fault.c revision 1.17 1 1.17 skrll /* $NetBSD: fault.c,v 1.17 2002/04/04 12:39:55 skrll Exp $ */
2 1.1 chris
3 1.1 chris /*
4 1.1 chris * Copyright (c) 1994-1997 Mark Brinicombe.
5 1.1 chris * Copyright (c) 1994 Brini.
6 1.1 chris * All rights reserved.
7 1.1 chris *
8 1.1 chris * This code is derived from software written for Brini by Mark Brinicombe
9 1.1 chris *
10 1.1 chris * Redistribution and use in source and binary forms, with or without
11 1.1 chris * modification, are permitted provided that the following conditions
12 1.1 chris * are met:
13 1.1 chris * 1. Redistributions of source code must retain the above copyright
14 1.1 chris * notice, this list of conditions and the following disclaimer.
15 1.1 chris * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 chris * notice, this list of conditions and the following disclaimer in the
17 1.1 chris * documentation and/or other materials provided with the distribution.
18 1.1 chris * 3. All advertising materials mentioning features or use of this software
19 1.1 chris * must display the following acknowledgement:
20 1.1 chris * This product includes software developed by Brini.
21 1.1 chris * 4. The name of the company nor the name of the author may be used to
22 1.1 chris * endorse or promote products derived from this software without specific
23 1.1 chris * prior written permission.
24 1.1 chris *
25 1.1 chris * THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 1.1 chris * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 1.1 chris * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
28 1.1 chris * IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
29 1.1 chris * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
30 1.1 chris * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
31 1.1 chris * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 1.1 chris * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 1.1 chris * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 1.1 chris * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 1.1 chris * SUCH DAMAGE.
36 1.1 chris *
37 1.1 chris * RiscBSD kernel project
38 1.1 chris *
39 1.1 chris * fault.c
40 1.1 chris *
41 1.1 chris * Fault handlers
42 1.1 chris *
43 1.1 chris * Created : 28/11/94
44 1.1 chris */
45 1.1 chris
46 1.12 thorpej #include "opt_cputypes.h"
47 1.1 chris #include "opt_ddb.h"
48 1.1 chris #include "opt_pmap_debug.h"
49 1.1 chris
50 1.1 chris #include <sys/types.h>
51 1.1 chris #include <sys/param.h>
52 1.1 chris #include <sys/systm.h>
53 1.1 chris #include <sys/proc.h>
54 1.1 chris #include <sys/user.h>
55 1.1 chris #include <sys/kernel.h>
56 1.1 chris
57 1.1 chris #include <uvm/uvm_extern.h>
58 1.1 chris
59 1.1 chris #include <machine/frame.h>
60 1.5 thorpej #include <arm/arm32/katelib.h>
61 1.1 chris #include <machine/cpu.h>
62 1.2 matt #include <machine/intr.h>
63 1.1 chris #ifdef DDB
64 1.1 chris #include <machine/db_machdep.h>
65 1.1 chris #endif
66 1.1 chris
67 1.1 chris #include <arch/arm/arm/disassem.h>
68 1.7 chris #include <arm/arm32/machdep.h>
69 1.7 chris
70 1.1 chris int cowfault __P((vaddr_t));
71 1.1 chris extern char fusubailout[];
72 1.1 chris
73 1.7 chris static void report_abort __P((const char *, u_int, u_int, u_int));
74 1.7 chris
75 1.1 chris /* Abort code */
76 1.1 chris
77 1.1 chris /* Define text descriptions of the different aborts */
78 1.1 chris
79 1.1 chris static const char *aborts[16] = {
80 1.1 chris "Write buffer fault",
81 1.1 chris "Alignment fault",
82 1.1 chris "Write buffer fault",
83 1.1 chris "Alignment fault",
84 1.1 chris "Bus error (LF section)",
85 1.1 chris "Translation fault (section)",
86 1.1 chris "Bus error (page)",
87 1.1 chris "Translation fault (page)",
88 1.1 chris "Bus error (section)",
89 1.1 chris "Domain error (section)",
90 1.1 chris "Bus error (page)",
91 1.1 chris "Domain error (page)",
92 1.1 chris "Bus error trans (L1)",
93 1.1 chris "Permission error (section)",
94 1.1 chris "Bus error trans (L2)",
95 1.1 chris "Permission error (page)"
96 1.1 chris };
97 1.1 chris
98 1.7 chris static void
99 1.1 chris report_abort(prefix, fault_status, fault_address, fault_pc)
100 1.1 chris const char *prefix;
101 1.1 chris u_int fault_status;
102 1.1 chris u_int fault_address;
103 1.1 chris u_int fault_pc;
104 1.1 chris {
105 1.1 chris #ifndef DEBUG
106 1.1 chris if (prefix == NULL) {
107 1.1 chris #endif
108 1.1 chris if (prefix)
109 1.1 chris printf("%s ", prefix);
110 1.1 chris printf("Data abort: '%s' status=%03x address=%08x PC=%08x\n",
111 1.1 chris aborts[fault_status & FAULT_TYPE_MASK],
112 1.1 chris fault_status & 0xfff, fault_address, fault_pc);
113 1.1 chris #ifndef DEBUG
114 1.1 chris }
115 1.1 chris #endif
116 1.1 chris }
117 1.1 chris
118 1.3 thorpej static __volatile int data_abort_expected;
119 1.3 thorpej static __volatile int data_abort_received;
120 1.3 thorpej
121 1.3 thorpej int
122 1.3 thorpej badaddr_read(void *addr, size_t size, void *rptr)
123 1.3 thorpej {
124 1.3 thorpej u_long rcpt;
125 1.3 thorpej int rv;
126 1.3 thorpej
127 1.3 thorpej /* Tell the Data Abort handler that we're expecting one. */
128 1.3 thorpej data_abort_received = 0;
129 1.3 thorpej data_abort_expected = 1;
130 1.3 thorpej
131 1.3 thorpej cpu_drain_writebuf();
132 1.3 thorpej
133 1.3 thorpej /* Read from the test address. */
134 1.3 thorpej switch (size) {
135 1.3 thorpej case sizeof(uint8_t):
136 1.3 thorpej __asm __volatile("ldrb %0, [%1]"
137 1.3 thorpej : "=r" (rcpt)
138 1.3 thorpej : "r" (addr));
139 1.3 thorpej break;
140 1.3 thorpej
141 1.3 thorpej case sizeof(uint16_t):
142 1.3 thorpej __asm __volatile("ldrh %0, [%1]"
143 1.3 thorpej : "=r" (rcpt)
144 1.3 thorpej : "r" (addr));
145 1.3 thorpej break;
146 1.3 thorpej
147 1.3 thorpej case sizeof(uint32_t):
148 1.3 thorpej __asm __volatile("ldr %0, [%1]"
149 1.3 thorpej : "=r" (rcpt)
150 1.3 thorpej : "r" (addr));
151 1.3 thorpej break;
152 1.3 thorpej
153 1.3 thorpej default:
154 1.3 thorpej data_abort_expected = 0;
155 1.3 thorpej panic("badaddr: invalid size (%lu)\n", (u_long) size);
156 1.3 thorpej }
157 1.3 thorpej
158 1.3 thorpej /* Disallow further Data Aborts. */
159 1.3 thorpej data_abort_expected = 0;
160 1.3 thorpej
161 1.3 thorpej rv = data_abort_received;
162 1.3 thorpej data_abort_received = 0;
163 1.3 thorpej
164 1.3 thorpej /* Copy the data back if no fault occurred. */
165 1.3 thorpej if (rptr != NULL && rv == 0) {
166 1.3 thorpej switch (size) {
167 1.3 thorpej case sizeof(uint8_t):
168 1.3 thorpej *(uint8_t *) rptr = rcpt;
169 1.3 thorpej break;
170 1.3 thorpej
171 1.3 thorpej case sizeof(uint16_t):
172 1.3 thorpej *(uint16_t *) rptr = rcpt;
173 1.3 thorpej break;
174 1.3 thorpej
175 1.3 thorpej case sizeof(uint32_t):
176 1.3 thorpej *(uint32_t *) rptr = rcpt;
177 1.3 thorpej break;
178 1.3 thorpej }
179 1.3 thorpej }
180 1.3 thorpej
181 1.3 thorpej /* Return true if the address was invalid. */
182 1.3 thorpej return (rv);
183 1.3 thorpej }
184 1.3 thorpej
185 1.1 chris /*
186 1.1 chris * void data_abort_handler(trapframe_t *frame)
187 1.1 chris *
188 1.1 chris * Abort handler called when read/write occurs at an address of
189 1.1 chris * a non existent or restricted (access permissions) memory page.
190 1.1 chris * We first need to identify the type of page fault.
191 1.1 chris */
192 1.1 chris
193 1.1 chris #define TRAP_CODE ((fault_status & 0x0f) | (fault_address & 0xfffffff0))
194 1.1 chris
195 1.1 chris void
196 1.1 chris data_abort_handler(frame)
197 1.1 chris trapframe_t *frame;
198 1.1 chris {
199 1.1 chris struct proc *p;
200 1.1 chris struct pcb *pcb;
201 1.1 chris u_int fault_address;
202 1.1 chris u_int fault_status;
203 1.1 chris u_int fault_pc;
204 1.1 chris u_int fault_instruction;
205 1.1 chris int fault_code;
206 1.1 chris int user;
207 1.1 chris int error;
208 1.1 chris void *onfault;
209 1.3 thorpej
210 1.3 thorpej /*
211 1.3 thorpej * If we were expecting a Data Abort, signal that we got
212 1.3 thorpej * one, adjust the PC to skip the faulting insn, and
213 1.3 thorpej * return.
214 1.3 thorpej */
215 1.3 thorpej if (data_abort_expected) {
216 1.3 thorpej data_abort_received = 1;
217 1.3 thorpej frame->tf_pc += INSN_SIZE;
218 1.3 thorpej return;
219 1.3 thorpej }
220 1.1 chris
221 1.1 chris /*
222 1.1 chris * Must get fault address and status from the CPU before
223 1.1 chris * re-enabling interrupts. (Interrupt handlers may take
224 1.1 chris * R/M emulation faults.)
225 1.1 chris */
226 1.1 chris fault_address = cpu_faultaddress();
227 1.1 chris fault_status = cpu_faultstatus();
228 1.1 chris fault_pc = frame->tf_pc;
229 1.1 chris
230 1.1 chris /*
231 1.1 chris * Enable IRQ's (disabled by CPU on abort) if trapframe
232 1.1 chris * shows they were enabled.
233 1.1 chris */
234 1.1 chris if (!(frame->tf_spsr & I32_bit))
235 1.1 chris enable_interrupts(I32_bit);
236 1.1 chris
237 1.1 chris #ifdef DEBUG
238 1.1 chris if ((GetCPSR() & PSR_MODE) != PSR_SVC32_MODE)
239 1.1 chris panic("data_abort_handler: not in SVC32 mode");
240 1.1 chris #endif
241 1.1 chris
242 1.1 chris /* Update vmmeter statistics */
243 1.1 chris uvmexp.traps++;
244 1.1 chris
245 1.1 chris /* Extract the fault code from the fault status */
246 1.1 chris fault_code = fault_status & FAULT_TYPE_MASK;
247 1.1 chris
248 1.1 chris /* Get the current proc structure or proc0 if there is none */
249 1.1 chris if ((p = curproc) == NULL)
250 1.1 chris p = &proc0;
251 1.1 chris
252 1.1 chris /*
253 1.1 chris * can't use curpcb, as it might be NULL; and we have p in
254 1.1 chris * a register anyway
255 1.1 chris */
256 1.1 chris pcb = &p->p_addr->u_pcb;
257 1.1 chris
258 1.1 chris /* fusubailout is used by [fs]uswintr to avoid page faulting */
259 1.1 chris if (pcb->pcb_onfault
260 1.1 chris && ((fault_code != FAULT_TRANS_S && fault_code != FAULT_TRANS_P &&
261 1.1 chris fault_code != FAULT_PERM_S && fault_code != FAULT_PERM_P)
262 1.1 chris || pcb->pcb_onfault == fusubailout)) {
263 1.1 chris
264 1.1 chris copyfault:
265 1.1 chris #ifdef DEBUG
266 1.1 chris printf("Using pcb_onfault=%p addr=%08x st=%08x p=%p\n",
267 1.1 chris pcb->pcb_onfault, fault_address, fault_status, p);
268 1.1 chris #endif
269 1.1 chris frame->tf_pc = (u_int)pcb->pcb_onfault;
270 1.1 chris if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE)
271 1.1 chris panic("Yikes pcb_onfault=%p during USR mode fault\n",
272 1.1 chris pcb->pcb_onfault);
273 1.1 chris return;
274 1.1 chris }
275 1.1 chris
276 1.1 chris /* More debug stuff */
277 1.1 chris
278 1.1 chris fault_instruction = ReadWord(fault_pc);
279 1.1 chris
280 1.1 chris #ifdef PMAP_DEBUG
281 1.1 chris if (pmap_debug_level >= 0) {
282 1.1 chris report_abort(NULL, fault_status, fault_address, fault_pc);
283 1.1 chris printf("Instruction @V%08x = %08x\n",
284 1.1 chris fault_pc, fault_instruction);
285 1.1 chris }
286 1.1 chris #endif
287 1.1 chris
288 1.1 chris /* Call the cpu specific abort fixup routine */
289 1.1 chris error = cpu_dataabt_fixup(frame);
290 1.1 chris if (error == ABORT_FIXUP_RETURN)
291 1.1 chris return;
292 1.1 chris if (error == ABORT_FIXUP_FAILED) {
293 1.11 reinoud printf("pc = 0x%08x, opcode 0x%08x, insn = ", fault_pc, *((u_int *)fault_pc));
294 1.1 chris disassemble(fault_pc);
295 1.11 reinoud printf("data abort handler: fixup failed for this instruction\n");
296 1.1 chris }
297 1.1 chris
298 1.1 chris #ifdef PMAP_DEBUG
299 1.1 chris if (pmap_debug_level >= 0)
300 1.1 chris printf("fault in process %p\n", p);
301 1.1 chris #endif
302 1.1 chris
303 1.1 chris #ifdef DEBUG
304 1.1 chris /* Is this needed ? */
305 1.1 chris if (pcb != curpcb) {
306 1.1 chris printf("data_abort: Alert ! pcb(%p) != curpcb(%p)\n",
307 1.1 chris pcb, curpcb);
308 1.1 chris printf("data_abort: Alert ! proc(%p), curproc(%p)\n",
309 1.1 chris p, curproc);
310 1.1 chris }
311 1.1 chris #endif /* DEBUG */
312 1.1 chris
313 1.1 chris /* Were we in user mode when the abort occurred ? */
314 1.1 chris if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE) {
315 1.1 chris /*
316 1.1 chris * Note that the fault was from USR mode.
317 1.1 chris */
318 1.1 chris user = 1;
319 1.1 chris p->p_addr->u_pcb.pcb_tf = frame;
320 1.1 chris } else
321 1.1 chris user = 0;
322 1.11 reinoud
323 1.11 reinoud /* check if this was a failed fixup */
324 1.11 reinoud if (error == ABORT_FIXUP_FAILED) {
325 1.11 reinoud if (user) {
326 1.11 reinoud trapsignal(p, SIGSEGV, TRAP_CODE);
327 1.11 reinoud userret(p);
328 1.11 reinoud return;
329 1.11 reinoud };
330 1.11 reinoud panic("Data abort fixup failed in kernel - we're dead\n");
331 1.11 reinoud };
332 1.1 chris
333 1.1 chris /* Now act on the fault type */
334 1.1 chris switch (fault_code) {
335 1.1 chris case FAULT_WRTBUF_0: /* Write Buffer Fault */
336 1.1 chris case FAULT_WRTBUF_1: /* Write Buffer Fault */
337 1.1 chris /* If this happens forget it no point in continuing */
338 1.1 chris
339 1.1 chris /* FALLTHROUGH */
340 1.1 chris
341 1.1 chris case FAULT_ALIGN_0: /* Alignment Fault */
342 1.1 chris case FAULT_ALIGN_1: /* Alignment Fault */
343 1.1 chris /*
344 1.1 chris * Really this should just kill the process.
345 1.1 chris * Alignment faults are turned off in the kernel
346 1.1 chris * in order to get better performance from shorts with
347 1.1 chris * GCC so an alignment fault means somebody has played
348 1.1 chris * with the control register in the CPU. Might as well
349 1.1 chris * panic as the kernel was not compiled for aligned accesses.
350 1.1 chris */
351 1.1 chris
352 1.1 chris /* FALLTHROUGH */
353 1.1 chris
354 1.1 chris case FAULT_BUSERR_0: /* Bus Error LF Section */
355 1.1 chris case FAULT_BUSERR_1: /* Bus Error Page */
356 1.1 chris case FAULT_BUSERR_2: /* Bus Error Section */
357 1.1 chris case FAULT_BUSERR_3: /* Bus Error Page */
358 1.1 chris /* What will accutally cause a bus error ? */
359 1.1 chris /* Real bus errors are not a process problem but hardware */
360 1.1 chris
361 1.1 chris /* FALLTHROUGH */
362 1.1 chris
363 1.1 chris case FAULT_DOMAIN_S: /* Section Domain Error Fault */
364 1.1 chris case FAULT_DOMAIN_P: /* Page Domain Error Fault*/
365 1.1 chris /*
366 1.1 chris * Right well we dont use domains, everything is
367 1.1 chris * always a client and thus subject to access permissions.
368 1.1 chris * If we get a domain error then we have corrupts PTE's
369 1.1 chris * so we might as well die !
370 1.1 chris * I suppose eventually this should just kill the process
371 1.1 chris * who owns the PTE's but if this happens it implies a
372 1.1 chris * kernel problem.
373 1.1 chris */
374 1.1 chris
375 1.1 chris /* FALLTHROUGH */
376 1.1 chris
377 1.1 chris case FAULT_BUSTRNL1: /* Bus Error Trans L1 Fault */
378 1.1 chris case FAULT_BUSTRNL2: /* Bus Error Trans L2 Fault */
379 1.1 chris /*
380 1.1 chris * These faults imply that the PTE is corrupt.
381 1.1 chris * Likely to be a kernel fault so we had better stop.
382 1.1 chris */
383 1.1 chris
384 1.1 chris /* FALLTHROUGH */
385 1.1 chris
386 1.1 chris default :
387 1.1 chris /* Are there any combinations I have missed ? */
388 1.1 chris report_abort(NULL, fault_status, fault_address, fault_pc);
389 1.1 chris
390 1.1 chris we_re_toast:
391 1.1 chris /*
392 1.1 chris * Were are dead, try and provide some debug
393 1.1 chris * information before dying.
394 1.1 chris */
395 1.1 chris #ifdef DDB
396 1.1 chris printf("Unhandled trap (frame = %p)\n", frame);
397 1.1 chris report_abort(NULL, fault_status, fault_address, fault_pc);
398 1.1 chris kdb_trap(-1, frame);
399 1.1 chris return;
400 1.1 chris #else
401 1.1 chris panic("Unhandled trap (frame = %p)", frame);
402 1.1 chris #endif /* DDB */
403 1.1 chris
404 1.1 chris case FAULT_TRANS_P: /* Page Translation Fault */
405 1.1 chris case FAULT_PERM_P: /* Page Permission Fault */
406 1.1 chris case FAULT_TRANS_S: /* Section Translation Fault */
407 1.1 chris case FAULT_PERM_S: /* Section Permission Fault */
408 1.1 chris /*
409 1.1 chris * Page/section translation/permission fault -- need to fault in
410 1.1 chris * the page and possibly the page table page.
411 1.1 chris */
412 1.14 thorpej {
413 1.1 chris register vaddr_t va;
414 1.1 chris register struct vmspace *vm = p->p_vmspace;
415 1.1 chris register struct vm_map *map;
416 1.1 chris int rv;
417 1.1 chris vm_prot_t ftype;
418 1.1 chris extern struct vm_map *kernel_map;
419 1.1 chris
420 1.1 chris va = trunc_page((vaddr_t)fault_address);
421 1.1 chris
422 1.1 chris #ifdef PMAP_DEBUG
423 1.1 chris if (pmap_debug_level >= 0)
424 1.1 chris printf("page fault: addr=V%08lx ", va);
425 1.1 chris #endif
426 1.1 chris
427 1.1 chris /*
428 1.1 chris * It is only a kernel address space fault iff:
429 1.1 chris * 1. user == 0 and
430 1.1 chris * 2. pcb_onfault not set or
431 1.1 chris * 3. pcb_onfault set but supervisor space fault
432 1.1 chris * The last can occur during an exec() copyin where the
433 1.1 chris * argument space is lazy-allocated.
434 1.1 chris */
435 1.1 chris if (!user &&
436 1.1 chris (va >= VM_MIN_KERNEL_ADDRESS || va < VM_MIN_ADDRESS)) {
437 1.1 chris /* Was the fault due to the FPE/IPKDB ? */
438 1.1 chris if ((frame->tf_spsr & PSR_MODE) == PSR_UND32_MODE) {
439 1.1 chris report_abort("UND32", fault_status,
440 1.1 chris fault_address, fault_pc);
441 1.1 chris trapsignal(p, SIGSEGV, TRAP_CODE);
442 1.1 chris
443 1.1 chris /*
444 1.1 chris * Force exit via userret()
445 1.1 chris * This is necessary as the FPE is an extension
446 1.1 chris * to userland that actually runs in a
447 1.1 chris * priveledged mode but uses USR mode
448 1.1 chris * permissions for its accesses.
449 1.1 chris */
450 1.1 chris userret(p);
451 1.1 chris return;
452 1.1 chris }
453 1.1 chris map = kernel_map;
454 1.1 chris } else
455 1.1 chris map = &vm->vm_map;
456 1.1 chris
457 1.1 chris #ifdef PMAP_DEBUG
458 1.1 chris if (pmap_debug_level >= 0)
459 1.1 chris printf("vmmap=%p ", map);
460 1.1 chris #endif
461 1.1 chris
462 1.1 chris if (map == NULL)
463 1.10 thorpej panic("No map for fault address va = 0x%08lx", va);
464 1.1 chris
465 1.1 chris /*
466 1.1 chris * We need to know whether the page should be mapped
467 1.1 chris * as R or R/W. The MMU does not give us the info as
468 1.1 chris * to whether the fault was caused by a read or a write.
469 1.1 chris * This means we need to disassemble the instruction
470 1.1 chris * responsible and determine if it was a read or write
471 1.1 chris * instruction.
472 1.1 chris */
473 1.1 chris /* STR instruction ? */
474 1.1 chris if ((fault_instruction & 0x0c100000) == 0x04000000)
475 1.8 chs ftype = VM_PROT_WRITE;
476 1.1 chris /* STM or CDT instruction ? */
477 1.1 chris else if ((fault_instruction & 0x0a100000) == 0x08000000)
478 1.8 chs ftype = VM_PROT_WRITE;
479 1.1 chris /* STRH, STRSH or STRSB instruction ? */
480 1.1 chris else if ((fault_instruction & 0x0e100090) == 0x00000090)
481 1.8 chs ftype = VM_PROT_WRITE;
482 1.1 chris /* SWP instruction ? */
483 1.1 chris else if ((fault_instruction & 0x0fb00ff0) == 0x01000090)
484 1.9 bjh21 ftype = VM_PROT_READ | VM_PROT_WRITE;
485 1.1 chris else
486 1.1 chris ftype = VM_PROT_READ;
487 1.1 chris
488 1.1 chris #ifdef PMAP_DEBUG
489 1.1 chris if (pmap_debug_level >= 0)
490 1.1 chris printf("fault protection = %d\n", ftype);
491 1.1 chris #endif
492 1.1 chris
493 1.1 chris if ((ftype & VM_PROT_WRITE) ?
494 1.1 chris pmap_modified_emulation(map->pmap, va) :
495 1.1 chris pmap_handled_emulation(map->pmap, va))
496 1.1 chris goto out;
497 1.1 chris
498 1.1 chris if (current_intr_depth > 0) {
499 1.1 chris #ifdef DDB
500 1.1 chris printf("Non-emulated page fault with intr_depth > 0\n");
501 1.1 chris report_abort(NULL, fault_status, fault_address, fault_pc);
502 1.1 chris kdb_trap(-1, frame);
503 1.1 chris return;
504 1.1 chris #else
505 1.1 chris panic("Fault with intr_depth > 0");
506 1.1 chris #endif /* DDB */
507 1.1 chris }
508 1.1 chris
509 1.1 chris onfault = pcb->pcb_onfault;
510 1.1 chris pcb->pcb_onfault = NULL;
511 1.1 chris rv = uvm_fault(map, va, 0, ftype);
512 1.1 chris pcb->pcb_onfault = onfault;
513 1.1 chris if (rv == 0)
514 1.1 chris goto out;
515 1.1 chris
516 1.1 chris if (user == 0) {
517 1.1 chris if (pcb->pcb_onfault)
518 1.1 chris goto copyfault;
519 1.1 chris printf("[u]vm_fault(%p, %lx, %x, 0) -> %x\n",
520 1.1 chris map, va, ftype, rv);
521 1.1 chris goto we_re_toast;
522 1.1 chris }
523 1.1 chris
524 1.1 chris report_abort("", fault_status, fault_address, fault_pc);
525 1.1 chris if (rv == ENOMEM) {
526 1.1 chris printf("UVM: pid %d (%s), uid %d killed: "
527 1.1 chris "out of swap\n", p->p_pid, p->p_comm,
528 1.1 chris p->p_cred && p->p_ucred ?
529 1.1 chris p->p_ucred->cr_uid : -1);
530 1.1 chris trapsignal(p, SIGKILL, TRAP_CODE);
531 1.1 chris } else
532 1.1 chris trapsignal(p, SIGSEGV, TRAP_CODE);
533 1.1 chris break;
534 1.14 thorpej }
535 1.1 chris }
536 1.1 chris
537 1.14 thorpej out:
538 1.1 chris /* Call userret() if it was a USR mode fault */
539 1.1 chris if (user)
540 1.1 chris userret(p);
541 1.1 chris }
542 1.1 chris
543 1.1 chris
544 1.1 chris /*
545 1.1 chris * void prefetch_abort_handler(trapframe_t *frame)
546 1.1 chris *
547 1.1 chris * Abort handler called when instruction execution occurs at
548 1.1 chris * a non existent or restricted (access permissions) memory page.
549 1.1 chris * If the address is invalid and we were in SVC mode then panic as
550 1.1 chris * the kernel should never prefetch abort.
551 1.1 chris * If the address is invalid and the page is mapped then the user process
552 1.1 chris * does no have read permission so send it a signal.
553 1.1 chris * Otherwise fault the page in and try again.
554 1.1 chris */
555 1.1 chris
556 1.1 chris extern int kernel_debug;
557 1.1 chris
558 1.1 chris void
559 1.1 chris prefetch_abort_handler(frame)
560 1.1 chris trapframe_t *frame;
561 1.1 chris {
562 1.14 thorpej struct proc *p;
563 1.14 thorpej struct vm_map *map;
564 1.14 thorpej vaddr_t fault_pc, va;
565 1.1 chris int error;
566 1.1 chris
567 1.1 chris /*
568 1.1 chris * Enable IRQ's (disabled by the abort) This always comes
569 1.1 chris * from user mode so we know interrupts were not disabled.
570 1.1 chris * But we check anyway.
571 1.1 chris */
572 1.1 chris if (!(frame->tf_spsr & I32_bit))
573 1.1 chris enable_interrupts(I32_bit);
574 1.1 chris
575 1.1 chris #ifdef DEBUG
576 1.1 chris if ((GetCPSR() & PSR_MODE) != PSR_SVC32_MODE)
577 1.1 chris panic("prefetch_abort_handler: not in SVC32 mode");
578 1.1 chris #endif
579 1.1 chris
580 1.1 chris /* Update vmmeter statistics */
581 1.1 chris uvmexp.traps++;
582 1.1 chris
583 1.1 chris /* Call the cpu specific abort fixup routine */
584 1.1 chris error = cpu_prefetchabt_fixup(frame);
585 1.1 chris if (error == ABORT_FIXUP_RETURN)
586 1.1 chris return;
587 1.1 chris if (error == ABORT_FIXUP_FAILED)
588 1.1 chris panic("prefetch abort fixup failed\n");
589 1.1 chris
590 1.1 chris /* Get the current proc structure or proc0 if there is none */
591 1.1 chris if ((p = curproc) == 0) {
592 1.1 chris p = &proc0;
593 1.1 chris #ifdef DEBUG
594 1.1 chris printf("Prefetch abort with curproc == 0\n");
595 1.1 chris #endif
596 1.1 chris }
597 1.1 chris
598 1.1 chris #ifdef PMAP_DEBUG
599 1.1 chris if (pmap_debug_level >= 0)
600 1.1 chris printf("prefetch fault in process %p %s\n", p, p->p_comm);
601 1.1 chris #endif
602 1.1 chris
603 1.4 thorpej /* Get fault address */
604 1.4 thorpej fault_pc = frame->tf_pc;
605 1.14 thorpej va = trunc_page(fault_pc);
606 1.4 thorpej
607 1.1 chris /* Was the prefectch abort from USR32 mode ? */
608 1.1 chris if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE) {
609 1.1 chris p->p_addr->u_pcb.pcb_tf = frame;
610 1.1 chris } else {
611 1.1 chris /*
612 1.1 chris * All the kernel code pages are loaded at boot time
613 1.1 chris * and do not get paged
614 1.1 chris */
615 1.14 thorpej panic("Prefetch abort in non-USR mode (frame=%p PC=0x%08lx)\n",
616 1.4 thorpej frame, fault_pc);
617 1.1 chris }
618 1.1 chris
619 1.14 thorpej map = &p->p_vmspace->vm_map;
620 1.14 thorpej
621 1.1 chris #ifdef PMAP_DEBUG
622 1.1 chris if (pmap_debug_level >= 0)
623 1.16 thorpej printf("prefetch_abort: PC = %08lx\n", fault_pc);
624 1.1 chris #endif
625 1.1 chris /* Ok validate the address, can only execute in USER space */
626 1.1 chris if (fault_pc < VM_MIN_ADDRESS || fault_pc >= VM_MAXUSER_ADDRESS) {
627 1.1 chris #ifdef DEBUG
628 1.1 chris printf("prefetch: pc (%08x) not in user process space\n",
629 1.1 chris fault_pc);
630 1.1 chris #endif
631 1.1 chris trapsignal(p, SIGSEGV, fault_pc);
632 1.1 chris userret(p);
633 1.1 chris return;
634 1.1 chris }
635 1.1 chris
636 1.12 thorpej #ifdef CPU_SA110
637 1.12 thorpej /*
638 1.12 thorpej * There are bugs in the rev K SA110. This is a check for one
639 1.12 thorpej * of them.
640 1.12 thorpej */
641 1.13 thorpej if (curcpu()->ci_cputype == CPU_ID_SA110 && curcpu()->ci_cpurev < 3) {
642 1.12 thorpej /* Always current pmap */
643 1.12 thorpej pt_entry_t *pte = vtopte((vaddr_t) fault_pc);
644 1.12 thorpej struct pmap *pmap = p->p_vmspace->vm_map.pmap;
645 1.12 thorpej
646 1.12 thorpej if (pmap_pde_v(pmap_pde(pmap, (vaddr_t) fault_pc)) &&
647 1.12 thorpej pmap_pte_v(pte)) {
648 1.12 thorpej if (kernel_debug & 1) {
649 1.12 thorpej printf("prefetch_abort: page is already "
650 1.12 thorpej "mapped - pte=%p *pte=%08x\n", pte, *pte);
651 1.14 thorpej printf("prefetch_abort: pc=%08lx proc=%p "
652 1.12 thorpej "process=%s\n", fault_pc, p, p->p_comm);
653 1.12 thorpej printf("prefetch_abort: far=%08x fs=%x\n",
654 1.12 thorpej cpu_faultaddress(), cpu_faultstatus());
655 1.12 thorpej printf("prefetch_abort: trapframe=%08x\n",
656 1.12 thorpej (u_int)frame);
657 1.12 thorpej }
658 1.12 thorpej #ifdef DDB
659 1.12 thorpej if (kernel_debug & 2)
660 1.12 thorpej Debugger();
661 1.17 skrll #endif
662 1.1 chris }
663 1.1 chris }
664 1.12 thorpej #endif /* CPU_SA110 */
665 1.12 thorpej
666 1.14 thorpej if (pmap_handled_emulation(map->pmap, va))
667 1.14 thorpej goto out;
668 1.14 thorpej
669 1.14 thorpej if (current_intr_depth > 0) {
670 1.14 thorpej #ifdef DDB
671 1.14 thorpej printf("Non-emulated prefetch abort with intr_depth > 0\n");
672 1.14 thorpej kdb_trap(-1, frame);
673 1.14 thorpej return;
674 1.14 thorpej #else
675 1.14 thorpej panic("Prefetch Abort with intr_depth > 0");
676 1.1 chris #endif
677 1.1 chris }
678 1.1 chris
679 1.14 thorpej error = uvm_fault(map, va, 0, VM_PROT_READ);
680 1.14 thorpej if (error == 0)
681 1.14 thorpej goto out;
682 1.14 thorpej
683 1.14 thorpej if (error == ENOMEM) {
684 1.14 thorpej printf("UVM: pid %d (%s), uid %d killed: "
685 1.14 thorpej "out of swap\n", p->p_pid, p->p_comm,
686 1.14 thorpej p->p_cred && p->p_ucred ?
687 1.14 thorpej p->p_ucred->cr_uid : -1);
688 1.14 thorpej trapsignal(p, SIGKILL, fault_pc);
689 1.14 thorpej } else
690 1.14 thorpej trapsignal(p, SIGSEGV, fault_pc);
691 1.14 thorpej out:
692 1.1 chris userret(p);
693 1.1 chris }
694 1.1 chris
695 1.1 chris int
696 1.1 chris cowfault(va)
697 1.1 chris vaddr_t va;
698 1.1 chris {
699 1.1 chris struct vmspace *vm;
700 1.1 chris int error;
701 1.1 chris
702 1.1 chris if (va >= VM_MAXUSER_ADDRESS)
703 1.1 chris return (EFAULT);
704 1.1 chris
705 1.1 chris /* uvm_fault can't be called from within an interrupt */
706 1.1 chris KASSERT(current_intr_depth == 0);
707 1.1 chris
708 1.1 chris vm = curproc->p_vmspace;
709 1.8 chs error = uvm_fault(&vm->vm_map, va, 0, VM_PROT_WRITE);
710 1.1 chris return error;
711 1.1 chris }
712