2017-11-24 14:00:32 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2013-03-14 12:44:25 +00:00
|
|
|
/*
|
|
|
|
* Stack dumping functions
|
|
|
|
*
|
|
|
|
* Copyright IBM Corp. 1999, 2013
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/kallsyms.h>
|
|
|
|
#include <linux/hardirq.h>
|
|
|
|
#include <linux/kprobes.h>
|
|
|
|
#include <linux/utsname.h>
|
|
|
|
#include <linux/export.h>
|
|
|
|
#include <linux/kdebug.h>
|
|
|
|
#include <linux/ptrace.h>
|
2016-03-15 21:57:36 +00:00
|
|
|
#include <linux/mm.h>
|
2013-03-14 12:44:25 +00:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/sched.h>
|
2017-02-08 17:51:35 +00:00
|
|
|
#include <linux/sched/debug.h>
|
2017-02-08 17:51:37 +00:00
|
|
|
#include <linux/sched/task_stack.h>
|
2013-03-14 12:44:25 +00:00
|
|
|
#include <asm/processor.h>
|
|
|
|
#include <asm/debug.h>
|
2013-09-13 11:36:25 +00:00
|
|
|
#include <asm/dis.h>
|
2013-03-14 12:44:25 +00:00
|
|
|
#include <asm/ipl.h>
|
|
|
|
|
|
|
|
/*
|
2016-02-09 11:58:54 +00:00
|
|
|
* For dump_trace we have tree different stack to consider:
|
2013-03-14 12:44:25 +00:00
|
|
|
* - the panic stack which is used if the kernel stack has overflown
|
|
|
|
* - the asynchronous interrupt stack (cpu related)
|
|
|
|
* - the synchronous kernel stack (process related)
|
2016-02-09 11:58:54 +00:00
|
|
|
* The stack trace can start at any of the three stacks and can potentially
|
2013-03-14 12:44:25 +00:00
|
|
|
* touch all of them. The order is: panic stack, async stack, sync stack.
|
|
|
|
*/
|
|
|
|
static unsigned long
|
2016-02-09 11:58:54 +00:00
|
|
|
__dump_trace(dump_trace_func_t func, void *data, unsigned long sp,
|
|
|
|
unsigned long low, unsigned long high)
|
2013-03-14 12:44:25 +00:00
|
|
|
{
|
|
|
|
struct stack_frame *sf;
|
|
|
|
struct pt_regs *regs;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
if (sp < low || sp > high - sizeof(*sf))
|
|
|
|
return sp;
|
|
|
|
sf = (struct stack_frame *) sp;
|
2016-10-17 09:08:31 +00:00
|
|
|
if (func(data, sf->gprs[8], 0))
|
|
|
|
return sp;
|
2013-03-14 12:44:25 +00:00
|
|
|
/* Follow the backchain. */
|
|
|
|
while (1) {
|
|
|
|
low = sp;
|
2016-01-18 12:12:19 +00:00
|
|
|
sp = sf->back_chain;
|
2013-03-14 12:44:25 +00:00
|
|
|
if (!sp)
|
|
|
|
break;
|
|
|
|
if (sp <= low || sp > high - sizeof(*sf))
|
|
|
|
return sp;
|
|
|
|
sf = (struct stack_frame *) sp;
|
2016-10-17 09:08:31 +00:00
|
|
|
if (func(data, sf->gprs[8], 1))
|
|
|
|
return sp;
|
2013-03-14 12:44:25 +00:00
|
|
|
}
|
|
|
|
/* Zero backchain detected, check for interrupt frame. */
|
|
|
|
sp = (unsigned long) (sf + 1);
|
|
|
|
if (sp <= low || sp > high - sizeof(*regs))
|
|
|
|
return sp;
|
|
|
|
regs = (struct pt_regs *) sp;
|
2016-02-09 11:58:54 +00:00
|
|
|
if (!user_mode(regs)) {
|
2016-10-17 09:08:31 +00:00
|
|
|
if (func(data, regs->psw.addr, 1))
|
2016-02-09 11:58:54 +00:00
|
|
|
return sp;
|
|
|
|
}
|
2013-03-14 12:44:25 +00:00
|
|
|
low = sp;
|
|
|
|
sp = regs->gprs[15];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-09 11:58:54 +00:00
|
|
|
void dump_trace(dump_trace_func_t func, void *data, struct task_struct *task,
|
|
|
|
unsigned long sp)
|
2013-03-14 12:44:25 +00:00
|
|
|
{
|
2016-02-09 11:58:54 +00:00
|
|
|
unsigned long frame_size;
|
2013-03-14 12:44:25 +00:00
|
|
|
|
2016-02-09 11:58:54 +00:00
|
|
|
frame_size = STACK_FRAME_OVERHEAD + sizeof(struct pt_regs);
|
2013-03-14 12:44:25 +00:00
|
|
|
#ifdef CONFIG_CHECK_STACK
|
2016-02-09 11:58:54 +00:00
|
|
|
sp = __dump_trace(func, data, sp,
|
2017-07-05 05:37:27 +00:00
|
|
|
S390_lowcore.panic_stack + frame_size - PAGE_SIZE,
|
2013-06-04 09:00:08 +00:00
|
|
|
S390_lowcore.panic_stack + frame_size);
|
2013-03-14 12:44:25 +00:00
|
|
|
#endif
|
2016-02-09 11:58:54 +00:00
|
|
|
sp = __dump_trace(func, data, sp,
|
2013-06-04 09:00:08 +00:00
|
|
|
S390_lowcore.async_stack + frame_size - ASYNC_SIZE,
|
|
|
|
S390_lowcore.async_stack + frame_size);
|
2016-06-27 05:57:21 +00:00
|
|
|
task = task ?: current;
|
|
|
|
__dump_trace(func, data, sp,
|
|
|
|
(unsigned long)task_stack_page(task),
|
|
|
|
(unsigned long)task_stack_page(task) + THREAD_SIZE);
|
2016-02-09 11:58:54 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(dump_trace);
|
|
|
|
|
2016-10-17 09:08:31 +00:00
|
|
|
static int show_address(void *data, unsigned long address, int reliable)
|
2016-02-09 11:58:54 +00:00
|
|
|
{
|
2016-10-17 09:08:31 +00:00
|
|
|
if (reliable)
|
|
|
|
printk(" [<%016lx>] %pSR \n", address, (void *)address);
|
|
|
|
else
|
|
|
|
printk("([<%016lx>] %pSR)\n", address, (void *)address);
|
2016-02-09 11:58:54 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-06 08:04:26 +00:00
|
|
|
void show_stack(struct task_struct *task, unsigned long *stack)
|
2016-02-09 11:58:54 +00:00
|
|
|
{
|
2017-06-06 08:04:26 +00:00
|
|
|
unsigned long sp = (unsigned long) stack;
|
|
|
|
|
2016-02-09 11:58:54 +00:00
|
|
|
if (!sp)
|
|
|
|
sp = task ? task->thread.ksp : current_stack_pointer();
|
|
|
|
printk("Call Trace:\n");
|
|
|
|
dump_trace(show_address, NULL, task, sp);
|
2013-03-14 12:44:25 +00:00
|
|
|
if (!task)
|
|
|
|
task = current;
|
|
|
|
debug_show_held_locks(task);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void show_last_breaking_event(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
printk("Last Breaking-Event-Address:\n");
|
2013-09-02 09:20:00 +00:00
|
|
|
printk(" [<%016lx>] %pSR\n", regs->args[0], (void *)regs->args[0]);
|
2013-03-14 12:44:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void show_registers(struct pt_regs *regs)
|
|
|
|
{
|
2016-01-31 16:36:59 +00:00
|
|
|
struct psw_bits *psw = &psw_bits(regs->psw);
|
2013-03-14 12:44:25 +00:00
|
|
|
char *mode;
|
|
|
|
|
|
|
|
mode = user_mode(regs) ? "User" : "Krnl";
|
2014-04-07 14:26:37 +00:00
|
|
|
printk("%s PSW : %p %p", mode, (void *)regs->psw.mask, (void *)regs->psw.addr);
|
|
|
|
if (!user_mode(regs))
|
2016-10-17 09:59:58 +00:00
|
|
|
pr_cont(" (%pSR)", (void *)regs->psw.addr);
|
|
|
|
pr_cont("\n");
|
2013-03-14 12:44:25 +00:00
|
|
|
printk(" R:%x T:%x IO:%x EX:%x Key:%x M:%x W:%x "
|
2017-06-03 08:56:07 +00:00
|
|
|
"P:%x AS:%x CC:%x PM:%x", psw->per, psw->dat, psw->io, psw->ext,
|
|
|
|
psw->key, psw->mcheck, psw->wait, psw->pstate, psw->as, psw->cc, psw->pm);
|
2016-10-17 09:59:58 +00:00
|
|
|
pr_cont(" RI:%x EA:%x\n", psw->ri, psw->eaba);
|
|
|
|
printk("%s GPRS: %016lx %016lx %016lx %016lx\n", mode,
|
2013-03-14 12:44:25 +00:00
|
|
|
regs->gprs[0], regs->gprs[1], regs->gprs[2], regs->gprs[3]);
|
2015-02-12 12:08:27 +00:00
|
|
|
printk(" %016lx %016lx %016lx %016lx\n",
|
2013-03-14 12:44:25 +00:00
|
|
|
regs->gprs[4], regs->gprs[5], regs->gprs[6], regs->gprs[7]);
|
2015-02-12 12:08:27 +00:00
|
|
|
printk(" %016lx %016lx %016lx %016lx\n",
|
2013-03-14 12:44:25 +00:00
|
|
|
regs->gprs[8], regs->gprs[9], regs->gprs[10], regs->gprs[11]);
|
2015-02-12 12:08:27 +00:00
|
|
|
printk(" %016lx %016lx %016lx %016lx\n",
|
2013-03-14 12:44:25 +00:00
|
|
|
regs->gprs[12], regs->gprs[13], regs->gprs[14], regs->gprs[15]);
|
|
|
|
show_code(regs);
|
|
|
|
}
|
|
|
|
|
|
|
|
void show_regs(struct pt_regs *regs)
|
|
|
|
{
|
dump_stack: unify debug information printed by show_regs()
show_regs() is inherently arch-dependent but it does make sense to print
generic debug information and some archs already do albeit in slightly
different forms. This patch introduces a generic function to print debug
information from show_regs() so that different archs print out the same
information and it's much easier to modify what's printed.
show_regs_print_info() prints out the same debug info as dump_stack()
does plus task and thread_info pointers.
* Archs which didn't print debug info now do.
alpha, arc, blackfin, c6x, cris, frv, h8300, hexagon, ia64, m32r,
metag, microblaze, mn10300, openrisc, parisc, score, sh64, sparc,
um, xtensa
* Already prints debug info. Replaced with show_regs_print_info().
The printed information is superset of what used to be there.
arm, arm64, avr32, mips, powerpc, sh32, tile, unicore32, x86
* s390 is special in that it used to print arch-specific information
along with generic debug info. Heiko and Martin think that the
arch-specific extra isn't worth keeping s390 specfic implementation.
Converted to use the generic version.
Note that now all archs print the debug info before actual register
dumps.
An example BUG() dump follows.
kernel BUG at /work/os/work/kernel/workqueue.c:4841!
invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Modules linked in:
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.9.0-rc1-work+ #7
Hardware name: empty empty/S3992, BIOS 080011 10/26/2007
task: ffff88007c85e040 ti: ffff88007c860000 task.ti: ffff88007c860000
RIP: 0010:[<ffffffff8234a07e>] [<ffffffff8234a07e>] init_workqueues+0x4/0x6
RSP: 0000:ffff88007c861ec8 EFLAGS: 00010246
RAX: ffff88007c861fd8 RBX: ffffffff824466a8 RCX: 0000000000000001
RDX: 0000000000000046 RSI: 0000000000000001 RDI: ffffffff8234a07a
RBP: ffff88007c861ec8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffffff8234a07a
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff88007dc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffff88015f7ff000 CR3: 00000000021f1000 CR4: 00000000000007f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Stack:
ffff88007c861ef8 ffffffff81000312 ffffffff824466a8 ffff88007c85e650
0000000000000003 0000000000000000 ffff88007c861f38 ffffffff82335e5d
ffff88007c862080 ffffffff8223d8c0 ffff88007c862080 ffffffff81c47760
Call Trace:
[<ffffffff81000312>] do_one_initcall+0x122/0x170
[<ffffffff82335e5d>] kernel_init_freeable+0x9b/0x1c8
[<ffffffff81c47760>] ? rest_init+0x140/0x140
[<ffffffff81c4776e>] kernel_init+0xe/0xf0
[<ffffffff81c6be9c>] ret_from_fork+0x7c/0xb0
[<ffffffff81c47760>] ? rest_init+0x140/0x140
...
v2: Typo fix in x86-32.
v3: CPU number dropped from show_regs_print_info() as
dump_stack_print_info() has been updated to print it. s390
specific implementation dropped as requested by s390 maintainers.
Signed-off-by: Tejun Heo <tj@kernel.org>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: Jesper Nilsson <jesper.nilsson@axis.com>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Bjorn Helgaas <bhelgaas@google.com>
Cc: Fengguang Wu <fengguang.wu@intel.com>
Cc: Mike Frysinger <vapier@gentoo.org>
Cc: Vineet Gupta <vgupta@synopsys.com>
Cc: Sam Ravnborg <sam@ravnborg.org>
Acked-by: Chris Metcalf <cmetcalf@tilera.com> [tile bits]
Acked-by: Richard Kuo <rkuo@codeaurora.org> [hexagon bits]
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-04-30 22:27:17 +00:00
|
|
|
show_regs_print_info(KERN_DEFAULT);
|
2013-03-14 12:44:25 +00:00
|
|
|
show_registers(regs);
|
|
|
|
/* Show stack backtrace if pt_regs is from kernel mode */
|
|
|
|
if (!user_mode(regs))
|
2017-06-06 08:04:26 +00:00
|
|
|
show_stack(NULL, (unsigned long *) regs->gprs[15]);
|
2013-03-14 12:44:25 +00:00
|
|
|
show_last_breaking_event(regs);
|
|
|
|
}
|
|
|
|
|
|
|
|
static DEFINE_SPINLOCK(die_lock);
|
|
|
|
|
|
|
|
void die(struct pt_regs *regs, const char *str)
|
|
|
|
{
|
|
|
|
static int die_counter;
|
|
|
|
|
|
|
|
oops_enter();
|
|
|
|
lgr_info_log();
|
|
|
|
debug_stop_all();
|
|
|
|
console_verbose();
|
|
|
|
spin_lock_irq(&die_lock);
|
|
|
|
bust_spinlocks(1);
|
2014-11-19 12:31:08 +00:00
|
|
|
printk("%s: %04x ilc:%d [#%d] ", str, regs->int_code & 0xffff,
|
|
|
|
regs->int_code >> 17, ++die_counter);
|
2013-03-14 12:44:25 +00:00
|
|
|
#ifdef CONFIG_PREEMPT
|
2016-10-19 11:42:55 +00:00
|
|
|
pr_cont("PREEMPT ");
|
2013-03-14 12:44:25 +00:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_SMP
|
2016-10-19 11:42:55 +00:00
|
|
|
pr_cont("SMP ");
|
2013-03-14 12:44:25 +00:00
|
|
|
#endif
|
2016-03-15 21:57:36 +00:00
|
|
|
if (debug_pagealloc_enabled())
|
2016-10-19 11:42:55 +00:00
|
|
|
pr_cont("DEBUG_PAGEALLOC");
|
|
|
|
pr_cont("\n");
|
2013-03-14 12:44:25 +00:00
|
|
|
notify_die(DIE_OOPS, str, regs, 0, regs->int_code & 0xffff, SIGSEGV);
|
|
|
|
print_modules();
|
|
|
|
show_regs(regs);
|
|
|
|
bust_spinlocks(0);
|
|
|
|
add_taint(TAINT_DIE, LOCKDEP_NOW_UNRELIABLE);
|
|
|
|
spin_unlock_irq(&die_lock);
|
|
|
|
if (in_interrupt())
|
|
|
|
panic("Fatal exception in interrupt");
|
|
|
|
if (panic_on_oops)
|
|
|
|
panic("Fatal exception: panic_on_oops");
|
|
|
|
oops_exit();
|
|
|
|
do_exit(SIGSEGV);
|
|
|
|
}
|