128080329SPaul Mundt /* 228080329SPaul Mundt * Page fault handler for SH with an MMU. 328080329SPaul Mundt * 428080329SPaul Mundt * Copyright (C) 1999 Niibe Yutaka 528080329SPaul Mundt * Copyright (C) 2003 - 2012 Paul Mundt 628080329SPaul Mundt * 728080329SPaul Mundt * Based on linux/arch/i386/mm/fault.c: 828080329SPaul Mundt * Copyright (C) 1995 Linus Torvalds 928080329SPaul Mundt * 1028080329SPaul Mundt * This file is subject to the terms and conditions of the GNU General Public 1128080329SPaul Mundt * License. See the file "COPYING" in the main directory of this archive 1228080329SPaul Mundt * for more details. 1328080329SPaul Mundt */ 1428080329SPaul Mundt #include <linux/kernel.h> 1528080329SPaul Mundt #include <linux/mm.h> 163f07c014SIngo Molnar #include <linux/sched/signal.h> 1728080329SPaul Mundt #include <linux/hardirq.h> 1828080329SPaul Mundt #include <linux/kprobes.h> 1928080329SPaul Mundt #include <linux/perf_event.h> 2028080329SPaul Mundt #include <linux/kdebug.h> 2170ffdb93SDavid Hildenbrand #include <linux/uaccess.h> 2228080329SPaul Mundt #include <asm/io_trapped.h> 2328080329SPaul Mundt #include <asm/mmu_context.h> 2428080329SPaul Mundt #include <asm/tlbflush.h> 2528080329SPaul Mundt #include <asm/traps.h> 2628080329SPaul Mundt 2728080329SPaul Mundt static void 28e1656829SEric W. Biederman force_sig_info_fault(int si_signo, int si_code, unsigned long address) 2928080329SPaul Mundt { 302e1661d2SEric W. Biederman force_sig_fault(si_signo, si_code, (void __user *)address); 3128080329SPaul Mundt } 3228080329SPaul Mundt 3328080329SPaul Mundt /* 3428080329SPaul Mundt * This is useful to dump out the page tables associated with 3528080329SPaul Mundt * 'addr' in mm 'mm'. 3628080329SPaul Mundt */ 3728080329SPaul Mundt static void show_pte(struct mm_struct *mm, unsigned long addr) 3828080329SPaul Mundt { 3928080329SPaul Mundt pgd_t *pgd; 4028080329SPaul Mundt 4190eed7d8SPaul Mundt if (mm) { 4228080329SPaul Mundt pgd = mm->pgd; 4390eed7d8SPaul Mundt } else { 4428080329SPaul Mundt pgd = get_TTB(); 4528080329SPaul Mundt 4690eed7d8SPaul Mundt if (unlikely(!pgd)) 4790eed7d8SPaul Mundt pgd = swapper_pg_dir; 4890eed7d8SPaul Mundt } 4990eed7d8SPaul Mundt 50*eaabf98bSGeert Uytterhoeven pr_alert("pgd = %p\n", pgd); 5128080329SPaul Mundt pgd += pgd_index(addr); 52*eaabf98bSGeert Uytterhoeven pr_alert("[%08lx] *pgd=%0*llx", addr, (u32)(sizeof(*pgd) * 2), 53*eaabf98bSGeert Uytterhoeven (u64)pgd_val(*pgd)); 5428080329SPaul Mundt 5528080329SPaul Mundt do { 5628080329SPaul Mundt pud_t *pud; 5728080329SPaul Mundt pmd_t *pmd; 5828080329SPaul Mundt pte_t *pte; 5928080329SPaul Mundt 6028080329SPaul Mundt if (pgd_none(*pgd)) 6128080329SPaul Mundt break; 6228080329SPaul Mundt 6328080329SPaul Mundt if (pgd_bad(*pgd)) { 64*eaabf98bSGeert Uytterhoeven pr_cont("(bad)"); 6528080329SPaul Mundt break; 6628080329SPaul Mundt } 6728080329SPaul Mundt 6828080329SPaul Mundt pud = pud_offset(pgd, addr); 6928080329SPaul Mundt if (PTRS_PER_PUD != 1) 70*eaabf98bSGeert Uytterhoeven pr_cont(", *pud=%0*llx", (u32)(sizeof(*pud) * 2), 7128080329SPaul Mundt (u64)pud_val(*pud)); 7228080329SPaul Mundt 7328080329SPaul Mundt if (pud_none(*pud)) 7428080329SPaul Mundt break; 7528080329SPaul Mundt 7628080329SPaul Mundt if (pud_bad(*pud)) { 77*eaabf98bSGeert Uytterhoeven pr_cont("(bad)"); 7828080329SPaul Mundt break; 7928080329SPaul Mundt } 8028080329SPaul Mundt 8128080329SPaul Mundt pmd = pmd_offset(pud, addr); 8228080329SPaul Mundt if (PTRS_PER_PMD != 1) 83*eaabf98bSGeert Uytterhoeven pr_cont(", *pmd=%0*llx", (u32)(sizeof(*pmd) * 2), 8428080329SPaul Mundt (u64)pmd_val(*pmd)); 8528080329SPaul Mundt 8628080329SPaul Mundt if (pmd_none(*pmd)) 8728080329SPaul Mundt break; 8828080329SPaul Mundt 8928080329SPaul Mundt if (pmd_bad(*pmd)) { 90*eaabf98bSGeert Uytterhoeven pr_cont("(bad)"); 9128080329SPaul Mundt break; 9228080329SPaul Mundt } 9328080329SPaul Mundt 9428080329SPaul Mundt /* We must not map this if we have highmem enabled */ 9528080329SPaul Mundt if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT))) 9628080329SPaul Mundt break; 9728080329SPaul Mundt 9828080329SPaul Mundt pte = pte_offset_kernel(pmd, addr); 99*eaabf98bSGeert Uytterhoeven pr_cont(", *pte=%0*llx", (u32)(sizeof(*pte) * 2), 10028080329SPaul Mundt (u64)pte_val(*pte)); 10128080329SPaul Mundt } while (0); 10228080329SPaul Mundt 103*eaabf98bSGeert Uytterhoeven pr_cont("\n"); 10428080329SPaul Mundt } 10528080329SPaul Mundt 10628080329SPaul Mundt static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address) 10728080329SPaul Mundt { 10828080329SPaul Mundt unsigned index = pgd_index(address); 10928080329SPaul Mundt pgd_t *pgd_k; 11028080329SPaul Mundt pud_t *pud, *pud_k; 11128080329SPaul Mundt pmd_t *pmd, *pmd_k; 11228080329SPaul Mundt 11328080329SPaul Mundt pgd += index; 11428080329SPaul Mundt pgd_k = init_mm.pgd + index; 11528080329SPaul Mundt 11628080329SPaul Mundt if (!pgd_present(*pgd_k)) 11728080329SPaul Mundt return NULL; 11828080329SPaul Mundt 11928080329SPaul Mundt pud = pud_offset(pgd, address); 12028080329SPaul Mundt pud_k = pud_offset(pgd_k, address); 12128080329SPaul Mundt if (!pud_present(*pud_k)) 12228080329SPaul Mundt return NULL; 12328080329SPaul Mundt 12428080329SPaul Mundt if (!pud_present(*pud)) 12528080329SPaul Mundt set_pud(pud, *pud_k); 12628080329SPaul Mundt 12728080329SPaul Mundt pmd = pmd_offset(pud, address); 12828080329SPaul Mundt pmd_k = pmd_offset(pud_k, address); 12928080329SPaul Mundt if (!pmd_present(*pmd_k)) 13028080329SPaul Mundt return NULL; 13128080329SPaul Mundt 13228080329SPaul Mundt if (!pmd_present(*pmd)) 13328080329SPaul Mundt set_pmd(pmd, *pmd_k); 13428080329SPaul Mundt else { 13528080329SPaul Mundt /* 13628080329SPaul Mundt * The page tables are fully synchronised so there must 13728080329SPaul Mundt * be another reason for the fault. Return NULL here to 13828080329SPaul Mundt * signal that we have not taken care of the fault. 13928080329SPaul Mundt */ 14028080329SPaul Mundt BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k)); 14128080329SPaul Mundt return NULL; 14228080329SPaul Mundt } 14328080329SPaul Mundt 14428080329SPaul Mundt return pmd_k; 14528080329SPaul Mundt } 14628080329SPaul Mundt 147d8fd35fcSPaul Mundt #ifdef CONFIG_SH_STORE_QUEUES 148d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT P3_ADDR_MAX 149d8fd35fcSPaul Mundt #else 150d8fd35fcSPaul Mundt #define __FAULT_ADDR_LIMIT VMALLOC_END 151d8fd35fcSPaul Mundt #endif 152d8fd35fcSPaul Mundt 15328080329SPaul Mundt /* 15428080329SPaul Mundt * Handle a fault on the vmalloc or module mapping area 15528080329SPaul Mundt */ 15628080329SPaul Mundt static noinline int vmalloc_fault(unsigned long address) 15728080329SPaul Mundt { 15828080329SPaul Mundt pgd_t *pgd_k; 15928080329SPaul Mundt pmd_t *pmd_k; 16028080329SPaul Mundt pte_t *pte_k; 16128080329SPaul Mundt 162c3e0af98SPaul Mundt /* Make sure we are in vmalloc/module/P3 area: */ 163d8fd35fcSPaul Mundt if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT)) 16428080329SPaul Mundt return -1; 16528080329SPaul Mundt 16628080329SPaul Mundt /* 16728080329SPaul Mundt * Synchronize this task's top level page-table 16828080329SPaul Mundt * with the 'reference' page table. 16928080329SPaul Mundt * 17028080329SPaul Mundt * Do _not_ use "current" here. We might be inside 17128080329SPaul Mundt * an interrupt in the middle of a task switch.. 17228080329SPaul Mundt */ 17328080329SPaul Mundt pgd_k = get_TTB(); 17428080329SPaul Mundt pmd_k = vmalloc_sync_one(pgd_k, address); 17528080329SPaul Mundt if (!pmd_k) 17628080329SPaul Mundt return -1; 17728080329SPaul Mundt 17828080329SPaul Mundt pte_k = pte_offset_kernel(pmd_k, address); 17928080329SPaul Mundt if (!pte_present(*pte_k)) 18028080329SPaul Mundt return -1; 18128080329SPaul Mundt 18228080329SPaul Mundt return 0; 18328080329SPaul Mundt } 18428080329SPaul Mundt 18528080329SPaul Mundt static void 18628080329SPaul Mundt show_fault_oops(struct pt_regs *regs, unsigned long address) 18728080329SPaul Mundt { 18828080329SPaul Mundt if (!oops_may_print()) 18928080329SPaul Mundt return; 19028080329SPaul Mundt 19128080329SPaul Mundt printk(KERN_ALERT "PC:"); 192*eaabf98bSGeert Uytterhoeven pr_alert("BUG: unable to handle kernel %s at %08lx\n", 193*eaabf98bSGeert Uytterhoeven address < PAGE_SIZE ? "NULL pointer dereference" 194*eaabf98bSGeert Uytterhoeven : "paging request", 195*eaabf98bSGeert Uytterhoeven address); 196*eaabf98bSGeert Uytterhoeven pr_alert("PC:"); 19728080329SPaul Mundt printk_address(regs->pc, 1); 19828080329SPaul Mundt 19928080329SPaul Mundt show_pte(NULL, address); 20028080329SPaul Mundt } 20128080329SPaul Mundt 20228080329SPaul Mundt static noinline void 20328080329SPaul Mundt no_context(struct pt_regs *regs, unsigned long error_code, 20428080329SPaul Mundt unsigned long address) 20528080329SPaul Mundt { 20628080329SPaul Mundt /* Are we prepared to handle this kernel fault? */ 20728080329SPaul Mundt if (fixup_exception(regs)) 20828080329SPaul Mundt return; 20928080329SPaul Mundt 21028080329SPaul Mundt if (handle_trapped_io(regs, address)) 21128080329SPaul Mundt return; 21228080329SPaul Mundt 21328080329SPaul Mundt /* 21428080329SPaul Mundt * Oops. The kernel tried to access some bad page. We'll have to 21528080329SPaul Mundt * terminate things with extreme prejudice. 21628080329SPaul Mundt */ 21728080329SPaul Mundt bust_spinlocks(1); 21828080329SPaul Mundt 21928080329SPaul Mundt show_fault_oops(regs, address); 22028080329SPaul Mundt 22128080329SPaul Mundt die("Oops", regs, error_code); 22228080329SPaul Mundt bust_spinlocks(0); 22328080329SPaul Mundt do_exit(SIGKILL); 22428080329SPaul Mundt } 22528080329SPaul Mundt 22628080329SPaul Mundt static void 22728080329SPaul Mundt __bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, 22828080329SPaul Mundt unsigned long address, int si_code) 22928080329SPaul Mundt { 23028080329SPaul Mundt /* User mode accesses just cause a SIGSEGV */ 23128080329SPaul Mundt if (user_mode(regs)) { 23228080329SPaul Mundt /* 23328080329SPaul Mundt * It's possible to have interrupts off here: 23428080329SPaul Mundt */ 23528080329SPaul Mundt local_irq_enable(); 23628080329SPaul Mundt 237e1656829SEric W. Biederman force_sig_info_fault(SIGSEGV, si_code, address); 23828080329SPaul Mundt 23928080329SPaul Mundt return; 24028080329SPaul Mundt } 24128080329SPaul Mundt 24228080329SPaul Mundt no_context(regs, error_code, address); 24328080329SPaul Mundt } 24428080329SPaul Mundt 24528080329SPaul Mundt static noinline void 24628080329SPaul Mundt bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, 24728080329SPaul Mundt unsigned long address) 24828080329SPaul Mundt { 24928080329SPaul Mundt __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR); 25028080329SPaul Mundt } 25128080329SPaul Mundt 25228080329SPaul Mundt static void 25328080329SPaul Mundt __bad_area(struct pt_regs *regs, unsigned long error_code, 25428080329SPaul Mundt unsigned long address, int si_code) 25528080329SPaul Mundt { 25628080329SPaul Mundt struct mm_struct *mm = current->mm; 25728080329SPaul Mundt 25828080329SPaul Mundt /* 25928080329SPaul Mundt * Something tried to access memory that isn't in our memory map.. 26028080329SPaul Mundt * Fix it, but check if it's kernel or user first.. 26128080329SPaul Mundt */ 26228080329SPaul Mundt up_read(&mm->mmap_sem); 26328080329SPaul Mundt 26428080329SPaul Mundt __bad_area_nosemaphore(regs, error_code, address, si_code); 26528080329SPaul Mundt } 26628080329SPaul Mundt 26728080329SPaul Mundt static noinline void 26828080329SPaul Mundt bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address) 26928080329SPaul Mundt { 27028080329SPaul Mundt __bad_area(regs, error_code, address, SEGV_MAPERR); 27128080329SPaul Mundt } 27228080329SPaul Mundt 27328080329SPaul Mundt static noinline void 27428080329SPaul Mundt bad_area_access_error(struct pt_regs *regs, unsigned long error_code, 27528080329SPaul Mundt unsigned long address) 27628080329SPaul Mundt { 27728080329SPaul Mundt __bad_area(regs, error_code, address, SEGV_ACCERR); 27828080329SPaul Mundt } 27928080329SPaul Mundt 28028080329SPaul Mundt static void 28128080329SPaul Mundt do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address) 28228080329SPaul Mundt { 28328080329SPaul Mundt struct task_struct *tsk = current; 28428080329SPaul Mundt struct mm_struct *mm = tsk->mm; 28528080329SPaul Mundt 28628080329SPaul Mundt up_read(&mm->mmap_sem); 28728080329SPaul Mundt 28828080329SPaul Mundt /* Kernel mode? Handle exceptions or die: */ 28928080329SPaul Mundt if (!user_mode(regs)) 29028080329SPaul Mundt no_context(regs, error_code, address); 29128080329SPaul Mundt 292e1656829SEric W. Biederman force_sig_info_fault(SIGBUS, BUS_ADRERR, address); 29328080329SPaul Mundt } 29428080329SPaul Mundt 29528080329SPaul Mundt static noinline int 29628080329SPaul Mundt mm_fault_error(struct pt_regs *regs, unsigned long error_code, 29750a7ca3cSSouptick Joarder unsigned long address, vm_fault_t fault) 29828080329SPaul Mundt { 29928080329SPaul Mundt /* 30028080329SPaul Mundt * Pagefault was interrupted by SIGKILL. We have no reason to 30128080329SPaul Mundt * continue pagefault. 30228080329SPaul Mundt */ 303fb027adaSPeter Xu if (fault_signal_pending(fault, regs)) { 30428080329SPaul Mundt if (!user_mode(regs)) 30528080329SPaul Mundt no_context(regs, error_code, address); 30628080329SPaul Mundt return 1; 30728080329SPaul Mundt } 30828080329SPaul Mundt 309fb027adaSPeter Xu /* Release mmap_sem first if necessary */ 310fb027adaSPeter Xu if (!(fault & VM_FAULT_RETRY)) 311fb027adaSPeter Xu up_read(¤t->mm->mmap_sem); 312fb027adaSPeter Xu 31328080329SPaul Mundt if (!(fault & VM_FAULT_ERROR)) 31428080329SPaul Mundt return 0; 31528080329SPaul Mundt 31628080329SPaul Mundt if (fault & VM_FAULT_OOM) { 31728080329SPaul Mundt /* Kernel mode? Handle exceptions or die: */ 31828080329SPaul Mundt if (!user_mode(regs)) { 31928080329SPaul Mundt no_context(regs, error_code, address); 32028080329SPaul Mundt return 1; 32128080329SPaul Mundt } 32228080329SPaul Mundt 323c2d23f91SDavid Rientjes /* 324c2d23f91SDavid Rientjes * We ran out of memory, call the OOM killer, and return the 325c2d23f91SDavid Rientjes * userspace (which will retry the fault, or kill us if we got 326c2d23f91SDavid Rientjes * oom-killed): 327c2d23f91SDavid Rientjes */ 328c2d23f91SDavid Rientjes pagefault_out_of_memory(); 32928080329SPaul Mundt } else { 33028080329SPaul Mundt if (fault & VM_FAULT_SIGBUS) 33128080329SPaul Mundt do_sigbus(regs, error_code, address); 33233692f27SLinus Torvalds else if (fault & VM_FAULT_SIGSEGV) 33333692f27SLinus Torvalds bad_area(regs, error_code, address); 33428080329SPaul Mundt else 33528080329SPaul Mundt BUG(); 33628080329SPaul Mundt } 33728080329SPaul Mundt 33828080329SPaul Mundt return 1; 33928080329SPaul Mundt } 34028080329SPaul Mundt 34128080329SPaul Mundt static inline int access_error(int error_code, struct vm_area_struct *vma) 34228080329SPaul Mundt { 34328080329SPaul Mundt if (error_code & FAULT_CODE_WRITE) { 34428080329SPaul Mundt /* write, present and write, not present: */ 34528080329SPaul Mundt if (unlikely(!(vma->vm_flags & VM_WRITE))) 34628080329SPaul Mundt return 1; 34728080329SPaul Mundt return 0; 34828080329SPaul Mundt } 34928080329SPaul Mundt 35028080329SPaul Mundt /* ITLB miss on NX page */ 35128080329SPaul Mundt if (unlikely((error_code & FAULT_CODE_ITLB) && 35228080329SPaul Mundt !(vma->vm_flags & VM_EXEC))) 35328080329SPaul Mundt return 1; 35428080329SPaul Mundt 35528080329SPaul Mundt /* read, not present: */ 3563122e80eSAnshuman Khandual if (unlikely(!vma_is_accessible(vma))) 35728080329SPaul Mundt return 1; 35828080329SPaul Mundt 35928080329SPaul Mundt return 0; 36028080329SPaul Mundt } 36128080329SPaul Mundt 36228080329SPaul Mundt static int fault_in_kernel_space(unsigned long address) 36328080329SPaul Mundt { 36428080329SPaul Mundt return address >= TASK_SIZE; 36528080329SPaul Mundt } 36628080329SPaul Mundt 36728080329SPaul Mundt /* 36828080329SPaul Mundt * This routine handles page faults. It determines the address, 36928080329SPaul Mundt * and the problem, and then passes it off to one of the appropriate 37028080329SPaul Mundt * routines. 37128080329SPaul Mundt */ 37228080329SPaul Mundt asmlinkage void __kprobes do_page_fault(struct pt_regs *regs, 37328080329SPaul Mundt unsigned long error_code, 37428080329SPaul Mundt unsigned long address) 37528080329SPaul Mundt { 37628080329SPaul Mundt unsigned long vec; 37728080329SPaul Mundt struct task_struct *tsk; 37828080329SPaul Mundt struct mm_struct *mm; 37928080329SPaul Mundt struct vm_area_struct * vma; 38050a7ca3cSSouptick Joarder vm_fault_t fault; 381dde16072SPeter Xu unsigned int flags = FAULT_FLAG_DEFAULT; 38228080329SPaul Mundt 38328080329SPaul Mundt tsk = current; 38428080329SPaul Mundt mm = tsk->mm; 38528080329SPaul Mundt vec = lookup_exception_vector(); 38628080329SPaul Mundt 38728080329SPaul Mundt /* 38828080329SPaul Mundt * We fault-in kernel-space virtual memory on-demand. The 38928080329SPaul Mundt * 'reference' page table is init_mm.pgd. 39028080329SPaul Mundt * 39128080329SPaul Mundt * NOTE! We MUST NOT take any locks for this case. We may 39228080329SPaul Mundt * be in an interrupt or a critical region, and should 39328080329SPaul Mundt * only copy the information from the master page table, 39428080329SPaul Mundt * nothing more. 39528080329SPaul Mundt */ 39628080329SPaul Mundt if (unlikely(fault_in_kernel_space(address))) { 39728080329SPaul Mundt if (vmalloc_fault(address) >= 0) 39828080329SPaul Mundt return; 399b98cca44SAnshuman Khandual if (kprobe_page_fault(regs, vec)) 40028080329SPaul Mundt return; 40128080329SPaul Mundt 40228080329SPaul Mundt bad_area_nosemaphore(regs, error_code, address); 40328080329SPaul Mundt return; 40428080329SPaul Mundt } 40528080329SPaul Mundt 406b98cca44SAnshuman Khandual if (unlikely(kprobe_page_fault(regs, vec))) 40728080329SPaul Mundt return; 40828080329SPaul Mundt 40928080329SPaul Mundt /* Only enable interrupts if they were on before the fault */ 41028080329SPaul Mundt if ((regs->sr & SR_IMASK) != SR_IMASK) 41128080329SPaul Mundt local_irq_enable(); 41228080329SPaul Mundt 41328080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address); 41428080329SPaul Mundt 41528080329SPaul Mundt /* 41628080329SPaul Mundt * If we're in an interrupt, have no user context or are running 41770ffdb93SDavid Hildenbrand * with pagefaults disabled then we must not take the fault: 41828080329SPaul Mundt */ 41970ffdb93SDavid Hildenbrand if (unlikely(faulthandler_disabled() || !mm)) { 42028080329SPaul Mundt bad_area_nosemaphore(regs, error_code, address); 42128080329SPaul Mundt return; 42228080329SPaul Mundt } 42328080329SPaul Mundt 42428080329SPaul Mundt retry: 42528080329SPaul Mundt down_read(&mm->mmap_sem); 42628080329SPaul Mundt 42728080329SPaul Mundt vma = find_vma(mm, address); 42828080329SPaul Mundt if (unlikely(!vma)) { 42928080329SPaul Mundt bad_area(regs, error_code, address); 43028080329SPaul Mundt return; 43128080329SPaul Mundt } 43228080329SPaul Mundt if (likely(vma->vm_start <= address)) 43328080329SPaul Mundt goto good_area; 43428080329SPaul Mundt if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) { 43528080329SPaul Mundt bad_area(regs, error_code, address); 43628080329SPaul Mundt return; 43728080329SPaul Mundt } 43828080329SPaul Mundt if (unlikely(expand_stack(vma, address))) { 43928080329SPaul Mundt bad_area(regs, error_code, address); 44028080329SPaul Mundt return; 44128080329SPaul Mundt } 44228080329SPaul Mundt 44328080329SPaul Mundt /* 44428080329SPaul Mundt * Ok, we have a good vm_area for this memory access, so 44528080329SPaul Mundt * we can handle it.. 44628080329SPaul Mundt */ 44728080329SPaul Mundt good_area: 44828080329SPaul Mundt if (unlikely(access_error(error_code, vma))) { 44928080329SPaul Mundt bad_area_access_error(regs, error_code, address); 45028080329SPaul Mundt return; 45128080329SPaul Mundt } 45228080329SPaul Mundt 45328080329SPaul Mundt set_thread_fault_code(error_code); 45428080329SPaul Mundt 455759496baSJohannes Weiner if (user_mode(regs)) 456759496baSJohannes Weiner flags |= FAULT_FLAG_USER; 457759496baSJohannes Weiner if (error_code & FAULT_CODE_WRITE) 458759496baSJohannes Weiner flags |= FAULT_FLAG_WRITE; 459759496baSJohannes Weiner 46028080329SPaul Mundt /* 46128080329SPaul Mundt * If for any reason at all we couldn't handle the fault, 46228080329SPaul Mundt * make sure we exit gracefully rather than endlessly redo 46328080329SPaul Mundt * the fault. 46428080329SPaul Mundt */ 465dcddffd4SKirill A. Shutemov fault = handle_mm_fault(vma, address, flags); 46628080329SPaul Mundt 46728080329SPaul Mundt if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR))) 46828080329SPaul Mundt if (mm_fault_error(regs, error_code, address, fault)) 46928080329SPaul Mundt return; 47028080329SPaul Mundt 47128080329SPaul Mundt if (flags & FAULT_FLAG_ALLOW_RETRY) { 47228080329SPaul Mundt if (fault & VM_FAULT_MAJOR) { 47328080329SPaul Mundt tsk->maj_flt++; 47428080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1, 47528080329SPaul Mundt regs, address); 47628080329SPaul Mundt } else { 47728080329SPaul Mundt tsk->min_flt++; 47828080329SPaul Mundt perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1, 47928080329SPaul Mundt regs, address); 48028080329SPaul Mundt } 48128080329SPaul Mundt if (fault & VM_FAULT_RETRY) { 48245cac65bSShaohua Li flags |= FAULT_FLAG_TRIED; 48328080329SPaul Mundt 48428080329SPaul Mundt /* 48528080329SPaul Mundt * No need to up_read(&mm->mmap_sem) as we would 48628080329SPaul Mundt * have already released it in __lock_page_or_retry 48728080329SPaul Mundt * in mm/filemap.c. 48828080329SPaul Mundt */ 48928080329SPaul Mundt goto retry; 49028080329SPaul Mundt } 49128080329SPaul Mundt } 49228080329SPaul Mundt 49328080329SPaul Mundt up_read(&mm->mmap_sem); 49428080329SPaul Mundt } 495