blob: 541dc610150888e706977c7944c42ab1d61d7437 [file] [log] [blame]
Paul Mundt26ff6c12006-09-27 15:13:36 +09001/*
2 * Page fault handler for SH with an MMU.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 * Copyright (C) 1999 Niibe Yutaka
Paul Mundtdbdb4e92012-05-14 10:27:34 +09005 * Copyright (C) 2003 - 2012 Paul Mundt
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
7 * Based on linux/arch/i386/mm/fault.c:
8 * Copyright (C) 1995 Linus Torvalds
Paul Mundt26ff6c12006-09-27 15:13:36 +09009 *
10 * This file is subject to the terms and conditions of the GNU General Public
11 * License. See the file "COPYING" in the main directory of this archive
12 * for more details.
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/mm.h>
Paul Mundt0f08f332006-09-27 17:03:56 +090016#include <linux/hardirq.h>
17#include <linux/kprobes.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020018#include <linux/perf_event.h>
Paul Mundtdbdb4e92012-05-14 10:27:34 +090019#include <linux/kdebug.h>
Magnus Damme7cc9a72008-02-07 20:18:21 +090020#include <asm/io_trapped.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include <asm/mmu_context.h>
Paul Mundtdb2e1fa2007-02-14 14:13:10 +090022#include <asm/tlbflush.h>
David Howellse839ca52012-03-28 18:30:03 +010023#include <asm/traps.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070024
Paul Mundt7433ab7702009-06-25 02:30:10 +090025static inline int notify_page_fault(struct pt_regs *regs, int trap)
26{
27 int ret = 0;
28
Paul Mundtc63c3102009-07-05 02:50:10 +090029 if (kprobes_built_in() && !user_mode(regs)) {
Paul Mundt7433ab7702009-06-25 02:30:10 +090030 preempt_disable();
31 if (kprobe_running() && kprobe_fault_handler(regs, trap))
32 ret = 1;
33 preempt_enable();
34 }
Paul Mundt7433ab7702009-06-25 02:30:10 +090035
36 return ret;
37}
38
Paul Mundtdbdb4e92012-05-14 10:27:34 +090039static void
40force_sig_info_fault(int si_signo, int si_code, unsigned long address,
41 struct task_struct *tsk)
42{
43 siginfo_t info;
44
45 info.si_signo = si_signo;
46 info.si_errno = 0;
47 info.si_code = si_code;
48 info.si_addr = (void __user *)address;
49
50 force_sig_info(si_signo, &info, tsk);
51}
52
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090053/*
54 * This is useful to dump out the page tables associated with
55 * 'addr' in mm 'mm'.
56 */
57static void show_pte(struct mm_struct *mm, unsigned long addr)
58{
59 pgd_t *pgd;
60
Paul Mundt90eed7d2012-07-24 13:15:54 +090061 if (mm) {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090062 pgd = mm->pgd;
Paul Mundt90eed7d2012-07-24 13:15:54 +090063 } else {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090064 pgd = get_TTB();
65
Paul Mundt90eed7d2012-07-24 13:15:54 +090066 if (unlikely(!pgd))
67 pgd = swapper_pg_dir;
68 }
69
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090070 printk(KERN_ALERT "pgd = %p\n", pgd);
71 pgd += pgd_index(addr);
72 printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr,
Paul Mundt28080322012-05-14 15:33:28 +090073 (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090074
75 do {
76 pud_t *pud;
77 pmd_t *pmd;
78 pte_t *pte;
79
80 if (pgd_none(*pgd))
81 break;
82
83 if (pgd_bad(*pgd)) {
84 printk("(bad)");
85 break;
86 }
87
88 pud = pud_offset(pgd, addr);
89 if (PTRS_PER_PUD != 1)
Paul Mundt28080322012-05-14 15:33:28 +090090 printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090091 (u64)pud_val(*pud));
92
93 if (pud_none(*pud))
94 break;
95
96 if (pud_bad(*pud)) {
97 printk("(bad)");
98 break;
99 }
100
101 pmd = pmd_offset(pud, addr);
102 if (PTRS_PER_PMD != 1)
Paul Mundt28080322012-05-14 15:33:28 +0900103 printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +0900104 (u64)pmd_val(*pmd));
105
106 if (pmd_none(*pmd))
107 break;
108
109 if (pmd_bad(*pmd)) {
110 printk("(bad)");
111 break;
112 }
113
114 /* We must not map this if we have highmem enabled */
115 if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT)))
116 break;
117
118 pte = pte_offset_kernel(pmd, addr);
Paul Mundt28080322012-05-14 15:33:28 +0900119 printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2),
120 (u64)pte_val(*pte));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +0900121 } while (0);
122
123 printk("\n");
124}
125
Paul Mundt0f60bb22009-07-05 03:18:47 +0900126static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
127{
128 unsigned index = pgd_index(address);
129 pgd_t *pgd_k;
130 pud_t *pud, *pud_k;
131 pmd_t *pmd, *pmd_k;
132
133 pgd += index;
134 pgd_k = init_mm.pgd + index;
135
136 if (!pgd_present(*pgd_k))
137 return NULL;
138
139 pud = pud_offset(pgd, address);
140 pud_k = pud_offset(pgd_k, address);
141 if (!pud_present(*pud_k))
142 return NULL;
143
Matt Fleming5d9b4b12009-12-13 14:38:50 +0000144 if (!pud_present(*pud))
145 set_pud(pud, *pud_k);
146
Paul Mundt0f60bb22009-07-05 03:18:47 +0900147 pmd = pmd_offset(pud, address);
148 pmd_k = pmd_offset(pud_k, address);
149 if (!pmd_present(*pmd_k))
150 return NULL;
151
152 if (!pmd_present(*pmd))
153 set_pmd(pmd, *pmd_k);
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000154 else {
155 /*
156 * The page tables are fully synchronised so there must
157 * be another reason for the fault. Return NULL here to
158 * signal that we have not taken care of the fault.
159 */
Paul Mundt0f60bb22009-07-05 03:18:47 +0900160 BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000161 return NULL;
162 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900163
164 return pmd_k;
165}
166
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900167#ifdef CONFIG_SH_STORE_QUEUES
168#define __FAULT_ADDR_LIMIT P3_ADDR_MAX
169#else
170#define __FAULT_ADDR_LIMIT VMALLOC_END
171#endif
172
Paul Mundt0f60bb22009-07-05 03:18:47 +0900173/*
174 * Handle a fault on the vmalloc or module mapping area
175 */
176static noinline int vmalloc_fault(unsigned long address)
177{
178 pgd_t *pgd_k;
179 pmd_t *pmd_k;
180 pte_t *pte_k;
181
Paul Mundtc3e0af92012-05-18 19:30:05 +0900182 /* Make sure we are in vmalloc/module/P3 area: */
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900183 if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT))
Paul Mundt0f60bb22009-07-05 03:18:47 +0900184 return -1;
185
186 /*
187 * Synchronize this task's top level page-table
188 * with the 'reference' page table.
189 *
190 * Do _not_ use "current" here. We might be inside
191 * an interrupt in the middle of a task switch..
192 */
193 pgd_k = get_TTB();
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000194 pmd_k = vmalloc_sync_one(pgd_k, address);
Paul Mundt0f60bb22009-07-05 03:18:47 +0900195 if (!pmd_k)
196 return -1;
197
198 pte_k = pte_offset_kernel(pmd_k, address);
199 if (!pte_present(*pte_k))
200 return -1;
201
202 return 0;
203}
204
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900205static void
206show_fault_oops(struct pt_regs *regs, unsigned long address)
207{
208 if (!oops_may_print())
209 return;
210
211 printk(KERN_ALERT "BUG: unable to handle kernel ");
212 if (address < PAGE_SIZE)
213 printk(KERN_CONT "NULL pointer dereference");
214 else
215 printk(KERN_CONT "paging request");
216
217 printk(KERN_CONT " at %08lx\n", address);
218 printk(KERN_ALERT "PC:");
219 printk_address(regs->pc, 1);
220
221 show_pte(NULL, address);
222}
223
224static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900225no_context(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900226 unsigned long address)
227{
228 /* Are we prepared to handle this kernel fault? */
229 if (fixup_exception(regs))
230 return;
231
232 if (handle_trapped_io(regs, address))
233 return;
234
235 /*
236 * Oops. The kernel tried to access some bad page. We'll have to
237 * terminate things with extreme prejudice.
238 */
239 bust_spinlocks(1);
240
241 show_fault_oops(regs, address);
242
Paul Mundt5a1dc782012-05-14 14:57:28 +0900243 die("Oops", regs, error_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900244 bust_spinlocks(0);
245 do_exit(SIGKILL);
246}
247
248static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900249__bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900250 unsigned long address, int si_code)
251{
252 struct task_struct *tsk = current;
253
254 /* User mode accesses just cause a SIGSEGV */
255 if (user_mode(regs)) {
256 /*
257 * It's possible to have interrupts off here:
258 */
259 local_irq_enable();
260
261 force_sig_info_fault(SIGSEGV, si_code, address, tsk);
262
263 return;
264 }
265
Paul Mundt5a1dc782012-05-14 14:57:28 +0900266 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900267}
268
269static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900270bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900271 unsigned long address)
272{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900273 __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900274}
275
276static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900277__bad_area(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900278 unsigned long address, int si_code)
279{
280 struct mm_struct *mm = current->mm;
281
282 /*
283 * Something tried to access memory that isn't in our memory map..
284 * Fix it, but check if it's kernel or user first..
285 */
286 up_read(&mm->mmap_sem);
287
Paul Mundt5a1dc782012-05-14 14:57:28 +0900288 __bad_area_nosemaphore(regs, error_code, address, si_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900289}
290
291static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900292bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900293{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900294 __bad_area(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900295}
296
297static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900298bad_area_access_error(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900299 unsigned long address)
300{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900301 __bad_area(regs, error_code, address, SEGV_ACCERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900302}
303
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900304static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900305do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900306{
307 struct task_struct *tsk = current;
308 struct mm_struct *mm = tsk->mm;
309
310 up_read(&mm->mmap_sem);
311
312 /* Kernel mode? Handle exceptions or die: */
313 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900314 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900315
316 force_sig_info_fault(SIGBUS, BUS_ADRERR, address, tsk);
317}
318
319static noinline int
Paul Mundt5a1dc782012-05-14 14:57:28 +0900320mm_fault_error(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900321 unsigned long address, unsigned int fault)
322{
323 /*
324 * Pagefault was interrupted by SIGKILL. We have no reason to
325 * continue pagefault.
326 */
327 if (fatal_signal_pending(current)) {
328 if (!(fault & VM_FAULT_RETRY))
329 up_read(&current->mm->mmap_sem);
330 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900331 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900332 return 1;
333 }
334
335 if (!(fault & VM_FAULT_ERROR))
336 return 0;
337
338 if (fault & VM_FAULT_OOM) {
339 /* Kernel mode? Handle exceptions or die: */
340 if (!user_mode(regs)) {
341 up_read(&current->mm->mmap_sem);
Paul Mundt5a1dc782012-05-14 14:57:28 +0900342 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900343 return 1;
344 }
David Rientjesc2d23f92012-12-12 13:52:10 -0800345 up_read(&current->mm->mmap_sem);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900346
David Rientjesc2d23f92012-12-12 13:52:10 -0800347 /*
348 * We ran out of memory, call the OOM killer, and return the
349 * userspace (which will retry the fault, or kill us if we got
350 * oom-killed):
351 */
352 pagefault_out_of_memory();
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900353 } else {
354 if (fault & VM_FAULT_SIGBUS)
Paul Mundt5a1dc782012-05-14 14:57:28 +0900355 do_sigbus(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900356 else
357 BUG();
358 }
359
360 return 1;
361}
362
Paul Mundt28080322012-05-14 15:33:28 +0900363static inline int access_error(int error_code, struct vm_area_struct *vma)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900364{
Paul Mundt28080322012-05-14 15:33:28 +0900365 if (error_code & FAULT_CODE_WRITE) {
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900366 /* write, present and write, not present: */
367 if (unlikely(!(vma->vm_flags & VM_WRITE)))
368 return 1;
369 return 0;
370 }
371
Paul Mundt28080322012-05-14 15:33:28 +0900372 /* ITLB miss on NX page */
373 if (unlikely((error_code & FAULT_CODE_ITLB) &&
374 !(vma->vm_flags & VM_EXEC)))
375 return 1;
376
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900377 /* read, not present: */
378 if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))))
379 return 1;
380
381 return 0;
382}
383
Paul Mundt0f60bb22009-07-05 03:18:47 +0900384static int fault_in_kernel_space(unsigned long address)
385{
386 return address >= TASK_SIZE;
387}
388
Linus Torvalds1da177e2005-04-16 15:20:36 -0700389/*
390 * This routine handles page faults. It determines the address,
391 * and the problem, and then passes it off to one of the appropriate
392 * routines.
393 */
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900394asmlinkage void __kprobes do_page_fault(struct pt_regs *regs,
Paul Mundt5a1dc782012-05-14 14:57:28 +0900395 unsigned long error_code,
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900396 unsigned long address)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700397{
Paul Mundt0f60bb22009-07-05 03:18:47 +0900398 unsigned long vec;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700399 struct task_struct *tsk;
400 struct mm_struct *mm;
401 struct vm_area_struct * vma;
Nick Piggin83c54072007-07-19 01:47:05 -0700402 int fault;
Johannes Weiner759496b2013-09-12 15:13:39 -0700403 unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404
Linus Torvalds1da177e2005-04-16 15:20:36 -0700405 tsk = current;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900406 mm = tsk->mm;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900407 vec = lookup_exception_vector();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700408
Paul Mundt0f60bb22009-07-05 03:18:47 +0900409 /*
410 * We fault-in kernel-space virtual memory on-demand. The
411 * 'reference' page table is init_mm.pgd.
412 *
413 * NOTE! We MUST NOT take any locks for this case. We may
414 * be in an interrupt or a critical region, and should
415 * only copy the information from the master page table,
416 * nothing more.
417 */
418 if (unlikely(fault_in_kernel_space(address))) {
419 if (vmalloc_fault(address) >= 0)
Stuart Menefy99a596f2006-11-21 15:38:05 +0900420 return;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900421 if (notify_page_fault(regs, vec))
Stuart Menefy96e14e52008-09-05 16:17:15 +0900422 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900423
Paul Mundt5a1dc782012-05-14 14:57:28 +0900424 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900425 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900426 }
427
Paul Mundt0f60bb22009-07-05 03:18:47 +0900428 if (unlikely(notify_page_fault(regs, vec)))
Paul Mundt7433ab7702009-06-25 02:30:10 +0900429 return;
430
431 /* Only enable interrupts if they were on before the fault */
432 if ((regs->sr & SR_IMASK) != SR_IMASK)
433 local_irq_enable();
434
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200435 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Paul Mundt7433ab7702009-06-25 02:30:10 +0900436
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 /*
Paul Mundt0f60bb22009-07-05 03:18:47 +0900438 * If we're in an interrupt, have no user context or are running
439 * in an atomic region then we must not take the fault:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 */
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900441 if (unlikely(in_atomic() || !mm)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900442 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900443 return;
444 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700445
Kautuk Consul11fd9822012-03-31 08:06:11 -0400446retry:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447 down_read(&mm->mmap_sem);
448
449 vma = find_vma(mm, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900450 if (unlikely(!vma)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900451 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900452 return;
453 }
454 if (likely(vma->vm_start <= address))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700455 goto good_area;
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900456 if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900457 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900458 return;
459 }
460 if (unlikely(expand_stack(vma, address))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900461 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900462 return;
463 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900464
465 /*
466 * Ok, we have a good vm_area for this memory access, so
467 * we can handle it..
468 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700469good_area:
Paul Mundt5a1dc782012-05-14 14:57:28 +0900470 if (unlikely(access_error(error_code, vma))) {
471 bad_area_access_error(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900472 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700473 }
474
Paul Mundt5a1dc782012-05-14 14:57:28 +0900475 set_thread_fault_code(error_code);
476
Johannes Weiner759496b2013-09-12 15:13:39 -0700477 if (user_mode(regs))
478 flags |= FAULT_FLAG_USER;
479 if (error_code & FAULT_CODE_WRITE)
480 flags |= FAULT_FLAG_WRITE;
481
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482 /*
483 * If for any reason at all we couldn't handle the fault,
484 * make sure we exit gracefully rather than endlessly redo
485 * the fault.
486 */
Kautuk Consul11fd9822012-03-31 08:06:11 -0400487 fault = handle_mm_fault(mm, vma, address, flags);
488
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900489 if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR)))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900490 if (mm_fault_error(regs, error_code, address, fault))
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900491 return;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400492
493 if (flags & FAULT_FLAG_ALLOW_RETRY) {
494 if (fault & VM_FAULT_MAJOR) {
495 tsk->maj_flt++;
496 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
497 regs, address);
498 } else {
499 tsk->min_flt++;
500 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
501 regs, address);
502 }
503 if (fault & VM_FAULT_RETRY) {
504 flags &= ~FAULT_FLAG_ALLOW_RETRY;
Shaohua Li45cac652012-10-08 16:32:19 -0700505 flags |= FAULT_FLAG_TRIED;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400506
507 /*
508 * No need to up_read(&mm->mmap_sem) as we would
509 * have already released it in __lock_page_or_retry
510 * in mm/filemap.c.
511 */
512 goto retry;
513 }
Paul Mundt7433ab7702009-06-25 02:30:10 +0900514 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700515
516 up_read(&mm->mmap_sem);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700517}