Home | History | Annotate | Line # | Download | only in hppa
trap.c revision 1.18
      1 /*	$NetBSD: trap.c,v 1.18 2004/06/09 16:06:56 chs Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Matthew Fredette.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  * 3. All advertising materials mentioning features or use of this software
     19  *    must display the following acknowledgement:
     20  *      This product includes software developed by the NetBSD
     21  *      Foundation, Inc. and its contributors.
     22  * 4. Neither the name of The NetBSD Foundation nor the names of its
     23  *    contributors may be used to endorse or promote products derived
     24  *    from this software without specific prior written permission.
     25  *
     26  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     27  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     28  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     29  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     30  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     31  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     32  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     33  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     34  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     35  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     36  * POSSIBILITY OF SUCH DAMAGE.
     37  */
     38 
     39 /*	$OpenBSD: trap.c,v 1.30 2001/09/19 20:50:56 mickey Exp $	*/
     40 
     41 /*
     42  * Copyright (c) 1998-2000 Michael Shalayeff
     43  * All rights reserved.
     44  *
     45  * Redistribution and use in source and binary forms, with or without
     46  * modification, are permitted provided that the following conditions
     47  * are met:
     48  * 1. Redistributions of source code must retain the above copyright
     49  *    notice, this list of conditions and the following disclaimer.
     50  * 2. Redistributions in binary form must reproduce the above copyright
     51  *    notice, this list of conditions and the following disclaimer in the
     52  *    documentation and/or other materials provided with the distribution.
     53  * 3. All advertising materials mentioning features or use of this software
     54  *    must display the following acknowledgement:
     55  *	This product includes software developed by Michael Shalayeff.
     56  * 4. The name of the author may not be used to endorse or promote products
     57  *    derived from this software without specific prior written permission.
     58  *
     59  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     60  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     61  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     62  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     63  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     64  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     65  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     66  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     67  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     68  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     69  */
     70 
     71 #include <sys/cdefs.h>
     72 __KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.18 2004/06/09 16:06:56 chs Exp $");
     73 
     74 /* #define INTRDEBUG */
     75 /* #define TRAPDEBUG */
     76 /* #define USERTRACE */
     77 
     78 #include "opt_kgdb.h"
     79 #include "opt_syscall_debug.h"
     80 #include "opt_ktrace.h"
     81 #include "opt_systrace.h"
     82 
     83 #include <sys/param.h>
     84 #include <sys/systm.h>
     85 #include <sys/kernel.h>
     86 #include <sys/syscall.h>
     87 #include <sys/sa.h>
     88 #include <sys/savar.h>
     89 #ifdef KTRACE
     90 #include <sys/ktrace.h>
     91 #endif
     92 #ifdef SYSTRACE
     93 #include <sys/systrace.h>
     94 #endif
     95 #include <sys/proc.h>
     96 #include <sys/signalvar.h>
     97 #include <sys/user.h>
     98 #include <sys/acct.h>
     99 #include <sys/signal.h>
    100 #include <sys/device.h>
    101 #include <sys/pool.h>
    102 
    103 #include <net/netisr.h>
    104 
    105 #ifdef KGDB
    106 #include <sys/kgdb.h>
    107 #endif
    108 
    109 #include <uvm/uvm.h>
    110 
    111 #include <machine/iomod.h>
    112 #include <machine/cpufunc.h>
    113 #include <machine/reg.h>
    114 #include <machine/autoconf.h>
    115 
    116 #include <machine/db_machdep.h>
    117 
    118 #include <hppa/hppa/machdep.h>
    119 
    120 #if defined(INTRDEBUG) || defined(TRAPDEBUG)
    121 #include <ddb/db_output.h>
    122 #endif
    123 
    124 #if defined(DEBUG) || defined(DIAGNOSTIC)
    125 /*
    126  * 0x6fc1000 is a stwm r1, d(sr0, sp), which is the last
    127  * instruction in the function prologue that gcc -O0 uses.
    128  * When we have this instruction we know the relationship
    129  * between the stack pointer and the gcc -O0 frame pointer
    130  * (in r3, loaded with the initial sp) for the body of a
    131  * function.
    132  *
    133  * If the given instruction is a stwm r1, d(sr0, sp) where
    134  * d > 0, we evaluate to d, else we evaluate to zero.
    135  */
    136 #define STWM_R1_D_SR0_SP(inst) \
    137 	(((inst) & 0xffffc001) == 0x6fc10000 ? (((inst) & 0x00003ff) >> 1) : 0)
    138 #endif /* DEBUG || DIAGNOSTIC */
    139 
    140 const char *trap_type[] = {
    141 	"invalid",
    142 	"HPMC",
    143 	"power failure",
    144 	"recovery counter",
    145 	"external interrupt",
    146 	"LPMC",
    147 	"ITLB miss fault",
    148 	"instruction protection",
    149 	"Illegal instruction",
    150 	"break instruction",
    151 	"privileged operation",
    152 	"privileged register",
    153 	"overflow",
    154 	"conditional",
    155 	"assist exception",
    156 	"DTLB miss",
    157 	"ITLB non-access miss",
    158 	"DTLB non-access miss",
    159 	"data protection/rights/alignment",
    160 	"data break",
    161 	"TLB dirty",
    162 	"page reference",
    163 	"assist emulation",
    164 	"higher-priv transfer",
    165 	"lower-priv transfer",
    166 	"taken branch",
    167 	"data access rights",
    168 	"data protection",
    169 	"unaligned data ref",
    170 };
    171 int trap_types = sizeof(trap_type)/sizeof(trap_type[0]);
    172 
    173 int want_resched;
    174 volatile int astpending;
    175 
    176 void pmap_hptdump(void);
    177 void syscall(struct trapframe *, int *);
    178 
    179 /* XXX */
    180 void hppa_trapsignal_hack(struct lwp *, int, u_long);
    181 
    182 #ifdef USERTRACE
    183 /*
    184  * USERTRACE is a crude facility that traces the PC of
    185  * a single user process.  This tracing is normally
    186  * activated by the dispatching of a certain syscall
    187  * with certain arguments - see the activation code in
    188  * syscall().
    189  */
    190 u_int rctr_next_iioq;
    191 #endif
    192 
    193 static __inline void
    194 userret (struct lwp *l, register_t pc, u_quad_t oticks)
    195 {
    196 	struct proc *p = l->l_proc;
    197 	int sig;
    198 
    199 	/* take pending signals */
    200 	while ((sig = CURSIG(l)) != 0)
    201 		postsig(sig);
    202 
    203 	l->l_priority = l->l_usrpri;
    204 	if (want_resched) {
    205 		/*
    206 		 * We're being preempted.
    207 		 */
    208 		preempt(0);
    209 		while ((sig = CURSIG(l)) != 0)
    210 			postsig(sig);
    211 	}
    212 
    213 	/*
    214 	 * If profiling, charge recent system time to the trapped pc.
    215 	 */
    216 	if (l->l_flag & P_PROFIL) {
    217 		extern int psratio;
    218 
    219 		addupc_task(p, pc, (int)(p->p_sticks - oticks) * psratio);
    220 	}
    221 
    222 	curcpu()->ci_schedstate.spc_curpriority = l->l_priority;
    223 }
    224 
    225 /*
    226  * This handles some messy kernel debugger details.
    227  * It dispatches into either kgdb or DDB, and knows
    228  * about some special things to do, like skipping over
    229  * break instructions and how to really set up for
    230  * a single-step.
    231  */
    232 #if defined(KGDB) || defined(DDB)
    233 static int
    234 trap_kdebug(int type, int code, struct trapframe *frame)
    235 {
    236 	int handled;
    237 	u_int tf_iioq_head_old;
    238 	u_int tf_iioq_tail_old;
    239 
    240 	for(;;) {
    241 
    242 		/* This trap has not been handled. */
    243 		handled = 0;
    244 
    245 		/* Remember the instruction offset queue. */
    246 		tf_iioq_head_old = frame->tf_iioq_head;
    247 		tf_iioq_tail_old = frame->tf_iioq_tail;
    248 
    249 #ifdef	KGDB
    250 		/* Let KGDB handle it (if connected) */
    251 		if (!handled)
    252 			handled = kgdb_trap(type, frame);
    253 #endif
    254 #ifdef	DDB
    255 		/* Let DDB handle it. */
    256 		if (!handled)
    257 			handled = kdb_trap(type, code, frame);
    258 #endif
    259 
    260 		/* If this trap wasn't handled, return now. */
    261 		if (!handled)
    262 			return(0);
    263 
    264 		/*
    265 		 * If the instruction offset queue head changed,
    266 		 * but the offset queue tail didn't, assume that
    267 		 * the user wants to jump to the head offset, and
    268 		 * adjust the tail accordingly.  This should fix
    269 		 * the kgdb `jump' command, and can help DDB users
    270 		 * who `set' the offset head but forget the tail.
    271 		 */
    272 		if (frame->tf_iioq_head != tf_iioq_head_old &&
    273 		    frame->tf_iioq_tail == tf_iioq_tail_old)
    274 			frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    275 
    276 		/*
    277 		 * This is some single-stepping support.
    278 		 * If we're trying to step through a nullified
    279 		 * instruction, just advance by hand and trap
    280 		 * again.  Otherwise, load the recovery counter
    281 		 * with zero.
    282 		 */
    283 		if (frame->tf_ipsw & PSW_R) {
    284 #ifdef TRAPDEBUG
    285 			printf("(single stepping at head 0x%x tail 0x%x)\n", frame->tf_iioq_head, frame->tf_iioq_tail);
    286 #endif
    287 			if (frame->tf_ipsw & PSW_N) {
    288 #ifdef TRAPDEBUG
    289 				printf("(single stepping past nullified)\n");
    290 #endif
    291 
    292 				/* Advance the program counter. */
    293 				frame->tf_iioq_head = frame->tf_iioq_tail;
    294 				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    295 
    296 				/* Clear flags. */
    297 				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
    298 
    299 				/* Simulate another trap. */
    300 				type = T_RECOVERY;
    301 				continue;
    302 			}
    303 			frame->tf_rctr = 0;
    304 		}
    305 
    306 		/* We handled this trap. */
    307 		return (1);
    308 	}
    309 	/* NOTREACHED */
    310 }
    311 #else	/* !KGDB && !DDB */
    312 #define trap_kdebug(t, c, f)	(0)
    313 #endif	/* !KGDB && !DDB */
    314 
    315 #ifdef DIAGNOSTIC
    316 /*
    317  * These functions give a crude usermode backtrace.  They
    318  * really only work when code has been compiled without
    319  * optimization, as they assume a certain function prologue
    320  * sets up a frame pointer and stores the return pointer
    321  * and arguments in it.
    322  */
    323 static void user_backtrace_raw(u_int, u_int);
    324 static void
    325 user_backtrace_raw(u_int pc, u_int fp)
    326 {
    327 	int frame_number;
    328 	int arg_number;
    329 
    330 	for (frame_number = 0;
    331 	     frame_number < 100 && pc > HPPA_PC_PRIV_MASK && fp;
    332 	     frame_number++) {
    333 
    334 		printf("%3d: pc=%08x%s fp=0x%08x", frame_number,
    335 		    pc & ~HPPA_PC_PRIV_MASK, USERMODE(pc) ? "" : "**", fp);
    336 		for(arg_number = 0; arg_number < 4; arg_number++)
    337 			printf(" arg%d=0x%08x", arg_number,
    338 			    (int) fuword(HPPA_FRAME_CARG(arg_number, fp)));
    339 		printf("\n");
    340                 pc = fuword(((register_t *) fp) - 5);	/* fetch rp */
    341 		if (pc == -1) {
    342 			printf("  fuword for pc failed\n");
    343 			break;
    344 		}
    345                 fp = fuword(((register_t *) fp) + 0);	/* fetch previous fp */
    346 		if (fp == -1) {
    347 			printf("  fuword for fp failed\n");
    348 			break;
    349 		}
    350 	}
    351 	printf("  backtrace stopped with pc %08x fp 0x%08x\n", pc, fp);
    352 }
    353 
    354 static void user_backtrace(struct trapframe *, struct lwp *, int);
    355 static void
    356 user_backtrace(struct trapframe *tf, struct lwp *l, int type)
    357 {
    358 	struct proc *p = l->l_proc;
    359 	u_int pc, fp, inst;
    360 
    361 	/*
    362 	 * Display any trap type that we have.
    363 	 */
    364 	if (type >= 0)
    365 		printf("pid %d (%s) trap #%d\n",
    366 		    p->p_pid, p->p_comm, type & ~T_USER);
    367 
    368 	/*
    369 	 * Assuming that the frame pointer in r3 is valid,
    370 	 * dump out a stack trace.
    371 	 */
    372 	fp = tf->tf_r3;
    373 	printf("pid %d (%s) backtrace, starting with fp 0x%08x\n",
    374 		p->p_pid, p->p_comm, fp);
    375 	user_backtrace_raw(tf->tf_iioq_head, fp);
    376 
    377 	/*
    378 	 * In case the frame pointer in r3 is not valid,
    379 	 * assuming the stack pointer is valid and the
    380 	 * faulting function is a non-leaf, if we can
    381 	 * find its prologue we can recover its frame
    382 	 * pointer.
    383 	 */
    384 	pc = tf->tf_iioq_head;
    385 	fp = tf->tf_sp - HPPA_FRAME_SIZE;
    386 	printf("pid %d (%s) backtrace, starting with sp 0x%08x pc 0x%08x\n",
    387 		p->p_pid, p->p_comm, tf->tf_sp, pc);
    388 	for(pc &= ~HPPA_PC_PRIV_MASK; pc > 0; pc -= sizeof(inst)) {
    389 		inst = fuword((register_t *) pc);
    390 		if (inst == -1) {
    391 			printf("  fuword for inst at pc %08x failed\n", pc);
    392 			break;
    393 		}
    394 		/* Check for the prologue instruction that sets sp. */
    395 		if (STWM_R1_D_SR0_SP(inst)) {
    396 			fp = tf->tf_sp - STWM_R1_D_SR0_SP(inst);
    397 			printf("  sp from fp at pc %08x: %08x\n", pc, inst);
    398 			break;
    399 		}
    400 	}
    401 	user_backtrace_raw(tf->tf_iioq_head, fp);
    402 }
    403 #endif /* DIAGNOSTIC */
    404 
    405 #ifdef DEBUG
    406 /*
    407  * This sanity-checks a trapframe.  It is full of various
    408  * assumptions about what a healthy CPU state should be,
    409  * with some documented elsewhere, some not.
    410  */
    411 struct trapframe *sanity_frame;
    412 struct lwp *sanity_lwp;
    413 int sanity_checked = 0;
    414 void frame_sanity_check(struct trapframe *, struct lwp *);
    415 void
    416 frame_sanity_check(struct trapframe *tf, struct lwp *l)
    417 {
    418 	extern int kernel_text;
    419 	extern int etext;
    420 	extern register_t kpsw;
    421 	extern vaddr_t hpt_base;
    422 	extern vsize_t hpt_mask;
    423 	vsize_t uspace_size;
    424 #define SANITY(e)					\
    425 do {							\
    426 	if (sanity_frame == NULL && !(e)) {		\
    427 		sanity_frame = tf;			\
    428 		sanity_lwp = l;				\
    429 		sanity_checked = __LINE__;		\
    430 	}						\
    431 } while (/* CONSTCOND */ 0)
    432 
    433 	SANITY((tf->tf_ipsw & kpsw) == kpsw);
    434 	SANITY(tf->tf_hptm == hpt_mask && tf->tf_vtop == hpt_base);
    435 	SANITY((kpsw & PSW_I) == 0 || tf->tf_eiem != 0);
    436 	if (tf->tf_iisq_head == HPPA_SID_KERNEL) {
    437 		/*
    438 		 * If the trap happened in the gateway
    439 		 * page, we take the easy way out and
    440 		 * assume that the trapframe is okay.
    441 		 */
    442 		if ((tf->tf_iioq_head & ~PAGE_MASK) != SYSCALLGATE) {
    443 			SANITY(!USERMODE(tf->tf_iioq_head));
    444 			SANITY(!USERMODE(tf->tf_iioq_tail));
    445 			SANITY(tf->tf_iioq_head >= (u_int) &kernel_text);
    446 			SANITY(tf->tf_iioq_head < (u_int) &etext);
    447 			SANITY(tf->tf_iioq_tail >= (u_int) &kernel_text);
    448 			SANITY(tf->tf_iioq_tail < (u_int) &etext);
    449 #ifdef HPPA_REDZONE
    450 			uspace_size = HPPA_REDZONE;
    451 #else
    452 			uspace_size = USPACE;
    453 #endif
    454 			SANITY(l == NULL ||
    455 				((tf->tf_sp >= (u_int)(l->l_addr) + PAGE_SIZE &&
    456 				  tf->tf_sp < (u_int)(l->l_addr) + uspace_size)));
    457 		}
    458 	} else {
    459 		SANITY(USERMODE(tf->tf_iioq_head));
    460 		SANITY(USERMODE(tf->tf_iioq_tail));
    461 		SANITY(l != NULL && tf->tf_cr30 == kvtop((caddr_t)l->l_addr));
    462 	}
    463 #undef SANITY
    464 	if (sanity_frame == tf) {
    465 		(void) trap_kdebug(T_IBREAK, 0, tf);
    466 		sanity_frame = NULL;
    467 		sanity_lwp = NULL;
    468 		sanity_checked = 0;
    469 	}
    470 }
    471 #endif /* DEBUG */
    472 
    473 void
    474 trap(int type, struct trapframe *frame)
    475 {
    476 	struct lwp *l;
    477 	struct proc *p;
    478 	struct pcb *pcbp;
    479 	vaddr_t va;
    480 	struct vm_map *map;
    481 	struct vmspace *vm;
    482 	vm_prot_t vftype;
    483 	pa_space_t space;
    484 	u_int opcode;
    485 	int ret;
    486 	const char *tts;
    487 	int type_raw;
    488 #ifdef DIAGNOSTIC
    489 	extern int emergency_stack_start, emergency_stack_end;
    490 #endif
    491 
    492 	type_raw = type & ~T_USER;
    493 	opcode = frame->tf_iir;
    494 	if (type_raw == T_ITLBMISS || type_raw == T_ITLBMISSNA) {
    495 		va = frame->tf_iioq_head;
    496 		space = frame->tf_iisq_head;
    497 		vftype = VM_PROT_EXECUTE;
    498 	} else {
    499 		va = frame->tf_ior;
    500 		space = frame->tf_isr;
    501 		vftype = inst_store(opcode) ? VM_PROT_WRITE : VM_PROT_READ;
    502 	}
    503 
    504 	l = curlwp;
    505 	p = l ? l->l_proc : NULL;
    506 
    507 #ifdef DIAGNOSTIC
    508 	/*
    509 	 * If we are on the emergency stack, then we either got
    510 	 * a fault on the kernel stack, or we're just handling
    511 	 * a trap for the machine check handler (which also
    512 	 * runs on the emergency stack).
    513 	 *
    514 	 * We *very crudely* differentiate between the two cases
    515 	 * by checking the faulting instruction: if it is the
    516 	 * function prologue instruction that stores the old
    517 	 * frame pointer and updates the stack pointer, we assume
    518 	 * that we faulted on the kernel stack.
    519 	 *
    520 	 * In this case, not completing that instruction will
    521 	 * probably confuse backtraces in kgdb/ddb.  Completing
    522 	 * it would be difficult, because we already faulted on
    523 	 * that part of the stack, so instead we fix up the
    524 	 * frame as if the function called has just returned.
    525 	 * This has peculiar knowledge about what values are in
    526 	 * what registers during the "normal gcc -g" prologue.
    527 	 */
    528 	if (&type >= &emergency_stack_start &&
    529 	    &type < &emergency_stack_end &&
    530 	    type != T_IBREAK && STWM_R1_D_SR0_SP(opcode)) {
    531 		/* Restore the caller's frame pointer. */
    532 		frame->tf_r3 = frame->tf_r1;
    533 		/* Restore the caller's instruction offsets. */
    534 		frame->tf_iioq_head = frame->tf_rp;
    535 		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    536 		goto dead_end;
    537 	}
    538 #endif /* DIAGNOSTIC */
    539 
    540 #ifdef DEBUG
    541 	frame_sanity_check(frame, l);
    542 #endif /* DEBUG */
    543 
    544 	/* If this is a trap, not an interrupt, reenable interrupts. */
    545 	if (type_raw != T_INTERRUPT)
    546 		mtctl(frame->tf_eiem, CR_EIEM);
    547 
    548 	if (frame->tf_flags & TFF_LAST)
    549 		l->l_md.md_regs = frame;
    550 
    551 	if ((type & ~T_USER) > trap_types)
    552 		tts = "reserved";
    553 	else
    554 		tts = trap_type[type & ~T_USER];
    555 
    556 #ifdef TRAPDEBUG
    557 	if (type_raw != T_INTERRUPT && type_raw != T_IBREAK)
    558 		printf("trap: %d, %s for %x:%x at %x:%x, fp=%p, rp=%x\n",
    559 		    type, tts, space, (u_int)va, frame->tf_iisq_head,
    560 		    frame->tf_iioq_head, frame, frame->tf_rp);
    561 	else if (type_raw == T_IBREAK)
    562 		printf("trap: break instruction %x:%x at %x:%x, fp=%p\n",
    563 		    break5(opcode), break13(opcode),
    564 		    frame->tf_iisq_head, frame->tf_iioq_head, frame);
    565 
    566 	{
    567 		extern int etext;
    568 		if (frame < (struct trapframe *)&etext) {
    569 			printf("trap: bogus frame ptr %p\n", frame);
    570 			goto dead_end;
    571 		}
    572 	}
    573 #endif
    574 	switch (type) {
    575 	case T_NONEXIST:
    576 	case T_NONEXIST|T_USER:
    577 #if !defined(DDB) && !defined(KGDB)
    578 		/* we've got screwed up by the central scrutinizer */
    579 		panic ("trap: elvis has just left the building!");
    580 		break;
    581 #else
    582 		goto dead_end;
    583 #endif
    584 	case T_RECOVERY|T_USER:
    585 #ifdef USERTRACE
    586 		for(;;) {
    587 			if (frame->tf_iioq_head != rctr_next_iioq)
    588 				printf("-%08x\nr %08x",
    589 					rctr_next_iioq - 4,
    590 					frame->tf_iioq_head);
    591 			rctr_next_iioq = frame->tf_iioq_head + 4;
    592 			if (frame->tf_ipsw & PSW_N) {
    593 				/* Advance the program counter. */
    594 				frame->tf_iioq_head = frame->tf_iioq_tail;
    595 				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
    596 				/* Clear flags. */
    597 				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
    598 				/* Simulate another trap. */
    599 				continue;
    600 			}
    601 			break;
    602 		}
    603 		frame->tf_rctr = 0;
    604 		break;
    605 #endif /* USERTRACE */
    606 	case T_RECOVERY:
    607 #if !defined(DDB) && !defined(KGDB)
    608 		/* XXX will implement later */
    609 		printf ("trap: handicapped");
    610 		break;
    611 #else
    612 		goto dead_end;
    613 #endif
    614 
    615 	case T_EMULATION | T_USER:
    616 #ifdef FPEMUL
    617 		hppa_fpu_emulate(frame, l);
    618 #else  /* !FPEMUL */
    619 		/*
    620 		 * We don't have FPU emulation, so signal the
    621 		 * process with a SIGFPE.
    622 		 */
    623 		hppa_trapsignal_hack(l, SIGFPE, frame->tf_iioq_head);
    624 #endif /* !FPEMUL */
    625 		break;
    626 
    627 #ifdef DIAGNOSTIC
    628 	case T_EXCEPTION:
    629 		panic("FPU/SFU emulation botch");
    630 
    631 		/* these just can't happen ever */
    632 	case T_PRIV_OP:
    633 	case T_PRIV_REG:
    634 		/* these just can't make it to the trap() ever */
    635 	case T_HPMC:      case T_HPMC | T_USER:
    636 	case T_EMULATION:
    637 #endif
    638 	case T_IBREAK:
    639 	case T_DATALIGN:
    640 	case T_DBREAK:
    641 	dead_end:
    642 		if (type & T_USER) {
    643 #ifdef DEBUG
    644 			user_backtrace(frame, l, type);
    645 #endif
    646 			hppa_trapsignal_hack(l, SIGILL, frame->tf_iioq_head);
    647 			break;
    648 		}
    649 		if (trap_kdebug(type, va, frame))
    650 			return;
    651 		else if (type == T_DATALIGN)
    652 			panic ("trap: %s at 0x%x", tts, (u_int) va);
    653 		else
    654 			panic ("trap: no debugger for \"%s\" (%d)", tts, type);
    655 		break;
    656 
    657 	case T_IBREAK | T_USER:
    658 	case T_DBREAK | T_USER:
    659 		/* pass to user debugger */
    660 		break;
    661 
    662 	case T_EXCEPTION | T_USER:	/* co-proc assist trap */
    663 		hppa_trapsignal_hack(l, SIGFPE, va);
    664 		break;
    665 
    666 	case T_OVERFLOW | T_USER:
    667 		hppa_trapsignal_hack(l, SIGFPE, va);
    668 		break;
    669 
    670 	case T_CONDITION | T_USER:
    671 		break;
    672 
    673 	case T_ILLEGAL | T_USER:
    674 #ifdef DEBUG
    675 		user_backtrace(frame, l, type);
    676 #endif
    677 		hppa_trapsignal_hack(l, SIGILL, va);
    678 		break;
    679 
    680 	case T_PRIV_OP | T_USER:
    681 #ifdef DEBUG
    682 		user_backtrace(frame, l, type);
    683 #endif
    684 		hppa_trapsignal_hack(l, SIGILL, va);
    685 		break;
    686 
    687 	case T_PRIV_REG | T_USER:
    688 #ifdef DEBUG
    689 		user_backtrace(frame, l, type);
    690 #endif
    691 		hppa_trapsignal_hack(l, SIGILL, va);
    692 		break;
    693 
    694 		/* these should never got here */
    695 	case T_HIGHERPL | T_USER:
    696 	case T_LOWERPL | T_USER:
    697 		hppa_trapsignal_hack(l, SIGSEGV, va);
    698 		break;
    699 
    700 	case T_IPROT | T_USER:
    701 	case T_DPROT | T_USER:
    702 		hppa_trapsignal_hack(l, SIGSEGV, va);
    703 		break;
    704 
    705 	case T_DATACC:   	case T_USER | T_DATACC:
    706 	case T_ITLBMISS:	case T_USER | T_ITLBMISS:
    707 	case T_DTLBMISS:	case T_USER | T_DTLBMISS:
    708 	case T_ITLBMISSNA:	case T_USER | T_ITLBMISSNA:
    709 	case T_DTLBMISSNA:	case T_USER | T_DTLBMISSNA:
    710 	case T_TLB_DIRTY:	case T_USER | T_TLB_DIRTY:
    711 		vm = p->p_vmspace;
    712 
    713 		if (!vm) {
    714 #ifdef TRAPDEBUG
    715 			printf("trap: no vm, p=%p\n", p);
    716 #endif
    717 			goto dead_end;
    718 		}
    719 
    720 		/*
    721 		 * it could be a kernel map for exec_map faults
    722 		 */
    723 		if (!(type & T_USER) && space == HPPA_SID_KERNEL)
    724 			map = kernel_map;
    725 		else {
    726 			map = &vm->vm_map;
    727 			if (l->l_flag & L_SA) {
    728 				l->l_savp->savp_faultaddr = va;
    729 				l->l_flag |= L_SA_PAGEFAULT;
    730 			}
    731 		}
    732 
    733 		va = hppa_trunc_page(va);
    734 
    735 		if (map->pmap->pmap_space != space) {
    736 #ifdef TRAPDEBUG
    737 			printf("trap: space missmatch %d != %d\n",
    738 			    space, map->pmap->pmap_space);
    739 #endif
    740 			/* actually dump the user, crap the kernel */
    741 			goto dead_end;
    742 		}
    743 
    744 		/* Never call uvm_fault in interrupt context. */
    745 		KASSERT(hppa_intr_depth == 0);
    746 
    747 		ret = uvm_fault(map, va, 0, vftype);
    748 
    749 #ifdef TRAPDEBUG
    750 		printf("uvm_fault(%p, %x, %d, %d)=%d\n",
    751 		    map, (u_int)va, 0, vftype, ret);
    752 #endif
    753 
    754 		if (map != kernel_map)
    755 			l->l_flag &= ~L_SA_PAGEFAULT;
    756 		/*
    757 		 * If this was a stack access we keep track of the maximum
    758 		 * accessed stack size.  Also, if uvm_fault gets a protection
    759 		 * failure it is due to accessing the stack region outside
    760 		 * the current limit and we need to reflect that as an access
    761 		 * error.
    762 		 */
    763 		if (va >= (vaddr_t)vm->vm_maxsaddr + vm->vm_ssize) {
    764 			if (ret == 0) {
    765 				vsize_t nss = btoc(va - USRSTACK + PAGE_SIZE);
    766 				if (nss > vm->vm_ssize)
    767 					vm->vm_ssize = nss;
    768 			} else if (ret == EACCES)
    769 				ret = EFAULT;
    770 		}
    771 
    772 		if (ret != 0) {
    773 			if (type & T_USER) {
    774 printf("trapsignal: uvm_fault(%p, %x, %d, %d)=%d\n",
    775 	map, (u_int)va, 0, vftype, ret);
    776 #ifdef DEBUG
    777 				user_backtrace(frame, l, type);
    778 #endif
    779 				hppa_trapsignal_hack(l, SIGSEGV, frame->tf_ior);
    780 			} else {
    781 				if (l && l->l_addr->u_pcb.pcb_onfault) {
    782 #ifdef PMAPDEBUG
    783 					printf("trap: copyin/out %d\n",ret);
    784 #endif
    785 					pcbp = &l->l_addr->u_pcb;
    786 					frame->tf_iioq_tail = 4 +
    787 					    (frame->tf_iioq_head =
    788 						pcbp->pcb_onfault);
    789 					pcbp->pcb_onfault = 0;
    790 					break;
    791 				}
    792 #if 1
    793 if (trap_kdebug (type, va, frame))
    794 	return;
    795 #else
    796 				panic("trap: uvm_fault(%p, %x, %d, %d): %d",
    797 				    map, va, 0, vftype, ret);
    798 #endif
    799 			}
    800 		}
    801 		break;
    802 
    803 	case T_DATALIGN | T_USER:
    804 #ifdef DEBUG
    805 		user_backtrace(frame, l, type);
    806 #endif
    807 		hppa_trapsignal_hack(l, SIGBUS, va);
    808 		break;
    809 
    810 	case T_INTERRUPT:
    811 	case T_INTERRUPT|T_USER:
    812 		hppa_intr(frame);
    813 		mtctl(frame->tf_eiem, CR_EIEM);
    814 #if 0
    815 if (trap_kdebug (type, va, frame))
    816 return;
    817 #endif
    818 		break;
    819 	case T_LOWERPL:
    820 	case T_DPROT:
    821 	case T_IPROT:
    822 	case T_OVERFLOW:
    823 	case T_CONDITION:
    824 	case T_ILLEGAL:
    825 	case T_HIGHERPL:
    826 	case T_TAKENBR:
    827 	case T_POWERFAIL:
    828 	case T_LPMC:
    829 	case T_PAGEREF:
    830 	case T_DATAPID:  	case T_DATAPID  | T_USER:
    831 		if (0 /* T-chip */) {
    832 			break;
    833 		}
    834 		/* FALLTHROUGH to unimplemented */
    835 	default:
    836 #if 1
    837 if (trap_kdebug (type, va, frame))
    838 	return;
    839 #endif
    840 		panic ("trap: unimplemented \'%s\' (%d)", tts, type);
    841 	}
    842 
    843 	if (type & T_USER)
    844 		userret(l, l->l_md.md_regs->tf_iioq_head, 0);
    845 
    846 #ifdef DEBUG
    847 	frame_sanity_check(frame, l);
    848 	if (frame->tf_flags & TFF_LAST && curlwp != NULL)
    849 		frame_sanity_check(curlwp->l_md.md_regs, curlwp);
    850 #endif /* DEBUG */
    851 }
    852 
    853 void
    854 child_return(void *arg)
    855 {
    856 	struct lwp *l = arg;
    857 	struct proc *p = l->l_proc;
    858 
    859 	userret(l, l->l_md.md_regs->tf_iioq_head, 0);
    860 #ifdef KTRACE
    861 	if (KTRPOINT(p, KTR_SYSRET))
    862 		ktrsysret(p, SYS_fork, 0, 0);
    863 #endif
    864 #ifdef DEBUG
    865 	frame_sanity_check(l->l_md.md_regs, l);
    866 #endif /* DEBUG */
    867 }
    868 
    869 /*
    870  * call actual syscall routine
    871  * from the low-level syscall handler:
    872  * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto
    873  *   our stack, this wins compared to copyin just needed amount anyway
    874  * - register args are copied onto stack too
    875  */
    876 void
    877 syscall(struct trapframe *frame, int *args)
    878 {
    879 	struct lwp *l;
    880 	struct proc *p;
    881 	const struct sysent *callp;
    882 	int nsys, code, argsize, error;
    883 	int tmp;
    884 	int rval[2];
    885 
    886 	uvmexp.syscalls++;
    887 
    888 #ifdef DEBUG
    889 	frame_sanity_check(frame, curlwp);
    890 #endif /* DEBUG */
    891 
    892 	if (!USERMODE(frame->tf_iioq_head))
    893 		panic("syscall");
    894 
    895 	l = curlwp;
    896 	p = l->l_proc;
    897 	l->l_md.md_regs = frame;
    898 	nsys = p->p_emul->e_nsysent;
    899 	callp = p->p_emul->e_sysent;
    900 	code = frame->tf_t1;
    901 
    902 	/*
    903 	 * Restarting a system call is touchy on the HPPA,
    904 	 * because syscall arguments are passed in registers
    905 	 * and the program counter of the syscall "point"
    906 	 * isn't easily divined.
    907 	 *
    908 	 * We handle the first problem by assuming that we
    909 	 * will have to restart this system call, so we
    910 	 * stuff the first four words of the original arguments
    911 	 * back into the frame as arg0...arg3, which is where
    912 	 * we found them in the first place.  Any further
    913 	 * arguments are (still) on the user's stack and the
    914 	 * syscall code will fetch them from there (again).
    915 	 *
    916 	 * The program counter problem is addressed below.
    917 	 */
    918 	frame->tf_arg0 = args[0];
    919 	frame->tf_arg1 = args[1];
    920 	frame->tf_arg2 = args[2];
    921 	frame->tf_arg3 = args[3];
    922 
    923 	/*
    924 	 * Some special handling for the syscall(2) and
    925 	 * __syscall(2) system calls.
    926 	 */
    927 	switch (code) {
    928 	case SYS_syscall:
    929 		code = *args;
    930 		args += 1;
    931 		break;
    932 	case SYS___syscall:
    933 		if (callp != sysent)
    934 			break;
    935 		/*
    936 		 * NB: even though __syscall(2) takes a quad_t
    937 		 * containing the system call number, because
    938 		 * our argument copying word-swaps 64-bit arguments,
    939 		 * the least significant word of that quad_t
    940 		 * is the first word in the argument array.
    941 		 */
    942 		code = *args;
    943 		args += 2;
    944 	}
    945 
    946 	/*
    947 	 * Stacks growing from lower addresses to higher
    948 	 * addresses are not really such a good idea, because
    949 	 * it makes it impossible to overlay a struct on top
    950 	 * of C stack arguments (the arguments appear in
    951 	 * reversed order).
    952 	 *
    953 	 * You can do the obvious thing (as locore.S does) and
    954 	 * copy argument words one by one, laying them out in
    955 	 * the "right" order in the destination buffer, but this
    956 	 * ends up word-swapping multi-word arguments (like off_t).
    957 	 *
    958 	 * To compensate, we have some automatically-generated
    959 	 * code that word-swaps these multi-word arguments.
    960 	 * Right now the script that generates this code is
    961 	 * in Perl, because I don't know awk.
    962 	 *
    963 	 * FIXME - this works only on native binaries and
    964 	 * will probably screw up any and all emulation.
    965 	 */
    966 	switch (code) {
    967 	/*
    968 	 * BEGIN automatically generated
    969 	 * by /home/fredette/project/hppa/makescargfix.pl
    970 	 * do not edit!
    971 	 */
    972 	case SYS_pread:
    973 		/*
    974 		 * 	syscallarg(int) fd;
    975 		 * 	syscallarg(void *) buf;
    976 		 * 	syscallarg(size_t) nbyte;
    977 		 * 	syscallarg(int) pad;
    978 		 * 	syscallarg(off_t) offset;
    979 		 */
    980 		tmp = args[4];
    981 		args[4] = args[4 + 1];
    982 		args[4 + 1] = tmp;
    983 		break;
    984 	case SYS_pwrite:
    985 		/*
    986 		 * 	syscallarg(int) fd;
    987 		 * 	syscallarg(const void *) buf;
    988 		 * 	syscallarg(size_t) nbyte;
    989 		 * 	syscallarg(int) pad;
    990 		 * 	syscallarg(off_t) offset;
    991 		 */
    992 		tmp = args[4];
    993 		args[4] = args[4 + 1];
    994 		args[4 + 1] = tmp;
    995 		break;
    996 	case SYS_mmap:
    997 		/*
    998 		 * 	syscallarg(void *) addr;
    999 		 * 	syscallarg(size_t) len;
   1000 		 * 	syscallarg(int) prot;
   1001 		 * 	syscallarg(int) flags;
   1002 		 * 	syscallarg(int) fd;
   1003 		 * 	syscallarg(long) pad;
   1004 		 * 	syscallarg(off_t) pos;
   1005 		 */
   1006 		tmp = args[6];
   1007 		args[6] = args[6 + 1];
   1008 		args[6 + 1] = tmp;
   1009 		break;
   1010 	case SYS_lseek:
   1011 		/*
   1012 		 * 	syscallarg(int) fd;
   1013 		 * 	syscallarg(int) pad;
   1014 		 * 	syscallarg(off_t) offset;
   1015 		 */
   1016 		tmp = args[2];
   1017 		args[2] = args[2 + 1];
   1018 		args[2 + 1] = tmp;
   1019 		break;
   1020 	case SYS_truncate:
   1021 		/*
   1022 		 * 	syscallarg(const char *) path;
   1023 		 * 	syscallarg(int) pad;
   1024 		 * 	syscallarg(off_t) length;
   1025 		 */
   1026 		tmp = args[2];
   1027 		args[2] = args[2 + 1];
   1028 		args[2 + 1] = tmp;
   1029 		break;
   1030 	case SYS_ftruncate:
   1031 		/*
   1032 		 * 	syscallarg(int) fd;
   1033 		 * 	syscallarg(int) pad;
   1034 		 * 	syscallarg(off_t) length;
   1035 		 */
   1036 		tmp = args[2];
   1037 		args[2] = args[2 + 1];
   1038 		args[2 + 1] = tmp;
   1039 		break;
   1040 	case SYS_preadv:
   1041 		/*
   1042 		 * 	syscallarg(int) fd;
   1043 		 * 	syscallarg(const struct iovec *) iovp;
   1044 		 * 	syscallarg(int) iovcnt;
   1045 		 * 	syscallarg(int) pad;
   1046 		 * 	syscallarg(off_t) offset;
   1047 		 */
   1048 		tmp = args[4];
   1049 		args[4] = args[4 + 1];
   1050 		args[4 + 1] = tmp;
   1051 		break;
   1052 	case SYS_pwritev:
   1053 		/*
   1054 		 * 	syscallarg(int) fd;
   1055 		 * 	syscallarg(const struct iovec *) iovp;
   1056 		 * 	syscallarg(int) iovcnt;
   1057 		 * 	syscallarg(int) pad;
   1058 		 * 	syscallarg(off_t) offset;
   1059 		 */
   1060 		tmp = args[4];
   1061 		args[4] = args[4 + 1];
   1062 		args[4 + 1] = tmp;
   1063 		break;
   1064 	default:
   1065 		break;
   1066 	/*
   1067 	 * END automatically generated
   1068 	 * by /home/fredette/project/hppa/makescargfix.pl
   1069 	 * do not edit!
   1070 	 */
   1071 	}
   1072 
   1073 #ifdef USERTRACE
   1074 	if (0) {
   1075 		user_backtrace(frame, p, -1);
   1076 		frame->tf_ipsw |= PSW_R;
   1077 		frame->tf_rctr = 0;
   1078 		printf("r %08x", frame->tf_iioq_head);
   1079 		rctr_next_iioq = frame->tf_iioq_head + 4;
   1080 	}
   1081 #endif
   1082 
   1083 	if (code < 0 || code >= nsys)
   1084 		callp += p->p_emul->e_nosys;	/* bad syscall # */
   1085 	else
   1086 		callp += code;
   1087 	argsize = callp->sy_argsize;
   1088 
   1089 	if ((error = trace_enter(l, code, code, NULL, args)) != 0)
   1090 		goto bad;
   1091 
   1092 	rval[0] = 0;
   1093 	rval[1] = 0;
   1094 	switch (error = (*callp->sy_call)(l, args, rval)) {
   1095 	case 0:
   1096 		l = curlwp;			/* changes on exec() */
   1097 		frame = l->l_md.md_regs;
   1098 		frame->tf_ret0 = rval[0];
   1099 		frame->tf_ret1 = rval[1];
   1100 		frame->tf_t1 = 0;
   1101 		break;
   1102 	case ERESTART:
   1103 		/*
   1104 		 * Now we have to wind back the instruction
   1105 		 * offset queue to the point where the system
   1106 		 * call will be made again.  This is inherently
   1107 		 * tied to the SYSCALL macro.
   1108 		 *
   1109 		 * Currently, the part of the SYSCALL macro
   1110 		 * that we want to rerun reads as:
   1111 		 *
   1112 		 *	ldil	L%SYSCALLGATE, r1
   1113 		 *	ble	4(sr7, r1)
   1114 		 *	ldi	__CONCAT(SYS_,x), t1
   1115 		 *	ldw	HPPA_FRAME_ERP(sr0,sp), rp
   1116 		 *
   1117 		 * And our offset queue head points to the
   1118 		 * final ldw instruction.  So we need to
   1119 		 * subtract twelve to reach the ldil.
   1120 		 */
   1121 		frame->tf_iioq_head -= 12;
   1122 		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
   1123 		break;
   1124 	case EJUSTRETURN:
   1125 		p = curproc;
   1126 		break;
   1127 	default:
   1128 	bad:
   1129 		if (p->p_emul->e_errno)
   1130 			error = p->p_emul->e_errno[error];
   1131 		frame->tf_t1 = error;
   1132 		break;
   1133 	}
   1134 
   1135 	trace_exit(l, code, args, rval, error);
   1136 
   1137 	userret(l, frame->tf_iioq_head, 0);
   1138 #ifdef DEBUG
   1139 	frame_sanity_check(frame, l);
   1140 #endif /* DEBUG */
   1141 }
   1142 
   1143 /*
   1144  * Start a new LWP
   1145  */
   1146 void
   1147 startlwp(void *arg)
   1148 {
   1149 	int err;
   1150 	ucontext_t *uc = arg;
   1151 	struct lwp *l = curlwp;
   1152 
   1153 	err = cpu_setmcontext(l, &uc->uc_mcontext, uc->uc_flags);
   1154 #if DIAGNOSTIC
   1155 	if (err) {
   1156 		printf("Error %d from cpu_setmcontext.", err);
   1157 	}
   1158 #endif
   1159 	pool_put(&lwp_uc_pool, uc);
   1160 
   1161 	userret(l, l->l_md.md_regs->tf_iioq_head, 0);
   1162 }
   1163 
   1164 /*
   1165  * XXX This is a terrible name.
   1166  */
   1167 void
   1168 upcallret(struct lwp *l)
   1169 {
   1170 	userret(l, l->l_md.md_regs->tf_iioq_head, 0);
   1171 }
   1172 
   1173 /*
   1174  * XXX for transition to SIGINFO
   1175  */
   1176 void
   1177 hppa_trapsignal_hack(struct lwp *l, int signum, u_long code)
   1178 {
   1179         ksiginfo_t ksi;
   1180 
   1181         KSI_INIT_TRAP(&ksi);
   1182         ksi.ksi_signo = signum;
   1183         ksi.ksi_trap = (int)code;
   1184         trapsignal(l, &ksi);
   1185 }
   1186