diff options
author | David S. Miller <davem@davemloft.net> | 2011-09-29 12:18:59 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2011-09-29 12:18:59 -0700 |
commit | f4142cba4e4065a416e78ade905bea29ff3930e6 (patch) | |
tree | fa0bcfecd234735bfb95b8c6c9c784fad43c3e2f /arch/m68k | |
parent | 11032c17bd3f96a4319e4415c07fc791525b79fd (diff) |
sparc64: Force the execute bit in OpenFirmware's translation entries.
In the OF 'translations' property, the template TTEs in the mappings
never specify the executable bit. This is the case even though some
of these mappings are for OF's code segment.
Therefore, we need to force the execute bit on in every mapping.
This problem can only really trigger on Niagara/sun4v machines and the
history behind this is a little complicated.
Previous to sun4v, the sun4u TTE entries lacked a hardware execute
permission bit. So OF didn't have to ever worry about setting
anything to handle executable pages. Any valid TTE loaded into the
I-TLB would be respected by the chip.
But sun4v Niagara chips have a real hardware enforced executable bit
in their TTEs. So it has to be set or else the I-TLB throws an
instruction access exception with type code 6 (protection violation).
We've been extremely fortunate to not get bitten by this in the past.
The best I can tell is that the OF's mappings for it's executable code
were mapped using permanent locked mappings on sun4v in the past.
Therefore, the fact that we didn't have the exec bit set in the OF
translations we would use did not matter in practice.
Thanks to Greg Onufer for helping me track this down.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'arch/m68k')
0 files changed, 0 insertions, 0 deletions