blob: 9bf876780cef4b1ea4b2aee99e47997ffb1f8b97 [file] [log] [blame]
Paul Mundt26ff6c12006-09-27 15:13:36 +09001/*
2 * Page fault handler for SH with an MMU.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 * Copyright (C) 1999 Niibe Yutaka
Paul Mundtdbdb4e92012-05-14 10:27:34 +09005 * Copyright (C) 2003 - 2012 Paul Mundt
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
7 * Based on linux/arch/i386/mm/fault.c:
8 * Copyright (C) 1995 Linus Torvalds
Paul Mundt26ff6c12006-09-27 15:13:36 +09009 *
10 * This file is subject to the terms and conditions of the GNU General Public
11 * License. See the file "COPYING" in the main directory of this archive
12 * for more details.
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/mm.h>
Paul Mundt0f08f332006-09-27 17:03:56 +090016#include <linux/hardirq.h>
17#include <linux/kprobes.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020018#include <linux/perf_event.h>
Paul Mundtdbdb4e92012-05-14 10:27:34 +090019#include <linux/kdebug.h>
David Hildenbrand70ffdb92015-05-11 17:52:11 +020020#include <linux/uaccess.h>
Magnus Damme7cc9a72008-02-07 20:18:21 +090021#include <asm/io_trapped.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022#include <asm/mmu_context.h>
Paul Mundtdb2e1fa2007-02-14 14:13:10 +090023#include <asm/tlbflush.h>
David Howellse839ca52012-03-28 18:30:03 +010024#include <asm/traps.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025
Paul Mundt7433ab7702009-06-25 02:30:10 +090026static inline int notify_page_fault(struct pt_regs *regs, int trap)
27{
28 int ret = 0;
29
Paul Mundtc63c3102009-07-05 02:50:10 +090030 if (kprobes_built_in() && !user_mode(regs)) {
Paul Mundt7433ab7702009-06-25 02:30:10 +090031 preempt_disable();
32 if (kprobe_running() && kprobe_fault_handler(regs, trap))
33 ret = 1;
34 preempt_enable();
35 }
Paul Mundt7433ab7702009-06-25 02:30:10 +090036
37 return ret;
38}
39
Paul Mundtdbdb4e92012-05-14 10:27:34 +090040static void
41force_sig_info_fault(int si_signo, int si_code, unsigned long address,
42 struct task_struct *tsk)
43{
44 siginfo_t info;
45
46 info.si_signo = si_signo;
47 info.si_errno = 0;
48 info.si_code = si_code;
49 info.si_addr = (void __user *)address;
50
51 force_sig_info(si_signo, &info, tsk);
52}
53
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090054/*
55 * This is useful to dump out the page tables associated with
56 * 'addr' in mm 'mm'.
57 */
58static void show_pte(struct mm_struct *mm, unsigned long addr)
59{
60 pgd_t *pgd;
61
Paul Mundt90eed7d2012-07-24 13:15:54 +090062 if (mm) {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090063 pgd = mm->pgd;
Paul Mundt90eed7d2012-07-24 13:15:54 +090064 } else {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090065 pgd = get_TTB();
66
Paul Mundt90eed7d2012-07-24 13:15:54 +090067 if (unlikely(!pgd))
68 pgd = swapper_pg_dir;
69 }
70
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090071 printk(KERN_ALERT "pgd = %p\n", pgd);
72 pgd += pgd_index(addr);
73 printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr,
Paul Mundt28080322012-05-14 15:33:28 +090074 (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090075
76 do {
77 pud_t *pud;
78 pmd_t *pmd;
79 pte_t *pte;
80
81 if (pgd_none(*pgd))
82 break;
83
84 if (pgd_bad(*pgd)) {
85 printk("(bad)");
86 break;
87 }
88
89 pud = pud_offset(pgd, addr);
90 if (PTRS_PER_PUD != 1)
Paul Mundt28080322012-05-14 15:33:28 +090091 printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090092 (u64)pud_val(*pud));
93
94 if (pud_none(*pud))
95 break;
96
97 if (pud_bad(*pud)) {
98 printk("(bad)");
99 break;
100 }
101
102 pmd = pmd_offset(pud, addr);
103 if (PTRS_PER_PMD != 1)
Paul Mundt28080322012-05-14 15:33:28 +0900104 printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +0900105 (u64)pmd_val(*pmd));
106
107 if (pmd_none(*pmd))
108 break;
109
110 if (pmd_bad(*pmd)) {
111 printk("(bad)");
112 break;
113 }
114
115 /* We must not map this if we have highmem enabled */
116 if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT)))
117 break;
118
119 pte = pte_offset_kernel(pmd, addr);
Paul Mundt28080322012-05-14 15:33:28 +0900120 printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2),
121 (u64)pte_val(*pte));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +0900122 } while (0);
123
124 printk("\n");
125}
126
Paul Mundt0f60bb22009-07-05 03:18:47 +0900127static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
128{
129 unsigned index = pgd_index(address);
130 pgd_t *pgd_k;
131 pud_t *pud, *pud_k;
132 pmd_t *pmd, *pmd_k;
133
134 pgd += index;
135 pgd_k = init_mm.pgd + index;
136
137 if (!pgd_present(*pgd_k))
138 return NULL;
139
140 pud = pud_offset(pgd, address);
141 pud_k = pud_offset(pgd_k, address);
142 if (!pud_present(*pud_k))
143 return NULL;
144
Matt Fleming5d9b4b12009-12-13 14:38:50 +0000145 if (!pud_present(*pud))
146 set_pud(pud, *pud_k);
147
Paul Mundt0f60bb22009-07-05 03:18:47 +0900148 pmd = pmd_offset(pud, address);
149 pmd_k = pmd_offset(pud_k, address);
150 if (!pmd_present(*pmd_k))
151 return NULL;
152
153 if (!pmd_present(*pmd))
154 set_pmd(pmd, *pmd_k);
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000155 else {
156 /*
157 * The page tables are fully synchronised so there must
158 * be another reason for the fault. Return NULL here to
159 * signal that we have not taken care of the fault.
160 */
Paul Mundt0f60bb22009-07-05 03:18:47 +0900161 BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000162 return NULL;
163 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900164
165 return pmd_k;
166}
167
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900168#ifdef CONFIG_SH_STORE_QUEUES
169#define __FAULT_ADDR_LIMIT P3_ADDR_MAX
170#else
171#define __FAULT_ADDR_LIMIT VMALLOC_END
172#endif
173
Paul Mundt0f60bb22009-07-05 03:18:47 +0900174/*
175 * Handle a fault on the vmalloc or module mapping area
176 */
177static noinline int vmalloc_fault(unsigned long address)
178{
179 pgd_t *pgd_k;
180 pmd_t *pmd_k;
181 pte_t *pte_k;
182
Paul Mundtc3e0af92012-05-18 19:30:05 +0900183 /* Make sure we are in vmalloc/module/P3 area: */
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900184 if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT))
Paul Mundt0f60bb22009-07-05 03:18:47 +0900185 return -1;
186
187 /*
188 * Synchronize this task's top level page-table
189 * with the 'reference' page table.
190 *
191 * Do _not_ use "current" here. We might be inside
192 * an interrupt in the middle of a task switch..
193 */
194 pgd_k = get_TTB();
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000195 pmd_k = vmalloc_sync_one(pgd_k, address);
Paul Mundt0f60bb22009-07-05 03:18:47 +0900196 if (!pmd_k)
197 return -1;
198
199 pte_k = pte_offset_kernel(pmd_k, address);
200 if (!pte_present(*pte_k))
201 return -1;
202
203 return 0;
204}
205
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900206static void
207show_fault_oops(struct pt_regs *regs, unsigned long address)
208{
209 if (!oops_may_print())
210 return;
211
212 printk(KERN_ALERT "BUG: unable to handle kernel ");
213 if (address < PAGE_SIZE)
214 printk(KERN_CONT "NULL pointer dereference");
215 else
216 printk(KERN_CONT "paging request");
217
218 printk(KERN_CONT " at %08lx\n", address);
219 printk(KERN_ALERT "PC:");
220 printk_address(regs->pc, 1);
221
222 show_pte(NULL, address);
223}
224
225static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900226no_context(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900227 unsigned long address)
228{
229 /* Are we prepared to handle this kernel fault? */
230 if (fixup_exception(regs))
231 return;
232
233 if (handle_trapped_io(regs, address))
234 return;
235
236 /*
237 * Oops. The kernel tried to access some bad page. We'll have to
238 * terminate things with extreme prejudice.
239 */
240 bust_spinlocks(1);
241
242 show_fault_oops(regs, address);
243
Paul Mundt5a1dc782012-05-14 14:57:28 +0900244 die("Oops", regs, error_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900245 bust_spinlocks(0);
246 do_exit(SIGKILL);
247}
248
249static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900250__bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900251 unsigned long address, int si_code)
252{
253 struct task_struct *tsk = current;
254
255 /* User mode accesses just cause a SIGSEGV */
256 if (user_mode(regs)) {
257 /*
258 * It's possible to have interrupts off here:
259 */
260 local_irq_enable();
261
262 force_sig_info_fault(SIGSEGV, si_code, address, tsk);
263
264 return;
265 }
266
Paul Mundt5a1dc782012-05-14 14:57:28 +0900267 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900268}
269
270static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900271bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900272 unsigned long address)
273{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900274 __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900275}
276
277static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900278__bad_area(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900279 unsigned long address, int si_code)
280{
281 struct mm_struct *mm = current->mm;
282
283 /*
284 * Something tried to access memory that isn't in our memory map..
285 * Fix it, but check if it's kernel or user first..
286 */
287 up_read(&mm->mmap_sem);
288
Paul Mundt5a1dc782012-05-14 14:57:28 +0900289 __bad_area_nosemaphore(regs, error_code, address, si_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900290}
291
292static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900293bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900294{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900295 __bad_area(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900296}
297
298static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900299bad_area_access_error(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900300 unsigned long address)
301{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900302 __bad_area(regs, error_code, address, SEGV_ACCERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900303}
304
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900305static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900306do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900307{
308 struct task_struct *tsk = current;
309 struct mm_struct *mm = tsk->mm;
310
311 up_read(&mm->mmap_sem);
312
313 /* Kernel mode? Handle exceptions or die: */
314 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900315 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900316
317 force_sig_info_fault(SIGBUS, BUS_ADRERR, address, tsk);
318}
319
320static noinline int
Paul Mundt5a1dc782012-05-14 14:57:28 +0900321mm_fault_error(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900322 unsigned long address, unsigned int fault)
323{
324 /*
325 * Pagefault was interrupted by SIGKILL. We have no reason to
326 * continue pagefault.
327 */
328 if (fatal_signal_pending(current)) {
329 if (!(fault & VM_FAULT_RETRY))
330 up_read(&current->mm->mmap_sem);
331 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900332 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900333 return 1;
334 }
335
336 if (!(fault & VM_FAULT_ERROR))
337 return 0;
338
339 if (fault & VM_FAULT_OOM) {
340 /* Kernel mode? Handle exceptions or die: */
341 if (!user_mode(regs)) {
342 up_read(&current->mm->mmap_sem);
Paul Mundt5a1dc782012-05-14 14:57:28 +0900343 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900344 return 1;
345 }
David Rientjesc2d23f92012-12-12 13:52:10 -0800346 up_read(&current->mm->mmap_sem);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900347
David Rientjesc2d23f92012-12-12 13:52:10 -0800348 /*
349 * We ran out of memory, call the OOM killer, and return the
350 * userspace (which will retry the fault, or kill us if we got
351 * oom-killed):
352 */
353 pagefault_out_of_memory();
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900354 } else {
355 if (fault & VM_FAULT_SIGBUS)
Paul Mundt5a1dc782012-05-14 14:57:28 +0900356 do_sigbus(regs, error_code, address);
Linus Torvalds33692f22015-01-29 10:51:32 -0800357 else if (fault & VM_FAULT_SIGSEGV)
358 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900359 else
360 BUG();
361 }
362
363 return 1;
364}
365
Paul Mundt28080322012-05-14 15:33:28 +0900366static inline int access_error(int error_code, struct vm_area_struct *vma)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900367{
Paul Mundt28080322012-05-14 15:33:28 +0900368 if (error_code & FAULT_CODE_WRITE) {
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900369 /* write, present and write, not present: */
370 if (unlikely(!(vma->vm_flags & VM_WRITE)))
371 return 1;
372 return 0;
373 }
374
Paul Mundt28080322012-05-14 15:33:28 +0900375 /* ITLB miss on NX page */
376 if (unlikely((error_code & FAULT_CODE_ITLB) &&
377 !(vma->vm_flags & VM_EXEC)))
378 return 1;
379
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900380 /* read, not present: */
381 if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))))
382 return 1;
383
384 return 0;
385}
386
Paul Mundt0f60bb22009-07-05 03:18:47 +0900387static int fault_in_kernel_space(unsigned long address)
388{
389 return address >= TASK_SIZE;
390}
391
Linus Torvalds1da177e2005-04-16 15:20:36 -0700392/*
393 * This routine handles page faults. It determines the address,
394 * and the problem, and then passes it off to one of the appropriate
395 * routines.
396 */
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900397asmlinkage void __kprobes do_page_fault(struct pt_regs *regs,
Paul Mundt5a1dc782012-05-14 14:57:28 +0900398 unsigned long error_code,
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900399 unsigned long address)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400{
Paul Mundt0f60bb22009-07-05 03:18:47 +0900401 unsigned long vec;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700402 struct task_struct *tsk;
403 struct mm_struct *mm;
404 struct vm_area_struct * vma;
Nick Piggin83c54072007-07-19 01:47:05 -0700405 int fault;
Johannes Weiner759496b2013-09-12 15:13:39 -0700406 unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407
Linus Torvalds1da177e2005-04-16 15:20:36 -0700408 tsk = current;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900409 mm = tsk->mm;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900410 vec = lookup_exception_vector();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700411
Paul Mundt0f60bb22009-07-05 03:18:47 +0900412 /*
413 * We fault-in kernel-space virtual memory on-demand. The
414 * 'reference' page table is init_mm.pgd.
415 *
416 * NOTE! We MUST NOT take any locks for this case. We may
417 * be in an interrupt or a critical region, and should
418 * only copy the information from the master page table,
419 * nothing more.
420 */
421 if (unlikely(fault_in_kernel_space(address))) {
422 if (vmalloc_fault(address) >= 0)
Stuart Menefy99a596f2006-11-21 15:38:05 +0900423 return;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900424 if (notify_page_fault(regs, vec))
Stuart Menefy96e14e52008-09-05 16:17:15 +0900425 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900426
Paul Mundt5a1dc782012-05-14 14:57:28 +0900427 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900428 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900429 }
430
Paul Mundt0f60bb22009-07-05 03:18:47 +0900431 if (unlikely(notify_page_fault(regs, vec)))
Paul Mundt7433ab7702009-06-25 02:30:10 +0900432 return;
433
434 /* Only enable interrupts if they were on before the fault */
435 if ((regs->sr & SR_IMASK) != SR_IMASK)
436 local_irq_enable();
437
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200438 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Paul Mundt7433ab7702009-06-25 02:30:10 +0900439
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 /*
Paul Mundt0f60bb22009-07-05 03:18:47 +0900441 * If we're in an interrupt, have no user context or are running
David Hildenbrand70ffdb92015-05-11 17:52:11 +0200442 * with pagefaults disabled then we must not take the fault:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700443 */
David Hildenbrand70ffdb92015-05-11 17:52:11 +0200444 if (unlikely(faulthandler_disabled() || !mm)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900445 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900446 return;
447 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700448
Kautuk Consul11fd9822012-03-31 08:06:11 -0400449retry:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700450 down_read(&mm->mmap_sem);
451
452 vma = find_vma(mm, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900453 if (unlikely(!vma)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900454 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900455 return;
456 }
457 if (likely(vma->vm_start <= address))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700458 goto good_area;
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900459 if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900460 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900461 return;
462 }
463 if (unlikely(expand_stack(vma, address))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900464 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900465 return;
466 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900467
468 /*
469 * Ok, we have a good vm_area for this memory access, so
470 * we can handle it..
471 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472good_area:
Paul Mundt5a1dc782012-05-14 14:57:28 +0900473 if (unlikely(access_error(error_code, vma))) {
474 bad_area_access_error(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900475 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700476 }
477
Paul Mundt5a1dc782012-05-14 14:57:28 +0900478 set_thread_fault_code(error_code);
479
Johannes Weiner759496b2013-09-12 15:13:39 -0700480 if (user_mode(regs))
481 flags |= FAULT_FLAG_USER;
482 if (error_code & FAULT_CODE_WRITE)
483 flags |= FAULT_FLAG_WRITE;
484
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485 /*
486 * If for any reason at all we couldn't handle the fault,
487 * make sure we exit gracefully rather than endlessly redo
488 * the fault.
489 */
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700490 fault = handle_mm_fault(vma, address, flags);
Kautuk Consul11fd9822012-03-31 08:06:11 -0400491
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900492 if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR)))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900493 if (mm_fault_error(regs, error_code, address, fault))
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900494 return;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400495
496 if (flags & FAULT_FLAG_ALLOW_RETRY) {
497 if (fault & VM_FAULT_MAJOR) {
498 tsk->maj_flt++;
499 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
500 regs, address);
501 } else {
502 tsk->min_flt++;
503 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
504 regs, address);
505 }
506 if (fault & VM_FAULT_RETRY) {
507 flags &= ~FAULT_FLAG_ALLOW_RETRY;
Shaohua Li45cac652012-10-08 16:32:19 -0700508 flags |= FAULT_FLAG_TRIED;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400509
510 /*
511 * No need to up_read(&mm->mmap_sem) as we would
512 * have already released it in __lock_page_or_retry
513 * in mm/filemap.c.
514 */
515 goto retry;
516 }
Paul Mundt7433ab7702009-06-25 02:30:10 +0900517 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700518
519 up_read(&mm->mmap_sem);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700520}