blob: 6defd2c6d9b1d95698670cbd65e7426de56b5c15 [file] [log] [blame]
Paul Mundt26ff6c12006-09-27 15:13:36 +09001/*
2 * Page fault handler for SH with an MMU.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 * Copyright (C) 1999 Niibe Yutaka
Paul Mundtdbdb4e92012-05-14 10:27:34 +09005 * Copyright (C) 2003 - 2012 Paul Mundt
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
7 * Based on linux/arch/i386/mm/fault.c:
8 * Copyright (C) 1995 Linus Torvalds
Paul Mundt26ff6c12006-09-27 15:13:36 +09009 *
10 * This file is subject to the terms and conditions of the GNU General Public
11 * License. See the file "COPYING" in the main directory of this archive
12 * for more details.
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/mm.h>
Ingo Molnar3f07c012017-02-08 18:51:30 +010016#include <linux/sched/signal.h>
Paul Mundt0f08f332006-09-27 17:03:56 +090017#include <linux/hardirq.h>
18#include <linux/kprobes.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020019#include <linux/perf_event.h>
Paul Mundtdbdb4e92012-05-14 10:27:34 +090020#include <linux/kdebug.h>
David Hildenbrand70ffdb92015-05-11 17:52:11 +020021#include <linux/uaccess.h>
Magnus Damme7cc9a72008-02-07 20:18:21 +090022#include <asm/io_trapped.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023#include <asm/mmu_context.h>
Paul Mundtdb2e1fa2007-02-14 14:13:10 +090024#include <asm/tlbflush.h>
David Howellse839ca52012-03-28 18:30:03 +010025#include <asm/traps.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070026
Paul Mundt7433ab7702009-06-25 02:30:10 +090027static inline int notify_page_fault(struct pt_regs *regs, int trap)
28{
29 int ret = 0;
30
Paul Mundtc63c3102009-07-05 02:50:10 +090031 if (kprobes_built_in() && !user_mode(regs)) {
Paul Mundt7433ab7702009-06-25 02:30:10 +090032 preempt_disable();
33 if (kprobe_running() && kprobe_fault_handler(regs, trap))
34 ret = 1;
35 preempt_enable();
36 }
Paul Mundt7433ab7702009-06-25 02:30:10 +090037
38 return ret;
39}
40
Paul Mundtdbdb4e92012-05-14 10:27:34 +090041static void
42force_sig_info_fault(int si_signo, int si_code, unsigned long address,
43 struct task_struct *tsk)
44{
Eric W. Biedermanc65626c2018-04-15 19:56:33 -050045 force_sig_fault(si_signo, si_code, (void __user *)address, tsk);
Paul Mundtdbdb4e92012-05-14 10:27:34 +090046}
47
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090048/*
49 * This is useful to dump out the page tables associated with
50 * 'addr' in mm 'mm'.
51 */
52static void show_pte(struct mm_struct *mm, unsigned long addr)
53{
54 pgd_t *pgd;
55
Paul Mundt90eed7d2012-07-24 13:15:54 +090056 if (mm) {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090057 pgd = mm->pgd;
Paul Mundt90eed7d2012-07-24 13:15:54 +090058 } else {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090059 pgd = get_TTB();
60
Paul Mundt90eed7d2012-07-24 13:15:54 +090061 if (unlikely(!pgd))
62 pgd = swapper_pg_dir;
63 }
64
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090065 printk(KERN_ALERT "pgd = %p\n", pgd);
66 pgd += pgd_index(addr);
67 printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr,
Paul Mundt28080322012-05-14 15:33:28 +090068 (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090069
70 do {
71 pud_t *pud;
72 pmd_t *pmd;
73 pte_t *pte;
74
75 if (pgd_none(*pgd))
76 break;
77
78 if (pgd_bad(*pgd)) {
79 printk("(bad)");
80 break;
81 }
82
83 pud = pud_offset(pgd, addr);
84 if (PTRS_PER_PUD != 1)
Paul Mundt28080322012-05-14 15:33:28 +090085 printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090086 (u64)pud_val(*pud));
87
88 if (pud_none(*pud))
89 break;
90
91 if (pud_bad(*pud)) {
92 printk("(bad)");
93 break;
94 }
95
96 pmd = pmd_offset(pud, addr);
97 if (PTRS_PER_PMD != 1)
Paul Mundt28080322012-05-14 15:33:28 +090098 printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090099 (u64)pmd_val(*pmd));
100
101 if (pmd_none(*pmd))
102 break;
103
104 if (pmd_bad(*pmd)) {
105 printk("(bad)");
106 break;
107 }
108
109 /* We must not map this if we have highmem enabled */
110 if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT)))
111 break;
112
113 pte = pte_offset_kernel(pmd, addr);
Paul Mundt28080322012-05-14 15:33:28 +0900114 printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2),
115 (u64)pte_val(*pte));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +0900116 } while (0);
117
118 printk("\n");
119}
120
Paul Mundt0f60bb22009-07-05 03:18:47 +0900121static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
122{
123 unsigned index = pgd_index(address);
124 pgd_t *pgd_k;
125 pud_t *pud, *pud_k;
126 pmd_t *pmd, *pmd_k;
127
128 pgd += index;
129 pgd_k = init_mm.pgd + index;
130
131 if (!pgd_present(*pgd_k))
132 return NULL;
133
134 pud = pud_offset(pgd, address);
135 pud_k = pud_offset(pgd_k, address);
136 if (!pud_present(*pud_k))
137 return NULL;
138
Matt Fleming5d9b4b12009-12-13 14:38:50 +0000139 if (!pud_present(*pud))
140 set_pud(pud, *pud_k);
141
Paul Mundt0f60bb22009-07-05 03:18:47 +0900142 pmd = pmd_offset(pud, address);
143 pmd_k = pmd_offset(pud_k, address);
144 if (!pmd_present(*pmd_k))
145 return NULL;
146
147 if (!pmd_present(*pmd))
148 set_pmd(pmd, *pmd_k);
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000149 else {
150 /*
151 * The page tables are fully synchronised so there must
152 * be another reason for the fault. Return NULL here to
153 * signal that we have not taken care of the fault.
154 */
Paul Mundt0f60bb22009-07-05 03:18:47 +0900155 BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000156 return NULL;
157 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900158
159 return pmd_k;
160}
161
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900162#ifdef CONFIG_SH_STORE_QUEUES
163#define __FAULT_ADDR_LIMIT P3_ADDR_MAX
164#else
165#define __FAULT_ADDR_LIMIT VMALLOC_END
166#endif
167
Paul Mundt0f60bb22009-07-05 03:18:47 +0900168/*
169 * Handle a fault on the vmalloc or module mapping area
170 */
171static noinline int vmalloc_fault(unsigned long address)
172{
173 pgd_t *pgd_k;
174 pmd_t *pmd_k;
175 pte_t *pte_k;
176
Paul Mundtc3e0af92012-05-18 19:30:05 +0900177 /* Make sure we are in vmalloc/module/P3 area: */
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900178 if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT))
Paul Mundt0f60bb22009-07-05 03:18:47 +0900179 return -1;
180
181 /*
182 * Synchronize this task's top level page-table
183 * with the 'reference' page table.
184 *
185 * Do _not_ use "current" here. We might be inside
186 * an interrupt in the middle of a task switch..
187 */
188 pgd_k = get_TTB();
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000189 pmd_k = vmalloc_sync_one(pgd_k, address);
Paul Mundt0f60bb22009-07-05 03:18:47 +0900190 if (!pmd_k)
191 return -1;
192
193 pte_k = pte_offset_kernel(pmd_k, address);
194 if (!pte_present(*pte_k))
195 return -1;
196
197 return 0;
198}
199
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900200static void
201show_fault_oops(struct pt_regs *regs, unsigned long address)
202{
203 if (!oops_may_print())
204 return;
205
206 printk(KERN_ALERT "BUG: unable to handle kernel ");
207 if (address < PAGE_SIZE)
208 printk(KERN_CONT "NULL pointer dereference");
209 else
210 printk(KERN_CONT "paging request");
211
212 printk(KERN_CONT " at %08lx\n", address);
213 printk(KERN_ALERT "PC:");
214 printk_address(regs->pc, 1);
215
216 show_pte(NULL, address);
217}
218
219static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900220no_context(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900221 unsigned long address)
222{
223 /* Are we prepared to handle this kernel fault? */
224 if (fixup_exception(regs))
225 return;
226
227 if (handle_trapped_io(regs, address))
228 return;
229
230 /*
231 * Oops. The kernel tried to access some bad page. We'll have to
232 * terminate things with extreme prejudice.
233 */
234 bust_spinlocks(1);
235
236 show_fault_oops(regs, address);
237
Paul Mundt5a1dc782012-05-14 14:57:28 +0900238 die("Oops", regs, error_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900239 bust_spinlocks(0);
240 do_exit(SIGKILL);
241}
242
243static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900244__bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900245 unsigned long address, int si_code)
246{
247 struct task_struct *tsk = current;
248
249 /* User mode accesses just cause a SIGSEGV */
250 if (user_mode(regs)) {
251 /*
252 * It's possible to have interrupts off here:
253 */
254 local_irq_enable();
255
256 force_sig_info_fault(SIGSEGV, si_code, address, tsk);
257
258 return;
259 }
260
Paul Mundt5a1dc782012-05-14 14:57:28 +0900261 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900262}
263
264static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900265bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900266 unsigned long address)
267{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900268 __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900269}
270
271static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900272__bad_area(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900273 unsigned long address, int si_code)
274{
275 struct mm_struct *mm = current->mm;
276
277 /*
278 * Something tried to access memory that isn't in our memory map..
279 * Fix it, but check if it's kernel or user first..
280 */
281 up_read(&mm->mmap_sem);
282
Paul Mundt5a1dc782012-05-14 14:57:28 +0900283 __bad_area_nosemaphore(regs, error_code, address, si_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900284}
285
286static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900287bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900288{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900289 __bad_area(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900290}
291
292static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900293bad_area_access_error(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900294 unsigned long address)
295{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900296 __bad_area(regs, error_code, address, SEGV_ACCERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900297}
298
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900299static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900300do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900301{
302 struct task_struct *tsk = current;
303 struct mm_struct *mm = tsk->mm;
304
305 up_read(&mm->mmap_sem);
306
307 /* Kernel mode? Handle exceptions or die: */
308 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900309 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900310
311 force_sig_info_fault(SIGBUS, BUS_ADRERR, address, tsk);
312}
313
314static noinline int
Paul Mundt5a1dc782012-05-14 14:57:28 +0900315mm_fault_error(struct pt_regs *regs, unsigned long error_code,
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700316 unsigned long address, vm_fault_t fault)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900317{
318 /*
319 * Pagefault was interrupted by SIGKILL. We have no reason to
320 * continue pagefault.
321 */
322 if (fatal_signal_pending(current)) {
323 if (!(fault & VM_FAULT_RETRY))
324 up_read(&current->mm->mmap_sem);
325 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900326 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900327 return 1;
328 }
329
330 if (!(fault & VM_FAULT_ERROR))
331 return 0;
332
333 if (fault & VM_FAULT_OOM) {
334 /* Kernel mode? Handle exceptions or die: */
335 if (!user_mode(regs)) {
336 up_read(&current->mm->mmap_sem);
Paul Mundt5a1dc782012-05-14 14:57:28 +0900337 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900338 return 1;
339 }
David Rientjesc2d23f92012-12-12 13:52:10 -0800340 up_read(&current->mm->mmap_sem);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900341
David Rientjesc2d23f92012-12-12 13:52:10 -0800342 /*
343 * We ran out of memory, call the OOM killer, and return the
344 * userspace (which will retry the fault, or kill us if we got
345 * oom-killed):
346 */
347 pagefault_out_of_memory();
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900348 } else {
349 if (fault & VM_FAULT_SIGBUS)
Paul Mundt5a1dc782012-05-14 14:57:28 +0900350 do_sigbus(regs, error_code, address);
Linus Torvalds33692f22015-01-29 10:51:32 -0800351 else if (fault & VM_FAULT_SIGSEGV)
352 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900353 else
354 BUG();
355 }
356
357 return 1;
358}
359
Paul Mundt28080322012-05-14 15:33:28 +0900360static inline int access_error(int error_code, struct vm_area_struct *vma)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900361{
Paul Mundt28080322012-05-14 15:33:28 +0900362 if (error_code & FAULT_CODE_WRITE) {
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900363 /* write, present and write, not present: */
364 if (unlikely(!(vma->vm_flags & VM_WRITE)))
365 return 1;
366 return 0;
367 }
368
Paul Mundt28080322012-05-14 15:33:28 +0900369 /* ITLB miss on NX page */
370 if (unlikely((error_code & FAULT_CODE_ITLB) &&
371 !(vma->vm_flags & VM_EXEC)))
372 return 1;
373
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900374 /* read, not present: */
375 if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))))
376 return 1;
377
378 return 0;
379}
380
Paul Mundt0f60bb22009-07-05 03:18:47 +0900381static int fault_in_kernel_space(unsigned long address)
382{
383 return address >= TASK_SIZE;
384}
385
Linus Torvalds1da177e2005-04-16 15:20:36 -0700386/*
387 * This routine handles page faults. It determines the address,
388 * and the problem, and then passes it off to one of the appropriate
389 * routines.
390 */
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900391asmlinkage void __kprobes do_page_fault(struct pt_regs *regs,
Paul Mundt5a1dc782012-05-14 14:57:28 +0900392 unsigned long error_code,
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900393 unsigned long address)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700394{
Paul Mundt0f60bb22009-07-05 03:18:47 +0900395 unsigned long vec;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700396 struct task_struct *tsk;
397 struct mm_struct *mm;
398 struct vm_area_struct * vma;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700399 vm_fault_t fault;
Johannes Weiner759496b2013-09-12 15:13:39 -0700400 unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401
Linus Torvalds1da177e2005-04-16 15:20:36 -0700402 tsk = current;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900403 mm = tsk->mm;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900404 vec = lookup_exception_vector();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700405
Paul Mundt0f60bb22009-07-05 03:18:47 +0900406 /*
407 * We fault-in kernel-space virtual memory on-demand. The
408 * 'reference' page table is init_mm.pgd.
409 *
410 * NOTE! We MUST NOT take any locks for this case. We may
411 * be in an interrupt or a critical region, and should
412 * only copy the information from the master page table,
413 * nothing more.
414 */
415 if (unlikely(fault_in_kernel_space(address))) {
416 if (vmalloc_fault(address) >= 0)
Stuart Menefy99a596f2006-11-21 15:38:05 +0900417 return;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900418 if (notify_page_fault(regs, vec))
Stuart Menefy96e14e52008-09-05 16:17:15 +0900419 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900420
Paul Mundt5a1dc782012-05-14 14:57:28 +0900421 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900422 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900423 }
424
Paul Mundt0f60bb22009-07-05 03:18:47 +0900425 if (unlikely(notify_page_fault(regs, vec)))
Paul Mundt7433ab7702009-06-25 02:30:10 +0900426 return;
427
428 /* Only enable interrupts if they were on before the fault */
429 if ((regs->sr & SR_IMASK) != SR_IMASK)
430 local_irq_enable();
431
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200432 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Paul Mundt7433ab7702009-06-25 02:30:10 +0900433
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434 /*
Paul Mundt0f60bb22009-07-05 03:18:47 +0900435 * If we're in an interrupt, have no user context or are running
David Hildenbrand70ffdb92015-05-11 17:52:11 +0200436 * with pagefaults disabled then we must not take the fault:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 */
David Hildenbrand70ffdb92015-05-11 17:52:11 +0200438 if (unlikely(faulthandler_disabled() || !mm)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900439 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900440 return;
441 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700442
Kautuk Consul11fd9822012-03-31 08:06:11 -0400443retry:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 down_read(&mm->mmap_sem);
445
446 vma = find_vma(mm, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900447 if (unlikely(!vma)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900448 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900449 return;
450 }
451 if (likely(vma->vm_start <= address))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 goto good_area;
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900453 if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900454 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900455 return;
456 }
457 if (unlikely(expand_stack(vma, address))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900458 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900459 return;
460 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900461
462 /*
463 * Ok, we have a good vm_area for this memory access, so
464 * we can handle it..
465 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466good_area:
Paul Mundt5a1dc782012-05-14 14:57:28 +0900467 if (unlikely(access_error(error_code, vma))) {
468 bad_area_access_error(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900469 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470 }
471
Paul Mundt5a1dc782012-05-14 14:57:28 +0900472 set_thread_fault_code(error_code);
473
Johannes Weiner759496b2013-09-12 15:13:39 -0700474 if (user_mode(regs))
475 flags |= FAULT_FLAG_USER;
476 if (error_code & FAULT_CODE_WRITE)
477 flags |= FAULT_FLAG_WRITE;
478
Linus Torvalds1da177e2005-04-16 15:20:36 -0700479 /*
480 * If for any reason at all we couldn't handle the fault,
481 * make sure we exit gracefully rather than endlessly redo
482 * the fault.
483 */
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700484 fault = handle_mm_fault(vma, address, flags);
Kautuk Consul11fd9822012-03-31 08:06:11 -0400485
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900486 if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR)))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900487 if (mm_fault_error(regs, error_code, address, fault))
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900488 return;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400489
490 if (flags & FAULT_FLAG_ALLOW_RETRY) {
491 if (fault & VM_FAULT_MAJOR) {
492 tsk->maj_flt++;
493 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
494 regs, address);
495 } else {
496 tsk->min_flt++;
497 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
498 regs, address);
499 }
500 if (fault & VM_FAULT_RETRY) {
501 flags &= ~FAULT_FLAG_ALLOW_RETRY;
Shaohua Li45cac652012-10-08 16:32:19 -0700502 flags |= FAULT_FLAG_TRIED;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400503
504 /*
505 * No need to up_read(&mm->mmap_sem) as we would
506 * have already released it in __lock_page_or_retry
507 * in mm/filemap.c.
508 */
509 goto retry;
510 }
Paul Mundt7433ab7702009-06-25 02:30:10 +0900511 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700512
513 up_read(&mm->mmap_sem);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700514}