blob: 5f51456f4fc7167a2af3e02b6774ca48375e73fc [file] [log] [blame]
Paul Mundt26ff6c12006-09-27 15:13:36 +09001/*
2 * Page fault handler for SH with an MMU.
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 * Copyright (C) 1999 Niibe Yutaka
Paul Mundtdbdb4e92012-05-14 10:27:34 +09005 * Copyright (C) 2003 - 2012 Paul Mundt
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
7 * Based on linux/arch/i386/mm/fault.c:
8 * Copyright (C) 1995 Linus Torvalds
Paul Mundt26ff6c12006-09-27 15:13:36 +09009 *
10 * This file is subject to the terms and conditions of the GNU General Public
11 * License. See the file "COPYING" in the main directory of this archive
12 * for more details.
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/mm.h>
Ingo Molnar3f07c012017-02-08 18:51:30 +010016#include <linux/sched/signal.h>
Paul Mundt0f08f332006-09-27 17:03:56 +090017#include <linux/hardirq.h>
18#include <linux/kprobes.h>
Ingo Molnarcdd6c482009-09-21 12:02:48 +020019#include <linux/perf_event.h>
Paul Mundtdbdb4e92012-05-14 10:27:34 +090020#include <linux/kdebug.h>
David Hildenbrand70ffdb92015-05-11 17:52:11 +020021#include <linux/uaccess.h>
Magnus Damme7cc9a72008-02-07 20:18:21 +090022#include <asm/io_trapped.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023#include <asm/mmu_context.h>
Paul Mundtdb2e1fa2007-02-14 14:13:10 +090024#include <asm/tlbflush.h>
David Howellse839ca52012-03-28 18:30:03 +010025#include <asm/traps.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070026
Paul Mundtdbdb4e92012-05-14 10:27:34 +090027static void
Eric W. Biedermane1656822019-02-05 18:38:15 -060028force_sig_info_fault(int si_signo, int si_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +090029{
Eric W. Biederman2e1661d22019-05-23 11:04:24 -050030 force_sig_fault(si_signo, si_code, (void __user *)address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +090031}
32
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090033/*
34 * This is useful to dump out the page tables associated with
35 * 'addr' in mm 'mm'.
36 */
37static void show_pte(struct mm_struct *mm, unsigned long addr)
38{
39 pgd_t *pgd;
40
Paul Mundt90eed7d2012-07-24 13:15:54 +090041 if (mm) {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090042 pgd = mm->pgd;
Paul Mundt90eed7d2012-07-24 13:15:54 +090043 } else {
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090044 pgd = get_TTB();
45
Paul Mundt90eed7d2012-07-24 13:15:54 +090046 if (unlikely(!pgd))
47 pgd = swapper_pg_dir;
48 }
49
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090050 printk(KERN_ALERT "pgd = %p\n", pgd);
51 pgd += pgd_index(addr);
52 printk(KERN_ALERT "[%08lx] *pgd=%0*Lx", addr,
Paul Mundt28080322012-05-14 15:33:28 +090053 (u32)(sizeof(*pgd) * 2), (u64)pgd_val(*pgd));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090054
55 do {
56 pud_t *pud;
57 pmd_t *pmd;
58 pte_t *pte;
59
60 if (pgd_none(*pgd))
61 break;
62
63 if (pgd_bad(*pgd)) {
64 printk("(bad)");
65 break;
66 }
67
68 pud = pud_offset(pgd, addr);
69 if (PTRS_PER_PUD != 1)
Paul Mundt28080322012-05-14 15:33:28 +090070 printk(", *pud=%0*Lx", (u32)(sizeof(*pud) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090071 (u64)pud_val(*pud));
72
73 if (pud_none(*pud))
74 break;
75
76 if (pud_bad(*pud)) {
77 printk("(bad)");
78 break;
79 }
80
81 pmd = pmd_offset(pud, addr);
82 if (PTRS_PER_PMD != 1)
Paul Mundt28080322012-05-14 15:33:28 +090083 printk(", *pmd=%0*Lx", (u32)(sizeof(*pmd) * 2),
Stuart Menefy45c0e0e2012-04-19 17:25:03 +090084 (u64)pmd_val(*pmd));
85
86 if (pmd_none(*pmd))
87 break;
88
89 if (pmd_bad(*pmd)) {
90 printk("(bad)");
91 break;
92 }
93
94 /* We must not map this if we have highmem enabled */
95 if (PageHighMem(pfn_to_page(pmd_val(*pmd) >> PAGE_SHIFT)))
96 break;
97
98 pte = pte_offset_kernel(pmd, addr);
Paul Mundt28080322012-05-14 15:33:28 +090099 printk(", *pte=%0*Lx", (u32)(sizeof(*pte) * 2),
100 (u64)pte_val(*pte));
Stuart Menefy45c0e0e2012-04-19 17:25:03 +0900101 } while (0);
102
103 printk("\n");
104}
105
Paul Mundt0f60bb22009-07-05 03:18:47 +0900106static inline pmd_t *vmalloc_sync_one(pgd_t *pgd, unsigned long address)
107{
108 unsigned index = pgd_index(address);
109 pgd_t *pgd_k;
110 pud_t *pud, *pud_k;
111 pmd_t *pmd, *pmd_k;
112
113 pgd += index;
114 pgd_k = init_mm.pgd + index;
115
116 if (!pgd_present(*pgd_k))
117 return NULL;
118
119 pud = pud_offset(pgd, address);
120 pud_k = pud_offset(pgd_k, address);
121 if (!pud_present(*pud_k))
122 return NULL;
123
Matt Fleming5d9b4b12009-12-13 14:38:50 +0000124 if (!pud_present(*pud))
125 set_pud(pud, *pud_k);
126
Paul Mundt0f60bb22009-07-05 03:18:47 +0900127 pmd = pmd_offset(pud, address);
128 pmd_k = pmd_offset(pud_k, address);
129 if (!pmd_present(*pmd_k))
130 return NULL;
131
132 if (!pmd_present(*pmd))
133 set_pmd(pmd, *pmd_k);
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000134 else {
135 /*
136 * The page tables are fully synchronised so there must
137 * be another reason for the fault. Return NULL here to
138 * signal that we have not taken care of the fault.
139 */
Paul Mundt0f60bb22009-07-05 03:18:47 +0900140 BUG_ON(pmd_page(*pmd) != pmd_page(*pmd_k));
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000141 return NULL;
142 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900143
144 return pmd_k;
145}
146
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900147#ifdef CONFIG_SH_STORE_QUEUES
148#define __FAULT_ADDR_LIMIT P3_ADDR_MAX
149#else
150#define __FAULT_ADDR_LIMIT VMALLOC_END
151#endif
152
Paul Mundt0f60bb22009-07-05 03:18:47 +0900153/*
154 * Handle a fault on the vmalloc or module mapping area
155 */
156static noinline int vmalloc_fault(unsigned long address)
157{
158 pgd_t *pgd_k;
159 pmd_t *pmd_k;
160 pte_t *pte_k;
161
Paul Mundtc3e0af92012-05-18 19:30:05 +0900162 /* Make sure we are in vmalloc/module/P3 area: */
Paul Mundtd8fd35f2012-05-18 20:01:16 +0900163 if (!(address >= VMALLOC_START && address < __FAULT_ADDR_LIMIT))
Paul Mundt0f60bb22009-07-05 03:18:47 +0900164 return -1;
165
166 /*
167 * Synchronize this task's top level page-table
168 * with the 'reference' page table.
169 *
170 * Do _not_ use "current" here. We might be inside
171 * an interrupt in the middle of a task switch..
172 */
173 pgd_k = get_TTB();
Matt Fleming05dd2cd2009-07-13 11:38:04 +0000174 pmd_k = vmalloc_sync_one(pgd_k, address);
Paul Mundt0f60bb22009-07-05 03:18:47 +0900175 if (!pmd_k)
176 return -1;
177
178 pte_k = pte_offset_kernel(pmd_k, address);
179 if (!pte_present(*pte_k))
180 return -1;
181
182 return 0;
183}
184
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900185static void
186show_fault_oops(struct pt_regs *regs, unsigned long address)
187{
188 if (!oops_may_print())
189 return;
190
191 printk(KERN_ALERT "BUG: unable to handle kernel ");
192 if (address < PAGE_SIZE)
193 printk(KERN_CONT "NULL pointer dereference");
194 else
195 printk(KERN_CONT "paging request");
196
197 printk(KERN_CONT " at %08lx\n", address);
198 printk(KERN_ALERT "PC:");
199 printk_address(regs->pc, 1);
200
201 show_pte(NULL, address);
202}
203
204static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900205no_context(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900206 unsigned long address)
207{
208 /* Are we prepared to handle this kernel fault? */
209 if (fixup_exception(regs))
210 return;
211
212 if (handle_trapped_io(regs, address))
213 return;
214
215 /*
216 * Oops. The kernel tried to access some bad page. We'll have to
217 * terminate things with extreme prejudice.
218 */
219 bust_spinlocks(1);
220
221 show_fault_oops(regs, address);
222
Paul Mundt5a1dc782012-05-14 14:57:28 +0900223 die("Oops", regs, error_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900224 bust_spinlocks(0);
225 do_exit(SIGKILL);
226}
227
228static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900229__bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900230 unsigned long address, int si_code)
231{
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900232 /* User mode accesses just cause a SIGSEGV */
233 if (user_mode(regs)) {
234 /*
235 * It's possible to have interrupts off here:
236 */
237 local_irq_enable();
238
Eric W. Biedermane1656822019-02-05 18:38:15 -0600239 force_sig_info_fault(SIGSEGV, si_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900240
241 return;
242 }
243
Paul Mundt5a1dc782012-05-14 14:57:28 +0900244 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900245}
246
247static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900248bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900249 unsigned long address)
250{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900251 __bad_area_nosemaphore(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900252}
253
254static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900255__bad_area(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900256 unsigned long address, int si_code)
257{
258 struct mm_struct *mm = current->mm;
259
260 /*
261 * Something tried to access memory that isn't in our memory map..
262 * Fix it, but check if it's kernel or user first..
263 */
264 up_read(&mm->mmap_sem);
265
Paul Mundt5a1dc782012-05-14 14:57:28 +0900266 __bad_area_nosemaphore(regs, error_code, address, si_code);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900267}
268
269static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900270bad_area(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900271{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900272 __bad_area(regs, error_code, address, SEGV_MAPERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900273}
274
275static noinline void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900276bad_area_access_error(struct pt_regs *regs, unsigned long error_code,
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900277 unsigned long address)
278{
Paul Mundt5a1dc782012-05-14 14:57:28 +0900279 __bad_area(regs, error_code, address, SEGV_ACCERR);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900280}
281
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900282static void
Paul Mundt5a1dc782012-05-14 14:57:28 +0900283do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900284{
285 struct task_struct *tsk = current;
286 struct mm_struct *mm = tsk->mm;
287
288 up_read(&mm->mmap_sem);
289
290 /* Kernel mode? Handle exceptions or die: */
291 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900292 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900293
Eric W. Biedermane1656822019-02-05 18:38:15 -0600294 force_sig_info_fault(SIGBUS, BUS_ADRERR, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900295}
296
297static noinline int
Paul Mundt5a1dc782012-05-14 14:57:28 +0900298mm_fault_error(struct pt_regs *regs, unsigned long error_code,
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700299 unsigned long address, vm_fault_t fault)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900300{
301 /*
302 * Pagefault was interrupted by SIGKILL. We have no reason to
303 * continue pagefault.
304 */
305 if (fatal_signal_pending(current)) {
306 if (!(fault & VM_FAULT_RETRY))
307 up_read(&current->mm->mmap_sem);
308 if (!user_mode(regs))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900309 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900310 return 1;
311 }
312
313 if (!(fault & VM_FAULT_ERROR))
314 return 0;
315
316 if (fault & VM_FAULT_OOM) {
317 /* Kernel mode? Handle exceptions or die: */
318 if (!user_mode(regs)) {
319 up_read(&current->mm->mmap_sem);
Paul Mundt5a1dc782012-05-14 14:57:28 +0900320 no_context(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900321 return 1;
322 }
David Rientjesc2d23f92012-12-12 13:52:10 -0800323 up_read(&current->mm->mmap_sem);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900324
David Rientjesc2d23f92012-12-12 13:52:10 -0800325 /*
326 * We ran out of memory, call the OOM killer, and return the
327 * userspace (which will retry the fault, or kill us if we got
328 * oom-killed):
329 */
330 pagefault_out_of_memory();
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900331 } else {
332 if (fault & VM_FAULT_SIGBUS)
Paul Mundt5a1dc782012-05-14 14:57:28 +0900333 do_sigbus(regs, error_code, address);
Linus Torvalds33692f22015-01-29 10:51:32 -0800334 else if (fault & VM_FAULT_SIGSEGV)
335 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900336 else
337 BUG();
338 }
339
340 return 1;
341}
342
Paul Mundt28080322012-05-14 15:33:28 +0900343static inline int access_error(int error_code, struct vm_area_struct *vma)
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900344{
Paul Mundt28080322012-05-14 15:33:28 +0900345 if (error_code & FAULT_CODE_WRITE) {
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900346 /* write, present and write, not present: */
347 if (unlikely(!(vma->vm_flags & VM_WRITE)))
348 return 1;
349 return 0;
350 }
351
Paul Mundt28080322012-05-14 15:33:28 +0900352 /* ITLB miss on NX page */
353 if (unlikely((error_code & FAULT_CODE_ITLB) &&
354 !(vma->vm_flags & VM_EXEC)))
355 return 1;
356
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900357 /* read, not present: */
358 if (unlikely(!(vma->vm_flags & (VM_READ | VM_EXEC | VM_WRITE))))
359 return 1;
360
361 return 0;
362}
363
Paul Mundt0f60bb22009-07-05 03:18:47 +0900364static int fault_in_kernel_space(unsigned long address)
365{
366 return address >= TASK_SIZE;
367}
368
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369/*
370 * This routine handles page faults. It determines the address,
371 * and the problem, and then passes it off to one of the appropriate
372 * routines.
373 */
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900374asmlinkage void __kprobes do_page_fault(struct pt_regs *regs,
Paul Mundt5a1dc782012-05-14 14:57:28 +0900375 unsigned long error_code,
Stuart Menefyb5a1bcb2006-11-21 13:34:04 +0900376 unsigned long address)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700377{
Paul Mundt0f60bb22009-07-05 03:18:47 +0900378 unsigned long vec;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700379 struct task_struct *tsk;
380 struct mm_struct *mm;
381 struct vm_area_struct * vma;
Souptick Joarder50a7ca32018-08-17 15:44:47 -0700382 vm_fault_t fault;
Johannes Weiner759496b2013-09-12 15:13:39 -0700383 unsigned int flags = FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_KILLABLE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385 tsk = current;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900386 mm = tsk->mm;
Paul Mundt0f60bb22009-07-05 03:18:47 +0900387 vec = lookup_exception_vector();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700388
Paul Mundt0f60bb22009-07-05 03:18:47 +0900389 /*
390 * We fault-in kernel-space virtual memory on-demand. The
391 * 'reference' page table is init_mm.pgd.
392 *
393 * NOTE! We MUST NOT take any locks for this case. We may
394 * be in an interrupt or a critical region, and should
395 * only copy the information from the master page table,
396 * nothing more.
397 */
398 if (unlikely(fault_in_kernel_space(address))) {
399 if (vmalloc_fault(address) >= 0)
Stuart Menefy99a596f2006-11-21 15:38:05 +0900400 return;
Anshuman Khandualb98cca42019-07-16 16:28:00 -0700401 if (kprobe_page_fault(regs, vec))
Stuart Menefy96e14e52008-09-05 16:17:15 +0900402 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900403
Paul Mundt5a1dc782012-05-14 14:57:28 +0900404 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900405 return;
Stuart Menefy99a596f2006-11-21 15:38:05 +0900406 }
407
Anshuman Khandualb98cca42019-07-16 16:28:00 -0700408 if (unlikely(kprobe_page_fault(regs, vec)))
Paul Mundt7433ab7702009-06-25 02:30:10 +0900409 return;
410
411 /* Only enable interrupts if they were on before the fault */
412 if ((regs->sr & SR_IMASK) != SR_IMASK)
413 local_irq_enable();
414
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +0200415 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address);
Paul Mundt7433ab7702009-06-25 02:30:10 +0900416
Linus Torvalds1da177e2005-04-16 15:20:36 -0700417 /*
Paul Mundt0f60bb22009-07-05 03:18:47 +0900418 * If we're in an interrupt, have no user context or are running
David Hildenbrand70ffdb92015-05-11 17:52:11 +0200419 * with pagefaults disabled then we must not take the fault:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700420 */
David Hildenbrand70ffdb92015-05-11 17:52:11 +0200421 if (unlikely(faulthandler_disabled() || !mm)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900422 bad_area_nosemaphore(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900423 return;
424 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425
Kautuk Consul11fd9822012-03-31 08:06:11 -0400426retry:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 down_read(&mm->mmap_sem);
428
429 vma = find_vma(mm, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900430 if (unlikely(!vma)) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900431 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900432 return;
433 }
434 if (likely(vma->vm_start <= address))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 goto good_area;
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900436 if (unlikely(!(vma->vm_flags & VM_GROWSDOWN))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900437 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900438 return;
439 }
440 if (unlikely(expand_stack(vma, address))) {
Paul Mundt5a1dc782012-05-14 14:57:28 +0900441 bad_area(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900442 return;
443 }
Paul Mundt0f60bb22009-07-05 03:18:47 +0900444
445 /*
446 * Ok, we have a good vm_area for this memory access, so
447 * we can handle it..
448 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449good_area:
Paul Mundt5a1dc782012-05-14 14:57:28 +0900450 if (unlikely(access_error(error_code, vma))) {
451 bad_area_access_error(regs, error_code, address);
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900452 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700453 }
454
Paul Mundt5a1dc782012-05-14 14:57:28 +0900455 set_thread_fault_code(error_code);
456
Johannes Weiner759496b2013-09-12 15:13:39 -0700457 if (user_mode(regs))
458 flags |= FAULT_FLAG_USER;
459 if (error_code & FAULT_CODE_WRITE)
460 flags |= FAULT_FLAG_WRITE;
461
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462 /*
463 * If for any reason at all we couldn't handle the fault,
464 * make sure we exit gracefully rather than endlessly redo
465 * the fault.
466 */
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700467 fault = handle_mm_fault(vma, address, flags);
Kautuk Consul11fd9822012-03-31 08:06:11 -0400468
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900469 if (unlikely(fault & (VM_FAULT_RETRY | VM_FAULT_ERROR)))
Paul Mundt5a1dc782012-05-14 14:57:28 +0900470 if (mm_fault_error(regs, error_code, address, fault))
Paul Mundtdbdb4e92012-05-14 10:27:34 +0900471 return;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400472
473 if (flags & FAULT_FLAG_ALLOW_RETRY) {
474 if (fault & VM_FAULT_MAJOR) {
475 tsk->maj_flt++;
476 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MAJ, 1,
477 regs, address);
478 } else {
479 tsk->min_flt++;
480 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS_MIN, 1,
481 regs, address);
482 }
483 if (fault & VM_FAULT_RETRY) {
484 flags &= ~FAULT_FLAG_ALLOW_RETRY;
Shaohua Li45cac652012-10-08 16:32:19 -0700485 flags |= FAULT_FLAG_TRIED;
Kautuk Consul11fd9822012-03-31 08:06:11 -0400486
487 /*
488 * No need to up_read(&mm->mmap_sem) as we would
489 * have already released it in __lock_page_or_retry
490 * in mm/filemap.c.
491 */
492 goto retry;
493 }
Paul Mundt7433ab7702009-06-25 02:30:10 +0900494 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495
496 up_read(&mm->mmap_sem);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497}