source: trunk/hal/tsar_mips32/core/hal_exception.c @ 440

Last change on this file since 440 was 440, checked in by alain, 6 years ago

1/ Fix a bug in the Multithreaded "sort" applicationr:
The pthread_create() arguments must be declared as global variables.
2/ The exit syscall can be called by any thread of a process..

File size: 17.4 KB
RevLine 
[16]1/*
2 * hal_exception.c - implementation of exception handler for TSAR-MIPS32.
3 *
4 * Author   Alain Greiner (2016, 2017)
5 *
6 * Copyright (c) UPMC Sorbonne Universites
7 *
8 * This file is part of ALMOS-MKH.
9 *
10 * ALMOS-MKH is free software; you can redistribute it and/or modify it
11 * under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; version 2.0 of the License.
13 *
14 * ALMOS-MKH is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
17 * General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with ALMOS-MKH; if not, write to the Free Software Foundation,
21 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
22 */
23
24#include <hal_types.h>
25#include <hal_irqmask.h>
[406]26#include <hal_special.h>
[16]27#include <hal_exception.h>
28#include <thread.h>
29#include <printk.h>
[380]30#include <chdev.h>
[16]31#include <vmm.h>
32#include <errno.h>
33#include <scheduler.h>
34#include <core.h>
35#include <syscalls.h>
[440]36#include <shared_syscalls.h>
[16]37#include <remote_spinlock.h>
[406]38#include <hal_kentry.h>
[16]39
[380]40
[16]41//////////////////////////////////////////////////////////////////////////////////////////
42//  Extern global variables
43//////////////////////////////////////////////////////////////////////////////////////////
44
[380]45extern   chdev_directory_t    chdev_dir;  // allocated in the kernel_init.c file.
[16]46
47//////////////////////////////////////////////////////////////////////////////////////////
[381]48// This enum defines the global exception types after analysis by the exception handler.
49//////////////////////////////////////////////////////////////////////////////////////////
50
51typedef enum
52{
53    EXCP_NON_FATAL,
54    EXCP_USER_ERROR,
55    EXCP_KERNEL_PANIC,
56}
57exception_handling_type_t;
58
59//////////////////////////////////////////////////////////////////////////////////////////
[407]60// This enum defines the mask values for an MMU exception code reported by the mips32.
[381]61//////////////////////////////////////////////////////////////////////////////////////////
62
63typedef enum
64{
[407]65    MMU_WRITE_PT1_UNMAPPED        = 0x0001,
66    MMU_WRITE_PT2_UNMAPPED        = 0x0002,
67    MMU_WRITE_PRIVILEGE_VIOLATION = 0x0004,
68    MMU_WRITE_ACCESS_VIOLATION    = 0x0008,
69    MMU_WRITE_UNDEFINED_XTN       = 0x0020,
70    MMU_WRITE_PT1_ILLEGAL_ACCESS  = 0x0040,
71    MMU_WRITE_PT2_ILLEGAL_ACCESS  = 0x0080,
72    MMU_WRITE_DATA_ILLEGAL_ACCESS = 0x0100,
73
74    MMU_READ_PT1_UNMAPPED         = 0x1001,
75    MMU_READ_PT2_UNMAPPED         = 0x1002,
76    MMU_READ_PRIVILEGE_VIOLATION  = 0x1004,
77    MMU_READ_EXEC_VIOLATION       = 0x1010,
78    MMU_READ_UNDEFINED_XTN        = 0x1020,
79    MMU_READ_PT1_ILLEGAL_ACCESS   = 0x1040,
80    MMU_READ_PT2_ILLEGAL_ACCESS   = 0x1080,
81    MMU_READ_DATA_ILLEGAL_ACCESS  = 0x1100,
[381]82}
83mmu_exception_subtype_t;
84
85//////////////////////////////////////////////////////////////////////////////////////////
[16]86// This enum defines the relevant values for XCODE field in mips32 CP0_CR register.
87//////////////////////////////////////////////////////////////////////////////////////////
88
89typedef enum
90{
[296]91    XCODE_ADEL = 0x4,        // Illegal address for data load
92    XCODE_ADES = 0x5,        // Illegal address for data store
93    XCODE_IBE  = 0x6,        // Instruction MMU exception       (can be NON-FATAL)
94    XCODE_DBE  = 0x7,        // Data MMU exception              (can be NON-FATAL)
95    XCODE_RI   = 0xA,        // Reserved instruction exception
96    XCODE_CPU  = 0xB,        // Coprocessor unusable exception  (can be NON-FATAl)
97    XCODE_OVR  = 0xC,        // Arithmetic Overflow exception
[16]98}
99xcode_values_t;
100
[409]101/////////////////////////////////////////////
102char * hal_mmu_exception_str( uint32_t code )
[408]103{
104    if     ( code == MMU_WRITE_PT1_UNMAPPED        ) return "WRITE_PT1_UNMAPPED";
105    else if( code == MMU_WRITE_PT2_UNMAPPED        ) return "WRITE_PT2_UNMAPPED";
106    else if( code == MMU_WRITE_PRIVILEGE_VIOLATION ) return "WRITE_PRIVILEGE_VIOLATION";
107    else if( code == MMU_WRITE_ACCESS_VIOLATION    ) return "WRITE_ACCESS_VIOLATION";
108    else if( code == MMU_WRITE_UNDEFINED_XTN       ) return "WRITE_UNDEFINED_XTN";
109    else if( code == MMU_WRITE_PT1_ILLEGAL_ACCESS  ) return "WRITE_PT1_ILLEGAL_ACCESS";
110    else if( code == MMU_WRITE_PT2_ILLEGAL_ACCESS  ) return "WRITE_PT2_ILLEGAL_ACCESS";
111    else if( code == MMU_WRITE_DATA_ILLEGAL_ACCESS ) return "WRITE_DATA_ILLEGAL_ACCESS";
112    else if( code == MMU_READ_PT1_UNMAPPED         ) return "READ_PT1_UNMAPPED";
113    else if( code == MMU_READ_PT2_UNMAPPED         ) return "READ_PT2_UNMAPPED";
114    else if( code == MMU_READ_PRIVILEGE_VIOLATION  ) return "READ_PRIVILEGE_VIOLATION";
115    else if( code == MMU_READ_EXEC_VIOLATION       ) return "READ_EXEC_VIOLATION";
116    else if( code == MMU_READ_UNDEFINED_XTN        ) return "READ_UNDEFINED_XTN";
117    else if( code == MMU_READ_PT1_ILLEGAL_ACCESS   ) return "READ_PT1_ILLEGAL_ACCESS";
118    else if( code == MMU_READ_PT2_ILLEGAL_ACCESS   ) return "READ_PT2_ILLEGAL_ACCESS";
119    else if( code == MMU_READ_DATA_ILLEGAL_ACCESS  ) return "READ_DATA_ILLEGAL_ACCESS";
120    else                                             return "undefined";
121}
122
[380]123//////////////////////////////////////////////////////////////////////////////////////////
[406]124// This function is called when a FPU Coprocessor Unavailable exception has been
[380]125// detected for the calling thread.
126// It enables the FPU, It saves the current FPU context in the current owner thread
127// descriptor if required, and restore the FPU context from the calling thread descriptor.
128//////////////////////////////////////////////////////////////////////////////////////////
129// @ this     : pointer on faulty thread descriptor.
130// @ return always EXCP_NON_FATAL
131//////////////////////////////////////////////////////////////////////////////////////////
[406]132error_t hal_fpu_exception( thread_t * this )
[380]133{
134        core_t   * core = this->core; 
135
136    // enable FPU 
137        hal_fpu_enable();
138
139    // save FPU context in current owner thread if required
140        if( core->fpu_owner != NULL )
141    {
142        if( core->fpu_owner != this )
143            {
[408]144                    hal_fpu_context_save( XPTR( local_cxy , core->fpu_owner ) );
[380]145        }
146        }
147
148    // attach the FPU to the requesting thread
149        hal_fpu_context_restore( this->fpu_context );
150        core->fpu_owner = this;
151
152        return EXCP_NON_FATAL;
153
154}  // end hal_fpu_exception()
155
156//////////////////////////////////////////////////////////////////////////////////////////
[437]157// This function is called when an MMU exception has been detected (IBE / DBE).
[380]158// It get the relevant exception arguments from the MMU.
159// It signal a fatal error in case of illegal access. In case of page unmapped
160// it checks that the faulty address belongs to a registered vseg. It update the local
161// vseg list from the reference cluster if required, and signal a fatal user error
162// in case of illegal virtual address. Finally, it updates the local page table from the
163// reference cluster.
164//////////////////////////////////////////////////////////////////////////////////////////
165// @ this     : pointer on faulty thread descriptor.
[440]166// @ excPC    :
[406]167// @ is_ins   : IBE if true / DBE if false.
[380]168// @ return EXCP_NON_FATAL / EXCP_USER_ERROR / EXCP_KERNEL_PANIC
169//////////////////////////////////////////////////////////////////////////////////////////
[406]170error_t hal_mmu_exception( thread_t * this,
[437]171                           uint32_t   excPC,
[406]172                           bool_t     is_ins ) 
[380]173{
[406]174        process_t      * process;
175    error_t          error;
[380]176
[406]177    uint32_t         mmu_ins_excp_code;
178    uint32_t         mmu_ins_bad_vaddr;
179    uint32_t         mmu_dat_excp_code;
180    uint32_t         mmu_dat_bad_vaddr;
[380]181
[406]182    uint32_t         bad_vaddr;
[380]183    uint32_t         excp_code;
184       
[406]185    process = this->process;
[380]186
187    // get relevant values from MMU
188        hal_get_mmu_excp( &mmu_ins_excp_code,
189                          &mmu_ins_bad_vaddr,
190                          &mmu_dat_excp_code, 
191                          &mmu_dat_bad_vaddr );
192
[406]193    // get exception code and faulty vaddr, depending on IBE/DBE
194    if( is_ins )
[380]195    {
196        excp_code = mmu_ins_excp_code;
197        bad_vaddr = mmu_ins_bad_vaddr;
198    }
[406]199    else 
[380]200    {
201        excp_code = mmu_dat_excp_code;
202        bad_vaddr = mmu_dat_bad_vaddr;
203    }
204
[438]205#if DEBUG_HAL_EXCEPTIONS
[432]206uint32_t cycle = (uint32_t)hal_get_cycles();
[438]207if( DEBUG_HAL_EXCEPTIONS < cycle )
[432]208printk("\n[DBG] %s : thread %x enter / is_ins %d / %s / vaddr %x / cycle %d\n",
209__FUNCTION__, this, is_ins, hal_mmu_exception_str(excp_code), bad_vaddr, cycle );
210#endif
[408]211
[407]212   // analyse exception code
213    switch( excp_code )
[380]214    {
[407]215        case MMU_WRITE_PT1_UNMAPPED:      // non fatal
216        case MMU_WRITE_PT2_UNMAPPED:
217        case MMU_READ_PT1_UNMAPPED:
218        case MMU_READ_PT2_UNMAPPED:
219        {
220            // try to map the unmapped PTE
221            error = vmm_handle_page_fault( process, 
[440]222                                           bad_vaddr >> CONFIG_PPM_PAGE_SHIFT,  // vpn
223                                           false );                             // not a COW
[407]224            if( error )   
225            {
226                printk("\n[ERROR] in %s for thread %x : cannot map vaddr = %x\n",
227                __FUNCTION__ , this->trdid , bad_vaddr );
[406]228
[407]229                        return EXCP_USER_ERROR;
230            } 
231            else            // page fault successfull
232            {
[391]233
[438]234#if DEBUG_HAL_EXCEPTIONS
[432]235cycle = (uint32_t)hal_get_cycles();
[438]236if( DEBUG_HAL_EXCEPTIONS < cycle )
[432]237printk("\n[DBG] %s : thread %x exit / page-fault handled for vaddr = %x\n",
238__FUNCTION__ , this , bad_vaddr );
239#endif
[407]240 
241                return EXCP_NON_FATAL;
242            }
243        }
244        case MMU_WRITE_PRIVILEGE_VIOLATION:  // illegal access user error
245        case MMU_READ_PRIVILEGE_VIOLATION:
[380]246        {
[407]247            printk("\n[ERROR] in %s for thread %x : illegal user access to vaddr = %x\n",
248            __FUNCTION__ , this->trdid , bad_vaddr );
[380]249
[407]250            return EXCP_USER_ERROR;
251        }
[408]252        case MMU_WRITE_ACCESS_VIOLATION:     // user error, or Copy-on-Write
[380]253        {
[407]254            // access page table to get GPT_COW flag
255            bool_t cow = hal_gpt_pte_is_cow( &(process->vmm.gpt),
[408]256                                             bad_vaddr >> CONFIG_PPM_PAGE_SHIFT ); 
[380]257
[407]258            if( cow )                        // Copy-on-Write
259            {
260                // try to allocate and copy the page
[440]261                error = vmm_handle_page_fault( process,
262                                               bad_vaddr >> CONFIG_PPM_PAGE_SHIFT,  // vpn
263                                               true );                              // COW
[407]264                if( error )
265                {
266                    printk("\n[ERROR] in %s for thread %x : cannot cow vaddr = %x\n",
267                    __FUNCTION__ , this->trdid , bad_vaddr );
[380]268
[407]269                            return EXCP_USER_ERROR;
270                }
271                else         // Copy on write successfull
272                {
[380]273
[438]274#if DEBUG_HAL_EXCEPTIONS
[432]275cycle = (uint32_t)hal_get_cycles();
[438]276if( DEBUG_HAL_EXCEPTIONS < cycle )
[432]277printk("\n[DBG] %s : thread %x exit / copy-on-write handled for vaddr = %x\n",
278__FUNCTION__ , this , bad_vaddr );
279#endif
[380]280
[407]281                    return EXCP_NON_FATAL;
282                } 
283            }
284            else                             // non writable user error
285            {
[409]286                printk("\n[ERROR] in %s for thread %x : non-writable vaddr = %x\n",
[407]287                __FUNCTION__ , this->trdid , bad_vaddr );
288
289                return EXCP_USER_ERROR;
290            }
291        }
292        case MMU_READ_EXEC_VIOLATION:        // user error
293        {
294            printk("\n[ERROR] in %s for thread %x : read to non-executable vaddr = %x\n",
295            __FUNCTION__ , this->trdid , bad_vaddr );
296
297            return EXCP_USER_ERROR;
298        }
299        default:                             // this is a kernel error => panic   
300        {
[440]301            assert( false , __FUNCTION__ ,
302            "thread %x / core[%x,%d] / epc %x / vaddr %x / cycle %d\n",
303            this, local_cxy, this->core->lid, excPC, bad_vaddr, (uint32_t)hal_get_cycles() );
[407]304
305            return EXCP_KERNEL_PANIC;
306        }
307    } 
[380]308} // end hal_mmu_exception()
309
310//////////////////////////////////////////////////////////////////////////////////////////
311// This static function prints on the kernel terminal the saved context (core registers)
312// and the thread state of a faulty thread.
313//////////////////////////////////////////////////////////////////////////////////////////
314// @ this     : pointer on faulty thread descriptor.
[425]315// @ uzone    : pointer on register array.
[407]316// @ error    : EXCP_USER_ERROR or EXCP_KERNEL_PANIC
[380]317//////////////////////////////////////////////////////////////////////////////////////////
318static void hal_exception_dump( thread_t * this,
[408]319                                reg_t    * uzone,
[407]320                                error_t    error )
[380]321{
[408]322    uint32_t    save_sr;
323    core_t    * core    = this->core;
324    process_t * process = this->process;
[380]325
326    // get pointers on TXT0 chdev
[407]327    xptr_t    txt0_xp  = chdev_dir.txt_tx[0];
[380]328    cxy_t     txt0_cxy = GET_CXY( txt0_xp );
329    chdev_t * txt0_ptr = GET_PTR( txt0_xp );
330
331    // get extended pointer on remote TXT0 chdev lock
332    xptr_t  lock_xp = XPTR( txt0_cxy , &txt0_ptr->wait_lock );
333
334    // get TXT0 lock in busy waiting mode
335    remote_spinlock_lock_busy( lock_xp , &save_sr );
336
[407]337    if( error == EXCP_USER_ERROR )
338    {
[408]339        nolock_printk("\n=== USER ERROR / trdid %x / pid %x / core[%x,%d] / cycle %d ===\n",
340        this->trdid, process->pid, local_cxy, core->lid , (uint32_t)hal_get_cycles() );
[407]341    }
[380]342    else
[407]343    {
[408]344        nolock_printk("\n=== KERNEL PANIC / trdid %x / pid %x / core[%x,%d] / cycle %d ===\n",
345        this->trdid, process->pid, local_cxy, core->lid , (uint32_t)hal_get_cycles() );
[407]346    }
[380]347
[408]348        nolock_printk("local locks = %d / remote locks = %d / blocked_vector = %X\n\n",
349    this->local_locks, this->remote_locks, this->blocked );
[380]350
[408]351    nolock_printk("c0_cr   %X  c0_epc  %X  c0_sr  %X  c0_th  %X\n",
352    uzone[UZ_CR], uzone[UZ_EPC], uzone[UZ_SR], uzone[UZ_TH] );
[380]353
[408]354    nolock_printk("c2_mode %X  c2_ptpr %X\n",
355    uzone[UZ_MODE], uzone[UZ_PTPR] );
[380]356
[408]357    nolock_printk("at_01   %X  v0_2    %X  v1_3   %X  a0_4   %X  a1_5   %X\n",
358        uzone[UZ_AT], uzone[UZ_V0], uzone[UZ_V1], uzone[UZ_A0], uzone[UZ_A1] );
359
360    nolock_printk("a2_6    %X  a3_7    %X  t0_8   %X  t1_9   %X  t2_10  %X\n",
361        uzone[UZ_A2], uzone[UZ_A3], uzone[UZ_T0], uzone[UZ_T1], uzone[UZ_T2] );
[380]362 
[408]363    nolock_printk("t3_11   %X  t4_12   %X  t5_13  %X  t6_14  %X  t7_15  %X\n",
364        uzone[UZ_T3], uzone[UZ_T4], uzone[UZ_T5], uzone[UZ_T6], uzone[UZ_T7] );
[380]365
[408]366    nolock_printk("s0_16   %X  s1_17   %X  s2_18  %X  s3_19  %X  s4_20  %X\n",
367        uzone[UZ_S0], uzone[UZ_S1], uzone[UZ_S2], uzone[UZ_S3], uzone[UZ_S4] );
[380]368 
[408]369    nolock_printk("s5_21   %X  s6_22   %X  s7_23  %X  s8_24  %X  ra_25  %X\n",
370        uzone[UZ_S5], uzone[UZ_S6], uzone[UZ_S7], uzone[UZ_T8], uzone[UZ_T9] );
[380]371
[408]372    nolock_printk("gp_28   %X  sp_29   %X  S8_30  %X  ra_31  %X\n",
373        uzone[UZ_GP], uzone[UZ_SP], uzone[UZ_S8], uzone[UZ_RA] );
[407]374
[380]375    // release the lock
376    remote_spinlock_unlock_busy( lock_xp , save_sr );
377
378}  // end hal_exception_dump()
379
[408]380///////////////////////
381void hal_do_exception()
[16]382{
[408]383    uint32_t   * uzone;
384    thread_t   * this;
385        error_t      error;
386        uint32_t     excCode;                  // 4 bits XCODE from CP0_CR
[437]387        uint32_t     excPC;                    // fauty instruction address
[16]388
[408]389    // get pointer on faulty thread uzone
390    this  = CURRENT_THREAD;
[425]391    uzone = (uint32_t *)CURRENT_THREAD->uzone_current;
[408]392
[437]393    // get XCODE and EPC from UZONE
[408]394        excCode        = (uzone[UZ_CR] >> 2) & 0xF;
[437]395    excPC          = uzone[UZ_EPC];
[16]396
[438]397#if DEBUG_HAL_EXCEPTIONS
[432]398uint32_t cycle = (uint32_t)hal_get_cycles();
[438]399if( DEBUG_HAL_EXCEPTIONS < cycle )
[437]400printk("\n[DBG] %s : thread %x enter / core[%x,%d] / pid %x / epc %x / xcode %x / cycle %d\n",
401__FUNCTION__, this, local_cxy, this->core->lid, this->process->pid, excPC, excCode, cycle );
[432]402#endif
[406]403
[16]404        switch(excCode)
405        {
406        case XCODE_DBE:     // can be non fatal
[406]407        {
[437]408                    error = hal_mmu_exception( this , excPC , false );  // data MMU exception
[406]409            break;
410        }
[380]411            case XCODE_IBE:     // can be non fatal
[16]412        {
[437]413                    error = hal_mmu_exception( this , excPC , true );   // ins MMU exception
[406]414                    break;
[16]415        }
416            case XCODE_CPU:    // can be non fatal
417        {
[408]418            if( ((uzone[UZ_CR] >> 28) & 0x3) == 1 )     // unavailable FPU
[16]419            {
[380]420                error = hal_fpu_exception( this );
[16]421            }
422            else
423            {
424                        error = EXCP_USER_ERROR;
425            }
[406]426                    break;
[16]427        }
[380]428        case XCODE_OVR:    // user fatal error
429        case XCODE_RI:     // user fatal error
430        case XCODE_ADEL:   // user fatal error
431        case XCODE_ADES:   // user fatal error
[16]432        {
433                    error = EXCP_USER_ERROR;
[406]434                break;
[16]435        }
436        default:
437        {
[317]438                    error = EXCP_KERNEL_PANIC;
[16]439        }
440        }
441   
442    // analyse error code
[317]443        if( error == EXCP_USER_ERROR )          //  user error => kill user process
[16]444        {
[408]445        hal_exception_dump( this , uzone , error );
[407]446
[440]447        sys_exit( EXIT_FAILURE );
[16]448        }
449    else if( error == EXCP_KERNEL_PANIC )   // kernel error => kernel panic
450    {
[408]451        hal_exception_dump( this , uzone , error );
[425]452
453        assert( false , __FUNCTION__ , "thread %x in process %x on core [%x,%d]",
[440]454        this , this->process->pid , local_cxy , this->core->lid );
[16]455    }
[406]456
[438]457#if DEBUG_HAL_EXCEPTIONS
[432]458cycle = (uint32_t)hal_get_cycles();
[438]459if( DEBUG_HAL_EXCEPTIONS < cycle )
[437]460printk("\n[DBG] %s : thread %x exit / core[%x,%d] / pid %x / epc %x / xcode %x / cycle %d\n",
461__FUNCTION__, this, local_cxy, this->core->lid, this->process->pid, excPC, excCode, cycle );
[432]462#endif
[406]463
[16]464}  // end hal_do_exception()
465
466
Note: See TracBrowser for help on using the repository browser.