| Dave Peverley | 40a8b42 | 2008-12-16 09:35:40 +0900 | [diff] [blame] | 1 | /* | 
 | 2 |  * SH specific backtracing code for oprofile | 
 | 3 |  * | 
 | 4 |  * Copyright 2007 STMicroelectronics Ltd. | 
 | 5 |  * | 
 | 6 |  * Author: Dave Peverley <dpeverley@mpc-data.co.uk> | 
 | 7 |  * | 
 | 8 |  * Based on ARM oprofile backtrace code by Richard Purdie and in turn, i386 | 
 | 9 |  * oprofile backtrace code by John Levon, David Smith | 
 | 10 |  * | 
 | 11 |  * This program is free software; you can redistribute it and/or modify | 
 | 12 |  * it under the terms of the GNU General Public License version 2 as | 
 | 13 |  * published by the Free Software Foundation. | 
 | 14 |  * | 
 | 15 |  */ | 
 | 16 | #include <linux/oprofile.h> | 
 | 17 | #include <linux/sched.h> | 
 | 18 | #include <linux/kallsyms.h> | 
 | 19 | #include <linux/mm.h> | 
 | 20 | #include <asm/ptrace.h> | 
 | 21 | #include <asm/uaccess.h> | 
 | 22 | #include <asm/sections.h> | 
 | 23 |  | 
 | 24 | /* Limit to stop backtracing too far. */ | 
 | 25 | static int backtrace_limit = 20; | 
 | 26 |  | 
 | 27 | static unsigned long * | 
 | 28 | user_backtrace(unsigned long *stackaddr, struct pt_regs *regs) | 
 | 29 | { | 
 | 30 | 	unsigned long buf_stack; | 
 | 31 |  | 
 | 32 | 	/* Also check accessibility of address */ | 
 | 33 | 	if (!access_ok(VERIFY_READ, stackaddr, sizeof(unsigned long))) | 
 | 34 | 		return NULL; | 
 | 35 |  | 
 | 36 | 	if (__copy_from_user_inatomic(&buf_stack, stackaddr, sizeof(unsigned long))) | 
 | 37 | 		return NULL; | 
 | 38 |  | 
 | 39 | 	/* Quick paranoia check */ | 
 | 40 | 	if (buf_stack & 3) | 
 | 41 | 		return NULL; | 
 | 42 |  | 
 | 43 | 	oprofile_add_trace(buf_stack); | 
 | 44 |  | 
 | 45 | 	stackaddr++; | 
 | 46 |  | 
 | 47 | 	return stackaddr; | 
 | 48 | } | 
 | 49 |  | 
 | 50 | /* | 
 | 51 |  * |             | /\ Higher addresses | 
 | 52 |  * |             | | 
 | 53 |  * --------------- stack base (address of current_thread_info) | 
 | 54 |  * | thread info | | 
 | 55 |  * .             . | 
 | 56 |  * |    stack    | | 
 | 57 |  * --------------- saved regs->regs[15] value if valid | 
 | 58 |  * .             . | 
 | 59 |  * --------------- struct pt_regs stored on stack (struct pt_regs *) | 
 | 60 |  * |             | | 
 | 61 |  * .             . | 
 | 62 |  * |             | | 
 | 63 |  * --------------- ??? | 
 | 64 |  * |             | | 
 | 65 |  * |             | \/ Lower addresses | 
 | 66 |  * | 
 | 67 |  * Thus, &pt_regs <-> stack base restricts the valid(ish) fp values | 
 | 68 |  */ | 
 | 69 | static int valid_kernel_stack(unsigned long *stackaddr, struct pt_regs *regs) | 
 | 70 | { | 
 | 71 | 	unsigned long stack = (unsigned long)regs; | 
 | 72 | 	unsigned long stack_base = (stack & ~(THREAD_SIZE - 1)) + THREAD_SIZE; | 
 | 73 |  | 
 | 74 | 	return ((unsigned long)stackaddr > stack) && ((unsigned long)stackaddr < stack_base); | 
 | 75 | } | 
 | 76 |  | 
 | 77 | static unsigned long * | 
 | 78 | kernel_backtrace(unsigned long *stackaddr, struct pt_regs *regs) | 
 | 79 | { | 
 | 80 | 	unsigned long addr; | 
 | 81 |  | 
 | 82 | 	/* | 
 | 83 | 	 * If not a valid kernel address, keep going till we find one | 
 | 84 | 	 * or the SP stops being a valid address. | 
 | 85 | 	 */ | 
 | 86 | 	do { | 
 | 87 | 		addr = *stackaddr++; | 
| Paul Mundt | 59de580 | 2008-12-22 19:32:27 +0900 | [diff] [blame] | 88 | 		oprofile_add_trace(addr); | 
| Dave Peverley | 40a8b42 | 2008-12-16 09:35:40 +0900 | [diff] [blame] | 89 | 	} while (valid_kernel_stack(stackaddr, regs)); | 
 | 90 |  | 
 | 91 | 	return stackaddr; | 
 | 92 | } | 
 | 93 |  | 
 | 94 | void sh_backtrace(struct pt_regs * const regs, unsigned int depth) | 
 | 95 | { | 
 | 96 | 	unsigned long *stackaddr; | 
 | 97 |  | 
 | 98 | 	/* | 
 | 99 | 	 * Paranoia - clip max depth as we could get lost in the weeds. | 
 | 100 | 	 */ | 
 | 101 | 	if (depth > backtrace_limit) | 
 | 102 | 		depth = backtrace_limit; | 
 | 103 |  | 
 | 104 | 	stackaddr = (unsigned long *)regs->regs[15]; | 
 | 105 | 	if (!user_mode(regs)) { | 
 | 106 | 		while (depth-- && valid_kernel_stack(stackaddr, regs)) | 
 | 107 | 			stackaddr = kernel_backtrace(stackaddr, regs); | 
 | 108 |  | 
 | 109 | 		return; | 
 | 110 | 	} | 
 | 111 |  | 
 | 112 | 	while (depth-- && (stackaddr != NULL)) | 
 | 113 | 		stackaddr = user_backtrace(stackaddr, regs); | 
 | 114 | } |