xref: /openbmc/linux/arch/x86/include/asm/traps.h (revision 53aaf262)
1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */
21965aae3SH. Peter Anvin #ifndef _ASM_X86_TRAPS_H
31965aae3SH. Peter Anvin #define _ASM_X86_TRAPS_H
4bb898558SAl Viro 
595927475SAndy Lutomirski #include <linux/context_tracking_state.h>
65cec93c2SAndy Lutomirski #include <linux/kprobes.h>
75cec93c2SAndy Lutomirski 
8bb898558SAl Viro #include <asm/debugreg.h>
953aaf262SThomas Gleixner #include <asm/idtentry.h>
10a2bcd473SIngo Molnar #include <asm/siginfo.h>			/* TRAP_TRACE, ... */
11bb898558SAl Viro 
129e1a431dSAndi Kleen #define dotraplinkage __visible
13bb898558SAl Viro 
14bb898558SAl Viro asmlinkage void divide_error(void);
15bb898558SAl Viro asmlinkage void debug(void);
16bb898558SAl Viro asmlinkage void nmi(void);
17bb898558SAl Viro asmlinkage void int3(void);
18bb898558SAl Viro asmlinkage void overflow(void);
19bb898558SAl Viro asmlinkage void bounds(void);
20bb898558SAl Viro asmlinkage void invalid_op(void);
21bb898558SAl Viro asmlinkage void device_not_available(void);
22bb898558SAl Viro #ifdef CONFIG_X86_64
23bb898558SAl Viro asmlinkage void double_fault(void);
24bb898558SAl Viro #endif
25bb898558SAl Viro asmlinkage void coprocessor_segment_overrun(void);
26bb898558SAl Viro asmlinkage void invalid_TSS(void);
27bb898558SAl Viro asmlinkage void segment_not_present(void);
28bb898558SAl Viro asmlinkage void stack_segment(void);
29bb898558SAl Viro asmlinkage void general_protection(void);
30bb898558SAl Viro asmlinkage void page_fault(void);
31631bc487SGleb Natapov asmlinkage void async_page_fault(void);
32bb898558SAl Viro asmlinkage void spurious_interrupt_bug(void);
33bb898558SAl Viro asmlinkage void coprocessor_error(void);
34bb898558SAl Viro asmlinkage void alignment_check(void);
35bb898558SAl Viro #ifdef CONFIG_X86_MCE
36bb898558SAl Viro asmlinkage void machine_check(void);
37bb898558SAl Viro #endif /* CONFIG_X86_MCE */
38bb898558SAl Viro asmlinkage void simd_coprocessor_error(void);
39bb898558SAl Viro 
405878d5d6SJuergen Gross #if defined(CONFIG_X86_64) && defined(CONFIG_XEN_PV)
415878d5d6SJuergen Gross asmlinkage void xen_divide_error(void);
4243e41110SJuergen Gross asmlinkage void xen_xennmi(void);
435878d5d6SJuergen Gross asmlinkage void xen_xendebug(void);
44b23e5844SZhenzhong Duan asmlinkage void xen_int3(void);
455878d5d6SJuergen Gross asmlinkage void xen_overflow(void);
465878d5d6SJuergen Gross asmlinkage void xen_bounds(void);
475878d5d6SJuergen Gross asmlinkage void xen_invalid_op(void);
485878d5d6SJuergen Gross asmlinkage void xen_device_not_available(void);
495878d5d6SJuergen Gross asmlinkage void xen_double_fault(void);
505878d5d6SJuergen Gross asmlinkage void xen_coprocessor_segment_overrun(void);
515878d5d6SJuergen Gross asmlinkage void xen_invalid_TSS(void);
525878d5d6SJuergen Gross asmlinkage void xen_segment_not_present(void);
535878d5d6SJuergen Gross asmlinkage void xen_stack_segment(void);
545878d5d6SJuergen Gross asmlinkage void xen_general_protection(void);
555878d5d6SJuergen Gross asmlinkage void xen_page_fault(void);
565878d5d6SJuergen Gross asmlinkage void xen_spurious_interrupt_bug(void);
575878d5d6SJuergen Gross asmlinkage void xen_coprocessor_error(void);
585878d5d6SJuergen Gross asmlinkage void xen_alignment_check(void);
595878d5d6SJuergen Gross #ifdef CONFIG_X86_MCE
605878d5d6SJuergen Gross asmlinkage void xen_machine_check(void);
615878d5d6SJuergen Gross #endif /* CONFIG_X86_MCE */
625878d5d6SJuergen Gross asmlinkage void xen_simd_coprocessor_error(void);
635878d5d6SJuergen Gross #endif
645878d5d6SJuergen Gross 
658e1599fcSBorislav Petkov dotraplinkage void do_divide_error(struct pt_regs *regs, long error_code);
668e1599fcSBorislav Petkov dotraplinkage void do_debug(struct pt_regs *regs, long error_code);
678e1599fcSBorislav Petkov dotraplinkage void do_nmi(struct pt_regs *regs, long error_code);
688e1599fcSBorislav Petkov dotraplinkage void do_int3(struct pt_regs *regs, long error_code);
698e1599fcSBorislav Petkov dotraplinkage void do_overflow(struct pt_regs *regs, long error_code);
708e1599fcSBorislav Petkov dotraplinkage void do_bounds(struct pt_regs *regs, long error_code);
718e1599fcSBorislav Petkov dotraplinkage void do_invalid_op(struct pt_regs *regs, long error_code);
728e1599fcSBorislav Petkov dotraplinkage void do_device_not_available(struct pt_regs *regs, long error_code);
737d8d8cfdSAndy Lutomirski dotraplinkage void do_double_fault(struct pt_regs *regs, long error_code, unsigned long cr2);
748e1599fcSBorislav Petkov dotraplinkage void do_coprocessor_segment_overrun(struct pt_regs *regs, long error_code);
758e1599fcSBorislav Petkov dotraplinkage void do_invalid_TSS(struct pt_regs *regs, long error_code);
768e1599fcSBorislav Petkov dotraplinkage void do_segment_not_present(struct pt_regs *regs, long error_code);
778e1599fcSBorislav Petkov dotraplinkage void do_stack_segment(struct pt_regs *regs, long error_code);
788e1599fcSBorislav Petkov dotraplinkage void do_general_protection(struct pt_regs *regs, long error_code);
79a0d14b89SPeter Zijlstra dotraplinkage void do_page_fault(struct pt_regs *regs, unsigned long error_code, unsigned long address);
808e1599fcSBorislav Petkov dotraplinkage void do_spurious_interrupt_bug(struct pt_regs *regs, long error_code);
818e1599fcSBorislav Petkov dotraplinkage void do_coprocessor_error(struct pt_regs *regs, long error_code);
828e1599fcSBorislav Petkov dotraplinkage void do_alignment_check(struct pt_regs *regs, long error_code);
838e1599fcSBorislav Petkov dotraplinkage void do_simd_coprocessor_error(struct pt_regs *regs, long error_code);
84bb898558SAl Viro #ifdef CONFIG_X86_32
858e1599fcSBorislav Petkov dotraplinkage void do_iret_error(struct pt_regs *regs, long error_code);
86bb898558SAl Viro #endif
878e1599fcSBorislav Petkov dotraplinkage void do_mce(struct pt_regs *regs, long error_code);
88bb898558SAl Viro 
893ba4f0a6SThomas Gleixner #ifdef CONFIG_X86_64
903ba4f0a6SThomas Gleixner asmlinkage __visible notrace struct pt_regs *sync_regs(struct pt_regs *eregs);
913ba4f0a6SThomas Gleixner asmlinkage __visible notrace
923ba4f0a6SThomas Gleixner struct bad_iret_stack *fixup_bad_iret(struct bad_iret_stack *s);
933ba4f0a6SThomas Gleixner void __init trap_init(void);
943ba4f0a6SThomas Gleixner #endif
953ba4f0a6SThomas Gleixner 
96bb898558SAl Viro static inline int get_si_code(unsigned long condition)
97bb898558SAl Viro {
98bb898558SAl Viro 	if (condition & DR_STEP)
99bb898558SAl Viro 		return TRAP_TRACE;
100bb898558SAl Viro 	else if (condition & (DR_TRAP0|DR_TRAP1|DR_TRAP2|DR_TRAP3))
101bb898558SAl Viro 		return TRAP_HWBKPT;
102bb898558SAl Viro 	else
103bb898558SAl Viro 		return TRAP_BRKPT;
104bb898558SAl Viro }
105bb898558SAl Viro 
106bb898558SAl Viro extern int panic_on_unrecovered_nmi;
107bb898558SAl Viro 
108d315760fSTejun Heo void math_emulate(struct math_emu_info *);
109fde0312dSAkinobu Mita #ifndef CONFIG_X86_32
11068b5e432SBorislav Petkov asmlinkage void smp_thermal_interrupt(struct pt_regs *regs);
11168b5e432SBorislav Petkov asmlinkage void smp_threshold_interrupt(struct pt_regs *regs);
11268b5e432SBorislav Petkov asmlinkage void smp_deferred_error_interrupt(struct pt_regs *regs);
113bb898558SAl Viro #endif
114bb898558SAl Viro 
115ad3bc25aSBorislav Petkov void smp_apic_timer_interrupt(struct pt_regs *regs);
116ad3bc25aSBorislav Petkov void smp_spurious_interrupt(struct pt_regs *regs);
117ad3bc25aSBorislav Petkov void smp_error_interrupt(struct pt_regs *regs);
118ad3bc25aSBorislav Petkov asmlinkage void smp_irq_move_cleanup_interrupt(void);
119ad3bc25aSBorislav Petkov 
1206271cfdfSAndy Lutomirski #ifdef CONFIG_VMAP_STACK
1216271cfdfSAndy Lutomirski void __noreturn handle_stack_overflow(const char *message,
1226271cfdfSAndy Lutomirski 				      struct pt_regs *regs,
1236271cfdfSAndy Lutomirski 				      unsigned long fault_address);
1246271cfdfSAndy Lutomirski #endif
1256271cfdfSAndy Lutomirski 
1261067f030SRicardo Neri /*
1271067f030SRicardo Neri  * Page fault error code bits:
1281067f030SRicardo Neri  *
1291067f030SRicardo Neri  *   bit 0 ==	 0: no page found	1: protection fault
1301067f030SRicardo Neri  *   bit 1 ==	 0: read access		1: write access
1311067f030SRicardo Neri  *   bit 2 ==	 0: kernel-mode access	1: user-mode access
1321067f030SRicardo Neri  *   bit 3 ==				1: use of reserved bit detected
1331067f030SRicardo Neri  *   bit 4 ==				1: fault was an instruction fetch
1341067f030SRicardo Neri  *   bit 5 ==				1: protection keys block access
1351067f030SRicardo Neri  */
1361067f030SRicardo Neri enum x86_pf_error_code {
1371067f030SRicardo Neri 	X86_PF_PROT	=		1 << 0,
1381067f030SRicardo Neri 	X86_PF_WRITE	=		1 << 1,
1391067f030SRicardo Neri 	X86_PF_USER	=		1 << 2,
1401067f030SRicardo Neri 	X86_PF_RSVD	=		1 << 3,
1411067f030SRicardo Neri 	X86_PF_INSTR	=		1 << 4,
1421067f030SRicardo Neri 	X86_PF_PK	=		1 << 5,
1431067f030SRicardo Neri };
1441965aae3SH. Peter Anvin #endif /* _ASM_X86_TRAPS_H */
145