128080329SPaul Mundt /* 228080329SPaul Mundt * Page fault handler for SH with an MMU. 328080329SPaul Mundt * 428080329SPaul Mundt * Copyright (C) 1999 Niibe Yutaka 528080329SPaul Mundt * Copyright (C) 2003 - 2012 Paul Mundt 628080329SPaul Mundt * 728080329SPaul Mundt * Based on linux/arch/i386/mm/fault.c: 828080329SPaul Mundt * Copyright (C) 1995 Linus Torvalds 928080329SPaul Mundt * 1028080329SPaul Mundt * This file is subject to the terms and conditions of the GNU General Public 1128080329SPaul Mundt * License. See the file "COPYING" in the main directory of this archive 1228080329SPaul Mundt * for more details. 1328080329SPaul Mundt */ 1428080329SPaul Mundt #include <linux/kernel.h> 1528080329SPaul Mundt #include <linux/mm.h> 1628080329SPaul Mundt #include <linux/hardirq.h> 1728080329SPaul Mundt #include <linux/kprobes.h> 1828080329SPaul Mundt #include <linux/perf_event.h> 1928080329SPaul Mundt #include <linux/kdebug.h> 2070ffdb93SDavid Hildenbrand #include <linux/uaccess.h> 2128080329SPaul Mundt #include <asm/io_trapped.h> 2228080329SPaul Mundt #include <asm/mmu_context.h> 2328080329SPaul Mundt #include <asm/tlbflush.h> 2428080329SPaul Mundt #include <asm/traps.h> 2528080329SPaul Mundt 2628080329SPaul Mundt static inline int notify_page_fault(struct pt_regs *regs, int trap) 2728080329SPaul Mundt { 2828080329SPaul Mundt int ret = 0; 2928080329SPaul Mundt 3028080329SPaul Mundt if (kprobes_built_in() && !user_mode(regs)) { 3128080329SPaul Mundt preempt_disable(); 3228080329SPaul Mundt if (kprobe_running() && kprobe_fault_handler(regs, trap)) 3328080329SPaul Mundt ret = 1; 3428080329SPaul Mundt preempt_enable(); 3528080329SPaul Mundt } 3628080329SPaul Mundt 3728080329SPaul Mundt return ret; 3828080329SPaul Mundt } 3928080329SPaul Mundt 4028080329SPaul Mundt static void 4128080329SPaul Mundt force_sig_info_fault(int si_signo, int si_code, unsigned long address, 4228080329SPaul Mundt struct task_struct *tsk) 4328080329SPaul Mundt { 4428080329SPaul Mundt siginfo_t info; 4528080329SPaul Mundt 4628080329SPaul Mundt info.si_signo = si_signo; 4728080329SPaul Mundt info.si_errno = 0; 4828080329SPaul Mundt info.si_code = si_code; 4928080329SPaul Mundt info.si_addr = (void __user *)address; 5028080329SPaul Mundt 5128080329SPaul Mundt force_sig_info(si_signo, &info, tsk); 5228080329SPaul Mundt } 5328080329SPaul Mundt 5428080329SPaul Mundt /* 5528080329SPaul Mundt * This is useful to dump out the page tables associated with 5628080329SPaul Mundt * 'addr' in mm 'mm'. 5728080329SPaul Mundt */ 5828080329SPaul Mundt static void show_pte(struct mm_struct *mm, unsigned long addr) 5928080329SPaul Mundt { 6028080329SPaul Mundt pgd_t *pgd; 6128080329SPaul Mundt 6290eed7d8SPaul Mundt if (mm) { 6328080329SPaul Mundt pgd = mm->pgd; 6490eed7d8SPaul Mundt } else { 6528080329SPaul Mundt pgd = get_TTB(); 6628080329SPaul Mundt 6790eed7d8SPaul Mundt if (unlikely(!pgd)) 6890eed7d8SPaul Mundt pgd = swapper_pg_dir; 6990eed7d8SPaul Mundt } 7090eed7d8SPaul Mundt 7128080329SPaul Mundt printk(KERN_ALERT "pgd = %p\n", pgd); 7228080329SPaul Mundt pgd += pgd_index(addr); 7328080329SPaul Mundt printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr, 7428080329SPaul Mundt (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd)); 7528080329SPaul Mundt 7628080329SPaul Mundt do { 7728080329SPaul Mundt pud_t *pud; 7828080329SPaul Mundt pmd_t *pmd; 7928080329SPaul Mundt pte_t *pte; 8028080329SPaul Mundt 8128080329SPaul Mundt if (pgd_none(*pgd)) 8228080329SPaul Mundt break; 8328080329SPaul Mundt 8428080329SPaul Mundt if (pgd_bad(*pgd)) { 8528080329SPaul Mundt printk("(bad)"); 8628080329SPaul Mundt break; 8728080329SPaul Mundt } 8828080329SPaul Mundt 8928080329SPaul Mundt pud = pud_offset(pgd, addr); 9028080329SPaul Mundt if (PTRS_PER_PUD != 1) 9128080329SPaul Mundt printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2), 9228080329SPaul Mundt (u64)pud_val(*pud)); 9328080329SPaul Mundt 9428080329SPaul Mundt if (pud_none(*pud)) 9528080329SPaul Mundt break; 9628080329SPaul Mundt 9728080329SPaul Mundt if (pud_bad(*pud)) { 9828080329SPaul Mundt printk("(bad)"); 9928080329SPaul Mundt break; 10028080329SPaul Mundt } 10128080329SPaul Mundt 10228080329SPaul Mundt pmd = pmd_offset(pud, addr); 10328080329SPaul Mundt if (PTRS_PER_PMD != 1) 10428080329SPaul Mundt printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2), 10528080329SPaul Mundt (u64)pmd_val(*pmd)); 10628080329SPaul Mundt 10728080329SPaul Mundt if (pmd_none(*pmd)) 10828080329SPaul Mundt break; 10928080329SPaul Mundt 11028080329SPaul Mundt if (pmd_bad(*pmd)) { 11128080329SPaul Mundt printk("(bad)"); 11228080329SPaul Mundt break; 11328080329SPaul Mundt } 11428080329SPaul Mundt 11528080329SPaul Mundt /* We must not map this if we have highmem enabled */ 11628080329SPaul Mundt if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT))) 11728080329SPaul Mundt break; 11828080329SPaul Mundt 11928080329SPaul Mundt pte = pte_offset_kernel(pmd, addr); 12028080329SPaul Mundt printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2), 12128080329SPaul Mundt (u64)pte_val(*pte)); 12228080329SPaul Mundt } while (0); 12328080329SPaul Mundt 12428080329SPaul Mundt printk("\n"); 12528080329SPaul Mundt } 12628080329SPaul Mundt 12728080329SPaul Mundt static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address) 12828080329SPaul Mundt { 12928080329SPaul Mundt unsigned index = pgd_index(address); 13028080329SPaul Mundt pgd_t *pgd_k; 13128080329SPaul Mundt pud_t *pud, *pud_k; 13228080329SPaul Mundt pmd_t *pmd, *pmd_k; 13328080329SPaul Mundt 13428080329SPaul Mundt pgd += index; 13528080329SPaul Mundt pgd_k = init_mm.pgd + index; 13628080329SPaul Mundt 13728080329SPaul Mundt if (!pgd_present(*pgd_k)) 13828080329SPaul Mundt return NULL; 13928080329SPaul Mundt 14028080329SPaul Mundt pud = pud_offset(pgd, address); 14128080329SPaul Mundt pud_k = pud_offset(pgd_k, address); 14228080329SPaul Mundt if (!pud_present(*pud_k)) 14328080329SPaul Mundt return NULL; 14428080329SPaul Mundt 14528080329SPaul Mundt if (!pud_present(*pud)) 14628080329SPaul Mundt set_pud(pud, *pud_k); 14728080329SPaul Mundt 14828080329SPaul Mundt pmd = pmd_offset(pud, address); 14928080329SPaul Mundt pmd_k = pmd_offset(pud_k, address); 15028080329SPaul Mundt if (!pmd_present(*pmd_k)) 15128080329SPaul Mundt return NULL; 15228080329SPaul Mundt 15328080329SPaul Mundt if (!pmd_present(*pmd)) 15428080329SPaul Mundt set_pmd(pmd, *pmd_k); 15528080329SPaul Mundt else { 15628080329SPaul Mundt /* 15728080329SPaul Mundt * The page tables are fully synchronised so there must 15828080329SPaul Mundt * be another reason for the fault. Return NULL here to 15928080329SPaul Mundt * signal that we have not taken care of the fault. 16028080329SPaul Mundt */ 16128080329SPaul Mundt BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k)); 16228080329SPaul Mundt return NULL; 16328080329SPaul Mundt } 16428080329SPaul Mundt 16528080329SPaul Mundt return pmd_k; 16628080329SPaul Mundt } 16728080329SPaul Mundt 168d8fd35fcSPaul Mundt #ifdef CONFIG_SH_STORE_QUEUES 169d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT P3_ADDR_MAX 170d8fd35fcSPaul Mundt #else 171d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT VMALLOC_END 172d8fd35fcSPaul Mundt #endif 173d8fd35fcSPaul Mundt 17428080329SPaul Mundt /* 17528080329SPaul Mundt * Handle a fault on the vmalloc or module mapping area 17628080329SPaul Mundt */ 17728080329SPaul Mundt static noinline int vmalloc_fault(unsigned long address) 17828080329SPaul Mundt { 17928080329SPaul Mundt pgd_t *pgd_k; 18028080329SPaul Mundt pmd_t *pmd_k; 18128080329SPaul Mundt pte_t *pte_k; 18228080329SPaul Mundt 183c3e0af98SPaul Mundt /* Make sure we are in vmalloc/module/P3 area: */ 184d8fd35fcSPaul Mundt if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT)) 18528080329SPaul Mundt return -1; 18628080329SPaul Mundt 18728080329SPaul Mundt /* 18828080329SPaul Mundt * Synchronize this task's top level page-table 18928080329SPaul Mundt * with the 'reference' page table. 19028080329SPaul Mundt * 19128080329SPaul Mundt * Do _not_ use "current" here. We might be inside 19228080329SPaul Mundt * an interrupt in the middle of a task switch.. 19328080329SPaul Mundt */ 19428080329SPaul Mundt pgd_k = get_TTB(); 19528080329SPaul Mundt pmd_k = vmalloc_sync_one(pgd_k, address); 19628080329SPaul Mundt if (!pmd_k) 19728080329SPaul Mundt return -1; 19828080329SPaul Mundt 19928080329SPaul Mundt pte_k = pte_offset_kernel(pmd_k, address); 20028080329SPaul Mundt if (!pte_present(*pte_k)) 20128080329SPaul Mundt return -1; 20228080329SPaul Mundt 20328080329SPaul Mundt return 0; 20428080329SPaul Mundt } 20528080329SPaul Mundt 20628080329SPaul Mundt static void 20728080329SPaul Mundt show_fault_oops(struct pt_regs *regs, unsigned long address) 20828080329SPaul Mundt { 20928080329SPaul Mundt if (!oops_may_print()) 21028080329SPaul Mundt return; 21128080329SPaul Mundt 21228080329SPaul Mundt printk(KERN_ALERT "BUG: unable to handle kernel "); 21328080329SPaul Mundt if (address < PAGE_SIZE) 21428080329SPaul Mundt printk(KERN_CONT "NULL pointer dereference"); 21528080329SPaul Mundt else 21628080329SPaul Mundt printk(KERN_CONT "paging request"); 21728080329SPaul Mundt 21828080329SPaul Mundt printk(KERN_CONT " at %08lx\n", address); 21928080329SPaul Mundt printk(KERN_ALERT "PC:"); 22028080329SPaul Mundt printk_address(regs->pc, 1); 22128080329SPaul Mundt 22228080329SPaul Mundt show_pte(NULL, address); 22328080329SPaul Mundt } 22428080329SPaul Mundt 22528080329SPaul Mundt static noinline void 22628080329SPaul Mundt no_context(struct pt_regs *regs, unsigned long error_code, 22728080329SPaul Mundt unsigned long address) 22828080329SPaul Mundt { 22928080329SPaul Mundt /* Are we prepared to handle this kernel fault? */ 23028080329SPaul Mundt if (fixup_exception(regs)) 23128080329SPaul Mundt return; 23228080329SPaul Mundt 23328080329SPaul Mundt if (handle_trapped_io(regs, address)) 23428080329SPaul Mundt return; 23528080329SPaul Mundt 23628080329SPaul Mundt /* 23728080329SPaul Mundt * Oops. The kernel tried to access some bad page. We'll have to 23828080329SPaul Mundt * terminate things with extreme prejudice. 23928080329SPaul Mundt */ 24028080329SPaul Mundt bust_spinlocks(1); 24128080329SPaul Mundt 24228080329SPaul Mundt show_fault_oops(regs, address); 24328080329SPaul Mundt 24428080329SPaul Mundt die("Oops", regs, error_code); 24528080329SPaul Mundt bust_spinlocks(0); 24628080329SPaul Mundt do_exit(SIGKILL); 24728080329SPaul Mundt } 24828080329SPaul Mundt 24928080329SPaul Mundt static void 25028080329SPaul Mundt __bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, 25128080329SPaul Mundt unsigned long address, int si_code) 25228080329SPaul Mundt { 25328080329SPaul Mundt struct task_struct *tsk = current; 25428080329SPaul Mundt 25528080329SPaul Mundt /* User mode accesses just cause a SIGSEGV */ 25628080329SPaul Mundt if (user_mode(regs)) { 25728080329SPaul Mundt /* 25828080329SPaul Mundt * It's possible to have interrupts off here: 25928080329SPaul Mundt */ 26028080329SPaul Mundt local_irq_enable(); 26128080329SPaul Mundt 26228080329SPaul Mundt force_sig_info_fault(SIGSEGV, si_code, address, tsk); 26328080329SPaul Mundt 26428080329SPaul Mundt return; 26528080329SPaul Mundt } 26628080329SPaul Mundt 26728080329SPaul Mundt no_context(regs, error_code, address); 26828080329SPaul Mundt } 26928080329SPaul Mundt 27028080329SPaul Mundt static noinline void 27128080329SPaul Mundt bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, 27228080329SPaul Mundt unsigned long address) 27328080329SPaul Mundt { 27428080329SPaul Mundt __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR); 27528080329SPaul Mundt } 27628080329SPaul Mundt 27728080329SPaul Mundt static void 27828080329SPaul Mundt __bad_area(struct pt_regs *regs, unsigned long error_code, 27928080329SPaul Mundt unsigned long address, int si_code) 28028080329SPaul Mundt { 28128080329SPaul Mundt struct mm_struct *mm = current->mm; 28228080329SPaul Mundt 28328080329SPaul Mundt /* 28428080329SPaul Mundt * Something tried to access memory that isn't in our memory map.. 28528080329SPaul Mundt * Fix it, but check if it's kernel or user first.. 28628080329SPaul Mundt */ 28728080329SPaul Mundt up_read(&mm->mmap_sem); 28828080329SPaul Mundt 28928080329SPaul Mundt __bad_area_nosemaphore(regs, error_code, address, si_code); 29028080329SPaul Mundt } 29128080329SPaul Mundt 29228080329SPaul Mundt static noinline void 29328080329SPaul Mundt bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address) 29428080329SPaul Mundt { 29528080329SPaul Mundt __bad_area(regs, error_code, address, SEGV_MAPERR); 29628080329SPaul Mundt } 29728080329SPaul Mundt 29828080329SPaul Mundt static noinline void 29928080329SPaul Mundt bad_area_access_error(struct pt_regs *regs, unsigned long error_code, 30028080329SPaul Mundt unsigned long address) 30128080329SPaul Mundt { 30228080329SPaul Mundt __bad_area(regs, error_code, address, SEGV_ACCERR); 30328080329SPaul Mundt } 30428080329SPaul Mundt 30528080329SPaul Mundt static void 30628080329SPaul Mundt do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address) 30728080329SPaul Mundt { 30828080329SPaul Mundt struct task_struct *tsk = current; 30928080329SPaul Mundt struct mm_struct *mm = tsk->mm; 31028080329SPaul Mundt 31128080329SPaul Mundt up_read(&mm->mmap_sem); 31228080329SPaul Mundt 31328080329SPaul Mundt /* Kernel mode? Handle exceptions or die: */ 31428080329SPaul Mundt if (!user_mode(regs)) 31528080329SPaul Mundt no_context(regs, error_code, address); 31628080329SPaul Mundt 31728080329SPaul Mundt force_sig_info_fault(SIGBUS, BUS_ADRERR, address, tsk); 31828080329SPaul Mundt } 31928080329SPaul Mundt 32028080329SPaul Mundt static noinline int 32128080329SPaul Mundt mm_fault_error(struct pt_regs *regs, unsigned long error_code, 32228080329SPaul Mundt unsigned long address, unsigned int fault) 32328080329SPaul Mundt { 32428080329SPaul Mundt /* 32528080329SPaul Mundt * Pagefault was interrupted by SIGKILL. We have no reason to 32628080329SPaul Mundt * continue pagefault. 32728080329SPaul Mundt */ 32828080329SPaul Mundt if (fatal_signal_pending(current)) { 32928080329SPaul Mundt if (!(fault & VM_FAULT_RETRY)) 33028080329SPaul Mundt up_read(¤t->mm->mmap_sem); 33128080329SPaul Mundt if (!user_mode(regs)) 33228080329SPaul Mundt no_context(regs, error_code, address); 33328080329SPaul Mundt return 1; 33428080329SPaul Mundt } 33528080329SPaul Mundt 33628080329SPaul Mundt if (!(fault & VM_FAULT_ERROR)) 33728080329SPaul Mundt return 0; 33828080329SPaul Mundt 33928080329SPaul Mundt if (fault & VM_FAULT_OOM) { 34028080329SPaul Mundt /* Kernel mode? Handle exceptions or die: */ 34128080329SPaul Mundt if (!user_mode(regs)) { 34228080329SPaul Mundt up_read(¤t->mm->mmap_sem); 34328080329SPaul Mundt no_context(regs, error_code, address); 34428080329SPaul Mundt return 1; 34528080329SPaul Mundt } 346c2d23f91SDavid Rientjes up_read(¤t->mm->mmap_sem); 34728080329SPaul Mundt 348c2d23f91SDavid Rientjes /* 349c2d23f91SDavid Rientjes * We ran out of memory, call the OOM killer, and return the 350c2d23f91SDavid Rientjes * userspace (which will retry the fault, or kill us if we got 351c2d23f91SDavid Rientjes * oom-killed): 352c2d23f91SDavid Rientjes */ 353c2d23f91SDavid Rientjes pagefault_out_of_memory(); 35428080329SPaul Mundt } else { 35528080329SPaul Mundt if (fault & VM_FAULT_SIGBUS) 35628080329SPaul Mundt do_sigbus(regs, error_code, address); 35733692f27SLinus Torvalds else if (fault & VM_FAULT_SIGSEGV) 35833692f27SLinus Torvalds bad_area(regs, error_code, address); 35928080329SPaul Mundt else 36028080329SPaul Mundt BUG(); 36128080329SPaul Mundt } 36228080329SPaul Mundt 36328080329SPaul Mundt return 1; 36428080329SPaul Mundt } 36528080329SPaul Mundt 36628080329SPaul Mundt static inline int access_error(int error_code, struct vm_area_struct *vma) 36728080329SPaul Mundt { 36828080329SPaul Mundt if (error_code & FAULT_CODE_WRITE) { 36928080329SPaul Mundt /* write, present and write, not present: */ 37028080329SPaul Mundt if (unlikely(!(vma->vm_flags & VM_WRITE))) 37128080329SPaul Mundt return 1; 37228080329SPaul Mundt return 0; 37328080329SPaul Mundt } 37428080329SPaul Mundt 37528080329SPaul Mundt /* ITLB miss on NX page */ 37628080329SPaul Mundt if (unlikely((error_code & FAULT_CODE_ITLB) && 37728080329SPaul Mundt !(vma->vm_flags & VM_EXEC))) 37828080329SPaul Mundt return 1; 37928080329SPaul Mundt 38028080329SPaul Mundt /* read, not present: */ 38128080329SPaul Mundt if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE)))) 38228080329SPaul Mundt return 1; 38328080329SPaul Mundt 38428080329SPaul Mundt return 0; 38528080329SPaul Mundt } 38628080329SPaul Mundt 38728080329SPaul Mundt static int fault_in_kernel_space(unsigned long address) 38828080329SPaul Mundt { 38928080329SPaul Mundt return address >= TASK_SIZE; 39028080329SPaul Mundt } 39128080329SPaul Mundt 39228080329SPaul Mundt /* 39328080329SPaul Mundt * This routine handles page faults. It determines the address, 39428080329SPaul Mundt * and the problem, and then passes it off to one of the appropriate 39528080329SPaul Mundt * routines. 39628080329SPaul Mundt */ 39728080329SPaul Mundt asmlinkage void __kprobes do_page_fault(struct pt_regs *regs, 39828080329SPaul Mundt unsigned long error_code, 39928080329SPaul Mundt unsigned long address) 40028080329SPaul Mundt { 40128080329SPaul Mundt unsigned long vec; 40228080329SPaul Mundt struct task_struct *tsk; 40328080329SPaul Mundt struct mm_struct *mm; 40428080329SPaul Mundt struct vm_area_struct * vma; 40528080329SPaul Mundt int fault; 406759496baSJohannes Weiner unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE; 40728080329SPaul Mundt 40828080329SPaul Mundt tsk = current; 40928080329SPaul Mundt mm = tsk->mm; 41028080329SPaul Mundt vec = lookup_exception_vector(); 41128080329SPaul Mundt 41228080329SPaul Mundt /* 41328080329SPaul Mundt * We fault-in kernel-space virtual memory on-demand. The 41428080329SPaul Mundt * 'reference' page table is init_mm.pgd. 41528080329SPaul Mundt * 41628080329SPaul Mundt * NOTE! We MUST NOT take any locks for this case. We may 41728080329SPaul Mundt * be in an interrupt or a critical region, and should 41828080329SPaul Mundt * only copy the information from the master page table, 41928080329SPaul Mundt * nothing more. 42028080329SPaul Mundt */ 42128080329SPaul Mundt if (unlikely(fault_in_kernel_space(address))) { 42228080329SPaul Mundt if (vmalloc_fault(address) >= 0) 42328080329SPaul Mundt return; 42428080329SPaul Mundt if (notify_page_fault(regs, vec)) 42528080329SPaul Mundt return; 42628080329SPaul Mundt 42728080329SPaul Mundt bad_area_nosemaphore(regs, error_code, address); 42828080329SPaul Mundt return; 42928080329SPaul Mundt } 43028080329SPaul Mundt 43128080329SPaul Mundt if (unlikely(notify_page_fault(regs, vec))) 43228080329SPaul Mundt return; 43328080329SPaul Mundt 43428080329SPaul Mundt /* Only enable interrupts if they were on before the fault */ 43528080329SPaul Mundt if ((regs->sr & SR_IMASK) != SR_IMASK) 43628080329SPaul Mundt local_irq_enable(); 43728080329SPaul Mundt 43828080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address); 43928080329SPaul Mundt 44028080329SPaul Mundt /* 44128080329SPaul Mundt * If we're in an interrupt, have no user context or are running 44270ffdb93SDavid Hildenbrand * with pagefaults disabled then we must not take the fault: 44328080329SPaul Mundt */ 44470ffdb93SDavid Hildenbrand if (unlikely(faulthandler_disabled() || !mm)) { 44528080329SPaul Mundt bad_area_nosemaphore(regs, error_code, address); 44628080329SPaul Mundt return; 44728080329SPaul Mundt } 44828080329SPaul Mundt 44928080329SPaul Mundt retry: 45028080329SPaul Mundt down_read(&mm->mmap_sem); 45128080329SPaul Mundt 45228080329SPaul Mundt vma = find_vma(mm, address); 45328080329SPaul Mundt if (unlikely(!vma)) { 45428080329SPaul Mundt bad_area(regs, error_code, address); 45528080329SPaul Mundt return; 45628080329SPaul Mundt } 45728080329SPaul Mundt if (likely(vma->vm_start <= address)) 45828080329SPaul Mundt goto good_area; 45928080329SPaul Mundt if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) { 46028080329SPaul Mundt bad_area(regs, error_code, address); 46128080329SPaul Mundt return; 46228080329SPaul Mundt } 46328080329SPaul Mundt if (unlikely(expand_stack(vma, address))) { 46428080329SPaul Mundt bad_area(regs, error_code, address); 46528080329SPaul Mundt return; 46628080329SPaul Mundt } 46728080329SPaul Mundt 46828080329SPaul Mundt /* 46928080329SPaul Mundt * Ok, we have a good vm_area for this memory access, so 47028080329SPaul Mundt * we can handle it.. 47128080329SPaul Mundt */ 47228080329SPaul Mundt good_area: 47328080329SPaul Mundt if (unlikely(access_error(error_code, vma))) { 47428080329SPaul Mundt bad_area_access_error(regs, error_code, address); 47528080329SPaul Mundt return; 47628080329SPaul Mundt } 47728080329SPaul Mundt 47828080329SPaul Mundt set_thread_fault_code(error_code); 47928080329SPaul Mundt 480759496baSJohannes Weiner if (user_mode(regs)) 481759496baSJohannes Weiner flags |= FAULT_FLAG_USER; 482759496baSJohannes Weiner if (error_code & FAULT_CODE_WRITE) 483759496baSJohannes Weiner flags |= FAULT_FLAG_WRITE; 484759496baSJohannes Weiner 48528080329SPaul Mundt /* 48628080329SPaul Mundt * If for any reason at all we couldn't handle the fault, 48728080329SPaul Mundt * make sure we exit gracefully rather than endlessly redo 48828080329SPaul Mundt * the fault. 48928080329SPaul Mundt */ 490*dcddffd4SKirill A. Shutemov fault = handle_mm_fault(vma, address, flags); 49128080329SPaul Mundt 49228080329SPaul Mundt if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR))) 49328080329SPaul Mundt if (mm_fault_error(regs, error_code, address, fault)) 49428080329SPaul Mundt return; 49528080329SPaul Mundt 49628080329SPaul Mundt if (flags & FAULT_FLAG_ALLOW_RETRY) { 49728080329SPaul Mundt if (fault & VM_FAULT_MAJOR) { 49828080329SPaul Mundt tsk->maj_flt++; 49928080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1, 50028080329SPaul Mundt regs, address); 50128080329SPaul Mundt } else { 50228080329SPaul Mundt tsk->min_flt++; 50328080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1, 50428080329SPaul Mundt regs, address); 50528080329SPaul Mundt } 50628080329SPaul Mundt if (fault & VM_FAULT_RETRY) { 50728080329SPaul Mundt flags &= ~FAULT_FLAG_ALLOW_RETRY; 50845cac65bSShaohua Li flags |= FAULT_FLAG_TRIED; 50928080329SPaul Mundt 51028080329SPaul Mundt /* 51128080329SPaul Mundt * No need to up_read(&mm->mmap_sem) as we would 51228080329SPaul Mundt * have already released it in __lock_page_or_retry 51328080329SPaul Mundt * in mm/filemap.c. 51428080329SPaul Mundt */ 51528080329SPaul Mundt goto retry; 51628080329SPaul Mundt } 51728080329SPaul Mundt } 51828080329SPaul Mundt 51928080329SPaul Mundt up_read(&mm->mmap_sem); 52028080329SPaul Mundt } 521