Home | History | Annotate | Line # | Download | only in arm32
fault.c revision 1.25.2.1
      1 /*	$NetBSD: fault.c,v 1.25.2.1 2002/10/19 14:04:36 bjh21 Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1994-1997 Mark Brinicombe.
      5  * Copyright (c) 1994 Brini.
      6  * All rights reserved.
      7  *
      8  * This code is derived from software written for Brini by Mark Brinicombe
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  * 3. All advertising materials mentioning features or use of this software
     19  *    must display the following acknowledgement:
     20  *	This product includes software developed by Brini.
     21  * 4. The name of the company nor the name of the author may be used to
     22  *    endorse or promote products derived from this software without specific
     23  *    prior written permission.
     24  *
     25  * THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED
     26  * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
     27  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     28  * IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
     29  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     30  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     31  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     32  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     33  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     34  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     35  * SUCH DAMAGE.
     36  *
     37  * RiscBSD kernel project
     38  *
     39  * fault.c
     40  *
     41  * Fault handlers
     42  *
     43  * Created      : 28/11/94
     44  */
     45 
     46 #include "opt_ddb.h"
     47 #include "opt_pmap_debug.h"
     48 
     49 #include <sys/types.h>
     50 __KERNEL_RCSID(0, "$NetBSD: fault.c,v 1.25.2.1 2002/10/19 14:04:36 bjh21 Exp $");
     51 
     52 #include <sys/param.h>
     53 #include <sys/systm.h>
     54 #include <sys/proc.h>
     55 #include <sys/user.h>
     56 #include <sys/kernel.h>
     57 
     58 #include <uvm/uvm_extern.h>
     59 
     60 #include <arm/cpuconf.h>
     61 
     62 #include <machine/frame.h>
     63 #include <arm/arm32/katelib.h>
     64 #include <machine/cpu.h>
     65 #include <machine/intr.h>
     66 #ifdef DDB
     67 #include <machine/db_machdep.h>
     68 #endif
     69 
     70 #include <arch/arm/arm/disassem.h>
     71 #include <arm/arm32/machdep.h>
     72 
     73 extern char fusubailout[];
     74 
     75 static void report_abort __P((const char *, u_int, u_int, u_int));
     76 
     77 /* Abort code */
     78 
     79 /* Define text descriptions of the different aborts */
     80 
     81 static const char *aborts[16] = {
     82 	"Write buffer fault",
     83 	"Alignment fault",
     84 	"Write buffer fault",
     85 	"Alignment fault",
     86 	"Bus error (LF section)",
     87 	"Translation fault (section)",
     88 	"Bus error (page)",
     89 	"Translation fault (page)",
     90 	"Bus error (section)",
     91 	"Domain error (section)",
     92 	"Bus error (page)",
     93 	"Domain error (page)",
     94 	"Bus error trans (L1)",
     95 	"Permission error (section)",
     96 	"Bus error trans (L2)",
     97 	"Permission error (page)"
     98 };
     99 
    100 static void
    101 report_abort(prefix, fault_status, fault_address, fault_pc)
    102 	const char *prefix;
    103 	u_int fault_status;
    104 	u_int fault_address;
    105 	u_int fault_pc;
    106 {
    107 #ifndef DEBUG
    108 	if (prefix == NULL) {
    109 #endif
    110 		if (prefix)
    111 			printf("%s ", prefix);
    112 		printf("Data abort: '%s' status=%03x address=%08x PC=%08x\n",
    113 		    aborts[fault_status & FAULT_TYPE_MASK],
    114 		    fault_status & 0xfff, fault_address, fault_pc);
    115 #ifndef DEBUG
    116 	}
    117 #endif
    118 }
    119 
    120 static __volatile int data_abort_expected;
    121 static __volatile int data_abort_received;
    122 
    123 int
    124 badaddr_read(void *addr, size_t size, void *rptr)
    125 {
    126 	u_long rcpt;
    127 	int rv;
    128 
    129 	/* Tell the Data Abort handler that we're expecting one. */
    130 	data_abort_received = 0;
    131 	data_abort_expected = 1;
    132 
    133 	cpu_drain_writebuf();
    134 
    135 	/* Read from the test address. */
    136 	switch (size) {
    137 	case sizeof(uint8_t):
    138 		__asm __volatile("ldrb %0, [%1]"
    139 			: "=r" (rcpt)
    140 			: "r" (addr));
    141 		break;
    142 
    143 	case sizeof(uint16_t):
    144 		__asm __volatile("ldrh %0, [%1]"
    145 			: "=r" (rcpt)
    146 			: "r" (addr));
    147 		break;
    148 
    149 	case sizeof(uint32_t):
    150 		__asm __volatile("ldr %0, [%1]"
    151 			: "=r" (rcpt)
    152 			: "r" (addr));
    153 		break;
    154 
    155 	default:
    156 		data_abort_expected = 0;
    157 		panic("badaddr: invalid size (%lu)", (u_long) size);
    158 	}
    159 
    160 	/* Disallow further Data Aborts. */
    161 	data_abort_expected = 0;
    162 
    163 	rv = data_abort_received;
    164 	data_abort_received = 0;
    165 
    166 	/* Copy the data back if no fault occurred. */
    167 	if (rptr != NULL && rv == 0) {
    168 		switch (size) {
    169 		case sizeof(uint8_t):
    170 			*(uint8_t *) rptr = rcpt;
    171 			break;
    172 
    173 		case sizeof(uint16_t):
    174 			*(uint16_t *) rptr = rcpt;
    175 			break;
    176 
    177 		case sizeof(uint32_t):
    178 			*(uint32_t *) rptr = rcpt;
    179 			break;
    180 		}
    181 	}
    182 
    183 	/* Return true if the address was invalid. */
    184 	return (rv);
    185 }
    186 
    187 /*
    188  * void data_abort_handler(trapframe_t *frame)
    189  *
    190  * Abort handler called when read/write occurs at an address of
    191  * a non existent or restricted (access permissions) memory page.
    192  * We first need to identify the type of page fault.
    193  */
    194 
    195 #define TRAP_CODE ((fault_status & 0x0f) | (fault_address & 0xfffffff0))
    196 
    197 void
    198 data_abort_handler(frame)
    199 	trapframe_t *frame;
    200 {
    201 	struct proc *p;
    202 	struct pcb *pcb;
    203 	u_int fault_address;
    204 	u_int fault_status;
    205 	u_int fault_pc;
    206 	u_int fault_instruction;
    207 	int fault_code;
    208 	int user;
    209 	int error;
    210 	void *onfault;
    211 
    212 	/*
    213 	 * If we were expecting a Data Abort, signal that we got
    214 	 * one, adjust the PC to skip the faulting insn, and
    215 	 * return.
    216 	 */
    217 	if (data_abort_expected) {
    218 		data_abort_received = 1;
    219 		frame->tf_pc += INSN_SIZE;
    220 		return;
    221 	}
    222 
    223 	/*
    224 	 * Must get fault address and status from the CPU before
    225 	 * re-enabling interrupts.  (Interrupt handlers may take
    226 	 * R/M emulation faults.)
    227 	 */
    228 	fault_address = cpu_faultaddress();
    229 	fault_status = cpu_faultstatus();
    230 	fault_pc = frame->tf_pc;
    231 
    232 	/*
    233 	 * Enable IRQ's (disabled by CPU on abort) if trapframe
    234 	 * shows they were enabled.
    235 	 */
    236 	if (!(frame->tf_spsr & I32_bit))
    237 		enable_interrupts(I32_bit);
    238 
    239 #ifdef DEBUG
    240 	if ((GetCPSR() & PSR_MODE) != PSR_SVC32_MODE)
    241 		panic("data_abort_handler: not in SVC32 mode");
    242 #endif
    243 
    244 	/* Update vmmeter statistics */
    245 	uvmexp.traps++;
    246 
    247 	/* Extract the fault code from the fault status */
    248 	fault_code = fault_status & FAULT_TYPE_MASK;
    249 
    250 	/* Get the current proc structure or proc0 if there is none */
    251 	if ((p = curproc) == NULL)
    252 		p = &proc0;
    253 
    254 	/*
    255 	 * can't use curpcb, as it might be NULL; and we have p in
    256 	 * a register anyway
    257 	 */
    258 	pcb = &p->p_addr->u_pcb;
    259 
    260 	/* fusubailout is used by [fs]uswintr to avoid page faulting */
    261 	if (pcb->pcb_onfault
    262 	    && ((fault_code != FAULT_TRANS_S && fault_code != FAULT_TRANS_P &&
    263 		 fault_code != FAULT_PERM_S && fault_code != FAULT_PERM_P)
    264 	        || pcb->pcb_onfault == fusubailout)) {
    265 
    266 		frame->tf_r0 = EFAULT;
    267 copyfault:
    268 #ifdef DEBUG
    269 		printf("Using pcb_onfault=%p addr=%08x st=%08x p=%p\n",
    270 		    pcb->pcb_onfault, fault_address, fault_status, p);
    271 #endif
    272 		frame->tf_pc = (u_int)pcb->pcb_onfault;
    273 		if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE)
    274 			panic("Yikes pcb_onfault=%p during USR mode fault",
    275 			    pcb->pcb_onfault);
    276 		return;
    277 	}
    278 
    279 	/* More debug stuff */
    280 
    281 	fault_instruction = ReadWord(fault_pc);
    282 
    283 #ifdef PMAP_DEBUG
    284 	if (pmap_debug_level >= 0) {
    285 		report_abort(NULL, fault_status, fault_address, fault_pc);
    286 		printf("Instruction @V%08x = %08x\n",
    287 		    fault_pc, fault_instruction);
    288 	}
    289 #endif
    290 
    291 	/* Call the cpu specific abort fixup routine */
    292 	error = cpu_dataabt_fixup(frame);
    293 	if (error == ABORT_FIXUP_RETURN)
    294 		return;
    295 	if (error == ABORT_FIXUP_FAILED) {
    296 		printf("pc = 0x%08x, opcode 0x%08x, insn = ", fault_pc, *((u_int *)fault_pc));
    297 		disassemble(fault_pc);
    298 		printf("data abort handler: fixup failed for this instruction\n");
    299 	}
    300 
    301 #ifdef PMAP_DEBUG
    302 	if (pmap_debug_level >= 0)
    303 		printf("fault in process %p\n", p);
    304 #endif
    305 
    306 #ifdef DEBUG
    307 	/* Is this needed ? */
    308 	if (pcb != curpcb) {
    309 		printf("data_abort: Alert ! pcb(%p) != curpcb(%p)\n",
    310 		    pcb, curpcb);
    311 		printf("data_abort: Alert ! proc(%p), curproc(%p)\n",
    312 		    p, curproc);
    313 	}
    314 #endif	/* DEBUG */
    315 
    316 	/* Were we in user mode when the abort occurred ? */
    317 	if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE) {
    318 		/*
    319 		 * Note that the fault was from USR mode.
    320 		 */
    321 		user = 1;
    322 		p->p_addr->u_pcb.pcb_tf = frame;
    323 		KERNEL_PROC_LOCK(p);
    324 	} else {
    325 		user = 0;
    326 		KERNEL_LOCK(LK_CANRECURSE|LK_EXCLUSIVE);
    327 	}
    328 
    329 	/* check if this was a failed fixup */
    330 	if (error == ABORT_FIXUP_FAILED) {
    331 		if (user) {
    332 			trapsignal(p, SIGSEGV, TRAP_CODE);
    333 			KERNEL_PROC_UNLOCK(p);
    334 			userret(p);
    335 			return;
    336 		};
    337 		panic("Data abort fixup failed in kernel - we're dead");
    338 	};
    339 
    340 	/* Now act on the fault type */
    341 	switch (fault_code) {
    342 	case FAULT_WRTBUF_0:              /* Write Buffer Fault */
    343 	case FAULT_WRTBUF_1:              /* Write Buffer Fault */
    344 		/* If this happens forget it no point in continuing */
    345 
    346 		/* FALLTHROUGH */
    347 
    348 	case FAULT_ALIGN_0:              /* Alignment Fault */
    349 	case FAULT_ALIGN_1:              /* Alignment Fault */
    350 		/*
    351 		 * Really this should just kill the process.
    352 		 * Alignment faults are turned off in the kernel
    353 		 * in order to get better performance from shorts with
    354 		 * GCC so an alignment fault means somebody has played
    355 		 * with the control register in the CPU. Might as well
    356 		 * panic as the kernel was not compiled for aligned accesses.
    357 		 */
    358 
    359 		/* FALLTHROUGH */
    360 
    361 	case FAULT_BUSERR_0:              /* Bus Error LF Section */
    362 	case FAULT_BUSERR_1:              /* Bus Error Page */
    363 	case FAULT_BUSERR_2:              /* Bus Error Section */
    364 	case FAULT_BUSERR_3:              /* Bus Error Page */
    365 		/* What will accutally cause a bus error ? */
    366 		/* Real bus errors are not a process problem but hardware */
    367 
    368 		/* FALLTHROUGH */
    369 
    370 	case FAULT_DOMAIN_S:              /* Section Domain Error Fault */
    371 	case FAULT_DOMAIN_P:              /* Page Domain Error Fault*/
    372 		/*
    373 		 * Right well we dont use domains, everything is
    374 		 * always a client and thus subject to access permissions.
    375 		 * If we get a domain error then we have corrupts PTE's
    376 		 * so we might as well die !
    377 		 * I suppose eventually this should just kill the process
    378 		 * who owns the PTE's but if this happens it implies a
    379 		 * kernel problem.
    380 		 */
    381 
    382 		/* FALLTHROUGH */
    383 
    384 	case FAULT_BUSTRNL1:              /* Bus Error Trans L1 Fault */
    385 	case FAULT_BUSTRNL2:              /* Bus Error Trans L2 Fault */
    386 		/*
    387 		 * These faults imply that the PTE is corrupt.
    388 		 * Likely to be a kernel fault so we had better stop.
    389 		 */
    390 
    391 		/* FALLTHROUGH */
    392 
    393 	default :
    394 		/* Are there any combinations I have missed ? */
    395 		report_abort(NULL, fault_status, fault_address, fault_pc);
    396 
    397 	we_re_toast:
    398 		/*
    399 		 * Were are dead, try and provide some debug
    400 		 * information before dying.
    401 		 */
    402 #ifdef DDB
    403 		printf("Unhandled trap (frame = %p)\n", frame);
    404 		report_abort(NULL, fault_status, fault_address, fault_pc);
    405 		kdb_trap(-1, frame);
    406 		return;
    407 #else
    408 		panic("Unhandled trap (frame = %p)", frame);
    409 #endif	/* DDB */
    410 
    411 	case FAULT_TRANS_P:              /* Page Translation Fault */
    412 	case FAULT_PERM_P:		 /* Page Permission Fault */
    413 	case FAULT_TRANS_S:              /* Section Translation Fault */
    414 	case FAULT_PERM_S:		 /* Section Permission Fault */
    415 	/*
    416 	 * Page/section translation/permission fault -- need to fault in
    417 	 * the page and possibly the page table page.
    418 	 */
    419 	    {
    420 		register vaddr_t va;
    421 		register struct vmspace *vm = p->p_vmspace;
    422 		register struct vm_map *map;
    423 		int rv;
    424 		vm_prot_t ftype;
    425 		extern struct vm_map *kernel_map;
    426 
    427 		va = trunc_page((vaddr_t)fault_address);
    428 
    429 #ifdef PMAP_DEBUG
    430 		if (pmap_debug_level >= 0)
    431 			printf("page fault: addr=V%08lx ", va);
    432 #endif
    433 
    434 		/*
    435 		 * It is only a kernel address space fault iff:
    436 		 *	1. user == 0  and
    437 		 *	2. pcb_onfault not set or
    438 		 *	3. pcb_onfault set but supervisor space fault
    439 		 * The last can occur during an exec() copyin where the
    440 		 * argument space is lazy-allocated.
    441 		 */
    442 		if (!user &&
    443 		    (va >= VM_MIN_KERNEL_ADDRESS || va < VM_MIN_ADDRESS)) {
    444 			/* Was the fault due to the FPE/IPKDB ? */
    445 			if ((frame->tf_spsr & PSR_MODE) == PSR_UND32_MODE) {
    446 				report_abort("UND32", fault_status,
    447 				    fault_address, fault_pc);
    448 				trapsignal(p, SIGSEGV, TRAP_CODE);
    449 
    450 				KERNEL_PROC_UNLOCK(p);
    451 				/*
    452 				 * Force exit via userret()
    453 				 * This is necessary as the FPE is an extension
    454 				 * to userland that actually runs in a
    455 				 * priveledged mode but uses USR mode
    456 				 * permissions for its accesses.
    457 				 */
    458 				userret(p);
    459 				return;
    460 			}
    461 			map = kernel_map;
    462 		} else
    463 			map = &vm->vm_map;
    464 
    465 #ifdef PMAP_DEBUG
    466 		if (pmap_debug_level >= 0)
    467 			printf("vmmap=%p ", map);
    468 #endif
    469 
    470 		if (map == NULL)
    471 			panic("No map for fault address va = 0x%08lx", va);
    472 
    473 		/*
    474 		 * We need to know whether the page should be mapped
    475 		 * as R or R/W. The MMU does not give us the info as
    476 		 * to whether the fault was caused by a read or a write.
    477 		 * This means we need to disassemble the instruction
    478 		 * responsible and determine if it was a read or write
    479 		 * instruction.
    480 		 */
    481 		/* STR instruction ? */
    482 		if ((fault_instruction & 0x0c100000) == 0x04000000)
    483 			ftype = VM_PROT_WRITE;
    484 		/* STM or CDT instruction ? */
    485 		else if ((fault_instruction & 0x0a100000) == 0x08000000)
    486 			ftype = VM_PROT_WRITE;
    487 		/* STRH, STRSH or STRSB instruction ? */
    488 		else if ((fault_instruction & 0x0e100090) == 0x00000090)
    489 			ftype = VM_PROT_WRITE;
    490 		/* SWP instruction ? */
    491 		else if ((fault_instruction & 0x0fb00ff0) == 0x01000090)
    492 			ftype = VM_PROT_READ | VM_PROT_WRITE;
    493 		else
    494 			ftype = VM_PROT_READ;
    495 
    496 #ifdef PMAP_DEBUG
    497 		if (pmap_debug_level >= 0)
    498 			printf("fault protection = %d\n", ftype);
    499 #endif
    500 
    501 		if ((ftype & VM_PROT_WRITE) ?
    502 		    pmap_modified_emulation(map->pmap, va) :
    503 		    pmap_handled_emulation(map->pmap, va))
    504 			goto out;
    505 
    506 		if (current_intr_depth > 0) {
    507 #ifdef DDB
    508 			printf("Non-emulated page fault with intr_depth > 0\n");
    509 			report_abort(NULL, fault_status, fault_address, fault_pc);
    510 			kdb_trap(-1, frame);
    511 			return;
    512 #else
    513 			panic("Fault with intr_depth > 0");
    514 #endif	/* DDB */
    515 		}
    516 
    517 		onfault = pcb->pcb_onfault;
    518 		pcb->pcb_onfault = NULL;
    519 		rv = uvm_fault(map, va, 0, ftype);
    520 		pcb->pcb_onfault = onfault;
    521 		if (rv == 0) {
    522 			if (user != 0) /* Record any stack growth... */
    523 				uvm_grow(p, trunc_page(va));
    524 			goto out;
    525 		}
    526 		if (user == 0) {
    527 			if (pcb->pcb_onfault) {
    528 				frame->tf_r0 = rv;
    529 				goto copyfault;
    530 			}
    531 			printf("[u]vm_fault(%p, %lx, %x, 0) -> %x\n",
    532 			    map, va, ftype, rv);
    533 			goto we_re_toast;
    534 		}
    535 
    536 		report_abort("", fault_status, fault_address, fault_pc);
    537 		if (rv == ENOMEM) {
    538 			printf("UVM: pid %d (%s), uid %d killed: "
    539 			       "out of swap\n", p->p_pid, p->p_comm,
    540 			       p->p_cred && p->p_ucred ?
    541 			       p->p_ucred->cr_uid : -1);
    542 			trapsignal(p, SIGKILL, TRAP_CODE);
    543 		} else
    544 			trapsignal(p, SIGSEGV, TRAP_CODE);
    545 		break;
    546 	    }
    547 	}
    548 
    549  out:
    550 	/* Call userret() if it was a USR mode fault */
    551 	if (user) {
    552 		KERNEL_PROC_UNLOCK(p);
    553 		userret(p);
    554 	} else
    555 		KERNEL_UNLOCK();
    556 }
    557 
    558 
    559 /*
    560  * void prefetch_abort_handler(trapframe_t *frame)
    561  *
    562  * Abort handler called when instruction execution occurs at
    563  * a non existent or restricted (access permissions) memory page.
    564  * If the address is invalid and we were in SVC mode then panic as
    565  * the kernel should never prefetch abort.
    566  * If the address is invalid and the page is mapped then the user process
    567  * does no have read permission so send it a signal.
    568  * Otherwise fault the page in and try again.
    569  */
    570 
    571 extern int kernel_debug;
    572 
    573 void
    574 prefetch_abort_handler(frame)
    575 	trapframe_t *frame;
    576 {
    577 	struct proc *p;
    578 	struct vm_map *map;
    579 	vaddr_t fault_pc, va;
    580 	int error;
    581 
    582 	/*
    583 	 * Enable IRQ's (disabled by the abort) This always comes
    584 	 * from user mode so we know interrupts were not disabled.
    585 	 * But we check anyway.
    586 	 */
    587 	if (!(frame->tf_spsr & I32_bit))
    588 		enable_interrupts(I32_bit);
    589 
    590 #ifdef DEBUG
    591 	if ((GetCPSR() & PSR_MODE) != PSR_SVC32_MODE)
    592 		panic("prefetch_abort_handler: not in SVC32 mode");
    593 #endif
    594 
    595 	/* Update vmmeter statistics */
    596 	uvmexp.traps++;
    597 
    598 	/* Call the cpu specific abort fixup routine */
    599 	error = cpu_prefetchabt_fixup(frame);
    600 	if (error == ABORT_FIXUP_RETURN)
    601 		return;
    602 	if (error == ABORT_FIXUP_FAILED)
    603 		panic("prefetch abort fixup failed");
    604 
    605 	/* Get the current proc structure or proc0 if there is none */
    606 	if ((p = curproc) == 0) {
    607 		p = &proc0;
    608 #ifdef DEBUG
    609 		printf("Prefetch abort with curproc == 0\n");
    610 #endif
    611 	}
    612 
    613 #ifdef PMAP_DEBUG
    614 	if (pmap_debug_level >= 0)
    615 		printf("prefetch fault in process %p %s\n", p, p->p_comm);
    616 #endif
    617 
    618 	/* Get fault address */
    619 	fault_pc = frame->tf_pc;
    620 	va = trunc_page(fault_pc);
    621 
    622 	/* Was the prefectch abort from USR32 mode ? */
    623 	if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE) {
    624 		p->p_addr->u_pcb.pcb_tf = frame;
    625 	} else {
    626 		/*
    627 		 * All the kernel code pages are loaded at boot time
    628 		 * and do not get paged
    629 		 */
    630 	        panic("Prefetch abort in non-USR mode (frame=%p PC=0x%08lx)",
    631 	            frame, fault_pc);
    632 	}
    633 
    634 	map = &p->p_vmspace->vm_map;
    635 
    636 #ifdef PMAP_DEBUG
    637 	if (pmap_debug_level >= 0)
    638 		printf("prefetch_abort: PC = %08lx\n", fault_pc);
    639 #endif
    640 	/* Ok validate the address, can only execute in USER space */
    641 	if (fault_pc < VM_MIN_ADDRESS || fault_pc >= VM_MAXUSER_ADDRESS) {
    642 #ifdef DEBUG
    643 		printf("prefetch: pc (%08lx) not in user process space\n",
    644 		    fault_pc);
    645 #endif
    646 		trapsignal(p, SIGSEGV, fault_pc);
    647 		userret(p);
    648 		return;
    649 	}
    650 
    651 #ifdef CPU_SA110
    652 	/*
    653 	 * There are bugs in the rev K SA110.  This is a check for one
    654 	 * of them.
    655 	 */
    656 	if (curcpu()->ci_arm_cputype == CPU_ID_SA110 &&
    657 	    curcpu()->ci_arm_cpurev < 3) {
    658 		/* Always current pmap */
    659 		pt_entry_t *pte = vtopte((vaddr_t) fault_pc);
    660 		struct pmap *pmap = p->p_vmspace->vm_map.pmap;
    661 
    662 		if (pmap_pde_v(pmap_pde(pmap, (vaddr_t) fault_pc)) &&
    663 		    pmap_pte_v(pte)) {
    664 			if (kernel_debug & 1) {
    665 				printf("prefetch_abort: page is already "
    666 				    "mapped - pte=%p *pte=%08x\n", pte, *pte);
    667 				printf("prefetch_abort: pc=%08lx proc=%p "
    668 				    "process=%s\n", fault_pc, p, p->p_comm);
    669 				printf("prefetch_abort: far=%08x fs=%x\n",
    670 				    cpu_faultaddress(), cpu_faultstatus());
    671 				printf("prefetch_abort: trapframe=%08x\n",
    672 				    (u_int)frame);
    673 			}
    674 #ifdef DDB
    675 			if (kernel_debug & 2)
    676 				Debugger();
    677 #endif
    678 		}
    679 	}
    680 #endif /* CPU_SA110 */
    681 
    682 	if (pmap_handled_emulation(map->pmap, va))
    683 		goto out;
    684 
    685 	if (current_intr_depth > 0) {
    686 #ifdef DDB
    687 		printf("Non-emulated prefetch abort with intr_depth > 0\n");
    688 		kdb_trap(-1, frame);
    689 		return;
    690 #else
    691 		panic("Prefetch Abort with intr_depth > 0");
    692 #endif
    693 	}
    694 
    695 	error = uvm_fault(map, va, 0, VM_PROT_READ);
    696 	if (error == 0)
    697 		goto out;
    698 
    699 	if (error == ENOMEM) {
    700 		printf("UVM: pid %d (%s), uid %d killed: "
    701 		    "out of swap\n", p->p_pid, p->p_comm,
    702 		    p->p_cred && p->p_ucred ?
    703 		    p->p_ucred->cr_uid : -1);
    704 		trapsignal(p, SIGKILL, fault_pc);
    705 	} else
    706 		trapsignal(p, SIGSEGV, fault_pc);
    707  out:
    708 	userret(p);
    709 }
    710