2 * This software is part of the SBCL system. See the README file for
5 * This software is derived from the CMU CL system, which was
6 * written at Carnegie Mellon University and released into the
7 * public domain. The software is in the public domain and is
8 * provided with absolutely no warranty. See the COPYING and CREDITS
9 * files for more information.
22 #include "interrupt.h"
24 #include "breakpoint.h"
27 #ifdef LISP_FEATURE_LINUX
28 extern int linux_sparc_siginfo_bug;
36 os_vm_address_t arch_get_bad_addr(int sig, siginfo_t *code, os_context_t *context)
42 pc = (unsigned int *)(*os_context_pc_addr(context));
44 /* On the sparc, we have to decode the instruction. */
46 /* Make sure it's not the pc thats bogus, and that it was lisp code */
47 /* that caused the fault. */
48 if ((unsigned long) pc & 3) {
52 if ((pc < READ_ONLY_SPACE_START ||
53 pc >= READ_ONLY_SPACE_START+READ_ONLY_SPACE_SIZE) &&
54 (pc < current_dynamic_space ||
55 pc >= current_dynamic_space + dynamic_space_size)) {
61 if ((badinst >> 30) != 3)
62 /* All load/store instructions have op = 11 (binary) */
65 rs1 = (badinst>>14)&0x1f;
67 if (badinst & (1<<13)) {
68 /* r[rs1] + simm(13) */
69 int simm13 = badinst & 0x1fff;
74 return (os_vm_address_t)
75 (*os_context_register_addr(context, rs1)+simm13);
79 int rs2 = badinst & 0x1f;
81 return (os_vm_address_t)
82 (*os_context_register_addr(context, rs1) +
83 *os_context_register_addr(context, rs2));
87 void arch_skip_instruction(os_context_t *context)
89 *os_context_pc_addr(context) = *os_context_npc_addr(context);
90 /* Note that we're doing integer arithmetic here, not pointer. So
91 * the value that the return value of os_context_npc_addr() points
92 * to will be incremented by 4, not 16.
94 *os_context_npc_addr(context) += 4;
97 unsigned char *arch_internal_error_arguments(os_context_t *context)
99 return (unsigned char *)(*os_context_pc_addr(context) + 4);
102 boolean arch_pseudo_atomic_atomic(os_context_t *context)
104 /* FIXME: this foreign_function_call_active test is dubious at
105 * best. If a foreign call is made in a pseudo atomic section
106 * (?) or more likely a pseudo atomic section is in a foreign
107 * call then an interrupt is executed immediately. Maybe it
108 * has to do with C code not maintaining pseudo atomic
109 * properly. MG - 2005-08-10
111 * The foreign_function_call_active used to live at each call-site
112 * to arch_pseudo_atomic_atomic, but this seems clearer.
114 return (!foreign_function_call_active)
115 && ((*os_context_register_addr(context,reg_ALLOC)) & 4);
118 void arch_set_pseudo_atomic_interrupted(os_context_t *context)
120 *os_context_register_addr(context,reg_ALLOC) |= 1;
123 void arch_clear_pseudo_atomic_interrupted(os_context_t *context)
125 *os_context_register_addr(context,reg_ALLOC) &= ~1;
128 unsigned int arch_install_breakpoint(void *pc)
130 unsigned int *ptr = (unsigned int *)pc;
131 unsigned int result = *ptr;
132 *ptr = trap_Breakpoint;
134 os_flush_icache((os_vm_address_t) pc, sizeof(unsigned int));
139 void arch_remove_breakpoint(void *pc, unsigned int orig_inst)
141 *(unsigned int *)pc = orig_inst;
142 os_flush_icache((os_vm_address_t) pc, sizeof(unsigned int));
146 * Perform the instruction that we overwrote with a breakpoint. As we
147 * don't have a single-step facility, this means we have to:
148 * - put the instruction back
149 * - put a second breakpoint at the following instruction,
150 * set after_breakpoint and continue execution.
152 * When the second breakpoint is hit (very shortly thereafter, we hope)
153 * sigtrap_handler gets called again, but follows the AfterBreakpoint
155 * - puts a bpt back in the first breakpoint place (running across a
156 * breakpoint shouldn't cause it to be uninstalled)
157 * - replaces the second bpt with the instruction it was meant to be
162 static unsigned int *skipped_break_addr, displaced_after_inst;
163 static sigset_t orig_sigmask;
165 void arch_do_displaced_inst(os_context_t *context, unsigned int orig_inst)
167 unsigned int *pc = (unsigned int *)(*os_context_pc_addr(context));
168 unsigned int *npc = (unsigned int *)(*os_context_npc_addr(context));
170 /* orig_sigmask = context->sigmask;
171 sigemptyset(&context->sigmask); */
173 /* FILLBLOCKSET(&context->uc_sigmask);*/
176 os_flush_icache((os_vm_address_t) pc, sizeof(unsigned int));
177 skipped_break_addr = pc;
178 displaced_after_inst = *npc;
179 *npc = trap_AfterBreakpoint;
180 os_flush_icache((os_vm_address_t) npc, sizeof(unsigned int));
184 static int pseudo_atomic_trap_p(os_context_t *context)
187 unsigned int badinst;
191 pc = (unsigned int*) *os_context_pc_addr(context);
195 /* Check to see if the current instruction is a pseudo-atomic-trap */
196 if (((badinst >> 30) == 2) && (((badinst >> 19) & 0x3f) == 0x3a)
197 && (((badinst >> 13) & 1) == 1) && ((badinst & 0x7f) == PSEUDO_ATOMIC_TRAP))
199 unsigned int previnst;
202 * Check to see if the previous instruction was an andcc alloc-tn,
203 * 3, zero-tn instruction.
205 if (((previnst >> 30) == 2) && (((previnst >> 19) & 0x3f) == 0x11)
206 && (((previnst >> 14) & 0x1f) == reg_ALLOC)
207 && (((previnst >> 25) & 0x1f) == reg_ZERO)
208 && (((previnst >> 13) & 1) == 1)
209 && ((previnst & 0x1fff) == 3))
215 fprintf(stderr, "Oops! Got a PSEUDO-ATOMIC-TRAP without a preceeding andcc!\n");
222 arch_handle_breakpoint(os_context_t *context)
224 handle_breakpoint(context);
228 arch_handle_fun_end_breakpoint(os_context_t *context)
230 *os_context_pc_addr(context) = (int) handle_fun_end_breakpoint(context);
231 *os_context_npc_addr(context) = *os_context_pc_addr(context) + 4;
235 arch_handle_after_breakpoint(os_context_t *context)
237 *skipped_break_addr = trap_Breakpoint;
238 os_flush_icache(skipped_break_addr, sizeof(unsigned int));
239 skipped_break_addr = NULL;
240 *(unsigned long *) os_context_pc_addr(context) = displaced_after_inst;
241 /* context->sigmask = orig_sigmask; */
242 os_flush_icache((os_vm_address_t) os_context_pc_addr(context), sizeof(unsigned int));
246 arch_handle_single_step_trap(os_context_t *context, int trap)
248 unsigned int code = *((u32 *)(*os_context_pc_addr(context)));
249 int register_offset = code >> 5 & 0x1f;
250 handle_single_step_trap(context, trap, register_offset);
251 arch_skip_instruction(context);
254 static void sigill_handler(int signal, siginfo_t *siginfo,
255 os_context_t *context)
257 if ((siginfo->si_code) == ILL_ILLOPC
258 #ifdef LISP_FEATURE_LINUX
259 || (linux_sparc_siginfo_bug && (siginfo->si_code == 2))
264 unsigned int* pc = (unsigned int*) siginfo->si_addr;
268 handle_trap(context,trap);
270 else if ((siginfo->si_code) == ILL_ILLTRP
271 #ifdef LISP_FEATURE_LINUX
272 || (linux_sparc_siginfo_bug && (siginfo->si_code) == 192)
275 if (pseudo_atomic_trap_p(context)) {
276 /* A trap instruction from a pseudo-atomic. We just need
277 to fixup up alloc-tn to remove the interrupted flag,
278 skip over the trap instruction, and then handle the
279 pending interrupt(s). */
280 arch_clear_pseudo_atomic_interrupted(context);
281 arch_skip_instruction(context);
282 interrupt_handle_pending(context);
285 interrupt_internal_error(context, 0);
289 interrupt_handle_now(signal, siginfo, context);
293 static void sigemt_handler(int signal, siginfo_t *siginfo,
294 os_context_t *context)
296 unsigned int badinst;
297 boolean subtract, immed;
298 int rd, rs1, op1, rs2, op2, result;
300 badinst = *(unsigned int *)os_context_pc_addr(context);
301 if ((badinst >> 30) != 2 || ((badinst >> 20) & 0x1f) != 0x11) {
302 /* It wasn't a tagged add. Pass the signal into lisp. */
303 interrupt_handle_now(signal, siginfo, context);
307 fprintf(stderr, "SIGEMT trap handler with tagged op instruction!\n");
309 /* Extract the parts of the inst. */
310 subtract = badinst & (1<<19);
311 rs1 = (badinst>>14) & 0x1f;
312 op1 = *os_context_register_addr(context, rs1);
314 /* If the first arg is $ALLOC then it is really a signal-pending note */
315 /* for the pseudo-atomic noise. */
316 if (rs1 == reg_ALLOC) {
317 /* Perform the op anyway. */
318 op2 = badinst & 0x1fff;
325 /* KLUDGE: this & ~7 is a little bit magical but basically
326 clears pseudo_atomic bits if any */
327 *os_context_register_addr(context, reg_ALLOC) = result & ~7;
328 arch_skip_instruction(context);
329 interrupt_handle_pending(context);
333 if ((op1 & 3) != 0) {
334 /* The first arg wan't a fixnum. */
335 interrupt_internal_error(context, 0);
339 if (immed = badinst & (1<<13)) {
340 op2 = badinst & 0x1fff;
345 rs2 = badinst & 0x1f;
346 op2 = *os_context_register_addr(context, rs2);
349 if ((op2 & 3) != 0) {
350 /* The second arg wan't a fixnum. */
351 interrupt_internal_error(context, 0);
355 rd = (badinst>>25) & 0x1f;
357 /* Don't bother computing the result unless we are going to use it. */
359 result = (op1>>2) - (op2>>2);
361 result = (op1>>2) + (op2>>2);
363 dynamic_space_free_pointer =
364 (lispobj *) *os_context_register_addr(context, reg_ALLOC);
366 *os_context_register_addr(context, rd) = alloc_number(result);
368 *os_context_register_addr(context, reg_ALLOC) =
369 (unsigned long) dynamic_space_free_pointer;
372 arch_skip_instruction(context);
375 void arch_install_interrupt_handlers()
377 undoably_install_low_level_interrupt_handler(SIGILL , sigill_handler);
378 undoably_install_low_level_interrupt_handler(SIGEMT, sigemt_handler);
382 #ifdef LISP_FEATURE_LINKAGE_TABLE
384 /* This a naive port from CMUCL/sparc, which was mostly stolen from the
385 * CMUCL/x86 version, with adjustments for sparc
387 * Linkage entry size is 16, because we need at least 3 instruction to
390 * sethi %hi(addr), %g4
391 * jmpl [%g4 + %lo(addr)], %g5
394 * The Sparc V9 ABI seems to use 8 words for its jump tables. Maybe
395 * we should do the same?
399 * Define the registers to use in the linkage jump table. Can be the
400 * same. Some care must be exercised when choosing these. It has to be
401 * a register that is not otherwise being used. reg_L0 is a good
402 * choice. call_into_c trashes reg_L0 without preserving it, so we can
403 * trash it in the linkage jump table.
405 #define LINKAGE_TEMP_REG reg_L0
406 #define LINKAGE_ADDR_REG reg_L0
409 * Insert the necessary jump instructions at the given address.
412 arch_write_linkage_table_jmp(void* reloc_addr, void *target_addr)
415 * Make JMP to function entry.
417 * The instruction sequence is:
419 * sethi %hi(addr), temp_reg
420 * jmp %temp_reg + %lo(addr), %addr_reg
426 unsigned long hi; /* Top 22 bits of address */
427 unsigned long lo; /* Low 10 bits of address */
430 inst_ptr = (int*) reloc_addr;
433 * Split the target address into hi and lo parts for the sethi
434 * instruction. hi is the top 22 bits. lo is the low 10 bits.
436 hi = (unsigned long) target_addr;
441 * sethi %hi(addr), temp_reg
444 inst = (0 << 30) | (LINKAGE_TEMP_REG << 25) | (4 << 22) | hi;
448 * jmpl [temp_reg + %lo(addr)], addr_reg
451 inst = (2U << 30) | (LINKAGE_ADDR_REG << 25) | (0x38 << 19)
452 | (LINKAGE_TEMP_REG << 14) | (1 << 13) | lo;
455 /* nop (really sethi 0, %g0) */
457 inst = (0 << 30) | (0 << 25) | (4 << 22) | 0;
462 os_flush_icache((os_vm_address_t) reloc_addr, (char*) inst_ptr - (char*) reloc_addr);
466 arch_write_linkage_table_ref(void * reloc_addr, void *target_addr)
468 *(unsigned long *)reloc_addr = (unsigned long)target_addr;