asmlinkage void do_entArith(unsigned long summary, unsigned long write_mask, struct pt_regs *regs) { long si_code = FPE_FLTINV; siginfo_t info; if (summary & 1) { /* Software-completion summary bit is set, so try to emulate the instruction. If the processor supports precise exceptions, we don't have to search. */ if (!amask(AMASK_PRECISE_TRAP)) si_code = alpha_fp_emul(regs->pc - 4); else si_code = alpha_fp_emul_imprecise(regs, write_mask); if (si_code == 0) return; } die_if_kernel("Arithmetic fault", regs, 0, NULL); info.si_signo = SIGFPE; info.si_errno = 0; info.si_code = si_code; info.si_addr = (void __user *) regs->pc; send_sig_info(SIGFPE, &info, current); }
asmlinkage void do_entArith(unsigned long summary, unsigned long write_mask, struct pt_regs *regs) { long si_code = FPE_FLTINV; siginfo_t info; if (summary & 1) { /* */ if (!amask(AMASK_PRECISE_TRAP)) si_code = alpha_fp_emul(regs->pc - 4); else si_code = alpha_fp_emul_imprecise(regs, write_mask); if (si_code == 0) return; } die_if_kernel("Arithmetic fault", regs, 0, NULL); info.si_signo = SIGFPE; info.si_errno = 0; info.si_code = si_code; info.si_addr = (void __user *) regs->pc; send_sig_info(SIGFPE, &info, current); }
asmlinkage void do_entArith(unsigned long summary, unsigned long write_mask, unsigned long a2, unsigned long a3, unsigned long a4, unsigned long a5, struct pt_regs regs) { if (summary & 1) { /* Software-completion summary bit is set, so try to emulate the instruction. */ if (!amask(AMASK_PRECISE_TRAP)) { /* 21264 (except pass 1) has precise exceptions. */ if (alpha_fp_emul(regs.pc - 4)) return; } else { if (alpha_fp_emul_imprecise(®s, write_mask)) return; } } #if 0 printk("%s: arithmetic trap at %016lx: %02lx %016lx\n", current->comm, regs.pc, summary, write_mask); #endif die_if_kernel("Arithmetic fault", ®s, 0, 0); send_sig(SIGFPE, current, 1); }
asmlinkage void do_entIF(unsigned long type, struct pt_regs *regs) { siginfo_t info; int signo, code; if ((regs->ps & ~IPL_MAX) == 0) { if (type == 1) { const unsigned int *data = (const unsigned int *) regs->pc; printk("Kernel bug at %s:%d\n", (const char *)(data[1] | (long)data[2] << 32), data[0]); } die_if_kernel((type == 1 ? "Kernel Bug" : "Instruction fault"), regs, type, NULL); } switch (type) { case 0: /* breakpoint */ info.si_signo = SIGTRAP; info.si_errno = 0; info.si_code = TRAP_BRKPT; info.si_trapno = 0; info.si_addr = (void __user *) regs->pc; if (ptrace_cancel_bpt(current)) { regs->pc -= 4; /* make pc point to former bpt */ } send_sig_info(SIGTRAP, &info, current); return; case 1: /* bugcheck */ info.si_signo = SIGTRAP; info.si_errno = 0; info.si_code = __SI_FAULT; info.si_addr = (void __user *) regs->pc; info.si_trapno = 0; send_sig_info(SIGTRAP, &info, current); return; case 2: /* gentrap */ info.si_addr = (void __user *) regs->pc; info.si_trapno = regs->r16; switch ((long) regs->r16) { case GEN_INTOVF: signo = SIGFPE; code = FPE_INTOVF; break; case GEN_INTDIV: signo = SIGFPE; code = FPE_INTDIV; break; case GEN_FLTOVF: signo = SIGFPE; code = FPE_FLTOVF; break; case GEN_FLTDIV: signo = SIGFPE; code = FPE_FLTDIV; break; case GEN_FLTUND: signo = SIGFPE; code = FPE_FLTUND; break; case GEN_FLTINV: signo = SIGFPE; code = FPE_FLTINV; break; case GEN_FLTINE: signo = SIGFPE; code = FPE_FLTRES; break; case GEN_ROPRAND: signo = SIGFPE; code = __SI_FAULT; break; case GEN_DECOVF: case GEN_DECDIV: case GEN_DECINV: case GEN_ASSERTERR: case GEN_NULPTRERR: case GEN_STKOVF: case GEN_STRLENERR: case GEN_SUBSTRERR: case GEN_RANGERR: case GEN_SUBRNG: case GEN_SUBRNG1: case GEN_SUBRNG2: case GEN_SUBRNG3: case GEN_SUBRNG4: case GEN_SUBRNG5: case GEN_SUBRNG6: case GEN_SUBRNG7: default: signo = SIGTRAP; code = __SI_FAULT; break; } info.si_signo = signo; info.si_errno = 0; info.si_code = code; info.si_addr = (void __user *) regs->pc; send_sig_info(signo, &info, current); return; case 4: /* opDEC */ if (implver() == IMPLVER_EV4) { long si_code; /* The some versions of SRM do not handle the opDEC properly - they return the PC of the opDEC fault, not the instruction after as the Alpha architecture requires. Here we fix it up. We do this by intentionally causing an opDEC fault during the boot sequence and testing if we get the correct PC. If not, we set a flag to correct it every time through. */ regs->pc += opDEC_fix; /* EV4 does not implement anything except normal rounding. Everything else will come here as an illegal instruction. Emulate them. */ si_code = alpha_fp_emul(regs->pc - 4); if (si_code == 0) return; if (si_code > 0) { info.si_signo = SIGFPE; info.si_errno = 0; info.si_code = si_code; info.si_addr = (void __user *) regs->pc; send_sig_info(SIGFPE, &info, current); return; } } break; case 3: /* FEN fault */ /* Irritating users can call PAL_clrfen to disable the FPU for the process. The kernel will then trap in do_switch_stack and undo_switch_stack when we try to save and restore the FP registers. Given that GCC by default generates code that uses the FP registers, PAL_clrfen is not useful except for DoS attacks. So turn the bleeding FPU back on and be done with it. */ current_thread_info()->pcb.flags |= 1; __reload_thread(¤t_thread_info()->pcb); return; case 5: /* illoc */ default: /* unexpected instruction-fault type */ ; } info.si_signo = SIGILL; info.si_errno = 0; info.si_code = ILL_ILLOPC; info.si_addr = (void __user *) regs->pc; send_sig_info(SIGILL, &info, current); }
asmlinkage void do_entIF(unsigned long type, struct pt_regs *regs) { siginfo_t info; int signo, code; if ((regs->ps & ~IPL_MAX) == 0) { if (type == 1) { const unsigned int *data = (const unsigned int *) regs->pc; printk("Kernel bug at %s:%d\n", (const char *)(data[1] | (long)data[2] << 32), data[0]); } die_if_kernel((type == 1 ? "Kernel Bug" : "Instruction fault"), regs, type, NULL); } switch (type) { case 0: /* */ info.si_signo = SIGTRAP; info.si_errno = 0; info.si_code = TRAP_BRKPT; info.si_trapno = 0; info.si_addr = (void __user *) regs->pc; if (ptrace_cancel_bpt(current)) { regs->pc -= 4; /* */ } send_sig_info(SIGTRAP, &info, current); return; case 1: /* */ info.si_signo = SIGTRAP; info.si_errno = 0; info.si_code = __SI_FAULT; info.si_addr = (void __user *) regs->pc; info.si_trapno = 0; send_sig_info(SIGTRAP, &info, current); return; case 2: /* */ info.si_addr = (void __user *) regs->pc; info.si_trapno = regs->r16; switch ((long) regs->r16) { case GEN_INTOVF: signo = SIGFPE; code = FPE_INTOVF; break; case GEN_INTDIV: signo = SIGFPE; code = FPE_INTDIV; break; case GEN_FLTOVF: signo = SIGFPE; code = FPE_FLTOVF; break; case GEN_FLTDIV: signo = SIGFPE; code = FPE_FLTDIV; break; case GEN_FLTUND: signo = SIGFPE; code = FPE_FLTUND; break; case GEN_FLTINV: signo = SIGFPE; code = FPE_FLTINV; break; case GEN_FLTINE: signo = SIGFPE; code = FPE_FLTRES; break; case GEN_ROPRAND: signo = SIGFPE; code = __SI_FAULT; break; case GEN_DECOVF: case GEN_DECDIV: case GEN_DECINV: case GEN_ASSERTERR: case GEN_NULPTRERR: case GEN_STKOVF: case GEN_STRLENERR: case GEN_SUBSTRERR: case GEN_RANGERR: case GEN_SUBRNG: case GEN_SUBRNG1: case GEN_SUBRNG2: case GEN_SUBRNG3: case GEN_SUBRNG4: case GEN_SUBRNG5: case GEN_SUBRNG6: case GEN_SUBRNG7: default: signo = SIGTRAP; code = __SI_FAULT; break; } info.si_signo = signo; info.si_errno = 0; info.si_code = code; info.si_addr = (void __user *) regs->pc; send_sig_info(signo, &info, current); return; case 4: /* */ if (implver() == IMPLVER_EV4) { long si_code; /* */ regs->pc += opDEC_fix; /* */ si_code = alpha_fp_emul(regs->pc - 4); if (si_code == 0) return; if (si_code > 0) { info.si_signo = SIGFPE; info.si_errno = 0; info.si_code = si_code; info.si_addr = (void __user *) regs->pc; send_sig_info(SIGFPE, &info, current); return; } } break; case 3: /* */ /* */ current_thread_info()->pcb.flags |= 1; __reload_thread(¤t_thread_info()->pcb); return; case 5: /* */ default: /* */ ; } info.si_signo = SIGILL; info.si_errno = 0; info.si_code = ILL_ILLOPC; info.si_addr = (void __user *) regs->pc; send_sig_info(SIGILL, &info, current); }
asmlinkage void do_entIF(unsigned long type, unsigned long a1, unsigned long a2, unsigned long a3, unsigned long a4, unsigned long a5, struct pt_regs regs) { die_if_kernel("Instruction fault", ®s, type, 0); switch (type) { case 0: /* breakpoint */ if (ptrace_cancel_bpt(current)) { regs.pc -= 4; /* make pc point to former bpt */ } send_sig(SIGTRAP, current, 1); break; case 1: /* bugcheck */ send_sig(SIGTRAP, current, 1); break; case 2: /* gentrap */ /* * The exception code should be passed on to the signal * handler as the second argument. Linux doesn't do that * yet (also notice that Linux *always* behaves like * DEC Unix with SA_SIGINFO off; see DEC Unix man page * for sigaction(2)). */ switch ((long) regs.r16) { case GEN_INTOVF: case GEN_INTDIV: case GEN_FLTOVF: case GEN_FLTDIV: case GEN_FLTUND: case GEN_FLTINV: case GEN_FLTINE: case GEN_ROPRAND: send_sig(SIGFPE, current, 1); break; case GEN_DECOVF: case GEN_DECDIV: case GEN_DECINV: case GEN_ASSERTERR: case GEN_NULPTRERR: case GEN_STKOVF: case GEN_STRLENERR: case GEN_SUBSTRERR: case GEN_RANGERR: case GEN_SUBRNG: case GEN_SUBRNG1: case GEN_SUBRNG2: case GEN_SUBRNG3: case GEN_SUBRNG4: case GEN_SUBRNG5: case GEN_SUBRNG6: case GEN_SUBRNG7: send_sig(SIGTRAP, current, 1); break; } break; case 3: /* FEN fault */ send_sig(SIGILL, current, 1); break; case 4: /* opDEC */ if (implver() == IMPLVER_EV4) { /* EV4 does not implement anything except normal rounding. Everything else will come here as an illegal instruction. Emulate them. */ if (alpha_fp_emul(regs.pc - 4)) return; } send_sig(SIGILL, current, 1); break; default: panic("do_entIF: unexpected instruction-fault type"); } }
asmlinkage void do_entIF(unsigned long type, unsigned long a1, unsigned long a2, unsigned long a3, unsigned long a4, unsigned long a5, struct pt_regs regs) { if (!opDEC_testing || type != 4) { die_if_kernel((type == 1 ? "Kernel Bug" : "Instruction fault"), ®s, type, 0); } switch (type) { case 0: /* breakpoint */ if (ptrace_cancel_bpt(current)) { regs.pc -= 4; /* make pc point to former bpt */ } send_sig(SIGTRAP, current, 1); return; case 1: /* bugcheck */ send_sig(SIGTRAP, current, 1); return; case 2: /* gentrap */ /* * The exception code should be passed on to the signal * handler as the second argument. Linux doesn't do that * yet (also notice that Linux *always* behaves like * DEC Unix with SA_SIGINFO off; see DEC Unix man page * for sigaction(2)). */ switch ((long) regs.r16) { case GEN_INTOVF: case GEN_INTDIV: case GEN_FLTOVF: case GEN_FLTDIV: case GEN_FLTUND: case GEN_FLTINV: case GEN_FLTINE: case GEN_ROPRAND: send_sig(SIGFPE, current, 1); return; case GEN_DECOVF: case GEN_DECDIV: case GEN_DECINV: case GEN_ASSERTERR: case GEN_NULPTRERR: case GEN_STKOVF: case GEN_STRLENERR: case GEN_SUBSTRERR: case GEN_RANGERR: case GEN_SUBRNG: case GEN_SUBRNG1: case GEN_SUBRNG2: case GEN_SUBRNG3: case GEN_SUBRNG4: case GEN_SUBRNG5: case GEN_SUBRNG6: case GEN_SUBRNG7: send_sig(SIGTRAP, current, 1); return; } break; case 4: /* opDEC */ if (implver() == IMPLVER_EV4) { /* The some versions of SRM do not handle the opDEC properly - they return the PC of the opDEC fault, not the instruction after as the Alpha architecture requires. Here we fix it up. We do this by intentionally causing an opDEC fault during the boot sequence and testing if we get the correct PC. If not, we set a flag to correct it every time through. */ if (opDEC_testing) { if (regs.pc == opDEC_test_pc) { opDEC_fix = 4; regs.pc += 4; printk("opDEC fixup enabled.\n"); } return; } regs.pc += opDEC_fix; /* EV4 does not implement anything except normal rounding. Everything else will come here as an illegal instruction. Emulate them. */ if (alpha_fp_emul(regs.pc-4)) return; } break; case 3: /* FEN fault */ /* Irritating users can call PAL_clrfen to disable the FPU for the process. The kernel will then trap in do_switch_stack and undo_switch_stack when we try to save and restore the FP registers. Given that GCC by default generates code that uses the FP registers, PAL_clrfen is not useful except for DoS attacks. So turn the bleeding FPU back on and be done with it. */ current->thread.pal_flags |= 1; __reload_thread(¤t->thread); return; case 5: /* illoc */ default: /* unexpected instruction-fault type */ ; } send_sig(SIGILL, current, 1); }