traps.c
来自「LINUX 2.6.17.4的源码」· C语言 代码 · 共 1,015 行 · 第 1/2 页
C
1,015 行
/* * linux/arch/x86-64/traps.c * * Copyright (C) 1991, 1992 Linus Torvalds * Copyright (C) 2000, 2001, 2002 Andi Kleen, SuSE Labs * * Pentium III FXSR, SSE support * Gareth Hughes <gareth@valinux.com>, May 2000 * * $Id: traps.c,v 1.36 2002/03/24 11:09:10 ak Exp $ *//* * 'Traps.c' handles hardware traps and faults after we have saved some * state in 'entry.S'. */#include <linux/config.h>#include <linux/sched.h>#include <linux/kernel.h>#include <linux/string.h>#include <linux/errno.h>#include <linux/ptrace.h>#include <linux/timer.h>#include <linux/mm.h>#include <linux/init.h>#include <linux/delay.h>#include <linux/spinlock.h>#include <linux/interrupt.h>#include <linux/module.h>#include <linux/moduleparam.h>#include <linux/nmi.h>#include <linux/kprobes.h>#include <linux/kexec.h>#include <asm/system.h>#include <asm/uaccess.h>#include <asm/io.h>#include <asm/atomic.h>#include <asm/debugreg.h>#include <asm/desc.h>#include <asm/i387.h>#include <asm/kdebug.h>#include <asm/processor.h>#include <asm/smp.h>#include <asm/pgalloc.h>#include <asm/pda.h>#include <asm/proto.h>#include <asm/nmi.h>asmlinkage void divide_error(void);asmlinkage void debug(void);asmlinkage void nmi(void);asmlinkage void int3(void);asmlinkage void overflow(void);asmlinkage void bounds(void);asmlinkage void invalid_op(void);asmlinkage void device_not_available(void);asmlinkage void double_fault(void);asmlinkage void coprocessor_segment_overrun(void);asmlinkage void invalid_TSS(void);asmlinkage void segment_not_present(void);asmlinkage void stack_segment(void);asmlinkage void general_protection(void);asmlinkage void page_fault(void);asmlinkage void coprocessor_error(void);asmlinkage void simd_coprocessor_error(void);asmlinkage void reserved(void);asmlinkage void alignment_check(void);asmlinkage void machine_check(void);asmlinkage void spurious_interrupt_bug(void);ATOMIC_NOTIFIER_HEAD(die_chain);int register_die_notifier(struct notifier_block *nb){ vmalloc_sync_all(); return atomic_notifier_chain_register(&die_chain, nb);}EXPORT_SYMBOL(register_die_notifier);int unregister_die_notifier(struct notifier_block *nb){ return atomic_notifier_chain_unregister(&die_chain, nb);}EXPORT_SYMBOL(unregister_die_notifier);static inline void conditional_sti(struct pt_regs *regs){ if (regs->eflags & X86_EFLAGS_IF) local_irq_enable();}static inline void preempt_conditional_sti(struct pt_regs *regs){ preempt_disable(); if (regs->eflags & X86_EFLAGS_IF) local_irq_enable();}static inline void preempt_conditional_cli(struct pt_regs *regs){ if (regs->eflags & X86_EFLAGS_IF) local_irq_disable(); /* Make sure to not schedule here because we could be running on an exception stack. */ preempt_enable_no_resched();}static int kstack_depth_to_print = 10;#ifdef CONFIG_KALLSYMS#include <linux/kallsyms.h> int printk_address(unsigned long address){ unsigned long offset = 0, symsize; const char *symname; char *modname; char *delim = ":"; char namebuf[128]; symname = kallsyms_lookup(address, &symsize, &offset, &modname, namebuf); if (!symname) return printk("[<%016lx>]", address); if (!modname) modname = delim = ""; return printk("<%016lx>{%s%s%s%s%+ld}", address, delim, modname, delim, symname, offset); } #elseint printk_address(unsigned long address){ return printk("[<%016lx>]", address);} #endifstatic unsigned long *in_exception_stack(unsigned cpu, unsigned long stack, unsigned *usedp, const char **idp){ static char ids[][8] = { [DEBUG_STACK - 1] = "#DB", [NMI_STACK - 1] = "NMI", [DOUBLEFAULT_STACK - 1] = "#DF", [STACKFAULT_STACK - 1] = "#SS", [MCE_STACK - 1] = "#MC",#if DEBUG_STKSZ > EXCEPTION_STKSZ [N_EXCEPTION_STACKS ... N_EXCEPTION_STACKS + DEBUG_STKSZ / EXCEPTION_STKSZ - 2] = "#DB[?]"#endif }; unsigned k; for (k = 0; k < N_EXCEPTION_STACKS; k++) { unsigned long end; switch (k + 1) {#if DEBUG_STKSZ > EXCEPTION_STKSZ case DEBUG_STACK: end = cpu_pda(cpu)->debugstack + DEBUG_STKSZ; break;#endif default: end = per_cpu(init_tss, cpu).ist[k]; break; } if (stack >= end) continue; if (stack >= end - EXCEPTION_STKSZ) { if (*usedp & (1U << k)) break; *usedp |= 1U << k; *idp = ids[k]; return (unsigned long *)end; }#if DEBUG_STKSZ > EXCEPTION_STKSZ if (k == DEBUG_STACK - 1 && stack >= end - DEBUG_STKSZ) { unsigned j = N_EXCEPTION_STACKS - 1; do { ++j; end -= EXCEPTION_STKSZ; ids[j][4] = '1' + (j - N_EXCEPTION_STACKS); } while (stack < end - EXCEPTION_STKSZ); if (*usedp & (1U << j)) break; *usedp |= 1U << j; *idp = ids[j]; return (unsigned long *)end; }#endif } return NULL;}/* * x86-64 can have upto three kernel stacks: * process stack * interrupt stack * severe exception (double fault, nmi, stack fault, debug, mce) hardware stack */void show_trace(unsigned long *stack){ const unsigned cpu = safe_smp_processor_id(); unsigned long *irqstack_end = (unsigned long *)cpu_pda(cpu)->irqstackptr; int i; unsigned used = 0; printk("\nCall Trace:");#define HANDLE_STACK(cond) \ do while (cond) { \ unsigned long addr = *stack++; \ if (kernel_text_address(addr)) { \ if (i > 50) { \ printk("\n "); \ i = 0; \ } \ else \ i += printk(" "); \ /* \ * If the address is either in the text segment of the \ * kernel, or in the region which contains vmalloc'ed \ * memory, it *may* be the address of a calling \ * routine; if so, print it so that someone tracing \ * down the cause of the crash will be able to figure \ * out the call path that was taken. \ */ \ i += printk_address(addr); \ } \ } while (0) for(i = 11; ; ) { const char *id; unsigned long *estack_end; estack_end = in_exception_stack(cpu, (unsigned long)stack, &used, &id); if (estack_end) { i += printk(" <%s>", id); HANDLE_STACK (stack < estack_end); i += printk(" <EOE>"); stack = (unsigned long *) estack_end[-2]; continue; } if (irqstack_end) { unsigned long *irqstack; irqstack = irqstack_end - (IRQSTACKSIZE - 64) / sizeof(*irqstack); if (stack >= irqstack && stack < irqstack_end) { i += printk(" <IRQ>"); HANDLE_STACK (stack < irqstack_end); stack = (unsigned long *) (irqstack_end[-1]); irqstack_end = NULL; i += printk(" <EOI>"); continue; } } break; } HANDLE_STACK (((long) stack & (THREAD_SIZE-1)) != 0);#undef HANDLE_STACK printk("\n");}void show_stack(struct task_struct *tsk, unsigned long * rsp){ unsigned long *stack; int i; const int cpu = safe_smp_processor_id(); unsigned long *irqstack_end = (unsigned long *) (cpu_pda(cpu)->irqstackptr); unsigned long *irqstack = (unsigned long *) (cpu_pda(cpu)->irqstackptr - IRQSTACKSIZE); // debugging aid: "show_stack(NULL, NULL);" prints the // back trace for this cpu. if (rsp == NULL) { if (tsk) rsp = (unsigned long *)tsk->thread.rsp; else rsp = (unsigned long *)&rsp; } stack = rsp; for(i=0; i < kstack_depth_to_print; i++) { if (stack >= irqstack && stack <= irqstack_end) { if (stack == irqstack_end) { stack = (unsigned long *) (irqstack_end[-1]); printk(" <EOI> "); } } else { if (((long) stack & (THREAD_SIZE-1)) == 0) break; } if (i && ((i % 4) == 0)) printk("\n "); printk("%016lx ", *stack++); touch_nmi_watchdog(); } show_trace((unsigned long *)rsp);}/* * The architecture-independent dump_stack generator */void dump_stack(void){ unsigned long dummy; show_trace(&dummy);}EXPORT_SYMBOL(dump_stack);void show_registers(struct pt_regs *regs){ int i; int in_kernel = !user_mode(regs); unsigned long rsp; const int cpu = safe_smp_processor_id(); struct task_struct *cur = cpu_pda(cpu)->pcurrent; rsp = regs->rsp; printk("CPU %d ", cpu); __show_regs(regs); printk("Process %s (pid: %d, threadinfo %p, task %p)\n", cur->comm, cur->pid, task_thread_info(cur), cur); /* * When in-kernel, we also print out the stack and code at the * time of the fault.. */ if (in_kernel) { printk("Stack: "); show_stack(NULL, (unsigned long*)rsp); printk("\nCode: "); if (regs->rip < PAGE_OFFSET) goto bad; for (i=0; i<20; i++) { unsigned char c; if (__get_user(c, &((unsigned char*)regs->rip)[i])) {bad: printk(" Bad RIP value."); break; } printk("%02x ", c); } } printk("\n");} void handle_BUG(struct pt_regs *regs){ struct bug_frame f; long len; const char *prefix = ""; if (user_mode(regs)) return; if (__copy_from_user(&f, (const void __user *) regs->rip, sizeof(struct bug_frame))) return; if (f.filename >= 0 || f.ud2[0] != 0x0f || f.ud2[1] != 0x0b) return; len = __strnlen_user((char *)(long)f.filename, PATH_MAX) - 1; if (len < 0 || len >= PATH_MAX) f.filename = (int)(long)"unmapped filename"; else if (len > 50) { f.filename += len - 50; prefix = "..."; } printk("----------- [cut here ] --------- [please bite here ] ---------\n"); printk(KERN_ALERT "Kernel BUG at %s%.50s:%d\n", prefix, (char *)(long)f.filename, f.line);} #ifdef CONFIG_BUGvoid out_of_line_bug(void){ BUG(); } #endifstatic DEFINE_SPINLOCK(die_lock);static int die_owner = -1;static unsigned int die_nest_count;unsigned __kprobes long oops_begin(void){ int cpu = safe_smp_processor_id(); unsigned long flags; /* racy, but better than risking deadlock. */ local_irq_save(flags); if (!spin_trylock(&die_lock)) { if (cpu == die_owner) /* nested oops. should stop eventually */; else spin_lock(&die_lock); } die_nest_count++; die_owner = cpu; console_verbose(); bust_spinlocks(1); return flags;}void __kprobes oops_end(unsigned long flags){ die_owner = -1; bust_spinlocks(0); die_nest_count--; if (die_nest_count) /* We still own the lock */ local_irq_restore(flags); else /* Nest count reaches zero, release the lock. */ spin_unlock_irqrestore(&die_lock, flags); if (panic_on_oops) panic("Oops");}void __kprobes __die(const char * str, struct pt_regs * regs, long err){ static int die_counter; printk(KERN_EMERG "%s: %04lx [%u] ", str, err & 0xffff,++die_counter);#ifdef CONFIG_PREEMPT printk("PREEMPT ");#endif#ifdef CONFIG_SMP printk("SMP ");#endif#ifdef CONFIG_DEBUG_PAGEALLOC printk("DEBUG_PAGEALLOC");#endif printk("\n"); notify_die(DIE_OOPS, str, regs, err, current->thread.trap_no, SIGSEGV); show_registers(regs); /* Executive summary in case the oops scrolled away */ printk(KERN_ALERT "RIP "); printk_address(regs->rip); printk(" RSP <%016lx>\n", regs->rsp); if (kexec_should_crash(current)) crash_kexec(regs);}void die(const char * str, struct pt_regs * regs, long err){ unsigned long flags = oops_begin(); handle_BUG(regs); __die(str, regs, err); oops_end(flags); do_exit(SIGSEGV); }void __kprobes die_nmi(char *str, struct pt_regs *regs){ unsigned long flags = oops_begin(); /* * We are in trouble anyway, lets at least try * to get a message out. */ printk(str, safe_smp_processor_id()); show_registers(regs); if (kexec_should_crash(current)) crash_kexec(regs); if (panic_on_timeout || panic_on_oops) panic("nmi watchdog"); printk("console shuts up ...\n"); oops_end(flags); nmi_exit(); local_irq_enable(); do_exit(SIGSEGV);}static void __kprobes do_trap(int trapnr, int signr, char *str, struct pt_regs * regs, long error_code, siginfo_t *info){ struct task_struct *tsk = current; tsk->thread.error_code = error_code; tsk->thread.trap_no = trapnr; if (user_mode(regs)) { if (exception_trace && unhandled_signal(tsk, signr)) printk(KERN_INFO "%s[%d] trap %s rip:%lx rsp:%lx error:%lx\n", tsk->comm, tsk->pid, str, regs->rip, regs->rsp, error_code); if (info) force_sig_info(signr, info, tsk); else force_sig(signr, tsk); return; } /* kernel trap */ { const struct exception_table_entry *fixup;
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?