Home | History | Annotate | Line # | Download | only in hppa
trap.c revision 1.75
      1  1.75     skrll /*	$NetBSD: trap.c,v 1.75 2010/02/10 20:52:35 skrll Exp $	*/
      2   1.1  fredette 
      3   1.1  fredette /*-
      4   1.1  fredette  * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
      5   1.1  fredette  * All rights reserved.
      6   1.1  fredette  *
      7   1.1  fredette  * This code is derived from software contributed to The NetBSD Foundation
      8   1.1  fredette  * by Matthew Fredette.
      9   1.1  fredette  *
     10   1.1  fredette  * Redistribution and use in source and binary forms, with or without
     11   1.1  fredette  * modification, are permitted provided that the following conditions
     12   1.1  fredette  * are met:
     13   1.1  fredette  * 1. Redistributions of source code must retain the above copyright
     14   1.1  fredette  *    notice, this list of conditions and the following disclaimer.
     15   1.1  fredette  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1  fredette  *    notice, this list of conditions and the following disclaimer in the
     17   1.1  fredette  *    documentation and/or other materials provided with the distribution.
     18   1.1  fredette  *
     19   1.1  fredette  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20   1.1  fredette  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21   1.1  fredette  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22   1.1  fredette  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23   1.1  fredette  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24   1.1  fredette  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25   1.1  fredette  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26   1.1  fredette  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27   1.1  fredette  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28   1.1  fredette  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29   1.1  fredette  * POSSIBILITY OF SUCH DAMAGE.
     30   1.1  fredette  */
     31   1.1  fredette 
     32   1.1  fredette /*	$OpenBSD: trap.c,v 1.30 2001/09/19 20:50:56 mickey Exp $	*/
     33   1.1  fredette 
     34   1.1  fredette /*
     35  1.60       snj  * Copyright (c) 1998-2004 Michael Shalayeff
     36   1.1  fredette  * All rights reserved.
     37   1.1  fredette  *
     38   1.1  fredette  * Redistribution and use in source and binary forms, with or without
     39   1.1  fredette  * modification, are permitted provided that the following conditions
     40   1.1  fredette  * are met:
     41   1.1  fredette  * 1. Redistributions of source code must retain the above copyright
     42   1.1  fredette  *    notice, this list of conditions and the following disclaimer.
     43   1.1  fredette  * 2. Redistributions in binary form must reproduce the above copyright
     44   1.1  fredette  *    notice, this list of conditions and the following disclaimer in the
     45   1.1  fredette  *    documentation and/or other materials provided with the distribution.
     46   1.1  fredette  *
     47   1.1  fredette  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     48   1.1  fredette  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     49   1.1  fredette  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     50  1.60       snj  * IN NO EVENT SHALL THE AUTHOR OR HIS RELATIVES BE LIABLE FOR ANY DIRECT,
     51  1.60       snj  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     52  1.60       snj  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     53  1.60       snj  * SERVICES; LOSS OF MIND, USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     54  1.60       snj  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
     55  1.60       snj  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
     56  1.60       snj  * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
     57  1.60       snj  * THE POSSIBILITY OF SUCH DAMAGE.
     58   1.1  fredette  */
     59   1.8     lukem 
     60   1.8     lukem #include <sys/cdefs.h>
     61  1.75     skrll __KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.75 2010/02/10 20:52:35 skrll Exp $");
     62   1.1  fredette 
     63   1.1  fredette /* #define INTRDEBUG */
     64   1.1  fredette /* #define TRAPDEBUG */
     65   1.1  fredette /* #define USERTRACE */
     66   1.1  fredette 
     67   1.1  fredette #include "opt_kgdb.h"
     68  1.51     skrll #include "opt_ptrace.h"
     69  1.56  wrstuden #include "opt_sa.h"
     70   1.1  fredette 
     71   1.1  fredette #include <sys/param.h>
     72   1.1  fredette #include <sys/systm.h>
     73   1.1  fredette #include <sys/kernel.h>
     74   1.1  fredette #include <sys/syscall.h>
     75  1.57        ad #include <sys/syscallvar.h>
     76  1.56  wrstuden #include <sys/sa.h>
     77  1.56  wrstuden #include <sys/savar.h>
     78  1.40        ad #include <sys/mutex.h>
     79   1.1  fredette #include <sys/ktrace.h>
     80   1.1  fredette #include <sys/proc.h>
     81   1.1  fredette #include <sys/signalvar.h>
     82   1.1  fredette #include <sys/acct.h>
     83   1.1  fredette #include <sys/signal.h>
     84   1.1  fredette #include <sys/device.h>
     85   1.9       chs #include <sys/pool.h>
     86  1.20       chs #include <sys/userret.h>
     87   1.1  fredette 
     88   1.1  fredette #include <net/netisr.h>
     89   1.1  fredette 
     90   1.1  fredette #ifdef KGDB
     91   1.1  fredette #include <sys/kgdb.h>
     92   1.1  fredette #endif
     93   1.1  fredette 
     94   1.1  fredette #include <uvm/uvm.h>
     95   1.1  fredette 
     96   1.1  fredette #include <machine/iomod.h>
     97   1.1  fredette #include <machine/cpufunc.h>
     98   1.1  fredette #include <machine/reg.h>
     99   1.1  fredette #include <machine/autoconf.h>
    100   1.1  fredette 
    101   1.1  fredette #include <machine/db_machdep.h>
    102   1.1  fredette 
    103   1.1  fredette #include <hppa/hppa/machdep.h>
    104   1.1  fredette 
    105   1.1  fredette #include <ddb/db_output.h>
    106  1.19       chs #include <ddb/db_interface.h>
    107   1.1  fredette 
    108  1.51     skrll #ifdef PTRACE
    109  1.51     skrll void ss_clear_breakpoints(struct lwp *l);
    110  1.51     skrll int ss_put_value(struct lwp *, vaddr_t, u_int);
    111  1.51     skrll int ss_get_value(struct lwp *, vaddr_t, u_int *);
    112  1.51     skrll #endif
    113  1.51     skrll 
    114  1.51     skrll /* single-step breakpoint */
    115  1.51     skrll #define SSBREAKPOINT   (HPPA_BREAK_KERNEL | (HPPA_BREAK_SS << 13))
    116  1.51     skrll 
    117   1.1  fredette #if defined(DEBUG) || defined(DIAGNOSTIC)
    118   1.1  fredette /*
    119   1.1  fredette  * 0x6fc1000 is a stwm r1, d(sr0, sp), which is the last
    120   1.1  fredette  * instruction in the function prologue that gcc -O0 uses.
    121   1.1  fredette  * When we have this instruction we know the relationship
    122   1.1  fredette  * between the stack pointer and the gcc -O0 frame pointer
    123   1.1  fredette  * (in r3, loaded with the initial sp) for the body of a
    124   1.1  fredette  * function.
    125   1.1  fredette  *
    126   1.1  fredette  * If the given instruction is a stwm r1, d(sr0, sp) where
    127   1.1  fredette  * d > 0, we evaluate to d, else we evaluate to zero.
    128   1.1  fredette  */
    129   1.1  fredette #define STWM_R1_D_SR0_SP(inst) \
    130   1.1  fredette 	(((inst) & 0xffffc001) == 0x6fc10000 ? (((inst) & 0x00003ff) >> 1) : 0)
    131   1.1  fredette #endif /* DEBUG || DIAGNOSTIC */
    132   1.1  fredette 
    133   1.1  fredette const char *trap_type[] = {
    134   1.1  fredette 	"invalid",
    135   1.1  fredette 	"HPMC",
    136   1.1  fredette 	"power failure",
    137   1.1  fredette 	"recovery counter",
    138   1.1  fredette 	"external interrupt",
    139   1.1  fredette 	"LPMC",
    140   1.1  fredette 	"ITLB miss fault",
    141   1.1  fredette 	"instruction protection",
    142   1.1  fredette 	"Illegal instruction",
    143   1.1  fredette 	"break instruction",
    144   1.1  fredette 	"privileged operation",
    145   1.1  fredette 	"privileged register",
    146   1.1  fredette 	"overflow",
    147   1.1  fredette 	"conditional",
    148   1.1  fredette 	"assist exception",
    149   1.1  fredette 	"DTLB miss",
    150   1.1  fredette 	"ITLB non-access miss",
    151   1.1  fredette 	"DTLB non-access miss",
    152   1.1  fredette 	"data protection/rights/alignment",
    153   1.1  fredette 	"data break",
    154   1.1  fredette 	"TLB dirty",
    155   1.1  fredette 	"page reference",
    156   1.1  fredette 	"assist emulation",
    157   1.1  fredette 	"higher-priv transfer",
    158   1.1  fredette 	"lower-priv transfer",
    159   1.1  fredette 	"taken branch",
    160   1.1  fredette 	"data access rights",
    161   1.1  fredette 	"data protection",
    162   1.1  fredette 	"unaligned data ref",
    163   1.1  fredette };
    164  1.72     skrll int trap_types = __arraycount(trap_type);
    165   1.1  fredette 
    166  1.23       chs uint8_t fpopmap[] = {
    167  1.23       chs 	0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, 0x00,
    168  1.23       chs 	0x00, 0x0c, 0x00, 0x0e, 0x00, 0x00, 0x00, 0x00,
    169  1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    170  1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    171  1.23       chs 	0x00, 0x00, 0x00, 0x26, 0x00, 0x00, 0x00, 0x00,
    172  1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    173  1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    174  1.23       chs 	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
    175  1.23       chs };
    176  1.23       chs 
    177   1.1  fredette volatile int astpending;
    178   1.1  fredette 
    179  1.14       chs void pmap_hptdump(void);
    180  1.14       chs void syscall(struct trapframe *, int *);
    181   1.1  fredette 
    182  1.53     skrll #if defined(DEBUG)
    183  1.53     skrll struct trapframe *sanity_frame;
    184  1.53     skrll struct lwp *sanity_lwp;
    185  1.53     skrll int sanity_checked = 0;
    186  1.53     skrll void frame_sanity_check(int, int, struct trapframe *, struct lwp *);
    187  1.53     skrll #endif
    188  1.53     skrll 
    189  1.53     skrll 
    190   1.1  fredette #ifdef USERTRACE
    191   1.1  fredette /*
    192   1.1  fredette  * USERTRACE is a crude facility that traces the PC of
    193   1.1  fredette  * a single user process.  This tracing is normally
    194   1.1  fredette  * activated by the dispatching of a certain syscall
    195   1.1  fredette  * with certain arguments - see the activation code in
    196   1.1  fredette  * syscall().
    197   1.1  fredette  */
    198  1.53     skrll static void user_backtrace(struct trapframe *, struct lwp *, int);
    199  1.53     skrll static void user_backtrace_raw(u_int, u_int);
    200  1.53     skrll 
    201   1.1  fredette u_int rctr_next_iioq;
    202   1.1  fredette #endif
    203   1.1  fredette 
    204  1.30     perry static inline void
    205  1.20       chs userret(struct lwp *l, register_t pc, u_quad_t oticks)
    206   1.1  fredette {
    207   1.9       chs 	struct proc *p = l->l_proc;
    208   1.1  fredette 
    209  1.70     skrll 	if (astpending) {
    210  1.70     skrll 		astpending = 0;
    211  1.70     skrll 		if (curcpu()->ci_want_resched) {
    212  1.70     skrll 			preempt();
    213  1.70     skrll 		}
    214   1.1  fredette 	}
    215   1.1  fredette 
    216  1.20       chs 	mi_userret(l);
    217  1.20       chs 
    218   1.1  fredette 	/*
    219   1.1  fredette 	 * If profiling, charge recent system time to the trapped pc.
    220   1.1  fredette 	 */
    221  1.40        ad 	if (p->p_stflag & PST_PROFIL) {
    222   1.1  fredette 		extern int psratio;
    223   1.1  fredette 
    224  1.40        ad 		addupc_task(l, pc, (int)(p->p_sticks - oticks) * psratio);
    225   1.1  fredette 	}
    226   1.1  fredette }
    227   1.1  fredette 
    228   1.1  fredette /*
    229   1.1  fredette  * This handles some messy kernel debugger details.
    230   1.1  fredette  * It dispatches into either kgdb or DDB, and knows
    231   1.1  fredette  * about some special things to do, like skipping over
    232   1.1  fredette  * break instructions and how to really set up for
    233   1.1  fredette  * a single-step.
    234   1.1  fredette  */
    235   1.1  fredette #if defined(KGDB) || defined(DDB)
    236   1.1  fredette static int
    237   1.1  fredette trap_kdebug(int type, int code, struct trapframe *frame)
    238   1.1  fredette {
    239   1.1  fredette 	int handled;
    240   1.1  fredette 	u_int tf_iioq_head_old;
    241   1.1  fredette 	u_int tf_iioq_tail_old;
    242   1.1  fredette 
    243   1.1  fredette 	for(;;) {
    244   1.1  fredette 
    245   1.1  fredette 		/* This trap has not been handled. */
    246   1.1  fredette 		handled = 0;
    247   1.1  fredette 
    248   1.1  fredette 		/* Remember the instruction offset queue. */
    249   1.1  fredette 		tf_iioq_head_old = frame->tf_iioq_head;
    250   1.1  fredette 		tf_iioq_tail_old = frame->tf_iioq_tail;
    251   1.1  fredette 
    252   1.1  fredette #ifdef	KGDB
    253   1.1  fredette 		/* Let KGDB handle it (if connected) */
    254   1.1  fredette 		if (!handled)
    255   1.1  fredette 			handled = kgdb_trap(type, frame);
    256   1.1  fredette #endif
    257   1.1  fredette #ifdef	DDB
    258   1.1  fredette 		/* Let DDB handle it. */
    259   1.1  fredette 		if (!handled)
    260   1.1  fredette 			handled = kdb_trap(type, code, frame);
    261   1.1  fredette #endif
    262   1.1  fredette 
    263   1.1  fredette 		/* If this trap wasn't handled, return now. */
    264   1.1  fredette 		if (!handled)
    265   1.1  fredette 			return(0);
    266   1.1  fredette 
    267   1.1  fredette 		/*
    268   1.1  fredette 		 * If the instruction offset queue head changed,
    269   1.1  fredette 		 * but the offset queue tail didn't, assume that
    270   1.1  fredette 		 * the user wants to jump to the head offset, and
    271   1.1  fredette 		 * adjust the tail accordingly.  This should fix
    272   1.1  fredette 		 * the kgdb `jump' command, and can help DDB users
    273   1.1  fredette 		 * who `set' the offset head but forget the tail.
    274   1.1  fredette 		 */
    275   1.1  fredette 		if (frame->tf_iioq_head != tf_iioq_head_old &&
    276   1.1  fredette 		    frame->tf_iioq_tail == tf_iioq_tail_old)
    277   1.1  fredette 			frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    278   1.1  fredette 
    279   1.1  fredette 		/*
    280   1.1  fredette 		 * This is some single-stepping support.
    281   1.1  fredette 		 * If we're trying to step through a nullified
    282   1.1  fredette 		 * instruction, just advance by hand and trap
    283   1.1  fredette 		 * again.  Otherwise, load the recovery counter
    284   1.1  fredette 		 * with zero.
    285   1.1  fredette 		 */
    286   1.1  fredette 		if (frame->tf_ipsw & PSW_R) {
    287   1.1  fredette #ifdef TRAPDEBUG
    288  1.44     skrll 			printf("(single stepping at head 0x%x tail 0x%x)\n",
    289  1.44     skrll 			    frame->tf_iioq_head, frame->tf_iioq_tail);
    290   1.1  fredette #endif
    291   1.1  fredette 			if (frame->tf_ipsw & PSW_N) {
    292   1.1  fredette #ifdef TRAPDEBUG
    293   1.1  fredette 				printf("(single stepping past nullified)\n");
    294   1.1  fredette #endif
    295   1.1  fredette 
    296   1.1  fredette 				/* Advance the program counter. */
    297   1.1  fredette 				frame->tf_iioq_head = frame->tf_iioq_tail;
    298   1.1  fredette 				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    299   1.1  fredette 
    300   1.1  fredette 				/* Clear flags. */
    301   1.1  fredette 				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
    302   1.1  fredette 
    303   1.1  fredette 				/* Simulate another trap. */
    304   1.1  fredette 				type = T_RECOVERY;
    305   1.1  fredette 				continue;
    306   1.1  fredette 			}
    307   1.1  fredette 			frame->tf_rctr = 0;
    308   1.1  fredette 		}
    309   1.1  fredette 
    310   1.1  fredette 		/* We handled this trap. */
    311   1.1  fredette 		return (1);
    312   1.1  fredette 	}
    313   1.1  fredette 	/* NOTREACHED */
    314   1.1  fredette }
    315   1.1  fredette #else	/* !KGDB && !DDB */
    316   1.1  fredette #define trap_kdebug(t, c, f)	(0)
    317   1.1  fredette #endif	/* !KGDB && !DDB */
    318   1.1  fredette 
    319  1.24   tsutsui #if defined(DEBUG) || defined(USERTRACE)
    320   1.1  fredette /*
    321   1.1  fredette  * These functions give a crude usermode backtrace.  They
    322   1.1  fredette  * really only work when code has been compiled without
    323   1.1  fredette  * optimization, as they assume a certain function prologue
    324   1.1  fredette  * sets up a frame pointer and stores the return pointer
    325   1.1  fredette  * and arguments in it.
    326   1.1  fredette  */
    327   1.1  fredette static void
    328   1.1  fredette user_backtrace_raw(u_int pc, u_int fp)
    329   1.1  fredette {
    330   1.1  fredette 	int frame_number;
    331   1.1  fredette 	int arg_number;
    332   1.1  fredette 
    333   1.3  fredette 	for (frame_number = 0;
    334   1.3  fredette 	     frame_number < 100 && pc > HPPA_PC_PRIV_MASK && fp;
    335   1.3  fredette 	     frame_number++) {
    336   1.3  fredette 
    337   1.1  fredette 		printf("%3d: pc=%08x%s fp=0x%08x", frame_number,
    338  1.44     skrll 		    pc & ~HPPA_PC_PRIV_MASK, USERMODE(pc) ? "  " : "**", fp);
    339   1.1  fredette 		for(arg_number = 0; arg_number < 4; arg_number++)
    340   1.1  fredette 			printf(" arg%d=0x%08x", arg_number,
    341   1.1  fredette 			    (int) fuword(HPPA_FRAME_CARG(arg_number, fp)));
    342   1.1  fredette 		printf("\n");
    343   1.1  fredette                 pc = fuword(((register_t *) fp) - 5);	/* fetch rp */
    344   1.1  fredette 		if (pc == -1) {
    345   1.1  fredette 			printf("  fuword for pc failed\n");
    346   1.1  fredette 			break;
    347   1.1  fredette 		}
    348   1.1  fredette                 fp = fuword(((register_t *) fp) + 0);	/* fetch previous fp */
    349   1.1  fredette 		if (fp == -1) {
    350   1.1  fredette 			printf("  fuword for fp failed\n");
    351   1.1  fredette 			break;
    352   1.1  fredette 		}
    353   1.1  fredette 	}
    354   1.1  fredette 	printf("  backtrace stopped with pc %08x fp 0x%08x\n", pc, fp);
    355   1.1  fredette }
    356   1.1  fredette 
    357   1.1  fredette static void
    358   1.9       chs user_backtrace(struct trapframe *tf, struct lwp *l, int type)
    359   1.1  fredette {
    360   1.9       chs 	struct proc *p = l->l_proc;
    361   1.1  fredette 	u_int pc, fp, inst;
    362   1.1  fredette 
    363   1.1  fredette 	/*
    364   1.3  fredette 	 * Display any trap type that we have.
    365   1.3  fredette 	 */
    366   1.3  fredette 	if (type >= 0)
    367   1.3  fredette 		printf("pid %d (%s) trap #%d\n",
    368   1.3  fredette 		    p->p_pid, p->p_comm, type & ~T_USER);
    369   1.3  fredette 
    370   1.3  fredette 	/*
    371   1.1  fredette 	 * Assuming that the frame pointer in r3 is valid,
    372   1.1  fredette 	 * dump out a stack trace.
    373   1.1  fredette 	 */
    374   1.1  fredette 	fp = tf->tf_r3;
    375   1.1  fredette 	printf("pid %d (%s) backtrace, starting with fp 0x%08x\n",
    376   1.1  fredette 		p->p_pid, p->p_comm, fp);
    377   1.1  fredette 	user_backtrace_raw(tf->tf_iioq_head, fp);
    378   1.1  fredette 
    379   1.1  fredette 	/*
    380   1.1  fredette 	 * In case the frame pointer in r3 is not valid,
    381   1.1  fredette 	 * assuming the stack pointer is valid and the
    382   1.1  fredette 	 * faulting function is a non-leaf, if we can
    383   1.1  fredette 	 * find its prologue we can recover its frame
    384   1.1  fredette 	 * pointer.
    385   1.1  fredette 	 */
    386   1.1  fredette 	pc = tf->tf_iioq_head;
    387   1.1  fredette 	fp = tf->tf_sp - HPPA_FRAME_SIZE;
    388   1.1  fredette 	printf("pid %d (%s) backtrace, starting with sp 0x%08x pc 0x%08x\n",
    389   1.1  fredette 		p->p_pid, p->p_comm, tf->tf_sp, pc);
    390  1.44     skrll 	for (pc &= ~HPPA_PC_PRIV_MASK; pc > 0; pc -= sizeof(inst)) {
    391   1.1  fredette 		inst = fuword((register_t *) pc);
    392   1.1  fredette 		if (inst == -1) {
    393   1.1  fredette 			printf("  fuword for inst at pc %08x failed\n", pc);
    394   1.1  fredette 			break;
    395   1.1  fredette 		}
    396   1.1  fredette 		/* Check for the prologue instruction that sets sp. */
    397   1.1  fredette 		if (STWM_R1_D_SR0_SP(inst)) {
    398   1.1  fredette 			fp = tf->tf_sp - STWM_R1_D_SR0_SP(inst);
    399   1.1  fredette 			printf("  sp from fp at pc %08x: %08x\n", pc, inst);
    400   1.1  fredette 			break;
    401   1.1  fredette 		}
    402   1.1  fredette 	}
    403   1.1  fredette 	user_backtrace_raw(tf->tf_iioq_head, fp);
    404   1.1  fredette }
    405  1.24   tsutsui #endif /* DEBUG || USERTRACE */
    406   1.1  fredette 
    407   1.1  fredette #ifdef DEBUG
    408   1.1  fredette /*
    409   1.1  fredette  * This sanity-checks a trapframe.  It is full of various
    410   1.1  fredette  * assumptions about what a healthy CPU state should be,
    411   1.1  fredette  * with some documented elsewhere, some not.
    412   1.1  fredette  */
    413   1.1  fredette void
    414  1.26       chs frame_sanity_check(int where, int type, struct trapframe *tf, struct lwp *l)
    415   1.1  fredette {
    416   1.1  fredette 	extern int kernel_text;
    417   1.1  fredette 	extern int etext;
    418   1.1  fredette 	extern register_t kpsw;
    419  1.62     rmind 
    420   1.1  fredette #define SANITY(e)					\
    421   1.1  fredette do {							\
    422   1.1  fredette 	if (sanity_frame == NULL && !(e)) {		\
    423   1.1  fredette 		sanity_frame = tf;			\
    424   1.9       chs 		sanity_lwp = l;				\
    425   1.1  fredette 		sanity_checked = __LINE__;		\
    426   1.1  fredette 	}						\
    427   1.1  fredette } while (/* CONSTCOND */ 0)
    428   1.1  fredette 
    429   1.1  fredette 	SANITY((tf->tf_ipsw & kpsw) == kpsw);
    430   1.1  fredette 	SANITY((kpsw & PSW_I) == 0 || tf->tf_eiem != 0);
    431   1.1  fredette 	if (tf->tf_iisq_head == HPPA_SID_KERNEL) {
    432  1.62     rmind 		vaddr_t minsp, maxsp, uv;
    433  1.45     skrll 
    434  1.63     skrll 		uv = uvm_lwp_getuarea(l);
    435  1.63     skrll 
    436   1.1  fredette 		/*
    437   1.1  fredette 		 * If the trap happened in the gateway
    438   1.1  fredette 		 * page, we take the easy way out and
    439   1.1  fredette 		 * assume that the trapframe is okay.
    440   1.1  fredette 		 */
    441  1.45     skrll 		if ((tf->tf_iioq_head & ~PAGE_MASK) == SYSCALLGATE)
    442  1.45     skrll 			goto out;
    443  1.45     skrll 
    444  1.45     skrll 		SANITY(!USERMODE(tf->tf_iioq_head));
    445  1.45     skrll 		SANITY(!USERMODE(tf->tf_iioq_tail));
    446  1.45     skrll 
    447  1.45     skrll 		/*
    448  1.45     skrll 		 * Don't check the instruction queues or stack on interrupts
    449  1.45     skrll 		 * as we could be be in the sti code (outside normal kernel
    450  1.45     skrll 		 * text) or switching LWPs (curlwp and sp are not in sync)
    451  1.45     skrll 		 */
    452  1.45     skrll 		if ((type & ~T_USER) == T_INTERRUPT)
    453  1.45     skrll 			goto out;
    454  1.45     skrll 
    455  1.45     skrll 		SANITY(tf->tf_iioq_head >= (u_int) &kernel_text);
    456  1.45     skrll 		SANITY(tf->tf_iioq_head < (u_int) &etext);
    457  1.45     skrll 		SANITY(tf->tf_iioq_tail >= (u_int) &kernel_text);
    458  1.45     skrll 		SANITY(tf->tf_iioq_tail < (u_int) &etext);
    459  1.43      yamt 
    460  1.62     rmind 		maxsp = uv + USPACE + PAGE_SIZE;
    461  1.62     rmind 		minsp = uv + PAGE_SIZE;
    462  1.43      yamt 
    463  1.45     skrll 		SANITY(l != NULL || (tf->tf_sp >= minsp && tf->tf_sp < maxsp));
    464   1.1  fredette 	} else {
    465  1.71     skrll 		bool ok;
    466  1.71     skrll 		paddr_t pa;
    467  1.71     skrll 
    468  1.71     skrll 		ok = pmap_extract(pmap_kernel(), uvm_lwp_getuarea(l), &pa);
    469  1.71     skrll 		KASSERT(ok);
    470  1.71     skrll 
    471   1.1  fredette 		SANITY(USERMODE(tf->tf_iioq_head));
    472   1.1  fredette 		SANITY(USERMODE(tf->tf_iioq_tail));
    473  1.71     skrll 		SANITY(l != NULL && tf->tf_cr30 == pa);
    474   1.1  fredette 	}
    475   1.1  fredette #undef SANITY
    476  1.45     skrll out:
    477   1.1  fredette 	if (sanity_frame == tf) {
    478  1.26       chs 		printf("insanity: where 0x%x type 0x%x tf %p lwp %p line %d "
    479  1.26       chs 		       "sp 0x%x pc 0x%x\n",
    480  1.26       chs 		       where, type, sanity_frame, sanity_lwp, sanity_checked,
    481  1.22       chs 		       tf->tf_sp, tf->tf_iioq_head);
    482   1.4  fredette 		(void) trap_kdebug(T_IBREAK, 0, tf);
    483   1.1  fredette 		sanity_frame = NULL;
    484   1.9       chs 		sanity_lwp = NULL;
    485   1.1  fredette 		sanity_checked = 0;
    486   1.1  fredette 	}
    487   1.1  fredette }
    488   1.1  fredette #endif /* DEBUG */
    489   1.1  fredette 
    490   1.1  fredette void
    491  1.14       chs trap(int type, struct trapframe *frame)
    492   1.1  fredette {
    493  1.13   tsutsui 	struct lwp *l;
    494  1.13   tsutsui 	struct proc *p;
    495  1.61     rmind 	struct pcb *pcb;
    496   1.9       chs 	vaddr_t va;
    497   1.9       chs 	struct vm_map *map;
    498   1.1  fredette 	struct vmspace *vm;
    499   1.9       chs 	vm_prot_t vftype;
    500   1.9       chs 	pa_space_t space;
    501  1.22       chs 	ksiginfo_t ksi;
    502  1.19       chs 	u_int opcode, onfault;
    503   1.1  fredette 	int ret;
    504  1.73     skrll 	const char *tts = "reserved";
    505  1.67     skrll 	int trapnum;
    506   1.1  fredette #ifdef DIAGNOSTIC
    507   1.1  fredette 	extern int emergency_stack_start, emergency_stack_end;
    508  1.73     skrll 
    509  1.69     skrll 	int oldcpl = cpl;
    510   1.1  fredette #endif
    511   1.1  fredette 
    512  1.67     skrll 	trapnum = type & ~T_USER;
    513   1.1  fredette 	opcode = frame->tf_iir;
    514  1.67     skrll 	if (trapnum == T_ITLBMISS || trapnum == T_ITLBMISSNA ||
    515  1.67     skrll 	    trapnum == T_IBREAK || trapnum == T_TAKENBR) {
    516   1.1  fredette 		va = frame->tf_iioq_head;
    517   1.1  fredette 		space = frame->tf_iisq_head;
    518  1.17       chs 		vftype = VM_PROT_EXECUTE;
    519   1.1  fredette 	} else {
    520   1.1  fredette 		va = frame->tf_ior;
    521   1.1  fredette 		space = frame->tf_isr;
    522   1.1  fredette 		vftype = inst_store(opcode) ? VM_PROT_WRITE : VM_PROT_READ;
    523   1.1  fredette 	}
    524  1.13   tsutsui 
    525  1.64     skrll 	KASSERT(curlwp != NULL);
    526  1.18       chs 	l = curlwp;
    527  1.64     skrll 	p = l->l_proc;
    528  1.36        ad 	if ((type & T_USER) != 0)
    529  1.36        ad 		LWP_CACHE_CREDS(l, p);
    530   1.1  fredette 
    531   1.1  fredette #ifdef DIAGNOSTIC
    532   1.1  fredette 	/*
    533   1.1  fredette 	 * If we are on the emergency stack, then we either got
    534   1.1  fredette 	 * a fault on the kernel stack, or we're just handling
    535   1.1  fredette 	 * a trap for the machine check handler (which also
    536   1.1  fredette 	 * runs on the emergency stack).
    537   1.1  fredette 	 *
    538   1.1  fredette 	 * We *very crudely* differentiate between the two cases
    539   1.1  fredette 	 * by checking the faulting instruction: if it is the
    540   1.1  fredette 	 * function prologue instruction that stores the old
    541   1.1  fredette 	 * frame pointer and updates the stack pointer, we assume
    542   1.1  fredette 	 * that we faulted on the kernel stack.
    543   1.1  fredette 	 *
    544   1.1  fredette 	 * In this case, not completing that instruction will
    545   1.1  fredette 	 * probably confuse backtraces in kgdb/ddb.  Completing
    546   1.1  fredette 	 * it would be difficult, because we already faulted on
    547   1.1  fredette 	 * that part of the stack, so instead we fix up the
    548   1.1  fredette 	 * frame as if the function called has just returned.
    549   1.1  fredette 	 * This has peculiar knowledge about what values are in
    550   1.1  fredette 	 * what registers during the "normal gcc -g" prologue.
    551   1.1  fredette 	 */
    552   1.1  fredette 	if (&type >= &emergency_stack_start &&
    553   1.1  fredette 	    &type < &emergency_stack_end &&
    554   1.1  fredette 	    type != T_IBREAK && STWM_R1_D_SR0_SP(opcode)) {
    555   1.1  fredette 		/* Restore the caller's frame pointer. */
    556   1.1  fredette 		frame->tf_r3 = frame->tf_r1;
    557   1.1  fredette 		/* Restore the caller's instruction offsets. */
    558   1.1  fredette 		frame->tf_iioq_head = frame->tf_rp;
    559   1.1  fredette 		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    560   1.1  fredette 		goto dead_end;
    561   1.1  fredette 	}
    562   1.1  fredette #endif /* DIAGNOSTIC */
    563   1.1  fredette 
    564   1.1  fredette #ifdef DEBUG
    565  1.26       chs 	frame_sanity_check(0xdead01, type, frame, l);
    566   1.1  fredette #endif /* DEBUG */
    567   1.1  fredette 
    568   1.1  fredette 	if (frame->tf_flags & TFF_LAST)
    569   1.9       chs 		l->l_md.md_regs = frame;
    570   1.1  fredette 
    571  1.73     skrll 	if (trapnum <= trap_types)
    572  1.73     skrll 		tts = trap_type[trapnum];
    573  1.73     skrll 
    574   1.1  fredette #ifdef TRAPDEBUG
    575  1.67     skrll 	if (trapnum != T_INTERRUPT && trapnum != T_IBREAK)
    576  1.75     skrll 		printf("trap: %d, %s for %x:%lx at %x:%x, fp=%p, rp=%x\n",
    577  1.75     skrll 		    type, tts, space, va, frame->tf_iisq_head,
    578   1.1  fredette 		    frame->tf_iioq_head, frame, frame->tf_rp);
    579  1.67     skrll 	else if (trapnum == T_IBREAK)
    580   1.1  fredette 		printf("trap: break instruction %x:%x at %x:%x, fp=%p\n",
    581   1.1  fredette 		    break5(opcode), break13(opcode),
    582   1.1  fredette 		    frame->tf_iisq_head, frame->tf_iioq_head, frame);
    583   1.1  fredette 
    584   1.1  fredette 	{
    585   1.1  fredette 		extern int etext;
    586   1.1  fredette 		if (frame < (struct trapframe *)&etext) {
    587   1.1  fredette 			printf("trap: bogus frame ptr %p\n", frame);
    588   1.1  fredette 			goto dead_end;
    589   1.1  fredette 		}
    590   1.1  fredette 	}
    591   1.1  fredette #endif
    592  1.73     skrll 
    593  1.61     rmind 	pcb = lwp_getpcb(l);
    594  1.61     rmind 
    595  1.66     skrll 	/* If this is a trap, not an interrupt, reenable interrupts. */
    596  1.67     skrll 	if (trapnum != T_INTERRUPT) {
    597  1.66     skrll 		uvmexp.traps++;
    598  1.66     skrll 		mtctl(frame->tf_eiem, CR_EIEM);
    599  1.66     skrll 	}
    600  1.66     skrll 
    601   1.1  fredette 	switch (type) {
    602   1.1  fredette 	case T_NONEXIST:
    603   1.1  fredette 	case T_NONEXIST|T_USER:
    604   1.1  fredette #if !defined(DDB) && !defined(KGDB)
    605   1.1  fredette 		/* we've got screwed up by the central scrutinizer */
    606   1.1  fredette 		panic ("trap: elvis has just left the building!");
    607   1.1  fredette 		break;
    608   1.1  fredette #else
    609   1.1  fredette 		goto dead_end;
    610   1.1  fredette #endif
    611   1.1  fredette 	case T_RECOVERY|T_USER:
    612   1.1  fredette #ifdef USERTRACE
    613   1.1  fredette 		for(;;) {
    614   1.1  fredette 			if (frame->tf_iioq_head != rctr_next_iioq)
    615   1.1  fredette 				printf("-%08x\nr %08x",
    616   1.1  fredette 					rctr_next_iioq - 4,
    617   1.1  fredette 					frame->tf_iioq_head);
    618   1.1  fredette 			rctr_next_iioq = frame->tf_iioq_head + 4;
    619   1.1  fredette 			if (frame->tf_ipsw & PSW_N) {
    620   1.1  fredette 				/* Advance the program counter. */
    621   1.1  fredette 				frame->tf_iioq_head = frame->tf_iioq_tail;
    622   1.1  fredette 				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    623   1.1  fredette 				/* Clear flags. */
    624   1.1  fredette 				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
    625   1.1  fredette 				/* Simulate another trap. */
    626   1.1  fredette 				continue;
    627   1.1  fredette 			}
    628   1.1  fredette 			break;
    629   1.1  fredette 		}
    630   1.1  fredette 		frame->tf_rctr = 0;
    631   1.1  fredette 		break;
    632   1.1  fredette #endif /* USERTRACE */
    633   1.1  fredette 	case T_RECOVERY:
    634   1.1  fredette #if !defined(DDB) && !defined(KGDB)
    635   1.1  fredette 		/* XXX will implement later */
    636   1.1  fredette 		printf ("trap: handicapped");
    637   1.1  fredette 		break;
    638   1.1  fredette #else
    639   1.1  fredette 		goto dead_end;
    640   1.1  fredette #endif
    641   1.1  fredette 
    642   1.1  fredette 	case T_EMULATION | T_USER:
    643   1.1  fredette #ifdef FPEMUL
    644  1.21       chs 		hppa_fpu_emulate(frame, l, opcode);
    645   1.1  fredette #else  /* !FPEMUL */
    646   1.1  fredette 		/*
    647   1.1  fredette 		 * We don't have FPU emulation, so signal the
    648   1.1  fredette 		 * process with a SIGFPE.
    649   1.1  fredette 		 */
    650  1.22       chs 
    651  1.22       chs 		KSI_INIT_TRAP(&ksi);
    652  1.22       chs 		ksi.ksi_signo = SIGFPE;
    653  1.22       chs 		ksi.ksi_code = SI_NOINFO;
    654  1.22       chs 		ksi.ksi_trap = type;
    655  1.22       chs 		ksi.ksi_addr = (void *)frame->tf_iioq_head;
    656  1.22       chs 		trapsignal(l, &ksi);
    657   1.1  fredette #endif /* !FPEMUL */
    658   1.1  fredette 		break;
    659   1.1  fredette 
    660  1.25       chs 	case T_DATALIGN:
    661  1.61     rmind 		if (pcb->pcb_onfault) {
    662  1.25       chs do_onfault:
    663  1.61     rmind 			frame->tf_iioq_head = pcb->pcb_onfault;
    664  1.61     rmind 			frame->tf_iioq_tail = 4 + frame->tf_iioq_head;
    665  1.61     rmind 			pcb->pcb_onfault = 0;
    666  1.25       chs 			break;
    667  1.25       chs 		}
    668  1.25       chs 		/*FALLTHROUGH*/
    669  1.25       chs 
    670   1.1  fredette #ifdef DIAGNOSTIC
    671   1.1  fredette 		/* these just can't happen ever */
    672   1.1  fredette 	case T_PRIV_OP:
    673   1.1  fredette 	case T_PRIV_REG:
    674   1.1  fredette 		/* these just can't make it to the trap() ever */
    675  1.25       chs 	case T_HPMC:
    676  1.25       chs 	case T_HPMC | T_USER:
    677   1.1  fredette 	case T_EMULATION:
    678  1.25       chs 	case T_EXCEPTION:
    679   1.1  fredette #endif
    680   1.1  fredette 	case T_IBREAK:
    681   1.1  fredette 	case T_DBREAK:
    682   1.1  fredette 	dead_end:
    683   1.3  fredette 		if (type & T_USER) {
    684   1.3  fredette #ifdef DEBUG
    685   1.9       chs 			user_backtrace(frame, l, type);
    686   1.3  fredette #endif
    687  1.22       chs 			KSI_INIT_TRAP(&ksi);
    688  1.22       chs 			ksi.ksi_signo = SIGILL;
    689  1.22       chs 			ksi.ksi_code = ILL_ILLTRP;
    690  1.22       chs 			ksi.ksi_trap = type;
    691  1.22       chs 			ksi.ksi_addr = (void *)frame->tf_iioq_head;
    692  1.22       chs 			trapsignal(l, &ksi);
    693   1.3  fredette 			break;
    694   1.3  fredette 		}
    695   1.1  fredette 		if (trap_kdebug(type, va, frame))
    696   1.1  fredette 			return;
    697   1.1  fredette 		else if (type == T_DATALIGN)
    698   1.1  fredette 			panic ("trap: %s at 0x%x", tts, (u_int) va);
    699   1.1  fredette 		else
    700   1.1  fredette 			panic ("trap: no debugger for \"%s\" (%d)", tts, type);
    701   1.1  fredette 		break;
    702   1.1  fredette 
    703   1.1  fredette 	case T_IBREAK | T_USER:
    704   1.1  fredette 	case T_DBREAK | T_USER:
    705  1.51     skrll 		KSI_INIT_TRAP(&ksi);
    706  1.51     skrll 		ksi.ksi_signo = SIGTRAP;
    707  1.51     skrll 		ksi.ksi_code = TRAP_TRACE;
    708  1.67     skrll 		ksi.ksi_trap = trapnum;
    709  1.51     skrll 		ksi.ksi_addr = (void *)frame->tf_iioq_head;
    710  1.51     skrll #ifdef PTRACE
    711  1.51     skrll 		ss_clear_breakpoints(l);
    712  1.51     skrll 		if (opcode == SSBREAKPOINT)
    713  1.51     skrll 			ksi.ksi_code = TRAP_BRKPT;
    714  1.51     skrll #endif
    715   1.1  fredette 		/* pass to user debugger */
    716  1.51     skrll 		trapsignal(l, &ksi);
    717  1.51     skrll 
    718  1.51     skrll 		break;
    719  1.51     skrll 
    720  1.51     skrll #ifdef PTRACE
    721  1.51     skrll 	case T_TAKENBR | T_USER:
    722  1.51     skrll 		ss_clear_breakpoints(l);
    723  1.51     skrll 
    724  1.51     skrll 		KSI_INIT_TRAP(&ksi);
    725  1.51     skrll 		ksi.ksi_signo = SIGTRAP;
    726  1.51     skrll 		ksi.ksi_code = TRAP_TRACE;
    727  1.67     skrll 		ksi.ksi_trap = trapnum;
    728  1.51     skrll 		ksi.ksi_addr = (void *)frame->tf_iioq_head;
    729  1.51     skrll 
    730  1.51     skrll                 /* pass to user debugger */
    731  1.51     skrll 		trapsignal(l, &ksi);
    732   1.1  fredette 		break;
    733  1.51     skrll #endif
    734   1.1  fredette 
    735  1.21       chs 	case T_EXCEPTION | T_USER: {	/* co-proc assist trap */
    736  1.21       chs 		uint64_t *fpp;
    737  1.23       chs 		uint32_t *pex, ex, inst;
    738  1.23       chs 		int i;
    739  1.21       chs 
    740  1.21       chs 		hppa_fpu_flush(l);
    741  1.61     rmind 		fpp = pcb->pcb_fpregs;
    742  1.23       chs 		pex = (uint32_t *)&fpp[1];
    743  1.23       chs 		for (i = 1; i < 8 && !*pex; i++, pex++)
    744  1.21       chs 			;
    745  1.23       chs 		KASSERT(i < 8);
    746  1.23       chs 		ex = *pex;
    747  1.23       chs 		*pex = 0;
    748  1.23       chs 
    749  1.21       chs 		/* reset the trap flag, as if there was none */
    750  1.21       chs 		fpp[0] &= ~(((uint64_t)HPPA_FPU_T) << 32);
    751  1.21       chs 
    752  1.23       chs 		/* emulate the instruction */
    753  1.23       chs 		inst = ((uint32_t)fpopmap[ex >> 26] << 26) | (ex & 0x03ffffff);
    754  1.21       chs 		hppa_fpu_emulate(frame, l, inst);
    755  1.21       chs 		}
    756   1.1  fredette 		break;
    757   1.1  fredette 
    758   1.1  fredette 	case T_OVERFLOW | T_USER:
    759  1.22       chs 		KSI_INIT_TRAP(&ksi);
    760  1.22       chs 		ksi.ksi_signo = SIGFPE;
    761  1.22       chs 		ksi.ksi_code = SI_NOINFO;
    762  1.22       chs 		ksi.ksi_trap = type;
    763  1.22       chs 		ksi.ksi_addr = (void *)va;
    764  1.22       chs 		trapsignal(l, &ksi);
    765   1.1  fredette 		break;
    766   1.1  fredette 
    767   1.1  fredette 	case T_CONDITION | T_USER:
    768  1.23       chs 		KSI_INIT_TRAP(&ksi);
    769  1.23       chs 		ksi.ksi_signo = SIGFPE;
    770  1.23       chs 		ksi.ksi_code = FPE_INTDIV;
    771  1.23       chs 		ksi.ksi_trap = type;
    772  1.23       chs 		ksi.ksi_addr = (void *)va;
    773  1.23       chs 		trapsignal(l, &ksi);
    774   1.1  fredette 		break;
    775   1.1  fredette 
    776   1.1  fredette 	case T_ILLEGAL | T_USER:
    777   1.3  fredette #ifdef DEBUG
    778   1.9       chs 		user_backtrace(frame, l, type);
    779   1.3  fredette #endif
    780  1.22       chs 		KSI_INIT_TRAP(&ksi);
    781  1.22       chs 		ksi.ksi_signo = SIGILL;
    782  1.22       chs 		ksi.ksi_code = ILL_ILLOPC;
    783  1.22       chs 		ksi.ksi_trap = type;
    784  1.22       chs 		ksi.ksi_addr = (void *)va;
    785  1.22       chs 		trapsignal(l, &ksi);
    786   1.1  fredette 		break;
    787   1.1  fredette 
    788   1.1  fredette 	case T_PRIV_OP | T_USER:
    789   1.3  fredette #ifdef DEBUG
    790   1.9       chs 		user_backtrace(frame, l, type);
    791   1.3  fredette #endif
    792  1.22       chs 		KSI_INIT_TRAP(&ksi);
    793  1.22       chs 		ksi.ksi_signo = SIGILL;
    794  1.22       chs 		ksi.ksi_code = ILL_PRVOPC;
    795  1.22       chs 		ksi.ksi_trap = type;
    796  1.22       chs 		ksi.ksi_addr = (void *)va;
    797  1.22       chs 		trapsignal(l, &ksi);
    798   1.1  fredette 		break;
    799   1.1  fredette 
    800   1.1  fredette 	case T_PRIV_REG | T_USER:
    801   1.3  fredette #ifdef DEBUG
    802   1.9       chs 		user_backtrace(frame, l, type);
    803   1.3  fredette #endif
    804  1.22       chs 		KSI_INIT_TRAP(&ksi);
    805  1.22       chs 		ksi.ksi_signo = SIGILL;
    806  1.22       chs 		ksi.ksi_code = ILL_PRVREG;
    807  1.22       chs 		ksi.ksi_trap = type;
    808  1.22       chs 		ksi.ksi_addr = (void *)va;
    809  1.22       chs 		trapsignal(l, &ksi);
    810   1.1  fredette 		break;
    811   1.1  fredette 
    812   1.1  fredette 		/* these should never got here */
    813   1.1  fredette 	case T_HIGHERPL | T_USER:
    814   1.1  fredette 	case T_LOWERPL | T_USER:
    815  1.22       chs 		KSI_INIT_TRAP(&ksi);
    816  1.22       chs 		ksi.ksi_signo = SIGSEGV;
    817  1.22       chs 		ksi.ksi_code = SEGV_ACCERR;
    818  1.22       chs 		ksi.ksi_trap = type;
    819  1.22       chs 		ksi.ksi_addr = (void *)va;
    820  1.22       chs 		trapsignal(l, &ksi);
    821   1.1  fredette 		break;
    822   1.1  fredette 
    823   1.1  fredette 	case T_IPROT | T_USER:
    824   1.1  fredette 	case T_DPROT | T_USER:
    825  1.22       chs 		KSI_INIT_TRAP(&ksi);
    826  1.22       chs 		ksi.ksi_signo = SIGSEGV;
    827  1.22       chs 		ksi.ksi_code = SEGV_ACCERR;
    828  1.22       chs 		ksi.ksi_trap = type;
    829  1.22       chs 		ksi.ksi_addr = (void *)va;
    830  1.22       chs 		trapsignal(l, &ksi);
    831   1.1  fredette 		break;
    832   1.1  fredette 
    833   1.1  fredette 	case T_DATACC:   	case T_USER | T_DATACC:
    834   1.1  fredette 	case T_ITLBMISS:	case T_USER | T_ITLBMISS:
    835   1.1  fredette 	case T_DTLBMISS:	case T_USER | T_DTLBMISS:
    836   1.1  fredette 	case T_ITLBMISSNA:	case T_USER | T_ITLBMISSNA:
    837   1.1  fredette 	case T_DTLBMISSNA:	case T_USER | T_DTLBMISSNA:
    838   1.1  fredette 	case T_TLB_DIRTY:	case T_USER | T_TLB_DIRTY:
    839   1.1  fredette 		vm = p->p_vmspace;
    840   1.1  fredette 
    841   1.1  fredette 		if (!vm) {
    842   1.1  fredette #ifdef TRAPDEBUG
    843   1.1  fredette 			printf("trap: no vm, p=%p\n", p);
    844   1.1  fredette #endif
    845   1.1  fredette 			goto dead_end;
    846   1.1  fredette 		}
    847   1.1  fredette 
    848   1.1  fredette 		/*
    849   1.1  fredette 		 * it could be a kernel map for exec_map faults
    850   1.1  fredette 		 */
    851   1.1  fredette 		if (!(type & T_USER) && space == HPPA_SID_KERNEL)
    852   1.1  fredette 			map = kernel_map;
    853  1.56  wrstuden 		else {
    854   1.1  fredette 			map = &vm->vm_map;
    855  1.56  wrstuden 			if ((l->l_flag & LW_SA)
    856  1.56  wrstuden 			    && (~l->l_pflag & LP_SA_NOBLOCK)) {
    857  1.56  wrstuden 				l->l_savp->savp_faultaddr = va;
    858  1.56  wrstuden 				l->l_pflag |= LP_SA_PAGEFAULT;
    859  1.56  wrstuden 			}
    860  1.56  wrstuden 		}
    861  1.10        cl 
    862  1.41     skrll 		va = trunc_page(va);
    863   1.1  fredette 
    864  1.59     skrll 		if (map->pmap->pm_space != space) {
    865   1.1  fredette #ifdef TRAPDEBUG
    866  1.37     skrll 			printf("trap: space mismatch %d != %d\n",
    867  1.59     skrll 			    space, map->pmap->pm_space);
    868   1.1  fredette #endif
    869   1.1  fredette 			/* actually dump the user, crap the kernel */
    870   1.1  fredette 			goto dead_end;
    871   1.1  fredette 		}
    872   1.1  fredette 
    873   1.1  fredette 		/* Never call uvm_fault in interrupt context. */
    874   1.1  fredette 		KASSERT(hppa_intr_depth == 0);
    875   1.1  fredette 
    876  1.61     rmind 		onfault = pcb->pcb_onfault;
    877  1.61     rmind 		pcb->pcb_onfault = 0;
    878  1.33  drochner 		ret = uvm_fault(map, va, vftype);
    879  1.61     rmind 		pcb->pcb_onfault = onfault;
    880   1.1  fredette 
    881   1.1  fredette #ifdef TRAPDEBUG
    882  1.33  drochner 		printf("uvm_fault(%p, %x, %d)=%d\n",
    883  1.33  drochner 		    map, (u_int)va, vftype, ret);
    884   1.1  fredette #endif
    885   1.1  fredette 
    886  1.56  wrstuden 		if (map != kernel_map)
    887  1.56  wrstuden 			l->l_pflag &= ~LP_SA_PAGEFAULT;
    888  1.56  wrstuden 
    889   1.1  fredette 		/*
    890   1.1  fredette 		 * If this was a stack access we keep track of the maximum
    891   1.1  fredette 		 * accessed stack size.  Also, if uvm_fault gets a protection
    892   1.1  fredette 		 * failure it is due to accessing the stack region outside
    893   1.1  fredette 		 * the current limit and we need to reflect that as an access
    894   1.1  fredette 		 * error.
    895   1.1  fredette 		 */
    896  1.39     skrll 		if (map != kernel_map && va >= (vaddr_t)vm->vm_minsaddr) {
    897  1.39     skrll 			if (ret == 0)
    898  1.39     skrll 				uvm_grow(l->l_proc, va);
    899  1.39     skrll 			else if (ret == EACCES)
    900   1.1  fredette 				ret = EFAULT;
    901   1.1  fredette 		}
    902   1.1  fredette 
    903   1.1  fredette 		if (ret != 0) {
    904   1.1  fredette 			if (type & T_USER) {
    905   1.1  fredette #ifdef DEBUG
    906   1.9       chs 				user_backtrace(frame, l, type);
    907   1.1  fredette #endif
    908  1.22       chs 				KSI_INIT_TRAP(&ksi);
    909  1.22       chs 				ksi.ksi_signo = SIGSEGV;
    910  1.22       chs 				ksi.ksi_code = (ret == EACCES ?
    911  1.22       chs 						SEGV_ACCERR : SEGV_MAPERR);
    912  1.22       chs 				ksi.ksi_trap = type;
    913  1.22       chs 				ksi.ksi_addr = (void *)va;
    914  1.22       chs 				trapsignal(l, &ksi);
    915   1.1  fredette 			} else {
    916  1.61     rmind 				if (pcb->pcb_onfault) {
    917  1.25       chs 					goto do_onfault;
    918   1.1  fredette 				}
    919  1.33  drochner 				panic("trap: uvm_fault(%p, %lx, %d): %d",
    920  1.33  drochner 				    map, va, vftype, ret);
    921   1.1  fredette 			}
    922   1.1  fredette 		}
    923   1.1  fredette 		break;
    924   1.1  fredette 
    925   1.1  fredette 	case T_DATALIGN | T_USER:
    926   1.3  fredette #ifdef DEBUG
    927   1.9       chs 		user_backtrace(frame, l, type);
    928   1.3  fredette #endif
    929  1.22       chs 		KSI_INIT_TRAP(&ksi);
    930  1.22       chs 		ksi.ksi_signo = SIGBUS;
    931  1.22       chs 		ksi.ksi_code = BUS_ADRALN;
    932  1.22       chs 		ksi.ksi_trap = type;
    933  1.22       chs 		ksi.ksi_addr = (void *)va;
    934  1.22       chs 		trapsignal(l, &ksi);
    935   1.1  fredette 		break;
    936   1.1  fredette 
    937   1.1  fredette 	case T_INTERRUPT:
    938   1.1  fredette 	case T_INTERRUPT|T_USER:
    939   1.1  fredette 		hppa_intr(frame);
    940   1.1  fredette 		mtctl(frame->tf_eiem, CR_EIEM);
    941   1.1  fredette 		break;
    942  1.22       chs 
    943   1.1  fredette 	case T_LOWERPL:
    944   1.1  fredette 	case T_DPROT:
    945   1.1  fredette 	case T_IPROT:
    946   1.1  fredette 	case T_OVERFLOW:
    947   1.1  fredette 	case T_CONDITION:
    948   1.1  fredette 	case T_ILLEGAL:
    949   1.1  fredette 	case T_HIGHERPL:
    950   1.1  fredette 	case T_TAKENBR:
    951   1.1  fredette 	case T_POWERFAIL:
    952   1.1  fredette 	case T_LPMC:
    953   1.1  fredette 	case T_PAGEREF:
    954   1.1  fredette 	case T_DATAPID:  	case T_DATAPID  | T_USER:
    955   1.1  fredette 		if (0 /* T-chip */) {
    956   1.1  fredette 			break;
    957   1.1  fredette 		}
    958   1.1  fredette 		/* FALLTHROUGH to unimplemented */
    959   1.1  fredette 	default:
    960   1.1  fredette 		panic ("trap: unimplemented \'%s\' (%d)", tts, type);
    961   1.1  fredette 	}
    962   1.1  fredette 
    963  1.69     skrll #ifdef DIAGNOSTIC
    964  1.69     skrll 	if (cpl != oldcpl)
    965  1.69     skrll 		printf("WARNING: SPL (%d) NOT LOWERED ON TRAP (%d) EXIT\n",
    966  1.69     skrll 		    cpl, trapnum);
    967  1.69     skrll #endif
    968  1.69     skrll 
    969   1.1  fredette 	if (type & T_USER)
    970   1.9       chs 		userret(l, l->l_md.md_regs->tf_iioq_head, 0);
    971   1.1  fredette 
    972   1.1  fredette #ifdef DEBUG
    973  1.26       chs 	frame_sanity_check(0xdead02, type, frame, l);
    974  1.43      yamt 	if (frame->tf_flags & TFF_LAST && (curlwp->l_flag & LW_IDLE) == 0)
    975  1.26       chs 		frame_sanity_check(0xdead03, type, curlwp->l_md.md_regs,
    976  1.26       chs 				   curlwp);
    977   1.1  fredette #endif /* DEBUG */
    978   1.1  fredette }
    979   1.1  fredette 
    980   1.1  fredette void
    981  1.14       chs child_return(void *arg)
    982   1.1  fredette {
    983   1.9       chs 	struct lwp *l = arg;
    984   1.1  fredette 
    985  1.68     skrll 	/*
    986  1.68     skrll 	 * Return values in the frame set by cpu_lwp_fork().
    987  1.68     skrll 	 */
    988  1.68     skrll 
    989   1.9       chs 	userret(l, l->l_md.md_regs->tf_iioq_head, 0);
    990  1.46        ad 	ktrsysret(SYS_fork, 0, 0);
    991   1.1  fredette #ifdef DEBUG
    992  1.26       chs 	frame_sanity_check(0xdead04, 0, l->l_md.md_regs, l);
    993   1.1  fredette #endif /* DEBUG */
    994   1.1  fredette }
    995   1.1  fredette 
    996  1.51     skrll #ifdef PTRACE
    997  1.51     skrll 
    998  1.51     skrll #include <sys/ptrace.h>
    999  1.51     skrll 
   1000  1.51     skrll int
   1001  1.51     skrll ss_get_value(struct lwp *l, vaddr_t addr, u_int *value)
   1002  1.51     skrll {
   1003  1.51     skrll 	struct uio uio;
   1004  1.51     skrll 	struct iovec iov;
   1005  1.51     skrll 
   1006  1.51     skrll 	iov.iov_base = (void *)value;
   1007  1.51     skrll 	iov.iov_len = sizeof(u_int);
   1008  1.51     skrll 	uio.uio_iov = &iov;
   1009  1.51     skrll 	uio.uio_iovcnt = 1;
   1010  1.51     skrll 	uio.uio_offset = (off_t)addr;
   1011  1.51     skrll 	uio.uio_resid = sizeof(u_int);
   1012  1.51     skrll 	uio.uio_rw = UIO_READ;
   1013  1.51     skrll 	UIO_SETUP_SYSSPACE(&uio);
   1014  1.51     skrll 
   1015  1.51     skrll 	return (process_domem(curlwp, l, &uio));
   1016  1.51     skrll }
   1017  1.51     skrll 
   1018  1.51     skrll int
   1019  1.51     skrll ss_put_value(struct lwp *l, vaddr_t addr, u_int value)
   1020  1.51     skrll {
   1021  1.51     skrll 	struct uio uio;
   1022  1.51     skrll 	struct iovec iov;
   1023  1.51     skrll 
   1024  1.51     skrll 	iov.iov_base = (void *)&value;
   1025  1.51     skrll 	iov.iov_len = sizeof(u_int);
   1026  1.51     skrll 	uio.uio_iov = &iov;
   1027  1.51     skrll 	uio.uio_iovcnt = 1;
   1028  1.51     skrll 	uio.uio_offset = (off_t)addr;
   1029  1.51     skrll 	uio.uio_resid = sizeof(u_int);
   1030  1.51     skrll 	uio.uio_rw = UIO_WRITE;
   1031  1.51     skrll 	UIO_SETUP_SYSSPACE(&uio);
   1032  1.51     skrll 
   1033  1.51     skrll 	return (process_domem(curlwp, l, &uio));
   1034  1.51     skrll }
   1035  1.51     skrll 
   1036  1.51     skrll void
   1037  1.51     skrll ss_clear_breakpoints(struct lwp *l)
   1038  1.51     skrll {
   1039  1.51     skrll 	/* Restore origional instructions. */
   1040  1.51     skrll 	if (l->l_md.md_bpva != 0) {
   1041  1.51     skrll 		ss_put_value(l, l->l_md.md_bpva, l->l_md.md_bpsave[0]);
   1042  1.51     skrll 		ss_put_value(l, l->l_md.md_bpva + 4, l->l_md.md_bpsave[1]);
   1043  1.51     skrll 		l->l_md.md_bpva = 0;
   1044  1.51     skrll 	}
   1045  1.51     skrll }
   1046  1.51     skrll 
   1047  1.51     skrll 
   1048  1.51     skrll int
   1049  1.51     skrll process_sstep(struct lwp *l, int sstep)
   1050  1.51     skrll {
   1051  1.51     skrll 	struct trapframe *tf = l->l_md.md_regs;
   1052  1.51     skrll 	int error;
   1053  1.51     skrll 
   1054  1.51     skrll 	ss_clear_breakpoints(l);
   1055  1.51     skrll 
   1056  1.51     skrll 	/* We're continuing... */
   1057  1.51     skrll 	/* Don't touch the syscall gateway page. */
   1058  1.51     skrll 	/* XXX head */
   1059  1.51     skrll 	if (sstep == 0 ||
   1060  1.51     skrll 	    (tf->tf_iioq_tail & ~PAGE_MASK) == SYSCALLGATE) {
   1061  1.51     skrll 		tf->tf_ipsw &= ~PSW_T;
   1062  1.51     skrll 		return 0;
   1063  1.51     skrll 	}
   1064  1.51     skrll 
   1065  1.51     skrll 	l->l_md.md_bpva = tf->tf_iioq_tail & ~HPPA_PC_PRIV_MASK;
   1066  1.51     skrll 
   1067  1.51     skrll 	/*
   1068  1.51     skrll 	 * Insert two breakpoint instructions; the first one might be
   1069  1.51     skrll 	 * nullified.  Of course we need to save two instruction
   1070  1.51     skrll 	 * first.
   1071  1.51     skrll 	 */
   1072  1.51     skrll 
   1073  1.51     skrll 	error = ss_get_value(l, l->l_md.md_bpva, &l->l_md.md_bpsave[0]);
   1074  1.51     skrll 	if (error)
   1075  1.51     skrll 		return (error);
   1076  1.51     skrll 	error = ss_get_value(l, l->l_md.md_bpva + 4, &l->l_md.md_bpsave[1]);
   1077  1.51     skrll 	if (error)
   1078  1.51     skrll 		return (error);
   1079  1.51     skrll 
   1080  1.51     skrll 	error = ss_put_value(l, l->l_md.md_bpva, SSBREAKPOINT);
   1081  1.51     skrll 	if (error)
   1082  1.51     skrll 		return error;
   1083  1.51     skrll 	error = ss_put_value(l, l->l_md.md_bpva + 4, SSBREAKPOINT);
   1084  1.51     skrll 	if (error)
   1085  1.51     skrll 		return error;
   1086  1.51     skrll 
   1087  1.51     skrll 	tf->tf_ipsw |= PSW_T;
   1088  1.51     skrll 
   1089  1.51     skrll 	return 0;
   1090  1.51     skrll }
   1091  1.51     skrll #endif
   1092  1.51     skrll 
   1093  1.51     skrll 
   1094   1.1  fredette /*
   1095   1.1  fredette  * call actual syscall routine
   1096   1.1  fredette  * from the low-level syscall handler:
   1097   1.1  fredette  * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto
   1098   1.1  fredette  *   our stack, this wins compared to copyin just needed amount anyway
   1099   1.1  fredette  * - register args are copied onto stack too
   1100   1.1  fredette  */
   1101   1.1  fredette void
   1102  1.14       chs syscall(struct trapframe *frame, int *args)
   1103   1.1  fredette {
   1104   1.9       chs 	struct lwp *l;
   1105   1.9       chs 	struct proc *p;
   1106   1.9       chs 	const struct sysent *callp;
   1107  1.65     skrll 	size_t nargs64;
   1108  1.54       dsl 	int nsys, code, error;
   1109   1.1  fredette 	int tmp;
   1110   1.1  fredette 	int rval[2];
   1111  1.69     skrll #ifdef DIAGNOSTIC
   1112  1.69     skrll 	int oldcpl = cpl;
   1113  1.69     skrll #endif
   1114   1.1  fredette 
   1115   1.1  fredette 	uvmexp.syscalls++;
   1116   1.1  fredette 
   1117   1.1  fredette #ifdef DEBUG
   1118  1.26       chs 	frame_sanity_check(0xdead04, 0, frame, curlwp);
   1119   1.1  fredette #endif /* DEBUG */
   1120   1.1  fredette 
   1121   1.1  fredette 	if (!USERMODE(frame->tf_iioq_head))
   1122   1.1  fredette 		panic("syscall");
   1123   1.1  fredette 
   1124  1.64     skrll 	KASSERT(curlwp != NULL);
   1125   1.9       chs 	l = curlwp;
   1126   1.9       chs 	p = l->l_proc;
   1127   1.9       chs 	l->l_md.md_regs = frame;
   1128   1.1  fredette 	nsys = p->p_emul->e_nsysent;
   1129   1.1  fredette 	callp = p->p_emul->e_sysent;
   1130   1.1  fredette 	code = frame->tf_t1;
   1131  1.36        ad 	LWP_CACHE_CREDS(l, p);
   1132   1.1  fredette 
   1133  1.56  wrstuden #ifdef KERN_SA
   1134  1.56  wrstuden 	if (__predict_false((l->l_savp)
   1135  1.56  wrstuden             && (l->l_savp->savp_pflags & SAVP_FLAG_DELIVERING)))
   1136  1.56  wrstuden 		l->l_savp->savp_pflags &= ~SAVP_FLAG_DELIVERING;
   1137  1.56  wrstuden #endif
   1138  1.56  wrstuden 
   1139   1.1  fredette 	/*
   1140  1.65     skrll 	 * Restarting a system call is touchy on the HPPA, because syscall
   1141  1.65     skrll 	 * arguments are passed in registers and the program counter of the
   1142  1.65     skrll 	 * syscall "point" isn't easily divined.
   1143   1.1  fredette 	 *
   1144  1.65     skrll 	 * We handle the first problem by assuming that we will have to restart
   1145  1.65     skrll 	 * this system call, so we stuff the first four words of the original
   1146  1.65     skrll 	 * arguments back into the frame as arg0...arg3, which is where we
   1147  1.65     skrll 	 * found them in the first place.  Any further arguments are (still) on
   1148  1.65     skrll 	 * the user's stack and the  syscall code will fetch them from there
   1149  1.65     skrll 	 * (again).
   1150   1.1  fredette 	 *
   1151   1.1  fredette 	 * The program counter problem is addressed below.
   1152   1.1  fredette 	 */
   1153   1.1  fredette 	frame->tf_arg0 = args[0];
   1154   1.1  fredette 	frame->tf_arg1 = args[1];
   1155   1.1  fredette 	frame->tf_arg2 = args[2];
   1156   1.1  fredette 	frame->tf_arg3 = args[3];
   1157   1.1  fredette 
   1158   1.1  fredette 	/*
   1159   1.1  fredette 	 * Some special handling for the syscall(2) and
   1160   1.1  fredette 	 * __syscall(2) system calls.
   1161   1.1  fredette 	 */
   1162   1.1  fredette 	switch (code) {
   1163   1.1  fredette 	case SYS_syscall:
   1164   1.1  fredette 		code = *args;
   1165   1.1  fredette 		args += 1;
   1166   1.1  fredette 		break;
   1167   1.1  fredette 	case SYS___syscall:
   1168   1.1  fredette 		if (callp != sysent)
   1169   1.1  fredette 			break;
   1170   1.1  fredette 		/*
   1171  1.65     skrll 		 * NB: even though __syscall(2) takes a quad_t containing the
   1172  1.65     skrll 		 * system call number, because our argument copying word-swaps
   1173  1.65     skrll 		 * 64-bit arguments, the least significant word of that quad_t
   1174   1.1  fredette 		 * is the first word in the argument array.
   1175   1.1  fredette 		 */
   1176   1.1  fredette 		code = *args;
   1177   1.1  fredette 		args += 2;
   1178   1.1  fredette 	}
   1179   1.1  fredette 
   1180   1.1  fredette 	/*
   1181  1.65     skrll 	 * Stacks growing from lower addresses to higher addresses are not
   1182  1.65     skrll 	 * really such a good idea, because it makes it impossible to overlay a
   1183  1.65     skrll 	 * struct on top of C stack arguments (the arguments appear in
   1184   1.1  fredette 	 * reversed order).
   1185   1.1  fredette 	 *
   1186  1.65     skrll 	 * You can do the obvious thing (as locore.S does) and copy argument
   1187  1.65     skrll 	 * words one by one, laying them out in the "right" order in the dest-
   1188  1.65     skrll 	 * ination buffer, but this ends up word-swapping multi-word arguments
   1189  1.65     skrll 	 * (like off_t).
   1190   1.1  fredette 	 *
   1191   1.1  fredette 	 * FIXME - this works only on native binaries and
   1192   1.1  fredette 	 * will probably screw up any and all emulation.
   1193  1.65     skrll 	 *
   1194   1.1  fredette 	 */
   1195  1.65     skrll 
   1196  1.65     skrll 	if (code < 0 || code >= nsys)
   1197  1.65     skrll 		callp += p->p_emul->e_nosys;	/* bad syscall # */
   1198  1.65     skrll 	else
   1199  1.65     skrll 		callp += code;
   1200  1.65     skrll 
   1201  1.65     skrll 	nargs64 = SYCALL_NARGS64(callp);
   1202  1.65     skrll 	if (nargs64 != 0) {
   1203  1.65     skrll 		size_t nargs = callp->sy_narg;
   1204  1.65     skrll 
   1205  1.65     skrll 		for (size_t i = 0; i < nargs + nargs64;) {
   1206  1.65     skrll 			if (SYCALL_ARG_64_P(callp, i)) {
   1207  1.65     skrll 				tmp = args[i];
   1208  1.65     skrll 				args[i] = args[i + 1];
   1209  1.65     skrll 				args[i + 1] = tmp;
   1210  1.65     skrll 				i += 2;
   1211  1.65     skrll 			} else
   1212  1.65     skrll 				i++;
   1213  1.65     skrll 		}
   1214   1.1  fredette 	}
   1215   1.1  fredette 
   1216   1.1  fredette #ifdef USERTRACE
   1217   1.1  fredette 	if (0) {
   1218  1.35     skrll 		user_backtrace(frame, l, -1);
   1219   1.1  fredette 		frame->tf_ipsw |= PSW_R;
   1220   1.1  fredette 		frame->tf_rctr = 0;
   1221   1.1  fredette 		printf("r %08x", frame->tf_iioq_head);
   1222   1.1  fredette 		rctr_next_iioq = frame->tf_iioq_head + 4;
   1223   1.1  fredette 	}
   1224   1.1  fredette #endif
   1225   1.1  fredette 
   1226  1.65     skrll 	error = 0;
   1227  1.65     skrll 	if (__predict_false(p->p_trace_enabled)) {
   1228  1.65     skrll 		error = trace_enter(code, args, callp->sy_narg);
   1229  1.65     skrll 		if (error)
   1230  1.65     skrll 			goto out;
   1231  1.65     skrll 	}
   1232   1.1  fredette 
   1233   1.1  fredette 	rval[0] = 0;
   1234   1.1  fredette 	rval[1] = 0;
   1235  1.57        ad 	error = sy_call(callp, l, args, rval);
   1236  1.27  christos out:
   1237  1.27  christos 	switch (error) {
   1238   1.1  fredette 	case 0:
   1239   1.9       chs 		l = curlwp;			/* changes on exec() */
   1240   1.9       chs 		frame = l->l_md.md_regs;
   1241   1.1  fredette 		frame->tf_ret0 = rval[0];
   1242   1.1  fredette 		frame->tf_ret1 = rval[1];
   1243   1.1  fredette 		frame->tf_t1 = 0;
   1244   1.1  fredette 		break;
   1245   1.1  fredette 	case ERESTART:
   1246   1.1  fredette 		/*
   1247  1.74     skrll 		 * Now we have to wind back the instruction offset queue to the
   1248  1.74     skrll 		 * point where the system call will be made again.  This is
   1249  1.74     skrll 		 * inherently tied to the SYSCALL macro.
   1250   1.1  fredette 		 *
   1251  1.74     skrll 		 * Currently, the part of the SYSCALL macro that we want to re-
   1252  1.74     skrll 		 * run reads as:
   1253   1.1  fredette 		 *
   1254   1.1  fredette 		 *	ldil	L%SYSCALLGATE, r1
   1255   1.1  fredette 		 *	ble	4(sr7, r1)
   1256   1.1  fredette 		 *	ldi	__CONCAT(SYS_,x), t1
   1257  1.52     skrll 		 *	comb,<>	%r0, %t1, __cerror
   1258   1.1  fredette 		 *
   1259  1.74     skrll 		 * And our offset queue head points to the comb instruction.
   1260  1.74     skrll 		 * So we need to subtract twelve to reach the ldil.
   1261   1.1  fredette 		 */
   1262   1.1  fredette 		frame->tf_iioq_head -= 12;
   1263   1.1  fredette 		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
   1264   1.1  fredette 		break;
   1265   1.1  fredette 	case EJUSTRETURN:
   1266   1.1  fredette 		p = curproc;
   1267   1.1  fredette 		break;
   1268   1.1  fredette 	default:
   1269   1.1  fredette 		if (p->p_emul->e_errno)
   1270   1.1  fredette 			error = p->p_emul->e_errno[error];
   1271   1.1  fredette 		frame->tf_t1 = error;
   1272   1.1  fredette 		break;
   1273   1.1  fredette 	}
   1274   1.2  christos 
   1275  1.65     skrll 	if (__predict_false(p->p_trace_enabled))
   1276  1.65     skrll 		trace_exit(code, rval, error);
   1277   1.2  christos 
   1278   1.9       chs 	userret(l, frame->tf_iioq_head, 0);
   1279  1.69     skrll 
   1280  1.69     skrll #ifdef DIAGNOSTIC
   1281  1.69     skrll 	if (cpl != oldcpl) {
   1282  1.69     skrll 		printf("WARNING: SPL (0x%x) NOT LOWERED ON "
   1283  1.69     skrll 		    "syscall(0x%x, 0x%x, 0x%x, 0x%x...) EXIT, PID %d\n",
   1284  1.69     skrll 		    cpl, code, args[0], args[1], args[2], p->p_pid);
   1285  1.69     skrll 		cpl = oldcpl;
   1286  1.69     skrll 	}
   1287  1.69     skrll #endif
   1288  1.69     skrll 
   1289   1.1  fredette #ifdef DEBUG
   1290  1.26       chs 	frame_sanity_check(0xdead05, 0, frame, l);
   1291   1.1  fredette #endif /* DEBUG */
   1292   1.9       chs }
   1293   1.9       chs 
   1294   1.9       chs /*
   1295   1.9       chs  * Start a new LWP
   1296   1.9       chs  */
   1297   1.9       chs void
   1298  1.14       chs startlwp(void *arg)
   1299   1.9       chs {
   1300   1.9       chs 	int err;
   1301   1.9       chs 	ucontext_t *uc = arg;
   1302   1.9       chs 	struct lwp *l = curlwp;
   1303   1.9       chs 
   1304   1.9       chs 	err = cpu_setmcontext(l, &uc->uc_mcontext, uc->uc_flags);
   1305   1.9       chs #if DIAGNOSTIC
   1306   1.9       chs 	if (err) {
   1307   1.9       chs 		printf("Error %d from cpu_setmcontext.", err);
   1308   1.9       chs 	}
   1309   1.9       chs #endif
   1310   1.9       chs 	pool_put(&lwp_uc_pool, uc);
   1311   1.9       chs 
   1312   1.9       chs 	userret(l, l->l_md.md_regs->tf_iioq_head, 0);
   1313   1.9       chs }
   1314  1.56  wrstuden 
   1315  1.56  wrstuden /*
   1316  1.56  wrstuden  * XXX This is a terrible name.
   1317  1.56  wrstuden  */
   1318  1.56  wrstuden void
   1319  1.56  wrstuden upcallret(struct lwp *l)
   1320  1.56  wrstuden {
   1321  1.56  wrstuden 	userret(l, l->l_md.md_regs->tf_iioq_head, 0);
   1322  1.56  wrstuden }
   1323