|
|
@@ -36,7 +36,7 @@
|
|
|
/*
|
|
|
Panic handlers; these get called when an unhandled exception occurs or the assembly-level
|
|
|
task switching / interrupt code runs into an unrecoverable error. The default task stack
|
|
|
- overflow handler also is in here.
|
|
|
+ overflow handler and abort handler are also in here.
|
|
|
*/
|
|
|
|
|
|
/*
|
|
|
@@ -95,15 +95,29 @@ inline static void panicPutHex(int a) { }
|
|
|
inline static void panicPutDec(int a) { }
|
|
|
#endif
|
|
|
|
|
|
-
|
|
|
void __attribute__((weak)) vApplicationStackOverflowHook( TaskHandle_t xTask, signed char *pcTaskName )
|
|
|
{
|
|
|
panicPutStr("***ERROR*** A stack overflow in task ");
|
|
|
panicPutStr((char *)pcTaskName);
|
|
|
panicPutStr(" has been detected.\r\n");
|
|
|
- configASSERT(0);
|
|
|
+ abort();
|
|
|
+}
|
|
|
+
|
|
|
+static bool abort_called;
|
|
|
+
|
|
|
+void abort()
|
|
|
+{
|
|
|
+#if !CONFIG_ESP32_PANIC_SILENT_REBOOT
|
|
|
+ ets_printf("abort() was called at PC 0x%08x\n", (intptr_t)__builtin_return_address(0) - 3);
|
|
|
+#endif
|
|
|
+ abort_called = true;
|
|
|
+ while(1) {
|
|
|
+ __asm__ ("break 0,0");
|
|
|
+ *((int*) 0) = 0;
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
+
|
|
|
static const char *edesc[] = {
|
|
|
"IllegalInstruction", "Syscall", "InstructionFetchError", "LoadStoreError",
|
|
|
"Level1Interrupt", "Alloca", "IntegerDivideByZero", "PCValue",
|
|
|
@@ -118,7 +132,7 @@ static const char *edesc[] = {
|
|
|
};
|
|
|
|
|
|
|
|
|
-void commonErrorHandler(XtExcFrame *frame);
|
|
|
+static void commonErrorHandler(XtExcFrame *frame);
|
|
|
|
|
|
//The fact that we've panic'ed probably means the other CPU is now running wild, possibly
|
|
|
//messing up the serial output, so we stall it here.
|
|
|
@@ -127,19 +141,6 @@ static void haltOtherCore()
|
|
|
esp_cpu_stall( xPortGetCoreID() == 0 ? 1 : 0 );
|
|
|
}
|
|
|
|
|
|
-//Returns true when a debugger is attached using JTAG.
|
|
|
-static int inOCDMode()
|
|
|
-{
|
|
|
-#if CONFIG_ESP32_DEBUG_OCDAWARE
|
|
|
- int dcr;
|
|
|
- int reg = 0x10200C; //DSRSET register
|
|
|
- asm("rer %0,%1":"=r"(dcr):"r"(reg));
|
|
|
- return (dcr & 0x1);
|
|
|
-#else
|
|
|
- return 0; //Always return no debugger is attached.
|
|
|
-#endif
|
|
|
-}
|
|
|
-
|
|
|
void panicHandler(XtExcFrame *frame)
|
|
|
{
|
|
|
int *regs = (int *)frame;
|
|
|
@@ -165,7 +166,7 @@ void panicHandler(XtExcFrame *frame)
|
|
|
panicPutStr(reason);
|
|
|
panicPutStr(")\r\n");
|
|
|
|
|
|
- if (inOCDMode()) {
|
|
|
+ if (esp_cpu_in_ocd_debug_mode()) {
|
|
|
asm("break.n 1");
|
|
|
}
|
|
|
commonErrorHandler(frame);
|
|
|
@@ -197,7 +198,7 @@ void xt_unhandled_exception(XtExcFrame *frame)
|
|
|
}
|
|
|
panicPutStr(" occurred on core ");
|
|
|
panicPutDec(xPortGetCoreID());
|
|
|
- if (inOCDMode()) {
|
|
|
+ if (esp_cpu_in_ocd_debug_mode()) {
|
|
|
panicPutStr(" at pc=");
|
|
|
panicPutHex(regs[1]);
|
|
|
panicPutStr(". Setting bp and returning..\r\n");
|
|
|
@@ -255,6 +256,7 @@ static inline bool stackPointerIsSane(uint32_t sp)
|
|
|
{
|
|
|
return !(sp < 0x3ffae010 || sp > 0x3ffffff0 || ((sp & 0xf) != 0));
|
|
|
}
|
|
|
+
|
|
|
static void putEntry(uint32_t pc, uint32_t sp)
|
|
|
{
|
|
|
if (pc & 0x80000000) {
|
|
|
@@ -265,7 +267,8 @@ static void putEntry(uint32_t pc, uint32_t sp)
|
|
|
panicPutStr(":0x");
|
|
|
panicPutHex(sp);
|
|
|
}
|
|
|
-void doBacktrace(XtExcFrame *frame)
|
|
|
+
|
|
|
+static void doBacktrace(XtExcFrame *frame)
|
|
|
{
|
|
|
uint32_t i = 0, pc = frame->pc, sp = frame->a1;
|
|
|
panicPutStr("\nBacktrace:");
|
|
|
@@ -291,7 +294,7 @@ void doBacktrace(XtExcFrame *frame)
|
|
|
We arrive here after a panic or unhandled exception, when no OCD is detected. Dump the registers to the
|
|
|
serial port and either jump to the gdb stub, halt the CPU or reboot.
|
|
|
*/
|
|
|
-void commonErrorHandler(XtExcFrame *frame)
|
|
|
+static void commonErrorHandler(XtExcFrame *frame)
|
|
|
{
|
|
|
int *regs = (int *)frame;
|
|
|
int x, y;
|
|
|
@@ -304,21 +307,28 @@ void commonErrorHandler(XtExcFrame *frame)
|
|
|
//Feed the watchdogs, so they will give us time to print out debug info
|
|
|
reconfigureAllWdts();
|
|
|
|
|
|
- panicPutStr("Register dump:\r\n");
|
|
|
-
|
|
|
- for (x = 0; x < 24; x += 4) {
|
|
|
- for (y = 0; y < 4; y++) {
|
|
|
- if (sdesc[x + y][0] != 0) {
|
|
|
- panicPutStr(sdesc[x + y]);
|
|
|
- panicPutStr(": 0x");
|
|
|
- panicPutHex(regs[x + y + 1]);
|
|
|
- panicPutStr(" ");
|
|
|
+ /* only dump registers for 'real' crashes, if crashing via abort()
|
|
|
+ the register window is no longer useful.
|
|
|
+ */
|
|
|
+ if (!abort_called) {
|
|
|
+ panicPutStr("Register dump:\r\n");
|
|
|
+
|
|
|
+ for (x = 0; x < 24; x += 4) {
|
|
|
+ for (y = 0; y < 4; y++) {
|
|
|
+ if (sdesc[x + y][0] != 0) {
|
|
|
+ panicPutStr(sdesc[x + y]);
|
|
|
+ panicPutStr(": 0x");
|
|
|
+ panicPutHex(regs[x + y + 1]);
|
|
|
+ panicPutStr(" ");
|
|
|
+ }
|
|
|
}
|
|
|
+ panicPutStr("\r\n");
|
|
|
}
|
|
|
- panicPutStr("\r\n");
|
|
|
}
|
|
|
+
|
|
|
/* With windowed ABI backtracing is easy, let's do it. */
|
|
|
doBacktrace(frame);
|
|
|
+
|
|
|
#if CONFIG_ESP32_PANIC_GDBSTUB
|
|
|
disableAllWdts();
|
|
|
panicPutStr("Entering gdb stub now.\r\n");
|
|
|
@@ -339,8 +349,7 @@ void commonErrorHandler(XtExcFrame *frame)
|
|
|
|
|
|
void esp_set_breakpoint_if_jtag(void *fn)
|
|
|
{
|
|
|
- if (!inOCDMode()) {
|
|
|
- return;
|
|
|
+ if (esp_cpu_in_ocd_debug_mode()) {
|
|
|
+ setFirstBreakpoint((uint32_t)fn);
|
|
|
}
|
|
|
- setFirstBreakpoint((uint32_t)fn);
|
|
|
}
|