On Thu, 2014-25-09 at 05:05:45 UTC, Anton Blanchard wrote:
> It is often useful to see the instruction that caused an unhandled
> exception.
> 
> diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c
> index 0dc43f9..27e30c8 100644
> --- a/arch/powerpc/kernel/traps.c
> +++ b/arch/powerpc/kernel/traps.c
> @@ -252,9 +252,18 @@ void _exception(int signr, struct pt_regs *regs, int 
> code, unsigned long addr)
>       }
>  
>       if (show_unhandled_signals && unhandled_signal(current, signr)) {
> +             u32 __user *nia = (u32 __user *)regs->nip;
> +             u32 insn = 0;
> +
> +             pagefault_disable();
> +             if (!access_ok(VERIFY_READ, nia, sizeof(*nia)) ||
> +                 __get_user_inatomic(insn, nia))
> +                     insn = 0xffffffffUL;
> +             pagefault_enable();

Can you add a comment explaining that interesting construct?

Looks like we do something similar in the perf callchain code, though without
the access_ok() check?

cheers
_______________________________________________
Linuxppc-dev mailing list
Linuxppc-dev@lists.ozlabs.org
https://lists.ozlabs.org/listinfo/linuxppc-dev

Reply via email to