mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-11-20 00:26:39 +08:00
5358db0b0e
This patch adds support for decoding ARM oopses to scripts/decodecode. The following things are handled: - ARCH and CROSS_COMPILE environment variables are respected. - The Code: in x86 oopses is in bytes, while it is in either words (4 bytes) or halfwords for ARM. - Some versions of ARM objdump refuse to disassemble instructions generated by literal constants (".word 0x..."). The workaround is to strip the object file first. - The faulting instruction is marked (liked so) in ARM, but <like so> in x86. - ARM mnemonics may include characters such as [] which need to be escaped before being passed to sed for the "<- trapping instruction" substitution. Signed-off-by: Rabin Vincent <rabin@rab.in> Signed-off-by: Michal Marek <mmarek@suse.cz>
99 lines
1.9 KiB
Bash
Executable File
99 lines
1.9 KiB
Bash
Executable File
#!/bin/sh
|
|
# Disassemble the Code: line in Linux oopses
|
|
# usage: decodecode < oops.file
|
|
#
|
|
# options: set env. variable AFLAGS=options to pass options to "as";
|
|
# e.g., to decode an i386 oops on an x86_64 system, use:
|
|
# AFLAGS=--32 decodecode < 386.oops
|
|
|
|
cleanup() {
|
|
rm -f $T $T.s $T.o $T.oo $T.aa $T.dis
|
|
exit 1
|
|
}
|
|
|
|
die() {
|
|
echo "$@"
|
|
exit 1
|
|
}
|
|
|
|
trap cleanup EXIT
|
|
|
|
T=`mktemp` || die "cannot create temp file"
|
|
code=
|
|
|
|
while read i ; do
|
|
|
|
case "$i" in
|
|
*Code:*)
|
|
code=$i
|
|
;;
|
|
esac
|
|
|
|
done
|
|
|
|
if [ -z "$code" ]; then
|
|
rm $T
|
|
exit
|
|
fi
|
|
|
|
echo $code
|
|
code=`echo $code | sed -e 's/.*Code: //'`
|
|
|
|
width=`expr index "$code" ' '`
|
|
width=$[($width-1)/2]
|
|
case $width in
|
|
1) type=byte ;;
|
|
2) type=2byte ;;
|
|
4) type=4byte ;;
|
|
esac
|
|
|
|
disas() {
|
|
${CROSS_COMPILE}as $AFLAGS -o $1.o $1.s &> /dev/null
|
|
|
|
if [ "$ARCH" == "arm" ]; then
|
|
if [ $width == 2 ]; then
|
|
OBJDUMPFLAGS="-M force-thumb"
|
|
fi
|
|
|
|
${CROSS_COMPILE}strip $1.o
|
|
fi
|
|
|
|
${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $1.o | \
|
|
grep -v "/tmp\|Disassembly\|\.text\|^$" &> $1.dis
|
|
}
|
|
|
|
marker=`expr index "$code" "\<"`
|
|
if [ $marker -eq 0 ]; then
|
|
marker=`expr index "$code" "\("`
|
|
fi
|
|
|
|
touch $T.oo
|
|
if [ $marker -ne 0 ]; then
|
|
echo All code >> $T.oo
|
|
echo ======== >> $T.oo
|
|
beforemark=`echo "$code"`
|
|
echo -n " .$type 0x" > $T.s
|
|
echo $beforemark | sed -e 's/ /,0x/g; s/[<>()]//g' >> $T.s
|
|
disas $T
|
|
cat $T.dis >> $T.oo
|
|
rm -f $T.o $T.s $T.dis
|
|
|
|
# and fix code at-and-after marker
|
|
code=`echo "$code" | cut -c$((${marker} + 1))-`
|
|
fi
|
|
echo Code starting with the faulting instruction > $T.aa
|
|
echo =========================================== >> $T.aa
|
|
code=`echo $code | sed -e 's/ [<(]/ /;s/[>)] / /;s/ /,0x/g; s/[>)]$//'`
|
|
echo -n " .$type 0x" > $T.s
|
|
echo $code >> $T.s
|
|
disas $T
|
|
cat $T.dis >> $T.aa
|
|
|
|
faultline=`cat $T.dis | head -1 | cut -d":" -f2`
|
|
faultline=`echo "$faultline" | sed -e 's/\[/\\\[/g; s/\]/\\\]/g'`
|
|
|
|
cat $T.oo | sed -e "s/\($faultline\)/\*\1 <-- trapping instruction/g"
|
|
echo
|
|
cat $T.aa
|
|
cleanup
|