cregit-Linux how code gets into the kernel

Release 4.7 arch/cris/kernel/traps.c

Directory: arch/cris/kernel
 *  linux/arch/cris/traps.c
 *  Here we handle the break vectors not used by the system call
 *  mechanism, as well as some general stack/register dumping
 *  things.
 *  Copyright (C) 2000-2007 Axis Communications AB
 *  Authors:   Bjorn Wesen
 *             Hans-Peter Nilsson

#include <linux/init.h>
#include <linux/module.h>
#include <linux/utsname.h>
#include <linux/kallsyms.h>

#include <asm/pgtable.h>
#include <asm/uaccess.h>
#include <arch/system.h>

extern void arch_enable_nmi(void);
extern void stop_watchdog(void);
extern void reset_watchdog(void);
extern void show_registers(struct pt_regs *regs);

extern void handle_BUG(struct pt_regs *regs);

#define handle_BUG(regs)

static int kstack_depth_to_print = 24;

void (*nmi_handler)(struct pt_regs *);

void show_trace(unsigned long *stack) { unsigned long addr, module_start, module_end; extern char _stext, _etext; int i; pr_err("\nCall Trace: "); i = 1; module_start = VMALLOC_START; module_end = VMALLOC_END; while (((long)stack & (THREAD_SIZE - 1)) != 0) { if (__get_user(addr, stack)) { /* This message matches "failing address" marked s390 in ksymoops, so lines containing it will not be filtered out by ksymoops. */ pr_err("Failing address 0x%lx\n", (unsigned long)stack); break; } stack++; /* * If the address is either in the text segment of the * kernel, or in the region which contains vmalloc'ed * memory, it *may* be the address of a calling * routine; if so, print it so that someone tracing * down the cause of the crash will be able to figure * out the call path that was taken. */ if (((addr >= (unsigned long)&_stext) && (addr <= (unsigned long)&_etext)) || ((addr >= module_start) && (addr <= module_end))) { #ifdef CONFIG_KALLSYMS print_ip_sym(addr); #else if (i && ((i % 8) == 0)) pr_err("\n "); pr_err("[<%08lx>] ", addr); i++; #endif } } }


linus torvaldslinus torvalds15689.66%360.00%
jesper nilssonjesper nilsson1810.34%240.00%

/* * These constants are for searching for possible module text * segments. MODULE_RANGE is a guess of how much space is likely * to be vmalloced. */ #define MODULE_RANGE (8*1024*1024) /* * The output (format, strings and order) is adjusted to be usable with * ksymoops-2.4.1 with some necessary CRIS-specific patches. Please don't * change it unless you're serious about adjusting ksymoops and syncing * with the ksymoops maintainer. */
void show_stack(struct task_struct *task, unsigned long *sp) { unsigned long *stack, addr; int i; /* * debugging aid: "show_stack(NULL);" prints a * back trace. */ if (sp == NULL) { if (task) sp = (unsigned long*)task->thread.ksp; else sp = (unsigned long*)rdsp(); } stack = sp; pr_err("\nStack from %08lx:\n ", (unsigned long)stack); for (i = 0; i < kstack_depth_to_print; i++) { if (((long)stack & (THREAD_SIZE-1)) == 0) break; if (i && ((i % 8) == 0)) pr_err("\n "); if (__get_user(addr, stack)) { /* This message matches "failing address" marked s390 in ksymoops, so lines containing it will not be filtered out by ksymoops. */ pr_err("Failing address 0x%lx\n", (unsigned long)stack); break; } stack++; pr_err("%08lx ", addr); } show_trace(sp); }


linus torvaldslinus torvalds13982.74%133.33%
mikael starvikmikael starvik2514.88%133.33%
jesper nilssonjesper nilsson42.38%133.33%

#if 0 /* displays a short stack trace */ int show_stack(void) { unsigned long *sp = (unsigned long *)rdusp(); int i; pr_err("Stack dump [0x%08lx]:\n", (unsigned long)sp); for (i = 0; i < 16; i++) pr_err("sp + %d: 0x%08lx\n", i*4, sp[i]); return 0; } #endif
void set_nmi_handler(void (*handler)(struct pt_regs *)) { nmi_handler = handler; arch_enable_nmi(); }


mikael starvikmikael starvik2295.65%150.00%
jesper nilssonjesper nilsson14.35%150.00%

void oops_nmi_handler(struct pt_regs *regs) { stop_watchdog(); oops_in_progress = 1; pr_err("NMI!\n"); show_registers(regs); oops_in_progress = 0; oops_exit(); pr_err("\n"); /* Flush mtdoops. */ }


mikael starvikmikael starvik2152.50%133.33%
jesper nilssonjesper nilsson1947.50%266.67%

static int __init oops_nmi_register(void) { set_nmi_handler(oops_nmi_handler); return 0; }


mikael starvikmikael starvik17100.00%1100.00%

__initcall(oops_nmi_register); #endif /* * This gets called from entry.S when the watchdog has bitten. Show something * similar to an Oops dump, and if the kernel is configured to be a nice * doggy, then halt instead of reboot. */
void watchdog_bite_hook(struct pt_regs *regs) { #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY local_irq_disable(); stop_watchdog(); show_registers(regs); while (1) ; /* Do nothing. */ #else show_registers(regs); #endif }


jesper nilssonjesper nilsson2974.36%233.33%
andrew mortonandrew morton410.26%116.67%
linus torvaldslinus torvalds37.69%233.33%
arnaldo carvalho de meloarnaldo carvalho de melo37.69%116.67%

/* This is normally the Oops function. */
void die_if_kernel(const char *str, struct pt_regs *regs, long err) { if (user_mode(regs)) return; #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY /* * This printout might take too long and could trigger * the watchdog normally. If NICE_DOGGY is set, simply * stop the watchdog during the printout. */ stop_watchdog(); #endif oops_enter(); handle_BUG(regs); pr_err("Linux %s %s\n", utsname()->release, utsname()->version); pr_err("%s: %04lx\n", str, err & 0xffff); show_registers(regs); oops_exit(); oops_in_progress = 0; pr_err("\n"); /* Flush mtdoops. */ #ifdef CONFIG_ETRAX_WATCHDOG_NICE_DOGGY reset_watchdog(); #endif do_exit(SIGSEGV); }


jesper nilssonjesper nilsson8989.00%266.67%
mikael starvikmikael starvik1111.00%133.33%

void __init trap_init(void) { /* Nothing needs to be done */ }


jesper nilssonjesper nilsson888.89%150.00%
mikael starvikmikael starvik111.11%150.00%

Overall Contributors

linus torvaldslinus torvalds31745.74%428.57%
jesper nilssonjesper nilsson24935.93%214.29%
mikael starvikmikael starvik11216.16%214.29%
andrew mortonandrew morton71.01%214.29%
arnaldo carvalho de meloarnaldo carvalho de melo30.43%17.14%
david howellsdavid howells30.43%17.14%
lucas de marchilucas de marchi10.14%17.14%
stephen rothwellstephen rothwell10.14%17.14%
Directory: arch/cris/kernel
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
{% endraw %}