source: mainline/kernel/arch/ia64/src/mm/tlb.c@ 38e5675b

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 38e5675b was 38e5675b, checked in by Jakub Jermar <jakub@…>, 15 years ago

Switch ia64 to use the unified panic architecture. No stack traces so far.

  • Property mode set to 100644
File size: 19.5 KB
RevLine 
[36b01bb2]1/*
[df4ed85]2 * Copyright (c) 2006 Jakub Jermar
[36b01bb2]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[5bda2f3e]29/** @addtogroup ia64mm
[b45c443]30 * @{
31 */
32/** @file
33 */
34
[36b01bb2]35/*
36 * TLB management.
37 */
38
39#include <mm/tlb.h>
[a0d74fd]40#include <mm/asid.h>
[9ad03fe]41#include <mm/page.h>
42#include <mm/as.h>
[bc78c75]43#include <arch/mm/tlb.h>
[a0d74fd]44#include <arch/mm/page.h>
[68091bd]45#include <arch/mm/vhpt.h>
[89298e3]46#include <arch/barrier.h>
[2c49fbbe]47#include <arch/interrupt.h>
[7c322bd]48#include <arch/pal/pal.h>
49#include <arch/asm.h>
[2c49fbbe]50#include <panic.h>
[1065603e]51#include <print.h>
[9ad03fe]52#include <arch.h>
[a175a67]53#include <interrupt.h>
[36b01bb2]54
[5bda2f3e]55#define IO_FRAME_BASE 0xFFFFC000000
56
[ef67bab]57/** Invalidate all TLB entries. */
[36b01bb2]58void tlb_invalidate_all(void)
59{
[ee289cf0]60 ipl_t ipl;
61 uintptr_t adr;
62 uint32_t count1, count2, stride1, stride2;
[5bda2f3e]63
[6c441cf8]64 unsigned int i, j;
[5bda2f3e]65
[ee289cf0]66 adr = PAL_PTCE_INFO_BASE();
67 count1 = PAL_PTCE_INFO_COUNT1();
68 count2 = PAL_PTCE_INFO_COUNT2();
69 stride1 = PAL_PTCE_INFO_STRIDE1();
70 stride2 = PAL_PTCE_INFO_STRIDE2();
[5bda2f3e]71
[ee289cf0]72 ipl = interrupts_disable();
[5bda2f3e]73
[6c441cf8]74 for (i = 0; i < count1; i++) {
75 for (j = 0; j < count2; j++) {
[e7b7be3f]76 asm volatile (
[5bda2f3e]77 "ptc.e %[adr] ;;"
78 :: [adr] "r" (adr)
[ee289cf0]79 );
80 adr += stride2;
[7c322bd]81 }
[ee289cf0]82 adr += stride1;
83 }
[5bda2f3e]84
[ee289cf0]85 interrupts_restore(ipl);
[5bda2f3e]86
[ee289cf0]87 srlz_d();
88 srlz_i();
[5bda2f3e]89
[68091bd]90#ifdef CONFIG_VHPT
[ee289cf0]91 vhpt_invalidate_all();
[5bda2f3e]92#endif
[36b01bb2]93}
94
95/** Invalidate entries belonging to an address space.
96 *
[5bda2f3e]97 * @param asid Address space identifier.
98 *
[36b01bb2]99 */
100void tlb_invalidate_asid(asid_t asid)
101{
[a82500ce]102 tlb_invalidate_all();
[36b01bb2]103}
[bc78c75]104
[a82500ce]105
[98000fb]106void tlb_invalidate_pages(asid_t asid, uintptr_t page, size_t cnt)
[a82500ce]107{
[5bda2f3e]108 region_register_t rr;
[d0cf9de]109 bool restore_rr = false;
[1065603e]110 int b = 0;
111 int c = cnt;
[5bda2f3e]112
[7f1c620]113 uintptr_t va;
[1065603e]114 va = page;
[5bda2f3e]115
[d0cf9de]116 rr.word = rr_read(VA2VRN(va));
117 if ((restore_rr = (rr.map.rid != ASID2RID(asid, VA2VRN(va))))) {
118 /*
119 * The selected region register does not contain required RID.
120 * Save the old content of the register and replace the RID.
121 */
[5bda2f3e]122 region_register_t rr0;
123
[d0cf9de]124 rr0 = rr;
125 rr0.map.rid = ASID2RID(asid, VA2VRN(va));
126 rr_write(VA2VRN(va), rr0.word);
127 srlz_d();
128 srlz_i();
129 }
130
[5bda2f3e]131 while (c >>= 1)
[1065603e]132 b++;
133 b >>= 1;
[7f1c620]134 uint64_t ps;
[d0cf9de]135
[1065603e]136 switch (b) {
[666773c]137 case 0: /* cnt 1 - 3 */
[ee289cf0]138 ps = PAGE_WIDTH;
139 break;
[666773c]140 case 1: /* cnt 4 - 15 */
141 ps = PAGE_WIDTH + 2;
142 va &= ~((1 << ps) - 1);
[ee289cf0]143 break;
[666773c]144 case 2: /* cnt 16 - 63 */
145 ps = PAGE_WIDTH + 4;
146 va &= ~((1 << ps) - 1);
[ee289cf0]147 break;
[666773c]148 case 3: /* cnt 64 - 255 */
149 ps = PAGE_WIDTH + 6;
150 va &= ~((1 << ps) - 1);
[ee289cf0]151 break;
[666773c]152 case 4: /* cnt 256 - 1023 */
153 ps = PAGE_WIDTH + 8;
154 va &= ~((1 << ps) - 1);
[ee289cf0]155 break;
[666773c]156 case 5: /* cnt 1024 - 4095 */
157 ps = PAGE_WIDTH + 10;
158 va &= ~((1 << ps) - 1);
[ee289cf0]159 break;
[666773c]160 case 6: /* cnt 4096 - 16383 */
161 ps = PAGE_WIDTH + 12;
162 va &= ~((1 << ps) - 1);
[ee289cf0]163 break;
[666773c]164 case 7: /* cnt 16384 - 65535 */
165 case 8: /* cnt 65536 - (256K - 1) */
166 ps = PAGE_WIDTH + 14;
167 va &= ~((1 << ps) - 1);
[ee289cf0]168 break;
169 default:
[666773c]170 ps = PAGE_WIDTH + 18;
171 va &= ~((1 << ps) - 1);
[ee289cf0]172 break;
[d0cf9de]173 }
[5bda2f3e]174
175 for (; va < (page + cnt * PAGE_SIZE); va += (1 << ps))
176 asm volatile (
177 "ptc.l %[va], %[ps] ;;"
178 :: [va]"r" (va),
179 [ps] "r" (ps << 2)
180 );
181
[d0cf9de]182 srlz_d();
183 srlz_i();
184
185 if (restore_rr) {
186 rr_write(VA2VRN(va), rr.word);
187 srlz_d();
188 srlz_i();
189 }
[a82500ce]190}
191
[95042fd]192/** Insert data into data translation cache.
193 *
[5bda2f3e]194 * @param va Virtual page address.
195 * @param asid Address space identifier.
196 * @param entry The rest of TLB entry as required by TLB insertion
197 * format.
198 *
[95042fd]199 */
[7f1c620]200void dtc_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry)
[b994a60]201{
[95042fd]202 tc_mapping_insert(va, asid, entry, true);
203}
[bc78c75]204
[95042fd]205/** Insert data into instruction translation cache.
206 *
[5bda2f3e]207 * @param va Virtual page address.
208 * @param asid Address space identifier.
209 * @param entry The rest of TLB entry as required by TLB insertion
210 * format.
[95042fd]211 */
[7f1c620]212void itc_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry)
[b994a60]213{
[95042fd]214 tc_mapping_insert(va, asid, entry, false);
215}
[bc78c75]216
[95042fd]217/** Insert data into instruction or data translation cache.
218 *
[5bda2f3e]219 * @param va Virtual page address.
220 * @param asid Address space identifier.
221 * @param entry The rest of TLB entry as required by TLB insertion
222 * format.
223 * @param dtc If true, insert into data translation cache, use
224 * instruction translation cache otherwise.
225 *
[95042fd]226 */
[7f1c620]227void tc_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, bool dtc)
[bc78c75]228{
[5bda2f3e]229 region_register_t rr;
[95042fd]230 bool restore_rr = false;
[5bda2f3e]231
[a0d74fd]232 rr.word = rr_read(VA2VRN(va));
233 if ((restore_rr = (rr.map.rid != ASID2RID(asid, VA2VRN(va))))) {
[95042fd]234 /*
235 * The selected region register does not contain required RID.
236 * Save the old content of the register and replace the RID.
237 */
[5bda2f3e]238 region_register_t rr0;
239
[95042fd]240 rr0 = rr;
[a0d74fd]241 rr0.map.rid = ASID2RID(asid, VA2VRN(va));
242 rr_write(VA2VRN(va), rr0.word);
[89298e3]243 srlz_d();
[95042fd]244 srlz_i();
245 }
246
[e7b7be3f]247 asm volatile (
[5bda2f3e]248 "mov r8 = psr ;;\n"
249 "rsm %[mask] ;;\n" /* PSR_IC_MASK */
250 "srlz.d ;;\n"
251 "srlz.i ;;\n"
252 "mov cr.ifa = %[va]\n" /* va */
253 "mov cr.itir = %[word1] ;;\n" /* entry.word[1] */
254 "cmp.eq p6, p7 = %[dtc], r0 ;;\n" /* decide between itc and dtc */
255 "(p6) itc.i %[word0] ;;\n"
256 "(p7) itc.d %[word0] ;;\n"
257 "mov psr.l = r8 ;;\n"
258 "srlz.d ;;\n"
259 :: [mask] "i" (PSR_IC_MASK),
260 [va] "r" (va),
261 [word0] "r" (entry.word[0]),
262 [word1] "r" (entry.word[1]),
263 [dtc] "r" (dtc)
[2c49fbbe]264 : "p6", "p7", "r8"
[95042fd]265 );
266
267 if (restore_rr) {
[a0d74fd]268 rr_write(VA2VRN(va), rr.word);
[95042fd]269 srlz_d();
270 srlz_i();
[bc78c75]271 }
272}
273
[95042fd]274/** Insert data into instruction translation register.
275 *
[5bda2f3e]276 * @param va Virtual page address.
277 * @param asid Address space identifier.
278 * @param entry The rest of TLB entry as required by TLB insertion
279 * format.
280 * @param tr Translation register.
281 *
[95042fd]282 */
[5bda2f3e]283void itr_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, size_t tr)
[bc78c75]284{
[95042fd]285 tr_mapping_insert(va, asid, entry, false, tr);
[bc78c75]286}
287
[95042fd]288/** Insert data into data translation register.
289 *
[5bda2f3e]290 * @param va Virtual page address.
291 * @param asid Address space identifier.
292 * @param entry The rest of TLB entry as required by TLB insertion
293 * format.
294 * @param tr Translation register.
295 *
[95042fd]296 */
[5bda2f3e]297void dtr_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, size_t tr)
[95042fd]298{
299 tr_mapping_insert(va, asid, entry, true, tr);
300}
[bc78c75]301
[95042fd]302/** Insert data into instruction or data translation register.
303 *
[5bda2f3e]304 * @param va Virtual page address.
305 * @param asid Address space identifier.
306 * @param entry The rest of TLB entry as required by TLB insertion
307 * format.
308 * @param dtr If true, insert into data translation register, use
309 * instruction translation register otherwise.
310 * @param tr Translation register.
311 *
[95042fd]312 */
[5bda2f3e]313void tr_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, bool dtr,
[98000fb]314 size_t tr)
[89298e3]315{
[5bda2f3e]316 region_register_t rr;
[95042fd]317 bool restore_rr = false;
[5bda2f3e]318
[a0d74fd]319 rr.word = rr_read(VA2VRN(va));
320 if ((restore_rr = (rr.map.rid != ASID2RID(asid, VA2VRN(va))))) {
[95042fd]321 /*
322 * The selected region register does not contain required RID.
323 * Save the old content of the register and replace the RID.
324 */
[5bda2f3e]325 region_register_t rr0;
326
[95042fd]327 rr0 = rr;
[a0d74fd]328 rr0.map.rid = ASID2RID(asid, VA2VRN(va));
329 rr_write(VA2VRN(va), rr0.word);
[89298e3]330 srlz_d();
[95042fd]331 srlz_i();
[89298e3]332 }
[5bda2f3e]333
[e7b7be3f]334 asm volatile (
[5bda2f3e]335 "mov r8 = psr ;;\n"
336 "rsm %[mask] ;;\n" /* PSR_IC_MASK */
337 "srlz.d ;;\n"
338 "srlz.i ;;\n"
339 "mov cr.ifa = %[va]\n" /* va */
340 "mov cr.itir = %[word1] ;;\n" /* entry.word[1] */
341 "cmp.eq p6, p7 = %[dtr], r0 ;;\n" /* decide between itr and dtr */
342 "(p6) itr.i itr[%[tr]] = %[word0] ;;\n"
343 "(p7) itr.d dtr[%[tr]] = %[word0] ;;\n"
344 "mov psr.l = r8 ;;\n"
345 "srlz.d ;;\n"
346 :: [mask] "i" (PSR_IC_MASK),
347 [va] "r" (va),
348 [word1] "r" (entry.word[1]),
349 [word0] "r" (entry.word[0]),
350 [tr] "r" (tr),
351 [dtr] "r" (dtr)
[2c49fbbe]352 : "p6", "p7", "r8"
[95042fd]353 );
354
355 if (restore_rr) {
[a0d74fd]356 rr_write(VA2VRN(va), rr.word);
[95042fd]357 srlz_d();
358 srlz_i();
359 }
[89298e3]360}
361
[a0d74fd]362/** Insert data into DTLB.
363 *
[5bda2f3e]364 * @param page Virtual page address including VRN bits.
365 * @param frame Physical frame address.
366 * @param dtr If true, insert into data translation register, use data
367 * translation cache otherwise.
368 * @param tr Translation register if dtr is true, ignored otherwise.
369 *
[a0d74fd]370 */
[5bda2f3e]371void dtlb_kernel_mapping_insert(uintptr_t page, uintptr_t frame, bool dtr,
[98000fb]372 size_t tr)
[a0d74fd]373{
374 tlb_entry_t entry;
375
376 entry.word[0] = 0;
377 entry.word[1] = 0;
378
[5bda2f3e]379 entry.p = true; /* present */
[a0d74fd]380 entry.ma = MA_WRITEBACK;
[5bda2f3e]381 entry.a = true; /* already accessed */
382 entry.d = true; /* already dirty */
[a0d74fd]383 entry.pl = PL_KERNEL;
384 entry.ar = AR_READ | AR_WRITE;
385 entry.ppn = frame >> PPN_SHIFT;
386 entry.ps = PAGE_WIDTH;
387
388 if (dtr)
389 dtr_mapping_insert(page, ASID_KERNEL, entry, tr);
390 else
391 dtc_mapping_insert(page, ASID_KERNEL, entry);
392}
393
[208259c]394/** Purge kernel entries from DTR.
395 *
396 * Purge DTR entries used by the kernel.
397 *
[5bda2f3e]398 * @param page Virtual page address including VRN bits.
399 * @param width Width of the purge in bits.
400 *
[208259c]401 */
[98000fb]402void dtr_purge(uintptr_t page, size_t width)
[208259c]403{
[5bda2f3e]404 asm volatile (
405 "ptr.d %[page], %[width]\n"
406 :: [page] "r" (page),
407 [width] "r" (width << 2)
408 );
[208259c]409}
410
411
[9ad03fe]412/** Copy content of PTE into data translation cache.
413 *
[5bda2f3e]414 * @param t PTE.
415 *
[9ad03fe]416 */
417void dtc_pte_copy(pte_t *t)
418{
419 tlb_entry_t entry;
[5bda2f3e]420
[9ad03fe]421 entry.word[0] = 0;
422 entry.word[1] = 0;
423
424 entry.p = t->p;
425 entry.ma = t->c ? MA_WRITEBACK : MA_UNCACHEABLE;
426 entry.a = t->a;
427 entry.d = t->d;
428 entry.pl = t->k ? PL_KERNEL : PL_USER;
429 entry.ar = t->w ? AR_WRITE : AR_READ;
430 entry.ppn = t->frame >> PPN_SHIFT;
431 entry.ps = PAGE_WIDTH;
432
433 dtc_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]434
[68091bd]435#ifdef CONFIG_VHPT
436 vhpt_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]437#endif
[9ad03fe]438}
439
440/** Copy content of PTE into instruction translation cache.
441 *
[5bda2f3e]442 * @param t PTE.
443 *
[9ad03fe]444 */
445void itc_pte_copy(pte_t *t)
446{
447 tlb_entry_t entry;
[5bda2f3e]448
[9ad03fe]449 entry.word[0] = 0;
450 entry.word[1] = 0;
451
452 ASSERT(t->x);
453
454 entry.p = t->p;
455 entry.ma = t->c ? MA_WRITEBACK : MA_UNCACHEABLE;
456 entry.a = t->a;
457 entry.pl = t->k ? PL_KERNEL : PL_USER;
458 entry.ar = t->x ? (AR_EXECUTE | AR_READ) : AR_READ;
459 entry.ppn = t->frame >> PPN_SHIFT;
460 entry.ps = PAGE_WIDTH;
461
462 itc_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]463
[68091bd]464#ifdef CONFIG_VHPT
465 vhpt_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]466#endif
[9ad03fe]467}
468
469/** Instruction TLB fault handler for faults with VHPT turned off.
470 *
[5bda2f3e]471 * @param vector Interruption vector.
472 * @param istate Structure with saved interruption state.
473 *
[9ad03fe]474 */
[7f1c620]475void alternate_instruction_tlb_fault(uint64_t vector, istate_t *istate)
[89298e3]476{
[5bda2f3e]477 region_register_t rr;
[567807b1]478 rid_t rid;
[7f1c620]479 uintptr_t va;
[9ad03fe]480 pte_t *t;
481
[5bda2f3e]482 va = istate->cr_ifa; /* faulting address */
[567807b1]483 rr.word = rr_read(VA2VRN(va));
484 rid = rr.map.rid;
[5bda2f3e]485
[2299914]486 page_table_lock(AS, true);
[9ad03fe]487 t = page_mapping_find(AS, va);
488 if (t) {
489 /*
490 * The mapping was found in software page hash table.
491 * Insert it into data translation cache.
492 */
493 itc_pte_copy(t);
[2299914]494 page_table_unlock(AS, true);
[9ad03fe]495 } else {
496 /*
497 * Forward the page fault to address space page fault handler.
498 */
[2299914]499 page_table_unlock(AS, true);
[567807b1]500 if (as_page_fault(va, PF_ACCESS_EXEC, istate) == AS_PF_FAULT) {
[5bda2f3e]501 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]502 panic_memtrap(istate, PF_ACCESS_EXEC, va,
503 "Page fault.");
[9ad03fe]504 }
505 }
[95042fd]506}
[89298e3]507
[46321fb]508static int is_io_page_accessible(int page)
509{
[666773c]510 if (TASK->arch.iomap)
[38f6add]511 return bitmap_get(TASK->arch.iomap, page);
[666773c]512 else
513 return 0;
[46321fb]514}
515
[666773c]516/**
517 * There is special handling of memory mapped legacy io, because of 4KB sized
518 * access for userspace.
[46321fb]519 *
[5bda2f3e]520 * @param va Virtual address of page fault.
521 * @param istate Structure with saved interruption state.
522 *
523 * @return One on success, zero on failure.
[46321fb]524 *
525 */
526static int try_memmap_io_insertion(uintptr_t va, istate_t *istate)
527{
[666773c]528 if ((va >= IO_OFFSET ) && (va < IO_OFFSET + (1 << IO_PAGE_WIDTH))) {
529 if (TASK) {
530 uint64_t io_page = (va & ((1 << IO_PAGE_WIDTH) - 1)) >>
531 USPACE_IO_PAGE_WIDTH;
[5bda2f3e]532
[666773c]533 if (is_io_page_accessible(io_page)) {
534 uint64_t page, frame;
[5bda2f3e]535
[666773c]536 page = IO_OFFSET +
537 (1 << USPACE_IO_PAGE_WIDTH) * io_page;
538 frame = IO_FRAME_BASE +
539 (1 << USPACE_IO_PAGE_WIDTH) * io_page;
[5bda2f3e]540
[46321fb]541 tlb_entry_t entry;
[5bda2f3e]542
[46321fb]543 entry.word[0] = 0;
544 entry.word[1] = 0;
[5bda2f3e]545
546 entry.p = true; /* present */
547 entry.ma = MA_UNCACHEABLE;
548 entry.a = true; /* already accessed */
549 entry.d = true; /* already dirty */
[46321fb]550 entry.pl = PL_USER;
551 entry.ar = AR_READ | AR_WRITE;
[ef5de6d]552 entry.ppn = frame >> PPN_SHIFT;
[46321fb]553 entry.ps = USPACE_IO_PAGE_WIDTH;
[5bda2f3e]554
[ef5de6d]555 dtc_mapping_insert(page, TASK->as->asid, entry);
[46321fb]556 return 1;
[666773c]557 } else {
558 fault_if_from_uspace(istate,
[f651e80]559 "IO access fault at %p.", va);
[666773c]560 }
561 }
562 }
[5bda2f3e]563
[46321fb]564 return 0;
565}
566
[9ad03fe]567/** Data TLB fault handler for faults with VHPT turned off.
[a0d74fd]568 *
[5bda2f3e]569 * @param vector Interruption vector.
570 * @param istate Structure with saved interruption state.
571 *
[a0d74fd]572 */
[7f1c620]573void alternate_data_tlb_fault(uint64_t vector, istate_t *istate)
[95042fd]574{
[93d66ef]575 if (istate->cr_isr.sp) {
576 /* Speculative load. Deffer the exception
577 until a more clever approach can be used.
578
579 Currently if we try to find the mapping
580 for the speculative load while in the kernel,
581 we might introduce a livelock because of
582 the possibly invalid values of the address. */
583 istate->cr_ipsr.ed = true;
584 return;
585 }
586
[5bda2f3e]587 uintptr_t va = istate->cr_ifa; /* faulting address */
[a0d74fd]588
[5bda2f3e]589 region_register_t rr;
[a0d74fd]590 rr.word = rr_read(VA2VRN(va));
[5bda2f3e]591 rid_t rid = rr.map.rid;
[a0d74fd]592 if (RID2ASID(rid) == ASID_KERNEL) {
593 if (VA2VRN(va) == VRN_KERNEL) {
594 /*
595 * Provide KA2PA(identity) mapping for faulting piece of
596 * kernel address space.
597 */
[9ad03fe]598 dtlb_kernel_mapping_insert(va, KA2PA(va), false, 0);
[a0d74fd]599 return;
600 }
601 }
[5bda2f3e]602
603
[2299914]604 page_table_lock(AS, true);
[5bda2f3e]605 pte_t *entry = page_mapping_find(AS, va);
606 if (entry) {
[9ad03fe]607 /*
[f47fd19]608 * The mapping was found in the software page hash table.
[9ad03fe]609 * Insert it into data translation cache.
610 */
[5bda2f3e]611 dtc_pte_copy(entry);
[2299914]612 page_table_unlock(AS, true);
[9ad03fe]613 } else {
[46321fb]614 page_table_unlock(AS, true);
[666773c]615 if (try_memmap_io_insertion(va, istate))
616 return;
[5bda2f3e]617
[9ad03fe]618 /*
[5bda2f3e]619 * Forward the page fault to the address space page fault
[666773c]620 * handler.
[9ad03fe]621 */
[567807b1]622 if (as_page_fault(va, PF_ACCESS_READ, istate) == AS_PF_FAULT) {
[5bda2f3e]623 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]624 panic_memtrap(istate, PF_ACCESS_READ, va,
625 "Page fault.");
[9ad03fe]626 }
627 }
[95042fd]628}
[89298e3]629
[9ad03fe]630/** Data nested TLB fault handler.
631 *
632 * This fault should not occur.
633 *
[5bda2f3e]634 * @param vector Interruption vector.
635 * @param istate Structure with saved interruption state.
636 *
[9ad03fe]637 */
[7f1c620]638void data_nested_tlb_fault(uint64_t vector, istate_t *istate)
[95042fd]639{
[5bda2f3e]640 ASSERT(false);
[95042fd]641}
[89298e3]642
[9ad03fe]643/** Data Dirty bit fault handler.
644 *
[5bda2f3e]645 * @param vector Interruption vector.
646 * @param istate Structure with saved interruption state.
647 *
[9ad03fe]648 */
[7f1c620]649void data_dirty_bit_fault(uint64_t vector, istate_t *istate)
[95042fd]650{
[5bda2f3e]651 region_register_t rr;
[567807b1]652 rid_t rid;
[7f1c620]653 uintptr_t va;
[9ad03fe]654 pte_t *t;
[567807b1]655
[5bda2f3e]656 va = istate->cr_ifa; /* faulting address */
[567807b1]657 rr.word = rr_read(VA2VRN(va));
658 rid = rr.map.rid;
[5bda2f3e]659
[2299914]660 page_table_lock(AS, true);
[567807b1]661 t = page_mapping_find(AS, va);
[5bda2f3e]662 ASSERT((t) && (t->p));
663 if ((t) && (t->p) && (t->w)) {
[9ad03fe]664 /*
665 * Update the Dirty bit in page tables and reinsert
666 * the mapping into DTC.
667 */
668 t->d = true;
669 dtc_pte_copy(t);
[567807b1]670 } else {
671 if (as_page_fault(va, PF_ACCESS_WRITE, istate) == AS_PF_FAULT) {
[5bda2f3e]672 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]673 panic_memtrap(istate, PF_ACCESS_WRITE, va,
674 "Page fault.");
[567807b1]675 }
[9ad03fe]676 }
[2299914]677 page_table_unlock(AS, true);
[95042fd]678}
[89298e3]679
[9ad03fe]680/** Instruction access bit fault handler.
681 *
[5bda2f3e]682 * @param vector Interruption vector.
683 * @param istate Structure with saved interruption state.
684 *
[9ad03fe]685 */
[7f1c620]686void instruction_access_bit_fault(uint64_t vector, istate_t *istate)
[95042fd]687{
[5bda2f3e]688 region_register_t rr;
[567807b1]689 rid_t rid;
[7f1c620]690 uintptr_t va;
[5bda2f3e]691 pte_t *t;
692
693 va = istate->cr_ifa; /* faulting address */
[567807b1]694 rr.word = rr_read(VA2VRN(va));
695 rid = rr.map.rid;
[5bda2f3e]696
[2299914]697 page_table_lock(AS, true);
[567807b1]698 t = page_mapping_find(AS, va);
[5bda2f3e]699 ASSERT((t) && (t->p));
700 if ((t) && (t->p) && (t->x)) {
[9ad03fe]701 /*
702 * Update the Accessed bit in page tables and reinsert
703 * the mapping into ITC.
704 */
705 t->a = true;
706 itc_pte_copy(t);
[567807b1]707 } else {
708 if (as_page_fault(va, PF_ACCESS_EXEC, istate) == AS_PF_FAULT) {
[f651e80]709 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]710 panic_memtrap(istate, PF_ACCESS_EXEC, va,
711 "Page fault.");
[567807b1]712 }
[9ad03fe]713 }
[2299914]714 page_table_unlock(AS, true);
[95042fd]715}
[89298e3]716
[9ad03fe]717/** Data access bit fault handler.
718 *
719 * @param vector Interruption vector.
[25d7709]720 * @param istate Structure with saved interruption state.
[5bda2f3e]721 *
[9ad03fe]722 */
[7f1c620]723void data_access_bit_fault(uint64_t vector, istate_t *istate)
[95042fd]724{
[5bda2f3e]725 region_register_t rr;
[567807b1]726 rid_t rid;
[7f1c620]727 uintptr_t va;
[9ad03fe]728 pte_t *t;
[5bda2f3e]729
730 va = istate->cr_ifa; /* faulting address */
[567807b1]731 rr.word = rr_read(VA2VRN(va));
732 rid = rr.map.rid;
[5bda2f3e]733
[2299914]734 page_table_lock(AS, true);
[567807b1]735 t = page_mapping_find(AS, va);
[5bda2f3e]736 ASSERT((t) && (t->p));
737 if ((t) && (t->p)) {
[9ad03fe]738 /*
739 * Update the Accessed bit in page tables and reinsert
740 * the mapping into DTC.
741 */
742 t->a = true;
743 dtc_pte_copy(t);
[567807b1]744 } else {
745 if (as_page_fault(va, PF_ACCESS_READ, istate) == AS_PF_FAULT) {
[f651e80]746 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]747 panic_memtrap(istate, PF_ACCESS_READ, va,
748 "Page fault.");
[567807b1]749 }
[9ad03fe]750 }
[2299914]751 page_table_unlock(AS, true);
[89298e3]752}
753
[925be4e]754/** Data access rights fault handler.
755 *
756 * @param vector Interruption vector.
757 * @param istate Structure with saved interruption state.
[5bda2f3e]758 *
[925be4e]759 */
760void data_access_rights_fault(uint64_t vector, istate_t *istate)
761{
[5bda2f3e]762 region_register_t rr;
[925be4e]763 rid_t rid;
764 uintptr_t va;
765 pte_t *t;
[5bda2f3e]766
767 va = istate->cr_ifa; /* faulting address */
[925be4e]768 rr.word = rr_read(VA2VRN(va));
769 rid = rr.map.rid;
[5bda2f3e]770
[925be4e]771 /*
772 * Assume a write to a read-only page.
773 */
774 page_table_lock(AS, true);
775 t = page_mapping_find(AS, va);
[5bda2f3e]776 ASSERT((t) && (t->p));
[925be4e]777 ASSERT(!t->w);
778 if (as_page_fault(va, PF_ACCESS_WRITE, istate) == AS_PF_FAULT) {
779 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]780 panic_memtrap(istate, PF_ACCESS_WRITE, va, "Page fault.");
[925be4e]781 }
782 page_table_unlock(AS, true);
783}
784
[9ad03fe]785/** Page not present fault handler.
786 *
787 * @param vector Interruption vector.
[25d7709]788 * @param istate Structure with saved interruption state.
[5bda2f3e]789 *
[9ad03fe]790 */
[7f1c620]791void page_not_present(uint64_t vector, istate_t *istate)
[95042fd]792{
[5bda2f3e]793 region_register_t rr;
[567807b1]794 rid_t rid;
[7f1c620]795 uintptr_t va;
[9ad03fe]796 pte_t *t;
797
[5bda2f3e]798 va = istate->cr_ifa; /* faulting address */
[567807b1]799 rr.word = rr_read(VA2VRN(va));
800 rid = rr.map.rid;
[5bda2f3e]801
[2299914]802 page_table_lock(AS, true);
[9ad03fe]803 t = page_mapping_find(AS, va);
804 ASSERT(t);
805
806 if (t->p) {
807 /*
808 * If the Present bit is set in page hash table, just copy it
809 * and update ITC/DTC.
810 */
811 if (t->x)
812 itc_pte_copy(t);
813 else
814 dtc_pte_copy(t);
[2299914]815 page_table_unlock(AS, true);
[9ad03fe]816 } else {
[2299914]817 page_table_unlock(AS, true);
[567807b1]818 if (as_page_fault(va, PF_ACCESS_READ, istate) == AS_PF_FAULT) {
[f651e80]819 fault_if_from_uspace(istate, "Page fault at %p.", va);
[38e5675b]820 panic_memtrap(istate, PF_ACCESS_READ, va,
821 "Page fault.");
[9ad03fe]822 }
823 }
[95042fd]824}
[b45c443]825
[9979acb]826void tlb_arch_init(void)
827{
828}
829
830void tlb_print(void)
831{
832}
833
[ee289cf0]834/** @}
[b45c443]835 */
Note: See TracBrowser for help on using the repository browser.