source: mainline/kernel/arch/ia64/src/mm/tlb.c@ efb48eb

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since efb48eb was 0fd9b35, checked in by Jakub Jermar <jakub@…>, 14 years ago

Limit kernel identity on ia64 to low memory and make sure to use
the kernel address space for kernel non-identity page table
lookups.

  • Property mode set to 100644
File size: 18.9 KB
RevLine 
[36b01bb2]1/*
[df4ed85]2 * Copyright (c) 2006 Jakub Jermar
[36b01bb2]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[5bda2f3e]29/** @addtogroup ia64mm
[b45c443]30 * @{
31 */
32/** @file
33 */
34
[36b01bb2]35/*
36 * TLB management.
37 */
38
39#include <mm/tlb.h>
[a0d74fd]40#include <mm/asid.h>
[9ad03fe]41#include <mm/page.h>
42#include <mm/as.h>
[bc78c75]43#include <arch/mm/tlb.h>
[a0d74fd]44#include <arch/mm/page.h>
[68091bd]45#include <arch/mm/vhpt.h>
[89298e3]46#include <arch/barrier.h>
[2c49fbbe]47#include <arch/interrupt.h>
[7c322bd]48#include <arch/pal/pal.h>
49#include <arch/asm.h>
[2c49fbbe]50#include <panic.h>
[1065603e]51#include <print.h>
[9ad03fe]52#include <arch.h>
[a175a67]53#include <interrupt.h>
[36b01bb2]54
[5bda2f3e]55#define IO_FRAME_BASE 0xFFFFC000000
56
[ef67bab]57/** Invalidate all TLB entries. */
[36b01bb2]58void tlb_invalidate_all(void)
59{
[ee289cf0]60 ipl_t ipl;
61 uintptr_t adr;
62 uint32_t count1, count2, stride1, stride2;
[5bda2f3e]63
[6c441cf8]64 unsigned int i, j;
[5bda2f3e]65
[ee289cf0]66 adr = PAL_PTCE_INFO_BASE();
67 count1 = PAL_PTCE_INFO_COUNT1();
68 count2 = PAL_PTCE_INFO_COUNT2();
69 stride1 = PAL_PTCE_INFO_STRIDE1();
70 stride2 = PAL_PTCE_INFO_STRIDE2();
[5bda2f3e]71
[ee289cf0]72 ipl = interrupts_disable();
[5bda2f3e]73
[6c441cf8]74 for (i = 0; i < count1; i++) {
75 for (j = 0; j < count2; j++) {
[e7b7be3f]76 asm volatile (
[5bda2f3e]77 "ptc.e %[adr] ;;"
78 :: [adr] "r" (adr)
[ee289cf0]79 );
80 adr += stride2;
[7c322bd]81 }
[ee289cf0]82 adr += stride1;
83 }
[5bda2f3e]84
[ee289cf0]85 interrupts_restore(ipl);
[5bda2f3e]86
[ee289cf0]87 srlz_d();
88 srlz_i();
[5bda2f3e]89
[68091bd]90#ifdef CONFIG_VHPT
[ee289cf0]91 vhpt_invalidate_all();
[5bda2f3e]92#endif
[36b01bb2]93}
94
95/** Invalidate entries belonging to an address space.
96 *
[5bda2f3e]97 * @param asid Address space identifier.
98 *
[36b01bb2]99 */
100void tlb_invalidate_asid(asid_t asid)
101{
[a82500ce]102 tlb_invalidate_all();
[36b01bb2]103}
[bc78c75]104
[a82500ce]105
[98000fb]106void tlb_invalidate_pages(asid_t asid, uintptr_t page, size_t cnt)
[a82500ce]107{
[5bda2f3e]108 region_register_t rr;
[d0cf9de]109 bool restore_rr = false;
[1065603e]110 int b = 0;
111 int c = cnt;
[5bda2f3e]112
[7f1c620]113 uintptr_t va;
[1065603e]114 va = page;
[5bda2f3e]115
[d0cf9de]116 rr.word = rr_read(VA2VRN(va));
117 if ((restore_rr = (rr.map.rid != ASID2RID(asid, VA2VRN(va))))) {
118 /*
119 * The selected region register does not contain required RID.
120 * Save the old content of the register and replace the RID.
121 */
[5bda2f3e]122 region_register_t rr0;
123
[d0cf9de]124 rr0 = rr;
125 rr0.map.rid = ASID2RID(asid, VA2VRN(va));
126 rr_write(VA2VRN(va), rr0.word);
127 srlz_d();
128 srlz_i();
129 }
130
[5bda2f3e]131 while (c >>= 1)
[1065603e]132 b++;
133 b >>= 1;
[7f1c620]134 uint64_t ps;
[d0cf9de]135
[1065603e]136 switch (b) {
[666773c]137 case 0: /* cnt 1 - 3 */
[ee289cf0]138 ps = PAGE_WIDTH;
139 break;
[666773c]140 case 1: /* cnt 4 - 15 */
141 ps = PAGE_WIDTH + 2;
142 va &= ~((1 << ps) - 1);
[ee289cf0]143 break;
[666773c]144 case 2: /* cnt 16 - 63 */
145 ps = PAGE_WIDTH + 4;
146 va &= ~((1 << ps) - 1);
[ee289cf0]147 break;
[666773c]148 case 3: /* cnt 64 - 255 */
149 ps = PAGE_WIDTH + 6;
150 va &= ~((1 << ps) - 1);
[ee289cf0]151 break;
[666773c]152 case 4: /* cnt 256 - 1023 */
153 ps = PAGE_WIDTH + 8;
154 va &= ~((1 << ps) - 1);
[ee289cf0]155 break;
[666773c]156 case 5: /* cnt 1024 - 4095 */
157 ps = PAGE_WIDTH + 10;
158 va &= ~((1 << ps) - 1);
[ee289cf0]159 break;
[666773c]160 case 6: /* cnt 4096 - 16383 */
161 ps = PAGE_WIDTH + 12;
162 va &= ~((1 << ps) - 1);
[ee289cf0]163 break;
[666773c]164 case 7: /* cnt 16384 - 65535 */
165 case 8: /* cnt 65536 - (256K - 1) */
166 ps = PAGE_WIDTH + 14;
167 va &= ~((1 << ps) - 1);
[ee289cf0]168 break;
169 default:
[666773c]170 ps = PAGE_WIDTH + 18;
171 va &= ~((1 << ps) - 1);
[ee289cf0]172 break;
[d0cf9de]173 }
[5bda2f3e]174
175 for (; va < (page + cnt * PAGE_SIZE); va += (1 << ps))
176 asm volatile (
177 "ptc.l %[va], %[ps] ;;"
178 :: [va]"r" (va),
179 [ps] "r" (ps << 2)
180 );
181
[d0cf9de]182 srlz_d();
183 srlz_i();
184
185 if (restore_rr) {
186 rr_write(VA2VRN(va), rr.word);
187 srlz_d();
188 srlz_i();
189 }
[a82500ce]190}
191
[95042fd]192/** Insert data into data translation cache.
193 *
[5bda2f3e]194 * @param va Virtual page address.
195 * @param asid Address space identifier.
196 * @param entry The rest of TLB entry as required by TLB insertion
197 * format.
198 *
[95042fd]199 */
[7f1c620]200void dtc_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry)
[b994a60]201{
[95042fd]202 tc_mapping_insert(va, asid, entry, true);
203}
[bc78c75]204
[95042fd]205/** Insert data into instruction translation cache.
206 *
[5bda2f3e]207 * @param va Virtual page address.
208 * @param asid Address space identifier.
209 * @param entry The rest of TLB entry as required by TLB insertion
210 * format.
[95042fd]211 */
[7f1c620]212void itc_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry)
[b994a60]213{
[95042fd]214 tc_mapping_insert(va, asid, entry, false);
215}
[bc78c75]216
[95042fd]217/** Insert data into instruction or data translation cache.
218 *
[5bda2f3e]219 * @param va Virtual page address.
220 * @param asid Address space identifier.
221 * @param entry The rest of TLB entry as required by TLB insertion
222 * format.
223 * @param dtc If true, insert into data translation cache, use
224 * instruction translation cache otherwise.
225 *
[95042fd]226 */
[7f1c620]227void tc_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, bool dtc)
[bc78c75]228{
[5bda2f3e]229 region_register_t rr;
[95042fd]230 bool restore_rr = false;
[5bda2f3e]231
[a0d74fd]232 rr.word = rr_read(VA2VRN(va));
233 if ((restore_rr = (rr.map.rid != ASID2RID(asid, VA2VRN(va))))) {
[95042fd]234 /*
235 * The selected region register does not contain required RID.
236 * Save the old content of the register and replace the RID.
237 */
[5bda2f3e]238 region_register_t rr0;
239
[95042fd]240 rr0 = rr;
[a0d74fd]241 rr0.map.rid = ASID2RID(asid, VA2VRN(va));
242 rr_write(VA2VRN(va), rr0.word);
[89298e3]243 srlz_d();
[95042fd]244 srlz_i();
245 }
246
[e7b7be3f]247 asm volatile (
[5bda2f3e]248 "mov r8 = psr ;;\n"
249 "rsm %[mask] ;;\n" /* PSR_IC_MASK */
250 "srlz.d ;;\n"
251 "srlz.i ;;\n"
252 "mov cr.ifa = %[va]\n" /* va */
253 "mov cr.itir = %[word1] ;;\n" /* entry.word[1] */
254 "cmp.eq p6, p7 = %[dtc], r0 ;;\n" /* decide between itc and dtc */
255 "(p6) itc.i %[word0] ;;\n"
256 "(p7) itc.d %[word0] ;;\n"
257 "mov psr.l = r8 ;;\n"
258 "srlz.d ;;\n"
259 :: [mask] "i" (PSR_IC_MASK),
260 [va] "r" (va),
261 [word0] "r" (entry.word[0]),
262 [word1] "r" (entry.word[1]),
263 [dtc] "r" (dtc)
[2c49fbbe]264 : "p6", "p7", "r8"
[95042fd]265 );
266
267 if (restore_rr) {
[a0d74fd]268 rr_write(VA2VRN(va), rr.word);
[95042fd]269 srlz_d();
270 srlz_i();
[bc78c75]271 }
272}
273
[95042fd]274/** Insert data into instruction translation register.
275 *
[5bda2f3e]276 * @param va Virtual page address.
277 * @param asid Address space identifier.
278 * @param entry The rest of TLB entry as required by TLB insertion
279 * format.
280 * @param tr Translation register.
281 *
[95042fd]282 */
[5bda2f3e]283void itr_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, size_t tr)
[bc78c75]284{
[95042fd]285 tr_mapping_insert(va, asid, entry, false, tr);
[bc78c75]286}
287
[95042fd]288/** Insert data into data translation register.
289 *
[5bda2f3e]290 * @param va Virtual page address.
291 * @param asid Address space identifier.
292 * @param entry The rest of TLB entry as required by TLB insertion
293 * format.
294 * @param tr Translation register.
295 *
[95042fd]296 */
[5bda2f3e]297void dtr_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, size_t tr)
[95042fd]298{
299 tr_mapping_insert(va, asid, entry, true, tr);
300}
[bc78c75]301
[95042fd]302/** Insert data into instruction or data translation register.
303 *
[5bda2f3e]304 * @param va Virtual page address.
305 * @param asid Address space identifier.
306 * @param entry The rest of TLB entry as required by TLB insertion
307 * format.
308 * @param dtr If true, insert into data translation register, use
309 * instruction translation register otherwise.
310 * @param tr Translation register.
311 *
[95042fd]312 */
[5bda2f3e]313void tr_mapping_insert(uintptr_t va, asid_t asid, tlb_entry_t entry, bool dtr,
[98000fb]314 size_t tr)
[89298e3]315{
[5bda2f3e]316 region_register_t rr;
[95042fd]317 bool restore_rr = false;
[5bda2f3e]318
[a0d74fd]319 rr.word = rr_read(VA2VRN(va));
320 if ((restore_rr = (rr.map.rid != ASID2RID(asid, VA2VRN(va))))) {
[95042fd]321 /*
322 * The selected region register does not contain required RID.
323 * Save the old content of the register and replace the RID.
324 */
[5bda2f3e]325 region_register_t rr0;
326
[95042fd]327 rr0 = rr;
[a0d74fd]328 rr0.map.rid = ASID2RID(asid, VA2VRN(va));
329 rr_write(VA2VRN(va), rr0.word);
[89298e3]330 srlz_d();
[95042fd]331 srlz_i();
[89298e3]332 }
[5bda2f3e]333
[e7b7be3f]334 asm volatile (
[5bda2f3e]335 "mov r8 = psr ;;\n"
336 "rsm %[mask] ;;\n" /* PSR_IC_MASK */
337 "srlz.d ;;\n"
338 "srlz.i ;;\n"
339 "mov cr.ifa = %[va]\n" /* va */
340 "mov cr.itir = %[word1] ;;\n" /* entry.word[1] */
341 "cmp.eq p6, p7 = %[dtr], r0 ;;\n" /* decide between itr and dtr */
342 "(p6) itr.i itr[%[tr]] = %[word0] ;;\n"
343 "(p7) itr.d dtr[%[tr]] = %[word0] ;;\n"
344 "mov psr.l = r8 ;;\n"
345 "srlz.d ;;\n"
346 :: [mask] "i" (PSR_IC_MASK),
347 [va] "r" (va),
348 [word1] "r" (entry.word[1]),
349 [word0] "r" (entry.word[0]),
350 [tr] "r" (tr),
351 [dtr] "r" (dtr)
[2c49fbbe]352 : "p6", "p7", "r8"
[95042fd]353 );
354
355 if (restore_rr) {
[a0d74fd]356 rr_write(VA2VRN(va), rr.word);
[95042fd]357 srlz_d();
358 srlz_i();
359 }
[89298e3]360}
361
[a0d74fd]362/** Insert data into DTLB.
363 *
[5bda2f3e]364 * @param page Virtual page address including VRN bits.
365 * @param frame Physical frame address.
366 * @param dtr If true, insert into data translation register, use data
367 * translation cache otherwise.
368 * @param tr Translation register if dtr is true, ignored otherwise.
369 *
[a0d74fd]370 */
[5bda2f3e]371void dtlb_kernel_mapping_insert(uintptr_t page, uintptr_t frame, bool dtr,
[98000fb]372 size_t tr)
[a0d74fd]373{
374 tlb_entry_t entry;
375
376 entry.word[0] = 0;
377 entry.word[1] = 0;
378
[5bda2f3e]379 entry.p = true; /* present */
[a0d74fd]380 entry.ma = MA_WRITEBACK;
[5bda2f3e]381 entry.a = true; /* already accessed */
382 entry.d = true; /* already dirty */
[a0d74fd]383 entry.pl = PL_KERNEL;
384 entry.ar = AR_READ | AR_WRITE;
385 entry.ppn = frame >> PPN_SHIFT;
386 entry.ps = PAGE_WIDTH;
387
388 if (dtr)
389 dtr_mapping_insert(page, ASID_KERNEL, entry, tr);
390 else
391 dtc_mapping_insert(page, ASID_KERNEL, entry);
392}
393
[208259c]394/** Purge kernel entries from DTR.
395 *
396 * Purge DTR entries used by the kernel.
397 *
[5bda2f3e]398 * @param page Virtual page address including VRN bits.
399 * @param width Width of the purge in bits.
400 *
[208259c]401 */
[98000fb]402void dtr_purge(uintptr_t page, size_t width)
[208259c]403{
[5bda2f3e]404 asm volatile (
405 "ptr.d %[page], %[width]\n"
406 :: [page] "r" (page),
407 [width] "r" (width << 2)
408 );
[208259c]409}
410
411
[9ad03fe]412/** Copy content of PTE into data translation cache.
413 *
[5bda2f3e]414 * @param t PTE.
415 *
[9ad03fe]416 */
417void dtc_pte_copy(pte_t *t)
418{
419 tlb_entry_t entry;
[5bda2f3e]420
[9ad03fe]421 entry.word[0] = 0;
422 entry.word[1] = 0;
423
424 entry.p = t->p;
425 entry.ma = t->c ? MA_WRITEBACK : MA_UNCACHEABLE;
426 entry.a = t->a;
427 entry.d = t->d;
428 entry.pl = t->k ? PL_KERNEL : PL_USER;
429 entry.ar = t->w ? AR_WRITE : AR_READ;
430 entry.ppn = t->frame >> PPN_SHIFT;
431 entry.ps = PAGE_WIDTH;
432
433 dtc_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]434
[68091bd]435#ifdef CONFIG_VHPT
436 vhpt_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]437#endif
[9ad03fe]438}
439
440/** Copy content of PTE into instruction translation cache.
441 *
[5bda2f3e]442 * @param t PTE.
443 *
[9ad03fe]444 */
445void itc_pte_copy(pte_t *t)
446{
447 tlb_entry_t entry;
[5bda2f3e]448
[9ad03fe]449 entry.word[0] = 0;
450 entry.word[1] = 0;
451
452 ASSERT(t->x);
453
454 entry.p = t->p;
455 entry.ma = t->c ? MA_WRITEBACK : MA_UNCACHEABLE;
456 entry.a = t->a;
457 entry.pl = t->k ? PL_KERNEL : PL_USER;
458 entry.ar = t->x ? (AR_EXECUTE | AR_READ) : AR_READ;
459 entry.ppn = t->frame >> PPN_SHIFT;
460 entry.ps = PAGE_WIDTH;
461
462 itc_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]463
[68091bd]464#ifdef CONFIG_VHPT
465 vhpt_mapping_insert(t->page, t->as->asid, entry);
[5bda2f3e]466#endif
[9ad03fe]467}
468
[0fd9b35]469static bool is_kernel_fault(uintptr_t va)
470{
471 region_register_t rr;
472
473 rr.word = rr_read(VA2VRN(va));
474 rid_t rid = rr.map.rid;
475 return (RID2ASID(rid) == ASID_KERNEL) && (VA2VRN(va) == VRN_KERNEL);
476}
477
[9ad03fe]478/** Instruction TLB fault handler for faults with VHPT turned off.
479 *
[5bda2f3e]480 * @param vector Interruption vector.
481 * @param istate Structure with saved interruption state.
482 *
[9ad03fe]483 */
[7f1c620]484void alternate_instruction_tlb_fault(uint64_t vector, istate_t *istate)
[89298e3]485{
[7f1c620]486 uintptr_t va;
[9ad03fe]487 pte_t *t;
488
[5bda2f3e]489 va = istate->cr_ifa; /* faulting address */
490
[0fd9b35]491 ASSERT(!is_kernel_fault(va));
492
[0ff03f3]493 t = page_mapping_find(AS, va, true);
[9ad03fe]494 if (t) {
495 /*
496 * The mapping was found in software page hash table.
497 * Insert it into data translation cache.
498 */
499 itc_pte_copy(t);
500 } else {
501 /*
502 * Forward the page fault to address space page fault handler.
503 */
[567807b1]504 if (as_page_fault(va, PF_ACCESS_EXEC, istate) == AS_PF_FAULT) {
[7e752b2]505 fault_if_from_uspace(istate, "Page fault at %p.",
506 (void *) va);
[c15b374]507 panic_memtrap(istate, PF_ACCESS_EXEC, va, NULL);
[9ad03fe]508 }
509 }
[95042fd]510}
[89298e3]511
[46321fb]512static int is_io_page_accessible(int page)
513{
[666773c]514 if (TASK->arch.iomap)
[38f6add]515 return bitmap_get(TASK->arch.iomap, page);
[666773c]516 else
517 return 0;
[46321fb]518}
519
[666773c]520/**
521 * There is special handling of memory mapped legacy io, because of 4KB sized
522 * access for userspace.
[46321fb]523 *
[5bda2f3e]524 * @param va Virtual address of page fault.
525 * @param istate Structure with saved interruption state.
526 *
527 * @return One on success, zero on failure.
[46321fb]528 *
529 */
530static int try_memmap_io_insertion(uintptr_t va, istate_t *istate)
531{
[666773c]532 if ((va >= IO_OFFSET ) && (va < IO_OFFSET + (1 << IO_PAGE_WIDTH))) {
533 if (TASK) {
534 uint64_t io_page = (va & ((1 << IO_PAGE_WIDTH) - 1)) >>
535 USPACE_IO_PAGE_WIDTH;
[5bda2f3e]536
[666773c]537 if (is_io_page_accessible(io_page)) {
538 uint64_t page, frame;
[5bda2f3e]539
[666773c]540 page = IO_OFFSET +
541 (1 << USPACE_IO_PAGE_WIDTH) * io_page;
542 frame = IO_FRAME_BASE +
543 (1 << USPACE_IO_PAGE_WIDTH) * io_page;
[5bda2f3e]544
[46321fb]545 tlb_entry_t entry;
[5bda2f3e]546
[46321fb]547 entry.word[0] = 0;
548 entry.word[1] = 0;
[5bda2f3e]549
550 entry.p = true; /* present */
551 entry.ma = MA_UNCACHEABLE;
552 entry.a = true; /* already accessed */
553 entry.d = true; /* already dirty */
[46321fb]554 entry.pl = PL_USER;
555 entry.ar = AR_READ | AR_WRITE;
[ef5de6d]556 entry.ppn = frame >> PPN_SHIFT;
[46321fb]557 entry.ps = USPACE_IO_PAGE_WIDTH;
[5bda2f3e]558
[ef5de6d]559 dtc_mapping_insert(page, TASK->as->asid, entry);
[46321fb]560 return 1;
[666773c]561 } else {
562 fault_if_from_uspace(istate,
[7e752b2]563 "IO access fault at %p.", (void *) va);
[666773c]564 }
565 }
566 }
[5bda2f3e]567
[46321fb]568 return 0;
569}
570
[9ad03fe]571/** Data TLB fault handler for faults with VHPT turned off.
[a0d74fd]572 *
[5bda2f3e]573 * @param vector Interruption vector.
574 * @param istate Structure with saved interruption state.
575 *
[a0d74fd]576 */
[7f1c620]577void alternate_data_tlb_fault(uint64_t vector, istate_t *istate)
[95042fd]578{
[93d66ef]579 if (istate->cr_isr.sp) {
[0fd9b35]580 /*
581 * Speculative load. Deffer the exception until a more clever
582 * approach can be used. Currently if we try to find the
583 * mapping for the speculative load while in the kernel, we
584 * might introduce a livelock because of the possibly invalid
585 * values of the address.
586 */
[93d66ef]587 istate->cr_ipsr.ed = true;
588 return;
589 }
590
[5bda2f3e]591 uintptr_t va = istate->cr_ifa; /* faulting address */
[0fd9b35]592 as_t *as = AS;
[a0d74fd]593
[0fd9b35]594 if (is_kernel_fault(va)) {
595 if (va < end_of_identity) {
[a0d74fd]596 /*
[0fd9b35]597 * Create kernel identity mapping for low memory.
[a0d74fd]598 */
[9ad03fe]599 dtlb_kernel_mapping_insert(va, KA2PA(va), false, 0);
[a0d74fd]600 return;
[0fd9b35]601 } else {
602 as = AS_KERNEL;
[a0d74fd]603 }
604 }
[5bda2f3e]605
606
[0fd9b35]607 pte_t *entry = page_mapping_find(as, va, true);
[5bda2f3e]608 if (entry) {
[9ad03fe]609 /*
[f47fd19]610 * The mapping was found in the software page hash table.
[9ad03fe]611 * Insert it into data translation cache.
612 */
[5bda2f3e]613 dtc_pte_copy(entry);
[9ad03fe]614 } else {
[666773c]615 if (try_memmap_io_insertion(va, istate))
616 return;
[5bda2f3e]617
[9ad03fe]618 /*
[5bda2f3e]619 * Forward the page fault to the address space page fault
[666773c]620 * handler.
[9ad03fe]621 */
[567807b1]622 if (as_page_fault(va, PF_ACCESS_READ, istate) == AS_PF_FAULT) {
[7e752b2]623 fault_if_from_uspace(istate, "Page fault at %p.",
624 (void *) va);
[c15b374]625 panic_memtrap(istate, PF_ACCESS_UNKNOWN, va, NULL);
[9ad03fe]626 }
627 }
[95042fd]628}
[89298e3]629
[9ad03fe]630/** Data nested TLB fault handler.
631 *
632 * This fault should not occur.
633 *
[5bda2f3e]634 * @param vector Interruption vector.
635 * @param istate Structure with saved interruption state.
636 *
[9ad03fe]637 */
[7f1c620]638void data_nested_tlb_fault(uint64_t vector, istate_t *istate)
[95042fd]639{
[5bda2f3e]640 ASSERT(false);
[95042fd]641}
[89298e3]642
[9ad03fe]643/** Data Dirty bit fault handler.
644 *
[5bda2f3e]645 * @param vector Interruption vector.
646 * @param istate Structure with saved interruption state.
647 *
[9ad03fe]648 */
[7f1c620]649void data_dirty_bit_fault(uint64_t vector, istate_t *istate)
[95042fd]650{
[7f1c620]651 uintptr_t va;
[9ad03fe]652 pte_t *t;
[0fd9b35]653 as_t *as = AS;
[567807b1]654
[5bda2f3e]655 va = istate->cr_ifa; /* faulting address */
656
[0fd9b35]657 if (is_kernel_fault(va))
658 as = AS_KERNEL;
659
660 t = page_mapping_find(as, va, true);
[5bda2f3e]661 ASSERT((t) && (t->p));
662 if ((t) && (t->p) && (t->w)) {
[9ad03fe]663 /*
664 * Update the Dirty bit in page tables and reinsert
665 * the mapping into DTC.
666 */
667 t->d = true;
668 dtc_pte_copy(t);
[567807b1]669 } else {
670 if (as_page_fault(va, PF_ACCESS_WRITE, istate) == AS_PF_FAULT) {
[7e752b2]671 fault_if_from_uspace(istate, "Page fault at %p.",
672 (void *) va);
[c15b374]673 panic_memtrap(istate, PF_ACCESS_WRITE, va, NULL);
[567807b1]674 }
[9ad03fe]675 }
[95042fd]676}
[89298e3]677
[9ad03fe]678/** Instruction access bit fault handler.
679 *
[5bda2f3e]680 * @param vector Interruption vector.
681 * @param istate Structure with saved interruption state.
682 *
[9ad03fe]683 */
[7f1c620]684void instruction_access_bit_fault(uint64_t vector, istate_t *istate)
[95042fd]685{
[7f1c620]686 uintptr_t va;
[5bda2f3e]687 pte_t *t;
688
689 va = istate->cr_ifa; /* faulting address */
[0fd9b35]690
691 ASSERT(!is_kernel_fault(va));
[5bda2f3e]692
[0ff03f3]693 t = page_mapping_find(AS, va, true);
[5bda2f3e]694 ASSERT((t) && (t->p));
695 if ((t) && (t->p) && (t->x)) {
[9ad03fe]696 /*
697 * Update the Accessed bit in page tables and reinsert
698 * the mapping into ITC.
699 */
700 t->a = true;
701 itc_pte_copy(t);
[567807b1]702 } else {
703 if (as_page_fault(va, PF_ACCESS_EXEC, istate) == AS_PF_FAULT) {
[7e752b2]704 fault_if_from_uspace(istate, "Page fault at %p.",
705 (void *) va);
[c15b374]706 panic_memtrap(istate, PF_ACCESS_EXEC, va, NULL);
[567807b1]707 }
[9ad03fe]708 }
[95042fd]709}
[89298e3]710
[9ad03fe]711/** Data access bit fault handler.
712 *
713 * @param vector Interruption vector.
[25d7709]714 * @param istate Structure with saved interruption state.
[5bda2f3e]715 *
[9ad03fe]716 */
[7f1c620]717void data_access_bit_fault(uint64_t vector, istate_t *istate)
[95042fd]718{
[7f1c620]719 uintptr_t va;
[9ad03fe]720 pte_t *t;
[0fd9b35]721 as_t *as = AS;
[5bda2f3e]722
723 va = istate->cr_ifa; /* faulting address */
724
[0fd9b35]725 if (is_kernel_fault(va))
726 as = AS_KERNEL;
727
728 t = page_mapping_find(as, va, true);
[5bda2f3e]729 ASSERT((t) && (t->p));
730 if ((t) && (t->p)) {
[9ad03fe]731 /*
732 * Update the Accessed bit in page tables and reinsert
733 * the mapping into DTC.
734 */
735 t->a = true;
736 dtc_pte_copy(t);
[567807b1]737 } else {
738 if (as_page_fault(va, PF_ACCESS_READ, istate) == AS_PF_FAULT) {
[7e752b2]739 fault_if_from_uspace(istate, "Page fault at %p.",
740 (void *) va);
[c15b374]741 panic_memtrap(istate, PF_ACCESS_UNKNOWN, va, NULL);
[567807b1]742 }
[9ad03fe]743 }
[89298e3]744}
745
[925be4e]746/** Data access rights fault handler.
747 *
748 * @param vector Interruption vector.
749 * @param istate Structure with saved interruption state.
[5bda2f3e]750 *
[925be4e]751 */
752void data_access_rights_fault(uint64_t vector, istate_t *istate)
753{
754 uintptr_t va;
755 pte_t *t;
[5bda2f3e]756
757 va = istate->cr_ifa; /* faulting address */
[0fd9b35]758
759 ASSERT(!is_kernel_fault(va));
[5bda2f3e]760
[925be4e]761 /*
762 * Assume a write to a read-only page.
763 */
[0ff03f3]764 t = page_mapping_find(AS, va, true);
[5bda2f3e]765 ASSERT((t) && (t->p));
[925be4e]766 ASSERT(!t->w);
767 if (as_page_fault(va, PF_ACCESS_WRITE, istate) == AS_PF_FAULT) {
[7e752b2]768 fault_if_from_uspace(istate, "Page fault at %p.",
769 (void *) va);
[c15b374]770 panic_memtrap(istate, PF_ACCESS_WRITE, va, NULL);
[925be4e]771 }
772}
773
[9ad03fe]774/** Page not present fault handler.
775 *
776 * @param vector Interruption vector.
[25d7709]777 * @param istate Structure with saved interruption state.
[5bda2f3e]778 *
[9ad03fe]779 */
[7f1c620]780void page_not_present(uint64_t vector, istate_t *istate)
[95042fd]781{
[7f1c620]782 uintptr_t va;
[9ad03fe]783 pte_t *t;
784
[5bda2f3e]785 va = istate->cr_ifa; /* faulting address */
786
[0fd9b35]787 ASSERT(!is_kernel_fault(va));
788
[0ff03f3]789 t = page_mapping_find(AS, va, true);
[9ad03fe]790 ASSERT(t);
791
792 if (t->p) {
793 /*
794 * If the Present bit is set in page hash table, just copy it
795 * and update ITC/DTC.
796 */
797 if (t->x)
798 itc_pte_copy(t);
799 else
800 dtc_pte_copy(t);
801 } else {
[567807b1]802 if (as_page_fault(va, PF_ACCESS_READ, istate) == AS_PF_FAULT) {
[7e752b2]803 fault_if_from_uspace(istate, "Page fault at %p.",
804 (void *) va);
[c15b374]805 panic_memtrap(istate, PF_ACCESS_UNKNOWN, va, NULL);
[9ad03fe]806 }
807 }
[95042fd]808}
[b45c443]809
[9979acb]810void tlb_arch_init(void)
811{
812}
813
814void tlb_print(void)
815{
816}
817
[ee289cf0]818/** @}
[b45c443]819 */
Note: See TracBrowser for help on using the repository browser.