162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci#include <linux/extable.h> 362306a36Sopenharmony_ci#include <linux/uaccess.h> 462306a36Sopenharmony_ci#include <linux/sched/debug.h> 562306a36Sopenharmony_ci#include <linux/bitfield.h> 662306a36Sopenharmony_ci#include <xen/xen.h> 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <asm/fpu/api.h> 962306a36Sopenharmony_ci#include <asm/sev.h> 1062306a36Sopenharmony_ci#include <asm/traps.h> 1162306a36Sopenharmony_ci#include <asm/kdebug.h> 1262306a36Sopenharmony_ci#include <asm/insn-eval.h> 1362306a36Sopenharmony_ci#include <asm/sgx.h> 1462306a36Sopenharmony_ci 1562306a36Sopenharmony_cistatic inline unsigned long *pt_regs_nr(struct pt_regs *regs, int nr) 1662306a36Sopenharmony_ci{ 1762306a36Sopenharmony_ci int reg_offset = pt_regs_offset(regs, nr); 1862306a36Sopenharmony_ci static unsigned long __dummy; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci if (WARN_ON_ONCE(reg_offset < 0)) 2162306a36Sopenharmony_ci return &__dummy; 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci return (unsigned long *)((unsigned long)regs + reg_offset); 2462306a36Sopenharmony_ci} 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic inline unsigned long 2762306a36Sopenharmony_ciex_fixup_addr(const struct exception_table_entry *x) 2862306a36Sopenharmony_ci{ 2962306a36Sopenharmony_ci return (unsigned long)&x->fixup + x->fixup; 3062306a36Sopenharmony_ci} 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_cistatic bool ex_handler_default(const struct exception_table_entry *e, 3362306a36Sopenharmony_ci struct pt_regs *regs) 3462306a36Sopenharmony_ci{ 3562306a36Sopenharmony_ci if (e->data & EX_FLAG_CLEAR_AX) 3662306a36Sopenharmony_ci regs->ax = 0; 3762306a36Sopenharmony_ci if (e->data & EX_FLAG_CLEAR_DX) 3862306a36Sopenharmony_ci regs->dx = 0; 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci regs->ip = ex_fixup_addr(e); 4162306a36Sopenharmony_ci return true; 4262306a36Sopenharmony_ci} 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci/* 4562306a36Sopenharmony_ci * This is the *very* rare case where we do a "load_unaligned_zeropad()" 4662306a36Sopenharmony_ci * and it's a page crosser into a non-existent page. 4762306a36Sopenharmony_ci * 4862306a36Sopenharmony_ci * This happens when we optimistically load a pathname a word-at-a-time 4962306a36Sopenharmony_ci * and the name is less than the full word and the next page is not 5062306a36Sopenharmony_ci * mapped. Typically that only happens for CONFIG_DEBUG_PAGEALLOC. 5162306a36Sopenharmony_ci * 5262306a36Sopenharmony_ci * NOTE! The faulting address is always a 'mov mem,reg' type instruction 5362306a36Sopenharmony_ci * of size 'long', and the exception fixup must always point to right 5462306a36Sopenharmony_ci * after the instruction. 5562306a36Sopenharmony_ci */ 5662306a36Sopenharmony_cistatic bool ex_handler_zeropad(const struct exception_table_entry *e, 5762306a36Sopenharmony_ci struct pt_regs *regs, 5862306a36Sopenharmony_ci unsigned long fault_addr) 5962306a36Sopenharmony_ci{ 6062306a36Sopenharmony_ci struct insn insn; 6162306a36Sopenharmony_ci const unsigned long mask = sizeof(long) - 1; 6262306a36Sopenharmony_ci unsigned long offset, addr, next_ip, len; 6362306a36Sopenharmony_ci unsigned long *reg; 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci next_ip = ex_fixup_addr(e); 6662306a36Sopenharmony_ci len = next_ip - regs->ip; 6762306a36Sopenharmony_ci if (len > MAX_INSN_SIZE) 6862306a36Sopenharmony_ci return false; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci if (insn_decode(&insn, (void *) regs->ip, len, INSN_MODE_KERN)) 7162306a36Sopenharmony_ci return false; 7262306a36Sopenharmony_ci if (insn.length != len) 7362306a36Sopenharmony_ci return false; 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci if (insn.opcode.bytes[0] != 0x8b) 7662306a36Sopenharmony_ci return false; 7762306a36Sopenharmony_ci if (insn.opnd_bytes != sizeof(long)) 7862306a36Sopenharmony_ci return false; 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci addr = (unsigned long) insn_get_addr_ref(&insn, regs); 8162306a36Sopenharmony_ci if (addr == ~0ul) 8262306a36Sopenharmony_ci return false; 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci offset = addr & mask; 8562306a36Sopenharmony_ci addr = addr & ~mask; 8662306a36Sopenharmony_ci if (fault_addr != addr + sizeof(long)) 8762306a36Sopenharmony_ci return false; 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci reg = insn_get_modrm_reg_ptr(&insn, regs); 9062306a36Sopenharmony_ci if (!reg) 9162306a36Sopenharmony_ci return false; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci *reg = *(unsigned long *)addr >> (offset * 8); 9462306a36Sopenharmony_ci return ex_handler_default(e, regs); 9562306a36Sopenharmony_ci} 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_cistatic bool ex_handler_fault(const struct exception_table_entry *fixup, 9862306a36Sopenharmony_ci struct pt_regs *regs, int trapnr) 9962306a36Sopenharmony_ci{ 10062306a36Sopenharmony_ci regs->ax = trapnr; 10162306a36Sopenharmony_ci return ex_handler_default(fixup, regs); 10262306a36Sopenharmony_ci} 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_cistatic bool ex_handler_sgx(const struct exception_table_entry *fixup, 10562306a36Sopenharmony_ci struct pt_regs *regs, int trapnr) 10662306a36Sopenharmony_ci{ 10762306a36Sopenharmony_ci regs->ax = trapnr | SGX_ENCLS_FAULT_FLAG; 10862306a36Sopenharmony_ci return ex_handler_default(fixup, regs); 10962306a36Sopenharmony_ci} 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_ci/* 11262306a36Sopenharmony_ci * Handler for when we fail to restore a task's FPU state. We should never get 11362306a36Sopenharmony_ci * here because the FPU state of a task using the FPU (task->thread.fpu.state) 11462306a36Sopenharmony_ci * should always be valid. However, past bugs have allowed userspace to set 11562306a36Sopenharmony_ci * reserved bits in the XSAVE area using PTRACE_SETREGSET or sys_rt_sigreturn(). 11662306a36Sopenharmony_ci * These caused XRSTOR to fail when switching to the task, leaking the FPU 11762306a36Sopenharmony_ci * registers of the task previously executing on the CPU. Mitigate this class 11862306a36Sopenharmony_ci * of vulnerability by restoring from the initial state (essentially, zeroing 11962306a36Sopenharmony_ci * out all the FPU registers) if we can't restore from the task's FPU state. 12062306a36Sopenharmony_ci */ 12162306a36Sopenharmony_cistatic bool ex_handler_fprestore(const struct exception_table_entry *fixup, 12262306a36Sopenharmony_ci struct pt_regs *regs) 12362306a36Sopenharmony_ci{ 12462306a36Sopenharmony_ci regs->ip = ex_fixup_addr(fixup); 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci WARN_ONCE(1, "Bad FPU state detected at %pB, reinitializing FPU registers.", 12762306a36Sopenharmony_ci (void *)instruction_pointer(regs)); 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci fpu_reset_from_exception_fixup(); 13062306a36Sopenharmony_ci return true; 13162306a36Sopenharmony_ci} 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_ci/* 13462306a36Sopenharmony_ci * On x86-64, we end up being imprecise with 'access_ok()', and allow 13562306a36Sopenharmony_ci * non-canonical user addresses to make the range comparisons simpler, 13662306a36Sopenharmony_ci * and to not have to worry about LAM being enabled. 13762306a36Sopenharmony_ci * 13862306a36Sopenharmony_ci * In fact, we allow up to one page of "slop" at the sign boundary, 13962306a36Sopenharmony_ci * which means that we can do access_ok() by just checking the sign 14062306a36Sopenharmony_ci * of the pointer for the common case of having a small access size. 14162306a36Sopenharmony_ci */ 14262306a36Sopenharmony_cistatic bool gp_fault_address_ok(unsigned long fault_address) 14362306a36Sopenharmony_ci{ 14462306a36Sopenharmony_ci#ifdef CONFIG_X86_64 14562306a36Sopenharmony_ci /* Is it in the "user space" part of the non-canonical space? */ 14662306a36Sopenharmony_ci if (valid_user_address(fault_address)) 14762306a36Sopenharmony_ci return true; 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci /* .. or just above it? */ 15062306a36Sopenharmony_ci fault_address -= PAGE_SIZE; 15162306a36Sopenharmony_ci if (valid_user_address(fault_address)) 15262306a36Sopenharmony_ci return true; 15362306a36Sopenharmony_ci#endif 15462306a36Sopenharmony_ci return false; 15562306a36Sopenharmony_ci} 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_cistatic bool ex_handler_uaccess(const struct exception_table_entry *fixup, 15862306a36Sopenharmony_ci struct pt_regs *regs, int trapnr, 15962306a36Sopenharmony_ci unsigned long fault_address) 16062306a36Sopenharmony_ci{ 16162306a36Sopenharmony_ci WARN_ONCE(trapnr == X86_TRAP_GP && !gp_fault_address_ok(fault_address), 16262306a36Sopenharmony_ci "General protection fault in user access. Non-canonical address?"); 16362306a36Sopenharmony_ci return ex_handler_default(fixup, regs); 16462306a36Sopenharmony_ci} 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_cistatic bool ex_handler_copy(const struct exception_table_entry *fixup, 16762306a36Sopenharmony_ci struct pt_regs *regs, int trapnr) 16862306a36Sopenharmony_ci{ 16962306a36Sopenharmony_ci WARN_ONCE(trapnr == X86_TRAP_GP, "General protection fault in user access. Non-canonical address?"); 17062306a36Sopenharmony_ci return ex_handler_fault(fixup, regs, trapnr); 17162306a36Sopenharmony_ci} 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_cistatic bool ex_handler_msr(const struct exception_table_entry *fixup, 17462306a36Sopenharmony_ci struct pt_regs *regs, bool wrmsr, bool safe, int reg) 17562306a36Sopenharmony_ci{ 17662306a36Sopenharmony_ci if (__ONCE_LITE_IF(!safe && wrmsr)) { 17762306a36Sopenharmony_ci pr_warn("unchecked MSR access error: WRMSR to 0x%x (tried to write 0x%08x%08x) at rIP: 0x%lx (%pS)\n", 17862306a36Sopenharmony_ci (unsigned int)regs->cx, (unsigned int)regs->dx, 17962306a36Sopenharmony_ci (unsigned int)regs->ax, regs->ip, (void *)regs->ip); 18062306a36Sopenharmony_ci show_stack_regs(regs); 18162306a36Sopenharmony_ci } 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci if (__ONCE_LITE_IF(!safe && !wrmsr)) { 18462306a36Sopenharmony_ci pr_warn("unchecked MSR access error: RDMSR from 0x%x at rIP: 0x%lx (%pS)\n", 18562306a36Sopenharmony_ci (unsigned int)regs->cx, regs->ip, (void *)regs->ip); 18662306a36Sopenharmony_ci show_stack_regs(regs); 18762306a36Sopenharmony_ci } 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci if (!wrmsr) { 19062306a36Sopenharmony_ci /* Pretend that the read succeeded and returned 0. */ 19162306a36Sopenharmony_ci regs->ax = 0; 19262306a36Sopenharmony_ci regs->dx = 0; 19362306a36Sopenharmony_ci } 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci if (safe) 19662306a36Sopenharmony_ci *pt_regs_nr(regs, reg) = -EIO; 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci return ex_handler_default(fixup, regs); 19962306a36Sopenharmony_ci} 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_cistatic bool ex_handler_clear_fs(const struct exception_table_entry *fixup, 20262306a36Sopenharmony_ci struct pt_regs *regs) 20362306a36Sopenharmony_ci{ 20462306a36Sopenharmony_ci if (static_cpu_has(X86_BUG_NULL_SEG)) 20562306a36Sopenharmony_ci asm volatile ("mov %0, %%fs" : : "rm" (__USER_DS)); 20662306a36Sopenharmony_ci asm volatile ("mov %0, %%fs" : : "rm" (0)); 20762306a36Sopenharmony_ci return ex_handler_default(fixup, regs); 20862306a36Sopenharmony_ci} 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_cistatic bool ex_handler_imm_reg(const struct exception_table_entry *fixup, 21162306a36Sopenharmony_ci struct pt_regs *regs, int reg, int imm) 21262306a36Sopenharmony_ci{ 21362306a36Sopenharmony_ci *pt_regs_nr(regs, reg) = (long)imm; 21462306a36Sopenharmony_ci return ex_handler_default(fixup, regs); 21562306a36Sopenharmony_ci} 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_cistatic bool ex_handler_ucopy_len(const struct exception_table_entry *fixup, 21862306a36Sopenharmony_ci struct pt_regs *regs, int trapnr, 21962306a36Sopenharmony_ci unsigned long fault_address, 22062306a36Sopenharmony_ci int reg, int imm) 22162306a36Sopenharmony_ci{ 22262306a36Sopenharmony_ci regs->cx = imm * regs->cx + *pt_regs_nr(regs, reg); 22362306a36Sopenharmony_ci return ex_handler_uaccess(fixup, regs, trapnr, fault_address); 22462306a36Sopenharmony_ci} 22562306a36Sopenharmony_ci 22662306a36Sopenharmony_ciint ex_get_fixup_type(unsigned long ip) 22762306a36Sopenharmony_ci{ 22862306a36Sopenharmony_ci const struct exception_table_entry *e = search_exception_tables(ip); 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci return e ? FIELD_GET(EX_DATA_TYPE_MASK, e->data) : EX_TYPE_NONE; 23162306a36Sopenharmony_ci} 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ciint fixup_exception(struct pt_regs *regs, int trapnr, unsigned long error_code, 23462306a36Sopenharmony_ci unsigned long fault_addr) 23562306a36Sopenharmony_ci{ 23662306a36Sopenharmony_ci const struct exception_table_entry *e; 23762306a36Sopenharmony_ci int type, reg, imm; 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ci#ifdef CONFIG_PNPBIOS 24062306a36Sopenharmony_ci if (unlikely(SEGMENT_IS_PNP_CODE(regs->cs))) { 24162306a36Sopenharmony_ci extern u32 pnp_bios_fault_eip, pnp_bios_fault_esp; 24262306a36Sopenharmony_ci extern u32 pnp_bios_is_utter_crap; 24362306a36Sopenharmony_ci pnp_bios_is_utter_crap = 1; 24462306a36Sopenharmony_ci printk(KERN_CRIT "PNPBIOS fault.. attempting recovery.\n"); 24562306a36Sopenharmony_ci __asm__ volatile( 24662306a36Sopenharmony_ci "movl %0, %%esp\n\t" 24762306a36Sopenharmony_ci "jmp *%1\n\t" 24862306a36Sopenharmony_ci : : "g" (pnp_bios_fault_esp), "g" (pnp_bios_fault_eip)); 24962306a36Sopenharmony_ci panic("do_trap: can't hit this"); 25062306a36Sopenharmony_ci } 25162306a36Sopenharmony_ci#endif 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci e = search_exception_tables(regs->ip); 25462306a36Sopenharmony_ci if (!e) 25562306a36Sopenharmony_ci return 0; 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_ci type = FIELD_GET(EX_DATA_TYPE_MASK, e->data); 25862306a36Sopenharmony_ci reg = FIELD_GET(EX_DATA_REG_MASK, e->data); 25962306a36Sopenharmony_ci imm = FIELD_GET(EX_DATA_IMM_MASK, e->data); 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_ci switch (type) { 26262306a36Sopenharmony_ci case EX_TYPE_DEFAULT: 26362306a36Sopenharmony_ci case EX_TYPE_DEFAULT_MCE_SAFE: 26462306a36Sopenharmony_ci return ex_handler_default(e, regs); 26562306a36Sopenharmony_ci case EX_TYPE_FAULT: 26662306a36Sopenharmony_ci case EX_TYPE_FAULT_MCE_SAFE: 26762306a36Sopenharmony_ci return ex_handler_fault(e, regs, trapnr); 26862306a36Sopenharmony_ci case EX_TYPE_UACCESS: 26962306a36Sopenharmony_ci return ex_handler_uaccess(e, regs, trapnr, fault_addr); 27062306a36Sopenharmony_ci case EX_TYPE_COPY: 27162306a36Sopenharmony_ci return ex_handler_copy(e, regs, trapnr); 27262306a36Sopenharmony_ci case EX_TYPE_CLEAR_FS: 27362306a36Sopenharmony_ci return ex_handler_clear_fs(e, regs); 27462306a36Sopenharmony_ci case EX_TYPE_FPU_RESTORE: 27562306a36Sopenharmony_ci return ex_handler_fprestore(e, regs); 27662306a36Sopenharmony_ci case EX_TYPE_BPF: 27762306a36Sopenharmony_ci return ex_handler_bpf(e, regs); 27862306a36Sopenharmony_ci case EX_TYPE_WRMSR: 27962306a36Sopenharmony_ci return ex_handler_msr(e, regs, true, false, reg); 28062306a36Sopenharmony_ci case EX_TYPE_RDMSR: 28162306a36Sopenharmony_ci return ex_handler_msr(e, regs, false, false, reg); 28262306a36Sopenharmony_ci case EX_TYPE_WRMSR_SAFE: 28362306a36Sopenharmony_ci return ex_handler_msr(e, regs, true, true, reg); 28462306a36Sopenharmony_ci case EX_TYPE_RDMSR_SAFE: 28562306a36Sopenharmony_ci return ex_handler_msr(e, regs, false, true, reg); 28662306a36Sopenharmony_ci case EX_TYPE_WRMSR_IN_MCE: 28762306a36Sopenharmony_ci ex_handler_msr_mce(regs, true); 28862306a36Sopenharmony_ci break; 28962306a36Sopenharmony_ci case EX_TYPE_RDMSR_IN_MCE: 29062306a36Sopenharmony_ci ex_handler_msr_mce(regs, false); 29162306a36Sopenharmony_ci break; 29262306a36Sopenharmony_ci case EX_TYPE_POP_REG: 29362306a36Sopenharmony_ci regs->sp += sizeof(long); 29462306a36Sopenharmony_ci fallthrough; 29562306a36Sopenharmony_ci case EX_TYPE_IMM_REG: 29662306a36Sopenharmony_ci return ex_handler_imm_reg(e, regs, reg, imm); 29762306a36Sopenharmony_ci case EX_TYPE_FAULT_SGX: 29862306a36Sopenharmony_ci return ex_handler_sgx(e, regs, trapnr); 29962306a36Sopenharmony_ci case EX_TYPE_UCOPY_LEN: 30062306a36Sopenharmony_ci return ex_handler_ucopy_len(e, regs, trapnr, fault_addr, reg, imm); 30162306a36Sopenharmony_ci case EX_TYPE_ZEROPAD: 30262306a36Sopenharmony_ci return ex_handler_zeropad(e, regs, fault_addr); 30362306a36Sopenharmony_ci } 30462306a36Sopenharmony_ci BUG(); 30562306a36Sopenharmony_ci} 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ciextern unsigned int early_recursion_flag; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci/* Restricted version used during very early boot */ 31062306a36Sopenharmony_civoid __init early_fixup_exception(struct pt_regs *regs, int trapnr) 31162306a36Sopenharmony_ci{ 31262306a36Sopenharmony_ci /* Ignore early NMIs. */ 31362306a36Sopenharmony_ci if (trapnr == X86_TRAP_NMI) 31462306a36Sopenharmony_ci return; 31562306a36Sopenharmony_ci 31662306a36Sopenharmony_ci if (early_recursion_flag > 2) 31762306a36Sopenharmony_ci goto halt_loop; 31862306a36Sopenharmony_ci 31962306a36Sopenharmony_ci /* 32062306a36Sopenharmony_ci * Old CPUs leave the high bits of CS on the stack 32162306a36Sopenharmony_ci * undefined. I'm not sure which CPUs do this, but at least 32262306a36Sopenharmony_ci * the 486 DX works this way. 32362306a36Sopenharmony_ci * Xen pv domains are not using the default __KERNEL_CS. 32462306a36Sopenharmony_ci */ 32562306a36Sopenharmony_ci if (!xen_pv_domain() && regs->cs != __KERNEL_CS) 32662306a36Sopenharmony_ci goto fail; 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci /* 32962306a36Sopenharmony_ci * The full exception fixup machinery is available as soon as 33062306a36Sopenharmony_ci * the early IDT is loaded. This means that it is the 33162306a36Sopenharmony_ci * responsibility of extable users to either function correctly 33262306a36Sopenharmony_ci * when handlers are invoked early or to simply avoid causing 33362306a36Sopenharmony_ci * exceptions before they're ready to handle them. 33462306a36Sopenharmony_ci * 33562306a36Sopenharmony_ci * This is better than filtering which handlers can be used, 33662306a36Sopenharmony_ci * because refusing to call a handler here is guaranteed to 33762306a36Sopenharmony_ci * result in a hard-to-debug panic. 33862306a36Sopenharmony_ci * 33962306a36Sopenharmony_ci * Keep in mind that not all vectors actually get here. Early 34062306a36Sopenharmony_ci * page faults, for example, are special. 34162306a36Sopenharmony_ci */ 34262306a36Sopenharmony_ci if (fixup_exception(regs, trapnr, regs->orig_ax, 0)) 34362306a36Sopenharmony_ci return; 34462306a36Sopenharmony_ci 34562306a36Sopenharmony_ci if (trapnr == X86_TRAP_UD) { 34662306a36Sopenharmony_ci if (report_bug(regs->ip, regs) == BUG_TRAP_TYPE_WARN) { 34762306a36Sopenharmony_ci /* Skip the ud2. */ 34862306a36Sopenharmony_ci regs->ip += LEN_UD2; 34962306a36Sopenharmony_ci return; 35062306a36Sopenharmony_ci } 35162306a36Sopenharmony_ci 35262306a36Sopenharmony_ci /* 35362306a36Sopenharmony_ci * If this was a BUG and report_bug returns or if this 35462306a36Sopenharmony_ci * was just a normal #UD, we want to continue onward and 35562306a36Sopenharmony_ci * crash. 35662306a36Sopenharmony_ci */ 35762306a36Sopenharmony_ci } 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_cifail: 36062306a36Sopenharmony_ci early_printk("PANIC: early exception 0x%02x IP %lx:%lx error %lx cr2 0x%lx\n", 36162306a36Sopenharmony_ci (unsigned)trapnr, (unsigned long)regs->cs, regs->ip, 36262306a36Sopenharmony_ci regs->orig_ax, read_cr2()); 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci show_regs(regs); 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_cihalt_loop: 36762306a36Sopenharmony_ci while (true) 36862306a36Sopenharmony_ci halt(); 36962306a36Sopenharmony_ci} 370