forked from luck/tmp_suning_uos_patched
baa54ab93c
Redefine trap handler as below: 0 N/A reserved for system calls 1 SIGUSR1 user-defined signal 1 2 SIGUSR2 user-defined signal 2 3 SIGILL illegal instruction 4..29 reserved (but implemented to raise SIGILL instead of being undefined) 30 SIGTRAP KGDB 31 SIGTRAP trace/breakpoint trap Signed-off-by: Ley Foon Tan <lftan@altera.com>
206 lines
4.7 KiB
C
206 lines
4.7 KiB
C
/*
|
|
* Hardware exception handling
|
|
*
|
|
* Copyright (C) 2010 Tobias Klauser <tklauser@distanz.ch>
|
|
* Copyright (C) 2004 Microtronix Datacom Ltd.
|
|
* Copyright (C) 2001 Vic Phillips
|
|
*
|
|
* This file is subject to the terms and conditions of the GNU General
|
|
* Public License. See the file COPYING in the main directory of this
|
|
* archive for more details.
|
|
*/
|
|
|
|
#include <linux/sched.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/signal.h>
|
|
#include <linux/export.h>
|
|
#include <linux/mm.h>
|
|
#include <linux/ptrace.h>
|
|
|
|
#include <asm/traps.h>
|
|
#include <asm/sections.h>
|
|
#include <asm/uaccess.h>
|
|
|
|
static DEFINE_SPINLOCK(die_lock);
|
|
|
|
static void _send_sig(int signo, int code, unsigned long addr)
|
|
{
|
|
siginfo_t info;
|
|
|
|
info.si_signo = signo;
|
|
info.si_errno = 0;
|
|
info.si_code = code;
|
|
info.si_addr = (void __user *) addr;
|
|
force_sig_info(signo, &info, current);
|
|
}
|
|
|
|
void die(const char *str, struct pt_regs *regs, long err)
|
|
{
|
|
console_verbose();
|
|
spin_lock_irq(&die_lock);
|
|
pr_warn("Oops: %s, sig: %ld\n", str, err);
|
|
show_regs(regs);
|
|
spin_unlock_irq(&die_lock);
|
|
/*
|
|
* do_exit() should take care of panic'ing from an interrupt
|
|
* context so we don't handle it here
|
|
*/
|
|
do_exit(err);
|
|
}
|
|
|
|
void _exception(int signo, struct pt_regs *regs, int code, unsigned long addr)
|
|
{
|
|
if (!user_mode(regs))
|
|
die("Exception in kernel mode", regs, signo);
|
|
|
|
_send_sig(signo, code, addr);
|
|
}
|
|
|
|
/*
|
|
* The show_stack is an external API which we do not use ourselves.
|
|
*/
|
|
|
|
int kstack_depth_to_print = 48;
|
|
|
|
void show_stack(struct task_struct *task, unsigned long *stack)
|
|
{
|
|
unsigned long *endstack, addr;
|
|
int i;
|
|
|
|
if (!stack) {
|
|
if (task)
|
|
stack = (unsigned long *)task->thread.ksp;
|
|
else
|
|
stack = (unsigned long *)&stack;
|
|
}
|
|
|
|
addr = (unsigned long) stack;
|
|
endstack = (unsigned long *) PAGE_ALIGN(addr);
|
|
|
|
pr_emerg("Stack from %08lx:", (unsigned long)stack);
|
|
for (i = 0; i < kstack_depth_to_print; i++) {
|
|
if (stack + 1 > endstack)
|
|
break;
|
|
if (i % 8 == 0)
|
|
pr_emerg("\n ");
|
|
pr_emerg(" %08lx", *stack++);
|
|
}
|
|
|
|
pr_emerg("\nCall Trace:");
|
|
i = 0;
|
|
while (stack + 1 <= endstack) {
|
|
addr = *stack++;
|
|
/*
|
|
* If the address is either in the text segment of the
|
|
* kernel, or in the region which contains vmalloc'ed
|
|
* memory, it *may* be the address of a calling
|
|
* routine; if so, print it so that someone tracing
|
|
* down the cause of the crash will be able to figure
|
|
* out the call path that was taken.
|
|
*/
|
|
if (((addr >= (unsigned long) _stext) &&
|
|
(addr <= (unsigned long) _etext))) {
|
|
if (i % 4 == 0)
|
|
pr_emerg("\n ");
|
|
pr_emerg(" [<%08lx>]", addr);
|
|
i++;
|
|
}
|
|
}
|
|
pr_emerg("\n");
|
|
}
|
|
|
|
void __init trap_init(void)
|
|
{
|
|
/* Nothing to do here */
|
|
}
|
|
|
|
/* Breakpoint handler */
|
|
asmlinkage void breakpoint_c(struct pt_regs *fp)
|
|
{
|
|
/*
|
|
* The breakpoint entry code has moved the PC on by 4 bytes, so we must
|
|
* move it back. This could be done on the host but we do it here
|
|
* because monitor.S of JTAG gdbserver does it too.
|
|
*/
|
|
fp->ea -= 4;
|
|
_exception(SIGTRAP, fp, TRAP_BRKPT, fp->ea);
|
|
}
|
|
|
|
#ifndef CONFIG_NIOS2_ALIGNMENT_TRAP
|
|
/* Alignment exception handler */
|
|
asmlinkage void handle_unaligned_c(struct pt_regs *fp, int cause)
|
|
{
|
|
unsigned long addr = RDCTL(CTL_BADADDR);
|
|
|
|
cause >>= 2;
|
|
fp->ea -= 4;
|
|
|
|
if (fixup_exception(fp))
|
|
return;
|
|
|
|
if (!user_mode(fp)) {
|
|
pr_alert("Unaligned access from kernel mode, this might be a hardware\n");
|
|
pr_alert("problem, dump registers and restart the instruction\n");
|
|
pr_alert(" BADADDR 0x%08lx\n", addr);
|
|
pr_alert(" cause %d\n", cause);
|
|
pr_alert(" op-code 0x%08lx\n", *(unsigned long *)(fp->ea));
|
|
show_regs(fp);
|
|
return;
|
|
}
|
|
|
|
_exception(SIGBUS, fp, BUS_ADRALN, addr);
|
|
}
|
|
#endif /* CONFIG_NIOS2_ALIGNMENT_TRAP */
|
|
|
|
/* Illegal instruction handler */
|
|
asmlinkage void handle_illegal_c(struct pt_regs *fp)
|
|
{
|
|
fp->ea -= 4;
|
|
_exception(SIGILL, fp, ILL_ILLOPC, fp->ea);
|
|
}
|
|
|
|
/* Supervisor instruction handler */
|
|
asmlinkage void handle_supervisor_instr(struct pt_regs *fp)
|
|
{
|
|
fp->ea -= 4;
|
|
_exception(SIGILL, fp, ILL_PRVOPC, fp->ea);
|
|
}
|
|
|
|
/* Division error handler */
|
|
asmlinkage void handle_diverror_c(struct pt_regs *fp)
|
|
{
|
|
fp->ea -= 4;
|
|
_exception(SIGFPE, fp, FPE_INTDIV, fp->ea);
|
|
}
|
|
|
|
/* Unhandled exception handler */
|
|
asmlinkage void unhandled_exception(struct pt_regs *regs, int cause)
|
|
{
|
|
unsigned long addr = RDCTL(CTL_BADADDR);
|
|
|
|
cause /= 4;
|
|
|
|
pr_emerg("Unhandled exception #%d in %s mode (badaddr=0x%08lx)\n",
|
|
cause, user_mode(regs) ? "user" : "kernel", addr);
|
|
|
|
regs->ea -= 4;
|
|
show_regs(regs);
|
|
|
|
pr_emerg("opcode: 0x%08lx\n", *(unsigned long *)(regs->ea));
|
|
}
|
|
|
|
asmlinkage void handle_trap_1_c(struct pt_regs *fp)
|
|
{
|
|
_send_sig(SIGUSR1, 0, fp->ea);
|
|
}
|
|
|
|
asmlinkage void handle_trap_2_c(struct pt_regs *fp)
|
|
{
|
|
_send_sig(SIGUSR2, 0, fp->ea);
|
|
}
|
|
|
|
asmlinkage void handle_trap_3_c(struct pt_regs *fp)
|
|
{
|
|
_send_sig(SIGILL, ILL_ILLTRP, fp->ea);
|
|
}
|