fatal.c 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. /*
  2. * Copyright (c) 2019 Intel Corporation.
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include <kernel.h>
  7. #include <kernel_internal.h>
  8. #include <kernel_structs.h>
  9. #include <sys/__assert.h>
  10. #include <arch/cpu.h>
  11. #include <logging/log_ctrl.h>
  12. #include <logging/log.h>
  13. #include <fatal.h>
  14. #include <debug/coredump.h>
  15. LOG_MODULE_DECLARE(os, CONFIG_KERNEL_LOG_LEVEL);
  16. /* LCOV_EXCL_START */
  17. FUNC_NORETURN __weak void arch_system_halt(unsigned int reason)
  18. {
  19. ARG_UNUSED(reason);
  20. /* TODO: What's the best way to totally halt the system if SMP
  21. * is enabled?
  22. */
  23. (void)arch_irq_lock();
  24. for (;;) {
  25. /* Spin endlessly */
  26. }
  27. }
  28. /* LCOV_EXCL_STOP */
  29. /* LCOV_EXCL_START */
  30. __weak void k_sys_fatal_error_handler(unsigned int reason,
  31. const z_arch_esf_t *esf)
  32. {
  33. ARG_UNUSED(esf);
  34. LOG_PANIC();
  35. LOG_ERR("Halting system");
  36. arch_system_halt(reason);
  37. CODE_UNREACHABLE; /* LCOV_EXCL_LINE */
  38. }
  39. /* LCOV_EXCL_STOP */
  40. static const char *thread_name_get(struct k_thread *thread)
  41. {
  42. const char *thread_name = (thread != NULL) ? k_thread_name_get(thread) : NULL;
  43. if ((thread_name == NULL) || (thread_name[0] == '\0')) {
  44. thread_name = "unknown";
  45. }
  46. return thread_name;
  47. }
  48. static const char *reason_to_str(unsigned int reason)
  49. {
  50. switch (reason) {
  51. case K_ERR_CPU_EXCEPTION:
  52. return "CPU exception";
  53. case K_ERR_SPURIOUS_IRQ:
  54. return "Unhandled interrupt";
  55. case K_ERR_STACK_CHK_FAIL:
  56. return "Stack overflow";
  57. case K_ERR_KERNEL_OOPS:
  58. return "Kernel oops";
  59. case K_ERR_KERNEL_PANIC:
  60. return "Kernel panic";
  61. default:
  62. return "Unknown error";
  63. }
  64. }
  65. /* LCOV_EXCL_START */
  66. FUNC_NORETURN void k_fatal_halt(unsigned int reason)
  67. {
  68. arch_system_halt(reason);
  69. }
  70. /* LCOV_EXCL_STOP */
  71. static inline int get_cpu(void)
  72. {
  73. #if defined(CONFIG_SMP)
  74. return arch_curr_cpu()->id;
  75. #else
  76. return 0;
  77. #endif
  78. }
  79. void z_fatal_error(unsigned int reason, const z_arch_esf_t *esf)
  80. {
  81. /* We can't allow this code to be preempted, but don't need to
  82. * synchronize between CPUs, so an arch-layer lock is
  83. * appropriate.
  84. */
  85. unsigned int key = arch_irq_lock();
  86. struct k_thread *thread = IS_ENABLED(CONFIG_MULTITHREADING) ?
  87. k_current_get() : NULL;
  88. /* twister looks for the "ZEPHYR FATAL ERROR" string, don't
  89. * change it without also updating twister
  90. */
  91. LOG_ERR(">>> ZEPHYR FATAL ERROR %d: %s on CPU %d", reason,
  92. reason_to_str(reason), get_cpu());
  93. /* FIXME: This doesn't seem to work as expected on all arches.
  94. * Need a reliable way to determine whether the fault happened when
  95. * an IRQ or exception was being handled, or thread context.
  96. *
  97. * See #17656
  98. */
  99. #if defined(CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION)
  100. if ((esf != NULL) && arch_is_in_nested_exception(esf)) {
  101. LOG_ERR("Fault during interrupt handling\n");
  102. }
  103. #endif
  104. LOG_ERR("Current thread: %p (%s)", thread,
  105. log_strdup(thread_name_get(thread)));
  106. coredump(reason, esf, thread);
  107. k_sys_fatal_error_handler(reason, esf);
  108. /* If the system fatal error handler returns, then kill the faulting
  109. * thread; a policy decision was made not to hang the system.
  110. *
  111. * Policy for fatal errors in ISRs: unconditionally panic.
  112. *
  113. * There is one exception to this policy: a stack sentinel
  114. * check may be performed (on behalf of the current thread)
  115. * during ISR exit, but in this case the thread should be
  116. * aborted.
  117. *
  118. * Note that k_thread_abort() returns on some architectures but
  119. * not others; e.g. on ARC, x86_64, Xtensa with ASM2, ARM
  120. */
  121. if (!IS_ENABLED(CONFIG_TEST)) {
  122. __ASSERT(reason != K_ERR_KERNEL_PANIC,
  123. "Attempted to recover from a kernel panic condition");
  124. /* FIXME: #17656 */
  125. #if defined(CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION)
  126. if ((esf != NULL) && arch_is_in_nested_exception(esf)) {
  127. #if defined(CONFIG_STACK_SENTINEL)
  128. if (reason != K_ERR_STACK_CHK_FAIL) {
  129. __ASSERT(0,
  130. "Attempted to recover from a fatal error in ISR");
  131. }
  132. #endif /* CONFIG_STACK_SENTINEL */
  133. }
  134. #endif /* CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION */
  135. } else {
  136. /* Test mode */
  137. #if defined(CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION)
  138. if ((esf != NULL) && arch_is_in_nested_exception(esf)) {
  139. /* Abort the thread only on STACK Sentinel check fail. */
  140. #if defined(CONFIG_STACK_SENTINEL)
  141. if (reason != K_ERR_STACK_CHK_FAIL) {
  142. arch_irq_unlock(key);
  143. return;
  144. }
  145. #else
  146. arch_irq_unlock(key);
  147. return;
  148. #endif /* CONFIG_STACK_SENTINEL */
  149. } else {
  150. /* Abort the thread only if the fault is not due to
  151. * a spurious ISR handler triggered.
  152. */
  153. if (reason == K_ERR_SPURIOUS_IRQ) {
  154. arch_irq_unlock(key);
  155. return;
  156. }
  157. }
  158. #endif /*CONFIG_ARCH_HAS_NESTED_EXCEPTION_DETECTION */
  159. }
  160. arch_irq_unlock(key);
  161. if (IS_ENABLED(CONFIG_MULTITHREADING)) {
  162. k_thread_abort(thread);
  163. }
  164. }