Linux Audio

Check our new training course

Loading...
v3.5.6
  1/*
  2 *  Copyright (C) 1991, 1992  Linus Torvalds
  3 *  Copyright (C) 2000, 2001, 2002 Andi Kleen, SuSE Labs
  4 */
  5#include <linux/kallsyms.h>
  6#include <linux/kprobes.h>
  7#include <linux/uaccess.h>
  8#include <linux/hardirq.h>
  9#include <linux/kdebug.h>
 10#include <linux/module.h>
 11#include <linux/ptrace.h>
 12#include <linux/kexec.h>
 13#include <linux/sysfs.h>
 14#include <linux/bug.h>
 15#include <linux/nmi.h>
 16
 17#include <asm/stacktrace.h>
 18
 
 
 
 
 
 
 
 
 
 
 19
 20void dump_trace(struct task_struct *task, struct pt_regs *regs,
 21		unsigned long *stack, unsigned long bp,
 22		const struct stacktrace_ops *ops, void *data)
 23{
 24	int graph = 0;
 
 25
 26	if (!task)
 27		task = current;
 
 
 
 
 28
 29	if (!stack) {
 30		unsigned long dummy;
 
 31
 32		stack = &dummy;
 33		if (task && task != current)
 34			stack = (unsigned long *)task->thread.sp;
 35	}
 
 36
 37	if (!bp)
 38		bp = stack_frame(task, regs);
 39
 40	for (;;) {
 41		struct thread_info *context;
 
 
 42
 43		context = (struct thread_info *)
 44			((unsigned long)stack & (~(THREAD_SIZE - 1)));
 45		bp = ops->walk_stack(context, stack, bp, ops, data, NULL, &graph);
 46
 47		stack = (unsigned long *)context->previous_esp;
 48		if (!stack)
 49			break;
 50		if (ops->stack(data, "IRQ") < 0)
 51			break;
 52		touch_nmi_watchdog();
 53	}
 
 
 
 
 
 
 
 54}
 55EXPORT_SYMBOL(dump_trace);
 56
 57void
 58show_stack_log_lvl(struct task_struct *task, struct pt_regs *regs,
 59		   unsigned long *sp, unsigned long bp, char *log_lvl)
 60{
 61	unsigned long *stack;
 62	int i;
 63
 64	if (sp == NULL) {
 65		if (task)
 66			sp = (unsigned long *)task->thread.sp;
 67		else
 68			sp = (unsigned long *)&sp;
 69	}
 
 
 
 
 70
 71	stack = sp;
 72	for (i = 0; i < kstack_depth_to_print; i++) {
 73		if (kstack_end(stack))
 74			break;
 75		if (i && ((i % STACKSLOTS_PER_LINE) == 0))
 76			printk(KERN_CONT "\n");
 77		printk(KERN_CONT " %08lx", *stack++);
 78		touch_nmi_watchdog();
 
 
 
 
 
 
 
 
 
 79	}
 80	printk(KERN_CONT "\n");
 81	show_trace_log_lvl(task, regs, sp, bp, log_lvl);
 82}
 83
 
 
 
 
 
 
 84
 85void show_regs(struct pt_regs *regs)
 86{
 87	int i;
 88
 89	print_modules();
 90	__show_regs(regs, !user_mode_vm(regs));
 91
 92	printk(KERN_EMERG "Process %.*s (pid: %d, ti=%p task=%p task.ti=%p)\n",
 93		TASK_COMM_LEN, current->comm, task_pid_nr(current),
 94		current_thread_info(), current, task_thread_info(current));
 95	/*
 96	 * When in-kernel, we also print out the stack and code at the
 97	 * time of the fault..
 98	 */
 99	if (!user_mode_vm(regs)) {
100		unsigned int code_prologue = code_bytes * 43 / 64;
101		unsigned int code_len = code_bytes;
102		unsigned char c;
103		u8 *ip;
104
105		printk(KERN_EMERG "Stack:\n");
106		show_stack_log_lvl(NULL, regs, &regs->sp, 0, KERN_EMERG);
107
108		printk(KERN_EMERG "Code: ");
109
110		ip = (u8 *)regs->ip - code_prologue;
111		if (ip < (u8 *)PAGE_OFFSET || probe_kernel_address(ip, c)) {
112			/* try starting at IP */
113			ip = (u8 *)regs->ip;
114			code_len = code_len - code_prologue + 1;
115		}
116		for (i = 0; i < code_len; i++, ip++) {
117			if (ip < (u8 *)PAGE_OFFSET ||
118					probe_kernel_address(ip, c)) {
119				printk(KERN_CONT " Bad EIP value.");
120				break;
121			}
122			if (ip == (u8 *)regs->ip)
123				printk(KERN_CONT "<%02x> ", c);
124			else
125				printk(KERN_CONT "%02x ", c);
126		}
127	}
128	printk(KERN_CONT "\n");
129}
130
131int is_valid_bugaddr(unsigned long ip)
132{
133	unsigned short ud2;
134
135	if (ip < PAGE_OFFSET)
136		return 0;
137	if (probe_kernel_address((unsigned short *)ip, ud2))
138		return 0;
139
140	return ud2 == 0x0b0f;
141}
v4.10.11
  1/*
  2 *  Copyright (C) 1991, 1992  Linus Torvalds
  3 *  Copyright (C) 2000, 2001, 2002 Andi Kleen, SuSE Labs
  4 */
  5#include <linux/kallsyms.h>
  6#include <linux/kprobes.h>
  7#include <linux/uaccess.h>
  8#include <linux/hardirq.h>
  9#include <linux/kdebug.h>
 10#include <linux/export.h>
 11#include <linux/ptrace.h>
 12#include <linux/kexec.h>
 13#include <linux/sysfs.h>
 14#include <linux/bug.h>
 15#include <linux/nmi.h>
 16
 17#include <asm/stacktrace.h>
 18
 19const char *stack_type_name(enum stack_type type)
 20{
 21	if (type == STACK_TYPE_IRQ)
 22		return "IRQ";
 23
 24	if (type == STACK_TYPE_SOFTIRQ)
 25		return "SOFTIRQ";
 26
 27	return NULL;
 28}
 29
 30static bool in_hardirq_stack(unsigned long *stack, struct stack_info *info)
 
 
 31{
 32	unsigned long *begin = (unsigned long *)this_cpu_read(hardirq_stack);
 33	unsigned long *end   = begin + (THREAD_SIZE / sizeof(long));
 34
 35	/*
 36	 * This is a software stack, so 'end' can be a valid stack pointer.
 37	 * It just means the stack is empty.
 38	 */
 39	if (stack < begin || stack > end)
 40		return false;
 41
 42	info->type	= STACK_TYPE_IRQ;
 43	info->begin	= begin;
 44	info->end	= end;
 45
 46	/*
 47	 * See irq_32.c -- the next stack pointer is stored at the beginning of
 48	 * the stack.
 49	 */
 50	info->next_sp	= (unsigned long *)*begin;
 51
 52	return true;
 53}
 54
 55static bool in_softirq_stack(unsigned long *stack, struct stack_info *info)
 56{
 57	unsigned long *begin = (unsigned long *)this_cpu_read(softirq_stack);
 58	unsigned long *end   = begin + (THREAD_SIZE / sizeof(long));
 59
 60	/*
 61	 * This is a software stack, so 'end' can be a valid stack pointer.
 62	 * It just means the stack is empty.
 63	 */
 64	if (stack < begin || stack > end)
 65		return false;
 66
 67	info->type	= STACK_TYPE_SOFTIRQ;
 68	info->begin	= begin;
 69	info->end	= end;
 70
 71	/*
 72	 * The next stack pointer is stored at the beginning of the stack.
 73	 * See irq_32.c.
 74	 */
 75	info->next_sp	= (unsigned long *)*begin;
 76
 77	return true;
 78}
 
 79
 80int get_stack_info(unsigned long *stack, struct task_struct *task,
 81		   struct stack_info *info, unsigned long *visit_mask)
 
 82{
 83	if (!stack)
 84		goto unknown;
 85
 86	task = task ? : current;
 87
 88	if (in_task_stack(stack, task, info))
 89		goto recursion_check;
 90
 91	if (task != current)
 92		goto unknown;
 93
 94	if (in_hardirq_stack(stack, info))
 95		goto recursion_check;
 96
 97	if (in_softirq_stack(stack, info))
 98		goto recursion_check;
 99
100	goto unknown;
101
102recursion_check:
103	/*
104	 * Make sure we don't iterate through any given stack more than once.
105	 * If it comes up a second time then there's something wrong going on:
106	 * just break out and report an unknown stack type.
107	 */
108	if (visit_mask) {
109		if (*visit_mask & (1UL << info->type)) {
110			printk_deferred_once(KERN_WARNING "WARNING: stack recursion on stack type %d\n", info->type);
111			goto unknown;
112		}
113		*visit_mask |= 1UL << info->type;
114	}
 
 
 
115
116	return 0;
117
118unknown:
119	info->type = STACK_TYPE_UNKNOWN;
120	return -EINVAL;
121}
122
123void show_regs(struct pt_regs *regs)
124{
125	int i;
126
127	show_regs_print_info(KERN_EMERG);
128	__show_regs(regs, !user_mode(regs));
129
 
 
 
130	/*
131	 * When in-kernel, we also print out the stack and code at the
132	 * time of the fault..
133	 */
134	if (!user_mode(regs)) {
135		unsigned int code_prologue = code_bytes * 43 / 64;
136		unsigned int code_len = code_bytes;
137		unsigned char c;
138		u8 *ip;
139
140		show_trace_log_lvl(current, regs, NULL, KERN_EMERG);
 
141
142		pr_emerg("Code:");
143
144		ip = (u8 *)regs->ip - code_prologue;
145		if (ip < (u8 *)PAGE_OFFSET || probe_kernel_address(ip, c)) {
146			/* try starting at IP */
147			ip = (u8 *)regs->ip;
148			code_len = code_len - code_prologue + 1;
149		}
150		for (i = 0; i < code_len; i++, ip++) {
151			if (ip < (u8 *)PAGE_OFFSET ||
152					probe_kernel_address(ip, c)) {
153				pr_cont("  Bad EIP value.");
154				break;
155			}
156			if (ip == (u8 *)regs->ip)
157				pr_cont(" <%02x>", c);
158			else
159				pr_cont(" %02x", c);
160		}
161	}
162	pr_cont("\n");
163}
164
165int is_valid_bugaddr(unsigned long ip)
166{
167	unsigned short ud2;
168
169	if (ip < PAGE_OFFSET)
170		return 0;
171	if (probe_kernel_address((unsigned short *)ip, ud2))
172		return 0;
173
174	return ud2 == 0x0b0f;
175}