traps.c 36.3 KB
Newer Older
B
Bryan Wu 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
/*
 * File:         arch/blackfin/kernel/traps.c
 * Based on:
 * Author:       Hamish Macdonald
 *
 * Created:
 * Description:  uses S/W interrupt 15 for the system calls
 *
 * Modified:
 *               Copyright 2004-2006 Analog Devices Inc.
 *
 * Bugs:         Enter bugs at http://blackfin.uclinux.org/
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see the file COPYING, or write
 * to the Free Software Foundation, Inc.,
 * 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
 */

30
#include <linux/bug.h>
31 32 33 34
#include <linux/uaccess.h>
#include <linux/interrupt.h>
#include <linux/module.h>
#include <linux/kallsyms.h>
35
#include <linux/fs.h>
36
#include <linux/rbtree.h>
B
Bryan Wu 已提交
37 38
#include <asm/traps.h>
#include <asm/cacheflush.h>
39
#include <asm/cplb.h>
40
#include <asm/dma.h>
B
Bryan Wu 已提交
41 42
#include <asm/blackfin.h>
#include <asm/irq_handler.h>
43
#include <linux/irq.h>
44
#include <asm/trace.h>
45
#include <asm/fixed_code.h>
B
Bryan Wu 已提交
46 47 48

#ifdef CONFIG_KGDB
# include <linux/kgdb.h>
49 50 51

# define CHK_DEBUGGER_TRAP() \
	do { \
52
		kgdb_handle_exception(trapnr, sig, info.si_code, fp); \
53 54 55 56 57 58 59 60 61
	} while (0)
# define CHK_DEBUGGER_TRAP_MAYBE() \
	do { \
		if (kgdb_connected) \
			CHK_DEBUGGER_TRAP(); \
	} while (0)
#else
# define CHK_DEBUGGER_TRAP() do { } while (0)
# define CHK_DEBUGGER_TRAP_MAYBE() do { } while (0)
B
Bryan Wu 已提交
62 63
#endif

64

65
#ifdef CONFIG_DEBUG_VERBOSE
66 67 68 69 70 71 72
#define verbose_printk(fmt, arg...) \
	printk(fmt, ##arg)
#else
#define verbose_printk(fmt, arg...) \
	({ if (0) printk(fmt, ##arg); 0; })
#endif

73 74 75 76 77 78 79
#if defined(CONFIG_DEBUG_MMRS) || defined(CONFIG_DEBUG_MMRS_MODULE)
u32 last_seqstat;
#ifdef CONFIG_DEBUG_MMRS_MODULE
EXPORT_SYMBOL(last_seqstat);
#endif
#endif

B
Bryan Wu 已提交
80 81 82 83 84 85 86 87
/* Initiate the event table handler */
void __init trap_init(void)
{
	CSYNC();
	bfin_write_EVT3(trap);
	CSYNC();
}

88
static void decode_address(char *buf, unsigned long address)
B
Bryan Wu 已提交
89
{
90
#ifdef CONFIG_DEBUG_VERBOSE
B
Bryan Wu 已提交
91 92
	struct task_struct *p;
	struct mm_struct *mm;
93
	unsigned long flags, offset;
94
	unsigned char in_atomic = (bfin_read_IPEND() & 0x10) || in_atomic();
95
	struct rb_node *n;
B
Bryan Wu 已提交
96 97

#ifdef CONFIG_KALLSYMS
98
	unsigned long symsize;
B
Bryan Wu 已提交
99 100 101 102 103 104 105 106 107 108 109 110
	const char *symname;
	char *modname;
	char *delim = ":";
	char namebuf[128];

	/* look up the address and see if we are in kernel space */
	symname = kallsyms_lookup(address, &symsize, &offset, &modname, namebuf);

	if (symname) {
		/* yeah! kernel space! */
		if (!modname)
			modname = delim = "";
111
		sprintf(buf, "<0x%p> { %s%s%s%s + 0x%lx }",
112
		              (void *)address, delim, modname, delim, symname,
B
Bryan Wu 已提交
113
		              (unsigned long)offset);
114
		return;
B
Bryan Wu 已提交
115 116 117 118

	}
#endif

119 120 121 122 123 124 125 126 127 128 129 130
	/* Problem in fixed code section? */
	if (address >= FIXED_CODE_START && address < FIXED_CODE_END) {
		sprintf(buf, "<0x%p> /* Maybe fixed code section */", (void *)address);
		return;
	}

	/* Problem somewhere before the kernel start address */
	if (address < CONFIG_BOOT_LOAD) {
		sprintf(buf, "<0x%p> /* Maybe null pointer? */", (void *)address);
		return;
	}

B
Bryan Wu 已提交
131 132 133 134
	/* looks like we're off in user-land, so let's walk all the
	 * mappings of all our processes and see if we can't be a whee
	 * bit more specific
	 */
135
	write_lock_irqsave(&tasklist_lock, flags);
B
Bryan Wu 已提交
136
	for_each_process(p) {
137
		mm = (in_atomic ? p->mm : get_task_mm(p));
B
Bryan Wu 已提交
138 139 140
		if (!mm)
			continue;

141 142 143 144
		for (n = rb_first(&mm->mm_rb); n; n = rb_next(n)) {
			struct vm_area_struct *vma;

			vma = rb_entry(n, struct vm_area_struct, vm_rb);
B
Bryan Wu 已提交
145 146

			if (address >= vma->vm_start && address < vma->vm_end) {
147
				char _tmpbuf[256];
B
Bryan Wu 已提交
148 149
				char *name = p->comm;
				struct file *file = vma->vm_file;
150

151 152
				if (file) {
					char *d_name = d_path(&file->f_path, _tmpbuf,
153
						      sizeof(_tmpbuf));
154 155 156
					if (!IS_ERR(d_name))
						name = d_name;
				}
B
Bryan Wu 已提交
157

158 159 160
				/* FLAT does not have its text aligned to the start of
				 * the map while FDPIC ELF does ...
				 */
161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181

				/* before we can check flat/fdpic, we need to
				 * make sure current is valid
				 */
				if ((unsigned long)current >= FIXED_CODE_START &&
				    !((unsigned long)current & 0x3)) {
					if (current->mm &&
					    (address > current->mm->start_code) &&
					    (address < current->mm->end_code))
						offset = address - current->mm->start_code;
					else
						offset = (address - vma->vm_start) +
							 (vma->vm_pgoff << PAGE_SHIFT);

					sprintf(buf, "<0x%p> [ %s + 0x%lx ]",
						(void *)address, name, offset);
				} else
					sprintf(buf, "<0x%p> [ %s vma:0x%lx-0x%lx]",
						(void *)address, name,
						vma->vm_start, vma->vm_end);

182
				if (!in_atomic)
183
					mmput(mm);
184

185 186 187
				if (!strlen(buf))
					sprintf(buf, "<0x%p> [ %s ] dynamic memory", (void *)address, name);

188
				goto done;
B
Bryan Wu 已提交
189 190
			}
		}
191
		if (!in_atomic)
192
			mmput(mm);
B
Bryan Wu 已提交
193 194 195
	}

	/* we were unable to find this address anywhere */
196
	sprintf(buf, "<0x%p> /* kernel dynamic memory */", (void *)address);
197 198 199

done:
	write_unlock_irqrestore(&tasklist_lock, flags);
200 201 202
#else
	sprintf(buf, " ");
#endif
B
Bryan Wu 已提交
203 204
}

205 206
asmlinkage void double_fault_c(struct pt_regs *fp)
{
207 208 209 210 211
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON
	int j;
	trace_buffer_save(j);
#endif

212 213
	console_verbose();
	oops_in_progress = 1;
214
#ifdef CONFIG_DEBUG_VERBOSE
215
	printk(KERN_EMERG "\n" KERN_EMERG "Double Fault\n");
216 217
#ifdef CONFIG_DEBUG_DOUBLEFAULT_PRINT
	if (((long)fp->seqstat &  SEQSTAT_EXCAUSE) == VEC_UNCOV) {
218
		unsigned int cpu = smp_processor_id();
219
		char buf[150];
220
		decode_address(buf, cpu_pda[cpu].retx);
221
		printk(KERN_EMERG "While handling exception (EXCAUSE = 0x%x) at %s:\n",
222 223
			(unsigned int)cpu_pda[cpu].seqstat & SEQSTAT_EXCAUSE, buf);
		decode_address(buf, cpu_pda[cpu].dcplb_fault_addr);
224
		printk(KERN_NOTICE "   DCPLB_FAULT_ADDR: %s\n", buf);
225
		decode_address(buf, cpu_pda[cpu].icplb_fault_addr);
226 227 228
		printk(KERN_NOTICE "   ICPLB_FAULT_ADDR: %s\n", buf);

		decode_address(buf, fp->retx);
229
		printk(KERN_NOTICE "The instruction at %s caused a double exception\n", buf);
230 231 232 233 234 235
	} else
#endif
	{
		dump_bfin_process(fp);
		dump_bfin_mem(fp);
		show_regs(fp);
236
		dump_bfin_trace_buffer();
237
	}
238
#endif
239
	panic("Double Fault - unrecoverable event");
240 241 242

}

243 244 245 246 247
static int kernel_mode_regs(struct pt_regs *regs)
{
	return regs->ipend & 0xffc0;
}

B
Bryan Wu 已提交
248 249
asmlinkage void trap_c(struct pt_regs *fp)
{
250 251
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON
	int j;
252 253 254
#endif
#ifdef CONFIG_DEBUG_HUNT_FOR_ZERO
	unsigned int cpu = smp_processor_id();
255
#endif
256
	const char *strerror = NULL;
257
	int sig = 0;
B
Bryan Wu 已提交
258 259 260
	siginfo_t info;
	unsigned long trapnr = fp->seqstat & SEQSTAT_EXCAUSE;

261
	trace_buffer_save(j);
262 263 264
#if defined(CONFIG_DEBUG_MMRS) || defined(CONFIG_DEBUG_MMRS_MODULE)
	last_seqstat = (u32)fp->seqstat;
#endif
265 266 267 268 269

	/* Important - be very careful dereferncing pointers - will lead to
	 * double faults if the stack has become corrupt
	 */

270 271 272
#ifndef CONFIG_KGDB
	/* IPEND is skipped if KGDB isn't enabled (see entry code) */
	fp->ipend = bfin_read_IPEND();
B
Bryan Wu 已提交
273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300
#endif

	/* trap_c() will be called for exceptions. During exceptions
	 * processing, the pc value should be set with retx value.
	 * With this change we can cleanup some code in signal.c- TODO
	 */
	fp->orig_pc = fp->retx;
	/* printk("exception: 0x%x, ipend=%x, reti=%x, retx=%x\n",
		trapnr, fp->ipend, fp->pc, fp->retx); */

	/* send the appropriate signal to the user program */
	switch (trapnr) {

	/* This table works in conjuction with the one in ./mach-common/entry.S
	 * Some exceptions are handled there (in assembly, in exception space)
	 * Some are handled here, (in C, in interrupt space)
	 * Some, like CPLB, are handled in both, where the normal path is
	 * handled in assembly/exception space, and the error path is handled
	 * here
	 */

	/* 0x00 - Linux Syscall, getting here is an error */
	/* 0x01 - userspace gdb breakpoint, handled here */
	case VEC_EXCPT01:
		info.si_code = TRAP_ILLTRAP;
		sig = SIGTRAP;
		CHK_DEBUGGER_TRAP_MAYBE();
		/* Check if this is a breakpoint in kernel space */
301
		if (kernel_mode_regs(fp))
302
			goto traps_done;
B
Bryan Wu 已提交
303 304
		else
			break;
M
Mike Frysinger 已提交
305
	/* 0x03 - User Defined, userspace stack overflow */
B
Bryan Wu 已提交
306 307 308
	case VEC_EXCPT03:
		info.si_code = SEGV_STACKFLOW;
		sig = SIGSEGV;
309
		strerror = KERN_NOTICE EXC_0x03(KERN_NOTICE);
310
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
311
		break;
312 313 314 315 316 317
	/* 0x02 - KGDB initial connection and break signal trap */
	case VEC_EXCPT02:
#ifdef CONFIG_KGDB
		info.si_code = TRAP_ILLTRAP;
		sig = SIGTRAP;
		CHK_DEBUGGER_TRAP();
318
		goto traps_done;
319
#endif
320 321 322 323 324 325 326 327 328 329 330 331
	/* 0x04 - User Defined */
	/* 0x05 - User Defined */
	/* 0x06 - User Defined */
	/* 0x07 - User Defined */
	/* 0x08 - User Defined */
	/* 0x09 - User Defined */
	/* 0x0A - User Defined */
	/* 0x0B - User Defined */
	/* 0x0C - User Defined */
	/* 0x0D - User Defined */
	/* 0x0E - User Defined */
	/* 0x0F - User Defined */
332
	/* If we got here, it is most likely that someone was trying to use a
333 334 335 336 337
	 * custom exception handler, and it is not actually installed properly
	 */
	case VEC_EXCPT04 ... VEC_EXCPT15:
		info.si_code = ILL_ILLPARAOP;
		sig = SIGILL;
338
		strerror = KERN_NOTICE EXC_0x04(KERN_NOTICE);
339 340
		CHK_DEBUGGER_TRAP_MAYBE();
		break;
B
Bryan Wu 已提交
341 342 343 344 345 346
	/* 0x10 HW Single step, handled here */
	case VEC_STEP:
		info.si_code = TRAP_STEP;
		sig = SIGTRAP;
		CHK_DEBUGGER_TRAP_MAYBE();
		/* Check if this is a single step in kernel space */
347
		if (kernel_mode_regs(fp))
348
			goto traps_done;
B
Bryan Wu 已提交
349 350 351 352 353 354
		else
			break;
	/* 0x11 - Trace Buffer Full, handled here */
	case VEC_OVFLOW:
		info.si_code = TRAP_TRACEFLOW;
		sig = SIGTRAP;
355
		strerror = KERN_NOTICE EXC_0x11(KERN_NOTICE);
356
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374
		break;
	/* 0x12 - Reserved, Caught by default */
	/* 0x13 - Reserved, Caught by default */
	/* 0x14 - Reserved, Caught by default */
	/* 0x15 - Reserved, Caught by default */
	/* 0x16 - Reserved, Caught by default */
	/* 0x17 - Reserved, Caught by default */
	/* 0x18 - Reserved, Caught by default */
	/* 0x19 - Reserved, Caught by default */
	/* 0x1A - Reserved, Caught by default */
	/* 0x1B - Reserved, Caught by default */
	/* 0x1C - Reserved, Caught by default */
	/* 0x1D - Reserved, Caught by default */
	/* 0x1E - Reserved, Caught by default */
	/* 0x1F - Reserved, Caught by default */
	/* 0x20 - Reserved, Caught by default */
	/* 0x21 - Undefined Instruction, handled here */
	case VEC_UNDEF_I:
375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391
#ifdef CONFIG_BUG
		if (kernel_mode_regs(fp)) {
			switch (report_bug(fp->pc, fp)) {
			case BUG_TRAP_TYPE_NONE:
				break;
			case BUG_TRAP_TYPE_WARN:
				dump_bfin_trace_buffer();
				fp->pc += 2;
				goto traps_done;
			case BUG_TRAP_TYPE_BUG:
				/* call to panic() will dump trace, and it is
				 * off at this point, so it won't be clobbered
				 */
				panic("BUG()");
			}
		}
#endif
B
Bryan Wu 已提交
392 393
		info.si_code = ILL_ILLOPC;
		sig = SIGILL;
394
		strerror = KERN_NOTICE EXC_0x21(KERN_NOTICE);
395
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
396 397 398 399 400
		break;
	/* 0x22 - Illegal Instruction Combination, handled here */
	case VEC_ILGAL_I:
		info.si_code = ILL_ILLPARAOP;
		sig = SIGILL;
401
		strerror = KERN_NOTICE EXC_0x22(KERN_NOTICE);
402
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
403
		break;
404
	/* 0x23 - Data CPLB protection violation, handled here */
B
Bryan Wu 已提交
405 406
	case VEC_CPLB_VL:
		info.si_code = ILL_CPLB_VI;
407
		sig = SIGBUS;
408
		strerror = KERN_NOTICE EXC_0x23(KERN_NOTICE);
409
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
410 411 412 413 414
		break;
	/* 0x24 - Data access misaligned, handled here */
	case VEC_MISALI_D:
		info.si_code = BUS_ADRALN;
		sig = SIGBUS;
415
		strerror = KERN_NOTICE EXC_0x24(KERN_NOTICE);
416
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
417 418 419 420 421
		break;
	/* 0x25 - Unrecoverable Event, handled here */
	case VEC_UNCOV:
		info.si_code = ILL_ILLEXCPT;
		sig = SIGILL;
422
		strerror = KERN_NOTICE EXC_0x25(KERN_NOTICE);
423
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
424 425 426 427 428 429
		break;
	/* 0x26 - Data CPLB Miss, normal case is handled in _cplb_hdr,
		error case is handled here */
	case VEC_CPLB_M:
		info.si_code = BUS_ADRALN;
		sig = SIGBUS;
430
		strerror = KERN_NOTICE EXC_0x26(KERN_NOTICE);
B
Bryan Wu 已提交
431 432 433 434 435
		break;
	/* 0x27 - Data CPLB Multiple Hits - Linux Trap Zero, handled here */
	case VEC_CPLB_MHIT:
		info.si_code = ILL_CPLB_MULHIT;
		sig = SIGSEGV;
436
#ifdef CONFIG_DEBUG_HUNT_FOR_ZERO
437
		if (cpu_pda[cpu].dcplb_fault_addr < FIXED_CODE_START)
438
			strerror = KERN_NOTICE "NULL pointer access\n";
439
		else
B
Bryan Wu 已提交
440
#endif
441
			strerror = KERN_NOTICE EXC_0x27(KERN_NOTICE);
442
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
443 444 445 446 447
		break;
	/* 0x28 - Emulation Watchpoint, handled here */
	case VEC_WATCH:
		info.si_code = TRAP_WATCHPT;
		sig = SIGTRAP;
448
		pr_debug(EXC_0x28(KERN_DEBUG));
B
Bryan Wu 已提交
449 450
		CHK_DEBUGGER_TRAP_MAYBE();
		/* Check if this is a watchpoint in kernel space */
451
		if (kernel_mode_regs(fp))
452
			goto traps_done;
B
Bryan Wu 已提交
453 454 455 456 457 458 459
		else
			break;
#ifdef CONFIG_BF535
	/* 0x29 - Instruction fetch access error (535 only) */
	case VEC_ISTRU_VL:      /* ADSP-BF535 only (MH) */
		info.si_code = BUS_OPFETCH;
		sig = SIGBUS;
460
		strerror = KERN_NOTICE "BF535: VEC_ISTRU_VL\n";
461
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
462 463 464 465 466 467 468 469
		break;
#else
	/* 0x29 - Reserved, Caught by default */
#endif
	/* 0x2A - Instruction fetch misaligned, handled here */
	case VEC_MISALI_I:
		info.si_code = BUS_ADRALN;
		sig = SIGBUS;
470
		strerror = KERN_NOTICE EXC_0x2A(KERN_NOTICE);
471
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
472
		break;
473
	/* 0x2B - Instruction CPLB protection violation, handled here */
B
Bryan Wu 已提交
474 475
	case VEC_CPLB_I_VL:
		info.si_code = ILL_CPLB_VI;
476
		sig = SIGBUS;
477
		strerror = KERN_NOTICE EXC_0x2B(KERN_NOTICE);
478
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
479 480 481 482 483
		break;
	/* 0x2C - Instruction CPLB miss, handled in _cplb_hdr */
	case VEC_CPLB_I_M:
		info.si_code = ILL_CPLB_MISS;
		sig = SIGBUS;
484
		strerror = KERN_NOTICE EXC_0x2C(KERN_NOTICE);
B
Bryan Wu 已提交
485 486 487 488 489
		break;
	/* 0x2D - Instruction CPLB Multiple Hits, handled here */
	case VEC_CPLB_I_MHIT:
		info.si_code = ILL_CPLB_MULHIT;
		sig = SIGSEGV;
490
#ifdef CONFIG_DEBUG_HUNT_FOR_ZERO
491
		if (cpu_pda[cpu].icplb_fault_addr < FIXED_CODE_START)
492
			strerror = KERN_NOTICE "Jump to NULL address\n";
493
		else
B
Bryan Wu 已提交
494
#endif
495
			strerror = KERN_NOTICE EXC_0x2D(KERN_NOTICE);
496
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
497 498 499 500 501
		break;
	/* 0x2E - Illegal use of Supervisor Resource, handled here */
	case VEC_ILL_RES:
		info.si_code = ILL_PRVOPC;
		sig = SIGILL;
502
		strerror = KERN_NOTICE EXC_0x2E(KERN_NOTICE);
503
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521
		break;
	/* 0x2F - Reserved, Caught by default */
	/* 0x30 - Reserved, Caught by default */
	/* 0x31 - Reserved, Caught by default */
	/* 0x32 - Reserved, Caught by default */
	/* 0x33 - Reserved, Caught by default */
	/* 0x34 - Reserved, Caught by default */
	/* 0x35 - Reserved, Caught by default */
	/* 0x36 - Reserved, Caught by default */
	/* 0x37 - Reserved, Caught by default */
	/* 0x38 - Reserved, Caught by default */
	/* 0x39 - Reserved, Caught by default */
	/* 0x3A - Reserved, Caught by default */
	/* 0x3B - Reserved, Caught by default */
	/* 0x3C - Reserved, Caught by default */
	/* 0x3D - Reserved, Caught by default */
	/* 0x3E - Reserved, Caught by default */
	/* 0x3F - Reserved, Caught by default */
522 523 524 525 526 527 528 529
	case VEC_HWERR:
		info.si_code = BUS_ADRALN;
		sig = SIGBUS;
		switch (fp->seqstat & SEQSTAT_HWERRCAUSE) {
		/* System MMR Error */
		case (SEQSTAT_HWERRCAUSE_SYSTEM_MMR):
			info.si_code = BUS_ADRALN;
			sig = SIGBUS;
530
			strerror = KERN_NOTICE HWC_x2(KERN_NOTICE);
531 532 533 534 535
			break;
		/* External Memory Addressing Error */
		case (SEQSTAT_HWERRCAUSE_EXTERN_ADDR):
			info.si_code = BUS_ADRERR;
			sig = SIGBUS;
536
			strerror = KERN_NOTICE HWC_x3(KERN_NOTICE);
537 538 539
			break;
		/* Performance Monitor Overflow */
		case (SEQSTAT_HWERRCAUSE_PERF_FLOW):
540
			strerror = KERN_NOTICE HWC_x12(KERN_NOTICE);
541 542 543 544 545 546 547 548 549
			break;
		/* RAISE 5 instruction */
		case (SEQSTAT_HWERRCAUSE_RAISE_5):
			printk(KERN_NOTICE HWC_x18(KERN_NOTICE));
			break;
		default:        /* Reserved */
			printk(KERN_NOTICE HWC_default(KERN_NOTICE));
			break;
		}
550
		CHK_DEBUGGER_TRAP_MAYBE();
551
		break;
552 553 554 555
	/*
	 * We should be handling all known exception types above,
	 * if we get here we hit a reserved one, so panic
	 */
B
Bryan Wu 已提交
556
	default:
557 558
		info.si_code = ILL_ILLPARAOP;
		sig = SIGILL;
559
		verbose_printk(KERN_EMERG "Caught Unhandled Exception, code = %08lx\n",
B
Bryan Wu 已提交
560
			(fp->seqstat & SEQSTAT_EXCAUSE));
561
		CHK_DEBUGGER_TRAP_MAYBE();
B
Bryan Wu 已提交
562 563 564
		break;
	}

565 566
	BUG_ON(sig == 0);

567 568 569 570 571 572 573 574 575 576
	/* If the fault was caused by a kernel thread, or interrupt handler
	 * we will kernel panic, so the system reboots.
	 */
	if (kernel_mode_regs(fp) || (current && !current->mm)) {
		console_verbose();
		oops_in_progress = 1;
		if (strerror)
			verbose_printk(strerror);
	}

577
	if (sig != SIGTRAP) {
578
		dump_bfin_process(fp);
579
		dump_bfin_mem(fp);
580
		show_regs(fp);
581 582 583 584

		/* Print out the trace buffer if it makes sense */
#ifndef CONFIG_DEBUG_BFIN_NO_KERN_HWTRACE
		if (trapnr == VEC_CPLB_I_M || trapnr == VEC_CPLB_M)
585
			verbose_printk(KERN_NOTICE "No trace since you do not have "
586 587 588 589 590
				"CONFIG_DEBUG_BFIN_NO_KERN_HWTRACE enabled\n"
				KERN_NOTICE "\n");
		else
#endif
			dump_bfin_trace_buffer();
591

592
		if (oops_in_progress) {
593
			/* Dump the current kernel stack */
594
			verbose_printk(KERN_NOTICE "\n" KERN_NOTICE "Kernel Stack\n");
595
			show_stack(current, NULL);
596
			print_modules();
597
#ifndef CONFIG_ACCESS_CHECK
598
			verbose_printk(KERN_EMERG "Please turn on "
599
			       "CONFIG_ACCESS_CHECK\n");
600
#endif
B
Bryan Wu 已提交
601
			panic("Kernel exception");
602
		} else {
603
#ifdef CONFIG_DEBUG_VERBOSE
604
			unsigned long *stack;
605 606
			/* Dump the user space stack */
			stack = (unsigned long *)rdusp();
607
			verbose_printk(KERN_NOTICE "Userspace Stack\n");
608
			show_stack(NULL, stack);
609
#endif
610
		}
B
Bryan Wu 已提交
611
	}
612

613 614 615 616 617 618 619 620 621
#ifdef CONFIG_IPIPE
	if (!ipipe_trap_notify(fp->seqstat & 0x3f, fp))
#endif
	{
		info.si_signo = sig;
		info.si_errno = 0;
		info.si_addr = (void __user *)fp->pc;
		force_sig_info(sig, &info, current);
	}
B
Bryan Wu 已提交
622

623 624 625
	if (ANOMALY_05000461 && trapnr == VEC_HWERR && !access_ok(VERIFY_READ, fp->pc, 8))
		fp->pc = SAFE_USER_INSTRUCTION;

626
 traps_done:
B
Bryan Wu 已提交
627 628 629 630 631
	trace_buffer_restore(j);
}

/* Typical exception handling routines	*/

632 633
#define EXPAND_LEN ((1 << CONFIG_DEBUG_BFIN_HWTRACE_EXPAND_LEN) * 256 - 1)

634 635 636 637
/*
 * Similar to get_user, do some address checking, then dereference
 * Return true on sucess, false on bad address
 */
638
static bool get_instruction(unsigned short *val, unsigned short *address)
639
{
640
	unsigned long addr = (unsigned long)address;
641 642 643 644 645

	/* Check for odd addresses */
	if (addr & 0x1)
		return false;

646 647
	/* MMR region will never have instructions */
	if (addr >= SYSMMR_BASE)
648 649
		return false;

650 651 652 653 654 655 656 657 658 659 660 661 662
	switch (bfin_mem_access_type(addr, 2)) {
		case BFIN_MEM_ACCESS_CORE:
		case BFIN_MEM_ACCESS_CORE_ONLY:
			*val = *address;
			return true;
		case BFIN_MEM_ACCESS_DMA:
			dma_memcpy(val, address, 2);
			return true;
		case BFIN_MEM_ACCESS_ITEST:
			isram_memcpy(val, address, 2);
			return true;
		default: /* invalid access */
			return false;
663 664 665
	}
}

666
/*
667 668 669 670 671
 * decode the instruction if we are printing out the trace, as it
 * makes things easier to follow, without running it through objdump
 * These are the normal instructions which cause change of flow, which
 * would be at the source of the trace buffer
 */
672
#if defined(CONFIG_DEBUG_VERBOSE) && defined(CONFIG_DEBUG_BFIN_HWTRACE_ON)
673
static void decode_instruction(unsigned short *address)
674 675 676 677 678
{
	unsigned short opcode;

	if (get_instruction(&opcode, address)) {
		if (opcode == 0x0010)
679
			verbose_printk("RTS");
680
		else if (opcode == 0x0011)
681
			verbose_printk("RTI");
682
		else if (opcode == 0x0012)
683
			verbose_printk("RTX");
684 685 686 687 688 689 690 691
		else if (opcode == 0x0013)
			verbose_printk("RTN");
		else if (opcode == 0x0014)
			verbose_printk("RTE");
		else if (opcode == 0x0025)
			verbose_printk("EMUEXCPT");
		else if (opcode == 0x0040 && opcode <= 0x0047)
			verbose_printk("STI R%i", opcode & 7);
692
		else if (opcode >= 0x0050 && opcode <= 0x0057)
693
			verbose_printk("JUMP (P%i)", opcode & 7);
694
		else if (opcode >= 0x0060 && opcode <= 0x0067)
695
			verbose_printk("CALL (P%i)", opcode & 7);
696
		else if (opcode >= 0x0070 && opcode <= 0x0077)
697
			verbose_printk("CALL (PC+P%i)", opcode & 7);
698
		else if (opcode >= 0x0080 && opcode <= 0x0087)
699
			verbose_printk("JUMP (PC+P%i)", opcode & 7);
700 701 702 703
		else if (opcode >= 0x0090 && opcode <= 0x009F)
			verbose_printk("RAISE 0x%x", opcode & 0xF);
		else if (opcode >= 0x00A0 && opcode <= 0x00AF)
			verbose_printk("EXCPT 0x%x", opcode & 0xF);
704
		else if ((opcode >= 0x1000 && opcode <= 0x13FF) || (opcode >= 0x1800 && opcode <= 0x1BFF))
705
			verbose_printk("IF !CC JUMP");
706
		else if ((opcode >= 0x1400 && opcode <= 0x17ff) || (opcode >= 0x1c00 && opcode <= 0x1fff))
707
			verbose_printk("IF CC JUMP");
708
		else if (opcode >= 0x2000 && opcode <= 0x2fff)
709
			verbose_printk("JUMP.S");
710
		else if (opcode >= 0xe080 && opcode <= 0xe0ff)
711
			verbose_printk("LSETUP");
712
		else if (opcode >= 0xe200 && opcode <= 0xe2ff)
713
			verbose_printk("JUMP.L");
714
		else if (opcode >= 0xe300 && opcode <= 0xe3ff)
715
			verbose_printk("CALL pcrel");
716
		else
717
			verbose_printk("0x%04x", opcode);
718 719 720
	}

}
721
#endif
722

B
Bryan Wu 已提交
723 724
void dump_bfin_trace_buffer(void)
{
725
#ifdef CONFIG_DEBUG_VERBOSE
726 727
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON
	int tflags, i = 0;
728
	char buf[150];
729
	unsigned short *addr;
730 731 732 733
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_EXPAND
	int j, index;
#endif

B
Bryan Wu 已提交
734 735
	trace_buffer_save(tflags);

736
	printk(KERN_NOTICE "Hardware Trace:\n");
737

738 739 740 741
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_EXPAND
	printk(KERN_NOTICE "WARNING: Expanded trace turned on - can not trace exceptions\n");
#endif

B
Bryan Wu 已提交
742
	if (likely(bfin_read_TBUFSTAT() & TBUFCNT)) {
743
		for (; bfin_read_TBUFSTAT() & TBUFCNT; i++) {
744 745
			decode_address(buf, (unsigned long)bfin_read_TBUF());
			printk(KERN_NOTICE "%4i Target : %s\n", i, buf);
746 747 748
			addr = (unsigned short *)bfin_read_TBUF();
			decode_address(buf, (unsigned long)addr);
			printk(KERN_NOTICE "     Source : %s ", buf);
749
			decode_instruction(addr);
750
			printk("\n");
B
Bryan Wu 已提交
751 752 753
		}
	}

754 755
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_EXPAND
	if (trace_buff_offset)
756
		index = trace_buff_offset / 4;
757 758 759 760 761
	else
		index = EXPAND_LEN;

	j = (1 << CONFIG_DEBUG_BFIN_HWTRACE_EXPAND_LEN) * 128;
	while (j) {
762 763
		decode_address(buf, software_trace_buff[index]);
		printk(KERN_NOTICE "%4i Target : %s\n", i, buf);
764 765 766
		index -= 1;
		if (index < 0 )
			index = EXPAND_LEN;
767
		decode_address(buf, software_trace_buff[index]);
768 769 770
		printk(KERN_NOTICE "     Source : %s ", buf);
		decode_instruction((unsigned short *)software_trace_buff[index]);
		printk("\n");
771 772 773 774 775 776 777 778
		index -= 1;
		if (index < 0)
			index = EXPAND_LEN;
		j--;
		i++;
	}
#endif

B
Bryan Wu 已提交
779
	trace_buffer_restore(tflags);
780
#endif
781
#endif
B
Bryan Wu 已提交
782 783 784
}
EXPORT_SYMBOL(dump_bfin_trace_buffer);

785 786 787 788 789 790 791 792 793 794 795 796
#ifdef CONFIG_BUG
int is_valid_bugaddr(unsigned long addr)
{
	unsigned short opcode;

	if (!get_instruction(&opcode, (unsigned short *)addr))
		return 0;

	return opcode == BFIN_BUG_OPCODE;
}
#endif

797 798 799 800
/*
 * Checks to see if the address pointed to is either a
 * 16-bit CALL instruction, or a 32-bit CALL instruction
 */
801
static bool is_bfin_call(unsigned short *addr)
B
Bryan Wu 已提交
802
{
803 804
	unsigned short opcode = 0, *ins_addr;
	ins_addr = (unsigned short *)addr;
B
Bryan Wu 已提交
805

806 807
	if (!get_instruction(&opcode, ins_addr))
		return false;
B
Bryan Wu 已提交
808

809 810 811 812 813 814 815
	if ((opcode >= 0x0060 && opcode <= 0x0067) ||
	    (opcode >= 0x0070 && opcode <= 0x0077))
		return true;

	ins_addr--;
	if (!get_instruction(&opcode, ins_addr))
		return false;
B
Bryan Wu 已提交
816

817 818 819 820 821 822
	if (opcode >= 0xE300 && opcode <= 0xE3FF)
		return true;

	return false;

}
823

B
Bryan Wu 已提交
824 825
void show_stack(struct task_struct *task, unsigned long *stack)
{
826
#ifdef CONFIG_PRINTK
827 828 829 830
	unsigned int *addr, *endstack, *fp = 0, *frame;
	unsigned short *ins_addr;
	char buf[150];
	unsigned int i, j, ret_addr, frame_no = 0;
B
Bryan Wu 已提交
831

832 833 834 835
	/*
	 * If we have been passed a specific stack, use that one otherwise
	 *    if we have been passed a task structure, use that, otherwise
	 *    use the stack of where the variable "stack" exists
B
Bryan Wu 已提交
836 837
	 */

838 839 840
	if (stack == NULL) {
		if (task) {
			/* We know this is a kernel stack, so this is the start/end */
B
Bryan Wu 已提交
841
			stack = (unsigned long *)task->thread.ksp;
842 843 844
			endstack = (unsigned int *)(((unsigned int)(stack) & ~(THREAD_SIZE - 1)) + THREAD_SIZE);
		} else {
			/* print out the existing stack info */
B
Bryan Wu 已提交
845
			stack = (unsigned long *)&stack;
846 847 848 849 850
			endstack = (unsigned int *)PAGE_ALIGN((unsigned int)stack);
		}
	} else
		endstack = (unsigned int *)PAGE_ALIGN((unsigned int)stack);

851
	printk(KERN_NOTICE "Stack info:\n");
852
	decode_address(buf, (unsigned int)stack);
853 854
	printk(KERN_NOTICE " SP: [0x%p] %s\n", stack, buf);

855 856 857 858 859
	if (!access_ok(VERIFY_READ, stack, (unsigned int)endstack - (unsigned int)stack)) {
		printk(KERN_NOTICE "Invalid stack pointer\n");
		return;
	}

860
	/* First thing is to look for a frame pointer */
861
	for (addr = (unsigned int *)((unsigned int)stack & ~0xF); addr < endstack; addr++) {
862 863 864 865 866 867 868 869 870
		if (*addr & 0x1)
			continue;
		ins_addr = (unsigned short *)*addr;
		ins_addr--;
		if (is_bfin_call(ins_addr))
			fp = addr - 1;

		if (fp) {
			/* Let's check to see if it is a frame pointer */
871 872
			while (fp >= (addr - 1) && fp < endstack
			       && fp && ((unsigned int) fp & 0x3) == 0)
873 874 875 876 877 878 879
				fp = (unsigned int *)*fp;
			if (fp == 0 || fp == endstack) {
				fp = addr - 1;
				break;
			}
			fp = 0;
		}
B
Bryan Wu 已提交
880
	}
881 882
	if (fp) {
		frame = fp;
883
		printk(KERN_NOTICE " FP: (0x%p)\n", fp);
884 885
	} else
		frame = 0;
B
Bryan Wu 已提交
886

887 888 889 890 891 892
	/*
	 * Now that we think we know where things are, we
	 * walk the stack again, this time printing things out
	 * incase there is no frame pointer, we still look for
	 * valid return addresses
	 */
B
Bryan Wu 已提交
893

894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946
	/* First time print out data, next time, print out symbols */
	for (j = 0; j <= 1; j++) {
		if (j)
			printk(KERN_NOTICE "Return addresses in stack:\n");
		else
			printk(KERN_NOTICE " Memory from 0x%08lx to %p", ((long unsigned int)stack & ~0xF), endstack);

		fp = frame;
		frame_no = 0;

		for (addr = (unsigned int *)((unsigned int)stack & ~0xF), i = 0;
		     addr <= endstack; addr++, i++) {

			ret_addr = 0;
			if (!j && i % 8 == 0)
				printk("\n" KERN_NOTICE "%p:",addr);

			/* if it is an odd address, or zero, just skip it */
			if (*addr & 0x1 || !*addr)
				goto print;

			ins_addr = (unsigned short *)*addr;

			/* Go back one instruction, and see if it is a CALL */
			ins_addr--;
			ret_addr = is_bfin_call(ins_addr);
 print:
			if (!j && stack == (unsigned long *)addr)
				printk("[%08x]", *addr);
			else if (ret_addr)
				if (j) {
					decode_address(buf, (unsigned int)*addr);
					if (frame == addr) {
						printk(KERN_NOTICE "   frame %2i : %s\n", frame_no, buf);
						continue;
					}
					printk(KERN_NOTICE "    address : %s\n", buf);
				} else
					printk("<%08x>", *addr);
			else if (fp == addr) {
				if (j)
					frame = addr+1;
				else
					printk("(%08x)", *addr);

				fp = (unsigned int *)*addr;
				frame_no++;

			} else if (!j)
				printk(" %08x ", *addr);
		}
		if (!j)
			printk("\n");
B
Bryan Wu 已提交
947
	}
948
#endif
B
Bryan Wu 已提交
949 950 951 952 953
}

void dump_stack(void)
{
	unsigned long stack;
954
#ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON
B
Bryan Wu 已提交
955
	int tflags;
956
#endif
B
Bryan Wu 已提交
957 958 959 960 961 962 963
	trace_buffer_save(tflags);
	dump_bfin_trace_buffer();
	show_stack(current, &stack);
	trace_buffer_restore(tflags);
}
EXPORT_SYMBOL(dump_stack);

964
void dump_bfin_process(struct pt_regs *fp)
B
Bryan Wu 已提交
965
{
966
#ifdef CONFIG_DEBUG_VERBOSE
967 968 969 970 971
	/* We should be able to look at fp->ipend, but we don't push it on the
	 * stack all the time, so do this until we fix that */
	unsigned int context = bfin_read_IPEND();

	if (oops_in_progress)
972
		verbose_printk(KERN_EMERG "Kernel OOPS in progress\n");
973

974
	if (context & 0x0020 && (fp->seqstat & SEQSTAT_EXCAUSE) == VEC_HWERR)
975
		verbose_printk(KERN_NOTICE "HW Error context\n");
976
	else if (context & 0x0020)
977
		verbose_printk(KERN_NOTICE "Deferred Exception context\n");
978
	else if (context & 0x3FC0)
979
		verbose_printk(KERN_NOTICE "Interrupt context\n");
980
	else if (context & 0x4000)
981
		verbose_printk(KERN_NOTICE "Deferred Interrupt context\n");
982
	else if (context & 0x8000)
983
		verbose_printk(KERN_NOTICE "Kernel process context\n");
984

985 986 987
	/* Because we are crashing, and pointers could be bad, we check things
	 * pretty closely before we use them
	 */
988 989
	if ((unsigned long)current >= FIXED_CODE_START &&
	    !((unsigned long)current & 0x3) && current->pid) {
990
		verbose_printk(KERN_NOTICE "CURRENT PROCESS:\n");
991
		if (current->comm >= (char *)FIXED_CODE_START)
992
			verbose_printk(KERN_NOTICE "COMM=%s PID=%d\n",
993 994
				current->comm, current->pid);
		else
995
			verbose_printk(KERN_NOTICE "COMM= invalid\n");
996

997
		printk(KERN_NOTICE "CPU = %d\n", current_thread_info()->cpu);
998
		if (!((unsigned long)current->mm & 0x3) && (unsigned long)current->mm >= FIXED_CODE_START)
999
			verbose_printk(KERN_NOTICE  "TEXT = 0x%p-0x%p        DATA = 0x%p-0x%p\n"
1000 1001 1002 1003 1004 1005 1006 1007 1008 1009
				KERN_NOTICE " BSS = 0x%p-0x%p  USER-STACK = 0x%p\n"
				KERN_NOTICE "\n",
				(void *)current->mm->start_code,
				(void *)current->mm->end_code,
				(void *)current->mm->start_data,
				(void *)current->mm->end_data,
				(void *)current->mm->end_data,
				(void *)current->mm->brk,
				(void *)current->mm->start_stack);
		else
1010
			verbose_printk(KERN_NOTICE "invalid mm\n");
1011
	} else
1012
		verbose_printk(KERN_NOTICE "\n" KERN_NOTICE
1013
		     "No Valid process in current context\n");
1014
#endif
1015
}
1016

1017
void dump_bfin_mem(struct pt_regs *fp)
1018
{
1019
#ifdef CONFIG_DEBUG_VERBOSE
1020 1021
	unsigned short *addr, *erraddr, val = 0, err = 0;
	char sti = 0, buf[6];
B
Bryan Wu 已提交
1022

1023
	erraddr = (void *)fp->pc;
1024

1025
	verbose_printk(KERN_NOTICE "return address: [0x%p]; contents of:", erraddr);
1026 1027 1028 1029 1030

	for (addr = (unsigned short *)((unsigned long)erraddr & ~0xF) - 0x10;
	     addr < (unsigned short *)((unsigned long)erraddr & ~0xF) + 0x10;
	     addr++) {
		if (!((unsigned long)addr & 0xF))
1031
			verbose_printk("\n" KERN_NOTICE "0x%p: ", addr);
1032

1033
		if (!get_instruction(&val, addr)) {
1034 1035 1036 1037 1038 1039
				val = 0;
				sprintf(buf, "????");
		} else
			sprintf(buf, "%04x", val);

		if (addr == erraddr) {
1040
			verbose_printk("[%s]", buf);
1041 1042
			err = val;
		} else
1043
			verbose_printk(" %s ", buf);
1044 1045 1046 1047 1048 1049 1050 1051

		/* Do any previous instructions turn on interrupts? */
		if (addr <= erraddr &&				/* in the past */
		    ((val >= 0x0040 && val <= 0x0047) ||	/* STI instruction */
		      val == 0x017b))				/* [SP++] = RETI */
			sti = 1;
	}

1052
	verbose_printk("\n");
1053 1054 1055 1056

	/* Hardware error interrupts can be deferred */
	if (unlikely(sti && (fp->seqstat & SEQSTAT_EXCAUSE) == VEC_HWERR &&
	    oops_in_progress)){
1057
		verbose_printk(KERN_NOTICE "Looks like this was a deferred error - sorry\n");
B
Bryan Wu 已提交
1058
#ifndef CONFIG_DEBUG_HWERR
1059
		verbose_printk(KERN_NOTICE "The remaining message may be meaningless\n"
1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072
			KERN_NOTICE "You should enable CONFIG_DEBUG_HWERR to get a"
			 " better idea where it came from\n");
#else
		/* If we are handling only one peripheral interrupt
		 * and current mm and pid are valid, and the last error
		 * was in that user space process's text area
		 * print it out - because that is where the problem exists
		 */
		if ((!(((fp)->ipend & ~0x30) & (((fp)->ipend & ~0x30) - 1))) &&
		     (current->pid && current->mm)) {
			/* And the last RETI points to the current userspace context */
			if ((fp + 1)->pc >= current->mm->start_code &&
			    (fp + 1)->pc <= current->mm->end_code) {
1073 1074
				verbose_printk(KERN_NOTICE "It might be better to look around here : \n");
				verbose_printk(KERN_NOTICE "-------------------------------------------\n");
1075
				show_regs(fp + 1);
1076
				verbose_printk(KERN_NOTICE "-------------------------------------------\n");
1077
			}
B
Bryan Wu 已提交
1078
		}
1079 1080
#endif
	}
1081
#endif
1082 1083 1084 1085
}

void show_regs(struct pt_regs *fp)
{
1086
#ifdef CONFIG_DEBUG_VERBOSE
1087
	char buf [150];
1088 1089
	struct irqaction *action;
	unsigned int i;
1090
	unsigned long flags = 0;
1091
	unsigned int cpu = smp_processor_id();
1092
	unsigned char in_atomic = (bfin_read_IPEND() & 0x10) || in_atomic();
1093

1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116
	verbose_printk(KERN_NOTICE "\n");
	if (CPUID != bfin_cpuid())
		verbose_printk(KERN_NOTICE "Compiled for cpu family 0x%04x (Rev %d), "
			"but running on:0x%04x (Rev %d)\n",
			CPUID, bfin_compiled_revid(), bfin_cpuid(), bfin_revid());

	verbose_printk(KERN_NOTICE "ADSP-%s-0.%d",
		CPU, bfin_compiled_revid());

	if (bfin_compiled_revid() !=  bfin_revid())
		verbose_printk("(Detected 0.%d)", bfin_revid());

	verbose_printk(" %lu(MHz CCLK) %lu(MHz SCLK) (%s)\n",
		get_cclk()/1000000, get_sclk()/1000000,
#ifdef CONFIG_MPU
		"mpu on"
#else
		"mpu off"
#endif
		);

	verbose_printk(KERN_NOTICE "%s", linux_banner);

1117 1118
	verbose_printk(KERN_NOTICE "\n" KERN_NOTICE "SEQUENCER STATUS:\t\t%s\n", print_tainted());
	verbose_printk(KERN_NOTICE " SEQSTAT: %08lx  IPEND: %04lx  SYSCFG: %04lx\n",
1119
		(long)fp->seqstat, fp->ipend, fp->syscfg);
1120
	if ((fp->seqstat & SEQSTAT_EXCAUSE) == VEC_HWERR) {
1121
		verbose_printk(KERN_NOTICE "  HWERRCAUSE: 0x%lx\n",
1122 1123 1124 1125
			(fp->seqstat & SEQSTAT_HWERRCAUSE) >> 14);
#ifdef EBIU_ERRMST
		/* If the error was from the EBIU, print it out */
		if (bfin_read_EBIU_ERRMST() & CORE_ERROR) {
1126
			verbose_printk(KERN_NOTICE "  EBIU Error Reason  : 0x%04x\n",
1127
				bfin_read_EBIU_ERRMST());
1128
			verbose_printk(KERN_NOTICE "  EBIU Error Address : 0x%08x\n",
1129 1130 1131 1132
				bfin_read_EBIU_ERRADD());
		}
#endif
	}
1133
	verbose_printk(KERN_NOTICE "  EXCAUSE   : 0x%lx\n",
1134
		fp->seqstat & SEQSTAT_EXCAUSE);
1135
	for (i = 2; i <= 15 ; i++) {
1136
		if (fp->ipend & (1 << i)) {
1137 1138 1139 1140 1141
			if (i != 4) {
				decode_address(buf, bfin_read32(EVT0 + 4*i));
				verbose_printk(KERN_NOTICE "  physical IVG%i asserted : %s\n", i, buf);
			} else
				verbose_printk(KERN_NOTICE "  interrupts disabled\n");
1142 1143 1144 1145 1146 1147
		}
	}

	/* if no interrupts are going off, don't print this out */
	if (fp->ipend & ~0x3F) {
		for (i = 0; i < (NR_IRQS - 1); i++) {
1148 1149 1150
			if (!in_atomic)
				spin_lock_irqsave(&irq_desc[i].lock, flags);

1151 1152 1153 1154 1155
			action = irq_desc[i].action;
			if (!action)
				goto unlock;

			decode_address(buf, (unsigned int)action->handler);
1156
			verbose_printk(KERN_NOTICE "  logical irq %3d mapped  : %s", i, buf);
1157 1158
			for (action = action->next; action; action = action->next) {
				decode_address(buf, (unsigned int)action->handler);
1159
				verbose_printk(", %s", buf);
1160
			}
1161
			verbose_printk("\n");
1162
unlock:
1163 1164
			if (!in_atomic)
				spin_unlock_irqrestore(&irq_desc[i].lock, flags);
1165 1166
		}
	}
1167

1168
	decode_address(buf, fp->rete);
1169
	verbose_printk(KERN_NOTICE " RETE: %s\n", buf);
1170
	decode_address(buf, fp->retn);
1171
	verbose_printk(KERN_NOTICE " RETN: %s\n", buf);
1172
	decode_address(buf, fp->retx);
1173
	verbose_printk(KERN_NOTICE " RETX: %s\n", buf);
1174
	decode_address(buf, fp->rets);
1175
	verbose_printk(KERN_NOTICE " RETS: %s\n", buf);
1176
	decode_address(buf, fp->pc);
1177
	verbose_printk(KERN_NOTICE " PC  : %s\n", buf);
1178

1179 1180
	if (((long)fp->seqstat &  SEQSTAT_EXCAUSE) &&
	    (((long)fp->seqstat & SEQSTAT_EXCAUSE) != VEC_HWERR)) {
1181
		decode_address(buf, cpu_pda[cpu].dcplb_fault_addr);
1182
		verbose_printk(KERN_NOTICE "DCPLB_FAULT_ADDR: %s\n", buf);
1183
		decode_address(buf, cpu_pda[cpu].icplb_fault_addr);
1184
		verbose_printk(KERN_NOTICE "ICPLB_FAULT_ADDR: %s\n", buf);
1185 1186
	}

1187 1188
	verbose_printk(KERN_NOTICE "\n" KERN_NOTICE "PROCESSOR STATE:\n");
	verbose_printk(KERN_NOTICE " R0 : %08lx    R1 : %08lx    R2 : %08lx    R3 : %08lx\n",
1189
		fp->r0, fp->r1, fp->r2, fp->r3);
1190
	verbose_printk(KERN_NOTICE " R4 : %08lx    R5 : %08lx    R6 : %08lx    R7 : %08lx\n",
1191
		fp->r4, fp->r5, fp->r6, fp->r7);
1192
	verbose_printk(KERN_NOTICE " P0 : %08lx    P1 : %08lx    P2 : %08lx    P3 : %08lx\n",
1193
		fp->p0, fp->p1, fp->p2, fp->p3);
1194
	verbose_printk(KERN_NOTICE " P4 : %08lx    P5 : %08lx    FP : %08lx    SP : %08lx\n",
1195
		fp->p4, fp->p5, fp->fp, (long)fp);
1196
	verbose_printk(KERN_NOTICE " LB0: %08lx    LT0: %08lx    LC0: %08lx\n",
1197
		fp->lb0, fp->lt0, fp->lc0);
1198
	verbose_printk(KERN_NOTICE " LB1: %08lx    LT1: %08lx    LC1: %08lx\n",
1199
		fp->lb1, fp->lt1, fp->lc1);
1200
	verbose_printk(KERN_NOTICE " B0 : %08lx    L0 : %08lx    M0 : %08lx    I0 : %08lx\n",
1201
		fp->b0, fp->l0, fp->m0, fp->i0);
1202
	verbose_printk(KERN_NOTICE " B1 : %08lx    L1 : %08lx    M1 : %08lx    I1 : %08lx\n",
1203
		fp->b1, fp->l1, fp->m1, fp->i1);
1204
	verbose_printk(KERN_NOTICE " B2 : %08lx    L2 : %08lx    M2 : %08lx    I2 : %08lx\n",
1205
		fp->b2, fp->l2, fp->m2, fp->i2);
1206
	verbose_printk(KERN_NOTICE " B3 : %08lx    L3 : %08lx    M3 : %08lx    I3 : %08lx\n",
1207
		fp->b3, fp->l3, fp->m3, fp->i3);
1208
	verbose_printk(KERN_NOTICE "A0.w: %08lx   A0.x: %08lx   A1.w: %08lx   A1.x: %08lx\n",
1209
		fp->a0w, fp->a0x, fp->a1w, fp->a1x);
1210

1211
	verbose_printk(KERN_NOTICE "USP : %08lx  ASTAT: %08lx\n",
1212
		rdusp(), fp->astat);
B
Bryan Wu 已提交
1213

1214 1215
	verbose_printk(KERN_NOTICE "\n");
#endif
B
Bryan Wu 已提交
1216 1217 1218 1219 1220 1221
}

#ifdef CONFIG_SYS_BFIN_SPINLOCK_L1
asmlinkage int sys_bfin_spinlock(int *spinlock)__attribute__((l1_text));
#endif

1222 1223 1224
static DEFINE_SPINLOCK(bfin_spinlock_lock);

asmlinkage int sys_bfin_spinlock(int *p)
B
Bryan Wu 已提交
1225
{
1226
	int ret, tmp = 0;
B
Bryan Wu 已提交
1227

1228 1229 1230 1231
	spin_lock(&bfin_spinlock_lock);	/* This would also hold kernel preemption. */
	ret = get_user(tmp, p);
	if (likely(ret == 0)) {
		if (unlikely(tmp))
B
Bryan Wu 已提交
1232
			ret = 1;
1233 1234
		else
			put_user(1, p);
B
Bryan Wu 已提交
1235
	}
1236
	spin_unlock(&bfin_spinlock_lock);
B
Bryan Wu 已提交
1237 1238 1239
	return ret;
}

1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275
int bfin_request_exception(unsigned int exception, void (*handler)(void))
{
	void (*curr_handler)(void);

	if (exception > 0x3F)
		return -EINVAL;

	curr_handler = ex_table[exception];

	if (curr_handler != ex_replaceable)
		return -EBUSY;

	ex_table[exception] = handler;

	return 0;
}
EXPORT_SYMBOL(bfin_request_exception);

int bfin_free_exception(unsigned int exception, void (*handler)(void))
{
	void (*curr_handler)(void);

	if (exception > 0x3F)
		return -EINVAL;

	curr_handler = ex_table[exception];

	if (curr_handler != handler)
		return -EBUSY;

	ex_table[exception] = ex_replaceable;

	return 0;
}
EXPORT_SYMBOL(bfin_free_exception);

B
Bryan Wu 已提交
1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290
void panic_cplb_error(int cplb_panic, struct pt_regs *fp)
{
	switch (cplb_panic) {
	case CPLB_NO_UNLOCKED:
		printk(KERN_EMERG "All CPLBs are locked\n");
		break;
	case CPLB_PROT_VIOL:
		return;
	case CPLB_NO_ADDR_MATCH:
		return;
	case CPLB_UNKNOWN_ERR:
		printk(KERN_EMERG "Unknown CPLB Exception\n");
		break;
	}

1291 1292
	oops_in_progress = 1;

1293
	dump_bfin_process(fp);
1294
	dump_bfin_mem(fp);
1295
	show_regs(fp);
B
Bryan Wu 已提交
1296
	dump_stack();
1297
	panic("Unrecoverable event");
B
Bryan Wu 已提交
1298
}