Linux Audio

Check our new training course

Loading...
v4.6
  1/*
  2 * Hardware exception handling
  3 *
  4 * Copyright (C) 2010 Tobias Klauser <tklauser@distanz.ch>
  5 * Copyright (C) 2004 Microtronix Datacom Ltd.
  6 * Copyright (C) 2001 Vic Phillips
  7 *
  8 * This file is subject to the terms and conditions of the GNU General
  9 * Public License.  See the file COPYING in the main directory of this
 10 * archive for more details.
 11 */
 12
 13#include <linux/sched.h>
 
 14#include <linux/kernel.h>
 15#include <linux/signal.h>
 16#include <linux/export.h>
 17#include <linux/mm.h>
 18#include <linux/ptrace.h>
 19
 20#include <asm/traps.h>
 21#include <asm/sections.h>
 22#include <asm/uaccess.h>
 23
 24static DEFINE_SPINLOCK(die_lock);
 25
 26static void _send_sig(int signo, int code, unsigned long addr)
 27{
 28	siginfo_t info;
 29
 30	info.si_signo = signo;
 31	info.si_errno = 0;
 32	info.si_code = code;
 33	info.si_addr = (void __user *) addr;
 34	force_sig_info(signo, &info, current);
 35}
 36
 37void die(const char *str, struct pt_regs *regs, long err)
 38{
 39	console_verbose();
 40	spin_lock_irq(&die_lock);
 41	pr_warn("Oops: %s, sig: %ld\n", str, err);
 42	show_regs(regs);
 43	spin_unlock_irq(&die_lock);
 44	/*
 45	 * do_exit() should take care of panic'ing from an interrupt
 46	 * context so we don't handle it here
 47	 */
 48	do_exit(err);
 49}
 50
 51void _exception(int signo, struct pt_regs *regs, int code, unsigned long addr)
 52{
 53	if (!user_mode(regs))
 54		die("Exception in kernel mode", regs, signo);
 55
 56	_send_sig(signo, code, addr);
 57}
 58
 59/*
 60 * The show_stack is an external API which we do not use ourselves.
 61 */
 62
 63int kstack_depth_to_print = 48;
 64
 65void show_stack(struct task_struct *task, unsigned long *stack)
 66{
 67	unsigned long *endstack, addr;
 68	int i;
 69
 70	if (!stack) {
 71		if (task)
 72			stack = (unsigned long *)task->thread.ksp;
 73		else
 74			stack = (unsigned long *)&stack;
 75	}
 76
 77	addr = (unsigned long) stack;
 78	endstack = (unsigned long *) PAGE_ALIGN(addr);
 79
 80	pr_emerg("Stack from %08lx:", (unsigned long)stack);
 81	for (i = 0; i < kstack_depth_to_print; i++) {
 82		if (stack + 1 > endstack)
 83			break;
 84		if (i % 8 == 0)
 85			pr_emerg("\n       ");
 86		pr_emerg(" %08lx", *stack++);
 87	}
 88
 89	pr_emerg("\nCall Trace:");
 90	i = 0;
 91	while (stack + 1 <= endstack) {
 92		addr = *stack++;
 93		/*
 94		 * If the address is either in the text segment of the
 95		 * kernel, or in the region which contains vmalloc'ed
 96		 * memory, it *may* be the address of a calling
 97		 * routine; if so, print it so that someone tracing
 98		 * down the cause of the crash will be able to figure
 99		 * out the call path that was taken.
100		 */
101		if (((addr >= (unsigned long) _stext) &&
102		     (addr <= (unsigned long) _etext))) {
103			if (i % 4 == 0)
104				pr_emerg("\n       ");
105			pr_emerg(" [<%08lx>]", addr);
106			i++;
107		}
108	}
109	pr_emerg("\n");
110}
111
112void __init trap_init(void)
113{
114	/* Nothing to do here */
115}
116
117/* Breakpoint handler */
118asmlinkage void breakpoint_c(struct pt_regs *fp)
119{
120	/*
121	 * The breakpoint entry code has moved the PC on by 4 bytes, so we must
122	 * move it back. This could be done on the host but we do it here
123	 * because monitor.S of JTAG gdbserver does it too.
124	 */
125	fp->ea -= 4;
126	_exception(SIGTRAP, fp, TRAP_BRKPT, fp->ea);
127}
128
129#ifndef CONFIG_NIOS2_ALIGNMENT_TRAP
130/* Alignment exception handler */
131asmlinkage void handle_unaligned_c(struct pt_regs *fp, int cause)
132{
133	unsigned long addr = RDCTL(CTL_BADADDR);
134
135	cause >>= 2;
136	fp->ea -= 4;
137
138	if (fixup_exception(fp))
139		return;
140
141	if (!user_mode(fp)) {
142		pr_alert("Unaligned access from kernel mode, this might be a hardware\n");
143		pr_alert("problem, dump registers and restart the instruction\n");
144		pr_alert("  BADADDR 0x%08lx\n", addr);
145		pr_alert("  cause   %d\n", cause);
146		pr_alert("  op-code 0x%08lx\n", *(unsigned long *)(fp->ea));
147		show_regs(fp);
148		return;
149	}
150
151	_exception(SIGBUS, fp, BUS_ADRALN, addr);
152}
153#endif /* CONFIG_NIOS2_ALIGNMENT_TRAP */
154
155/* Illegal instruction handler */
156asmlinkage void handle_illegal_c(struct pt_regs *fp)
157{
158	fp->ea -= 4;
159	_exception(SIGILL, fp, ILL_ILLOPC, fp->ea);
160}
161
162/* Supervisor instruction handler */
163asmlinkage void handle_supervisor_instr(struct pt_regs *fp)
164{
165	fp->ea -= 4;
166	_exception(SIGILL, fp, ILL_PRVOPC, fp->ea);
167}
168
169/* Division error handler */
170asmlinkage void handle_diverror_c(struct pt_regs *fp)
171{
172	fp->ea -= 4;
173	_exception(SIGFPE, fp, FPE_INTDIV, fp->ea);
174}
175
176/* Unhandled exception handler */
177asmlinkage void unhandled_exception(struct pt_regs *regs, int cause)
178{
179	unsigned long addr = RDCTL(CTL_BADADDR);
180
181	cause /= 4;
182
183	pr_emerg("Unhandled exception #%d in %s mode (badaddr=0x%08lx)\n",
184			cause, user_mode(regs) ? "user" : "kernel", addr);
185
186	regs->ea -= 4;
187	show_regs(regs);
188
189	pr_emerg("opcode: 0x%08lx\n", *(unsigned long *)(regs->ea));
190}
191
192asmlinkage void handle_trap_1_c(struct pt_regs *fp)
193{
194	_send_sig(SIGUSR1, 0, fp->ea);
195}
196
197asmlinkage void handle_trap_2_c(struct pt_regs *fp)
198{
199	_send_sig(SIGUSR2, 0, fp->ea);
200}
201
202asmlinkage void handle_trap_3_c(struct pt_regs *fp)
203{
204	_send_sig(SIGILL, ILL_ILLTRP, fp->ea);
205}
v5.4
  1/*
  2 * Hardware exception handling
  3 *
  4 * Copyright (C) 2010 Tobias Klauser <tklauser@distanz.ch>
  5 * Copyright (C) 2004 Microtronix Datacom Ltd.
  6 * Copyright (C) 2001 Vic Phillips
  7 *
  8 * This file is subject to the terms and conditions of the GNU General
  9 * Public License.  See the file COPYING in the main directory of this
 10 * archive for more details.
 11 */
 12
 13#include <linux/sched.h>
 14#include <linux/sched/debug.h>
 15#include <linux/kernel.h>
 16#include <linux/signal.h>
 17#include <linux/export.h>
 18#include <linux/mm.h>
 19#include <linux/ptrace.h>
 20
 21#include <asm/traps.h>
 22#include <asm/sections.h>
 23#include <linux/uaccess.h>
 24
 25static DEFINE_SPINLOCK(die_lock);
 26
 27static void _send_sig(int signo, int code, unsigned long addr)
 28{
 29	force_sig_fault(signo, code, (void __user *) addr);
 
 
 
 
 
 
 30}
 31
 32void die(const char *str, struct pt_regs *regs, long err)
 33{
 34	console_verbose();
 35	spin_lock_irq(&die_lock);
 36	pr_warn("Oops: %s, sig: %ld\n", str, err);
 37	show_regs(regs);
 38	spin_unlock_irq(&die_lock);
 39	/*
 40	 * do_exit() should take care of panic'ing from an interrupt
 41	 * context so we don't handle it here
 42	 */
 43	do_exit(err);
 44}
 45
 46void _exception(int signo, struct pt_regs *regs, int code, unsigned long addr)
 47{
 48	if (!user_mode(regs))
 49		die("Exception in kernel mode", regs, signo);
 50
 51	_send_sig(signo, code, addr);
 52}
 53
 54/*
 55 * The show_stack is an external API which we do not use ourselves.
 56 */
 57
 58int kstack_depth_to_print = 48;
 59
 60void show_stack(struct task_struct *task, unsigned long *stack)
 61{
 62	unsigned long *endstack, addr;
 63	int i;
 64
 65	if (!stack) {
 66		if (task)
 67			stack = (unsigned long *)task->thread.ksp;
 68		else
 69			stack = (unsigned long *)&stack;
 70	}
 71
 72	addr = (unsigned long) stack;
 73	endstack = (unsigned long *) PAGE_ALIGN(addr);
 74
 75	pr_emerg("Stack from %08lx:", (unsigned long)stack);
 76	for (i = 0; i < kstack_depth_to_print; i++) {
 77		if (stack + 1 > endstack)
 78			break;
 79		if (i % 8 == 0)
 80			pr_emerg("\n       ");
 81		pr_emerg(" %08lx", *stack++);
 82	}
 83
 84	pr_emerg("\nCall Trace:");
 85	i = 0;
 86	while (stack + 1 <= endstack) {
 87		addr = *stack++;
 88		/*
 89		 * If the address is either in the text segment of the
 90		 * kernel, or in the region which contains vmalloc'ed
 91		 * memory, it *may* be the address of a calling
 92		 * routine; if so, print it so that someone tracing
 93		 * down the cause of the crash will be able to figure
 94		 * out the call path that was taken.
 95		 */
 96		if (((addr >= (unsigned long) _stext) &&
 97		     (addr <= (unsigned long) _etext))) {
 98			if (i % 4 == 0)
 99				pr_emerg("\n       ");
100			pr_emerg(" [<%08lx>]", addr);
101			i++;
102		}
103	}
104	pr_emerg("\n");
105}
106
107void __init trap_init(void)
108{
109	/* Nothing to do here */
110}
111
112/* Breakpoint handler */
113asmlinkage void breakpoint_c(struct pt_regs *fp)
114{
115	/*
116	 * The breakpoint entry code has moved the PC on by 4 bytes, so we must
117	 * move it back. This could be done on the host but we do it here
118	 * because monitor.S of JTAG gdbserver does it too.
119	 */
120	fp->ea -= 4;
121	_exception(SIGTRAP, fp, TRAP_BRKPT, fp->ea);
122}
123
124#ifndef CONFIG_NIOS2_ALIGNMENT_TRAP
125/* Alignment exception handler */
126asmlinkage void handle_unaligned_c(struct pt_regs *fp, int cause)
127{
128	unsigned long addr = RDCTL(CTL_BADADDR);
129
130	cause >>= 2;
131	fp->ea -= 4;
132
133	if (fixup_exception(fp))
134		return;
135
136	if (!user_mode(fp)) {
137		pr_alert("Unaligned access from kernel mode, this might be a hardware\n");
138		pr_alert("problem, dump registers and restart the instruction\n");
139		pr_alert("  BADADDR 0x%08lx\n", addr);
140		pr_alert("  cause   %d\n", cause);
141		pr_alert("  op-code 0x%08lx\n", *(unsigned long *)(fp->ea));
142		show_regs(fp);
143		return;
144	}
145
146	_exception(SIGBUS, fp, BUS_ADRALN, addr);
147}
148#endif /* CONFIG_NIOS2_ALIGNMENT_TRAP */
149
150/* Illegal instruction handler */
151asmlinkage void handle_illegal_c(struct pt_regs *fp)
152{
153	fp->ea -= 4;
154	_exception(SIGILL, fp, ILL_ILLOPC, fp->ea);
155}
156
157/* Supervisor instruction handler */
158asmlinkage void handle_supervisor_instr(struct pt_regs *fp)
159{
160	fp->ea -= 4;
161	_exception(SIGILL, fp, ILL_PRVOPC, fp->ea);
162}
163
164/* Division error handler */
165asmlinkage void handle_diverror_c(struct pt_regs *fp)
166{
167	fp->ea -= 4;
168	_exception(SIGFPE, fp, FPE_INTDIV, fp->ea);
169}
170
171/* Unhandled exception handler */
172asmlinkage void unhandled_exception(struct pt_regs *regs, int cause)
173{
174	unsigned long addr = RDCTL(CTL_BADADDR);
175
176	cause /= 4;
177
178	pr_emerg("Unhandled exception #%d in %s mode (badaddr=0x%08lx)\n",
179			cause, user_mode(regs) ? "user" : "kernel", addr);
180
181	regs->ea -= 4;
182	show_regs(regs);
183
184	pr_emerg("opcode: 0x%08lx\n", *(unsigned long *)(regs->ea));
185}
186
187asmlinkage void handle_trap_1_c(struct pt_regs *fp)
188{
189	_send_sig(SIGUSR1, 0, fp->ea);
190}
191
192asmlinkage void handle_trap_2_c(struct pt_regs *fp)
193{
194	_send_sig(SIGUSR2, 0, fp->ea);
195}
196
197asmlinkage void handle_trap_3_c(struct pt_regs *fp)
198{
199	_send_sig(SIGILL, ILL_ILLTRP, fp->ea);
200}