traps.c 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. /*
  2. * (C) Copyright 2000 - 2007
  3. * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
  4. *
  5. * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
  6. *
  7. * SPDX-License-Identifier: GPL-2.0+
  8. *
  9. * Derived from the MPC83xx code.
  10. */
  11. /*
  12. * This file handles the architecture-dependent parts of hardware
  13. * exceptions
  14. */
  15. #include <common.h>
  16. #include <kgdb.h>
  17. #include <asm/processor.h>
  18. DECLARE_GLOBAL_DATA_PTR;
  19. extern unsigned long search_exception_table(unsigned long);
  20. /*
  21. * End of addressable memory. This may be less than the actual
  22. * amount of memory on the system if we're unable to keep all
  23. * the memory mapped in.
  24. */
  25. extern ulong get_effective_memsize(void);
  26. #define END_OF_MEM (gd->bd->bi_memstart + get_effective_memsize())
  27. /*
  28. * Trap & Exception support
  29. */
  30. static void print_backtrace(unsigned long *sp)
  31. {
  32. int cnt = 0;
  33. unsigned long i;
  34. puts("Call backtrace: ");
  35. while (sp) {
  36. if ((uint)sp > END_OF_MEM)
  37. break;
  38. i = sp[1];
  39. if (cnt++ % 7 == 0)
  40. putc('\n');
  41. printf("%08lX ", i);
  42. if (cnt > 32) break;
  43. sp = (unsigned long *) *sp;
  44. }
  45. putc('\n');
  46. }
  47. void show_regs(struct pt_regs *regs)
  48. {
  49. int i;
  50. printf("NIP: %08lX XER: %08lX LR: %08lX REGS: %p TRAP: %04lx DAR: %08lX\n",
  51. regs->nip, regs->xer, regs->link, regs, regs->trap, regs->dar);
  52. printf("MSR: %08lx EE: %01x PR: %01x FP: %01x ME: %01x IR/DR: %01x%01x\n",
  53. regs->msr, regs->msr & MSR_EE ? 1 : 0, regs->msr & MSR_PR ? 1 : 0,
  54. regs->msr & MSR_FP ? 1 : 0,regs->msr & MSR_ME ? 1 : 0,
  55. regs->msr & MSR_IR ? 1 : 0,
  56. regs->msr & MSR_DR ? 1 : 0);
  57. putc('\n');
  58. for (i = 0; i < 32; i++) {
  59. if ((i % 8) == 0) {
  60. printf("GPR%02d: ", i);
  61. }
  62. printf("%08lX ", regs->gpr[i]);
  63. if ((i % 8) == 7) {
  64. putc('\n');
  65. }
  66. }
  67. }
  68. static void _exception(int signr, struct pt_regs *regs)
  69. {
  70. show_regs(regs);
  71. print_backtrace((unsigned long *)regs->gpr[1]);
  72. panic("Exception at pc %lx signal %d", regs->nip, signr);
  73. }
  74. void MachineCheckException(struct pt_regs *regs)
  75. {
  76. unsigned long fixup = search_exception_table(regs->nip);
  77. if (fixup) {
  78. regs->nip = fixup;
  79. return;
  80. }
  81. #ifdef CONFIG_CMD_KGDB
  82. if (debugger_exception_handler && (*debugger_exception_handler)(regs))
  83. return;
  84. #endif
  85. puts("Machine check.\nCaused by (from msr): ");
  86. printf("regs %p ", regs);
  87. switch (regs->msr & 0x00FF0000) {
  88. case (0x80000000 >> 10):
  89. puts("Instruction cache parity signal\n");
  90. break;
  91. case (0x80000000 >> 11):
  92. puts("Data cache parity signal\n");
  93. break;
  94. case (0x80000000 >> 12):
  95. puts("Machine check signal\n");
  96. break;
  97. case (0x80000000 >> 13):
  98. puts("Transfer error ack signal\n");
  99. break;
  100. case (0x80000000 >> 14):
  101. puts("Data parity signal\n");
  102. break;
  103. case (0x80000000 >> 15):
  104. puts("Address parity signal\n");
  105. break;
  106. default:
  107. puts("Unknown values in msr\n");
  108. }
  109. show_regs(regs);
  110. print_backtrace((unsigned long *)regs->gpr[1]);
  111. panic("machine check");
  112. }
  113. void AlignmentException(struct pt_regs *regs)
  114. {
  115. #ifdef CONFIG_CMD_KGDB
  116. if (debugger_exception_handler && (*debugger_exception_handler)(regs))
  117. return;
  118. #endif
  119. show_regs(regs);
  120. print_backtrace((unsigned long *)regs->gpr[1]);
  121. panic("Alignment Exception");
  122. }
  123. void ProgramCheckException(struct pt_regs *regs)
  124. {
  125. #ifdef CONFIG_CMD_KGDB
  126. if (debugger_exception_handler && (*debugger_exception_handler)(regs))
  127. return;
  128. #endif
  129. show_regs(regs);
  130. print_backtrace((unsigned long *)regs->gpr[1]);
  131. panic("Program Check Exception");
  132. }
  133. void SoftEmuException(struct pt_regs *regs)
  134. {
  135. #ifdef CONFIG_CMD_KGDB
  136. if (debugger_exception_handler && (*debugger_exception_handler)(regs))
  137. return;
  138. #endif
  139. show_regs(regs);
  140. print_backtrace((unsigned long *)regs->gpr[1]);
  141. panic("Software Emulation Exception");
  142. }
  143. void UnknownException(struct pt_regs *regs)
  144. {
  145. #ifdef CONFIG_CMD_KGDB
  146. if (debugger_exception_handler && (*debugger_exception_handler)(regs))
  147. return;
  148. #endif
  149. printf("Bad trap at PC: %lx, SR: %lx, vector=%lx\n",
  150. regs->nip, regs->msr, regs->trap);
  151. _exception(0, regs);
  152. }
  153. #ifdef CONFIG_CMD_BEDBUG
  154. extern void do_bedbug_breakpoint(struct pt_regs *);
  155. #endif
  156. void DebugException(struct pt_regs *regs)
  157. {
  158. printf("Debugger trap at @ %lx\n", regs->nip);
  159. show_regs(regs);
  160. #ifdef CONFIG_CMD_BEDBUG
  161. do_bedbug_breakpoint(regs);
  162. #endif
  163. }