| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* $Id: traps.c,v 1.2 2003/07/04 08:27:41 starvik Exp $ | 
|  | 2 | * | 
|  | 3 | *  linux/arch/cris/arch-v10/traps.c | 
|  | 4 | * | 
|  | 5 | *  Heler functions for trap handlers | 
|  | 6 | * | 
|  | 7 | *  Copyright (C) 2000-2002 Axis Communications AB | 
|  | 8 | * | 
|  | 9 | *  Authors:   Bjorn Wesen | 
|  | 10 | *  	       Hans-Peter Nilsson | 
|  | 11 | * | 
|  | 12 | */ | 
|  | 13 |  | 
|  | 14 | #include <linux/config.h> | 
|  | 15 | #include <linux/ptrace.h> | 
|  | 16 | #include <asm/uaccess.h> | 
|  | 17 | #include <asm/arch/sv_addr_ag.h> | 
|  | 18 |  | 
|  | 19 | void | 
|  | 20 | show_registers(struct pt_regs * regs) | 
|  | 21 | { | 
|  | 22 | /* We either use rdusp() - the USP register, which might not | 
|  | 23 | correspond to the current process for all cases we're called, | 
|  | 24 | or we use the current->thread.usp, which is not up to date for | 
|  | 25 | the current process.  Experience shows we want the USP | 
|  | 26 | register.  */ | 
|  | 27 | unsigned long usp = rdusp(); | 
|  | 28 |  | 
|  | 29 | printk("IRP: %08lx SRP: %08lx DCCR: %08lx USP: %08lx MOF: %08lx\n", | 
|  | 30 | regs->irp, regs->srp, regs->dccr, usp, regs->mof ); | 
|  | 31 | printk(" r0: %08lx  r1: %08lx   r2: %08lx  r3: %08lx\n", | 
|  | 32 | regs->r0, regs->r1, regs->r2, regs->r3); | 
|  | 33 | printk(" r4: %08lx  r5: %08lx   r6: %08lx  r7: %08lx\n", | 
|  | 34 | regs->r4, regs->r5, regs->r6, regs->r7); | 
|  | 35 | printk(" r8: %08lx  r9: %08lx  r10: %08lx r11: %08lx\n", | 
|  | 36 | regs->r8, regs->r9, regs->r10, regs->r11); | 
|  | 37 | printk("r12: %08lx r13: %08lx oR10: %08lx\n", | 
|  | 38 | regs->r12, regs->r13, regs->orig_r10); | 
|  | 39 | printk("R_MMU_CAUSE: %08lx\n", (unsigned long)*R_MMU_CAUSE); | 
|  | 40 | printk("Process %s (pid: %d, stackpage=%08lx)\n", | 
|  | 41 | current->comm, current->pid, (unsigned long)current); | 
|  | 42 |  | 
|  | 43 | /* | 
|  | 44 | * When in-kernel, we also print out the stack and code at the | 
|  | 45 | * time of the fault.. | 
|  | 46 | */ | 
|  | 47 | if (! user_mode(regs)) { | 
|  | 48 | int i; | 
|  | 49 |  | 
|  | 50 | show_stack(NULL, (unsigned long*)usp); | 
|  | 51 |  | 
|  | 52 | /* Dump kernel stack if the previous dump wasn't one.  */ | 
|  | 53 | if (usp != 0) | 
|  | 54 | show_stack (NULL, NULL); | 
|  | 55 |  | 
|  | 56 | printk("\nCode: "); | 
|  | 57 | if(regs->irp < PAGE_OFFSET) | 
|  | 58 | goto bad; | 
|  | 59 |  | 
|  | 60 | /* Often enough the value at regs->irp does not point to | 
|  | 61 | the interesting instruction, which is most often the | 
|  | 62 | _previous_ instruction.  So we dump at an offset large | 
|  | 63 | enough that instruction decoding should be in sync at | 
|  | 64 | the interesting point, but small enough to fit on a row | 
|  | 65 | (sort of).  We point out the regs->irp location in a | 
|  | 66 | ksymoops-friendly way by wrapping the byte for that | 
|  | 67 | address in parentheses.  */ | 
|  | 68 | for(i = -12; i < 12; i++) | 
|  | 69 | { | 
|  | 70 | unsigned char c; | 
|  | 71 | if(__get_user(c, &((unsigned char*)regs->irp)[i])) { | 
|  | 72 | bad: | 
|  | 73 | printk(" Bad IP value."); | 
|  | 74 | break; | 
|  | 75 | } | 
|  | 76 |  | 
|  | 77 | if (i == 0) | 
|  | 78 | printk("(%02x) ", c); | 
|  | 79 | else | 
|  | 80 | printk("%02x ", c); | 
|  | 81 | } | 
|  | 82 | printk("\n"); | 
|  | 83 | } | 
|  | 84 | } | 
|  | 85 |  | 
|  | 86 | /* Called from entry.S when the watchdog has bitten | 
|  | 87 | * We print out something resembling an oops dump, and if | 
|  | 88 | * we have the nice doggy development flag set, we halt here | 
|  | 89 | * instead of rebooting. | 
|  | 90 | */ | 
|  | 91 |  | 
|  | 92 | extern void reset_watchdog(void); | 
|  | 93 | extern void stop_watchdog(void); | 
|  | 94 |  | 
|  | 95 |  | 
|  | 96 | void | 
|  | 97 | watchdog_bite_hook(struct pt_regs *regs) | 
|  | 98 | { | 
|  | 99 | #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY | 
|  | 100 | local_irq_disable(); | 
|  | 101 | stop_watchdog(); | 
|  | 102 | show_registers(regs); | 
|  | 103 | while(1) /* nothing */; | 
|  | 104 | #else | 
|  | 105 | show_registers(regs); | 
|  | 106 | #endif | 
|  | 107 | } | 
|  | 108 |  | 
|  | 109 | /* This is normally the 'Oops' routine */ | 
|  | 110 | void | 
|  | 111 | die_if_kernel(const char * str, struct pt_regs * regs, long err) | 
|  | 112 | { | 
|  | 113 | if(user_mode(regs)) | 
|  | 114 | return; | 
|  | 115 |  | 
|  | 116 | #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY | 
|  | 117 | /* This printout might take too long and trigger the | 
|  | 118 | * watchdog normally. If we're in the nice doggy | 
|  | 119 | * development mode, stop the watchdog during printout. | 
|  | 120 | */ | 
|  | 121 | stop_watchdog(); | 
|  | 122 | #endif | 
|  | 123 |  | 
|  | 124 | printk("%s: %04lx\n", str, err & 0xffff); | 
|  | 125 |  | 
|  | 126 | show_registers(regs); | 
|  | 127 |  | 
|  | 128 | #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY | 
|  | 129 | reset_watchdog(); | 
|  | 130 | #endif | 
|  | 131 | do_exit(SIGSEGV); | 
|  | 132 | } |