trap.c revision 1.3
1/*	$NetBSD: trap.c,v 1.3 2002/07/07 22:52:54 fredette Exp $	*/
2
3/*-
4 * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Matthew Fredette.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 *    must display the following acknowledgement:
20 *      This product includes software developed by the NetBSD
21 *      Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 *    contributors may be used to endorse or promote products derived
24 *    from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39/*	$OpenBSD: trap.c,v 1.30 2001/09/19 20:50:56 mickey Exp $	*/
40
41/*
42 * Copyright (c) 1998-2000 Michael Shalayeff
43 * All rights reserved.
44 *
45 * Redistribution and use in source and binary forms, with or without
46 * modification, are permitted provided that the following conditions
47 * are met:
48 * 1. Redistributions of source code must retain the above copyright
49 *    notice, this list of conditions and the following disclaimer.
50 * 2. Redistributions in binary form must reproduce the above copyright
51 *    notice, this list of conditions and the following disclaimer in the
52 *    documentation and/or other materials provided with the distribution.
53 * 3. All advertising materials mentioning features or use of this software
54 *    must display the following acknowledgement:
55 *	This product includes software developed by Michael Shalayeff.
56 * 4. The name of the author may not be used to endorse or promote products
57 *    derived from this software without specific prior written permission.
58 *
59 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
60 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
61 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
62 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
63 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
64 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
65 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
66 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
67 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
68 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
69 */
70
71/* #define INTRDEBUG */
72/* #define TRAPDEBUG */
73/* #define USERTRACE */
74
75#include "opt_kgdb.h"
76#include "opt_syscall_debug.h"
77#include "opt_ktrace.h"
78#include "opt_systrace.h"
79
80#include <sys/param.h>
81#include <sys/systm.h>
82#include <sys/kernel.h>
83#include <sys/syscall.h>
84#ifdef KTRACE
85#include <sys/ktrace.h>
86#endif
87#ifdef SYSTRACE
88#include <sys/systrace.h>
89#endif
90#include <sys/proc.h>
91#include <sys/signalvar.h>
92#include <sys/user.h>
93#include <sys/acct.h>
94#include <sys/signal.h>
95#include <sys/device.h>
96
97#include <net/netisr.h>
98
99#ifdef KGDB
100#include <sys/kgdb.h>
101#endif
102
103#include <uvm/uvm.h>
104
105#include <machine/iomod.h>
106#include <machine/cpufunc.h>
107#include <machine/reg.h>
108#include <machine/autoconf.h>
109
110#include <machine/db_machdep.h>
111
112#include <hppa/hppa/machdep.h>
113
114#if defined(INTRDEBUG) || defined(TRAPDEBUG)
115#include <ddb/db_output.h>
116#endif
117
118#if defined(DEBUG) || defined(DIAGNOSTIC)
119/*
120 * 0x6fc1000 is a stwm r1, d(sr0, sp), which is the last
121 * instruction in the function prologue that gcc -O0 uses.
122 * When we have this instruction we know the relationship
123 * between the stack pointer and the gcc -O0 frame pointer
124 * (in r3, loaded with the initial sp) for the body of a
125 * function.
126 *
127 * If the given instruction is a stwm r1, d(sr0, sp) where
128 * d > 0, we evaluate to d, else we evaluate to zero.
129 */
130#define STWM_R1_D_SR0_SP(inst) \
131	(((inst) & 0xffffc001) == 0x6fc10000 ? (((inst) & 0x00003ff) >> 1) : 0)
132#endif /* DEBUG || DIAGNOSTIC */
133
134const char *trap_type[] = {
135	"invalid",
136	"HPMC",
137	"power failure",
138	"recovery counter",
139	"external interrupt",
140	"LPMC",
141	"ITLB miss fault",
142	"instruction protection",
143	"Illegal instruction",
144	"break instruction",
145	"privileged operation",
146	"privileged register",
147	"overflow",
148	"conditional",
149	"assist exception",
150	"DTLB miss",
151	"ITLB non-access miss",
152	"DTLB non-access miss",
153	"data protection/rights/alignment",
154	"data break",
155	"TLB dirty",
156	"page reference",
157	"assist emulation",
158	"higher-priv transfer",
159	"lower-priv transfer",
160	"taken branch",
161	"data access rights",
162	"data protection",
163	"unaligned data ref",
164};
165int trap_types = sizeof(trap_type)/sizeof(trap_type[0]);
166
167int want_resched;
168volatile int astpending;
169
170void pmap_hptdump __P((void));
171void syscall __P((struct trapframe *frame, int *args));
172
173#ifdef USERTRACE
174/*
175 * USERTRACE is a crude facility that traces the PC of
176 * a single user process.  This tracing is normally
177 * activated by the dispatching of a certain syscall
178 * with certain arguments - see the activation code in
179 * syscall().
180 */
181u_int rctr_next_iioq;
182#endif
183
184static __inline void
185userret (struct proc *p, register_t pc, u_quad_t oticks)
186{
187	int sig;
188
189	/* take pending signals */
190	while ((sig = CURSIG(p)) != 0)
191		postsig(sig);
192
193	p->p_priority = p->p_usrpri;
194	if (want_resched) {
195		/*
196		 * We're being preempted.
197		 */
198		preempt(NULL);
199		while ((sig = CURSIG(p)) != 0)
200			postsig(sig);
201	}
202
203	/*
204	 * If profiling, charge recent system time to the trapped pc.
205	 */
206	if (p->p_flag & P_PROFIL) {
207		extern int psratio;
208
209		addupc_task(p, pc, (int)(p->p_sticks - oticks) * psratio);
210	}
211
212	curcpu()->ci_schedstate.spc_curpriority = p->p_priority;
213}
214
215/*
216 * This handles some messy kernel debugger details.
217 * It dispatches into either kgdb or DDB, and knows
218 * about some special things to do, like skipping over
219 * break instructions and how to really set up for
220 * a single-step.
221 */
222#if defined(KGDB) || defined(DDB)
223static int
224trap_kdebug(int type, int code, struct trapframe *frame)
225{
226	int handled;
227	u_int tf_iioq_head_old;
228	u_int tf_iioq_tail_old;
229
230	for(;;) {
231
232		/* This trap has not been handled. */
233		handled = 0;
234
235		/* Remember the instruction offset queue. */
236		tf_iioq_head_old = frame->tf_iioq_head;
237		tf_iioq_tail_old = frame->tf_iioq_tail;
238
239#ifdef	KGDB
240		/* Let KGDB handle it (if connected) */
241		if (!handled)
242			handled = kgdb_trap(type, frame);
243#endif
244#ifdef	DDB
245		/* Let DDB handle it. */
246		if (!handled)
247			handled = kdb_trap(type, code, frame);
248#endif
249
250		/* If this trap wasn't handled, return now. */
251		if (!handled)
252			return(0);
253
254		/*
255		 * If the instruction offset queue head changed,
256		 * but the offset queue tail didn't, assume that
257		 * the user wants to jump to the head offset, and
258		 * adjust the tail accordingly.  This should fix
259		 * the kgdb `jump' command, and can help DDB users
260		 * who `set' the offset head but forget the tail.
261		 */
262		if (frame->tf_iioq_head != tf_iioq_head_old &&
263		    frame->tf_iioq_tail == tf_iioq_tail_old)
264			frame->tf_iioq_tail = frame->tf_iioq_head + 4;
265
266		/*
267		 * This is some single-stepping support.
268		 * If we're trying to step through a nullified
269		 * instruction, just advance by hand and trap
270		 * again.  Otherwise, load the recovery counter
271		 * with zero.
272		 */
273		if (frame->tf_ipsw & PSW_R) {
274#ifdef TRAPDEBUG
275			printf("(single stepping at head 0x%x tail 0x%x)\n", frame->tf_iioq_head, frame->tf_iioq_tail);
276#endif
277			if (frame->tf_ipsw & PSW_N) {
278#ifdef TRAPDEBUG
279				printf("(single stepping past nullified)\n");
280#endif
281
282				/* Advance the program counter. */
283				frame->tf_iioq_head = frame->tf_iioq_tail;
284				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
285
286				/* Clear flags. */
287				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
288
289				/* Simulate another trap. */
290				type = T_RECOVERY;
291				continue;
292			}
293			frame->tf_rctr = 0;
294		}
295
296		/* We handled this trap. */
297		return (1);
298	}
299	/* NOTREACHED */
300}
301#else	/* !KGDB && !DDB */
302#define trap_kdebug(t, c, f)	(0)
303#endif	/* !KGDB && !DDB */
304
305#ifdef DIAGNOSTIC
306/*
307 * These functions give a crude usermode backtrace.  They
308 * really only work when code has been compiled without
309 * optimization, as they assume a certain function prologue
310 * sets up a frame pointer and stores the return pointer
311 * and arguments in it.
312 */
313static void user_backtrace_raw __P((u_int, u_int));
314static void
315user_backtrace_raw(u_int pc, u_int fp)
316{
317	int frame_number;
318	int arg_number;
319
320	for (frame_number = 0;
321	     frame_number < 100 && pc > HPPA_PC_PRIV_MASK && fp;
322	     frame_number++) {
323
324		printf("%3d: pc=%08x%s fp=0x%08x", frame_number,
325		    pc & ~HPPA_PC_PRIV_MASK, USERMODE(pc) ? "" : "**", fp);
326		for(arg_number = 0; arg_number < 4; arg_number++)
327			printf(" arg%d=0x%08x", arg_number,
328			    (int) fuword(HPPA_FRAME_CARG(arg_number, fp)));
329		printf("\n");
330                pc = fuword(((register_t *) fp) - 5);	/* fetch rp */
331		if (pc == -1) {
332			printf("  fuword for pc failed\n");
333			break;
334		}
335                fp = fuword(((register_t *) fp) + 0);	/* fetch previous fp */
336		if (fp == -1) {
337			printf("  fuword for fp failed\n");
338			break;
339		}
340	}
341	printf("  backtrace stopped with pc %08x fp 0x%08x\n", pc, fp);
342}
343
344static void user_backtrace __P((struct trapframe *, struct proc *, int));
345static void
346user_backtrace(struct trapframe *tf, struct proc *p, int type)
347{
348	u_int pc, fp, inst;
349
350	/*
351	 * Display any trap type that we have.
352	 */
353	if (type >= 0)
354		printf("pid %d (%s) trap #%d\n",
355		    p->p_pid, p->p_comm, type & ~T_USER);
356
357	/*
358	 * Assuming that the frame pointer in r3 is valid,
359	 * dump out a stack trace.
360	 */
361	fp = tf->tf_r3;
362	printf("pid %d (%s) backtrace, starting with fp 0x%08x\n",
363		p->p_pid, p->p_comm, fp);
364	user_backtrace_raw(tf->tf_iioq_head, fp);
365
366	/*
367	 * In case the frame pointer in r3 is not valid,
368	 * assuming the stack pointer is valid and the
369	 * faulting function is a non-leaf, if we can
370	 * find its prologue we can recover its frame
371	 * pointer.
372	 */
373	pc = tf->tf_iioq_head;
374	fp = tf->tf_sp - HPPA_FRAME_SIZE;
375	printf("pid %d (%s) backtrace, starting with sp 0x%08x pc 0x%08x\n",
376		p->p_pid, p->p_comm, tf->tf_sp, pc);
377	for(pc &= ~HPPA_PC_PRIV_MASK; pc > 0; pc -= sizeof(inst)) {
378		inst = fuword((register_t *) pc);
379		if (inst == -1) {
380			printf("  fuword for inst at pc %08x failed\n", pc);
381			break;
382		}
383		/* Check for the prologue instruction that sets sp. */
384		if (STWM_R1_D_SR0_SP(inst)) {
385			fp = tf->tf_sp - STWM_R1_D_SR0_SP(inst);
386			printf("  sp from fp at pc %08x: %08x\n", pc, inst);
387			break;
388		}
389	}
390	user_backtrace_raw(tf->tf_iioq_head, fp);
391}
392#endif /* DIAGNOSTIC */
393
394#ifdef DEBUG
395/*
396 * This sanity-checks a trapframe.  It is full of various
397 * assumptions about what a healthy CPU state should be,
398 * with some documented elsewhere, some not.
399 */
400struct trapframe *sanity_frame;
401struct proc *sanity_proc;
402int sanity_checked = 0;
403void frame_sanity_check __P((struct trapframe *, struct proc *));
404void
405frame_sanity_check(struct trapframe *tf, struct proc *p)
406{
407	extern int kernel_text;
408	extern int etext;
409	extern register_t kpsw;
410	extern vaddr_t hpt_base;
411	extern vsize_t hpt_mask;
412	vsize_t uspace_size;
413#define SANITY(e)					\
414do {							\
415	if (sanity_frame == NULL && !(e)) {		\
416		sanity_frame = tf;			\
417		sanity_proc = p;			\
418		sanity_checked = __LINE__;		\
419	}						\
420} while (/* CONSTCOND */ 0)
421
422	SANITY((tf->tf_ipsw & kpsw) == kpsw);
423	SANITY(tf->tf_hptm == hpt_mask && tf->tf_vtop == hpt_base);
424	SANITY((kpsw & PSW_I) == 0 || tf->tf_eiem != 0);
425	if (tf->tf_iisq_head == HPPA_SID_KERNEL) {
426		/*
427		 * If the trap happened in the gateway
428		 * page, we take the easy way out and
429		 * assume that the trapframe is okay.
430		 */
431		if ((tf->tf_iioq_head & ~PAGE_MASK) != SYSCALLGATE) {
432			SANITY(!USERMODE(tf->tf_iioq_head));
433			SANITY(!USERMODE(tf->tf_iioq_tail));
434			SANITY(tf->tf_iioq_head >= (u_int) &kernel_text);
435			SANITY(tf->tf_iioq_head < (u_int) &etext);
436			SANITY(tf->tf_iioq_tail >= (u_int) &kernel_text);
437			SANITY(tf->tf_iioq_tail < (u_int) &etext);
438#ifdef HPPA_REDZONE
439			uspace_size = HPPA_REDZONE;
440#else
441			uspace_size = USPACE;
442#endif
443			SANITY(p == NULL ||
444				((tf->tf_sp >= (u_int)(p->p_addr) + NBPG &&
445				  tf->tf_sp < (u_int)(p->p_addr) + uspace_size)));
446		}
447	} else {
448		SANITY(USERMODE(tf->tf_iioq_head));
449		SANITY(USERMODE(tf->tf_iioq_tail));
450		SANITY(p != NULL && tf->tf_cr30 == kvtop((caddr_t)p->p_addr));
451	}
452#undef SANITY
453	if (sanity_frame == tf) {
454		trap_kdebug(T_IBREAK, 0, tf);
455		sanity_frame = NULL;
456		sanity_proc = NULL;
457		sanity_checked = 0;
458	}
459}
460#endif /* DEBUG */
461
462void
463trap(type, frame)
464	int type;
465	struct trapframe *frame;
466{
467	struct proc *p = curproc;
468	struct pcb *pcbp;
469	register vaddr_t va;
470	register struct vm_map *map;
471	struct vmspace *vm;
472	register vm_prot_t vftype;
473	register pa_space_t space;
474	u_int opcode;
475	int ret;
476	const char *tts;
477	int type_raw;
478#ifdef DIAGNOSTIC
479	extern int emergency_stack_start, emergency_stack_end;
480#endif
481
482	type_raw = type & ~T_USER;
483	opcode = frame->tf_iir;
484	if (type_raw == T_ITLBMISS || type_raw == T_ITLBMISSNA) {
485		va = frame->tf_iioq_head;
486		space = frame->tf_iisq_head;
487		vftype = VM_PROT_READ;	/* XXX VM_PROT_EXECUTE ??? */
488	} else {
489		va = frame->tf_ior;
490		space = frame->tf_isr;
491		vftype = inst_store(opcode) ? VM_PROT_WRITE : VM_PROT_READ;
492	}
493
494#ifdef DIAGNOSTIC
495	/*
496	 * If we are on the emergency stack, then we either got
497	 * a fault on the kernel stack, or we're just handling
498	 * a trap for the machine check handler (which also
499	 * runs on the emergency stack).
500	 *
501	 * We *very crudely* differentiate between the two cases
502	 * by checking the faulting instruction: if it is the
503	 * function prologue instruction that stores the old
504	 * frame pointer and updates the stack pointer, we assume
505	 * that we faulted on the kernel stack.
506	 *
507	 * In this case, not completing that instruction will
508	 * probably confuse backtraces in kgdb/ddb.  Completing
509	 * it would be difficult, because we already faulted on
510	 * that part of the stack, so instead we fix up the
511	 * frame as if the function called has just returned.
512	 * This has peculiar knowledge about what values are in
513	 * what registers during the "normal gcc -g" prologue.
514	 */
515	if (&type >= &emergency_stack_start &&
516	    &type < &emergency_stack_end &&
517	    type != T_IBREAK && STWM_R1_D_SR0_SP(opcode)) {
518		/* Restore the caller's frame pointer. */
519		frame->tf_r3 = frame->tf_r1;
520		/* Restore the caller's instruction offsets. */
521		frame->tf_iioq_head = frame->tf_rp;
522		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
523		goto dead_end;
524	}
525#endif /* DIAGNOSTIC */
526
527#ifdef DEBUG
528	frame_sanity_check(frame, p);
529#endif /* DEBUG */
530
531	/* If this is a trap, not an interrupt, reenable interrupts. */
532	if (type_raw != T_INTERRUPT)
533		mtctl(frame->tf_eiem, CR_EIEM);
534
535	if (frame->tf_flags & TFF_LAST)
536		p->p_md.md_regs = frame;
537
538	if ((type & ~T_USER) > trap_types)
539		tts = "reserved";
540	else
541		tts = trap_type[type & ~T_USER];
542
543#ifdef TRAPDEBUG
544	if (type_raw != T_INTERRUPT && type_raw != T_IBREAK)
545		printf("trap: %d, %s for %x:%x at %x:%x, fp=%p, rp=%x\n",
546		    type, tts, space, (u_int)va, frame->tf_iisq_head,
547		    frame->tf_iioq_head, frame, frame->tf_rp);
548	else if (type_raw == T_IBREAK)
549		printf("trap: break instruction %x:%x at %x:%x, fp=%p\n",
550		    break5(opcode), break13(opcode),
551		    frame->tf_iisq_head, frame->tf_iioq_head, frame);
552
553	{
554		extern int etext;
555		if (frame < (struct trapframe *)&etext) {
556			printf("trap: bogus frame ptr %p\n", frame);
557			goto dead_end;
558		}
559	}
560#endif
561	switch (type) {
562	case T_NONEXIST:
563	case T_NONEXIST|T_USER:
564#if !defined(DDB) && !defined(KGDB)
565		/* we've got screwed up by the central scrutinizer */
566		panic ("trap: elvis has just left the building!");
567		break;
568#else
569		goto dead_end;
570#endif
571	case T_RECOVERY|T_USER:
572#ifdef USERTRACE
573		for(;;) {
574			if (frame->tf_iioq_head != rctr_next_iioq)
575				printf("-%08x\nr %08x",
576					rctr_next_iioq - 4,
577					frame->tf_iioq_head);
578			rctr_next_iioq = frame->tf_iioq_head + 4;
579			if (frame->tf_ipsw & PSW_N) {
580				/* Advance the program counter. */
581				frame->tf_iioq_head = frame->tf_iioq_tail;
582				frame->tf_iioq_tail = frame->tf_iioq_head + 4;
583				/* Clear flags. */
584				frame->tf_ipsw &= ~(PSW_N|PSW_X|PSW_Y|PSW_Z|PSW_B|PSW_T|PSW_H|PSW_L);
585				/* Simulate another trap. */
586				continue;
587			}
588			break;
589		}
590		frame->tf_rctr = 0;
591		break;
592#endif /* USERTRACE */
593	case T_RECOVERY:
594#if !defined(DDB) && !defined(KGDB)
595		/* XXX will implement later */
596		printf ("trap: handicapped");
597		break;
598#else
599		goto dead_end;
600#endif
601
602	case T_EMULATION | T_USER:
603#ifdef FPEMUL
604		hppa_fpu_emulate(frame, p);
605#else  /* !FPEMUL */
606		/*
607		 * We don't have FPU emulation, so signal the
608		 * process with a SIGFPE.
609		 */
610		trapsignal(p, SIGFPE, frame->tf_iioq_head);
611#endif /* !FPEMUL */
612		break;
613
614#ifdef DIAGNOSTIC
615	case T_EXCEPTION:
616		panic("FPU/SFU emulation botch");
617
618		/* these just can't happen ever */
619	case T_PRIV_OP:
620	case T_PRIV_REG:
621		/* these just can't make it to the trap() ever */
622	case T_HPMC:      case T_HPMC | T_USER:
623	case T_EMULATION:
624#endif
625	case T_IBREAK:
626	case T_DATALIGN:
627	case T_DBREAK:
628	dead_end:
629		if (type & T_USER) {
630#ifdef DEBUG
631			user_backtrace(frame, p, type);
632#endif
633			trapsignal(p, SIGILL, frame->tf_iioq_head);
634			break;
635		}
636		if (trap_kdebug(type, va, frame))
637			return;
638		else if (type == T_DATALIGN)
639			panic ("trap: %s at 0x%x", tts, (u_int) va);
640		else
641			panic ("trap: no debugger for \"%s\" (%d)", tts, type);
642		break;
643
644	case T_IBREAK | T_USER:
645	case T_DBREAK | T_USER:
646		/* pass to user debugger */
647		break;
648
649	case T_EXCEPTION | T_USER:	/* co-proc assist trap */
650		trapsignal(p, SIGFPE, va);
651		break;
652
653	case T_OVERFLOW | T_USER:
654		trapsignal(p, SIGFPE, va);
655		break;
656
657	case T_CONDITION | T_USER:
658		break;
659
660	case T_ILLEGAL | T_USER:
661#ifdef DEBUG
662		user_backtrace(frame, p, type);
663#endif
664		trapsignal(p, SIGILL, va);
665		break;
666
667	case T_PRIV_OP | T_USER:
668#ifdef DEBUG
669		user_backtrace(frame, p, type);
670#endif
671		trapsignal(p, SIGILL, va);
672		break;
673
674	case T_PRIV_REG | T_USER:
675#ifdef DEBUG
676		user_backtrace(frame, p, type);
677#endif
678		trapsignal(p, SIGILL, va);
679		break;
680
681		/* these should never got here */
682	case T_HIGHERPL | T_USER:
683	case T_LOWERPL | T_USER:
684		trapsignal(p, SIGSEGV, va);
685		break;
686
687	case T_IPROT | T_USER:
688	case T_DPROT | T_USER:
689		trapsignal(p, SIGSEGV, va);
690		break;
691
692	case T_DATACC:   	case T_USER | T_DATACC:
693	case T_ITLBMISS:	case T_USER | T_ITLBMISS:
694	case T_DTLBMISS:	case T_USER | T_DTLBMISS:
695	case T_ITLBMISSNA:	case T_USER | T_ITLBMISSNA:
696	case T_DTLBMISSNA:	case T_USER | T_DTLBMISSNA:
697	case T_TLB_DIRTY:	case T_USER | T_TLB_DIRTY:
698		va = hppa_trunc_page(va);
699		vm = p->p_vmspace;
700
701		if (!vm) {
702#ifdef TRAPDEBUG
703			printf("trap: no vm, p=%p\n", p);
704#endif
705			goto dead_end;
706		}
707
708		/*
709		 * it could be a kernel map for exec_map faults
710		 */
711		if (!(type & T_USER) && space == HPPA_SID_KERNEL)
712			map = kernel_map;
713		else
714			map = &vm->vm_map;
715
716		if (map->pmap->pmap_space != space) {
717#ifdef TRAPDEBUG
718			printf("trap: space missmatch %d != %d\n",
719			    space, map->pmap->pmap_space);
720#endif
721			/* actually dump the user, crap the kernel */
722			goto dead_end;
723		}
724
725		/* Never call uvm_fault in interrupt context. */
726		KASSERT(hppa_intr_depth == 0);
727
728		ret = uvm_fault(map, va, 0, vftype);
729
730#ifdef TRAPDEBUG
731		printf("uvm_fault(%p, %x, %d, %d)=%d\n",
732		    map, (u_int)va, 0, vftype, ret);
733#endif
734
735		/*
736		 * If this was a stack access we keep track of the maximum
737		 * accessed stack size.  Also, if uvm_fault gets a protection
738		 * failure it is due to accessing the stack region outside
739		 * the current limit and we need to reflect that as an access
740		 * error.
741		 */
742		if (va >= (vaddr_t)vm->vm_maxsaddr + vm->vm_ssize) {
743			if (ret == 0) {
744				vsize_t nss = btoc(va - USRSTACK + NBPG);
745				if (nss > vm->vm_ssize)
746					vm->vm_ssize = nss;
747			} else if (ret == EACCES)
748				ret = EFAULT;
749		}
750
751		if (ret != 0) {
752			if (type & T_USER) {
753printf("trapsignal: uvm_fault(%p, %x, %d, %d)=%d\n",
754	map, (u_int)va, 0, vftype, ret);
755#ifdef DEBUG
756				user_backtrace(frame, p, type);
757#endif
758				trapsignal(p, SIGSEGV, frame->tf_ior);
759			} else {
760				if (p && p->p_addr->u_pcb.pcb_onfault) {
761#ifdef PMAPDEBUG
762					printf("trap: copyin/out %d\n",ret);
763#endif
764					pcbp = &p->p_addr->u_pcb;
765					frame->tf_iioq_tail = 4 +
766					    (frame->tf_iioq_head =
767						pcbp->pcb_onfault);
768					pcbp->pcb_onfault = 0;
769					break;
770				}
771#if 1
772if (trap_kdebug (type, va, frame))
773	return;
774#else
775				panic("trap: uvm_fault(%p, %x, %d, %d): %d",
776				    map, va, 0, vftype, ret);
777#endif
778			}
779		}
780		break;
781
782	case T_DATALIGN | T_USER:
783#ifdef DEBUG
784		user_backtrace(frame, p, type);
785#endif
786		trapsignal(p, SIGBUS, va);
787		break;
788
789	case T_INTERRUPT:
790	case T_INTERRUPT|T_USER:
791		hppa_intr(frame);
792		mtctl(frame->tf_eiem, CR_EIEM);
793#if 0
794if (trap_kdebug (type, va, frame))
795return;
796#endif
797		break;
798	case T_LOWERPL:
799	case T_DPROT:
800	case T_IPROT:
801	case T_OVERFLOW:
802	case T_CONDITION:
803	case T_ILLEGAL:
804	case T_HIGHERPL:
805	case T_TAKENBR:
806	case T_POWERFAIL:
807	case T_LPMC:
808	case T_PAGEREF:
809	case T_DATAPID:  	case T_DATAPID  | T_USER:
810		if (0 /* T-chip */) {
811			break;
812		}
813		/* FALLTHROUGH to unimplemented */
814	default:
815#if 1
816if (trap_kdebug (type, va, frame))
817	return;
818#endif
819		panic ("trap: unimplemented \'%s\' (%d)", tts, type);
820	}
821
822	if (type & T_USER)
823		userret(p, p->p_md.md_regs->tf_iioq_head, 0);
824
825#ifdef DEBUG
826	frame_sanity_check(frame, p);
827	if (frame->tf_flags & TFF_LAST && curproc != NULL)
828		frame_sanity_check(curproc->p_md.md_regs, curproc);
829#endif /* DEBUG */
830}
831
832void
833child_return(arg)
834	void *arg;
835{
836	struct proc *p = arg;
837
838	userret(p, p->p_md.md_regs->tf_iioq_head, 0);
839#ifdef KTRACE
840	if (KTRPOINT(p, KTR_SYSRET))
841		ktrsysret(p, SYS_fork, 0, 0);
842#endif
843#ifdef DEBUG
844	frame_sanity_check(p->p_md.md_regs, p);
845#endif /* DEBUG */
846}
847
848/*
849 * call actual syscall routine
850 * from the low-level syscall handler:
851 * - all HPPA_FRAME_NARGS syscall's arguments supposed to be copied onto
852 *   our stack, this wins compared to copyin just needed amount anyway
853 * - register args are copied onto stack too
854 */
855void
856syscall(frame, args)
857	struct trapframe *frame;
858	int *args;
859{
860	register struct proc *p;
861	register const struct sysent *callp;
862	int nsys, code, argsize, error;
863	int tmp;
864	int rval[2];
865
866	uvmexp.syscalls++;
867
868#ifdef DEBUG
869	frame_sanity_check(frame, curproc);
870#endif /* DEBUG */
871
872	if (!USERMODE(frame->tf_iioq_head))
873		panic("syscall");
874
875	p = curproc;
876	p->p_md.md_regs = frame;
877	nsys = p->p_emul->e_nsysent;
878	callp = p->p_emul->e_sysent;
879	code = frame->tf_t1;
880
881	/*
882	 * Restarting a system call is touchy on the HPPA,
883	 * because syscall arguments are passed in registers
884	 * and the program counter of the syscall "point"
885	 * isn't easily divined.
886	 *
887	 * We handle the first problem by assuming that we
888	 * will have to restart this system call, so we
889	 * stuff the first four words of the original arguments
890	 * back into the frame as arg0...arg3, which is where
891	 * we found them in the first place.  Any further
892	 * arguments are (still) on the user's stack and the
893	 * syscall code will fetch them from there (again).
894	 *
895	 * The program counter problem is addressed below.
896	 */
897	frame->tf_arg0 = args[0];
898	frame->tf_arg1 = args[1];
899	frame->tf_arg2 = args[2];
900	frame->tf_arg3 = args[3];
901
902	/*
903	 * Some special handling for the syscall(2) and
904	 * __syscall(2) system calls.
905	 */
906	switch (code) {
907	case SYS_syscall:
908		code = *args;
909		args += 1;
910		break;
911	case SYS___syscall:
912		if (callp != sysent)
913			break;
914		/*
915		 * NB: even though __syscall(2) takes a quad_t
916		 * containing the system call number, because
917		 * our argument copying word-swaps 64-bit arguments,
918		 * the least significant word of that quad_t
919		 * is the first word in the argument array.
920		 */
921		code = *args;
922		args += 2;
923	}
924
925	/*
926	 * Stacks growing from lower addresses to higher
927	 * addresses are not really such a good idea, because
928	 * it makes it impossible to overlay a struct on top
929	 * of C stack arguments (the arguments appear in
930	 * reversed order).
931	 *
932	 * You can do the obvious thing (as locore.S does) and
933	 * copy argument words one by one, laying them out in
934	 * the "right" order in the destination buffer, but this
935	 * ends up word-swapping multi-word arguments (like off_t).
936	 *
937	 * To compensate, we have some automatically-generated
938	 * code that word-swaps these multi-word arguments.
939	 * Right now the script that generates this code is
940	 * in Perl, because I don't know awk.
941	 *
942	 * FIXME - this works only on native binaries and
943	 * will probably screw up any and all emulation.
944	 */
945	switch (code) {
946	/*
947	 * BEGIN automatically generated
948	 * by /home/fredette/project/hppa/makescargfix.pl
949	 * do not edit!
950	 */
951	case SYS_pread:
952		/*
953		 * 	syscallarg(int) fd;
954		 * 	syscallarg(void *) buf;
955		 * 	syscallarg(size_t) nbyte;
956		 * 	syscallarg(int) pad;
957		 * 	syscallarg(off_t) offset;
958		 */
959		tmp = args[4];
960		args[4] = args[4 + 1];
961		args[4 + 1] = tmp;
962		break;
963	case SYS_pwrite:
964		/*
965		 * 	syscallarg(int) fd;
966		 * 	syscallarg(const void *) buf;
967		 * 	syscallarg(size_t) nbyte;
968		 * 	syscallarg(int) pad;
969		 * 	syscallarg(off_t) offset;
970		 */
971		tmp = args[4];
972		args[4] = args[4 + 1];
973		args[4 + 1] = tmp;
974		break;
975	case SYS_mmap:
976		/*
977		 * 	syscallarg(void *) addr;
978		 * 	syscallarg(size_t) len;
979		 * 	syscallarg(int) prot;
980		 * 	syscallarg(int) flags;
981		 * 	syscallarg(int) fd;
982		 * 	syscallarg(long) pad;
983		 * 	syscallarg(off_t) pos;
984		 */
985		tmp = args[6];
986		args[6] = args[6 + 1];
987		args[6 + 1] = tmp;
988		break;
989	case SYS_lseek:
990		/*
991		 * 	syscallarg(int) fd;
992		 * 	syscallarg(int) pad;
993		 * 	syscallarg(off_t) offset;
994		 */
995		tmp = args[2];
996		args[2] = args[2 + 1];
997		args[2 + 1] = tmp;
998		break;
999	case SYS_truncate:
1000		/*
1001		 * 	syscallarg(const char *) path;
1002		 * 	syscallarg(int) pad;
1003		 * 	syscallarg(off_t) length;
1004		 */
1005		tmp = args[2];
1006		args[2] = args[2 + 1];
1007		args[2 + 1] = tmp;
1008		break;
1009	case SYS_ftruncate:
1010		/*
1011		 * 	syscallarg(int) fd;
1012		 * 	syscallarg(int) pad;
1013		 * 	syscallarg(off_t) length;
1014		 */
1015		tmp = args[2];
1016		args[2] = args[2 + 1];
1017		args[2 + 1] = tmp;
1018		break;
1019	case SYS_preadv:
1020		/*
1021		 * 	syscallarg(int) fd;
1022		 * 	syscallarg(const struct iovec *) iovp;
1023		 * 	syscallarg(int) iovcnt;
1024		 * 	syscallarg(int) pad;
1025		 * 	syscallarg(off_t) offset;
1026		 */
1027		tmp = args[4];
1028		args[4] = args[4 + 1];
1029		args[4 + 1] = tmp;
1030		break;
1031	case SYS_pwritev:
1032		/*
1033		 * 	syscallarg(int) fd;
1034		 * 	syscallarg(const struct iovec *) iovp;
1035		 * 	syscallarg(int) iovcnt;
1036		 * 	syscallarg(int) pad;
1037		 * 	syscallarg(off_t) offset;
1038		 */
1039		tmp = args[4];
1040		args[4] = args[4 + 1];
1041		args[4 + 1] = tmp;
1042		break;
1043	default:
1044		break;
1045	/*
1046	 * END automatically generated
1047	 * by /home/fredette/project/hppa/makescargfix.pl
1048	 * do not edit!
1049	 */
1050	}
1051
1052#ifdef USERTRACE
1053	if (0) {
1054		user_backtrace(frame, p, -1);
1055		frame->tf_ipsw |= PSW_R;
1056		frame->tf_rctr = 0;
1057		printf("r %08x", frame->tf_iioq_head);
1058		rctr_next_iioq = frame->tf_iioq_head + 4;
1059	}
1060#endif
1061
1062	if (code < 0 || code >= nsys)
1063		callp += p->p_emul->e_nosys;	/* bad syscall # */
1064	else
1065		callp += code;
1066	argsize = callp->sy_argsize;
1067
1068	if ((error = trace_enter(p, code, args, rval)) != 0)
1069		goto bad;
1070
1071	rval[0] = 0;
1072	rval[1] = 0;
1073	switch (error = (*callp->sy_call)(p, args, rval)) {
1074	case 0:
1075		p = curproc;			/* changes on exec() */
1076		frame = p->p_md.md_regs;
1077		frame->tf_ret0 = rval[0];
1078		frame->tf_ret1 = rval[1];
1079		frame->tf_t1 = 0;
1080		break;
1081	case ERESTART:
1082		/*
1083		 * Now we have to wind back the instruction
1084		 * offset queue to the point where the system
1085		 * call will be made again.  This is inherently
1086		 * tied to the SYSCALL macro.
1087		 *
1088		 * Currently, the part of the SYSCALL macro
1089		 * that we want to rerun reads as:
1090		 *
1091		 *	ldil	L%SYSCALLGATE, r1
1092		 *	ble	4(sr7, r1)
1093		 *	ldi	__CONCAT(SYS_,x), t1
1094		 *	ldw	HPPA_FRAME_ERP(sr0,sp), rp
1095		 *
1096		 * And our offset queue head points to the
1097		 * final ldw instruction.  So we need to
1098		 * subtract twelve to reach the ldil.
1099		 */
1100		frame->tf_iioq_head -= 12;
1101		frame->tf_iioq_tail = frame->tf_iioq_head + 4;
1102		break;
1103	case EJUSTRETURN:
1104		p = curproc;
1105		break;
1106	default:
1107	bad:
1108		if (p->p_emul->e_errno)
1109			error = p->p_emul->e_errno[error];
1110		frame->tf_t1 = error;
1111		break;
1112	}
1113
1114	trace_exit(p, code, args, rval, error);
1115
1116	userret(p, frame->tf_iioq_head, 0);
1117#ifdef DEBUG
1118	frame_sanity_check(frame, p);
1119#endif /* DEBUG */
1120}
1121