You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
179 lines
4.6 KiB
179 lines
4.6 KiB
/* |
|
* Copyright (c) 2019 Intel Corporation. |
|
* |
|
* SPDX-License-Identifier: Apache-2.0 |
|
*/ |
|
|
|
#include <zephyr/kernel.h> |
|
|
|
#include <kernel_internal.h> |
|
#include <zephyr/kernel_structs.h> |
|
#include <zephyr/sys/__assert.h> |
|
#include <zephyr/arch/cpu.h> |
|
#include <zephyr/logging/log_ctrl.h> |
|
#include <zephyr/logging/log.h> |
|
#include <zephyr/fatal.h> |
|
#include <zephyr/debug/coredump.h> |
|
|
|
LOG_MODULE_DECLARE(os, CONFIG_KERNEL_LOG_LEVEL); |
|
|
|
/* LCOV_EXCL_START */ |
|
FUNC_NORETURN __weak void arch_system_halt(unsigned int reason) |
|
{ |
|
ARG_UNUSED(reason); |
|
|
|
/* TODO: What's the best way to totally halt the system if SMP |
|
* is enabled? |
|
*/ |
|
|
|
(void)arch_irq_lock(); |
|
for (;;) { |
|
/* Spin endlessly */ |
|
} |
|
} |
|
/* LCOV_EXCL_STOP */ |
|
|
|
/* LCOV_EXCL_START */ |
|
__weak void k_sys_fatal_error_handler(unsigned int reason, |
|
const struct arch_esf *esf) |
|
{ |
|
ARG_UNUSED(esf); |
|
|
|
LOG_PANIC(); |
|
LOG_ERR("Halting system"); |
|
arch_system_halt(reason); |
|
CODE_UNREACHABLE; |
|
} |
|
/* LCOV_EXCL_STOP */ |
|
|
|
static const char *thread_name_get(struct k_thread *thread) |
|
{ |
|
const char *thread_name = (thread != NULL) ? k_thread_name_get(thread) : NULL; |
|
|
|
if ((thread_name == NULL) || (thread_name[0] == '\0')) { |
|
thread_name = "unknown"; |
|
} |
|
|
|
return thread_name; |
|
} |
|
|
|
static const char *reason_to_str(unsigned int reason) |
|
{ |
|
switch (reason) { |
|
case K_ERR_CPU_EXCEPTION: |
|
return "CPU exception"; |
|
case K_ERR_SPURIOUS_IRQ: |
|
return "Unhandled interrupt"; |
|
case K_ERR_STACK_CHK_FAIL: |
|
return "Stack overflow"; |
|
case K_ERR_KERNEL_OOPS: |
|
return "Kernel oops"; |
|
case K_ERR_KERNEL_PANIC: |
|
return "Kernel panic"; |
|
default: |
|
return "Unknown error"; |
|
} |
|
} |
|
|
|
/* LCOV_EXCL_START */ |
|
FUNC_NORETURN void k_fatal_halt(unsigned int reason) |
|
{ |
|
arch_system_halt(reason); |
|
} |
|
/* LCOV_EXCL_STOP */ |
|
|
|
void z_fatal_error(unsigned int reason, const struct arch_esf *esf) |
|
{ |
|
/* We can't allow this code to be preempted, but don't need to |
|
* synchronize between CPUs, so an arch-layer lock is |
|
* appropriate. |
|
*/ |
|
unsigned int key = arch_irq_lock(); |
|
struct k_thread *thread = IS_ENABLED(CONFIG_MULTITHREADING) ? |
|
_current : NULL; |
|
|
|
/* twister looks for the "ZEPHYR FATAL ERROR" string, don't |
|
* change it without also updating twister |
|
*/ |
|
LOG_ERR(">>> ZEPHYR FATAL ERROR %d: %s on CPU %d", reason, |
|
reason_to_str(reason), _current_cpu->id); |
|
|
|
/* FIXME: This doesn't seem to work as expected on all arches. |
|
* Need a reliable way to determine whether the fault happened when |
|
* an IRQ or exception was being handled, or thread context. |
|
* |
|
* See #17656 |
|
*/ |
|
#if defined(CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION) |
|
if ((esf != NULL) && arch_is_in_nested_exception(esf)) { |
|
LOG_ERR("Fault during interrupt handling\n"); |
|
} |
|
#endif /* CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION */ |
|
|
|
if (IS_ENABLED(CONFIG_MULTITHREADING)) { |
|
LOG_ERR("Current thread: %p (%s)", thread, thread_name_get(thread)); |
|
} |
|
|
|
coredump(reason, esf, thread); |
|
|
|
k_sys_fatal_error_handler(reason, esf); |
|
|
|
/* If the system fatal error handler returns, then kill the faulting |
|
* thread; a policy decision was made not to hang the system. |
|
* |
|
* Policy for fatal errors in ISRs: unconditionally panic. |
|
* |
|
* There is one exception to this policy: a stack sentinel |
|
* check may be performed (on behalf of the current thread) |
|
* during ISR exit, but in this case the thread should be |
|
* aborted. |
|
* |
|
* Note that k_thread_abort() returns on some architectures but |
|
* not others; e.g. on ARC, x86_64, Xtensa with ASM2, ARM |
|
*/ |
|
if (!IS_ENABLED(CONFIG_TEST)) { |
|
__ASSERT(reason != K_ERR_KERNEL_PANIC, |
|
"Attempted to recover from a kernel panic condition"); |
|
/* FIXME: #17656 */ |
|
#if defined(CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION) |
|
if ((esf != NULL) && arch_is_in_nested_exception(esf)) { |
|
#if defined(CONFIG_STACK_SENTINEL) |
|
if (reason != K_ERR_STACK_CHK_FAIL) { |
|
__ASSERT(0, |
|
"Attempted to recover from a fatal error in ISR"); |
|
} |
|
#endif /* CONFIG_STACK_SENTINEL */ |
|
} |
|
#endif /* CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION */ |
|
} else { |
|
/* Test mode */ |
|
#if defined(CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION) |
|
if ((esf != NULL) && arch_is_in_nested_exception(esf)) { |
|
/* Abort the thread only on STACK Sentinel check fail. */ |
|
#if defined(CONFIG_STACK_SENTINEL) |
|
if (reason != K_ERR_STACK_CHK_FAIL) { |
|
arch_irq_unlock(key); |
|
return; |
|
} |
|
#else |
|
arch_irq_unlock(key); |
|
return; |
|
#endif /* CONFIG_STACK_SENTINEL */ |
|
} else { |
|
/* Abort the thread only if the fault is not due to |
|
* a spurious ISR handler triggered. |
|
*/ |
|
if (reason == K_ERR_SPURIOUS_IRQ) { |
|
arch_irq_unlock(key); |
|
return; |
|
} |
|
} |
|
#endif /*CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION */ |
|
} |
|
|
|
arch_irq_unlock(key); |
|
|
|
if (IS_ENABLED(CONFIG_MULTITHREADING)) { |
|
k_thread_abort(thread); |
|
} |
|
}
|
|
|