2 * Copyright (C) 2004-2006 Atmel Corporation
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
10 #include <linux/hardirq.h>
11 #include <linux/init.h>
12 #include <linux/kallsyms.h>
13 #include <linux/kdebug.h>
14 #include <linux/module.h>
15 #include <linux/notifier.h>
16 #include <linux/sched.h>
17 #include <linux/uaccess.h>
19 #include <asm/addrspace.h>
20 #include <asm/mmu_context.h>
22 #include <asm/sysreg.h>
23 #include <asm/traps.h>
25 static DEFINE_SPINLOCK(die_lock);
27 void NORET_TYPE die(const char *str, struct pt_regs *regs, long err)
29 static int die_counter;
32 spin_lock_irq(&die_lock);
35 printk(KERN_ALERT "Oops: %s, sig: %ld [#%d]\n",
36 str, err, ++die_counter);
41 printk(KERN_CONT "PREEMPT ");
43 #ifdef CONFIG_FRAME_POINTER
44 printk(KERN_CONT "FRAME_POINTER ");
46 if (current_cpu_data.features & AVR32_FEATURE_OCD) {
47 unsigned long did = ocd_read(DID);
48 printk(KERN_CONT "chip: 0x%03lx:0x%04lx rev %lu\n",
53 printk(KERN_CONT "cpu: arch %u r%u / core %u r%u\n",
54 current_cpu_data.arch_type,
55 current_cpu_data.arch_revision,
56 current_cpu_data.cpu_type,
57 current_cpu_data.cpu_revision);
61 show_regs_log_lvl(regs, KERN_EMERG);
62 show_stack_log_lvl(current, regs->sp, regs, KERN_EMERG);
65 spin_unlock_irq(&die_lock);
68 panic("Fatal exception in interrupt");
71 panic("Fatal exception");
76 void _exception(long signr, struct pt_regs *regs, int code,
81 if (!user_mode(regs)) {
82 const struct exception_table_entry *fixup;
84 /* Are we prepared to handle this kernel fault? */
85 fixup = search_exception_tables(regs->pc);
87 regs->pc = fixup->fixup;
90 die("Unhandled exception in kernel mode", regs, signr);
93 memset(&info, 0, sizeof(info));
94 info.si_signo = signr;
96 info.si_addr = (void __user *)addr;
97 force_sig_info(signr, &info, current);
100 * Init gets no signals that it doesn't have a handler for.
101 * That's all very well, but if it has caused a synchronous
102 * exception and we ignore the resulting signal, it will just
103 * generate the same exception over and over again and we get
104 * nowhere. Better to kill it and let the kernel panic.
106 if (is_global_init(current)) {
107 __sighandler_t handler;
109 spin_lock_irq(¤t->sighand->siglock);
110 handler = current->sighand->action[signr-1].sa.sa_handler;
111 spin_unlock_irq(¤t->sighand->siglock);
112 if (handler == SIG_DFL) {
113 /* init has generated a synchronous exception
114 and it doesn't have a handler for the signal */
115 printk(KERN_CRIT "init has generated signal %ld "
116 "but has no handler for it\n", signr);
122 asmlinkage void do_nmi(unsigned long ecr, struct pt_regs *regs)
128 ret = notify_die(DIE_NMI, "NMI", regs, 0, ecr, SIGINT);
134 die("Fatal Non-Maskable Interrupt", regs, SIGINT);
136 printk(KERN_ALERT "Got NMI, but nobody cared. Disabling...\n");
143 asmlinkage void do_critical_exception(unsigned long ecr, struct pt_regs *regs)
145 die("Critical exception", regs, SIGKILL);
148 asmlinkage void do_address_exception(unsigned long ecr, struct pt_regs *regs)
150 _exception(SIGBUS, regs, BUS_ADRALN, regs->pc);
153 /* This way of handling undefined instructions is stolen from ARM */
154 static LIST_HEAD(undef_hook);
155 static DEFINE_SPINLOCK(undef_lock);
157 void register_undef_hook(struct undef_hook *hook)
159 spin_lock_irq(&undef_lock);
160 list_add(&hook->node, &undef_hook);
161 spin_unlock_irq(&undef_lock);
164 void unregister_undef_hook(struct undef_hook *hook)
166 spin_lock_irq(&undef_lock);
167 list_del(&hook->node);
168 spin_unlock_irq(&undef_lock);
171 static int do_cop_absent(u32 insn)
176 if ((insn & 0xfdf00000) == 0xf1900000)
180 cop_nr = (insn >> 13) & 0x7;
182 /* Try enabling the coprocessor */
183 cpucr = sysreg_read(CPUCR);
184 cpucr |= (1 << (24 + cop_nr));
185 sysreg_write(CPUCR, cpucr);
187 cpucr = sysreg_read(CPUCR);
188 if (!(cpucr & (1 << (24 + cop_nr))))
195 int is_valid_bugaddr(unsigned long pc)
197 unsigned short opcode;
199 if (pc < PAGE_OFFSET)
201 if (probe_kernel_address((u16 *)pc, opcode))
204 return opcode == AVR32_BUG_OPCODE;
208 asmlinkage void do_illegal_opcode(unsigned long ecr, struct pt_regs *regs)
211 struct undef_hook *hook;
216 if (!user_mode(regs) && (ecr == ECR_ILLEGAL_OPCODE)) {
217 enum bug_trap_type type;
219 type = report_bug(regs->pc, regs);
221 case BUG_TRAP_TYPE_NONE:
223 case BUG_TRAP_TYPE_WARN:
226 case BUG_TRAP_TYPE_BUG:
227 die("Kernel BUG", regs, SIGKILL);
234 if (user_mode(regs)) {
235 pc = (void __user *)instruction_pointer(regs);
236 if (get_user(insn, (u32 __user *)pc))
239 if (ecr == ECR_COPROC_ABSENT && !do_cop_absent(insn))
242 spin_lock_irq(&undef_lock);
243 list_for_each_entry(hook, &undef_hook, node) {
244 if ((insn & hook->insn_mask) == hook->insn_val) {
245 if (hook->fn(regs, insn) == 0) {
246 spin_unlock_irq(&undef_lock);
251 spin_unlock_irq(&undef_lock);
255 case ECR_PRIVILEGE_VIOLATION:
258 case ECR_COPROC_ABSENT:
266 _exception(SIGILL, regs, code, regs->pc);
270 _exception(SIGSEGV, regs, SEGV_MAPERR, regs->pc);
273 asmlinkage void do_fpe(unsigned long ecr, struct pt_regs *regs)
275 /* We have no FPU yet */
276 _exception(SIGILL, regs, ILL_COPROC, regs->pc);
280 void __init trap_init(void)