trap.c revision 1.6 1 /* $NetBSD: trap.c,v 1.6 2002/12/21 16:23:58 manu Exp $ */
2
3 /*-
4 * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Matthew Fredette.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the NetBSD
21 * Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 * contributors may be used to endorse or promote products derived
24 * from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39 /* $OpenBSD: trap.c,v 1.30 2001/09/19 20:50:56 mickey Exp $ */
40
41 /*
42 * Copyright (c) 1998-2000 Michael Shalayeff
43 * All rights reserved.
44 *
45 * Redistribution and use in source and binary forms, with or without
46 * modification, are permitted provided that the following conditions
47 * are met:
48 * 1. Redistributions of source code must retain the above copyright
49 * notice, this list of conditions and the following disclaimer.
50 * 2. Redistributions in binary form must reproduce the above copyright
51 * notice, this list of conditions and the following disclaimer in the
52 * documentation and/or other materials provided with the distribution.
53 * 3. All advertising materials mentioning features or use of this software
54 * must display the following acknowledgement:
55 * This product includes software developed by Michael Shalayeff.
56 * 4. The name of the author may not be used to endorse or promote products
57 * derived from this software without specific prior written permission.
58 *
59 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
60 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
61 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
62 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
63 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
64 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
65 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
66 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
67 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
68 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
69 */
70
71 /* #define INTRDEBUG */
72 /* #define TRAPDEBUG */
73 /* #define USERTRACE */
74
75 #include "opt_kgdb.h"
76 #include "opt_syscall_debug.h"
77 #include "opt_ktrace.h"
78 #include "opt_systrace.h"
79
80 #include <sys/param.h>
81 #include <sys/systm.h>
82 #include <sys/kernel.h>
83 #include <sys/syscall.h>
84 #ifdef KTRACE
85 #include <sys/ktrace.h>
86 #endif
87 #ifdef SYSTRACE
88 #include <sys/systrace.h>
89 #endif
90 #include <sys/proc.h>
91 #include <sys/signalvar.h>
92 #include <sys/user.h>
93 #include <sys/acct.h>
94 #include <sys/signal.h>
95 #include <sys/device.h>
96
97 #include <net/netisr.h>
98
99 #ifdef KGDB
100 #include <sys/kgdb.h>
101 #endif
102
103 #include <uvm/uvm.h>
104
105 #include <machine/iomod.h>
106 #include <machine/cpufunc.h>
107 #include <machine/reg.h>
108 #include <machine/autoconf.h>
109
110 #include <machine/db_machdep.h>
111
112 #include <hppa/hppa/machdep.h>
113
114 #if defined(INTRDEBUG) || defined(TRAPDEBUG)
115 #include <ddb/db_output.h>
116 #endif
117
118 #if defined(DEBUG) || defined(DIAGNOSTIC)
119 /*
120 * 0x6fc1000 is a stwm r1, d(sr0, sp), which is the last
121 * instruction in the function prologue that gcc -O0 uses.
122 * When we have this instruction we know the relationship
123 * between the stack pointer and the gcc -O0 frame pointer
124 * (in r3, loaded with the initial sp) for the body of a
125 * function.
126 *
127 * If the given instruction is a stwm r1, d(sr0, sp) where
128 * d > 0, we evaluate to d, else we evaluate to zero.
129 */
130 #define STWM_R1_D_SR0_SP(inst) \
131 (((inst) & 0xffffc001) == 0x6fc10000 ? (((inst) & 0x00003ff) >> 1) : 0)
132 #endif /* DEBUG || DIAGNOSTIC */
133
134 const char *trap_type[] = {
135 "invalid",
136 "HPMC",
137 "power failure",
138 "recovery counter",
139 "external interrupt",
140 "LPMC",
141 "ITLB miss fault",
142 "instruction protection",
143 "Illegal instruction",
144 "break instruction",
145 "privileged operation",
146 "privileged register",
147 "overflow",
148 "conditional",
149 "assist exception",
150 "DTLB miss",
151 "ITLB non-access miss",
152 "DTLB non-access miss",
153 "data protection/rights/alignment",
154 "data break",
155 "TLB dirty",
156 "page reference",
157 "assist emulation",
158 "higher-priv transfer",
159 "lower-priv transfer",
160 "taken branch",
161 "data access rights",
162 "data protection",
163 "unaligned data ref",
164 };
165 int trap_types = sizeof(trap_type)/sizeof(trap_type[0]);
166
167 int want_resched;
168 volatile int astpending;
169
170 void pmap_hptdump __P((void));
171 void syscall __P((struct trapframe *frame, int *args));
172
173 #ifdef USERTRACE
174 /*
175 * USERTRACE is a crude facility that traces the PC of
176 * a single user process. This tracing is normally
177 * activated by the dispatching of a certain syscall
178 * with certain arguments - see the activation code in
179 * syscall().
180 */
181 u_int rctr_next_iioq;
182 #endif
183
184 static __inline void
185 userret (struct proc *p, register_t pc, u_quad_t oticks)
186 {
187 int sig;
188
189 /* take pending signals */
190 while ((sig = CURSIG(p)) != 0)
191 postsig(sig);
192
193 p->p_priority = p->p_usrpri;
194 if (want_resched) {
195 /*
196 * We're being preempted.
197 */
198 preempt(NULL);
199 while ((sig = CURSIG(p)) != 0)
200 postsig(sig);
201 }
202
203 /*
204 * If profiling, charge recent system time to the trapped pc.
205 */
206 if (p->p_flag & P_PROFIL) {
207 extern int psratio;
208
209 addupc_task(p, pc, (int)(p->p_sticks - oticks) * psratio);
210 }
211
212 curcpu()->ci_schedstate.spc_curpriority = p->p_priority;
213 }
214
215 /*
216 * This handles some messy kernel debugger details.
217 * It dispatches into either kgdb or DDB, and knows
218 * about some special things to do, like skipping over
219 * break instructions and how to really set up for
220 * a single-step.
221 */
222 #if defined(KGDB) || defined(DDB)
223 static int
224 trap_kdebug(int type, int code, struct trapframe *frame)
225 {
226 int handled;
227 u_int tf_iioq_head_old;
228 u_int tf_iioq_tail_old;
229
230 for(;;) {
231
232 /* This trap has not been handled. */
233 handled = 0;
234
235 /* Remember the instruction offset queue. */
236 tf_iioq_head_old = frame->tf_iioq_head;
237 tf_iioq_tail_old = frame->tf_iioq_tail;
238
239 #ifdef KGDB
240 /* Let KGDB handle it (if connected) */
241 if (!handled)
242 handled = kgdb_trap(type, frame);
243 #endif
244 #ifdef DDB
245 /* Let DDB handle it. */
246 if (!handled)
247 handled = kdb_trap(type, code, frame);
248 #endif
249
250 /* If this trap wasn't handled, return now. */
251 if (!handled)
252 return(0);
253
254 /*
255 * If the instruction offset queue head changed,
256 * but the offset queue tail didn't, assume that
257 * the user wants to jump to the head offset, and
258 * adjust the tail accordingly. This should fix
259 * the kgdb `jump' command, and can help DDB users
260 * who `set' the offset head but forget the tail.
261 */
262 if (frame->tf_iioq_head != tf_iioq_head_old &&
263 frame->tf_iioq_tail == tf_iioq_tail_old)
264 frame->tf_iioq_tail = frame->tf_iioq_head + 4;
265
266 /*
267 * This is some single-stepping support.
268 * If we're trying to step through a nullified
269 * instruction, just advance by hand and trap
270 * again. Otherwise, load the recovery counter
271 * with zero.
272 */
273 if (frame->tf_ipsw & PSW_R) {
274 #ifdef TRAPDEBUG
275 printf("(single stepping at head 0x%x tail 0x%x)\n", frame->tf_iioq_head, frame->tf_iioq_tail);
276 #endif
277 if (frame->tf_ipsw & PSW_N) {
278 #ifdef TRAPDEBUG
279 printf("(single stepping past nullified)\n");
280 #endif
281
282 /* Advance the program counter. */
283 frame->tf_iioq_head = frame->tf_iioq_tail;
284 frame->tf_iioq_tail = frame->tf_iioq_head + 4;
285
286 /* Clear flags. */
287 frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
288
289 /* Simulate another trap. */
290 type = T_RECOVERY;
291 continue;
292 }
293 frame->tf_rctr = 0;
294 }
295
296 /* We handled this trap. */
297 return (1);
298 }
299 /* NOTREACHED */
300 }
301 #else /* !KGDB && !DDB */
302 #define trap_kdebug(t, c, f) (0)
303 #endif /* !KGDB && !DDB */
304
305 #ifdef DIAGNOSTIC
306 /*
307 * These functions give a crude usermode backtrace. They
308 * really only work when code has been compiled without
309 * optimization, as they assume a certain function prologue
310 * sets up a frame pointer and stores the return pointer
311 * and arguments in it.
312 */
313 static void user_backtrace_raw __P((u_int, u_int));
314 static void
315 user_backtrace_raw(u_int pc, u_int fp)
316 {
317 int frame_number;
318 int arg_number;
319
320 for (frame_number = 0;
321 frame_number < 100 && pc > HPPA_PC_PRIV_MASK && fp;
322 frame_number++) {
323
324 printf("%3d: pc=%08x%s fp=0x%08x", frame_number,
325 pc & ~HPPA_PC_PRIV_MASK, USERMODE(pc) ? "" : "**", fp);
326 for(arg_number = 0; arg_number < 4; arg_number++)
327 printf(" arg%d=0x%08x", arg_number,
328 (int) fuword(HPPA_FRAME_CARG(arg_number, fp)));
329 printf("\n");
330 pc = fuword(((register_t *) fp) - 5); /* fetch rp */
331 if (pc == -1) {
332 printf(" fuword for pc failed\n");
333 break;
334 }
335 fp = fuword(((register_t *) fp) + 0); /* fetch previous fp */
336 if (fp == -1) {
337 printf(" fuword for fp failed\n");
338 break;
339 }
340 }
341 printf(" backtrace stopped with pc %08x fp 0x%08x\n", pc, fp);
342 }
343
344 static void user_backtrace __P((struct trapframe *, struct proc *, int));
345 static void
346 user_backtrace(struct trapframe *tf, struct proc *p, int type)
347 {
348 u_int pc, fp, inst;
349
350 /*
351 * Display any trap type that we have.
352 */
353 if (type >= 0)
354 printf("pid %d (%s) trap #%d\n",
355 p->p_pid, p->p_comm, type & ~T_USER);
356
357 /*
358 * Assuming that the frame pointer in r3 is valid,
359 * dump out a stack trace.
360 */
361 fp = tf->tf_r3;
362 printf("pid %d (%s) backtrace, starting with fp 0x%08x\n",
363 p->p_pid, p->p_comm, fp);
364 user_backtrace_raw(tf->tf_iioq_head, fp);
365
366 /*
367 * In case the frame pointer in r3 is not valid,
368 * assuming the stack pointer is valid and the
369 * faulting function is a non-leaf, if we can
370 * find its prologue we can recover its frame
371 * pointer.
372 */
373 pc = tf->tf_iioq_head;
374 fp = tf->tf_sp - HPPA_FRAME_SIZE;
375 printf("pid %d (%s) backtrace, starting with sp 0x%08x pc 0x%08x\n",
376 p->p_pid, p->p_comm, tf->tf_sp, pc);
377 for(pc &= ~HPPA_PC_PRIV_MASK; pc > 0; pc -= sizeof(inst)) {
378 inst = fuword((register_t *) pc);
379 if (inst == -1) {
380 printf(" fuword for inst at pc %08x failed\n", pc);
381 break;
382 }
383 /* Check for the prologue instruction that sets sp. */
384 if (STWM_R1_D_SR0_SP(inst)) {
385 fp = tf->tf_sp - STWM_R1_D_SR0_SP(inst);
386 printf(" sp from fp at pc %08x: %08x\n", pc, inst);
387 break;
388 }
389 }
390 user_backtrace_raw(tf->tf_iioq_head, fp);
391 }
392 #endif /* DIAGNOSTIC */
393
394 #ifdef DEBUG
395 /*
396 * This sanity-checks a trapframe. It is full of various
397 * assumptions about what a healthy CPU state should be,
398 * with some documented elsewhere, some not.
399 */
400 struct trapframe *sanity_frame;
401 struct proc *sanity_proc;
402 int sanity_checked = 0;
403 void frame_sanity_check __P((struct trapframe *, struct proc *));
404 void
405 frame_sanity_check(struct trapframe *tf, struct proc *p)
406 {
407 extern int kernel_text;
408 extern int etext;
409 extern register_t kpsw;
410 extern vaddr_t hpt_base;
411 extern vsize_t hpt_mask;
412 vsize_t uspace_size;
413 #define SANITY(e) \
414 do { \
415 if (sanity_frame == NULL && !(e)) { \
416 sanity_frame = tf; \
417 sanity_proc = p; \
418 sanity_checked = __LINE__; \
419 } \
420 } while (/* CONSTCOND */ 0)
421
422 SANITY((tf->tf_ipsw & kpsw) == kpsw);
423 SANITY(tf->tf_hptm == hpt_mask && tf->tf_vtop == hpt_base);
424 SANITY((kpsw & PSW_I) == 0 || tf->tf_eiem != 0);
425 if (tf->tf_iisq_head == HPPA_SID_KERNEL) {
426 /*
427 * If the trap happened in the gateway
428 * page, we take the easy way out and
429 * assume that the trapframe is okay.
430 */
431 if ((tf->tf_iioq_head & ~PAGE_MASK) != SYSCALLGATE) {
432 SANITY(!USERMODE(tf->tf_iioq_head));
433 SANITY(!USERMODE(tf->tf_iioq_tail));
434 SANITY(tf->tf_iioq_head >= (u_int) &kernel_text);
435 SANITY(tf->tf_iioq_head < (u_int) &etext);
436 SANITY(tf->tf_iioq_tail >= (u_int) &kernel_text);
437 SANITY(tf->tf_iioq_tail < (u_int) &etext);
438 #ifdef HPPA_REDZONE
439 uspace_size = HPPA_REDZONE;
440 #else
441 uspace_size = USPACE;
442 #endif
443 SANITY(p == NULL ||
444 ((tf->tf_sp >= (u_int)(p->p_addr) + NBPG &&
445 tf->tf_sp < (u_int)(p->p_addr) + uspace_size)));
446 }
447 } else {
448 SANITY(USERMODE(tf->tf_iioq_head));
449 SANITY(USERMODE(tf->tf_iioq_tail));
450 SANITY(p != NULL && tf->tf_cr30 == kvtop((caddr_t)p->p_addr));
451 }
452 #undef SANITY
453 if (sanity_frame == tf) {
454 (void) trap_kdebug(T_IBREAK, 0, tf);
455 sanity_frame = NULL;
456 sanity_proc = NULL;
457 sanity_checked = 0;
458 }
459 }
460 #endif /* DEBUG */
461
462 void
463 trap(type, frame)
464 int type;
465 struct trapframe *frame;
466 {
467 struct proc *p = curproc;
468 struct pcb *pcbp;
469 register vaddr_t va;
470 register struct vm_map *map;
471 struct vmspace *vm;
472 register vm_prot_t vftype;
473 register pa_space_t space;
474 u_int opcode;
475 int ret;
476 const char *tts;
477 int type_raw;
478 #ifdef DIAGNOSTIC
479 extern int emergency_stack_start, emergency_stack_end;
480 #endif
481
482 type_raw = type & ~T_USER;
483 opcode = frame->tf_iir;
484 if (type_raw == T_ITLBMISS || type_raw == T_ITLBMISSNA) {
485 va = frame->tf_iioq_head;
486 space = frame->tf_iisq_head;
487 vftype = VM_PROT_READ; /* XXX VM_PROT_EXECUTE ??? */
488 } else {
489 va = frame->tf_ior;
490 space = frame->tf_isr;
491 vftype = inst_store(opcode) ? VM_PROT_WRITE : VM_PROT_READ;
492 }
493
494 #ifdef DIAGNOSTIC
495 /*
496 * If we are on the emergency stack, then we either got
497 * a fault on the kernel stack, or we're just handling
498 * a trap for the machine check handler (which also
499 * runs on the emergency stack).
500 *
501 * We *very crudely* differentiate between the two cases
502 * by checking the faulting instruction: if it is the
503 * function prologue instruction that stores the old
504 * frame pointer and updates the stack pointer, we assume
505 * that we faulted on the kernel stack.
506 *
507 * In this case, not completing that instruction will
508 * probably confuse backtraces in kgdb/ddb. Completing
509 * it would be difficult, because we already faulted on
510 * that part of the stack, so instead we fix up the
511 * frame as if the function called has just returned.
512 * This has peculiar knowledge about what values are in
513 * what registers during the "normal gcc -g" prologue.
514 */
515 if (&type >= &emergency_stack_start &&
516 &type < &emergency_stack_end &&
517 type != T_IBREAK && STWM_R1_D_SR0_SP(opcode)) {
518 /* Restore the caller's frame pointer. */
519 frame->tf_r3 = frame->tf_r1;
520 /* Restore the caller's instruction offsets. */
521 frame->tf_iioq_head = frame->tf_rp;
522 frame->tf_iioq_tail = frame->tf_iioq_head + 4;
523 goto dead_end;
524 }
525 #endif /* DIAGNOSTIC */
526
527 #ifdef DEBUG
528 frame_sanity_check(frame, p);
529 #endif /* DEBUG */
530
531 /* If this is a trap, not an interrupt, reenable interrupts. */
532 if (type_raw != T_INTERRUPT)
533 mtctl(frame->tf_eiem, CR_EIEM);
534
535 if (frame->tf_flags & TFF_LAST)
536 p->p_md.md_regs = frame;
537
538 if ((type & ~T_USER) > trap_types)
539 tts = "reserved";
540 else
541 tts = trap_type[type & ~T_USER];
542
543 #ifdef TRAPDEBUG
544 if (type_raw != T_INTERRUPT && type_raw != T_IBREAK)
545 printf("trap: %d, %s for %x:%x at %x:%x, fp=%p, rp=%x\n",
546 type, tts, space, (u_int)va, frame->tf_iisq_head,
547 frame->tf_iioq_head, frame, frame->tf_rp);
548 else if (type_raw == T_IBREAK)
549 printf("trap: break instruction %x:%x at %x:%x, fp=%p\n",
550 break5(opcode), break13(opcode),
551 frame->tf_iisq_head, frame->tf_iioq_head, frame);
552
553 {
554 extern int etext;
555 if (frame < (struct trapframe *)&etext) {
556 printf("trap: bogus frame ptr %p\n", frame);
557 goto dead_end;
558 }
559 }
560 #endif
561 switch (type) {
562 case T_NONEXIST:
563 case T_NONEXIST|T_USER:
564 #if !defined(DDB) && !defined(KGDB)
565 /* we've got screwed up by the central scrutinizer */
566 panic ("trap: elvis has just left the building!");
567 break;
568 #else
569 goto dead_end;
570 #endif
571 case T_RECOVERY|T_USER:
572 #ifdef USERTRACE
573 for(;;) {
574 if (frame->tf_iioq_head != rctr_next_iioq)
575 printf("-%08x\nr %08x",
576 rctr_next_iioq - 4,
577 frame->tf_iioq_head);
578 rctr_next_iioq = frame->tf_iioq_head + 4;
579 if (frame->tf_ipsw & PSW_N) {
580 /* Advance the program counter. */
581 frame->tf_iioq_head = frame->tf_iioq_tail;
582 frame->tf_iioq_tail = frame->tf_iioq_head + 4;
583 /* Clear flags. */
584 frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
585 /* Simulate another trap. */
586 continue;
587 }
588 break;
589 }
590 frame->tf_rctr = 0;
591 break;
592 #endif /* USERTRACE */
593 case T_RECOVERY:
594 #if !defined(DDB) && !defined(KGDB)
595 /* XXX will implement later */
596 printf ("trap: handicapped");
597 break;
598 #else
599 goto dead_end;
600 #endif
601
602 case T_EMULATION | T_USER:
603 #ifdef FPEMUL
604 hppa_fpu_emulate(frame, p);
605 #else /* !FPEMUL */
606 /*
607 * We don't have FPU emulation, so signal the
608 * process with a SIGFPE.
609 */
610 trapsignal(p, SIGFPE, frame->tf_iioq_head);
611 #endif /* !FPEMUL */
612 break;
613
614 #ifdef DIAGNOSTIC
615 case T_EXCEPTION:
616 panic("FPU/SFU emulation botch");
617
618 /* these just can't happen ever */
619 case T_PRIV_OP:
620 case T_PRIV_REG:
621 /* these just can't make it to the trap() ever */
622 case T_HPMC: case T_HPMC | T_USER:
623 case T_EMULATION:
624 #endif
625 case T_IBREAK:
626 case T_DATALIGN:
627 case T_DBREAK:
628 dead_end:
629 if (type & T_USER) {
630 #ifdef DEBUG
631 user_backtrace(frame, p, type);
632 #endif
633 trapsignal(p, SIGILL, frame->tf_iioq_head);
634 break;
635 }
636 if (trap_kdebug(type, va, frame))
637 return;
638 else if (type == T_DATALIGN)
639 panic ("trap: %s at 0x%x", tts, (u_int) va);
640 else
641 panic ("trap: no debugger for \"%s\" (%d)", tts, type);
642 break;
643
644 case T_IBREAK | T_USER:
645 case T_DBREAK | T_USER:
646 /* pass to user debugger */
647 break;
648
649 case T_EXCEPTION | T_USER: /* co-proc assist trap */
650 trapsignal(p, SIGFPE, va);
651 break;
652
653 case T_OVERFLOW | T_USER:
654 trapsignal(p, SIGFPE, va);
655 break;
656
657 case T_CONDITION | T_USER:
658 break;
659
660 case T_ILLEGAL | T_USER:
661 #ifdef DEBUG
662 user_backtrace(frame, p, type);
663 #endif
664 trapsignal(p, SIGILL, va);
665 break;
666
667 case T_PRIV_OP | T_USER:
668 #ifdef DEBUG
669 user_backtrace(frame, p, type);
670 #endif
671 trapsignal(p, SIGILL, va);
672 break;
673
674 case T_PRIV_REG | T_USER:
675 #ifdef DEBUG
676 user_backtrace(frame, p, type);
677 #endif
678 trapsignal(p, SIGILL, va);
679 break;
680
681 /* these should never got here */
682 case T_HIGHERPL | T_USER:
683 case T_LOWERPL | T_USER:
684 trapsignal(p, SIGSEGV, va);
685 break;
686
687 case T_IPROT | T_USER:
688 case T_DPROT | T_USER:
689 trapsignal(p, SIGSEGV, va);
690 break;
691
692 case T_DATACC: case T_USER | T_DATACC:
693 case T_ITLBMISS: case T_USER | T_ITLBMISS:
694 case T_DTLBMISS: case T_USER | T_DTLBMISS:
695 case T_ITLBMISSNA: case T_USER | T_ITLBMISSNA:
696 case T_DTLBMISSNA: case T_USER | T_DTLBMISSNA:
697 case T_TLB_DIRTY: case T_USER | T_TLB_DIRTY:
698 va = hppa_trunc_page(va);
699 vm = p->p_vmspace;
700
701 if (!vm) {
702 #ifdef TRAPDEBUG
703 printf("trap: no vm, p=%p\n", p);
704 #endif
705 goto dead_end;
706 }
707
708 /*
709 * it could be a kernel map for exec_map faults
710 */
711 if (!(type & T_USER) && space == HPPA_SID_KERNEL)
712 map = kernel_map;
713 else
714 map = &vm->vm_map;
715
716 if (map->pmap->pmap_space != space) {
717 #ifdef TRAPDEBUG
718 printf("trap: space missmatch %d != %d\n",
719 space, map->pmap->pmap_space);
720 #endif
721 /* actually dump the user, crap the kernel */
722 goto dead_end;
723 }
724
725 /* Never call uvm_fault in interrupt context. */
726 KASSERT(hppa_intr_depth == 0);
727
728 ret = uvm_fault(map, va, 0, vftype);
729
730 #ifdef TRAPDEBUG
731 printf("uvm_fault(%p, %x, %d, %d)=%d\n",
732 map, (u_int)va, 0, vftype, ret);
733 #endif
734
735 /*
736 * If this was a stack access we keep track of the maximum
737 * accessed stack size. Also, if uvm_fault gets a protection
738 * failure it is due to accessing the stack region outside
739 * the current limit and we need to reflect that as an access
740 * error.
741 */
742 if (va >= (vaddr_t)vm->vm_maxsaddr + vm->vm_ssize) {
743 if (ret == 0) {
744 vsize_t nss = btoc(va - USRSTACK + NBPG);
745 if (nss > vm->vm_ssize)
746 vm->vm_ssize = nss;
747 } else if (ret == EACCES)
748 ret = EFAULT;
749 }
750
751 if (ret != 0) {
752 if (type & T_USER) {
753 printf("trapsignal: uvm_fault(%p, %x, %d, %d)=%d\n",
754 map, (u_int)va, 0, vftype, ret);
755 #ifdef DEBUG
756 user_backtrace(frame, p, type);
757 #endif
758 trapsignal(p, SIGSEGV, frame->tf_ior);
759 } else {
760 if (p && p->p_addr->u_pcb.pcb_onfault) {
761 #ifdef PMAPDEBUG
762 printf("trap: copyin/out %d\n",ret);
763 #endif
764 pcbp = &p->p_addr->u_pcb;
765 frame->tf_iioq_tail = 4 +
766 (frame->tf_iioq_head =
767 pcbp->pcb_onfault);
768 pcbp->pcb_onfault = 0;
769 break;
770 }
771 #if 1
772 if (trap_kdebug (type, va, frame))
773 return;
774 #else
775 panic("trap: uvm_fault(%p, %x, %d, %d): %d",
776 map, va, 0, vftype, ret);
777 #endif
778 }
779 }
780 break;
781
782 case T_DATALIGN | T_USER:
783 #ifdef DEBUG
784 user_backtrace(frame, p, type);
785 #endif
786 trapsignal(p, SIGBUS, va);
787 break;
788
789 case T_INTERRUPT:
790 case T_INTERRUPT|T_USER:
791 hppa_intr(frame);
792 mtctl(frame->tf_eiem, CR_EIEM);
793 #if 0
794 if (trap_kdebug (type, va, frame))
795 return;
796 #endif
797 break;
798 case T_LOWERPL:
799 case T_DPROT:
800 case T_IPROT:
801 case T_OVERFLOW:
802 case T_CONDITION:
803 case T_ILLEGAL:
804 case T_HIGHERPL:
805 case T_TAKENBR:
806 case T_POWERFAIL:
807 case T_LPMC:
808 case T_PAGEREF:
809 case T_DATAPID: case T_DATAPID | T_USER:
810 if (0 /* T-chip */) {
811 break;
812 }
813 /* FALLTHROUGH to unimplemented */
814 default:
815 #if 1
816 if (trap_kdebug (type, va, frame))
817 return;
818 #endif
819 panic ("trap: unimplemented \'%s\' (%d)", tts, type);
820 }
821
822 if (type & T_USER)
823 userret(p, p->p_md.md_regs->tf_iioq_head, 0);
824
825 #ifdef DEBUG
826 frame_sanity_check(frame, p);
827 if (frame->tf_flags & TFF_LAST && curproc != NULL)
828 frame_sanity_check(curproc->p_md.md_regs, curproc);
829 #endif /* DEBUG */
830 }
831
832 void
833 child_return(arg)
834 void *arg;
835 {
836 struct proc *p = arg;
837
838 userret(p, p->p_md.md_regs->tf_iioq_head, 0);
839 #ifdef KTRACE
840 if (KTRPOINT(p, KTR_SYSRET))
841 ktrsysret(p, SYS_fork, 0, 0);
842 #endif
843 #ifdef DEBUG
844 frame_sanity_check(p->p_md.md_regs, p);
845 #endif /* DEBUG */
846 }
847
848 /*
849 * call actual syscall routine
850 * from the low-level syscall handler:
851 * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto
852 * our stack, this wins compared to copyin just needed amount anyway
853 * - register args are copied onto stack too
854 */
855 void
856 syscall(frame, args)
857 struct trapframe *frame;
858 int *args;
859 {
860 register struct proc *p;
861 register const struct sysent *callp;
862 int nsys, code, argsize, error;
863 int tmp;
864 int rval[2];
865
866 uvmexp.syscalls++;
867
868 #ifdef DEBUG
869 frame_sanity_check(frame, curproc);
870 #endif /* DEBUG */
871
872 if (!USERMODE(frame->tf_iioq_head))
873 panic("syscall");
874
875 p = curproc;
876 p->p_md.md_regs = frame;
877 nsys = p->p_emul->e_nsysent;
878 callp = p->p_emul->e_sysent;
879 code = frame->tf_t1;
880
881 /*
882 * Restarting a system call is touchy on the HPPA,
883 * because syscall arguments are passed in registers
884 * and the program counter of the syscall "point"
885 * isn't easily divined.
886 *
887 * We handle the first problem by assuming that we
888 * will have to restart this system call, so we
889 * stuff the first four words of the original arguments
890 * back into the frame as arg0...arg3, which is where
891 * we found them in the first place. Any further
892 * arguments are (still) on the user's stack and the
893 * syscall code will fetch them from there (again).
894 *
895 * The program counter problem is addressed below.
896 */
897 frame->tf_arg0 = args[0];
898 frame->tf_arg1 = args[1];
899 frame->tf_arg2 = args[2];
900 frame->tf_arg3 = args[3];
901
902 /*
903 * Some special handling for the syscall(2) and
904 * __syscall(2) system calls.
905 */
906 switch (code) {
907 case SYS_syscall:
908 code = *args;
909 args += 1;
910 break;
911 case SYS___syscall:
912 if (callp != sysent)
913 break;
914 /*
915 * NB: even though __syscall(2) takes a quad_t
916 * containing the system call number, because
917 * our argument copying word-swaps 64-bit arguments,
918 * the least significant word of that quad_t
919 * is the first word in the argument array.
920 */
921 code = *args;
922 args += 2;
923 }
924
925 /*
926 * Stacks growing from lower addresses to higher
927 * addresses are not really such a good idea, because
928 * it makes it impossible to overlay a struct on top
929 * of C stack arguments (the arguments appear in
930 * reversed order).
931 *
932 * You can do the obvious thing (as locore.S does) and
933 * copy argument words one by one, laying them out in
934 * the "right" order in the destination buffer, but this
935 * ends up word-swapping multi-word arguments (like off_t).
936 *
937 * To compensate, we have some automatically-generated
938 * code that word-swaps these multi-word arguments.
939 * Right now the script that generates this code is
940 * in Perl, because I don't know awk.
941 *
942 * FIXME - this works only on native binaries and
943 * will probably screw up any and all emulation.
944 */
945 switch (code) {
946 /*
947 * BEGIN automatically generated
948 * by /home/fredette/project/hppa/makescargfix.pl
949 * do not edit!
950 */
951 case SYS_pread:
952 /*
953 * syscallarg(int) fd;
954 * syscallarg(void *) buf;
955 * syscallarg(size_t) nbyte;
956 * syscallarg(int) pad;
957 * syscallarg(off_t) offset;
958 */
959 tmp = args[4];
960 args[4] = args[4 + 1];
961 args[4 + 1] = tmp;
962 break;
963 case SYS_pwrite:
964 /*
965 * syscallarg(int) fd;
966 * syscallarg(const void *) buf;
967 * syscallarg(size_t) nbyte;
968 * syscallarg(int) pad;
969 * syscallarg(off_t) offset;
970 */
971 tmp = args[4];
972 args[4] = args[4 + 1];
973 args[4 + 1] = tmp;
974 break;
975 case SYS_mmap:
976 /*
977 * syscallarg(void *) addr;
978 * syscallarg(size_t) len;
979 * syscallarg(int) prot;
980 * syscallarg(int) flags;
981 * syscallarg(int) fd;
982 * syscallarg(long) pad;
983 * syscallarg(off_t) pos;
984 */
985 tmp = args[6];
986 args[6] = args[6 + 1];
987 args[6 + 1] = tmp;
988 break;
989 case SYS_lseek:
990 /*
991 * syscallarg(int) fd;
992 * syscallarg(int) pad;
993 * syscallarg(off_t) offset;
994 */
995 tmp = args[2];
996 args[2] = args[2 + 1];
997 args[2 + 1] = tmp;
998 break;
999 case SYS_truncate:
1000 /*
1001 * syscallarg(const char *) path;
1002 * syscallarg(int) pad;
1003 * syscallarg(off_t) length;
1004 */
1005 tmp = args[2];
1006 args[2] = args[2 + 1];
1007 args[2 + 1] = tmp;
1008 break;
1009 case SYS_ftruncate:
1010 /*
1011 * syscallarg(int) fd;
1012 * syscallarg(int) pad;
1013 * syscallarg(off_t) length;
1014 */
1015 tmp = args[2];
1016 args[2] = args[2 + 1];
1017 args[2 + 1] = tmp;
1018 break;
1019 case SYS_preadv:
1020 /*
1021 * syscallarg(int) fd;
1022 * syscallarg(const struct iovec *) iovp;
1023 * syscallarg(int) iovcnt;
1024 * syscallarg(int) pad;
1025 * syscallarg(off_t) offset;
1026 */
1027 tmp = args[4];
1028 args[4] = args[4 + 1];
1029 args[4 + 1] = tmp;
1030 break;
1031 case SYS_pwritev:
1032 /*
1033 * syscallarg(int) fd;
1034 * syscallarg(const struct iovec *) iovp;
1035 * syscallarg(int) iovcnt;
1036 * syscallarg(int) pad;
1037 * syscallarg(off_t) offset;
1038 */
1039 tmp = args[4];
1040 args[4] = args[4 + 1];
1041 args[4 + 1] = tmp;
1042 break;
1043 default:
1044 break;
1045 /*
1046 * END automatically generated
1047 * by /home/fredette/project/hppa/makescargfix.pl
1048 * do not edit!
1049 */
1050 }
1051
1052 #ifdef USERTRACE
1053 if (0) {
1054 user_backtrace(frame, p, -1);
1055 frame->tf_ipsw |= PSW_R;
1056 frame->tf_rctr = 0;
1057 printf("r %08x", frame->tf_iioq_head);
1058 rctr_next_iioq = frame->tf_iioq_head + 4;
1059 }
1060 #endif
1061
1062 if (code < 0 || code >= nsys)
1063 callp += p->p_emul->e_nosys; /* bad syscall # */
1064 else
1065 callp += code;
1066 argsize = callp->sy_argsize;
1067
1068 if ((error = trace_enter(p, code, code, NULL, args, rval)) != 0)
1069 goto bad;
1070
1071 rval[0] = 0;
1072 rval[1] = 0;
1073 switch (error = (*callp->sy_call)(p, args, rval)) {
1074 case 0:
1075 p = curproc; /* changes on exec() */
1076 frame = p->p_md.md_regs;
1077 frame->tf_ret0 = rval[0];
1078 frame->tf_ret1 = rval[1];
1079 frame->tf_t1 = 0;
1080 break;
1081 case ERESTART:
1082 /*
1083 * Now we have to wind back the instruction
1084 * offset queue to the point where the system
1085 * call will be made again. This is inherently
1086 * tied to the SYSCALL macro.
1087 *
1088 * Currently, the part of the SYSCALL macro
1089 * that we want to rerun reads as:
1090 *
1091 * ldil L%SYSCALLGATE, r1
1092 * ble 4(sr7, r1)
1093 * ldi __CONCAT(SYS_,x), t1
1094 * ldw HPPA_FRAME_ERP(sr0,sp), rp
1095 *
1096 * And our offset queue head points to the
1097 * final ldw instruction. So we need to
1098 * subtract twelve to reach the ldil.
1099 */
1100 frame->tf_iioq_head -= 12;
1101 frame->tf_iioq_tail = frame->tf_iioq_head + 4;
1102 break;
1103 case EJUSTRETURN:
1104 p = curproc;
1105 break;
1106 default:
1107 bad:
1108 if (p->p_emul->e_errno)
1109 error = p->p_emul->e_errno[error];
1110 frame->tf_t1 = error;
1111 break;
1112 }
1113
1114 trace_exit(p, code, args, rval, error);
1115
1116 userret(p, frame->tf_iioq_head, 0);
1117 #ifdef DEBUG
1118 frame_sanity_check(frame, p);
1119 #endif /* DEBUG */
1120 }
1121