1 /* traps.c: high-level exception handler for FR-V
3 * Copyright (C) 2003 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
12 #include <linux/sched/signal.h>
13 #include <linux/sched/debug.h>
14 #include <linux/signal.h>
15 #include <linux/kernel.h>
17 #include <linux/types.h>
18 #include <linux/user.h>
19 #include <linux/string.h>
20 #include <linux/linkage.h>
21 #include <linux/init.h>
22 #include <linux/module.h>
24 #include <asm/asm-offsets.h>
25 #include <asm/setup.h>
27 #include <linux/uaccess.h>
28 #include <asm/pgtable.h>
29 #include <asm/siginfo.h>
30 #include <asm/unaligned.h>
32 void show_backtrace(struct pt_regs
*, unsigned long);
34 extern asmlinkage
void __break_hijack_kernel_event(void);
36 /*****************************************************************************/
38 * instruction access error
40 asmlinkage
void insn_access_error(unsigned long esfr1
, unsigned long epcr0
, unsigned long esr0
)
44 die_if_kernel("-- Insn Access Error --\n"
49 info
.si_signo
= SIGSEGV
;
50 info
.si_code
= SEGV_ACCERR
;
52 info
.si_addr
= (void __user
*) ((epcr0
& EPCR0_V
) ? (epcr0
& EPCR0_PC
) : __frame
->pc
);
54 force_sig_info(info
.si_signo
, &info
, current
);
55 } /* end insn_access_error() */
57 /*****************************************************************************/
60 * - illegal instruction
61 * - privileged instruction
65 asmlinkage
void illegal_instruction(unsigned long esfr1
, unsigned long epcr0
, unsigned long esr0
)
69 die_if_kernel("-- Illegal Instruction --\n"
76 info
.si_addr
= (void __user
*) ((epcr0
& EPCR0_V
) ? (epcr0
& EPCR0_PC
) : __frame
->pc
);
78 switch (__frame
->tbr
& TBR_TT
) {
79 case TBR_TT_ILLEGAL_INSTR
:
80 info
.si_signo
= SIGILL
;
81 info
.si_code
= ILL_ILLOPC
;
83 case TBR_TT_PRIV_INSTR
:
84 info
.si_signo
= SIGILL
;
85 info
.si_code
= ILL_PRVOPC
;
87 case TBR_TT_TRAP2
... TBR_TT_TRAP126
:
88 info
.si_signo
= SIGILL
;
89 info
.si_code
= ILL_ILLTRP
;
91 /* GDB uses "tira gr0, #1" as a breakpoint instruction. */
94 info
.si_signo
= SIGTRAP
;
96 (__frame
->__status
& REG__STATUS_STEPPED
) ? TRAP_TRACE
: TRAP_BRKPT
;
100 force_sig_info(info
.si_signo
, &info
, current
);
101 } /* end illegal_instruction() */
103 /*****************************************************************************/
105 * handle atomic operations with errors
106 * - arguments in gr8, gr9, gr10
107 * - original memory value placed in gr5
108 * - replacement memory value placed in gr9
110 asmlinkage
void atomic_operation(unsigned long esfr1
, unsigned long epcr0
,
113 static DEFINE_SPINLOCK(atomic_op_lock
);
114 unsigned long x
, y
, z
;
115 unsigned long __user
*p
;
124 if (!user_mode(__frame
))
127 switch (__frame
->tbr
& TBR_TT
) {
129 * u32 __atomic_user_cmpxchg32(u32 *ptr, u32 test, u32 new)
131 case TBR_TT_ATOMIC_CMPXCHG32
:
132 p
= (unsigned long __user
*) __frame
->gr8
;
137 ret
= get_user(z
, p
);
144 spin_lock_irq(&atomic_op_lock
);
146 if (__get_user(z
, p
) == 0) {
150 if (__put_user(y
, p
) == 0)
155 spin_unlock_irq(&atomic_op_lock
);
159 * u32 __atomic_kernel_xchg32(void *v, u32 new)
161 case TBR_TT_ATOMIC_XCHG32
:
162 p
= (unsigned long __user
*) __frame
->gr8
;
166 ret
= get_user(z
, p
);
170 spin_lock_irq(&atomic_op_lock
);
172 if (__get_user(z
, p
) == 0) {
173 if (__put_user(y
, p
) == 0)
178 spin_unlock_irq(&atomic_op_lock
);
182 * ulong __atomic_kernel_XOR_return(ulong i, ulong *v)
184 case TBR_TT_ATOMIC_XOR
:
185 p
= (unsigned long __user
*) __frame
->gr8
;
189 ret
= get_user(z
, p
);
193 spin_lock_irq(&atomic_op_lock
);
195 if (__get_user(z
, p
) == 0) {
197 if (__put_user(y
, p
) == 0)
202 spin_unlock_irq(&atomic_op_lock
);
206 * ulong __atomic_kernel_OR_return(ulong i, ulong *v)
208 case TBR_TT_ATOMIC_OR
:
209 p
= (unsigned long __user
*) __frame
->gr8
;
213 ret
= get_user(z
, p
);
217 spin_lock_irq(&atomic_op_lock
);
219 if (__get_user(z
, p
) == 0) {
221 if (__put_user(y
, p
) == 0)
226 spin_unlock_irq(&atomic_op_lock
);
230 * ulong __atomic_kernel_AND_return(ulong i, ulong *v)
232 case TBR_TT_ATOMIC_AND
:
233 p
= (unsigned long __user
*) __frame
->gr8
;
237 ret
= get_user(z
, p
);
241 spin_lock_irq(&atomic_op_lock
);
243 if (__get_user(z
, p
) == 0) {
245 if (__put_user(y
, p
) == 0)
250 spin_unlock_irq(&atomic_op_lock
);
254 * int __atomic_user_sub_return(atomic_t *v, int i)
256 case TBR_TT_ATOMIC_SUB
:
257 p
= (unsigned long __user
*) __frame
->gr8
;
261 ret
= get_user(z
, p
);
265 spin_lock_irq(&atomic_op_lock
);
267 if (__get_user(z
, p
) == 0) {
269 if (__put_user(y
, p
) == 0)
274 spin_unlock_irq(&atomic_op_lock
);
278 * int __atomic_user_add_return(atomic_t *v, int i)
280 case TBR_TT_ATOMIC_ADD
:
281 p
= (unsigned long __user
*) __frame
->gr8
;
285 ret
= get_user(z
, p
);
289 spin_lock_irq(&atomic_op_lock
);
291 if (__get_user(z
, p
) == 0) {
293 if (__put_user(y
, p
) == 0)
298 spin_unlock_irq(&atomic_op_lock
);
306 spin_unlock_irq(&atomic_op_lock
);
308 if (!user_mode(__frame
))
315 spin_unlock_irq(&atomic_op_lock
);
317 if (!user_mode(__frame
))
321 die_if_kernel("-- Atomic Op Error --\n");
323 info
.si_signo
= SIGSEGV
;
324 info
.si_code
= SEGV_ACCERR
;
326 info
.si_addr
= (void __user
*) __frame
->pc
;
328 force_sig_info(info
.si_signo
, &info
, current
);
331 /*****************************************************************************/
335 asmlinkage
void media_exception(unsigned long msr0
, unsigned long msr1
)
339 die_if_kernel("-- Media Exception --\n"
344 info
.si_signo
= SIGFPE
;
345 info
.si_code
= FPE_MDAOVF
;
347 info
.si_addr
= (void __user
*) __frame
->pc
;
349 force_sig_info(info
.si_signo
, &info
, current
);
350 } /* end media_exception() */
352 /*****************************************************************************/
354 * instruction or data access exception
356 asmlinkage
void memory_access_exception(unsigned long esr0
,
363 if (fixup_exception(__frame
))
367 die_if_kernel("-- Memory Access Exception --\n"
373 info
.si_signo
= SIGSEGV
;
374 info
.si_code
= SEGV_ACCERR
;
378 if ((esr0
& (ESRx_VALID
| ESR0_EAV
)) == (ESRx_VALID
| ESR0_EAV
))
379 info
.si_addr
= (void __user
*) ear0
;
381 force_sig_info(info
.si_signo
, &info
, current
);
383 } /* end memory_access_exception() */
385 /*****************************************************************************/
388 * - double-word data load from CPU control area (0xFExxxxxx)
389 * - read performed on inactive or self-refreshing SDRAM
390 * - error notification from slave device
391 * - misaligned address
392 * - access to out of bounds memory region
393 * - user mode accessing privileged memory region
394 * - write to R/O memory region
396 asmlinkage
void data_access_error(unsigned long esfr1
, unsigned long esr15
, unsigned long ear15
)
400 die_if_kernel("-- Data Access Error --\n"
405 info
.si_signo
= SIGSEGV
;
406 info
.si_code
= SEGV_ACCERR
;
408 info
.si_addr
= (void __user
*)
409 (((esr15
& (ESRx_VALID
|ESR15_EAV
)) == (ESRx_VALID
|ESR15_EAV
)) ? ear15
: 0);
411 force_sig_info(info
.si_signo
, &info
, current
);
412 } /* end data_access_error() */
414 /*****************************************************************************/
416 * data store error - should only happen if accessing inactive or self-refreshing SDRAM
418 asmlinkage
void data_store_error(unsigned long esfr1
, unsigned long esr15
)
420 die_if_kernel("-- Data Store Error --\n"
424 } /* end data_store_error() */
426 /*****************************************************************************/
430 asmlinkage
void division_exception(unsigned long esfr1
, unsigned long esr0
, unsigned long isr
)
434 die_if_kernel("-- Division Exception --\n"
439 info
.si_signo
= SIGFPE
;
440 info
.si_code
= FPE_INTDIV
;
442 info
.si_addr
= (void __user
*) __frame
->pc
;
444 force_sig_info(info
.si_signo
, &info
, current
);
445 } /* end division_exception() */
447 /*****************************************************************************/
451 asmlinkage
void compound_exception(unsigned long esfr1
,
452 unsigned long esr0
, unsigned long esr14
, unsigned long esr15
,
453 unsigned long msr0
, unsigned long msr1
)
455 die_if_kernel("-- Compound Exception --\n"
461 esr0
, esr14
, esr15
, msr0
, msr1
);
463 } /* end compound_exception() */
465 void show_stack(struct task_struct
*task
, unsigned long *sp
)
469 void show_trace_task(struct task_struct
*tsk
)
471 printk("CONTEXT: stack=0x%lx frame=0x%p LR=0x%lx RET=0x%lx\n",
472 tsk
->thread
.sp
, tsk
->thread
.frame
, tsk
->thread
.lr
, tsk
->thread
.sched_lr
);
475 static const char *regnames
[] = {
476 "PSR ", "ISR ", "CCR ", "CCCR",
477 "LR ", "LCR ", "PC ", "_stt",
478 "sys ", "GR8*", "GNE0", "GNE1",
480 "TBR ", "SP ", "FP ", "GR3 ",
481 "GR4 ", "GR5 ", "GR6 ", "GR7 ",
482 "GR8 ", "GR9 ", "GR10", "GR11",
483 "GR12", "GR13", "GR14", "GR15",
484 "GR16", "GR17", "GR18", "GR19",
485 "GR20", "GR21", "GR22", "GR23",
486 "GR24", "GR25", "GR26", "GR27",
487 "EFRM", "CURR", "GR30", "BFRM"
490 void show_regs(struct pt_regs
*regs
)
496 show_regs_print_info(KERN_DEFAULT
);
498 printk("Frame: @%08lx [%s]\n",
499 (unsigned long) regs
,
500 regs
->psr
& PSR_S
? "kernel" : "user");
502 reg
= (unsigned long *) regs
;
503 for (loop
= 0; loop
< NR_PT_REGS
; loop
++) {
504 printk("%s %08lx", regnames
[loop
+ 0], reg
[loop
+ 0]);
506 if (loop
== NR_PT_REGS
- 1 || loop
% 5 == 4)
513 void die_if_kernel(const char *str
, ...)
518 if (user_mode(__frame
))
522 vsnprintf(buffer
, sizeof(buffer
), str
, va
);
526 printk("\n===================================\n");
527 printk("%s\n", buffer
);
528 show_backtrace(__frame
, 0);
530 __break_hijack_kernel_event();
534 /*****************************************************************************/
536 * dump the contents of an exception frame
538 static void show_backtrace_regs(struct pt_regs
*frame
)
543 /* print the registers for this frame */
544 printk("<-- %s Frame: @%p -->\n",
545 frame
->psr
& PSR_S
? "Kernel Mode" : "User Mode",
548 reg
= (unsigned long *) frame
;
549 for (loop
= 0; loop
< NR_PT_REGS
; loop
++) {
550 printk("%s %08lx", regnames
[loop
+ 0], reg
[loop
+ 0]);
552 if (loop
== NR_PT_REGS
- 1 || loop
% 5 == 4)
558 printk("--------\n");
559 } /* end show_backtrace_regs() */
561 /*****************************************************************************/
563 * generate a backtrace of the kernel stack
565 void show_backtrace(struct pt_regs
*frame
, unsigned long sp
)
567 struct pt_regs
*frame0
;
568 unsigned long tos
= 0, stop
= 0, base
;
571 base
= ((((unsigned long) frame
) + 8191) & ~8191) - sizeof(struct user_context
);
572 frame0
= (struct pt_regs
*) base
;
576 stop
= (unsigned long) frame
;
579 printk("\nProcess %s (pid: %d)\n\n", current
->comm
, current
->pid
);
582 /* dump stack segment between frames */
583 //printk("%08lx -> %08lx\n", tos, stop);
587 printk(" %04lx :", tos
& 0xffff);
589 printk(" %08lx", *(unsigned long *) tos
);
602 /* dump frame 0 outside of the loop */
607 if (((unsigned long) frame
) + sizeof(*frame
) != tos
) {
608 printk("-- TOS %08lx does not follow frame %p --\n",
613 show_backtrace_regs(frame
);
615 /* dump the stack between this frame and the next */
616 stop
= (unsigned long) frame
->next_frame
;
620 (stop
< base
&& stop
+ sizeof(*frame
) > base
) ||
622 printk("-- next_frame %08lx is invalid (range %08lx-%08lx) --\n",
627 /* move to next frame */
628 frame
= frame
->next_frame
;
631 /* we can always dump frame 0, even if the rest of the stack is corrupt */
632 show_backtrace_regs(frame0
);
634 } /* end show_backtrace() */
636 /*****************************************************************************/
640 void __init
trap_init (void)
642 } /* end trap_init() */