2 * arch/ia64/kernel/ivt.S
4 * Copyright (C) 1998-2001, 2003, 2005 Hewlett-Packard Co
5 * Stephane Eranian <eranian@hpl.hp.com>
6 * David Mosberger <davidm@hpl.hp.com>
7 * Copyright (C) 2000, 2002-2003 Intel Co
8 * Asit Mallick <asit.k.mallick@intel.com>
9 * Suresh Siddha <suresh.b.siddha@intel.com>
10 * Kenneth Chen <kenneth.w.chen@intel.com>
11 * Fenghua Yu <fenghua.yu@intel.com>
13 * 00/08/23 Asit Mallick <asit.k.mallick@intel.com> TLB handling for SMP
14 * 00/12/20 David Mosberger-Tang <davidm@hpl.hp.com> DTLB/ITLB handler now uses virtual PT.
16 * Copyright (C) 2005 Hewlett-Packard Co
17 * Dan Magenheimer <dan.magenheimer@hp.com>
18 * Xen paravirtualization
19 * Copyright (c) 2008 Isaku Yamahata <yamahata at valinux co jp>
20 * VA Linux Systems Japan K.K.
22 * Yaozu (Eddie) Dong <eddie.dong@intel.com>
25 * This file defines the interruption vector table used by the CPU.
26 * It does not include one entry per possible cause of interruption.
28 * The first 20 entries of the table contain 64 bundles each while the
29 * remaining 48 entries contain only 16 bundles each.
31 * The 64 bundles are used to allow inlining the whole handler for critical
32 * interruptions like TLB misses.
34 * For each entry, the comment is as follows:
36 * // 0x1c00 Entry 7 (size 64 bundles) Data Key Miss (12,51)
37 * entry offset ----/ / / / /
38 * entry number ---------/ / / /
39 * size of the entry -------------/ / /
40 * vector name -------------------------------------/ /
41 * interruptions triggering this vector ----------------------/
43 * The table is 32KB in size and must be aligned on 32KB boundary.
44 * (The CPU ignores the 15 lower bits of the address)
46 * Table is based upon EAS2.6 (Oct 1999)
50 #include <asm/asmmacro.h>
51 #include <asm/break.h>
53 #include <asm/kregs.h>
54 #include <asm/asm-offsets.h>
55 #include <asm/pgtable.h>
56 #include <asm/processor.h>
57 #include <asm/ptrace.h>
58 #include <asm/system.h>
59 #include <asm/thread_info.h>
60 #include <asm/unistd.h>
61 #include <asm/errno.h>
64 # define PSR_DEFAULT_BITS psr.ac
66 # define PSR_DEFAULT_BITS 0
71 * This lets you track the last eight faults that occurred on the CPU. Make sure ar.k2 isn't
72 * needed for something else before enabling this...
74 # define DBG_FAULT(i) mov r16=ar.k2;; shl r16=r16,8;; add r16=(i),r16;;mov ar.k2=r16
83 mov r19=n;; /* prepare to save predicates */ \
84 br.sptk.many dispatch_to_fault_handler
86 .section .text.ivt,"ax"
88 .align 32768 // align on 32KB boundary
91 /////////////////////////////////////////////////////////////////////////////////////////
92 // 0x0000 Entry 0 (size 64 bundles) VHPT Translation (8,20,47)
96 * The VHPT vector is invoked when the TLB entry for the virtual page table
97 * is missing. This happens only as a result of a previous
98 * (the "original") TLB miss, which may either be caused by an instruction
99 * fetch or a data access (or non-access).
101 * What we do here is normal TLB miss handing for the _original_ miss,
102 * followed by inserting the TLB entry for the virtual page table page
103 * that the VHPT walker was attempting to access. The latter gets
104 * inserted as long as page table entry above pte level have valid
105 * mappings for the faulting address. The TLB entry for the original
106 * miss gets inserted only if the pte entry indicates that the page is
109 * do_page_fault gets invoked in the following cases:
110 * - the faulting virtual address uses unimplemented address bits
111 * - the faulting virtual address has no valid page table mapping
113 MOV_FROM_IFA(r16) // get address that caused the TLB miss
114 #ifdef CONFIG_HUGETLB_PAGE
119 RSM_PSR_DT // use physical addressing for data
120 mov r31=pr // save the predicate registers
121 mov r19=IA64_KR(PT_BASE) // get page table base address
122 shl r21=r16,3 // shift bit 60 into sign bit
123 shr.u r17=r16,61 // get the region number into r17
126 #ifdef CONFIG_HUGETLB_PAGE
132 (p8) dep r25=r18,r25,2,6
136 cmp.eq p6,p7=5,r17 // is IFA pointing into to region 5?
137 shr.u r18=r22,PGDIR_SHIFT // get bottom portion of pgd index bit
139 (p7) dep r17=r17,r19,(PAGE_SHIFT-3),3 // put region number bits in place
142 LOAD_PHYSICAL(p6, r19, swapper_pg_dir) // region 5 is rooted at swapper_pg_dir
144 .pred.rel "mutex", p6, p7
145 (p6) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT
146 (p7) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT-3
148 (p6) dep r17=r18,r19,3,(PAGE_SHIFT-3) // r17=pgd_offset for region 5
149 (p7) dep r17=r18,r17,3,(PAGE_SHIFT-6) // r17=pgd_offset for region[0-4]
150 cmp.eq p7,p6=0,r21 // unused address bits all zeroes?
151 #ifdef CONFIG_PGTABLE_4
152 shr.u r28=r22,PUD_SHIFT // shift pud index into position
154 shr.u r18=r22,PMD_SHIFT // shift pmd index into position
157 ld8 r17=[r17] // get *pgd (may be 0)
159 (p7) cmp.eq p6,p7=r17,r0 // was pgd_present(*pgd) == NULL?
160 #ifdef CONFIG_PGTABLE_4
161 dep r28=r28,r17,3,(PAGE_SHIFT-3) // r28=pud_offset(pgd,addr)
163 shr.u r18=r22,PMD_SHIFT // shift pmd index into position
164 (p7) ld8 r29=[r28] // get *pud (may be 0)
166 (p7) cmp.eq.or.andcm p6,p7=r29,r0 // was pud_present(*pud) == NULL?
167 dep r17=r18,r29,3,(PAGE_SHIFT-3) // r17=pmd_offset(pud,addr)
169 dep r17=r18,r17,3,(PAGE_SHIFT-3) // r17=pmd_offset(pgd,addr)
172 (p7) ld8 r20=[r17] // get *pmd (may be 0)
173 shr.u r19=r22,PAGE_SHIFT // shift pte index into position
175 (p7) cmp.eq.or.andcm p6,p7=r20,r0 // was pmd_present(*pmd) == NULL?
176 dep r21=r19,r20,3,(PAGE_SHIFT-3) // r21=pte_offset(pmd,addr)
178 (p7) ld8 r18=[r21] // read *pte
179 MOV_FROM_ISR(r19) // cr.isr bit 32 tells us if this is an insn miss
181 (p7) tbit.z p6,p7=r18,_PAGE_P_BIT // page present bit cleared?
182 MOV_FROM_IHA(r22) // get the VHPT address that caused the TLB miss
183 ;; // avoid RAW on p7
184 (p7) tbit.nz.unc p10,p11=r19,32 // is it an instruction TLB miss?
185 dep r23=0,r20,0,PAGE_SHIFT // clear low bits to get page address
187 ITC_I_AND_D(p10, p11, r18, r24) // insert the instruction TLB entry and
188 // insert the data TLB entry
189 (p6) br.cond.spnt.many page_fault // handle bad address/page not present (page fault)
192 #ifdef CONFIG_HUGETLB_PAGE
193 MOV_TO_ITIR(p8, r25, r24) // change to default page-size for VHPT
197 * Now compute and insert the TLB entry for the virtual page table. We never
198 * execute in a page table page so there is no need to set the exception deferral
201 adds r24=__DIRTY_BITS_NO_ED|_PAGE_PL_0|_PAGE_AR_RW,r23
207 * Tell the assemblers dependency-violation checker that the above "itc" instructions
208 * cannot possibly affect the following loads:
213 * Re-check pagetable entry. If they changed, we may have received a ptc.g
214 * between reading the pagetable and the "itc". If so, flush the entry we
215 * inserted and retry. At this point, we have:
217 * r28 = equivalent of pud_offset(pgd, ifa)
218 * r17 = equivalent of pmd_offset(pud, ifa)
219 * r21 = equivalent of pte_offset(pmd, ifa)
225 ld8 r25=[r21] // read *pte again
226 ld8 r26=[r17] // read *pmd again
227 #ifdef CONFIG_PGTABLE_4
228 ld8 r19=[r28] // read *pud again
232 cmp.ne.or.andcm p6,p7=r26,r20 // did *pmd change
233 #ifdef CONFIG_PGTABLE_4
234 cmp.ne.or.andcm p6,p7=r19,r29 // did *pud change
236 mov r27=PAGE_SHIFT<<2
238 (p6) ptc.l r22,r27 // purge PTE page translation
239 (p7) cmp.ne.or.andcm p6,p7=r25,r18 // did *pte change
241 (p6) ptc.l r16,r27 // purge translation
244 mov pr=r31,-1 // restore predicate registers
249 /////////////////////////////////////////////////////////////////////////////////////////
250 // 0x0400 Entry 1 (size 64 bundles) ITLB (21)
254 * The ITLB handler accesses the PTE via the virtually mapped linear
255 * page table. If a nested TLB miss occurs, we switch into physical
256 * mode, walk the page table, and then re-execute the PTE read and
257 * go on normally after that.
259 MOV_FROM_IFA(r16) // get virtual address
260 mov r29=b0 // save b0
261 mov r31=pr // save predicates
263 MOV_FROM_IHA(r17) // get virtual address of PTE
264 movl r30=1f // load nested fault continuation point
266 1: ld8 r18=[r17] // read *pte
269 tbit.z p6,p0=r18,_PAGE_P_BIT // page present bit cleared?
270 (p6) br.cond.spnt page_fault
276 * Tell the assemblers dependency-violation checker that the above "itc" instructions
277 * cannot possibly affect the following loads:
281 ld8 r19=[r17] // read *pte again and see if same
282 mov r20=PAGE_SHIFT<<2 // setup page size for purge
293 /////////////////////////////////////////////////////////////////////////////////////////
294 // 0x0800 Entry 2 (size 64 bundles) DTLB (9,48)
298 * The DTLB handler accesses the PTE via the virtually mapped linear
299 * page table. If a nested TLB miss occurs, we switch into physical
300 * mode, walk the page table, and then re-execute the PTE read and
301 * go on normally after that.
303 MOV_FROM_IFA(r16) // get virtual address
304 mov r29=b0 // save b0
305 mov r31=pr // save predicates
307 MOV_FROM_IHA(r17) // get virtual address of PTE
308 movl r30=1f // load nested fault continuation point
310 1: ld8 r18=[r17] // read *pte
313 tbit.z p6,p0=r18,_PAGE_P_BIT // page present bit cleared?
314 (p6) br.cond.spnt page_fault
320 * Tell the assemblers dependency-violation checker that the above "itc" instructions
321 * cannot possibly affect the following loads:
325 ld8 r19=[r17] // read *pte again and see if same
326 mov r20=PAGE_SHIFT<<2 // setup page size for purge
337 /////////////////////////////////////////////////////////////////////////////////////////
338 // 0x0c00 Entry 3 (size 64 bundles) Alt ITLB (19)
341 MOV_FROM_IFA(r16) // get address that caused the TLB miss
343 MOV_FROM_IPSR(p0, r21)
344 movl r19=(((1 << IA64_MAX_PHYS_BITS) - 1) & ~0xfff)
347 #ifdef CONFIG_DISABLE_VHPT
348 shr.u r22=r16,61 // get the region number into r21
350 cmp.gt p8,p0=6,r22 // user mode
352 THASH(p8, r17, r16, r23)
354 MOV_TO_IHA(p8, r17, r23)
355 (p8) mov r29=b0 // save b0
356 (p8) br.cond.dptk .itlb_fault
358 extr.u r23=r21,IA64_PSR_CPL0_BIT,2 // extract psr.cpl
359 and r19=r19,r16 // clear ed, reserved bits, and PTE control bits
360 shr.u r18=r16,57 // move address bit 61 to bit 4
362 andcm r18=0x10,r18 // bit 4=~address-bit(61)
363 cmp.ne p8,p0=r0,r23 // psr.cpl != 0?
364 or r19=r17,r19 // insert PTE control bits into r19
366 or r19=r19,r18 // set bit 4 (uncached) if the access was to region 6
367 (p8) br.cond.spnt page_fault
369 ITC_I(p0, r19, r18) // insert the TLB entry
375 /////////////////////////////////////////////////////////////////////////////////////////
376 // 0x1000 Entry 4 (size 64 bundles) Alt DTLB (7,46)
379 MOV_FROM_IFA(r16) // get address that caused the TLB miss
382 movl r19=(((1 << IA64_MAX_PHYS_BITS) - 1) & ~0xfff)
383 MOV_FROM_IPSR(p0, r21)
387 #ifdef CONFIG_DISABLE_VHPT
388 shr.u r22=r16,61 // get the region number into r21
390 cmp.gt p8,p0=6,r22 // access to region 0-5
392 THASH(p8, r17, r16, r25)
394 MOV_TO_IHA(p8, r17, r25)
395 (p8) mov r29=b0 // save b0
396 (p8) br.cond.dptk dtlb_fault
398 cmp.ge p10,p11=r16,r24 // access to per_cpu_data?
399 tbit.z p12,p0=r16,61 // access to region 6?
400 mov r25=PERCPU_PAGE_SHIFT << 2
401 mov r26=PERCPU_PAGE_SIZE
405 (p10) mov r19=IA64_KR(PER_CPU_DATA)
406 (p11) and r19=r19,r16 // clear non-ppn fields
407 extr.u r23=r21,IA64_PSR_CPL0_BIT,2 // extract psr.cpl
408 and r22=IA64_ISR_CODE_MASK,r20 // get the isr.code field
409 tbit.nz p6,p7=r20,IA64_ISR_SP_BIT // is speculation bit on?
410 tbit.nz p9,p0=r20,IA64_ISR_NA_BIT // is non-access bit on?
412 (p10) sub r19=r19,r26
413 MOV_TO_ITIR(p10, r25, r24)
415 (p9) cmp.eq.or.andcm p6,p7=IA64_ISR_CODE_LFETCH,r22 // check isr.code field
416 (p12) dep r17=-1,r17,4,1 // set ma=UC for region 6 addr
417 (p8) br.cond.spnt page_fault
419 dep r21=-1,r21,IA64_PSR_ED_BIT,1
421 or r19=r19,r17 // insert PTE control bits into r19
422 MOV_TO_IPSR(p6, r21, r24)
424 ITC_D(p7, r19, r18) // insert the TLB entry
430 /////////////////////////////////////////////////////////////////////////////////////////
431 // 0x1400 Entry 5 (size 64 bundles) Data nested TLB (6,45)
432 ENTRY(nested_dtlb_miss)
434 * In the absence of kernel bugs, we get here when the virtually mapped linear
435 * page table is accessed non-speculatively (e.g., in the Dirty-bit, Instruction
436 * Access-bit, or Data Access-bit faults). If the DTLB entry for the virtual page
437 * table is missing, a nested TLB miss fault is triggered and control is
438 * transferred to this point. When this happens, we lookup the pte for the
439 * faulting address by walking the page table in physical mode and return to the
440 * continuation point passed in register r30 (or call page_fault if the address is
443 * Input: r16: faulting address
445 * r30: continuation address
448 * Output: r17: physical address of PTE of faulting address
450 * r30: continuation address
453 * Clobbered: b0, r18, r19, r21, r22, psr.dt (cleared)
455 RSM_PSR_DT // switch to using physical data addressing
456 mov r19=IA64_KR(PT_BASE) // get the page table base address
457 shl r21=r16,3 // shift bit 60 into sign bit
460 shr.u r17=r16,61 // get the region number into r17
461 extr.u r18=r18,2,6 // get the faulting page size
463 cmp.eq p6,p7=5,r17 // is faulting address in region 5?
464 add r22=-PAGE_SHIFT,r18 // adjustment for hugetlb address
465 add r18=PGDIR_SHIFT-PAGE_SHIFT,r18
469 (p7) dep r17=r17,r19,(PAGE_SHIFT-3),3 // put region number bits in place
472 LOAD_PHYSICAL(p6, r19, swapper_pg_dir) // region 5 is rooted at swapper_pg_dir
474 .pred.rel "mutex", p6, p7
475 (p6) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT
476 (p7) shr.u r21=r21,PGDIR_SHIFT+PAGE_SHIFT-3
478 (p6) dep r17=r18,r19,3,(PAGE_SHIFT-3) // r17=pgd_offset for region 5
479 (p7) dep r17=r18,r17,3,(PAGE_SHIFT-6) // r17=pgd_offset for region[0-4]
480 cmp.eq p7,p6=0,r21 // unused address bits all zeroes?
481 #ifdef CONFIG_PGTABLE_4
482 shr.u r18=r22,PUD_SHIFT // shift pud index into position
484 shr.u r18=r22,PMD_SHIFT // shift pmd index into position
487 ld8 r17=[r17] // get *pgd (may be 0)
489 (p7) cmp.eq p6,p7=r17,r0 // was pgd_present(*pgd) == NULL?
490 dep r17=r18,r17,3,(PAGE_SHIFT-3) // r17=p[u|m]d_offset(pgd,addr)
492 #ifdef CONFIG_PGTABLE_4
493 (p7) ld8 r17=[r17] // get *pud (may be 0)
494 shr.u r18=r22,PMD_SHIFT // shift pmd index into position
496 (p7) cmp.eq.or.andcm p6,p7=r17,r0 // was pud_present(*pud) == NULL?
497 dep r17=r18,r17,3,(PAGE_SHIFT-3) // r17=pmd_offset(pud,addr)
500 (p7) ld8 r17=[r17] // get *pmd (may be 0)
501 shr.u r19=r22,PAGE_SHIFT // shift pte index into position
503 (p7) cmp.eq.or.andcm p6,p7=r17,r0 // was pmd_present(*pmd) == NULL?
504 dep r17=r19,r17,3,(PAGE_SHIFT-3) // r17=pte_offset(pmd,addr);
505 (p6) br.cond.spnt page_fault
507 br.sptk.many b0 // return to continuation point
508 END(nested_dtlb_miss)
511 /////////////////////////////////////////////////////////////////////////////////////////
512 // 0x1800 Entry 6 (size 64 bundles) Instruction Key Miss (24)
519 /////////////////////////////////////////////////////////////////////////////////////////
520 // 0x1c00 Entry 7 (size 64 bundles) Data Key Miss (12,51)
527 /////////////////////////////////////////////////////////////////////////////////////////
528 // 0x2000 Entry 8 (size 64 bundles) Dirty-bit (54)
532 * What we do here is to simply turn on the dirty bit in the PTE. We need to
533 * update both the page-table and the TLB entry. To efficiently access the PTE,
534 * we address it through the virtual page table. Most likely, the TLB entry for
535 * the relevant virtual page table page is still present in the TLB so we can
536 * normally do this without additional TLB misses. In case the necessary virtual
537 * page table TLB entry isn't present, we take a nested TLB miss hit where we look
538 * up the physical address of the L3 PTE and then continue at label 1 below.
540 MOV_FROM_IFA(r16) // get the address that caused the fault
541 movl r30=1f // load continuation point in case of nested fault
543 THASH(p0, r17, r16, r18) // compute virtual address of L3 PTE
544 mov r29=b0 // save b0 in case of nested fault
545 mov r31=pr // save pr
547 mov r28=ar.ccv // save ar.ccv
550 ;; // avoid RAW on r18
551 mov ar.ccv=r18 // set compare value for cmpxchg
552 or r25=_PAGE_D|_PAGE_A,r18 // set the dirty and accessed bits
553 tbit.z p7,p6 = r18,_PAGE_P_BIT // Check present bit
555 (p6) cmpxchg8.acq r26=[r17],r25,ar.ccv // Only update if page is present
556 mov r24=PAGE_SHIFT<<2
558 (p6) cmp.eq p6,p7=r26,r18 // Only compare if page is present
560 ITC_D(p6, r25, r18) // install updated PTE
563 * Tell the assemblers dependency-violation checker that the above "itc" instructions
564 * cannot possibly affect the following loads:
568 ld8 r18=[r17] // read PTE again
570 cmp.eq p6,p7=r18,r25 // is it same as the newly installed
573 mov b0=r29 // restore b0
578 ;; // avoid RAW on r18
579 or r18=_PAGE_D|_PAGE_A,r18 // set the dirty and accessed bits
580 mov b0=r29 // restore b0
582 st8 [r17]=r18 // store back updated PTE
583 ITC_D(p0, r18, r16) // install updated PTE
585 mov pr=r31,-1 // restore pr
590 /////////////////////////////////////////////////////////////////////////////////////////
591 // 0x2400 Entry 9 (size 64 bundles) Instruction Access-bit (27)
594 // Like Entry 8, except for instruction access
595 MOV_FROM_IFA(r16) // get the address that caused the fault
596 movl r30=1f // load continuation point in case of nested fault
597 mov r31=pr // save predicates
598 #ifdef CONFIG_ITANIUM
600 * Erratum 10 (IFA may contain incorrect address) has "NoFix" status.
602 MOV_FROM_IPSR(p0, r17)
605 tbit.z p6,p0=r17,IA64_PSR_IS_BIT // IA64 instruction set?
607 (p6) mov r16=r18 // if so, use cr.iip instead of cr.ifa
608 #endif /* CONFIG_ITANIUM */
610 THASH(p0, r17, r16, r18) // compute virtual address of L3 PTE
611 mov r29=b0 // save b0 in case of nested fault)
613 mov r28=ar.ccv // save ar.ccv
617 mov ar.ccv=r18 // set compare value for cmpxchg
618 or r25=_PAGE_A,r18 // set the accessed bit
619 tbit.z p7,p6 = r18,_PAGE_P_BIT // Check present bit
621 (p6) cmpxchg8.acq r26=[r17],r25,ar.ccv // Only if page present
622 mov r24=PAGE_SHIFT<<2
624 (p6) cmp.eq p6,p7=r26,r18 // Only if page present
626 ITC_I(p6, r25, r26) // install updated PTE
629 * Tell the assemblers dependency-violation checker that the above "itc" instructions
630 * cannot possibly affect the following loads:
634 ld8 r18=[r17] // read PTE again
636 cmp.eq p6,p7=r18,r25 // is it same as the newly installed
639 mov b0=r29 // restore b0
641 #else /* !CONFIG_SMP */
645 or r18=_PAGE_A,r18 // set the accessed bit
646 mov b0=r29 // restore b0
648 st8 [r17]=r18 // store back updated PTE
649 ITC_I(p0, r18, r16) // install updated PTE
650 #endif /* !CONFIG_SMP */
656 /////////////////////////////////////////////////////////////////////////////////////////
657 // 0x2800 Entry 10 (size 64 bundles) Data Access-bit (15,55)
660 // Like Entry 8, except for data access
661 MOV_FROM_IFA(r16) // get the address that caused the fault
662 movl r30=1f // load continuation point in case of nested fault
664 THASH(p0, r17, r16, r18) // compute virtual address of L3 PTE
666 mov r29=b0 // save b0 in case of nested fault)
668 mov r28=ar.ccv // save ar.ccv
671 ;; // avoid RAW on r18
672 mov ar.ccv=r18 // set compare value for cmpxchg
673 or r25=_PAGE_A,r18 // set the dirty bit
674 tbit.z p7,p6 = r18,_PAGE_P_BIT // Check present bit
676 (p6) cmpxchg8.acq r26=[r17],r25,ar.ccv // Only if page is present
677 mov r24=PAGE_SHIFT<<2
679 (p6) cmp.eq p6,p7=r26,r18 // Only if page is present
681 ITC_D(p6, r25, r26) // install updated PTE
683 * Tell the assemblers dependency-violation checker that the above "itc" instructions
684 * cannot possibly affect the following loads:
688 ld8 r18=[r17] // read PTE again
690 cmp.eq p6,p7=r18,r25 // is it same as the newly installed
697 ;; // avoid RAW on r18
698 or r18=_PAGE_A,r18 // set the accessed bit
700 st8 [r17]=r18 // store back updated PTE
701 ITC_D(p0, r18, r16) // install updated PTE
703 mov b0=r29 // restore b0
709 /////////////////////////////////////////////////////////////////////////////////////////
710 // 0x2c00 Entry 11 (size 64 bundles) Break instruction (33)
713 * The streamlined system call entry/exit paths only save/restore the initial part
714 * of pt_regs. This implies that the callers of system-calls must adhere to the
715 * normal procedure calling conventions.
717 * Registers to be saved & restored:
718 * CR registers: cr.ipsr, cr.iip, cr.ifs
719 * AR registers: ar.unat, ar.pfs, ar.rsc, ar.rnat, ar.bspstore, ar.fpsr
720 * others: pr, b0, b6, loadrs, r1, r11, r12, r13, r15
721 * Registers to be restored only:
722 * r8-r11: output value from the system call.
724 * During system call exit, scratch registers (including r15) are modified/cleared
725 * to prevent leaking bits from kernel to user level.
728 mov.m r16=IA64_KR(CURRENT) // M2 r16 <- current task (12 cyc)
729 MOV_FROM_IPSR(p0, r29) // M2 (12 cyc)
730 mov r31=pr // I0 (2 cyc)
732 MOV_FROM_IIM(r17) // M2 (2 cyc)
733 mov.m r27=ar.rsc // M2 (12 cyc)
734 mov r18=__IA64_BREAK_SYSCALL // A
737 mov.m r21=ar.fpsr // M2 (12 cyc)
738 mov r19=b6 // I0 (2 cyc)
740 mov.m r23=ar.bspstore // M2 (12 cyc)
741 mov.m r24=ar.rnat // M2 (5 cyc)
742 mov.i r26=ar.pfs // I0 (2 cyc)
746 mov r20=r1 // A save r1
749 movl r30=sys_call_table // X
751 MOV_FROM_IIP(r28) // M2 (2 cyc)
752 cmp.eq p0,p7=r18,r17 // I0 is this a system call?
753 (p7) br.cond.spnt non_syscall // B no ->
755 // From this point on, we are definitely on the syscall-path
756 // and we can use (non-banked) scratch registers.
758 ///////////////////////////////////////////////////////////////////////
759 mov r1=r16 // A move task-pointer to "addl"-addressable reg
760 mov r2=r16 // A setup r2 for ia64_syscall_setup
761 add r9=TI_FLAGS+IA64_TASK_SIZE,r16 // A r9 = ¤t_thread_info()->flags
763 adds r16=IA64_TASK_THREAD_ON_USTACK_OFFSET,r16
764 adds r15=-1024,r15 // A subtract 1024 from syscall number
765 mov r3=NR_syscalls - 1
767 ld1.bias r17=[r16] // M0|1 r17 = current->thread.on_ustack flag
768 ld4 r9=[r9] // M0|1 r9 = current_thread_info()->flags
769 extr.u r8=r29,41,2 // I0 extract ei field from cr.ipsr
771 shladd r30=r15,3,r30 // A r30 = sys_call_table + 8*(syscall-1024)
772 addl r22=IA64_RBS_OFFSET,r1 // A compute base of RBS
773 cmp.leu p6,p7=r15,r3 // A syscall number in range?
776 lfetch.fault.excl.nt1 [r22] // M0|1 prefetch RBS
777 (p6) ld8 r30=[r30] // M0|1 load address of syscall entry point
778 tnat.nz.or p7,p0=r15 // I0 is syscall nr a NaT?
780 mov.m ar.bspstore=r22 // M2 switch to kernel RBS
781 cmp.eq p8,p9=2,r8 // A isr.ei==2?
784 (p8) mov r8=0 // A clear ei to 0
785 (p7) movl r30=sys_ni_syscall // X
787 (p8) adds r28=16,r28 // A switch cr.iip to next bundle
788 (p9) adds r8=1,r8 // A increment ei to next slot
789 #ifdef CONFIG_VIRT_CPU_ACCOUNTING
791 mov b6=r30 // I0 setup syscall handler branch reg early
797 mov.m r25=ar.unat // M2 (5 cyc)
798 dep r29=r8,r29,41,2 // I0 insert new ei into cr.ipsr
799 adds r15=1024,r15 // A restore original syscall number
801 // If any of the above loads miss in L1D, we'll stall here until
804 ///////////////////////////////////////////////////////////////////////
805 st1 [r16]=r0 // M2|3 clear current->thread.on_ustack flag
806 #ifdef CONFIG_VIRT_CPU_ACCOUNTING
807 mov.m r30=ar.itc // M get cycle for accounting
809 mov b6=r30 // I0 setup syscall handler branch reg early
811 cmp.eq pKStk,pUStk=r0,r17 // A were we on kernel stacks already?
813 and r9=_TIF_SYSCALL_TRACEAUDIT,r9 // A mask trace or audit
814 mov r18=ar.bsp // M2 (12 cyc)
815 (pKStk) br.cond.spnt .break_fixup // B we're already in kernel-mode -- fix up RBS
817 .back_from_break_fixup:
818 (pUStk) addl r1=IA64_STK_OFFSET-IA64_PT_REGS_SIZE,r1 // A compute base of memory stack
819 cmp.eq p14,p0=r9,r0 // A are syscalls being traced/audited?
820 br.call.sptk.many b7=ia64_syscall_setup // B
822 #ifdef CONFIG_VIRT_CPU_ACCOUNTING
823 // mov.m r30=ar.itc is called in advance, and r13 is current
824 add r16=TI_AC_STAMP+IA64_TASK_SIZE,r13 // A
825 add r17=TI_AC_LEAVE+IA64_TASK_SIZE,r13 // A
826 (pKStk) br.cond.spnt .skip_accounting // B unlikely skip
828 ld8 r18=[r16],TI_AC_STIME-TI_AC_STAMP // M get last stamp
829 ld8 r19=[r17],TI_AC_UTIME-TI_AC_LEAVE // M time at leave
831 ld8 r20=[r16],TI_AC_STAMP-TI_AC_STIME // M cumulated stime
832 ld8 r21=[r17] // M cumulated utime
833 sub r22=r19,r18 // A stime before leave
835 st8 [r16]=r30,TI_AC_STIME-TI_AC_STAMP // M update stamp
836 sub r18=r30,r19 // A elapsed time in user
838 add r20=r20,r22 // A sum stime
839 add r21=r21,r18 // A sum utime
841 st8 [r16]=r20 // M update stime
842 st8 [r17]=r21 // M update utime
846 mov ar.rsc=0x3 // M2 set eager mode, pl 0, LE, loadrs=0
848 BSW_1(r2, r14) // B (6 cyc) regs are saved, switch to bank 1
851 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r3, r16) // M2 now it's safe to re-enable intr.-collection
852 // M0 ensure interruption collection is on
853 movl r3=ia64_ret_from_syscall // X
855 mov rp=r3 // I0 set the real return addr
856 (p10) br.cond.spnt.many ia64_ret_from_syscall // B return if bad call-frame or r15 is a NaT
858 SSM_PSR_I(p15, p15, r16) // M2 restore psr.i
859 (p14) br.call.sptk.many b6=b6 // B invoke syscall-handker (ignore return addr)
860 br.cond.spnt.many ia64_trace_syscall // B do syscall-tracing thingamagic
862 ///////////////////////////////////////////////////////////////////////
863 // On entry, we optimistically assumed that we're coming from user-space.
864 // For the rare cases where a system-call is done from within the kernel,
865 // we fix things up at this point:
867 add r1=-IA64_PT_REGS_SIZE,sp // A allocate space for pt_regs structure
868 mov ar.rnat=r24 // M2 restore kernel's AR.RNAT
870 mov ar.bspstore=r23 // M2 restore kernel's AR.BSPSTORE
871 br.cond.sptk .back_from_break_fixup
875 /////////////////////////////////////////////////////////////////////////////////////////
876 // 0x3000 Entry 12 (size 64 bundles) External Interrupt (4)
878 /* interrupt handler has become too big to fit this area. */
879 br.sptk.many __interrupt
883 /////////////////////////////////////////////////////////////////////////////////////////
884 // 0x3400 Entry 13 (size 64 bundles) Reserved
889 /////////////////////////////////////////////////////////////////////////////////////////
890 // 0x3800 Entry 14 (size 64 bundles) Reserved
895 * There is no particular reason for this code to be here, other than that
896 * there happens to be space here that would go unused otherwise. If this
897 * fault ever gets "unreserved", simply moved the following code to a more
900 * ia64_syscall_setup() is a separate subroutine so that it can
901 * allocate stacked registers so it can safely demine any
902 * potential NaT values from the input registers.
905 * - executing on bank 0 or bank 1 register set (doesn't matter)
906 * - r1: stack pointer
907 * - r2: current task pointer
909 * - r11: original contents (saved ar.pfs to be saved)
910 * - r12: original contents (sp to be saved)
911 * - r13: original contents (tp to be saved)
912 * - r15: original contents (syscall # to be saved)
913 * - r18: saved bsp (after switching to kernel stack)
915 * - r20: saved r1 (gp)
916 * - r21: saved ar.fpsr
917 * - r22: kernel's register backing store base (krbs_base)
918 * - r23: saved ar.bspstore
919 * - r24: saved ar.rnat
920 * - r25: saved ar.unat
921 * - r26: saved ar.pfs
922 * - r27: saved ar.rsc
923 * - r28: saved cr.iip
924 * - r29: saved cr.ipsr
925 * - r30: ar.itc for accounting (don't touch)
927 * - b0: original contents (to be saved)
929 * - p10: TRUE if syscall is invoked with more than 8 out
930 * registers or r15's Nat is true
932 * - r3: preserved (same as on entry)
933 * - r8: -EINVAL if p10 is true
934 * - r12: points to kernel stack
935 * - r13: points to current task
936 * - r14: preserved (same as on entry)
938 * - p15: TRUE if interrupts need to be re-enabled
939 * - ar.fpsr: set to kernel settings
940 * - b6: preserved (same as on entry)
942 #ifdef __IA64_ASM_PARAVIRTUALIZED_NATIVE
943 GLOBAL_ENTRY(ia64_syscall_setup)
945 # error This code assumes that b6 is the first field in pt_regs.
947 st8 [r1]=r19 // save b6
948 add r16=PT(CR_IPSR),r1 // initialize first base pointer
949 add r17=PT(R11),r1 // initialize second base pointer
951 alloc r19=ar.pfs,8,0,0,0 // ensure in0-in7 are writable
952 st8 [r16]=r29,PT(AR_PFS)-PT(CR_IPSR) // save cr.ipsr
955 st8.spill [r17]=r11,PT(CR_IIP)-PT(R11) // save r11
957 (pKStk) mov r18=r0 // make sure r18 isn't NaT
960 st8 [r16]=r26,PT(CR_IFS)-PT(AR_PFS) // save ar.pfs
961 st8 [r17]=r28,PT(AR_UNAT)-PT(CR_IIP) // save cr.iip
962 mov r28=b0 // save b0 (2 cyc)
965 st8 [r17]=r25,PT(AR_RSC)-PT(AR_UNAT) // save ar.unat
966 dep r19=0,r19,38,26 // clear all bits but 0..37 [I0]
970 st8 [r16]=r19,PT(AR_RNAT)-PT(CR_IFS) // store ar.pfs.pfm in cr.ifs
971 extr.u r11=r19,7,7 // I0 // get sol of ar.pfs
972 and r8=0x7f,r19 // A // get sof of ar.pfs
974 st8 [r17]=r27,PT(AR_BSPSTORE)-PT(AR_RSC)// save ar.rsc
975 tbit.nz p15,p0=r29,IA64_PSR_I_BIT // I0
979 (pUStk) sub r18=r18,r22 // r18=RSE.ndirty*8
983 (pKStk) adds r16=PT(PR)-PT(AR_RNAT),r16 // skip over ar_rnat field
984 (pKStk) adds r17=PT(B0)-PT(AR_BSPSTORE),r17 // skip over ar_bspstore field
988 tnat.nz p12,p0=in4 // [I0]
991 (pUStk) st8 [r16]=r24,PT(PR)-PT(AR_RNAT) // save ar.rnat
992 (pUStk) st8 [r17]=r23,PT(B0)-PT(AR_BSPSTORE) // save ar.bspstore
993 shl r18=r18,16 // compute ar.rsc to be used for "loadrs"
995 st8 [r16]=r31,PT(LOADRS)-PT(PR) // save predicates
996 st8 [r17]=r28,PT(R1)-PT(B0) // save b0
997 tnat.nz p13,p0=in5 // [I0]
999 st8 [r16]=r18,PT(R12)-PT(LOADRS) // save ar.rsc value for "loadrs"
1000 st8.spill [r17]=r20,PT(R13)-PT(R1) // save original r1
1004 .mem.offset 0,0; st8.spill [r16]=r12,PT(AR_FPSR)-PT(R12) // save r12
1005 .mem.offset 8,0; st8.spill [r17]=r13,PT(R15)-PT(R13) // save r13
1008 st8 [r16]=r21,PT(R8)-PT(AR_FPSR) // save ar.fpsr
1010 cmp.lt p10,p9=r11,r8 // frame size can't be more than local+8
1013 (p9) tnat.nz p10,p0=r15
1014 adds r12=-16,r1 // switch to kernel memory stack (with 16 bytes of scratch)
1016 st8.spill [r17]=r15 // save r15
1020 mov r13=r2 // establish `current'
1021 movl r1=__gp // establish kernel global pointer
1023 st8 [r16]=r8 // ensure pt_regs.r8 != 0 (see handle_syscall_error)
1027 cmp.eq pSys,pNonSys=r0,r0 // set pSys=1, pNonSys=0
1028 movl r17=FPSR_DEFAULT
1030 mov.m ar.fpsr=r17 // set ar.fpsr to kernel default value
1031 (p10) mov r8=-EINVAL
1033 END(ia64_syscall_setup)
1034 #endif /* __IA64_ASM_PARAVIRTUALIZED_NATIVE */
1036 .org ia64_ivt+0x3c00
1037 /////////////////////////////////////////////////////////////////////////////////////////
1038 // 0x3c00 Entry 15 (size 64 bundles) Reserved
1042 .org ia64_ivt+0x4000
1043 /////////////////////////////////////////////////////////////////////////////////////////
1044 // 0x4000 Entry 16 (size 64 bundles) Reserved
1048 #if defined(CONFIG_VIRT_CPU_ACCOUNTING) && defined(__IA64_ASM_PARAVIRTUALIZED_NATIVE)
1050 * There is no particular reason for this code to be here, other than
1051 * that there happens to be space here that would go unused otherwise.
1052 * If this fault ever gets "unreserved", simply moved the following
1053 * code to a more suitable spot...
1055 * account_sys_enter is called from SAVE_MIN* macros if accounting is
1056 * enabled and if the macro is entered from user mode.
1058 GLOBAL_ENTRY(account_sys_enter)
1059 // mov.m r20=ar.itc is called in advance, and r13 is current
1060 add r16=TI_AC_STAMP+IA64_TASK_SIZE,r13
1061 add r17=TI_AC_LEAVE+IA64_TASK_SIZE,r13
1063 ld8 r18=[r16],TI_AC_STIME-TI_AC_STAMP // time at last check in kernel
1064 ld8 r19=[r17],TI_AC_UTIME-TI_AC_LEAVE // time at left from kernel
1066 ld8 r23=[r16],TI_AC_STAMP-TI_AC_STIME // cumulated stime
1067 ld8 r21=[r17] // cumulated utime
1068 sub r22=r19,r18 // stime before leave kernel
1070 st8 [r16]=r20,TI_AC_STIME-TI_AC_STAMP // update stamp
1071 sub r18=r20,r19 // elapsed time in user mode
1073 add r23=r23,r22 // sum stime
1074 add r21=r21,r18 // sum utime
1076 st8 [r16]=r23 // update stime
1077 st8 [r17]=r21 // update utime
1080 END(account_sys_enter)
1083 .org ia64_ivt+0x4400
1084 /////////////////////////////////////////////////////////////////////////////////////////
1085 // 0x4400 Entry 17 (size 64 bundles) Reserved
1089 .org ia64_ivt+0x4800
1090 /////////////////////////////////////////////////////////////////////////////////////////
1091 // 0x4800 Entry 18 (size 64 bundles) Reserved
1095 .org ia64_ivt+0x4c00
1096 /////////////////////////////////////////////////////////////////////////////////////////
1097 // 0x4c00 Entry 19 (size 64 bundles) Reserved
1102 // --- End of long entries, Beginning of short entries
1105 .org ia64_ivt+0x5000
1106 /////////////////////////////////////////////////////////////////////////////////////////
1107 // 0x5000 Entry 20 (size 16 bundles) Page Not Present (10,22,49)
1108 ENTRY(page_not_present)
1113 * The Linux page fault handler doesn't expect non-present pages to be in
1114 * the TLB. Flush the existing entry now, so we meet that expectation.
1116 mov r17=PAGE_SHIFT<<2
1122 br.sptk.many page_fault
1123 END(page_not_present)
1125 .org ia64_ivt+0x5100
1126 /////////////////////////////////////////////////////////////////////////////////////////
1127 // 0x5100 Entry 21 (size 16 bundles) Key Permission (13,25,52)
1128 ENTRY(key_permission)
1135 br.sptk.many page_fault
1138 .org ia64_ivt+0x5200
1139 /////////////////////////////////////////////////////////////////////////////////////////
1140 // 0x5200 Entry 22 (size 16 bundles) Instruction Access Rights (26)
1141 ENTRY(iaccess_rights)
1148 br.sptk.many page_fault
1151 .org ia64_ivt+0x5300
1152 /////////////////////////////////////////////////////////////////////////////////////////
1153 // 0x5300 Entry 23 (size 16 bundles) Data Access Rights (14,53)
1154 ENTRY(daccess_rights)
1161 br.sptk.many page_fault
1164 .org ia64_ivt+0x5400
1165 /////////////////////////////////////////////////////////////////////////////////////////
1166 // 0x5400 Entry 24 (size 16 bundles) General Exception (5,32,34,36,38,39)
1167 ENTRY(general_exception)
1173 (p6) br.sptk.many dispatch_illegal_op_fault
1175 mov r19=24 // fault number
1176 br.sptk.many dispatch_to_fault_handler
1177 END(general_exception)
1179 .org ia64_ivt+0x5500
1180 /////////////////////////////////////////////////////////////////////////////////////////
1181 // 0x5500 Entry 25 (size 16 bundles) Disabled FP-Register (35)
1182 ENTRY(disabled_fp_reg)
1184 rsm psr.dfh // ensure we can access fph
1189 br.sptk.many dispatch_to_fault_handler
1190 END(disabled_fp_reg)
1192 .org ia64_ivt+0x5600
1193 /////////////////////////////////////////////////////////////////////////////////////////
1194 // 0x5600 Entry 26 (size 16 bundles) Nat Consumption (11,23,37,50)
1195 ENTRY(nat_consumption)
1198 MOV_FROM_IPSR(p0, r16)
1200 mov r31=pr // save PR
1202 and r18=0xf,r17 // r18 = cr.ipsr.code{3:0}
1203 tbit.z p6,p0=r17,IA64_ISR_NA_BIT
1205 cmp.ne.or p6,p0=IA64_ISR_CODE_LFETCH,r18
1206 dep r16=-1,r16,IA64_PSR_ED_BIT,1
1207 (p6) br.cond.spnt 1f // branch if (cr.ispr.na == 0 || cr.ipsr.code{3:0} != LFETCH)
1209 MOV_TO_IPSR(p0, r16, r18)
1217 END(nat_consumption)
1219 .org ia64_ivt+0x5700
1220 /////////////////////////////////////////////////////////////////////////////////////////
1221 // 0x5700 Entry 27 (size 16 bundles) Speculation (40)
1222 ENTRY(speculation_vector)
1225 * A [f]chk.[as] instruction needs to take the branch to the recovery code but
1226 * this part of the architecture is not implemented in hardware on some CPUs, such
1227 * as Itanium. Thus, in general we need to emulate the behavior. IIM contains
1228 * the relative target (not yet sign extended). So after sign extending it we
1229 * simply add it to IIP. We also need to reset the EI field of the IPSR to zero,
1230 * i.e., the slot to restart into.
1232 * cr.imm contains zero_ext(imm21)
1237 shl r18=r18,43 // put sign bit in position (43=64-21)
1240 MOV_FROM_IPSR(p0, r16)
1241 shr r18=r18,39 // sign extend (39=43-4)
1244 add r17=r17,r18 // now add the offset
1246 MOV_TO_IIP(r17, r19)
1247 dep r16=0,r16,41,2 // clear EI
1250 MOV_TO_IPSR(p0, r16, r19)
1254 END(speculation_vector)
1256 .org ia64_ivt+0x5800
1257 /////////////////////////////////////////////////////////////////////////////////////////
1258 // 0x5800 Entry 28 (size 16 bundles) Reserved
1262 .org ia64_ivt+0x5900
1263 /////////////////////////////////////////////////////////////////////////////////////////
1264 // 0x5900 Entry 29 (size 16 bundles) Debug (16,28,56)
1270 .org ia64_ivt+0x5a00
1271 /////////////////////////////////////////////////////////////////////////////////////////
1272 // 0x5a00 Entry 30 (size 16 bundles) Unaligned Reference (57)
1273 ENTRY(unaligned_access)
1275 mov r31=pr // prepare to save predicates
1277 br.sptk.many dispatch_unaligned_handler
1278 END(unaligned_access)
1280 .org ia64_ivt+0x5b00
1281 /////////////////////////////////////////////////////////////////////////////////////////
1282 // 0x5b00 Entry 31 (size 16 bundles) Unsupported Data Reference (57)
1283 ENTRY(unsupported_data_reference)
1286 END(unsupported_data_reference)
1288 .org ia64_ivt+0x5c00
1289 /////////////////////////////////////////////////////////////////////////////////////////
1290 // 0x5c00 Entry 32 (size 16 bundles) Floating-Point Fault (64)
1291 ENTRY(floating_point_fault)
1294 END(floating_point_fault)
1296 .org ia64_ivt+0x5d00
1297 /////////////////////////////////////////////////////////////////////////////////////////
1298 // 0x5d00 Entry 33 (size 16 bundles) Floating Point Trap (66)
1299 ENTRY(floating_point_trap)
1302 END(floating_point_trap)
1304 .org ia64_ivt+0x5e00
1305 /////////////////////////////////////////////////////////////////////////////////////////
1306 // 0x5e00 Entry 34 (size 16 bundles) Lower Privilege Transfer Trap (66)
1307 ENTRY(lower_privilege_trap)
1310 END(lower_privilege_trap)
1312 .org ia64_ivt+0x5f00
1313 /////////////////////////////////////////////////////////////////////////////////////////
1314 // 0x5f00 Entry 35 (size 16 bundles) Taken Branch Trap (68)
1315 ENTRY(taken_branch_trap)
1318 END(taken_branch_trap)
1320 .org ia64_ivt+0x6000
1321 /////////////////////////////////////////////////////////////////////////////////////////
1322 // 0x6000 Entry 36 (size 16 bundles) Single Step Trap (69)
1323 ENTRY(single_step_trap)
1326 END(single_step_trap)
1328 .org ia64_ivt+0x6100
1329 /////////////////////////////////////////////////////////////////////////////////////////
1330 // 0x6100 Entry 37 (size 16 bundles) Reserved
1334 .org ia64_ivt+0x6200
1335 /////////////////////////////////////////////////////////////////////////////////////////
1336 // 0x6200 Entry 38 (size 16 bundles) Reserved
1340 .org ia64_ivt+0x6300
1341 /////////////////////////////////////////////////////////////////////////////////////////
1342 // 0x6300 Entry 39 (size 16 bundles) Reserved
1346 .org ia64_ivt+0x6400
1347 /////////////////////////////////////////////////////////////////////////////////////////
1348 // 0x6400 Entry 40 (size 16 bundles) Reserved
1352 .org ia64_ivt+0x6500
1353 /////////////////////////////////////////////////////////////////////////////////////////
1354 // 0x6500 Entry 41 (size 16 bundles) Reserved
1358 .org ia64_ivt+0x6600
1359 /////////////////////////////////////////////////////////////////////////////////////////
1360 // 0x6600 Entry 42 (size 16 bundles) Reserved
1364 .org ia64_ivt+0x6700
1365 /////////////////////////////////////////////////////////////////////////////////////////
1366 // 0x6700 Entry 43 (size 16 bundles) Reserved
1370 .org ia64_ivt+0x6800
1371 /////////////////////////////////////////////////////////////////////////////////////////
1372 // 0x6800 Entry 44 (size 16 bundles) Reserved
1376 .org ia64_ivt+0x6900
1377 /////////////////////////////////////////////////////////////////////////////////////////
1378 // 0x6900 Entry 45 (size 16 bundles) IA-32 Exeception (17,18,29,41,42,43,44,58,60,61,62,72,73,75,76,77)
1379 ENTRY(ia32_exception)
1384 .org ia64_ivt+0x6a00
1385 /////////////////////////////////////////////////////////////////////////////////////////
1386 // 0x6a00 Entry 46 (size 16 bundles) IA-32 Intercept (30,31,59,70,71)
1387 ENTRY(ia32_intercept)
1389 #ifdef CONFIG_IA32_SUPPORT
1393 extr.u r17=r16,16,8 // get ISR.code
1395 MOV_FROM_IIM(r19) // old eflag value
1398 (p6) br.cond.spnt 1f // not a system flag fault
1401 extr.u r17=r16,18,1 // get the eflags.ac bit
1404 (p6) br.cond.spnt 1f // eflags.ac bit didn't change
1406 mov pr=r31,-1 // restore predicate registers
1410 #endif // CONFIG_IA32_SUPPORT
1414 .org ia64_ivt+0x6b00
1415 /////////////////////////////////////////////////////////////////////////////////////////
1416 // 0x6b00 Entry 47 (size 16 bundles) IA-32 Interrupt (74)
1417 ENTRY(ia32_interrupt)
1419 #ifdef CONFIG_IA32_SUPPORT
1421 br.sptk.many dispatch_to_ia32_handler
1427 .org ia64_ivt+0x6c00
1428 /////////////////////////////////////////////////////////////////////////////////////////
1429 // 0x6c00 Entry 48 (size 16 bundles) Reserved
1433 .org ia64_ivt+0x6d00
1434 /////////////////////////////////////////////////////////////////////////////////////////
1435 // 0x6d00 Entry 49 (size 16 bundles) Reserved
1439 .org ia64_ivt+0x6e00
1440 /////////////////////////////////////////////////////////////////////////////////////////
1441 // 0x6e00 Entry 50 (size 16 bundles) Reserved
1445 .org ia64_ivt+0x6f00
1446 /////////////////////////////////////////////////////////////////////////////////////////
1447 // 0x6f00 Entry 51 (size 16 bundles) Reserved
1451 .org ia64_ivt+0x7000
1452 /////////////////////////////////////////////////////////////////////////////////////////
1453 // 0x7000 Entry 52 (size 16 bundles) Reserved
1457 .org ia64_ivt+0x7100
1458 /////////////////////////////////////////////////////////////////////////////////////////
1459 // 0x7100 Entry 53 (size 16 bundles) Reserved
1463 .org ia64_ivt+0x7200
1464 /////////////////////////////////////////////////////////////////////////////////////////
1465 // 0x7200 Entry 54 (size 16 bundles) Reserved
1469 .org ia64_ivt+0x7300
1470 /////////////////////////////////////////////////////////////////////////////////////////
1471 // 0x7300 Entry 55 (size 16 bundles) Reserved
1475 .org ia64_ivt+0x7400
1476 /////////////////////////////////////////////////////////////////////////////////////////
1477 // 0x7400 Entry 56 (size 16 bundles) Reserved
1481 .org ia64_ivt+0x7500
1482 /////////////////////////////////////////////////////////////////////////////////////////
1483 // 0x7500 Entry 57 (size 16 bundles) Reserved
1487 .org ia64_ivt+0x7600
1488 /////////////////////////////////////////////////////////////////////////////////////////
1489 // 0x7600 Entry 58 (size 16 bundles) Reserved
1493 .org ia64_ivt+0x7700
1494 /////////////////////////////////////////////////////////////////////////////////////////
1495 // 0x7700 Entry 59 (size 16 bundles) Reserved
1499 .org ia64_ivt+0x7800
1500 /////////////////////////////////////////////////////////////////////////////////////////
1501 // 0x7800 Entry 60 (size 16 bundles) Reserved
1505 .org ia64_ivt+0x7900
1506 /////////////////////////////////////////////////////////////////////////////////////////
1507 // 0x7900 Entry 61 (size 16 bundles) Reserved
1511 .org ia64_ivt+0x7a00
1512 /////////////////////////////////////////////////////////////////////////////////////////
1513 // 0x7a00 Entry 62 (size 16 bundles) Reserved
1517 .org ia64_ivt+0x7b00
1518 /////////////////////////////////////////////////////////////////////////////////////////
1519 // 0x7b00 Entry 63 (size 16 bundles) Reserved
1523 .org ia64_ivt+0x7c00
1524 /////////////////////////////////////////////////////////////////////////////////////////
1525 // 0x7c00 Entry 64 (size 16 bundles) Reserved
1529 .org ia64_ivt+0x7d00
1530 /////////////////////////////////////////////////////////////////////////////////////////
1531 // 0x7d00 Entry 65 (size 16 bundles) Reserved
1535 .org ia64_ivt+0x7e00
1536 /////////////////////////////////////////////////////////////////////////////////////////
1537 // 0x7e00 Entry 66 (size 16 bundles) Reserved
1541 .org ia64_ivt+0x7f00
1542 /////////////////////////////////////////////////////////////////////////////////////////
1543 // 0x7f00 Entry 67 (size 16 bundles) Reserved
1547 //-----------------------------------------------------------------------------------
1548 // call do_page_fault (predicates are in r31, psr.dt may be off, r16 is faulting address)
1550 SSM_PSR_DT_AND_SRLZ_I
1553 alloc r15=ar.pfs,0,0,3,0
1556 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r14, r3)
1557 adds r3=8,r2 // set up second base pointer
1558 SSM_PSR_I(p15, p15, r14) // restore psr.i
1559 movl r14=ia64_leave_kernel
1564 adds out2=16,r12 // out2 = pointer to pt_regs
1565 br.call.sptk.many b6=ia64_do_page_fault // ignore return address
1569 mov ar.rsc=r27 // restore ar.rsc before SAVE_MIN_WITH_COVER
1573 // There is no particular reason for this code to be here, other than that
1574 // there happens to be space here that would go unused otherwise. If this
1575 // fault ever gets "unreserved", simply moved the following code to a more
1578 alloc r14=ar.pfs,0,0,2,0
1581 adds r3=8,r2 // set up second base pointer for SAVE_REST
1583 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r15, r24)
1584 // guarantee that interruption collection is on
1585 SSM_PSR_I(p15, p15, r15) // restore psr.i
1586 movl r15=ia64_leave_kernel
1591 br.call.sptk.many b6=ia64_bad_break // avoid WAW on CFM and ignore return addr
1596 mov r31=pr // prepare to save predicates
1598 SAVE_MIN_WITH_COVER // uses r31; defines r2 and r3
1599 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r3, r14)
1600 // ensure everybody knows psr.ic is back on
1601 adds r3=8,r2 // set up second base pointer for SAVE_REST
1605 MCA_RECOVER_RANGE(interrupt)
1606 alloc r14=ar.pfs,0,0,2,0 // must be first in an insn group
1607 MOV_FROM_IVR(out0, r8) // pass cr.ivr as first arg
1608 add out1=16,sp // pass pointer to pt_regs as second arg
1610 srlz.d // make sure we see the effect of cr.ivr
1611 movl r14=ia64_leave_kernel
1614 br.call.sptk.many b6=ia64_handle_irq
1618 * There is no particular reason for this code to be here, other than that
1619 * there happens to be space here that would go unused otherwise. If this
1620 * fault ever gets "unreserved", simply moved the following code to a more
1624 ENTRY(dispatch_unaligned_handler)
1627 alloc r14=ar.pfs,0,0,2,0 // now it's safe (must be first in insn group!)
1631 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r3, r24)
1632 // guarantee that interruption collection is on
1633 SSM_PSR_I(p15, p15, r3) // restore psr.i
1634 adds r3=8,r2 // set up second base pointer
1637 movl r14=ia64_leave_kernel
1640 br.sptk.many ia64_prepare_handle_unaligned
1641 END(dispatch_unaligned_handler)
1644 * There is no particular reason for this code to be here, other than that
1645 * there happens to be space here that would go unused otherwise. If this
1646 * fault ever gets "unreserved", simply moved the following code to a more
1650 ENTRY(dispatch_to_fault_handler)
1654 * r19: fault vector number (e.g., 24 for General Exception)
1655 * r31: contains saved predicates (pr)
1657 SAVE_MIN_WITH_COVER_R19
1658 alloc r14=ar.pfs,0,0,5,0
1664 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r3, out0)
1665 // guarantee that interruption collection is on
1668 SSM_PSR_I(p15, p15, r3) // restore psr.i
1669 adds r3=8,r2 // set up second base pointer for SAVE_REST
1672 movl r14=ia64_leave_kernel
1675 br.call.sptk.many b6=ia64_fault
1676 END(dispatch_to_fault_handler)
1679 * Squatting in this space ...
1681 * This special case dispatcher for illegal operation faults allows preserved
1682 * registers to be modified through a callback function (asm only) that is handed
1683 * back from the fault handler in r8. Up to three arguments can be passed to the
1684 * callback function by returning an aggregate with the callback as its first
1685 * element, followed by the arguments.
1687 ENTRY(dispatch_illegal_op_fault)
1691 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r3, r24)
1692 // guarantee that interruption collection is on
1694 SSM_PSR_I(p15, p15, r3) // restore psr.i
1695 adds r3=8,r2 // set up second base pointer for SAVE_REST
1697 alloc r14=ar.pfs,0,0,1,0 // must be first in insn group
1701 PT_REGS_UNWIND_INFO(0)
1703 br.call.sptk.many rp=ia64_illegal_op_fault
1705 alloc r14=ar.pfs,0,0,3,0 // must be first in insn group
1709 movl r15=ia64_leave_kernel
1715 (p6) br.call.dpnt.many b6=b6 // call returns to ia64_leave_kernel
1716 br.sptk.many ia64_leave_kernel
1717 END(dispatch_illegal_op_fault)
1719 #ifdef CONFIG_IA32_SUPPORT
1722 * There is no particular reason for this code to be here, other than that
1723 * there happens to be space here that would go unused otherwise. If this
1724 * fault ever gets "unreserved", simply moved the following code to a more
1728 // IA32 interrupt entry point
1730 ENTRY(dispatch_to_ia32_handler)
1734 SSM_PSR_IC_AND_DEFAULT_BITS_AND_SRLZ_I(r3, r24)
1735 // guarantee that interruption collection is on
1737 SSM_PSR_I(p15, p15, r3)
1738 adds r3=8,r2 // Base pointer for SAVE_REST
1743 shr r14=r14,16 // Get interrupt number
1745 cmp.ne p6,p0=r14,r15
1746 (p6) br.call.dpnt.many b6=non_ia32_syscall
1748 adds r14=IA64_PT_REGS_R8_OFFSET + 16,sp // 16 byte hole per SW conventions
1749 adds r15=IA64_PT_REGS_R1_OFFSET + 16,sp
1751 cmp.eq pSys,pNonSys=r0,r0 // set pSys=1, pNonSys=0
1752 ld8 r8=[r14] // get r8
1754 st8 [r15]=r8 // save original EAX in r1 (IA32 procs don't use the GP)
1756 alloc r15=ar.pfs,0,0,6,0 // must first in an insn group
1758 ld4 r8=[r14],8 // r8 == eax (syscall number)
1759 mov r15=IA32_NR_syscalls
1761 cmp.ltu.unc p6,p7=r8,r15
1762 ld4 out1=[r14],8 // r9 == ecx
1764 ld4 out2=[r14],8 // r10 == edx
1766 ld4 out0=[r14] // r11 == ebx
1767 adds r14=(IA64_PT_REGS_R13_OFFSET) + 16,sp
1769 ld4 out5=[r14],PT(R14)-PT(R13) // r13 == ebp
1771 ld4 out3=[r14],PT(R15)-PT(R14) // r14 == esi
1772 adds r2=TI_FLAGS+IA64_TASK_SIZE,r13
1774 ld4 out4=[r14] // r15 == edi
1775 movl r16=ia32_syscall_table
1777 (p6) shladd r16=r8,3,r16 // force ni_syscall if not valid syscall number
1778 ld4 r2=[r2] // r2 = current_thread_info()->flags
1781 and r2=_TIF_SYSCALL_TRACEAUDIT,r2 // mask trace or audit
1784 movl r15=ia32_ret_from_syscall
1788 (p8) br.call.sptk.many b6=b6
1789 br.cond.sptk ia32_trace_syscall
1792 alloc r15=ar.pfs,0,0,2,0
1793 mov out0=r14 // interrupt #
1794 add out1=16,sp // pointer to pt_regs
1795 ;; // avoid WAW on CFM
1796 br.call.sptk.many rp=ia32_bad_interrupt
1797 .ret1: movl r15=ia64_leave_kernel
1801 END(dispatch_to_ia32_handler)
1803 #endif /* CONFIG_IA32_SUPPORT */