dump_stack: unify debug information printed by show_regs()
[deliverable/linux.git] / arch / mips / kernel / traps.c
CommitLineData
1da177e4
LT
1/*
2 * This file is subject to the terms and conditions of the GNU General Public
3 * License. See the file "COPYING" in the main directory of this archive
4 * for more details.
5 *
36ccf1c0 6 * Copyright (C) 1994 - 1999, 2000, 01, 06 Ralf Baechle
1da177e4
LT
7 * Copyright (C) 1995, 1996 Paul M. Antoine
8 * Copyright (C) 1998 Ulf Carlsson
9 * Copyright (C) 1999 Silicon Graphics, Inc.
10 * Kevin D. Kissell, kevink@mips.com and Carsten Langgaard, carstenl@mips.com
11 * Copyright (C) 2000, 01 MIPS Technologies, Inc.
60b0d655 12 * Copyright (C) 2002, 2003, 2004, 2005, 2007 Maciej W. Rozycki
1da177e4 13 */
8e8a52ed 14#include <linux/bug.h>
60b0d655 15#include <linux/compiler.h>
7aa1c8f4 16#include <linux/kexec.h>
1da177e4 17#include <linux/init.h>
8742cd23 18#include <linux/kernel.h>
f9ded569 19#include <linux/module.h>
1da177e4 20#include <linux/mm.h>
1da177e4
LT
21#include <linux/sched.h>
22#include <linux/smp.h>
1da177e4
LT
23#include <linux/spinlock.h>
24#include <linux/kallsyms.h>
e01402b1 25#include <linux/bootmem.h>
d4fd1989 26#include <linux/interrupt.h>
39b8d525 27#include <linux/ptrace.h>
88547001
JW
28#include <linux/kgdb.h>
29#include <linux/kdebug.h>
c1bf207d 30#include <linux/kprobes.h>
69f3a7de 31#include <linux/notifier.h>
5dd11d5d 32#include <linux/kdb.h>
ca4d3e67 33#include <linux/irq.h>
7f788d2d 34#include <linux/perf_event.h>
1da177e4
LT
35
36#include <asm/bootinfo.h>
37#include <asm/branch.h>
38#include <asm/break.h>
69f3a7de 39#include <asm/cop2.h>
1da177e4 40#include <asm/cpu.h>
e50c0a8f 41#include <asm/dsp.h>
1da177e4 42#include <asm/fpu.h>
ba3049ed 43#include <asm/fpu_emulator.h>
340ee4b9
RB
44#include <asm/mipsregs.h>
45#include <asm/mipsmtregs.h>
1da177e4
LT
46#include <asm/module.h>
47#include <asm/pgtable.h>
48#include <asm/ptrace.h>
49#include <asm/sections.h>
1da177e4
LT
50#include <asm/tlbdebug.h>
51#include <asm/traps.h>
52#include <asm/uaccess.h>
b67b2b70 53#include <asm/watch.h>
1da177e4 54#include <asm/mmu_context.h>
1da177e4 55#include <asm/types.h>
1df0f0ff 56#include <asm/stacktrace.h>
92bbe1b9 57#include <asm/uasm.h>
1da177e4 58
c65a5480
AN
59extern void check_wait(void);
60extern asmlinkage void r4k_wait(void);
61extern asmlinkage void rollback_handle_int(void);
e4ac58af 62extern asmlinkage void handle_int(void);
1da177e4
LT
63extern asmlinkage void handle_tlbm(void);
64extern asmlinkage void handle_tlbl(void);
65extern asmlinkage void handle_tlbs(void);
66extern asmlinkage void handle_adel(void);
67extern asmlinkage void handle_ades(void);
68extern asmlinkage void handle_ibe(void);
69extern asmlinkage void handle_dbe(void);
70extern asmlinkage void handle_sys(void);
71extern asmlinkage void handle_bp(void);
72extern asmlinkage void handle_ri(void);
5b10496b
AN
73extern asmlinkage void handle_ri_rdhwr_vivt(void);
74extern asmlinkage void handle_ri_rdhwr(void);
1da177e4
LT
75extern asmlinkage void handle_cpu(void);
76extern asmlinkage void handle_ov(void);
77extern asmlinkage void handle_tr(void);
78extern asmlinkage void handle_fpe(void);
79extern asmlinkage void handle_mdmx(void);
80extern asmlinkage void handle_watch(void);
340ee4b9 81extern asmlinkage void handle_mt(void);
e50c0a8f 82extern asmlinkage void handle_dsp(void);
1da177e4
LT
83extern asmlinkage void handle_mcheck(void);
84extern asmlinkage void handle_reserved(void);
85
12616ed2 86extern int fpu_emulator_cop1Handler(struct pt_regs *xcp,
515b029d
DD
87 struct mips_fpu_struct *ctx, int has_fpu,
88 void *__user *fault_addr);
1da177e4
LT
89
90void (*board_be_init)(void);
91int (*board_be_handler)(struct pt_regs *regs, int is_fixup);
e01402b1
RB
92void (*board_nmi_handler_setup)(void);
93void (*board_ejtag_handler_setup)(void);
94void (*board_bind_eic_interrupt)(int irq, int regset);
6fb97eff 95void (*board_ebase_setup)(void);
fcbf1dfd 96void __cpuinitdata(*board_cache_error_setup)(void);
1da177e4 97
4d157d5e 98static void show_raw_backtrace(unsigned long reg29)
e889d78f 99{
39b8d525 100 unsigned long *sp = (unsigned long *)(reg29 & ~3);
e889d78f
AN
101 unsigned long addr;
102
103 printk("Call Trace:");
104#ifdef CONFIG_KALLSYMS
105 printk("\n");
106#endif
10220c88
TB
107 while (!kstack_end(sp)) {
108 unsigned long __user *p =
109 (unsigned long __user *)(unsigned long)sp++;
110 if (__get_user(addr, p)) {
111 printk(" (Bad stack address)");
112 break;
39b8d525 113 }
10220c88
TB
114 if (__kernel_text_address(addr))
115 print_ip_sym(addr);
e889d78f 116 }
10220c88 117 printk("\n");
e889d78f
AN
118}
119
f66686f7 120#ifdef CONFIG_KALLSYMS
1df0f0ff 121int raw_show_trace;
f66686f7
AN
122static int __init set_raw_show_trace(char *str)
123{
124 raw_show_trace = 1;
125 return 1;
126}
127__setup("raw_show_trace", set_raw_show_trace);
1df0f0ff 128#endif
4d157d5e 129
eae23f2c 130static void show_backtrace(struct task_struct *task, const struct pt_regs *regs)
f66686f7 131{
4d157d5e
FBH
132 unsigned long sp = regs->regs[29];
133 unsigned long ra = regs->regs[31];
f66686f7 134 unsigned long pc = regs->cp0_epc;
f66686f7 135
e909be82
VW
136 if (!task)
137 task = current;
138
f66686f7 139 if (raw_show_trace || !__kernel_text_address(pc)) {
87151ae3 140 show_raw_backtrace(sp);
f66686f7
AN
141 return;
142 }
143 printk("Call Trace:\n");
4d157d5e 144 do {
87151ae3 145 print_ip_sym(pc);
1924600c 146 pc = unwind_stack(task, &sp, pc, &ra);
4d157d5e 147 } while (pc);
f66686f7
AN
148 printk("\n");
149}
f66686f7 150
1da177e4
LT
151/*
152 * This routine abuses get_user()/put_user() to reference pointers
153 * with at least a bit of error checking ...
154 */
eae23f2c
RB
155static void show_stacktrace(struct task_struct *task,
156 const struct pt_regs *regs)
1da177e4
LT
157{
158 const int field = 2 * sizeof(unsigned long);
159 long stackdata;
160 int i;
5e0373b8 161 unsigned long __user *sp = (unsigned long __user *)regs->regs[29];
1da177e4
LT
162
163 printk("Stack :");
164 i = 0;
165 while ((unsigned long) sp & (PAGE_SIZE - 1)) {
166 if (i && ((i % (64 / field)) == 0))
70342287 167 printk("\n ");
1da177e4
LT
168 if (i > 39) {
169 printk(" ...");
170 break;
171 }
172
173 if (__get_user(stackdata, sp++)) {
174 printk(" (Bad stack address)");
175 break;
176 }
177
178 printk(" %0*lx", field, stackdata);
179 i++;
180 }
181 printk("\n");
87151ae3 182 show_backtrace(task, regs);
f66686f7
AN
183}
184
f66686f7
AN
185void show_stack(struct task_struct *task, unsigned long *sp)
186{
187 struct pt_regs regs;
188 if (sp) {
189 regs.regs[29] = (unsigned long)sp;
190 regs.regs[31] = 0;
191 regs.cp0_epc = 0;
192 } else {
193 if (task && task != current) {
194 regs.regs[29] = task->thread.reg29;
195 regs.regs[31] = 0;
196 regs.cp0_epc = task->thread.reg31;
5dd11d5d
JW
197#ifdef CONFIG_KGDB_KDB
198 } else if (atomic_read(&kgdb_active) != -1 &&
199 kdb_current_regs) {
200 memcpy(&regs, kdb_current_regs, sizeof(regs));
201#endif /* CONFIG_KGDB_KDB */
f66686f7
AN
202 } else {
203 prepare_frametrace(&regs);
204 }
205 }
206 show_stacktrace(task, &regs);
1da177e4
LT
207}
208
e1bb8289 209static void show_code(unsigned int __user *pc)
1da177e4
LT
210{
211 long i;
39b8d525 212 unsigned short __user *pc16 = NULL;
1da177e4
LT
213
214 printk("\nCode:");
215
39b8d525
RB
216 if ((unsigned long)pc & 1)
217 pc16 = (unsigned short __user *)((unsigned long)pc & ~1);
1da177e4
LT
218 for(i = -3 ; i < 6 ; i++) {
219 unsigned int insn;
39b8d525 220 if (pc16 ? __get_user(insn, pc16 + i) : __get_user(insn, pc + i)) {
1da177e4
LT
221 printk(" (Bad address in epc)\n");
222 break;
223 }
39b8d525 224 printk("%c%0*x%c", (i?' ':'<'), pc16 ? 4 : 8, insn, (i?' ':'>'));
1da177e4
LT
225 }
226}
227
eae23f2c 228static void __show_regs(const struct pt_regs *regs)
1da177e4
LT
229{
230 const int field = 2 * sizeof(unsigned long);
231 unsigned int cause = regs->cp0_cause;
232 int i;
233
a43cb95d 234 show_regs_print_info(KERN_DEFAULT);
1da177e4
LT
235
236 /*
237 * Saved main processor registers
238 */
239 for (i = 0; i < 32; ) {
240 if ((i % 4) == 0)
241 printk("$%2d :", i);
242 if (i == 0)
243 printk(" %0*lx", field, 0UL);
244 else if (i == 26 || i == 27)
245 printk(" %*s", field, "");
246 else
247 printk(" %0*lx", field, regs->regs[i]);
248
249 i++;
250 if ((i % 4) == 0)
251 printk("\n");
252 }
253
9693a853
FBH
254#ifdef CONFIG_CPU_HAS_SMARTMIPS
255 printk("Acx : %0*lx\n", field, regs->acx);
256#endif
1da177e4
LT
257 printk("Hi : %0*lx\n", field, regs->hi);
258 printk("Lo : %0*lx\n", field, regs->lo);
259
260 /*
261 * Saved cp0 registers
262 */
b012cffe
RB
263 printk("epc : %0*lx %pS\n", field, regs->cp0_epc,
264 (void *) regs->cp0_epc);
1da177e4 265 printk(" %s\n", print_tainted());
b012cffe
RB
266 printk("ra : %0*lx %pS\n", field, regs->regs[31],
267 (void *) regs->regs[31]);
1da177e4 268
70342287 269 printk("Status: %08x ", (uint32_t) regs->cp0_status);
1da177e4 270
3b2396d9
MR
271 if (current_cpu_data.isa_level == MIPS_CPU_ISA_I) {
272 if (regs->cp0_status & ST0_KUO)
273 printk("KUo ");
274 if (regs->cp0_status & ST0_IEO)
275 printk("IEo ");
276 if (regs->cp0_status & ST0_KUP)
277 printk("KUp ");
278 if (regs->cp0_status & ST0_IEP)
279 printk("IEp ");
280 if (regs->cp0_status & ST0_KUC)
281 printk("KUc ");
282 if (regs->cp0_status & ST0_IEC)
283 printk("IEc ");
284 } else {
285 if (regs->cp0_status & ST0_KX)
286 printk("KX ");
287 if (regs->cp0_status & ST0_SX)
288 printk("SX ");
289 if (regs->cp0_status & ST0_UX)
290 printk("UX ");
291 switch (regs->cp0_status & ST0_KSU) {
292 case KSU_USER:
293 printk("USER ");
294 break;
295 case KSU_SUPERVISOR:
296 printk("SUPERVISOR ");
297 break;
298 case KSU_KERNEL:
299 printk("KERNEL ");
300 break;
301 default:
302 printk("BAD_MODE ");
303 break;
304 }
305 if (regs->cp0_status & ST0_ERL)
306 printk("ERL ");
307 if (regs->cp0_status & ST0_EXL)
308 printk("EXL ");
309 if (regs->cp0_status & ST0_IE)
310 printk("IE ");
1da177e4 311 }
1da177e4
LT
312 printk("\n");
313
314 printk("Cause : %08x\n", cause);
315
316 cause = (cause & CAUSEF_EXCCODE) >> CAUSEB_EXCCODE;
317 if (1 <= cause && cause <= 5)
318 printk("BadVA : %0*lx\n", field, regs->cp0_badvaddr);
319
9966db25
RB
320 printk("PrId : %08x (%s)\n", read_c0_prid(),
321 cpu_name_string());
1da177e4
LT
322}
323
eae23f2c
RB
324/*
325 * FIXME: really the generic show_regs should take a const pointer argument.
326 */
327void show_regs(struct pt_regs *regs)
328{
329 __show_regs((struct pt_regs *)regs);
330}
331
c1bf207d 332void show_registers(struct pt_regs *regs)
1da177e4 333{
39b8d525
RB
334 const int field = 2 * sizeof(unsigned long);
335
eae23f2c 336 __show_regs(regs);
1da177e4 337 print_modules();
39b8d525
RB
338 printk("Process %s (pid: %d, threadinfo=%p, task=%p, tls=%0*lx)\n",
339 current->comm, current->pid, current_thread_info(), current,
340 field, current_thread_info()->tp_value);
341 if (cpu_has_userlocal) {
342 unsigned long tls;
343
344 tls = read_c0_userlocal();
345 if (tls != current_thread_info()->tp_value)
346 printk("*HwTLS: %0*lx\n", field, tls);
347 }
348
f66686f7 349 show_stacktrace(current, regs);
e1bb8289 350 show_code((unsigned int __user *) regs->cp0_epc);
1da177e4
LT
351 printk("\n");
352}
353
70dc6f04
DD
354static int regs_to_trapnr(struct pt_regs *regs)
355{
356 return (regs->cp0_cause >> 2) & 0x1f;
357}
358
4d85f6af 359static DEFINE_RAW_SPINLOCK(die_lock);
1da177e4 360
70dc6f04 361void __noreturn die(const char *str, struct pt_regs *regs)
1da177e4
LT
362{
363 static int die_counter;
ce384d83 364 int sig = SIGSEGV;
41c594ab 365#ifdef CONFIG_MIPS_MT_SMTC
8742cd23 366 unsigned long dvpret;
41c594ab 367#endif /* CONFIG_MIPS_MT_SMTC */
1da177e4 368
8742cd23
NL
369 oops_enter();
370
10423c91
RB
371 if (notify_die(DIE_OOPS, str, regs, 0, regs_to_trapnr(regs), SIGSEGV) == NOTIFY_STOP)
372 sig = 0;
5dd11d5d 373
1da177e4 374 console_verbose();
4d85f6af 375 raw_spin_lock_irq(&die_lock);
8742cd23
NL
376#ifdef CONFIG_MIPS_MT_SMTC
377 dvpret = dvpe();
378#endif /* CONFIG_MIPS_MT_SMTC */
41c594ab
RB
379 bust_spinlocks(1);
380#ifdef CONFIG_MIPS_MT_SMTC
381 mips_mt_regdump(dvpret);
382#endif /* CONFIG_MIPS_MT_SMTC */
ce384d83 383
178086c8 384 printk("%s[#%d]:\n", str, ++die_counter);
1da177e4 385 show_registers(regs);
373d4d09 386 add_taint(TAINT_DIE, LOCKDEP_NOW_UNRELIABLE);
4d85f6af 387 raw_spin_unlock_irq(&die_lock);
d4fd1989 388
8742cd23
NL
389 oops_exit();
390
d4fd1989
MB
391 if (in_interrupt())
392 panic("Fatal exception in interrupt");
393
394 if (panic_on_oops) {
ab75dc02 395 printk(KERN_EMERG "Fatal exception: panic in 5 seconds");
d4fd1989
MB
396 ssleep(5);
397 panic("Fatal exception");
398 }
399
7aa1c8f4
RB
400 if (regs && kexec_should_crash(current))
401 crash_kexec(regs);
402
ce384d83 403 do_exit(sig);
1da177e4
LT
404}
405
0510617b
TB
406extern struct exception_table_entry __start___dbe_table[];
407extern struct exception_table_entry __stop___dbe_table[];
1da177e4 408
b6dcec9b
RB
409__asm__(
410" .section __dbe_table, \"a\"\n"
411" .previous \n");
1da177e4
LT
412
413/* Given an address, look for it in the exception tables. */
414static const struct exception_table_entry *search_dbe_tables(unsigned long addr)
415{
416 const struct exception_table_entry *e;
417
418 e = search_extable(__start___dbe_table, __stop___dbe_table - 1, addr);
419 if (!e)
420 e = search_module_dbetables(addr);
421 return e;
422}
423
424asmlinkage void do_be(struct pt_regs *regs)
425{
426 const int field = 2 * sizeof(unsigned long);
427 const struct exception_table_entry *fixup = NULL;
428 int data = regs->cp0_cause & 4;
429 int action = MIPS_BE_FATAL;
430
70342287 431 /* XXX For now. Fixme, this searches the wrong table ... */
1da177e4
LT
432 if (data && !user_mode(regs))
433 fixup = search_dbe_tables(exception_epc(regs));
434
435 if (fixup)
436 action = MIPS_BE_FIXUP;
437
438 if (board_be_handler)
28fc582c 439 action = board_be_handler(regs, fixup != NULL);
1da177e4
LT
440
441 switch (action) {
442 case MIPS_BE_DISCARD:
443 return;
444 case MIPS_BE_FIXUP:
445 if (fixup) {
446 regs->cp0_epc = fixup->nextinsn;
447 return;
448 }
449 break;
450 default:
451 break;
452 }
453
454 /*
455 * Assume it would be too dangerous to continue ...
456 */
457 printk(KERN_ALERT "%s bus error, epc == %0*lx, ra == %0*lx\n",
458 data ? "Data" : "Instruction",
459 field, regs->cp0_epc, field, regs->regs[31]);
70dc6f04 460 if (notify_die(DIE_OOPS, "bus error", regs, 0, regs_to_trapnr(regs), SIGBUS)
88547001
JW
461 == NOTIFY_STOP)
462 return;
463
1da177e4
LT
464 die_if_kernel("Oops", regs);
465 force_sig(SIGBUS, current);
466}
467
1da177e4 468/*
60b0d655 469 * ll/sc, rdhwr, sync emulation
1da177e4
LT
470 */
471
472#define OPCODE 0xfc000000
473#define BASE 0x03e00000
474#define RT 0x001f0000
475#define OFFSET 0x0000ffff
476#define LL 0xc0000000
477#define SC 0xe0000000
60b0d655 478#define SPEC0 0x00000000
3c37026d
RB
479#define SPEC3 0x7c000000
480#define RD 0x0000f800
481#define FUNC 0x0000003f
60b0d655 482#define SYNC 0x0000000f
3c37026d 483#define RDHWR 0x0000003b
1da177e4
LT
484
485/*
486 * The ll_bit is cleared by r*_switch.S
487 */
488
f1e39a4a
RB
489unsigned int ll_bit;
490struct task_struct *ll_task;
1da177e4 491
60b0d655 492static inline int simulate_ll(struct pt_regs *regs, unsigned int opcode)
1da177e4 493{
fe00f943 494 unsigned long value, __user *vaddr;
1da177e4 495 long offset;
1da177e4
LT
496
497 /*
498 * analyse the ll instruction that just caused a ri exception
499 * and put the referenced address to addr.
500 */
501
502 /* sign extend offset */
503 offset = opcode & OFFSET;
504 offset <<= 16;
505 offset >>= 16;
506
fe00f943 507 vaddr = (unsigned long __user *)
b9688310 508 ((unsigned long)(regs->regs[(opcode & BASE) >> 21]) + offset);
1da177e4 509
60b0d655
MR
510 if ((unsigned long)vaddr & 3)
511 return SIGBUS;
512 if (get_user(value, vaddr))
513 return SIGSEGV;
1da177e4
LT
514
515 preempt_disable();
516
517 if (ll_task == NULL || ll_task == current) {
518 ll_bit = 1;
519 } else {
520 ll_bit = 0;
521 }
522 ll_task = current;
523
524 preempt_enable();
525
526 regs->regs[(opcode & RT) >> 16] = value;
527
60b0d655 528 return 0;
1da177e4
LT
529}
530
60b0d655 531static inline int simulate_sc(struct pt_regs *regs, unsigned int opcode)
1da177e4 532{
fe00f943
RB
533 unsigned long __user *vaddr;
534 unsigned long reg;
1da177e4 535 long offset;
1da177e4
LT
536
537 /*
538 * analyse the sc instruction that just caused a ri exception
539 * and put the referenced address to addr.
540 */
541
542 /* sign extend offset */
543 offset = opcode & OFFSET;
544 offset <<= 16;
545 offset >>= 16;
546
fe00f943 547 vaddr = (unsigned long __user *)
b9688310 548 ((unsigned long)(regs->regs[(opcode & BASE) >> 21]) + offset);
1da177e4
LT
549 reg = (opcode & RT) >> 16;
550
60b0d655
MR
551 if ((unsigned long)vaddr & 3)
552 return SIGBUS;
1da177e4
LT
553
554 preempt_disable();
555
556 if (ll_bit == 0 || ll_task != current) {
557 regs->regs[reg] = 0;
558 preempt_enable();
60b0d655 559 return 0;
1da177e4
LT
560 }
561
562 preempt_enable();
563
60b0d655
MR
564 if (put_user(regs->regs[reg], vaddr))
565 return SIGSEGV;
1da177e4
LT
566
567 regs->regs[reg] = 1;
568
60b0d655 569 return 0;
1da177e4
LT
570}
571
572/*
573 * ll uses the opcode of lwc0 and sc uses the opcode of swc0. That is both
574 * opcodes are supposed to result in coprocessor unusable exceptions if
575 * executed on ll/sc-less processors. That's the theory. In practice a
576 * few processors such as NEC's VR4100 throw reserved instruction exceptions
577 * instead, so we're doing the emulation thing in both exception handlers.
578 */
60b0d655 579static int simulate_llsc(struct pt_regs *regs, unsigned int opcode)
1da177e4 580{
7f788d2d
DCZ
581 if ((opcode & OPCODE) == LL) {
582 perf_sw_event(PERF_COUNT_SW_EMULATION_FAULTS,
a8b0ca17 583 1, regs, 0);
60b0d655 584 return simulate_ll(regs, opcode);
7f788d2d
DCZ
585 }
586 if ((opcode & OPCODE) == SC) {
587 perf_sw_event(PERF_COUNT_SW_EMULATION_FAULTS,
a8b0ca17 588 1, regs, 0);
60b0d655 589 return simulate_sc(regs, opcode);
7f788d2d 590 }
1da177e4 591
60b0d655 592 return -1; /* Must be something else ... */
1da177e4
LT
593}
594
3c37026d
RB
595/*
596 * Simulate trapping 'rdhwr' instructions to provide user accessible
1f5826bd 597 * registers not implemented in hardware.
3c37026d 598 */
60b0d655 599static int simulate_rdhwr(struct pt_regs *regs, unsigned int opcode)
3c37026d 600{
dc8f6029 601 struct thread_info *ti = task_thread_info(current);
3c37026d
RB
602
603 if ((opcode & OPCODE) == SPEC3 && (opcode & FUNC) == RDHWR) {
604 int rd = (opcode & RD) >> 11;
605 int rt = (opcode & RT) >> 16;
7f788d2d 606 perf_sw_event(PERF_COUNT_SW_EMULATION_FAULTS,
a8b0ca17 607 1, regs, 0);
3c37026d 608 switch (rd) {
1f5826bd
CD
609 case 0: /* CPU number */
610 regs->regs[rt] = smp_processor_id();
611 return 0;
612 case 1: /* SYNCI length */
613 regs->regs[rt] = min(current_cpu_data.dcache.linesz,
614 current_cpu_data.icache.linesz);
615 return 0;
616 case 2: /* Read count register */
617 regs->regs[rt] = read_c0_count();
618 return 0;
619 case 3: /* Count register resolution */
620 switch (current_cpu_data.cputype) {
621 case CPU_20KC:
622 case CPU_25KF:
623 regs->regs[rt] = 1;
624 break;
3c37026d 625 default:
1f5826bd
CD
626 regs->regs[rt] = 2;
627 }
628 return 0;
629 case 29:
630 regs->regs[rt] = ti->tp_value;
631 return 0;
632 default:
633 return -1;
3c37026d
RB
634 }
635 }
636
56ebd51b 637 /* Not ours. */
60b0d655
MR
638 return -1;
639}
e5679882 640
60b0d655
MR
641static int simulate_sync(struct pt_regs *regs, unsigned int opcode)
642{
7f788d2d
DCZ
643 if ((opcode & OPCODE) == SPEC0 && (opcode & FUNC) == SYNC) {
644 perf_sw_event(PERF_COUNT_SW_EMULATION_FAULTS,
a8b0ca17 645 1, regs, 0);
60b0d655 646 return 0;
7f788d2d 647 }
60b0d655
MR
648
649 return -1; /* Must be something else ... */
3c37026d
RB
650}
651
1da177e4
LT
652asmlinkage void do_ov(struct pt_regs *regs)
653{
654 siginfo_t info;
655
36ccf1c0
RB
656 die_if_kernel("Integer overflow", regs);
657
1da177e4
LT
658 info.si_code = FPE_INTOVF;
659 info.si_signo = SIGFPE;
660 info.si_errno = 0;
fe00f943 661 info.si_addr = (void __user *) regs->cp0_epc;
1da177e4
LT
662 force_sig_info(SIGFPE, &info, current);
663}
664
515b029d
DD
665static int process_fpemu_return(int sig, void __user *fault_addr)
666{
667 if (sig == SIGSEGV || sig == SIGBUS) {
668 struct siginfo si = {0};
669 si.si_addr = fault_addr;
670 si.si_signo = sig;
671 if (sig == SIGSEGV) {
672 if (find_vma(current->mm, (unsigned long)fault_addr))
673 si.si_code = SEGV_ACCERR;
674 else
675 si.si_code = SEGV_MAPERR;
676 } else {
677 si.si_code = BUS_ADRERR;
678 }
679 force_sig_info(sig, &si, current);
680 return 1;
681 } else if (sig) {
682 force_sig(sig, current);
683 return 1;
684 } else {
685 return 0;
686 }
687}
688
1da177e4
LT
689/*
690 * XXX Delayed fp exceptions when doing a lazy ctx switch XXX
691 */
692asmlinkage void do_fpe(struct pt_regs *regs, unsigned long fcr31)
693{
515b029d 694 siginfo_t info = {0};
948a34cf 695
70dc6f04 696 if (notify_die(DIE_FP, "FP exception", regs, 0, regs_to_trapnr(regs), SIGFPE)
88547001
JW
697 == NOTIFY_STOP)
698 return;
57725f9e
CD
699 die_if_kernel("FP exception in kernel code", regs);
700
1da177e4
LT
701 if (fcr31 & FPU_CSR_UNI_X) {
702 int sig;
515b029d 703 void __user *fault_addr = NULL;
1da177e4 704
1da177e4 705 /*
a3dddd56 706 * Unimplemented operation exception. If we've got the full
1da177e4
LT
707 * software emulator on-board, let's use it...
708 *
709 * Force FPU to dump state into task/thread context. We're
710 * moving a lot of data here for what is probably a single
711 * instruction, but the alternative is to pre-decode the FP
712 * register operands before invoking the emulator, which seems
713 * a bit extreme for what should be an infrequent event.
714 */
cd21dfcf 715 /* Ensure 'resume' not overwrite saved fp context again. */
53dc8028 716 lose_fpu(1);
1da177e4
LT
717
718 /* Run the emulator */
515b029d
DD
719 sig = fpu_emulator_cop1Handler(regs, &current->thread.fpu, 1,
720 &fault_addr);
1da177e4
LT
721
722 /*
723 * We can't allow the emulated instruction to leave any of
724 * the cause bit set in $fcr31.
725 */
eae89076 726 current->thread.fpu.fcr31 &= ~FPU_CSR_ALL_X;
1da177e4
LT
727
728 /* Restore the hardware register state */
70342287 729 own_fpu(1); /* Using the FPU again. */
1da177e4
LT
730
731 /* If something went wrong, signal */
515b029d 732 process_fpemu_return(sig, fault_addr);
1da177e4
LT
733
734 return;
948a34cf
TS
735 } else if (fcr31 & FPU_CSR_INV_X)
736 info.si_code = FPE_FLTINV;
737 else if (fcr31 & FPU_CSR_DIV_X)
738 info.si_code = FPE_FLTDIV;
739 else if (fcr31 & FPU_CSR_OVF_X)
740 info.si_code = FPE_FLTOVF;
741 else if (fcr31 & FPU_CSR_UDF_X)
742 info.si_code = FPE_FLTUND;
743 else if (fcr31 & FPU_CSR_INE_X)
744 info.si_code = FPE_FLTRES;
745 else
746 info.si_code = __SI_FAULT;
747 info.si_signo = SIGFPE;
748 info.si_errno = 0;
749 info.si_addr = (void __user *) regs->cp0_epc;
750 force_sig_info(SIGFPE, &info, current);
1da177e4
LT
751}
752
df270051
RB
753static void do_trap_or_bp(struct pt_regs *regs, unsigned int code,
754 const char *str)
1da177e4 755{
1da177e4 756 siginfo_t info;
df270051 757 char b[40];
1da177e4 758
5dd11d5d 759#ifdef CONFIG_KGDB_LOW_LEVEL_TRAP
70dc6f04 760 if (kgdb_ll_trap(DIE_TRAP, str, regs, code, regs_to_trapnr(regs), SIGTRAP) == NOTIFY_STOP)
5dd11d5d
JW
761 return;
762#endif /* CONFIG_KGDB_LOW_LEVEL_TRAP */
763
70dc6f04 764 if (notify_die(DIE_TRAP, str, regs, code, regs_to_trapnr(regs), SIGTRAP) == NOTIFY_STOP)
88547001
JW
765 return;
766
1da177e4 767 /*
df270051
RB
768 * A short test says that IRIX 5.3 sends SIGTRAP for all trap
769 * insns, even for trap and break codes that indicate arithmetic
770 * failures. Weird ...
1da177e4
LT
771 * But should we continue the brokenness??? --macro
772 */
df270051
RB
773 switch (code) {
774 case BRK_OVERFLOW:
775 case BRK_DIVZERO:
776 scnprintf(b, sizeof(b), "%s instruction in kernel code", str);
777 die_if_kernel(b, regs);
778 if (code == BRK_DIVZERO)
1da177e4
LT
779 info.si_code = FPE_INTDIV;
780 else
781 info.si_code = FPE_INTOVF;
782 info.si_signo = SIGFPE;
783 info.si_errno = 0;
fe00f943 784 info.si_addr = (void __user *) regs->cp0_epc;
1da177e4
LT
785 force_sig_info(SIGFPE, &info, current);
786 break;
63dc68a8 787 case BRK_BUG:
df270051
RB
788 die_if_kernel("Kernel bug detected", regs);
789 force_sig(SIGTRAP, current);
63dc68a8 790 break;
ba3049ed
RB
791 case BRK_MEMU:
792 /*
793 * Address errors may be deliberately induced by the FPU
794 * emulator to retake control of the CPU after executing the
795 * instruction in the delay slot of an emulated branch.
796 *
797 * Terminate if exception was recognized as a delay slot return
798 * otherwise handle as normal.
799 */
800 if (do_dsemulret(regs))
801 return;
802
803 die_if_kernel("Math emu break/trap", regs);
804 force_sig(SIGTRAP, current);
805 break;
1da177e4 806 default:
df270051
RB
807 scnprintf(b, sizeof(b), "%s instruction in kernel code", str);
808 die_if_kernel(b, regs);
1da177e4
LT
809 force_sig(SIGTRAP, current);
810 }
df270051
RB
811}
812
813asmlinkage void do_bp(struct pt_regs *regs)
814{
815 unsigned int opcode, bcode;
816
817 if (__get_user(opcode, (unsigned int __user *) exception_epc(regs)))
818 goto out_sigsegv;
819
820 /*
821 * There is the ancient bug in the MIPS assemblers that the break
822 * code starts left to bit 16 instead to bit 6 in the opcode.
823 * Gas is bug-compatible, but not always, grrr...
824 * We handle both cases with a simple heuristics. --macro
825 */
826 bcode = ((opcode >> 6) & ((1 << 20) - 1));
827 if (bcode >= (1 << 10))
828 bcode >>= 10;
829
c1bf207d
DD
830 /*
831 * notify the kprobe handlers, if instruction is likely to
832 * pertain to them.
833 */
834 switch (bcode) {
835 case BRK_KPROBE_BP:
70dc6f04 836 if (notify_die(DIE_BREAK, "debug", regs, bcode, regs_to_trapnr(regs), SIGTRAP) == NOTIFY_STOP)
c1bf207d
DD
837 return;
838 else
839 break;
840 case BRK_KPROBE_SSTEPBP:
70dc6f04 841 if (notify_die(DIE_SSTEPBP, "single_step", regs, bcode, regs_to_trapnr(regs), SIGTRAP) == NOTIFY_STOP)
c1bf207d
DD
842 return;
843 else
844 break;
845 default:
846 break;
847 }
848
df270051 849 do_trap_or_bp(regs, bcode, "Break");
90fccb13 850 return;
e5679882
RB
851
852out_sigsegv:
853 force_sig(SIGSEGV, current);
1da177e4
LT
854}
855
856asmlinkage void do_tr(struct pt_regs *regs)
857{
858 unsigned int opcode, tcode = 0;
1da177e4 859
ba755f8e 860 if (__get_user(opcode, (unsigned int __user *) exception_epc(regs)))
e5679882 861 goto out_sigsegv;
1da177e4
LT
862
863 /* Immediate versions don't provide a code. */
864 if (!(opcode & OPCODE))
865 tcode = ((opcode >> 6) & ((1 << 10) - 1));
866
df270051 867 do_trap_or_bp(regs, tcode, "Trap");
90fccb13 868 return;
e5679882
RB
869
870out_sigsegv:
871 force_sig(SIGSEGV, current);
1da177e4
LT
872}
873
874asmlinkage void do_ri(struct pt_regs *regs)
875{
60b0d655
MR
876 unsigned int __user *epc = (unsigned int __user *)exception_epc(regs);
877 unsigned long old_epc = regs->cp0_epc;
878 unsigned int opcode = 0;
879 int status = -1;
1da177e4 880
70dc6f04 881 if (notify_die(DIE_RI, "RI Fault", regs, 0, regs_to_trapnr(regs), SIGILL)
88547001
JW
882 == NOTIFY_STOP)
883 return;
884
60b0d655 885 die_if_kernel("Reserved instruction in kernel code", regs);
1da177e4 886
60b0d655 887 if (unlikely(compute_return_epc(regs) < 0))
3c37026d
RB
888 return;
889
60b0d655
MR
890 if (unlikely(get_user(opcode, epc) < 0))
891 status = SIGSEGV;
892
893 if (!cpu_has_llsc && status < 0)
894 status = simulate_llsc(regs, opcode);
895
896 if (status < 0)
897 status = simulate_rdhwr(regs, opcode);
898
899 if (status < 0)
900 status = simulate_sync(regs, opcode);
901
902 if (status < 0)
903 status = SIGILL;
904
905 if (unlikely(status > 0)) {
906 regs->cp0_epc = old_epc; /* Undo skip-over. */
907 force_sig(status, current);
908 }
1da177e4
LT
909}
910
d223a861
RB
911/*
912 * MIPS MT processors may have fewer FPU contexts than CPU threads. If we've
913 * emulated more than some threshold number of instructions, force migration to
914 * a "CPU" that has FP support.
915 */
916static void mt_ase_fp_affinity(void)
917{
918#ifdef CONFIG_MIPS_MT_FPAFF
919 if (mt_fpemul_threshold > 0 &&
920 ((current->thread.emulated_fp++ > mt_fpemul_threshold))) {
921 /*
922 * If there's no FPU present, or if the application has already
923 * restricted the allowed set to exclude any CPUs with FPUs,
924 * we'll skip the procedure.
925 */
926 if (cpus_intersects(current->cpus_allowed, mt_fpu_cpumask)) {
927 cpumask_t tmask;
928
9cc12363
KK
929 current->thread.user_cpus_allowed
930 = current->cpus_allowed;
931 cpus_and(tmask, current->cpus_allowed,
932 mt_fpu_cpumask);
ed1bbdef 933 set_cpus_allowed_ptr(current, &tmask);
293c5bd1 934 set_thread_flag(TIF_FPUBOUND);
d223a861
RB
935 }
936 }
937#endif /* CONFIG_MIPS_MT_FPAFF */
938}
939
69f3a7de
RB
940/*
941 * No lock; only written during early bootup by CPU 0.
942 */
943static RAW_NOTIFIER_HEAD(cu2_chain);
944
945int __ref register_cu2_notifier(struct notifier_block *nb)
946{
947 return raw_notifier_chain_register(&cu2_chain, nb);
948}
949
950int cu2_notifier_call_chain(unsigned long val, void *v)
951{
952 return raw_notifier_call_chain(&cu2_chain, val, v);
953}
954
955static int default_cu2_call(struct notifier_block *nfb, unsigned long action,
70342287 956 void *data)
69f3a7de
RB
957{
958 struct pt_regs *regs = data;
959
960 switch (action) {
961 default:
962 die_if_kernel("Unhandled kernel unaligned access or invalid "
963 "instruction", regs);
70342287 964 /* Fall through */
69f3a7de
RB
965
966 case CU2_EXCEPTION:
967 force_sig(SIGILL, current);
968 }
969
970 return NOTIFY_OK;
971}
972
1da177e4
LT
973asmlinkage void do_cpu(struct pt_regs *regs)
974{
60b0d655
MR
975 unsigned int __user *epc;
976 unsigned long old_epc;
977 unsigned int opcode;
1da177e4 978 unsigned int cpid;
60b0d655 979 int status;
f9bb4cf3 980 unsigned long __maybe_unused flags;
1da177e4 981
5323180d
AN
982 die_if_kernel("do_cpu invoked from kernel context!", regs);
983
1da177e4
LT
984 cpid = (regs->cp0_cause >> CAUSEB_CE) & 3;
985
986 switch (cpid) {
987 case 0:
60b0d655
MR
988 epc = (unsigned int __user *)exception_epc(regs);
989 old_epc = regs->cp0_epc;
990 opcode = 0;
991 status = -1;
1da177e4 992
60b0d655 993 if (unlikely(compute_return_epc(regs) < 0))
1da177e4 994 return;
3c37026d 995
60b0d655
MR
996 if (unlikely(get_user(opcode, epc) < 0))
997 status = SIGSEGV;
998
999 if (!cpu_has_llsc && status < 0)
1000 status = simulate_llsc(regs, opcode);
1001
1002 if (status < 0)
1003 status = simulate_rdhwr(regs, opcode);
1004
1005 if (status < 0)
1006 status = SIGILL;
1007
1008 if (unlikely(status > 0)) {
1009 regs->cp0_epc = old_epc; /* Undo skip-over. */
1010 force_sig(status, current);
1011 }
1012
1013 return;
1da177e4 1014
051ff44a
MR
1015 case 3:
1016 /*
1017 * Old (MIPS I and MIPS II) processors will set this code
1018 * for COP1X opcode instructions that replaced the original
70342287 1019 * COP3 space. We don't limit COP1 space instructions in
051ff44a
MR
1020 * the emulator according to the CPU ISA, so we want to
1021 * treat COP1X instructions consistently regardless of which
70342287 1022 * code the CPU chose. Therefore we redirect this trap to
051ff44a
MR
1023 * the FP emulator too.
1024 *
1025 * Then some newer FPU-less processors use this code
1026 * erroneously too, so they are covered by this choice
1027 * as well.
1028 */
1029 if (raw_cpu_has_fpu)
1030 break;
1031 /* Fall through. */
1032
1da177e4 1033 case 1:
70342287 1034 if (used_math()) /* Using the FPU again. */
53dc8028 1035 own_fpu(1);
70342287 1036 else { /* First time FPU user. */
1da177e4
LT
1037 init_fpu();
1038 set_used_math();
1039 }
1040
5323180d 1041 if (!raw_cpu_has_fpu) {
e04582b7 1042 int sig;
515b029d 1043 void __user *fault_addr = NULL;
e04582b7 1044 sig = fpu_emulator_cop1Handler(regs,
515b029d
DD
1045 &current->thread.fpu,
1046 0, &fault_addr);
1047 if (!process_fpemu_return(sig, fault_addr))
d223a861 1048 mt_ase_fp_affinity();
1da177e4
LT
1049 }
1050
1da177e4
LT
1051 return;
1052
1053 case 2:
69f3a7de 1054 raw_notifier_call_chain(&cu2_chain, CU2_EXCEPTION, regs);
55dc9d51 1055 return;
1da177e4
LT
1056 }
1057
1058 force_sig(SIGILL, current);
1059}
1060
1061asmlinkage void do_mdmx(struct pt_regs *regs)
1062{
1063 force_sig(SIGILL, current);
1064}
1065
8bc6d05b
DD
1066/*
1067 * Called with interrupts disabled.
1068 */
1da177e4
LT
1069asmlinkage void do_watch(struct pt_regs *regs)
1070{
b67b2b70
DD
1071 u32 cause;
1072
1da177e4 1073 /*
b67b2b70
DD
1074 * Clear WP (bit 22) bit of cause register so we don't loop
1075 * forever.
1da177e4 1076 */
b67b2b70
DD
1077 cause = read_c0_cause();
1078 cause &= ~(1 << 22);
1079 write_c0_cause(cause);
1080
1081 /*
1082 * If the current thread has the watch registers loaded, save
1083 * their values and send SIGTRAP. Otherwise another thread
1084 * left the registers set, clear them and continue.
1085 */
1086 if (test_tsk_thread_flag(current, TIF_LOAD_WATCH)) {
1087 mips_read_watch_registers();
8bc6d05b 1088 local_irq_enable();
b67b2b70 1089 force_sig(SIGTRAP, current);
8bc6d05b 1090 } else {
b67b2b70 1091 mips_clear_watch_registers();
8bc6d05b
DD
1092 local_irq_enable();
1093 }
1da177e4
LT
1094}
1095
1096asmlinkage void do_mcheck(struct pt_regs *regs)
1097{
cac4bcbc
RB
1098 const int field = 2 * sizeof(unsigned long);
1099 int multi_match = regs->cp0_status & ST0_TS;
1100
1da177e4 1101 show_regs(regs);
cac4bcbc
RB
1102
1103 if (multi_match) {
70342287 1104 printk("Index : %0x\n", read_c0_index());
cac4bcbc
RB
1105 printk("Pagemask: %0x\n", read_c0_pagemask());
1106 printk("EntryHi : %0*lx\n", field, read_c0_entryhi());
1107 printk("EntryLo0: %0*lx\n", field, read_c0_entrylo0());
1108 printk("EntryLo1: %0*lx\n", field, read_c0_entrylo1());
1109 printk("\n");
1110 dump_tlb_all();
1111 }
1112
e1bb8289 1113 show_code((unsigned int __user *) regs->cp0_epc);
cac4bcbc 1114
1da177e4
LT
1115 /*
1116 * Some chips may have other causes of machine check (e.g. SB1
1117 * graduation timer)
1118 */
1119 panic("Caught Machine Check exception - %scaused by multiple "
1120 "matching entries in the TLB.",
cac4bcbc 1121 (multi_match) ? "" : "not ");
1da177e4
LT
1122}
1123
340ee4b9
RB
1124asmlinkage void do_mt(struct pt_regs *regs)
1125{
41c594ab
RB
1126 int subcode;
1127
41c594ab
RB
1128 subcode = (read_vpe_c0_vpecontrol() & VPECONTROL_EXCPT)
1129 >> VPECONTROL_EXCPT_SHIFT;
1130 switch (subcode) {
1131 case 0:
e35a5e35 1132 printk(KERN_DEBUG "Thread Underflow\n");
41c594ab
RB
1133 break;
1134 case 1:
e35a5e35 1135 printk(KERN_DEBUG "Thread Overflow\n");
41c594ab
RB
1136 break;
1137 case 2:
e35a5e35 1138 printk(KERN_DEBUG "Invalid YIELD Qualifier\n");
41c594ab
RB
1139 break;
1140 case 3:
e35a5e35 1141 printk(KERN_DEBUG "Gating Storage Exception\n");
41c594ab
RB
1142 break;
1143 case 4:
e35a5e35 1144 printk(KERN_DEBUG "YIELD Scheduler Exception\n");
41c594ab
RB
1145 break;
1146 case 5:
f232c7e8 1147 printk(KERN_DEBUG "Gating Storage Scheduler Exception\n");
41c594ab
RB
1148 break;
1149 default:
e35a5e35 1150 printk(KERN_DEBUG "*** UNKNOWN THREAD EXCEPTION %d ***\n",
41c594ab
RB
1151 subcode);
1152 break;
1153 }
340ee4b9
RB
1154 die_if_kernel("MIPS MT Thread exception in kernel", regs);
1155
1156 force_sig(SIGILL, current);
1157}
1158
1159
e50c0a8f
RB
1160asmlinkage void do_dsp(struct pt_regs *regs)
1161{
1162 if (cpu_has_dsp)
ab75dc02 1163 panic("Unexpected DSP exception");
e50c0a8f
RB
1164
1165 force_sig(SIGILL, current);
1166}
1167
1da177e4
LT
1168asmlinkage void do_reserved(struct pt_regs *regs)
1169{
1170 /*
70342287 1171 * Game over - no way to handle this if it ever occurs. Most probably
1da177e4
LT
1172 * caused by a new unknown cpu type or after another deadly
1173 * hard/software error.
1174 */
1175 show_regs(regs);
1176 panic("Caught reserved exception %ld - should not happen.",
1177 (regs->cp0_cause & 0x7f) >> 2);
1178}
1179
39b8d525
RB
1180static int __initdata l1parity = 1;
1181static int __init nol1parity(char *s)
1182{
1183 l1parity = 0;
1184 return 1;
1185}
1186__setup("nol1par", nol1parity);
1187static int __initdata l2parity = 1;
1188static int __init nol2parity(char *s)
1189{
1190 l2parity = 0;
1191 return 1;
1192}
1193__setup("nol2par", nol2parity);
1194
1da177e4
LT
1195/*
1196 * Some MIPS CPUs can enable/disable for cache parity detection, but do
1197 * it different ways.
1198 */
1199static inline void parity_protection_init(void)
1200{
10cc3529 1201 switch (current_cpu_type()) {
1da177e4 1202 case CPU_24K:
98a41de9 1203 case CPU_34K:
39b8d525
RB
1204 case CPU_74K:
1205 case CPU_1004K:
1206 {
1207#define ERRCTL_PE 0x80000000
1208#define ERRCTL_L2P 0x00800000
1209 unsigned long errctl;
1210 unsigned int l1parity_present, l2parity_present;
1211
1212 errctl = read_c0_ecc();
1213 errctl &= ~(ERRCTL_PE|ERRCTL_L2P);
1214
1215 /* probe L1 parity support */
1216 write_c0_ecc(errctl | ERRCTL_PE);
1217 back_to_back_c0_hazard();
1218 l1parity_present = (read_c0_ecc() & ERRCTL_PE);
1219
1220 /* probe L2 parity support */
1221 write_c0_ecc(errctl|ERRCTL_L2P);
1222 back_to_back_c0_hazard();
1223 l2parity_present = (read_c0_ecc() & ERRCTL_L2P);
1224
1225 if (l1parity_present && l2parity_present) {
1226 if (l1parity)
1227 errctl |= ERRCTL_PE;
1228 if (l1parity ^ l2parity)
1229 errctl |= ERRCTL_L2P;
1230 } else if (l1parity_present) {
1231 if (l1parity)
1232 errctl |= ERRCTL_PE;
1233 } else if (l2parity_present) {
1234 if (l2parity)
1235 errctl |= ERRCTL_L2P;
1236 } else {
1237 /* No parity available */
1238 }
1239
1240 printk(KERN_INFO "Writing ErrCtl register=%08lx\n", errctl);
1241
1242 write_c0_ecc(errctl);
1243 back_to_back_c0_hazard();
1244 errctl = read_c0_ecc();
1245 printk(KERN_INFO "Readback ErrCtl register=%08lx\n", errctl);
1246
1247 if (l1parity_present)
1248 printk(KERN_INFO "Cache parity protection %sabled\n",
1249 (errctl & ERRCTL_PE) ? "en" : "dis");
1250
1251 if (l2parity_present) {
1252 if (l1parity_present && l1parity)
1253 errctl ^= ERRCTL_L2P;
1254 printk(KERN_INFO "L2 cache parity protection %sabled\n",
1255 (errctl & ERRCTL_L2P) ? "en" : "dis");
1256 }
1257 }
1258 break;
1259
1da177e4 1260 case CPU_5KC:
78d4803f 1261 case CPU_5KE:
2fa36399 1262 case CPU_LOONGSON1:
14f18b7f
RB
1263 write_c0_ecc(0x80000000);
1264 back_to_back_c0_hazard();
1265 /* Set the PE bit (bit 31) in the c0_errctl register. */
1266 printk(KERN_INFO "Cache parity protection %sabled\n",
1267 (read_c0_ecc() & 0x80000000) ? "en" : "dis");
1da177e4
LT
1268 break;
1269 case CPU_20KC:
1270 case CPU_25KF:
1271 /* Clear the DE bit (bit 16) in the c0_status register. */
1272 printk(KERN_INFO "Enable cache parity protection for "
1273 "MIPS 20KC/25KF CPUs.\n");
1274 clear_c0_status(ST0_DE);
1275 break;
1276 default:
1277 break;
1278 }
1279}
1280
1281asmlinkage void cache_parity_error(void)
1282{
1283 const int field = 2 * sizeof(unsigned long);
1284 unsigned int reg_val;
1285
1286 /* For the moment, report the problem and hang. */
1287 printk("Cache error exception:\n");
1288 printk("cp0_errorepc == %0*lx\n", field, read_c0_errorepc());
1289 reg_val = read_c0_cacheerr();
1290 printk("c0_cacheerr == %08x\n", reg_val);
1291
1292 printk("Decoded c0_cacheerr: %s cache fault in %s reference.\n",
1293 reg_val & (1<<30) ? "secondary" : "primary",
1294 reg_val & (1<<31) ? "data" : "insn");
1295 printk("Error bits: %s%s%s%s%s%s%s\n",
1296 reg_val & (1<<29) ? "ED " : "",
1297 reg_val & (1<<28) ? "ET " : "",
1298 reg_val & (1<<26) ? "EE " : "",
1299 reg_val & (1<<25) ? "EB " : "",
1300 reg_val & (1<<24) ? "EI " : "",
1301 reg_val & (1<<23) ? "E1 " : "",
1302 reg_val & (1<<22) ? "E0 " : "");
1303 printk("IDX: 0x%08x\n", reg_val & ((1<<22)-1));
1304
ec917c2c 1305#if defined(CONFIG_CPU_MIPS32) || defined(CONFIG_CPU_MIPS64)
1da177e4
LT
1306 if (reg_val & (1<<22))
1307 printk("DErrAddr0: 0x%0*lx\n", field, read_c0_derraddr0());
1308
1309 if (reg_val & (1<<23))
1310 printk("DErrAddr1: 0x%0*lx\n", field, read_c0_derraddr1());
1311#endif
1312
1313 panic("Can't handle the cache error!");
1314}
1315
1316/*
1317 * SDBBP EJTAG debug exception handler.
1318 * We skip the instruction and return to the next instruction.
1319 */
1320void ejtag_exception_handler(struct pt_regs *regs)
1321{
1322 const int field = 2 * sizeof(unsigned long);
1323 unsigned long depc, old_epc;
1324 unsigned int debug;
1325
70ae6126 1326 printk(KERN_DEBUG "SDBBP EJTAG debug exception - not handled yet, just ignored!\n");
1da177e4
LT
1327 depc = read_c0_depc();
1328 debug = read_c0_debug();
70ae6126 1329 printk(KERN_DEBUG "c0_depc = %0*lx, DEBUG = %08x\n", field, depc, debug);
1da177e4
LT
1330 if (debug & 0x80000000) {
1331 /*
1332 * In branch delay slot.
1333 * We cheat a little bit here and use EPC to calculate the
1334 * debug return address (DEPC). EPC is restored after the
1335 * calculation.
1336 */
1337 old_epc = regs->cp0_epc;
1338 regs->cp0_epc = depc;
1339 __compute_return_epc(regs);
1340 depc = regs->cp0_epc;
1341 regs->cp0_epc = old_epc;
1342 } else
1343 depc += 4;
1344 write_c0_depc(depc);
1345
1346#if 0
70ae6126 1347 printk(KERN_DEBUG "\n\n----- Enable EJTAG single stepping ----\n\n");
1da177e4
LT
1348 write_c0_debug(debug | 0x100);
1349#endif
1350}
1351
1352/*
1353 * NMI exception handler.
34bd92e2 1354 * No lock; only written during early bootup by CPU 0.
1da177e4 1355 */
34bd92e2
KC
1356static RAW_NOTIFIER_HEAD(nmi_chain);
1357
1358int register_nmi_notifier(struct notifier_block *nb)
1359{
1360 return raw_notifier_chain_register(&nmi_chain, nb);
1361}
1362
ff2d8b19 1363void __noreturn nmi_exception_handler(struct pt_regs *regs)
1da177e4 1364{
34bd92e2 1365 raw_notifier_call_chain(&nmi_chain, 0, regs);
41c594ab 1366 bust_spinlocks(1);
1da177e4
LT
1367 printk("NMI taken!!!!\n");
1368 die("NMI", regs);
1da177e4
LT
1369}
1370
e01402b1
RB
1371#define VECTORSPACING 0x100 /* for EI/VI mode */
1372
1373unsigned long ebase;
1da177e4 1374unsigned long exception_handlers[32];
e01402b1 1375unsigned long vi_handlers[64];
1da177e4 1376
2d1b6e95 1377void __init *set_except_vector(int n, void *addr)
1da177e4
LT
1378{
1379 unsigned long handler = (unsigned long) addr;
1380 unsigned long old_handler = exception_handlers[n];
1381
1382 exception_handlers[n] = handler;
1383 if (n == 0 && cpu_has_divec) {
92bbe1b9
FF
1384 unsigned long jump_mask = ~((1 << 28) - 1);
1385 u32 *buf = (u32 *)(ebase + 0x200);
1386 unsigned int k0 = 26;
1387 if ((handler & jump_mask) == ((ebase + 0x200) & jump_mask)) {
1388 uasm_i_j(&buf, handler & ~jump_mask);
1389 uasm_i_nop(&buf);
1390 } else {
1391 UASM_i_LA(&buf, k0, handler);
1392 uasm_i_jr(&buf, k0);
1393 uasm_i_nop(&buf);
1394 }
1395 local_flush_icache_range(ebase + 0x200, (unsigned long)buf);
e01402b1
RB
1396 }
1397 return (void *)old_handler;
1398}
1399
6ba07e59
AN
1400static asmlinkage void do_default_vi(void)
1401{
1402 show_regs(get_irq_regs());
1403 panic("Caught unexpected vectored interrupt.");
1404}
1405
ef300e42 1406static void *set_vi_srs_handler(int n, vi_handler_t addr, int srs)
e01402b1
RB
1407{
1408 unsigned long handler;
1409 unsigned long old_handler = vi_handlers[n];
f6771dbb 1410 int srssets = current_cpu_data.srsets;
e01402b1
RB
1411 u32 *w;
1412 unsigned char *b;
1413
b72b7092 1414 BUG_ON(!cpu_has_veic && !cpu_has_vint);
e01402b1
RB
1415
1416 if (addr == NULL) {
1417 handler = (unsigned long) do_default_vi;
1418 srs = 0;
41c594ab 1419 } else
e01402b1
RB
1420 handler = (unsigned long) addr;
1421 vi_handlers[n] = (unsigned long) addr;
1422
1423 b = (unsigned char *)(ebase + 0x200 + n*VECTORSPACING);
1424
f6771dbb 1425 if (srs >= srssets)
e01402b1
RB
1426 panic("Shadow register set %d not supported", srs);
1427
1428 if (cpu_has_veic) {
1429 if (board_bind_eic_interrupt)
49a89efb 1430 board_bind_eic_interrupt(n, srs);
41c594ab 1431 } else if (cpu_has_vint) {
e01402b1 1432 /* SRSMap is only defined if shadow sets are implemented */
f6771dbb 1433 if (srssets > 1)
49a89efb 1434 change_c0_srsmap(0xf << n*4, srs << n*4);
e01402b1
RB
1435 }
1436
1437 if (srs == 0) {
1438 /*
1439 * If no shadow set is selected then use the default handler
1440 * that does normal register saving and a standard interrupt exit
1441 */
1442
1443 extern char except_vec_vi, except_vec_vi_lui;
1444 extern char except_vec_vi_ori, except_vec_vi_end;
c65a5480
AN
1445 extern char rollback_except_vec_vi;
1446 char *vec_start = (cpu_wait == r4k_wait) ?
1447 &rollback_except_vec_vi : &except_vec_vi;
41c594ab
RB
1448#ifdef CONFIG_MIPS_MT_SMTC
1449 /*
1450 * We need to provide the SMTC vectored interrupt handler
1451 * not only with the address of the handler, but with the
1452 * Status.IM bit to be masked before going there.
1453 */
1454 extern char except_vec_vi_mori;
c65a5480 1455 const int mori_offset = &except_vec_vi_mori - vec_start;
41c594ab 1456#endif /* CONFIG_MIPS_MT_SMTC */
c65a5480
AN
1457 const int handler_len = &except_vec_vi_end - vec_start;
1458 const int lui_offset = &except_vec_vi_lui - vec_start;
1459 const int ori_offset = &except_vec_vi_ori - vec_start;
e01402b1
RB
1460
1461 if (handler_len > VECTORSPACING) {
1462 /*
1463 * Sigh... panicing won't help as the console
1464 * is probably not configured :(
1465 */
49a89efb 1466 panic("VECTORSPACING too small");
e01402b1
RB
1467 }
1468
c65a5480 1469 memcpy(b, vec_start, handler_len);
41c594ab 1470#ifdef CONFIG_MIPS_MT_SMTC
8e8a52ed
RB
1471 BUG_ON(n > 7); /* Vector index %d exceeds SMTC maximum. */
1472
41c594ab
RB
1473 w = (u32 *)(b + mori_offset);
1474 *w = (*w & 0xffff0000) | (0x100 << n);
1475#endif /* CONFIG_MIPS_MT_SMTC */
e01402b1
RB
1476 w = (u32 *)(b + lui_offset);
1477 *w = (*w & 0xffff0000) | (((u32)handler >> 16) & 0xffff);
1478 w = (u32 *)(b + ori_offset);
1479 *w = (*w & 0xffff0000) | ((u32)handler & 0xffff);
e0cee3ee
TB
1480 local_flush_icache_range((unsigned long)b,
1481 (unsigned long)(b+handler_len));
e01402b1
RB
1482 }
1483 else {
1484 /*
1485 * In other cases jump directly to the interrupt handler
1486 *
1487 * It is the handlers responsibility to save registers if required
1488 * (eg hi/lo) and return from the exception using "eret"
1489 */
1490 w = (u32 *)b;
1491 *w++ = 0x08000000 | (((u32)handler >> 2) & 0x03fffff); /* j handler */
1492 *w = 0;
e0cee3ee
TB
1493 local_flush_icache_range((unsigned long)b,
1494 (unsigned long)(b+8));
1da177e4 1495 }
e01402b1 1496
1da177e4
LT
1497 return (void *)old_handler;
1498}
1499
ef300e42 1500void *set_vi_handler(int n, vi_handler_t addr)
e01402b1 1501{
ff3eab2a 1502 return set_vi_srs_handler(n, addr, 0);
e01402b1 1503}
f41ae0b2 1504
1da177e4 1505extern void tlb_init(void);
1d40cfcd 1506extern void flush_tlb_handlers(void);
1da177e4 1507
42f77542
RB
1508/*
1509 * Timer interrupt
1510 */
1511int cp0_compare_irq;
68b6352c 1512EXPORT_SYMBOL_GPL(cp0_compare_irq);
010c108d 1513int cp0_compare_irq_shift;
42f77542
RB
1514
1515/*
1516 * Performance counter IRQ or -1 if shared with timer
1517 */
1518int cp0_perfcount_irq;
1519EXPORT_SYMBOL_GPL(cp0_perfcount_irq);
1520
bdc94eb4
CD
1521static int __cpuinitdata noulri;
1522
1523static int __init ulri_disable(char *s)
1524{
1525 pr_info("Disabling ulri\n");
1526 noulri = 1;
1527
1528 return 1;
1529}
1530__setup("noulri", ulri_disable);
1531
6650df3c 1532void __cpuinit per_cpu_trap_init(bool is_boot_cpu)
1da177e4
LT
1533{
1534 unsigned int cpu = smp_processor_id();
1535 unsigned int status_set = ST0_CU0;
18d693b3 1536 unsigned int hwrena = cpu_hwrena_impl_bits;
41c594ab
RB
1537#ifdef CONFIG_MIPS_MT_SMTC
1538 int secondaryTC = 0;
1539 int bootTC = (cpu == 0);
1540
1541 /*
1542 * Only do per_cpu_trap_init() for first TC of Each VPE.
1543 * Note that this hack assumes that the SMTC init code
1544 * assigns TCs consecutively and in ascending order.
1545 */
1546
1547 if (((read_c0_tcbind() & TCBIND_CURTC) != 0) &&
1548 ((read_c0_tcbind() & TCBIND_CURVPE) == cpu_data[cpu - 1].vpe_id))
1549 secondaryTC = 1;
1550#endif /* CONFIG_MIPS_MT_SMTC */
1da177e4
LT
1551
1552 /*
1553 * Disable coprocessors and select 32-bit or 64-bit addressing
1554 * and the 16/32 or 32/32 FPR register model. Reset the BEV
1555 * flag that some firmware may have left set and the TS bit (for
1556 * IP27). Set XX for ISA IV code to work.
1557 */
875d43e7 1558#ifdef CONFIG_64BIT
1da177e4
LT
1559 status_set |= ST0_FR|ST0_KX|ST0_SX|ST0_UX;
1560#endif
adb37892 1561 if (current_cpu_data.isa_level & MIPS_CPU_ISA_IV)
1da177e4 1562 status_set |= ST0_XX;
bbaf238b
CD
1563 if (cpu_has_dsp)
1564 status_set |= ST0_MX;
1565
b38c7399 1566 change_c0_status(ST0_CU|ST0_MX|ST0_RE|ST0_FR|ST0_BEV|ST0_TS|ST0_KX|ST0_SX|ST0_UX,
1da177e4
LT
1567 status_set);
1568
18d693b3
KC
1569 if (cpu_has_mips_r2)
1570 hwrena |= 0x0000000f;
a3692020 1571
18d693b3
KC
1572 if (!noulri && cpu_has_userlocal)
1573 hwrena |= (1 << 29);
a3692020 1574
18d693b3
KC
1575 if (hwrena)
1576 write_c0_hwrena(hwrena);
e01402b1 1577
41c594ab
RB
1578#ifdef CONFIG_MIPS_MT_SMTC
1579 if (!secondaryTC) {
1580#endif /* CONFIG_MIPS_MT_SMTC */
1581
e01402b1 1582 if (cpu_has_veic || cpu_has_vint) {
9fb4c2b9 1583 unsigned long sr = set_c0_status(ST0_BEV);
49a89efb 1584 write_c0_ebase(ebase);
9fb4c2b9 1585 write_c0_status(sr);
e01402b1 1586 /* Setting vector spacing enables EI/VI mode */
49a89efb 1587 change_c0_intctl(0x3e0, VECTORSPACING);
e01402b1 1588 }
d03d0a57
RB
1589 if (cpu_has_divec) {
1590 if (cpu_has_mipsmt) {
1591 unsigned int vpflags = dvpe();
1592 set_c0_cause(CAUSEF_IV);
1593 evpe(vpflags);
1594 } else
1595 set_c0_cause(CAUSEF_IV);
1596 }
3b1d4ed5
RB
1597
1598 /*
1599 * Before R2 both interrupt numbers were fixed to 7, so on R2 only:
1600 *
1601 * o read IntCtl.IPTI to determine the timer interrupt
1602 * o read IntCtl.IPPCI to determine the performance counter interrupt
1603 */
1604 if (cpu_has_mips_r2) {
010c108d
DV
1605 cp0_compare_irq_shift = CAUSEB_TI - CAUSEB_IP;
1606 cp0_compare_irq = (read_c0_intctl() >> INTCTLB_IPTI) & 7;
1607 cp0_perfcount_irq = (read_c0_intctl() >> INTCTLB_IPPCI) & 7;
c3e838a2 1608 if (cp0_perfcount_irq == cp0_compare_irq)
3b1d4ed5 1609 cp0_perfcount_irq = -1;
c3e838a2
CD
1610 } else {
1611 cp0_compare_irq = CP0_LEGACY_COMPARE_IRQ;
c6a4ebb9 1612 cp0_compare_irq_shift = CP0_LEGACY_PERFCNT_IRQ;
c3e838a2 1613 cp0_perfcount_irq = -1;
3b1d4ed5
RB
1614 }
1615
41c594ab
RB
1616#ifdef CONFIG_MIPS_MT_SMTC
1617 }
1618#endif /* CONFIG_MIPS_MT_SMTC */
1da177e4 1619
5c200197
MR
1620 if (!cpu_data[cpu].asid_cache)
1621 cpu_data[cpu].asid_cache = ASID_FIRST_VERSION;
1da177e4
LT
1622
1623 atomic_inc(&init_mm.mm_count);
1624 current->active_mm = &init_mm;
1625 BUG_ON(current->mm);
1626 enter_lazy_tlb(&init_mm, current);
1627
41c594ab
RB
1628#ifdef CONFIG_MIPS_MT_SMTC
1629 if (bootTC) {
1630#endif /* CONFIG_MIPS_MT_SMTC */
6650df3c
DD
1631 /* Boot CPU's cache setup in setup_arch(). */
1632 if (!is_boot_cpu)
1633 cpu_cache_init();
41c594ab
RB
1634 tlb_init();
1635#ifdef CONFIG_MIPS_MT_SMTC
6a05888d
RB
1636 } else if (!secondaryTC) {
1637 /*
1638 * First TC in non-boot VPE must do subset of tlb_init()
1639 * for MMU countrol registers.
1640 */
1641 write_c0_pagemask(PM_DEFAULT_MASK);
1642 write_c0_wired(0);
41c594ab
RB
1643 }
1644#endif /* CONFIG_MIPS_MT_SMTC */
3d8bfdd0 1645 TLBMISS_HANDLER_SETUP();
1da177e4
LT
1646}
1647
e01402b1 1648/* Install CPU exception handler */
e3dc81f2 1649void __cpuinit set_handler(unsigned long offset, void *addr, unsigned long size)
e01402b1
RB
1650{
1651 memcpy((void *)(ebase + offset), addr, size);
e0cee3ee 1652 local_flush_icache_range(ebase + offset, ebase + offset + size);
e01402b1
RB
1653}
1654
234fcd14 1655static char panic_null_cerr[] __cpuinitdata =
641e97f3
RB
1656 "Trying to set NULL cache error exception handler";
1657
42fe7ee3
RB
1658/*
1659 * Install uncached CPU exception handler.
1660 * This is suitable only for the cache error exception which is the only
1661 * exception handler that is being run uncached.
1662 */
234fcd14
RB
1663void __cpuinit set_uncached_handler(unsigned long offset, void *addr,
1664 unsigned long size)
e01402b1 1665{
4f81b01a 1666 unsigned long uncached_ebase = CKSEG1ADDR(ebase);
e01402b1 1667
641e97f3
RB
1668 if (!addr)
1669 panic(panic_null_cerr);
1670
e01402b1
RB
1671 memcpy((void *)(uncached_ebase + offset), addr, size);
1672}
1673
5b10496b
AN
1674static int __initdata rdhwr_noopt;
1675static int __init set_rdhwr_noopt(char *str)
1676{
1677 rdhwr_noopt = 1;
1678 return 1;
1679}
1680
1681__setup("rdhwr_noopt", set_rdhwr_noopt);
1682
1da177e4
LT
1683void __init trap_init(void)
1684{
1685 extern char except_vec3_generic, except_vec3_r4000;
1da177e4
LT
1686 extern char except_vec4;
1687 unsigned long i;
c65a5480
AN
1688 int rollback;
1689
1690 check_wait();
1691 rollback = (cpu_wait == r4k_wait);
1da177e4 1692
88547001
JW
1693#if defined(CONFIG_KGDB)
1694 if (kgdb_early_setup)
70342287 1695 return; /* Already done */
88547001
JW
1696#endif
1697
9fb4c2b9
CD
1698 if (cpu_has_veic || cpu_has_vint) {
1699 unsigned long size = 0x200 + VECTORSPACING*64;
1700 ebase = (unsigned long)
1701 __alloc_bootmem(size, 1 << fls(size), 0);
1702 } else {
f6be75d0 1703 ebase = CKSEG0;
566f74f6
DD
1704 if (cpu_has_mips_r2)
1705 ebase += (read_c0_ebase() & 0x3ffff000);
1706 }
e01402b1 1707
6fb97eff
KC
1708 if (board_ebase_setup)
1709 board_ebase_setup();
6650df3c 1710 per_cpu_trap_init(true);
1da177e4
LT
1711
1712 /*
1713 * Copy the generic exception handlers to their final destination.
1714 * This will be overriden later as suitable for a particular
1715 * configuration.
1716 */
e01402b1 1717 set_handler(0x180, &except_vec3_generic, 0x80);
1da177e4
LT
1718
1719 /*
1720 * Setup default vectors
1721 */
1722 for (i = 0; i <= 31; i++)
1723 set_except_vector(i, handle_reserved);
1724
1725 /*
1726 * Copy the EJTAG debug exception vector handler code to it's final
1727 * destination.
1728 */
e01402b1 1729 if (cpu_has_ejtag && board_ejtag_handler_setup)
49a89efb 1730 board_ejtag_handler_setup();
1da177e4
LT
1731
1732 /*
1733 * Only some CPUs have the watch exceptions.
1734 */
1735 if (cpu_has_watch)
1736 set_except_vector(23, handle_watch);
1737
1738 /*
e01402b1 1739 * Initialise interrupt handlers
1da177e4 1740 */
e01402b1
RB
1741 if (cpu_has_veic || cpu_has_vint) {
1742 int nvec = cpu_has_veic ? 64 : 8;
1743 for (i = 0; i < nvec; i++)
ff3eab2a 1744 set_vi_handler(i, NULL);
e01402b1
RB
1745 }
1746 else if (cpu_has_divec)
1747 set_handler(0x200, &except_vec4, 0x8);
1da177e4
LT
1748
1749 /*
1750 * Some CPUs can enable/disable for cache parity detection, but does
1751 * it different ways.
1752 */
1753 parity_protection_init();
1754
1755 /*
1756 * The Data Bus Errors / Instruction Bus Errors are signaled
1757 * by external hardware. Therefore these two exceptions
1758 * may have board specific handlers.
1759 */
1760 if (board_be_init)
1761 board_be_init();
1762
c65a5480 1763 set_except_vector(0, rollback ? rollback_handle_int : handle_int);
1da177e4
LT
1764 set_except_vector(1, handle_tlbm);
1765 set_except_vector(2, handle_tlbl);
1766 set_except_vector(3, handle_tlbs);
1767
1768 set_except_vector(4, handle_adel);
1769 set_except_vector(5, handle_ades);
1770
1771 set_except_vector(6, handle_ibe);
1772 set_except_vector(7, handle_dbe);
1773
1774 set_except_vector(8, handle_sys);
1775 set_except_vector(9, handle_bp);
5b10496b
AN
1776 set_except_vector(10, rdhwr_noopt ? handle_ri :
1777 (cpu_has_vtag_icache ?
1778 handle_ri_rdhwr_vivt : handle_ri_rdhwr));
1da177e4
LT
1779 set_except_vector(11, handle_cpu);
1780 set_except_vector(12, handle_ov);
1781 set_except_vector(13, handle_tr);
1da177e4 1782
10cc3529
RB
1783 if (current_cpu_type() == CPU_R6000 ||
1784 current_cpu_type() == CPU_R6000A) {
1da177e4
LT
1785 /*
1786 * The R6000 is the only R-series CPU that features a machine
1787 * check exception (similar to the R4000 cache error) and
1788 * unaligned ldc1/sdc1 exception. The handlers have not been
70342287 1789 * written yet. Well, anyway there is no R6000 machine on the
1da177e4
LT
1790 * current list of targets for Linux/MIPS.
1791 * (Duh, crap, there is someone with a triple R6k machine)
1792 */
1793 //set_except_vector(14, handle_mc);
1794 //set_except_vector(15, handle_ndc);
1795 }
1796
e01402b1
RB
1797
1798 if (board_nmi_handler_setup)
1799 board_nmi_handler_setup();
1800
e50c0a8f
RB
1801 if (cpu_has_fpu && !cpu_has_nofpuex)
1802 set_except_vector(15, handle_fpe);
1803
1804 set_except_vector(22, handle_mdmx);
1805
1806 if (cpu_has_mcheck)
1807 set_except_vector(24, handle_mcheck);
1808
340ee4b9
RB
1809 if (cpu_has_mipsmt)
1810 set_except_vector(25, handle_mt);
1811
acaec427 1812 set_except_vector(26, handle_dsp);
e50c0a8f 1813
fcbf1dfd
DD
1814 if (board_cache_error_setup)
1815 board_cache_error_setup();
1816
e50c0a8f
RB
1817 if (cpu_has_vce)
1818 /* Special exception: R4[04]00 uses also the divec space. */
566f74f6 1819 memcpy((void *)(ebase + 0x180), &except_vec3_r4000, 0x100);
e50c0a8f 1820 else if (cpu_has_4kex)
566f74f6 1821 memcpy((void *)(ebase + 0x180), &except_vec3_generic, 0x80);
e50c0a8f 1822 else
566f74f6 1823 memcpy((void *)(ebase + 0x080), &except_vec3_generic, 0x80);
e50c0a8f 1824
e0cee3ee 1825 local_flush_icache_range(ebase, ebase + 0x400);
1d40cfcd 1826 flush_tlb_handlers();
0510617b
TB
1827
1828 sort_extable(__start___dbe_table, __stop___dbe_table);
69f3a7de 1829
4483b159 1830 cu2_notifier(default_cu2_call, 0x80000000); /* Run last */
1da177e4 1831}
This page took 1.381374 seconds and 5 git commands to generate.