traps_32.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911
  1. /*
  2. * 'traps.c' handles hardware traps and faults after we have saved some
  3. * state in 'entry.S'.
  4. *
  5. * SuperH version: Copyright (C) 1999 Niibe Yutaka
  6. * Copyright (C) 2000 Philipp Rumpf
  7. * Copyright (C) 2000 David Howells
  8. * Copyright (C) 2002 - 2007 Paul Mundt
  9. *
  10. * This file is subject to the terms and conditions of the GNU General Public
  11. * License. See the file "COPYING" in the main directory of this archive
  12. * for more details.
  13. */
  14. #include <linux/kernel.h>
  15. #include <linux/ptrace.h>
  16. #include <linux/init.h>
  17. #include <linux/spinlock.h>
  18. #include <linux/module.h>
  19. #include <linux/kallsyms.h>
  20. #include <linux/io.h>
  21. #include <linux/bug.h>
  22. #include <linux/debug_locks.h>
  23. #include <linux/kdebug.h>
  24. #include <linux/kexec.h>
  25. #include <linux/limits.h>
  26. #include <asm/system.h>
  27. #include <asm/uaccess.h>
  28. #include <asm/fpu.h>
  29. #include <asm/kprobes.h>
  30. #ifdef CONFIG_SH_KGDB
  31. #include <asm/kgdb.h>
  32. #define CHK_REMOTE_DEBUG(regs) \
  33. { \
  34. if (kgdb_debug_hook && !user_mode(regs))\
  35. (*kgdb_debug_hook)(regs); \
  36. }
  37. #else
  38. #define CHK_REMOTE_DEBUG(regs)
  39. #endif
  40. #ifdef CONFIG_CPU_SH2
  41. # define TRAP_RESERVED_INST 4
  42. # define TRAP_ILLEGAL_SLOT_INST 6
  43. # define TRAP_ADDRESS_ERROR 9
  44. # ifdef CONFIG_CPU_SH2A
  45. # define TRAP_FPU_ERROR 13
  46. # define TRAP_DIVZERO_ERROR 17
  47. # define TRAP_DIVOVF_ERROR 18
  48. # endif
  49. #else
  50. #define TRAP_RESERVED_INST 12
  51. #define TRAP_ILLEGAL_SLOT_INST 13
  52. #endif
  53. static void dump_mem(const char *str, unsigned long bottom, unsigned long top)
  54. {
  55. unsigned long p;
  56. int i;
  57. printk("%s(0x%08lx to 0x%08lx)\n", str, bottom, top);
  58. for (p = bottom & ~31; p < top; ) {
  59. printk("%04lx: ", p & 0xffff);
  60. for (i = 0; i < 8; i++, p += 4) {
  61. unsigned int val;
  62. if (p < bottom || p >= top)
  63. printk(" ");
  64. else {
  65. if (__get_user(val, (unsigned int __user *)p)) {
  66. printk("\n");
  67. return;
  68. }
  69. printk("%08x ", val);
  70. }
  71. }
  72. printk("\n");
  73. }
  74. }
  75. static DEFINE_SPINLOCK(die_lock);
  76. void die(const char * str, struct pt_regs * regs, long err)
  77. {
  78. static int die_counter;
  79. oops_enter();
  80. console_verbose();
  81. spin_lock_irq(&die_lock);
  82. bust_spinlocks(1);
  83. printk("%s: %04lx [#%d]\n", str, err & 0xffff, ++die_counter);
  84. CHK_REMOTE_DEBUG(regs);
  85. print_modules();
  86. show_regs(regs);
  87. printk("Process: %s (pid: %d, stack limit = %p)\n", current->comm,
  88. task_pid_nr(current), task_stack_page(current) + 1);
  89. if (!user_mode(regs) || in_interrupt())
  90. dump_mem("Stack: ", regs->regs[15], THREAD_SIZE +
  91. (unsigned long)task_stack_page(current));
  92. notify_die(DIE_OOPS, str, regs, err, 255, SIGSEGV);
  93. bust_spinlocks(0);
  94. add_taint(TAINT_DIE);
  95. spin_unlock_irq(&die_lock);
  96. if (kexec_should_crash(current))
  97. crash_kexec(regs);
  98. if (in_interrupt())
  99. panic("Fatal exception in interrupt");
  100. if (panic_on_oops)
  101. panic("Fatal exception");
  102. oops_exit();
  103. do_exit(SIGSEGV);
  104. }
  105. static inline void die_if_kernel(const char *str, struct pt_regs *regs,
  106. long err)
  107. {
  108. if (!user_mode(regs))
  109. die(str, regs, err);
  110. }
  111. /*
  112. * try and fix up kernelspace address errors
  113. * - userspace errors just cause EFAULT to be returned, resulting in SEGV
  114. * - kernel/userspace interfaces cause a jump to an appropriate handler
  115. * - other kernel errors are bad
  116. * - return 0 if fixed-up, -EFAULT if non-fatal (to the kernel) fault
  117. */
  118. static int die_if_no_fixup(const char * str, struct pt_regs * regs, long err)
  119. {
  120. if (!user_mode(regs)) {
  121. const struct exception_table_entry *fixup;
  122. fixup = search_exception_tables(regs->pc);
  123. if (fixup) {
  124. regs->pc = fixup->fixup;
  125. return 0;
  126. }
  127. die(str, regs, err);
  128. }
  129. return -EFAULT;
  130. }
  131. static inline void sign_extend(unsigned int count, unsigned char *dst)
  132. {
  133. #ifdef __LITTLE_ENDIAN__
  134. if ((count == 1) && dst[0] & 0x80) {
  135. dst[1] = 0xff;
  136. dst[2] = 0xff;
  137. dst[3] = 0xff;
  138. }
  139. if ((count == 2) && dst[1] & 0x80) {
  140. dst[2] = 0xff;
  141. dst[3] = 0xff;
  142. }
  143. #else
  144. if ((count == 1) && dst[3] & 0x80) {
  145. dst[2] = 0xff;
  146. dst[1] = 0xff;
  147. dst[0] = 0xff;
  148. }
  149. if ((count == 2) && dst[2] & 0x80) {
  150. dst[1] = 0xff;
  151. dst[0] = 0xff;
  152. }
  153. #endif
  154. }
  155. static struct mem_access user_mem_access = {
  156. copy_from_user,
  157. copy_to_user,
  158. };
  159. /*
  160. * handle an instruction that does an unaligned memory access by emulating the
  161. * desired behaviour
  162. * - note that PC _may not_ point to the faulting instruction
  163. * (if that instruction is in a branch delay slot)
  164. * - return 0 if emulation okay, -EFAULT on existential error
  165. */
  166. static int handle_unaligned_ins(opcode_t instruction, struct pt_regs *regs,
  167. struct mem_access *ma)
  168. {
  169. int ret, index, count;
  170. unsigned long *rm, *rn;
  171. unsigned char *src, *dst;
  172. unsigned char __user *srcu, *dstu;
  173. index = (instruction>>8)&15; /* 0x0F00 */
  174. rn = &regs->regs[index];
  175. index = (instruction>>4)&15; /* 0x00F0 */
  176. rm = &regs->regs[index];
  177. count = 1<<(instruction&3);
  178. ret = -EFAULT;
  179. switch (instruction>>12) {
  180. case 0: /* mov.[bwl] to/from memory via r0+rn */
  181. if (instruction & 8) {
  182. /* from memory */
  183. srcu = (unsigned char __user *)*rm;
  184. srcu += regs->regs[0];
  185. dst = (unsigned char *)rn;
  186. *(unsigned long *)dst = 0;
  187. #if !defined(__LITTLE_ENDIAN__)
  188. dst += 4-count;
  189. #endif
  190. if (ma->from(dst, srcu, count))
  191. goto fetch_fault;
  192. sign_extend(count, dst);
  193. } else {
  194. /* to memory */
  195. src = (unsigned char *)rm;
  196. #if !defined(__LITTLE_ENDIAN__)
  197. src += 4-count;
  198. #endif
  199. dstu = (unsigned char __user *)*rn;
  200. dstu += regs->regs[0];
  201. if (ma->to(dstu, src, count))
  202. goto fetch_fault;
  203. }
  204. ret = 0;
  205. break;
  206. case 1: /* mov.l Rm,@(disp,Rn) */
  207. src = (unsigned char*) rm;
  208. dstu = (unsigned char __user *)*rn;
  209. dstu += (instruction&0x000F)<<2;
  210. if (ma->to(dstu, src, 4))
  211. goto fetch_fault;
  212. ret = 0;
  213. break;
  214. case 2: /* mov.[bwl] to memory, possibly with pre-decrement */
  215. if (instruction & 4)
  216. *rn -= count;
  217. src = (unsigned char*) rm;
  218. dstu = (unsigned char __user *)*rn;
  219. #if !defined(__LITTLE_ENDIAN__)
  220. src += 4-count;
  221. #endif
  222. if (ma->to(dstu, src, count))
  223. goto fetch_fault;
  224. ret = 0;
  225. break;
  226. case 5: /* mov.l @(disp,Rm),Rn */
  227. srcu = (unsigned char __user *)*rm;
  228. srcu += (instruction & 0x000F) << 2;
  229. dst = (unsigned char *)rn;
  230. *(unsigned long *)dst = 0;
  231. if (ma->from(dst, srcu, 4))
  232. goto fetch_fault;
  233. ret = 0;
  234. break;
  235. case 6: /* mov.[bwl] from memory, possibly with post-increment */
  236. srcu = (unsigned char __user *)*rm;
  237. if (instruction & 4)
  238. *rm += count;
  239. dst = (unsigned char*) rn;
  240. *(unsigned long*)dst = 0;
  241. #if !defined(__LITTLE_ENDIAN__)
  242. dst += 4-count;
  243. #endif
  244. if (ma->from(dst, srcu, count))
  245. goto fetch_fault;
  246. sign_extend(count, dst);
  247. ret = 0;
  248. break;
  249. case 8:
  250. switch ((instruction&0xFF00)>>8) {
  251. case 0x81: /* mov.w R0,@(disp,Rn) */
  252. src = (unsigned char *) &regs->regs[0];
  253. #if !defined(__LITTLE_ENDIAN__)
  254. src += 2;
  255. #endif
  256. dstu = (unsigned char __user *)*rm; /* called Rn in the spec */
  257. dstu += (instruction & 0x000F) << 1;
  258. if (ma->to(dstu, src, 2))
  259. goto fetch_fault;
  260. ret = 0;
  261. break;
  262. case 0x85: /* mov.w @(disp,Rm),R0 */
  263. srcu = (unsigned char __user *)*rm;
  264. srcu += (instruction & 0x000F) << 1;
  265. dst = (unsigned char *) &regs->regs[0];
  266. *(unsigned long *)dst = 0;
  267. #if !defined(__LITTLE_ENDIAN__)
  268. dst += 2;
  269. #endif
  270. if (ma->from(dst, srcu, 2))
  271. goto fetch_fault;
  272. sign_extend(2, dst);
  273. ret = 0;
  274. break;
  275. }
  276. break;
  277. }
  278. return ret;
  279. fetch_fault:
  280. /* Argh. Address not only misaligned but also non-existent.
  281. * Raise an EFAULT and see if it's trapped
  282. */
  283. return die_if_no_fixup("Fault in unaligned fixup", regs, 0);
  284. }
  285. /*
  286. * emulate the instruction in the delay slot
  287. * - fetches the instruction from PC+2
  288. */
  289. static inline int handle_delayslot(struct pt_regs *regs,
  290. opcode_t old_instruction,
  291. struct mem_access *ma)
  292. {
  293. opcode_t instruction;
  294. void __user *addr = (void __user *)(regs->pc +
  295. instruction_size(old_instruction));
  296. if (copy_from_user(&instruction, addr, sizeof(instruction))) {
  297. /* the instruction-fetch faulted */
  298. if (user_mode(regs))
  299. return -EFAULT;
  300. /* kernel */
  301. die("delay-slot-insn faulting in handle_unaligned_delayslot",
  302. regs, 0);
  303. }
  304. return handle_unaligned_ins(instruction, regs, ma);
  305. }
  306. /*
  307. * handle an instruction that does an unaligned memory access
  308. * - have to be careful of branch delay-slot instructions that fault
  309. * SH3:
  310. * - if the branch would be taken PC points to the branch
  311. * - if the branch would not be taken, PC points to delay-slot
  312. * SH4:
  313. * - PC always points to delayed branch
  314. * - return 0 if handled, -EFAULT if failed (may not return if in kernel)
  315. */
  316. /* Macros to determine offset from current PC for branch instructions */
  317. /* Explicit type coercion is used to force sign extension where needed */
  318. #define SH_PC_8BIT_OFFSET(instr) ((((signed char)(instr))*2) + 4)
  319. #define SH_PC_12BIT_OFFSET(instr) ((((signed short)(instr<<4))>>3) + 4)
  320. /*
  321. * XXX: SH-2A needs this too, but it needs an overhaul thanks to mixed 32-bit
  322. * opcodes..
  323. */
  324. static int handle_unaligned_notify_count = 10;
  325. int handle_unaligned_access(opcode_t instruction, struct pt_regs *regs,
  326. struct mem_access *ma)
  327. {
  328. u_int rm;
  329. int ret, index;
  330. index = (instruction>>8)&15; /* 0x0F00 */
  331. rm = regs->regs[index];
  332. /* shout about the first ten userspace fixups */
  333. if (user_mode(regs) && handle_unaligned_notify_count>0) {
  334. handle_unaligned_notify_count--;
  335. printk(KERN_NOTICE "Fixing up unaligned userspace access "
  336. "in \"%s\" pid=%d pc=0x%p ins=0x%04hx\n",
  337. current->comm, task_pid_nr(current),
  338. (void *)regs->pc, instruction);
  339. }
  340. ret = -EFAULT;
  341. switch (instruction&0xF000) {
  342. case 0x0000:
  343. if (instruction==0x000B) {
  344. /* rts */
  345. ret = handle_delayslot(regs, instruction, ma);
  346. if (ret==0)
  347. regs->pc = regs->pr;
  348. }
  349. else if ((instruction&0x00FF)==0x0023) {
  350. /* braf @Rm */
  351. ret = handle_delayslot(regs, instruction, ma);
  352. if (ret==0)
  353. regs->pc += rm + 4;
  354. }
  355. else if ((instruction&0x00FF)==0x0003) {
  356. /* bsrf @Rm */
  357. ret = handle_delayslot(regs, instruction, ma);
  358. if (ret==0) {
  359. regs->pr = regs->pc + 4;
  360. regs->pc += rm + 4;
  361. }
  362. }
  363. else {
  364. /* mov.[bwl] to/from memory via r0+rn */
  365. goto simple;
  366. }
  367. break;
  368. case 0x1000: /* mov.l Rm,@(disp,Rn) */
  369. goto simple;
  370. case 0x2000: /* mov.[bwl] to memory, possibly with pre-decrement */
  371. goto simple;
  372. case 0x4000:
  373. if ((instruction&0x00FF)==0x002B) {
  374. /* jmp @Rm */
  375. ret = handle_delayslot(regs, instruction, ma);
  376. if (ret==0)
  377. regs->pc = rm;
  378. }
  379. else if ((instruction&0x00FF)==0x000B) {
  380. /* jsr @Rm */
  381. ret = handle_delayslot(regs, instruction, ma);
  382. if (ret==0) {
  383. regs->pr = regs->pc + 4;
  384. regs->pc = rm;
  385. }
  386. }
  387. else {
  388. /* mov.[bwl] to/from memory via r0+rn */
  389. goto simple;
  390. }
  391. break;
  392. case 0x5000: /* mov.l @(disp,Rm),Rn */
  393. goto simple;
  394. case 0x6000: /* mov.[bwl] from memory, possibly with post-increment */
  395. goto simple;
  396. case 0x8000: /* bf lab, bf/s lab, bt lab, bt/s lab */
  397. switch (instruction&0x0F00) {
  398. case 0x0100: /* mov.w R0,@(disp,Rm) */
  399. goto simple;
  400. case 0x0500: /* mov.w @(disp,Rm),R0 */
  401. goto simple;
  402. case 0x0B00: /* bf lab - no delayslot*/
  403. break;
  404. case 0x0F00: /* bf/s lab */
  405. ret = handle_delayslot(regs, instruction, ma);
  406. if (ret==0) {
  407. #if defined(CONFIG_CPU_SH4) || defined(CONFIG_SH7705_CACHE_32KB)
  408. if ((regs->sr & 0x00000001) != 0)
  409. regs->pc += 4; /* next after slot */
  410. else
  411. #endif
  412. regs->pc += SH_PC_8BIT_OFFSET(instruction);
  413. }
  414. break;
  415. case 0x0900: /* bt lab - no delayslot */
  416. break;
  417. case 0x0D00: /* bt/s lab */
  418. ret = handle_delayslot(regs, instruction, ma);
  419. if (ret==0) {
  420. #if defined(CONFIG_CPU_SH4) || defined(CONFIG_SH7705_CACHE_32KB)
  421. if ((regs->sr & 0x00000001) == 0)
  422. regs->pc += 4; /* next after slot */
  423. else
  424. #endif
  425. regs->pc += SH_PC_8BIT_OFFSET(instruction);
  426. }
  427. break;
  428. }
  429. break;
  430. case 0xA000: /* bra label */
  431. ret = handle_delayslot(regs, instruction, ma);
  432. if (ret==0)
  433. regs->pc += SH_PC_12BIT_OFFSET(instruction);
  434. break;
  435. case 0xB000: /* bsr label */
  436. ret = handle_delayslot(regs, instruction, ma);
  437. if (ret==0) {
  438. regs->pr = regs->pc + 4;
  439. regs->pc += SH_PC_12BIT_OFFSET(instruction);
  440. }
  441. break;
  442. }
  443. return ret;
  444. /* handle non-delay-slot instruction */
  445. simple:
  446. ret = handle_unaligned_ins(instruction, regs, ma);
  447. if (ret==0)
  448. regs->pc += instruction_size(instruction);
  449. return ret;
  450. }
  451. /*
  452. * Handle various address error exceptions:
  453. * - instruction address error:
  454. * misaligned PC
  455. * PC >= 0x80000000 in user mode
  456. * - data address error (read and write)
  457. * misaligned data access
  458. * access to >= 0x80000000 is user mode
  459. * Unfortuntaly we can't distinguish between instruction address error
  460. * and data address errors caused by read accesses.
  461. */
  462. asmlinkage void do_address_error(struct pt_regs *regs,
  463. unsigned long writeaccess,
  464. unsigned long address)
  465. {
  466. unsigned long error_code = 0;
  467. mm_segment_t oldfs;
  468. siginfo_t info;
  469. opcode_t instruction;
  470. int tmp;
  471. /* Intentional ifdef */
  472. #ifdef CONFIG_CPU_HAS_SR_RB
  473. error_code = lookup_exception_vector();
  474. #endif
  475. oldfs = get_fs();
  476. if (user_mode(regs)) {
  477. int si_code = BUS_ADRERR;
  478. local_irq_enable();
  479. /* bad PC is not something we can fix */
  480. if (regs->pc & 1) {
  481. si_code = BUS_ADRALN;
  482. goto uspace_segv;
  483. }
  484. set_fs(USER_DS);
  485. if (copy_from_user(&instruction, (void __user *)(regs->pc),
  486. sizeof(instruction))) {
  487. /* Argh. Fault on the instruction itself.
  488. This should never happen non-SMP
  489. */
  490. set_fs(oldfs);
  491. goto uspace_segv;
  492. }
  493. tmp = handle_unaligned_access(instruction, regs,
  494. &user_mem_access);
  495. set_fs(oldfs);
  496. if (tmp==0)
  497. return; /* sorted */
  498. uspace_segv:
  499. printk(KERN_NOTICE "Sending SIGBUS to \"%s\" due to unaligned "
  500. "access (PC %lx PR %lx)\n", current->comm, regs->pc,
  501. regs->pr);
  502. info.si_signo = SIGBUS;
  503. info.si_errno = 0;
  504. info.si_code = si_code;
  505. info.si_addr = (void __user *)address;
  506. force_sig_info(SIGBUS, &info, current);
  507. } else {
  508. if (regs->pc & 1)
  509. die("unaligned program counter", regs, error_code);
  510. set_fs(KERNEL_DS);
  511. if (copy_from_user(&instruction, (void __user *)(regs->pc),
  512. sizeof(instruction))) {
  513. /* Argh. Fault on the instruction itself.
  514. This should never happen non-SMP
  515. */
  516. set_fs(oldfs);
  517. die("insn faulting in do_address_error", regs, 0);
  518. }
  519. handle_unaligned_access(instruction, regs, &user_mem_access);
  520. set_fs(oldfs);
  521. }
  522. }
  523. #ifdef CONFIG_SH_DSP
  524. /*
  525. * SH-DSP support gerg@snapgear.com.
  526. */
  527. int is_dsp_inst(struct pt_regs *regs)
  528. {
  529. unsigned short inst = 0;
  530. /*
  531. * Safe guard if DSP mode is already enabled or we're lacking
  532. * the DSP altogether.
  533. */
  534. if (!(current_cpu_data.flags & CPU_HAS_DSP) || (regs->sr & SR_DSP))
  535. return 0;
  536. get_user(inst, ((unsigned short *) regs->pc));
  537. inst &= 0xf000;
  538. /* Check for any type of DSP or support instruction */
  539. if ((inst == 0xf000) || (inst == 0x4000))
  540. return 1;
  541. return 0;
  542. }
  543. #else
  544. #define is_dsp_inst(regs) (0)
  545. #endif /* CONFIG_SH_DSP */
  546. #ifdef CONFIG_CPU_SH2A
  547. asmlinkage void do_divide_error(unsigned long r4, unsigned long r5,
  548. unsigned long r6, unsigned long r7,
  549. struct pt_regs __regs)
  550. {
  551. siginfo_t info;
  552. switch (r4) {
  553. case TRAP_DIVZERO_ERROR:
  554. info.si_code = FPE_INTDIV;
  555. break;
  556. case TRAP_DIVOVF_ERROR:
  557. info.si_code = FPE_INTOVF;
  558. break;
  559. }
  560. force_sig_info(SIGFPE, &info, current);
  561. }
  562. #endif
  563. asmlinkage void do_reserved_inst(unsigned long r4, unsigned long r5,
  564. unsigned long r6, unsigned long r7,
  565. struct pt_regs __regs)
  566. {
  567. struct pt_regs *regs = RELOC_HIDE(&__regs, 0);
  568. unsigned long error_code;
  569. struct task_struct *tsk = current;
  570. #ifdef CONFIG_SH_FPU_EMU
  571. unsigned short inst = 0;
  572. int err;
  573. get_user(inst, (unsigned short*)regs->pc);
  574. err = do_fpu_inst(inst, regs);
  575. if (!err) {
  576. regs->pc += instruction_size(inst);
  577. return;
  578. }
  579. /* not a FPU inst. */
  580. #endif
  581. #ifdef CONFIG_SH_DSP
  582. /* Check if it's a DSP instruction */
  583. if (is_dsp_inst(regs)) {
  584. /* Enable DSP mode, and restart instruction. */
  585. regs->sr |= SR_DSP;
  586. return;
  587. }
  588. #endif
  589. error_code = lookup_exception_vector();
  590. local_irq_enable();
  591. CHK_REMOTE_DEBUG(regs);
  592. force_sig(SIGILL, tsk);
  593. die_if_no_fixup("reserved instruction", regs, error_code);
  594. }
  595. #ifdef CONFIG_SH_FPU_EMU
  596. static int emulate_branch(unsigned short inst, struct pt_regs* regs)
  597. {
  598. /*
  599. * bfs: 8fxx: PC+=d*2+4;
  600. * bts: 8dxx: PC+=d*2+4;
  601. * bra: axxx: PC+=D*2+4;
  602. * bsr: bxxx: PC+=D*2+4 after PR=PC+4;
  603. * braf:0x23: PC+=Rn*2+4;
  604. * bsrf:0x03: PC+=Rn*2+4 after PR=PC+4;
  605. * jmp: 4x2b: PC=Rn;
  606. * jsr: 4x0b: PC=Rn after PR=PC+4;
  607. * rts: 000b: PC=PR;
  608. */
  609. if ((inst & 0xfd00) == 0x8d00) {
  610. regs->pc += SH_PC_8BIT_OFFSET(inst);
  611. return 0;
  612. }
  613. if ((inst & 0xe000) == 0xa000) {
  614. regs->pc += SH_PC_12BIT_OFFSET(inst);
  615. return 0;
  616. }
  617. if ((inst & 0xf0df) == 0x0003) {
  618. regs->pc += regs->regs[(inst & 0x0f00) >> 8] + 4;
  619. return 0;
  620. }
  621. if ((inst & 0xf0df) == 0x400b) {
  622. regs->pc = regs->regs[(inst & 0x0f00) >> 8];
  623. return 0;
  624. }
  625. if ((inst & 0xffff) == 0x000b) {
  626. regs->pc = regs->pr;
  627. return 0;
  628. }
  629. return 1;
  630. }
  631. #endif
  632. asmlinkage void do_illegal_slot_inst(unsigned long r4, unsigned long r5,
  633. unsigned long r6, unsigned long r7,
  634. struct pt_regs __regs)
  635. {
  636. struct pt_regs *regs = RELOC_HIDE(&__regs, 0);
  637. unsigned long inst;
  638. struct task_struct *tsk = current;
  639. if (kprobe_handle_illslot(regs->pc) == 0)
  640. return;
  641. #ifdef CONFIG_SH_FPU_EMU
  642. get_user(inst, (unsigned short *)regs->pc + 1);
  643. if (!do_fpu_inst(inst, regs)) {
  644. get_user(inst, (unsigned short *)regs->pc);
  645. if (!emulate_branch(inst, regs))
  646. return;
  647. /* fault in branch.*/
  648. }
  649. /* not a FPU inst. */
  650. #endif
  651. inst = lookup_exception_vector();
  652. local_irq_enable();
  653. CHK_REMOTE_DEBUG(regs);
  654. force_sig(SIGILL, tsk);
  655. die_if_no_fixup("illegal slot instruction", regs, inst);
  656. }
  657. asmlinkage void do_exception_error(unsigned long r4, unsigned long r5,
  658. unsigned long r6, unsigned long r7,
  659. struct pt_regs __regs)
  660. {
  661. struct pt_regs *regs = RELOC_HIDE(&__regs, 0);
  662. long ex;
  663. ex = lookup_exception_vector();
  664. die_if_kernel("exception", regs, ex);
  665. }
  666. #if defined(CONFIG_SH_STANDARD_BIOS)
  667. void *gdb_vbr_vector;
  668. static inline void __init gdb_vbr_init(void)
  669. {
  670. register unsigned long vbr;
  671. /*
  672. * Read the old value of the VBR register to initialise
  673. * the vector through which debug and BIOS traps are
  674. * delegated by the Linux trap handler.
  675. */
  676. asm volatile("stc vbr, %0" : "=r" (vbr));
  677. gdb_vbr_vector = (void *)(vbr + 0x100);
  678. printk("Setting GDB trap vector to 0x%08lx\n",
  679. (unsigned long)gdb_vbr_vector);
  680. }
  681. #endif
  682. void __cpuinit per_cpu_trap_init(void)
  683. {
  684. extern void *vbr_base;
  685. #ifdef CONFIG_SH_STANDARD_BIOS
  686. if (raw_smp_processor_id() == 0)
  687. gdb_vbr_init();
  688. #endif
  689. /* NOTE: The VBR value should be at P1
  690. (or P2, virtural "fixed" address space).
  691. It's definitely should not in physical address. */
  692. asm volatile("ldc %0, vbr"
  693. : /* no output */
  694. : "r" (&vbr_base)
  695. : "memory");
  696. }
  697. void *set_exception_table_vec(unsigned int vec, void *handler)
  698. {
  699. extern void *exception_handling_table[];
  700. void *old_handler;
  701. old_handler = exception_handling_table[vec];
  702. exception_handling_table[vec] = handler;
  703. return old_handler;
  704. }
  705. void __init trap_init(void)
  706. {
  707. set_exception_table_vec(TRAP_RESERVED_INST, do_reserved_inst);
  708. set_exception_table_vec(TRAP_ILLEGAL_SLOT_INST, do_illegal_slot_inst);
  709. #if defined(CONFIG_CPU_SH4) && !defined(CONFIG_SH_FPU) || \
  710. defined(CONFIG_SH_FPU_EMU)
  711. /*
  712. * For SH-4 lacking an FPU, treat floating point instructions as
  713. * reserved. They'll be handled in the math-emu case, or faulted on
  714. * otherwise.
  715. */
  716. set_exception_table_evt(0x800, do_reserved_inst);
  717. set_exception_table_evt(0x820, do_illegal_slot_inst);
  718. #elif defined(CONFIG_SH_FPU)
  719. #ifdef CONFIG_CPU_SUBTYPE_SHX3
  720. set_exception_table_evt(0xd80, fpu_state_restore_trap_handler);
  721. set_exception_table_evt(0xda0, fpu_state_restore_trap_handler);
  722. #else
  723. set_exception_table_evt(0x800, fpu_state_restore_trap_handler);
  724. set_exception_table_evt(0x820, fpu_state_restore_trap_handler);
  725. #endif
  726. #endif
  727. #ifdef CONFIG_CPU_SH2
  728. set_exception_table_vec(TRAP_ADDRESS_ERROR, address_error_trap_handler);
  729. #endif
  730. #ifdef CONFIG_CPU_SH2A
  731. set_exception_table_vec(TRAP_DIVZERO_ERROR, do_divide_error);
  732. set_exception_table_vec(TRAP_DIVOVF_ERROR, do_divide_error);
  733. #ifdef CONFIG_SH_FPU
  734. set_exception_table_vec(TRAP_FPU_ERROR, fpu_error_trap_handler);
  735. #endif
  736. #endif
  737. /* Setup VBR for boot cpu */
  738. per_cpu_trap_init();
  739. }
  740. void show_trace(struct task_struct *tsk, unsigned long *sp,
  741. struct pt_regs *regs)
  742. {
  743. unsigned long addr;
  744. if (regs && user_mode(regs))
  745. return;
  746. printk("\nCall trace: ");
  747. #ifdef CONFIG_KALLSYMS
  748. printk("\n");
  749. #endif
  750. while (!kstack_end(sp)) {
  751. addr = *sp++;
  752. if (kernel_text_address(addr))
  753. print_ip_sym(addr);
  754. }
  755. printk("\n");
  756. if (!tsk)
  757. tsk = current;
  758. debug_show_held_locks(tsk);
  759. }
  760. void show_stack(struct task_struct *tsk, unsigned long *sp)
  761. {
  762. unsigned long stack;
  763. if (!tsk)
  764. tsk = current;
  765. if (tsk == current)
  766. sp = (unsigned long *)current_stack_pointer;
  767. else
  768. sp = (unsigned long *)tsk->thread.sp;
  769. stack = (unsigned long)sp;
  770. dump_mem("Stack: ", stack, THREAD_SIZE +
  771. (unsigned long)task_stack_page(tsk));
  772. show_trace(tsk, sp, NULL);
  773. }
  774. void dump_stack(void)
  775. {
  776. show_stack(NULL, NULL);
  777. }
  778. EXPORT_SYMBOL(dump_stack);