fault.c revision 1.6 1 /* $NetBSD: fault.c,v 1.6 2001/11/23 17:23:41 thorpej Exp $ */
2
3 /*
4 * Copyright (c) 1994-1997 Mark Brinicombe.
5 * Copyright (c) 1994 Brini.
6 * All rights reserved.
7 *
8 * This code is derived from software written for Brini by Mark Brinicombe
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by Brini.
21 * 4. The name of the company nor the name of the author may be used to
22 * endorse or promote products derived from this software without specific
23 * prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
28 * IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
29 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
30 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
31 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * SUCH DAMAGE.
36 *
37 * RiscBSD kernel project
38 *
39 * fault.c
40 *
41 * Fault handlers
42 *
43 * Created : 28/11/94
44 */
45
46 #include "opt_ddb.h"
47 #include "opt_pmap_debug.h"
48
49 #include <sys/types.h>
50 #include <sys/param.h>
51 #include <sys/systm.h>
52 #include <sys/proc.h>
53 #include <sys/user.h>
54 #include <sys/kernel.h>
55
56 #include <uvm/uvm_extern.h>
57
58 #include <machine/frame.h>
59 #include <arm/arm32/katelib.h>
60 #include <machine/cpu.h>
61 #include <machine/intr.h>
62 #ifdef DDB
63 #include <machine/db_machdep.h>
64 #endif
65
66 #include <arch/arm/arm/disassem.h>
67
68 int cowfault __P((vaddr_t));
69 int fetchuserword __P((u_int address, u_int *location));
70 extern char fusubailout[];
71
72 /* Abort code */
73
74 /* Define text descriptions of the different aborts */
75
76 static const char *aborts[16] = {
77 "Write buffer fault",
78 "Alignment fault",
79 "Write buffer fault",
80 "Alignment fault",
81 "Bus error (LF section)",
82 "Translation fault (section)",
83 "Bus error (page)",
84 "Translation fault (page)",
85 "Bus error (section)",
86 "Domain error (section)",
87 "Bus error (page)",
88 "Domain error (page)",
89 "Bus error trans (L1)",
90 "Permission error (section)",
91 "Bus error trans (L2)",
92 "Permission error (page)"
93 };
94
95 void
96 report_abort(prefix, fault_status, fault_address, fault_pc)
97 const char *prefix;
98 u_int fault_status;
99 u_int fault_address;
100 u_int fault_pc;
101 {
102 #ifndef DEBUG
103 if (prefix == NULL) {
104 #endif
105 if (prefix)
106 printf("%s ", prefix);
107 printf("Data abort: '%s' status=%03x address=%08x PC=%08x\n",
108 aborts[fault_status & FAULT_TYPE_MASK],
109 fault_status & 0xfff, fault_address, fault_pc);
110 #ifndef DEBUG
111 }
112 #endif
113 }
114
115 static __volatile int data_abort_expected;
116 static __volatile int data_abort_received;
117
118 int
119 badaddr_read(void *addr, size_t size, void *rptr)
120 {
121 u_long rcpt;
122 int rv;
123
124 /* Tell the Data Abort handler that we're expecting one. */
125 data_abort_received = 0;
126 data_abort_expected = 1;
127
128 cpu_drain_writebuf();
129
130 /* Read from the test address. */
131 switch (size) {
132 case sizeof(uint8_t):
133 __asm __volatile("ldrb %0, [%1]"
134 : "=r" (rcpt)
135 : "r" (addr));
136 break;
137
138 case sizeof(uint16_t):
139 __asm __volatile("ldrh %0, [%1]"
140 : "=r" (rcpt)
141 : "r" (addr));
142 break;
143
144 case sizeof(uint32_t):
145 __asm __volatile("ldr %0, [%1]"
146 : "=r" (rcpt)
147 : "r" (addr));
148 break;
149
150 default:
151 data_abort_expected = 0;
152 panic("badaddr: invalid size (%lu)\n", (u_long) size);
153 }
154
155 /* Disallow further Data Aborts. */
156 data_abort_expected = 0;
157
158 rv = data_abort_received;
159 data_abort_received = 0;
160
161 /* Copy the data back if no fault occurred. */
162 if (rptr != NULL && rv == 0) {
163 switch (size) {
164 case sizeof(uint8_t):
165 *(uint8_t *) rptr = rcpt;
166 break;
167
168 case sizeof(uint16_t):
169 *(uint16_t *) rptr = rcpt;
170 break;
171
172 case sizeof(uint32_t):
173 *(uint32_t *) rptr = rcpt;
174 break;
175 }
176 }
177
178 /* Return true if the address was invalid. */
179 return (rv);
180 }
181
182 /*
183 * void data_abort_handler(trapframe_t *frame)
184 *
185 * Abort handler called when read/write occurs at an address of
186 * a non existent or restricted (access permissions) memory page.
187 * We first need to identify the type of page fault.
188 */
189
190 #define TRAP_CODE ((fault_status & 0x0f) | (fault_address & 0xfffffff0))
191
192 void
193 data_abort_handler(frame)
194 trapframe_t *frame;
195 {
196 struct proc *p;
197 struct pcb *pcb;
198 u_int fault_address;
199 u_int fault_status;
200 u_int fault_pc;
201 u_int fault_instruction;
202 int fault_code;
203 int user;
204 int error;
205 void *onfault;
206
207 /*
208 * If we were expecting a Data Abort, signal that we got
209 * one, adjust the PC to skip the faulting insn, and
210 * return.
211 */
212 if (data_abort_expected) {
213 data_abort_received = 1;
214 frame->tf_pc += INSN_SIZE;
215 return;
216 }
217
218 /*
219 * Must get fault address and status from the CPU before
220 * re-enabling interrupts. (Interrupt handlers may take
221 * R/M emulation faults.)
222 */
223 fault_address = cpu_faultaddress();
224 fault_status = cpu_faultstatus();
225 fault_pc = frame->tf_pc;
226
227 /*
228 * Enable IRQ's (disabled by CPU on abort) if trapframe
229 * shows they were enabled.
230 */
231 if (!(frame->tf_spsr & I32_bit))
232 enable_interrupts(I32_bit);
233
234 #ifdef DEBUG
235 if ((GetCPSR() & PSR_MODE) != PSR_SVC32_MODE)
236 panic("data_abort_handler: not in SVC32 mode");
237 #endif
238
239 /* Update vmmeter statistics */
240 uvmexp.traps++;
241
242 /* Extract the fault code from the fault status */
243 fault_code = fault_status & FAULT_TYPE_MASK;
244
245 /* Get the current proc structure or proc0 if there is none */
246 if ((p = curproc) == NULL)
247 p = &proc0;
248
249 /*
250 * can't use curpcb, as it might be NULL; and we have p in
251 * a register anyway
252 */
253 pcb = &p->p_addr->u_pcb;
254
255 /* fusubailout is used by [fs]uswintr to avoid page faulting */
256 if (pcb->pcb_onfault
257 && ((fault_code != FAULT_TRANS_S && fault_code != FAULT_TRANS_P &&
258 fault_code != FAULT_PERM_S && fault_code != FAULT_PERM_P)
259 || pcb->pcb_onfault == fusubailout)) {
260
261 copyfault:
262 #ifdef DEBUG
263 printf("Using pcb_onfault=%p addr=%08x st=%08x p=%p\n",
264 pcb->pcb_onfault, fault_address, fault_status, p);
265 #endif
266 frame->tf_pc = (u_int)pcb->pcb_onfault;
267 if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE)
268 panic("Yikes pcb_onfault=%p during USR mode fault\n",
269 pcb->pcb_onfault);
270 return;
271 }
272
273 /* More debug stuff */
274
275 fault_instruction = ReadWord(fault_pc);
276
277 #ifdef PMAP_DEBUG
278 if (pmap_debug_level >= 0) {
279 report_abort(NULL, fault_status, fault_address, fault_pc);
280 printf("Instruction @V%08x = %08x\n",
281 fault_pc, fault_instruction);
282 }
283 #endif
284
285 /* Call the cpu specific abort fixup routine */
286 error = cpu_dataabt_fixup(frame);
287 if (error == ABORT_FIXUP_RETURN)
288 return;
289 if (error == ABORT_FIXUP_FAILED) {
290 printf("pc = 0x%08x, insn = ", fault_pc);
291 disassemble(fault_pc);
292 panic("data abort fixup failed\n");
293 }
294
295 #ifdef PMAP_DEBUG
296 if (pmap_debug_level >= 0)
297 printf("fault in process %p\n", p);
298 #endif
299
300 #ifdef DEBUG
301 /* Is this needed ? */
302 if (pcb != curpcb) {
303 printf("data_abort: Alert ! pcb(%p) != curpcb(%p)\n",
304 pcb, curpcb);
305 printf("data_abort: Alert ! proc(%p), curproc(%p)\n",
306 p, curproc);
307 }
308 #endif /* DEBUG */
309
310 /* Were we in user mode when the abort occurred ? */
311 if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE) {
312 /*
313 * Note that the fault was from USR mode.
314 */
315 user = 1;
316 p->p_addr->u_pcb.pcb_tf = frame;
317 } else
318 user = 0;
319
320 /* Now act on the fault type */
321 switch (fault_code) {
322 case FAULT_WRTBUF_0: /* Write Buffer Fault */
323 case FAULT_WRTBUF_1: /* Write Buffer Fault */
324 /* If this happens forget it no point in continuing */
325
326 /* FALLTHROUGH */
327
328 case FAULT_ALIGN_0: /* Alignment Fault */
329 case FAULT_ALIGN_1: /* Alignment Fault */
330 /*
331 * Really this should just kill the process.
332 * Alignment faults are turned off in the kernel
333 * in order to get better performance from shorts with
334 * GCC so an alignment fault means somebody has played
335 * with the control register in the CPU. Might as well
336 * panic as the kernel was not compiled for aligned accesses.
337 */
338
339 /* FALLTHROUGH */
340
341 case FAULT_BUSERR_0: /* Bus Error LF Section */
342 case FAULT_BUSERR_1: /* Bus Error Page */
343 case FAULT_BUSERR_2: /* Bus Error Section */
344 case FAULT_BUSERR_3: /* Bus Error Page */
345 /* What will accutally cause a bus error ? */
346 /* Real bus errors are not a process problem but hardware */
347
348 /* FALLTHROUGH */
349
350 case FAULT_DOMAIN_S: /* Section Domain Error Fault */
351 case FAULT_DOMAIN_P: /* Page Domain Error Fault*/
352 /*
353 * Right well we dont use domains, everything is
354 * always a client and thus subject to access permissions.
355 * If we get a domain error then we have corrupts PTE's
356 * so we might as well die !
357 * I suppose eventually this should just kill the process
358 * who owns the PTE's but if this happens it implies a
359 * kernel problem.
360 */
361
362 /* FALLTHROUGH */
363
364 case FAULT_BUSTRNL1: /* Bus Error Trans L1 Fault */
365 case FAULT_BUSTRNL2: /* Bus Error Trans L2 Fault */
366 /*
367 * These faults imply that the PTE is corrupt.
368 * Likely to be a kernel fault so we had better stop.
369 */
370
371 /* FALLTHROUGH */
372
373 default :
374 /* Are there any combinations I have missed ? */
375 report_abort(NULL, fault_status, fault_address, fault_pc);
376
377 we_re_toast:
378 /*
379 * Were are dead, try and provide some debug
380 * information before dying.
381 */
382 #ifdef DDB
383 printf("Unhandled trap (frame = %p)\n", frame);
384 report_abort(NULL, fault_status, fault_address, fault_pc);
385 kdb_trap(-1, frame);
386 return;
387 #else
388 panic("Unhandled trap (frame = %p)", frame);
389 #endif /* DDB */
390
391 case FAULT_TRANS_P: /* Page Translation Fault */
392 case FAULT_PERM_P: /* Page Permission Fault */
393 case FAULT_TRANS_S: /* Section Translation Fault */
394 case FAULT_PERM_S: /* Section Permission Fault */
395 /*
396 * Page/section translation/permission fault -- need to fault in
397 * the page and possibly the page table page.
398 */
399 {
400 register vaddr_t va;
401 register struct vmspace *vm = p->p_vmspace;
402 register struct vm_map *map;
403 int rv;
404 vm_prot_t ftype;
405 extern struct vm_map *kernel_map;
406
407 va = trunc_page((vaddr_t)fault_address);
408
409 #ifdef PMAP_DEBUG
410 if (pmap_debug_level >= 0)
411 printf("page fault: addr=V%08lx ", va);
412 #endif
413
414 /*
415 * It is only a kernel address space fault iff:
416 * 1. user == 0 and
417 * 2. pcb_onfault not set or
418 * 3. pcb_onfault set but supervisor space fault
419 * The last can occur during an exec() copyin where the
420 * argument space is lazy-allocated.
421 */
422 if (!user &&
423 (va >= VM_MIN_KERNEL_ADDRESS || va < VM_MIN_ADDRESS)) {
424 /* Was the fault due to the FPE/IPKDB ? */
425 if ((frame->tf_spsr & PSR_MODE) == PSR_UND32_MODE) {
426 report_abort("UND32", fault_status,
427 fault_address, fault_pc);
428 trapsignal(p, SIGSEGV, TRAP_CODE);
429
430 /*
431 * Force exit via userret()
432 * This is necessary as the FPE is an extension
433 * to userland that actually runs in a
434 * priveledged mode but uses USR mode
435 * permissions for its accesses.
436 */
437 userret(p);
438 return;
439 }
440 map = kernel_map;
441 } else
442 map = &vm->vm_map;
443
444 #ifdef PMAP_DEBUG
445 if (pmap_debug_level >= 0)
446 printf("vmmap=%p ", map);
447 #endif
448
449 if (map == NULL)
450 panic("No map for fault address\n");
451
452 /*
453 * We need to know whether the page should be mapped
454 * as R or R/W. The MMU does not give us the info as
455 * to whether the fault was caused by a read or a write.
456 * This means we need to disassemble the instruction
457 * responsible and determine if it was a read or write
458 * instruction.
459 */
460 /* STR instruction ? */
461 if ((fault_instruction & 0x0c100000) == 0x04000000)
462 ftype = VM_PROT_READ | VM_PROT_WRITE;
463 /* STM or CDT instruction ? */
464 else if ((fault_instruction & 0x0a100000) == 0x08000000)
465 ftype = VM_PROT_READ | VM_PROT_WRITE;
466 /* STRH, STRSH or STRSB instruction ? */
467 else if ((fault_instruction & 0x0e100090) == 0x00000090)
468 ftype = VM_PROT_READ | VM_PROT_WRITE;
469 /* SWP instruction ? */
470 else if ((fault_instruction & 0x0fb00ff0) == 0x01000090)
471 ftype = VM_PROT_READ | VM_PROT_WRITE;
472 else
473 ftype = VM_PROT_READ;
474
475 #ifdef PMAP_DEBUG
476 if (pmap_debug_level >= 0)
477 printf("fault protection = %d\n", ftype);
478 #endif
479
480 if ((ftype & VM_PROT_WRITE) ?
481 pmap_modified_emulation(map->pmap, va) :
482 pmap_handled_emulation(map->pmap, va))
483 goto out;
484
485 if (current_intr_depth > 0) {
486 #ifdef DDB
487 printf("Non-emulated page fault with intr_depth > 0\n");
488 report_abort(NULL, fault_status, fault_address, fault_pc);
489 kdb_trap(-1, frame);
490 return;
491 #else
492 panic("Fault with intr_depth > 0");
493 #endif /* DDB */
494 }
495
496 onfault = pcb->pcb_onfault;
497 pcb->pcb_onfault = NULL;
498 rv = uvm_fault(map, va, 0, ftype);
499 pcb->pcb_onfault = onfault;
500 if (rv == 0)
501 goto out;
502
503 if (user == 0) {
504 if (pcb->pcb_onfault)
505 goto copyfault;
506 printf("[u]vm_fault(%p, %lx, %x, 0) -> %x\n",
507 map, va, ftype, rv);
508 goto we_re_toast;
509 }
510
511 report_abort("", fault_status, fault_address, fault_pc);
512 if (rv == ENOMEM) {
513 printf("UVM: pid %d (%s), uid %d killed: "
514 "out of swap\n", p->p_pid, p->p_comm,
515 p->p_cred && p->p_ucred ?
516 p->p_ucred->cr_uid : -1);
517 trapsignal(p, SIGKILL, TRAP_CODE);
518 } else
519 trapsignal(p, SIGSEGV, TRAP_CODE);
520 break;
521 }
522 }
523
524 out:
525 /* Call userret() if it was a USR mode fault */
526 if (user)
527 userret(p);
528 }
529
530
531 /*
532 * void prefetch_abort_handler(trapframe_t *frame)
533 *
534 * Abort handler called when instruction execution occurs at
535 * a non existent or restricted (access permissions) memory page.
536 * If the address is invalid and we were in SVC mode then panic as
537 * the kernel should never prefetch abort.
538 * If the address is invalid and the page is mapped then the user process
539 * does no have read permission so send it a signal.
540 * Otherwise fault the page in and try again.
541 */
542
543 extern int kernel_debug;
544
545 void
546 prefetch_abort_handler(frame)
547 trapframe_t *frame;
548 {
549 register u_int fault_pc;
550 register struct proc *p;
551 register struct pcb *pcb;
552 u_int fault_instruction;
553 pt_entry_t *pte;
554 int error;
555
556 /*
557 * Enable IRQ's (disabled by the abort) This always comes
558 * from user mode so we know interrupts were not disabled.
559 * But we check anyway.
560 */
561 if (!(frame->tf_spsr & I32_bit))
562 enable_interrupts(I32_bit);
563
564 #ifdef DEBUG
565 if ((GetCPSR() & PSR_MODE) != PSR_SVC32_MODE)
566 panic("prefetch_abort_handler: not in SVC32 mode");
567 #endif
568
569 /* Update vmmeter statistics */
570 uvmexp.traps++;
571
572 /* Call the cpu specific abort fixup routine */
573 error = cpu_prefetchabt_fixup(frame);
574 if (error == ABORT_FIXUP_RETURN)
575 return;
576 if (error == ABORT_FIXUP_FAILED)
577 panic("prefetch abort fixup failed\n");
578
579 /* Get the current proc structure or proc0 if there is none */
580 if ((p = curproc) == 0) {
581 p = &proc0;
582 #ifdef DEBUG
583 printf("Prefetch abort with curproc == 0\n");
584 #endif
585 }
586
587 #ifdef PMAP_DEBUG
588 if (pmap_debug_level >= 0)
589 printf("prefetch fault in process %p %s\n", p, p->p_comm);
590 #endif
591 /*
592 * can't use curpcb, as it might be NULL; and we have p in a
593 * register anyway
594 */
595 pcb = &p->p_addr->u_pcb;
596 if (pcb == 0)
597 panic("prefetch_abort_handler: no pcb ... we're toast !\n");
598
599 #ifdef DEBUG
600 if (pcb != curpcb) {
601 printf("data_abort: Alert ! pcb(%p) != curpcb(%p)\n",
602 pcb, curpcb);
603 printf("data_abort: Alert ! proc(%p), curproc(%p)\n",
604 p, curproc);
605 }
606 #endif /* DEBUG */
607
608 /* Get fault address */
609 fault_pc = frame->tf_pc;
610
611 /* Was the prefectch abort from USR32 mode ? */
612 if ((frame->tf_spsr & PSR_MODE) == PSR_USR32_MODE) {
613 p->p_addr->u_pcb.pcb_tf = frame;
614 } else {
615 /*
616 * All the kernel code pages are loaded at boot time
617 * and do not get paged
618 */
619 panic("Prefetch abort in non-USR mode (frame=%p PC=0x%08x)\n",
620 frame, fault_pc);
621 }
622
623 #ifdef PMAP_DEBUG
624 if (pmap_debug_level >= 0)
625 printf("prefetch_abort: PC = %08x\n", fault_pc);
626 #endif
627 /* Ok validate the address, can only execute in USER space */
628 if (fault_pc < VM_MIN_ADDRESS || fault_pc >= VM_MAXUSER_ADDRESS) {
629 #ifdef DEBUG
630 printf("prefetch: pc (%08x) not in user process space\n",
631 fault_pc);
632 #endif
633 trapsignal(p, SIGSEGV, fault_pc);
634 userret(p);
635 return;
636 }
637
638 /* Is the page already mapped ? */
639 /* This is debugging for rev K SA110 silicon */
640 pte = pmap_pte(p->p_vmspace->vm_map.pmap, (vaddr_t)fault_pc);
641 if (pte && *pte != 0) {
642 if (kernel_debug & 1) {
643 printf("prefetch_abort: page is already mapped - pte=%p *pte=%08x\n",
644 pte, *pte);
645 printf("prefetch_abort: pc=%08x proc=%p process=%s\n", fault_pc, p, p->p_comm);
646 printf("prefetch_abort: far=%08x fs=%x\n", cpu_faultaddress(), cpu_faultstatus());
647 printf("prefetch_abort: trapframe=%08x\n", (u_int)frame);
648 }
649 #ifdef DDB
650 if (kernel_debug & 2)
651 Debugger();
652 #endif
653 }
654
655 /* Ok read the fault address. This will fault the page in for us */
656 if (fetchuserword(fault_pc, &fault_instruction) != 0) {
657 #ifdef DEBUG
658 printf("prefetch: faultin failed for address %08x\n",
659 fault_pc);
660 #endif
661 trapsignal(p, SIGSEGV, fault_pc);
662 } else {
663
664 #ifdef DIAGNOSTIC
665 /* More debug stuff */
666
667 #ifdef PMAP_DEBUG
668 if (pmap_debug_level >= 0) {
669 printf("Instruction @V%08x = %08x\n", fault_pc,
670 fault_instruction);
671 disassemble(fault_pc);
672 printf("return addr=%08x", frame->tf_pc);
673 pte = pmap_pte(p->p_vmspace->vm_map.pmap,
674 (vaddr_t)fault_pc);
675 if (pte)
676 printf(" pte=%p *pte=%08x\n", pte, *pte);
677 else
678 printf("\n");
679
680 }
681 #endif /* PMAP_DEBUG */
682 #endif /* DIAGNOSTIC */
683 }
684
685 userret(p);
686 }
687
688 int
689 cowfault(va)
690 vaddr_t va;
691 {
692 struct vmspace *vm;
693 int error;
694
695 if (va >= VM_MAXUSER_ADDRESS)
696 return (EFAULT);
697
698 /* uvm_fault can't be called from within an interrupt */
699 KASSERT(current_intr_depth == 0);
700
701 vm = curproc->p_vmspace;
702 error = uvm_fault(&vm->vm_map, va, 0, VM_PROT_READ | VM_PROT_WRITE);
703 return error;
704 }
705
706 /* End of fault.c */
707