162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci#include <linux/extable.h>
362306a36Sopenharmony_ci#include <linux/uaccess.h>
462306a36Sopenharmony_ci#include <linux/sched/debug.h>
562306a36Sopenharmony_ci#include <linux/bitfield.h>
662306a36Sopenharmony_ci#include <xen/xen.h>
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include <asm/fpu/api.h>
962306a36Sopenharmony_ci#include <asm/sev.h>
1062306a36Sopenharmony_ci#include <asm/traps.h>
1162306a36Sopenharmony_ci#include <asm/kdebug.h>
1262306a36Sopenharmony_ci#include <asm/insn-eval.h>
1362306a36Sopenharmony_ci#include <asm/sgx.h>
1462306a36Sopenharmony_ci
1562306a36Sopenharmony_cistatic inline unsigned long *pt_regs_nr(struct pt_regs *regs, int nr)
1662306a36Sopenharmony_ci{
1762306a36Sopenharmony_ci	int reg_offset = pt_regs_offset(regs, nr);
1862306a36Sopenharmony_ci	static unsigned long __dummy;
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci	if (WARN_ON_ONCE(reg_offset < 0))
2162306a36Sopenharmony_ci		return &__dummy;
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_ci	return (unsigned long *)((unsigned long)regs + reg_offset);
2462306a36Sopenharmony_ci}
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_cistatic inline unsigned long
2762306a36Sopenharmony_ciex_fixup_addr(const struct exception_table_entry *x)
2862306a36Sopenharmony_ci{
2962306a36Sopenharmony_ci	return (unsigned long)&x->fixup + x->fixup;
3062306a36Sopenharmony_ci}
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_cistatic bool ex_handler_default(const struct exception_table_entry *e,
3362306a36Sopenharmony_ci			       struct pt_regs *regs)
3462306a36Sopenharmony_ci{
3562306a36Sopenharmony_ci	if (e->data & EX_FLAG_CLEAR_AX)
3662306a36Sopenharmony_ci		regs->ax = 0;
3762306a36Sopenharmony_ci	if (e->data & EX_FLAG_CLEAR_DX)
3862306a36Sopenharmony_ci		regs->dx = 0;
3962306a36Sopenharmony_ci
4062306a36Sopenharmony_ci	regs->ip = ex_fixup_addr(e);
4162306a36Sopenharmony_ci	return true;
4262306a36Sopenharmony_ci}
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci/*
4562306a36Sopenharmony_ci * This is the *very* rare case where we do a "load_unaligned_zeropad()"
4662306a36Sopenharmony_ci * and it's a page crosser into a non-existent page.
4762306a36Sopenharmony_ci *
4862306a36Sopenharmony_ci * This happens when we optimistically load a pathname a word-at-a-time
4962306a36Sopenharmony_ci * and the name is less than the full word and the  next page is not
5062306a36Sopenharmony_ci * mapped. Typically that only happens for CONFIG_DEBUG_PAGEALLOC.
5162306a36Sopenharmony_ci *
5262306a36Sopenharmony_ci * NOTE! The faulting address is always a 'mov mem,reg' type instruction
5362306a36Sopenharmony_ci * of size 'long', and the exception fixup must always point to right
5462306a36Sopenharmony_ci * after the instruction.
5562306a36Sopenharmony_ci */
5662306a36Sopenharmony_cistatic bool ex_handler_zeropad(const struct exception_table_entry *e,
5762306a36Sopenharmony_ci			       struct pt_regs *regs,
5862306a36Sopenharmony_ci			       unsigned long fault_addr)
5962306a36Sopenharmony_ci{
6062306a36Sopenharmony_ci	struct insn insn;
6162306a36Sopenharmony_ci	const unsigned long mask = sizeof(long) - 1;
6262306a36Sopenharmony_ci	unsigned long offset, addr, next_ip, len;
6362306a36Sopenharmony_ci	unsigned long *reg;
6462306a36Sopenharmony_ci
6562306a36Sopenharmony_ci	next_ip = ex_fixup_addr(e);
6662306a36Sopenharmony_ci	len = next_ip - regs->ip;
6762306a36Sopenharmony_ci	if (len > MAX_INSN_SIZE)
6862306a36Sopenharmony_ci		return false;
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci	if (insn_decode(&insn, (void *) regs->ip, len, INSN_MODE_KERN))
7162306a36Sopenharmony_ci		return false;
7262306a36Sopenharmony_ci	if (insn.length != len)
7362306a36Sopenharmony_ci		return false;
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	if (insn.opcode.bytes[0] != 0x8b)
7662306a36Sopenharmony_ci		return false;
7762306a36Sopenharmony_ci	if (insn.opnd_bytes != sizeof(long))
7862306a36Sopenharmony_ci		return false;
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	addr = (unsigned long) insn_get_addr_ref(&insn, regs);
8162306a36Sopenharmony_ci	if (addr == ~0ul)
8262306a36Sopenharmony_ci		return false;
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	offset = addr & mask;
8562306a36Sopenharmony_ci	addr = addr & ~mask;
8662306a36Sopenharmony_ci	if (fault_addr != addr + sizeof(long))
8762306a36Sopenharmony_ci		return false;
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	reg = insn_get_modrm_reg_ptr(&insn, regs);
9062306a36Sopenharmony_ci	if (!reg)
9162306a36Sopenharmony_ci		return false;
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	*reg = *(unsigned long *)addr >> (offset * 8);
9462306a36Sopenharmony_ci	return ex_handler_default(e, regs);
9562306a36Sopenharmony_ci}
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_cistatic bool ex_handler_fault(const struct exception_table_entry *fixup,
9862306a36Sopenharmony_ci			     struct pt_regs *regs, int trapnr)
9962306a36Sopenharmony_ci{
10062306a36Sopenharmony_ci	regs->ax = trapnr;
10162306a36Sopenharmony_ci	return ex_handler_default(fixup, regs);
10262306a36Sopenharmony_ci}
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_cistatic bool ex_handler_sgx(const struct exception_table_entry *fixup,
10562306a36Sopenharmony_ci			   struct pt_regs *regs, int trapnr)
10662306a36Sopenharmony_ci{
10762306a36Sopenharmony_ci	regs->ax = trapnr | SGX_ENCLS_FAULT_FLAG;
10862306a36Sopenharmony_ci	return ex_handler_default(fixup, regs);
10962306a36Sopenharmony_ci}
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_ci/*
11262306a36Sopenharmony_ci * Handler for when we fail to restore a task's FPU state.  We should never get
11362306a36Sopenharmony_ci * here because the FPU state of a task using the FPU (task->thread.fpu.state)
11462306a36Sopenharmony_ci * should always be valid.  However, past bugs have allowed userspace to set
11562306a36Sopenharmony_ci * reserved bits in the XSAVE area using PTRACE_SETREGSET or sys_rt_sigreturn().
11662306a36Sopenharmony_ci * These caused XRSTOR to fail when switching to the task, leaking the FPU
11762306a36Sopenharmony_ci * registers of the task previously executing on the CPU.  Mitigate this class
11862306a36Sopenharmony_ci * of vulnerability by restoring from the initial state (essentially, zeroing
11962306a36Sopenharmony_ci * out all the FPU registers) if we can't restore from the task's FPU state.
12062306a36Sopenharmony_ci */
12162306a36Sopenharmony_cistatic bool ex_handler_fprestore(const struct exception_table_entry *fixup,
12262306a36Sopenharmony_ci				 struct pt_regs *regs)
12362306a36Sopenharmony_ci{
12462306a36Sopenharmony_ci	regs->ip = ex_fixup_addr(fixup);
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	WARN_ONCE(1, "Bad FPU state detected at %pB, reinitializing FPU registers.",
12762306a36Sopenharmony_ci		  (void *)instruction_pointer(regs));
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	fpu_reset_from_exception_fixup();
13062306a36Sopenharmony_ci	return true;
13162306a36Sopenharmony_ci}
13262306a36Sopenharmony_ci
13362306a36Sopenharmony_ci/*
13462306a36Sopenharmony_ci * On x86-64, we end up being imprecise with 'access_ok()', and allow
13562306a36Sopenharmony_ci * non-canonical user addresses to make the range comparisons simpler,
13662306a36Sopenharmony_ci * and to not have to worry about LAM being enabled.
13762306a36Sopenharmony_ci *
13862306a36Sopenharmony_ci * In fact, we allow up to one page of "slop" at the sign boundary,
13962306a36Sopenharmony_ci * which means that we can do access_ok() by just checking the sign
14062306a36Sopenharmony_ci * of the pointer for the common case of having a small access size.
14162306a36Sopenharmony_ci */
14262306a36Sopenharmony_cistatic bool gp_fault_address_ok(unsigned long fault_address)
14362306a36Sopenharmony_ci{
14462306a36Sopenharmony_ci#ifdef CONFIG_X86_64
14562306a36Sopenharmony_ci	/* Is it in the "user space" part of the non-canonical space? */
14662306a36Sopenharmony_ci	if (valid_user_address(fault_address))
14762306a36Sopenharmony_ci		return true;
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci	/* .. or just above it? */
15062306a36Sopenharmony_ci	fault_address -= PAGE_SIZE;
15162306a36Sopenharmony_ci	if (valid_user_address(fault_address))
15262306a36Sopenharmony_ci		return true;
15362306a36Sopenharmony_ci#endif
15462306a36Sopenharmony_ci	return false;
15562306a36Sopenharmony_ci}
15662306a36Sopenharmony_ci
15762306a36Sopenharmony_cistatic bool ex_handler_uaccess(const struct exception_table_entry *fixup,
15862306a36Sopenharmony_ci			       struct pt_regs *regs, int trapnr,
15962306a36Sopenharmony_ci			       unsigned long fault_address)
16062306a36Sopenharmony_ci{
16162306a36Sopenharmony_ci	WARN_ONCE(trapnr == X86_TRAP_GP && !gp_fault_address_ok(fault_address),
16262306a36Sopenharmony_ci		"General protection fault in user access. Non-canonical address?");
16362306a36Sopenharmony_ci	return ex_handler_default(fixup, regs);
16462306a36Sopenharmony_ci}
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_cistatic bool ex_handler_copy(const struct exception_table_entry *fixup,
16762306a36Sopenharmony_ci			    struct pt_regs *regs, int trapnr)
16862306a36Sopenharmony_ci{
16962306a36Sopenharmony_ci	WARN_ONCE(trapnr == X86_TRAP_GP, "General protection fault in user access. Non-canonical address?");
17062306a36Sopenharmony_ci	return ex_handler_fault(fixup, regs, trapnr);
17162306a36Sopenharmony_ci}
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_cistatic bool ex_handler_msr(const struct exception_table_entry *fixup,
17462306a36Sopenharmony_ci			   struct pt_regs *regs, bool wrmsr, bool safe, int reg)
17562306a36Sopenharmony_ci{
17662306a36Sopenharmony_ci	if (__ONCE_LITE_IF(!safe && wrmsr)) {
17762306a36Sopenharmony_ci		pr_warn("unchecked MSR access error: WRMSR to 0x%x (tried to write 0x%08x%08x) at rIP: 0x%lx (%pS)\n",
17862306a36Sopenharmony_ci			(unsigned int)regs->cx, (unsigned int)regs->dx,
17962306a36Sopenharmony_ci			(unsigned int)regs->ax,  regs->ip, (void *)regs->ip);
18062306a36Sopenharmony_ci		show_stack_regs(regs);
18162306a36Sopenharmony_ci	}
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_ci	if (__ONCE_LITE_IF(!safe && !wrmsr)) {
18462306a36Sopenharmony_ci		pr_warn("unchecked MSR access error: RDMSR from 0x%x at rIP: 0x%lx (%pS)\n",
18562306a36Sopenharmony_ci			(unsigned int)regs->cx, regs->ip, (void *)regs->ip);
18662306a36Sopenharmony_ci		show_stack_regs(regs);
18762306a36Sopenharmony_ci	}
18862306a36Sopenharmony_ci
18962306a36Sopenharmony_ci	if (!wrmsr) {
19062306a36Sopenharmony_ci		/* Pretend that the read succeeded and returned 0. */
19162306a36Sopenharmony_ci		regs->ax = 0;
19262306a36Sopenharmony_ci		regs->dx = 0;
19362306a36Sopenharmony_ci	}
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	if (safe)
19662306a36Sopenharmony_ci		*pt_regs_nr(regs, reg) = -EIO;
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	return ex_handler_default(fixup, regs);
19962306a36Sopenharmony_ci}
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_cistatic bool ex_handler_clear_fs(const struct exception_table_entry *fixup,
20262306a36Sopenharmony_ci				struct pt_regs *regs)
20362306a36Sopenharmony_ci{
20462306a36Sopenharmony_ci	if (static_cpu_has(X86_BUG_NULL_SEG))
20562306a36Sopenharmony_ci		asm volatile ("mov %0, %%fs" : : "rm" (__USER_DS));
20662306a36Sopenharmony_ci	asm volatile ("mov %0, %%fs" : : "rm" (0));
20762306a36Sopenharmony_ci	return ex_handler_default(fixup, regs);
20862306a36Sopenharmony_ci}
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_cistatic bool ex_handler_imm_reg(const struct exception_table_entry *fixup,
21162306a36Sopenharmony_ci			       struct pt_regs *regs, int reg, int imm)
21262306a36Sopenharmony_ci{
21362306a36Sopenharmony_ci	*pt_regs_nr(regs, reg) = (long)imm;
21462306a36Sopenharmony_ci	return ex_handler_default(fixup, regs);
21562306a36Sopenharmony_ci}
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_cistatic bool ex_handler_ucopy_len(const struct exception_table_entry *fixup,
21862306a36Sopenharmony_ci				  struct pt_regs *regs, int trapnr,
21962306a36Sopenharmony_ci				  unsigned long fault_address,
22062306a36Sopenharmony_ci				  int reg, int imm)
22162306a36Sopenharmony_ci{
22262306a36Sopenharmony_ci	regs->cx = imm * regs->cx + *pt_regs_nr(regs, reg);
22362306a36Sopenharmony_ci	return ex_handler_uaccess(fixup, regs, trapnr, fault_address);
22462306a36Sopenharmony_ci}
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ciint ex_get_fixup_type(unsigned long ip)
22762306a36Sopenharmony_ci{
22862306a36Sopenharmony_ci	const struct exception_table_entry *e = search_exception_tables(ip);
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci	return e ? FIELD_GET(EX_DATA_TYPE_MASK, e->data) : EX_TYPE_NONE;
23162306a36Sopenharmony_ci}
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ciint fixup_exception(struct pt_regs *regs, int trapnr, unsigned long error_code,
23462306a36Sopenharmony_ci		    unsigned long fault_addr)
23562306a36Sopenharmony_ci{
23662306a36Sopenharmony_ci	const struct exception_table_entry *e;
23762306a36Sopenharmony_ci	int type, reg, imm;
23862306a36Sopenharmony_ci
23962306a36Sopenharmony_ci#ifdef CONFIG_PNPBIOS
24062306a36Sopenharmony_ci	if (unlikely(SEGMENT_IS_PNP_CODE(regs->cs))) {
24162306a36Sopenharmony_ci		extern u32 pnp_bios_fault_eip, pnp_bios_fault_esp;
24262306a36Sopenharmony_ci		extern u32 pnp_bios_is_utter_crap;
24362306a36Sopenharmony_ci		pnp_bios_is_utter_crap = 1;
24462306a36Sopenharmony_ci		printk(KERN_CRIT "PNPBIOS fault.. attempting recovery.\n");
24562306a36Sopenharmony_ci		__asm__ volatile(
24662306a36Sopenharmony_ci			"movl %0, %%esp\n\t"
24762306a36Sopenharmony_ci			"jmp *%1\n\t"
24862306a36Sopenharmony_ci			: : "g" (pnp_bios_fault_esp), "g" (pnp_bios_fault_eip));
24962306a36Sopenharmony_ci		panic("do_trap: can't hit this");
25062306a36Sopenharmony_ci	}
25162306a36Sopenharmony_ci#endif
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci	e = search_exception_tables(regs->ip);
25462306a36Sopenharmony_ci	if (!e)
25562306a36Sopenharmony_ci		return 0;
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci	type = FIELD_GET(EX_DATA_TYPE_MASK, e->data);
25862306a36Sopenharmony_ci	reg  = FIELD_GET(EX_DATA_REG_MASK,  e->data);
25962306a36Sopenharmony_ci	imm  = FIELD_GET(EX_DATA_IMM_MASK,  e->data);
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci	switch (type) {
26262306a36Sopenharmony_ci	case EX_TYPE_DEFAULT:
26362306a36Sopenharmony_ci	case EX_TYPE_DEFAULT_MCE_SAFE:
26462306a36Sopenharmony_ci		return ex_handler_default(e, regs);
26562306a36Sopenharmony_ci	case EX_TYPE_FAULT:
26662306a36Sopenharmony_ci	case EX_TYPE_FAULT_MCE_SAFE:
26762306a36Sopenharmony_ci		return ex_handler_fault(e, regs, trapnr);
26862306a36Sopenharmony_ci	case EX_TYPE_UACCESS:
26962306a36Sopenharmony_ci		return ex_handler_uaccess(e, regs, trapnr, fault_addr);
27062306a36Sopenharmony_ci	case EX_TYPE_COPY:
27162306a36Sopenharmony_ci		return ex_handler_copy(e, regs, trapnr);
27262306a36Sopenharmony_ci	case EX_TYPE_CLEAR_FS:
27362306a36Sopenharmony_ci		return ex_handler_clear_fs(e, regs);
27462306a36Sopenharmony_ci	case EX_TYPE_FPU_RESTORE:
27562306a36Sopenharmony_ci		return ex_handler_fprestore(e, regs);
27662306a36Sopenharmony_ci	case EX_TYPE_BPF:
27762306a36Sopenharmony_ci		return ex_handler_bpf(e, regs);
27862306a36Sopenharmony_ci	case EX_TYPE_WRMSR:
27962306a36Sopenharmony_ci		return ex_handler_msr(e, regs, true, false, reg);
28062306a36Sopenharmony_ci	case EX_TYPE_RDMSR:
28162306a36Sopenharmony_ci		return ex_handler_msr(e, regs, false, false, reg);
28262306a36Sopenharmony_ci	case EX_TYPE_WRMSR_SAFE:
28362306a36Sopenharmony_ci		return ex_handler_msr(e, regs, true, true, reg);
28462306a36Sopenharmony_ci	case EX_TYPE_RDMSR_SAFE:
28562306a36Sopenharmony_ci		return ex_handler_msr(e, regs, false, true, reg);
28662306a36Sopenharmony_ci	case EX_TYPE_WRMSR_IN_MCE:
28762306a36Sopenharmony_ci		ex_handler_msr_mce(regs, true);
28862306a36Sopenharmony_ci		break;
28962306a36Sopenharmony_ci	case EX_TYPE_RDMSR_IN_MCE:
29062306a36Sopenharmony_ci		ex_handler_msr_mce(regs, false);
29162306a36Sopenharmony_ci		break;
29262306a36Sopenharmony_ci	case EX_TYPE_POP_REG:
29362306a36Sopenharmony_ci		regs->sp += sizeof(long);
29462306a36Sopenharmony_ci		fallthrough;
29562306a36Sopenharmony_ci	case EX_TYPE_IMM_REG:
29662306a36Sopenharmony_ci		return ex_handler_imm_reg(e, regs, reg, imm);
29762306a36Sopenharmony_ci	case EX_TYPE_FAULT_SGX:
29862306a36Sopenharmony_ci		return ex_handler_sgx(e, regs, trapnr);
29962306a36Sopenharmony_ci	case EX_TYPE_UCOPY_LEN:
30062306a36Sopenharmony_ci		return ex_handler_ucopy_len(e, regs, trapnr, fault_addr, reg, imm);
30162306a36Sopenharmony_ci	case EX_TYPE_ZEROPAD:
30262306a36Sopenharmony_ci		return ex_handler_zeropad(e, regs, fault_addr);
30362306a36Sopenharmony_ci	}
30462306a36Sopenharmony_ci	BUG();
30562306a36Sopenharmony_ci}
30662306a36Sopenharmony_ci
30762306a36Sopenharmony_ciextern unsigned int early_recursion_flag;
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci/* Restricted version used during very early boot */
31062306a36Sopenharmony_civoid __init early_fixup_exception(struct pt_regs *regs, int trapnr)
31162306a36Sopenharmony_ci{
31262306a36Sopenharmony_ci	/* Ignore early NMIs. */
31362306a36Sopenharmony_ci	if (trapnr == X86_TRAP_NMI)
31462306a36Sopenharmony_ci		return;
31562306a36Sopenharmony_ci
31662306a36Sopenharmony_ci	if (early_recursion_flag > 2)
31762306a36Sopenharmony_ci		goto halt_loop;
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci	/*
32062306a36Sopenharmony_ci	 * Old CPUs leave the high bits of CS on the stack
32162306a36Sopenharmony_ci	 * undefined.  I'm not sure which CPUs do this, but at least
32262306a36Sopenharmony_ci	 * the 486 DX works this way.
32362306a36Sopenharmony_ci	 * Xen pv domains are not using the default __KERNEL_CS.
32462306a36Sopenharmony_ci	 */
32562306a36Sopenharmony_ci	if (!xen_pv_domain() && regs->cs != __KERNEL_CS)
32662306a36Sopenharmony_ci		goto fail;
32762306a36Sopenharmony_ci
32862306a36Sopenharmony_ci	/*
32962306a36Sopenharmony_ci	 * The full exception fixup machinery is available as soon as
33062306a36Sopenharmony_ci	 * the early IDT is loaded.  This means that it is the
33162306a36Sopenharmony_ci	 * responsibility of extable users to either function correctly
33262306a36Sopenharmony_ci	 * when handlers are invoked early or to simply avoid causing
33362306a36Sopenharmony_ci	 * exceptions before they're ready to handle them.
33462306a36Sopenharmony_ci	 *
33562306a36Sopenharmony_ci	 * This is better than filtering which handlers can be used,
33662306a36Sopenharmony_ci	 * because refusing to call a handler here is guaranteed to
33762306a36Sopenharmony_ci	 * result in a hard-to-debug panic.
33862306a36Sopenharmony_ci	 *
33962306a36Sopenharmony_ci	 * Keep in mind that not all vectors actually get here.  Early
34062306a36Sopenharmony_ci	 * page faults, for example, are special.
34162306a36Sopenharmony_ci	 */
34262306a36Sopenharmony_ci	if (fixup_exception(regs, trapnr, regs->orig_ax, 0))
34362306a36Sopenharmony_ci		return;
34462306a36Sopenharmony_ci
34562306a36Sopenharmony_ci	if (trapnr == X86_TRAP_UD) {
34662306a36Sopenharmony_ci		if (report_bug(regs->ip, regs) == BUG_TRAP_TYPE_WARN) {
34762306a36Sopenharmony_ci			/* Skip the ud2. */
34862306a36Sopenharmony_ci			regs->ip += LEN_UD2;
34962306a36Sopenharmony_ci			return;
35062306a36Sopenharmony_ci		}
35162306a36Sopenharmony_ci
35262306a36Sopenharmony_ci		/*
35362306a36Sopenharmony_ci		 * If this was a BUG and report_bug returns or if this
35462306a36Sopenharmony_ci		 * was just a normal #UD, we want to continue onward and
35562306a36Sopenharmony_ci		 * crash.
35662306a36Sopenharmony_ci		 */
35762306a36Sopenharmony_ci	}
35862306a36Sopenharmony_ci
35962306a36Sopenharmony_cifail:
36062306a36Sopenharmony_ci	early_printk("PANIC: early exception 0x%02x IP %lx:%lx error %lx cr2 0x%lx\n",
36162306a36Sopenharmony_ci		     (unsigned)trapnr, (unsigned long)regs->cs, regs->ip,
36262306a36Sopenharmony_ci		     regs->orig_ax, read_cr2());
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_ci	show_regs(regs);
36562306a36Sopenharmony_ci
36662306a36Sopenharmony_cihalt_loop:
36762306a36Sopenharmony_ci	while (true)
36862306a36Sopenharmony_ci		halt();
36962306a36Sopenharmony_ci}
370