traps.c

来自「底层驱动开发」· C语言 代码 · 共 569 行

C
569
字号
/* *  linux/arch/ppc64/kernel/traps.c * *  Copyright (C) 1995-1996  Gary Thomas (gdt@linuxppc.org) * *  This program is free software; you can redistribute it and/or *  modify it under the terms of the GNU General Public License *  as published by the Free Software Foundation; either version *  2 of the License, or (at your option) any later version. * *  Modified by Cort Dougan (cort@cs.nmt.edu) *  and Paul Mackerras (paulus@cs.anu.edu.au) *//* * This file handles the architecture-dependent parts of hardware exceptions */#include <linux/config.h>#include <linux/errno.h>#include <linux/sched.h>#include <linux/kernel.h>#include <linux/mm.h>#include <linux/stddef.h>#include <linux/unistd.h>#include <linux/slab.h>#include <linux/user.h>#include <linux/a.out.h>#include <linux/interrupt.h>#include <linux/init.h>#include <linux/module.h>#include <linux/delay.h>#include <linux/kprobes.h>#include <asm/kdebug.h>#include <asm/pgtable.h>#include <asm/uaccess.h>#include <asm/system.h>#include <asm/io.h>#include <asm/processor.h>#include <asm/ppcdebug.h>#include <asm/rtas.h>#include <asm/systemcfg.h>#include <asm/machdep.h>#include <asm/pmc.h>#ifdef CONFIG_DEBUGGERint (*__debugger)(struct pt_regs *regs);int (*__debugger_ipi)(struct pt_regs *regs);int (*__debugger_bpt)(struct pt_regs *regs);int (*__debugger_sstep)(struct pt_regs *regs);int (*__debugger_iabr_match)(struct pt_regs *regs);int (*__debugger_dabr_match)(struct pt_regs *regs);int (*__debugger_fault_handler)(struct pt_regs *regs);EXPORT_SYMBOL(__debugger);EXPORT_SYMBOL(__debugger_ipi);EXPORT_SYMBOL(__debugger_bpt);EXPORT_SYMBOL(__debugger_sstep);EXPORT_SYMBOL(__debugger_iabr_match);EXPORT_SYMBOL(__debugger_dabr_match);EXPORT_SYMBOL(__debugger_fault_handler);#endifstruct notifier_block *ppc64_die_chain;static DEFINE_SPINLOCK(die_notifier_lock);int register_die_notifier(struct notifier_block *nb){	int err = 0;	unsigned long flags;	spin_lock_irqsave(&die_notifier_lock, flags);	err = notifier_chain_register(&ppc64_die_chain, nb);	spin_unlock_irqrestore(&die_notifier_lock, flags);	return err;}/* * Trap & Exception support */static DEFINE_SPINLOCK(die_lock);int die(const char *str, struct pt_regs *regs, long err){	static int die_counter;	int nl = 0;	if (debugger(regs))		return 1;	console_verbose();	spin_lock_irq(&die_lock);	bust_spinlocks(1);	printk("Oops: %s, sig: %ld [#%d]\n", str, err, ++die_counter);#ifdef CONFIG_PREEMPT	printk("PREEMPT ");	nl = 1;#endif#ifdef CONFIG_SMP	printk("SMP NR_CPUS=%d ", NR_CPUS);	nl = 1;#endif#ifdef CONFIG_DEBUG_PAGEALLOC	printk("DEBUG_PAGEALLOC ");	nl = 1;#endif#ifdef CONFIG_NUMA	printk("NUMA ");	nl = 1;#endif	switch(systemcfg->platform) {		case PLATFORM_PSERIES:			printk("PSERIES ");			nl = 1;			break;		case PLATFORM_PSERIES_LPAR:			printk("PSERIES LPAR ");			nl = 1;			break;		case PLATFORM_ISERIES_LPAR:			printk("ISERIES LPAR ");			nl = 1;			break;		case PLATFORM_POWERMAC:			printk("POWERMAC ");			nl = 1;			break;		case PLATFORM_BPA:			printk("BPA ");			nl = 1;			break;	}	if (nl)		printk("\n");	print_modules();	show_regs(regs);	bust_spinlocks(0);	spin_unlock_irq(&die_lock);	if (in_interrupt())		panic("Fatal exception in interrupt");	if (panic_on_oops) {		printk(KERN_EMERG "Fatal exception: panic in 5 seconds\n");		ssleep(5);		panic("Fatal exception");	}	do_exit(SIGSEGV);	return 0;}void _exception(int signr, struct pt_regs *regs, int code, unsigned long addr){	siginfo_t info;	if (!user_mode(regs)) {		if (die("Exception in kernel mode", regs, signr))			return;	}	memset(&info, 0, sizeof(info));	info.si_signo = signr;	info.si_code = code;	info.si_addr = (void __user *) addr;	force_sig_info(signr, &info, current);}void system_reset_exception(struct pt_regs *regs){	/* See if any machine dependent calls */	if (ppc_md.system_reset_exception)		ppc_md.system_reset_exception(regs);	die("System Reset", regs, 0);	/* Must die if the interrupt is not recoverable */	if (!(regs->msr & MSR_RI))		panic("Unrecoverable System Reset");	/* What should we do here? We could issue a shutdown or hard reset. */}void machine_check_exception(struct pt_regs *regs){	int recover = 0;	/* See if any machine dependent calls */	if (ppc_md.machine_check_exception)		recover = ppc_md.machine_check_exception(regs);	if (recover)		return;	if (debugger_fault_handler(regs))		return;	die("Machine check", regs, 0);	/* Must die if the interrupt is not recoverable */	if (!(regs->msr & MSR_RI))		panic("Unrecoverable Machine check");}void unknown_exception(struct pt_regs *regs){	printk("Bad trap at PC: %lx, SR: %lx, vector=%lx\n",	       regs->nip, regs->msr, regs->trap);	_exception(SIGTRAP, regs, 0, 0);}void instruction_breakpoint_exception(struct pt_regs *regs){	if (notify_die(DIE_IABR_MATCH, "iabr_match", regs, 5,					5, SIGTRAP) == NOTIFY_STOP)		return;	if (debugger_iabr_match(regs))		return;	_exception(SIGTRAP, regs, TRAP_BRKPT, regs->nip);}void __kprobes single_step_exception(struct pt_regs *regs){	regs->msr &= ~MSR_SE;  /* Turn off 'trace' bit */	if (notify_die(DIE_SSTEP, "single_step", regs, 5,					5, SIGTRAP) == NOTIFY_STOP)		return;	if (debugger_sstep(regs))		return;	_exception(SIGTRAP, regs, TRAP_TRACE, regs->nip);}/* * After we have successfully emulated an instruction, we have to * check if the instruction was being single-stepped, and if so, * pretend we got a single-step exception.  This was pointed out * by Kumar Gala.  -- paulus */static inline void emulate_single_step(struct pt_regs *regs){	if (regs->msr & MSR_SE)		single_step_exception(regs);}static void parse_fpe(struct pt_regs *regs){	int code = 0;	unsigned long fpscr;	flush_fp_to_thread(current);	fpscr = current->thread.fpscr;	/* Invalid operation */	if ((fpscr & FPSCR_VE) && (fpscr & FPSCR_VX))		code = FPE_FLTINV;	/* Overflow */	else if ((fpscr & FPSCR_OE) && (fpscr & FPSCR_OX))		code = FPE_FLTOVF;	/* Underflow */	else if ((fpscr & FPSCR_UE) && (fpscr & FPSCR_UX))		code = FPE_FLTUND;	/* Divide by zero */	else if ((fpscr & FPSCR_ZE) && (fpscr & FPSCR_ZX))		code = FPE_FLTDIV;	/* Inexact result */	else if ((fpscr & FPSCR_XE) && (fpscr & FPSCR_XX))		code = FPE_FLTRES;	_exception(SIGFPE, regs, code, regs->nip);}/* * Illegal instruction emulation support.  Return non-zero if we can't * emulate, or -EFAULT if the associated memory access caused an access * fault.  Return zero on success. */#define INST_MFSPR_PVR		0x7c1f42a6#define INST_MFSPR_PVR_MASK	0xfc1fffff#define INST_DCBA		0x7c0005ec#define INST_DCBA_MASK		0x7c0007fe#define INST_MCRXR		0x7c000400#define INST_MCRXR_MASK		0x7c0007festatic int emulate_instruction(struct pt_regs *regs){	unsigned int instword;	if (!user_mode(regs))		return -EINVAL;	CHECK_FULL_REGS(regs);	if (get_user(instword, (unsigned int __user *)(regs->nip)))		return -EFAULT;	/* Emulate the mfspr rD, PVR. */	if ((instword & INST_MFSPR_PVR_MASK) == INST_MFSPR_PVR) {		unsigned int rd;		rd = (instword >> 21) & 0x1f;		regs->gpr[rd] = mfspr(SPRN_PVR);		return 0;	}	/* Emulating the dcba insn is just a no-op.  */	if ((instword & INST_DCBA_MASK) == INST_DCBA) {		static int warned;		if (!warned) {			printk(KERN_WARNING			       "process %d (%s) uses obsolete 'dcba' insn\n",			       current->pid, current->comm);			warned = 1;		}		return 0;	}	/* Emulate the mcrxr insn.  */	if ((instword & INST_MCRXR_MASK) == INST_MCRXR) {		static int warned;		unsigned int shift;		if (!warned) {			printk(KERN_WARNING			       "process %d (%s) uses obsolete 'mcrxr' insn\n",			       current->pid, current->comm);			warned = 1;		}		shift = (instword >> 21) & 0x1c;		regs->ccr &= ~(0xf0000000 >> shift);		regs->ccr |= (regs->xer & 0xf0000000) >> shift;		regs->xer &= ~0xf0000000;		return 0;	}	return -EINVAL;}/* * Look through the list of trap instructions that are used for BUG(), * BUG_ON() and WARN_ON() and see if we hit one.  At this point we know * that the exception was caused by a trap instruction of some kind. * Returns 1 if we should continue (i.e. it was a WARN_ON) or 0 * otherwise. */extern struct bug_entry __start___bug_table[], __stop___bug_table[];#ifndef CONFIG_MODULES#define module_find_bug(x)	NULL#endifstruct bug_entry *find_bug(unsigned long bugaddr){	struct bug_entry *bug;	for (bug = __start___bug_table; bug < __stop___bug_table; ++bug)		if (bugaddr == bug->bug_addr)			return bug;	return module_find_bug(bugaddr);}static intcheck_bug_trap(struct pt_regs *regs){	struct bug_entry *bug;	unsigned long addr;	if (regs->msr & MSR_PR)		return 0;	/* not in kernel */	addr = regs->nip;	/* address of trap instruction */	if (addr < PAGE_OFFSET)		return 0;	bug = find_bug(regs->nip);	if (bug == NULL)		return 0;	if (bug->line & BUG_WARNING_TRAP) {		/* this is a WARN_ON rather than BUG/BUG_ON */		printk(KERN_ERR "Badness in %s at %s:%d\n",		       bug->function, bug->file,		      (unsigned int)bug->line & ~BUG_WARNING_TRAP);		show_stack(current, (void *)regs->gpr[1]);		return 1;	}	printk(KERN_CRIT "kernel BUG in %s at %s:%d!\n",	       bug->function, bug->file, (unsigned int)bug->line);	return 0;}void __kprobes program_check_exception(struct pt_regs *regs){	if (debugger_fault_handler(regs))		return;	if (regs->msr & 0x100000) {		/* IEEE FP exception */		parse_fpe(regs);	} else if (regs->msr & 0x20000) {		/* trap exception */		if (notify_die(DIE_BPT, "breakpoint", regs, 5,					5, SIGTRAP) == NOTIFY_STOP)			return;		if (debugger_bpt(regs))			return;		if (check_bug_trap(regs)) {			regs->nip += 4;			return;		}		_exception(SIGTRAP, regs, TRAP_BRKPT, regs->nip);	} else {		/* Privileged or illegal instruction; try to emulate it. */		switch (emulate_instruction(regs)) {		case 0:			regs->nip += 4;			emulate_single_step(regs);			break;		case -EFAULT:			_exception(SIGSEGV, regs, SEGV_MAPERR, regs->nip);			break;		default:			if (regs->msr & 0x40000)				/* priveleged */				_exception(SIGILL, regs, ILL_PRVOPC, regs->nip);			else				/* illegal */				_exception(SIGILL, regs, ILL_ILLOPC, regs->nip);			break;		}	}}void kernel_fp_unavailable_exception(struct pt_regs *regs){	printk(KERN_EMERG "Unrecoverable FP Unavailable Exception "			  "%lx at %lx\n", regs->trap, regs->nip);	die("Unrecoverable FP Unavailable Exception", regs, SIGABRT);}void altivec_unavailable_exception(struct pt_regs *regs){	if (user_mode(regs)) {		/* A user program has executed an altivec instruction,		   but this kernel doesn't support altivec. */		_exception(SIGILL, regs, ILL_ILLOPC, regs->nip);		return;	}	printk(KERN_EMERG "Unrecoverable VMX/Altivec Unavailable Exception "			  "%lx at %lx\n", regs->trap, regs->nip);	die("Unrecoverable VMX/Altivec Unavailable Exception", regs, SIGABRT);}extern perf_irq_t perf_irq;void performance_monitor_exception(struct pt_regs *regs){	perf_irq(regs);}void alignment_exception(struct pt_regs *regs){	int fixed;	fixed = fix_alignment(regs);	if (fixed == 1) {		regs->nip += 4;	/* skip over emulated instruction */		emulate_single_step(regs);		return;	}	/* Operand address was bad */		if (fixed == -EFAULT) {		if (user_mode(regs)) {			_exception(SIGSEGV, regs, SEGV_MAPERR, regs->dar);		} else {			/* Search exception table */			bad_page_fault(regs, regs->dar, SIGSEGV);		}		return;	}	_exception(SIGBUS, regs, BUS_ADRALN, regs->nip);}#ifdef CONFIG_ALTIVECvoid altivec_assist_exception(struct pt_regs *regs){	int err;	siginfo_t info;	if (!user_mode(regs)) {		printk(KERN_EMERG "VMX/Altivec assist exception in kernel mode"		       " at %lx\n", regs->nip);		die("Kernel VMX/Altivec assist exception", regs, SIGILL);	}	flush_altivec_to_thread(current);	err = emulate_altivec(regs);	if (err == 0) {		regs->nip += 4;		/* skip emulated instruction */		emulate_single_step(regs);		return;	}	if (err == -EFAULT) {		/* got an error reading the instruction */		info.si_signo = SIGSEGV;		info.si_errno = 0;		info.si_code = SEGV_MAPERR;		info.si_addr = (void __user *) regs->nip;		force_sig_info(SIGSEGV, &info, current);	} else {		/* didn't recognize the instruction */		/* XXX quick hack for now: set the non-Java bit in the VSCR */		if (printk_ratelimit())			printk(KERN_ERR "Unrecognized altivec instruction "			       "in %s at %lx\n", current->comm, regs->nip);		current->thread.vscr.u[3] |= 0x10000;	}}#endif /* CONFIG_ALTIVEC *//* * We enter here if we get an unrecoverable exception, that is, one * that happened at a point where the RI (recoverable interrupt) bit * in the MSR is 0.  This indicates that SRR0/1 are live, and that * we therefore lost state by taking this exception. */void unrecoverable_exception(struct pt_regs *regs){	printk(KERN_EMERG "Unrecoverable exception %lx at %lx\n",	       regs->trap, regs->nip);	die("Unrecoverable exception", regs, SIGABRT);}/* * We enter here if we discover during exception entry that we are * running in supervisor mode with a userspace value in the stack pointer. */void kernel_bad_stack(struct pt_regs *regs){	printk(KERN_EMERG "Bad kernel stack pointer %lx at %lx\n",	       regs->gpr[1], regs->nip);	die("Bad kernel stack pointer", regs, SIGABRT);}void __init trap_init(void){}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?