Home | History | Annotate | Line # | Download | only in hppa
      1  1.128     skrll /*	$NetBSD: trap.c,v 1.128 2025/09/19 18:06:37 skrll Exp $	*/
      2    1.1  fredette 
      3    1.1  fredette /*-
      4    1.1  fredette  * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
      5    1.1  fredette  * All rights reserved.
      6    1.1  fredette  *
      7    1.1  fredette  * This code is derived from software contributed to The NetBSD Foundation
      8    1.1  fredette  * by Matthew Fredette.
      9    1.1  fredette  *
     10    1.1  fredette  * Redistribution and use in source and binary forms, with or without
     11    1.1  fredette  * modification, are permitted provided that the following conditions
     12    1.1  fredette  * are met:
     13    1.1  fredette  * 1. Redistributions of source code must retain the above copyright
     14    1.1  fredette  *    notice, this list of conditions and the following disclaimer.
     15    1.1  fredette  * 2. Redistributions in binary form must reproduce the above copyright
     16    1.1  fredette  *    notice, this list of conditions and the following disclaimer in the
     17    1.1  fredette  *    documentation and/or other materials provided with the distribution.
     18    1.1  fredette  *
     19    1.1  fredette  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20    1.1  fredette  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21    1.1  fredette  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22    1.1  fredette  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23    1.1  fredette  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24    1.1  fredette  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25    1.1  fredette  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26    1.1  fredette  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27    1.1  fredette  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28    1.1  fredette  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29    1.1  fredette  * POSSIBILITY OF SUCH DAMAGE.
     30    1.1  fredette  */
     31    1.1  fredette 
     32    1.1  fredette /*	$OpenBSD: trap.c,v 1.30 2001/09/19 20:50:56 mickey Exp $	*/
     33    1.1  fredette 
     34    1.1  fredette /*
     35   1.60       snj  * Copyright (c) 1998-2004 Michael Shalayeff
     36    1.1  fredette  * All rights reserved.
     37    1.1  fredette  *
     38    1.1  fredette  * Redistribution and use in source and binary forms, with or without
     39    1.1  fredette  * modification, are permitted provided that the following conditions
     40    1.1  fredette  * are met:
     41    1.1  fredette  * 1. Redistributions of source code must retain the above copyright
     42    1.1  fredette  *    notice, this list of conditions and the following disclaimer.
     43    1.1  fredette  * 2. Redistributions in binary form must reproduce the above copyright
     44    1.1  fredette  *    notice, this list of conditions and the following disclaimer in the
     45    1.1  fredette  *    documentation and/or other materials provided with the distribution.
     46    1.1  fredette  *
     47    1.1  fredette  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     48    1.1  fredette  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     49    1.1  fredette  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     50   1.60       snj  * IN NO EVENT SHALL THE AUTHOR OR HIS RELATIVES BE LIABLE FOR ANY DIRECT,
     51   1.60       snj  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     52   1.60       snj  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     53   1.60       snj  * SERVICES; LOSS OF MIND, USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     54   1.60       snj  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
     55   1.60       snj  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
     56   1.60       snj  * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
     57   1.60       snj  * THE POSSIBILITY OF SUCH DAMAGE.
     58    1.1  fredette  */
     59    1.8     lukem 
     60    1.8     lukem #include <sys/cdefs.h>
     61  1.128     skrll __KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.128 2025/09/19 18:06:37 skrll Exp $");
     62    1.1  fredette 
     63    1.1  fredette /* #define INTRDEBUG */
     64    1.1  fredette /* #define TRAPDEBUG */
     65    1.1  fredette /* #define USERTRACE */
     66    1.1  fredette 
     67    1.1  fredette #include "opt_kgdb.h"
     68   1.51     skrll #include "opt_ptrace.h"
     69    1.1  fredette 
     70    1.1  fredette #include <sys/param.h>
     71    1.1  fredette #include <sys/systm.h>
     72    1.1  fredette #include <sys/kernel.h>
     73    1.1  fredette #include <sys/syscall.h>
     74   1.57        ad #include <sys/syscallvar.h>
     75   1.40        ad #include <sys/mutex.h>
     76    1.1  fredette #include <sys/ktrace.h>
     77    1.1  fredette #include <sys/proc.h>
     78    1.1  fredette #include <sys/signalvar.h>
     79    1.1  fredette #include <sys/acct.h>
     80    1.1  fredette #include <sys/signal.h>
     81    1.1  fredette #include <sys/device.h>
     82  1.107    martin #include <sys/kauth.h>
     83   1.88     rmind #include <sys/kmem.h>
     84   1.20       chs #include <sys/userret.h>
     85    1.1  fredette 
     86    1.1  fredette #ifdef KGDB
     87    1.1  fredette #include <sys/kgdb.h>
     88    1.1  fredette #endif
     89    1.1  fredette 
     90    1.1  fredette #include <uvm/uvm.h>
     91    1.1  fredette 
     92    1.1  fredette #include <machine/iomod.h>
     93    1.1  fredette #include <machine/cpufunc.h>
     94    1.1  fredette #include <machine/reg.h>
     95    1.1  fredette #include <machine/autoconf.h>
     96    1.1  fredette 
     97    1.1  fredette #include <machine/db_machdep.h>
     98    1.1  fredette 
     99    1.1  fredette #include <hppa/hppa/machdep.h>
    100    1.1  fredette 
    101    1.1  fredette #include <ddb/db_output.h>
    102   1.19       chs #include <ddb/db_interface.h>
    103    1.1  fredette 
    104   1.51     skrll #ifdef PTRACE
    105   1.51     skrll void ss_clear_breakpoints(struct lwp *l);
    106   1.51     skrll int ss_put_value(struct lwp *, vaddr_t, u_int);
    107   1.51     skrll int ss_get_value(struct lwp *, vaddr_t, u_int *);
    108   1.51     skrll 
    109   1.51     skrll /* single-step breakpoint */
    110   1.51     skrll #define SSBREAKPOINT   (HPPA_BREAK_KERNEL | (HPPA_BREAK_SS << 13))
    111   1.51     skrll 
    112   1.87     skrll #endif
    113   1.87     skrll 
    114    1.1  fredette #if defined(DEBUG) || defined(DIAGNOSTIC)
    115    1.1  fredette /*
    116    1.1  fredette  * 0x6fc1000 is a stwm r1, d(sr0, sp), which is the last
    117    1.1  fredette  * instruction in the function prologue that gcc -O0 uses.
    118    1.1  fredette  * When we have this instruction we know the relationship
    119  1.111     skrll  * between the stack pointer and the gcc -O0 frame pointer
    120    1.1  fredette  * (in r3, loaded with the initial sp) for the body of a
    121    1.1  fredette  * function.
    122    1.1  fredette  *
    123    1.1  fredette  * If the given instruction is a stwm r1, d(sr0, sp) where
    124    1.1  fredette  * d > 0, we evaluate to d, else we evaluate to zero.
    125    1.1  fredette  */
    126    1.1  fredette #define STWM_R1_D_SR0_SP(inst) \
    127    1.1  fredette 	(((inst) & 0xffffc001) == 0x6fc10000 ? (((inst) & 0x00003ff) >> 1) : 0)
    128    1.1  fredette #endif /* DEBUG || DIAGNOSTIC */
    129    1.1  fredette 
    130    1.1  fredette const char *trap_type[] = {
    131    1.1  fredette 	"invalid",
    132    1.1  fredette 	"HPMC",
    133    1.1  fredette 	"power failure",
    134    1.1  fredette 	"recovery counter",
    135    1.1  fredette 	"external interrupt",
    136    1.1  fredette 	"LPMC",
    137    1.1  fredette 	"ITLB miss fault",
    138    1.1  fredette 	"instruction protection",
    139    1.1  fredette 	"Illegal instruction",
    140    1.1  fredette 	"break instruction",
    141    1.1  fredette 	"privileged operation",
    142    1.1  fredette 	"privileged register",
    143    1.1  fredette 	"overflow",
    144    1.1  fredette 	"conditional",
    145    1.1  fredette 	"assist exception",
    146    1.1  fredette 	"DTLB miss",
    147    1.1  fredette 	"ITLB non-access miss",
    148    1.1  fredette 	"DTLB non-access miss",
    149    1.1  fredette 	"data protection/rights/alignment",
    150    1.1  fredette 	"data break",
    151    1.1  fredette 	"TLB dirty",
    152    1.1  fredette 	"page reference",
    153    1.1  fredette 	"assist emulation",
    154    1.1  fredette 	"higher-priv transfer",
    155    1.1  fredette 	"lower-priv transfer",
    156    1.1  fredette 	"taken branch",
    157    1.1  fredette 	"data access rights",
    158    1.1  fredette 	"data protection",
    159    1.1  fredette 	"unaligned data ref",
    160    1.1  fredette };
    161   1.72     skrll int trap_types = __arraycount(trap_type);
    162    1.1  fredette 
    163   1.23       chs uint8_t fpopmap[] = {
    164   1.23       chs 	0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x00,
    165   1.23       chs 	0x00, 0x0c, 0x00, 0x0e, 0x00, 0x00, 0x00, 0x00,
    166   1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    167   1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    168   1.23       chs 	0x00, 0x00, 0x00, 0x26, 0x00, 0x00, 0x00, 0x00,
    169   1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    170   1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    171   1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    172   1.23       chs };
    173   1.23       chs 
    174   1.14       chs void pmap_hptdump(void);
    175   1.14       chs void syscall(struct trapframe *, int *);
    176    1.1  fredette 
    177   1.53     skrll #if defined(DEBUG)
    178   1.53     skrll struct trapframe *sanity_frame;
    179   1.53     skrll struct lwp *sanity_lwp;
    180   1.81     skrll const char *sanity_string;
    181   1.81     skrll void frame_sanity_check(const char *, int, int, struct trapframe *,
    182   1.81     skrll     struct lwp *);
    183   1.53     skrll #endif
    184   1.53     skrll 
    185   1.53     skrll 
    186    1.1  fredette #ifdef USERTRACE
    187    1.1  fredette /*
    188   1.82     skrll  * USERTRACE is a crude facility that traces the PC of a single user process.
    189   1.82     skrll  * This tracing is normally activated by the dispatching of a certain syscall
    190   1.82     skrll  * with certain arguments - see the activation code in syscall().
    191    1.1  fredette  */
    192   1.53     skrll static void user_backtrace(struct trapframe *, struct lwp *, int);
    193   1.53     skrll static void user_backtrace_raw(u_int, u_int);
    194   1.53     skrll 
    195    1.1  fredette u_int rctr_next_iioq;
    196    1.1  fredette #endif
    197    1.1  fredette 
    198   1.30     perry static inline void
    199  1.114     skrll userret(struct lwp *l, struct trapframe *tf)
    200    1.1  fredette {
    201    1.9       chs 	struct proc *p = l->l_proc;
    202  1.114     skrll 	int oticks = 0; /* XXX why zero? */
    203    1.1  fredette 
    204  1.113        ad 	do {
    205  1.113        ad 		l->l_md.md_astpending = 0;
    206  1.113        ad 		//curcpu()->ci_data.cpu_nast++;
    207  1.113        ad 		mi_userret(l);
    208  1.113        ad 	} while (l->l_md.md_astpending);
    209   1.20       chs 
    210    1.1  fredette 	/*
    211    1.1  fredette 	 * If profiling, charge recent system time to the trapped pc.
    212    1.1  fredette 	 */
    213   1.40        ad 	if (p->p_stflag & PST_PROFIL) {
    214    1.1  fredette 		extern int psratio;
    215    1.1  fredette 
    216  1.114     skrll 		addupc_task(l, tf->tf_iioq_head,
    217  1.114     skrll 		    (int)(p->p_sticks - oticks) * psratio);
    218    1.1  fredette 	}
    219    1.1  fredette }
    220    1.1  fredette 
    221    1.1  fredette /*
    222    1.1  fredette  * This handles some messy kernel debugger details.
    223    1.1  fredette  * It dispatches into either kgdb or DDB, and knows
    224    1.1  fredette  * about some special things to do, like skipping over
    225    1.1  fredette  * break instructions and how to really set up for
    226    1.1  fredette  * a single-step.
    227    1.1  fredette  */
    228    1.1  fredette #if defined(KGDB) || defined(DDB)
    229    1.1  fredette static int
    230    1.1  fredette trap_kdebug(int type, int code, struct trapframe *frame)
    231    1.1  fredette {
    232    1.1  fredette 	int handled;
    233    1.1  fredette 	u_int tf_iioq_head_old;
    234    1.1  fredette 	u_int tf_iioq_tail_old;
    235    1.1  fredette 
    236   1.89     skrll 	for (;;) {
    237    1.1  fredette 
    238    1.1  fredette 		/* This trap has not been handled. */
    239    1.1  fredette 		handled = 0;
    240    1.1  fredette 
    241    1.1  fredette 		/* Remember the instruction offset queue. */
    242    1.1  fredette 		tf_iioq_head_old = frame->tf_iioq_head;
    243    1.1  fredette 		tf_iioq_tail_old = frame->tf_iioq_tail;
    244    1.1  fredette 
    245    1.1  fredette #ifdef	KGDB
    246    1.1  fredette 		/* Let KGDB handle it (if connected) */
    247    1.1  fredette 		if (!handled)
    248    1.1  fredette 			handled = kgdb_trap(type, frame);
    249    1.1  fredette #endif
    250    1.1  fredette #ifdef	DDB
    251    1.1  fredette 		/* Let DDB handle it. */
    252    1.1  fredette 		if (!handled)
    253    1.1  fredette 			handled = kdb_trap(type, code, frame);
    254    1.1  fredette #endif
    255    1.1  fredette 
    256    1.1  fredette 		/* If this trap wasn't handled, return now. */
    257    1.1  fredette 		if (!handled)
    258    1.1  fredette 			return(0);
    259    1.1  fredette 
    260    1.1  fredette 		/*
    261   1.77     skrll 		 * If the instruction offset queue head changed, but the offset
    262   1.77     skrll 		 * queue tail didn't, assume that the user wants to jump to the
    263   1.77     skrll 		 * head offset, and adjust the tail accordingly.  This should
    264   1.77     skrll 		 * fix the kgdb `jump' command, and can help DDB users who `set'
    265   1.77     skrll 		 * the offset head but forget the tail.
    266    1.1  fredette 		 */
    267    1.1  fredette 		if (frame->tf_iioq_head != tf_iioq_head_old &&
    268    1.1  fredette 		    frame->tf_iioq_tail == tf_iioq_tail_old)
    269    1.1  fredette 			frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    270    1.1  fredette 
    271    1.1  fredette 		/*
    272   1.77     skrll 		 * This is some single-stepping support.  If we're trying to
    273   1.77     skrll 		 * step through a nullified instruction, just advance by hand
    274   1.77     skrll 		 * and trap again.  Otherwise, load the recovery counter with
    275   1.77     skrll 		 * zero.
    276    1.1  fredette 		 */
    277    1.1  fredette 		if (frame->tf_ipsw & PSW_R) {
    278    1.1  fredette #ifdef TRAPDEBUG
    279   1.44     skrll 			printf("(single stepping at head 0x%x tail 0x%x)\n",
    280   1.44     skrll 			    frame->tf_iioq_head, frame->tf_iioq_tail);
    281    1.1  fredette #endif
    282    1.1  fredette 			if (frame->tf_ipsw & PSW_N) {
    283    1.1  fredette #ifdef TRAPDEBUG
    284    1.1  fredette 				printf("(single stepping past nullified)\n");
    285    1.1  fredette #endif
    286    1.1  fredette 
    287    1.1  fredette 				/* Advance the program counter. */
    288    1.1  fredette 				frame->tf_iioq_head = frame->tf_iioq_tail;
    289    1.1  fredette 				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    290    1.1  fredette 
    291    1.1  fredette 				/* Clear flags. */
    292    1.1  fredette 				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
    293    1.1  fredette 
    294    1.1  fredette 				/* Simulate another trap. */
    295    1.1  fredette 				type = T_RECOVERY;
    296    1.1  fredette 				continue;
    297    1.1  fredette 			}
    298    1.1  fredette 			frame->tf_rctr = 0;
    299    1.1  fredette 		}
    300  1.111     skrll 
    301    1.1  fredette 		/* We handled this trap. */
    302    1.1  fredette 		return (1);
    303    1.1  fredette 	}
    304    1.1  fredette 	/* NOTREACHED */
    305    1.1  fredette }
    306    1.1  fredette #else	/* !KGDB && !DDB */
    307    1.1  fredette #define trap_kdebug(t, c, f)	(0)
    308    1.1  fredette #endif	/* !KGDB && !DDB */
    309    1.1  fredette 
    310   1.24   tsutsui #if defined(DEBUG) || defined(USERTRACE)
    311    1.1  fredette /*
    312   1.77     skrll  * These functions give a crude usermode backtrace.  They really only work when
    313   1.77     skrll  * code has been compiled without optimization, as they assume a certain func-
    314   1.77     skrll  * tion prologue sets up a frame pointer and stores the return pointer and arg-
    315   1.77     skrll  * uments in it.
    316    1.1  fredette  */
    317    1.1  fredette static void
    318    1.1  fredette user_backtrace_raw(u_int pc, u_int fp)
    319    1.1  fredette {
    320    1.1  fredette 	int frame_number;
    321    1.1  fredette 	int arg_number;
    322  1.109   thorpej 	uint32_t val;
    323    1.1  fredette 
    324  1.111     skrll 	for (frame_number = 0;
    325    1.3  fredette 	     frame_number < 100 && pc > HPPA_PC_PRIV_MASK && fp;
    326    1.3  fredette 	     frame_number++) {
    327    1.3  fredette 
    328  1.111     skrll 		printf("%3d: pc=%08x%s fp=0x%08x", frame_number,
    329   1.44     skrll 		    pc & ~HPPA_PC_PRIV_MASK, USERMODE(pc) ? "  " : "**", fp);
    330  1.109   thorpej 		for (arg_number = 0; arg_number < 4; arg_number++) {
    331  1.109   thorpej 			if (ufetch_32(HPPA_FRAME_CARG(arg_number, fp),
    332  1.109   thorpej 				      &val) == 0) {
    333  1.109   thorpej 				printf(" arg%d=0x%08x", arg_number, val);
    334  1.109   thorpej 			} else {
    335  1.109   thorpej 				printf(" arg%d=<bad address>", arg_number);
    336  1.109   thorpej 			}
    337  1.109   thorpej 		}
    338    1.1  fredette 		printf("\n");
    339  1.109   thorpej 		if (ufetch_int((((uint32_t *) fp) - 5), &pc) != 0) {
    340  1.109   thorpej 			printf("  ufetch for pc failed\n");
    341    1.1  fredette 			break;
    342    1.1  fredette 		}
    343  1.109   thorpej 		if (ufetch_int((((uint32_t *) fp) + 0), &fp) != 0) {
    344  1.109   thorpej 			printf("  ufetch for fp failed\n");
    345    1.1  fredette 			break;
    346    1.1  fredette 		}
    347    1.1  fredette 	}
    348    1.1  fredette 	printf("  backtrace stopped with pc %08x fp 0x%08x\n", pc, fp);
    349    1.1  fredette }
    350    1.1  fredette 
    351    1.1  fredette static void
    352    1.9       chs user_backtrace(struct trapframe *tf, struct lwp *l, int type)
    353    1.1  fredette {
    354    1.9       chs 	struct proc *p = l->l_proc;
    355    1.1  fredette 	u_int pc, fp, inst;
    356    1.1  fredette 
    357    1.1  fredette 	/*
    358    1.3  fredette 	 * Display any trap type that we have.
    359    1.3  fredette 	 */
    360    1.3  fredette 	if (type >= 0)
    361  1.111     skrll 		printf("pid %d (%s) trap #%d\n",
    362    1.3  fredette 		    p->p_pid, p->p_comm, type & ~T_USER);
    363    1.3  fredette 
    364    1.3  fredette 	/*
    365    1.1  fredette 	 * Assuming that the frame pointer in r3 is valid,
    366    1.1  fredette 	 * dump out a stack trace.
    367    1.1  fredette 	 */
    368    1.1  fredette 	fp = tf->tf_r3;
    369    1.1  fredette 	printf("pid %d (%s) backtrace, starting with fp 0x%08x\n",
    370    1.1  fredette 		p->p_pid, p->p_comm, fp);
    371    1.1  fredette 	user_backtrace_raw(tf->tf_iioq_head, fp);
    372    1.1  fredette 
    373    1.1  fredette 	/*
    374   1.82     skrll 	 * In case the frame pointer in r3 is not valid, assuming the stack
    375   1.82     skrll 	 * pointer is valid and the faulting function is a non-leaf, if we can
    376   1.82     skrll 	 * find its prologue we can recover its frame pointer.
    377    1.1  fredette 	 */
    378    1.1  fredette 	pc = tf->tf_iioq_head;
    379    1.1  fredette 	fp = tf->tf_sp - HPPA_FRAME_SIZE;
    380    1.1  fredette 	printf("pid %d (%s) backtrace, starting with sp 0x%08x pc 0x%08x\n",
    381   1.82     skrll 	    p->p_pid, p->p_comm, tf->tf_sp, pc);
    382   1.44     skrll 	for (pc &= ~HPPA_PC_PRIV_MASK; pc > 0; pc -= sizeof(inst)) {
    383  1.109   thorpej 		if (ufetch_int((u_int *) pc, &inst) != 0) {
    384  1.109   thorpej 			printf("  ufetch for inst at pc %08x failed\n", pc);
    385    1.1  fredette 			break;
    386    1.1  fredette 		}
    387    1.1  fredette 		/* Check for the prologue instruction that sets sp. */
    388    1.1  fredette 		if (STWM_R1_D_SR0_SP(inst)) {
    389    1.1  fredette 			fp = tf->tf_sp - STWM_R1_D_SR0_SP(inst);
    390    1.1  fredette 			printf("  sp from fp at pc %08x: %08x\n", pc, inst);
    391    1.1  fredette 			break;
    392    1.1  fredette 		}
    393    1.1  fredette 	}
    394    1.1  fredette 	user_backtrace_raw(tf->tf_iioq_head, fp);
    395    1.1  fredette }
    396   1.24   tsutsui #endif /* DEBUG || USERTRACE */
    397    1.1  fredette 
    398    1.1  fredette #ifdef DEBUG
    399    1.1  fredette /*
    400   1.82     skrll  * This sanity-checks a trapframe.  It is full of various assumptions about
    401   1.82     skrll  * what a healthy CPU state should be, with some documented elsewhere, some not.
    402    1.1  fredette  */
    403    1.1  fredette void
    404   1.81     skrll frame_sanity_check(const char *func, int line, int type, struct trapframe *tf,
    405   1.81     skrll     struct lwp *l)
    406    1.1  fredette {
    407   1.94     skrll #if 0
    408    1.1  fredette 	extern int kernel_text;
    409    1.1  fredette 	extern int etext;
    410   1.94     skrll #endif
    411   1.96     skrll 	struct cpu_info *ci = curcpu();
    412   1.62     rmind 
    413    1.1  fredette #define SANITY(e)					\
    414    1.1  fredette do {							\
    415    1.1  fredette 	if (sanity_frame == NULL && !(e)) {		\
    416    1.1  fredette 		sanity_frame = tf;			\
    417    1.9       chs 		sanity_lwp = l;				\
    418   1.81     skrll 		sanity_string = #e;			\
    419    1.1  fredette 	}						\
    420    1.1  fredette } while (/* CONSTCOND */ 0)
    421    1.1  fredette 
    422   1.79     skrll 	KASSERT(l != NULL);
    423   1.96     skrll 	SANITY((tf->tf_ipsw & ci->ci_psw) == ci->ci_psw);
    424   1.96     skrll 	SANITY((ci->ci_psw & PSW_I) == 0 || tf->tf_eiem != 0);
    425    1.1  fredette 	if (tf->tf_iisq_head == HPPA_SID_KERNEL) {
    426   1.62     rmind 		vaddr_t minsp, maxsp, uv;
    427   1.45     skrll 
    428   1.63     skrll 		uv = uvm_lwp_getuarea(l);
    429   1.63     skrll 
    430    1.1  fredette 		/*
    431   1.82     skrll 		 * If the trap happened in the gateway page, we take the easy
    432   1.82     skrll 		 * way out and assume that the trapframe is okay.
    433    1.1  fredette 		 */
    434   1.45     skrll 		if ((tf->tf_iioq_head & ~PAGE_MASK) == SYSCALLGATE)
    435   1.45     skrll 			goto out;
    436   1.45     skrll 
    437   1.45     skrll 		SANITY(!USERMODE(tf->tf_iioq_head));
    438   1.45     skrll 		SANITY(!USERMODE(tf->tf_iioq_tail));
    439   1.45     skrll 
    440   1.45     skrll 		/*
    441   1.45     skrll 		 * Don't check the instruction queues or stack on interrupts
    442  1.116   msaitoh 		 * as we could be in the sti code (outside normal kernel
    443   1.45     skrll 		 * text) or switching LWPs (curlwp and sp are not in sync)
    444   1.45     skrll 		 */
    445   1.45     skrll 		if ((type & ~T_USER) == T_INTERRUPT)
    446   1.45     skrll 			goto out;
    447   1.94     skrll #if 0
    448   1.45     skrll 		SANITY(tf->tf_iioq_head >= (u_int) &kernel_text);
    449   1.45     skrll 		SANITY(tf->tf_iioq_head < (u_int) &etext);
    450   1.45     skrll 		SANITY(tf->tf_iioq_tail >= (u_int) &kernel_text);
    451   1.45     skrll 		SANITY(tf->tf_iioq_tail < (u_int) &etext);
    452   1.94     skrll #endif
    453   1.43      yamt 
    454   1.62     rmind 		maxsp = uv + USPACE + PAGE_SIZE;
    455   1.62     rmind 		minsp = uv + PAGE_SIZE;
    456   1.43      yamt 
    457   1.79     skrll 		SANITY(tf->tf_sp >= minsp && tf->tf_sp < maxsp);
    458    1.1  fredette 	} else {
    459   1.79     skrll 		struct pcb *pcb = lwp_getpcb(l);
    460   1.71     skrll 
    461    1.1  fredette 		SANITY(USERMODE(tf->tf_iioq_head));
    462    1.1  fredette 		SANITY(USERMODE(tf->tf_iioq_tail));
    463   1.79     skrll 		SANITY(tf->tf_cr30 == (u_int)pcb->pcb_fpregs);
    464    1.1  fredette 	}
    465    1.1  fredette #undef SANITY
    466   1.45     skrll out:
    467    1.1  fredette 	if (sanity_frame == tf) {
    468   1.90     skrll 		printf("insanity: '%s' at %s:%d type 0x%x tf %p lwp %p "
    469   1.90     skrll 		    "sp 0x%x pc 0x%x\n",
    470   1.90     skrll 		    sanity_string, func, line, type, sanity_frame, sanity_lwp,
    471   1.90     skrll 		    tf->tf_sp, tf->tf_iioq_head);
    472    1.4  fredette 		(void) trap_kdebug(T_IBREAK, 0, tf);
    473    1.1  fredette 		sanity_frame = NULL;
    474    1.9       chs 		sanity_lwp = NULL;
    475    1.1  fredette 	}
    476    1.1  fredette }
    477    1.1  fredette #endif /* DEBUG */
    478    1.1  fredette 
    479  1.119     skrll 
    480  1.119     skrll #define __PABITS(x, y)		__BITS(31 - (x), 31 - (y))
    481  1.119     skrll #define __PABIT(x)		__BIT(31 - (x))
    482  1.119     skrll 
    483  1.128     skrll #define LPA_MASK					  \
    484  1.128     skrll      (				__PABITS(0, 5)		| \
    485  1.128     skrll 				__PABITS(18, 25))
    486  1.128     skrll #define LPA						  \
    487  1.128     skrll      (__SHIFTIN(1,		__PABITS(0, 5))		| \
    488  1.128     skrll       __SHIFTIN(0x4d,		__PABITS(18, 25)))
    489  1.128     skrll 
    490  1.128     skrll 
    491  1.128     skrll #define PROBE_ENCS		(0x46 | 0xc6 | 0x47 | 0xc7)
    492  1.128     skrll #define PROBE_PL		__PABITS(11, 15)
    493  1.128     skrll #define PROBE_IMMED		__PABIT(18)
    494  1.128     skrll #define PROBE_RW		__PABIT(25)
    495  1.128     skrll 
    496  1.128     skrll #define PROBE_MASK					  \
    497  1.128     skrll     ((				__PABITS(0, 5)		| \
    498  1.128     skrll 				__PABITS(18, 25)	| \
    499  1.128     skrll 				__PABIT(26))		^ \
    500  1.119     skrll      (PROBE_IMMED | PROBE_RW))
    501  1.119     skrll 
    502  1.128     skrll #define PROBE						  \
    503  1.128     skrll     ((__SHIFTIN(1,		__PABITS(0, 5))		| \
    504  1.128     skrll       __SHIFTIN(PROBE_ENCS,	__PABITS(18, 25))	| \
    505  1.128     skrll       __SHIFTIN(0,		__PABIT(26)))		^ \
    506  1.119     skrll      (PROBE_IMMED | PROBE_RW))
    507  1.119     skrll 
    508  1.128     skrll #define PLMASK			__BITS(1, 0)
    509  1.126     skrll 
    510  1.126     skrll 
    511  1.119     skrll /* for hppa64 */
    512  1.119     skrll CTASSERT(sizeof(register_t) == sizeof(u_int));
    513  1.119     skrll size_t hppa_regmap[] = {
    514  1.119     skrll 	0,	/* r0 is special case */
    515  1.119     skrll 	offsetof(struct trapframe, tf_r1  ) / sizeof(register_t),
    516  1.119     skrll 	offsetof(struct trapframe, tf_rp  ) / sizeof(register_t),
    517  1.119     skrll 	offsetof(struct trapframe, tf_r3  ) / sizeof(register_t),
    518  1.119     skrll 	offsetof(struct trapframe, tf_r4  ) / sizeof(register_t),
    519  1.119     skrll 	offsetof(struct trapframe, tf_r5  ) / sizeof(register_t),
    520  1.119     skrll 	offsetof(struct trapframe, tf_r6  ) / sizeof(register_t),
    521  1.119     skrll 	offsetof(struct trapframe, tf_r7  ) / sizeof(register_t),
    522  1.119     skrll 	offsetof(struct trapframe, tf_r8  ) / sizeof(register_t),
    523  1.119     skrll 	offsetof(struct trapframe, tf_r9  ) / sizeof(register_t),
    524  1.119     skrll 	offsetof(struct trapframe, tf_r10 ) / sizeof(register_t),
    525  1.119     skrll 	offsetof(struct trapframe, tf_r11 ) / sizeof(register_t),
    526  1.119     skrll 	offsetof(struct trapframe, tf_r12 ) / sizeof(register_t),
    527  1.119     skrll 	offsetof(struct trapframe, tf_r13 ) / sizeof(register_t),
    528  1.119     skrll 	offsetof(struct trapframe, tf_r14 ) / sizeof(register_t),
    529  1.119     skrll 	offsetof(struct trapframe, tf_r15 ) / sizeof(register_t),
    530  1.119     skrll 	offsetof(struct trapframe, tf_r16 ) / sizeof(register_t),
    531  1.119     skrll 	offsetof(struct trapframe, tf_r17 ) / sizeof(register_t),
    532  1.119     skrll 	offsetof(struct trapframe, tf_r18 ) / sizeof(register_t),
    533  1.119     skrll 	offsetof(struct trapframe, tf_t4  ) / sizeof(register_t),
    534  1.119     skrll 	offsetof(struct trapframe, tf_t3  ) / sizeof(register_t),
    535  1.119     skrll 	offsetof(struct trapframe, tf_t2  ) / sizeof(register_t),
    536  1.119     skrll 	offsetof(struct trapframe, tf_t1  ) / sizeof(register_t),
    537  1.119     skrll 	offsetof(struct trapframe, tf_arg3) / sizeof(register_t),
    538  1.119     skrll 	offsetof(struct trapframe, tf_arg2) / sizeof(register_t),
    539  1.119     skrll 	offsetof(struct trapframe, tf_arg1) / sizeof(register_t),
    540  1.119     skrll 	offsetof(struct trapframe, tf_arg0) / sizeof(register_t),
    541  1.119     skrll 	offsetof(struct trapframe, tf_dp  ) / sizeof(register_t),
    542  1.119     skrll 	offsetof(struct trapframe, tf_ret0) / sizeof(register_t),
    543  1.119     skrll 	offsetof(struct trapframe, tf_ret1) / sizeof(register_t),
    544  1.119     skrll 	offsetof(struct trapframe, tf_sp  ) / sizeof(register_t),
    545  1.119     skrll 	offsetof(struct trapframe, tf_r31 ) / sizeof(register_t),
    546  1.119     skrll };
    547  1.119     skrll 
    548  1.119     skrll 
    549  1.119     skrll static inline register_t
    550  1.119     skrll tf_getregno(struct trapframe *tf, u_int regno)
    551  1.119     skrll {
    552  1.119     skrll 	register_t *tf_reg = (register_t *)tf;
    553  1.119     skrll 	if (regno == 0)
    554  1.119     skrll 		return 0;
    555  1.119     skrll 	else
    556  1.119     skrll 		return tf_reg[hppa_regmap[regno]];
    557  1.119     skrll }
    558  1.119     skrll 
    559  1.119     skrll static inline void
    560  1.119     skrll tf_setregno(struct trapframe *tf, u_int regno, register_t val)
    561  1.119     skrll {
    562  1.119     skrll 	register_t *tf_reg = (register_t *)tf;
    563  1.119     skrll 	if (regno == 0)
    564  1.119     skrll 		return;
    565  1.119     skrll 	else
    566  1.119     skrll 		tf_reg[hppa_regmap[regno]] = val;
    567  1.119     skrll }
    568  1.119     skrll 
    569    1.1  fredette void
    570   1.14       chs trap(int type, struct trapframe *frame)
    571    1.1  fredette {
    572   1.13   tsutsui 	struct lwp *l;
    573   1.13   tsutsui 	struct proc *p;
    574   1.61     rmind 	struct pcb *pcb;
    575    1.9       chs 	vaddr_t va;
    576    1.9       chs 	struct vm_map *map;
    577    1.1  fredette 	struct vmspace *vm;
    578    1.9       chs 	vm_prot_t vftype;
    579    1.9       chs 	pa_space_t space;
    580   1.22       chs 	ksiginfo_t ksi;
    581   1.19       chs 	u_int opcode, onfault;
    582    1.1  fredette 	int ret;
    583   1.73     skrll 	const char *tts = "reserved";
    584   1.67     skrll 	int trapnum;
    585    1.1  fredette #ifdef DIAGNOSTIC
    586    1.1  fredette 	extern int emergency_stack_start, emergency_stack_end;
    587   1.85     skrll 	struct cpu_info *ci = curcpu();
    588   1.85     skrll 	int oldcpl = ci->ci_cpl;
    589    1.1  fredette #endif
    590    1.1  fredette 
    591   1.67     skrll 	trapnum = type & ~T_USER;
    592    1.1  fredette 	opcode = frame->tf_iir;
    593   1.84     skrll 
    594   1.84     skrll 	if (trapnum <= T_EXCEPTION || trapnum == T_HIGHERPL ||
    595   1.84     skrll 	    trapnum == T_LOWERPL || trapnum == T_TAKENBR ||
    596   1.84     skrll 	    trapnum == T_IDEBUG || trapnum == T_PERFMON) {
    597    1.1  fredette 		va = frame->tf_iioq_head;
    598    1.1  fredette 		space = frame->tf_iisq_head;
    599   1.17       chs 		vftype = VM_PROT_EXECUTE;
    600    1.1  fredette 	} else {
    601    1.1  fredette 		va = frame->tf_ior;
    602    1.1  fredette 		space = frame->tf_isr;
    603    1.1  fredette 		vftype = inst_store(opcode) ? VM_PROT_WRITE : VM_PROT_READ;
    604    1.1  fredette 	}
    605   1.13   tsutsui 
    606   1.64     skrll 	KASSERT(curlwp != NULL);
    607   1.18       chs 	l = curlwp;
    608   1.64     skrll 	p = l->l_proc;
    609    1.1  fredette 
    610    1.1  fredette #ifdef DIAGNOSTIC
    611    1.1  fredette 	/*
    612    1.1  fredette 	 * If we are on the emergency stack, then we either got
    613    1.1  fredette 	 * a fault on the kernel stack, or we're just handling
    614  1.111     skrll 	 * a trap for the machine check handler (which also
    615    1.1  fredette 	 * runs on the emergency stack).
    616    1.1  fredette 	 *
    617    1.1  fredette 	 * We *very crudely* differentiate between the two cases
    618    1.1  fredette 	 * by checking the faulting instruction: if it is the
    619    1.1  fredette 	 * function prologue instruction that stores the old
    620    1.1  fredette 	 * frame pointer and updates the stack pointer, we assume
    621    1.1  fredette 	 * that we faulted on the kernel stack.
    622    1.1  fredette 	 *
    623    1.1  fredette 	 * In this case, not completing that instruction will
    624    1.1  fredette 	 * probably confuse backtraces in kgdb/ddb.  Completing
    625    1.1  fredette 	 * it would be difficult, because we already faulted on
    626  1.111     skrll 	 * that part of the stack, so instead we fix up the
    627    1.1  fredette 	 * frame as if the function called has just returned.
    628    1.1  fredette 	 * This has peculiar knowledge about what values are in
    629    1.1  fredette 	 * what registers during the "normal gcc -g" prologue.
    630    1.1  fredette 	 */
    631    1.1  fredette 	if (&type >= &emergency_stack_start &&
    632    1.1  fredette 	    &type < &emergency_stack_end &&
    633    1.1  fredette 	    type != T_IBREAK && STWM_R1_D_SR0_SP(opcode)) {
    634    1.1  fredette 		/* Restore the caller's frame pointer. */
    635    1.1  fredette 		frame->tf_r3 = frame->tf_r1;
    636    1.1  fredette 		/* Restore the caller's instruction offsets. */
    637    1.1  fredette 		frame->tf_iioq_head = frame->tf_rp;
    638    1.1  fredette 		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    639    1.1  fredette 		goto dead_end;
    640    1.1  fredette 	}
    641    1.1  fredette #endif /* DIAGNOSTIC */
    642  1.111     skrll 
    643    1.1  fredette #ifdef DEBUG
    644   1.81     skrll 	frame_sanity_check(__func__, __LINE__, type, frame, l);
    645    1.1  fredette #endif /* DEBUG */
    646    1.1  fredette 
    647    1.1  fredette 	if (frame->tf_flags & TFF_LAST)
    648    1.9       chs 		l->l_md.md_regs = frame;
    649    1.1  fredette 
    650   1.73     skrll 	if (trapnum <= trap_types)
    651   1.73     skrll 		tts = trap_type[trapnum];
    652   1.73     skrll 
    653    1.1  fredette #ifdef TRAPDEBUG
    654   1.67     skrll 	if (trapnum != T_INTERRUPT && trapnum != T_IBREAK)
    655   1.75     skrll 		printf("trap: %d, %s for %x:%lx at %x:%x, fp=%p, rp=%x\n",
    656   1.75     skrll 		    type, tts, space, va, frame->tf_iisq_head,
    657    1.1  fredette 		    frame->tf_iioq_head, frame, frame->tf_rp);
    658   1.67     skrll 	else if (trapnum == T_IBREAK)
    659    1.1  fredette 		printf("trap: break instruction %x:%x at %x:%x, fp=%p\n",
    660    1.1  fredette 		    break5(opcode), break13(opcode),
    661    1.1  fredette 		    frame->tf_iisq_head, frame->tf_iioq_head, frame);
    662    1.1  fredette 
    663    1.1  fredette 	{
    664    1.1  fredette 		extern int etext;
    665    1.1  fredette 		if (frame < (struct trapframe *)&etext) {
    666    1.1  fredette 			printf("trap: bogus frame ptr %p\n", frame);
    667    1.1  fredette 			goto dead_end;
    668    1.1  fredette 		}
    669    1.1  fredette 	}
    670    1.1  fredette #endif
    671   1.73     skrll 
    672   1.61     rmind 	pcb = lwp_getpcb(l);
    673   1.61     rmind 
    674   1.66     skrll 	/* If this is a trap, not an interrupt, reenable interrupts. */
    675   1.67     skrll 	if (trapnum != T_INTERRUPT) {
    676   1.95      matt 		curcpu()->ci_data.cpu_ntrap++;
    677   1.66     skrll 		mtctl(frame->tf_eiem, CR_EIEM);
    678   1.66     skrll 	}
    679   1.66     skrll 
    680  1.119     skrll 	const bool user = (type & T_USER) != 0;
    681    1.1  fredette 	switch (type) {
    682    1.1  fredette 	case T_NONEXIST:
    683  1.118     skrll 	case T_NONEXIST | T_USER:
    684    1.1  fredette #if !defined(DDB) && !defined(KGDB)
    685    1.1  fredette 		/* we've got screwed up by the central scrutinizer */
    686    1.1  fredette 		panic ("trap: elvis has just left the building!");
    687    1.1  fredette 		break;
    688    1.1  fredette #else
    689    1.1  fredette 		goto dead_end;
    690    1.1  fredette #endif
    691  1.118     skrll 	case T_RECOVERY | T_USER:
    692    1.1  fredette #ifdef USERTRACE
    693   1.89     skrll 		for (;;) {
    694    1.1  fredette 			if (frame->tf_iioq_head != rctr_next_iioq)
    695    1.1  fredette 				printf("-%08x\nr %08x",
    696    1.1  fredette 					rctr_next_iioq - 4,
    697    1.1  fredette 					frame->tf_iioq_head);
    698    1.1  fredette 			rctr_next_iioq = frame->tf_iioq_head + 4;
    699    1.1  fredette 			if (frame->tf_ipsw & PSW_N) {
    700    1.1  fredette 				/* Advance the program counter. */
    701    1.1  fredette 				frame->tf_iioq_head = frame->tf_iioq_tail;
    702    1.1  fredette 				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    703    1.1  fredette 				/* Clear flags. */
    704    1.1  fredette 				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
    705    1.1  fredette 				/* Simulate another trap. */
    706    1.1  fredette 				continue;
    707    1.1  fredette 			}
    708    1.1  fredette 			break;
    709    1.1  fredette 		}
    710    1.1  fredette 		frame->tf_rctr = 0;
    711    1.1  fredette 		break;
    712    1.1  fredette #endif /* USERTRACE */
    713    1.1  fredette 	case T_RECOVERY:
    714    1.1  fredette #if !defined(DDB) && !defined(KGDB)
    715    1.1  fredette 		/* XXX will implement later */
    716    1.1  fredette 		printf ("trap: handicapped");
    717    1.1  fredette 		break;
    718    1.1  fredette #else
    719    1.1  fredette 		goto dead_end;
    720    1.1  fredette #endif
    721    1.1  fredette 
    722    1.1  fredette 	case T_EMULATION | T_USER:
    723   1.21       chs 		hppa_fpu_emulate(frame, l, opcode);
    724    1.1  fredette 		break;
    725    1.1  fredette 
    726   1.25       chs 	case T_DATALIGN:
    727   1.80       chs 		onfault = pcb->pcb_onfault;
    728   1.80       chs 		if (onfault) {
    729   1.80       chs 			ret = EFAULT;
    730   1.25       chs do_onfault:
    731   1.80       chs 			frame->tf_iioq_head = onfault;
    732   1.80       chs 			frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    733   1.80       chs 			frame->tf_ret0 = ret;
    734   1.25       chs 			break;
    735   1.25       chs 		}
    736   1.25       chs 		/*FALLTHROUGH*/
    737   1.25       chs 
    738    1.1  fredette #ifdef DIAGNOSTIC
    739    1.1  fredette 		/* these just can't happen ever */
    740    1.1  fredette 	case T_PRIV_OP:
    741    1.1  fredette 	case T_PRIV_REG:
    742    1.1  fredette 		/* these just can't make it to the trap() ever */
    743   1.25       chs 	case T_HPMC:
    744   1.25       chs 	case T_HPMC | T_USER:
    745    1.1  fredette 	case T_EMULATION:
    746   1.25       chs 	case T_EXCEPTION:
    747    1.1  fredette #endif
    748    1.1  fredette 	case T_IBREAK:
    749    1.1  fredette 	case T_DBREAK:
    750    1.1  fredette 	dead_end:
    751    1.3  fredette 		if (type & T_USER) {
    752    1.3  fredette #ifdef DEBUG
    753    1.9       chs 			user_backtrace(frame, l, type);
    754    1.3  fredette #endif
    755   1.22       chs 			KSI_INIT_TRAP(&ksi);
    756   1.22       chs 			ksi.ksi_signo = SIGILL;
    757   1.22       chs 			ksi.ksi_code = ILL_ILLTRP;
    758   1.22       chs 			ksi.ksi_trap = type;
    759   1.22       chs 			ksi.ksi_addr = (void *)frame->tf_iioq_head;
    760   1.22       chs 			trapsignal(l, &ksi);
    761    1.3  fredette 			break;
    762    1.3  fredette 		}
    763    1.1  fredette 		if (trap_kdebug(type, va, frame))
    764    1.1  fredette 			return;
    765    1.1  fredette 		else if (type == T_DATALIGN)
    766    1.1  fredette 			panic ("trap: %s at 0x%x", tts, (u_int) va);
    767    1.1  fredette 		else
    768    1.1  fredette 			panic ("trap: no debugger for \"%s\" (%d)", tts, type);
    769    1.1  fredette 		break;
    770    1.1  fredette 
    771    1.1  fredette 	case T_IBREAK | T_USER:
    772    1.1  fredette 	case T_DBREAK | T_USER:
    773   1.51     skrll 		KSI_INIT_TRAP(&ksi);
    774   1.51     skrll 		ksi.ksi_signo = SIGTRAP;
    775  1.120     skrll 		ksi.ksi_code = TRAP_BRKPT;
    776   1.67     skrll 		ksi.ksi_trap = trapnum;
    777  1.101     skrll 		ksi.ksi_addr = (void *)(frame->tf_iioq_head & ~HPPA_PC_PRIV_MASK);
    778   1.51     skrll #ifdef PTRACE
    779   1.51     skrll 		ss_clear_breakpoints(l);
    780   1.51     skrll 		if (opcode == SSBREAKPOINT)
    781  1.120     skrll 			ksi.ksi_code = TRAP_TRACE;
    782   1.51     skrll #endif
    783    1.1  fredette 		/* pass to user debugger */
    784   1.51     skrll 		trapsignal(l, &ksi);
    785   1.51     skrll 		break;
    786   1.51     skrll 
    787   1.51     skrll #ifdef PTRACE
    788   1.51     skrll 	case T_TAKENBR | T_USER:
    789   1.51     skrll 		ss_clear_breakpoints(l);
    790   1.51     skrll 
    791   1.51     skrll 		KSI_INIT_TRAP(&ksi);
    792   1.51     skrll 		ksi.ksi_signo = SIGTRAP;
    793   1.51     skrll 		ksi.ksi_code = TRAP_TRACE;
    794   1.67     skrll 		ksi.ksi_trap = trapnum;
    795  1.101     skrll 		ksi.ksi_addr = (void *)(frame->tf_iioq_head & ~HPPA_PC_PRIV_MASK);
    796   1.51     skrll 
    797   1.51     skrll                 /* pass to user debugger */
    798   1.51     skrll 		trapsignal(l, &ksi);
    799    1.1  fredette 		break;
    800   1.51     skrll #endif
    801    1.1  fredette 
    802   1.21       chs 	case T_EXCEPTION | T_USER: {	/* co-proc assist trap */
    803   1.21       chs 		uint64_t *fpp;
    804   1.23       chs 		uint32_t *pex, ex, inst;
    805   1.23       chs 		int i;
    806   1.21       chs 
    807   1.21       chs 		hppa_fpu_flush(l);
    808   1.79     skrll 		fpp = (uint64_t *)pcb->pcb_fpregs;
    809   1.78     skrll 
    810   1.78     skrll 		/* skip the status register */
    811   1.78     skrll 		pex = (uint32_t *)&fpp[0];
    812   1.78     skrll 		pex++;
    813   1.78     skrll 
    814   1.78     skrll 		/* loop through the exception registers */
    815   1.23       chs 		for (i = 1; i < 8 && !*pex; i++, pex++)
    816   1.21       chs 			;
    817   1.23       chs 		KASSERT(i < 8);
    818   1.23       chs 		ex = *pex;
    819   1.23       chs 		*pex = 0;
    820   1.23       chs 
    821   1.21       chs 		/* reset the trap flag, as if there was none */
    822   1.21       chs 		fpp[0] &= ~(((uint64_t)HPPA_FPU_T) << 32);
    823   1.21       chs 
    824   1.23       chs 		/* emulate the instruction */
    825   1.23       chs 		inst = ((uint32_t)fpopmap[ex >> 26] << 26) | (ex & 0x03ffffff);
    826   1.21       chs 		hppa_fpu_emulate(frame, l, inst);
    827   1.21       chs 		}
    828    1.1  fredette 		break;
    829    1.1  fredette 
    830    1.1  fredette 	case T_OVERFLOW | T_USER:
    831   1.22       chs 		KSI_INIT_TRAP(&ksi);
    832   1.22       chs 		ksi.ksi_signo = SIGFPE;
    833   1.22       chs 		ksi.ksi_code = SI_NOINFO;
    834   1.22       chs 		ksi.ksi_trap = type;
    835   1.22       chs 		ksi.ksi_addr = (void *)va;
    836   1.22       chs 		trapsignal(l, &ksi);
    837    1.1  fredette 		break;
    838  1.111     skrll 
    839    1.1  fredette 	case T_CONDITION | T_USER:
    840   1.23       chs 		KSI_INIT_TRAP(&ksi);
    841   1.23       chs 		ksi.ksi_signo = SIGFPE;
    842   1.23       chs 		ksi.ksi_code = FPE_INTDIV;
    843   1.23       chs 		ksi.ksi_trap = type;
    844   1.23       chs 		ksi.ksi_addr = (void *)va;
    845   1.23       chs 		trapsignal(l, &ksi);
    846    1.1  fredette 		break;
    847    1.1  fredette 
    848    1.1  fredette 	case T_ILLEGAL | T_USER:
    849    1.3  fredette #ifdef DEBUG
    850    1.9       chs 		user_backtrace(frame, l, type);
    851    1.3  fredette #endif
    852   1.22       chs 		KSI_INIT_TRAP(&ksi);
    853   1.22       chs 		ksi.ksi_signo = SIGILL;
    854   1.22       chs 		ksi.ksi_code = ILL_ILLOPC;
    855   1.22       chs 		ksi.ksi_trap = type;
    856   1.22       chs 		ksi.ksi_addr = (void *)va;
    857   1.22       chs 		trapsignal(l, &ksi);
    858    1.1  fredette 		break;
    859    1.1  fredette 
    860    1.1  fredette 	case T_PRIV_OP | T_USER:
    861    1.3  fredette #ifdef DEBUG
    862    1.9       chs 		user_backtrace(frame, l, type);
    863    1.3  fredette #endif
    864   1.22       chs 		KSI_INIT_TRAP(&ksi);
    865   1.22       chs 		ksi.ksi_signo = SIGILL;
    866   1.22       chs 		ksi.ksi_code = ILL_PRVOPC;
    867   1.22       chs 		ksi.ksi_trap = type;
    868   1.22       chs 		ksi.ksi_addr = (void *)va;
    869   1.22       chs 		trapsignal(l, &ksi);
    870    1.1  fredette 		break;
    871    1.1  fredette 
    872    1.1  fredette 	case T_PRIV_REG | T_USER:
    873    1.3  fredette #ifdef DEBUG
    874    1.9       chs 		user_backtrace(frame, l, type);
    875    1.3  fredette #endif
    876   1.22       chs 		KSI_INIT_TRAP(&ksi);
    877   1.22       chs 		ksi.ksi_signo = SIGILL;
    878   1.22       chs 		ksi.ksi_code = ILL_PRVREG;
    879   1.22       chs 		ksi.ksi_trap = type;
    880   1.22       chs 		ksi.ksi_addr = (void *)va;
    881   1.22       chs 		trapsignal(l, &ksi);
    882    1.1  fredette 		break;
    883    1.1  fredette 
    884    1.1  fredette 		/* these should never got here */
    885    1.1  fredette 	case T_HIGHERPL | T_USER:
    886    1.1  fredette 	case T_LOWERPL | T_USER:
    887   1.22       chs 		KSI_INIT_TRAP(&ksi);
    888   1.22       chs 		ksi.ksi_signo = SIGSEGV;
    889   1.22       chs 		ksi.ksi_code = SEGV_ACCERR;
    890   1.22       chs 		ksi.ksi_trap = type;
    891   1.22       chs 		ksi.ksi_addr = (void *)va;
    892   1.22       chs 		trapsignal(l, &ksi);
    893    1.1  fredette 		break;
    894    1.1  fredette 
    895    1.1  fredette 	case T_IPROT | T_USER:
    896    1.1  fredette 	case T_DPROT | T_USER:
    897   1.22       chs 		KSI_INIT_TRAP(&ksi);
    898   1.22       chs 		ksi.ksi_signo = SIGSEGV;
    899   1.22       chs 		ksi.ksi_code = SEGV_ACCERR;
    900   1.22       chs 		ksi.ksi_trap = type;
    901   1.22       chs 		ksi.ksi_addr = (void *)va;
    902   1.22       chs 		trapsignal(l, &ksi);
    903    1.1  fredette 		break;
    904    1.1  fredette 
    905  1.119     skrll 	case T_ITLBMISSNA:	case T_USER | T_ITLBMISSNA:
    906  1.119     skrll 	case T_DTLBMISSNA:	case T_USER | T_DTLBMISSNA:
    907  1.119     skrll 		vm = p->p_vmspace;
    908  1.119     skrll 
    909  1.119     skrll 		if (!vm) {
    910  1.119     skrll #ifdef TRAPDEBUG
    911  1.119     skrll 			printf("trap: no vm, p=%p\n", p);
    912  1.119     skrll #endif
    913  1.119     skrll 			goto dead_end;
    914  1.119     skrll 		}
    915  1.119     skrll 
    916  1.119     skrll 		/*
    917  1.119     skrll 		 * it could be a kernel map for exec_map faults
    918  1.119     skrll 		 */
    919  1.119     skrll 		if (!user && space == HPPA_SID_KERNEL)
    920  1.119     skrll 			map = kernel_map;
    921  1.119     skrll 		else {
    922  1.119     skrll 			map = &vm->vm_map;
    923  1.119     skrll 		}
    924  1.119     skrll 
    925  1.119     skrll 		va = trunc_page(va);
    926  1.119     skrll 
    927  1.119     skrll 		if ((opcode & LPA_MASK) == LPA) {
    928  1.119     skrll 			/* lpa failure case */
    929  1.119     skrll 			const u_int regno =
    930  1.119     skrll 			    __SHIFTOUT(opcode, __PABITS(27, 31));
    931  1.119     skrll 			tf_setregno(frame, regno, 0);
    932  1.119     skrll 			frame->tf_ipsw |= PSW_N;
    933  1.119     skrll 		} else if ((opcode & PROBE_MASK) == PROBE) {
    934  1.119     skrll 			u_int pl;
    935  1.124     skrll 			if ((opcode & PROBE_IMMED) != 0) {
    936  1.126     skrll 				pl = __SHIFTOUT(opcode, PROBE_PL) & PLMASK;
    937  1.119     skrll 			} else {
    938  1.119     skrll 				const u_int plreg =
    939  1.126     skrll 				    __SHIFTOUT(opcode, PROBE_PL);
    940  1.126     skrll 				pl = tf_getregno(frame, plreg) & PLMASK;
    941  1.119     skrll 			}
    942  1.128     skrll 
    943  1.119     skrll 			bool ok = true;
    944  1.119     skrll 			if ((user && space == HPPA_SID_KERNEL) ||
    945  1.127     skrll 			    (frame->tf_iioq_head & HPPA_PC_PRIV_MASK) != pl ||
    946  1.119     skrll 			    (user && va >= VM_MAXUSER_ADDRESS)) {
    947  1.119     skrll 				ok = false;
    948  1.119     skrll 			} else {
    949  1.119     skrll 				/* Never call uvm_fault in interrupt context. */
    950  1.119     skrll 				KASSERT(curcpu()->ci_intr_depth == 0);
    951  1.119     skrll 
    952  1.119     skrll 				const bool read =
    953  1.119     skrll 				    __SHIFTOUT(opcode, PROBE_RW) == 0;
    954  1.119     skrll 				onfault = pcb->pcb_onfault;
    955  1.119     skrll 				pcb->pcb_onfault = 0;
    956  1.119     skrll 				ret = uvm_fault(map, va, read ?
    957  1.119     skrll 				    VM_PROT_READ : VM_PROT_WRITE);
    958  1.119     skrll 				pcb->pcb_onfault = onfault;
    959  1.119     skrll 
    960  1.119     skrll 				if (ret)
    961  1.119     skrll 					ok = false;
    962  1.119     skrll 			}
    963  1.119     skrll 			if (!ok) {
    964  1.119     skrll 				const u_int regno =
    965  1.119     skrll 				    __SHIFTOUT(opcode, __PABITS(27, 31));
    966  1.119     skrll 				tf_setregno(frame, regno, 0);
    967  1.119     skrll 				frame->tf_ipsw |= PSW_N;
    968  1.119     skrll 			}
    969  1.119     skrll 		}
    970  1.119     skrll 		break;
    971  1.119     skrll 
    972    1.1  fredette 	case T_DATACC:   	case T_USER | T_DATACC:
    973    1.1  fredette 	case T_ITLBMISS:	case T_USER | T_ITLBMISS:
    974    1.1  fredette 	case T_DTLBMISS:	case T_USER | T_DTLBMISS:
    975    1.1  fredette 	case T_TLB_DIRTY:	case T_USER | T_TLB_DIRTY:
    976    1.1  fredette 		vm = p->p_vmspace;
    977    1.1  fredette 
    978    1.1  fredette 		if (!vm) {
    979    1.1  fredette #ifdef TRAPDEBUG
    980    1.1  fredette 			printf("trap: no vm, p=%p\n", p);
    981    1.1  fredette #endif
    982    1.1  fredette 			goto dead_end;
    983    1.1  fredette 		}
    984    1.1  fredette 
    985    1.1  fredette 		/*
    986    1.1  fredette 		 * it could be a kernel map for exec_map faults
    987    1.1  fredette 		 */
    988    1.1  fredette 		if (!(type & T_USER) && space == HPPA_SID_KERNEL)
    989    1.1  fredette 			map = kernel_map;
    990   1.56  wrstuden 		else {
    991    1.1  fredette 			map = &vm->vm_map;
    992   1.56  wrstuden 		}
    993   1.10        cl 
    994   1.41     skrll 		va = trunc_page(va);
    995    1.1  fredette 
    996   1.59     skrll 		if (map->pmap->pm_space != space) {
    997    1.1  fredette #ifdef TRAPDEBUG
    998   1.37     skrll 			printf("trap: space mismatch %d != %d\n",
    999   1.59     skrll 			    space, map->pmap->pm_space);
   1000    1.1  fredette #endif
   1001    1.1  fredette 			/* actually dump the user, crap the kernel */
   1002    1.1  fredette 			goto dead_end;
   1003    1.1  fredette 		}
   1004    1.1  fredette 
   1005    1.1  fredette 		/* Never call uvm_fault in interrupt context. */
   1006  1.115     skrll 		KASSERT(curcpu()->ci_intr_depth == 0);
   1007    1.1  fredette 
   1008   1.61     rmind 		onfault = pcb->pcb_onfault;
   1009   1.61     rmind 		pcb->pcb_onfault = 0;
   1010   1.33  drochner 		ret = uvm_fault(map, va, vftype);
   1011   1.61     rmind 		pcb->pcb_onfault = onfault;
   1012    1.1  fredette 
   1013    1.1  fredette #ifdef TRAPDEBUG
   1014   1.33  drochner 		printf("uvm_fault(%p, %x, %d)=%d\n",
   1015   1.33  drochner 		    map, (u_int)va, vftype, ret);
   1016    1.1  fredette #endif
   1017    1.1  fredette 
   1018    1.1  fredette 		/*
   1019    1.1  fredette 		 * If this was a stack access we keep track of the maximum
   1020    1.1  fredette 		 * accessed stack size.  Also, if uvm_fault gets a protection
   1021    1.1  fredette 		 * failure it is due to accessing the stack region outside
   1022    1.1  fredette 		 * the current limit and we need to reflect that as an access
   1023    1.1  fredette 		 * error.
   1024    1.1  fredette 		 */
   1025   1.39     skrll 		if (map != kernel_map && va >= (vaddr_t)vm->vm_minsaddr) {
   1026   1.39     skrll 			if (ret == 0)
   1027   1.39     skrll 				uvm_grow(l->l_proc, va);
   1028   1.39     skrll 			else if (ret == EACCES)
   1029    1.1  fredette 				ret = EFAULT;
   1030    1.1  fredette 		}
   1031    1.1  fredette 
   1032    1.1  fredette 		if (ret != 0) {
   1033    1.1  fredette 			if (type & T_USER) {
   1034    1.1  fredette #ifdef DEBUG
   1035    1.9       chs 				user_backtrace(frame, l, type);
   1036    1.1  fredette #endif
   1037   1.22       chs 				KSI_INIT_TRAP(&ksi);
   1038  1.107    martin 				switch (ret) {
   1039  1.107    martin 				case EACCES:
   1040  1.107    martin 					ksi.ksi_signo = SIGSEGV;
   1041  1.107    martin 					ksi.ksi_code = SEGV_ACCERR;
   1042  1.107    martin 					break;
   1043  1.107    martin 				case ENOMEM:
   1044  1.107    martin 					ksi.ksi_signo = SIGKILL;
   1045  1.107    martin 					printf("UVM: pid %d (%s), uid %d "
   1046  1.107    martin 					    "killed: out of swap\n",
   1047  1.107    martin 					    p->p_pid, p->p_comm,
   1048  1.111     skrll 					    l->l_cred ?
   1049  1.107    martin 						kauth_cred_geteuid(l->l_cred)
   1050  1.107    martin 						: -1);
   1051  1.107    martin 					break;
   1052  1.107    martin 				case EINVAL:
   1053  1.107    martin 					ksi.ksi_signo = SIGBUS;
   1054  1.107    martin 					ksi.ksi_code = BUS_ADRERR;
   1055  1.107    martin 					break;
   1056  1.107    martin 				default:
   1057  1.107    martin 					ksi.ksi_signo = SIGSEGV;
   1058  1.107    martin 					ksi.ksi_code = SEGV_MAPERR;
   1059  1.107    martin 					break;
   1060  1.107    martin 				}
   1061   1.22       chs 				ksi.ksi_trap = type;
   1062   1.22       chs 				ksi.ksi_addr = (void *)va;
   1063   1.22       chs 				trapsignal(l, &ksi);
   1064    1.1  fredette 			} else {
   1065   1.80       chs 				if (onfault) {
   1066   1.25       chs 					goto do_onfault;
   1067    1.1  fredette 				}
   1068   1.33  drochner 				panic("trap: uvm_fault(%p, %lx, %d): %d",
   1069   1.33  drochner 				    map, va, vftype, ret);
   1070    1.1  fredette 			}
   1071    1.1  fredette 		}
   1072    1.1  fredette 		break;
   1073    1.1  fredette 
   1074    1.1  fredette 	case T_DATALIGN | T_USER:
   1075    1.3  fredette #ifdef DEBUG
   1076    1.9       chs 		user_backtrace(frame, l, type);
   1077    1.3  fredette #endif
   1078   1.22       chs 		KSI_INIT_TRAP(&ksi);
   1079   1.22       chs 		ksi.ksi_signo = SIGBUS;
   1080   1.22       chs 		ksi.ksi_code = BUS_ADRALN;
   1081   1.22       chs 		ksi.ksi_trap = type;
   1082   1.22       chs 		ksi.ksi_addr = (void *)va;
   1083   1.22       chs 		trapsignal(l, &ksi);
   1084    1.1  fredette 		break;
   1085    1.1  fredette 
   1086    1.1  fredette 	case T_INTERRUPT:
   1087  1.118     skrll 	case T_INTERRUPT | T_USER:
   1088    1.1  fredette 		hppa_intr(frame);
   1089    1.1  fredette 		mtctl(frame->tf_eiem, CR_EIEM);
   1090    1.1  fredette 		break;
   1091   1.22       chs 
   1092    1.1  fredette 	case T_LOWERPL:
   1093    1.1  fredette 	case T_DPROT:
   1094    1.1  fredette 	case T_IPROT:
   1095    1.1  fredette 	case T_OVERFLOW:
   1096    1.1  fredette 	case T_CONDITION:
   1097    1.1  fredette 	case T_ILLEGAL:
   1098    1.1  fredette 	case T_HIGHERPL:
   1099    1.1  fredette 	case T_TAKENBR:
   1100    1.1  fredette 	case T_POWERFAIL:
   1101    1.1  fredette 	case T_LPMC:
   1102    1.1  fredette 	case T_PAGEREF:
   1103    1.1  fredette 	case T_DATAPID:  	case T_DATAPID  | T_USER:
   1104    1.1  fredette 		if (0 /* T-chip */) {
   1105    1.1  fredette 			break;
   1106    1.1  fredette 		}
   1107    1.1  fredette 		/* FALLTHROUGH to unimplemented */
   1108    1.1  fredette 	default:
   1109    1.1  fredette 		panic ("trap: unimplemented \'%s\' (%d)", tts, type);
   1110    1.1  fredette 	}
   1111    1.1  fredette 
   1112   1.69     skrll #ifdef DIAGNOSTIC
   1113   1.85     skrll 	if (ci->ci_cpl != oldcpl)
   1114   1.69     skrll 		printf("WARNING: SPL (%d) NOT LOWERED ON TRAP (%d) EXIT\n",
   1115   1.85     skrll 		    ci->ci_cpl, trapnum);
   1116   1.69     skrll #endif
   1117   1.69     skrll 
   1118    1.1  fredette 	if (type & T_USER)
   1119  1.114     skrll 		userret(l, l->l_md.md_regs);
   1120    1.1  fredette 
   1121    1.1  fredette #ifdef DEBUG
   1122   1.81     skrll 	frame_sanity_check(__func__, __LINE__, type, frame, l);
   1123   1.43      yamt 	if (frame->tf_flags & TFF_LAST && (curlwp->l_flag & LW_IDLE) == 0)
   1124   1.83     skrll 		frame_sanity_check(__func__, __LINE__, type,
   1125   1.83     skrll 		    curlwp->l_md.md_regs, curlwp);
   1126    1.1  fredette #endif /* DEBUG */
   1127    1.1  fredette }
   1128    1.1  fredette 
   1129    1.1  fredette void
   1130  1.110     kamil md_child_return(struct lwp *l)
   1131    1.1  fredette {
   1132   1.68     skrll 	/*
   1133   1.68     skrll 	 * Return values in the frame set by cpu_lwp_fork().
   1134   1.68     skrll 	 */
   1135   1.68     skrll 
   1136  1.114     skrll 	userret(l, l->l_md.md_regs);
   1137    1.1  fredette #ifdef DEBUG
   1138   1.81     skrll 	frame_sanity_check(__func__, __LINE__, 0, l->l_md.md_regs, l);
   1139    1.1  fredette #endif /* DEBUG */
   1140    1.1  fredette }
   1141    1.1  fredette 
   1142   1.97    martin /*
   1143   1.97    martin  * Process the tail end of a posix_spawn() for the child.
   1144   1.97    martin  */
   1145   1.97    martin void
   1146   1.97    martin cpu_spawn_return(struct lwp *l)
   1147   1.97    martin {
   1148   1.99     skrll 
   1149  1.114     skrll 	userret(l, l->l_md.md_regs);
   1150   1.97    martin #ifdef DEBUG
   1151   1.97    martin 	frame_sanity_check(__func__, __LINE__, 0, l->l_md.md_regs, l);
   1152   1.97    martin #endif /* DEBUG */
   1153   1.97    martin }
   1154   1.97    martin 
   1155   1.51     skrll #ifdef PTRACE
   1156   1.51     skrll 
   1157   1.51     skrll #include <sys/ptrace.h>
   1158   1.51     skrll 
   1159   1.51     skrll int
   1160   1.51     skrll ss_get_value(struct lwp *l, vaddr_t addr, u_int *value)
   1161   1.51     skrll {
   1162   1.51     skrll 	struct uio uio;
   1163   1.51     skrll 	struct iovec iov;
   1164   1.51     skrll 
   1165   1.51     skrll 	iov.iov_base = (void *)value;
   1166   1.51     skrll 	iov.iov_len = sizeof(u_int);
   1167   1.51     skrll 	uio.uio_iov = &iov;
   1168   1.51     skrll 	uio.uio_iovcnt = 1;
   1169   1.51     skrll 	uio.uio_offset = (off_t)addr;
   1170   1.51     skrll 	uio.uio_resid = sizeof(u_int);
   1171   1.51     skrll 	uio.uio_rw = UIO_READ;
   1172   1.51     skrll 	UIO_SETUP_SYSSPACE(&uio);
   1173   1.51     skrll 
   1174   1.51     skrll 	return (process_domem(curlwp, l, &uio));
   1175   1.51     skrll }
   1176   1.51     skrll 
   1177   1.51     skrll int
   1178   1.51     skrll ss_put_value(struct lwp *l, vaddr_t addr, u_int value)
   1179   1.51     skrll {
   1180   1.51     skrll 	struct uio uio;
   1181   1.51     skrll 	struct iovec iov;
   1182   1.51     skrll 
   1183   1.51     skrll 	iov.iov_base = (void *)&value;
   1184   1.51     skrll 	iov.iov_len = sizeof(u_int);
   1185   1.51     skrll 	uio.uio_iov = &iov;
   1186   1.51     skrll 	uio.uio_iovcnt = 1;
   1187   1.51     skrll 	uio.uio_offset = (off_t)addr;
   1188   1.51     skrll 	uio.uio_resid = sizeof(u_int);
   1189   1.51     skrll 	uio.uio_rw = UIO_WRITE;
   1190   1.51     skrll 	UIO_SETUP_SYSSPACE(&uio);
   1191   1.51     skrll 
   1192   1.51     skrll 	return (process_domem(curlwp, l, &uio));
   1193   1.51     skrll }
   1194   1.51     skrll 
   1195   1.51     skrll void
   1196   1.51     skrll ss_clear_breakpoints(struct lwp *l)
   1197   1.51     skrll {
   1198  1.117    andvar 	/* Restore original instructions. */
   1199   1.51     skrll 	if (l->l_md.md_bpva != 0) {
   1200   1.51     skrll 		ss_put_value(l, l->l_md.md_bpva, l->l_md.md_bpsave[0]);
   1201   1.51     skrll 		ss_put_value(l, l->l_md.md_bpva + 4, l->l_md.md_bpsave[1]);
   1202   1.51     skrll 		l->l_md.md_bpva = 0;
   1203   1.51     skrll 	}
   1204   1.51     skrll }
   1205   1.51     skrll 
   1206   1.51     skrll 
   1207   1.51     skrll int
   1208   1.51     skrll process_sstep(struct lwp *l, int sstep)
   1209   1.51     skrll {
   1210   1.51     skrll 	struct trapframe *tf = l->l_md.md_regs;
   1211   1.51     skrll 	int error;
   1212   1.51     skrll 
   1213   1.51     skrll 	ss_clear_breakpoints(l);
   1214   1.51     skrll 
   1215   1.51     skrll 	/* We're continuing... */
   1216   1.91     skrll 	if (sstep == 0) {
   1217   1.92     skrll 		tf->tf_ipsw &= ~PSW_T;
   1218   1.51     skrll 		return 0;
   1219   1.51     skrll 	}
   1220   1.51     skrll 
   1221   1.51     skrll 	/*
   1222   1.91     skrll 	 * Don't touch the syscall gateway page.  Instead, insert a
   1223   1.91     skrll 	 * breakpoint where we're supposed to return.
   1224   1.51     skrll 	 */
   1225   1.91     skrll 	if ((tf->tf_iioq_tail & ~PAGE_MASK) == SYSCALLGATE)
   1226   1.91     skrll 		l->l_md.md_bpva = tf->tf_r31 & ~HPPA_PC_PRIV_MASK;
   1227   1.91     skrll 	else
   1228   1.91     skrll 		l->l_md.md_bpva = tf->tf_iioq_tail & ~HPPA_PC_PRIV_MASK;
   1229   1.51     skrll 
   1230   1.51     skrll 	error = ss_get_value(l, l->l_md.md_bpva, &l->l_md.md_bpsave[0]);
   1231   1.51     skrll 	if (error)
   1232   1.91     skrll 		return error;
   1233   1.51     skrll 	error = ss_get_value(l, l->l_md.md_bpva + 4, &l->l_md.md_bpsave[1]);
   1234   1.51     skrll 	if (error)
   1235   1.91     skrll 		return error;
   1236   1.51     skrll 
   1237   1.51     skrll 	error = ss_put_value(l, l->l_md.md_bpva, SSBREAKPOINT);
   1238   1.51     skrll 	if (error)
   1239   1.51     skrll 		return error;
   1240   1.51     skrll 	error = ss_put_value(l, l->l_md.md_bpva + 4, SSBREAKPOINT);
   1241   1.51     skrll 	if (error)
   1242   1.51     skrll 		return error;
   1243   1.51     skrll 
   1244   1.91     skrll 	if ((tf->tf_iioq_tail & ~PAGE_MASK) == SYSCALLGATE)
   1245   1.92     skrll 		tf->tf_ipsw &= ~PSW_T;
   1246   1.91     skrll 	else
   1247   1.91     skrll 		tf->tf_ipsw |= PSW_T;
   1248   1.51     skrll 
   1249   1.51     skrll 	return 0;
   1250   1.51     skrll }
   1251   1.51     skrll #endif
   1252   1.51     skrll 
   1253   1.51     skrll 
   1254  1.122     skrll void
   1255  1.122     skrll syscall_intern(struct proc *p)
   1256  1.122     skrll {
   1257  1.122     skrll 	p->p_md.md_syscall = syscall;
   1258  1.122     skrll }
   1259  1.122     skrll 
   1260    1.1  fredette /*
   1261    1.1  fredette  * call actual syscall routine
   1262    1.1  fredette  * from the low-level syscall handler:
   1263    1.1  fredette  * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto
   1264    1.1  fredette  *   our stack, this wins compared to copyin just needed amount anyway
   1265    1.1  fredette  * - register args are copied onto stack too
   1266    1.1  fredette  */
   1267    1.1  fredette void
   1268   1.14       chs syscall(struct trapframe *frame, int *args)
   1269    1.1  fredette {
   1270    1.9       chs 	struct lwp *l;
   1271    1.9       chs 	struct proc *p;
   1272    1.9       chs 	const struct sysent *callp;
   1273   1.65     skrll 	size_t nargs64;
   1274   1.54       dsl 	int nsys, code, error;
   1275    1.1  fredette 	int tmp;
   1276    1.1  fredette 	int rval[2];
   1277   1.69     skrll #ifdef DIAGNOSTIC
   1278   1.85     skrll 	struct cpu_info *ci = curcpu();
   1279   1.85     skrll 	int oldcpl = ci->ci_cpl;
   1280   1.69     skrll #endif
   1281    1.1  fredette 
   1282   1.95      matt 	curcpu()->ci_data.cpu_nsyscall++;
   1283    1.1  fredette 
   1284    1.1  fredette #ifdef DEBUG
   1285   1.81     skrll 	frame_sanity_check(__func__, __LINE__, 0, frame, curlwp);
   1286    1.1  fredette #endif /* DEBUG */
   1287    1.1  fredette 
   1288    1.1  fredette 	if (!USERMODE(frame->tf_iioq_head))
   1289    1.1  fredette 		panic("syscall");
   1290    1.1  fredette 
   1291   1.64     skrll 	KASSERT(curlwp != NULL);
   1292    1.9       chs 	l = curlwp;
   1293    1.9       chs 	p = l->l_proc;
   1294    1.9       chs 	l->l_md.md_regs = frame;
   1295    1.1  fredette 	nsys = p->p_emul->e_nsysent;
   1296    1.1  fredette 	callp = p->p_emul->e_sysent;
   1297    1.1  fredette 	code = frame->tf_t1;
   1298    1.1  fredette 
   1299    1.1  fredette 	/*
   1300   1.65     skrll 	 * Restarting a system call is touchy on the HPPA, because syscall
   1301   1.65     skrll 	 * arguments are passed in registers and the program counter of the
   1302   1.65     skrll 	 * syscall "point" isn't easily divined.
   1303    1.1  fredette 	 *
   1304   1.65     skrll 	 * We handle the first problem by assuming that we will have to restart
   1305   1.65     skrll 	 * this system call, so we stuff the first four words of the original
   1306   1.65     skrll 	 * arguments back into the frame as arg0...arg3, which is where we
   1307   1.65     skrll 	 * found them in the first place.  Any further arguments are (still) on
   1308   1.65     skrll 	 * the user's stack and the  syscall code will fetch them from there
   1309   1.65     skrll 	 * (again).
   1310    1.1  fredette 	 *
   1311    1.1  fredette 	 * The program counter problem is addressed below.
   1312    1.1  fredette 	 */
   1313    1.1  fredette 	frame->tf_arg0 = args[0];
   1314    1.1  fredette 	frame->tf_arg1 = args[1];
   1315    1.1  fredette 	frame->tf_arg2 = args[2];
   1316    1.1  fredette 	frame->tf_arg3 = args[3];
   1317    1.1  fredette 
   1318    1.1  fredette 	/*
   1319  1.111     skrll 	 * Some special handling for the syscall(2) and
   1320    1.1  fredette 	 * __syscall(2) system calls.
   1321    1.1  fredette 	 */
   1322    1.1  fredette 	switch (code) {
   1323    1.1  fredette 	case SYS_syscall:
   1324    1.1  fredette 		code = *args;
   1325    1.1  fredette 		args += 1;
   1326    1.1  fredette 		break;
   1327    1.1  fredette 	case SYS___syscall:
   1328    1.1  fredette 		if (callp != sysent)
   1329    1.1  fredette 			break;
   1330    1.1  fredette 		/*
   1331   1.65     skrll 		 * NB: even though __syscall(2) takes a quad_t containing the
   1332   1.65     skrll 		 * system call number, because our argument copying word-swaps
   1333   1.65     skrll 		 * 64-bit arguments, the least significant word of that quad_t
   1334    1.1  fredette 		 * is the first word in the argument array.
   1335    1.1  fredette 		 */
   1336    1.1  fredette 		code = *args;
   1337    1.1  fredette 		args += 2;
   1338    1.1  fredette 	}
   1339    1.1  fredette 
   1340    1.1  fredette 	/*
   1341   1.65     skrll 	 * Stacks growing from lower addresses to higher addresses are not
   1342   1.65     skrll 	 * really such a good idea, because it makes it impossible to overlay a
   1343   1.65     skrll 	 * struct on top of C stack arguments (the arguments appear in
   1344    1.1  fredette 	 * reversed order).
   1345    1.1  fredette 	 *
   1346   1.65     skrll 	 * You can do the obvious thing (as locore.S does) and copy argument
   1347   1.65     skrll 	 * words one by one, laying them out in the "right" order in the dest-
   1348   1.65     skrll 	 * ination buffer, but this ends up word-swapping multi-word arguments
   1349   1.65     skrll 	 * (like off_t).
   1350    1.1  fredette 	 *
   1351    1.1  fredette 	 * FIXME - this works only on native binaries and
   1352    1.1  fredette 	 * will probably screw up any and all emulation.
   1353   1.65     skrll 	 *
   1354    1.1  fredette 	 */
   1355   1.65     skrll 
   1356   1.65     skrll 	if (code < 0 || code >= nsys)
   1357   1.65     skrll 		callp += p->p_emul->e_nosys;	/* bad syscall # */
   1358   1.65     skrll 	else
   1359   1.65     skrll 		callp += code;
   1360   1.65     skrll 
   1361   1.65     skrll 	nargs64 = SYCALL_NARGS64(callp);
   1362   1.65     skrll 	if (nargs64 != 0) {
   1363   1.65     skrll 		size_t nargs = callp->sy_narg;
   1364   1.65     skrll 
   1365   1.65     skrll 		for (size_t i = 0; i < nargs + nargs64;) {
   1366   1.65     skrll 			if (SYCALL_ARG_64_P(callp, i)) {
   1367   1.65     skrll 				tmp = args[i];
   1368   1.65     skrll 				args[i] = args[i + 1];
   1369   1.65     skrll 				args[i + 1] = tmp;
   1370   1.65     skrll 				i += 2;
   1371   1.65     skrll 			} else
   1372   1.65     skrll 				i++;
   1373   1.65     skrll 		}
   1374    1.1  fredette 	}
   1375    1.1  fredette 
   1376    1.1  fredette #ifdef USERTRACE
   1377    1.1  fredette 	if (0) {
   1378   1.35     skrll 		user_backtrace(frame, l, -1);
   1379    1.1  fredette 		frame->tf_ipsw |= PSW_R;
   1380    1.1  fredette 		frame->tf_rctr = 0;
   1381    1.1  fredette 		printf("r %08x", frame->tf_iioq_head);
   1382    1.1  fredette 		rctr_next_iioq = frame->tf_iioq_head + 4;
   1383    1.1  fredette 	}
   1384    1.1  fredette #endif
   1385    1.1  fredette 
   1386  1.102     skrll 	error = sy_invoke(callp, l, args, rval, code);
   1387    1.1  fredette 
   1388   1.27  christos 	switch (error) {
   1389    1.1  fredette 	case 0:
   1390    1.9       chs 		l = curlwp;			/* changes on exec() */
   1391    1.9       chs 		frame = l->l_md.md_regs;
   1392    1.1  fredette 		frame->tf_ret0 = rval[0];
   1393    1.1  fredette 		frame->tf_ret1 = rval[1];
   1394    1.1  fredette 		frame->tf_t1 = 0;
   1395    1.1  fredette 		break;
   1396    1.1  fredette 	case ERESTART:
   1397    1.1  fredette 		/*
   1398   1.74     skrll 		 * Now we have to wind back the instruction offset queue to the
   1399   1.74     skrll 		 * point where the system call will be made again.  This is
   1400   1.74     skrll 		 * inherently tied to the SYSCALL macro.
   1401    1.1  fredette 		 *
   1402   1.74     skrll 		 * Currently, the part of the SYSCALL macro that we want to re-
   1403   1.74     skrll 		 * run reads as:
   1404    1.1  fredette 		 *
   1405    1.1  fredette 		 *	ldil	L%SYSCALLGATE, r1
   1406  1.106     skrll 		 *	ble	4(srX, r1)
   1407    1.1  fredette 		 *	ldi	__CONCAT(SYS_,x), t1
   1408   1.52     skrll 		 *	comb,<>	%r0, %t1, __cerror
   1409    1.1  fredette 		 *
   1410   1.74     skrll 		 * And our offset queue head points to the comb instruction.
   1411   1.74     skrll 		 * So we need to subtract twelve to reach the ldil.
   1412    1.1  fredette 		 */
   1413    1.1  fredette 		frame->tf_iioq_head -= 12;
   1414    1.1  fredette 		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
   1415    1.1  fredette 		break;
   1416    1.1  fredette 	case EJUSTRETURN:
   1417    1.1  fredette 		p = curproc;
   1418    1.1  fredette 		break;
   1419    1.1  fredette 	default:
   1420    1.1  fredette 		if (p->p_emul->e_errno)
   1421    1.1  fredette 			error = p->p_emul->e_errno[error];
   1422    1.1  fredette 		frame->tf_t1 = error;
   1423    1.1  fredette 		break;
   1424    1.1  fredette 	}
   1425    1.2  christos 
   1426  1.114     skrll 	userret(l, frame);
   1427   1.69     skrll 
   1428   1.69     skrll #ifdef DIAGNOSTIC
   1429   1.85     skrll 	if (ci->ci_cpl != oldcpl) {
   1430   1.69     skrll 		printf("WARNING: SPL (0x%x) NOT LOWERED ON "
   1431   1.69     skrll 		    "syscall(0x%x, 0x%x, 0x%x, 0x%x...) EXIT, PID %d\n",
   1432   1.85     skrll 		    ci->ci_cpl, code, args[0], args[1], args[2], p->p_pid);
   1433   1.85     skrll 		ci->ci_cpl = oldcpl;
   1434   1.69     skrll 	}
   1435   1.69     skrll #endif
   1436   1.69     skrll 
   1437    1.1  fredette #ifdef DEBUG
   1438   1.81     skrll 	frame_sanity_check(__func__, __LINE__, 0, frame, l);
   1439    1.1  fredette #endif /* DEBUG */
   1440    1.9       chs }
   1441    1.9       chs 
   1442  1.111     skrll /*
   1443    1.9       chs  * Start a new LWP
   1444    1.9       chs  */
   1445    1.9       chs void
   1446   1.14       chs startlwp(void *arg)
   1447    1.9       chs {
   1448    1.9       chs 	ucontext_t *uc = arg;
   1449   1.88     rmind 	lwp_t *l = curlwp;
   1450  1.104    martin 	int error __diagused;
   1451    1.9       chs 
   1452   1.88     rmind 	error = cpu_setmcontext(l, &uc->uc_mcontext, uc->uc_flags);
   1453   1.88     rmind 	KASSERT(error == 0);
   1454    1.9       chs 
   1455   1.88     rmind 	kmem_free(uc, sizeof(ucontext_t));
   1456  1.114     skrll 	userret(l, l->l_md.md_regs);
   1457    1.9       chs }
   1458