[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080502211038.GB22631@Chamillionaire.breakpoint.cc>
Date: Fri, 2 May 2008 23:10:38 +0200
From: Sebastian Siewior <lkml@...breakpoint.cc>
To: Paulo Marques <pmarques@...popie.com>
Cc: Greg Ungerer <gerg@...pgear.com>, torvalds@...ux-foundation.org,
akpm@...ux-foundation.org, gerg@...inux.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] m68knommu: add pretty back strace
* Paulo Marques | 2008-05-02 20:27:57 [+0100]:
> Greg Ungerer wrote:
>> From: Sebastian Siewior <bigeasy@...utronix.de>
>> With this patch and
>> CONFIG_FRAME_POINTER=y
>> CONFIG_KALLSYMS=y
>> The backtrace shows resolved function names and their numeric
>> address.
>
> This is really not my area, but this patch reminds me of all the dwarf2
> unwinder on x86 that caused so many problems in the beginning...
>
>> [...]
>> +#ifdef CONFIG_FRAME_POINTER
>> + printk(KERN_EMERG "Call Trace:\n");
>> +
>> + last_stack = stack - 1;
>> + while (stack <= endstack && stack > last_stack) {
>> +
>> + addr = *(stack + 1);
>> + printk(KERN_EMERG " [%08lx] ", addr);
>> + print_symbol(KERN_CONT "%s\n", addr);
>> +
>> + last_stack = stack;
>> + stack = (unsigned long *)*stack;
>> }
>> printk("\n");
>> +#else
>> + printk(KERN_EMERG "CONFIG_FRAME_POINTER disabled, no symbolic call
>> trace\n");
>
> You could probably fall back to the old method in this case, no?
The old method printed every value from stack which was in the text
range (you didn't get modules AFAIK). This might be the caller as well a
function pointer as argument as well something else. I tried to find to
find a pattern without frame pointers but I had no luck. I thing the
caller fixed the stack frame or something.
Greg did not complain about removing it. If you or others want the old
method in case of no frame pointers I can send a patch.
> Also, if the stack is slightly corrupted on the top, the new method might
> just bail out without giving any indication about the path that lead there,
> when instead it could also fall back to the old method.
You mean by slightly that the first caller ORed the address with
something? In that case we don't return safely. I don't know how I could
find out the right time for a fallback (in case of slightly corrupted
stack).
> Paulo Marques - www.grupopie.com
Sebastian
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists