]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - arch/arc/kernel/troubleshoot.c
sched/headers: Prepare for new header dependencies before moving code to <linux/sched...
[mirror_ubuntu-artful-kernel.git] / arch / arc / kernel / troubleshoot.c
1 /*
2 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com)
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 */
7
8 #include <linux/ptrace.h>
9 #include <linux/module.h>
10 #include <linux/mm.h>
11 #include <linux/fs.h>
12 #include <linux/kdev_t.h>
13 #include <linux/fs_struct.h>
14 #include <linux/proc_fs.h>
15 #include <linux/file.h>
16 #include <linux/sched/mm.h>
17 #include <linux/sched/debug.h>
18
19 #include <asm/arcregs.h>
20 #include <asm/irqflags.h>
21
22 /*
23 * Common routine to print scratch regs (r0-r12) or callee regs (r13-r25)
24 * -Prints 3 regs per line and a CR.
25 * -To continue, callee regs right after scratch, special handling of CR
26 */
27 static noinline void print_reg_file(long *reg_rev, int start_num)
28 {
29 unsigned int i;
30 char buf[512];
31 int n = 0, len = sizeof(buf);
32
33 for (i = start_num; i < start_num + 13; i++) {
34 n += scnprintf(buf + n, len - n, "r%02u: 0x%08lx\t",
35 i, (unsigned long)*reg_rev);
36
37 if (((i + 1) % 3) == 0)
38 n += scnprintf(buf + n, len - n, "\n");
39
40 /* because pt_regs has regs reversed: r12..r0, r25..r13 */
41 if (is_isa_arcv2() && start_num == 0)
42 reg_rev++;
43 else
44 reg_rev--;
45 }
46
47 if (start_num != 0)
48 n += scnprintf(buf + n, len - n, "\n\n");
49
50 /* To continue printing callee regs on same line as scratch regs */
51 if (start_num == 0)
52 pr_info("%s", buf);
53 else
54 pr_cont("%s\n", buf);
55 }
56
57 static void show_callee_regs(struct callee_regs *cregs)
58 {
59 print_reg_file(&(cregs->r13), 13);
60 }
61
62 static void print_task_path_n_nm(struct task_struct *tsk, char *buf)
63 {
64 char *path_nm = NULL;
65 struct mm_struct *mm;
66 struct file *exe_file;
67
68 mm = get_task_mm(tsk);
69 if (!mm)
70 goto done;
71
72 exe_file = get_mm_exe_file(mm);
73 mmput(mm);
74
75 if (exe_file) {
76 path_nm = file_path(exe_file, buf, 255);
77 fput(exe_file);
78 }
79
80 done:
81 pr_info("Path: %s\n", !IS_ERR(path_nm) ? path_nm : "?");
82 }
83
84 static void show_faulting_vma(unsigned long address, char *buf)
85 {
86 struct vm_area_struct *vma;
87 struct inode *inode;
88 unsigned long ino = 0;
89 dev_t dev = 0;
90 char *nm = buf;
91 struct mm_struct *active_mm = current->active_mm;
92
93 /* can't use print_vma_addr() yet as it doesn't check for
94 * non-inclusive vma
95 */
96 down_read(&active_mm->mmap_sem);
97 vma = find_vma(active_mm, address);
98
99 /* check against the find_vma( ) behaviour which returns the next VMA
100 * if the container VMA is not found
101 */
102 if (vma && (vma->vm_start <= address)) {
103 struct file *file = vma->vm_file;
104 if (file) {
105 nm = file_path(file, buf, PAGE_SIZE - 1);
106 inode = file_inode(vma->vm_file);
107 dev = inode->i_sb->s_dev;
108 ino = inode->i_ino;
109 }
110 pr_info(" @off 0x%lx in [%s]\n"
111 " VMA: 0x%08lx to 0x%08lx\n",
112 vma->vm_start < TASK_UNMAPPED_BASE ?
113 address : address - vma->vm_start,
114 nm, vma->vm_start, vma->vm_end);
115 } else
116 pr_info(" @No matching VMA found\n");
117
118 up_read(&active_mm->mmap_sem);
119 }
120
121 static void show_ecr_verbose(struct pt_regs *regs)
122 {
123 unsigned int vec, cause_code;
124 unsigned long address;
125
126 pr_info("\n[ECR ]: 0x%08lx => ", regs->event);
127
128 /* For Data fault, this is data address not instruction addr */
129 address = current->thread.fault_address;
130
131 vec = regs->ecr_vec;
132 cause_code = regs->ecr_cause;
133
134 /* For DTLB Miss or ProtV, display the memory involved too */
135 if (vec == ECR_V_DTLB_MISS) {
136 pr_cont("Invalid %s @ 0x%08lx by insn @ 0x%08lx\n",
137 (cause_code == 0x01) ? "Read" :
138 ((cause_code == 0x02) ? "Write" : "EX"),
139 address, regs->ret);
140 } else if (vec == ECR_V_ITLB_MISS) {
141 pr_cont("Insn could not be fetched\n");
142 } else if (vec == ECR_V_MACH_CHK) {
143 pr_cont("%s\n", (cause_code == 0x0) ?
144 "Double Fault" : "Other Fatal Err");
145
146 } else if (vec == ECR_V_PROTV) {
147 if (cause_code == ECR_C_PROTV_INST_FETCH)
148 pr_cont("Execute from Non-exec Page\n");
149 else if (cause_code == ECR_C_PROTV_MISALIG_DATA)
150 pr_cont("Misaligned r/w from 0x%08lx\n", address);
151 else
152 pr_cont("%s access not allowed on page\n",
153 (cause_code == 0x01) ? "Read" :
154 ((cause_code == 0x02) ? "Write" : "EX"));
155 } else if (vec == ECR_V_INSN_ERR) {
156 pr_cont("Illegal Insn\n");
157 #ifdef CONFIG_ISA_ARCV2
158 } else if (vec == ECR_V_MEM_ERR) {
159 if (cause_code == 0x00)
160 pr_cont("Bus Error from Insn Mem\n");
161 else if (cause_code == 0x10)
162 pr_cont("Bus Error from Data Mem\n");
163 else
164 pr_cont("Bus Error, check PRM\n");
165 #endif
166 } else {
167 pr_cont("Check Programmer's Manual\n");
168 }
169 }
170
171 /************************************************************************
172 * API called by rest of kernel
173 ***********************************************************************/
174
175 void show_regs(struct pt_regs *regs)
176 {
177 struct task_struct *tsk = current;
178 struct callee_regs *cregs;
179 char *buf;
180
181 buf = (char *)__get_free_page(GFP_TEMPORARY);
182 if (!buf)
183 return;
184
185 print_task_path_n_nm(tsk, buf);
186 show_regs_print_info(KERN_INFO);
187
188 show_ecr_verbose(regs);
189
190 pr_info("[EFA ]: 0x%08lx\n[BLINK ]: %pS\n[ERET ]: %pS\n",
191 current->thread.fault_address,
192 (void *)regs->blink, (void *)regs->ret);
193
194 if (user_mode(regs))
195 show_faulting_vma(regs->ret, buf); /* faulting code, not data */
196
197 pr_info("[STAT32]: 0x%08lx", regs->status32);
198
199 #define STS_BIT(r, bit) r->status32 & STATUS_##bit##_MASK ? #bit" " : ""
200
201 #ifdef CONFIG_ISA_ARCOMPACT
202 pr_cont(" : %2s%2s%2s%2s%2s%2s%2s\n",
203 (regs->status32 & STATUS_U_MASK) ? "U " : "K ",
204 STS_BIT(regs, DE), STS_BIT(regs, AE),
205 STS_BIT(regs, A2), STS_BIT(regs, A1),
206 STS_BIT(regs, E2), STS_BIT(regs, E1));
207 #else
208 pr_cont(" : %2s%2s%2s%2s\n",
209 STS_BIT(regs, IE),
210 (regs->status32 & STATUS_U_MASK) ? "U " : "K ",
211 STS_BIT(regs, DE), STS_BIT(regs, AE));
212 #endif
213 pr_info("BTA: 0x%08lx\t SP: 0x%08lx\t FP: 0x%08lx\n",
214 regs->bta, regs->sp, regs->fp);
215 pr_info("LPS: 0x%08lx\tLPE: 0x%08lx\tLPC: 0x%08lx\n",
216 regs->lp_start, regs->lp_end, regs->lp_count);
217
218 /* print regs->r0 thru regs->r12
219 * Sequential printing was generating horrible code
220 */
221 print_reg_file(&(regs->r0), 0);
222
223 /* If Callee regs were saved, display them too */
224 cregs = (struct callee_regs *)current->thread.callee_reg;
225 if (cregs)
226 show_callee_regs(cregs);
227
228 free_page((unsigned long)buf);
229 }
230
231 void show_kernel_fault_diag(const char *str, struct pt_regs *regs,
232 unsigned long address)
233 {
234 current->thread.fault_address = address;
235
236 /* Caller and Callee regs */
237 show_regs(regs);
238
239 /* Show stack trace if this Fatality happened in kernel mode */
240 if (!user_mode(regs))
241 show_stacktrace(current, regs);
242 }