1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36#include <common.h>
37#include <command.h>
38#include <asm/processor.h>
39
40#if defined(CONFIG_CMD_KGDB)
41int (*debugger_exception_handler)(struct pt_regs *) = 0;
42#endif
43
44
45extern unsigned long search_exception_table(unsigned long);
46
47
48
49#define END_OF_MEM 0x02000000
50
51
52
53
54
55void
56print_backtrace(unsigned long *sp)
57{
58 int cnt = 0;
59 unsigned long i;
60
61 printf("Call backtrace: ");
62 while (sp) {
63 if ((uint)sp > END_OF_MEM)
64 break;
65
66 i = sp[1];
67 if (cnt++ % 7 == 0)
68 printf("\n");
69 printf("%08lX ", i);
70 if (cnt > 32) break;
71 sp = (unsigned long *)*sp;
72 }
73 printf("\n");
74}
75
76void show_regs(struct pt_regs * regs)
77{
78 int i;
79
80 printf("NIP: %08lX XER: %08lX LR: %08lX REGS: %p TRAP: %04lx DAR: %08lX\n",
81 regs->nip, regs->xer, regs->link, regs, regs->trap, regs->dar);
82 printf("MSR: %08lx EE: %01x PR: %01x FP: %01x ME: %01x IR/DR: %01x%01x\n",
83 regs->msr, regs->msr&MSR_EE ? 1 : 0, regs->msr&MSR_PR ? 1 : 0,
84 regs->msr & MSR_FP ? 1 : 0,regs->msr&MSR_ME ? 1 : 0,
85 regs->msr&MSR_IR ? 1 : 0,
86 regs->msr&MSR_DR ? 1 : 0);
87
88 printf("\n");
89 for (i = 0; i < 32; i++) {
90 if ((i % 8) == 0)
91 {
92 printf("GPR%02d: ", i);
93 }
94
95 printf("%08lX ", regs->gpr[i]);
96 if ((i % 8) == 7)
97 {
98 printf("\n");
99 }
100 }
101}
102
103
104void
105_exception(int signr, struct pt_regs *regs)
106{
107 show_regs(regs);
108 print_backtrace((unsigned long *)regs->gpr[1]);
109 panic("Exception in kernel pc %lx signal %d",regs->nip,signr);
110}
111
112void
113MachineCheckException(struct pt_regs *regs)
114{
115 unsigned long fixup;
116
117
118
119
120
121 if ((fixup = search_exception_table(regs->nip)) != 0) {
122 regs->nip = fixup;
123 return;
124 }
125
126#if defined(CONFIG_CMD_KGDB)
127 if (debugger_exception_handler && (*debugger_exception_handler)(regs))
128 return;
129#endif
130
131 printf("Machine check in kernel mode.\n");
132 printf("Caused by (from msr): ");
133 printf("regs %p ",regs);
134
135 switch( regs->msr & 0x000F0000)
136 {
137 case (0x80000000>>12) :
138 printf("Machine check signal - probably due to mm fault\n"
139 "with mmu off\n");
140 break;
141 case (0x80000000>>13) :
142 printf("Transfer error ack signal\n");
143 break;
144 case (0x80000000>>14) :
145 printf("Data parity signal\n");
146 break;
147 case (0x80000000>>15) :
148 printf("Address parity signal\n");
149 break;
150 default:
151 printf("Unknown values in msr\n");
152 }
153 show_regs(regs);
154 print_backtrace((unsigned long *)regs->gpr[1]);
155 panic("machine check");
156}
157
158void
159AlignmentException(struct pt_regs *regs)
160{
161#if defined(CONFIG_CMD_KGDB)
162 if (debugger_exception_handler && (*debugger_exception_handler)(regs))
163 return;
164#endif
165 show_regs(regs);
166 print_backtrace((unsigned long *)regs->gpr[1]);
167 panic("Alignment Exception");
168}
169
170void
171ProgramCheckException(struct pt_regs *regs)
172{
173#if defined(CONFIG_CMD_KGDB)
174 if (debugger_exception_handler && (*debugger_exception_handler)(regs))
175 return;
176#endif
177 show_regs(regs);
178 print_backtrace((unsigned long *)regs->gpr[1]);
179 panic("Program Check Exception");
180}
181
182void
183SoftEmuException(struct pt_regs *regs)
184{
185#if defined(CONFIG_CMD_KGDB)
186 if (debugger_exception_handler && (*debugger_exception_handler)(regs))
187 return;
188#endif
189 show_regs(regs);
190 print_backtrace((unsigned long *)regs->gpr[1]);
191 panic("Software Emulation Exception");
192}
193
194
195void
196UnknownException(struct pt_regs *regs)
197{
198#if defined(CONFIG_CMD_KGDB)
199 if (debugger_exception_handler && (*debugger_exception_handler)(regs))
200 return;
201#endif
202 printf("Bad trap at PC: %lx, SR: %lx, vector=%lx\n",
203 regs->nip, regs->msr, regs->trap);
204 _exception(0, regs);
205}
206
207#if defined(CONFIG_CMD_BEDBUG)
208extern void do_bedbug_breakpoint(struct pt_regs *);
209#endif
210
211void
212DebugException(struct pt_regs *regs)
213{
214
215 printf("Debugger trap at @ %lx\n", regs->nip );
216 show_regs(regs);
217#if defined(CONFIG_CMD_BEDBUG)
218 do_bedbug_breakpoint( regs );
219#endif
220}
221
222
223
224
225int
226addr_probe(uint *addr)
227{
228#if 0
229 int retval;
230
231 __asm__ __volatile__( \
232 "1: lwz %0,0(%1)\n" \
233 " eieio\n" \
234 " li %0,0\n" \
235 "2:\n" \
236 ".section .fixup,\"ax\"\n" \
237 "3: li %0,-1\n" \
238 " b 2b\n" \
239 ".section __ex_table,\"a\"\n" \
240 " .align 2\n" \
241 " .long 1b,3b\n" \
242 ".text" \
243 : "=r" (retval) : "r"(addr));
244
245 return (retval);
246#endif
247 return 0;
248}
249