Blame view
arch/sh/oprofile/backtrace.c
2.07 KB
40a8b421b sh: oprofile: Bac... |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
/* * SH specific backtracing code for oprofile * * Copyright 2007 STMicroelectronics Ltd. * * Author: Dave Peverley <dpeverley@mpc-data.co.uk> * * Based on ARM oprofile backtrace code by Richard Purdie and in turn, i386 * oprofile backtrace code by John Levon, David Smith * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * */ #include <linux/oprofile.h> #include <linux/sched.h> #include <linux/kallsyms.h> #include <linux/mm.h> |
0eff9f66d sh: Use the new s... |
20 |
#include <asm/unwinder.h> |
40a8b421b sh: oprofile: Bac... |
21 22 23 |
#include <asm/ptrace.h> #include <asm/uaccess.h> #include <asm/sections.h> |
4e14dfc72 sh: Use the gener... |
24 |
#include <asm/stacktrace.h> |
4e14dfc72 sh: Use the gener... |
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
static int backtrace_stack(void *data, char *name) { /* Yes, we want all stacks */ return 0; } static void backtrace_address(void *data, unsigned long addr, int reliable) { unsigned int *depth = data; if ((*depth)--) oprofile_add_trace(addr); } static struct stacktrace_ops backtrace_ops = { |
4e14dfc72 sh: Use the gener... |
40 41 42 |
.stack = backtrace_stack, .address = backtrace_address, }; |
40a8b421b sh: oprofile: Bac... |
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 |
/* Limit to stop backtracing too far. */ static int backtrace_limit = 20; static unsigned long * user_backtrace(unsigned long *stackaddr, struct pt_regs *regs) { unsigned long buf_stack; /* Also check accessibility of address */ if (!access_ok(VERIFY_READ, stackaddr, sizeof(unsigned long))) return NULL; if (__copy_from_user_inatomic(&buf_stack, stackaddr, sizeof(unsigned long))) return NULL; /* Quick paranoia check */ if (buf_stack & 3) return NULL; oprofile_add_trace(buf_stack); stackaddr++; return stackaddr; } |
40a8b421b sh: oprofile: Bac... |
69 70 71 72 73 74 75 76 77 |
void sh_backtrace(struct pt_regs * const regs, unsigned int depth) { unsigned long *stackaddr; /* * Paranoia - clip max depth as we could get lost in the weeds. */ if (depth > backtrace_limit) depth = backtrace_limit; |
d1ba71f76 sh64: oprofile: F... |
78 |
stackaddr = (unsigned long *)kernel_stack_pointer(regs); |
40a8b421b sh: oprofile: Bac... |
79 |
if (!user_mode(regs)) { |
4e14dfc72 sh: Use the gener... |
80 |
if (depth) |
0eff9f66d sh: Use the new s... |
81 82 |
unwind_stack(NULL, regs, stackaddr, &backtrace_ops, &depth); |
40a8b421b sh: oprofile: Bac... |
83 84 85 86 87 88 |
return; } while (depth-- && (stackaddr != NULL)) stackaddr = user_backtrace(stackaddr, regs); } |