1 // SPDX-License-Identifier: GPL-2.0
2 // Copyright (C) 2005-2017 Andes Technology Corporation
4 #include <linux/module.h>
5 #include <linux/personality.h>
6 #include <linux/kallsyms.h>
7 #include <linux/hardirq.h>
8 #include <linux/kdebug.h>
9 #include <linux/sched/task_stack.h>
10 #include <linux/uaccess.h>
11 #include <linux/ftrace.h>
13 #include <asm/proc-fns.h>
14 #include <asm/unistd.h>
17 #include <linux/ptrace.h>
18 #include <nds32_intrinsic.h>
20 extern void show_pte(struct mm_struct
*mm
, unsigned long addr
);
23 * Dump out the contents of some memory nicely...
25 void dump_mem(const char *lvl
, unsigned long bottom
, unsigned long top
)
32 * We need to switch to kernel mode so that we can use __get_user
33 * to safely read from kernel space. Note that we now dump the
34 * code first, just in case the backtrace kills us.
39 pr_emerg("%s(0x%08lx to 0x%08lx)\n", lvl
, bottom
, top
);
41 for (first
= bottom
& ~31; first
< top
; first
+= 32) {
43 char str
[sizeof(" 12345678") * 8 + 1];
45 memset(str
, ' ', sizeof(str
));
46 str
[sizeof(str
) - 1] = '\0';
48 for (p
= first
, i
= 0; i
< 8 && p
< top
; i
++, p
+= 4) {
49 if (p
>= bottom
&& p
< top
) {
51 if (__get_user(val
, (unsigned long *)p
) == 0)
52 sprintf(str
+ i
* 9, " %08lx", val
);
54 sprintf(str
+ i
* 9, " ????????");
57 pr_emerg("%s%04lx:%s\n", lvl
, first
& 0xffff, str
);
63 EXPORT_SYMBOL(dump_mem
);
65 static void dump_instr(struct pt_regs
*regs
)
67 unsigned long addr
= instruction_pointer(regs
);
69 char str
[sizeof("00000000 ") * 5 + 2 + 1], *p
= str
;
74 * We need to switch to kernel mode so that we can use __get_user
75 * to safely read from kernel space. Note that we now dump the
76 * code first, just in case the backtrace kills us.
82 for (i
= -4; i
< 1; i
++) {
83 unsigned int val
, bad
;
85 bad
= __get_user(val
, &((u32
*) addr
)[i
]);
88 p
+= sprintf(p
, i
== 0 ? "(%08x) " : "%08x ", val
);
90 p
+= sprintf(p
, "bad PC value");
94 pr_emerg("Code: %s\n", str
);
99 #define LOOP_TIMES (100)
100 static void __dump(struct task_struct
*tsk
, unsigned long *base_reg
,
103 unsigned long ret_addr
;
104 int cnt
= LOOP_TIMES
, graph
= 0;
105 printk("%sCall Trace:\n", loglvl
);
106 if (!IS_ENABLED(CONFIG_FRAME_POINTER
)) {
107 while (!kstack_end(base_reg
)) {
108 ret_addr
= *base_reg
++;
109 if (__kernel_text_address(ret_addr
)) {
110 ret_addr
= ftrace_graph_ret_addr(
111 tsk
, &graph
, ret_addr
, NULL
);
112 print_ip_sym(loglvl
, ret_addr
);
118 while (!kstack_end((void *)base_reg
) &&
119 !((unsigned long)base_reg
& 0x3) &&
120 ((unsigned long)base_reg
>= TASK_SIZE
)) {
121 unsigned long next_fp
;
122 ret_addr
= base_reg
[LP_OFFSET
];
123 next_fp
= base_reg
[FP_OFFSET
];
124 if (__kernel_text_address(ret_addr
)) {
126 ret_addr
= ftrace_graph_ret_addr(
127 tsk
, &graph
, ret_addr
, NULL
);
128 print_ip_sym(loglvl
, ret_addr
);
132 base_reg
= (unsigned long *)next_fp
;
135 printk("%s\n", loglvl
);
138 void show_stack(struct task_struct
*tsk
, unsigned long *sp
, const char *loglvl
)
140 unsigned long *base_reg
;
144 if (!IS_ENABLED(CONFIG_FRAME_POINTER
)) {
146 base_reg
= (unsigned long *)(tsk
->thread
.cpu_context
.sp
);
148 __asm__
__volatile__("\tori\t%0, $sp, #0\n":"=r"(base_reg
));
151 base_reg
= (unsigned long *)(tsk
->thread
.cpu_context
.fp
);
153 __asm__
__volatile__("\tori\t%0, $fp, #0\n":"=r"(base_reg
));
155 __dump(tsk
, base_reg
, loglvl
);
159 DEFINE_SPINLOCK(die_lock
);
162 * This function is protected against re-entrancy.
164 void die(const char *str
, struct pt_regs
*regs
, int err
)
166 struct task_struct
*tsk
= current
;
167 static int die_counter
;
170 spin_lock_irq(&die_lock
);
173 pr_emerg("Internal error: %s: %x [#%d]\n", str
, err
, ++die_counter
);
175 pr_emerg("CPU: %i\n", smp_processor_id());
177 pr_emerg("Process %s (pid: %d, stack limit = 0x%p)\n",
178 tsk
->comm
, tsk
->pid
, end_of_stack(tsk
));
180 if (!user_mode(regs
) || in_interrupt()) {
181 dump_mem("Stack: ", regs
->sp
, (regs
->sp
+ PAGE_SIZE
) & PAGE_MASK
);
187 spin_unlock_irq(&die_lock
);
193 void die_if_kernel(const char *str
, struct pt_regs
*regs
, int err
)
201 int bad_syscall(int n
, struct pt_regs
*regs
)
203 if (current
->personality
!= PER_LINUX
) {
204 send_sig(SIGSEGV
, current
, 1);
205 return regs
->uregs
[0];
208 force_sig_fault(SIGILL
, ILL_ILLTRP
,
209 (void __user
*)instruction_pointer(regs
) - 4);
210 die_if_kernel("Oops - bad syscall", regs
, n
);
211 return regs
->uregs
[0];
214 void __pte_error(const char *file
, int line
, unsigned long val
)
216 pr_emerg("%s:%d: bad pte %08lx.\n", file
, line
, val
);
219 void __pmd_error(const char *file
, int line
, unsigned long val
)
221 pr_emerg("%s:%d: bad pmd %08lx.\n", file
, line
, val
);
224 void __pgd_error(const char *file
, int line
, unsigned long val
)
226 pr_emerg("%s:%d: bad pgd %08lx.\n", file
, line
, val
);
229 extern char *exception_vector
, *exception_vector_end
;
230 void __init
trap_init(void)
235 void __init
early_trap_init(void)
237 unsigned long ivb
= 0;
238 unsigned long base
= PAGE_OFFSET
;
240 memcpy((unsigned long *)base
, (unsigned long *)&exception_vector
,
241 ((unsigned long)&exception_vector_end
-
242 (unsigned long)&exception_vector
));
243 ivb
= __nds32__mfsr(NDS32_SR_IVB
);
244 /* Check platform support. */
245 if (((ivb
& IVB_mskNIVIC
) >> IVB_offNIVIC
) < 2)
247 ("IVIC mode is not allowed on the platform with interrupt controller\n");
248 __nds32__mtsr((ivb
& ~IVB_mskESZ
) | (IVB_valESZ16
<< IVB_offESZ
) |
249 IVB_BASE
, NDS32_SR_IVB
);
250 __nds32__mtsr(INT_MASK_INITAIAL_VAL
, NDS32_SR_INT_MASK
);
253 * 0x800 = 128 vectors * 16byte.
254 * It should be enough to flush a page.
256 cpu_cache_wbinval_page(base
, true);
259 static void send_sigtrap(struct pt_regs
*regs
, int error_code
, int si_code
)
261 struct task_struct
*tsk
= current
;
263 tsk
->thread
.trap_no
= ENTRY_DEBUG_RELATED
;
264 tsk
->thread
.error_code
= error_code
;
266 force_sig_fault(SIGTRAP
, si_code
,
267 (void __user
*)instruction_pointer(regs
));
270 void do_debug_trap(unsigned long entry
, unsigned long addr
,
271 unsigned long type
, struct pt_regs
*regs
)
273 if (notify_die(DIE_OOPS
, "Oops", regs
, addr
, type
, SIGTRAP
)
277 if (user_mode(regs
)) {
279 send_sigtrap(regs
, 0, TRAP_BRKPT
);
282 if (!fixup_exception(regs
))
283 die("unexpected kernel_trap", regs
, 0);
287 void unhandled_interruption(struct pt_regs
*regs
)
289 pr_emerg("unhandled_interruption\n");
291 if (!user_mode(regs
))
296 void unhandled_exceptions(unsigned long entry
, unsigned long addr
,
297 unsigned long type
, struct pt_regs
*regs
)
299 pr_emerg("Unhandled Exception: entry: %lx addr:%lx itype:%lx\n", entry
,
302 if (!user_mode(regs
))
307 extern int do_page_fault(unsigned long entry
, unsigned long addr
,
308 unsigned int error_code
, struct pt_regs
*regs
);
311 * 2:DEF dispatch for TLB MISC exception handler
314 void do_dispatch_tlb_misc(unsigned long entry
, unsigned long addr
,
315 unsigned long type
, struct pt_regs
*regs
)
317 type
= type
& (ITYPE_mskINST
| ITYPE_mskETYPE
);
318 if ((type
& ITYPE_mskETYPE
) < 5) {
319 /* Permission exceptions */
320 do_page_fault(entry
, addr
, type
, regs
);
322 unhandled_exceptions(entry
, addr
, type
, regs
);
325 void do_revinsn(struct pt_regs
*regs
)
327 pr_emerg("Reserved Instruction\n");
329 if (!user_mode(regs
))
334 #ifdef CONFIG_ALIGNMENT_TRAP
335 extern int unalign_access_mode
;
336 extern int do_unaligned_access(unsigned long addr
, struct pt_regs
*regs
);
338 void do_dispatch_general(unsigned long entry
, unsigned long addr
,
339 unsigned long itype
, struct pt_regs
*regs
,
342 unsigned int swid
= itype
>> ITYPE_offSWID
;
343 unsigned long type
= itype
& (ITYPE_mskINST
| ITYPE_mskETYPE
);
344 if (type
== ETYPE_ALIGNMENT_CHECK
) {
345 #ifdef CONFIG_ALIGNMENT_TRAP
346 /* Alignment check */
347 if (user_mode(regs
) && unalign_access_mode
) {
349 ret
= do_unaligned_access(addr
, regs
);
356 ("Unhandled unaligned access exception\n");
359 do_page_fault(entry
, addr
, type
, regs
);
360 } else if (type
== ETYPE_RESERVED_INSTRUCTION
) {
361 /* Reserved instruction */
363 } else if (type
== ETYPE_COPROCESSOR
) {
365 #if IS_ENABLED(CONFIG_FPU)
366 unsigned int fucop_exist
= __nds32__mfsr(NDS32_SR_FUCOP_EXIST
);
367 unsigned int cpid
= ((itype
& ITYPE_mskCPID
) >> ITYPE_offCPID
);
369 if ((cpid
== FPU_CPID
) &&
370 (fucop_exist
& FUCOP_EXIST_mskCP0ISFPU
)) {
371 unsigned int subtype
= (itype
& ITYPE_mskSTYPE
);
373 if (true == do_fpu_exception(subtype
, regs
))
377 unhandled_exceptions(entry
, addr
, type
, regs
);
378 } else if (type
== ETYPE_TRAP
&& swid
== SWID_RAISE_INTERRUPT_LEVEL
) {
379 /* trap, used on v3 EDM target debugging workaround */
381 * DIPC(OIPC) is passed as parameter before
382 * interrupt is enabled, so the DIPC will not be corrupted
383 * even though interrupts are coming in
387 * 2. update pt_regs ipc with oipc
388 * 3. update pt_regs ipsw (clear DEX)
390 __asm__
volatile ("mtsr %0, $IPC\n\t"::"r" (oipc
));
392 if (regs
->pipsw
& PSW_mskDEX
) {
394 ("Nested Debug exception is possibly happened\n");
395 pr_emerg("ipc:%08x pipc:%08x\n",
396 (unsigned int)regs
->ipc
,
397 (unsigned int)regs
->pipc
);
399 do_debug_trap(entry
, addr
, itype
, regs
);
400 regs
->ipsw
&= ~PSW_mskDEX
;
402 unhandled_exceptions(entry
, addr
, type
, regs
);