Loading...
/* * Copyright (c) 2014 Wind River Systems, Inc. * * SPDX-License-Identifier: Apache-2.0 */ /** * @file * @brief Kernel fatal error handler for ARM Cortex-M and Cortex-R * * This module provides the z_arm_fatal_error() routine for ARM Cortex-M * and Cortex-R CPUs. */ #include <kernel.h> #include <logging/log.h> LOG_MODULE_DECLARE(os); static void esf_dump(const z_arch_esf_t *esf) { LOG_ERR("r0/a1: 0x%08x r1/a2: 0x%08x r2/a3: 0x%08x", esf->basic.a1, esf->basic.a2, esf->basic.a3); LOG_ERR("r3/a4: 0x%08x r12/ip: 0x%08x r14/lr: 0x%08x", esf->basic.a4, esf->basic.ip, esf->basic.lr); LOG_ERR(" xpsr: 0x%08x", esf->basic.xpsr); #if defined(CONFIG_FLOAT) && defined(CONFIG_FP_SHARING) for (int i = 0; i < 16; i += 4) { LOG_ERR("s[%d]: 0x%08x s[%d]: 0x%08x" " s[%d]: 0x%08x s[%d]: 0x%08x\n", i, (u32_t)esf->s[i], i + 1, (u32_t)esf->s[i + 1], i + 2, (u32_t)esf->s[i + 2], i + 3, (u32_t)esf->s[i + 3]); } LOG_ERR("fpscr: 0x%08x\n", esf->fpscr); #endif LOG_ERR("Faulting instruction address (r15/pc): 0x%08x", esf->basic.pc); } void z_arm_fatal_error(unsigned int reason, const z_arch_esf_t *esf) { if (esf != NULL) { esf_dump(esf); } z_fatal_error(reason, esf); } /** * @brief Handle a software-generated fatal exception * (e.g. kernel oops, panic, etc.). * * Notes: * - the function is invoked in SVC Handler * - if triggered from nPRIV mode, only oops and stack fail error reasons * may be propagated to the fault handling process. * - We expect the supplied exception stack frame to always be a valid * frame. That is because, if the ESF cannot be stacked during an SVC, * a processor fault (e.g. stacking error) will be generated, and the * fault handler will executed insted of the SVC. * * @param esf exception frame */ void z_do_kernel_oops(const z_arch_esf_t *esf) { /* Stacked R0 holds the exception reason. */ unsigned int reason = esf->basic.r0; #if defined(CONFIG_USERSPACE) if ((__get_CONTROL() & CONTROL_nPRIV_Msk) == CONTROL_nPRIV_Msk) { /* * Exception triggered from nPRIV mode. * * User mode is only allowed to induce oopses and stack check * failures via software-triggered system fatal exceptions. */ if (!((esf->basic.r0 == K_ERR_KERNEL_OOPS) || (esf->basic.r0 == K_ERR_STACK_CHK_FAIL))) { reason = K_ERR_KERNEL_OOPS; } } #endif /* CONFIG_USERSPACE */ z_arm_fatal_error(reason, esf); } FUNC_NORETURN void arch_syscall_oops(void *ssf_ptr) { u32_t *ssf_contents = ssf_ptr; z_arch_esf_t oops_esf = { 0 }; /* TODO: Copy the rest of the register set out of ssf_ptr */ oops_esf.basic.pc = ssf_contents[3]; z_arm_fatal_error(K_ERR_KERNEL_OOPS, &oops_esf); CODE_UNREACHABLE; } |