aboutsummaryrefslogtreecommitdiffstats
path: root/arch/openrisc/kernel/traps.c
diff options
context:
space:
mode:
Diffstat (limited to 'arch/openrisc/kernel/traps.c')
-rw-r--r--arch/openrisc/kernel/traps.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/arch/openrisc/kernel/traps.c b/arch/openrisc/kernel/traps.c
index 0fad2e46ff43..a4cc6e59c57f 100644
--- a/arch/openrisc/kernel/traps.c
+++ b/arch/openrisc/kernel/traps.c
@@ -249,7 +249,7 @@ void __init trap_init(void)
249 249
250asmlinkage void do_trap(struct pt_regs *regs, unsigned long address) 250asmlinkage void do_trap(struct pt_regs *regs, unsigned long address)
251{ 251{
252 force_sig_fault(SIGTRAP, TRAP_TRACE, (void __user *)address, current); 252 force_sig_fault(SIGTRAP, TRAP_TRACE, (void __user *)address);
253 253
254 regs->pc += 4; 254 regs->pc += 4;
255} 255}
@@ -258,7 +258,7 @@ asmlinkage void do_unaligned_access(struct pt_regs *regs, unsigned long address)
258{ 258{
259 if (user_mode(regs)) { 259 if (user_mode(regs)) {
260 /* Send a SIGBUS */ 260 /* Send a SIGBUS */
261 force_sig_fault(SIGBUS, BUS_ADRALN, (void __user *)address, current); 261 force_sig_fault(SIGBUS, BUS_ADRALN, (void __user *)address);
262 } else { 262 } else {
263 printk("KERNEL: Unaligned Access 0x%.8lx\n", address); 263 printk("KERNEL: Unaligned Access 0x%.8lx\n", address);
264 show_registers(regs); 264 show_registers(regs);
@@ -271,7 +271,7 @@ asmlinkage void do_bus_fault(struct pt_regs *regs, unsigned long address)
271{ 271{
272 if (user_mode(regs)) { 272 if (user_mode(regs)) {
273 /* Send a SIGBUS */ 273 /* Send a SIGBUS */
274 force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *)address, current); 274 force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *)address);
275 } else { /* Kernel mode */ 275 } else { /* Kernel mode */
276 printk("KERNEL: Bus error (SIGBUS) 0x%.8lx\n", address); 276 printk("KERNEL: Bus error (SIGBUS) 0x%.8lx\n", address);
277 show_registers(regs); 277 show_registers(regs);
@@ -466,7 +466,7 @@ asmlinkage void do_illegal_instruction(struct pt_regs *regs,
466 466
467 if (user_mode(regs)) { 467 if (user_mode(regs)) {
468 /* Send a SIGILL */ 468 /* Send a SIGILL */
469 force_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)address, current); 469 force_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)address);
470 } else { /* Kernel mode */ 470 } else { /* Kernel mode */
471 printk("KERNEL: Illegal instruction (SIGILL) 0x%.8lx\n", 471 printk("KERNEL: Illegal instruction (SIGILL) 0x%.8lx\n",
472 address); 472 address);