xref: /titanic_52/usr/src/uts/sun4/os/trap.c (revision 73427c57f824c3ec3b396181b163f37d50c5b3b1)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 #include <sys/mmu.h>
30 #include <sys/systm.h>
31 #include <sys/trap.h>
32 #include <sys/machtrap.h>
33 #include <sys/vtrace.h>
34 #include <sys/prsystm.h>
35 #include <sys/archsystm.h>
36 #include <sys/machsystm.h>
37 #include <sys/fpu/fpusystm.h>
38 #include <sys/tnf.h>
39 #include <sys/tnf_probe.h>
40 #include <sys/simulate.h>
41 #include <sys/ftrace.h>
42 #include <sys/ontrap.h>
43 #include <sys/kcpc.h>
44 #include <sys/kobj.h>
45 #include <sys/procfs.h>
46 #include <sys/sun4asi.h>
47 #include <sys/sdt.h>
48 #include <sys/fpras.h>
49 
50 #ifdef  TRAPTRACE
51 #include <sys/traptrace.h>
52 #endif
53 
54 int tudebug = 0;
55 static int tudebugbpt = 0;
56 static int tudebugfpe = 0;
57 
58 static int alignfaults = 0;
59 
60 #if defined(TRAPDEBUG) || defined(lint)
61 static int lodebug = 0;
62 #else
63 #define	lodebug	0
64 #endif /* defined(TRAPDEBUG) || defined(lint) */
65 
66 
67 int vis1_partial_support(struct regs *rp, k_siginfo_t *siginfo, uint_t *fault);
68 #pragma weak vis1_partial_support
69 
70 void showregs(unsigned, struct regs *, caddr_t, uint_t);
71 #pragma weak showregs
72 
73 void trap_async_hwerr(void);
74 #pragma weak trap_async_hwerr
75 
76 void trap_async_berr_bto(int, struct regs *);
77 #pragma weak trap_async_berr_bto
78 
79 static enum seg_rw get_accesstype(struct regs *);
80 static int nfload(struct regs *, int *);
81 static int swap_nc(struct regs *, int);
82 static int ldstub_nc(struct regs *, int);
83 void	trap_cleanup(struct regs *, uint_t, k_siginfo_t *, int);
84 void	trap_rtt(void);
85 
86 static int
87 die(unsigned type, struct regs *rp, caddr_t addr, uint_t mmu_fsr)
88 {
89 	struct trap_info ti;
90 
91 #ifdef TRAPTRACE
92 	TRAPTRACE_FREEZE;
93 #endif
94 
95 	ti.trap_regs = rp;
96 	ti.trap_type = type;
97 	ti.trap_addr = addr;
98 	ti.trap_mmu_fsr = mmu_fsr;
99 
100 	curthread->t_panic_trap = &ti;
101 
102 	if (type == T_DATA_MMU_MISS && addr < (caddr_t)KERNELBASE) {
103 		panic("BAD TRAP: type=%x rp=%p addr=%p mmu_fsr=%x "
104 		    "occurred in module \"%s\" due to %s",
105 		    type, (void *)rp, (void *)addr, mmu_fsr,
106 		    mod_containing_pc((caddr_t)rp->r_pc),
107 		    addr < (caddr_t)PAGESIZE ?
108 		    "a NULL pointer dereference" :
109 		    "an illegal access to a user address");
110 	} else {
111 		panic("BAD TRAP: type=%x rp=%p addr=%p mmu_fsr=%x",
112 		    type, (void *)rp, (void *)addr, mmu_fsr);
113 	}
114 
115 	return (0);	/* avoid optimization of restore in call's delay slot */
116 }
117 
118 #if defined(SF_ERRATA_23) || defined(SF_ERRATA_30) /* call ... illegal-insn */
119 int	ill_calls;
120 #endif
121 
122 /*
123  * Currently, the only PREFETCH/PREFETCHA instructions which cause traps
124  * are the "strong" prefetches (fcn=20-23).  But we check for all flavors of
125  * PREFETCH, in case some future variant also causes a DATA_MMU_MISS.
126  */
127 #define	IS_PREFETCH(i)	(((i) & 0xc1780000) == 0xc1680000)
128 
129 #define	IS_FLUSH(i)	(((i) & 0xc1f80000) == 0x81d80000)
130 #define	IS_SWAP(i)	(((i) & 0xc1f80000) == 0xc0780000)
131 #define	IS_LDSTUB(i)	(((i) & 0xc1f80000) == 0xc0680000)
132 #define	IS_FLOAT(i)	(((i) & 0x1000000) != 0)
133 #define	IS_STORE(i)	(((i) >> 21) & 1)
134 
135 /*
136  * Called from the trap handler when a processor trap occurs.
137  */
138 /*VARARGS2*/
139 void
140 trap(struct regs *rp, caddr_t addr, uint32_t type, uint32_t mmu_fsr)
141 {
142 	proc_t *p = ttoproc(curthread);
143 	klwp_id_t lwp = ttolwp(curthread);
144 	struct machpcb *mpcb = NULL;
145 	k_siginfo_t siginfo;
146 	uint_t op3, fault = 0;
147 	int stepped = 0;
148 	greg_t oldpc;
149 	int mstate;
150 	char *badaddr;
151 	faultcode_t res;
152 	enum fault_type fault_type;
153 	enum seg_rw rw;
154 	uintptr_t lofault;
155 	int instr;
156 	int iskernel;
157 	int watchcode;
158 	int watchpage;
159 	extern faultcode_t pagefault(caddr_t, enum fault_type,
160 		enum seg_rw, int);
161 
162 	CPU_STATS_ADDQ(CPU, sys, trap, 1);
163 
164 #ifdef SF_ERRATA_23 /* call causes illegal-insn */
165 	ASSERT((curthread->t_schedflag & TS_DONT_SWAP) ||
166 	    (type == T_UNIMP_INSTR));
167 #else
168 	ASSERT(curthread->t_schedflag & TS_DONT_SWAP);
169 #endif /* SF_ERRATA_23 */
170 
171 	if (USERMODE(rp->r_tstate) || (type & T_USER)) {
172 		/*
173 		 * Set lwp_state before trying to acquire any
174 		 * adaptive lock
175 		 */
176 		ASSERT(lwp != NULL);
177 		lwp->lwp_state = LWP_SYS;
178 		/*
179 		 * Set up the current cred to use during this trap. u_cred
180 		 * no longer exists.  t_cred is used instead.
181 		 * The current process credential applies to the thread for
182 		 * the entire trap.  If trapping from the kernel, this
183 		 * should already be set up.
184 		 */
185 		if (curthread->t_cred != p->p_cred) {
186 			cred_t *oldcred = curthread->t_cred;
187 			/*
188 			 * DTrace accesses t_cred in probe context.  t_cred
189 			 * must always be either NULL, or point to a valid,
190 			 * allocated cred structure.
191 			 */
192 			curthread->t_cred = crgetcred();
193 			crfree(oldcred);
194 		}
195 		type |= T_USER;
196 		ASSERT((type == (T_SYS_RTT_PAGE | T_USER)) ||
197 			(type == (T_SYS_RTT_ALIGN | T_USER)) ||
198 			lwp->lwp_regs == rp);
199 		mpcb = lwptompcb(lwp);
200 		switch (type) {
201 		case T_WIN_OVERFLOW + T_USER:
202 		case T_WIN_UNDERFLOW + T_USER:
203 		case T_SYS_RTT_PAGE + T_USER:
204 		case T_DATA_MMU_MISS + T_USER:
205 			mstate = LMS_DFAULT;
206 			break;
207 		case T_INSTR_MMU_MISS + T_USER:
208 			mstate = LMS_TFAULT;
209 			break;
210 		default:
211 			mstate = LMS_TRAP;
212 			break;
213 		}
214 		/* Kernel probe */
215 		TNF_PROBE_1(thread_state, "thread", /* CSTYLED */,
216 		    tnf_microstate, state, (char)mstate);
217 		mstate = new_mstate(curthread, mstate);
218 		siginfo.si_signo = 0;
219 		stepped =
220 		    lwp->lwp_pcb.pcb_step != STEP_NONE &&
221 		    ((oldpc = rp->r_pc), prundostep()) &&
222 		    mmu_btop((uintptr_t)addr) == mmu_btop((uintptr_t)oldpc);
223 		/* this assignment must not precede call to prundostep() */
224 		oldpc = rp->r_pc;
225 	}
226 
227 	TRACE_1(TR_FAC_TRAP, TR_C_TRAP_HANDLER_ENTER,
228 		"C_trap_handler_enter:type %x", type);
229 
230 #ifdef	F_DEFERRED
231 	/*
232 	 * Take any pending floating point exceptions now.
233 	 * If the floating point unit has an exception to handle,
234 	 * just return to user-level to let the signal handler run.
235 	 * The instruction that got us to trap() will be reexecuted on
236 	 * return from the signal handler and we will trap to here again.
237 	 * This is necessary to disambiguate simultaneous traps which
238 	 * happen when a floating-point exception is pending and a
239 	 * machine fault is incurred.
240 	 */
241 	if (type & USER) {
242 		/*
243 		 * FP_TRAPPED is set only by sendsig() when it copies
244 		 * out the floating-point queue for the signal handler.
245 		 * It is set there so we can test it here and in syscall().
246 		 */
247 		mpcb->mpcb_flags &= ~FP_TRAPPED;
248 		syncfpu();
249 		if (mpcb->mpcb_flags & FP_TRAPPED) {
250 			/*
251 			 * trap() has have been called recursively and may
252 			 * have stopped the process, so do single step
253 			 * support for /proc.
254 			 */
255 			mpcb->mpcb_flags &= ~FP_TRAPPED;
256 			goto out;
257 		}
258 	}
259 #endif
260 	switch (type) {
261 		case T_DATA_MMU_MISS:
262 		case T_INSTR_MMU_MISS + T_USER:
263 		case T_DATA_MMU_MISS + T_USER:
264 		case T_DATA_PROT + T_USER:
265 		case T_AST + T_USER:
266 		case T_SYS_RTT_PAGE + T_USER:
267 		case T_FLUSH_PCB + T_USER:
268 		case T_FLUSHW + T_USER:
269 			break;
270 
271 		default:
272 			FTRACE_3("trap(): type=0x%lx, regs=0x%lx, addr=0x%lx",
273 			    (ulong_t)type, (ulong_t)rp, (ulong_t)addr);
274 			break;
275 	}
276 
277 	switch (type) {
278 
279 	default:
280 		/*
281 		 * Check for user software trap.
282 		 */
283 		if (type & T_USER) {
284 			if (tudebug)
285 				showregs(type, rp, (caddr_t)0, 0);
286 			if ((type & ~T_USER) >= T_SOFTWARE_TRAP) {
287 				bzero(&siginfo, sizeof (siginfo));
288 				siginfo.si_signo = SIGILL;
289 				siginfo.si_code  = ILL_ILLTRP;
290 				siginfo.si_addr  = (caddr_t)rp->r_pc;
291 				siginfo.si_trapno = type &~ T_USER;
292 				fault = FLTILL;
293 				break;
294 			}
295 		}
296 		addr = (caddr_t)rp->r_pc;
297 		(void) die(type, rp, addr, 0);
298 		/*NOTREACHED*/
299 
300 	case T_ALIGNMENT:	/* supv alignment error */
301 		if (nfload(rp, NULL))
302 			goto cleanup;
303 
304 		if (curthread->t_lofault) {
305 			if (lodebug) {
306 				showregs(type, rp, addr, 0);
307 				traceback((caddr_t)rp->r_sp);
308 			}
309 			rp->r_g1 = EFAULT;
310 			rp->r_pc = curthread->t_lofault;
311 			rp->r_npc = rp->r_pc + 4;
312 			goto cleanup;
313 		}
314 		(void) die(type, rp, addr, 0);
315 		/*NOTREACHED*/
316 
317 	case T_INSTR_EXCEPTION:		/* sys instruction access exception */
318 		addr = (caddr_t)rp->r_pc;
319 		(void) die(type, rp, addr, mmu_fsr);
320 		/*NOTREACHED*/
321 
322 	case T_INSTR_MMU_MISS:		/* sys instruction mmu miss */
323 		addr = (caddr_t)rp->r_pc;
324 		(void) die(type, rp, addr, 0);
325 		/*NOTREACHED*/
326 
327 	case T_DATA_EXCEPTION:		/* system data access exception */
328 		switch (X_FAULT_TYPE(mmu_fsr)) {
329 		case FT_RANGE:
330 			/*
331 			 * This happens when we attempt to dereference an
332 			 * address in the address hole.  If t_ontrap is set,
333 			 * then break and fall through to T_DATA_MMU_MISS /
334 			 * T_DATA_PROT case below.  If lofault is set, then
335 			 * honour it (perhaps the user gave us a bogus
336 			 * address in the hole to copyin from or copyout to?)
337 			 */
338 
339 			if (curthread->t_ontrap != NULL)
340 				break;
341 
342 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
343 			if (curthread->t_lofault) {
344 				if (lodebug) {
345 					showregs(type, rp, addr, 0);
346 					traceback((caddr_t)rp->r_sp);
347 				}
348 				rp->r_g1 = EFAULT;
349 				rp->r_pc = curthread->t_lofault;
350 				rp->r_npc = rp->r_pc + 4;
351 				goto cleanup;
352 			}
353 			(void) die(type, rp, addr, mmu_fsr);
354 			/*NOTREACHED*/
355 
356 		case FT_PRIV:
357 			/*
358 			 * This can happen if we access ASI_USER from a kernel
359 			 * thread.  To support pxfs, we need to honor lofault if
360 			 * we're doing a copyin/copyout from a kernel thread.
361 			 */
362 
363 			if (nfload(rp, NULL))
364 				goto cleanup;
365 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
366 			if (curthread->t_lofault) {
367 				if (lodebug) {
368 					showregs(type, rp, addr, 0);
369 					traceback((caddr_t)rp->r_sp);
370 				}
371 				rp->r_g1 = EFAULT;
372 				rp->r_pc = curthread->t_lofault;
373 				rp->r_npc = rp->r_pc + 4;
374 				goto cleanup;
375 			}
376 			(void) die(type, rp, addr, mmu_fsr);
377 			/*NOTREACHED*/
378 
379 		default:
380 			if (nfload(rp, NULL))
381 				goto cleanup;
382 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
383 			(void) die(type, rp, addr, mmu_fsr);
384 			/*NOTREACHED*/
385 
386 		case FT_NFO:
387 			break;
388 		}
389 		/* fall into ... */
390 
391 	case T_DATA_MMU_MISS:		/* system data mmu miss */
392 	case T_DATA_PROT:		/* system data protection fault */
393 		if (nfload(rp, &instr))
394 			goto cleanup;
395 
396 		/*
397 		 * If we're under on_trap() protection (see <sys/ontrap.h>),
398 		 * set ot_trap and return from the trap to the trampoline.
399 		 */
400 		if (curthread->t_ontrap != NULL) {
401 			on_trap_data_t *otp = curthread->t_ontrap;
402 
403 			TRACE_0(TR_FAC_TRAP, TR_C_TRAP_HANDLER_EXIT,
404 				"C_trap_handler_exit");
405 			TRACE_0(TR_FAC_TRAP, TR_TRAP_END, "trap_end");
406 
407 			if (otp->ot_prot & OT_DATA_ACCESS) {
408 				otp->ot_trap |= OT_DATA_ACCESS;
409 				rp->r_pc = otp->ot_trampoline;
410 				rp->r_npc = rp->r_pc + 4;
411 				goto cleanup;
412 			}
413 		}
414 		lofault = curthread->t_lofault;
415 		curthread->t_lofault = 0;
416 
417 		mstate = new_mstate(curthread, LMS_KFAULT);
418 
419 		switch (type) {
420 		case T_DATA_PROT:
421 			fault_type = F_PROT;
422 			rw = S_WRITE;
423 			break;
424 		case T_INSTR_MMU_MISS:
425 			fault_type = F_INVAL;
426 			rw = S_EXEC;
427 			break;
428 		case T_DATA_MMU_MISS:
429 		case T_DATA_EXCEPTION:
430 			/*
431 			 * The hardware doesn't update the sfsr on mmu
432 			 * misses so it is not easy to find out whether
433 			 * the access was a read or a write so we need
434 			 * to decode the actual instruction.
435 			 */
436 			fault_type = F_INVAL;
437 			rw = get_accesstype(rp);
438 			break;
439 		default:
440 			cmn_err(CE_PANIC, "trap: unknown type %x", type);
441 			break;
442 		}
443 		/*
444 		 * We determine if access was done to kernel or user
445 		 * address space.  The addr passed into trap is really the
446 		 * tag access register.
447 		 */
448 		iskernel = (((uintptr_t)addr & TAGACC_CTX_MASK) == KCONTEXT);
449 		addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
450 
451 		res = pagefault(addr, fault_type, rw, iskernel);
452 		if (!iskernel && res == FC_NOMAP &&
453 		    addr < p->p_usrstack && grow(addr))
454 			res = 0;
455 
456 		(void) new_mstate(curthread, mstate);
457 
458 		/*
459 		 * Restore lofault.  If we resolved the fault, exit.
460 		 * If we didn't and lofault wasn't set, die.
461 		 */
462 		curthread->t_lofault = lofault;
463 
464 		if (res == 0)
465 			goto cleanup;
466 
467 		if (IS_PREFETCH(instr)) {
468 			/* skip prefetch instructions in kernel-land */
469 			rp->r_pc = rp->r_npc;
470 			rp->r_npc += 4;
471 			goto cleanup;
472 		}
473 
474 		if ((lofault == 0 || lodebug) &&
475 		    (calc_memaddr(rp, &badaddr) == SIMU_SUCCESS))
476 			addr = badaddr;
477 		if (lofault == 0)
478 			(void) die(type, rp, addr, 0);
479 		/*
480 		 * Cannot resolve fault.  Return to lofault.
481 		 */
482 		if (lodebug) {
483 			showregs(type, rp, addr, 0);
484 			traceback((caddr_t)rp->r_sp);
485 		}
486 		if (FC_CODE(res) == FC_OBJERR)
487 			res = FC_ERRNO(res);
488 		else
489 			res = EFAULT;
490 		rp->r_g1 = res;
491 		rp->r_pc = curthread->t_lofault;
492 		rp->r_npc = curthread->t_lofault + 4;
493 		goto cleanup;
494 
495 	case T_INSTR_EXCEPTION + T_USER: /* user insn access exception */
496 		bzero(&siginfo, sizeof (siginfo));
497 		siginfo.si_addr = (caddr_t)rp->r_pc;
498 		siginfo.si_signo = SIGSEGV;
499 		siginfo.si_code = X_FAULT_TYPE(mmu_fsr) == FT_PRIV ?
500 		    SEGV_ACCERR : SEGV_MAPERR;
501 		fault = FLTBOUNDS;
502 		break;
503 
504 	case T_WIN_OVERFLOW + T_USER:	/* window overflow in ??? */
505 	case T_WIN_UNDERFLOW + T_USER:	/* window underflow in ??? */
506 	case T_SYS_RTT_PAGE + T_USER:	/* window underflow in user_rtt */
507 	case T_INSTR_MMU_MISS + T_USER:	/* user instruction mmu miss */
508 	case T_DATA_MMU_MISS + T_USER:	/* user data mmu miss */
509 	case T_DATA_PROT + T_USER:	/* user data protection fault */
510 		switch (type) {
511 		case T_INSTR_MMU_MISS + T_USER:
512 			addr = (caddr_t)rp->r_pc;
513 			fault_type = F_INVAL;
514 			rw = S_EXEC;
515 			break;
516 
517 		case T_DATA_MMU_MISS + T_USER:
518 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
519 			fault_type = F_INVAL;
520 			/*
521 			 * The hardware doesn't update the sfsr on mmu misses
522 			 * so it is not easy to find out whether the access
523 			 * was a read or a write so we need to decode the
524 			 * actual instruction.  XXX BUGLY HW
525 			 */
526 			rw = get_accesstype(rp);
527 			break;
528 
529 		case T_DATA_PROT + T_USER:
530 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
531 			fault_type = F_PROT;
532 			rw = S_WRITE;
533 			break;
534 
535 		case T_WIN_OVERFLOW + T_USER:
536 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
537 			fault_type = F_INVAL;
538 			rw = S_WRITE;
539 			break;
540 
541 		case T_WIN_UNDERFLOW + T_USER:
542 		case T_SYS_RTT_PAGE + T_USER:
543 			addr = (caddr_t)((uintptr_t)addr & TAGACC_VADDR_MASK);
544 			fault_type = F_INVAL;
545 			rw = S_READ;
546 			break;
547 
548 		default:
549 			cmn_err(CE_PANIC, "trap: unknown type %x", type);
550 			break;
551 		}
552 
553 		/*
554 		 * If we are single stepping do not call pagefault
555 		 */
556 		if (stepped) {
557 			res = FC_NOMAP;
558 		} else {
559 			caddr_t vaddr = addr;
560 			size_t sz;
561 			int ta;
562 
563 			ASSERT(!(curthread->t_flag & T_WATCHPT));
564 			watchpage = (pr_watch_active(p) &&
565 				type != T_WIN_OVERFLOW + T_USER &&
566 				type != T_WIN_UNDERFLOW + T_USER &&
567 				type != T_SYS_RTT_PAGE + T_USER &&
568 				pr_is_watchpage(addr, rw));
569 
570 			if (!watchpage ||
571 			    (sz = instr_size(rp, &vaddr, rw)) <= 0)
572 				/* EMPTY */;
573 			else if ((watchcode = pr_is_watchpoint(&vaddr, &ta,
574 			    sz, NULL, rw)) != 0) {
575 				if (ta) {
576 					do_watch_step(vaddr, sz, rw,
577 						watchcode, rp->r_pc);
578 					fault_type = F_INVAL;
579 				} else {
580 					bzero(&siginfo,	sizeof (siginfo));
581 					siginfo.si_signo = SIGTRAP;
582 					siginfo.si_code = watchcode;
583 					siginfo.si_addr = vaddr;
584 					siginfo.si_trapafter = 0;
585 					siginfo.si_pc = (caddr_t)rp->r_pc;
586 					fault = FLTWATCH;
587 					break;
588 				}
589 			} else {
590 				if (rw != S_EXEC &&
591 				    pr_watch_emul(rp, vaddr, rw))
592 					goto out;
593 				do_watch_step(vaddr, sz, rw, 0, 0);
594 				fault_type = F_INVAL;
595 			}
596 
597 			if (pr_watch_active(p) &&
598 			    (type == T_WIN_OVERFLOW + T_USER ||
599 			    type == T_WIN_UNDERFLOW + T_USER ||
600 			    type == T_SYS_RTT_PAGE + T_USER)) {
601 				int dotwo = (type == T_WIN_UNDERFLOW + T_USER);
602 				if (copy_return_window(dotwo))
603 					goto out;
604 				fault_type = F_INVAL;
605 			}
606 
607 			res = pagefault(addr, fault_type, rw, 0);
608 
609 			/*
610 			 * If pagefault succeed, ok.
611 			 * Otherwise grow the stack automatically.
612 			 */
613 			if (res == 0 ||
614 			    (res == FC_NOMAP &&
615 			    type != T_INSTR_MMU_MISS + T_USER &&
616 			    addr < p->p_usrstack &&
617 			    grow(addr))) {
618 				int ismem = prismember(&p->p_fltmask, FLTPAGE);
619 
620 				/*
621 				 * instr_size() is used to get the exact
622 				 * address of the fault, instead of the
623 				 * page of the fault. Unfortunately it is
624 				 * very slow, and this is an important
625 				 * code path. Don't call it unless
626 				 * correctness is needed. ie. if FLTPAGE
627 				 * is set, or we're profiling.
628 				 */
629 
630 				if (curthread->t_rprof != NULL || ismem)
631 					(void) instr_size(rp, &addr, rw);
632 
633 				lwp->lwp_lastfault = FLTPAGE;
634 				lwp->lwp_lastfaddr = addr;
635 
636 				if (ismem) {
637 					bzero(&siginfo, sizeof (siginfo));
638 					siginfo.si_addr = addr;
639 					(void) stop_on_fault(FLTPAGE, &siginfo);
640 				}
641 				goto out;
642 			}
643 
644 			if (type != (T_INSTR_MMU_MISS + T_USER)) {
645 				/*
646 				 * check for non-faulting loads, also
647 				 * fetch the instruction to check for
648 				 * flush
649 				 */
650 				if (nfload(rp, &instr))
651 					goto out;
652 
653 				/* skip userland prefetch instructions */
654 				if (IS_PREFETCH(instr)) {
655 					rp->r_pc = rp->r_npc;
656 					rp->r_npc += 4;
657 					goto out;
658 					/*NOTREACHED*/
659 				}
660 
661 				/*
662 				 * check if the instruction was a
663 				 * flush.  ABI allows users to specify
664 				 * an illegal address on the flush
665 				 * instruction so we simply return in
666 				 * this case.
667 				 *
668 				 * NB: the hardware should set a bit
669 				 * indicating this trap was caused by
670 				 * a flush instruction.  Instruction
671 				 * decoding is bugly!
672 				 */
673 				if (IS_FLUSH(instr)) {
674 					/* skip the flush instruction */
675 					rp->r_pc = rp->r_npc;
676 					rp->r_npc += 4;
677 					goto out;
678 					/*NOTREACHED*/
679 				}
680 			} else if (res == FC_PROT) {
681 				report_stack_exec(p, addr);
682 			}
683 
684 			if (tudebug)
685 				showregs(type, rp, addr, 0);
686 		}
687 
688 		/*
689 		 * In the case where both pagefault and grow fail,
690 		 * set the code to the value provided by pagefault.
691 		 */
692 		(void) instr_size(rp, &addr, rw);
693 		bzero(&siginfo, sizeof (siginfo));
694 		siginfo.si_addr = addr;
695 		if (FC_CODE(res) == FC_OBJERR) {
696 			siginfo.si_errno = FC_ERRNO(res);
697 			if (siginfo.si_errno != EINTR) {
698 				siginfo.si_signo = SIGBUS;
699 				siginfo.si_code = BUS_OBJERR;
700 				fault = FLTACCESS;
701 			}
702 		} else { /* FC_NOMAP || FC_PROT */
703 			siginfo.si_signo = SIGSEGV;
704 			siginfo.si_code = (res == FC_NOMAP) ?
705 				SEGV_MAPERR : SEGV_ACCERR;
706 			fault = FLTBOUNDS;
707 		}
708 		/*
709 		 * If this is the culmination of a single-step,
710 		 * reset the addr, code, signal and fault to
711 		 * indicate a hardware trace trap.
712 		 */
713 		if (stepped) {
714 			pcb_t *pcb = &lwp->lwp_pcb;
715 
716 			siginfo.si_signo = 0;
717 			fault = 0;
718 			if (pcb->pcb_step == STEP_WASACTIVE) {
719 				pcb->pcb_step = STEP_NONE;
720 				pcb->pcb_tracepc = NULL;
721 				oldpc = rp->r_pc - 4;
722 			}
723 			/*
724 			 * If both NORMAL_STEP and WATCH_STEP are in
725 			 * effect, give precedence to WATCH_STEP.
726 			 * One or the other must be set at this point.
727 			 */
728 			ASSERT(pcb->pcb_flags & (NORMAL_STEP|WATCH_STEP));
729 			if ((fault = undo_watch_step(&siginfo)) == 0 &&
730 			    (pcb->pcb_flags & NORMAL_STEP)) {
731 				siginfo.si_signo = SIGTRAP;
732 				siginfo.si_code = TRAP_TRACE;
733 				siginfo.si_addr = (caddr_t)rp->r_pc;
734 				fault = FLTTRACE;
735 			}
736 			pcb->pcb_flags &= ~(NORMAL_STEP|WATCH_STEP);
737 		}
738 		break;
739 
740 	case T_DATA_EXCEPTION + T_USER:	/* user data access exception */
741 
742 		if (&vis1_partial_support != NULL) {
743 			bzero(&siginfo, sizeof (siginfo));
744 			if (vis1_partial_support(rp,
745 			    &siginfo, &fault) == 0)
746 				goto out;
747 		}
748 
749 		if (nfload(rp, &instr))
750 			goto out;
751 		if (IS_FLUSH(instr)) {
752 			/* skip the flush instruction */
753 			rp->r_pc = rp->r_npc;
754 			rp->r_npc += 4;
755 			goto out;
756 			/*NOTREACHED*/
757 		}
758 		bzero(&siginfo, sizeof (siginfo));
759 		siginfo.si_addr = addr;
760 		switch (X_FAULT_TYPE(mmu_fsr)) {
761 		case FT_ATOMIC_NC:
762 			if ((IS_SWAP(instr) && swap_nc(rp, instr)) ||
763 			    (IS_LDSTUB(instr) && ldstub_nc(rp, instr))) {
764 				/* skip the atomic */
765 				rp->r_pc = rp->r_npc;
766 				rp->r_npc += 4;
767 				goto out;
768 			}
769 			/* fall into ... */
770 		case FT_PRIV:
771 			siginfo.si_signo = SIGSEGV;
772 			siginfo.si_code = SEGV_ACCERR;
773 			fault = FLTBOUNDS;
774 			break;
775 		case FT_SPEC_LD:
776 		case FT_ILL_ALT:
777 			siginfo.si_signo = SIGILL;
778 			siginfo.si_code = ILL_ILLADR;
779 			fault = FLTILL;
780 			break;
781 		default:
782 			siginfo.si_signo = SIGSEGV;
783 			siginfo.si_code = SEGV_MAPERR;
784 			fault = FLTBOUNDS;
785 			break;
786 		}
787 		break;
788 
789 	case T_SYS_RTT_ALIGN + T_USER:	/* user alignment error */
790 	case T_ALIGNMENT + T_USER:	/* user alignment error */
791 		if (tudebug)
792 			showregs(type, rp, addr, 0);
793 		/*
794 		 * If the user has to do unaligned references
795 		 * the ugly stuff gets done here.
796 		 */
797 		alignfaults++;
798 		if (&vis1_partial_support != NULL) {
799 			bzero(&siginfo, sizeof (siginfo));
800 			if (vis1_partial_support(rp,
801 			    &siginfo, &fault) == 0)
802 				goto out;
803 		}
804 
805 		bzero(&siginfo, sizeof (siginfo));
806 		if (type == T_SYS_RTT_ALIGN + T_USER) {
807 			if (nfload(rp, NULL))
808 				goto out;
809 			/*
810 			 * Can't do unaligned stack access
811 			 */
812 			siginfo.si_signo = SIGBUS;
813 			siginfo.si_code = BUS_ADRALN;
814 			siginfo.si_addr = addr;
815 			fault = FLTACCESS;
816 			break;
817 		}
818 
819 		/*
820 		 * Try to fix alignment before non-faulting load test.
821 		 */
822 		if (p->p_fixalignment) {
823 			if (do_unaligned(rp, &badaddr) == SIMU_SUCCESS) {
824 				rp->r_pc = rp->r_npc;
825 				rp->r_npc += 4;
826 				goto out;
827 			}
828 			if (nfload(rp, NULL))
829 				goto out;
830 			siginfo.si_signo = SIGSEGV;
831 			siginfo.si_code = SEGV_MAPERR;
832 			siginfo.si_addr = badaddr;
833 			fault = FLTBOUNDS;
834 		} else {
835 			if (nfload(rp, NULL))
836 				goto out;
837 			siginfo.si_signo = SIGBUS;
838 			siginfo.si_code = BUS_ADRALN;
839 			if (rp->r_pc & 3) {	/* offending address, if pc */
840 				siginfo.si_addr = (caddr_t)rp->r_pc;
841 			} else {
842 				if (calc_memaddr(rp, &badaddr) == SIMU_UNALIGN)
843 					siginfo.si_addr = badaddr;
844 				else
845 					siginfo.si_addr = (caddr_t)rp->r_pc;
846 			}
847 			fault = FLTACCESS;
848 		}
849 		break;
850 
851 	case T_PRIV_INSTR + T_USER:	/* privileged instruction fault */
852 		if (tudebug)
853 			showregs(type, rp, (caddr_t)0, 0);
854 		bzero(&siginfo, sizeof (siginfo));
855 		siginfo.si_signo = SIGILL;
856 		siginfo.si_code = ILL_PRVOPC;
857 		siginfo.si_addr = (caddr_t)rp->r_pc;
858 		fault = FLTILL;
859 		break;
860 
861 	case T_UNIMP_INSTR:		/* priv illegal instruction fault */
862 		if (fpras_implemented) {
863 			/*
864 			 * Call fpras_chktrap indicating that
865 			 * we've come from a trap handler and pass
866 			 * the regs.  That function may choose to panic
867 			 * (in which case it won't return) or it may
868 			 * determine that a reboot is desired.  In the
869 			 * latter case it must alter pc/npc to skip
870 			 * the illegal instruction and continue at
871 			 * a controlled address.
872 			 */
873 			if (&fpras_chktrap) {
874 			    if (fpras_chktrap(rp))
875 				goto cleanup;
876 			}
877 		}
878 #if defined(SF_ERRATA_23) || defined(SF_ERRATA_30) /* call ... illegal-insn */
879 		instr = *(int *)rp->r_pc;
880 		if ((instr & 0xc0000000) == 0x40000000) {
881 			long pc;
882 
883 			rp->r_o7 = (long long)rp->r_pc;
884 			pc = rp->r_pc + ((instr & 0x3fffffff) << 2);
885 			rp->r_pc = rp->r_npc;
886 			rp->r_npc = pc;
887 			ill_calls++;
888 			goto cleanup;
889 		}
890 #endif /* SF_ERRATA_23 || SF_ERRATA_30 */
891 		/*
892 		 * It's not an fpras failure and it's not SF_ERRATA_23 - die
893 		 */
894 		addr = (caddr_t)rp->r_pc;
895 		(void) die(type, rp, addr, 0);
896 		/*NOTREACHED*/
897 
898 	case T_UNIMP_INSTR + T_USER:	/* illegal instruction fault */
899 #if defined(SF_ERRATA_23) || defined(SF_ERRATA_30) /* call ... illegal-insn */
900 		instr = fetch_user_instr((caddr_t)rp->r_pc);
901 		if ((instr & 0xc0000000) == 0x40000000) {
902 			long pc;
903 
904 			rp->r_o7 = (long long)rp->r_pc;
905 			pc = rp->r_pc + ((instr & 0x3fffffff) << 2);
906 			rp->r_pc = rp->r_npc;
907 			rp->r_npc = pc;
908 			ill_calls++;
909 			goto out;
910 		}
911 #endif /* SF_ERRATA_23 || SF_ERRATA_30 */
912 		if (tudebug)
913 			showregs(type, rp, (caddr_t)0, 0);
914 		bzero(&siginfo, sizeof (siginfo));
915 		/*
916 		 * Try to simulate the instruction.
917 		 */
918 		switch (simulate_unimp(rp, &badaddr)) {
919 		case SIMU_RETRY:
920 			goto out;	/* regs are already set up */
921 			/*NOTREACHED*/
922 
923 		case SIMU_SUCCESS:
924 			/* skip the successfully simulated instruction */
925 			rp->r_pc = rp->r_npc;
926 			rp->r_npc += 4;
927 			goto out;
928 			/*NOTREACHED*/
929 
930 		case SIMU_FAULT:
931 			siginfo.si_signo = SIGSEGV;
932 			siginfo.si_code = SEGV_MAPERR;
933 			siginfo.si_addr = badaddr;
934 			fault = FLTBOUNDS;
935 			break;
936 
937 		case SIMU_DZERO:
938 			siginfo.si_signo = SIGFPE;
939 			siginfo.si_code = FPE_INTDIV;
940 			siginfo.si_addr = (caddr_t)rp->r_pc;
941 			fault = FLTIZDIV;
942 			break;
943 
944 		case SIMU_UNALIGN:
945 			siginfo.si_signo = SIGBUS;
946 			siginfo.si_code = BUS_ADRALN;
947 			siginfo.si_addr = badaddr;
948 			fault = FLTACCESS;
949 			break;
950 
951 		case SIMU_ILLEGAL:
952 		default:
953 			siginfo.si_signo = SIGILL;
954 			op3 = (instr >> 19) & 0x3F;
955 			if ((IS_FLOAT(instr) && (op3 == IOP_V8_STQFA) ||
956 			    (op3 == IOP_V8_STDFA)))
957 				siginfo.si_code = ILL_ILLADR;
958 			else
959 				siginfo.si_code = ILL_ILLOPC;
960 			siginfo.si_addr = (caddr_t)rp->r_pc;
961 			fault = FLTILL;
962 			break;
963 		}
964 		break;
965 
966 	case T_UNIMP_LDD + T_USER:
967 	case T_UNIMP_STD + T_USER:
968 		if (tudebug)
969 			showregs(type, rp, (caddr_t)0, 0);
970 		switch (simulate_lddstd(rp, &badaddr)) {
971 		case SIMU_SUCCESS:
972 			/* skip the successfully simulated instruction */
973 			rp->r_pc = rp->r_npc;
974 			rp->r_npc += 4;
975 			goto out;
976 			/*NOTREACHED*/
977 
978 		case SIMU_FAULT:
979 			if (nfload(rp, NULL))
980 				goto out;
981 			siginfo.si_signo = SIGSEGV;
982 			siginfo.si_code = SEGV_MAPERR;
983 			siginfo.si_addr = badaddr;
984 			fault = FLTBOUNDS;
985 			break;
986 
987 		case SIMU_UNALIGN:
988 			if (nfload(rp, NULL))
989 				goto out;
990 			siginfo.si_signo = SIGBUS;
991 			siginfo.si_code = BUS_ADRALN;
992 			siginfo.si_addr = badaddr;
993 			fault = FLTACCESS;
994 			break;
995 
996 		case SIMU_ILLEGAL:
997 		default:
998 			siginfo.si_signo = SIGILL;
999 			siginfo.si_code = ILL_ILLOPC;
1000 			siginfo.si_addr = (caddr_t)rp->r_pc;
1001 			fault = FLTILL;
1002 			break;
1003 		}
1004 		break;
1005 
1006 	case T_UNIMP_LDD:
1007 	case T_UNIMP_STD:
1008 		if (simulate_lddstd(rp, &badaddr) == SIMU_SUCCESS) {
1009 			/* skip the successfully simulated instruction */
1010 			rp->r_pc = rp->r_npc;
1011 			rp->r_npc += 4;
1012 			goto cleanup;
1013 			/*NOTREACHED*/
1014 		}
1015 		/*
1016 		 * A third party driver executed an {LDD,STD,LDDA,STDA}
1017 		 * that we couldn't simulate.
1018 		 */
1019 		if (nfload(rp, NULL))
1020 			goto cleanup;
1021 
1022 		if (curthread->t_lofault) {
1023 			if (lodebug) {
1024 				showregs(type, rp, addr, 0);
1025 				traceback((caddr_t)rp->r_sp);
1026 			}
1027 			rp->r_g1 = EFAULT;
1028 			rp->r_pc = curthread->t_lofault;
1029 			rp->r_npc = rp->r_pc + 4;
1030 			goto cleanup;
1031 		}
1032 		(void) die(type, rp, addr, 0);
1033 		/*NOTREACHED*/
1034 
1035 	case T_IDIV0 + T_USER:		/* integer divide by zero */
1036 	case T_DIV0 + T_USER:		/* integer divide by zero */
1037 		if (tudebug && tudebugfpe)
1038 			showregs(type, rp, (caddr_t)0, 0);
1039 		bzero(&siginfo, sizeof (siginfo));
1040 		siginfo.si_signo = SIGFPE;
1041 		siginfo.si_code = FPE_INTDIV;
1042 		siginfo.si_addr = (caddr_t)rp->r_pc;
1043 		fault = FLTIZDIV;
1044 		break;
1045 
1046 	case T_INT_OVERFLOW + T_USER:	/* integer overflow */
1047 		if (tudebug && tudebugfpe)
1048 			showregs(type, rp, (caddr_t)0, 0);
1049 		bzero(&siginfo, sizeof (siginfo));
1050 		siginfo.si_signo = SIGFPE;
1051 		siginfo.si_code  = FPE_INTOVF;
1052 		siginfo.si_addr  = (caddr_t)rp->r_pc;
1053 		fault = FLTIOVF;
1054 		break;
1055 
1056 	case T_BREAKPOINT + T_USER:	/* breakpoint trap (t 1) */
1057 		if (tudebug && tudebugbpt)
1058 			showregs(type, rp, (caddr_t)0, 0);
1059 		bzero(&siginfo, sizeof (siginfo));
1060 		siginfo.si_signo = SIGTRAP;
1061 		siginfo.si_code = TRAP_BRKPT;
1062 		siginfo.si_addr = (caddr_t)rp->r_pc;
1063 		fault = FLTBPT;
1064 		break;
1065 
1066 	case T_TAG_OVERFLOW + T_USER:	/* tag overflow (taddcctv, tsubcctv) */
1067 		if (tudebug)
1068 			showregs(type, rp, (caddr_t)0, 0);
1069 		bzero(&siginfo, sizeof (siginfo));
1070 		siginfo.si_signo = SIGEMT;
1071 		siginfo.si_code = EMT_TAGOVF;
1072 		siginfo.si_addr = (caddr_t)rp->r_pc;
1073 		fault = FLTACCESS;
1074 		break;
1075 
1076 	case T_FLUSH_PCB + T_USER:	/* finish user window overflow */
1077 	case T_FLUSHW + T_USER:		/* finish user window flush */
1078 		/*
1079 		 * This trap is entered from sys_rtt in locore.s when,
1080 		 * upon return to user is is found that there are user
1081 		 * windows in pcb_wbuf.  This happens because they could
1082 		 * not be saved on the user stack, either because it
1083 		 * wasn't resident or because it was misaligned.
1084 		 */
1085 	    {
1086 		int error;
1087 		caddr_t sp;
1088 
1089 		error = flush_user_windows_to_stack(&sp);
1090 		/*
1091 		 * Possible errors:
1092 		 *	error copying out
1093 		 *	unaligned stack pointer
1094 		 * The first is given to us as the return value
1095 		 * from flush_user_windows_to_stack().  The second
1096 		 * results in residual windows in the pcb.
1097 		 */
1098 		if (error != 0) {
1099 			/*
1100 			 * EINTR comes from a signal during copyout;
1101 			 * we should not post another signal.
1102 			 */
1103 			if (error != EINTR) {
1104 				/*
1105 				 * Zap the process with a SIGSEGV - process
1106 				 * may be managing its own stack growth by
1107 				 * taking SIGSEGVs on a different signal stack.
1108 				 */
1109 				bzero(&siginfo, sizeof (siginfo));
1110 				siginfo.si_signo = SIGSEGV;
1111 				siginfo.si_code  = SEGV_MAPERR;
1112 				siginfo.si_addr  = sp;
1113 				fault = FLTBOUNDS;
1114 			}
1115 			break;
1116 		} else if (mpcb->mpcb_wbcnt) {
1117 			bzero(&siginfo, sizeof (siginfo));
1118 			siginfo.si_signo = SIGILL;
1119 			siginfo.si_code  = ILL_BADSTK;
1120 			siginfo.si_addr  = (caddr_t)rp->r_pc;
1121 			fault = FLTILL;
1122 			break;
1123 		}
1124 	    }
1125 
1126 		/*
1127 		 * T_FLUSHW is used when handling a ta 0x3 -- the old flush
1128 		 * window trap -- which is implemented by executing the
1129 		 * flushw instruction. The flushw can trap if any of the
1130 		 * stack pages are not writable for whatever reason. In this
1131 		 * case only, we advance the pc to the next instruction so
1132 		 * that the user thread doesn't needlessly execute the trap
1133 		 * again. Normally this wouldn't be a problem -- we'll
1134 		 * usually only end up here if this is the first touch to a
1135 		 * stack page -- since the second execution won't trap, but
1136 		 * if there's a watchpoint on the stack page the user thread
1137 		 * would spin, continuously executing the trap instruction.
1138 		 */
1139 		if (type == T_FLUSHW + T_USER) {
1140 			rp->r_pc = rp->r_npc;
1141 			rp->r_npc += 4;
1142 		}
1143 		goto out;
1144 
1145 	case T_AST + T_USER:		/* profiling or resched pseudo trap */
1146 		if (lwp->lwp_pcb.pcb_flags & CPC_OVERFLOW) {
1147 			lwp->lwp_pcb.pcb_flags &= ~CPC_OVERFLOW;
1148 			if (kcpc_overflow_ast()) {
1149 				/*
1150 				 * Signal performance counter overflow
1151 				 */
1152 				if (tudebug)
1153 					showregs(type, rp, (caddr_t)0, 0);
1154 				bzero(&siginfo, sizeof (siginfo));
1155 				siginfo.si_signo = SIGEMT;
1156 				siginfo.si_code = EMT_CPCOVF;
1157 				siginfo.si_addr = (caddr_t)rp->r_pc;
1158 				/* for trap_cleanup(), below */
1159 				oldpc = rp->r_pc - 4;
1160 				fault = FLTCPCOVF;
1161 			}
1162 		}
1163 
1164 		/*
1165 		 * The CPC_OVERFLOW check above may already have populated
1166 		 * siginfo and set fault, so the checks below must not
1167 		 * touch these and the functions they call must use
1168 		 * trapsig() directly.
1169 		 */
1170 
1171 		if (lwp->lwp_pcb.pcb_flags & ASYNC_HWERR) {
1172 			lwp->lwp_pcb.pcb_flags &= ~ASYNC_HWERR;
1173 			trap_async_hwerr();
1174 		}
1175 
1176 		if (lwp->lwp_pcb.pcb_flags & ASYNC_BERR) {
1177 			lwp->lwp_pcb.pcb_flags &= ~ASYNC_BERR;
1178 			trap_async_berr_bto(ASYNC_BERR, rp);
1179 		}
1180 
1181 		if (lwp->lwp_pcb.pcb_flags & ASYNC_BTO) {
1182 			lwp->lwp_pcb.pcb_flags &= ~ASYNC_BTO;
1183 			trap_async_berr_bto(ASYNC_BTO, rp);
1184 		}
1185 
1186 		break;
1187 	}
1188 
1189 	if (fault) {
1190 		/* We took a fault so abort single step. */
1191 		lwp->lwp_pcb.pcb_flags &= ~(NORMAL_STEP|WATCH_STEP);
1192 	}
1193 	trap_cleanup(rp, fault, &siginfo, oldpc == rp->r_pc);
1194 
1195 out:	/* We can't get here from a system trap */
1196 	ASSERT(type & T_USER);
1197 	trap_rtt();
1198 	(void) new_mstate(curthread, mstate);
1199 	/* Kernel probe */
1200 	TNF_PROBE_1(thread_state, "thread", /* CSTYLED */,
1201 		tnf_microstate, state, LMS_USER);
1202 
1203 	TRACE_0(TR_FAC_TRAP, TR_C_TRAP_HANDLER_EXIT, "C_trap_handler_exit");
1204 	return;
1205 
1206 cleanup:	/* system traps end up here */
1207 	ASSERT(!(type & T_USER));
1208 
1209 	TRACE_0(TR_FAC_TRAP, TR_C_TRAP_HANDLER_EXIT, "C_trap_handler_exit");
1210 }
1211 
1212 void
1213 trap_cleanup(
1214 	struct regs *rp,
1215 	uint_t fault,
1216 	k_siginfo_t *sip,
1217 	int restartable)
1218 {
1219 	extern void aio_cleanup();
1220 	proc_t *p = ttoproc(curthread);
1221 	klwp_id_t lwp = ttolwp(curthread);
1222 
1223 	if (fault) {
1224 		/*
1225 		 * Remember the fault and fault address
1226 		 * for real-time (SIGPROF) profiling.
1227 		 */
1228 		lwp->lwp_lastfault = fault;
1229 		lwp->lwp_lastfaddr = sip->si_addr;
1230 
1231 		DTRACE_PROC2(fault, int, fault, ksiginfo_t *, sip);
1232 
1233 		/*
1234 		 * If a debugger has declared this fault to be an
1235 		 * event of interest, stop the lwp.  Otherwise just
1236 		 * deliver the associated signal.
1237 		 */
1238 		if (sip->si_signo != SIGKILL &&
1239 		    prismember(&p->p_fltmask, fault) &&
1240 		    stop_on_fault(fault, sip) == 0)
1241 			sip->si_signo = 0;
1242 	}
1243 
1244 	if (sip->si_signo)
1245 		trapsig(sip, restartable);
1246 
1247 	if (lwp->lwp_oweupc)
1248 		profil_tick(rp->r_pc);
1249 
1250 	if (curthread->t_astflag | curthread->t_sig_check) {
1251 		/*
1252 		 * Turn off the AST flag before checking all the conditions that
1253 		 * may have caused an AST.  This flag is on whenever a signal or
1254 		 * unusual condition should be handled after the next trap or
1255 		 * syscall.
1256 		 */
1257 		astoff(curthread);
1258 		curthread->t_sig_check = 0;
1259 
1260 		/*
1261 		 * The following check is legal for the following reasons:
1262 		 *	1) The thread we are checking, is ourselves, so there is
1263 		 *	   no way the proc can go away.
1264 		 *	2) The only time we need to be protected by the
1265 		 *	   lock is if the binding is changed.
1266 		 *
1267 		 *	Note we will still take the lock and check the binding
1268 		 *	if the condition was true without the lock held.  This
1269 		 *	prevents lock contention among threads owned by the
1270 		 *	same proc.
1271 		 */
1272 
1273 		if (curthread->t_proc_flag & TP_CHANGEBIND) {
1274 			mutex_enter(&p->p_lock);
1275 			if (curthread->t_proc_flag & TP_CHANGEBIND) {
1276 				timer_lwpbind();
1277 				curthread->t_proc_flag &= ~TP_CHANGEBIND;
1278 			}
1279 			mutex_exit(&p->p_lock);
1280 		}
1281 
1282 		/*
1283 		 * for kaio requests that are on the per-process poll queue,
1284 		 * aiop->aio_pollq, they're AIO_POLL bit is set, the kernel
1285 		 * should copyout their result_t to user memory. by copying
1286 		 * out the result_t, the user can poll on memory waiting
1287 		 * for the kaio request to complete.
1288 		 */
1289 		if (p->p_aio)
1290 			aio_cleanup(0);
1291 
1292 		/*
1293 		 * If this LWP was asked to hold, call holdlwp(), which will
1294 		 * stop.  holdlwps() sets this up and calls pokelwps() which
1295 		 * sets the AST flag.
1296 		 *
1297 		 * Also check TP_EXITLWP, since this is used by fresh new LWPs
1298 		 * through lwp_rtt().  That flag is set if the lwp_create(2)
1299 		 * syscall failed after creating the LWP.
1300 		 */
1301 		if (ISHOLD(p))
1302 			holdlwp();
1303 
1304 		/*
1305 		 * All code that sets signals and makes ISSIG evaluate true must
1306 		 * set t_astflag afterwards.
1307 		 */
1308 		if (ISSIG_PENDING(curthread, lwp, p)) {
1309 			if (issig(FORREAL))
1310 				psig();
1311 			curthread->t_sig_check = 1;
1312 		}
1313 
1314 		if (curthread->t_rprof != NULL) {
1315 			realsigprof(0, 0);
1316 			curthread->t_sig_check = 1;
1317 		}
1318 	}
1319 }
1320 
1321 /*
1322  * Called from fp_traps when a floating point trap occurs.
1323  * Note that the T_DATA_EXCEPTION case does not use X_FAULT_TYPE(mmu_fsr),
1324  * because mmu_fsr (now changed to code) is always 0.
1325  * Note that the T_UNIMP_INSTR case does not call simulate_unimp(),
1326  * because the simulator only simulates multiply and divide instructions,
1327  * which would not cause floating point traps in the first place.
1328  * XXX - Supervisor mode floating point traps?
1329  */
1330 void
1331 fpu_trap(struct regs *rp, caddr_t addr, uint32_t type, uint32_t code)
1332 {
1333 	proc_t *p = ttoproc(curthread);
1334 	klwp_id_t lwp = ttolwp(curthread);
1335 	k_siginfo_t siginfo;
1336 	uint_t op3, fault = 0;
1337 	int mstate;
1338 	char *badaddr;
1339 	kfpu_t *fp;
1340 	struct fpq *pfpq;
1341 	uint32_t inst;
1342 	utrap_handler_t *utrapp;
1343 
1344 	CPU_STATS_ADDQ(CPU, sys, trap, 1);
1345 
1346 	ASSERT(curthread->t_schedflag & TS_DONT_SWAP);
1347 
1348 	if (USERMODE(rp->r_tstate)) {
1349 		/*
1350 		 * Set lwp_state before trying to acquire any
1351 		 * adaptive lock
1352 		 */
1353 		ASSERT(lwp != NULL);
1354 		lwp->lwp_state = LWP_SYS;
1355 		/*
1356 		 * Set up the current cred to use during this trap. u_cred
1357 		 * no longer exists.  t_cred is used instead.
1358 		 * The current process credential applies to the thread for
1359 		 * the entire trap.  If trapping from the kernel, this
1360 		 * should already be set up.
1361 		 */
1362 		if (curthread->t_cred != p->p_cred) {
1363 			cred_t *oldcred = curthread->t_cred;
1364 			/*
1365 			 * DTrace accesses t_cred in probe context.  t_cred
1366 			 * must always be either NULL, or point to a valid,
1367 			 * allocated cred structure.
1368 			 */
1369 			curthread->t_cred = crgetcred();
1370 			crfree(oldcred);
1371 		}
1372 		ASSERT(lwp->lwp_regs == rp);
1373 		mstate = new_mstate(curthread, LMS_TRAP);
1374 		siginfo.si_signo = 0;
1375 		type |= T_USER;
1376 	}
1377 
1378 	TRACE_1(TR_FAC_TRAP, TR_C_TRAP_HANDLER_ENTER,
1379 		"C_fpu_trap_handler_enter:type %x", type);
1380 
1381 	if (tudebug && tudebugfpe)
1382 		showregs(type, rp, addr, 0);
1383 
1384 	bzero(&siginfo, sizeof (siginfo));
1385 	siginfo.si_code = code;
1386 	siginfo.si_addr = addr;
1387 
1388 	switch (type) {
1389 
1390 	case T_FP_EXCEPTION_IEEE + T_USER:	/* FPU arithmetic exception */
1391 		/*
1392 		 * FPU arithmetic exception - fake up a fpq if we
1393 		 *	came here directly from _fp_ieee_exception,
1394 		 *	which is indicated by a zero fpu_qcnt.
1395 		 */
1396 		fp = lwptofpu(curthread->t_lwp);
1397 		utrapp = curthread->t_procp->p_utraps;
1398 		if (fp->fpu_qcnt == 0) {
1399 			inst = fetch_user_instr((caddr_t)rp->r_pc);
1400 			lwp->lwp_state = LWP_SYS;
1401 			pfpq = &fp->fpu_q->FQu.fpq;
1402 			pfpq->fpq_addr = (uint32_t *)rp->r_pc;
1403 			pfpq->fpq_instr = inst;
1404 			fp->fpu_qcnt = 1;
1405 			fp->fpu_q_entrysize = sizeof (struct fpq);
1406 #ifdef SF_V9_TABLE_28
1407 			/*
1408 			 * Spitfire and blackbird followed the SPARC V9 manual
1409 			 * paragraph 3 of section 5.1.7.9 FSR_current_exception
1410 			 * (cexc) for setting fsr.cexc bits on underflow and
1411 			 * overflow traps when the fsr.tem.inexact bit is set,
1412 			 * instead of following Table 28. Bugid 1263234.
1413 			 */
1414 			{
1415 				extern int spitfire_bb_fsr_bug;
1416 
1417 				if (spitfire_bb_fsr_bug &&
1418 				    (fp->fpu_fsr & FSR_TEM_NX)) {
1419 					if (((fp->fpu_fsr & FSR_TEM_OF) == 0) &&
1420 					    (fp->fpu_fsr & FSR_CEXC_OF)) {
1421 						fp->fpu_fsr &= ~FSR_CEXC_OF;
1422 						fp->fpu_fsr |= FSR_CEXC_NX;
1423 						_fp_write_pfsr(&fp->fpu_fsr);
1424 						siginfo.si_code = FPE_FLTRES;
1425 					}
1426 					if (((fp->fpu_fsr & FSR_TEM_UF) == 0) &&
1427 					    (fp->fpu_fsr & FSR_CEXC_UF)) {
1428 						fp->fpu_fsr &= ~FSR_CEXC_UF;
1429 						fp->fpu_fsr |= FSR_CEXC_NX;
1430 						_fp_write_pfsr(&fp->fpu_fsr);
1431 						siginfo.si_code = FPE_FLTRES;
1432 					}
1433 				}
1434 			}
1435 #endif /* SF_V9_TABLE_28 */
1436 			rp->r_pc = rp->r_npc;
1437 			rp->r_npc += 4;
1438 		} else if (utrapp && utrapp[UT_FP_EXCEPTION_IEEE_754]) {
1439 			/*
1440 			 * The user had a trap handler installed.  Jump to
1441 			 * the trap handler instead of signalling the process.
1442 			 */
1443 			rp->r_pc = (long)utrapp[UT_FP_EXCEPTION_IEEE_754];
1444 			rp->r_npc = rp->r_pc + 4;
1445 			break;
1446 		}
1447 		siginfo.si_signo = SIGFPE;
1448 		fault = FLTFPE;
1449 		break;
1450 
1451 	case T_DATA_EXCEPTION + T_USER:		/* user data access exception */
1452 		siginfo.si_signo = SIGSEGV;
1453 		fault = FLTBOUNDS;
1454 		break;
1455 
1456 	case T_LDDF_ALIGN + T_USER: /* 64 bit user lddfa alignment error */
1457 	case T_STDF_ALIGN + T_USER: /* 64 bit user stdfa alignment error */
1458 		alignfaults++;
1459 		lwp->lwp_state = LWP_SYS;
1460 		if (&vis1_partial_support != NULL) {
1461 			bzero(&siginfo, sizeof (siginfo));
1462 			if (vis1_partial_support(rp,
1463 			    &siginfo, &fault) == 0)
1464 				goto out;
1465 		}
1466 		if (do_unaligned(rp, &badaddr) == SIMU_SUCCESS) {
1467 			rp->r_pc = rp->r_npc;
1468 			rp->r_npc += 4;
1469 			goto out;
1470 		}
1471 		fp = lwptofpu(curthread->t_lwp);
1472 		fp->fpu_qcnt = 0;
1473 		siginfo.si_signo = SIGSEGV;
1474 		siginfo.si_code = SEGV_MAPERR;
1475 		siginfo.si_addr = badaddr;
1476 		fault = FLTBOUNDS;
1477 		break;
1478 
1479 	case T_ALIGNMENT + T_USER:		/* user alignment error */
1480 		/*
1481 		 * If the user has to do unaligned references
1482 		 * the ugly stuff gets done here.
1483 		 * Only handles vanilla loads and stores.
1484 		 */
1485 		alignfaults++;
1486 		if (p->p_fixalignment) {
1487 			if (do_unaligned(rp, &badaddr) == SIMU_SUCCESS) {
1488 				rp->r_pc = rp->r_npc;
1489 				rp->r_npc += 4;
1490 				goto out;
1491 			}
1492 			siginfo.si_signo = SIGSEGV;
1493 			siginfo.si_code = SEGV_MAPERR;
1494 			siginfo.si_addr = badaddr;
1495 			fault = FLTBOUNDS;
1496 		} else {
1497 			siginfo.si_signo = SIGBUS;
1498 			siginfo.si_code = BUS_ADRALN;
1499 			if (rp->r_pc & 3) {	/* offending address, if pc */
1500 				siginfo.si_addr = (caddr_t)rp->r_pc;
1501 			} else {
1502 				if (calc_memaddr(rp, &badaddr) == SIMU_UNALIGN)
1503 					siginfo.si_addr = badaddr;
1504 				else
1505 					siginfo.si_addr = (caddr_t)rp->r_pc;
1506 			}
1507 			fault = FLTACCESS;
1508 		}
1509 		break;
1510 
1511 	case T_UNIMP_INSTR + T_USER:		/* illegal instruction fault */
1512 		siginfo.si_signo = SIGILL;
1513 		inst = fetch_user_instr((caddr_t)rp->r_pc);
1514 		op3 = (inst >> 19) & 0x3F;
1515 		if ((op3 == IOP_V8_STQFA) || (op3 == IOP_V8_STDFA))
1516 			siginfo.si_code = ILL_ILLADR;
1517 		else
1518 			siginfo.si_code = ILL_ILLTRP;
1519 		fault = FLTILL;
1520 		break;
1521 
1522 	default:
1523 		(void) die(type, rp, addr, 0);
1524 		/*NOTREACHED*/
1525 	}
1526 
1527 	/*
1528 	 * We can't get here from a system trap
1529 	 * Never restart any instruction which got here from an fp trap.
1530 	 */
1531 	ASSERT(type & T_USER);
1532 
1533 	trap_cleanup(rp, fault, &siginfo, 0);
1534 out:
1535 	trap_rtt();
1536 	(void) new_mstate(curthread, mstate);
1537 }
1538 
1539 void
1540 trap_rtt(void)
1541 {
1542 	klwp_id_t lwp = ttolwp(curthread);
1543 
1544 	/*
1545 	 * Restore register window if a debugger modified it.
1546 	 * Set up to perform a single-step if a debugger requested it.
1547 	 */
1548 	if (lwp->lwp_pcb.pcb_xregstat != XREGNONE)
1549 		xregrestore(lwp, 0);
1550 
1551 	/*
1552 	 * Set state to LWP_USER here so preempt won't give us a kernel
1553 	 * priority if it occurs after this point.  Call CL_TRAPRET() to
1554 	 * restore the user-level priority.
1555 	 *
1556 	 * It is important that no locks (other than spinlocks) be entered
1557 	 * after this point before returning to user mode (unless lwp_state
1558 	 * is set back to LWP_SYS).
1559 	 */
1560 	lwp->lwp_state = LWP_USER;
1561 	if (curthread->t_trapret) {
1562 		curthread->t_trapret = 0;
1563 		thread_lock(curthread);
1564 		CL_TRAPRET(curthread);
1565 		thread_unlock(curthread);
1566 	}
1567 	if (CPU->cpu_runrun || curthread->t_schedflag & TS_ANYWAITQ)
1568 		preempt();
1569 	if (lwp->lwp_pcb.pcb_step != STEP_NONE)
1570 		prdostep();
1571 
1572 	TRACE_0(TR_FAC_TRAP, TR_C_TRAP_HANDLER_EXIT, "C_trap_handler_exit");
1573 }
1574 
1575 #define	IS_LDASI(o)	\
1576 	((o) == (uint32_t)0xC0C00000 || (o) == (uint32_t)0xC0800000 ||	\
1577 	(o) == (uint32_t)0xC1800000)
1578 #define	IS_IMM_ASI(i)	(((i) & 0x2000) == 0)
1579 #define	IS_ASINF(a)	(((a) & 0xF6) == 0x82)
1580 #define	IS_LDDA(i)	(((i) & 0xC1F80000) == 0xC0980000)
1581 
1582 static int
1583 nfload(struct regs *rp, int *instrp)
1584 {
1585 	uint_t	instr, asi, op3, rd;
1586 	size_t	len;
1587 	struct as *as;
1588 	caddr_t addr;
1589 	FPU_DREGS_TYPE zero;
1590 	extern int segnf_create();
1591 
1592 	if (USERMODE(rp->r_tstate))
1593 		instr = fetch_user_instr((caddr_t)rp->r_pc);
1594 	else
1595 		instr = *(int *)rp->r_pc;
1596 
1597 	if (instrp)
1598 		*instrp = instr;
1599 
1600 	op3 = (uint_t)(instr & 0xC1E00000);
1601 	if (!IS_LDASI(op3))
1602 		return (0);
1603 	if (IS_IMM_ASI(instr))
1604 		asi = (instr & 0x1FE0) >> 5;
1605 	else
1606 		asi = (uint_t)((rp->r_tstate >> TSTATE_ASI_SHIFT) &
1607 		    TSTATE_ASI_MASK);
1608 	if (!IS_ASINF(asi))
1609 		return (0);
1610 	if (calc_memaddr(rp, &addr) == SIMU_SUCCESS) {
1611 		len = 1;
1612 		as = USERMODE(rp->r_tstate) ? ttoproc(curthread)->p_as : &kas;
1613 		as_rangelock(as);
1614 		if (as_gap(as, len, &addr, &len, 0, addr) == 0)
1615 			(void) as_map(as, addr, len, segnf_create, NULL);
1616 		as_rangeunlock(as);
1617 	}
1618 	zero = 0;
1619 	rd = (instr >> 25) & 0x1f;
1620 	if (IS_FLOAT(instr)) {
1621 		uint_t dbflg = ((instr >> 19) & 3) == 3;
1622 
1623 		if (dbflg) {		/* clever v9 reg encoding */
1624 			if (rd & 1)
1625 				rd = (rd & 0x1e) | 0x20;
1626 			rd >>= 1;
1627 		}
1628 		if (fpu_exists) {
1629 			if (!(_fp_read_fprs() & FPRS_FEF))
1630 				fp_enable();
1631 
1632 			if (dbflg)
1633 				_fp_write_pdreg(&zero, rd);
1634 			else
1635 				_fp_write_pfreg((uint_t *)&zero, rd);
1636 		} else {
1637 			kfpu_t *fp = lwptofpu(curthread->t_lwp);
1638 
1639 			if (!fp->fpu_en)
1640 				fp_enable();
1641 
1642 			if (dbflg)
1643 				fp->fpu_fr.fpu_dregs[rd] = zero;
1644 			else
1645 				fp->fpu_fr.fpu_regs[rd] = 0;
1646 		}
1647 	} else {
1648 		(void) putreg(&zero, rp, rd, &addr);
1649 		if (IS_LDDA(instr))
1650 			(void) putreg(&zero, rp, rd + 1, &addr);
1651 	}
1652 	rp->r_pc = rp->r_npc;
1653 	rp->r_npc += 4;
1654 	return (1);
1655 }
1656 
1657 kmutex_t atomic_nc_mutex;
1658 
1659 /*
1660  * The following couple of routines are for userland drivers which
1661  * do atomics to noncached addresses.  This sort of worked on previous
1662  * platforms -- the operation really wasn't atomic, but it didn't generate
1663  * a trap as sun4u systems do.
1664  */
1665 static int
1666 swap_nc(struct regs *rp, int instr)
1667 {
1668 	uint64_t rdata, mdata;
1669 	caddr_t addr, badaddr;
1670 	uint_t tmp, rd;
1671 
1672 	(void) flush_user_windows_to_stack(NULL);
1673 	rd = (instr >> 25) & 0x1f;
1674 	if (calc_memaddr(rp, &addr) != SIMU_SUCCESS)
1675 		return (0);
1676 	if (getreg(rp, rd, &rdata, &badaddr))
1677 		return (0);
1678 	mutex_enter(&atomic_nc_mutex);
1679 	if (fuword32(addr, &tmp) == -1) {
1680 		mutex_exit(&atomic_nc_mutex);
1681 		return (0);
1682 	}
1683 	mdata = (u_longlong_t)tmp;
1684 	if (suword32(addr, (uint32_t)rdata) == -1) {
1685 		mutex_exit(&atomic_nc_mutex);
1686 		return (0);
1687 	}
1688 	(void) putreg(&mdata, rp, rd, &badaddr);
1689 	mutex_exit(&atomic_nc_mutex);
1690 	return (1);
1691 }
1692 
1693 static int
1694 ldstub_nc(struct regs *rp, int instr)
1695 {
1696 	uint64_t mdata;
1697 	caddr_t addr, badaddr;
1698 	uint_t rd;
1699 	uint8_t tmp;
1700 
1701 	(void) flush_user_windows_to_stack(NULL);
1702 	rd = (instr >> 25) & 0x1f;
1703 	if (calc_memaddr(rp, &addr) != SIMU_SUCCESS)
1704 		return (0);
1705 	mutex_enter(&atomic_nc_mutex);
1706 	if (fuword8(addr, &tmp) == -1) {
1707 		mutex_exit(&atomic_nc_mutex);
1708 		return (0);
1709 	}
1710 	mdata = (u_longlong_t)tmp;
1711 	if (suword8(addr, (uint8_t)0xff) == -1) {
1712 		mutex_exit(&atomic_nc_mutex);
1713 		return (0);
1714 	}
1715 	(void) putreg(&mdata, rp, rd, &badaddr);
1716 	mutex_exit(&atomic_nc_mutex);
1717 	return (1);
1718 }
1719 
1720 /*
1721  * This function helps instr_size() determine the operand size.
1722  * It is called for the extended ldda/stda asi's.
1723  */
1724 int
1725 extended_asi_size(int asi)
1726 {
1727 	switch (asi) {
1728 	case ASI_PST8_P:
1729 	case ASI_PST8_S:
1730 	case ASI_PST16_P:
1731 	case ASI_PST16_S:
1732 	case ASI_PST32_P:
1733 	case ASI_PST32_S:
1734 	case ASI_PST8_PL:
1735 	case ASI_PST8_SL:
1736 	case ASI_PST16_PL:
1737 	case ASI_PST16_SL:
1738 	case ASI_PST32_PL:
1739 	case ASI_PST32_SL:
1740 		return (8);
1741 	case ASI_FL8_P:
1742 	case ASI_FL8_S:
1743 	case ASI_FL8_PL:
1744 	case ASI_FL8_SL:
1745 		return (1);
1746 	case ASI_FL16_P:
1747 	case ASI_FL16_S:
1748 	case ASI_FL16_PL:
1749 	case ASI_FL16_SL:
1750 		return (2);
1751 	case ASI_BLK_P:
1752 	case ASI_BLK_S:
1753 	case ASI_BLK_PL:
1754 	case ASI_BLK_SL:
1755 	case ASI_BLK_COMMIT_P:
1756 	case ASI_BLK_COMMIT_S:
1757 		return (64);
1758 	}
1759 
1760 	return (0);
1761 }
1762 
1763 /*
1764  * Patch non-zero to disable preemption of threads in the kernel.
1765  */
1766 int IGNORE_KERNEL_PREEMPTION = 0;	/* XXX - delete this someday */
1767 
1768 struct kpreempt_cnts {	/* kernel preemption statistics */
1769 	int	kpc_idle;	/* executing idle thread */
1770 	int	kpc_intr;	/* executing interrupt thread */
1771 	int	kpc_clock;	/* executing clock thread */
1772 	int	kpc_blocked;	/* thread has blocked preemption (t_preempt) */
1773 	int	kpc_notonproc;	/* thread is surrendering processor */
1774 	int	kpc_inswtch;	/* thread has ratified scheduling decision */
1775 	int	kpc_prilevel;	/* processor interrupt level is too high */
1776 	int	kpc_apreempt;	/* asynchronous preemption */
1777 	int	kpc_spreempt;	/* synchronous preemption */
1778 }	kpreempt_cnts;
1779 
1780 /*
1781  * kernel preemption: forced rescheduling
1782  *	preempt the running kernel thread.
1783  */
1784 void
1785 kpreempt(int asyncspl)
1786 {
1787 	if (IGNORE_KERNEL_PREEMPTION) {
1788 		aston(CPU->cpu_dispthread);
1789 		return;
1790 	}
1791 	/*
1792 	 * Check that conditions are right for kernel preemption
1793 	 */
1794 	do {
1795 		if (curthread->t_preempt) {
1796 			/*
1797 			 * either a privileged thread (idle, panic, interrupt)
1798 			 *	or will check when t_preempt is lowered
1799 			 */
1800 			if (curthread->t_pri < 0)
1801 				kpreempt_cnts.kpc_idle++;
1802 			else if (curthread->t_flag & T_INTR_THREAD) {
1803 				kpreempt_cnts.kpc_intr++;
1804 				if (curthread->t_pil == CLOCK_LEVEL)
1805 					kpreempt_cnts.kpc_clock++;
1806 			} else
1807 				kpreempt_cnts.kpc_blocked++;
1808 			aston(CPU->cpu_dispthread);
1809 			return;
1810 		}
1811 		if (curthread->t_state != TS_ONPROC ||
1812 		    curthread->t_disp_queue != CPU->cpu_disp) {
1813 			/* this thread will be calling swtch() shortly */
1814 			kpreempt_cnts.kpc_notonproc++;
1815 			if (CPU->cpu_thread != CPU->cpu_dispthread) {
1816 				/* already in swtch(), force another */
1817 				kpreempt_cnts.kpc_inswtch++;
1818 				siron();
1819 			}
1820 			return;
1821 		}
1822 
1823 		if (((asyncspl != KPREEMPT_SYNC) ? spltoipl(asyncspl) :
1824 		    getpil()) >= DISP_LEVEL) {
1825 			/*
1826 			 * We can't preempt this thread if it is at
1827 			 * a PIL >= DISP_LEVEL since it may be holding
1828 			 * a spin lock (like sched_lock).
1829 			 */
1830 			siron();	/* check back later */
1831 			kpreempt_cnts.kpc_prilevel++;
1832 			return;
1833 		}
1834 
1835 		/*
1836 		 * block preemption so we don't have multiple preemptions
1837 		 * pending on the interrupt stack
1838 		 */
1839 		curthread->t_preempt++;
1840 		if (asyncspl != KPREEMPT_SYNC) {
1841 			splx(asyncspl);
1842 			kpreempt_cnts.kpc_apreempt++;
1843 		} else
1844 			kpreempt_cnts.kpc_spreempt++;
1845 
1846 		preempt();
1847 		curthread->t_preempt--;
1848 	} while (CPU->cpu_kprunrun);
1849 }
1850 
1851 static enum seg_rw
1852 get_accesstype(struct regs *rp)
1853 {
1854 	uint32_t instr;
1855 
1856 	if (USERMODE(rp->r_tstate))
1857 		instr = fetch_user_instr((caddr_t)rp->r_pc);
1858 	else
1859 		instr = *(uint32_t *)rp->r_pc;
1860 
1861 	if (IS_FLUSH(instr))
1862 		return (S_OTHER);
1863 
1864 	if (IS_STORE(instr))
1865 		return (S_WRITE);
1866 	else
1867 		return (S_READ);
1868 }
1869