| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  * linux/arch/h8300/boot/traps.c -- general exception handling code | 
 | 3 |  * H8/300 support Yoshinori Sato <ysato@users.sourceforge.jp> | 
 | 4 |  *  | 
 | 5 |  * Cloned from Linux/m68k. | 
 | 6 |  * | 
 | 7 |  * No original Copyright holder listed, | 
 | 8 |  * Probabily original (C) Roman Zippel (assigned DJD, 1999) | 
 | 9 |  * | 
 | 10 |  * Copyright 1999-2000 D. Jeff Dionne, <jeff@rt-control.com> | 
 | 11 |  * | 
 | 12 |  * This file is subject to the terms and conditions of the GNU General Public | 
 | 13 |  * License.  See the file COPYING in the main directory of this archive | 
 | 14 |  * for more details. | 
 | 15 |  */ | 
 | 16 |  | 
 | 17 | #include <linux/types.h> | 
 | 18 | #include <linux/sched.h> | 
 | 19 | #include <linux/kernel.h> | 
 | 20 | #include <linux/errno.h> | 
 | 21 | #include <linux/init.h> | 
 | 22 | #include <linux/module.h> | 
 | 23 |  | 
 | 24 | #include <asm/system.h> | 
 | 25 | #include <asm/irq.h> | 
 | 26 | #include <asm/traps.h> | 
 | 27 | #include <asm/page.h> | 
 | 28 | #include <asm/gpio.h> | 
 | 29 |  | 
 | 30 | /* | 
 | 31 |  * this must be called very early as the kernel might | 
 | 32 |  * use some instruction that are emulated on the 060 | 
 | 33 |  */ | 
 | 34 |  | 
 | 35 | void __init base_trap_init(void) | 
 | 36 | { | 
 | 37 | } | 
 | 38 |  | 
 | 39 | void __init trap_init (void) | 
 | 40 | { | 
 | 41 | } | 
 | 42 |  | 
 | 43 | asmlinkage void set_esp0 (unsigned long ssp) | 
 | 44 | { | 
 | 45 | 	current->thread.esp0 = ssp; | 
 | 46 | } | 
 | 47 |  | 
 | 48 | /* | 
 | 49 |  *	Generic dumping code. Used for panic and debug. | 
 | 50 |  */ | 
 | 51 |  | 
 | 52 | static void dump(struct pt_regs *fp) | 
 | 53 | { | 
 | 54 | 	unsigned long	*sp; | 
 | 55 | 	unsigned char	*tp; | 
 | 56 | 	int		i; | 
 | 57 |  | 
 | 58 | 	printk("\nCURRENT PROCESS:\n\n"); | 
 | 59 | 	printk("COMM=%s PID=%d\n", current->comm, current->pid); | 
 | 60 | 	if (current->mm) { | 
 | 61 | 		printk("TEXT=%08x-%08x DATA=%08x-%08x BSS=%08x-%08x\n", | 
 | 62 | 			(int) current->mm->start_code, | 
 | 63 | 			(int) current->mm->end_code, | 
 | 64 | 			(int) current->mm->start_data, | 
 | 65 | 			(int) current->mm->end_data, | 
 | 66 | 			(int) current->mm->end_data, | 
 | 67 | 			(int) current->mm->brk); | 
 | 68 | 		printk("USER-STACK=%08x  KERNEL-STACK=%08lx\n\n", | 
 | 69 | 			(int) current->mm->start_stack, | 
 | 70 | 			(int) PAGE_SIZE+(unsigned long)current); | 
 | 71 | 	} | 
 | 72 |  | 
 | 73 | 	show_regs(fp); | 
 | 74 | 	printk("\nCODE:"); | 
 | 75 | 	tp = ((unsigned char *) fp->pc) - 0x20; | 
 | 76 | 	for (sp = (unsigned long *) tp, i = 0; (i < 0x40);  i += 4) { | 
 | 77 | 		if ((i % 0x10) == 0) | 
 | 78 | 			printk("\n%08x: ", (int) (tp + i)); | 
 | 79 | 		printk("%08x ", (int) *sp++); | 
 | 80 | 	} | 
 | 81 | 	printk("\n"); | 
 | 82 |  | 
 | 83 | 	printk("\nKERNEL STACK:"); | 
 | 84 | 	tp = ((unsigned char *) fp) - 0x40; | 
 | 85 | 	for (sp = (unsigned long *) tp, i = 0; (i < 0xc0); i += 4) { | 
 | 86 | 		if ((i % 0x10) == 0) | 
 | 87 | 			printk("\n%08x: ", (int) (tp + i)); | 
 | 88 | 		printk("%08x ", (int) *sp++); | 
 | 89 | 	} | 
 | 90 | 	printk("\n"); | 
 | 91 | 	if (STACK_MAGIC != *(unsigned long *)((unsigned long)current+PAGE_SIZE)) | 
 | 92 |                 printk("(Possibly corrupted stack page??)\n"); | 
 | 93 |  | 
 | 94 | 	printk("\n\n"); | 
 | 95 | } | 
 | 96 |  | 
 | 97 | void die_if_kernel (char *str, struct pt_regs *fp, int nr) | 
 | 98 | { | 
 | 99 | 	extern int console_loglevel; | 
 | 100 |  | 
 | 101 | 	if (!(fp->ccr & PS_S)) | 
 | 102 | 		return; | 
 | 103 |  | 
 | 104 | 	console_loglevel = 15; | 
 | 105 | 	dump(fp); | 
 | 106 |  | 
 | 107 | 	do_exit(SIGSEGV); | 
 | 108 | } | 
 | 109 |  | 
 | 110 | extern char _start, _etext; | 
 | 111 | #define check_kernel_text(addr) \ | 
 | 112 |         ((addr >= (unsigned long)(&_start)) && \ | 
 | 113 |          (addr <  (unsigned long)(&_etext)))  | 
 | 114 |  | 
 | 115 | static int kstack_depth_to_print = 24; | 
 | 116 |  | 
 | 117 | void show_stack(struct task_struct *task, unsigned long *esp) | 
 | 118 | { | 
 | 119 | 	unsigned long *stack,  addr; | 
 | 120 | 	int i; | 
 | 121 |  | 
 | 122 | 	if (esp == NULL) | 
 | 123 | 		esp = (unsigned long *) &esp; | 
 | 124 |  | 
 | 125 | 	stack = esp; | 
 | 126 |  | 
 | 127 | 	printk("Stack from %08lx:", (unsigned long)stack); | 
 | 128 | 	for (i = 0; i < kstack_depth_to_print; i++) { | 
 | 129 | 		if (((unsigned long)stack & (THREAD_SIZE - 1)) == 0) | 
 | 130 | 			break; | 
 | 131 | 		if (i % 8 == 0) | 
 | 132 | 			printk("\n       "); | 
 | 133 | 		printk(" %08lx", *stack++); | 
 | 134 | 	} | 
 | 135 |  | 
 | 136 | 	printk("\nCall Trace:"); | 
 | 137 | 	i = 0; | 
 | 138 | 	stack = esp; | 
 | 139 | 	while (((unsigned long)stack & (THREAD_SIZE - 1)) == 0) { | 
 | 140 | 		addr = *stack++; | 
 | 141 | 		/* | 
 | 142 | 		 * If the address is either in the text segment of the | 
 | 143 | 		 * kernel, or in the region which contains vmalloc'ed | 
 | 144 | 		 * memory, it *may* be the address of a calling | 
 | 145 | 		 * routine; if so, print it so that someone tracing | 
 | 146 | 		 * down the cause of the crash will be able to figure | 
 | 147 | 		 * out the call path that was taken. | 
 | 148 | 		 */ | 
 | 149 | 		if (check_kernel_text(addr)) { | 
 | 150 | 			if (i % 4 == 0) | 
 | 151 | 				printk("\n       "); | 
 | 152 | 			printk(" [<%08lx>]", addr); | 
 | 153 | 			i++; | 
 | 154 | 		} | 
 | 155 | 	} | 
 | 156 | 	printk("\n"); | 
 | 157 | } | 
 | 158 |  | 
 | 159 | void show_trace_task(struct task_struct *tsk) | 
 | 160 | { | 
 | 161 | 	show_stack(tsk,(unsigned long *)tsk->thread.esp0); | 
 | 162 | } | 
 | 163 |  | 
 | 164 | void dump_stack(void) | 
 | 165 | { | 
 | 166 | 	show_stack(NULL,NULL); | 
 | 167 | } | 
 | 168 |  | 
 | 169 | EXPORT_SYMBOL(dump_stack); |