return 0;
bad_thumb2:
- gdprintk(XENLOG_ERR, "unhandled THUMB2 instruction 0x%x%x\n", hw1, hw2);
+ gprintk(XENLOG_ERR, "unhandled THUMB2 instruction 0x%x%x\n", hw1, hw2);
return 1;
}
return 0;
bad_thumb:
- gdprintk(XENLOG_ERR, "unhandled THUMB instruction 0x%x\n", instr);
+ gprintk(XENLOG_ERR, "unhandled THUMB instruction 0x%x\n", instr);
return 1;
}
return decode_thumb(regs->pc, dabt);
/* TODO: Handle ARM instruction */
- gdprintk(XENLOG_ERR, "unhandled ARM instruction\n");
+ gprintk(XENLOG_ERR, "unhandled ARM instruction\n");
return 1;
}
break;
default:
-#ifndef NDEBUG
gdprintk(XENLOG_ERR,
"%s p15, %d, r%d, cr%d, cr%d, %d @ 0x%"PRIregister"\n",
cp32.read ? "mrc" : "mcr",
cp32.op1, cp32.reg, cp32.crn, cp32.crm, cp32.op2, regs->pc);
gdprintk(XENLOG_ERR, "unhandled 32-bit CP15 access %#x\n",
hsr.bits & HSR_CP32_REGS_MASK);
-#endif
inject_undef_exception(regs, hsr.len);
return;
}
break;
default:
{
-#ifndef NDEBUG
struct hsr_cp64 cp64 = hsr.cp64;
gdprintk(XENLOG_ERR,
cp64.op1, cp64.reg1, cp64.reg2, cp64.crm, regs->pc);
gdprintk(XENLOG_ERR, "unhandled 64-bit CP15 access %#x\n",
hsr.bits & HSR_CP64_REGS_MASK);
-#endif
inject_undef_exception(regs, hsr.len);
return;
}
default:
bad_cp:
-#ifndef NDEBUG
gdprintk(XENLOG_ERR,
"%s p14, %d, r%d, cr%d, cr%d, %d @ 0x%"PRIregister"\n",
cp32.read ? "mrc" : "mcr",
cp32.op1, cp32.reg, cp32.crn, cp32.crm, cp32.op2, regs->pc);
gdprintk(XENLOG_ERR, "unhandled 32-bit cp14 access %#x\n",
hsr.bits & HSR_CP32_REGS_MASK);
-#endif
inject_undef_exception(regs, hsr.len);
return;
}
static void do_cp14_dbg(struct cpu_user_regs *regs, union hsr hsr)
{
-#ifndef NDEBUG
struct hsr_cp64 cp64 = hsr.cp64;
-#endif
if ( !check_conditional_instr(regs, hsr) )
{
return;
}
-#ifndef NDEBUG
gdprintk(XENLOG_ERR,
"%s p14, %d, r%d, r%d, cr%d @ 0x%"PRIregister"\n",
cp64.read ? "mrrc" : "mcrr",
cp64.op1, cp64.reg1, cp64.reg2, cp64.crm, regs->pc);
gdprintk(XENLOG_ERR, "unhandled 64-bit CP14 access %#x\n",
hsr.bits & HSR_CP64_REGS_MASK);
-#endif
+
inject_undef_exception(regs, hsr.len);
}
static void do_cp(struct cpu_user_regs *regs, union hsr hsr)
{
-#ifndef NDEBUG
struct hsr_cp cp = hsr.cp;
-#endif
if ( !check_conditional_instr(regs, hsr) )
{
return;
}
-#ifndef NDEBUG
ASSERT(!cp.tas); /* We don't trap SIMD instruction */
gdprintk(XENLOG_ERR, "unhandled CP%d access\n", cp.coproc);
-#endif
inject_undef_exception(regs, hsr.len);
}
bad_sysreg:
{
struct hsr_sysreg sysreg = hsr.sysreg;
-#ifndef NDEBUG
gdprintk(XENLOG_ERR,
"%s %d, %d, c%d, c%d, %d %s x%d @ 0x%"PRIregister"\n",
sysreg.reg, regs->pc);
gdprintk(XENLOG_ERR, "unhandled 64-bit sysreg access %#x\n",
hsr.bits & HSR_SYSREG_REGS_MASK);
-#endif
+
inject_undef_exception(regs, sysreg.len);
return;
}
rc = decode_instruction(regs, &info.dabt);
if ( rc )
{
- gdprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
+ gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
goto bad_data_abort;
}
}
set_bit(current->vcpu_id, &vcpu_mask);
break;
default:
- gdprintk(XENLOG_WARNING,
- "vGICD:unhandled GICD_SGIR write %"PRIregister" \
- with wrong mode\n", sgir);
+ gprintk(XENLOG_WARNING,
+ "vGICD:unhandled GICD_SGIR write %"PRIregister" \
+ with wrong mode\n", sgir);
return 0;
}
{
if ( d->vcpu[vcpuid] != NULL && !is_vcpu_online(d->vcpu[vcpuid]) )
{
- gdprintk(XENLOG_WARNING, "VGIC: write r=%"PRIregister" \
- vcpu_mask=%lx, wrong CPUTargetList\n", sgir, vcpu_mask);
+ gprintk(XENLOG_WARNING, "VGIC: write r=%"PRIregister" \
+ vcpu_mask=%lx, wrong CPUTargetList\n", sgir, vcpu_mask);
continue;
}
vgic_vcpu_inject_irq(d->vcpu[vcpuid], virq);