mirror of
https://github.com/FEX-Emu/linux.git
synced 2024-12-21 00:42:16 +00:00
1eeb66a1bb
This patch moves the die notifier handling to common code. Previous various architectures had exactly the same code for it. Note that the new code is compiled unconditionally, this should be understood as an appel to the other architecture maintainer to implement support for it aswell (aka sprinkling a notify_die or two in the proper place) arm had a notifiy_die that did something totally different, I renamed it to arm_notify_die as part of the patch and made it static to the file it's declared and used at. avr32 used to pass slightly less information through this interface and I brought it into line with the other architectures. [akpm@linux-foundation.org: build fix] [akpm@linux-foundation.org: fix vmalloc_sync_all bustage] [bryan.wu@analog.com: fix vmalloc_sync_all in nommu] Signed-off-by: Christoph Hellwig <hch@lst.de> Cc: <linux-arch@vger.kernel.org> Cc: Russell King <rmk@arm.linux.org.uk> Signed-off-by: Bryan Wu <bryan.wu@analog.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
515 lines
14 KiB
C
515 lines
14 KiB
C
/* $Id: traps.c,v 1.64 2000/09/03 15:00:49 anton Exp $
|
|
* arch/sparc/kernel/traps.c
|
|
*
|
|
* Copyright 1995 David S. Miller (davem@caip.rutgers.edu)
|
|
* Copyright 2000 Jakub Jelinek (jakub@redhat.com)
|
|
*/
|
|
|
|
/*
|
|
* I hate traps on the sparc, grrr...
|
|
*/
|
|
|
|
#include <linux/sched.h> /* for jiffies */
|
|
#include <linux/kernel.h>
|
|
#include <linux/kallsyms.h>
|
|
#include <linux/signal.h>
|
|
#include <linux/smp.h>
|
|
#include <linux/smp_lock.h>
|
|
#include <linux/kdebug.h>
|
|
|
|
#include <asm/delay.h>
|
|
#include <asm/system.h>
|
|
#include <asm/ptrace.h>
|
|
#include <asm/oplib.h>
|
|
#include <asm/page.h>
|
|
#include <asm/pgtable.h>
|
|
#include <asm/unistd.h>
|
|
#include <asm/traps.h>
|
|
|
|
/* #define TRAP_DEBUG */
|
|
|
|
struct trap_trace_entry {
|
|
unsigned long pc;
|
|
unsigned long type;
|
|
};
|
|
|
|
int trap_curbuf = 0;
|
|
struct trap_trace_entry trapbuf[1024];
|
|
|
|
void syscall_trace_entry(struct pt_regs *regs)
|
|
{
|
|
printk("%s[%d]: ", current->comm, current->pid);
|
|
printk("scall<%d> (could be %d)\n", (int) regs->u_regs[UREG_G1],
|
|
(int) regs->u_regs[UREG_I0]);
|
|
}
|
|
|
|
void syscall_trace_exit(struct pt_regs *regs)
|
|
{
|
|
}
|
|
|
|
void sun4m_nmi(struct pt_regs *regs)
|
|
{
|
|
unsigned long afsr, afar;
|
|
|
|
printk("Aieee: sun4m NMI received!\n");
|
|
/* XXX HyperSparc hack XXX */
|
|
__asm__ __volatile__("mov 0x500, %%g1\n\t"
|
|
"lda [%%g1] 0x4, %0\n\t"
|
|
"mov 0x600, %%g1\n\t"
|
|
"lda [%%g1] 0x4, %1\n\t" :
|
|
"=r" (afsr), "=r" (afar));
|
|
printk("afsr=%08lx afar=%08lx\n", afsr, afar);
|
|
printk("you lose buddy boy...\n");
|
|
show_regs(regs);
|
|
prom_halt();
|
|
}
|
|
|
|
void sun4d_nmi(struct pt_regs *regs)
|
|
{
|
|
printk("Aieee: sun4d NMI received!\n");
|
|
printk("you lose buddy boy...\n");
|
|
show_regs(regs);
|
|
prom_halt();
|
|
}
|
|
|
|
void instruction_dump (unsigned long *pc)
|
|
{
|
|
int i;
|
|
|
|
if((((unsigned long) pc) & 3))
|
|
return;
|
|
|
|
for(i = -3; i < 6; i++)
|
|
printk("%c%08lx%c",i?' ':'<',pc[i],i?' ':'>');
|
|
printk("\n");
|
|
}
|
|
|
|
#define __SAVE __asm__ __volatile__("save %sp, -0x40, %sp\n\t")
|
|
#define __RESTORE __asm__ __volatile__("restore %g0, %g0, %g0\n\t")
|
|
|
|
void die_if_kernel(char *str, struct pt_regs *regs)
|
|
{
|
|
static int die_counter;
|
|
int count = 0;
|
|
|
|
/* Amuse the user. */
|
|
printk(
|
|
" \\|/ ____ \\|/\n"
|
|
" \"@'/ ,. \\`@\"\n"
|
|
" /_| \\__/ |_\\\n"
|
|
" \\__U_/\n");
|
|
|
|
printk("%s(%d): %s [#%d]\n", current->comm, current->pid, str, ++die_counter);
|
|
show_regs(regs);
|
|
|
|
__SAVE; __SAVE; __SAVE; __SAVE;
|
|
__SAVE; __SAVE; __SAVE; __SAVE;
|
|
__RESTORE; __RESTORE; __RESTORE; __RESTORE;
|
|
__RESTORE; __RESTORE; __RESTORE; __RESTORE;
|
|
|
|
{
|
|
struct reg_window *rw = (struct reg_window *)regs->u_regs[UREG_FP];
|
|
|
|
/* Stop the back trace when we hit userland or we
|
|
* find some badly aligned kernel stack. Set an upper
|
|
* bound in case our stack is trashed and we loop.
|
|
*/
|
|
while(rw &&
|
|
count++ < 30 &&
|
|
(((unsigned long) rw) >= PAGE_OFFSET) &&
|
|
!(((unsigned long) rw) & 0x7)) {
|
|
printk("Caller[%08lx]", rw->ins[7]);
|
|
print_symbol(": %s\n", rw->ins[7]);
|
|
rw = (struct reg_window *)rw->ins[6];
|
|
}
|
|
}
|
|
printk("Instruction DUMP:");
|
|
instruction_dump ((unsigned long *) regs->pc);
|
|
if(regs->psr & PSR_PS)
|
|
do_exit(SIGKILL);
|
|
do_exit(SIGSEGV);
|
|
}
|
|
|
|
void do_hw_interrupt(struct pt_regs *regs, unsigned long type)
|
|
{
|
|
siginfo_t info;
|
|
|
|
if(type < 0x80) {
|
|
/* Sun OS's puke from bad traps, Linux survives! */
|
|
printk("Unimplemented Sparc TRAP, type = %02lx\n", type);
|
|
die_if_kernel("Whee... Hello Mr. Penguin", regs);
|
|
}
|
|
|
|
if(regs->psr & PSR_PS)
|
|
die_if_kernel("Kernel bad trap", regs);
|
|
|
|
info.si_signo = SIGILL;
|
|
info.si_errno = 0;
|
|
info.si_code = ILL_ILLTRP;
|
|
info.si_addr = (void __user *)regs->pc;
|
|
info.si_trapno = type - 0x80;
|
|
force_sig_info(SIGILL, &info, current);
|
|
}
|
|
|
|
void do_illegal_instruction(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
extern int do_user_muldiv (struct pt_regs *, unsigned long);
|
|
siginfo_t info;
|
|
|
|
if(psr & PSR_PS)
|
|
die_if_kernel("Kernel illegal instruction", regs);
|
|
#ifdef TRAP_DEBUG
|
|
printk("Ill instr. at pc=%08lx instruction is %08lx\n",
|
|
regs->pc, *(unsigned long *)regs->pc);
|
|
#endif
|
|
if (!do_user_muldiv (regs, pc))
|
|
return;
|
|
|
|
info.si_signo = SIGILL;
|
|
info.si_errno = 0;
|
|
info.si_code = ILL_ILLOPC;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGILL, &info, current);
|
|
}
|
|
|
|
void do_priv_instruction(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
if(psr & PSR_PS)
|
|
die_if_kernel("Penguin instruction from Penguin mode??!?!", regs);
|
|
info.si_signo = SIGILL;
|
|
info.si_errno = 0;
|
|
info.si_code = ILL_PRVOPC;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGILL, &info, current);
|
|
}
|
|
|
|
/* XXX User may want to be allowed to do this. XXX */
|
|
|
|
void do_memaccess_unaligned(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
if(regs->psr & PSR_PS) {
|
|
printk("KERNEL MNA at pc %08lx npc %08lx called by %08lx\n", pc, npc,
|
|
regs->u_regs[UREG_RETPC]);
|
|
die_if_kernel("BOGUS", regs);
|
|
/* die_if_kernel("Kernel MNA access", regs); */
|
|
}
|
|
#if 0
|
|
show_regs (regs);
|
|
instruction_dump ((unsigned long *) regs->pc);
|
|
printk ("do_MNA!\n");
|
|
#endif
|
|
info.si_signo = SIGBUS;
|
|
info.si_errno = 0;
|
|
info.si_code = BUS_ADRALN;
|
|
info.si_addr = /* FIXME: Should dig out mna address */ (void *)0;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGBUS, &info, current);
|
|
}
|
|
|
|
extern void fpsave(unsigned long *fpregs, unsigned long *fsr,
|
|
void *fpqueue, unsigned long *fpqdepth);
|
|
extern void fpload(unsigned long *fpregs, unsigned long *fsr);
|
|
|
|
static unsigned long init_fsr = 0x0UL;
|
|
static unsigned long init_fregs[32] __attribute__ ((aligned (8))) =
|
|
{ ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL,
|
|
~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL,
|
|
~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL,
|
|
~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL, ~0UL };
|
|
|
|
void do_fpd_trap(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
/* Sanity check... */
|
|
if(psr & PSR_PS)
|
|
die_if_kernel("Kernel gets FloatingPenguinUnit disabled trap", regs);
|
|
|
|
put_psr(get_psr() | PSR_EF); /* Allow FPU ops. */
|
|
regs->psr |= PSR_EF;
|
|
#ifndef CONFIG_SMP
|
|
if(last_task_used_math == current)
|
|
return;
|
|
if(last_task_used_math) {
|
|
/* Other processes fpu state, save away */
|
|
struct task_struct *fptask = last_task_used_math;
|
|
fpsave(&fptask->thread.float_regs[0], &fptask->thread.fsr,
|
|
&fptask->thread.fpqueue[0], &fptask->thread.fpqdepth);
|
|
}
|
|
last_task_used_math = current;
|
|
if(used_math()) {
|
|
fpload(¤t->thread.float_regs[0], ¤t->thread.fsr);
|
|
} else {
|
|
/* Set initial sane state. */
|
|
fpload(&init_fregs[0], &init_fsr);
|
|
set_used_math();
|
|
}
|
|
#else
|
|
if(!used_math()) {
|
|
fpload(&init_fregs[0], &init_fsr);
|
|
set_used_math();
|
|
} else {
|
|
fpload(¤t->thread.float_regs[0], ¤t->thread.fsr);
|
|
}
|
|
set_thread_flag(TIF_USEDFPU);
|
|
#endif
|
|
}
|
|
|
|
static unsigned long fake_regs[32] __attribute__ ((aligned (8)));
|
|
static unsigned long fake_fsr;
|
|
static unsigned long fake_queue[32] __attribute__ ((aligned (8)));
|
|
static unsigned long fake_depth;
|
|
|
|
extern int do_mathemu(struct pt_regs *, struct task_struct *);
|
|
|
|
void do_fpe_trap(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
static int calls;
|
|
siginfo_t info;
|
|
unsigned long fsr;
|
|
int ret = 0;
|
|
#ifndef CONFIG_SMP
|
|
struct task_struct *fpt = last_task_used_math;
|
|
#else
|
|
struct task_struct *fpt = current;
|
|
#endif
|
|
put_psr(get_psr() | PSR_EF);
|
|
/* If nobody owns the fpu right now, just clear the
|
|
* error into our fake static buffer and hope it don't
|
|
* happen again. Thank you crashme...
|
|
*/
|
|
#ifndef CONFIG_SMP
|
|
if(!fpt) {
|
|
#else
|
|
if (!test_tsk_thread_flag(fpt, TIF_USEDFPU)) {
|
|
#endif
|
|
fpsave(&fake_regs[0], &fake_fsr, &fake_queue[0], &fake_depth);
|
|
regs->psr &= ~PSR_EF;
|
|
return;
|
|
}
|
|
fpsave(&fpt->thread.float_regs[0], &fpt->thread.fsr,
|
|
&fpt->thread.fpqueue[0], &fpt->thread.fpqdepth);
|
|
#ifdef DEBUG_FPU
|
|
printk("Hmm, FP exception, fsr was %016lx\n", fpt->thread.fsr);
|
|
#endif
|
|
|
|
switch ((fpt->thread.fsr & 0x1c000)) {
|
|
/* switch on the contents of the ftt [floating point trap type] field */
|
|
#ifdef DEBUG_FPU
|
|
case (1 << 14):
|
|
printk("IEEE_754_exception\n");
|
|
break;
|
|
#endif
|
|
case (2 << 14): /* unfinished_FPop (underflow & co) */
|
|
case (3 << 14): /* unimplemented_FPop (quad stuff, maybe sqrt) */
|
|
ret = do_mathemu(regs, fpt);
|
|
break;
|
|
#ifdef DEBUG_FPU
|
|
case (4 << 14):
|
|
printk("sequence_error (OS bug...)\n");
|
|
break;
|
|
case (5 << 14):
|
|
printk("hardware_error (uhoh!)\n");
|
|
break;
|
|
case (6 << 14):
|
|
printk("invalid_fp_register (user error)\n");
|
|
break;
|
|
#endif /* DEBUG_FPU */
|
|
}
|
|
/* If we successfully emulated the FPop, we pretend the trap never happened :-> */
|
|
if (ret) {
|
|
fpload(¤t->thread.float_regs[0], ¤t->thread.fsr);
|
|
return;
|
|
}
|
|
/* nope, better SIGFPE the offending process... */
|
|
|
|
#ifdef CONFIG_SMP
|
|
clear_tsk_thread_flag(fpt, TIF_USEDFPU);
|
|
#endif
|
|
if(psr & PSR_PS) {
|
|
/* The first fsr store/load we tried trapped,
|
|
* the second one will not (we hope).
|
|
*/
|
|
printk("WARNING: FPU exception from kernel mode. at pc=%08lx\n",
|
|
regs->pc);
|
|
regs->pc = regs->npc;
|
|
regs->npc += 4;
|
|
calls++;
|
|
if(calls > 2)
|
|
die_if_kernel("Too many Penguin-FPU traps from kernel mode",
|
|
regs);
|
|
return;
|
|
}
|
|
|
|
fsr = fpt->thread.fsr;
|
|
info.si_signo = SIGFPE;
|
|
info.si_errno = 0;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
info.si_code = __SI_FAULT;
|
|
if ((fsr & 0x1c000) == (1 << 14)) {
|
|
if (fsr & 0x10)
|
|
info.si_code = FPE_FLTINV;
|
|
else if (fsr & 0x08)
|
|
info.si_code = FPE_FLTOVF;
|
|
else if (fsr & 0x04)
|
|
info.si_code = FPE_FLTUND;
|
|
else if (fsr & 0x02)
|
|
info.si_code = FPE_FLTDIV;
|
|
else if (fsr & 0x01)
|
|
info.si_code = FPE_FLTRES;
|
|
}
|
|
send_sig_info(SIGFPE, &info, fpt);
|
|
#ifndef CONFIG_SMP
|
|
last_task_used_math = NULL;
|
|
#endif
|
|
regs->psr &= ~PSR_EF;
|
|
if(calls > 0)
|
|
calls=0;
|
|
}
|
|
|
|
void handle_tag_overflow(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
if(psr & PSR_PS)
|
|
die_if_kernel("Penguin overflow trap from kernel mode", regs);
|
|
info.si_signo = SIGEMT;
|
|
info.si_errno = 0;
|
|
info.si_code = EMT_TAGOVF;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGEMT, &info, current);
|
|
}
|
|
|
|
void handle_watchpoint(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
#ifdef TRAP_DEBUG
|
|
printk("Watchpoint detected at PC %08lx NPC %08lx PSR %08lx\n",
|
|
pc, npc, psr);
|
|
#endif
|
|
if(psr & PSR_PS)
|
|
panic("Tell me what a watchpoint trap is, and I'll then deal "
|
|
"with such a beast...");
|
|
}
|
|
|
|
void handle_reg_access(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
#ifdef TRAP_DEBUG
|
|
printk("Register Access Exception at PC %08lx NPC %08lx PSR %08lx\n",
|
|
pc, npc, psr);
|
|
#endif
|
|
info.si_signo = SIGBUS;
|
|
info.si_errno = 0;
|
|
info.si_code = BUS_OBJERR;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
force_sig_info(SIGBUS, &info, current);
|
|
}
|
|
|
|
void handle_cp_disabled(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
info.si_signo = SIGILL;
|
|
info.si_errno = 0;
|
|
info.si_code = ILL_COPROC;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGILL, &info, current);
|
|
}
|
|
|
|
void handle_cp_exception(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
#ifdef TRAP_DEBUG
|
|
printk("Co-Processor Exception at PC %08lx NPC %08lx PSR %08lx\n",
|
|
pc, npc, psr);
|
|
#endif
|
|
info.si_signo = SIGILL;
|
|
info.si_errno = 0;
|
|
info.si_code = ILL_COPROC;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGILL, &info, current);
|
|
}
|
|
|
|
void handle_hw_divzero(struct pt_regs *regs, unsigned long pc, unsigned long npc,
|
|
unsigned long psr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
info.si_signo = SIGFPE;
|
|
info.si_errno = 0;
|
|
info.si_code = FPE_INTDIV;
|
|
info.si_addr = (void __user *)pc;
|
|
info.si_trapno = 0;
|
|
send_sig_info(SIGFPE, &info, current);
|
|
}
|
|
|
|
#ifdef CONFIG_DEBUG_BUGVERBOSE
|
|
void do_BUG(const char *file, int line)
|
|
{
|
|
// bust_spinlocks(1); XXX Not in our original BUG()
|
|
printk("kernel BUG at %s:%d!\n", file, line);
|
|
}
|
|
#endif
|
|
|
|
/* Since we have our mappings set up, on multiprocessors we can spin them
|
|
* up here so that timer interrupts work during initialization.
|
|
*/
|
|
|
|
extern void sparc_cpu_startup(void);
|
|
|
|
int linux_smp_still_initting;
|
|
unsigned int thiscpus_tbr;
|
|
int thiscpus_mid;
|
|
|
|
void trap_init(void)
|
|
{
|
|
extern void thread_info_offsets_are_bolixed_pete(void);
|
|
|
|
/* Force linker to barf if mismatched */
|
|
if (TI_UWINMASK != offsetof(struct thread_info, uwinmask) ||
|
|
TI_TASK != offsetof(struct thread_info, task) ||
|
|
TI_EXECDOMAIN != offsetof(struct thread_info, exec_domain) ||
|
|
TI_FLAGS != offsetof(struct thread_info, flags) ||
|
|
TI_CPU != offsetof(struct thread_info, cpu) ||
|
|
TI_PREEMPT != offsetof(struct thread_info, preempt_count) ||
|
|
TI_SOFTIRQ != offsetof(struct thread_info, softirq_count) ||
|
|
TI_HARDIRQ != offsetof(struct thread_info, hardirq_count) ||
|
|
TI_KSP != offsetof(struct thread_info, ksp) ||
|
|
TI_KPC != offsetof(struct thread_info, kpc) ||
|
|
TI_KPSR != offsetof(struct thread_info, kpsr) ||
|
|
TI_KWIM != offsetof(struct thread_info, kwim) ||
|
|
TI_REG_WINDOW != offsetof(struct thread_info, reg_window) ||
|
|
TI_RWIN_SPTRS != offsetof(struct thread_info, rwbuf_stkptrs) ||
|
|
TI_W_SAVED != offsetof(struct thread_info, w_saved))
|
|
thread_info_offsets_are_bolixed_pete();
|
|
|
|
/* Attach to the address space of init_task. */
|
|
atomic_inc(&init_mm.mm_count);
|
|
current->active_mm = &init_mm;
|
|
|
|
/* NOTE: Other cpus have this done as they are started
|
|
* up on SMP.
|
|
*/
|
|
}
|