Linux 2.6.13-rc4
[linux-2.6/next.git] / arch / cris / arch-v10 / kernel / traps.c
blob34a27ea2052d10d28c73028fdce564822193a122
1 /* $Id: traps.c,v 1.4 2005/04/24 18:47:55 starvik Exp $
3 * linux/arch/cris/arch-v10/traps.c
5 * Heler functions for trap handlers
6 *
7 * Copyright (C) 2000-2002 Axis Communications AB
9 * Authors: Bjorn Wesen
10 * Hans-Peter Nilsson
14 #include <linux/config.h>
15 #include <linux/ptrace.h>
16 #include <asm/uaccess.h>
17 #include <asm/arch/sv_addr_ag.h>
19 extern int raw_printk(const char *fmt, ...);
21 void
22 show_registers(struct pt_regs * regs)
24 /* We either use rdusp() - the USP register, which might not
25 correspond to the current process for all cases we're called,
26 or we use the current->thread.usp, which is not up to date for
27 the current process. Experience shows we want the USP
28 register. */
29 unsigned long usp = rdusp();
31 raw_printk("IRP: %08lx SRP: %08lx DCCR: %08lx USP: %08lx MOF: %08lx\n",
32 regs->irp, regs->srp, regs->dccr, usp, regs->mof );
33 raw_printk(" r0: %08lx r1: %08lx r2: %08lx r3: %08lx\n",
34 regs->r0, regs->r1, regs->r2, regs->r3);
35 raw_printk(" r4: %08lx r5: %08lx r6: %08lx r7: %08lx\n",
36 regs->r4, regs->r5, regs->r6, regs->r7);
37 raw_printk(" r8: %08lx r9: %08lx r10: %08lx r11: %08lx\n",
38 regs->r8, regs->r9, regs->r10, regs->r11);
39 raw_printk("r12: %08lx r13: %08lx oR10: %08lx sp: %08lx\n",
40 regs->r12, regs->r13, regs->orig_r10, regs);
41 raw_printk("R_MMU_CAUSE: %08lx\n", (unsigned long)*R_MMU_CAUSE);
42 raw_printk("Process %s (pid: %d, stackpage=%08lx)\n",
43 current->comm, current->pid, (unsigned long)current);
46 * When in-kernel, we also print out the stack and code at the
47 * time of the fault..
49 if (! user_mode(regs)) {
50 int i;
52 show_stack(NULL, (unsigned long*)usp);
54 /* Dump kernel stack if the previous dump wasn't one. */
55 if (usp != 0)
56 show_stack (NULL, NULL);
58 raw_printk("\nCode: ");
59 if(regs->irp < PAGE_OFFSET)
60 goto bad;
62 /* Often enough the value at regs->irp does not point to
63 the interesting instruction, which is most often the
64 _previous_ instruction. So we dump at an offset large
65 enough that instruction decoding should be in sync at
66 the interesting point, but small enough to fit on a row
67 (sort of). We point out the regs->irp location in a
68 ksymoops-friendly way by wrapping the byte for that
69 address in parentheses. */
70 for(i = -12; i < 12; i++)
72 unsigned char c;
73 if(__get_user(c, &((unsigned char*)regs->irp)[i])) {
74 bad:
75 raw_printk(" Bad IP value.");
76 break;
79 if (i == 0)
80 raw_printk("(%02x) ", c);
81 else
82 raw_printk("%02x ", c);
84 raw_printk("\n");
88 /* Called from entry.S when the watchdog has bitten
89 * We print out something resembling an oops dump, and if
90 * we have the nice doggy development flag set, we halt here
91 * instead of rebooting.
94 extern void reset_watchdog(void);
95 extern void stop_watchdog(void);
98 void
99 watchdog_bite_hook(struct pt_regs *regs)
101 #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
102 local_irq_disable();
103 stop_watchdog();
104 show_registers(regs);
105 while(1) /* nothing */;
106 #else
107 show_registers(regs);
108 #endif
111 /* This is normally the 'Oops' routine */
112 void
113 die_if_kernel(const char * str, struct pt_regs * regs, long err)
115 if(user_mode(regs))
116 return;
118 #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
119 /* This printout might take too long and trigger the
120 * watchdog normally. If we're in the nice doggy
121 * development mode, stop the watchdog during printout.
123 stop_watchdog();
124 #endif
126 raw_printk("%s: %04lx\n", str, err & 0xffff);
128 show_registers(regs);
130 #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
131 reset_watchdog();
132 #endif
133 do_exit(SIGSEGV);
136 void arch_enable_nmi(void)
138 asm volatile("setf m");