lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 2 May 2008 23:10:38 +0200
From:	Sebastian Siewior <lkml@...breakpoint.cc>
To:	Paulo Marques <pmarques@...popie.com>
Cc:	Greg Ungerer <gerg@...pgear.com>, torvalds@...ux-foundation.org,
	akpm@...ux-foundation.org, gerg@...inux.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] m68knommu: add pretty back strace

* Paulo Marques | 2008-05-02 20:27:57 [+0100]:

> Greg Ungerer wrote:
>> From: Sebastian Siewior <bigeasy@...utronix.de>
>> With this patch and
>>  CONFIG_FRAME_POINTER=y
>>  CONFIG_KALLSYMS=y
>> The backtrace shows resolved function names and their numeric
>> address.
>
> This is really not my area, but this patch reminds me of all the dwarf2 
> unwinder on x86 that caused so many problems in the beginning...
>
>> [...]
>> +#ifdef CONFIG_FRAME_POINTER
>> +	printk(KERN_EMERG "Call Trace:\n");
>> +
>> +	last_stack = stack - 1;
>> +	while (stack <= endstack && stack > last_stack) {
>> +
>> +		addr = *(stack + 1);
>> +		printk(KERN_EMERG " [%08lx] ", addr);
>> +		print_symbol(KERN_CONT "%s\n", addr);
>> +
>> +		last_stack = stack;
>> +		stack = (unsigned long *)*stack;
>>  	}
>>  	printk("\n");
>> +#else
>> +	printk(KERN_EMERG "CONFIG_FRAME_POINTER disabled, no symbolic call 
>> trace\n");
>
> You could probably fall back to the old method in this case, no?
The old method printed every value from stack which was in the text
range (you didn't get modules AFAIK). This might be the caller as well a
function pointer as argument as well something else. I tried to find to
find a pattern without frame pointers but I had no luck. I thing the
caller fixed the stack frame or something.
Greg did not complain about removing it. If you or others want the old
method in case of no frame pointers I can send a patch.

> Also, if the stack is slightly corrupted on the top, the new method might 
> just bail out without giving any indication about the path that lead there, 
> when instead it could also fall back to the old method.
You mean by slightly that the first caller ORed the address with
something? In that case we don't return safely. I don't know how I could
find out the right time for a fallback (in case of slightly corrupted
stack).

> Paulo Marques - www.grupopie.com
Sebastian
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ