2 * arch/alpha/kernel/traps.c
4 * (C) Copyright 1994 Linus Torvalds
8 * This file initializes the trap entry points
11 #include <linux/config.h>
13 #include <linux/sched.h>
14 #include <linux/tty.h>
15 #include <linux/delay.h>
16 #include <linux/smp_lock.h>
17 #include <linux/module.h>
19 #include <asm/gentrap.h>
20 #include <asm/uaccess.h>
21 #include <asm/unaligned.h>
22 #include <asm/sysinfo.h>
23 #include <asm/hwrpb.h>
24 #include <asm/mmu_context.h>
28 /* data/code implementing a work-around for some SRMs which
29 mishandle opDEC faults
31 static int opDEC_testing
= 0;
32 static int opDEC_fix
= 0;
33 static int opDEC_checked
= 0;
34 static unsigned long opDEC_test_pc
= 0;
39 unsigned long test_pc
;
41 if (opDEC_checked
) return;
50 " cvttq/svm $f31,$f31\n"
51 : "=&r"(test_pc
), "=m"(opDEC_test_pc
)
60 dik_show_regs(struct pt_regs
*regs
, unsigned long *r9_15
)
62 printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx %s\n",
63 regs
->pc
, regs
->r26
, regs
->ps
, print_tainted());
64 printk("v0 = %016lx t0 = %016lx t1 = %016lx\n",
65 regs
->r0
, regs
->r1
, regs
->r2
);
66 printk("t2 = %016lx t3 = %016lx t4 = %016lx\n",
67 regs
->r3
, regs
->r4
, regs
->r5
);
68 printk("t5 = %016lx t6 = %016lx t7 = %016lx\n",
69 regs
->r6
, regs
->r7
, regs
->r8
);
72 printk("s0 = %016lx s1 = %016lx s2 = %016lx\n",
73 r9_15
[9], r9_15
[10], r9_15
[11]);
74 printk("s3 = %016lx s4 = %016lx s5 = %016lx\n",
75 r9_15
[12], r9_15
[13], r9_15
[14]);
76 printk("s6 = %016lx\n", r9_15
[15]);
79 printk("a0 = %016lx a1 = %016lx a2 = %016lx\n",
80 regs
->r16
, regs
->r17
, regs
->r18
);
81 printk("a3 = %016lx a4 = %016lx a5 = %016lx\n",
82 regs
->r19
, regs
->r20
, regs
->r21
);
83 printk("t8 = %016lx t9 = %016lx t10= %016lx\n",
84 regs
->r22
, regs
->r23
, regs
->r24
);
85 printk("t11= %016lx pv = %016lx at = %016lx\n",
86 regs
->r25
, regs
->r27
, regs
->r28
);
87 printk("gp = %016lx sp = %p\n", regs
->gp
, regs
+1);
94 static char * ireg_name
[] = {"v0", "t0", "t1", "t2", "t3", "t4", "t5", "t6",
95 "t7", "s0", "s1", "s2", "s3", "s4", "s5", "s6",
96 "a0", "a1", "a2", "a3", "a4", "a5", "t8", "t9",
97 "t10", "t11", "ra", "pv", "at", "gp", "sp", "zero"};
101 dik_show_code(unsigned int *pc
)
106 for (i
= -6; i
< 2; i
++) {
108 if (__get_user(insn
, pc
+i
))
110 printk("%c%08x%c", i
? ' ' : '<', insn
, i
? ' ' : '>');
116 dik_show_trace(unsigned long *sp
)
120 while (0x1ff8 & (unsigned long) sp
) {
121 extern char _stext
[], _etext
[];
122 unsigned long tmp
= *sp
;
124 if (tmp
< (unsigned long) &_stext
)
126 if (tmp
>= (unsigned long) &_etext
)
128 printk("%lx%c", tmp
, ' ');
137 void show_trace_task(struct task_struct
* tsk
)
139 struct thread_info
*ti
= tsk
->thread_info
;
140 unsigned long fp
, sp
= ti
->pcb
.ksp
, base
= (unsigned long) ti
;
142 if (sp
> base
&& sp
+6*8 < base
+ 16*1024) {
143 fp
= ((unsigned long*)sp
)[6];
144 if (fp
> sp
&& fp
< base
+ 16*1024)
145 dik_show_trace((unsigned long *)fp
);
149 static int kstack_depth_to_print
= 24;
151 void show_stack(unsigned long *sp
)
153 unsigned long *stack
;
157 * debugging aid: "show_stack(NULL);" prints the
158 * back trace for this cpu.
161 sp
=(unsigned long*)&sp
;
164 for(i
=0; i
< kstack_depth_to_print
; i
++) {
165 if (((long) stack
& (THREAD_SIZE
-1)) == 0)
167 if (i
&& ((i
% 4) == 0))
169 printk("%016lx ", *stack
++);
175 void dump_stack(void)
181 die_if_kernel(char * str
, struct pt_regs
*regs
, long err
, unsigned long *r9_15
)
186 printk("CPU %d ", hard_smp_processor_id());
188 printk("%s(%d): %s %ld\n", current
->comm
, current
->pid
, str
, err
);
189 dik_show_regs(regs
, r9_15
);
190 dik_show_trace((unsigned long *)(regs
+1));
191 dik_show_code((unsigned int *)regs
->pc
);
193 if (test_and_set_thread_flag (TIF_DIE_IF_KERNEL
)) {
194 printk("die_if_kernel recursion detected.\n");
201 #ifndef CONFIG_MATHEMU
202 static long dummy_emul(void) { return 0; }
203 long (*alpha_fp_emul_imprecise
)(struct pt_regs
*regs
, unsigned long writemask
)
204 = (void *)dummy_emul
;
205 long (*alpha_fp_emul
) (unsigned long pc
)
206 = (void *)dummy_emul
;
208 long alpha_fp_emul_imprecise(struct pt_regs
*regs
, unsigned long writemask
);
209 long alpha_fp_emul (unsigned long pc
);
213 do_entArith(unsigned long summary
, unsigned long write_mask
,
214 struct pt_regs
*regs
)
216 long si_code
= FPE_FLTINV
;
220 /* Software-completion summary bit is set, so try to
221 emulate the instruction. If the processor supports
222 precise exceptions, we don't have to search. */
223 if (!amask(AMASK_PRECISE_TRAP
))
224 si_code
= alpha_fp_emul(regs
->pc
- 4);
226 si_code
= alpha_fp_emul_imprecise(regs
, write_mask
);
230 die_if_kernel("Arithmetic fault", regs
, 0, 0);
232 info
.si_signo
= SIGFPE
;
234 info
.si_code
= si_code
;
235 info
.si_addr
= (void *) regs
->pc
;
236 send_sig_info(SIGFPE
, &info
, current
);
240 do_entIF(unsigned long type
, struct pt_regs
*regs
)
245 if (!opDEC_testing
|| type
!= 4) {
247 const unsigned int *data
248 = (const unsigned int *) regs
->pc
;
249 printk("Kernel bug at %s:%d\n",
250 (const char *)(data
[1] | (long)data
[2] << 32),
253 die_if_kernel((type
== 1 ? "Kernel Bug" : "Instruction fault"),
258 case 0: /* breakpoint */
259 info
.si_signo
= SIGTRAP
;
261 info
.si_code
= TRAP_BRKPT
;
263 info
.si_addr
= (void *) regs
->pc
;
265 if (ptrace_cancel_bpt(current
)) {
266 regs
->pc
-= 4; /* make pc point to former bpt */
269 send_sig_info(SIGTRAP
, &info
, current
);
272 case 1: /* bugcheck */
273 info
.si_signo
= SIGTRAP
;
275 info
.si_code
= __SI_FAULT
;
276 info
.si_addr
= (void *) regs
->pc
;
278 send_sig_info(SIGTRAP
, &info
, current
);
281 case 2: /* gentrap */
282 info
.si_addr
= (void *) regs
->pc
;
283 info
.si_trapno
= regs
->r16
;
284 switch ((long) regs
->r16
) {
341 info
.si_signo
= signo
;
344 info
.si_addr
= (void *) regs
->pc
;
345 send_sig_info(signo
, &info
, current
);
349 if (implver() == IMPLVER_EV4
) {
352 /* The some versions of SRM do not handle
353 the opDEC properly - they return the PC of the
354 opDEC fault, not the instruction after as the
355 Alpha architecture requires. Here we fix it up.
356 We do this by intentionally causing an opDEC
357 fault during the boot sequence and testing if
358 we get the correct PC. If not, we set a flag
359 to correct it every time through. */
361 if (regs
->pc
== opDEC_test_pc
) {
364 printk("opDEC fixup enabled.\n");
368 regs
->pc
+= opDEC_fix
;
370 /* EV4 does not implement anything except normal
371 rounding. Everything else will come here as
372 an illegal instruction. Emulate them. */
373 si_code
= alpha_fp_emul(regs
->pc
- 4);
377 info
.si_signo
= SIGFPE
;
379 info
.si_code
= si_code
;
380 info
.si_addr
= (void *) regs
->pc
;
381 send_sig_info(SIGFPE
, &info
, current
);
387 case 3: /* FEN fault */
388 /* Irritating users can call PAL_clrfen to disable the
389 FPU for the process. The kernel will then trap in
390 do_switch_stack and undo_switch_stack when we try
391 to save and restore the FP registers.
393 Given that GCC by default generates code that uses the
394 FP registers, PAL_clrfen is not useful except for DoS
395 attacks. So turn the bleeding FPU back on and be done
397 current_thread_info()->pcb
.flags
|= 1;
398 __reload_thread(¤t_thread_info()->pcb
);
402 default: /* unexpected instruction-fault type */
406 info
.si_signo
= SIGILL
;
408 info
.si_code
= ILL_ILLOPC
;
409 info
.si_addr
= (void *) regs
->pc
;
410 send_sig_info(SIGILL
, &info
, current
);
413 /* There is an ifdef in the PALcode in MILO that enables a
414 "kernel debugging entry point" as an unpriviledged call_pal.
416 We don't want to have anything to do with it, but unfortunately
417 several versions of MILO included in distributions have it enabled,
418 and if we don't put something on the entry point we'll oops. */
421 do_entDbg(struct pt_regs
*regs
)
425 die_if_kernel("Instruction fault", regs
, 0, 0);
427 info
.si_signo
= SIGILL
;
429 info
.si_code
= ILL_ILLOPC
;
430 info
.si_addr
= (void *) regs
->pc
;
431 force_sig_info(SIGILL
, &info
, current
);
436 * entUna has a different register layout to be reasonably simple. It
437 * needs access to all the integer registers (the kernel doesn't use
438 * fp-regs), and it needs to have them in order for simpler access.
440 * Due to the non-standard register layout (and because we don't want
441 * to handle floating-point regs), user-mode unaligned accesses are
442 * handled separately by do_entUnaUser below.
444 * Oh, btw, we don't handle the "gp" register correctly, but if we fault
445 * on a gp-register unaligned load/store, something is _very_ wrong
446 * in the kernel anyway..
449 unsigned long regs
[32];
450 unsigned long ps
, pc
, gp
, a0
, a1
, a2
;
453 struct unaligned_stat
{
454 unsigned long count
, va
, pc
;
458 /* Macro for exception fixup code to access integer registers. */
459 #define una_reg(r) (regs.regs[(r) >= 16 && (r) <= 18 ? (r)+19 : (r)])
463 do_entUna(void * va
, unsigned long opcode
, unsigned long reg
,
464 unsigned long a3
, unsigned long a4
, unsigned long a5
,
467 long error
, tmp1
, tmp2
, tmp3
, tmp4
;
468 unsigned long pc
= regs
.pc
- 4;
469 const struct exception_table_entry
*fixup
;
471 unaligned
[0].count
++;
472 unaligned
[0].va
= (unsigned long) va
;
473 unaligned
[0].pc
= pc
;
475 /* We don't want to use the generic get/put unaligned macros as
476 we want to trap exceptions. Only if we actually get an
477 exception will we decide whether we should have caught it. */
480 case 0x0c: /* ldwu */
481 __asm__
__volatile__(
482 "1: ldq_u %1,0(%3)\n"
483 "2: ldq_u %2,1(%3)\n"
487 ".section __ex_table,\"a\"\n"
489 " lda %1,3b-1b(%0)\n"
491 " lda %2,3b-2b(%0)\n"
493 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
497 una_reg(reg
) = tmp1
|tmp2
;
501 __asm__
__volatile__(
502 "1: ldq_u %1,0(%3)\n"
503 "2: ldq_u %2,3(%3)\n"
507 ".section __ex_table,\"a\"\n"
509 " lda %1,3b-1b(%0)\n"
511 " lda %2,3b-2b(%0)\n"
513 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
517 una_reg(reg
) = (int)(tmp1
|tmp2
);
521 __asm__
__volatile__(
522 "1: ldq_u %1,0(%3)\n"
523 "2: ldq_u %2,7(%3)\n"
527 ".section __ex_table,\"a\"\n"
529 " lda %1,3b-1b(%0)\n"
531 " lda %2,3b-2b(%0)\n"
533 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
537 una_reg(reg
) = tmp1
|tmp2
;
540 /* Note that the store sequences do not indicate that they change
541 memory because it _should_ be affecting nothing in this context.
542 (Otherwise we have other, much larger, problems.) */
544 __asm__
__volatile__(
545 "1: ldq_u %2,1(%5)\n"
546 "2: ldq_u %1,0(%5)\n"
553 "3: stq_u %2,1(%5)\n"
554 "4: stq_u %1,0(%5)\n"
556 ".section __ex_table,\"a\"\n"
558 " lda %2,5b-1b(%0)\n"
560 " lda %1,5b-2b(%0)\n"
562 " lda $31,5b-3b(%0)\n"
564 " lda $31,5b-4b(%0)\n"
566 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
),
567 "=&r"(tmp3
), "=&r"(tmp4
)
568 : "r"(va
), "r"(una_reg(reg
)), "0"(0));
574 __asm__
__volatile__(
575 "1: ldq_u %2,3(%5)\n"
576 "2: ldq_u %1,0(%5)\n"
583 "3: stq_u %2,3(%5)\n"
584 "4: stq_u %1,0(%5)\n"
586 ".section __ex_table,\"a\"\n"
588 " lda %2,5b-1b(%0)\n"
590 " lda %1,5b-2b(%0)\n"
592 " lda $31,5b-3b(%0)\n"
594 " lda $31,5b-4b(%0)\n"
596 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
),
597 "=&r"(tmp3
), "=&r"(tmp4
)
598 : "r"(va
), "r"(una_reg(reg
)), "0"(0));
604 __asm__
__volatile__(
605 "1: ldq_u %2,7(%5)\n"
606 "2: ldq_u %1,0(%5)\n"
613 "3: stq_u %2,7(%5)\n"
614 "4: stq_u %1,0(%5)\n"
616 ".section __ex_table,\"a\"\n\t"
618 " lda %2,5b-1b(%0)\n"
620 " lda %1,5b-2b(%0)\n"
622 " lda $31,5b-3b(%0)\n"
624 " lda $31,5b-4b(%0)\n"
626 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
),
627 "=&r"(tmp3
), "=&r"(tmp4
)
628 : "r"(va
), "r"(una_reg(reg
)), "0"(0));
635 printk("Bad unaligned kernel access at %016lx: %p %lx %ld\n",
636 pc
, va
, opcode
, reg
);
640 /* Ok, we caught the exception, but we don't want it. Is there
641 someone to pass it along to? */
642 if ((fixup
= search_exception_tables(pc
)) != 0) {
644 newpc
= fixup_exception(una_reg
, fixup
, pc
);
646 printk("Forwarding unaligned exception at %lx (%lx)\n",
654 * Yikes! No one to forward the exception to.
655 * Since the registers are in a weird format, dump them ourselves.
659 printk("%s(%d): unhandled unaligned exception\n",
660 current
->comm
, current
->pid
);
662 printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx\n",
663 pc
, una_reg(26), regs
.ps
);
664 printk("r0 = %016lx r1 = %016lx r2 = %016lx\n",
665 una_reg(0), una_reg(1), una_reg(2));
666 printk("r3 = %016lx r4 = %016lx r5 = %016lx\n",
667 una_reg(3), una_reg(4), una_reg(5));
668 printk("r6 = %016lx r7 = %016lx r8 = %016lx\n",
669 una_reg(6), una_reg(7), una_reg(8));
670 printk("r9 = %016lx r10= %016lx r11= %016lx\n",
671 una_reg(9), una_reg(10), una_reg(11));
672 printk("r12= %016lx r13= %016lx r14= %016lx\n",
673 una_reg(12), una_reg(13), una_reg(14));
674 printk("r15= %016lx\n", una_reg(15));
675 printk("r16= %016lx r17= %016lx r18= %016lx\n",
676 una_reg(16), una_reg(17), una_reg(18));
677 printk("r19= %016lx r20= %016lx r21= %016lx\n",
678 una_reg(19), una_reg(20), una_reg(21));
679 printk("r22= %016lx r23= %016lx r24= %016lx\n",
680 una_reg(22), una_reg(23), una_reg(24));
681 printk("r25= %016lx r27= %016lx r28= %016lx\n",
682 una_reg(25), una_reg(27), una_reg(28));
683 printk("gp = %016lx sp = %p\n", regs
.gp
, ®s
+1);
685 dik_show_code((unsigned int *)pc
);
686 dik_show_trace((unsigned long *)(®s
+1));
688 if (test_and_set_thread_flag (TIF_DIE_IF_KERNEL
)) {
689 printk("die_if_kernel recursion detected.\n");
697 * Convert an s-floating point value in memory format to the
698 * corresponding value in register format. The exponent
699 * needs to be remapped to preserve non-finite values
700 * (infinities, not-a-numbers, denormals).
702 static inline unsigned long
703 s_mem_to_reg (unsigned long s_mem
)
705 unsigned long frac
= (s_mem
>> 0) & 0x7fffff;
706 unsigned long sign
= (s_mem
>> 31) & 0x1;
707 unsigned long exp_msb
= (s_mem
>> 30) & 0x1;
708 unsigned long exp_low
= (s_mem
>> 23) & 0x7f;
711 exp
= (exp_msb
<< 10) | exp_low
; /* common case */
713 if (exp_low
== 0x7f) {
717 if (exp_low
== 0x00) {
723 return (sign
<< 63) | (exp
<< 52) | (frac
<< 29);
727 * Convert an s-floating point value in register format to the
728 * corresponding value in memory format.
730 static inline unsigned long
731 s_reg_to_mem (unsigned long s_reg
)
733 return ((s_reg
>> 62) << 30) | ((s_reg
<< 5) >> 34);
737 * Handle user-level unaligned fault. Handling user-level unaligned
738 * faults is *extremely* slow and produces nasty messages. A user
739 * program *should* fix unaligned faults ASAP.
741 * Notice that we have (almost) the regular kernel stack layout here,
742 * so finding the appropriate registers is a little more difficult
743 * than in the kernel case.
745 * Finally, we handle regular integer load/stores only. In
746 * particular, load-linked/store-conditionally and floating point
747 * load/stores are not supported. The former make no sense with
748 * unaligned faults (they are guaranteed to fail) and I don't think
749 * the latter will occur in any decent program.
751 * Sigh. We *do* have to handle some FP operations, because GCC will
752 * uses them as temporary storage for integer memory to memory copies.
753 * However, we need to deal with stt/ldt and sts/lds only.
756 #define OP_INT_MASK ( 1L << 0x28 | 1L << 0x2c /* ldl stl */ \
757 | 1L << 0x29 | 1L << 0x2d /* ldq stq */ \
758 | 1L << 0x0c | 1L << 0x0d /* ldwu stw */ \
759 | 1L << 0x0a | 1L << 0x0e ) /* ldbu stb */
761 #define OP_WRITE_MASK ( 1L << 0x26 | 1L << 0x27 /* sts stt */ \
762 | 1L << 0x2c | 1L << 0x2d /* stl stq */ \
763 | 1L << 0x0d | 1L << 0x0e ) /* stw stb */
765 #define R(x) ((size_t) &((struct pt_regs *)0)->x)
767 static int unauser_reg_offsets
[32] = {
768 R(r0
), R(r1
), R(r2
), R(r3
), R(r4
), R(r5
), R(r6
), R(r7
), R(r8
),
769 /* r9 ... r15 are stored in front of regs. */
770 -56, -48, -40, -32, -24, -16, -8,
771 R(r16
), R(r17
), R(r18
),
772 R(r19
), R(r20
), R(r21
), R(r22
), R(r23
), R(r24
), R(r25
), R(r26
),
773 R(r27
), R(r28
), R(gp
),
780 do_entUnaUser(void * va
, unsigned long opcode
,
781 unsigned long reg
, struct pt_regs
*regs
)
784 static long last_time
= 0;
786 unsigned long tmp1
, tmp2
, tmp3
, tmp4
;
787 unsigned long fake_reg
, *reg_addr
= &fake_reg
;
791 /* Check the UAC bits to decide what the user wants us to do
792 with the unaliged access. */
794 if (!test_thread_flag (TIF_UAC_NOPRINT
)) {
795 if (cnt
>= 5 && jiffies
- last_time
> 5*HZ
) {
799 printk("%s(%d): unaligned trap at %016lx: %p %lx %ld\n",
800 current
->comm
, current
->pid
,
801 regs
->pc
- 4, va
, opcode
, reg
);
805 if (test_thread_flag (TIF_UAC_SIGBUS
))
807 /* Not sure why you'd want to use this, but... */
808 if (test_thread_flag (TIF_UAC_NOFIX
))
811 /* Don't bother reading ds in the access check since we already
812 know that this came from the user. Also rely on the fact that
813 the page at TASK_SIZE is unmapped and so can't be touched anyway. */
814 if (!__access_ok((unsigned long)va
, 0, USER_DS
))
817 ++unaligned
[1].count
;
818 unaligned
[1].va
= (unsigned long)va
;
819 unaligned
[1].pc
= regs
->pc
- 4;
821 if ((1L << opcode
) & OP_INT_MASK
) {
822 /* it's an integer load/store */
824 reg_addr
= (unsigned long *)
825 ((char *)regs
+ unauser_reg_offsets
[reg
]);
826 } else if (reg
== 30) {
827 /* usp in PAL regs */
830 /* zero "register" */
835 /* We don't want to use the generic get/put unaligned macros as
836 we want to trap exceptions. Only if we actually get an
837 exception will we decide whether we should have caught it. */
840 case 0x0c: /* ldwu */
841 __asm__
__volatile__(
842 "1: ldq_u %1,0(%3)\n"
843 "2: ldq_u %2,1(%3)\n"
847 ".section __ex_table,\"a\"\n"
849 " lda %1,3b-1b(%0)\n"
851 " lda %2,3b-2b(%0)\n"
853 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
857 *reg_addr
= tmp1
|tmp2
;
861 __asm__
__volatile__(
862 "1: ldq_u %1,0(%3)\n"
863 "2: ldq_u %2,3(%3)\n"
867 ".section __ex_table,\"a\"\n"
869 " lda %1,3b-1b(%0)\n"
871 " lda %2,3b-2b(%0)\n"
873 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
877 alpha_write_fp_reg(reg
, s_mem_to_reg((int)(tmp1
|tmp2
)));
881 __asm__
__volatile__(
882 "1: ldq_u %1,0(%3)\n"
883 "2: ldq_u %2,7(%3)\n"
887 ".section __ex_table,\"a\"\n"
889 " lda %1,3b-1b(%0)\n"
891 " lda %2,3b-2b(%0)\n"
893 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
897 alpha_write_fp_reg(reg
, tmp1
|tmp2
);
901 __asm__
__volatile__(
902 "1: ldq_u %1,0(%3)\n"
903 "2: ldq_u %2,3(%3)\n"
907 ".section __ex_table,\"a\"\n"
909 " lda %1,3b-1b(%0)\n"
911 " lda %2,3b-2b(%0)\n"
913 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
917 *reg_addr
= (int)(tmp1
|tmp2
);
921 __asm__
__volatile__(
922 "1: ldq_u %1,0(%3)\n"
923 "2: ldq_u %2,7(%3)\n"
927 ".section __ex_table,\"a\"\n"
929 " lda %1,3b-1b(%0)\n"
931 " lda %2,3b-2b(%0)\n"
933 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
)
937 *reg_addr
= tmp1
|tmp2
;
940 /* Note that the store sequences do not indicate that they change
941 memory because it _should_ be affecting nothing in this context.
942 (Otherwise we have other, much larger, problems.) */
944 __asm__
__volatile__(
945 "1: ldq_u %2,1(%5)\n"
946 "2: ldq_u %1,0(%5)\n"
953 "3: stq_u %2,1(%5)\n"
954 "4: stq_u %1,0(%5)\n"
956 ".section __ex_table,\"a\"\n"
958 " lda %2,5b-1b(%0)\n"
960 " lda %1,5b-2b(%0)\n"
962 " lda $31,5b-3b(%0)\n"
964 " lda $31,5b-4b(%0)\n"
966 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
),
967 "=&r"(tmp3
), "=&r"(tmp4
)
968 : "r"(va
), "r"(*reg_addr
), "0"(0));
974 fake_reg
= s_reg_to_mem(alpha_read_fp_reg(reg
));
978 __asm__
__volatile__(
979 "1: ldq_u %2,3(%5)\n"
980 "2: ldq_u %1,0(%5)\n"
987 "3: stq_u %2,3(%5)\n"
988 "4: stq_u %1,0(%5)\n"
990 ".section __ex_table,\"a\"\n"
992 " lda %2,5b-1b(%0)\n"
994 " lda %1,5b-2b(%0)\n"
996 " lda $31,5b-3b(%0)\n"
998 " lda $31,5b-4b(%0)\n"
1000 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
),
1001 "=&r"(tmp3
), "=&r"(tmp4
)
1002 : "r"(va
), "r"(*reg_addr
), "0"(0));
1007 case 0x27: /* stt */
1008 fake_reg
= alpha_read_fp_reg(reg
);
1011 case 0x2d: /* stq */
1012 __asm__
__volatile__(
1013 "1: ldq_u %2,7(%5)\n"
1014 "2: ldq_u %1,0(%5)\n"
1021 "3: stq_u %2,7(%5)\n"
1022 "4: stq_u %1,0(%5)\n"
1024 ".section __ex_table,\"a\"\n\t"
1026 " lda %2,5b-1b(%0)\n"
1028 " lda %1,5b-2b(%0)\n"
1030 " lda $31,5b-3b(%0)\n"
1032 " lda $31,5b-4b(%0)\n"
1034 : "=r"(error
), "=&r"(tmp1
), "=&r"(tmp2
),
1035 "=&r"(tmp3
), "=&r"(tmp4
)
1036 : "r"(va
), "r"(*reg_addr
), "0"(0));
1042 /* What instruction were you trying to use, exactly? */
1046 /* Only integer loads should get here; everyone else returns early. */
1052 regs
->pc
-= 4; /* make pc point to faulting insn */
1053 info
.si_signo
= SIGSEGV
;
1056 /* We need to replicate some of the logic in mm/fault.c,
1057 since we don't have access to the fault code in the
1058 exception handling return path. */
1059 if (!__access_ok((unsigned long)va
, 0, USER_DS
))
1060 info
.si_code
= SEGV_ACCERR
;
1062 struct mm_struct
*mm
= current
->mm
;
1063 down_read(&mm
->mmap_sem
);
1064 if (find_vma(mm
, (unsigned long)va
))
1065 info
.si_code
= SEGV_ACCERR
;
1067 info
.si_code
= SEGV_MAPERR
;
1068 up_read(&mm
->mmap_sem
);
1071 send_sig_info(SIGSEGV
, &info
, current
);
1076 info
.si_signo
= SIGBUS
;
1078 info
.si_code
= BUS_ADRALN
;
1080 send_sig_info(SIGBUS
, &info
, current
);
1087 /* Tell PAL-code what global pointer we want in the kernel. */
1088 register unsigned long gptr
__asm__("$29");
1098 /* Hack for Multia (UDB) and JENSEN: some of their SRMs have
1099 a bug in the handling of the opDEC fault. Fix it up if so. */
1100 if (implver() == IMPLVER_EV4
)