blob: a11ad3229f8c4dc50474ed0af99a1cbcb4d1f21b [file] [log] [blame]
Jesper Nilsson1ddba022007-11-30 14:11:29 +01001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * linux/arch/cris/traps.c
3 *
Jesper Nilsson1ddba022007-11-30 14:11:29 +01004 * Here we handle the break vectors not used by the system call
5 * mechanism, as well as some general stack/register dumping
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 * things.
Jesper Nilsson1ddba022007-11-30 14:11:29 +01007 *
8 * Copyright (C) 2000-2007 Axis Communications AB
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 *
10 * Authors: Bjorn Wesen
Jesper Nilsson1ddba022007-11-30 14:11:29 +010011 * Hans-Peter Nilsson
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 *
13 */
14
15#include <linux/init.h>
16#include <linux/module.h>
Jesper Nilsson1ddba022007-11-30 14:11:29 +010017
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <asm/pgtable.h>
19#include <asm/uaccess.h>
David Howellsb1a154d2012-03-28 18:30:02 +010020#include <arch/system.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021
Jesper Nilsson1ddba022007-11-30 14:11:29 +010022extern void arch_enable_nmi(void);
23extern void stop_watchdog(void);
24extern void reset_watchdog(void);
25extern void show_registers(struct pt_regs *regs);
26
27#ifdef CONFIG_DEBUG_BUGVERBOSE
28extern void handle_BUG(struct pt_regs *regs);
29#else
30#define handle_BUG(regs)
31#endif
32
Linus Torvalds1da177e2005-04-16 15:20:36 -070033static int kstack_depth_to_print = 24;
34
Jesper Nilsson1ddba022007-11-30 14:11:29 +010035void (*nmi_handler)(struct pt_regs *);
Mikael Starvik059163ca2005-07-27 11:44:32 -070036
Jesper Nilsson1ddba022007-11-30 14:11:29 +010037void
38show_trace(unsigned long *stack)
Linus Torvalds1da177e2005-04-16 15:20:36 -070039{
40 unsigned long addr, module_start, module_end;
41 extern char _stext, _etext;
42 int i;
43
Jesper Nilsson1ddba022007-11-30 14:11:29 +010044 printk("\nCall Trace: ");
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Jesper Nilsson1ddba022007-11-30 14:11:29 +010046 i = 1;
47 module_start = VMALLOC_START;
48 module_end = VMALLOC_END;
Linus Torvalds1da177e2005-04-16 15:20:36 -070049
Jesper Nilsson1ddba022007-11-30 14:11:29 +010050 while (((long)stack & (THREAD_SIZE-1)) != 0) {
51 if (__get_user(addr, stack)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070052 /* This message matches "failing address" marked
53 s390 in ksymoops, so lines containing it will
54 not be filtered out by ksymoops. */
Jesper Nilsson1ddba022007-11-30 14:11:29 +010055 printk("Failing address 0x%lx\n", (unsigned long)stack);
Linus Torvalds1da177e2005-04-16 15:20:36 -070056 break;
57 }
58 stack++;
59
Jesper Nilsson1ddba022007-11-30 14:11:29 +010060 /*
61 * If the address is either in the text segment of the
62 * kernel, or in the region which contains vmalloc'ed
63 * memory, it *may* be the address of a calling
64 * routine; if so, print it so that someone tracing
65 * down the cause of the crash will be able to figure
66 * out the call path that was taken.
67 */
68 if (((addr >= (unsigned long)&_stext) &&
69 (addr <= (unsigned long)&_etext)) ||
70 ((addr >= module_start) && (addr <= module_end))) {
71 if (i && ((i % 8) == 0))
72 printk("\n ");
73 printk("[<%08lx>] ", addr);
74 i++;
75 }
76 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070077}
78
79/*
80 * These constants are for searching for possible module text
81 * segments. MODULE_RANGE is a guess of how much space is likely
82 * to be vmalloced.
83 */
84
85#define MODULE_RANGE (8*1024*1024)
86
87/*
88 * The output (format, strings and order) is adjusted to be usable with
89 * ksymoops-2.4.1 with some necessary CRIS-specific patches. Please don't
90 * change it unless you're serious about adjusting ksymoops and syncing
91 * with the ksymoops maintainer.
92 */
93
Jesper Nilsson1ddba022007-11-30 14:11:29 +010094void
Linus Torvalds1da177e2005-04-16 15:20:36 -070095show_stack(struct task_struct *task, unsigned long *sp)
96{
Jesper Nilsson1ddba022007-11-30 14:11:29 +010097 unsigned long *stack, addr;
98 int i;
Linus Torvalds1da177e2005-04-16 15:20:36 -070099
100 /*
101 * debugging aid: "show_stack(NULL);" prints a
102 * back trace.
103 */
104
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100105 if (sp == NULL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106 if (task)
107 sp = (unsigned long*)task->thread.ksp;
108 else
109 sp = (unsigned long*)rdsp();
110 }
111
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100112 stack = sp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100114 printk("\nStack from %08lx:\n ", (unsigned long)stack);
115 for (i = 0; i < kstack_depth_to_print; i++) {
116 if (((long)stack & (THREAD_SIZE-1)) == 0)
117 break;
118 if (i && ((i % 8) == 0))
119 printk("\n ");
120 if (__get_user(addr, stack)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121 /* This message matches "failing address" marked
122 s390 in ksymoops, so lines containing it will
123 not be filtered out by ksymoops. */
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100124 printk("Failing address 0x%lx\n", (unsigned long)stack);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125 break;
126 }
127 stack++;
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100128 printk("%08lx ", addr);
129 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130 show_trace(sp);
131}
132
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100133#if 0
134/* displays a short stack trace */
Mikael Starvik059163ca2005-07-27 11:44:32 -0700135
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100136int
137show_stack(void)
Mikael Starvik059163ca2005-07-27 11:44:32 -0700138{
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100139 unsigned long *sp = (unsigned long *)rdusp();
140 int i;
141
142 printk("Stack dump [0x%08lx]:\n", (unsigned long)sp);
143 for (i = 0; i < 16; i++)
144 printk("sp + %d: 0x%08lx\n", i*4, sp[i]);
145 return 0;
Mikael Starvik059163ca2005-07-27 11:44:32 -0700146}
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100147#endif
Mikael Starvik059163ca2005-07-27 11:44:32 -0700148
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100149void
150dump_stack(void)
Mikael Starvik059163ca2005-07-27 11:44:32 -0700151{
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100152 show_stack(NULL, NULL);
153}
154EXPORT_SYMBOL(dump_stack);
155
156void
157set_nmi_handler(void (*handler)(struct pt_regs *))
158{
159 nmi_handler = handler;
160 arch_enable_nmi();
Mikael Starvik059163ca2005-07-27 11:44:32 -0700161}
162
163#ifdef CONFIG_DEBUG_NMI_OOPS
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100164void
165oops_nmi_handler(struct pt_regs *regs)
Mikael Starvik059163ca2005-07-27 11:44:32 -0700166{
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100167 stop_watchdog();
168 oops_in_progress = 1;
169 printk("NMI!\n");
170 show_registers(regs);
171 oops_in_progress = 0;
Mikael Starvik059163ca2005-07-27 11:44:32 -0700172}
173
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100174static int __init
175oops_nmi_register(void)
Mikael Starvik059163ca2005-07-27 11:44:32 -0700176{
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100177 set_nmi_handler(oops_nmi_handler);
178 return 0;
Mikael Starvik059163ca2005-07-27 11:44:32 -0700179}
180
181__initcall(oops_nmi_register);
182
183#endif
184
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100185/*
186 * This gets called from entry.S when the watchdog has bitten. Show something
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300187 * similar to an Oops dump, and if the kernel is configured to be a nice
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100188 * doggy, then halt instead of reboot.
189 */
190void
191watchdog_bite_hook(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192{
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100193#ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
194 local_irq_disable();
195 stop_watchdog();
196 show_registers(regs);
197
198 while (1)
199 ; /* Do nothing. */
200#else
201 show_registers(regs);
202#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203}
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100204
205/* This is normally the Oops function. */
206void
207die_if_kernel(const char *str, struct pt_regs *regs, long err)
208{
209 if (user_mode(regs))
210 return;
211
212#ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
213 /*
214 * This printout might take too long and could trigger
215 * the watchdog normally. If NICE_DOGGY is set, simply
216 * stop the watchdog during the printout.
217 */
218 stop_watchdog();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219#endif
220
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100221 handle_BUG(regs);
222
223 printk("%s: %04lx\n", str, err & 0xffff);
224
225 show_registers(regs);
226
227 oops_in_progress = 0;
228
229#ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
230 reset_watchdog();
231#endif
232 do_exit(SIGSEGV);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700233}
234
Jesper Nilsson1ddba022007-11-30 14:11:29 +0100235void __init
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236trap_init(void)
237{
238 /* Nothing needs to be done */
239}