa2b8)
128080329SPaul Mundt /*
228080329SPaul Mundt  * Page fault handler for SH with an MMU.
328080329SPaul Mundt  *
428080329SPaul Mundt  *  Copyright (C) 1999  Niibe Yutaka
528080329SPaul Mundt  *  Copyright (C) 2003 - 2012  Paul Mundt
628080329SPaul Mundt  *
728080329SPaul Mundt  *  Based on linux/arch/i386/mm/fault.c:
828080329SPaul Mundt  *   Copyright (C) 1995  Linus Torvalds
928080329SPaul Mundt  *
1028080329SPaul Mundt  * This file is subject to the terms and conditions of the GNU General Public
1128080329SPaul Mundt  * License.  See the file "COPYING" in the main directory of this archive
1228080329SPaul Mundt  * for more details.
1328080329SPaul Mundt  */
1428080329SPaul Mundt #include <linux/kernel.h>
1528080329SPaul Mundt #include <linux/mm.h>
16*3f07c014SIngo Molnar #include <linux/sched/signal.h>
1728080329SPaul Mundt #include <linux/hardirq.h>
1828080329SPaul Mundt #include <linux/kprobes.h>
1928080329SPaul Mundt #include <linux/perf_event.h>
2028080329SPaul Mundt #include <linux/kdebug.h>
2170ffdb93SDavid Hildenbrand #include <linux/uaccess.h>
2228080329SPaul Mundt #include <asm/io_trapped.h>
2328080329SPaul Mundt #include <asm/mmu_context.h>
2428080329SPaul Mundt #include <asm/tlbflush.h>
2528080329SPaul Mundt #include <asm/traps.h>
2628080329SPaul Mundt 
2728080329SPaul Mundt static inline int notify_page_fault(struct pt_regs *regs, int trap)
2828080329SPaul Mundt {
2928080329SPaul Mundt 	int ret = 0;
3028080329SPaul Mundt 
3128080329SPaul Mundt 	if (kprobes_built_in() && !user_mode(regs)) {
3228080329SPaul Mundt 		preempt_disable();
3328080329SPaul Mundt 		if (kprobe_running() && kprobe_fault_handler(regs, trap))
3428080329SPaul Mundt 			ret = 1;
3528080329SPaul Mundt 		preempt_enable();
3628080329SPaul Mundt 	}
3728080329SPaul Mundt 
3828080329SPaul Mundt 	return ret;
3928080329SPaul Mundt }
4028080329SPaul Mundt 
4128080329SPaul Mundt static void
4228080329SPaul Mundt force_sig_info_fault(int si_signo, int si_code, unsigned long address,
4328080329SPaul Mundt 		     struct task_struct *tsk)
4428080329SPaul Mundt {
4528080329SPaul Mundt 	siginfo_t info;
4628080329SPaul Mundt 
4728080329SPaul Mundt 	info.si_signo	= si_signo;
4828080329SPaul Mundt 	info.si_errno	= 0;
4928080329SPaul Mundt 	info.si_code	= si_code;
5028080329SPaul Mundt 	info.si_addr	= (void __user *)address;
5128080329SPaul Mundt 
5228080329SPaul Mundt 	force_sig_info(si_signo, &info, tsk);
5328080329SPaul Mundt }
5428080329SPaul Mundt 
5528080329SPaul Mundt /*
5628080329SPaul Mundt  * This is useful to dump out the page tables associated with
5728080329SPaul Mundt  * 'addr' in mm 'mm'.
5828080329SPaul Mundt  */
5928080329SPaul Mundt static void show_pte(struct mm_struct *mm, unsigned long addr)
6028080329SPaul Mundt {
6128080329SPaul Mundt 	pgd_t *pgd;
6228080329SPaul Mundt 
6390eed7d8SPaul Mundt 	if (mm) {
6428080329SPaul Mundt 		pgd = mm->pgd;
6590eed7d8SPaul Mundt 	} else {
6628080329SPaul Mundt 		pgd = get_TTB();
6728080329SPaul Mundt 
6890eed7d8SPaul Mundt 		if (unlikely(!pgd))
6990eed7d8SPaul Mundt 			pgd = swapper_pg_dir;
7090eed7d8SPaul Mundt 	}
7190eed7d8SPaul Mundt 
7228080329SPaul Mundt 	printk(KERN_ALERT "pgd = %p\n", pgd);
7328080329SPaul Mundt 	pgd += pgd_index(addr);
7428080329SPaul Mundt 	printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr,
7528080329SPaul Mundt 	       (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd));
7628080329SPaul Mundt 
7728080329SPaul Mundt 	do {
7828080329SPaul Mundt 		pud_t *pud;
7928080329SPaul Mundt 		pmd_t *pmd;
8028080329SPaul Mundt 		pte_t *pte;
8128080329SPaul Mundt 
8228080329SPaul Mundt 		if (pgd_none(*pgd))
8328080329SPaul Mundt 			break;
8428080329SPaul Mundt 
8528080329SPaul Mundt 		if (pgd_bad(*pgd)) {
8628080329SPaul Mundt 			printk("(bad)");
8728080329SPaul Mundt 			break;
8828080329SPaul Mundt 		}
8928080329SPaul Mundt 
9028080329SPaul Mundt 		pud = pud_offset(pgd, addr);
9128080329SPaul Mundt 		if (PTRS_PER_PUD != 1)
9228080329SPaul Mundt 			printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2),
9328080329SPaul Mundt 			       (u64)pud_val(*pud));
9428080329SPaul Mundt 
9528080329SPaul Mundt 		if (pud_none(*pud))
9628080329SPaul Mundt 			break;
9728080329SPaul Mundt 
9828080329SPaul Mundt 		if (pud_bad(*pud)) {
9928080329SPaul Mundt 			printk("(bad)");
10028080329SPaul Mundt 			break;
10128080329SPaul Mundt 		}
10228080329SPaul Mundt 
10328080329SPaul Mundt 		pmd = pmd_offset(pud, addr);
10428080329SPaul Mundt 		if (PTRS_PER_PMD != 1)
10528080329SPaul Mundt 			printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2),
10628080329SPaul Mundt 			       (u64)pmd_val(*pmd));
10728080329SPaul Mundt 
10828080329SPaul Mundt 		if (pmd_none(*pmd))
10928080329SPaul Mundt 			break;
11028080329SPaul Mundt 
11128080329SPaul Mundt 		if (pmd_bad(*pmd)) {
11228080329SPaul Mundt 			printk("(bad)");
11328080329SPaul Mundt 			break;
11428080329SPaul Mundt 		}
11528080329SPaul Mundt 
11628080329SPaul Mundt 		/* We must not map this if we have highmem enabled */
11728080329SPaul Mundt 		if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT)))
11828080329SPaul Mundt 			break;
11928080329SPaul Mundt 
12028080329SPaul Mundt 		pte = pte_offset_kernel(pmd, addr);
12128080329SPaul Mundt 		printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2),
12228080329SPaul Mundt 		       (u64)pte_val(*pte));
12328080329SPaul Mundt 	} while (0);
12428080329SPaul Mundt 
12528080329SPaul Mundt 	printk("\n");
12628080329SPaul Mundt }
12728080329SPaul Mundt 
12828080329SPaul Mundt static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
12928080329SPaul Mundt {
13028080329SPaul Mundt 	unsigned index = pgd_index(address);
13128080329SPaul Mundt 	pgd_t *pgd_k;
13228080329SPaul Mundt 	pud_t *pud, *pud_k;
13328080329SPaul Mundt 	pmd_t *pmd, *pmd_k;
13428080329SPaul Mundt 
13528080329SPaul Mundt 	pgd += index;
13628080329SPaul Mundt 	pgd_k = init_mm.pgd + index;
13728080329SPaul Mundt 
13828080329SPaul Mundt 	if (!pgd_present(*pgd_k))
13928080329SPaul Mundt 		return NULL;
14028080329SPaul Mundt 
14128080329SPaul Mundt 	pud = pud_offset(pgd, address);
14228080329SPaul Mundt 	pud_k = pud_offset(pgd_k, address);
14328080329SPaul Mundt 	if (!pud_present(*pud_k))
14428080329SPaul Mundt 		return NULL;
14528080329SPaul Mundt 
14628080329SPaul Mundt 	if (!pud_present(*pud))
14728080329SPaul Mundt 	    set_pud(pud, *pud_k);
14828080329SPaul Mundt 
14928080329SPaul Mundt 	pmd = pmd_offset(pud, address);
15028080329SPaul Mundt 	pmd_k = pmd_offset(pud_k, address);
15128080329SPaul Mundt 	if (!pmd_present(*pmd_k))
15228080329SPaul Mundt 		return NULL;
15328080329SPaul Mundt 
15428080329SPaul Mundt 	if (!pmd_present(*pmd))
15528080329SPaul Mundt 		set_pmd(pmd, *pmd_k);
15628080329SPaul Mundt 	else {
15728080329SPaul Mundt 		/*
15828080329SPaul Mundt 		 * The page tables are fully synchronised so there must
15928080329SPaul Mundt 		 * be another reason for the fault. Return NULL here to
16028080329SPaul Mundt 		 * signal that we have not taken care of the fault.
16128080329SPaul Mundt 		 */
16228080329SPaul Mundt 		BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
16328080329SPaul Mundt 		return NULL;
16428080329SPaul Mundt 	}
16528080329SPaul Mundt 
16628080329SPaul Mundt 	return pmd_k;
16728080329SPaul Mundt }
16828080329SPaul Mundt 
169d8fd35fcSPaul Mundt #ifdef CONFIG_SH_STORE_QUEUES
170d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT	P3_ADDR_MAX
171d8fd35fcSPaul Mundt #else
172d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT	VMALLOC_END
173d8fd35fcSPaul Mundt #endif
174d8fd35fcSPaul Mundt 
17528080329SPaul Mundt /*
17628080329SPaul Mundt  * Handle a fault on the vmalloc or module mapping area
17728080329SPaul Mundt  */
17828080329SPaul Mundt static noinline int vmalloc_fault(unsigned long address)
17928080329SPaul Mundt {
18028080329SPaul Mundt 	pgd_t *pgd_k;
18128080329SPaul Mundt 	pmd_t *pmd_k;
18228080329SPaul Mundt 	pte_t *pte_k;
18328080329SPaul Mundt 
184c3e0af98SPaul Mundt 	/* Make sure we are in vmalloc/module/P3 area: */
185d8fd35fcSPaul Mundt 	if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT))
18628080329SPaul Mundt 		return -1;
18728080329SPaul Mundt 
18828080329SPaul Mundt 	/*
18928080329SPaul Mundt 	 * Synchronize this task's top level page-table
19028080329SPaul Mundt 	 * with the 'reference' page table.
19128080329SPaul Mundt 	 *
19228080329SPaul Mundt 	 * Do _not_ use "current" here. We might be inside
19328080329SPaul Mundt 	 * an interrupt in the middle of a task switch..
19428080329SPaul Mundt 	 */
19528080329SPaul Mundt 	pgd_k = get_TTB();
19628080329SPaul Mundt 	pmd_k = vmalloc_sync_one(pgd_k, address);
19728080329SPaul Mundt 	if (!pmd_k)
19828080329SPaul Mundt 		return -1;
19928080329SPaul Mundt 
20028080329SPaul Mundt 	pte_k = pte_offset_kernel(pmd_k, address);
20128080329SPaul Mundt 	if (!pte_present(*pte_k))
20228080329SPaul Mundt 		return -1;
20328080329SPaul Mundt 
20428080329SPaul Mundt 	return 0;
20528080329SPaul Mundt }
20628080329SPaul Mundt 
20728080329SPaul Mundt static void
20828080329SPaul Mundt show_fault_oops(struct pt_regs *regs, unsigned long address)
20928080329SPaul Mundt {
21028080329SPaul Mundt 	if (!oops_may_print())
21128080329SPaul Mundt 		return;
21228080329SPaul Mundt 
21328080329SPaul Mundt 	printk(KERN_ALERT "BUG: unable to handle kernel ");
21428080329SPaul Mundt 	if (address < PAGE_SIZE)
21528080329SPaul Mundt 		printk(KERN_CONT "NULL pointer dereference");
21628080329SPaul Mundt 	else
21728080329SPaul Mundt 		printk(KERN_CONT "paging request");
21828080329SPaul Mundt 
21928080329SPaul Mundt 	printk(KERN_CONT " at %08lx\n", address);
22028080329SPaul Mundt 	printk(KERN_ALERT "PC:");
22128080329SPaul Mundt 	printk_address(regs->pc, 1);
22228080329SPaul Mundt 
22328080329SPaul Mundt 	show_pte(NULL, address);
22428080329SPaul Mundt }
22528080329SPaul Mundt 
22628080329SPaul Mundt static noinline void
22728080329SPaul Mundt no_context(struct pt_regs *regs, unsigned long error_code,
22828080329SPaul Mundt 	   unsigned long address)
22928080329SPaul Mundt {
23028080329SPaul Mundt 	/* Are we prepared to handle this kernel fault?  */
23128080329SPaul Mundt 	if (fixup_exception(regs))
23228080329SPaul Mundt 		return;
23328080329SPaul Mundt 
23428080329SPaul Mundt 	if (handle_trapped_io(regs, address))
23528080329SPaul Mundt 		return;
23628080329SPaul Mundt 
23728080329SPaul Mundt 	/*
23828080329SPaul Mundt 	 * Oops. The kernel tried to access some bad page. We'll have to
23928080329SPaul Mundt 	 * terminate things with extreme prejudice.
24028080329SPaul Mundt 	 */
24128080329SPaul Mundt 	bust_spinlocks(1);
24228080329SPaul Mundt 
24328080329SPaul Mundt 	show_fault_oops(regs, address);
24428080329SPaul Mundt 
24528080329SPaul Mundt 	die("Oops", regs, error_code);
24628080329SPaul Mundt 	bust_spinlocks(0);
24728080329SPaul Mundt 	do_exit(SIGKILL);
24828080329SPaul Mundt }
24928080329SPaul Mundt 
25028080329SPaul Mundt static void
25128080329SPaul Mundt __bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
25228080329SPaul Mundt 		       unsigned long address, int si_code)
25328080329SPaul Mundt {
25428080329SPaul Mundt 	struct task_struct *tsk = current;
25528080329SPaul Mundt 
25628080329SPaul Mundt 	/* User mode accesses just cause a SIGSEGV */
25728080329SPaul Mundt 	if (user_mode(regs)) {
25828080329SPaul Mundt 		/*
25928080329SPaul Mundt 		 * It's possible to have interrupts off here:
26028080329SPaul Mundt 		 */
26128080329SPaul Mundt 		local_irq_enable();
26228080329SPaul Mundt 
26328080329SPaul Mundt 		force_sig_info_fault(SIGSEGV, si_code, address, tsk);
26428080329SPaul Mundt 
26528080329SPaul Mundt 		return;
26628080329SPaul Mundt 	}
26728080329SPaul Mundt 
26828080329SPaul Mundt 	no_context(regs, error_code, address);
26928080329SPaul Mundt }
27028080329SPaul Mundt 
27128080329SPaul Mundt static noinline void
27228080329SPaul Mundt bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
27328080329SPaul Mundt 		     unsigned long address)
27428080329SPaul Mundt {
27528080329SPaul Mundt 	__bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR);
27628080329SPaul Mundt }
27728080329SPaul Mundt 
27828080329SPaul Mundt static void
27928080329SPaul Mundt __bad_area(struct pt_regs *regs, unsigned long error_code,
28028080329SPaul Mundt 	   unsigned long address, int si_code)
28128080329SPaul Mundt {
28228080329SPaul Mundt 	struct mm_struct *mm = current->mm;
28328080329SPaul Mundt 
28428080329SPaul Mundt 	/*
28528080329SPaul Mundt 	 * Something tried to access memory that isn't in our memory map..
28628080329SPaul Mundt 	 * Fix it, but check if it's kernel or user first..
28728080329SPaul Mundt 	 */
28828080329SPaul Mundt 	up_read(&mm->mmap_sem);
28928080329SPaul Mundt 
29028080329SPaul Mundt 	__bad_area_nosemaphore(regs, error_code, address, si_code);
29128080329SPaul Mundt }
29228080329SPaul Mundt 
29328080329SPaul Mundt static noinline void
29428080329SPaul Mundt bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address)
29528080329SPaul Mundt {
29628080329SPaul Mundt 	__bad_area(regs, error_code, address, SEGV_MAPERR);
29728080329SPaul Mundt }
29828080329SPaul Mundt 
29928080329SPaul Mundt static noinline void
30028080329SPaul Mundt bad_area_access_error(struct pt_regs *regs, unsigned long error_code,
30128080329SPaul Mundt 		      unsigned long address)
30228080329SPaul Mundt {
30328080329SPaul Mundt 	__bad_area(regs, error_code, address, SEGV_ACCERR);
30428080329SPaul Mundt }
30528080329SPaul Mundt 
30628080329SPaul Mundt static void
30728080329SPaul Mundt do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address)
30828080329SPaul Mundt {
30928080329SPaul Mundt 	struct task_struct *tsk = current;
31028080329SPaul Mundt 	struct mm_struct *mm = tsk->mm;
31128080329SPaul Mundt 
31228080329SPaul Mundt 	up_read(&mm->mmap_sem);
31328080329SPaul Mundt 
31428080329SPaul Mundt 	/* Kernel mode? Handle exceptions or die: */
31528080329SPaul Mundt 	if (!user_mode(regs))
31628080329SPaul Mundt 		no_context(regs, error_code, address);
31728080329SPaul Mundt 
31828080329SPaul Mundt 	force_sig_info_fault(SIGBUS, BUS_ADRERR, address, tsk);
31928080329SPaul Mundt }
32028080329SPaul Mundt 
32128080329SPaul Mundt static noinline int
32228080329SPaul Mundt mm_fault_error(struct pt_regs *regs, unsigned long error_code,
32328080329SPaul Mundt 	       unsigned long address, unsigned int fault)
32428080329SPaul Mundt {
32528080329SPaul Mundt 	/*
32628080329SPaul Mundt 	 * Pagefault was interrupted by SIGKILL. We have no reason to
32728080329SPaul Mundt 	 * continue pagefault.
32828080329SPaul Mundt 	 */
32928080329SPaul Mundt 	if (fatal_signal_pending(current)) {
33028080329SPaul Mundt 		if (!(fault & VM_FAULT_RETRY))
33128080329SPaul Mundt 			up_read(&current->mm->mmap_sem);
33228080329SPaul Mundt 		if (!user_mode(regs))
33328080329SPaul Mundt 			no_context(regs, error_code, address);
33428080329SPaul Mundt 		return 1;
33528080329SPaul Mundt 	}
33628080329SPaul Mundt 
33728080329SPaul Mundt 	if (!(fault & VM_FAULT_ERROR))
33828080329SPaul Mundt 		return 0;
33928080329SPaul Mundt 
34028080329SPaul Mundt 	if (fault & VM_FAULT_OOM) {
34128080329SPaul Mundt 		/* Kernel mode? Handle exceptions or die: */
34228080329SPaul Mundt 		if (!user_mode(regs)) {
34328080329SPaul Mundt 			up_read(&current->mm->mmap_sem);
34428080329SPaul Mundt 			no_context(regs, error_code, address);
34528080329SPaul Mundt 			return 1;
34628080329SPaul Mundt 		}
347c2d23f91SDavid Rientjes 		up_read(&current->mm->mmap_sem);
34828080329SPaul Mundt 
349c2d23f91SDavid Rientjes 		/*
350c2d23f91SDavid Rientjes 		 * We ran out of memory, call the OOM killer, and return the
351c2d23f91SDavid Rientjes 		 * userspace (which will retry the fault, or kill us if we got
352c2d23f91SDavid Rientjes 		 * oom-killed):
353c2d23f91SDavid Rientjes 		 */
354c2d23f91SDavid Rientjes 		pagefault_out_of_memory();
35528080329SPaul Mundt 	} else {
35628080329SPaul Mundt 		if (fault & VM_FAULT_SIGBUS)
35728080329SPaul Mundt 			do_sigbus(regs, error_code, address);
35833692f27SLinus Torvalds 		else if (fault & VM_FAULT_SIGSEGV)
35933692f27SLinus Torvalds 			bad_area(regs, error_code, address);
36028080329SPaul Mundt 		else
36128080329SPaul Mundt 			BUG();
36228080329SPaul Mundt 	}
36328080329SPaul Mundt 
36428080329SPaul Mundt 	return 1;
36528080329SPaul Mundt }
36628080329SPaul Mundt 
36728080329SPaul Mundt static inline int access_error(int error_code, struct vm_area_struct *vma)
36828080329SPaul Mundt {
36928080329SPaul Mundt 	if (error_code & FAULT_CODE_WRITE) {
37028080329SPaul Mundt 		/* write, present and write, not present: */
37128080329SPaul Mundt 		if (unlikely(!(vma->vm_flags & VM_WRITE)))
37228080329SPaul Mundt 			return 1;
37328080329SPaul Mundt 		return 0;
37428080329SPaul Mundt 	}
37528080329SPaul Mundt 
37628080329SPaul Mundt 	/* ITLB miss on NX page */
37728080329SPaul Mundt 	if (unlikely((error_code & FAULT_CODE_ITLB) &&
37828080329SPaul Mundt 		     !(vma->vm_flags & VM_EXEC)))
37928080329SPaul Mundt 		return 1;
38028080329SPaul Mundt 
38128080329SPaul Mundt 	/* read, not present: */
38228080329SPaul Mundt 	if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))))
38328080329SPaul Mundt 		return 1;
38428080329SPaul Mundt 
38528080329SPaul Mundt 	return 0;
38628080329SPaul Mundt }
38728080329SPaul Mundt 
38828080329SPaul Mundt static int fault_in_kernel_space(unsigned long address)
38928080329SPaul Mundt {
39028080329SPaul Mundt 	return address >= TASK_SIZE;
39128080329SPaul Mundt }
39228080329SPaul Mundt 
39328080329SPaul Mundt /*
39428080329SPaul Mundt  * This routine handles page faults.  It determines the address,
39528080329SPaul Mundt  * and the problem, and then passes it off to one of the appropriate
39628080329SPaul Mundt  * routines.
39728080329SPaul Mundt  */
39828080329SPaul Mundt asmlinkage void __kprobes do_page_fault(struct pt_regs *regs,
39928080329SPaul Mundt 					unsigned long error_code,
40028080329SPaul Mundt 					unsigned long address)
40128080329SPaul Mundt {
40228080329SPaul Mundt 	unsigned long vec;
40328080329SPaul Mundt 	struct task_struct *tsk;
40428080329SPaul Mundt 	struct mm_struct *mm;
40528080329SPaul Mundt 	struct vm_area_struct * vma;
40628080329SPaul Mundt 	int fault;
407759496baSJohannes Weiner 	unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
40828080329SPaul Mundt 
40928080329SPaul Mundt 	tsk = current;
41028080329SPaul Mundt 	mm = tsk->mm;
41128080329SPaul Mundt 	vec = lookup_exception_vector();
41228080329SPaul Mundt 
41328080329SPaul Mundt 	/*
41428080329SPaul Mundt 	 * We fault-in kernel-space virtual memory on-demand. The
41528080329SPaul Mundt 	 * 'reference' page table is init_mm.pgd.
41628080329SPaul Mundt 	 *
41728080329SPaul Mundt 	 * NOTE! We MUST NOT take any locks for this case. We may
41828080329SPaul Mundt 	 * be in an interrupt or a critical region, and should
41928080329SPaul Mundt 	 * only copy the information from the master page table,
42028080329SPaul Mundt 	 * nothing more.
42128080329SPaul Mundt 	 */
42228080329SPaul Mundt 	if (unlikely(fault_in_kernel_space(address))) {
42328080329SPaul Mundt 		if (vmalloc_fault(address) >= 0)
42428080329SPaul Mundt 			return;
42528080329SPaul Mundt 		if (notify_page_fault(regs, vec))
42628080329SPaul Mundt 			return;
42728080329SPaul Mundt 
42828080329SPaul Mundt 		bad_area_nosemaphore(regs, error_code, address);
42928080329SPaul Mundt 		return;
43028080329SPaul Mundt 	}
43128080329SPaul Mundt 
43228080329SPaul Mundt 	if (unlikely(notify_page_fault(regs, vec)))
43328080329SPaul Mundt 		return;
43428080329SPaul Mundt 
43528080329SPaul Mundt 	/* Only enable interrupts if they were on before the fault */
43628080329SPaul Mundt 	if ((regs->sr & SR_IMASK) != SR_IMASK)
43728080329SPaul Mundt 		local_irq_enable();
43828080329SPaul Mundt 
43928080329SPaul Mundt 	perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
44028080329SPaul Mundt 
44128080329SPaul Mundt 	/*
44228080329SPaul Mundt 	 * If we're in an interrupt, have no user context or are running
44370ffdb93SDavid Hildenbrand 	 * with pagefaults disabled then we must not take the fault:
44428080329SPaul Mundt 	 */
44570ffdb93SDavid Hildenbrand 	if (unlikely(faulthandler_disabled() || !mm)) {
44628080329SPaul Mundt 		bad_area_nosemaphore(regs, error_code, address);
44728080329SPaul Mundt 		return;
44828080329SPaul Mundt 	}
44928080329SPaul Mundt 
45028080329SPaul Mundt retry:
45128080329SPaul Mundt 	down_read(&mm->mmap_sem);
45228080329SPaul Mundt 
45328080329SPaul Mundt 	vma = find_vma(mm, address);
45428080329SPaul Mundt 	if (unlikely(!vma)) {
45528080329SPaul Mundt 		bad_area(regs, error_code, address);
45628080329SPaul Mundt 		return;
45728080329SPaul Mundt 	}
45828080329SPaul Mundt 	if (likely(vma->vm_start <= address))
45928080329SPaul Mundt 		goto good_area;
46028080329SPaul Mundt 	if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) {
46128080329SPaul Mundt 		bad_area(regs, error_code, address);
46228080329SPaul Mundt 		return;
46328080329SPaul Mundt 	}
46428080329SPaul Mundt 	if (unlikely(expand_stack(vma, address))) {
46528080329SPaul Mundt 		bad_area(regs, error_code, address);
46628080329SPaul Mundt 		return;
46728080329SPaul Mundt 	}
46828080329SPaul Mundt 
46928080329SPaul Mundt 	/*
47028080329SPaul Mundt 	 * Ok, we have a good vm_area for this memory access, so
47128080329SPaul Mundt 	 * we can handle it..
47228080329SPaul Mundt 	 */
47328080329SPaul Mundt good_area:
47428080329SPaul Mundt 	if (unlikely(access_error(error_code, vma))) {
47528080329SPaul Mundt 		bad_area_access_error(regs, error_code, address);
47628080329SPaul Mundt 		return;
47728080329SPaul Mundt 	}
47828080329SPaul Mundt 
47928080329SPaul Mundt 	set_thread_fault_code(error_code);
48028080329SPaul Mundt 
481759496baSJohannes Weiner 	if (user_mode(regs))
482759496baSJohannes Weiner 		flags |= FAULT_FLAG_USER;
483759496baSJohannes Weiner 	if (error_code & FAULT_CODE_WRITE)
484759496baSJohannes Weiner 		flags |= FAULT_FLAG_WRITE;
485759496baSJohannes Weiner 
48628080329SPaul Mundt 	/*
48728080329SPaul Mundt 	 * If for any reason at all we couldn't handle the fault,
48828080329SPaul Mundt 	 * make sure we exit gracefully rather than endlessly redo
48928080329SPaul Mundt 	 * the fault.
49028080329SPaul Mundt 	 */
491dcddffd4SKirill A. Shutemov 	fault = handle_mm_fault(vma, address, flags);
49228080329SPaul Mundt 
49328080329SPaul Mundt 	if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR)))
49428080329SPaul Mundt 		if (mm_fault_error(regs, error_code, address, fault))
49528080329SPaul Mundt 			return;
49628080329SPaul Mundt 
49728080329SPaul Mundt 	if (flags & FAULT_FLAG_ALLOW_RETRY) {
49828080329SPaul Mundt 		if (fault & VM_FAULT_MAJOR) {
49928080329SPaul Mundt 			tsk->maj_flt++;
50028080329SPaul Mundt 			perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
50128080329SPaul Mundt 				      regs, address);
50228080329SPaul Mundt 		} else {
50328080329SPaul Mundt 			tsk->min_flt++;
50428080329SPaul Mundt 			perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
50528080329SPaul Mundt 				      regs, address);
50628080329SPaul Mundt 		}
50728080329SPaul Mundt 		if (fault & VM_FAULT_RETRY) {
50828080329SPaul Mundt 			flags &= ~FAULT_FLAG_ALLOW_RETRY;
50945cac65bSShaohua Li 			flags |= FAULT_FLAG_TRIED;
51028080329SPaul Mundt 
51128080329SPaul Mundt 			/*
51228080329SPaul Mundt 			 * No need to up_read(&mm->mmap_sem) as we would
51328080329SPaul Mundt 			 * have already released it in __lock_page_or_retry
51428080329SPaul Mundt 			 * in mm/filemap.c.
51528080329SPaul Mundt 			 */
51628080329SPaul Mundt 			goto retry;
51728080329SPaul Mundt 		}
51828080329SPaul Mundt 	}
51928080329SPaul Mundt 
52028080329SPaul Mundt 	up_read(&mm->mmap_sem);
52128080329SPaul Mundt }
522