trap.c revision 1.78
11.78Srmind/* $NetBSD: trap.c,v 1.78 2009/11/23 00:11:45 rmind Exp $ */ 21.7Sdbj 31.7Sdbj/* 41.10Sabs * This file was taken from mvme68k/mvme68k/trap.c 51.7Sdbj * should probably be re-synced when needed. 61.16Sdbj * Darrin B. Jewell <jewell@mit.edu> Tue Aug 3 10:53:12 UTC 1999 71.16Sdbj * original cvs id: NetBSD: trap.c,v 1.32 1999/08/03 10:52:06 dbj Exp 81.7Sdbj */ 91.1Sdbj 101.1Sdbj/* 111.1Sdbj * Copyright (c) 1982, 1986, 1990, 1993 121.1Sdbj * The Regents of the University of California. All rights reserved. 131.1Sdbj * 141.1Sdbj * This code is derived from software contributed to Berkeley by 151.1Sdbj * the Systems Programming Group of the University of Utah Computer 161.1Sdbj * Science Department. 171.1Sdbj * 181.1Sdbj * Redistribution and use in source and binary forms, with or without 191.1Sdbj * modification, are permitted provided that the following conditions 201.1Sdbj * are met: 211.1Sdbj * 1. Redistributions of source code must retain the above copyright 221.1Sdbj * notice, this list of conditions and the following disclaimer. 231.1Sdbj * 2. Redistributions in binary form must reproduce the above copyright 241.1Sdbj * notice, this list of conditions and the following disclaimer in the 251.1Sdbj * documentation and/or other materials provided with the distribution. 261.43Sagc * 3. Neither the name of the University nor the names of its contributors 271.43Sagc * may be used to endorse or promote products derived from this software 281.43Sagc * without specific prior written permission. 291.43Sagc * 301.43Sagc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 311.43Sagc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 321.43Sagc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 331.43Sagc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 341.43Sagc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 351.43Sagc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 361.43Sagc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 371.43Sagc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 381.43Sagc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 391.43Sagc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 401.43Sagc * SUCH DAMAGE. 411.43Sagc * 421.43Sagc * from: Utah $Hdr: trap.c 1.37 92/12/20$ 431.43Sagc * 441.43Sagc * @(#)trap.c 8.5 (Berkeley) 1/4/94 451.43Sagc */ 461.43Sagc/* 471.43Sagc * Copyright (c) 1988 University of Utah. 481.43Sagc * 491.43Sagc * This code is derived from software contributed to Berkeley by 501.43Sagc * the Systems Programming Group of the University of Utah Computer 511.43Sagc * Science Department. 521.43Sagc * 531.43Sagc * Redistribution and use in source and binary forms, with or without 541.43Sagc * modification, are permitted provided that the following conditions 551.43Sagc * are met: 561.43Sagc * 1. Redistributions of source code must retain the above copyright 571.43Sagc * notice, this list of conditions and the following disclaimer. 581.43Sagc * 2. Redistributions in binary form must reproduce the above copyright 591.43Sagc * notice, this list of conditions and the following disclaimer in the 601.43Sagc * documentation and/or other materials provided with the distribution. 611.1Sdbj * 3. All advertising materials mentioning features or use of this software 621.1Sdbj * must display the following acknowledgement: 631.1Sdbj * This product includes software developed by the University of 641.1Sdbj * California, Berkeley and its contributors. 651.1Sdbj * 4. Neither the name of the University nor the names of its contributors 661.1Sdbj * may be used to endorse or promote products derived from this software 671.1Sdbj * without specific prior written permission. 681.1Sdbj * 691.1Sdbj * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 701.1Sdbj * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 711.1Sdbj * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 721.1Sdbj * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 731.1Sdbj * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 741.1Sdbj * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 751.1Sdbj * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 761.1Sdbj * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 771.1Sdbj * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 781.1Sdbj * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 791.1Sdbj * SUCH DAMAGE. 801.1Sdbj * 811.1Sdbj * from: Utah $Hdr: trap.c 1.37 92/12/20$ 821.1Sdbj * 831.1Sdbj * @(#)trap.c 8.5 (Berkeley) 1/4/94 841.1Sdbj */ 851.42Slukem 861.42Slukem#include <sys/cdefs.h> 871.78Srmind__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.78 2009/11/23 00:11:45 rmind Exp $"); 881.2Sthorpej 891.5Sjonathan#include "opt_ddb.h" 901.9Sitohy#include "opt_execfmt.h" 911.33Slukem#include "opt_kgdb.h" 921.3Sthorpej#include "opt_compat_sunos.h" 931.1Sdbj 941.1Sdbj#include <sys/param.h> 951.1Sdbj#include <sys/systm.h> 961.1Sdbj#include <sys/proc.h> 971.1Sdbj#include <sys/acct.h> 981.1Sdbj#include <sys/kernel.h> 991.1Sdbj#include <sys/signalvar.h> 1001.1Sdbj#include <sys/resourcevar.h> 1011.74Swrstuden#include <sys/sa.h> 1021.74Swrstuden#include <sys/savar.h> 1031.1Sdbj#include <sys/syscall.h> 1041.1Sdbj#include <sys/syslog.h> 1051.47Scl#include <sys/userret.h> 1061.59Syamt#include <sys/kauth.h> 1071.16Sdbj 1081.16Sdbj#ifdef DEBUG 1091.16Sdbj#include <dev/cons.h> 1101.14Sdbj#endif 1111.1Sdbj 1121.16Sdbj#include <machine/db_machdep.h> 1131.1Sdbj#include <machine/psl.h> 1141.1Sdbj#include <machine/trap.h> 1151.1Sdbj#include <machine/cpu.h> 1161.1Sdbj#include <machine/reg.h> 1171.1Sdbj 1181.16Sdbj#include <m68k/cacheops.h> 1191.16Sdbj 1201.7Sdbj#include <uvm/uvm_extern.h> 1211.1Sdbj 1221.1Sdbj#ifdef COMPAT_SUNOS 1231.1Sdbj#include <compat/sunos/sunos_syscall.h> 1241.1Sdbjextern struct emul emul_sunos; 1251.1Sdbj#endif 1261.1Sdbj 1271.37Sjdolecek#ifdef KGDB 1281.37Sjdolecek#include <sys/kgdb.h> 1291.37Sjdolecek#endif 1301.37Sjdolecek 1311.53Schsint writeback(struct frame *, int); 1321.67Smhitchvoid trap(struct frame *, int, u_int, u_int); 1331.16Sdbj 1341.16Sdbj#ifdef DEBUG 1351.53Schsvoid dumpssw(u_short); 1361.53Schsvoid dumpwb(int, u_short, u_int, u_int); 1371.16Sdbj#endif 1381.16Sdbj 1391.53Schsstatic inline void userret(struct lwp *, struct frame *, u_quad_t, u_int, int); 1401.1Sdbj 1411.7Sdbjint astpending; 1421.1Sdbj 1431.54Sheconst char *trap_type[] = { 1441.1Sdbj "Bus error", 1451.1Sdbj "Address error", 1461.1Sdbj "Illegal instruction", 1471.1Sdbj "Zero divide", 1481.1Sdbj "CHK instruction", 1491.1Sdbj "TRAPV instruction", 1501.1Sdbj "Privilege violation", 1511.1Sdbj "Trace trap", 1521.1Sdbj "MMU fault", 1531.1Sdbj "SSIR trap", 1541.1Sdbj "Format error", 1551.1Sdbj "68881 exception", 1561.1Sdbj "Coprocessor violation", 1571.1Sdbj "Async system trap" 1581.1Sdbj}; 1591.1Sdbjint trap_types = sizeof trap_type / sizeof trap_type[0]; 1601.1Sdbj 1611.1Sdbj/* 1621.1Sdbj * Size of various exception stack frames (minus the standard 8 bytes) 1631.1Sdbj */ 1641.1Sdbjshort exframesize[] = { 1651.16Sdbj FMT0SIZE, /* type 0 - normal (68020/030/040/060) */ 1661.1Sdbj FMT1SIZE, /* type 1 - throwaway (68020/030/040) */ 1671.16Sdbj FMT2SIZE, /* type 2 - normal 6-word (68020/030/040/060) */ 1681.16Sdbj FMT3SIZE, /* type 3 - FP post-instruction (68040/060) */ 1691.16Sdbj FMT4SIZE, /* type 4 - access error/fp disabled (68060) */ 1701.16Sdbj -1, -1, /* type 5-6 - undefined */ 1711.1Sdbj FMT7SIZE, /* type 7 - access error (68040) */ 1721.1Sdbj 58, /* type 8 - bus fault (68010) */ 1731.1Sdbj FMT9SIZE, /* type 9 - coprocessor mid-instruction (68020/030) */ 1741.1Sdbj FMTASIZE, /* type A - short bus fault (68020/030) */ 1751.1Sdbj FMTBSIZE, /* type B - long bus fault (68020/030) */ 1761.1Sdbj -1, -1, -1, -1 /* type C-F - undefined */ 1771.1Sdbj}; 1781.1Sdbj 1791.16Sdbj#ifdef M68060 1801.16Sdbj#define KDFAULT_060(c) (cputype == CPU_68060 && ((c) & FSLW_TM_SV)) 1811.16Sdbj#define WRFAULT_060(c) (cputype == CPU_68060 && ((c) & FSLW_RW_W)) 1821.16Sdbj#else 1831.16Sdbj#define KDFAULT_060(c) 0 1841.16Sdbj#define WRFAULT_060(c) 0 1851.16Sdbj#endif 1861.16Sdbj 1871.1Sdbj#ifdef M68040 1881.16Sdbj#define KDFAULT_040(c) (cputype == CPU_68040 && \ 1891.16Sdbj ((c) & SSW4_TMMASK) == SSW4_TMKD) 1901.16Sdbj#define WRFAULT_040(c) (cputype == CPU_68040 && \ 1911.68Smhitch ((c) & (SSW4_LK|SSW4_RW)) != SSW4_RW) 1921.16Sdbj#else 1931.16Sdbj#define KDFAULT_040(c) 0 1941.16Sdbj#define WRFAULT_040(c) 0 1951.16Sdbj#endif 1961.16Sdbj 1971.16Sdbj#if defined(M68030) || defined(M68020) 1981.16Sdbj#define KDFAULT_OTH(c) (cputype <= CPU_68030 && \ 1991.16Sdbj ((c) & (SSW_DF|SSW_FCMASK)) == (SSW_DF|FC_SUPERD)) 2001.16Sdbj#define WRFAULT_OTH(c) (cputype <= CPU_68030 && \ 2011.68Smhitch (((c) & SSW_DF) != 0 && \ 2021.68Smhitch ((((c) & SSW_RW) == 0) || (((c) & SSW_RM) != 0)))) 2031.1Sdbj#else 2041.16Sdbj#define KDFAULT_OTH(c) 0 2051.16Sdbj#define WRFAULT_OTH(c) 0 2061.1Sdbj#endif 2071.1Sdbj 2081.16Sdbj#define KDFAULT(c) (KDFAULT_060(c) || KDFAULT_040(c) || KDFAULT_OTH(c)) 2091.16Sdbj#define WRFAULT(c) (WRFAULT_060(c) || WRFAULT_040(c) || WRFAULT_OTH(c)) 2101.16Sdbj 2111.1Sdbj#ifdef DEBUG 2121.1Sdbjint mmudebug = 0; 2131.1Sdbjint mmupid = -1; 2141.1Sdbj#define MDB_FOLLOW 1 2151.1Sdbj#define MDB_WBFOLLOW 2 2161.1Sdbj#define MDB_WBFAILED 4 2171.16Sdbj#define MDB_ISPID(p) ((p) == mmupid) 2181.1Sdbj#endif 2191.1Sdbj 2201.1Sdbj/* 2211.1Sdbj * trap and syscall both need the following work done before returning 2221.1Sdbj * to user mode. 2231.1Sdbj */ 2241.1Sdbjstatic inline void 2251.53Schsuserret(struct lwp *l, struct frame *fp, u_quad_t oticks, u_int faultaddr, 2261.53Schs int fromtrap) 2271.1Sdbj{ 2281.39Sthorpej struct proc *p = l->l_proc; 2291.48Scl#ifdef M68040 2301.20Sthorpej int sig; 2311.1Sdbj int beenhere = 0; 2321.1Sdbj 2331.1Sdbjagain: 2341.1Sdbj#endif 2351.47Scl /* Invoke MI userret code */ 2361.47Scl mi_userret(l); 2371.1Sdbj 2381.1Sdbj /* 2391.1Sdbj * If profiling, charge system time to the trapped pc. 2401.1Sdbj */ 2411.62Sad if (p->p_stflag & PST_PROFIL) { 2421.1Sdbj extern int psratio; 2431.1Sdbj 2441.62Sad addupc_task(l, fp->f_pc, 2451.1Sdbj (int)(p->p_sticks - oticks) * psratio); 2461.1Sdbj } 2471.1Sdbj#ifdef M68040 2481.1Sdbj /* 2491.1Sdbj * Deal with user mode writebacks (from trap, or from sigreturn). 2501.1Sdbj * If any writeback fails, go back and attempt signal delivery. 2511.1Sdbj * unless we have already been here and attempted the writeback 2521.1Sdbj * (e.g. bad address with user ignoring SIGSEGV). In that case 2531.40Swiz * we just return to the user without successfully completing 2541.1Sdbj * the writebacks. Maybe we should just drop the sucker? 2551.1Sdbj */ 2561.16Sdbj if (cputype == CPU_68040 && fp->f_format == FMT7) { 2571.1Sdbj if (beenhere) { 2581.1Sdbj#ifdef DEBUG 2591.1Sdbj if (mmudebug & MDB_WBFAILED) 2601.1Sdbj printf(fromtrap ? 2611.1Sdbj "pid %d(%s): writeback aborted, pc=%x, fa=%x\n" : 2621.1Sdbj "pid %d(%s): writeback aborted in sigreturn, pc=%x\n", 2631.1Sdbj p->p_pid, p->p_comm, fp->f_pc, faultaddr); 2641.1Sdbj#endif 2651.16Sdbj } else if ((sig = writeback(fp, fromtrap))) { 2661.45Scl ksiginfo_t ksi; 2671.1Sdbj beenhere = 1; 2681.1Sdbj oticks = p->p_sticks; 2691.45Scl (void)memset(&ksi, 0, sizeof(ksi)); 2701.45Scl ksi.ksi_signo = sig; 2711.45Scl ksi.ksi_addr = (void *)faultaddr; 2721.45Scl ksi.ksi_code = BUS_OBJERR; 2731.45Scl trapsignal(l, &ksi); 2741.1Sdbj goto again; 2751.1Sdbj } 2761.1Sdbj } 2771.1Sdbj#endif 2781.1Sdbj} 2791.1Sdbj 2801.1Sdbj/* 2811.28Sscw * Used by the common m68k syscall() and child_return() functions. 2821.28Sscw * XXX: Temporary until all m68k ports share common trap()/userret() code. 2831.28Sscw */ 2841.39Sthorpejvoid machine_userret(struct lwp *, struct frame *, u_quad_t); 2851.28Sscw 2861.28Sscwvoid 2871.53Schsmachine_userret(struct lwp *l, struct frame *f, u_quad_t t) 2881.28Sscw{ 2891.28Sscw 2901.39Sthorpej userret(l, f, t, 0, 0); 2911.28Sscw} 2921.28Sscw 2931.28Sscw/* 2941.1Sdbj * Trap is called from locore to handle most types of processor traps, 2951.1Sdbj * including events such as simulated software interrupts/AST's. 2961.1Sdbj * System calls are broken out for efficiency. 2971.1Sdbj */ 2981.1Sdbj/*ARGSUSED*/ 2991.16Sdbjvoid 3001.67Smhitchtrap(struct frame *fp, int type, unsigned code, unsigned v) 3011.1Sdbj{ 3021.1Sdbj extern char fubail[], subail[]; 3031.39Sthorpej struct lwp *l; 3041.1Sdbj struct proc *p; 3051.78Srmind struct pcb *pcb; 3061.45Scl ksiginfo_t ksi; 3071.45Scl int s; 3081.16Sdbj u_quad_t sticks = 0 /* XXX initialiser works around compiler bug */; 3091.51Swiz static int panicking = 0; 3101.1Sdbj 3111.7Sdbj uvmexp.traps++; 3121.39Sthorpej l = curlwp; 3131.45Scl 3141.46Sthorpej KSI_INIT_TRAP(&ksi); 3151.45Scl ksi.ksi_trap = type & ~T_USER; 3161.16Sdbj 3171.39Sthorpej p = l->l_proc; 3181.78Srmind pcb = lwp_getpcb(l); 3191.78Srmind KASSERT(pcb != NULL); 3201.16Sdbj 3211.67Smhitch if (USERMODE(fp->f_sr)) { 3221.1Sdbj type |= T_USER; 3231.1Sdbj sticks = p->p_sticks; 3241.67Smhitch l->l_md.md_regs = fp->f_regs; 3251.60Sad LWP_CACHE_CREDS(l, p); 3261.1Sdbj } 3271.1Sdbj switch (type) { 3281.1Sdbj 3291.1Sdbj default: 3301.14Sdbj dopanic: 3311.14Sdbj /* 3321.14Sdbj * Let the kernel debugger see the trap frame that 3331.14Sdbj * caused us to panic. This is a convenience so 3341.14Sdbj * one can see registers at the point of failure. 3351.14Sdbj */ 3361.16Sdbj s = splhigh(); 3371.51Swiz panicking = 1; 3381.38Smycroft printf("trap type %d, code = 0x%x, v = 0x%x\n", type, code, v); 3391.38Smycroft printf("%s program counter = 0x%x\n", 3401.67Smhitch (type & T_USER) ? "user" : "kernel", fp->f_pc); 3411.14Sdbj#ifdef KGDB 3421.14Sdbj /* If connected, step or cont returns 1 */ 3431.67Smhitch if (kgdb_trap(type, (db_regs_t *)fp)) 3441.14Sdbj goto kgdb_cont; 3451.14Sdbj#endif 3461.16Sdbj#ifdef DDB 3471.67Smhitch (void)kdb_trap(type, (db_regs_t *)fp); 3481.1Sdbj#endif 3491.14Sdbj#ifdef KGDB 3501.14Sdbj kgdb_cont: 3511.14Sdbj#endif 3521.16Sdbj splx(s); 3531.14Sdbj if (panicstr) { 3541.16Sdbj printf("trap during panic!\n"); 3551.16Sdbj#ifdef DEBUG 3561.16Sdbj /* XXX should be a machine-dependent hook */ 3571.16Sdbj printf("(press a key)\n"); (void)cngetc(); 3581.16Sdbj#endif 3591.14Sdbj } 3601.67Smhitch regdump((struct trapframe *)fp, 128); 3611.1Sdbj type &= ~T_USER; 3621.16Sdbj if ((u_int)type < trap_types) 3631.1Sdbj panic(trap_type[type]); 3641.1Sdbj panic("trap"); 3651.1Sdbj 3661.1Sdbj case T_BUSERR: /* kernel bus error */ 3671.78Srmind if (pcb->pcb_onfault == 0) 3681.1Sdbj goto dopanic; 3691.16Sdbj /* FALLTHROUGH */ 3701.16Sdbj 3711.16Sdbj copyfault: 3721.1Sdbj /* 3731.1Sdbj * If we have arranged to catch this fault in any of the 3741.1Sdbj * copy to/from user space routines, set PC to return to 3751.1Sdbj * indicated location and set flag informing buserror code 3761.1Sdbj * that it may need to clean up stack frame. 3771.1Sdbj */ 3781.67Smhitch fp->f_stackadj = exframesize[fp->f_format]; 3791.67Smhitch fp->f_format = fp->f_vector = 0; 3801.78Srmind fp->f_pc = (int)pcb->pcb_onfault; 3811.1Sdbj return; 3821.1Sdbj 3831.1Sdbj case T_BUSERR|T_USER: /* bus error */ 3841.1Sdbj case T_ADDRERR|T_USER: /* address error */ 3851.45Scl ksi.ksi_addr = (void *)v; 3861.45Scl ksi.ksi_signo = SIGBUS; 3871.45Scl ksi.ksi_code = (type == (T_BUSERR|T_USER)) ? 3881.45Scl BUS_OBJERR : BUS_ADRERR; 3891.1Sdbj break; 3901.1Sdbj 3911.1Sdbj case T_COPERR: /* kernel coprocessor violation */ 3921.1Sdbj case T_FMTERR|T_USER: /* do all RTE errors come in as T_USER? */ 3931.1Sdbj case T_FMTERR: /* ...just in case... */ 3941.1Sdbj /* 3951.1Sdbj * The user has most likely trashed the RTE or FP state info 3961.1Sdbj * in the stack frame of a signal handler. 3971.1Sdbj */ 3981.1Sdbj printf("pid %d: kernel %s exception\n", p->p_pid, 3991.1Sdbj type==T_COPERR ? "coprocessor" : "format"); 4001.1Sdbj type |= T_USER; 4011.62Sad 4021.73Sad mutex_enter(p->p_lock); 4031.29Sjdolecek SIGACTION(p, SIGILL).sa_handler = SIG_DFL; 4041.29Sjdolecek sigdelset(&p->p_sigctx.ps_sigignore, SIGILL); 4051.29Sjdolecek sigdelset(&p->p_sigctx.ps_sigcatch, SIGILL); 4061.62Sad sigdelset(&l->l_sigmask, SIGILL); 4071.73Sad mutex_exit(p->p_lock); 4081.62Sad 4091.45Scl ksi.ksi_signo = SIGILL; 4101.67Smhitch ksi.ksi_addr = (void *)(int)fp->f_format; 4111.45Scl /* XXX was ILL_RESAD_FAULT */ 4121.45Scl ksi.ksi_code = (type == T_COPERR) ? 4131.45Scl ILL_COPROC : ILL_ILLOPC; 4141.1Sdbj break; 4151.1Sdbj 4161.1Sdbj case T_COPERR|T_USER: /* user coprocessor violation */ 4171.1Sdbj /* What is a proper response here? */ 4181.45Scl ksi.ksi_signo = SIGFPE; 4191.45Scl ksi.ksi_code = FPE_FLTINV; 4201.1Sdbj break; 4211.1Sdbj 4221.1Sdbj case T_FPERR|T_USER: /* 68881 exceptions */ 4231.1Sdbj /* 4241.7Sdbj * We pass along the 68881 status register which locore stashed 4251.75Smartin * in code for us. 4261.1Sdbj */ 4271.45Scl ksi.ksi_signo = SIGFPE; 4281.75Smartin ksi.ksi_code = fpsr2siginfocode(code); 4291.1Sdbj break; 4301.1Sdbj 4311.1Sdbj#ifdef M68040 4321.56Swiz case T_FPEMULI|T_USER: /* unimplemented FP instruction */ 4331.1Sdbj case T_FPEMULD|T_USER: /* unimplemented FP data type */ 4341.1Sdbj /* XXX need to FSAVE */ 4351.1Sdbj printf("pid %d(%s): unimplemented FP %s at %x (EA %x)\n", 4361.1Sdbj p->p_pid, p->p_comm, 4371.67Smhitch fp->f_format == 2 ? "instruction" : "data type", 4381.67Smhitch fp->f_pc, fp->f_fmt2.f_iaddr); 4391.1Sdbj /* XXX need to FRESTORE */ 4401.45Scl ksi.ksi_signo = SIGFPE; 4411.45Scl ksi.ksi_code = FPE_FLTINV; 4421.1Sdbj break; 4431.1Sdbj#endif 4441.1Sdbj 4451.1Sdbj case T_ILLINST|T_USER: /* illegal instruction fault */ 4461.1Sdbj case T_PRIVINST|T_USER: /* privileged instruction fault */ 4471.67Smhitch ksi.ksi_addr = (void *)(int)fp->f_format; 4481.45Scl /* XXX was ILL_PRIVIN_FAULT */ 4491.45Scl ksi.ksi_signo = SIGILL; 4501.45Scl ksi.ksi_code = (type == (T_PRIVINST|T_USER)) ? 4511.45Scl ILL_PRVOPC : ILL_ILLOPC; 4521.1Sdbj break; 4531.1Sdbj 4541.1Sdbj case T_ZERODIV|T_USER: /* Divide by zero */ 4551.67Smhitch ksi.ksi_addr = (void *)(int)fp->f_format; 4561.45Scl /* XXX was FPE_INTDIV_TRAP */ 4571.45Scl ksi.ksi_signo = SIGFPE; 4581.45Scl ksi.ksi_code = FPE_FLTDIV; 4591.1Sdbj break; 4601.1Sdbj 4611.1Sdbj case T_CHKINST|T_USER: /* CHK instruction trap */ 4621.67Smhitch ksi.ksi_addr = (void *)(int)fp->f_format; 4631.45Scl /* XXX was FPE_SUBRNG_TRAP */ 4641.45Scl ksi.ksi_signo = SIGFPE; 4651.1Sdbj break; 4661.1Sdbj 4671.1Sdbj case T_TRAPVINST|T_USER: /* TRAPV instruction trap */ 4681.67Smhitch ksi.ksi_addr = (void *)(int)fp->f_format; 4691.45Scl /* XXX was FPE_INTOVF_TRAP */ 4701.45Scl ksi.ksi_signo = SIGFPE; 4711.1Sdbj break; 4721.1Sdbj 4731.1Sdbj /* 4741.1Sdbj * XXX: Trace traps are a nightmare. 4751.1Sdbj * 4761.1Sdbj * HP-UX uses trap #1 for breakpoints, 4771.16Sdbj * NetBSD/m68k uses trap #2, 4781.1Sdbj * SUN 3.x uses trap #15, 4791.16Sdbj * DDB and KGDB uses trap #15 (for kernel breakpoints; 4801.16Sdbj * handled elsewhere). 4811.1Sdbj * 4821.16Sdbj * NetBSD and HP-UX traps both get mapped by locore.s into T_TRACE. 4831.1Sdbj * SUN 3.x traps get passed through as T_TRAP15 and are not really 4841.1Sdbj * supported yet. 4851.16Sdbj * 4861.17Sitohy * XXX: We should never get kernel-mode T_TRAP15 4871.16Sdbj * XXX: because locore.s now gives them special treatment. 4881.1Sdbj */ 4891.16Sdbj case T_TRAP15: /* kernel breakpoint */ 4901.16Sdbj#ifdef DEBUG 4911.16Sdbj printf("unexpected kernel trace trap, type = %d\n", type); 4921.67Smhitch printf("program counter = 0x%x\n", fp->f_pc); 4931.1Sdbj#endif 4941.67Smhitch fp->f_sr &= ~PSL_T; 4951.16Sdbj return; 4961.1Sdbj 4971.1Sdbj case T_TRACE|T_USER: /* user trace trap */ 4981.1Sdbj#ifdef COMPAT_SUNOS 4991.1Sdbj /* 5001.1Sdbj * SunOS uses Trap #2 for a "CPU cache flush". 5011.1Sdbj * Just flush the on-chip caches and return. 5021.1Sdbj */ 5031.1Sdbj if (p->p_emul == &emul_sunos) { 5041.1Sdbj ICIA(); 5051.1Sdbj DCIU(); 5061.1Sdbj return; 5071.1Sdbj } 5081.16Sdbj#endif 5091.17Sitohy /* FALLTHROUGH */ 5101.17Sitohy case T_TRACE: /* tracing a trap instruction */ 5111.17Sitohy case T_TRAP15|T_USER: /* SUN user trace trap */ 5121.67Smhitch fp->f_sr &= ~PSL_T; 5131.45Scl ksi.ksi_signo = SIGTRAP; 5141.1Sdbj break; 5151.1Sdbj 5161.1Sdbj case T_ASTFLT: /* system async trap, cannot happen */ 5171.1Sdbj goto dopanic; 5181.1Sdbj 5191.1Sdbj case T_ASTFLT|T_USER: /* user async trap */ 5201.1Sdbj astpending = 0; 5211.1Sdbj /* 5221.1Sdbj * We check for software interrupts first. This is because 5231.1Sdbj * they are at a higher level than ASTs, and on a VAX would 5241.1Sdbj * interrupt the AST. We assume that if we are processing 5251.1Sdbj * an AST that we must be at IPL0 so we don't bother to 5261.1Sdbj * check. Note that we ensure that we are at least at SIR 5271.1Sdbj * IPL while processing the SIR. 5281.1Sdbj */ 5291.1Sdbj spl1(); 5301.1Sdbj /* fall into... */ 5311.1Sdbj 5321.1Sdbj case T_SSIR: /* software interrupt */ 5331.1Sdbj case T_SSIR|T_USER: 5341.1Sdbj /* 5351.1Sdbj * If this was not an AST trap, we are all done. 5361.1Sdbj */ 5371.1Sdbj if (type != (T_ASTFLT|T_USER)) { 5381.16Sdbj uvmexp.traps--; 5391.1Sdbj return; 5401.1Sdbj } 5411.1Sdbj spl0(); 5421.62Sad if (l->l_pflag & LP_OWEUPC) { 5431.62Sad l->l_pflag &= ~LP_OWEUPC; 5441.62Sad ADDUPROF(l); 5451.1Sdbj } 5461.66Stsutsui if (curcpu()->ci_want_resched) 5471.62Sad preempt(); 5481.1Sdbj goto out; 5491.1Sdbj 5501.1Sdbj case T_MMUFLT: /* kernel mode page fault */ 5511.1Sdbj /* 5521.1Sdbj * If we were doing profiling ticks or other user mode 5531.1Sdbj * stuff from interrupt code, Just Say No. 5541.1Sdbj */ 5551.78Srmind if (pcb->pcb_onfault == fubail || pcb->pcb_onfault == subail) 5561.1Sdbj goto copyfault; 5571.1Sdbj /* fall into ... */ 5581.1Sdbj 5591.1Sdbj case T_MMUFLT|T_USER: /* page fault */ 5601.1Sdbj { 5611.7Sdbj vaddr_t va; 5621.1Sdbj struct vmspace *vm = p->p_vmspace; 5631.34Schs struct vm_map *map; 5641.1Sdbj int rv; 5651.1Sdbj vm_prot_t ftype; 5661.34Schs extern struct vm_map *kernel_map; 5671.1Sdbj 5681.1Sdbj#ifdef DEBUG 5691.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) 5701.1Sdbj printf("trap: T_MMUFLT pid=%d, code=%x, v=%x, pc=%x, sr=%x\n", 5711.67Smhitch p->p_pid, code, v, fp->f_pc, fp->f_sr); 5721.1Sdbj#endif 5731.1Sdbj /* 5741.1Sdbj * It is only a kernel address space fault iff: 5751.1Sdbj * 1. (type & T_USER) == 0 and 5761.1Sdbj * 2. pcb_onfault not set or 5771.1Sdbj * 3. pcb_onfault set but supervisor space data fault 5781.1Sdbj * The last can occur during an exec() copyin where the 5791.1Sdbj * argument space is lazy-allocated. 5801.1Sdbj */ 5811.16Sdbj if ((type & T_USER) == 0 && 5821.78Srmind ((pcb->pcb_onfault == 0) || KDFAULT(code))) 5831.1Sdbj map = kernel_map; 5841.74Swrstuden else { 5851.16Sdbj map = vm ? &vm->vm_map : kernel_map; 5861.74Swrstuden if ((l->l_flag & LW_SA) 5871.74Swrstuden && (~l->l_pflag & LP_SA_NOBLOCK)) { 5881.74Swrstuden l->l_savp->savp_faultaddr = (vaddr_t)v; 5891.74Swrstuden l->l_pflag |= LP_SA_PAGEFAULT; 5901.74Swrstuden } 5911.74Swrstuden } 5921.16Sdbj 5931.1Sdbj if (WRFAULT(code)) 5941.36Schs ftype = VM_PROT_WRITE; 5951.1Sdbj else 5961.1Sdbj ftype = VM_PROT_READ; 5971.16Sdbj 5981.7Sdbj va = trunc_page((vaddr_t)v); 5991.16Sdbj 6001.1Sdbj if (map == kernel_map && va == 0) { 6011.16Sdbj printf("trap: bad kernel %s access at 0x%x\n", 6021.16Sdbj (ftype & VM_PROT_WRITE) ? "read/write" : 6031.16Sdbj "read", v); 6041.1Sdbj goto dopanic; 6051.1Sdbj } 6061.16Sdbj 6071.38Smycroft#ifdef DIAGNOSTIC 6081.51Swiz if (interrupt_depth && !panicking) { 6091.38Smycroft printf("trap: calling uvm_fault() from interrupt!\n"); 6101.38Smycroft goto dopanic; 6111.38Smycroft } 6121.38Smycroft#endif 6131.38Smycroft 6141.57Sdrochner rv = uvm_fault(map, va, ftype); 6151.7Sdbj#ifdef DEBUG 6161.7Sdbj if (rv && MDB_ISPID(p->p_pid)) 6171.57Sdrochner printf("uvm_fault(%p, 0x%lx, 0x%x) -> 0x%x\n", 6181.16Sdbj map, va, ftype, rv); 6191.7Sdbj#endif 6201.1Sdbj /* 6211.1Sdbj * If this was a stack access we keep track of the maximum 6221.1Sdbj * accessed stack size. Also, if vm_fault gets a protection 6231.1Sdbj * failure it is due to accessing the stack region outside 6241.1Sdbj * the current limit and we need to reflect that as an access 6251.1Sdbj * error. 6261.1Sdbj */ 6271.31Schs if (rv == 0) { 6281.64Schristos if (map != kernel_map && (void *)va >= vm->vm_maxsaddr) 6291.52Sjdolecek uvm_grow(p, va); 6301.52Sjdolecek 6311.1Sdbj if (type == T_MMUFLT) { 6321.16Sdbj#ifdef M68040 6331.16Sdbj if (cputype == CPU_68040) 6341.67Smhitch (void) writeback(fp, 1); 6351.1Sdbj#endif 6361.1Sdbj return; 6371.1Sdbj } 6381.74Swrstuden l->l_pflag &= ~LP_SA_PAGEFAULT; 6391.1Sdbj goto out; 6401.1Sdbj } 6411.45Scl if (rv == EACCES) { 6421.45Scl ksi.ksi_code = SEGV_ACCERR; 6431.45Scl rv = EFAULT; 6441.45Scl } else 6451.45Scl ksi.ksi_code = SEGV_MAPERR; 6461.1Sdbj if (type == T_MMUFLT) { 6471.78Srmind if (pcb->pcb_onfault) 6481.1Sdbj goto copyfault; 6491.57Sdrochner printf("uvm_fault(%p, 0x%lx, 0x%x) -> 0x%x\n", 6501.16Sdbj map, va, ftype, rv); 6511.1Sdbj printf(" type %x, code [mmu,,ssw]: %x\n", 6521.1Sdbj type, code); 6531.1Sdbj goto dopanic; 6541.1Sdbj } 6551.74Swrstuden l->l_pflag &= ~LP_SA_PAGEFAULT; 6561.45Scl ksi.ksi_addr = (void *)v; 6571.31Schs if (rv == ENOMEM) { 6581.11Schs printf("UVM: pid %d (%s), uid %d killed: out of swap\n", 6591.11Schs p->p_pid, p->p_comm, 6601.61Sad l->l_cred ? 6611.61Sad kauth_cred_geteuid(l->l_cred) : -1); 6621.45Scl ksi.ksi_signo = SIGKILL; 6631.11Schs } else { 6641.45Scl ksi.ksi_signo = SIGSEGV; 6651.11Schs } 6661.1Sdbj break; 6671.1Sdbj } 6681.1Sdbj } 6691.45Scl trapsignal(l, &ksi); 6701.1Sdbj if ((type & T_USER) == 0) 6711.1Sdbj return; 6721.1Sdbjout: 6731.67Smhitch userret(l, fp, sticks, v, 1); 6741.1Sdbj} 6751.1Sdbj 6761.1Sdbj#ifdef M68040 6771.1Sdbj#ifdef DEBUG 6781.1Sdbjstruct writebackstats { 6791.1Sdbj int calls; 6801.1Sdbj int cpushes; 6811.1Sdbj int move16s; 6821.1Sdbj int wb1s, wb2s, wb3s; 6831.1Sdbj int wbsize[4]; 6841.1Sdbj} wbstats; 6851.1Sdbj 6861.54Sheconst char *f7sz[] = { "longword", "byte", "word", "line" }; 6871.54Sheconst char *f7tt[] = { "normal", "MOVE16", "AFC", "ACK" }; 6881.54Sheconst char *f7tm[] = { "d-push", "u-data", "u-code", "M-data", 6891.1Sdbj "M-code", "k-data", "k-code", "RES" }; 6901.54Sheconst char wberrstr[] = 6911.16Sdbj "WARNING: pid %d(%s) writeback [%s] failed, pc=%x fa=%x wba=%x wbd=%x\n"; 6921.1Sdbj#endif 6931.1Sdbj 6941.16Sdbjint 6951.53Schswriteback(struct frame *fp, int docachepush) 6961.1Sdbj{ 6971.1Sdbj struct fmt7 *f = &fp->f_fmt7; 6981.39Sthorpej struct lwp *l = curlwp; 6991.39Sthorpej struct proc *p = l->l_proc; 7001.78Srmind struct pcb *pcb = lwp_getpcb(l); 7011.1Sdbj int err = 0; 7021.1Sdbj u_int fa; 7031.78Srmind void *oonfault = pcb->pcb_onfault; 7041.15Sthorpej paddr_t pa; 7051.1Sdbj 7061.1Sdbj#ifdef DEBUG 7071.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) { 7081.1Sdbj printf(" pid=%d, fa=%x,", p->p_pid, f->f_fa); 7091.1Sdbj dumpssw(f->f_ssw); 7101.1Sdbj } 7111.1Sdbj wbstats.calls++; 7121.1Sdbj#endif 7131.1Sdbj /* 7141.1Sdbj * Deal with special cases first. 7151.1Sdbj */ 7161.1Sdbj if ((f->f_ssw & SSW4_TMMASK) == SSW4_TMDCP) { 7171.1Sdbj /* 7181.1Sdbj * Dcache push fault. 7191.1Sdbj * Line-align the address and write out the push data to 7201.1Sdbj * the indicated physical address. 7211.1Sdbj */ 7221.1Sdbj#ifdef DEBUG 7231.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) { 7241.1Sdbj printf(" pushing %s to PA %x, data %x", 7251.1Sdbj f7sz[(f->f_ssw & SSW4_SZMASK) >> 5], 7261.1Sdbj f->f_fa, f->f_pd0); 7271.1Sdbj if ((f->f_ssw & SSW4_SZMASK) == SSW4_SZLN) 7281.1Sdbj printf("/%x/%x/%x", 7291.1Sdbj f->f_pd1, f->f_pd2, f->f_pd3); 7301.1Sdbj printf("\n"); 7311.1Sdbj } 7321.1Sdbj if (f->f_wb1s & SSW4_WBSV) 7331.1Sdbj panic("writeback: cache push with WB1S valid"); 7341.1Sdbj wbstats.cpushes++; 7351.1Sdbj#endif 7361.1Sdbj /* 7371.1Sdbj * XXX there are security problems if we attempt to do a 7381.1Sdbj * cache push after a signal handler has been called. 7391.1Sdbj */ 7401.1Sdbj if (docachepush) { 7411.7Sdbj pmap_enter(pmap_kernel(), (vaddr_t)vmmap, 7421.18Sthorpej trunc_page(f->f_fa), VM_PROT_WRITE, 7431.18Sthorpej VM_PROT_WRITE|PMAP_WIRED); 7441.35Schris pmap_update(pmap_kernel()); 7451.1Sdbj fa = (u_int)&vmmap[(f->f_fa & PGOFSET) & ~0xF]; 7461.77Scegger memcpy((void *)fa, (void *)&f->f_pd0, 16); 7471.15Sthorpej (void) pmap_extract(pmap_kernel(), (vaddr_t)fa, &pa); 7481.15Sthorpej DCFL(pa); 7491.7Sdbj pmap_remove(pmap_kernel(), (vaddr_t)vmmap, 7501.41Sthorpej (vaddr_t)&vmmap[PAGE_SIZE]); 7511.35Schris pmap_update(pmap_kernel()); 7521.1Sdbj } else 7531.1Sdbj printf("WARNING: pid %d(%s) uid %d: CPUSH not done\n", 7541.61Sad p->p_pid, p->p_comm, kauth_cred_geteuid(l->l_cred)); 7551.1Sdbj } else if ((f->f_ssw & (SSW4_RW|SSW4_TTMASK)) == SSW4_TTM16) { 7561.1Sdbj /* 7571.1Sdbj * MOVE16 fault. 7581.1Sdbj * Line-align the address and write out the push data to 7591.1Sdbj * the indicated virtual address. 7601.1Sdbj */ 7611.1Sdbj#ifdef DEBUG 7621.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) 7631.1Sdbj printf(" MOVE16 to VA %x(%x), data %x/%x/%x/%x\n", 7641.1Sdbj f->f_fa, f->f_fa & ~0xF, f->f_pd0, f->f_pd1, 7651.1Sdbj f->f_pd2, f->f_pd3); 7661.1Sdbj if (f->f_wb1s & SSW4_WBSV) 7671.1Sdbj panic("writeback: MOVE16 with WB1S valid"); 7681.1Sdbj wbstats.move16s++; 7691.1Sdbj#endif 7701.1Sdbj if (KDFAULT(f->f_wb1s)) 7711.77Scegger memcpy((void *)(f->f_fa & ~0xF), (void *)&f->f_pd0, 16); 7721.1Sdbj else 7731.64Schristos err = suline((void *)(f->f_fa & ~0xF), (void *)&f->f_pd0); 7741.1Sdbj if (err) { 7751.1Sdbj fa = f->f_fa & ~0xF; 7761.1Sdbj#ifdef DEBUG 7771.1Sdbj if (mmudebug & MDB_WBFAILED) 7781.1Sdbj printf(wberrstr, p->p_pid, p->p_comm, 7791.1Sdbj "MOVE16", fp->f_pc, f->f_fa, 7801.1Sdbj f->f_fa & ~0xF, f->f_pd0); 7811.1Sdbj#endif 7821.1Sdbj } 7831.1Sdbj } else if (f->f_wb1s & SSW4_WBSV) { 7841.1Sdbj /* 7851.1Sdbj * Writeback #1. 7861.1Sdbj * Position the "memory-aligned" data and write it out. 7871.1Sdbj */ 7881.1Sdbj u_int wb1d = f->f_wb1d; 7891.1Sdbj int off; 7901.1Sdbj 7911.1Sdbj#ifdef DEBUG 7921.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) 7931.1Sdbj dumpwb(1, f->f_wb1s, f->f_wb1a, f->f_wb1d); 7941.1Sdbj wbstats.wb1s++; 7951.1Sdbj wbstats.wbsize[(f->f_wb2s&SSW4_SZMASK)>>5]++; 7961.1Sdbj#endif 7971.1Sdbj off = (f->f_wb1a & 3) * 8; 7981.1Sdbj switch (f->f_wb1s & SSW4_SZMASK) { 7991.1Sdbj case SSW4_SZLW: 8001.1Sdbj if (off) 8011.1Sdbj wb1d = (wb1d >> (32 - off)) | (wb1d << off); 8021.1Sdbj if (KDFAULT(f->f_wb1s)) 8031.1Sdbj *(long *)f->f_wb1a = wb1d; 8041.1Sdbj else 8051.64Schristos err = suword((void *)f->f_wb1a, wb1d); 8061.1Sdbj break; 8071.1Sdbj case SSW4_SZB: 8081.1Sdbj off = 24 - off; 8091.1Sdbj if (off) 8101.1Sdbj wb1d >>= off; 8111.1Sdbj if (KDFAULT(f->f_wb1s)) 8121.1Sdbj *(char *)f->f_wb1a = wb1d; 8131.1Sdbj else 8141.64Schristos err = subyte((void *)f->f_wb1a, wb1d); 8151.1Sdbj break; 8161.1Sdbj case SSW4_SZW: 8171.1Sdbj off = (off + 16) % 32; 8181.1Sdbj if (off) 8191.1Sdbj wb1d = (wb1d >> (32 - off)) | (wb1d << off); 8201.1Sdbj if (KDFAULT(f->f_wb1s)) 8211.1Sdbj *(short *)f->f_wb1a = wb1d; 8221.1Sdbj else 8231.64Schristos err = susword((void *)f->f_wb1a, wb1d); 8241.1Sdbj break; 8251.1Sdbj } 8261.1Sdbj if (err) { 8271.1Sdbj fa = f->f_wb1a; 8281.1Sdbj#ifdef DEBUG 8291.1Sdbj if (mmudebug & MDB_WBFAILED) 8301.1Sdbj printf(wberrstr, p->p_pid, p->p_comm, 8311.1Sdbj "#1", fp->f_pc, f->f_fa, 8321.1Sdbj f->f_wb1a, f->f_wb1d); 8331.1Sdbj#endif 8341.1Sdbj } 8351.1Sdbj } 8361.1Sdbj /* 8371.1Sdbj * Deal with the "normal" writebacks. 8381.1Sdbj * 8391.1Sdbj * XXX writeback2 is known to reflect a LINE size writeback after 8401.1Sdbj * a MOVE16 was already dealt with above. Ignore it. 8411.1Sdbj */ 8421.1Sdbj if (err == 0 && (f->f_wb2s & SSW4_WBSV) && 8431.1Sdbj (f->f_wb2s & SSW4_SZMASK) != SSW4_SZLN) { 8441.1Sdbj#ifdef DEBUG 8451.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) 8461.1Sdbj dumpwb(2, f->f_wb2s, f->f_wb2a, f->f_wb2d); 8471.1Sdbj wbstats.wb2s++; 8481.1Sdbj wbstats.wbsize[(f->f_wb2s&SSW4_SZMASK)>>5]++; 8491.1Sdbj#endif 8501.1Sdbj switch (f->f_wb2s & SSW4_SZMASK) { 8511.1Sdbj case SSW4_SZLW: 8521.1Sdbj if (KDFAULT(f->f_wb2s)) 8531.1Sdbj *(long *)f->f_wb2a = f->f_wb2d; 8541.1Sdbj else 8551.64Schristos err = suword((void *)f->f_wb2a, f->f_wb2d); 8561.1Sdbj break; 8571.1Sdbj case SSW4_SZB: 8581.1Sdbj if (KDFAULT(f->f_wb2s)) 8591.1Sdbj *(char *)f->f_wb2a = f->f_wb2d; 8601.1Sdbj else 8611.64Schristos err = subyte((void *)f->f_wb2a, f->f_wb2d); 8621.1Sdbj break; 8631.1Sdbj case SSW4_SZW: 8641.1Sdbj if (KDFAULT(f->f_wb2s)) 8651.1Sdbj *(short *)f->f_wb2a = f->f_wb2d; 8661.1Sdbj else 8671.64Schristos err = susword((void *)f->f_wb2a, f->f_wb2d); 8681.1Sdbj break; 8691.1Sdbj } 8701.1Sdbj if (err) { 8711.1Sdbj fa = f->f_wb2a; 8721.1Sdbj#ifdef DEBUG 8731.1Sdbj if (mmudebug & MDB_WBFAILED) { 8741.1Sdbj printf(wberrstr, p->p_pid, p->p_comm, 8751.1Sdbj "#2", fp->f_pc, f->f_fa, 8761.1Sdbj f->f_wb2a, f->f_wb2d); 8771.1Sdbj dumpssw(f->f_ssw); 8781.1Sdbj dumpwb(2, f->f_wb2s, f->f_wb2a, f->f_wb2d); 8791.1Sdbj } 8801.1Sdbj#endif 8811.1Sdbj } 8821.1Sdbj } 8831.1Sdbj if (err == 0 && (f->f_wb3s & SSW4_WBSV)) { 8841.1Sdbj#ifdef DEBUG 8851.1Sdbj if ((mmudebug & MDB_WBFOLLOW) || MDB_ISPID(p->p_pid)) 8861.1Sdbj dumpwb(3, f->f_wb3s, f->f_wb3a, f->f_wb3d); 8871.1Sdbj wbstats.wb3s++; 8881.1Sdbj wbstats.wbsize[(f->f_wb3s&SSW4_SZMASK)>>5]++; 8891.1Sdbj#endif 8901.1Sdbj switch (f->f_wb3s & SSW4_SZMASK) { 8911.1Sdbj case SSW4_SZLW: 8921.1Sdbj if (KDFAULT(f->f_wb3s)) 8931.1Sdbj *(long *)f->f_wb3a = f->f_wb3d; 8941.1Sdbj else 8951.64Schristos err = suword((void *)f->f_wb3a, f->f_wb3d); 8961.1Sdbj break; 8971.1Sdbj case SSW4_SZB: 8981.1Sdbj if (KDFAULT(f->f_wb3s)) 8991.1Sdbj *(char *)f->f_wb3a = f->f_wb3d; 9001.1Sdbj else 9011.64Schristos err = subyte((void *)f->f_wb3a, f->f_wb3d); 9021.1Sdbj break; 9031.1Sdbj case SSW4_SZW: 9041.1Sdbj if (KDFAULT(f->f_wb3s)) 9051.1Sdbj *(short *)f->f_wb3a = f->f_wb3d; 9061.1Sdbj else 9071.64Schristos err = susword((void *)f->f_wb3a, f->f_wb3d); 9081.1Sdbj break; 9091.1Sdbj#ifdef DEBUG 9101.1Sdbj case SSW4_SZLN: 9111.1Sdbj panic("writeback: wb3s indicates LINE write"); 9121.1Sdbj#endif 9131.1Sdbj } 9141.1Sdbj if (err) { 9151.1Sdbj fa = f->f_wb3a; 9161.1Sdbj#ifdef DEBUG 9171.1Sdbj if (mmudebug & MDB_WBFAILED) 9181.1Sdbj printf(wberrstr, p->p_pid, p->p_comm, 9191.1Sdbj "#3", fp->f_pc, f->f_fa, 9201.1Sdbj f->f_wb3a, f->f_wb3d); 9211.1Sdbj#endif 9221.1Sdbj } 9231.1Sdbj } 9241.78Srmind pcb->pcb_onfault = oonfault; 9251.1Sdbj if (err) 9261.1Sdbj err = SIGSEGV; 9271.16Sdbj return (err); 9281.1Sdbj} 9291.1Sdbj 9301.1Sdbj#ifdef DEBUG 9311.16Sdbjvoid 9321.53Schsdumpssw(u_short ssw) 9331.1Sdbj{ 9341.1Sdbj printf(" SSW: %x: ", ssw); 9351.1Sdbj if (ssw & SSW4_CP) 9361.1Sdbj printf("CP,"); 9371.1Sdbj if (ssw & SSW4_CU) 9381.1Sdbj printf("CU,"); 9391.1Sdbj if (ssw & SSW4_CT) 9401.1Sdbj printf("CT,"); 9411.1Sdbj if (ssw & SSW4_CM) 9421.1Sdbj printf("CM,"); 9431.1Sdbj if (ssw & SSW4_MA) 9441.1Sdbj printf("MA,"); 9451.1Sdbj if (ssw & SSW4_ATC) 9461.1Sdbj printf("ATC,"); 9471.1Sdbj if (ssw & SSW4_LK) 9481.1Sdbj printf("LK,"); 9491.1Sdbj if (ssw & SSW4_RW) 9501.1Sdbj printf("RW,"); 9511.1Sdbj printf(" SZ=%s, TT=%s, TM=%s\n", 9521.1Sdbj f7sz[(ssw & SSW4_SZMASK) >> 5], 9531.1Sdbj f7tt[(ssw & SSW4_TTMASK) >> 3], 9541.1Sdbj f7tm[ssw & SSW4_TMMASK]); 9551.1Sdbj} 9561.1Sdbj 9571.16Sdbjvoid 9581.53Schsdumpwb(int num, u_short s, u_int a, u_int d) 9591.1Sdbj{ 9601.1Sdbj struct proc *p = curproc; 9611.7Sdbj paddr_t pa; 9621.1Sdbj 9631.1Sdbj printf(" writeback #%d: VA %x, data %x, SZ=%s, TT=%s, TM=%s\n", 9641.1Sdbj num, a, d, f7sz[(s & SSW4_SZMASK) >> 5], 9651.1Sdbj f7tt[(s & SSW4_TTMASK) >> 3], f7tm[s & SSW4_TMMASK]); 9661.16Sdbj printf(" PA "); 9671.63Sthorpej if (pmap_extract(p->p_vmspace->vm_map.pmap, (vaddr_t)a, &pa) == false) 9681.1Sdbj printf("<invalid address>"); 9691.1Sdbj else 9701.64Schristos printf("%lx, current value %lx", pa, fuword((void *)a)); 9711.1Sdbj printf("\n"); 9721.1Sdbj} 9731.1Sdbj#endif 9741.1Sdbj#endif 975