Gitweb:     
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e4cc2c8c7cb54ce0e5a7002c68aca9e89607117
Commit:     1e4cc2c8c7cb54ce0e5a7002c68aca9e89607117
Parent:     32872b203b542f0696b6af4db992a3c320de57e1
Author:     Jesper Nilsson <[EMAIL PROTECTED]>
AuthorDate: Fri Nov 30 16:22:50 2007 +0100
Committer:  Jesper Nilsson <[EMAIL PROTECTED]>
CommitDate: Fri Feb 8 11:06:26 2008 +0100

    CRIS v32: Update traps.c
    
    - Remove raw_prink hack, use oops_in_progress instead.
    - When ETRAX_WATCHDOG_NICE_DOGGY is set, loop in trap after oops dump
      instead of rebooting.
    - Break long lines to less than 80 chars.
    - Fix whitespace errors.
    - Remove unnecessary comments.
---
 arch/cris/arch-v10/kernel/traps.c |  268 ++++++++++++++++++-------------------
 1 files changed, 130 insertions(+), 138 deletions(-)

diff --git a/arch/cris/arch-v10/kernel/traps.c 
b/arch/cris/arch-v10/kernel/traps.c
dissimilarity index 88%
index 4becc1b..9eada5d 100644
--- a/arch/cris/arch-v10/kernel/traps.c
+++ b/arch/cris/arch-v10/kernel/traps.c
@@ -1,138 +1,130 @@
-/* $Id: traps.c,v 1.4 2005/04/24 18:47:55 starvik Exp $
- *
- *  linux/arch/cris/arch-v10/traps.c
- *
- *  Heler functions for trap handlers
- * 
- *  Copyright (C) 2000-2002 Axis Communications AB
- *
- *  Authors:   Bjorn Wesen
- *            Hans-Peter Nilsson
- *
- */
-
-#include <linux/ptrace.h>
-#include <asm/uaccess.h>
-#include <asm/arch/sv_addr_ag.h>
-
-extern int raw_printk(const char *fmt, ...);
-
-void 
-show_registers(struct pt_regs * regs)
-{
-       /* We either use rdusp() - the USP register, which might not
-          correspond to the current process for all cases we're called,
-          or we use the current->thread.usp, which is not up to date for
-          the current process.  Experience shows we want the USP
-          register.  */
-       unsigned long usp = rdusp();
-
-       raw_printk("IRP: %08lx SRP: %08lx DCCR: %08lx USP: %08lx MOF: %08lx\n",
-              regs->irp, regs->srp, regs->dccr, usp, regs->mof );
-       raw_printk(" r0: %08lx  r1: %08lx   r2: %08lx  r3: %08lx\n",
-              regs->r0, regs->r1, regs->r2, regs->r3);
-       raw_printk(" r4: %08lx  r5: %08lx   r6: %08lx  r7: %08lx\n",
-              regs->r4, regs->r5, regs->r6, regs->r7);
-       raw_printk(" r8: %08lx  r9: %08lx  r10: %08lx r11: %08lx\n",
-              regs->r8, regs->r9, regs->r10, regs->r11);
-       raw_printk("r12: %08lx r13: %08lx oR10: %08lx  sp: %08lx\n",
-              regs->r12, regs->r13, regs->orig_r10, regs);
-       raw_printk("R_MMU_CAUSE: %08lx\n", (unsigned long)*R_MMU_CAUSE);
-       raw_printk("Process %s (pid: %d, stackpage=%08lx)\n",
-              current->comm, current->pid, (unsigned long)current);
-
-       /*
-         * When in-kernel, we also print out the stack and code at the
-         * time of the fault..
-         */
-        if (! user_mode(regs)) {
-               int i;
-
-                show_stack(NULL, (unsigned long*)usp);
-
-               /* Dump kernel stack if the previous dump wasn't one.  */
-               if (usp != 0)
-                       show_stack (NULL, NULL);
-
-                raw_printk("\nCode: ");
-                if(regs->irp < PAGE_OFFSET)
-                        goto bad;
-
-               /* Often enough the value at regs->irp does not point to
-                  the interesting instruction, which is most often the
-                  _previous_ instruction.  So we dump at an offset large
-                  enough that instruction decoding should be in sync at
-                  the interesting point, but small enough to fit on a row
-                  (sort of).  We point out the regs->irp location in a
-                  ksymoops-friendly way by wrapping the byte for that
-                  address in parentheses.  */
-                for(i = -12; i < 12; i++)
-                {
-                        unsigned char c;
-                        if(__get_user(c, &((unsigned char*)regs->irp)[i])) {
-bad:
-                                raw_printk(" Bad IP value.");
-                                break;
-                        }
-
-                       if (i == 0)
-                         raw_printk("(%02x) ", c);
-                       else
-                         raw_printk("%02x ", c);
-                }
-               raw_printk("\n");
-        }
-}
-
-/* Called from entry.S when the watchdog has bitten
- * We print out something resembling an oops dump, and if
- * we have the nice doggy development flag set, we halt here
- * instead of rebooting.
- */
-
-extern void reset_watchdog(void);
-extern void stop_watchdog(void);
-
-
-void
-watchdog_bite_hook(struct pt_regs *regs)
-{
-#ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
-       local_irq_disable();
-       stop_watchdog();
-       show_registers(regs);
-       while(1) /* nothing */;
-#else
-       show_registers(regs);
-#endif 
-}
-
-/* This is normally the 'Oops' routine */
-void 
-die_if_kernel(const char * str, struct pt_regs * regs, long err)
-{
-       if(user_mode(regs))
-               return;
-
-#ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
-       /* This printout might take too long and trigger the 
-        * watchdog normally. If we're in the nice doggy
-        * development mode, stop the watchdog during printout.
-        */
-       stop_watchdog();
-#endif
-
-       raw_printk("%s: %04lx\n", str, err & 0xffff);
-
-       show_registers(regs);
-
-#ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY
-       reset_watchdog();
-#endif
-       do_exit(SIGSEGV);
-}
-
-void arch_enable_nmi(void)
-{
-  asm volatile("setf m");
-}
+/*
+ * Helper functions for trap handlers
+ *
+ * Copyright (C) 2000-2007, Axis Communications AB.
+ *
+ * Authors:   Bjorn Wesen
+ *            Hans-Peter Nilsson
+ *
+ */
+
+#include <linux/ptrace.h>
+#include <asm/uaccess.h>
+#include <asm/arch/sv_addr_ag.h>
+
+void
+show_registers(struct pt_regs *regs)
+{
+       /*
+        * It's possible to use either the USP register or current->thread.usp.
+        * USP might not correspond to the current process for all cases this
+        * function is called, and current->thread.usp isn't up to date for the
+        * current process. Experience shows that using USP is the way to go.
+        */
+       unsigned long usp = rdusp();
+
+       printk("IRP: %08lx SRP: %08lx DCCR: %08lx USP: %08lx MOF: %08lx\n",
+              regs->irp, regs->srp, regs->dccr, usp, regs->mof);
+
+       printk(" r0: %08lx  r1: %08lx   r2: %08lx  r3: %08lx\n",
+              regs->r0, regs->r1, regs->r2, regs->r3);
+
+       printk(" r4: %08lx  r5: %08lx   r6: %08lx  r7: %08lx\n",
+              regs->r4, regs->r5, regs->r6, regs->r7);
+
+       printk(" r8: %08lx  r9: %08lx  r10: %08lx r11: %08lx\n",
+              regs->r8, regs->r9, regs->r10, regs->r11);
+
+       printk("r12: %08lx r13: %08lx oR10: %08lx  sp: %08lx\n",
+              regs->r12, regs->r13, regs->orig_r10, (long unsigned)regs);
+
+       printk("R_MMU_CAUSE: %08lx\n", (unsigned long)*R_MMU_CAUSE);
+
+       printk("Process %s (pid: %d, stackpage=%08lx)\n",
+              current->comm, current->pid, (unsigned long)current);
+
+       /*
+        * When in-kernel, we also print out the stack and code at the
+        * time of the fault..
+        */
+       if (!user_mode(regs)) {
+               int i;
+
+               show_stack(NULL, (unsigned long *)usp);
+
+               /*
+                * If the previous stack-dump wasn't a kernel one, dump the
+                * kernel stack now.
+                */
+               if (usp != 0)
+                       show_stack(NULL, NULL);
+
+               printk("\nCode: ");
+
+               if (regs->irp < PAGE_OFFSET)
+                       goto bad_value;
+
+               /*
+                * Quite often the value at regs->irp doesn't point to the
+                * interesting instruction, which often is the previous
+                * instruction. So dump at an offset large enough that the
+                * instruction decoding should be in sync at the interesting
+                * point, but small enough to fit on a row. The regs->irp
+                * location is pointed out in a ksymoops-friendly way by
+                * wrapping the byte for that address in parenthesises.
+                */
+               for (i = -12; i < 12; i++) {
+                       unsigned char c;
+
+                       if (__get_user(c, &((unsigned char *)regs->irp)[i])) {
+bad_value:
+                               printk(" Bad IP value.");
+                               break;
+                       }
+
+                       if (i == 0)
+                               printk("(%02x) ", c);
+                       else
+                               printk("%02x ", c);
+               }
+               printk("\n");
+       }
+}
+
+void
+arch_enable_nmi(void)
+{
+       asm volatile ("setf m");
+}
+
+extern void (*nmi_handler)(struct pt_regs *);
+void handle_nmi(struct pt_regs *regs)
+{
+       if (nmi_handler)
+               nmi_handler(regs);
+
+       /* Wait until nmi is no longer active. (We enable NMI immediately after
+          returning from this function, and we don't want it happening while
+          exiting from the NMI interrupt handler.) */
+       while (*R_IRQ_MASK0_RD & IO_STATE(R_IRQ_MASK0_RD, nmi_pin, active))
+               ;
+}
+
+#ifdef CONFIG_DEBUG_BUGVERBOSE
+void
+handle_BUG(struct pt_regs *regs)
+{
+       struct bug_frame f;
+       unsigned char c;
+       unsigned long irp = regs->irp;
+
+       if (__copy_from_user(&f, (const void __user *)(irp - 8), sizeof f))
+               return;
+       if (f.prefix != BUG_PREFIX || f.magic != BUG_MAGIC)
+               return;
+       if (__get_user(c, f.filename))
+               f.filename = "<bad filename>";
+
+       printk("kernel BUG at %s:%d!\n", f.filename, f.line);
+}
+#endif
-
To unsubscribe from this list: send the line "unsubscribe git-commits-head" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to