diff options
author | Frank Ch. Eigler <fche@elastic.org> | 2008-04-13 14:59:36 -0400 |
---|---|---|
committer | Frank Ch. Eigler <fche@elastic.org> | 2008-04-13 14:59:36 -0400 |
commit | 1ec6761a6b893c2c755753617bebac79b3040fca (patch) | |
tree | bd252bb1d5253e1a10ff24b1790e6e0e1b7cec02 /runtime/stack-i386.c | |
parent | bf50bb491c5bfcf3035de45ac58acf11ed02af06 (diff) | |
parent | 1c86aa2adc1165906057cdde4cc7484468726fc4 (diff) | |
download | systemtap-steved-1ec6761a6b893c2c755753617bebac79b3040fca.tar.gz systemtap-steved-1ec6761a6b893c2c755753617bebac79b3040fca.tar.xz systemtap-steved-1ec6761a6b893c2c755753617bebac79b3040fca.zip |
Merge commit 'origin/unwind'
* commit 'origin/unwind':
Fixes for 2.6.25 pt_regs changes.
Include string.h
Change stap to get kernel symbols from debuginfo and
reincarnate vim/ directory in this branch to match master
Add new define STP_USE_DWARF_UNWINDER which is set based on which archs
Remove misleading error message.
Support for kernels built with CONFIG_FRAME_POINTER
Fix regression.
dded _stp_read_address() and changed code to use it.
kretprobe trampoline fixes
i386 fixes.
control.c (_stp_ctl_write_dbug): Insert missing break.
32-bit fixes
Cleanup.
2008-03-23 Frank Ch. Eigler <fche@elastic.org>
2008-03-23 Frank Ch. Eigler <fche@elastic.org>
2008-03-21 Eugene Teo <eugeneteo@kernel.sg>
add (back) runtime/unwind files
* clarify utility of epilogue-type probe aliases in documentation
rebased unwind_branch on top of current master
Diffstat (limited to 'runtime/stack-i386.c')
-rw-r--r-- | runtime/stack-i386.c | 75 |
1 files changed, 52 insertions, 23 deletions
diff --git a/runtime/stack-i386.c b/runtime/stack-i386.c index b46ff06b..20c8eda5 100644 --- a/runtime/stack-i386.c +++ b/runtime/stack-i386.c @@ -8,40 +8,69 @@ * later version. */ -static inline int _stp_valid_stack_ptr(unsigned long context, unsigned long p) +static int _stp_valid_stack_ptr(unsigned long context, unsigned long p) { return p > context && p < context + THREAD_SIZE - 3; } +/* DWARF unwinder failed. Just dump intereting addresses on kernel stack. */ +static void _stp_stack_print_fallback(unsigned long context, unsigned long stack, int verbose) +{ + unsigned long addr; + while (_stp_valid_stack_ptr(context, stack)) { + if (unlikely(_stp_read_address(addr, (unsigned long *)stack, KERNEL_DS))) { + /* cannot access stack. give up. */ + return; + } + _stp_func_print(addr, verbose, 0); + stack++; + } +} + static void __stp_stack_print (struct pt_regs *regs, int verbose, int levels) { unsigned long *stack = (unsigned long *)®_SP(regs); unsigned long context = (unsigned long)stack & ~(THREAD_SIZE - 1); - unsigned long addr; -#ifdef CONFIG_FRAME_POINTER - { - #ifdef STAPCONF_X86_UNIREGS - unsigned long ebp = regs->bp; - #else - unsigned long ebp = regs->ebp; - #endif - - while (_stp_valid_stack_ptr(context, (unsigned long)ebp)) { - addr = *(unsigned long *)(ebp + 4); - if (verbose) { - _stp_print_char(' '); - _stp_symbol_print (addr); - _stp_print_char('\n'); - } else - _stp_printf ("0x%08lx ", addr); - ebp = *(unsigned long *)ebp; +#ifdef STP_USE_FRAME_POINTER + /* FIXME: need to use _stp_func_print() and safe copy */ + unsigned long addr; + +#ifdef STAPCONF_X86_UNIREGS + unsigned long ebp = regs->bp; +#else + unsigned long ebp = regs->ebp; +#endif /* STAPCONF_X86_UNIREGS */ + + while (_stp_valid_stack_ptr(context, (unsigned long)ebp)) { + if (unlikely(_stp_read_address(addr, (unsigned long *)(ebp + 4), KERNEL_DS))) { + /* cannot access stack. give up. */ + return; } + if (verbose) { + _stp_print_char(' '); + _stp_symbol_print (addr); + _stp_print_char('\n'); + } else + _stp_printf ("0x%08lx ", addr); + ebp = *(unsigned long *)ebp; } #else - while (_stp_valid_stack_ptr(context, (unsigned long)stack)) { - addr = *stack++; - _stp_func_print(addr, verbose, 1); + struct unwind_frame_info info; + arch_unw_init_frame_info(&info, regs); + + while (!arch_unw_user_mode(&info)) { + int ret = unwind(&info); + dbug_unwind(1, "ret=%d PC=%lx SP=%lx\n", ret, UNW_PC(&info), UNW_SP(&info)); + if (ret == 0) { + _stp_func_print(UNW_PC(&info), verbose, 1); + continue; + } + /* If an error happened or we hit a kretprobe trampoline, use fallback backtrace */ + /* FIXME: is there a way to unwind across kretprobe trampolines? */ + if (ret < 0 || (ret > 0 && UNW_PC(&info) == _stp_kretprobe_trampoline)) + _stp_stack_print_fallback(context, UNW_SP(&info), verbose); + break; } -#endif +#endif /* STP_USE_FRAME_POINTER */ } |