1 /* $OpenBSD: trap.c,v 1.19 1998/09/30 12:40:41 pefo Exp $ */
4 * Copyright (c) 1988 University of Utah.
5 * Copyright (c) 1992, 1993
6 * The Regents of the University of California. All rights reserved.
8 * This code is derived from software contributed to Berkeley by
9 * the Systems Programming Group of the University of Utah Computer
10 * Science Department and Ralph Campbell.
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 4. Neither the name of the University nor the names of its contributors
21 * may be used to endorse or promote products derived from this software
22 * without specific prior written permission.
24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * from: Utah Hdr: trap.c 1.32 91/04/06
38 * from: @(#)trap.c 8.5 (Berkeley) 1/11/94
39 * JNPR: trap.c,v 1.13.2.2 2007/08/29 10:03:49 girish
41 #include <sys/cdefs.h>
42 __FBSDID("$FreeBSD$");
44 #include "opt_compat.h"
46 #include "opt_ktrace.h"
48 #include <sys/param.h>
49 #include <sys/systm.h>
50 #include <sys/sysent.h>
52 #include <sys/kernel.h>
53 #include <sys/signalvar.h>
54 #include <sys/syscall.h>
57 #include <vm/vm_extern.h>
58 #include <vm/vm_kern.h>
59 #include <vm/vm_page.h>
60 #include <vm/vm_map.h>
61 #include <vm/vm_param.h>
62 #include <sys/vmmeter.h>
63 #include <sys/ptrace.h>
66 #include <sys/vnode.h>
67 #include <sys/pioctl.h>
68 #include <sys/sysctl.h>
69 #include <sys/syslog.h>
72 #include <sys/ktrace.h>
74 #include <net/netisr.h>
76 #include <machine/trap.h>
77 #include <machine/cpu.h>
78 #include <machine/pte.h>
79 #include <machine/pmap.h>
80 #include <machine/md_var.h>
81 #include <machine/mips_opcode.h>
82 #include <machine/frame.h>
83 #include <machine/regnum.h>
84 #include <machine/tls.h>
87 #include <machine/db_machdep.h>
88 #include <ddb/db_sym.h>
94 #include <sys/dtrace_bsd.h>
99 SYSCTL_INT(_machdep, OID_AUTO, trap_debug, CTLFLAG_RW,
100 &trap_debug, 0, "Debug information on all traps");
103 #define lbu_macro(data, addr) \
104 __asm __volatile ("lbu %0, 0x0(%1)" \
105 : "=r" (data) /* outputs */ \
106 : "r" (addr)); /* inputs */
108 #define lb_macro(data, addr) \
109 __asm __volatile ("lb %0, 0x0(%1)" \
110 : "=r" (data) /* outputs */ \
111 : "r" (addr)); /* inputs */
113 #define lwl_macro(data, addr) \
114 __asm __volatile ("lwl %0, 0x0(%1)" \
115 : "=r" (data) /* outputs */ \
116 : "r" (addr)); /* inputs */
118 #define lwr_macro(data, addr) \
119 __asm __volatile ("lwr %0, 0x0(%1)" \
120 : "=r" (data) /* outputs */ \
121 : "r" (addr)); /* inputs */
123 #define ldl_macro(data, addr) \
124 __asm __volatile ("ldl %0, 0x0(%1)" \
125 : "=r" (data) /* outputs */ \
126 : "r" (addr)); /* inputs */
128 #define ldr_macro(data, addr) \
129 __asm __volatile ("ldr %0, 0x0(%1)" \
130 : "=r" (data) /* outputs */ \
131 : "r" (addr)); /* inputs */
133 #define sb_macro(data, addr) \
134 __asm __volatile ("sb %0, 0x0(%1)" \
136 : "r" (data), "r" (addr)); /* inputs */
138 #define swl_macro(data, addr) \
139 __asm __volatile ("swl %0, 0x0(%1)" \
141 : "r" (data), "r" (addr)); /* inputs */
143 #define swr_macro(data, addr) \
144 __asm __volatile ("swr %0, 0x0(%1)" \
146 : "r" (data), "r" (addr)); /* inputs */
148 #define sdl_macro(data, addr) \
149 __asm __volatile ("sdl %0, 0x0(%1)" \
151 : "r" (data), "r" (addr)); /* inputs */
153 #define sdr_macro(data, addr) \
154 __asm __volatile ("sdr %0, 0x0(%1)" \
156 : "r" (data), "r" (addr)); /* inputs */
158 static void log_illegal_instruction(const char *, struct trapframe *);
159 static void log_bad_page_fault(char *, struct trapframe *, int);
160 static void log_frame_dump(struct trapframe *frame);
161 static void get_mapping_info(vm_offset_t, pd_entry_t **, pt_entry_t **);
164 static void trap_frame_dump(struct trapframe *frame);
167 void (*machExceptionTable[]) (void)= {
169 * The kernel exception handlers.
171 MipsKernIntr, /* external interrupt */
172 MipsKernGenException, /* TLB modification */
173 MipsTLBInvalidException,/* TLB miss (load or instr. fetch) */
174 MipsTLBInvalidException,/* TLB miss (store) */
175 MipsKernGenException, /* address error (load or I-fetch) */
176 MipsKernGenException, /* address error (store) */
177 MipsKernGenException, /* bus error (I-fetch) */
178 MipsKernGenException, /* bus error (load or store) */
179 MipsKernGenException, /* system call */
180 MipsKernGenException, /* breakpoint */
181 MipsKernGenException, /* reserved instruction */
182 MipsKernGenException, /* coprocessor unusable */
183 MipsKernGenException, /* arithmetic overflow */
184 MipsKernGenException, /* trap exception */
185 MipsKernGenException, /* virtual coherence exception inst */
186 MipsKernGenException, /* floating point exception */
187 MipsKernGenException, /* reserved */
188 MipsKernGenException, /* reserved */
189 MipsKernGenException, /* reserved */
190 MipsKernGenException, /* reserved */
191 MipsKernGenException, /* reserved */
192 MipsKernGenException, /* reserved */
193 MipsKernGenException, /* reserved */
194 MipsKernGenException, /* watch exception */
195 MipsKernGenException, /* reserved */
196 MipsKernGenException, /* reserved */
197 MipsKernGenException, /* reserved */
198 MipsKernGenException, /* reserved */
199 MipsKernGenException, /* reserved */
200 MipsKernGenException, /* reserved */
201 MipsKernGenException, /* reserved */
202 MipsKernGenException, /* virtual coherence exception data */
204 * The user exception handlers.
206 MipsUserIntr, /* 0 */
207 MipsUserGenException, /* 1 */
208 MipsTLBInvalidException,/* 2 */
209 MipsTLBInvalidException,/* 3 */
210 MipsUserGenException, /* 4 */
211 MipsUserGenException, /* 5 */
212 MipsUserGenException, /* 6 */
213 MipsUserGenException, /* 7 */
214 MipsUserGenException, /* 8 */
215 MipsUserGenException, /* 9 */
216 MipsUserGenException, /* 10 */
217 MipsUserGenException, /* 11 */
218 MipsUserGenException, /* 12 */
219 MipsUserGenException, /* 13 */
220 MipsUserGenException, /* 14 */
221 MipsUserGenException, /* 15 */
222 MipsUserGenException, /* 16 */
223 MipsUserGenException, /* 17 */
224 MipsUserGenException, /* 18 */
225 MipsUserGenException, /* 19 */
226 MipsUserGenException, /* 20 */
227 MipsUserGenException, /* 21 */
228 MipsUserGenException, /* 22 */
229 MipsUserGenException, /* 23 */
230 MipsUserGenException, /* 24 */
231 MipsUserGenException, /* 25 */
232 MipsUserGenException, /* 26 */
233 MipsUserGenException, /* 27 */
234 MipsUserGenException, /* 28 */
235 MipsUserGenException, /* 29 */
236 MipsUserGenException, /* 20 */
237 MipsUserGenException, /* 31 */
240 char *trap_type[] = {
241 "external interrupt",
243 "TLB miss (load or instr. fetch)",
245 "address error (load or I-fetch)",
246 "address error (store)",
247 "bus error (I-fetch)",
248 "bus error (load or store)",
251 "reserved instruction",
252 "coprocessor unusable",
253 "arithmetic overflow",
255 "virtual coherency instruction",
272 "virtual coherency data",
275 #if !defined(SMP) && (defined(DDB) || defined(DEBUG))
276 struct trapdebug trapdebug[TRAPSIZE], *trp = trapdebug;
279 #if defined(DDB) || defined(DEBUG)
280 void stacktrace(struct trapframe *);
281 void logstacktrace(struct trapframe *);
284 #define KERNLAND(x) ((vm_offset_t)(x) >= VM_MIN_KERNEL_ADDRESS && (vm_offset_t)(x) < VM_MAX_KERNEL_ADDRESS)
285 #define DELAYBRANCH(x) ((int)(x) < 0)
288 * MIPS load/store access type
301 char *access_name[] = {
302 "Load Halfword Unsigned",
304 "Load Word Unsigned",
313 #include <machine/octeon_cop2.h>
316 static int allow_unaligned_acc = 1;
318 SYSCTL_INT(_vm, OID_AUTO, allow_unaligned_acc, CTLFLAG_RW,
319 &allow_unaligned_acc, 0, "Allow unaligned accesses");
322 * FP emulation is assumed to work on O32, but the code is outdated and crufty
323 * enough that it's a more sensible default to have it disabled when using
324 * other ABIs. At the very least, it needs a lot of help in using
325 * type-semantic ABI-oblivious macros for everything it does.
327 #if defined(__mips_o32)
328 static int emulate_fp = 1;
330 static int emulate_fp = 0;
332 SYSCTL_INT(_machdep, OID_AUTO, emulate_fp, CTLFLAG_RW,
333 &emulate_fp, 0, "Emulate unimplemented FPU instructions");
335 static int emulate_unaligned_access(struct trapframe *frame, int mode);
337 extern void fswintrberr(void); /* XXX */
340 cpu_fetch_syscall_args(struct thread *td, struct syscall_args *sa)
342 struct trapframe *locr0 = td->td_frame;
343 struct sysentvec *se;
346 bzero(sa->args, sizeof(sa->args));
348 /* compute next PC after syscall instruction */
349 td->td_pcb->pcb_tpc = sa->trapframe->pc; /* Remember if restart */
350 if (DELAYBRANCH(sa->trapframe->cause)) /* Check BD bit */
351 locr0->pc = MipsEmulateBranch(locr0, sa->trapframe->pc, 0, 0);
353 locr0->pc += sizeof(int);
354 sa->code = locr0->v0;
360 * This is an indirect syscall, in which the code is the first argument.
362 #if (!defined(__mips_n32) && !defined(__mips_n64)) || defined(COMPAT_FREEBSD32)
363 if (sa->code == SYS___syscall && SV_PROC_FLAG(td->td_proc, SV_ILP32)) {
365 * Like syscall, but code is a quad, so as to maintain alignment
366 * for the rest of the arguments.
368 if (_QUAD_LOWWORD == 0)
369 sa->code = locr0->a0;
371 sa->code = locr0->a1;
372 sa->args[0] = locr0->a2;
373 sa->args[1] = locr0->a3;
379 * This is either not a quad syscall, or is a quad syscall with a
380 * new ABI in which quads fit in a single register.
382 sa->code = locr0->a0;
383 sa->args[0] = locr0->a1;
384 sa->args[1] = locr0->a2;
385 sa->args[2] = locr0->a3;
387 #if defined(__mips_n32) || defined(__mips_n64)
388 #ifdef COMPAT_FREEBSD32
389 if (!SV_PROC_FLAG(td->td_proc, SV_ILP32)) {
392 * Non-o32 ABIs support more arguments in registers.
394 sa->args[3] = locr0->a4;
395 sa->args[4] = locr0->a5;
396 sa->args[5] = locr0->a6;
397 sa->args[6] = locr0->a7;
399 #ifdef COMPAT_FREEBSD32
406 * A direct syscall, arguments are just parameters to the syscall.
408 sa->args[0] = locr0->a0;
409 sa->args[1] = locr0->a1;
410 sa->args[2] = locr0->a2;
411 sa->args[3] = locr0->a3;
413 #if defined (__mips_n32) || defined(__mips_n64)
414 #ifdef COMPAT_FREEBSD32
415 if (!SV_PROC_FLAG(td->td_proc, SV_ILP32)) {
418 * Non-o32 ABIs support more arguments in registers.
420 sa->args[4] = locr0->a4;
421 sa->args[5] = locr0->a5;
422 sa->args[6] = locr0->a6;
423 sa->args[7] = locr0->a7;
425 #ifdef COMPAT_FREEBSD32
434 printf("SYSCALL #%d pid:%u\n", sa->code, td->td_proc->p_pid);
437 se = td->td_proc->p_sysent;
440 * Shouldn't this go before switching on the code?
443 sa->code &= se->sv_mask;
445 if (sa->code >= se->sv_size)
446 sa->callp = &se->sv_table[0];
448 sa->callp = &se->sv_table[sa->code];
450 sa->narg = sa->callp->sy_narg;
452 if (sa->narg > nsaved) {
453 #if defined(__mips_n32) || defined(__mips_n64)
456 * Is this right for new ABIs? I think the 4 there
457 * should be 8, size there are 8 registers to skip,
458 * not 4, but I'm not certain.
460 #ifdef COMPAT_FREEBSD32
461 if (!SV_PROC_FLAG(td->td_proc, SV_ILP32))
463 printf("SYSCALL #%u pid:%u, narg (%u) > nsaved (%u).\n",
464 sa->code, td->td_proc->p_pid, sa->narg, nsaved);
466 #if (defined(__mips_n32) || defined(__mips_n64)) && defined(COMPAT_FREEBSD32)
467 if (SV_PROC_FLAG(td->td_proc, SV_ILP32)) {
471 error = 0; /* XXX GCC is awful. */
472 for (i = nsaved; i < sa->narg; i++) {
473 error = copyin((caddr_t)(intptr_t)(locr0->sp +
474 (4 + (i - nsaved)) * sizeof(int32_t)),
475 (caddr_t)&arg, sizeof arg);
482 error = copyin((caddr_t)(intptr_t)(locr0->sp +
483 4 * sizeof(register_t)), (caddr_t)&sa->args[nsaved],
484 (u_int)(sa->narg - nsaved) * sizeof(register_t));
493 td->td_retval[0] = 0;
494 td->td_retval[1] = locr0->v1;
502 #include "../../kern/subr_syscall.c"
505 * Handle an exception.
506 * Called from MipsKernGenException() or MipsUserGenException()
507 * when a processor trap occurs.
508 * In the case of a kernel trap, we return the pc where to resume if
509 * p->p_addr->u_pcb.pcb_onfault is set, otherwise, return old pc.
512 trap(struct trapframe *trapframe)
517 struct thread *td = curthread;
518 struct proc *p = curproc;
527 register_t *frame_regs;
529 trapdebug_enter(trapframe, 0);
531 type = (trapframe->cause & MIPS_CR_EXC_CODE) >> MIPS_CR_EXC_CODE_SHIFT;
532 if (TRAPF_USERMODE(trapframe)) {
540 * Enable hardware interrupts if they were on before the trap. If it
541 * was off disable all so we don't accidently enable it when doing a
542 * return to userland.
544 if (trapframe->sr & MIPS_SR_INT_IE) {
545 set_intr_mask(trapframe->sr & MIPS_SR_INT_MASK);
553 static vm_offset_t last_badvaddr = 0;
554 static vm_offset_t this_badvaddr = 0;
555 static int count = 0;
558 printf("trap type %x (%s - ", type,
559 trap_type[type & (~T_USER)]);
562 printf("user mode)\n");
564 printf("kernel mode)\n");
567 printf("cpuid = %d\n", PCPU_GET(cpuid));
569 pid = mips_rd_entryhi() & TLBHI_ASID_MASK;
570 printf("badaddr = %#jx, pc = %#jx, ra = %#jx, sp = %#jx, sr = %jx, pid = %d, ASID = %u\n",
571 (intmax_t)trapframe->badvaddr, (intmax_t)trapframe->pc, (intmax_t)trapframe->ra,
572 (intmax_t)trapframe->sp, (intmax_t)trapframe->sr,
573 (curproc ? curproc->p_pid : -1), pid);
575 switch (type & ~T_USER) {
581 this_badvaddr = trapframe->badvaddr;
584 this_badvaddr = trapframe->ra;
587 this_badvaddr = trapframe->pc;
590 if ((last_badvaddr == this_badvaddr) &&
591 ((type & ~T_USER) != T_SYSCALL)) {
593 trap_frame_dump(trapframe);
594 panic("too many faults at %p\n", (void *)last_badvaddr);
597 last_badvaddr = this_badvaddr;
605 * A trap can occur while DTrace executes a probe. Before
606 * executing the probe, DTrace blocks re-scheduling and sets
607 * a flag in its per-cpu flags to indicate that it doesn't
608 * want to fault. On returning from the probe, the no-fault
609 * flag is cleared and finally re-scheduling is enabled.
611 * If the DTrace kernel module has registered a trap handler,
612 * call it and if it returns non-zero, assume that it has
613 * handled the trap and modified the trap frame so that this
614 * function can return normally.
617 * XXXDTRACE: add pid probe handler here (if ever)
620 if (dtrace_trap_func != NULL &&
621 (*dtrace_trap_func)(trapframe, type) != 0)
622 return (trapframe->pc);
629 kdb_trap(type, 0, trapframe);
634 /* check for kernel address */
635 if (KERNLAND(trapframe->badvaddr)) {
636 if (pmap_emulate_modified(kernel_pmap,
637 trapframe->badvaddr) != 0) {
638 ftype = VM_PROT_WRITE;
641 return (trapframe->pc);
645 case T_TLB_MOD + T_USER:
646 pmap = &p->p_vmspace->vm_pmap;
647 if (pmap_emulate_modified(pmap, trapframe->badvaddr) != 0) {
648 ftype = VM_PROT_WRITE;
652 return (trapframe->pc);
657 ftype = (type == T_TLB_ST_MISS) ? VM_PROT_WRITE : VM_PROT_READ;
658 /* check for kernel address */
659 if (KERNLAND(trapframe->badvaddr)) {
664 va = trunc_page((vm_offset_t)trapframe->badvaddr);
665 rv = vm_fault(kernel_map, va, ftype, VM_FAULT_NORMAL);
666 if (rv == KERN_SUCCESS)
667 return (trapframe->pc);
668 if (td->td_pcb->pcb_onfault != NULL) {
669 pc = (register_t)(intptr_t)td->td_pcb->pcb_onfault;
670 td->td_pcb->pcb_onfault = NULL;
677 * It is an error for the kernel to access user space except
678 * through the copyin/copyout routines.
680 if (td->td_pcb->pcb_onfault == NULL)
683 /* check for fuswintr() or suswintr() getting a page fault */
684 /* XXX There must be a nicer way to do this. */
685 if (td->td_pcb->pcb_onfault == fswintrberr) {
686 pc = (register_t)(intptr_t)td->td_pcb->pcb_onfault;
687 td->td_pcb->pcb_onfault = NULL;
693 case T_TLB_LD_MISS + T_USER:
694 ftype = VM_PROT_READ;
697 case T_TLB_ST_MISS + T_USER:
698 ftype = VM_PROT_WRITE;
708 va = trunc_page((vm_offset_t)trapframe->badvaddr);
709 if (KERNLAND(trapframe->badvaddr)) {
711 * Don't allow user-mode faults in kernel
718 * Keep swapout from messing with us during this
725 rv = vm_fault(map, va, ftype, VM_FAULT_NORMAL);
731 * XXXDTRACE: add dtrace_doubletrap_func here?
734 printf("vm_fault(%p (pmap %p), %p (%p), %x, %d) -> %x at pc %p\n",
735 map, &vm->vm_pmap, (void *)va, (void *)(intptr_t)trapframe->badvaddr,
736 ftype, VM_FAULT_NORMAL, rv, (void *)(intptr_t)trapframe->pc);
739 if (rv == KERN_SUCCESS) {
741 return (trapframe->pc);
747 if (td->td_pcb->pcb_onfault != NULL) {
748 pc = (register_t)(intptr_t)td->td_pcb->pcb_onfault;
749 td->td_pcb->pcb_onfault = NULL;
755 i = ((rv == KERN_PROTECTION_FAILURE) ? SIGBUS : SIGSEGV);
756 addr = trapframe->pc;
758 msg = "BAD_PAGE_FAULT";
759 log_bad_page_fault(msg, trapframe, type);
764 case T_ADDR_ERR_LD + T_USER: /* misaligned or kseg access */
765 case T_ADDR_ERR_ST + T_USER: /* misaligned or kseg access */
766 if (trapframe->badvaddr < 0 ||
767 trapframe->badvaddr >= VM_MAXUSER_ADDRESS) {
768 msg = "ADDRESS_SPACE_ERR";
769 } else if (allow_unaligned_acc) {
772 if (type == (T_ADDR_ERR_LD + T_USER))
775 mode = VM_PROT_WRITE;
777 access_type = emulate_unaligned_access(trapframe, mode);
778 if (access_type != 0)
780 msg = "ALIGNMENT_FIX_ERR";
787 case T_BUS_ERR_IFETCH + T_USER: /* BERR asserted to cpu */
788 case T_BUS_ERR_LD_ST + T_USER: /* BERR asserted to cpu */
789 ucode = 0; /* XXX should be VM_PROT_something */
791 addr = trapframe->pc;
794 log_bad_page_fault(msg, trapframe, type);
797 case T_SYSCALL + T_USER:
799 struct syscall_args sa;
802 sa.trapframe = trapframe;
803 error = syscallenter(td, &sa);
805 #if !defined(SMP) && (defined(DDB) || defined(DEBUG))
806 if (trp == trapdebug)
807 trapdebug[TRAPSIZE - 1].code = sa.code;
809 trp[-1].code = sa.code;
811 trapdebug_enter(td->td_frame, -sa.code);
814 * The sync'ing of I & D caches for SYS_ptrace() is
815 * done by procfs_domem() through procfs_rwmem()
816 * instead of being done here under a special check
819 syscallret(td, error, &sa);
820 return (trapframe->pc);
825 kdb_trap(type, 0, trapframe);
826 return (trapframe->pc);
829 case T_BREAK + T_USER:
834 /* compute address of break instruction */
836 if (DELAYBRANCH(trapframe->cause))
839 /* read break instruction */
840 instr = fuword32((caddr_t)va);
842 printf("trap: %s (%d) breakpoint %x at %x: (adr %x ins %x)\n",
843 p->p_comm, p->p_pid, instr, trapframe->pc,
844 p->p_md.md_ss_addr, p->p_md.md_ss_instr); /* XXX */
846 if (td->td_md.md_ss_addr != va ||
847 instr != MIPS_BREAK_SSTEP) {
849 addr = trapframe->pc;
853 * The restoration of the original instruction and
854 * the clearing of the berakpoint will be done later
855 * by the call to ptrace_clear_single_step() in
856 * issignal() when SIGTRAP is processed.
858 addr = trapframe->pc;
863 case T_IWATCH + T_USER:
864 case T_DWATCH + T_USER:
868 /* compute address of trapped instruction */
870 if (DELAYBRANCH(trapframe->cause))
872 printf("watch exception @ %p\n", (void *)va);
878 case T_TRAP + T_USER:
882 struct trapframe *locr0 = td->td_frame;
884 /* compute address of trap instruction */
886 if (DELAYBRANCH(trapframe->cause))
888 /* read break instruction */
889 instr = fuword32((caddr_t)va);
891 if (DELAYBRANCH(trapframe->cause)) { /* Check BD bit */
892 locr0->pc = MipsEmulateBranch(locr0, trapframe->pc, 0,
895 locr0->pc += sizeof(int);
898 i = SIGEMT; /* Stuff it with something for now */
902 case T_RES_INST + T_USER:
905 inst = *(InstFmt *)(intptr_t)trapframe->pc;
906 switch (inst.RType.op) {
908 switch (inst.RType.func) {
910 /* Register 29 used for TLS */
911 if (inst.RType.rd == 29) {
912 frame_regs = &(trapframe->zero);
913 frame_regs[inst.RType.rt] = (register_t)(intptr_t)td->td_md.md_tls;
914 #if defined(__mips_n64) && defined(COMPAT_FREEBSD32)
915 if (SV_PROC_FLAG(td->td_proc, SV_ILP32))
916 frame_regs[inst.RType.rt] += TLS_TP_OFFSET + TLS_TCB_SIZE32;
919 frame_regs[inst.RType.rt] += TLS_TP_OFFSET + TLS_TCB_SIZE;
920 trapframe->pc += sizeof(int);
928 log_illegal_instruction("RES_INST", trapframe);
930 addr = trapframe->pc;
939 cop = (trapframe->cause & MIPS_CR_COP_ERR) >> MIPS_CR_COP_ERR_SHIFT;
940 /* Handle only COP2 exception */
944 addr = trapframe->pc;
945 /* save userland cop2 context if it has been touched */
946 if ((td->td_md.md_flags & MDTD_COP2USED) &&
947 (td->td_md.md_cop2owner == COP2_OWNER_USERLAND)) {
948 if (td->td_md.md_ucop2)
949 octeon_cop2_save(td->td_md.md_ucop2);
951 panic("COP2 was used in user mode but md_ucop2 is NULL");
954 if (td->td_md.md_cop2 == NULL) {
955 td->td_md.md_cop2 = octeon_cop2_alloc_ctx();
956 if (td->td_md.md_cop2 == NULL)
957 panic("Failed to allocate COP2 context");
958 memset(td->td_md.md_cop2, 0, sizeof(*td->td_md.md_cop2));
961 octeon_cop2_restore(td->td_md.md_cop2);
963 /* Make userland re-request its context */
964 td->td_frame->sr &= ~MIPS_SR_COP_2_BIT;
965 td->td_md.md_flags |= MDTD_COP2USED;
966 td->td_md.md_cop2owner = COP2_OWNER_KERNEL;
967 /* Enable COP2, it will be disabled in cpu_switch */
968 mips_wr_status(mips_rd_status() | MIPS_SR_COP_2_BIT);
969 return (trapframe->pc);
975 case T_COP_UNUSABLE + T_USER:
976 cop = (trapframe->cause & MIPS_CR_COP_ERR) >> MIPS_CR_COP_ERR_SHIFT;
978 #if !defined(CPU_HAVEFPU)
979 /* FP (COP1) instruction */
980 log_illegal_instruction("COP1_UNUSABLE", trapframe);
984 addr = trapframe->pc;
985 MipsSwitchFPState(PCPU_GET(fpcurthread), td->td_frame);
986 PCPU_SET(fpcurthread, td);
987 td->td_frame->sr |= MIPS_SR_COP_1_BIT;
988 td->td_md.md_flags |= MDTD_FPUSED;
994 addr = trapframe->pc;
995 if ((td->td_md.md_flags & MDTD_COP2USED) &&
996 (td->td_md.md_cop2owner == COP2_OWNER_KERNEL)) {
997 if (td->td_md.md_cop2)
998 octeon_cop2_save(td->td_md.md_cop2);
1000 panic("COP2 was used in kernel mode but md_cop2 is NULL");
1003 if (td->td_md.md_ucop2 == NULL) {
1004 td->td_md.md_ucop2 = octeon_cop2_alloc_ctx();
1005 if (td->td_md.md_ucop2 == NULL)
1006 panic("Failed to allocate userland COP2 context");
1007 memset(td->td_md.md_ucop2, 0, sizeof(*td->td_md.md_ucop2));
1010 octeon_cop2_restore(td->td_md.md_ucop2);
1012 td->td_frame->sr |= MIPS_SR_COP_2_BIT;
1013 td->td_md.md_flags |= MDTD_COP2USED;
1014 td->td_md.md_cop2owner = COP2_OWNER_USERLAND;
1019 log_illegal_instruction("COPn_UNUSABLE", trapframe);
1020 i = SIGILL; /* only FPU instructions allowed */
1025 #if !defined(SMP) && (defined(DDB) || defined(DEBUG))
1028 printf("FPU Trap: PC %#jx CR %x SR %x\n",
1029 (intmax_t)trapframe->pc, (unsigned)trapframe->cause, (unsigned)trapframe->sr);
1033 case T_FPE + T_USER:
1036 addr = trapframe->pc;
1039 MipsFPTrap(trapframe->sr, trapframe->cause, trapframe->pc);
1042 case T_OVFLOW + T_USER:
1044 addr = trapframe->pc;
1047 case T_ADDR_ERR_LD: /* misaligned access */
1048 case T_ADDR_ERR_ST: /* misaligned access */
1051 printf("+++ ADDR_ERR: type = %d, badvaddr = %#jx\n", type,
1052 (intmax_t)trapframe->badvaddr);
1055 /* Only allow emulation on a user address */
1056 if (allow_unaligned_acc &&
1057 ((vm_offset_t)trapframe->badvaddr < VM_MAXUSER_ADDRESS)) {
1060 if (type == T_ADDR_ERR_LD)
1061 mode = VM_PROT_READ;
1063 mode = VM_PROT_WRITE;
1065 access_type = emulate_unaligned_access(trapframe, mode);
1066 if (access_type != 0)
1067 return (trapframe->pc);
1071 case T_BUS_ERR_LD_ST: /* BERR asserted to cpu */
1072 if (td->td_pcb->pcb_onfault != NULL) {
1073 pc = (register_t)(intptr_t)td->td_pcb->pcb_onfault;
1074 td->td_pcb->pcb_onfault = NULL;
1083 #if !defined(SMP) && defined(DEBUG)
1084 stacktrace(!usermode ? trapframe : td->td_frame);
1088 printf("cpu:%d-", PCPU_GET(cpuid));
1090 printf("Trap cause = %d (%s - ", type,
1091 trap_type[type & (~T_USER)]);
1094 printf("user mode)\n");
1096 printf("kernel mode)\n");
1100 printf("badvaddr = %#jx, pc = %#jx, ra = %#jx, sr = %#jxx\n",
1101 (intmax_t)trapframe->badvaddr, (intmax_t)trapframe->pc, (intmax_t)trapframe->ra,
1102 (intmax_t)trapframe->sr);
1106 if (debugger_on_panic || kdb_active) {
1107 kdb_trap(type, 0, trapframe);
1112 td->td_frame->pc = trapframe->pc;
1113 td->td_frame->cause = trapframe->cause;
1114 td->td_frame->badvaddr = trapframe->badvaddr;
1115 ksiginfo_init_trap(&ksi);
1117 ksi.ksi_code = ucode;
1118 ksi.ksi_addr = (void *)addr;
1119 ksi.ksi_trapno = type;
1120 trapsignal(td, &ksi);
1124 * Note: we should only get here if returning to user mode.
1126 userret(td, trapframe);
1127 return (trapframe->pc);
1130 #if !defined(SMP) && (defined(DDB) || defined(DEBUG))
1138 printf("trapDump(%s)\n", msg);
1139 for (i = 0; i < TRAPSIZE; i++) {
1140 if (trp == trapdebug) {
1141 trp = &trapdebug[TRAPSIZE - 1];
1146 if (trp->cause == 0)
1149 printf("%s: ADR %jx PC %jx CR %jx SR %jx\n",
1150 trap_type[(trp->cause & MIPS_CR_EXC_CODE) >>
1151 MIPS_CR_EXC_CODE_SHIFT],
1152 (intmax_t)trp->vadr, (intmax_t)trp->pc,
1153 (intmax_t)trp->cause, (intmax_t)trp->status);
1155 printf(" RA %jx SP %jx code %d\n", (intmax_t)trp->ra,
1156 (intmax_t)trp->sp, (int)trp->code);
1164 * Return the resulting PC as if the branch was executed.
1167 MipsEmulateBranch(struct trapframe *framePtr, uintptr_t instPC, int fpcCSR,
1171 register_t *regsPtr = (register_t *) framePtr;
1172 uintptr_t retAddr = 0;
1175 #define GetBranchDest(InstPtr, inst) \
1176 (InstPtr + 4 + ((short)inst.IType.imm << 2))
1180 if (instptr < MIPS_KSEG0_START)
1181 inst.word = fuword32((void *)instptr);
1183 inst = *(InstFmt *) instptr;
1185 if ((vm_offset_t)instPC < MIPS_KSEG0_START)
1186 inst.word = fuword32((void *)instPC);
1188 inst = *(InstFmt *) instPC;
1191 switch ((int)inst.JType.op) {
1193 switch ((int)inst.RType.func) {
1196 retAddr = regsPtr[inst.RType.rs];
1200 retAddr = instPC + 4;
1206 switch ((int)inst.IType.rt) {
1211 if ((int)(regsPtr[inst.RType.rs]) < 0)
1212 retAddr = GetBranchDest(instPC, inst);
1214 retAddr = instPC + 8;
1221 if ((int)(regsPtr[inst.RType.rs]) >= 0)
1222 retAddr = GetBranchDest(instPC, inst);
1224 retAddr = instPC + 8;
1233 retAddr = instPC + 4; /* Like syscall... */
1237 panic("MipsEmulateBranch: Bad branch cond");
1243 retAddr = (inst.JType.target << 2) |
1244 ((unsigned)(instPC + 4) & 0xF0000000);
1249 if (regsPtr[inst.RType.rs] == regsPtr[inst.RType.rt])
1250 retAddr = GetBranchDest(instPC, inst);
1252 retAddr = instPC + 8;
1257 if (regsPtr[inst.RType.rs] != regsPtr[inst.RType.rt])
1258 retAddr = GetBranchDest(instPC, inst);
1260 retAddr = instPC + 8;
1265 if ((int)(regsPtr[inst.RType.rs]) <= 0)
1266 retAddr = GetBranchDest(instPC, inst);
1268 retAddr = instPC + 8;
1273 if ((int)(regsPtr[inst.RType.rs]) > 0)
1274 retAddr = GetBranchDest(instPC, inst);
1276 retAddr = instPC + 8;
1280 switch (inst.RType.rs) {
1283 if ((inst.RType.rt & COPz_BC_TF_MASK) == COPz_BC_TRUE)
1284 condition = fpcCSR & MIPS_FPU_COND_BIT;
1286 condition = !(fpcCSR & MIPS_FPU_COND_BIT);
1288 retAddr = GetBranchDest(instPC, inst);
1290 retAddr = instPC + 8;
1294 retAddr = instPC + 4;
1299 retAddr = instPC + 4;
1305 #if defined(DDB) || defined(DEBUG)
1307 * Print a stack backtrace.
1310 stacktrace(struct trapframe *regs)
1312 stacktrace_subr(regs->pc, regs->sp, regs->ra, printf);
1317 log_frame_dump(struct trapframe *frame)
1319 log(LOG_ERR, "Trapframe Register Dump:\n");
1320 log(LOG_ERR, "\tzero: %#jx\tat: %#jx\tv0: %#jx\tv1: %#jx\n",
1321 (intmax_t)0, (intmax_t)frame->ast, (intmax_t)frame->v0, (intmax_t)frame->v1);
1323 log(LOG_ERR, "\ta0: %#jx\ta1: %#jx\ta2: %#jx\ta3: %#jx\n",
1324 (intmax_t)frame->a0, (intmax_t)frame->a1, (intmax_t)frame->a2, (intmax_t)frame->a3);
1326 #if defined(__mips_n32) || defined(__mips_n64)
1327 log(LOG_ERR, "\ta4: %#jx\ta5: %#jx\ta6: %#jx\ta6: %#jx\n",
1328 (intmax_t)frame->a4, (intmax_t)frame->a5, (intmax_t)frame->a6, (intmax_t)frame->a7);
1330 log(LOG_ERR, "\tt0: %#jx\tt1: %#jx\tt2: %#jx\tt3: %#jx\n",
1331 (intmax_t)frame->t0, (intmax_t)frame->t1, (intmax_t)frame->t2, (intmax_t)frame->t3);
1333 log(LOG_ERR, "\tt0: %#jx\tt1: %#jx\tt2: %#jx\tt3: %#jx\n",
1334 (intmax_t)frame->t0, (intmax_t)frame->t1, (intmax_t)frame->t2, (intmax_t)frame->t3);
1336 log(LOG_ERR, "\tt4: %#jx\tt5: %#jx\tt6: %#jx\tt7: %#jx\n",
1337 (intmax_t)frame->t4, (intmax_t)frame->t5, (intmax_t)frame->t6, (intmax_t)frame->t7);
1339 log(LOG_ERR, "\tt8: %#jx\tt9: %#jx\ts0: %#jx\ts1: %#jx\n",
1340 (intmax_t)frame->t8, (intmax_t)frame->t9, (intmax_t)frame->s0, (intmax_t)frame->s1);
1342 log(LOG_ERR, "\ts2: %#jx\ts3: %#jx\ts4: %#jx\ts5: %#jx\n",
1343 (intmax_t)frame->s2, (intmax_t)frame->s3, (intmax_t)frame->s4, (intmax_t)frame->s5);
1345 log(LOG_ERR, "\ts6: %#jx\ts7: %#jx\tk0: %#jx\tk1: %#jx\n",
1346 (intmax_t)frame->s6, (intmax_t)frame->s7, (intmax_t)frame->k0, (intmax_t)frame->k1);
1348 log(LOG_ERR, "\tgp: %#jx\tsp: %#jx\ts8: %#jx\tra: %#jx\n",
1349 (intmax_t)frame->gp, (intmax_t)frame->sp, (intmax_t)frame->s8, (intmax_t)frame->ra);
1351 log(LOG_ERR, "\tsr: %#jx\tmullo: %#jx\tmulhi: %#jx\tbadvaddr: %#jx\n",
1352 (intmax_t)frame->sr, (intmax_t)frame->mullo, (intmax_t)frame->mulhi, (intmax_t)frame->badvaddr);
1355 log(LOG_ERR, "\tcause: %#jx\tpc: %#jx\tic: %#jx\n",
1356 (intmax_t)frame->cause, (intmax_t)frame->pc, (intmax_t)frame->ic);
1358 log(LOG_ERR, "\tcause: %#jx\tpc: %#jx\n",
1359 (intmax_t)frame->cause, (intmax_t)frame->pc);
1365 trap_frame_dump(struct trapframe *frame)
1367 printf("Trapframe Register Dump:\n");
1368 printf("\tzero: %#jx\tat: %#jx\tv0: %#jx\tv1: %#jx\n",
1369 (intmax_t)0, (intmax_t)frame->ast, (intmax_t)frame->v0, (intmax_t)frame->v1);
1371 printf("\ta0: %#jx\ta1: %#jx\ta2: %#jx\ta3: %#jx\n",
1372 (intmax_t)frame->a0, (intmax_t)frame->a1, (intmax_t)frame->a2, (intmax_t)frame->a3);
1373 #if defined(__mips_n32) || defined(__mips_n64)
1374 printf("\ta4: %#jx\ta5: %#jx\ta6: %#jx\ta7: %#jx\n",
1375 (intmax_t)frame->a4, (intmax_t)frame->a5, (intmax_t)frame->a6, (intmax_t)frame->a7);
1377 printf("\tt0: %#jx\tt1: %#jx\tt2: %#jx\tt3: %#jx\n",
1378 (intmax_t)frame->t0, (intmax_t)frame->t1, (intmax_t)frame->t2, (intmax_t)frame->t3);
1380 printf("\tt0: %#jx\tt1: %#jx\tt2: %#jx\tt3: %#jx\n",
1381 (intmax_t)frame->t0, (intmax_t)frame->t1, (intmax_t)frame->t2, (intmax_t)frame->t3);
1383 printf("\tt4: %#jx\tt5: %#jx\tt6: %#jx\tt7: %#jx\n",
1384 (intmax_t)frame->t4, (intmax_t)frame->t5, (intmax_t)frame->t6, (intmax_t)frame->t7);
1386 printf("\tt8: %#jx\tt9: %#jx\ts0: %#jx\ts1: %#jx\n",
1387 (intmax_t)frame->t8, (intmax_t)frame->t9, (intmax_t)frame->s0, (intmax_t)frame->s1);
1389 printf("\ts2: %#jx\ts3: %#jx\ts4: %#jx\ts5: %#jx\n",
1390 (intmax_t)frame->s2, (intmax_t)frame->s3, (intmax_t)frame->s4, (intmax_t)frame->s5);
1392 printf("\ts6: %#jx\ts7: %#jx\tk0: %#jx\tk1: %#jx\n",
1393 (intmax_t)frame->s6, (intmax_t)frame->s7, (intmax_t)frame->k0, (intmax_t)frame->k1);
1395 printf("\tgp: %#jx\tsp: %#jx\ts8: %#jx\tra: %#jx\n",
1396 (intmax_t)frame->gp, (intmax_t)frame->sp, (intmax_t)frame->s8, (intmax_t)frame->ra);
1398 printf("\tsr: %#jx\tmullo: %#jx\tmulhi: %#jx\tbadvaddr: %#jx\n",
1399 (intmax_t)frame->sr, (intmax_t)frame->mullo, (intmax_t)frame->mulhi, (intmax_t)frame->badvaddr);
1402 printf("\tcause: %#jx\tpc: %#jx\tic: %#jx\n",
1403 (intmax_t)frame->cause, (intmax_t)frame->pc, (intmax_t)frame->ic);
1405 printf("\tcause: %#jx\tpc: %#jx\n",
1406 (intmax_t)frame->cause, (intmax_t)frame->pc);
1414 get_mapping_info(vm_offset_t va, pd_entry_t **pdepp, pt_entry_t **ptepp)
1418 struct proc *p = curproc;
1420 pdep = (&(p->p_vmspace->vm_pmap.pm_segtab[(va >> SEGSHIFT) & (NPDEPG - 1)]));
1422 ptep = pmap_pte(&p->p_vmspace->vm_pmap, va);
1424 ptep = (pt_entry_t *)0;
1431 log_illegal_instruction(const char *msg, struct trapframe *frame)
1444 printf("cpuid = %d\n", PCPU_GET(cpuid));
1446 pc = frame->pc + (DELAYBRANCH(frame->cause) ? 4 : 0);
1447 log(LOG_ERR, "%s: pid %d tid %ld (%s), uid %d: pc %#jx ra %#jx\n",
1448 msg, p->p_pid, (long)td->td_tid, p->p_comm,
1449 p->p_ucred ? p->p_ucred->cr_uid : -1,
1451 (intmax_t)frame->ra);
1453 /* log registers in trap frame */
1454 log_frame_dump(frame);
1456 get_mapping_info((vm_offset_t)pc, &pdep, &ptep);
1459 * Dump a few words around faulting instruction, if the addres is
1463 useracc((caddr_t)(intptr_t)pc, sizeof(int) * 4, VM_PROT_READ)) {
1464 /* dump page table entry for faulting instruction */
1465 log(LOG_ERR, "Page table info for pc address %#jx: pde = %p, pte = %#jx\n",
1466 (intmax_t)pc, (void *)(intptr_t)*pdep, (uintmax_t)(ptep ? *ptep : 0));
1468 addr = (unsigned int *)(intptr_t)pc;
1469 log(LOG_ERR, "Dumping 4 words starting at pc address %p: \n",
1471 log(LOG_ERR, "%08x %08x %08x %08x\n",
1472 addr[0], addr[1], addr[2], addr[3]);
1474 log(LOG_ERR, "pc address %#jx is inaccessible, pde = %p, pte = %#jx\n",
1475 (intmax_t)pc, (void *)(intptr_t)*pdep, (uintmax_t)(ptep ? *ptep : 0));
1480 log_bad_page_fault(char *msg, struct trapframe *frame, int trap_type)
1487 char *read_or_write;
1490 trap_type &= ~T_USER;
1496 printf("cpuid = %d\n", PCPU_GET(cpuid));
1498 switch (trap_type) {
1502 read_or_write = "write";
1506 case T_BUS_ERR_IFETCH:
1507 read_or_write = "read";
1510 read_or_write = "unknown";
1513 pc = frame->pc + (DELAYBRANCH(frame->cause) ? 4 : 0);
1514 log(LOG_ERR, "%s: pid %d tid %ld (%s), uid %d: pc %#jx got a %s fault "
1515 "(type %#x) at %#jx\n",
1516 msg, p->p_pid, (long)td->td_tid, p->p_comm,
1517 p->p_ucred ? p->p_ucred->cr_uid : -1,
1521 (intmax_t)frame->badvaddr);
1523 /* log registers in trap frame */
1524 log_frame_dump(frame);
1526 get_mapping_info((vm_offset_t)pc, &pdep, &ptep);
1529 * Dump a few words around faulting instruction, if the addres is
1532 if (!(pc & 3) && (pc != frame->badvaddr) &&
1533 (trap_type != T_BUS_ERR_IFETCH) &&
1534 useracc((caddr_t)(intptr_t)pc, sizeof(int) * 4, VM_PROT_READ)) {
1535 /* dump page table entry for faulting instruction */
1536 log(LOG_ERR, "Page table info for pc address %#jx: pde = %p, pte = %#jx\n",
1537 (intmax_t)pc, (void *)(intptr_t)*pdep, (uintmax_t)(ptep ? *ptep : 0));
1539 addr = (unsigned int *)(intptr_t)pc;
1540 log(LOG_ERR, "Dumping 4 words starting at pc address %p: \n",
1542 log(LOG_ERR, "%08x %08x %08x %08x\n",
1543 addr[0], addr[1], addr[2], addr[3]);
1545 log(LOG_ERR, "pc address %#jx is inaccessible, pde = %p, pte = %#jx\n",
1546 (intmax_t)pc, (void *)(intptr_t)*pdep, (uintmax_t)(ptep ? *ptep : 0));
1549 get_mapping_info((vm_offset_t)frame->badvaddr, &pdep, &ptep);
1550 log(LOG_ERR, "Page table info for bad address %#jx: pde = %p, pte = %#jx\n",
1551 (intmax_t)frame->badvaddr, (void *)(intptr_t)*pdep, (uintmax_t)(ptep ? *ptep : 0));
1556 * Unaligned load/store emulation
1559 mips_unaligned_load_store(struct trapframe *frame, int mode, register_t addr, register_t pc)
1561 register_t *reg = (register_t *) frame;
1562 u_int32_t inst = *((u_int32_t *)(intptr_t)pc);
1563 register_t value_msb, value;
1567 * ADDR_ERR faults have higher priority than TLB
1568 * Miss faults. Therefore, it is necessary to
1569 * verify that the faulting address is a valid
1570 * virtual address within the process' address space
1571 * before trying to emulate the unaligned access.
1573 switch (MIPS_INST_OPCODE(inst)) {
1574 case OP_LHU: case OP_LH:
1578 case OP_LWU: case OP_LW:
1587 printf("%s: unhandled opcode in address error: %#x\n", __func__, MIPS_INST_OPCODE(inst));
1591 if (!useracc((void *)((vm_offset_t)addr & ~(size - 1)), size * 2, mode))
1596 * Handle LL/SC LLD/SCD.
1598 switch (MIPS_INST_OPCODE(inst)) {
1600 KASSERT(mode == VM_PROT_READ, ("access mode must be read for load instruction."));
1601 lbu_macro(value_msb, addr);
1603 lbu_macro(value, addr);
1604 value |= value_msb << 8;
1605 reg[MIPS_INST_RT(inst)] = value;
1606 return (MIPS_LHU_ACCESS);
1609 KASSERT(mode == VM_PROT_READ, ("access mode must be read for load instruction."));
1610 lb_macro(value_msb, addr);
1612 lbu_macro(value, addr);
1613 value |= value_msb << 8;
1614 reg[MIPS_INST_RT(inst)] = value;
1615 return (MIPS_LH_ACCESS);
1618 KASSERT(mode == VM_PROT_READ, ("access mode must be read for load instruction."));
1619 lwl_macro(value, addr);
1621 lwr_macro(value, addr);
1622 value &= 0xffffffff;
1623 reg[MIPS_INST_RT(inst)] = value;
1624 return (MIPS_LWU_ACCESS);
1627 KASSERT(mode == VM_PROT_READ, ("access mode must be read for load instruction."));
1628 lwl_macro(value, addr);
1630 lwr_macro(value, addr);
1631 reg[MIPS_INST_RT(inst)] = value;
1632 return (MIPS_LW_ACCESS);
1634 #if defined(__mips_n32) || defined(__mips_n64)
1636 KASSERT(mode == VM_PROT_READ, ("access mode must be read for load instruction."));
1637 ldl_macro(value, addr);
1639 ldr_macro(value, addr);
1640 reg[MIPS_INST_RT(inst)] = value;
1641 return (MIPS_LD_ACCESS);
1645 KASSERT(mode == VM_PROT_WRITE, ("access mode must be write for store instruction."));
1646 value = reg[MIPS_INST_RT(inst)];
1647 value_msb = value >> 8;
1648 sb_macro(value_msb, addr);
1650 sb_macro(value, addr);
1651 return (MIPS_SH_ACCESS);
1654 KASSERT(mode == VM_PROT_WRITE, ("access mode must be write for store instruction."));
1655 value = reg[MIPS_INST_RT(inst)];
1656 swl_macro(value, addr);
1658 swr_macro(value, addr);
1659 return (MIPS_SW_ACCESS);
1661 #if defined(__mips_n32) || defined(__mips_n64)
1663 KASSERT(mode == VM_PROT_WRITE, ("access mode must be write for store instruction."));
1664 value = reg[MIPS_INST_RT(inst)];
1665 sdl_macro(value, addr);
1667 sdr_macro(value, addr);
1668 return (MIPS_SD_ACCESS);
1671 panic("%s: should not be reached.", __func__);
1676 emulate_unaligned_access(struct trapframe *frame, int mode)
1679 int access_type = 0;
1681 pc = frame->pc + (DELAYBRANCH(frame->cause) ? 4 : 0);
1684 * Fall through if it's instruction fetch exception
1686 if (!((pc & 3) || (pc == frame->badvaddr))) {
1689 * Handle unaligned load and store
1693 * Return access type if the instruction was emulated.
1694 * Otherwise restore pc and fall through.
1696 access_type = mips_unaligned_load_store(frame,
1697 mode, frame->badvaddr, pc);
1700 if (DELAYBRANCH(frame->cause))
1701 frame->pc = MipsEmulateBranch(frame, frame->pc,
1706 log(LOG_INFO, "Unaligned %s: pc=%#jx, badvaddr=%#jx\n",
1707 access_name[access_type - 1], (intmax_t)pc,
1708 (intmax_t)frame->badvaddr);