traps.c 4.5 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2
/*
3
 * Copyright (C) 2003-2006, Axis Communications AB.
4 5 6
 */

#include <linux/ptrace.h>
7
#include <linux/extable.h>
8
#include <linux/uaccess.h>
9 10
#include <linux/sched/debug.h>

11 12 13
#include <hwregs/supp_reg.h>
#include <hwregs/intr_vect_defs.h>
#include <asm/irq.h>
14

15
void show_registers(struct pt_regs *regs)
16 17 18
{
	/*
	 * It's possible to use either the USP register or current->thread.usp.
19
	 * USP might not correspond to the current process for all cases this
20
	 * function is called, and current->thread.usp isn't up to date for the
21
	 * current process. Experience shows that using USP is the way to go.
22
	 */
23
	unsigned long usp = rdusp();
24 25 26
	unsigned long d_mmu_cause;
	unsigned long i_mmu_cause;

27
	printk("CPU: %d\n", smp_processor_id());
28

29 30
	printk("ERP: %08lx SRP: %08lx  CCS: %08lx USP: %08lx MOF: %08lx\n",
	       regs->erp, regs->srp, regs->ccs, usp, regs->mof);
31

32 33
	printk(" r0: %08lx  r1: %08lx   r2: %08lx  r3: %08lx\n",
	       regs->r0, regs->r1, regs->r2, regs->r3);
34

35 36
	printk(" r4: %08lx  r5: %08lx   r6: %08lx  r7: %08lx\n",
	       regs->r4, regs->r5, regs->r6, regs->r7);
37

38 39
	printk(" r8: %08lx  r9: %08lx  r10: %08lx r11: %08lx\n",
	       regs->r8, regs->r9, regs->r10, regs->r11);
40

41 42
	printk("r12: %08lx r13: %08lx oR10: %08lx acr: %08lx\n",
	       regs->r12, regs->r13, regs->orig_r10, regs->acr);
43

44
	printk(" sp: %08lx\n", (unsigned long)regs);
45 46 47 48 49 50 51

	SUPP_BANK_SEL(BANK_IM);
	SUPP_REG_RD(RW_MM_CAUSE, i_mmu_cause);

	SUPP_BANK_SEL(BANK_DM);
	SUPP_REG_RD(RW_MM_CAUSE, d_mmu_cause);

52 53
	printk("       Data MMU Cause: %08lx\n", d_mmu_cause);
	printk("Instruction MMU Cause: %08lx\n", i_mmu_cause);
54

55 56
	printk("Process %s (pid: %d, stackpage=%08lx)\n",
	       current->comm, current->pid, (unsigned long)current);
57

58 59 60 61
	/*
	 * When in-kernel, we also print out the stack and code at the
	 * time of the fault..
	 */
62 63 64
	if (!user_mode(regs)) {
		int i;

65
		show_stack(NULL, (unsigned long *)usp);
66 67 68 69 70 71 72 73

		/*
		 * If the previous stack-dump wasn't a kernel one, dump the
		 * kernel stack now.
		 */
		if (usp != 0)
			show_stack(NULL, NULL);

74
		printk("\nCode: ");
75 76 77 78 79 80 81 82 83 84 85

		if (regs->erp < PAGE_OFFSET)
			goto bad_value;

		/*
		 * Quite often the value at regs->erp doesn't point to the
		 * interesting instruction, which often is the previous
		 * instruction. So dump at an offset large enough that the
		 * instruction decoding should be in sync at the interesting
		 * point, but small enough to fit on a row. The regs->erp
		 * location is pointed out in a ksymoops-friendly way by
86
		 * wrapping the byte for that address in parenthesises.
87 88
		 */
		for (i = -12; i < 12; i++) {
89 90 91
			unsigned char c;

			if (__get_user(c, &((unsigned char *)regs->erp)[i])) {
92
bad_value:
93
				printk(" Bad IP value.");
94 95 96 97
				break;
			}

			if (i == 0)
98
				printk("(%02x) ", c);
99
			else
100
				printk("%02x ", c);
101
		}
102
		printk("\n");
103 104 105
	}
}

106
void arch_enable_nmi(void)
107
{
108
	unsigned long flags;
109

110 111 112
	local_save_flags(flags);
	flags |= (1 << 30); /* NMI M flag is at bit 30 */
	local_irq_restore(flags);
113 114
}

115 116
extern void (*nmi_handler)(struct pt_regs *);
void handle_nmi(struct pt_regs *regs)
117
{
118 119 120
#ifdef CONFIG_ETRAXFS
	reg_intr_vect_r_nmi r;
#endif
121

122 123 124 125 126 127 128 129
	if (nmi_handler)
		nmi_handler(regs);

#ifdef CONFIG_ETRAXFS
	/* Wait until nmi is no longer active. */
	do {
		r = REG_RD(intr_vect, regi_irq, r_nmi);
	} while (r.ext == regk_intr_vect_on);
130
#endif
131
}
132 133


134 135
#ifdef CONFIG_BUG
extern void die_if_kernel(const char *str, struct pt_regs *regs, long err);
136

137 138
/* Copy of the regs at BUG() time.  */
struct pt_regs BUG_regs;
139

140 141 142 143
void do_BUG(char *file, unsigned int line)
{
	printk("kernel BUG at %s:%d!\n", file, line);
	die_if_kernel("Oops", &BUG_regs, 0);
144
}
145
EXPORT_SYMBOL(do_BUG);
146

147
void fixup_BUG(struct pt_regs *regs)
148
{
149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172
	BUG_regs = *regs;

#ifdef CONFIG_DEBUG_BUGVERBOSE
	/*
	 * Fixup the BUG arguments through exception handlers.
	 */
	{
		const struct exception_table_entry *fixup;

		/*
		 * ERP points at the "break 14" + 2, compensate for the 2
		 * bytes.
		 */
		fixup = search_exception_tables(instruction_pointer(regs) - 2);
		if (fixup) {
			/* Adjust the instruction pointer in the stackframe. */
			instruction_pointer(regs) = fixup->fixup;
			arch_fixup(regs);
		}
	}
#else
	/* Dont try to lookup the filename + line, just dump regs.  */
	do_BUG("unknown", 0);
#endif
173
}
174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196

/*
 * Break 14 handler. Save regs and jump into the fixup_BUG.
 */
__asm__  ( ".text\n\t"
	   ".global breakh_BUG\n\t"
	   "breakh_BUG:\n\t"
	   SAVE_ALL
	   KGDB_FIXUP
	   "move.d $sp, $r10\n\t"
	   "jsr fixup_BUG\n\t"
	   "nop\n\t"
	   "jump ret_from_intr\n\t"
	   "nop\n\t");


#ifdef CONFIG_DEBUG_BUGVERBOSE
void
handle_BUG(struct pt_regs *regs)
{
}
#endif
#endif