bug.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. /*
  2. Generic support for BUG()
  3. This respects the following config options:
  4. CONFIG_BUG - emit BUG traps. Nothing happens without this.
  5. CONFIG_GENERIC_BUG - enable this code.
  6. CONFIG_GENERIC_BUG_RELATIVE_POINTERS - use 32-bit pointers relative to
  7. the containing struct bug_entry for bug_addr and file.
  8. CONFIG_DEBUG_BUGVERBOSE - emit full file+line information for each BUG
  9. CONFIG_BUG and CONFIG_DEBUG_BUGVERBOSE are potentially user-settable
  10. (though they're generally always on).
  11. CONFIG_GENERIC_BUG is set by each architecture using this code.
  12. To use this, your architecture must:
  13. 1. Set up the config options:
  14. - Enable CONFIG_GENERIC_BUG if CONFIG_BUG
  15. 2. Implement BUG (and optionally BUG_ON, WARN, WARN_ON)
  16. - Define HAVE_ARCH_BUG
  17. - Implement BUG() to generate a faulting instruction
  18. - NOTE: struct bug_entry does not have "file" or "line" entries
  19. when CONFIG_DEBUG_BUGVERBOSE is not enabled, so you must generate
  20. the values accordingly.
  21. 3. Implement the trap
  22. - In the illegal instruction trap handler (typically), verify
  23. that the fault was in kernel mode, and call report_bug()
  24. - report_bug() will return whether it was a false alarm, a warning,
  25. or an actual bug.
  26. - You must implement the is_valid_bugaddr(bugaddr) callback which
  27. returns true if the eip is a real kernel address, and it points
  28. to the expected BUG trap instruction.
  29. Jeremy Fitzhardinge <jeremy@goop.org> 2006
  30. */
  31. #define pr_fmt(fmt) fmt
  32. #include <linux/list.h>
  33. #include <linux/module.h>
  34. #include <linux/kernel.h>
  35. #include <linux/bug.h>
  36. #include <linux/sched.h>
  37. extern const struct bug_entry __start___bug_table[], __stop___bug_table[];
  38. static inline unsigned long bug_addr(const struct bug_entry *bug)
  39. {
  40. #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS
  41. return bug->bug_addr;
  42. #else
  43. return (unsigned long)bug + bug->bug_addr_disp;
  44. #endif
  45. }
  46. #ifdef CONFIG_MODULES
  47. /* Updates are protected by module mutex */
  48. static LIST_HEAD(module_bug_list);
  49. static const struct bug_entry *module_find_bug(unsigned long bugaddr)
  50. {
  51. struct module *mod;
  52. const struct bug_entry *bug = NULL;
  53. rcu_read_lock_sched();
  54. list_for_each_entry_rcu(mod, &module_bug_list, bug_list) {
  55. unsigned i;
  56. bug = mod->bug_table;
  57. for (i = 0; i < mod->num_bugs; ++i, ++bug)
  58. if (bugaddr == bug_addr(bug))
  59. goto out;
  60. }
  61. bug = NULL;
  62. out:
  63. rcu_read_unlock_sched();
  64. return bug;
  65. }
  66. void module_bug_finalize(const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs,
  67. struct module *mod)
  68. {
  69. char *secstrings;
  70. unsigned int i;
  71. lockdep_assert_held(&module_mutex);
  72. mod->bug_table = NULL;
  73. mod->num_bugs = 0;
  74. /* Find the __bug_table section, if present */
  75. secstrings = (char *)hdr + sechdrs[hdr->e_shstrndx].sh_offset;
  76. for (i = 1; i < hdr->e_shnum; i++) {
  77. if (strcmp(secstrings+sechdrs[i].sh_name, "__bug_table"))
  78. continue;
  79. mod->bug_table = (void *) sechdrs[i].sh_addr;
  80. mod->num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);
  81. break;
  82. }
  83. /*
  84. * Strictly speaking this should have a spinlock to protect against
  85. * traversals, but since we only traverse on BUG()s, a spinlock
  86. * could potentially lead to deadlock and thus be counter-productive.
  87. * Thus, this uses RCU to safely manipulate the bug list, since BUG
  88. * must run in non-interruptive state.
  89. */
  90. list_add_rcu(&mod->bug_list, &module_bug_list);
  91. }
  92. void module_bug_cleanup(struct module *mod)
  93. {
  94. lockdep_assert_held(&module_mutex);
  95. list_del_rcu(&mod->bug_list);
  96. }
  97. #else
  98. static inline const struct bug_entry *module_find_bug(unsigned long bugaddr)
  99. {
  100. return NULL;
  101. }
  102. #endif
  103. const struct bug_entry *find_bug(unsigned long bugaddr)
  104. {
  105. const struct bug_entry *bug;
  106. for (bug = __start___bug_table; bug < __stop___bug_table; ++bug)
  107. if (bugaddr == bug_addr(bug))
  108. return bug;
  109. return module_find_bug(bugaddr);
  110. }
  111. enum bug_trap_type report_bug(unsigned long bugaddr, struct pt_regs *regs)
  112. {
  113. const struct bug_entry *bug;
  114. const char *file;
  115. unsigned line, warning;
  116. if (!is_valid_bugaddr(bugaddr))
  117. return BUG_TRAP_TYPE_NONE;
  118. bug = find_bug(bugaddr);
  119. file = NULL;
  120. line = 0;
  121. warning = 0;
  122. if (bug) {
  123. #ifdef CONFIG_DEBUG_BUGVERBOSE
  124. #ifndef CONFIG_GENERIC_BUG_RELATIVE_POINTERS
  125. file = bug->file;
  126. #else
  127. file = (const char *)bug + bug->file_disp;
  128. #endif
  129. line = bug->line;
  130. #endif
  131. warning = (bug->flags & BUGFLAG_WARNING) != 0;
  132. }
  133. if (warning) {
  134. /* this is a WARN_ON rather than BUG/BUG_ON */
  135. __warn(file, line, (void *)bugaddr, BUG_GET_TAINT(bug), regs,
  136. NULL);
  137. return BUG_TRAP_TYPE_WARN;
  138. }
  139. printk(KERN_DEFAULT "------------[ cut here ]------------\n");
  140. if (file)
  141. pr_crit("kernel BUG at %s:%u!\n", file, line);
  142. else
  143. pr_crit("Kernel BUG at %p [verbose debug info unavailable]\n",
  144. (void *)bugaddr);
  145. return BUG_TRAP_TYPE_BUG;
  146. }