1 /* traps.c: high-level exception handler for FR-V
3 * Copyright (C) 2003 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
12 #include <linux/sched.h>
13 #include <linux/signal.h>
14 #include <linux/kernel.h>
16 #include <linux/types.h>
17 #include <linux/user.h>
18 #include <linux/string.h>
19 #include <linux/linkage.h>
20 #include <linux/init.h>
21 #include <linux/module.h>
23 #include <asm/asm-offsets.h>
24 #include <asm/setup.h>
26 #include <asm/system.h>
27 #include <asm/uaccess.h>
28 #include <asm/pgtable.h>
29 #include <asm/siginfo.h>
30 #include <asm/unaligned.h>
32 void show_backtrace(struct pt_regs *, unsigned long);
34 extern asmlinkage void __break_hijack_kernel_event(void);
36 /*****************************************************************************/
38 * instruction access error
40 asmlinkage void insn_access_error(unsigned long esfr1, unsigned long epcr0, unsigned long esr0)
44 die_if_kernel("-- Insn Access Error --\n"
49 info.si_signo = SIGSEGV;
50 info.si_code = SEGV_ACCERR;
52 info.si_addr = (void __user *) ((epcr0 & EPCR0_V) ? (epcr0 & EPCR0_PC) : __frame->pc);
54 force_sig_info(info.si_signo, &info, current);
55 } /* end insn_access_error() */
57 /*****************************************************************************/
60 * - illegal instruction
61 * - privileged instruction
65 asmlinkage void illegal_instruction(unsigned long esfr1, unsigned long epcr0, unsigned long esr0)
69 die_if_kernel("-- Illegal Instruction --\n"
76 info.si_addr = (void __user *) ((epcr0 & EPCR0_V) ? (epcr0 & EPCR0_PC) : __frame->pc);
78 switch (__frame->tbr & TBR_TT) {
79 case TBR_TT_ILLEGAL_INSTR:
80 info.si_signo = SIGILL;
81 info.si_code = ILL_ILLOPC;
83 case TBR_TT_PRIV_INSTR:
84 info.si_signo = SIGILL;
85 info.si_code = ILL_PRVOPC;
87 case TBR_TT_TRAP2 ... TBR_TT_TRAP126:
88 info.si_signo = SIGILL;
89 info.si_code = ILL_ILLTRP;
91 /* GDB uses "tira gr0, #1" as a breakpoint instruction. */
94 info.si_signo = SIGTRAP;
96 (__frame->__status & REG__STATUS_STEPPED) ? TRAP_TRACE : TRAP_BRKPT;
100 force_sig_info(info.si_signo, &info, current);
101 } /* end illegal_instruction() */
103 /*****************************************************************************/
105 * handle atomic operations with errors
106 * - arguments in gr8, gr9, gr10
107 * - original memory value placed in gr5
108 * - replacement memory value placed in gr9
110 asmlinkage void atomic_operation(unsigned long esfr1, unsigned long epcr0,
113 static DEFINE_SPINLOCK(atomic_op_lock);
114 unsigned long x, y, z;
115 unsigned long __user *p;
124 if (!user_mode(__frame))
127 switch (__frame->tbr & TBR_TT) {
129 * u32 __atomic_user_cmpxchg32(u32 *ptr, u32 test, u32 new)
131 case TBR_TT_ATOMIC_CMPXCHG32:
132 p = (unsigned long __user *) __frame->gr8;
137 ret = get_user(z, p);
144 spin_lock_irq(&atomic_op_lock);
146 if (__get_user(z, p) == 0) {
150 if (__put_user(y, p) == 0)
155 spin_unlock_irq(&atomic_op_lock);
159 * u32 __atomic_kernel_xchg32(void *v, u32 new)
161 case TBR_TT_ATOMIC_XCHG32:
162 p = (unsigned long __user *) __frame->gr8;
166 ret = get_user(z, p);
170 spin_lock_irq(&atomic_op_lock);
172 if (__get_user(z, p) == 0) {
173 if (__put_user(y, p) == 0)
178 spin_unlock_irq(&atomic_op_lock);
182 * ulong __atomic_kernel_XOR_return(ulong i, ulong *v)
184 case TBR_TT_ATOMIC_XOR:
185 p = (unsigned long __user *) __frame->gr8;
189 ret = get_user(z, p);
193 spin_lock_irq(&atomic_op_lock);
195 if (__get_user(z, p) == 0) {
197 if (__put_user(y, p) == 0)
202 spin_unlock_irq(&atomic_op_lock);
206 * ulong __atomic_kernel_OR_return(ulong i, ulong *v)
208 case TBR_TT_ATOMIC_OR:
209 p = (unsigned long __user *) __frame->gr8;
213 ret = get_user(z, p);
217 spin_lock_irq(&atomic_op_lock);
219 if (__get_user(z, p) == 0) {
221 if (__put_user(y, p) == 0)
226 spin_unlock_irq(&atomic_op_lock);
230 * ulong __atomic_kernel_AND_return(ulong i, ulong *v)
232 case TBR_TT_ATOMIC_AND:
233 p = (unsigned long __user *) __frame->gr8;
237 ret = get_user(z, p);
241 spin_lock_irq(&atomic_op_lock);
243 if (__get_user(z, p) == 0) {
245 if (__put_user(y, p) == 0)
250 spin_unlock_irq(&atomic_op_lock);
254 * int __atomic_user_sub_return(atomic_t *v, int i)
256 case TBR_TT_ATOMIC_SUB:
257 p = (unsigned long __user *) __frame->gr8;
261 ret = get_user(z, p);
265 spin_lock_irq(&atomic_op_lock);
267 if (__get_user(z, p) == 0) {
269 if (__put_user(y, p) == 0)
274 spin_unlock_irq(&atomic_op_lock);
278 * int __atomic_user_add_return(atomic_t *v, int i)
280 case TBR_TT_ATOMIC_ADD:
281 p = (unsigned long __user *) __frame->gr8;
285 ret = get_user(z, p);
289 spin_lock_irq(&atomic_op_lock);
291 if (__get_user(z, p) == 0) {
293 if (__put_user(y, p) == 0)
298 spin_unlock_irq(&atomic_op_lock);
306 spin_unlock_irq(&atomic_op_lock);
308 if (!user_mode(__frame))
315 spin_unlock_irq(&atomic_op_lock);
317 if (!user_mode(__frame))
321 die_if_kernel("-- Atomic Op Error --\n");
323 info.si_signo = SIGSEGV;
324 info.si_code = SEGV_ACCERR;
326 info.si_addr = (void __user *) __frame->pc;
328 force_sig_info(info.si_signo, &info, current);
331 /*****************************************************************************/
335 asmlinkage void media_exception(unsigned long msr0, unsigned long msr1)
339 die_if_kernel("-- Media Exception --\n"
344 info.si_signo = SIGFPE;
345 info.si_code = FPE_MDAOVF;
347 info.si_addr = (void __user *) __frame->pc;
349 force_sig_info(info.si_signo, &info, current);
350 } /* end media_exception() */
352 /*****************************************************************************/
354 * instruction or data access exception
356 asmlinkage void memory_access_exception(unsigned long esr0,
365 if ((esr0 & ESRx_EC) == ESRx_EC_DATA_ACCESS)
366 if (handle_misalignment(esr0, ear0, epcr0) == 0)
369 if ((fixup = search_exception_table(__frame->pc)) != 0) {
375 die_if_kernel("-- Memory Access Exception --\n"
381 info.si_signo = SIGSEGV;
382 info.si_code = SEGV_ACCERR;
386 if ((esr0 & (ESRx_VALID | ESR0_EAV)) == (ESRx_VALID | ESR0_EAV))
387 info.si_addr = (void __user *) ear0;
389 force_sig_info(info.si_signo, &info, current);
391 } /* end memory_access_exception() */
393 /*****************************************************************************/
396 * - double-word data load from CPU control area (0xFExxxxxx)
397 * - read performed on inactive or self-refreshing SDRAM
398 * - error notification from slave device
399 * - misaligned address
400 * - access to out of bounds memory region
401 * - user mode accessing privileged memory region
402 * - write to R/O memory region
404 asmlinkage void data_access_error(unsigned long esfr1, unsigned long esr15, unsigned long ear15)
408 die_if_kernel("-- Data Access Error --\n"
413 info.si_signo = SIGSEGV;
414 info.si_code = SEGV_ACCERR;
416 info.si_addr = (void __user *)
417 (((esr15 & (ESRx_VALID|ESR15_EAV)) == (ESRx_VALID|ESR15_EAV)) ? ear15 : 0);
419 force_sig_info(info.si_signo, &info, current);
420 } /* end data_access_error() */
422 /*****************************************************************************/
424 * data store error - should only happen if accessing inactive or self-refreshing SDRAM
426 asmlinkage void data_store_error(unsigned long esfr1, unsigned long esr15)
428 die_if_kernel("-- Data Store Error --\n"
432 } /* end data_store_error() */
434 /*****************************************************************************/
438 asmlinkage void division_exception(unsigned long esfr1, unsigned long esr0, unsigned long isr)
442 die_if_kernel("-- Division Exception --\n"
447 info.si_signo = SIGFPE;
448 info.si_code = FPE_INTDIV;
450 info.si_addr = (void __user *) __frame->pc;
452 force_sig_info(info.si_signo, &info, current);
453 } /* end division_exception() */
455 /*****************************************************************************/
459 asmlinkage void compound_exception(unsigned long esfr1,
460 unsigned long esr0, unsigned long esr14, unsigned long esr15,
461 unsigned long msr0, unsigned long msr1)
463 die_if_kernel("-- Compound Exception --\n"
469 esr0, esr14, esr15, msr0, msr1);
471 } /* end compound_exception() */
473 /*****************************************************************************/
475 * The architecture-independent backtrace generator
477 void dump_stack(void)
479 show_stack(NULL, NULL);
482 EXPORT_SYMBOL(dump_stack);
484 void show_stack(struct task_struct *task, unsigned long *sp)
488 void show_trace_task(struct task_struct *tsk)
490 printk("CONTEXT: stack=0x%lx frame=0x%p LR=0x%lx RET=0x%lx\n",
491 tsk->thread.sp, tsk->thread.frame, tsk->thread.lr, tsk->thread.sched_lr);
494 static const char *regnames[] = {
495 "PSR ", "ISR ", "CCR ", "CCCR",
496 "LR ", "LCR ", "PC ", "_stt",
497 "sys ", "GR8*", "GNE0", "GNE1",
499 "TBR ", "SP ", "FP ", "GR3 ",
500 "GR4 ", "GR5 ", "GR6 ", "GR7 ",
501 "GR8 ", "GR9 ", "GR10", "GR11",
502 "GR12", "GR13", "GR14", "GR15",
503 "GR16", "GR17", "GR18", "GR19",
504 "GR20", "GR21", "GR22", "GR23",
505 "GR24", "GR25", "GR26", "GR27",
506 "EFRM", "CURR", "GR30", "BFRM"
509 void show_regs(struct pt_regs *regs)
516 printk("Frame: @%08lx [%s]\n",
517 (unsigned long) regs,
518 regs->psr & PSR_S ? "kernel" : "user");
520 reg = (unsigned long *) regs;
521 for (loop = 0; loop < NR_PT_REGS; loop++) {
522 printk("%s %08lx", regnames[loop + 0], reg[loop + 0]);
524 if (loop == NR_PT_REGS - 1 || loop % 5 == 4)
530 printk("Process %s (pid: %d)\n", current->comm, current->pid);
533 void die_if_kernel(const char *str, ...)
538 if (user_mode(__frame))
542 vsprintf(buffer, str, va);
546 printk("\n===================================\n");
547 printk("%s\n", buffer);
548 show_backtrace(__frame, 0);
550 __break_hijack_kernel_event();
554 /*****************************************************************************/
556 * dump the contents of an exception frame
558 static void show_backtrace_regs(struct pt_regs *frame)
563 /* print the registers for this frame */
564 printk("<-- %s Frame: @%p -->\n",
565 frame->psr & PSR_S ? "Kernel Mode" : "User Mode",
568 reg = (unsigned long *) frame;
569 for (loop = 0; loop < NR_PT_REGS; loop++) {
570 printk("%s %08lx", regnames[loop + 0], reg[loop + 0]);
572 if (loop == NR_PT_REGS - 1 || loop % 5 == 4)
578 printk("--------\n");
579 } /* end show_backtrace_regs() */
581 /*****************************************************************************/
583 * generate a backtrace of the kernel stack
585 void show_backtrace(struct pt_regs *frame, unsigned long sp)
587 struct pt_regs *frame0;
588 unsigned long tos = 0, stop = 0, base;
591 base = ((((unsigned long) frame) + 8191) & ~8191) - sizeof(struct user_context);
592 frame0 = (struct pt_regs *) base;
596 stop = (unsigned long) frame;
599 printk("\nProcess %s (pid: %d)\n\n", current->comm, current->pid);
602 /* dump stack segment between frames */
603 //printk("%08lx -> %08lx\n", tos, stop);
607 printk(" %04lx :", tos & 0xffff);
609 printk(" %08lx", *(unsigned long *) tos);
622 /* dump frame 0 outside of the loop */
627 if (((unsigned long) frame) + sizeof(*frame) != tos) {
628 printk("-- TOS %08lx does not follow frame %p --\n",
633 show_backtrace_regs(frame);
635 /* dump the stack between this frame and the next */
636 stop = (unsigned long) frame->next_frame;
640 (stop < base && stop + sizeof(*frame) > base) ||
642 printk("-- next_frame %08lx is invalid (range %08lx-%08lx) --\n",
647 /* move to next frame */
648 frame = frame->next_frame;
651 /* we can always dump frame 0, even if the rest of the stack is corrupt */
652 show_backtrace_regs(frame0);
654 } /* end show_backtrace() */
656 /*****************************************************************************/
660 void __init trap_init (void)
662 } /* end trap_init() */