128080329SPaul Mundt /* 228080329SPaul Mundt * Page fault handler for SH with an MMU. 328080329SPaul Mundt * 428080329SPaul Mundt * Copyright (C) 1999 Niibe Yutaka 528080329SPaul Mundt * Copyright (C) 2003 - 2012 Paul Mundt 628080329SPaul Mundt * 728080329SPaul Mundt * Based on linux/arch/i386/mm/fault.c: 828080329SPaul Mundt * Copyright (C) 1995 Linus Torvalds 928080329SPaul Mundt * 1028080329SPaul Mundt * This file is subject to the terms and conditions of the GNU General Public 1128080329SPaul Mundt * License. See the file "COPYING" in the main directory of this archive 1228080329SPaul Mundt * for more details. 1328080329SPaul Mundt */ 1428080329SPaul Mundt #include <linux/kernel.h> 1528080329SPaul Mundt #include <linux/mm.h> 1628080329SPaul Mundt #include <linux/hardirq.h> 1728080329SPaul Mundt #include <linux/kprobes.h> 1828080329SPaul Mundt #include <linux/perf_event.h> 1928080329SPaul Mundt #include <linux/kdebug.h> 2028080329SPaul Mundt #include <asm/io_trapped.h> 2128080329SPaul Mundt #include <asm/mmu_context.h> 2228080329SPaul Mundt #include <asm/tlbflush.h> 2328080329SPaul Mundt #include <asm/traps.h> 2428080329SPaul Mundt 2528080329SPaul Mundt static inline int notify_page_fault(struct pt_regs *regs, int trap) 2628080329SPaul Mundt { 2728080329SPaul Mundt int ret = 0; 2828080329SPaul Mundt 2928080329SPaul Mundt if (kprobes_built_in() && !user_mode(regs)) { 3028080329SPaul Mundt preempt_disable(); 3128080329SPaul Mundt if (kprobe_running() && kprobe_fault_handler(regs, trap)) 3228080329SPaul Mundt ret = 1; 3328080329SPaul Mundt preempt_enable(); 3428080329SPaul Mundt } 3528080329SPaul Mundt 3628080329SPaul Mundt return ret; 3728080329SPaul Mundt } 3828080329SPaul Mundt 3928080329SPaul Mundt static void 4028080329SPaul Mundt force_sig_info_fault(int si_signo, int si_code, unsigned long address, 4128080329SPaul Mundt struct task_struct *tsk) 4228080329SPaul Mundt { 4328080329SPaul Mundt siginfo_t info; 4428080329SPaul Mundt 4528080329SPaul Mundt info.si_signo = si_signo; 4628080329SPaul Mundt info.si_errno = 0; 4728080329SPaul Mundt info.si_code = si_code; 4828080329SPaul Mundt info.si_addr = (void __user *)address; 4928080329SPaul Mundt 5028080329SPaul Mundt force_sig_info(si_signo, &info, tsk); 5128080329SPaul Mundt } 5228080329SPaul Mundt 5328080329SPaul Mundt /* 5428080329SPaul Mundt * This is useful to dump out the page tables associated with 5528080329SPaul Mundt * 'addr' in mm 'mm'. 5628080329SPaul Mundt */ 5728080329SPaul Mundt static void show_pte(struct mm_struct *mm, unsigned long addr) 5828080329SPaul Mundt { 5928080329SPaul Mundt pgd_t *pgd; 6028080329SPaul Mundt 6190eed7d8SPaul Mundt if (mm) { 6228080329SPaul Mundt pgd = mm->pgd; 6390eed7d8SPaul Mundt } else { 6428080329SPaul Mundt pgd = get_TTB(); 6528080329SPaul Mundt 6690eed7d8SPaul Mundt if (unlikely(!pgd)) 6790eed7d8SPaul Mundt pgd = swapper_pg_dir; 6890eed7d8SPaul Mundt } 6990eed7d8SPaul Mundt 7028080329SPaul Mundt printk(KERN_ALERT "pgd = %p\n", pgd); 7128080329SPaul Mundt pgd += pgd_index(addr); 7228080329SPaul Mundt printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr, 7328080329SPaul Mundt (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd)); 7428080329SPaul Mundt 7528080329SPaul Mundt do { 7628080329SPaul Mundt pud_t *pud; 7728080329SPaul Mundt pmd_t *pmd; 7828080329SPaul Mundt pte_t *pte; 7928080329SPaul Mundt 8028080329SPaul Mundt if (pgd_none(*pgd)) 8128080329SPaul Mundt break; 8228080329SPaul Mundt 8328080329SPaul Mundt if (pgd_bad(*pgd)) { 8428080329SPaul Mundt printk("(bad)"); 8528080329SPaul Mundt break; 8628080329SPaul Mundt } 8728080329SPaul Mundt 8828080329SPaul Mundt pud = pud_offset(pgd, addr); 8928080329SPaul Mundt if (PTRS_PER_PUD != 1) 9028080329SPaul Mundt printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2), 9128080329SPaul Mundt (u64)pud_val(*pud)); 9228080329SPaul Mundt 9328080329SPaul Mundt if (pud_none(*pud)) 9428080329SPaul Mundt break; 9528080329SPaul Mundt 9628080329SPaul Mundt if (pud_bad(*pud)) { 9728080329SPaul Mundt printk("(bad)"); 9828080329SPaul Mundt break; 9928080329SPaul Mundt } 10028080329SPaul Mundt 10128080329SPaul Mundt pmd = pmd_offset(pud, addr); 10228080329SPaul Mundt if (PTRS_PER_PMD != 1) 10328080329SPaul Mundt printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2), 10428080329SPaul Mundt (u64)pmd_val(*pmd)); 10528080329SPaul Mundt 10628080329SPaul Mundt if (pmd_none(*pmd)) 10728080329SPaul Mundt break; 10828080329SPaul Mundt 10928080329SPaul Mundt if (pmd_bad(*pmd)) { 11028080329SPaul Mundt printk("(bad)"); 11128080329SPaul Mundt break; 11228080329SPaul Mundt } 11328080329SPaul Mundt 11428080329SPaul Mundt /* We must not map this if we have highmem enabled */ 11528080329SPaul Mundt if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT))) 11628080329SPaul Mundt break; 11728080329SPaul Mundt 11828080329SPaul Mundt pte = pte_offset_kernel(pmd, addr); 11928080329SPaul Mundt printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2), 12028080329SPaul Mundt (u64)pte_val(*pte)); 12128080329SPaul Mundt } while (0); 12228080329SPaul Mundt 12328080329SPaul Mundt printk("\n"); 12428080329SPaul Mundt } 12528080329SPaul Mundt 12628080329SPaul Mundt static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address) 12728080329SPaul Mundt { 12828080329SPaul Mundt unsigned index = pgd_index(address); 12928080329SPaul Mundt pgd_t *pgd_k; 13028080329SPaul Mundt pud_t *pud, *pud_k; 13128080329SPaul Mundt pmd_t *pmd, *pmd_k; 13228080329SPaul Mundt 13328080329SPaul Mundt pgd += index; 13428080329SPaul Mundt pgd_k = init_mm.pgd + index; 13528080329SPaul Mundt 13628080329SPaul Mundt if (!pgd_present(*pgd_k)) 13728080329SPaul Mundt return NULL; 13828080329SPaul Mundt 13928080329SPaul Mundt pud = pud_offset(pgd, address); 14028080329SPaul Mundt pud_k = pud_offset(pgd_k, address); 14128080329SPaul Mundt if (!pud_present(*pud_k)) 14228080329SPaul Mundt return NULL; 14328080329SPaul Mundt 14428080329SPaul Mundt if (!pud_present(*pud)) 14528080329SPaul Mundt set_pud(pud, *pud_k); 14628080329SPaul Mundt 14728080329SPaul Mundt pmd = pmd_offset(pud, address); 14828080329SPaul Mundt pmd_k = pmd_offset(pud_k, address); 14928080329SPaul Mundt if (!pmd_present(*pmd_k)) 15028080329SPaul Mundt return NULL; 15128080329SPaul Mundt 15228080329SPaul Mundt if (!pmd_present(*pmd)) 15328080329SPaul Mundt set_pmd(pmd, *pmd_k); 15428080329SPaul Mundt else { 15528080329SPaul Mundt /* 15628080329SPaul Mundt * The page tables are fully synchronised so there must 15728080329SPaul Mundt * be another reason for the fault. Return NULL here to 15828080329SPaul Mundt * signal that we have not taken care of the fault. 15928080329SPaul Mundt */ 16028080329SPaul Mundt BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k)); 16128080329SPaul Mundt return NULL; 16228080329SPaul Mundt } 16328080329SPaul Mundt 16428080329SPaul Mundt return pmd_k; 16528080329SPaul Mundt } 16628080329SPaul Mundt 167d8fd35fcSPaul Mundt #ifdef CONFIG_SH_STORE_QUEUES 168d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT P3_ADDR_MAX 169d8fd35fcSPaul Mundt #else 170d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT VMALLOC_END 171d8fd35fcSPaul Mundt #endif 172d8fd35fcSPaul Mundt 17328080329SPaul Mundt /* 17428080329SPaul Mundt * Handle a fault on the vmalloc or module mapping area 17528080329SPaul Mundt */ 17628080329SPaul Mundt static noinline int vmalloc_fault(unsigned long address) 17728080329SPaul Mundt { 17828080329SPaul Mundt pgd_t *pgd_k; 17928080329SPaul Mundt pmd_t *pmd_k; 18028080329SPaul Mundt pte_t *pte_k; 18128080329SPaul Mundt 182c3e0af98SPaul Mundt /* Make sure we are in vmalloc/module/P3 area: */ 183d8fd35fcSPaul Mundt if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT)) 18428080329SPaul Mundt return -1; 18528080329SPaul Mundt 18628080329SPaul Mundt /* 18728080329SPaul Mundt * Synchronize this task's top level page-table 18828080329SPaul Mundt * with the 'reference' page table. 18928080329SPaul Mundt * 19028080329SPaul Mundt * Do _not_ use "current" here. We might be inside 19128080329SPaul Mundt * an interrupt in the middle of a task switch.. 19228080329SPaul Mundt */ 19328080329SPaul Mundt pgd_k = get_TTB(); 19428080329SPaul Mundt pmd_k = vmalloc_sync_one(pgd_k, address); 19528080329SPaul Mundt if (!pmd_k) 19628080329SPaul Mundt return -1; 19728080329SPaul Mundt 19828080329SPaul Mundt pte_k = pte_offset_kernel(pmd_k, address); 19928080329SPaul Mundt if (!pte_present(*pte_k)) 20028080329SPaul Mundt return -1; 20128080329SPaul Mundt 20228080329SPaul Mundt return 0; 20328080329SPaul Mundt } 20428080329SPaul Mundt 20528080329SPaul Mundt static void 20628080329SPaul Mundt show_fault_oops(struct pt_regs *regs, unsigned long address) 20728080329SPaul Mundt { 20828080329SPaul Mundt if (!oops_may_print()) 20928080329SPaul Mundt return; 21028080329SPaul Mundt 21128080329SPaul Mundt printk(KERN_ALERT "BUG: unable to handle kernel "); 21228080329SPaul Mundt if (address < PAGE_SIZE) 21328080329SPaul Mundt printk(KERN_CONT "NULL pointer dereference"); 21428080329SPaul Mundt else 21528080329SPaul Mundt printk(KERN_CONT "paging request"); 21628080329SPaul Mundt 21728080329SPaul Mundt printk(KERN_CONT " at %08lx\n", address); 21828080329SPaul Mundt printk(KERN_ALERT "PC:"); 21928080329SPaul Mundt printk_address(regs->pc, 1); 22028080329SPaul Mundt 22128080329SPaul Mundt show_pte(NULL, address); 22228080329SPaul Mundt } 22328080329SPaul Mundt 22428080329SPaul Mundt static noinline void 22528080329SPaul Mundt no_context(struct pt_regs *regs, unsigned long error_code, 22628080329SPaul Mundt unsigned long address) 22728080329SPaul Mundt { 22828080329SPaul Mundt /* Are we prepared to handle this kernel fault? */ 22928080329SPaul Mundt if (fixup_exception(regs)) 23028080329SPaul Mundt return; 23128080329SPaul Mundt 23228080329SPaul Mundt if (handle_trapped_io(regs, address)) 23328080329SPaul Mundt return; 23428080329SPaul Mundt 23528080329SPaul Mundt /* 23628080329SPaul Mundt * Oops. The kernel tried to access some bad page. We'll have to 23728080329SPaul Mundt * terminate things with extreme prejudice. 23828080329SPaul Mundt */ 23928080329SPaul Mundt bust_spinlocks(1); 24028080329SPaul Mundt 24128080329SPaul Mundt show_fault_oops(regs, address); 24228080329SPaul Mundt 24328080329SPaul Mundt die("Oops", regs, error_code); 24428080329SPaul Mundt bust_spinlocks(0); 24528080329SPaul Mundt do_exit(SIGKILL); 24628080329SPaul Mundt } 24728080329SPaul Mundt 24828080329SPaul Mundt static void 24928080329SPaul Mundt __bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, 25028080329SPaul Mundt unsigned long address, int si_code) 25128080329SPaul Mundt { 25228080329SPaul Mundt struct task_struct *tsk = current; 25328080329SPaul Mundt 25428080329SPaul Mundt /* User mode accesses just cause a SIGSEGV */ 25528080329SPaul Mundt if (user_mode(regs)) { 25628080329SPaul Mundt /* 25728080329SPaul Mundt * It's possible to have interrupts off here: 25828080329SPaul Mundt */ 25928080329SPaul Mundt local_irq_enable(); 26028080329SPaul Mundt 26128080329SPaul Mundt force_sig_info_fault(SIGSEGV, si_code, address, tsk); 26228080329SPaul Mundt 26328080329SPaul Mundt return; 26428080329SPaul Mundt } 26528080329SPaul Mundt 26628080329SPaul Mundt no_context(regs, error_code, address); 26728080329SPaul Mundt } 26828080329SPaul Mundt 26928080329SPaul Mundt static noinline void 27028080329SPaul Mundt bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, 27128080329SPaul Mundt unsigned long address) 27228080329SPaul Mundt { 27328080329SPaul Mundt __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR); 27428080329SPaul Mundt } 27528080329SPaul Mundt 27628080329SPaul Mundt static void 27728080329SPaul Mundt __bad_area(struct pt_regs *regs, unsigned long error_code, 27828080329SPaul Mundt unsigned long address, int si_code) 27928080329SPaul Mundt { 28028080329SPaul Mundt struct mm_struct *mm = current->mm; 28128080329SPaul Mundt 28228080329SPaul Mundt /* 28328080329SPaul Mundt * Something tried to access memory that isn't in our memory map.. 28428080329SPaul Mundt * Fix it, but check if it's kernel or user first.. 28528080329SPaul Mundt */ 28628080329SPaul Mundt up_read(&mm->mmap_sem); 28728080329SPaul Mundt 28828080329SPaul Mundt __bad_area_nosemaphore(regs, error_code, address, si_code); 28928080329SPaul Mundt } 29028080329SPaul Mundt 29128080329SPaul Mundt static noinline void 29228080329SPaul Mundt bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address) 29328080329SPaul Mundt { 29428080329SPaul Mundt __bad_area(regs, error_code, address, SEGV_MAPERR); 29528080329SPaul Mundt } 29628080329SPaul Mundt 29728080329SPaul Mundt static noinline void 29828080329SPaul Mundt bad_area_access_error(struct pt_regs *regs, unsigned long error_code, 29928080329SPaul Mundt unsigned long address) 30028080329SPaul Mundt { 30128080329SPaul Mundt __bad_area(regs, error_code, address, SEGV_ACCERR); 30228080329SPaul Mundt } 30328080329SPaul Mundt 30428080329SPaul Mundt static void 30528080329SPaul Mundt do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address) 30628080329SPaul Mundt { 30728080329SPaul Mundt struct task_struct *tsk = current; 30828080329SPaul Mundt struct mm_struct *mm = tsk->mm; 30928080329SPaul Mundt 31028080329SPaul Mundt up_read(&mm->mmap_sem); 31128080329SPaul Mundt 31228080329SPaul Mundt /* Kernel mode? Handle exceptions or die: */ 31328080329SPaul Mundt if (!user_mode(regs)) 31428080329SPaul Mundt no_context(regs, error_code, address); 31528080329SPaul Mundt 31628080329SPaul Mundt force_sig_info_fault(SIGBUS, BUS_ADRERR, address, tsk); 31728080329SPaul Mundt } 31828080329SPaul Mundt 31928080329SPaul Mundt static noinline int 32028080329SPaul Mundt mm_fault_error(struct pt_regs *regs, unsigned long error_code, 32128080329SPaul Mundt unsigned long address, unsigned int fault) 32228080329SPaul Mundt { 32328080329SPaul Mundt /* 32428080329SPaul Mundt * Pagefault was interrupted by SIGKILL. We have no reason to 32528080329SPaul Mundt * continue pagefault. 32628080329SPaul Mundt */ 32728080329SPaul Mundt if (fatal_signal_pending(current)) { 32828080329SPaul Mundt if (!(fault & VM_FAULT_RETRY)) 32928080329SPaul Mundt up_read(¤t->mm->mmap_sem); 33028080329SPaul Mundt if (!user_mode(regs)) 33128080329SPaul Mundt no_context(regs, error_code, address); 33228080329SPaul Mundt return 1; 33328080329SPaul Mundt } 33428080329SPaul Mundt 33528080329SPaul Mundt if (!(fault & VM_FAULT_ERROR)) 33628080329SPaul Mundt return 0; 33728080329SPaul Mundt 33828080329SPaul Mundt if (fault & VM_FAULT_OOM) { 33928080329SPaul Mundt /* Kernel mode? Handle exceptions or die: */ 34028080329SPaul Mundt if (!user_mode(regs)) { 34128080329SPaul Mundt up_read(¤t->mm->mmap_sem); 34228080329SPaul Mundt no_context(regs, error_code, address); 34328080329SPaul Mundt return 1; 34428080329SPaul Mundt } 345*c2d23f91SDavid Rientjes up_read(¤t->mm->mmap_sem); 34628080329SPaul Mundt 347*c2d23f91SDavid Rientjes /* 348*c2d23f91SDavid Rientjes * We ran out of memory, call the OOM killer, and return the 349*c2d23f91SDavid Rientjes * userspace (which will retry the fault, or kill us if we got 350*c2d23f91SDavid Rientjes * oom-killed): 351*c2d23f91SDavid Rientjes */ 352*c2d23f91SDavid Rientjes pagefault_out_of_memory(); 35328080329SPaul Mundt } else { 35428080329SPaul Mundt if (fault & VM_FAULT_SIGBUS) 35528080329SPaul Mundt do_sigbus(regs, error_code, address); 35628080329SPaul Mundt else 35728080329SPaul Mundt BUG(); 35828080329SPaul Mundt } 35928080329SPaul Mundt 36028080329SPaul Mundt return 1; 36128080329SPaul Mundt } 36228080329SPaul Mundt 36328080329SPaul Mundt static inline int access_error(int error_code, struct vm_area_struct *vma) 36428080329SPaul Mundt { 36528080329SPaul Mundt if (error_code & FAULT_CODE_WRITE) { 36628080329SPaul Mundt /* write, present and write, not present: */ 36728080329SPaul Mundt if (unlikely(!(vma->vm_flags & VM_WRITE))) 36828080329SPaul Mundt return 1; 36928080329SPaul Mundt return 0; 37028080329SPaul Mundt } 37128080329SPaul Mundt 37228080329SPaul Mundt /* ITLB miss on NX page */ 37328080329SPaul Mundt if (unlikely((error_code & FAULT_CODE_ITLB) && 37428080329SPaul Mundt !(vma->vm_flags & VM_EXEC))) 37528080329SPaul Mundt return 1; 37628080329SPaul Mundt 37728080329SPaul Mundt /* read, not present: */ 37828080329SPaul Mundt if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE)))) 37928080329SPaul Mundt return 1; 38028080329SPaul Mundt 38128080329SPaul Mundt return 0; 38228080329SPaul Mundt } 38328080329SPaul Mundt 38428080329SPaul Mundt static int fault_in_kernel_space(unsigned long address) 38528080329SPaul Mundt { 38628080329SPaul Mundt return address >= TASK_SIZE; 38728080329SPaul Mundt } 38828080329SPaul Mundt 38928080329SPaul Mundt /* 39028080329SPaul Mundt * This routine handles page faults. It determines the address, 39128080329SPaul Mundt * and the problem, and then passes it off to one of the appropriate 39228080329SPaul Mundt * routines. 39328080329SPaul Mundt */ 39428080329SPaul Mundt asmlinkage void __kprobes do_page_fault(struct pt_regs *regs, 39528080329SPaul Mundt unsigned long error_code, 39628080329SPaul Mundt unsigned long address) 39728080329SPaul Mundt { 39828080329SPaul Mundt unsigned long vec; 39928080329SPaul Mundt struct task_struct *tsk; 40028080329SPaul Mundt struct mm_struct *mm; 40128080329SPaul Mundt struct vm_area_struct * vma; 40228080329SPaul Mundt int fault; 40328080329SPaul Mundt int write = error_code & FAULT_CODE_WRITE; 40428080329SPaul Mundt unsigned int flags = (FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE | 40528080329SPaul Mundt (write ? FAULT_FLAG_WRITE : 0)); 40628080329SPaul Mundt 40728080329SPaul Mundt tsk = current; 40828080329SPaul Mundt mm = tsk->mm; 40928080329SPaul Mundt vec = lookup_exception_vector(); 41028080329SPaul Mundt 41128080329SPaul Mundt /* 41228080329SPaul Mundt * We fault-in kernel-space virtual memory on-demand. The 41328080329SPaul Mundt * 'reference' page table is init_mm.pgd. 41428080329SPaul Mundt * 41528080329SPaul Mundt * NOTE! We MUST NOT take any locks for this case. We may 41628080329SPaul Mundt * be in an interrupt or a critical region, and should 41728080329SPaul Mundt * only copy the information from the master page table, 41828080329SPaul Mundt * nothing more. 41928080329SPaul Mundt */ 42028080329SPaul Mundt if (unlikely(fault_in_kernel_space(address))) { 42128080329SPaul Mundt if (vmalloc_fault(address) >= 0) 42228080329SPaul Mundt return; 42328080329SPaul Mundt if (notify_page_fault(regs, vec)) 42428080329SPaul Mundt return; 42528080329SPaul Mundt 42628080329SPaul Mundt bad_area_nosemaphore(regs, error_code, address); 42728080329SPaul Mundt return; 42828080329SPaul Mundt } 42928080329SPaul Mundt 43028080329SPaul Mundt if (unlikely(notify_page_fault(regs, vec))) 43128080329SPaul Mundt return; 43228080329SPaul Mundt 43328080329SPaul Mundt /* Only enable interrupts if they were on before the fault */ 43428080329SPaul Mundt if ((regs->sr & SR_IMASK) != SR_IMASK) 43528080329SPaul Mundt local_irq_enable(); 43628080329SPaul Mundt 43728080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address); 43828080329SPaul Mundt 43928080329SPaul Mundt /* 44028080329SPaul Mundt * If we're in an interrupt, have no user context or are running 44128080329SPaul Mundt * in an atomic region then we must not take the fault: 44228080329SPaul Mundt */ 44328080329SPaul Mundt if (unlikely(in_atomic() || !mm)) { 44428080329SPaul Mundt bad_area_nosemaphore(regs, error_code, address); 44528080329SPaul Mundt return; 44628080329SPaul Mundt } 44728080329SPaul Mundt 44828080329SPaul Mundt retry: 44928080329SPaul Mundt down_read(&mm->mmap_sem); 45028080329SPaul Mundt 45128080329SPaul Mundt vma = find_vma(mm, address); 45228080329SPaul Mundt if (unlikely(!vma)) { 45328080329SPaul Mundt bad_area(regs, error_code, address); 45428080329SPaul Mundt return; 45528080329SPaul Mundt } 45628080329SPaul Mundt if (likely(vma->vm_start <= address)) 45728080329SPaul Mundt goto good_area; 45828080329SPaul Mundt if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) { 45928080329SPaul Mundt bad_area(regs, error_code, address); 46028080329SPaul Mundt return; 46128080329SPaul Mundt } 46228080329SPaul Mundt if (unlikely(expand_stack(vma, address))) { 46328080329SPaul Mundt bad_area(regs, error_code, address); 46428080329SPaul Mundt return; 46528080329SPaul Mundt } 46628080329SPaul Mundt 46728080329SPaul Mundt /* 46828080329SPaul Mundt * Ok, we have a good vm_area for this memory access, so 46928080329SPaul Mundt * we can handle it.. 47028080329SPaul Mundt */ 47128080329SPaul Mundt good_area: 47228080329SPaul Mundt if (unlikely(access_error(error_code, vma))) { 47328080329SPaul Mundt bad_area_access_error(regs, error_code, address); 47428080329SPaul Mundt return; 47528080329SPaul Mundt } 47628080329SPaul Mundt 47728080329SPaul Mundt set_thread_fault_code(error_code); 47828080329SPaul Mundt 47928080329SPaul Mundt /* 48028080329SPaul Mundt * If for any reason at all we couldn't handle the fault, 48128080329SPaul Mundt * make sure we exit gracefully rather than endlessly redo 48228080329SPaul Mundt * the fault. 48328080329SPaul Mundt */ 48428080329SPaul Mundt fault = handle_mm_fault(mm, vma, address, flags); 48528080329SPaul Mundt 48628080329SPaul Mundt if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR))) 48728080329SPaul Mundt if (mm_fault_error(regs, error_code, address, fault)) 48828080329SPaul Mundt return; 48928080329SPaul Mundt 49028080329SPaul Mundt if (flags & FAULT_FLAG_ALLOW_RETRY) { 49128080329SPaul Mundt if (fault & VM_FAULT_MAJOR) { 49228080329SPaul Mundt tsk->maj_flt++; 49328080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1, 49428080329SPaul Mundt regs, address); 49528080329SPaul Mundt } else { 49628080329SPaul Mundt tsk->min_flt++; 49728080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1, 49828080329SPaul Mundt regs, address); 49928080329SPaul Mundt } 50028080329SPaul Mundt if (fault & VM_FAULT_RETRY) { 50128080329SPaul Mundt flags &= ~FAULT_FLAG_ALLOW_RETRY; 50245cac65bSShaohua Li flags |= FAULT_FLAG_TRIED; 50328080329SPaul Mundt 50428080329SPaul Mundt /* 50528080329SPaul Mundt * No need to up_read(&mm->mmap_sem) as we would 50628080329SPaul Mundt * have already released it in __lock_page_or_retry 50728080329SPaul Mundt * in mm/filemap.c. 50828080329SPaul Mundt */ 50928080329SPaul Mundt goto retry; 51028080329SPaul Mundt } 51128080329SPaul Mundt } 51228080329SPaul Mundt 51328080329SPaul Mundt up_read(&mm->mmap_sem); 51428080329SPaul Mundt } 515