1*1da177e4SLinus Torvalds #include <linux/compiler.h> 2*1da177e4SLinus Torvalds #include <linux/mm.h> 3*1da177e4SLinus Torvalds #include <linux/signal.h> 4*1da177e4SLinus Torvalds #include <linux/smp.h> 5*1da177e4SLinus Torvalds #include <linux/smp_lock.h> 6*1da177e4SLinus Torvalds 7*1da177e4SLinus Torvalds #include <asm/asm.h> 8*1da177e4SLinus Torvalds #include <asm/bootinfo.h> 9*1da177e4SLinus Torvalds #include <asm/byteorder.h> 10*1da177e4SLinus Torvalds #include <asm/cpu.h> 11*1da177e4SLinus Torvalds #include <asm/inst.h> 12*1da177e4SLinus Torvalds #include <asm/processor.h> 13*1da177e4SLinus Torvalds #include <asm/uaccess.h> 14*1da177e4SLinus Torvalds #include <asm/branch.h> 15*1da177e4SLinus Torvalds #include <asm/mipsregs.h> 16*1da177e4SLinus Torvalds #include <asm/system.h> 17*1da177e4SLinus Torvalds #include <asm/cacheflush.h> 18*1da177e4SLinus Torvalds 19*1da177e4SLinus Torvalds #include <asm/fpu_emulator.h> 20*1da177e4SLinus Torvalds 21*1da177e4SLinus Torvalds #include "ieee754.h" 22*1da177e4SLinus Torvalds #include "dsemul.h" 23*1da177e4SLinus Torvalds 24*1da177e4SLinus Torvalds /* Strap kernel emulator for full MIPS IV emulation */ 25*1da177e4SLinus Torvalds 26*1da177e4SLinus Torvalds #ifdef __mips 27*1da177e4SLinus Torvalds #undef __mips 28*1da177e4SLinus Torvalds #endif 29*1da177e4SLinus Torvalds #define __mips 4 30*1da177e4SLinus Torvalds 31*1da177e4SLinus Torvalds extern struct mips_fpu_emulator_private fpuemuprivate; 32*1da177e4SLinus Torvalds 33*1da177e4SLinus Torvalds 34*1da177e4SLinus Torvalds /* 35*1da177e4SLinus Torvalds * Emulate the arbritrary instruction ir at xcp->cp0_epc. Required when 36*1da177e4SLinus Torvalds * we have to emulate the instruction in a COP1 branch delay slot. Do 37*1da177e4SLinus Torvalds * not change cp0_epc due to the instruction 38*1da177e4SLinus Torvalds * 39*1da177e4SLinus Torvalds * According to the spec: 40*1da177e4SLinus Torvalds * 1) it shouldnt be a branch :-) 41*1da177e4SLinus Torvalds * 2) it can be a COP instruction :-( 42*1da177e4SLinus Torvalds * 3) if we are tring to run a protected memory space we must take 43*1da177e4SLinus Torvalds * special care on memory access instructions :-( 44*1da177e4SLinus Torvalds */ 45*1da177e4SLinus Torvalds 46*1da177e4SLinus Torvalds /* 47*1da177e4SLinus Torvalds * "Trampoline" return routine to catch exception following 48*1da177e4SLinus Torvalds * execution of delay-slot instruction execution. 49*1da177e4SLinus Torvalds */ 50*1da177e4SLinus Torvalds 51*1da177e4SLinus Torvalds struct emuframe { 52*1da177e4SLinus Torvalds mips_instruction emul; 53*1da177e4SLinus Torvalds mips_instruction badinst; 54*1da177e4SLinus Torvalds mips_instruction cookie; 55*1da177e4SLinus Torvalds gpreg_t epc; 56*1da177e4SLinus Torvalds }; 57*1da177e4SLinus Torvalds 58*1da177e4SLinus Torvalds int mips_dsemul(struct pt_regs *regs, mips_instruction ir, gpreg_t cpc) 59*1da177e4SLinus Torvalds { 60*1da177e4SLinus Torvalds extern asmlinkage void handle_dsemulret(void); 61*1da177e4SLinus Torvalds mips_instruction *dsemul_insns; 62*1da177e4SLinus Torvalds struct emuframe *fr; 63*1da177e4SLinus Torvalds int err; 64*1da177e4SLinus Torvalds 65*1da177e4SLinus Torvalds if (ir == 0) { /* a nop is easy */ 66*1da177e4SLinus Torvalds regs->cp0_epc = cpc; 67*1da177e4SLinus Torvalds regs->cp0_cause &= ~CAUSEF_BD; 68*1da177e4SLinus Torvalds return 0; 69*1da177e4SLinus Torvalds } 70*1da177e4SLinus Torvalds #ifdef DSEMUL_TRACE 71*1da177e4SLinus Torvalds printk("dsemul %lx %lx\n", regs->cp0_epc, cpc); 72*1da177e4SLinus Torvalds 73*1da177e4SLinus Torvalds #endif 74*1da177e4SLinus Torvalds 75*1da177e4SLinus Torvalds /* 76*1da177e4SLinus Torvalds * The strategy is to push the instruction onto the user stack 77*1da177e4SLinus Torvalds * and put a trap after it which we can catch and jump to 78*1da177e4SLinus Torvalds * the required address any alternative apart from full 79*1da177e4SLinus Torvalds * instruction emulation!!. 80*1da177e4SLinus Torvalds * 81*1da177e4SLinus Torvalds * Algorithmics used a system call instruction, and 82*1da177e4SLinus Torvalds * borrowed that vector. MIPS/Linux version is a bit 83*1da177e4SLinus Torvalds * more heavyweight in the interests of portability and 84*1da177e4SLinus Torvalds * multiprocessor support. For Linux we generate a 85*1da177e4SLinus Torvalds * an unaligned access and force an address error exception. 86*1da177e4SLinus Torvalds * 87*1da177e4SLinus Torvalds * For embedded systems (stand-alone) we prefer to use a 88*1da177e4SLinus Torvalds * non-existing CP1 instruction. This prevents us from emulating 89*1da177e4SLinus Torvalds * branches, but gives us a cleaner interface to the exception 90*1da177e4SLinus Torvalds * handler (single entry point). 91*1da177e4SLinus Torvalds */ 92*1da177e4SLinus Torvalds 93*1da177e4SLinus Torvalds /* Ensure that the two instructions are in the same cache line */ 94*1da177e4SLinus Torvalds dsemul_insns = (mips_instruction *) REG_TO_VA ((regs->regs[29] - sizeof(struct emuframe)) & ~0x7); 95*1da177e4SLinus Torvalds fr = (struct emuframe *) dsemul_insns; 96*1da177e4SLinus Torvalds 97*1da177e4SLinus Torvalds /* Verify that the stack pointer is not competely insane */ 98*1da177e4SLinus Torvalds if (unlikely(!access_ok(VERIFY_WRITE, fr, sizeof(struct emuframe)))) 99*1da177e4SLinus Torvalds return SIGBUS; 100*1da177e4SLinus Torvalds 101*1da177e4SLinus Torvalds err = __put_user(ir, &fr->emul); 102*1da177e4SLinus Torvalds err |= __put_user((mips_instruction)BADINST, &fr->badinst); 103*1da177e4SLinus Torvalds err |= __put_user((mips_instruction)BD_COOKIE, &fr->cookie); 104*1da177e4SLinus Torvalds err |= __put_user(cpc, &fr->epc); 105*1da177e4SLinus Torvalds 106*1da177e4SLinus Torvalds if (unlikely(err)) { 107*1da177e4SLinus Torvalds fpuemuprivate.stats.errors++; 108*1da177e4SLinus Torvalds return SIGBUS; 109*1da177e4SLinus Torvalds } 110*1da177e4SLinus Torvalds 111*1da177e4SLinus Torvalds regs->cp0_epc = VA_TO_REG & fr->emul; 112*1da177e4SLinus Torvalds 113*1da177e4SLinus Torvalds flush_cache_sigtramp((unsigned long)&fr->badinst); 114*1da177e4SLinus Torvalds 115*1da177e4SLinus Torvalds return SIGILL; /* force out of emulation loop */ 116*1da177e4SLinus Torvalds } 117*1da177e4SLinus Torvalds 118*1da177e4SLinus Torvalds int do_dsemulret(struct pt_regs *xcp) 119*1da177e4SLinus Torvalds { 120*1da177e4SLinus Torvalds struct emuframe *fr; 121*1da177e4SLinus Torvalds gpreg_t epc; 122*1da177e4SLinus Torvalds u32 insn, cookie; 123*1da177e4SLinus Torvalds int err = 0; 124*1da177e4SLinus Torvalds 125*1da177e4SLinus Torvalds fr = (struct emuframe *) (xcp->cp0_epc - sizeof(mips_instruction)); 126*1da177e4SLinus Torvalds 127*1da177e4SLinus Torvalds /* 128*1da177e4SLinus Torvalds * If we can't even access the area, something is very wrong, but we'll 129*1da177e4SLinus Torvalds * leave that to the default handling 130*1da177e4SLinus Torvalds */ 131*1da177e4SLinus Torvalds if (!access_ok(VERIFY_READ, fr, sizeof(struct emuframe))) 132*1da177e4SLinus Torvalds return 0; 133*1da177e4SLinus Torvalds 134*1da177e4SLinus Torvalds /* 135*1da177e4SLinus Torvalds * Do some sanity checking on the stackframe: 136*1da177e4SLinus Torvalds * 137*1da177e4SLinus Torvalds * - Is the instruction pointed to by the EPC an BADINST? 138*1da177e4SLinus Torvalds * - Is the following memory word the BD_COOKIE? 139*1da177e4SLinus Torvalds */ 140*1da177e4SLinus Torvalds err = __get_user(insn, &fr->badinst); 141*1da177e4SLinus Torvalds err |= __get_user(cookie, &fr->cookie); 142*1da177e4SLinus Torvalds 143*1da177e4SLinus Torvalds if (unlikely(err || (insn != BADINST) || (cookie != BD_COOKIE))) { 144*1da177e4SLinus Torvalds fpuemuprivate.stats.errors++; 145*1da177e4SLinus Torvalds return 0; 146*1da177e4SLinus Torvalds } 147*1da177e4SLinus Torvalds 148*1da177e4SLinus Torvalds /* 149*1da177e4SLinus Torvalds * At this point, we are satisfied that it's a BD emulation trap. Yes, 150*1da177e4SLinus Torvalds * a user might have deliberately put two malformed and useless 151*1da177e4SLinus Torvalds * instructions in a row in his program, in which case he's in for a 152*1da177e4SLinus Torvalds * nasty surprise - the next instruction will be treated as a 153*1da177e4SLinus Torvalds * continuation address! Alas, this seems to be the only way that we 154*1da177e4SLinus Torvalds * can handle signals, recursion, and longjmps() in the context of 155*1da177e4SLinus Torvalds * emulating the branch delay instruction. 156*1da177e4SLinus Torvalds */ 157*1da177e4SLinus Torvalds 158*1da177e4SLinus Torvalds #ifdef DSEMUL_TRACE 159*1da177e4SLinus Torvalds printk("dsemulret\n"); 160*1da177e4SLinus Torvalds #endif 161*1da177e4SLinus Torvalds if (__get_user(epc, &fr->epc)) { /* Saved EPC */ 162*1da177e4SLinus Torvalds /* This is not a good situation to be in */ 163*1da177e4SLinus Torvalds force_sig(SIGBUS, current); 164*1da177e4SLinus Torvalds 165*1da177e4SLinus Torvalds return 0; 166*1da177e4SLinus Torvalds } 167*1da177e4SLinus Torvalds 168*1da177e4SLinus Torvalds /* Set EPC to return to post-branch instruction */ 169*1da177e4SLinus Torvalds xcp->cp0_epc = epc; 170*1da177e4SLinus Torvalds 171*1da177e4SLinus Torvalds return 1; 172*1da177e4SLinus Torvalds } 173