The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/riscv/riscv/trap.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2015 Ruslan Bukin <br@bsdpad.com>
    3  * All rights reserved.
    4  *
    5  * Portions of this software were developed by SRI International and the
    6  * University of Cambridge Computer Laboratory under DARPA/AFRL contract
    7  * FA8750-10-C-0237 ("CTSRD"), as part of the DARPA CRASH research programme.
    8  *
    9  * Portions of this software were developed by the University of Cambridge
   10  * Computer Laboratory as part of the CTSRD Project, with support from the
   11  * UK Higher Education Innovation Fund (HEIF).
   12  *
   13  * Redistribution and use in source and binary forms, with or without
   14  * modification, are permitted provided that the following conditions
   15  * are met:
   16  * 1. Redistributions of source code must retain the above copyright
   17  *    notice, this list of conditions and the following disclaimer.
   18  * 2. Redistributions in binary form must reproduce the above copyright
   19  *    notice, this list of conditions and the following disclaimer in the
   20  *    documentation and/or other materials provided with the distribution.
   21  *
   22  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   32  * SUCH DAMAGE.
   33  */
   34 
   35 #include <sys/cdefs.h>
   36 __FBSDID("$FreeBSD$");
   37 
   38 #include <sys/param.h>
   39 #include <sys/systm.h>
   40 #include <sys/kernel.h>
   41 #include <sys/lock.h>
   42 #include <sys/mutex.h>
   43 #include <sys/pioctl.h>
   44 #include <sys/bus.h>
   45 #include <sys/proc.h>
   46 #include <sys/ptrace.h>
   47 #include <sys/syscall.h>
   48 #include <sys/sysent.h>
   49 #ifdef KDB
   50 #include <sys/kdb.h>
   51 #endif
   52 
   53 #include <vm/vm.h>
   54 #include <vm/pmap.h>
   55 #include <vm/vm_kern.h>
   56 #include <vm/vm_map.h>
   57 #include <vm/vm_param.h>
   58 #include <vm/vm_extern.h>
   59 
   60 #include <machine/frame.h>
   61 #include <machine/pcb.h>
   62 #include <machine/pcpu.h>
   63 
   64 #include <machine/resource.h>
   65 #include <machine/intr.h>
   66 
   67 #ifdef KDTRACE_HOOKS
   68 #include <sys/dtrace_bsd.h>
   69 #endif
   70 
   71 int (*dtrace_invop_jump_addr)(struct trapframe *);
   72 
   73 extern register_t fsu_intr_fault;
   74 
   75 /* Called from exception.S */
   76 void do_trap_supervisor(struct trapframe *);
   77 void do_trap_user(struct trapframe *);
   78 
   79 static __inline void
   80 call_trapsignal(struct thread *td, int sig, int code, void *addr)
   81 {
   82         ksiginfo_t ksi;
   83 
   84         ksiginfo_init_trap(&ksi);
   85         ksi.ksi_signo = sig;
   86         ksi.ksi_code = code;
   87         ksi.ksi_addr = addr;
   88         trapsignal(td, &ksi);
   89 }
   90 
   91 int
   92 cpu_fetch_syscall_args(struct thread *td)
   93 {
   94         struct proc *p;
   95         register_t *ap;
   96         struct syscall_args *sa;
   97         int nap;
   98 
   99         nap = 8;
  100         p = td->td_proc;
  101         sa = &td->td_sa;
  102         ap = &td->td_frame->tf_a[0];
  103 
  104         sa->code = td->td_frame->tf_t[0];
  105 
  106         if (sa->code == SYS_syscall || sa->code == SYS___syscall) {
  107                 sa->code = *ap++;
  108                 nap--;
  109         }
  110 
  111         if (p->p_sysent->sv_mask)
  112                 sa->code &= p->p_sysent->sv_mask;
  113         if (sa->code >= p->p_sysent->sv_size)
  114                 sa->callp = &p->p_sysent->sv_table[0];
  115         else
  116                 sa->callp = &p->p_sysent->sv_table[sa->code];
  117 
  118         sa->narg = sa->callp->sy_narg;
  119         memcpy(sa->args, ap, nap * sizeof(register_t));
  120         if (sa->narg > nap)
  121                 panic("TODO: Could we have more then 8 args?");
  122 
  123         td->td_retval[0] = 0;
  124         td->td_retval[1] = 0;
  125 
  126         return (0);
  127 }
  128 
  129 #include "../../kern/subr_syscall.c"
  130 
  131 static void
  132 dump_regs(struct trapframe *frame)
  133 {
  134         int n;
  135         int i;
  136 
  137         n = (sizeof(frame->tf_t) / sizeof(frame->tf_t[0]));
  138         for (i = 0; i < n; i++)
  139                 printf("t[%d] == 0x%016lx\n", i, frame->tf_t[i]);
  140 
  141         n = (sizeof(frame->tf_s) / sizeof(frame->tf_s[0]));
  142         for (i = 0; i < n; i++)
  143                 printf("s[%d] == 0x%016lx\n", i, frame->tf_s[i]);
  144 
  145         n = (sizeof(frame->tf_a) / sizeof(frame->tf_a[0]));
  146         for (i = 0; i < n; i++)
  147                 printf("a[%d] == 0x%016lx\n", i, frame->tf_a[i]);
  148 
  149         printf("sepc == 0x%016lx\n", frame->tf_sepc);
  150         printf("sstatus == 0x%016lx\n", frame->tf_sstatus);
  151 }
  152 
  153 static void
  154 svc_handler(struct trapframe *frame)
  155 {
  156         struct thread *td;
  157         int error;
  158 
  159         td = curthread;
  160         td->td_frame = frame;
  161 
  162         error = syscallenter(td);
  163         syscallret(td, error);
  164 }
  165 
  166 static void
  167 data_abort(struct trapframe *frame, int lower)
  168 {
  169         struct vm_map *map;
  170         uint64_t sbadaddr;
  171         struct thread *td;
  172         struct pcb *pcb;
  173         vm_prot_t ftype;
  174         vm_offset_t va;
  175         struct proc *p;
  176         int ucode;
  177         int error;
  178         int sig;
  179 
  180 #ifdef KDB
  181         if (kdb_active) {
  182                 kdb_reenter();
  183                 return;
  184         }
  185 #endif
  186 
  187         td = curthread;
  188         pcb = td->td_pcb;
  189 
  190         /*
  191          * Special case for fuswintr and suswintr. These can't sleep so
  192          * handle them early on in the trap handler.
  193          */
  194         if (__predict_false(pcb->pcb_onfault == (vm_offset_t)&fsu_intr_fault)) {
  195                 frame->tf_sepc = pcb->pcb_onfault;
  196                 return;
  197         }
  198 
  199         sbadaddr = frame->tf_sbadaddr;
  200 
  201         p = td->td_proc;
  202 
  203         if (lower)
  204                 map = &td->td_proc->p_vmspace->vm_map;
  205         else {
  206                 /* The top bit tells us which range to use */
  207                 if ((sbadaddr >> 63) == 1)
  208                         map = kernel_map;
  209                 else
  210                         map = &td->td_proc->p_vmspace->vm_map;
  211         }
  212 
  213         va = trunc_page(sbadaddr);
  214 
  215         if (frame->tf_scause == EXCP_STORE_ACCESS_FAULT) {
  216                 ftype = (VM_PROT_READ | VM_PROT_WRITE);
  217         } else {
  218                 ftype = (VM_PROT_READ);
  219         }
  220 
  221         if (map != kernel_map) {
  222                 /*
  223                  * Keep swapout from messing with us during this
  224                  *      critical time.
  225                  */
  226                 PROC_LOCK(p);
  227                 ++p->p_lock;
  228                 PROC_UNLOCK(p);
  229 
  230                 /* Fault in the user page: */
  231                 error = vm_fault(map, va, ftype, VM_FAULT_NORMAL);
  232 
  233                 PROC_LOCK(p);
  234                 --p->p_lock;
  235                 PROC_UNLOCK(p);
  236         } else {
  237                 /*
  238                  * Don't have to worry about process locking or stacks in the
  239                  * kernel.
  240                  */
  241                 error = vm_fault(map, va, ftype, VM_FAULT_NORMAL);
  242         }
  243 
  244         if (error != KERN_SUCCESS) {
  245                 if (lower) {
  246                         sig = SIGSEGV;
  247                         if (error == KERN_PROTECTION_FAILURE)
  248                                 ucode = SEGV_ACCERR;
  249                         else
  250                                 ucode = SEGV_MAPERR;
  251                         call_trapsignal(td, sig, ucode, (void *)sbadaddr);
  252                 } else {
  253                         if (td->td_intr_nesting_level == 0 &&
  254                             pcb->pcb_onfault != 0) {
  255                                 frame->tf_a[0] = error;
  256                                 frame->tf_sepc = pcb->pcb_onfault;
  257                                 return;
  258                         }
  259                         dump_regs(frame);
  260                         panic("vm_fault failed: %lx, va 0x%016lx",
  261                                 frame->tf_sepc, sbadaddr);
  262                 }
  263         }
  264 
  265         if (lower)
  266                 userret(td, frame);
  267 }
  268 
  269 void
  270 do_trap_supervisor(struct trapframe *frame)
  271 {
  272         uint64_t exception;
  273 
  274         exception = (frame->tf_scause & EXCP_MASK);
  275         if (frame->tf_scause & EXCP_INTR) {
  276                 /* Interrupt */
  277                 riscv_cpu_intr(frame);
  278                 return;
  279         }
  280 
  281 #ifdef KDTRACE_HOOKS
  282         if (dtrace_trap_func != NULL && (*dtrace_trap_func)(frame, exception))
  283                 return;
  284 #endif
  285 
  286         CTR3(KTR_TRAP, "do_trap_supervisor: curthread: %p, sepc: %lx, frame: %p",
  287             curthread, frame->tf_sepc, frame);
  288 
  289         switch(exception) {
  290         case EXCP_LOAD_ACCESS_FAULT:
  291         case EXCP_STORE_ACCESS_FAULT:
  292         case EXCP_INSTR_ACCESS_FAULT:
  293                 data_abort(frame, 0);
  294                 break;
  295         case EXCP_INSTR_BREAKPOINT:
  296 #ifdef KDTRACE_HOOKS
  297                 if (dtrace_invop_jump_addr != 0) {
  298                         dtrace_invop_jump_addr(frame);
  299                         break;
  300                 }
  301 #endif
  302 #ifdef KDB
  303                 kdb_trap(exception, 0, frame);
  304 #else
  305                 dump_regs(frame);
  306                 panic("No debugger in kernel.\n");
  307 #endif
  308                 break;
  309         case EXCP_INSTR_ILLEGAL:
  310                 dump_regs(frame);
  311                 panic("Illegal instruction at 0x%016lx\n", frame->tf_sepc);
  312                 break;
  313         default:
  314                 dump_regs(frame);
  315                 panic("Unknown kernel exception %x badaddr %lx\n",
  316                         exception, frame->tf_sbadaddr);
  317         }
  318 }
  319 
  320 void
  321 do_trap_user(struct trapframe *frame)
  322 {
  323         uint64_t exception;
  324         struct thread *td;
  325 
  326         td = curthread;
  327         td->td_frame = frame;
  328 
  329         exception = (frame->tf_scause & EXCP_MASK);
  330         if (frame->tf_scause & EXCP_INTR) {
  331                 /* Interrupt */
  332                 riscv_cpu_intr(frame);
  333                 return;
  334         }
  335 
  336         CTR3(KTR_TRAP, "do_trap_user: curthread: %p, sepc: %lx, frame: %p",
  337             curthread, frame->tf_sepc, frame);
  338 
  339         switch(exception) {
  340         case EXCP_LOAD_ACCESS_FAULT:
  341         case EXCP_STORE_ACCESS_FAULT:
  342         case EXCP_INSTR_ACCESS_FAULT:
  343                 data_abort(frame, 1);
  344                 break;
  345         case EXCP_UMODE_ENV_CALL:
  346                 frame->tf_sepc += 4;    /* Next instruction */
  347                 svc_handler(frame);
  348                 break;
  349         case EXCP_INSTR_ILLEGAL:
  350                 call_trapsignal(td, SIGILL, ILL_ILLTRP, (void *)frame->tf_sepc);
  351                 userret(td, frame);
  352                 break;
  353         case EXCP_INSTR_BREAKPOINT:
  354                 call_trapsignal(td, SIGTRAP, TRAP_BRKPT, (void *)frame->tf_sepc);
  355                 userret(td, frame);
  356                 break;
  357         default:
  358                 dump_regs(frame);
  359                 panic("Unknown userland exception %x badaddr %lx\n",
  360                         exception, frame->tf_sbadaddr);
  361         }
  362 }

Cache object: 28ba490368b0235ada96b7cb68d6ec9a


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.