Commit | Line | Data |
---|---|---|
1394f032 BW |
1 | /* |
2 | * File: arch/blackfin/kernel/traps.c | |
3 | * Based on: | |
4 | * Author: Hamish Macdonald | |
5 | * | |
6 | * Created: | |
7 | * Description: uses S/W interrupt 15 for the system calls | |
8 | * | |
9 | * Modified: | |
10 | * Copyright 2004-2006 Analog Devices Inc. | |
11 | * | |
12 | * Bugs: Enter bugs at http://blackfin.uclinux.org/ | |
13 | * | |
14 | * This program is free software; you can redistribute it and/or modify | |
15 | * it under the terms of the GNU General Public License as published by | |
16 | * the Free Software Foundation; either version 2 of the License, or | |
17 | * (at your option) any later version. | |
18 | * | |
19 | * This program is distributed in the hope that it will be useful, | |
20 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
21 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
22 | * GNU General Public License for more details. | |
23 | * | |
24 | * You should have received a copy of the GNU General Public License | |
25 | * along with this program; if not, see the file COPYING, or write | |
26 | * to the Free Software Foundation, Inc., | |
27 | * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
28 | */ | |
29 | ||
1f83b8f1 MF |
30 | #include <linux/uaccess.h> |
31 | #include <linux/interrupt.h> | |
32 | #include <linux/module.h> | |
33 | #include <linux/kallsyms.h> | |
d31c5ab1 | 34 | #include <linux/fs.h> |
1394f032 BW |
35 | #include <asm/traps.h> |
36 | #include <asm/cacheflush.h> | |
37 | #include <asm/blackfin.h> | |
1394f032 | 38 | #include <asm/irq_handler.h> |
669b792c | 39 | #include <asm/trace.h> |
226eb1ef | 40 | #include <asm/fixed_code.h> |
1394f032 BW |
41 | |
42 | #ifdef CONFIG_KGDB | |
43 | # include <linux/debugger.h> | |
44 | # include <linux/kgdb.h> | |
226eb1ef RG |
45 | |
46 | # define CHK_DEBUGGER_TRAP() \ | |
47 | do { \ | |
48 | CHK_DEBUGGER(trapnr, sig, info.si_code, fp, ); \ | |
49 | } while (0) | |
50 | # define CHK_DEBUGGER_TRAP_MAYBE() \ | |
51 | do { \ | |
52 | if (kgdb_connected) \ | |
53 | CHK_DEBUGGER_TRAP(); \ | |
54 | } while (0) | |
55 | #else | |
56 | # define CHK_DEBUGGER_TRAP() do { } while (0) | |
57 | # define CHK_DEBUGGER_TRAP_MAYBE() do { } while (0) | |
1394f032 BW |
58 | #endif |
59 | ||
60 | /* Initiate the event table handler */ | |
61 | void __init trap_init(void) | |
62 | { | |
63 | CSYNC(); | |
64 | bfin_write_EVT3(trap); | |
65 | CSYNC(); | |
66 | } | |
67 | ||
1394f032 BW |
68 | int kstack_depth_to_print = 48; |
69 | ||
226eb1ef | 70 | static void decode_address(char *buf, unsigned long address) |
1394f032 BW |
71 | { |
72 | struct vm_list_struct *vml; | |
73 | struct task_struct *p; | |
74 | struct mm_struct *mm; | |
885be03b RG |
75 | unsigned long flags, offset; |
76 | unsigned int in_exception = bfin_read_IPEND() & 0x10; | |
1394f032 BW |
77 | |
78 | #ifdef CONFIG_KALLSYMS | |
8a0e6656 | 79 | unsigned long symsize; |
1394f032 BW |
80 | const char *symname; |
81 | char *modname; | |
82 | char *delim = ":"; | |
83 | char namebuf[128]; | |
84 | ||
85 | /* look up the address and see if we are in kernel space */ | |
86 | symname = kallsyms_lookup(address, &symsize, &offset, &modname, namebuf); | |
87 | ||
88 | if (symname) { | |
89 | /* yeah! kernel space! */ | |
90 | if (!modname) | |
91 | modname = delim = ""; | |
226eb1ef | 92 | sprintf(buf, "<0x%p> { %s%s%s%s + 0x%lx }", |
1f83b8f1 | 93 | (void *)address, delim, modname, delim, symname, |
1394f032 | 94 | (unsigned long)offset); |
885be03b | 95 | return; |
1394f032 BW |
96 | |
97 | } | |
98 | #endif | |
99 | ||
226eb1ef RG |
100 | /* Problem in fixed code section? */ |
101 | if (address >= FIXED_CODE_START && address < FIXED_CODE_END) { | |
102 | sprintf(buf, "<0x%p> /* Maybe fixed code section */", (void *)address); | |
103 | return; | |
104 | } | |
105 | ||
106 | /* Problem somewhere before the kernel start address */ | |
107 | if (address < CONFIG_BOOT_LOAD) { | |
108 | sprintf(buf, "<0x%p> /* Maybe null pointer? */", (void *)address); | |
109 | return; | |
110 | } | |
111 | ||
1394f032 BW |
112 | /* looks like we're off in user-land, so let's walk all the |
113 | * mappings of all our processes and see if we can't be a whee | |
114 | * bit more specific | |
115 | */ | |
885be03b | 116 | write_lock_irqsave(&tasklist_lock, flags); |
1394f032 | 117 | for_each_process(p) { |
885be03b | 118 | mm = (in_exception ? p->mm : get_task_mm(p)); |
1394f032 BW |
119 | if (!mm) |
120 | continue; | |
121 | ||
122 | vml = mm->context.vmlist; | |
123 | while (vml) { | |
124 | struct vm_area_struct *vma = vml->vma; | |
125 | ||
126 | if (address >= vma->vm_start && address < vma->vm_end) { | |
127 | char *name = p->comm; | |
128 | struct file *file = vma->vm_file; | |
129 | if (file) { | |
130 | char _tmpbuf[256]; | |
131 | name = d_path(file->f_dentry, | |
132 | file->f_vfsmnt, | |
133 | _tmpbuf, | |
134 | sizeof(_tmpbuf)); | |
135 | } | |
136 | ||
8a0e6656 MF |
137 | /* FLAT does not have its text aligned to the start of |
138 | * the map while FDPIC ELF does ... | |
139 | */ | |
140 | if (current->mm && | |
141 | (address > current->mm->start_code) && | |
142 | (address < current->mm->end_code)) | |
143 | offset = address - current->mm->start_code; | |
144 | else | |
145 | offset = (address - vma->vm_start) + (vma->vm_pgoff << PAGE_SHIFT); | |
146 | ||
226eb1ef | 147 | sprintf(buf, "<0x%p> [ %s + 0x%lx ]", |
885be03b RG |
148 | (void *)address, name, offset); |
149 | if (!in_exception) | |
150 | mmput(mm); | |
151 | goto done; | |
1394f032 BW |
152 | } |
153 | ||
154 | vml = vml->next; | |
155 | } | |
885be03b RG |
156 | if (!in_exception) |
157 | mmput(mm); | |
1394f032 | 158 | } |
1394f032 BW |
159 | |
160 | /* we were unable to find this address anywhere */ | |
4a589e1e | 161 | sprintf(buf, "<0x%p> /* unknown address */", (void *)address); |
885be03b RG |
162 | |
163 | done: | |
164 | write_unlock_irqrestore(&tasklist_lock, flags); | |
1394f032 BW |
165 | } |
166 | ||
2ebcade5 RG |
167 | asmlinkage void double_fault_c(struct pt_regs *fp) |
168 | { | |
226eb1ef RG |
169 | console_verbose(); |
170 | oops_in_progress = 1; | |
2ebcade5 RG |
171 | printk(KERN_EMERG "\n" KERN_EMERG "Double Fault\n"); |
172 | dump_bfin_regs(fp, (void *)fp->retx); | |
173 | panic("Double Fault - unrecoverable event\n"); | |
174 | ||
175 | } | |
176 | ||
1394f032 BW |
177 | asmlinkage void trap_c(struct pt_regs *fp) |
178 | { | |
518039bc RG |
179 | #ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON |
180 | int j; | |
181 | #endif | |
182 | int sig = 0; | |
1394f032 BW |
183 | siginfo_t info; |
184 | unsigned long trapnr = fp->seqstat & SEQSTAT_EXCAUSE; | |
185 | ||
226eb1ef RG |
186 | trace_buffer_save(j); |
187 | ||
188 | /* Important - be very careful dereferncing pointers - will lead to | |
189 | * double faults if the stack has become corrupt | |
190 | */ | |
191 | ||
192 | /* If the fault was caused by a kernel thread, or interrupt handler | |
193 | * we will kernel panic, so the system reboots. | |
194 | * If KGDB is enabled, don't set this for kernel breakpoints | |
195 | */ | |
196 | if ((bfin_read_IPEND() & 0xFFC0) | |
1394f032 | 197 | #ifdef CONFIG_KGDB |
226eb1ef | 198 | && trapnr != VEC_EXCPT02 |
1394f032 | 199 | #endif |
226eb1ef RG |
200 | ){ |
201 | console_verbose(); | |
202 | oops_in_progress = 1; | |
203 | } else if (current) { | |
204 | if (current->mm == NULL) { | |
205 | console_verbose(); | |
206 | oops_in_progress = 1; | |
207 | } | |
208 | } | |
1394f032 BW |
209 | |
210 | /* trap_c() will be called for exceptions. During exceptions | |
211 | * processing, the pc value should be set with retx value. | |
212 | * With this change we can cleanup some code in signal.c- TODO | |
213 | */ | |
214 | fp->orig_pc = fp->retx; | |
215 | /* printk("exception: 0x%x, ipend=%x, reti=%x, retx=%x\n", | |
216 | trapnr, fp->ipend, fp->pc, fp->retx); */ | |
217 | ||
218 | /* send the appropriate signal to the user program */ | |
219 | switch (trapnr) { | |
220 | ||
221 | /* This table works in conjuction with the one in ./mach-common/entry.S | |
222 | * Some exceptions are handled there (in assembly, in exception space) | |
223 | * Some are handled here, (in C, in interrupt space) | |
224 | * Some, like CPLB, are handled in both, where the normal path is | |
225 | * handled in assembly/exception space, and the error path is handled | |
226 | * here | |
227 | */ | |
228 | ||
229 | /* 0x00 - Linux Syscall, getting here is an error */ | |
230 | /* 0x01 - userspace gdb breakpoint, handled here */ | |
231 | case VEC_EXCPT01: | |
232 | info.si_code = TRAP_ILLTRAP; | |
233 | sig = SIGTRAP; | |
234 | CHK_DEBUGGER_TRAP_MAYBE(); | |
235 | /* Check if this is a breakpoint in kernel space */ | |
236 | if (fp->ipend & 0xffc0) | |
237 | return; | |
238 | else | |
239 | break; | |
240 | #ifdef CONFIG_KGDB | |
241 | case VEC_EXCPT02 : /* gdb connection */ | |
242 | info.si_code = TRAP_ILLTRAP; | |
243 | sig = SIGTRAP; | |
244 | CHK_DEBUGGER_TRAP(); | |
245 | return; | |
246 | #else | |
247 | /* 0x02 - User Defined, Caught by default */ | |
248 | #endif | |
9401e618 | 249 | /* 0x03 - User Defined, userspace stack overflow */ |
1394f032 BW |
250 | case VEC_EXCPT03: |
251 | info.si_code = SEGV_STACKFLOW; | |
252 | sig = SIGSEGV; | |
226eb1ef | 253 | printk(KERN_NOTICE EXC_0x03); |
1394f032 BW |
254 | CHK_DEBUGGER_TRAP(); |
255 | break; | |
9401e618 | 256 | /* 0x04 - User Defined, Caught by default */ |
1394f032 BW |
257 | /* 0x05 - User Defined, Caught by default */ |
258 | /* 0x06 - User Defined, Caught by default */ | |
259 | /* 0x07 - User Defined, Caught by default */ | |
260 | /* 0x08 - User Defined, Caught by default */ | |
261 | /* 0x09 - User Defined, Caught by default */ | |
262 | /* 0x0A - User Defined, Caught by default */ | |
263 | /* 0x0B - User Defined, Caught by default */ | |
264 | /* 0x0C - User Defined, Caught by default */ | |
265 | /* 0x0D - User Defined, Caught by default */ | |
266 | /* 0x0E - User Defined, Caught by default */ | |
267 | /* 0x0F - User Defined, Caught by default */ | |
268 | /* 0x10 HW Single step, handled here */ | |
269 | case VEC_STEP: | |
270 | info.si_code = TRAP_STEP; | |
271 | sig = SIGTRAP; | |
272 | CHK_DEBUGGER_TRAP_MAYBE(); | |
273 | /* Check if this is a single step in kernel space */ | |
274 | if (fp->ipend & 0xffc0) | |
275 | return; | |
276 | else | |
277 | break; | |
278 | /* 0x11 - Trace Buffer Full, handled here */ | |
279 | case VEC_OVFLOW: | |
280 | info.si_code = TRAP_TRACEFLOW; | |
281 | sig = SIGTRAP; | |
226eb1ef | 282 | printk(KERN_NOTICE EXC_0x11); |
1394f032 BW |
283 | CHK_DEBUGGER_TRAP(); |
284 | break; | |
285 | /* 0x12 - Reserved, Caught by default */ | |
286 | /* 0x13 - Reserved, Caught by default */ | |
287 | /* 0x14 - Reserved, Caught by default */ | |
288 | /* 0x15 - Reserved, Caught by default */ | |
289 | /* 0x16 - Reserved, Caught by default */ | |
290 | /* 0x17 - Reserved, Caught by default */ | |
291 | /* 0x18 - Reserved, Caught by default */ | |
292 | /* 0x19 - Reserved, Caught by default */ | |
293 | /* 0x1A - Reserved, Caught by default */ | |
294 | /* 0x1B - Reserved, Caught by default */ | |
295 | /* 0x1C - Reserved, Caught by default */ | |
296 | /* 0x1D - Reserved, Caught by default */ | |
297 | /* 0x1E - Reserved, Caught by default */ | |
298 | /* 0x1F - Reserved, Caught by default */ | |
299 | /* 0x20 - Reserved, Caught by default */ | |
300 | /* 0x21 - Undefined Instruction, handled here */ | |
301 | case VEC_UNDEF_I: | |
302 | info.si_code = ILL_ILLOPC; | |
303 | sig = SIGILL; | |
226eb1ef | 304 | printk(KERN_NOTICE EXC_0x21); |
1394f032 BW |
305 | CHK_DEBUGGER_TRAP(); |
306 | break; | |
307 | /* 0x22 - Illegal Instruction Combination, handled here */ | |
308 | case VEC_ILGAL_I: | |
309 | info.si_code = ILL_ILLPARAOP; | |
310 | sig = SIGILL; | |
226eb1ef | 311 | printk(KERN_NOTICE EXC_0x22); |
1394f032 BW |
312 | CHK_DEBUGGER_TRAP(); |
313 | break; | |
f26fbc48 | 314 | /* 0x23 - Data CPLB protection violation, handled here */ |
1394f032 BW |
315 | case VEC_CPLB_VL: |
316 | info.si_code = ILL_CPLB_VI; | |
f26fbc48 | 317 | sig = SIGBUS; |
226eb1ef | 318 | printk(KERN_NOTICE EXC_0x23); |
1394f032 BW |
319 | CHK_DEBUGGER_TRAP(); |
320 | break; | |
321 | /* 0x24 - Data access misaligned, handled here */ | |
322 | case VEC_MISALI_D: | |
323 | info.si_code = BUS_ADRALN; | |
324 | sig = SIGBUS; | |
226eb1ef | 325 | printk(KERN_NOTICE EXC_0x24); |
1394f032 BW |
326 | CHK_DEBUGGER_TRAP(); |
327 | break; | |
328 | /* 0x25 - Unrecoverable Event, handled here */ | |
329 | case VEC_UNCOV: | |
330 | info.si_code = ILL_ILLEXCPT; | |
331 | sig = SIGILL; | |
226eb1ef | 332 | printk(KERN_NOTICE EXC_0x25); |
1394f032 BW |
333 | CHK_DEBUGGER_TRAP(); |
334 | break; | |
335 | /* 0x26 - Data CPLB Miss, normal case is handled in _cplb_hdr, | |
336 | error case is handled here */ | |
337 | case VEC_CPLB_M: | |
338 | info.si_code = BUS_ADRALN; | |
339 | sig = SIGBUS; | |
226eb1ef | 340 | printk(KERN_NOTICE EXC_0x26); |
1394f032 BW |
341 | CHK_DEBUGGER_TRAP(); |
342 | break; | |
343 | /* 0x27 - Data CPLB Multiple Hits - Linux Trap Zero, handled here */ | |
344 | case VEC_CPLB_MHIT: | |
345 | info.si_code = ILL_CPLB_MULHIT; | |
346 | #ifdef CONFIG_DEBUG_HUNT_FOR_ZERO | |
347 | sig = SIGSEGV; | |
226eb1ef | 348 | printk(KERN_NOTICE "NULL pointer access (probably)\n"); |
1394f032 BW |
349 | #else |
350 | sig = SIGILL; | |
226eb1ef | 351 | printk(KERN_NOTICE EXC_0x27); |
1394f032 BW |
352 | #endif |
353 | CHK_DEBUGGER_TRAP(); | |
354 | break; | |
355 | /* 0x28 - Emulation Watchpoint, handled here */ | |
356 | case VEC_WATCH: | |
357 | info.si_code = TRAP_WATCHPT; | |
358 | sig = SIGTRAP; | |
359 | pr_debug(EXC_0x28); | |
360 | CHK_DEBUGGER_TRAP_MAYBE(); | |
361 | /* Check if this is a watchpoint in kernel space */ | |
362 | if (fp->ipend & 0xffc0) | |
363 | return; | |
364 | else | |
365 | break; | |
366 | #ifdef CONFIG_BF535 | |
367 | /* 0x29 - Instruction fetch access error (535 only) */ | |
368 | case VEC_ISTRU_VL: /* ADSP-BF535 only (MH) */ | |
369 | info.si_code = BUS_OPFETCH; | |
370 | sig = SIGBUS; | |
226eb1ef | 371 | printk(KERN_NOTICE "BF535: VEC_ISTRU_VL\n"); |
1394f032 BW |
372 | CHK_DEBUGGER_TRAP(); |
373 | break; | |
374 | #else | |
375 | /* 0x29 - Reserved, Caught by default */ | |
376 | #endif | |
377 | /* 0x2A - Instruction fetch misaligned, handled here */ | |
378 | case VEC_MISALI_I: | |
379 | info.si_code = BUS_ADRALN; | |
380 | sig = SIGBUS; | |
226eb1ef | 381 | printk(KERN_NOTICE EXC_0x2A); |
1394f032 BW |
382 | CHK_DEBUGGER_TRAP(); |
383 | break; | |
f26fbc48 | 384 | /* 0x2B - Instruction CPLB protection violation, handled here */ |
1394f032 BW |
385 | case VEC_CPLB_I_VL: |
386 | info.si_code = ILL_CPLB_VI; | |
f26fbc48 | 387 | sig = SIGBUS; |
226eb1ef | 388 | printk(KERN_NOTICE EXC_0x2B); |
1394f032 BW |
389 | CHK_DEBUGGER_TRAP(); |
390 | break; | |
391 | /* 0x2C - Instruction CPLB miss, handled in _cplb_hdr */ | |
392 | case VEC_CPLB_I_M: | |
393 | info.si_code = ILL_CPLB_MISS; | |
394 | sig = SIGBUS; | |
226eb1ef | 395 | printk(KERN_NOTICE EXC_0x2C); |
1394f032 BW |
396 | CHK_DEBUGGER_TRAP(); |
397 | break; | |
398 | /* 0x2D - Instruction CPLB Multiple Hits, handled here */ | |
399 | case VEC_CPLB_I_MHIT: | |
400 | info.si_code = ILL_CPLB_MULHIT; | |
401 | #ifdef CONFIG_DEBUG_HUNT_FOR_ZERO | |
402 | sig = SIGSEGV; | |
226eb1ef | 403 | printk(KERN_NOTICE "Jump to address 0 - 0x0fff\n"); |
1394f032 BW |
404 | #else |
405 | sig = SIGILL; | |
226eb1ef | 406 | printk(KERN_NOTICE EXC_0x2D); |
1394f032 BW |
407 | #endif |
408 | CHK_DEBUGGER_TRAP(); | |
409 | break; | |
410 | /* 0x2E - Illegal use of Supervisor Resource, handled here */ | |
411 | case VEC_ILL_RES: | |
412 | info.si_code = ILL_PRVOPC; | |
413 | sig = SIGILL; | |
226eb1ef | 414 | printk(KERN_NOTICE EXC_0x2E); |
1394f032 BW |
415 | CHK_DEBUGGER_TRAP(); |
416 | break; | |
417 | /* 0x2F - Reserved, Caught by default */ | |
418 | /* 0x30 - Reserved, Caught by default */ | |
419 | /* 0x31 - Reserved, Caught by default */ | |
420 | /* 0x32 - Reserved, Caught by default */ | |
421 | /* 0x33 - Reserved, Caught by default */ | |
422 | /* 0x34 - Reserved, Caught by default */ | |
423 | /* 0x35 - Reserved, Caught by default */ | |
424 | /* 0x36 - Reserved, Caught by default */ | |
425 | /* 0x37 - Reserved, Caught by default */ | |
426 | /* 0x38 - Reserved, Caught by default */ | |
427 | /* 0x39 - Reserved, Caught by default */ | |
428 | /* 0x3A - Reserved, Caught by default */ | |
429 | /* 0x3B - Reserved, Caught by default */ | |
430 | /* 0x3C - Reserved, Caught by default */ | |
431 | /* 0x3D - Reserved, Caught by default */ | |
432 | /* 0x3E - Reserved, Caught by default */ | |
433 | /* 0x3F - Reserved, Caught by default */ | |
434 | default: | |
435 | info.si_code = TRAP_ILLTRAP; | |
436 | sig = SIGTRAP; | |
437 | printk(KERN_EMERG "Caught Unhandled Exception, code = %08lx\n", | |
438 | (fp->seqstat & SEQSTAT_EXCAUSE)); | |
439 | CHK_DEBUGGER_TRAP(); | |
440 | break; | |
441 | } | |
442 | ||
226eb1ef RG |
443 | BUG_ON(sig == 0); |
444 | ||
445 | if (sig != SIGTRAP) { | |
1394f032 BW |
446 | unsigned long stack; |
447 | dump_bfin_regs(fp, (void *)fp->retx); | |
226eb1ef RG |
448 | |
449 | /* Print out the trace buffer if it makes sense */ | |
450 | #ifndef CONFIG_DEBUG_BFIN_NO_KERN_HWTRACE | |
451 | if (trapnr == VEC_CPLB_I_M || trapnr == VEC_CPLB_M) | |
452 | printk(KERN_NOTICE "No trace since you do not have " | |
453 | "CONFIG_DEBUG_BFIN_NO_KERN_HWTRACE enabled\n" | |
454 | KERN_NOTICE "\n"); | |
455 | else | |
456 | #endif | |
457 | dump_bfin_trace_buffer(); | |
1394f032 | 458 | show_stack(current, &stack); |
226eb1ef RG |
459 | if (oops_in_progress) { |
460 | #ifndef CONFIG_ACCESS_CHECK | |
461 | printk(KERN_EMERG "Hey - dork - please turn on " | |
462 | "CONFIG_ACCESS_CHECK\n"); | |
463 | #endif | |
1394f032 | 464 | panic("Kernel exception"); |
226eb1ef RG |
465 | } |
466 | ||
467 | /* Ensure that bad return addresses don't end up in an infinite | |
468 | * loop, due to speculative loads/reads | |
469 | */ | |
4a589e1e RG |
470 | if (trapnr == VEC_CPLB_I_M) |
471 | fp->pc = SAFE_USER_INSTRUCTION; | |
1394f032 | 472 | } |
ce3afa1c RG |
473 | info.si_signo = sig; |
474 | info.si_errno = 0; | |
475 | info.si_addr = (void *)fp->pc; | |
476 | force_sig_info(sig, &info, current); | |
1394f032 | 477 | |
1394f032 BW |
478 | trace_buffer_restore(j); |
479 | return; | |
480 | } | |
481 | ||
482 | /* Typical exception handling routines */ | |
483 | ||
518039bc RG |
484 | #define EXPAND_LEN ((1 << CONFIG_DEBUG_BFIN_HWTRACE_EXPAND_LEN) * 256 - 1) |
485 | ||
1394f032 BW |
486 | void dump_bfin_trace_buffer(void) |
487 | { | |
518039bc RG |
488 | #ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON |
489 | int tflags, i = 0; | |
226eb1ef | 490 | char buf[150]; |
518039bc RG |
491 | #ifdef CONFIG_DEBUG_BFIN_HWTRACE_EXPAND |
492 | int j, index; | |
493 | #endif | |
494 | ||
1394f032 BW |
495 | trace_buffer_save(tflags); |
496 | ||
226eb1ef | 497 | printk(KERN_NOTICE "Hardware Trace:\n"); |
518039bc | 498 | |
1394f032 | 499 | if (likely(bfin_read_TBUFSTAT() & TBUFCNT)) { |
518039bc | 500 | for (; bfin_read_TBUFSTAT() & TBUFCNT; i++) { |
226eb1ef RG |
501 | decode_address(buf, (unsigned long)bfin_read_TBUF()); |
502 | printk(KERN_NOTICE "%4i Target : %s\n", i, buf); | |
503 | decode_address(buf, (unsigned long)bfin_read_TBUF()); | |
504 | printk(KERN_NOTICE " Source : %s\n", buf); | |
1394f032 BW |
505 | } |
506 | } | |
507 | ||
518039bc RG |
508 | #ifdef CONFIG_DEBUG_BFIN_HWTRACE_EXPAND |
509 | if (trace_buff_offset) | |
510 | index = trace_buff_offset/4 - 1; | |
511 | else | |
512 | index = EXPAND_LEN; | |
513 | ||
514 | j = (1 << CONFIG_DEBUG_BFIN_HWTRACE_EXPAND_LEN) * 128; | |
515 | while (j) { | |
226eb1ef RG |
516 | decode_address(buf, software_trace_buff[index]); |
517 | printk(KERN_NOTICE "%4i Target : %s\n", i, buf); | |
518039bc RG |
518 | index -= 1; |
519 | if (index < 0 ) | |
520 | index = EXPAND_LEN; | |
226eb1ef RG |
521 | decode_address(buf, software_trace_buff[index]); |
522 | printk(KERN_NOTICE " Source : %s\n", buf); | |
518039bc RG |
523 | index -= 1; |
524 | if (index < 0) | |
525 | index = EXPAND_LEN; | |
518039bc RG |
526 | j--; |
527 | i++; | |
528 | } | |
529 | #endif | |
530 | ||
1394f032 | 531 | trace_buffer_restore(tflags); |
518039bc | 532 | #endif |
1394f032 BW |
533 | } |
534 | EXPORT_SYMBOL(dump_bfin_trace_buffer); | |
535 | ||
536 | static void show_trace(struct task_struct *tsk, unsigned long *sp) | |
537 | { | |
538 | unsigned long addr; | |
539 | ||
226eb1ef | 540 | printk(KERN_NOTICE "\n" KERN_NOTICE "Call Trace:\n"); |
1394f032 BW |
541 | |
542 | while (!kstack_end(sp)) { | |
543 | addr = *sp++; | |
544 | /* | |
545 | * If the address is either in the text segment of the | |
546 | * kernel, or in the region which contains vmalloc'ed | |
547 | * memory, it *may* be the address of a calling | |
548 | * routine; if so, print it so that someone tracing | |
549 | * down the cause of the crash will be able to figure | |
550 | * out the call path that was taken. | |
551 | */ | |
552 | if (kernel_text_address(addr)) | |
553 | print_ip_sym(addr); | |
554 | } | |
555 | ||
226eb1ef | 556 | printk(KERN_NOTICE "\n"); |
1394f032 BW |
557 | } |
558 | ||
559 | void show_stack(struct task_struct *task, unsigned long *stack) | |
560 | { | |
561 | unsigned long *endstack, addr; | |
562 | int i; | |
563 | ||
564 | /* Cannot call dump_bfin_trace_buffer() here as show_stack() is | |
565 | * called externally in some places in the kernel. | |
566 | */ | |
567 | ||
568 | if (!stack) { | |
569 | if (task) | |
570 | stack = (unsigned long *)task->thread.ksp; | |
571 | else | |
572 | stack = (unsigned long *)&stack; | |
573 | } | |
574 | ||
575 | addr = (unsigned long)stack; | |
576 | endstack = (unsigned long *)PAGE_ALIGN(addr); | |
577 | ||
226eb1ef | 578 | printk(KERN_NOTICE "Stack from %08lx:", (unsigned long)stack); |
1394f032 BW |
579 | for (i = 0; i < kstack_depth_to_print; i++) { |
580 | if (stack + 1 > endstack) | |
581 | break; | |
582 | if (i % 8 == 0) | |
226eb1ef | 583 | printk("\n" KERN_NOTICE " "); |
1394f032 BW |
584 | printk(" %08lx", *stack++); |
585 | } | |
226eb1ef | 586 | printk("\n"); |
1394f032 BW |
587 | |
588 | show_trace(task, stack); | |
589 | } | |
590 | ||
591 | void dump_stack(void) | |
592 | { | |
593 | unsigned long stack; | |
518039bc | 594 | #ifdef CONFIG_DEBUG_BFIN_HWTRACE_ON |
1394f032 | 595 | int tflags; |
518039bc | 596 | #endif |
1394f032 BW |
597 | trace_buffer_save(tflags); |
598 | dump_bfin_trace_buffer(); | |
599 | show_stack(current, &stack); | |
600 | trace_buffer_restore(tflags); | |
601 | } | |
602 | ||
603 | EXPORT_SYMBOL(dump_stack); | |
604 | ||
605 | void dump_bfin_regs(struct pt_regs *fp, void *retaddr) | |
606 | { | |
226eb1ef RG |
607 | char buf [150]; |
608 | ||
609 | if (!oops_in_progress) { | |
610 | if (current->pid && current->mm) { | |
611 | printk(KERN_NOTICE "\n" KERN_NOTICE "CURRENT PROCESS:\n"); | |
612 | printk(KERN_NOTICE "COMM=%s PID=%d\n", | |
613 | current->comm, current->pid); | |
614 | ||
615 | printk(KERN_NOTICE "TEXT = 0x%p-0x%p DATA = 0x%p-0x%p\n" | |
616 | KERN_NOTICE "BSS = 0x%p-0x%p USER-STACK = 0x%p\n" | |
617 | KERN_NOTICE "\n", | |
618 | (void *)current->mm->start_code, | |
619 | (void *)current->mm->end_code, | |
620 | (void *)current->mm->start_data, | |
621 | (void *)current->mm->end_data, | |
622 | (void *)current->mm->end_data, | |
623 | (void *)current->mm->brk, | |
624 | (void *)current->mm->start_stack); | |
625 | } else { | |
626 | printk (KERN_NOTICE "\n" KERN_NOTICE | |
627 | "No Valid pid - Either things are really messed up," | |
628 | " or you are in the kernel\n"); | |
629 | } | |
1394f032 | 630 | } else { |
226eb1ef | 631 | printk(KERN_NOTICE "Kernel or interrupt exception\n"); |
4c26c6c9 | 632 | print_modules(); |
1394f032 BW |
633 | } |
634 | ||
226eb1ef | 635 | if (retaddr >= (void *)FIXED_CODE_START && retaddr < (void *)physical_mem_end |
1394f032 BW |
636 | #if L1_CODE_LENGTH != 0 |
637 | /* FIXME: Copy the code out of L1 Instruction SRAM through dma | |
638 | memcpy. */ | |
1f83b8f1 MF |
639 | && !(retaddr >= (void *)L1_CODE_START |
640 | && retaddr < (void *)(L1_CODE_START + L1_CODE_LENGTH)) | |
1394f032 BW |
641 | #endif |
642 | ) { | |
c5d88d9e | 643 | int i = ((unsigned int)retaddr & 0xFFFFFFF0) - 32; |
1394f032 | 644 | unsigned short x = 0; |
226eb1ef | 645 | printk(KERN_NOTICE "return address: [0x%p]; contents of:", retaddr); |
1f83b8f1 MF |
646 | for (; i < ((unsigned int)retaddr & 0xFFFFFFF0) + 32; i += 2) { |
647 | if (!(i & 0xF)) | |
226eb1ef | 648 | printk("\n" KERN_NOTICE "0x%08x: ", i); |
c5d88d9e RG |
649 | |
650 | if (get_user(x, (unsigned short *)i)) | |
1394f032 BW |
651 | break; |
652 | #ifndef CONFIG_DEBUG_HWERR | |
653 | /* If one of the last few instructions was a STI | |
d2d50aa9 | 654 | * it is likely that the error occured awhile ago |
226eb1ef RG |
655 | * and we just noticed. This only happens in kernel |
656 | * context, which should mean an oops is happening | |
1394f032 | 657 | */ |
226eb1ef | 658 | if (oops_in_progress && x >= 0x0040 && x <= 0x0047 && i <= 0) |
c5d88d9e RG |
659 | panic("\n\nWARNING : You should reconfigure" |
660 | " the kernel to turn on\n" | |
661 | " 'Hardware error interrupt" | |
662 | " debugging'\n" | |
663 | " The rest of this error" | |
664 | " is meanless\n"); | |
1394f032 | 665 | #endif |
1f83b8f1 | 666 | if (i == (unsigned int)retaddr) |
c5d88d9e RG |
667 | printk("[%04x]", x); |
668 | else | |
669 | printk(" %04x ", x); | |
1394f032 | 670 | } |
226eb1ef | 671 | printk("\n"); |
1394f032 | 672 | } else |
226eb1ef | 673 | printk("\n" KERN_NOTICE |
6a3f0b46 RG |
674 | "Cannot look at the [PC] <%p> for it is" |
675 | " in unreadable memory - sorry\n", retaddr); | |
226eb1ef RG |
676 | |
677 | printk(KERN_NOTICE "\n" KERN_NOTICE "SEQUENCER STATUS:\n"); | |
678 | printk(KERN_NOTICE " SEQSTAT: %08lx IPEND: %04lx SYSCFG: %04lx\n", | |
679 | (long)fp->seqstat, fp->ipend, fp->syscfg); | |
c5d88d9e | 680 | |
226eb1ef RG |
681 | decode_address(buf, fp->rete); |
682 | printk(KERN_NOTICE " RETE: %s\n", buf); | |
683 | decode_address(buf, fp->retn); | |
684 | printk(KERN_NOTICE " RETN: %s\n", buf); | |
685 | decode_address(buf, fp->retx); | |
686 | printk(KERN_NOTICE " RETX: %s\n", buf); | |
687 | decode_address(buf, fp->rets); | |
688 | printk(KERN_NOTICE " RETS: %s\n", buf); | |
c5d88d9e | 689 | |
226eb1ef RG |
690 | if ((long)fp->seqstat & SEQSTAT_EXCAUSE) { |
691 | decode_address(buf, bfin_read_DCPLB_FAULT_ADDR()); | |
692 | printk(KERN_NOTICE "DCPLB_FAULT_ADDR: %s\n", buf); | |
693 | decode_address(buf, bfin_read_ICPLB_FAULT_ADDR()); | |
694 | printk(KERN_NOTICE "ICPLB_FAULT_ADDR: %s\n", buf); | |
695 | } | |
696 | ||
697 | printk(KERN_NOTICE "\n" KERN_NOTICE "PROCESSOR STATE:\n"); | |
698 | printk(KERN_NOTICE " R0 : %08lx R1 : %08lx R2 : %08lx R3 : %08lx\n", | |
c5d88d9e | 699 | fp->r0, fp->r1, fp->r2, fp->r3); |
226eb1ef | 700 | printk(KERN_NOTICE " R4 : %08lx R5 : %08lx R6 : %08lx R7 : %08lx\n", |
c5d88d9e | 701 | fp->r4, fp->r5, fp->r6, fp->r7); |
226eb1ef | 702 | printk(KERN_NOTICE " P0 : %08lx P1 : %08lx P2 : %08lx P3 : %08lx\n", |
c5d88d9e | 703 | fp->p0, fp->p1, fp->p2, fp->p3); |
226eb1ef RG |
704 | printk(KERN_NOTICE " P4 : %08lx P5 : %08lx FP : %08lx SP : %08lx\n", |
705 | fp->p4, fp->p5, fp->fp, (long)fp); | |
706 | printk(KERN_NOTICE " LB0: %08lx LT0: %08lx LC0: %08lx\n", | |
c5d88d9e | 707 | fp->lb0, fp->lt0, fp->lc0); |
226eb1ef | 708 | printk(KERN_NOTICE " LB1: %08lx LT1: %08lx LC1: %08lx\n", |
c5d88d9e | 709 | fp->lb1, fp->lt1, fp->lc1); |
226eb1ef | 710 | printk(KERN_NOTICE " B0 : %08lx L0 : %08lx M0 : %08lx I0 : %08lx\n", |
c5d88d9e | 711 | fp->b0, fp->l0, fp->m0, fp->i0); |
226eb1ef | 712 | printk(KERN_NOTICE " B1 : %08lx L1 : %08lx M1 : %08lx I1 : %08lx\n", |
c5d88d9e | 713 | fp->b1, fp->l1, fp->m1, fp->i1); |
226eb1ef | 714 | printk(KERN_NOTICE " B2 : %08lx L2 : %08lx M2 : %08lx I2 : %08lx\n", |
c5d88d9e | 715 | fp->b2, fp->l2, fp->m2, fp->i2); |
226eb1ef | 716 | printk(KERN_NOTICE " B3 : %08lx L3 : %08lx M3 : %08lx I3 : %08lx\n", |
c5d88d9e | 717 | fp->b3, fp->l3, fp->m3, fp->i3); |
226eb1ef RG |
718 | printk(KERN_NOTICE "A0.w: %08lx A0.x: %08lx A1.w: %08lx A1.x: %08lx\n", |
719 | fp->a0w, fp->a0x, fp->a1w, fp->a1x); | |
c5d88d9e | 720 | |
226eb1ef | 721 | printk(KERN_NOTICE "USP : %08lx ASTAT: %08lx\n", |
c5d88d9e | 722 | rdusp(), fp->astat); |
1394f032 | 723 | |
226eb1ef | 724 | printk(KERN_NOTICE "\n"); |
1394f032 BW |
725 | } |
726 | ||
727 | #ifdef CONFIG_SYS_BFIN_SPINLOCK_L1 | |
728 | asmlinkage int sys_bfin_spinlock(int *spinlock)__attribute__((l1_text)); | |
729 | #endif | |
730 | ||
731 | asmlinkage int sys_bfin_spinlock(int *spinlock) | |
732 | { | |
733 | int ret = 0; | |
734 | int tmp = 0; | |
735 | ||
736 | local_irq_disable(); | |
737 | ret = get_user(tmp, spinlock); | |
738 | if (ret == 0) { | |
739 | if (tmp) | |
740 | ret = 1; | |
741 | tmp = 1; | |
742 | put_user(tmp, spinlock); | |
743 | } | |
744 | local_irq_enable(); | |
745 | return ret; | |
746 | } | |
747 | ||
1ffe6646 MF |
748 | int bfin_request_exception(unsigned int exception, void (*handler)(void)) |
749 | { | |
750 | void (*curr_handler)(void); | |
751 | ||
752 | if (exception > 0x3F) | |
753 | return -EINVAL; | |
754 | ||
755 | curr_handler = ex_table[exception]; | |
756 | ||
757 | if (curr_handler != ex_replaceable) | |
758 | return -EBUSY; | |
759 | ||
760 | ex_table[exception] = handler; | |
761 | ||
762 | return 0; | |
763 | } | |
764 | EXPORT_SYMBOL(bfin_request_exception); | |
765 | ||
766 | int bfin_free_exception(unsigned int exception, void (*handler)(void)) | |
767 | { | |
768 | void (*curr_handler)(void); | |
769 | ||
770 | if (exception > 0x3F) | |
771 | return -EINVAL; | |
772 | ||
773 | curr_handler = ex_table[exception]; | |
774 | ||
775 | if (curr_handler != handler) | |
776 | return -EBUSY; | |
777 | ||
778 | ex_table[exception] = ex_replaceable; | |
779 | ||
780 | return 0; | |
781 | } | |
782 | EXPORT_SYMBOL(bfin_free_exception); | |
783 | ||
1394f032 BW |
784 | void panic_cplb_error(int cplb_panic, struct pt_regs *fp) |
785 | { | |
786 | switch (cplb_panic) { | |
787 | case CPLB_NO_UNLOCKED: | |
788 | printk(KERN_EMERG "All CPLBs are locked\n"); | |
789 | break; | |
790 | case CPLB_PROT_VIOL: | |
791 | return; | |
792 | case CPLB_NO_ADDR_MATCH: | |
793 | return; | |
794 | case CPLB_UNKNOWN_ERR: | |
795 | printk(KERN_EMERG "Unknown CPLB Exception\n"); | |
796 | break; | |
797 | } | |
798 | ||
226eb1ef RG |
799 | oops_in_progress = 1; |
800 | ||
1f83b8f1 MF |
801 | printk(KERN_EMERG "DCPLB_FAULT_ADDR=%p\n", (void *)bfin_read_DCPLB_FAULT_ADDR()); |
802 | printk(KERN_EMERG "ICPLB_FAULT_ADDR=%p\n", (void *)bfin_read_ICPLB_FAULT_ADDR()); | |
1394f032 BW |
803 | dump_bfin_regs(fp, (void *)fp->retx); |
804 | dump_stack(); | |
805 | panic("Unrecoverable event\n"); | |
806 | } |