cregit-Linux how code gets into the kernel

Release 4.7 arch/cris/arch-v10/kernel/traps.c

 * Helper functions for trap handlers
 * Copyright (C) 2000-2007, Axis Communications AB.
 * Authors:   Bjorn Wesen
 *            Hans-Peter Nilsson

#include <linux/ptrace.h>
#include <asm/uaccess.h>
#include <arch/sv_addr_ag.h>
#include <arch/system.h>

void show_registers(struct pt_regs *regs) { /* * It's possible to use either the USP register or current->thread.usp. * USP might not correspond to the current process for all cases this * function is called, and current->thread.usp isn't up to date for the * current process. Experience shows that using USP is the way to go. */ unsigned long usp = rdusp(); printk("IRP: %08lx SRP: %08lx DCCR: %08lx USP: %08lx MOF: %08lx\n", regs->irp, regs->srp, regs->dccr, usp, regs->mof); printk(" r0: %08lx r1: %08lx r2: %08lx r3: %08lx\n", regs->r0, regs->r1, regs->r2, regs->r3); printk(" r4: %08lx r5: %08lx r6: %08lx r7: %08lx\n", regs->r4, regs->r5, regs->r6, regs->r7); printk(" r8: %08lx r9: %08lx r10: %08lx r11: %08lx\n", regs->r8, regs->r9, regs->r10, regs->r11); printk("r12: %08lx r13: %08lx oR10: %08lx sp: %08lx\n", regs->r12, regs->r13, regs->orig_r10, (long unsigned)regs); printk("R_MMU_CAUSE: %08lx\n", (unsigned long)*R_MMU_CAUSE); printk("Process %s (pid: %d, stackpage=%08lx)\n", current->comm, current->pid, (unsigned long)current); /* * When in-kernel, we also print out the stack and code at the * time of the fault.. */ if (!user_mode(regs)) { int i; show_stack(NULL, (unsigned long *)usp); /* * If the previous stack-dump wasn't a kernel one, dump the * kernel stack now. */ if (usp != 0) show_stack(NULL, NULL); printk("\nCode: "); if (regs->irp < PAGE_OFFSET) goto bad_value; /* * Quite often the value at regs->irp doesn't point to the * interesting instruction, which often is the previous * instruction. So dump at an offset large enough that the * instruction decoding should be in sync at the interesting * point, but small enough to fit on a row. The regs->irp * location is pointed out in a ksymoops-friendly way by * wrapping the byte for that address in parenthesises. */ for (i = -12; i < 12; i++) { unsigned char c; if (__get_user(c, &((unsigned char *)regs->irp)[i])) { bad_value: printk(" Bad IP value."); break; } if (i == 0) printk("(%02x) ", c); else printk("%02x ", c); } printk("\n"); } }


mikael starvikmikael starvik27192.49%266.67%
jesper nilssonjesper nilsson227.51%133.33%

void arch_enable_nmi(void) { asm volatile ("setf m"); }


jesper nilssonjesper nilsson660.00%150.00%
mikael starvikmikael starvik440.00%150.00%

extern void (*nmi_handler)(struct pt_regs *);
void handle_nmi(struct pt_regs *regs) { if (nmi_handler) nmi_handler(regs); /* Wait until nmi is no longer active. (We enable NMI immediately after returning from this function, and we don't want it happening while exiting from the NMI interrupt handler.) */ while (*R_IRQ_MASK0_RD & IO_STATE(R_IRQ_MASK0_RD, nmi_pin, active)) ; }


jesper nilssonjesper nilsson1851.43%150.00%
mikael starvikmikael starvik1748.57%150.00%

void handle_BUG(struct pt_regs *regs) { struct bug_frame f; unsigned char c; unsigned long irp = regs->irp; if (__copy_from_user(&f, (const void __user *)(irp - 8), sizeof f)) return; if (f.prefix != BUG_PREFIX || f.magic != BUG_MAGIC) return; if (__get_user(c, f.filename)) f.filename = "<bad filename>"; printk("kernel BUG at %s:%d!\n", f.filename, f.line); }


jesper nilssonjesper nilsson7376.84%150.00%
mikael starvikmikael starvik2223.16%150.00%


Overall Contributors

mikael starvikmikael starvik32770.63%240.00%
jesper nilssonjesper nilsson13328.73%240.00%
david howellsdavid howells30.65%120.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
{% endraw %}