2 * arch/alpha/kernel/traps.c
4 * (C) Copyright 1994 Linus Torvalds
8 * This file initializes the trap entry points
11 #include <linux/jiffies.h>
13 #include <linux/sched.h>
14 #include <linux/tty.h>
15 #include <linux/delay.h>
16 #include <linux/module.h>
17 #include <linux/init.h>
18 #include <linux/kallsyms.h>
19 #include <linux/ratelimit.h>
21 #include <asm/gentrap.h>
22 #include <asm/uaccess.h>
23 #include <asm/unaligned.h>
24 #include <asm/sysinfo.h>
25 #include <asm/hwrpb.h>
26 #include <asm/mmu_context.h>
27 #include <asm/special_insns.h>
31 /* Work-around for some SRMs which mishandle opDEC faults. */
38 __asm__ __volatile__ (
39 /* Load the address of... */
41 /* A stub instruction fault handler. Just add 4 to the
47 /* Install the instruction fault handler. */
49 " call_pal %[wrent]\n"
50 /* With that in place, the fault from the round-to-minf fp
51 insn will arrive either at the "lda 4" insn (bad) or one
52 past that (good). This places the correct fixup in %0. */
54 " cvttq/svm $f31,$f31\n"
56 : [fix] "=r" (opDEC_fix)
57 : [rti] "n" (PAL_rti), [wrent] "n" (PAL_wrent)
58 : "$0", "$1", "$16", "$17", "$22", "$23", "$24", "$25");
61 printk("opDEC fixup enabled.\n");
65 dik_show_regs(struct pt_regs *regs, unsigned long *r9_15)
67 printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx %s\n",
68 regs->pc, regs->r26, regs->ps, print_tainted());
69 print_symbol("pc is at %s\n", regs->pc);
70 print_symbol("ra is at %s\n", regs->r26 );
71 printk("v0 = %016lx t0 = %016lx t1 = %016lx\n",
72 regs->r0, regs->r1, regs->r2);
73 printk("t2 = %016lx t3 = %016lx t4 = %016lx\n",
74 regs->r3, regs->r4, regs->r5);
75 printk("t5 = %016lx t6 = %016lx t7 = %016lx\n",
76 regs->r6, regs->r7, regs->r8);
79 printk("s0 = %016lx s1 = %016lx s2 = %016lx\n",
80 r9_15[9], r9_15[10], r9_15[11]);
81 printk("s3 = %016lx s4 = %016lx s5 = %016lx\n",
82 r9_15[12], r9_15[13], r9_15[14]);
83 printk("s6 = %016lx\n", r9_15[15]);
86 printk("a0 = %016lx a1 = %016lx a2 = %016lx\n",
87 regs->r16, regs->r17, regs->r18);
88 printk("a3 = %016lx a4 = %016lx a5 = %016lx\n",
89 regs->r19, regs->r20, regs->r21);
90 printk("t8 = %016lx t9 = %016lx t10= %016lx\n",
91 regs->r22, regs->r23, regs->r24);
92 printk("t11= %016lx pv = %016lx at = %016lx\n",
93 regs->r25, regs->r27, regs->r28);
94 printk("gp = %016lx sp = %p\n", regs->gp, regs+1);
101 static char * ireg_name[] = {"v0", "t0", "t1", "t2", "t3", "t4", "t5", "t6",
102 "t7", "s0", "s1", "s2", "s3", "s4", "s5", "s6",
103 "a0", "a1", "a2", "a3", "a4", "a5", "t8", "t9",
104 "t10", "t11", "ra", "pv", "at", "gp", "sp", "zero"};
108 dik_show_code(unsigned int *pc)
113 for (i = -6; i < 2; i++) {
115 if (__get_user(insn, (unsigned int __user *)pc + i))
117 printk("%c%08x%c", i ? ' ' : '<', insn, i ? ' ' : '>');
123 dik_show_trace(unsigned long *sp)
127 while (0x1ff8 & (unsigned long) sp) {
128 extern char _stext[], _etext[];
129 unsigned long tmp = *sp;
131 if (tmp < (unsigned long) &_stext)
133 if (tmp >= (unsigned long) &_etext)
135 printk("[<%lx>]", tmp);
136 print_symbol(" %s", tmp);
146 static int kstack_depth_to_print = 24;
148 void show_stack(struct task_struct *task, unsigned long *sp)
150 unsigned long *stack;
154 * debugging aid: "show_stack(NULL);" prints the
155 * back trace for this cpu.
158 sp=(unsigned long*)&sp;
161 for(i=0; i < kstack_depth_to_print; i++) {
162 if (((long) stack & (THREAD_SIZE-1)) == 0)
164 if (i && ((i % 4) == 0))
166 printk("%016lx ", *stack++);
173 die_if_kernel(char * str, struct pt_regs *regs, long err, unsigned long *r9_15)
178 printk("CPU %d ", hard_smp_processor_id());
180 printk("%s(%d): %s %ld\n", current->comm, task_pid_nr(current), str, err);
181 dik_show_regs(regs, r9_15);
182 add_taint(TAINT_DIE, LOCKDEP_NOW_UNRELIABLE);
183 dik_show_trace((unsigned long *)(regs+1));
184 dik_show_code((unsigned int *)regs->pc);
186 if (test_and_set_thread_flag (TIF_DIE_IF_KERNEL)) {
187 printk("die_if_kernel recursion detected.\n");
194 #ifndef CONFIG_MATHEMU
195 static long dummy_emul(void) { return 0; }
196 long (*alpha_fp_emul_imprecise)(struct pt_regs *regs, unsigned long writemask)
197 = (void *)dummy_emul;
198 long (*alpha_fp_emul) (unsigned long pc)
199 = (void *)dummy_emul;
201 long alpha_fp_emul_imprecise(struct pt_regs *regs, unsigned long writemask);
202 long alpha_fp_emul (unsigned long pc);
206 do_entArith(unsigned long summary, unsigned long write_mask,
207 struct pt_regs *regs)
209 long si_code = FPE_FLTINV;
213 /* Software-completion summary bit is set, so try to
214 emulate the instruction. If the processor supports
215 precise exceptions, we don't have to search. */
216 if (!amask(AMASK_PRECISE_TRAP))
217 si_code = alpha_fp_emul(regs->pc - 4);
219 si_code = alpha_fp_emul_imprecise(regs, write_mask);
223 die_if_kernel("Arithmetic fault", regs, 0, NULL);
225 info.si_signo = SIGFPE;
227 info.si_code = si_code;
228 info.si_addr = (void __user *) regs->pc;
229 send_sig_info(SIGFPE, &info, current);
233 do_entIF(unsigned long type, struct pt_regs *regs)
238 if ((regs->ps & ~IPL_MAX) == 0) {
240 const unsigned int *data
241 = (const unsigned int *) regs->pc;
242 printk("Kernel bug at %s:%d\n",
243 (const char *)(data[1] | (long)data[2] << 32),
246 die_if_kernel((type == 1 ? "Kernel Bug" : "Instruction fault"),
251 case 0: /* breakpoint */
252 info.si_signo = SIGTRAP;
254 info.si_code = TRAP_BRKPT;
256 info.si_addr = (void __user *) regs->pc;
258 if (ptrace_cancel_bpt(current)) {
259 regs->pc -= 4; /* make pc point to former bpt */
262 send_sig_info(SIGTRAP, &info, current);
265 case 1: /* bugcheck */
266 info.si_signo = SIGTRAP;
268 info.si_code = __SI_FAULT;
269 info.si_addr = (void __user *) regs->pc;
271 send_sig_info(SIGTRAP, &info, current);
274 case 2: /* gentrap */
275 info.si_addr = (void __user *) regs->pc;
276 info.si_trapno = regs->r16;
277 switch ((long) regs->r16) {
334 info.si_signo = signo;
337 info.si_addr = (void __user *) regs->pc;
338 send_sig_info(signo, &info, current);
342 if (implver() == IMPLVER_EV4) {
345 /* The some versions of SRM do not handle
346 the opDEC properly - they return the PC of the
347 opDEC fault, not the instruction after as the
348 Alpha architecture requires. Here we fix it up.
349 We do this by intentionally causing an opDEC
350 fault during the boot sequence and testing if
351 we get the correct PC. If not, we set a flag
352 to correct it every time through. */
353 regs->pc += opDEC_fix;
355 /* EV4 does not implement anything except normal
356 rounding. Everything else will come here as
357 an illegal instruction. Emulate them. */
358 si_code = alpha_fp_emul(regs->pc - 4);
362 info.si_signo = SIGFPE;
364 info.si_code = si_code;
365 info.si_addr = (void __user *) regs->pc;
366 send_sig_info(SIGFPE, &info, current);
372 case 3: /* FEN fault */
373 /* Irritating users can call PAL_clrfen to disable the
374 FPU for the process. The kernel will then trap in
375 do_switch_stack and undo_switch_stack when we try
376 to save and restore the FP registers.
378 Given that GCC by default generates code that uses the
379 FP registers, PAL_clrfen is not useful except for DoS
380 attacks. So turn the bleeding FPU back on and be done
382 current_thread_info()->pcb.flags |= 1;
383 __reload_thread(¤t_thread_info()->pcb);
387 default: /* unexpected instruction-fault type */
391 info.si_signo = SIGILL;
393 info.si_code = ILL_ILLOPC;
394 info.si_addr = (void __user *) regs->pc;
395 send_sig_info(SIGILL, &info, current);
398 /* There is an ifdef in the PALcode in MILO that enables a
399 "kernel debugging entry point" as an unprivileged call_pal.
401 We don't want to have anything to do with it, but unfortunately
402 several versions of MILO included in distributions have it enabled,
403 and if we don't put something on the entry point we'll oops. */
406 do_entDbg(struct pt_regs *regs)
410 die_if_kernel("Instruction fault", regs, 0, NULL);
412 info.si_signo = SIGILL;
414 info.si_code = ILL_ILLOPC;
415 info.si_addr = (void __user *) regs->pc;
416 force_sig_info(SIGILL, &info, current);
421 * entUna has a different register layout to be reasonably simple. It
422 * needs access to all the integer registers (the kernel doesn't use
423 * fp-regs), and it needs to have them in order for simpler access.
425 * Due to the non-standard register layout (and because we don't want
426 * to handle floating-point regs), user-mode unaligned accesses are
427 * handled separately by do_entUnaUser below.
429 * Oh, btw, we don't handle the "gp" register correctly, but if we fault
430 * on a gp-register unaligned load/store, something is _very_ wrong
431 * in the kernel anyway..
434 unsigned long regs[32];
435 unsigned long ps, pc, gp, a0, a1, a2;
438 struct unaligned_stat {
439 unsigned long count, va, pc;
443 /* Macro for exception fixup code to access integer registers. */
444 #define una_reg(r) (_regs[(r) >= 16 && (r) <= 18 ? (r)+19 : (r)])
448 do_entUna(void * va, unsigned long opcode, unsigned long reg,
449 struct allregs *regs)
451 long error, tmp1, tmp2, tmp3, tmp4;
452 unsigned long pc = regs->pc - 4;
453 unsigned long *_regs = regs->regs;
454 const struct exception_table_entry *fixup;
456 unaligned[0].count++;
457 unaligned[0].va = (unsigned long) va;
458 unaligned[0].pc = pc;
460 /* We don't want to use the generic get/put unaligned macros as
461 we want to trap exceptions. Only if we actually get an
462 exception will we decide whether we should have caught it. */
465 case 0x0c: /* ldwu */
466 __asm__ __volatile__(
467 "1: ldq_u %1,0(%3)\n"
468 "2: ldq_u %2,1(%3)\n"
472 ".section __ex_table,\"a\"\n"
474 " lda %1,3b-1b(%0)\n"
476 " lda %2,3b-2b(%0)\n"
478 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
482 una_reg(reg) = tmp1|tmp2;
486 __asm__ __volatile__(
487 "1: ldq_u %1,0(%3)\n"
488 "2: ldq_u %2,3(%3)\n"
492 ".section __ex_table,\"a\"\n"
494 " lda %1,3b-1b(%0)\n"
496 " lda %2,3b-2b(%0)\n"
498 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
502 una_reg(reg) = (int)(tmp1|tmp2);
506 __asm__ __volatile__(
507 "1: ldq_u %1,0(%3)\n"
508 "2: ldq_u %2,7(%3)\n"
512 ".section __ex_table,\"a\"\n"
514 " lda %1,3b-1b(%0)\n"
516 " lda %2,3b-2b(%0)\n"
518 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
522 una_reg(reg) = tmp1|tmp2;
525 /* Note that the store sequences do not indicate that they change
526 memory because it _should_ be affecting nothing in this context.
527 (Otherwise we have other, much larger, problems.) */
529 __asm__ __volatile__(
530 "1: ldq_u %2,1(%5)\n"
531 "2: ldq_u %1,0(%5)\n"
538 "3: stq_u %2,1(%5)\n"
539 "4: stq_u %1,0(%5)\n"
541 ".section __ex_table,\"a\"\n"
543 " lda %2,5b-1b(%0)\n"
545 " lda %1,5b-2b(%0)\n"
547 " lda $31,5b-3b(%0)\n"
549 " lda $31,5b-4b(%0)\n"
551 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2),
552 "=&r"(tmp3), "=&r"(tmp4)
553 : "r"(va), "r"(una_reg(reg)), "0"(0));
559 __asm__ __volatile__(
560 "1: ldq_u %2,3(%5)\n"
561 "2: ldq_u %1,0(%5)\n"
568 "3: stq_u %2,3(%5)\n"
569 "4: stq_u %1,0(%5)\n"
571 ".section __ex_table,\"a\"\n"
573 " lda %2,5b-1b(%0)\n"
575 " lda %1,5b-2b(%0)\n"
577 " lda $31,5b-3b(%0)\n"
579 " lda $31,5b-4b(%0)\n"
581 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2),
582 "=&r"(tmp3), "=&r"(tmp4)
583 : "r"(va), "r"(una_reg(reg)), "0"(0));
589 __asm__ __volatile__(
590 "1: ldq_u %2,7(%5)\n"
591 "2: ldq_u %1,0(%5)\n"
598 "3: stq_u %2,7(%5)\n"
599 "4: stq_u %1,0(%5)\n"
601 ".section __ex_table,\"a\"\n\t"
603 " lda %2,5b-1b(%0)\n"
605 " lda %1,5b-2b(%0)\n"
607 " lda $31,5b-3b(%0)\n"
609 " lda $31,5b-4b(%0)\n"
611 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2),
612 "=&r"(tmp3), "=&r"(tmp4)
613 : "r"(va), "r"(una_reg(reg)), "0"(0));
619 printk("Bad unaligned kernel access at %016lx: %p %lx %lu\n",
620 pc, va, opcode, reg);
624 /* Ok, we caught the exception, but we don't want it. Is there
625 someone to pass it along to? */
626 if ((fixup = search_exception_tables(pc)) != 0) {
628 newpc = fixup_exception(una_reg, fixup, pc);
630 printk("Forwarding unaligned exception at %lx (%lx)\n",
638 * Yikes! No one to forward the exception to.
639 * Since the registers are in a weird format, dump them ourselves.
642 printk("%s(%d): unhandled unaligned exception\n",
643 current->comm, task_pid_nr(current));
645 printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx\n",
646 pc, una_reg(26), regs->ps);
647 printk("r0 = %016lx r1 = %016lx r2 = %016lx\n",
648 una_reg(0), una_reg(1), una_reg(2));
649 printk("r3 = %016lx r4 = %016lx r5 = %016lx\n",
650 una_reg(3), una_reg(4), una_reg(5));
651 printk("r6 = %016lx r7 = %016lx r8 = %016lx\n",
652 una_reg(6), una_reg(7), una_reg(8));
653 printk("r9 = %016lx r10= %016lx r11= %016lx\n",
654 una_reg(9), una_reg(10), una_reg(11));
655 printk("r12= %016lx r13= %016lx r14= %016lx\n",
656 una_reg(12), una_reg(13), una_reg(14));
657 printk("r15= %016lx\n", una_reg(15));
658 printk("r16= %016lx r17= %016lx r18= %016lx\n",
659 una_reg(16), una_reg(17), una_reg(18));
660 printk("r19= %016lx r20= %016lx r21= %016lx\n",
661 una_reg(19), una_reg(20), una_reg(21));
662 printk("r22= %016lx r23= %016lx r24= %016lx\n",
663 una_reg(22), una_reg(23), una_reg(24));
664 printk("r25= %016lx r27= %016lx r28= %016lx\n",
665 una_reg(25), una_reg(27), una_reg(28));
666 printk("gp = %016lx sp = %p\n", regs->gp, regs+1);
668 dik_show_code((unsigned int *)pc);
669 dik_show_trace((unsigned long *)(regs+1));
671 if (test_and_set_thread_flag (TIF_DIE_IF_KERNEL)) {
672 printk("die_if_kernel recursion detected.\n");
680 * Convert an s-floating point value in memory format to the
681 * corresponding value in register format. The exponent
682 * needs to be remapped to preserve non-finite values
683 * (infinities, not-a-numbers, denormals).
685 static inline unsigned long
686 s_mem_to_reg (unsigned long s_mem)
688 unsigned long frac = (s_mem >> 0) & 0x7fffff;
689 unsigned long sign = (s_mem >> 31) & 0x1;
690 unsigned long exp_msb = (s_mem >> 30) & 0x1;
691 unsigned long exp_low = (s_mem >> 23) & 0x7f;
694 exp = (exp_msb << 10) | exp_low; /* common case */
696 if (exp_low == 0x7f) {
700 if (exp_low == 0x00) {
706 return (sign << 63) | (exp << 52) | (frac << 29);
710 * Convert an s-floating point value in register format to the
711 * corresponding value in memory format.
713 static inline unsigned long
714 s_reg_to_mem (unsigned long s_reg)
716 return ((s_reg >> 62) << 30) | ((s_reg << 5) >> 34);
720 * Handle user-level unaligned fault. Handling user-level unaligned
721 * faults is *extremely* slow and produces nasty messages. A user
722 * program *should* fix unaligned faults ASAP.
724 * Notice that we have (almost) the regular kernel stack layout here,
725 * so finding the appropriate registers is a little more difficult
726 * than in the kernel case.
728 * Finally, we handle regular integer load/stores only. In
729 * particular, load-linked/store-conditionally and floating point
730 * load/stores are not supported. The former make no sense with
731 * unaligned faults (they are guaranteed to fail) and I don't think
732 * the latter will occur in any decent program.
734 * Sigh. We *do* have to handle some FP operations, because GCC will
735 * uses them as temporary storage for integer memory to memory copies.
736 * However, we need to deal with stt/ldt and sts/lds only.
739 #define OP_INT_MASK ( 1L << 0x28 | 1L << 0x2c /* ldl stl */ \
740 | 1L << 0x29 | 1L << 0x2d /* ldq stq */ \
741 | 1L << 0x0c | 1L << 0x0d /* ldwu stw */ \
742 | 1L << 0x0a | 1L << 0x0e ) /* ldbu stb */
744 #define OP_WRITE_MASK ( 1L << 0x26 | 1L << 0x27 /* sts stt */ \
745 | 1L << 0x2c | 1L << 0x2d /* stl stq */ \
746 | 1L << 0x0d | 1L << 0x0e ) /* stw stb */
748 #define R(x) ((size_t) &((struct pt_regs *)0)->x)
750 static int unauser_reg_offsets[32] = {
751 R(r0), R(r1), R(r2), R(r3), R(r4), R(r5), R(r6), R(r7), R(r8),
752 /* r9 ... r15 are stored in front of regs. */
753 -56, -48, -40, -32, -24, -16, -8,
754 R(r16), R(r17), R(r18),
755 R(r19), R(r20), R(r21), R(r22), R(r23), R(r24), R(r25), R(r26),
756 R(r27), R(r28), R(gp),
763 do_entUnaUser(void __user * va, unsigned long opcode,
764 unsigned long reg, struct pt_regs *regs)
766 static DEFINE_RATELIMIT_STATE(ratelimit, 5 * HZ, 5);
768 unsigned long tmp1, tmp2, tmp3, tmp4;
769 unsigned long fake_reg, *reg_addr = &fake_reg;
773 /* Check the UAC bits to decide what the user wants us to do
774 with the unaliged access. */
776 if (!(current_thread_info()->status & TS_UAC_NOPRINT)) {
777 if (__ratelimit(&ratelimit)) {
778 printk("%s(%d): unaligned trap at %016lx: %p %lx %ld\n",
779 current->comm, task_pid_nr(current),
780 regs->pc - 4, va, opcode, reg);
783 if ((current_thread_info()->status & TS_UAC_SIGBUS))
785 /* Not sure why you'd want to use this, but... */
786 if ((current_thread_info()->status & TS_UAC_NOFIX))
789 /* Don't bother reading ds in the access check since we already
790 know that this came from the user. Also rely on the fact that
791 the page at TASK_SIZE is unmapped and so can't be touched anyway. */
792 if (!__access_ok((unsigned long)va, 0, USER_DS))
795 ++unaligned[1].count;
796 unaligned[1].va = (unsigned long)va;
797 unaligned[1].pc = regs->pc - 4;
799 if ((1L << opcode) & OP_INT_MASK) {
800 /* it's an integer load/store */
802 reg_addr = (unsigned long *)
803 ((char *)regs + unauser_reg_offsets[reg]);
804 } else if (reg == 30) {
805 /* usp in PAL regs */
808 /* zero "register" */
813 /* We don't want to use the generic get/put unaligned macros as
814 we want to trap exceptions. Only if we actually get an
815 exception will we decide whether we should have caught it. */
818 case 0x0c: /* ldwu */
819 __asm__ __volatile__(
820 "1: ldq_u %1,0(%3)\n"
821 "2: ldq_u %2,1(%3)\n"
825 ".section __ex_table,\"a\"\n"
827 " lda %1,3b-1b(%0)\n"
829 " lda %2,3b-2b(%0)\n"
831 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
835 *reg_addr = tmp1|tmp2;
839 __asm__ __volatile__(
840 "1: ldq_u %1,0(%3)\n"
841 "2: ldq_u %2,3(%3)\n"
845 ".section __ex_table,\"a\"\n"
847 " lda %1,3b-1b(%0)\n"
849 " lda %2,3b-2b(%0)\n"
851 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
855 alpha_write_fp_reg(reg, s_mem_to_reg((int)(tmp1|tmp2)));
859 __asm__ __volatile__(
860 "1: ldq_u %1,0(%3)\n"
861 "2: ldq_u %2,7(%3)\n"
865 ".section __ex_table,\"a\"\n"
867 " lda %1,3b-1b(%0)\n"
869 " lda %2,3b-2b(%0)\n"
871 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
875 alpha_write_fp_reg(reg, tmp1|tmp2);
879 __asm__ __volatile__(
880 "1: ldq_u %1,0(%3)\n"
881 "2: ldq_u %2,3(%3)\n"
885 ".section __ex_table,\"a\"\n"
887 " lda %1,3b-1b(%0)\n"
889 " lda %2,3b-2b(%0)\n"
891 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
895 *reg_addr = (int)(tmp1|tmp2);
899 __asm__ __volatile__(
900 "1: ldq_u %1,0(%3)\n"
901 "2: ldq_u %2,7(%3)\n"
905 ".section __ex_table,\"a\"\n"
907 " lda %1,3b-1b(%0)\n"
909 " lda %2,3b-2b(%0)\n"
911 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2)
915 *reg_addr = tmp1|tmp2;
918 /* Note that the store sequences do not indicate that they change
919 memory because it _should_ be affecting nothing in this context.
920 (Otherwise we have other, much larger, problems.) */
922 __asm__ __volatile__(
923 "1: ldq_u %2,1(%5)\n"
924 "2: ldq_u %1,0(%5)\n"
931 "3: stq_u %2,1(%5)\n"
932 "4: stq_u %1,0(%5)\n"
934 ".section __ex_table,\"a\"\n"
936 " lda %2,5b-1b(%0)\n"
938 " lda %1,5b-2b(%0)\n"
940 " lda $31,5b-3b(%0)\n"
942 " lda $31,5b-4b(%0)\n"
944 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2),
945 "=&r"(tmp3), "=&r"(tmp4)
946 : "r"(va), "r"(*reg_addr), "0"(0));
952 fake_reg = s_reg_to_mem(alpha_read_fp_reg(reg));
956 __asm__ __volatile__(
957 "1: ldq_u %2,3(%5)\n"
958 "2: ldq_u %1,0(%5)\n"
965 "3: stq_u %2,3(%5)\n"
966 "4: stq_u %1,0(%5)\n"
968 ".section __ex_table,\"a\"\n"
970 " lda %2,5b-1b(%0)\n"
972 " lda %1,5b-2b(%0)\n"
974 " lda $31,5b-3b(%0)\n"
976 " lda $31,5b-4b(%0)\n"
978 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2),
979 "=&r"(tmp3), "=&r"(tmp4)
980 : "r"(va), "r"(*reg_addr), "0"(0));
986 fake_reg = alpha_read_fp_reg(reg);
990 __asm__ __volatile__(
991 "1: ldq_u %2,7(%5)\n"
992 "2: ldq_u %1,0(%5)\n"
999 "3: stq_u %2,7(%5)\n"
1000 "4: stq_u %1,0(%5)\n"
1002 ".section __ex_table,\"a\"\n\t"
1004 " lda %2,5b-1b(%0)\n"
1006 " lda %1,5b-2b(%0)\n"
1008 " lda $31,5b-3b(%0)\n"
1010 " lda $31,5b-4b(%0)\n"
1012 : "=r"(error), "=&r"(tmp1), "=&r"(tmp2),
1013 "=&r"(tmp3), "=&r"(tmp4)
1014 : "r"(va), "r"(*reg_addr), "0"(0));
1020 /* What instruction were you trying to use, exactly? */
1024 /* Only integer loads should get here; everyone else returns early. */
1030 regs->pc -= 4; /* make pc point to faulting insn */
1031 info.si_signo = SIGSEGV;
1034 /* We need to replicate some of the logic in mm/fault.c,
1035 since we don't have access to the fault code in the
1036 exception handling return path. */
1037 if (!__access_ok((unsigned long)va, 0, USER_DS))
1038 info.si_code = SEGV_ACCERR;
1040 struct mm_struct *mm = current->mm;
1041 down_read(&mm->mmap_sem);
1042 if (find_vma(mm, (unsigned long)va))
1043 info.si_code = SEGV_ACCERR;
1045 info.si_code = SEGV_MAPERR;
1046 up_read(&mm->mmap_sem);
1049 send_sig_info(SIGSEGV, &info, current);
1054 info.si_signo = SIGBUS;
1056 info.si_code = BUS_ADRALN;
1058 send_sig_info(SIGBUS, &info, current);
1065 /* Tell PAL-code what global pointer we want in the kernel. */
1066 register unsigned long gptr __asm__("$29");
1069 /* Hack for Multia (UDB) and JENSEN: some of their SRMs have
1070 a bug in the handling of the opDEC fault. Fix it up if so. */
1071 if (implver() == IMPLVER_EV4)