xref: /netbsd-src/sys/arch/powerpc/booke/trap.c (revision 9a1c8f8ab23fefe6d09a68997185e909841b5c27)
1 /*	$NetBSD: trap.c,v 1.41 2024/09/08 10:16:04 andvar Exp $	*/
2 /*-
3  * Copyright (c) 2010, 2011 The NetBSD Foundation, Inc.
4  * All rights reserved.
5  *
6  * This code is derived from software contributed to The NetBSD Foundation
7  * by Raytheon BBN Technologies Corp and Defense Advanced Research Projects
8  * Agency and which was developed by Matt Thomas of 3am Software Foundry.
9  *
10  * This material is based upon work supported by the Defense Advanced Research
11  * Projects Agency and Space and Naval Warfare Systems Center, Pacific, under
12  * Contract No. N66001-09-C-2073.
13  * Approved for Public Release, Distribution Unlimited
14  *
15  * Redistribution and use in source and binary forms, with or without
16  * modification, are permitted provided that the following conditions
17  * are met:
18  * 1. Redistributions of source code must retain the above copyright
19  *    notice, this list of conditions and the following disclaimer.
20  * 2. Redistributions in binary form must reproduce the above copyright
21  *    notice, this list of conditions and the following disclaimer in the
22  *    documentation and/or other materials provided with the distribution.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
25  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
27  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
28  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34  * POSSIBILITY OF SUCH DAMAGE.
35  */
36 
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(1, "$NetBSD: trap.c,v 1.41 2024/09/08 10:16:04 andvar Exp $");
39 
40 #ifdef _KERNEL_OPT
41 #include "opt_altivec.h"
42 #include "opt_ddb.h"
43 #endif
44 
45 #include <sys/param.h>
46 #include <sys/cpu.h>
47 #include <sys/kauth.h>
48 #include <sys/lwp.h>
49 #include <sys/proc.h>
50 #include <sys/ptrace.h>
51 #include <sys/ras.h>
52 #include <sys/siginfo.h>
53 #include <sys/systm.h>
54 
55 #include <ddb/ddb.h>
56 
57 #include <uvm/uvm_extern.h>
58 
59 #include <powerpc/altivec.h>		/* use same interface for SPE */
60 #include <powerpc/instr.h>
61 #include <powerpc/pcb.h>
62 #include <powerpc/psl.h>
63 #include <powerpc/spr.h>
64 #include <powerpc/trap.h>
65 #include <powerpc/userret.h>
66 
67 #include <powerpc/fpu/fpu_extern.h>
68 
69 #include <powerpc/booke/cpuvar.h>
70 #include <powerpc/booke/pte.h>
71 #include <powerpc/booke/spr.h>
72 #include <powerpc/booke/trap.h>
73 
74 void trap(enum ppc_booke_exceptions, struct trapframe *);
75 
76 static const char trap_names[][8] = {
77 	[T_CRITIAL_INPUT] = "CRIT",
78 	[T_EXTERNAL_INPUT] = "EXT",
79 	[T_DECREMENTER] = "DECR",
80 	[T_FIXED_INTERVAL] = "FIT",
81 	[T_WATCHDOG] = "WDOG",
82 	[T_SYSTEM_CALL] = "SC",
83 	[T_MACHINE_CHECK] = "MCHK",
84 	[T_DSI] = "DSI",
85 	[T_ISI] = "ISI",
86 	[T_ALIGNMENT] = "ALN",
87 	[T_PROGRAM] = "PGM",
88 	[T_FP_UNAVAILABLE] = "FP",
89 	[T_AP_UNAVAILABLE] = "AP",
90 	[T_DATA_TLB_ERROR] = "DTLB",
91 	[T_INSTRUCTION_TLB_ERROR] = "ITLB",
92 	[T_DEBUG] = "DEBUG",
93 	[T_SPE_UNAVAILABLE] = "SPE",
94 	[T_EMBEDDED_FP_DATA] = "FPDATA",
95 	[T_EMBEDDED_FP_ROUND] = "FPROUND",
96 	[T_EMBEDDED_PERF_MONITOR] = "PERFMON",
97 	[T_AST] = "AST",
98 };
99 
100 static inline bool
101 usertrap_p(struct trapframe *tf)
102 {
103 	return (tf->tf_srr1 & PSL_PR) != 0;
104 }
105 
106 static int
107 mchk_exception(struct trapframe *tf, ksiginfo_t *ksi)
108 {
109 	const bool usertrap = usertrap_p(tf);
110 	const vaddr_t faultva = tf->tf_mcar;
111 	struct cpu_info * const ci = curcpu();
112 	int rv = EFAULT;
113 
114 	if (usertrap) {
115 		ci->ci_ev_umchk.ev_count++;
116 		KSI_INIT_TRAP(ksi);
117 		ksi->ksi_signo = SIGBUS;
118 		ksi->ksi_trap = EXC_MCHK;
119 		ksi->ksi_addr = (void *)faultva;
120 		ksi->ksi_code = BUS_OBJERR;
121 	}
122 
123 	return rv;
124 }
125 
126 static inline vm_prot_t
127 get_faulttype(const struct trapframe * const tf)
128 {
129 	return VM_PROT_READ | (tf->tf_esr & ESR_ST ? VM_PROT_WRITE : 0);
130 }
131 
132 static inline struct vm_map *
133 get_faultmap(const struct trapframe * const tf, register_t psl_mask)
134 {
135 	return (tf->tf_srr1 & psl_mask)
136 	    ? &curlwp->l_proc->p_vmspace->vm_map
137 	    : kernel_map;
138 }
139 
140 /*
141  * We could use pmap_pte_lookup but this slightly faster since we already
142  * the segtab pointers in cpu_info.
143  */
144 static inline pt_entry_t *
145 trap_pte_lookup(struct trapframe *tf, vaddr_t va, register_t psl_mask)
146 {
147 	pmap_segtab_t ** const stbs = &curcpu()->ci_pmap_kern_segtab;
148 	pmap_segtab_t * const stb = stbs[(tf->tf_srr1 / psl_mask) & 1];
149 	if (__predict_false(stb == NULL))
150 		return NULL;
151 
152 	pmap_ptpage_t * const ppg = stb->seg_ppg[va >> SEGSHIFT];
153 	if (__predict_false(ppg == NULL))
154 		return NULL;
155 	const size_t pte_idx = (va >> PGSHIFT) & (NPTEPG - 1);
156 
157 	return ppg->ppg_ptes + pte_idx;
158 }
159 
160 static int
161 pagefault(struct vm_map *map, vaddr_t va, vm_prot_t ftype, bool usertrap)
162 {
163 	struct lwp * const l = curlwp;
164 	int rv;
165 
166 //	printf("%s(%p,%#lx,%u,%u)\n", __func__, map, va, ftype, usertrap);
167 
168 	if (usertrap) {
169 		rv = uvm_fault(map, trunc_page(va), ftype);
170 		if (rv == 0)
171 			uvm_grow(l->l_proc, trunc_page(va));
172 	} else {
173 		if (cpu_intr_p())
174 			return EFAULT;
175 
176 		struct pcb * const pcb = lwp_getpcb(l);
177 		struct faultbuf * const fb = pcb->pcb_onfault;
178 		pcb->pcb_onfault = NULL;
179 		rv = uvm_fault(map, trunc_page(va), ftype);
180 		pcb->pcb_onfault = fb;
181 		if (map != kernel_map) {
182 			if (rv == 0)
183 				uvm_grow(l->l_proc, trunc_page(va));
184 		}
185 	}
186 	return rv;
187 }
188 
189 static void
190 vm_signal(int error, int trap, vaddr_t addr, ksiginfo_t *ksi)
191 {
192 
193 	KSI_INIT_TRAP(ksi);
194 	switch (error) {
195 	case EINVAL:
196 		ksi->ksi_signo = SIGBUS;
197 		ksi->ksi_code = BUS_ADRERR;
198 		break;
199 	case EACCES:
200 		ksi->ksi_signo = SIGSEGV;
201 		ksi->ksi_code = SEGV_ACCERR;
202 		break;
203 	default:
204 		ksi->ksi_signo = SIGSEGV;
205 		ksi->ksi_code = SEGV_MAPERR;
206 		break;
207 	}
208 	ksi->ksi_trap = trap;
209 	ksi->ksi_addr = (void *)addr;
210 }
211 
212 static int
213 dsi_exception(struct trapframe *tf, ksiginfo_t *ksi)
214 {
215 	const vaddr_t faultva = tf->tf_dear;
216 	const vm_prot_t ftype = get_faulttype(tf);
217 	struct vm_map * const faultmap = get_faultmap(tf, PSL_DS);
218 	const bool usertrap = usertrap_p(tf);
219 
220 	kpreempt_disable();
221 	struct cpu_info * const ci = curcpu();
222 
223 	if (usertrap)
224 		ci->ci_ev_udsi.ev_count++;
225 	else
226 		ci->ci_ev_kdsi.ev_count++;
227 
228 	/*
229 	 * If we had a TLB entry (which we must have had to get this exception),
230 	 * we certainly have a PTE.
231 	 */
232 	pt_entry_t * const ptep = trap_pte_lookup(tf, trunc_page(faultva),
233 	    PSL_DS);
234 	KASSERT(ptep != NULL);
235 	pt_entry_t pte = *ptep;
236 
237 	if ((ftype & VM_PROT_WRITE)
238 	    && ((pte & (PTE_xW|PTE_UNMODIFIED)) == (PTE_xW|PTE_UNMODIFIED))) {
239 		const paddr_t pa = pte_to_paddr(pte);
240 		struct vm_page * const pg = PHYS_TO_VM_PAGE(pa);
241 		KASSERT(pg);
242 		struct vm_page_md * const mdpg = VM_PAGE_TO_MD(pg);
243 
244 		if (!VM_PAGEMD_MODIFIED_P(mdpg)) {
245 			pmap_page_set_attributes(mdpg, VM_PAGEMD_MODIFIED);
246 		}
247 		pte &= ~PTE_UNMODIFIED;
248 		*ptep = pte;
249 		pmap_tlb_update_addr(faultmap->pmap, trunc_page(faultva),
250 		    pte, 0);
251 		kpreempt_enable();
252 		return 0;
253 	}
254 	kpreempt_enable();
255 
256 	int rv = pagefault(faultmap, faultva, ftype, usertrap);
257 
258 	if (__predict_false(rv != 0 && usertrap)) {
259 		ci->ci_ev_udsi_fatal.ev_count++;
260 		vm_signal(rv, EXC_DSI, faultva, ksi);
261 	}
262 	return rv;
263 }
264 
265 static int
266 isi_exception(struct trapframe *tf, ksiginfo_t *ksi)
267 {
268 	const vaddr_t faultva = trunc_page(tf->tf_srr0);
269 	struct vm_map * const faultmap = get_faultmap(tf, PSL_IS);
270 	const bool usertrap = usertrap_p(tf);
271 
272 	kpreempt_disable();
273 	struct cpu_info * const ci = curcpu();
274 
275 	if (usertrap)
276 		ci->ci_ev_isi.ev_count++;
277 	else
278 		ci->ci_ev_kisi.ev_count++;
279 
280 	/*
281 	 * If we had a TLB entry (which we must have had to get this exception),
282 	 * we certainly have a PTE.
283 	 */
284 	pt_entry_t * const ptep = trap_pte_lookup(tf, trunc_page(faultva),
285 	    PSL_IS);
286 	if (ptep == NULL)
287 		dump_trapframe(tf, NULL);
288 	KASSERT(ptep != NULL);
289 	pt_entry_t pte = *ptep;
290 
291 	UVMHIST_FUNC(__func__); UVMHIST_CALLED(pmapexechist);
292 
293 	if ((pte & PTE_UNSYNCED) == PTE_UNSYNCED) {
294 		const paddr_t pa = pte_to_paddr(pte);
295 		struct vm_page * const pg = PHYS_TO_VM_PAGE(pa);
296 		KASSERT(pg);
297 		struct vm_page_md * const mdpg = VM_PAGE_TO_MD(pg);
298 
299 #ifdef UVMHIST
300 		if (VM_PAGEMD_EXECPAGE_P(mdpg))
301 			UVMHIST_LOG(pmapexechist,
302 			    "srr0=%#x pg=%p (pa %#"PRIxPADDR"): "
303 			    "no syncicache (already execpage)",
304 			    tf->tf_srr0, (uintptr_t)pg, pa, 0);
305 		else
306 			UVMHIST_LOG(pmapexechist,
307 			    "srr0=%#x pg=%p (pa %#"PRIxPADDR"): "
308 			    "performed syncicache (now execpage)",
309 			    tf->tf_srr0, (uintptr_t)pg, pa, 0);
310 #endif
311 
312 		if (!VM_PAGEMD_EXECPAGE_P(mdpg)) {
313 			ci->ci_softc->cpu_ev_exec_trap_sync.ev_count++;
314 			dcache_wb_page(pa);
315 			icache_inv_page(pa);
316 			pmap_page_set_attributes(mdpg, VM_PAGEMD_EXECPAGE);
317 		}
318 		pte &= ~PTE_UNSYNCED;
319 		pte |= PTE_xX;
320 		*ptep = pte;
321 
322 		pmap_tlb_update_addr(faultmap->pmap, trunc_page(faultva),
323 		    pte, 0);
324 		kpreempt_enable();
325 		UVMHIST_LOG(pmapexechist, "<- 0", 0,0,0,0);
326 		return 0;
327 	}
328 	kpreempt_enable();
329 
330 	int rv = pagefault(faultmap, faultva, VM_PROT_READ|VM_PROT_EXECUTE,
331 	    usertrap);
332 
333 	if (__predict_false(rv != 0 && usertrap)) {
334 		ci->ci_ev_isi_fatal.ev_count++;
335 		vm_signal(rv, EXC_ISI, tf->tf_srr0, ksi);
336 	}
337 	UVMHIST_LOG(pmapexechist, "<- %d", rv, 0,0,0);
338 	return rv;
339 }
340 
341 static int
342 dtlb_exception(struct trapframe *tf, ksiginfo_t *ksi)
343 {
344 	const vaddr_t faultva = tf->tf_dear;
345 	const vm_prot_t ftype = get_faulttype(tf);
346 	struct vm_map * const faultmap = get_faultmap(tf, PSL_DS);
347 	struct cpu_info * const ci = curcpu();
348 	const bool usertrap = usertrap_p(tf);
349 
350 #if 0
351 	/*
352 	 * This is what pte_load in trap_subr.S does for us.
353 	 */
354 	const pt_entry_t * const ptep =
355 	    trap_pte_lookup(tf, trunc_page(faultva), PSL_DS);
356 	if (ptep != NULL && !usertrap && pte_valid_p(*ptep)) {
357 		tlb_update_addr(trunc_page(faultva), KERNEL_PID, *ptep, true);
358 		ci->ci_ev_tlbmiss_soft.ev_count++;
359 		return 0;
360 	}
361 #endif
362 
363 	ci->ci_ev_dtlbmiss_hard.ev_count++;
364 
365 //	printf("pagefault(%p,%#lx,%u,%u)", faultmap, faultva, ftype, usertrap);
366 	int rv = pagefault(faultmap, faultva, ftype, usertrap);
367 //	printf(": %d\n", rv);
368 
369 	if (__predict_false(rv != 0 && usertrap)) {
370 		ci->ci_ev_udsi_fatal.ev_count++;
371 		vm_signal(rv, EXC_DSI, faultva, ksi);
372 	}
373 	return rv;
374 }
375 
376 static int
377 itlb_exception(struct trapframe *tf, ksiginfo_t *ksi)
378 {
379 	struct vm_map * const faultmap = get_faultmap(tf, PSL_IS);
380 	const vaddr_t faultva = tf->tf_srr0;
381 	struct cpu_info * const ci = curcpu();
382 	const bool usertrap = usertrap_p(tf);
383 
384 	ci->ci_ev_itlbmiss_hard.ev_count++;
385 
386 	int rv = pagefault(faultmap, faultva, VM_PROT_READ|VM_PROT_EXECUTE,
387 	    usertrap);
388 
389 	if (__predict_false(rv != 0 && usertrap)) {
390 		ci->ci_ev_isi_fatal.ev_count++;
391 		vm_signal(rv, EXC_ISI, tf->tf_srr0, ksi);
392 	}
393 	return rv;
394 }
395 
396 static int
397 spe_exception(struct trapframe *tf, ksiginfo_t *ksi)
398 {
399 	struct cpu_info * const ci = curcpu();
400 
401 	if (!usertrap_p(tf))
402 		return EPERM;
403 
404 	ci->ci_ev_vec.ev_count++;
405 
406 #ifdef PPC_HAVE_SPE
407 	vec_load();
408 	return 0;
409 #else
410 	KSI_INIT_TRAP(ksi);
411 	ksi->ksi_signo = SIGILL;
412 	ksi->ksi_trap = EXC_PGM;
413 	ksi->ksi_code = ILL_ILLOPC;
414 	ksi->ksi_addr = (void *)tf->tf_srr0;
415 	return EPERM;
416 #endif
417 }
418 
419 static bool
420 emulate_opcode(struct trapframe *tf, ksiginfo_t *ksi)
421 {
422 	uint32_t opcode;
423         if (copyin((void *)tf->tf_srr0, &opcode, sizeof(opcode)) != 0)
424 		return false;
425 
426 	if (opcode == OPC_LWSYNC)
427 		return true;
428 
429 	if (OPC_MFSPR_P(opcode, SPR_PVR)) {
430 		__asm ("mfpvr %0" : "=r"(tf->tf_fixreg[OPC_MFSPR_REG(opcode)]));
431 		return true;
432 	}
433 
434 	if (OPC_MFSPR_P(opcode, SPR_PIR)) {
435 		__asm ("mfspr %0, %1"
436 		    :	"=r"(tf->tf_fixreg[OPC_MFSPR_REG(opcode)])
437 		    :	"n"(SPR_PIR));
438 		return true;
439 	}
440 
441 	if (OPC_MFSPR_P(opcode, SPR_SVR)) {
442 		__asm ("mfspr %0,%1"
443 		    :	"=r"(tf->tf_fixreg[OPC_MFSPR_REG(opcode)])
444 		    :	"n"(SPR_SVR));
445 		return true;
446 	}
447 
448 	return emulate_mxmsr(curlwp, tf, opcode);
449 }
450 
451 static int
452 pgm_exception(struct trapframe *tf, ksiginfo_t *ksi)
453 {
454 	struct cpu_info * const ci = curcpu();
455 	int rv = EPERM;
456 
457 	if (!usertrap_p(tf))
458 		return rv;
459 
460 	UVMHIST_FUNC(__func__); UVMHIST_CALLED(pmapexechist);
461 
462 	UVMHIST_LOG(pmapexechist, " srr0/1=%#x/%#x esr=%#x pte=%#x",
463 	    tf->tf_srr0, tf->tf_srr1, tf->tf_esr,
464 	    *trap_pte_lookup(tf, trunc_page(tf->tf_srr0), PSL_IS));
465 
466 	ci->ci_ev_pgm.ev_count++;
467 
468 	KSI_INIT_TRAP(ksi);
469 
470 	if (tf->tf_esr & ESR_PTR) {
471 		struct lwp * const l = curlwp;
472 		struct proc * const p = curlwp->l_proc;
473 		vaddr_t va = (vaddr_t)tf->tf_srr0;
474 		int error;
475 
476 		/*
477 		 * Restore original instruction and clear BP.
478 		 */
479 		if (p->p_md.md_ss_addr[0] == va ||
480 		    p->p_md.md_ss_addr[1] == va) {
481 			error = ppc_sstep(l, 0);
482 			if (error != 0) {
483 				vm_signal(error, EXC_PGM /* XXX */, va, ksi);
484 				return error;
485 			}
486 			ksi->ksi_code = TRAP_TRACE;
487 		} else
488 			ksi->ksi_code = TRAP_BRKPT;
489 
490 		if (p->p_raslist != NULL &&
491 		    ras_lookup(p, (void *)va) != (void *)-1) {
492 			tf->tf_srr0 += (ksi->ksi_code == TRAP_TRACE) ? 0 : 4;
493 			return 0;
494 		}
495 	}
496 
497 	if (tf->tf_esr & (ESR_PIL|ESR_PPR)) {
498 		if (emulate_opcode(tf, ksi)) {
499 			tf->tf_srr0 += 4;
500 			return 0;
501 		}
502 	}
503 
504 	if (tf->tf_esr & ESR_PIL) {
505 		struct lwp * const l = curlwp;
506 		struct pcb * const pcb = lwp_getpcb(l);
507 
508 		if (__predict_false(!fpu_used_p(l))) {
509 			memset(&pcb->pcb_fpu, 0, sizeof(pcb->pcb_fpu));
510 			fpu_mark_used(l);
511 		}
512 		if (fpu_emulate(tf, &pcb->pcb_fpu, ksi)) {
513 			if (ksi->ksi_signo == 0) {
514 				ci->ci_ev_fpu.ev_count++;
515 				return 0;
516 			}
517 			return EFAULT;
518 		}
519 	}
520 
521 	ksi->ksi_signo = SIGILL;
522 	ksi->ksi_trap = EXC_PGM;
523 	if (tf->tf_esr & ESR_PIL) {
524 		ksi->ksi_code = ILL_ILLOPC;
525 	} else if (tf->tf_esr & ESR_PPR) {
526 		ksi->ksi_code = ILL_PRVOPC;
527 	} else if (tf->tf_esr & ESR_PTR) {
528 		ksi->ksi_signo = SIGTRAP;
529 	} else {
530 		ksi->ksi_code = 0;
531 	}
532 	ksi->ksi_addr = (void *)tf->tf_srr0;
533 	return rv;
534 }
535 
536 #if 0
537 static int
538 debug_exception(struct trapframe *tf, ksiginfo_t *ksi)
539 {
540 	struct cpu_info * const ci = curcpu();
541 	int rv = EPERM;
542 
543 	if (!usertrap_p(tf))
544 		return rv;
545 
546 	ci->ci_ev_debug.ev_count++;
547 
548 	/*
549 	 * Ack the interrupt.
550 	 */
551 	mtspr(SPR_DBSR, tf->tf_esr);
552 	KASSERT(tf->tf_esr & (DBSR_IAC1|DBSR_IAC2|DBSR_BRT));
553 	KASSERT((tf->tf_srr1 & PSL_SE) == 0);
554 
555 	/*
556 	 * Disable debug events
557 	 */
558 	mtspr(SPR_DBCR1, 0);
559 	mtspr(SPR_DBCR0, 0);
560 
561 	/*
562 	 * Tell the debugger ...
563 	 */
564 	KSI_INIT_TRAP(ksi);
565 	ksi->ksi_signo = SIGTRAP;
566 	ksi->ksi_trap = EXC_TRC;
567 	ksi->ksi_addr = (void *)tf->tf_srr0;
568 	ksi->ksi_code = TRAP_TRACE;
569 	return rv;
570 }
571 #endif
572 
573 static int
574 ali_exception(struct trapframe *tf, ksiginfo_t *ksi)
575 {
576 	struct cpu_info * const ci = curcpu();
577 	int rv = EFAULT;
578 
579 	ci->ci_ev_ali.ev_count++;
580 
581 	if (rv != 0 && usertrap_p(tf)) {
582 		ci->ci_ev_ali_fatal.ev_count++;
583 		KSI_INIT_TRAP(ksi);
584 		ksi->ksi_signo = SIGILL;
585 		ksi->ksi_trap = EXC_PGM;
586 		if (tf->tf_esr & ESR_PIL)
587 			ksi->ksi_code = ILL_ILLOPC;
588 		else if (tf->tf_esr & ESR_PPR)
589 			ksi->ksi_code = ILL_PRVOPC;
590 		else if (tf->tf_esr & ESR_PTR)
591 			ksi->ksi_code = ILL_ILLTRP;
592 		else
593 			ksi->ksi_code = 0;
594 		ksi->ksi_addr = (void *)tf->tf_srr0;
595 	}
596 	return rv;
597 }
598 
599 static int
600 embedded_fp_data_exception(struct trapframe *tf, ksiginfo_t *ksi)
601 {
602 	struct cpu_info * const ci = curcpu();
603 	int rv = EFAULT;
604 
605 	ci->ci_ev_fpu.ev_count++;
606 
607 	if (rv != 0 && usertrap_p(tf)) {
608 		KSI_INIT_TRAP(ksi);
609 #ifdef PPC_HAVE_SPE
610 		ksi->ksi_signo = SIGFPE;
611 		ksi->ksi_trap = tf->tf_exc;
612 		ksi->ksi_code = vec_siginfo_code(tf);
613 #else
614 		ksi->ksi_signo = SIGILL;
615 		ksi->ksi_trap = EXC_PGM;
616 		ksi->ksi_code = ILL_ILLOPC;
617 #endif
618 		ksi->ksi_addr = (void *)tf->tf_srr0;
619 	}
620 	return rv;
621 }
622 
623 static int
624 embedded_fp_round_exception(struct trapframe *tf, ksiginfo_t *ksi)
625 {
626 	struct cpu_info * const ci = curcpu();
627 	int rv = EDOM;
628 
629 	ci->ci_ev_fpu.ev_count++;
630 
631 	if (rv != 0 && usertrap_p(tf)) {
632 		KSI_INIT_TRAP(ksi);
633 #ifdef PPC_HAVE_SPE
634 		ksi->ksi_signo = SIGFPE;
635 		ksi->ksi_trap = tf->tf_exc;
636 		ksi->ksi_code = vec_siginfo_code(tf);
637 #else
638 		ksi->ksi_signo = SIGILL;
639 		ksi->ksi_trap = EXC_PGM;
640 		ksi->ksi_code = ILL_ILLOPC;
641 #endif
642 		ksi->ksi_addr = (void *)tf->tf_srr0;
643 	}
644 	return rv;
645 }
646 
647 void
648 dump_trapframe(const struct trapframe *tf, void (*pr)(const char *, ...))
649 {
650 	if (pr == NULL)
651 		pr = printf;
652 	(*pr)("trapframe %p (exc=%x srr0/1=%#lx/%#lx esr/dear=%#x/%#lx)\n",
653 	    tf, tf->tf_exc, tf->tf_srr0, tf->tf_srr1, tf->tf_esr, tf->tf_dear);
654 	(*pr)("lr =%08lx ctr=%08lx cr =%08x xer=%08x\n",
655 	    tf->tf_lr, tf->tf_ctr, tf->tf_cr, tf->tf_xer);
656 	for (u_int r = 0; r < 32; r += 4) {
657 		(*pr)("r%02u=%08lx r%02u=%08lx r%02u=%08lx r%02u=%08lx\n",
658 		    r+0, tf->tf_fixreg[r+0], r+1, tf->tf_fixreg[r+1],
659 		    r+2, tf->tf_fixreg[r+2], r+3, tf->tf_fixreg[r+3]);
660 	}
661 }
662 
663 #ifdef DDB
664 static bool
665 ddb_exception(struct trapframe *tf)
666 {
667 #if 0
668 	const register_t ddb_trapfunc = (uintptr_t) cpu_Debugger;
669 	if ((tf->tf_esr & ESR_PTR) == 0)
670 		return false;
671 	if (ddb_trapfunc <= tf->tf_srr0 && tf->tf_srr0 <= ddb_trapfunc+16) {
672 		register_t srr0 = tf->tf_srr0;
673 		if (kdb_trap(tf->tf_exc, tf)) {
674 			if (srr0 == tf->tf_srr0)
675 				tf->tf_srr0 += 4;
676 			return true;
677 		}
678 	}
679 	return false;
680 #else
681 #if 0
682 	struct cpu_info * const ci = curcpu();
683 	struct cpu_softc * const cpu = ci->ci_softc;
684 	printf("CPL stack:");
685 	if (ci->ci_idepth >= 0) {
686 		for (u_int i = 0; i <= ci->ci_idepth; i++) {
687 			printf(" [%u]=%u", i, cpu->cpu_pcpls[i]);
688 		}
689 	}
690 	printf(" %u\n", ci->ci_cpl);
691 	dump_trapframe(tf, NULL);
692 #endif
693 	if (kdb_trap(tf->tf_exc, tf)) {
694 		tf->tf_srr0 += 4;
695 		return true;
696 	}
697 	return false;
698 #endif
699 }
700 #endif /* DDB */
701 
702 static bool
703 onfaulted(struct trapframe *tf, register_t rv)
704 {
705 	struct lwp * const l = curlwp;
706 	struct pcb * const pcb = lwp_getpcb(l);
707 	struct faultbuf * const fb = pcb->pcb_onfault;
708 	if (fb == NULL)
709 		return false;
710 	tf->tf_srr0 = fb->fb_pc;
711 	tf->tf_srr1 = fb->fb_msr;
712 	tf->tf_cr = fb->fb_cr;
713 	tf->tf_fixreg[1] = fb->fb_sp;
714 	tf->tf_fixreg[2] = fb->fb_r2;
715 	tf->tf_fixreg[3] = rv;
716 	memcpy(&tf->tf_fixreg[13], fb->fb_fixreg, sizeof(fb->fb_fixreg));
717 	return true;
718 }
719 
720 void
721 trap(enum ppc_booke_exceptions trap_code, struct trapframe *tf)
722 {
723 	const bool usertrap = usertrap_p(tf);
724 	struct cpu_info * const ci = curcpu();
725 	struct lwp * const l = curlwp;
726 	struct proc * const p = l->l_proc;
727 	ksiginfo_t ksi;
728 	int rv = EACCES;
729 
730 	ci->ci_ev_traps.ev_count++;
731 	ci->ci_data.cpu_ntrap++;
732 
733 	KASSERTMSG(!usertrap || tf == trapframe(l),
734 	    "trap: tf=%p is invalid: trapframe(%p)=%p", tf, l, trapframe(l));
735 
736 #if 0
737 	if (trap_code != T_PROGRAM || usertrap)
738 		printf("trap(enter): %s (tf=%p, esr/dear=%#x/%#lx, srr0/1=%#lx/%#lx, lr=%#lx)\n",
739 		    trap_names[trap_code], tf, tf->tf_esr, tf->tf_dear,
740 		    tf->tf_srr0, tf->tf_srr1, tf->tf_lr);
741 #endif
742 #if 0
743 	if ((register_t)tf >= (register_t)l->l_addr + USPACE
744 	    || (register_t)tf < (register_t)l->l_addr + PAGE_SIZE) {
745 		printf("%s(entry): pid %d.%d (%s): invalid tf addr %p\n",
746 		    __func__, p->p_pid, l->l_lid, p->p_comm, tf);
747 		dump_trapframe(tf, NULL);
748 		console_debugger();
749 	}
750 #endif
751 #if 0
752 	if ((mfmsr() & PSL_CE) == 0) {
753 		printf("%s(entry): pid %d.%d (%s): %s: PSL_CE (%#lx) not set\n",
754 		    __func__, p->p_pid, l->l_lid, p->p_comm,
755 		    trap_names[trap_code], mfmsr());
756 		dump_trapframe(tf, NULL);
757 	}
758 #endif
759 
760 	if ((VM_MAX_ADDRESS & 0x80000000) == 0
761 	    && usertrap && (tf->tf_fixreg[1] & 0x80000000)) {
762 		printf("%s(entry): pid %d.%d (%s): %s invalid sp %#lx "
763 		    "(sprg1=%#jx)\n", __func__, p->p_pid, l->l_lid, p->p_comm,
764 		    trap_names[trap_code], tf->tf_fixreg[1],
765 		    (uintmax_t)mfspr(SPR_SPRG1));
766 		dump_trapframe(tf, NULL);
767 		console_debugger();
768 	}
769 
770 	if (usertrap && (tf->tf_srr1 & (PSL_DS|PSL_IS)) != (PSL_DS|PSL_IS)) {
771 		printf("%s(entry): pid %d.%d (%s): %s invalid PSL %#lx\n",
772 		    __func__, p->p_pid, l->l_lid, p->p_comm,
773 		    trap_names[trap_code], tf->tf_srr1);
774 		dump_trapframe(tf, NULL);
775 		console_debugger();
776 	}
777 
778 	switch (trap_code) {
779 	case T_CRITIAL_INPUT:
780 	case T_EXTERNAL_INPUT:
781 	case T_DEBUG:
782 	case T_DECREMENTER:
783 	case T_FIXED_INTERVAL:
784 	case T_WATCHDOG:
785 	case T_SYSTEM_CALL:
786 	default:
787 		panic("trap: unexcepted trap code %d! (tf=%p, srr0/1=%#lx/%#lx)",
788 		    trap_code, tf, tf->tf_srr0, tf->tf_srr1);
789 	case T_MACHINE_CHECK:
790 		rv = mchk_exception(tf, &ksi);
791 		break;
792 	case T_DSI:
793 		rv = dsi_exception(tf, &ksi);
794 		break;
795 	case T_ISI:
796 		rv = isi_exception(tf, &ksi);
797 		break;
798 	case T_ALIGNMENT:
799 		rv = ali_exception(tf, &ksi);
800 		break;
801 	case T_SPE_UNAVAILABLE:
802 		rv = spe_exception(tf, &ksi);
803 		break;
804 	case T_PROGRAM:
805 #ifdef DDB
806 		if (!usertrap && ddb_exception(tf))
807 			return;
808 #endif
809 		rv = pgm_exception(tf, &ksi);
810 		break;
811 	case T_FP_UNAVAILABLE:
812 	case T_AP_UNAVAILABLE:
813 		panic("trap: unexcepted trap code %d! (tf=%p, srr0/1=%#lx/%#lx)",
814 		    trap_code, tf, tf->tf_srr0, tf->tf_srr1);
815 	case T_DATA_TLB_ERROR:
816 		rv = dtlb_exception(tf, &ksi);
817 		break;
818 	case T_INSTRUCTION_TLB_ERROR:
819 		rv = itlb_exception(tf, &ksi);
820 		break;
821 #if 0
822 	case T_DEBUG:
823 #ifdef DDB
824 		if (!usertrap && ddb_exception(tf))
825 			return;
826 #endif
827 		rv = debug_exception(tf, &ksi);
828 		break;
829 #endif
830 	case T_EMBEDDED_FP_DATA:
831 		rv = embedded_fp_data_exception(tf, &ksi);
832 		break;
833 	case T_EMBEDDED_FP_ROUND:
834 		rv = embedded_fp_round_exception(tf, &ksi);
835 		break;
836 	case T_EMBEDDED_PERF_MONITOR:
837 #ifdef DDB
838 		//db_stack_trace_print(tf->tf_fixreg[1], true, 40, "", printf);
839 #endif
840 		dump_trapframe(tf, NULL);
841 		rv = EPERM;
842 		break;
843 	case T_AST:
844 		KASSERT(usertrap);
845 		cpu_ast(l, ci);
846 		if ((VM_MAX_ADDRESS & 0x80000000) == 0
847 		   && (tf->tf_fixreg[1] & 0x80000000)) {
848 			printf("%s(ast-exit): pid %d.%d (%s): invalid sp %#lx\n",
849 			    __func__, p->p_pid, l->l_lid, p->p_comm,
850 			    tf->tf_fixreg[1]);
851 			dump_trapframe(tf, NULL);
852 			console_debugger();
853 		}
854 		if ((tf->tf_srr1 & (PSL_DS|PSL_IS)) != (PSL_DS|PSL_IS)) {
855 			printf("%s(entry): pid %d.%d (%s): %s invalid PSL %#lx\n",
856 			    __func__, p->p_pid, l->l_lid, p->p_comm,
857 			    trap_names[trap_code], tf->tf_srr1);
858 			dump_trapframe(tf, NULL);
859 			console_debugger();
860 		}
861 #if 0
862 		if ((mfmsr() & PSL_CE) == 0) {
863 			printf("%s(exit): pid %d.%d (%s): %s: PSL_CE (%#lx) not set\n",
864 			    __func__, p->p_pid, l->l_lid, p->p_comm,
865 			    trap_names[trap_code], mfmsr());
866 			dump_trapframe(tf, NULL);
867 		}
868 #endif
869 		userret(l, tf);
870 		return;
871 	}
872 	if (!usertrap) {
873 		if (rv != 0) {
874 			if (!onfaulted(tf, rv)) {
875 #ifdef DDB
876 				db_stack_trace_print(tf->tf_fixreg[1], true, 40, "", printf);
877 #endif
878 				dump_trapframe(tf, NULL);
879 				panic("%s: pid %d.%d (%s): %s exception in kernel mode"
880 				    " (tf=%p, dear=%#lx, esr=%#x,"
881 				    " srr0/1=%#lx/%#lx)",
882 				    __func__, p->p_pid, l->l_lid, p->p_comm,
883 				    trap_names[trap_code], tf, tf->tf_dear,
884 				    tf->tf_esr, tf->tf_srr0, tf->tf_srr1);
885 			}
886 		}
887 #if 0
888 		if (tf->tf_fixreg[1] >= (register_t)l->l_addr + USPACE
889 		    || tf->tf_fixreg[1] < (register_t)l->l_addr + PAGE_SIZE) {
890 			printf("%s(exit): pid %d.%d (%s): invalid kern sp %#lx\n",
891 			    __func__, p->p_pid, l->l_lid, p->p_comm,
892 			    tf->tf_fixreg[1]);
893 			dump_trapframe(tf, NULL);
894 			Debugger();
895 		}
896 #endif
897 #if 0
898 		if ((mfmsr() & PSL_CE) == 0) {
899 			printf("%s(exit): pid %d.%d (%s): %s: PSL_CE (%#lx) not set\n",
900 			    __func__, p->p_pid, l->l_lid, p->p_comm,
901 			    trap_names[trap_code], mfmsr());
902 			mtmsr(mfmsr()|PSL_CE);
903 			dump_trapframe(tf, NULL);
904 		}
905 #endif
906 	} else {
907 		if (rv == ENOMEM) {
908 			printf("UVM: pid %d.%d (%s), uid %d killed: "
909 			    "out of swap\n",
910 			    p->p_pid, l->l_lid, p->p_comm,
911 			    l->l_cred ?  kauth_cred_geteuid(l->l_cred) : -1);
912 			ksi.ksi_signo = SIGKILL;
913 			ksi.ksi_code = 0;
914 		}
915 		if (rv != 0) {
916 			/*
917 			 * Only print a fatal trap if the signal will be
918 			 * uncaught.
919 			 */
920 			if (cpu_printfataltraps
921 			    && (p->p_slflag & PSL_TRACED) == 0
922 			    && !sigismember(&p->p_sigctx.ps_sigcatch,
923 				    ksi.ksi_signo)) {
924 				printf("%s: pid %d.%d (%s):"
925 				    " %s exception in user mode\n",
926 				    __func__, p->p_pid, l->l_lid, p->p_comm,
927 				    trap_names[trap_code]);
928 				if (cpu_printfataltraps > 1)
929 					dump_trapframe(tf, NULL);
930 			}
931 			(*p->p_emul->e_trapsignal)(l, &ksi);
932 		}
933 #ifdef DEBUG
934 		if ((tf->tf_srr1 & (PSL_DS|PSL_IS)) != (PSL_DS|PSL_IS)) {
935 			printf("%s(exit): pid %d.%d (%s): %s invalid PSL %#lx\n",
936 			    __func__, p->p_pid, l->l_lid, p->p_comm,
937 			    trap_names[trap_code], tf->tf_srr1);
938 			dump_trapframe(tf, NULL);
939 			console_debugger();
940 		}
941 #endif
942 #if 0
943 		if ((mfmsr() & PSL_CE) == 0) {
944 			printf("%s(exit): pid %d.%d (%s): %s: PSL_CE (%#lx) not set\n",
945 			    __func__, p->p_pid, l->l_lid, p->p_comm,
946 			    trap_names[trap_code], mfmsr());
947 			dump_trapframe(tf, NULL);
948 		}
949 #endif
950 		userret(l, tf);
951 	}
952 }
953