2 # SPDX-License-Identifier: GPL-2.0
3 # Disassemble the Code: line in Linux oopses
4 # usage: decodecode < oops.file
6 # options: set env. variable AFLAGS=options to pass options to "as";
7 # e.g., to decode an i386 oops on an x86_64 system, use:
8 # AFLAGS=--32 decodecode < 386.oops
9 # PC=hex - the PC (program counter) the oops points to
14 rm -f $T $T.s $T.o $T.oo $T.aa $T.dis
25 T=`mktemp` || die "cannot create temp file"
38 xdump="$(echo $i | grep '^[[:xdigit:]<>[:space:]]\+$')"
39 if [ -n "$xdump" ]; then
50 if [ -z "$code" ]; then
56 code=`echo $code | sed -e 's/.*Code: //'`
58 width=`expr index "$code" ' '`
59 width=$((($width-1)/2))
66 if [ -z "$ARCH" ]; then
68 aarch64*) ARCH=arm64 ;;
73 # Params: (tmp_file, pc_sub)
78 ${CROSS_COMPILE}as $AFLAGS -o $t.o $t.s > /dev/null 2>&1
80 if [ "$ARCH" = "arm" ]; then
81 if [ $width -eq 2 ]; then
82 OBJDUMPFLAGS="-M force-thumb"
85 ${CROSS_COMPILE}strip $t.o
88 if [ "$ARCH" = "arm64" ]; then
89 if [ $width -eq 4 ]; then
93 ${CROSS_COMPILE}strip $t.o
96 if [ "$ARCH" = "riscv" ]; then
97 OBJDUMPFLAGS="-M no-aliases --section=.text -D"
98 ${CROSS_COMPILE}strip $t.o
101 if [ $pc_sub -ne 0 ]; then
103 adj_vma=$(( $PC - $pc_sub ))
104 OBJDUMPFLAGS="$OBJDUMPFLAGS --adjust-vma=$adj_vma"
108 ${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
109 grep -v "/tmp\|Disassembly\|\.text\|^$" > $t.dis 2>&1
112 # Match the maximum number of opcode bytes from @op_bytes contained within
116 # @op_bytes: The string of bytes from the Code: line
117 # @opline: The disassembled line coming from objdump
120 # The max number of opcode bytes from the beginning of @op_bytes which match
121 # the opcode bytes in the objdump line.
122 get_substr_opcode_bytes_num()
130 for opc in $op_bytes;
135 if [ "$ARCH" = "riscv" ]; then
136 opcode=$(echo $opcode | tr ' ' '\n' | tac | tr -d '\n')
139 # return if opcode bytes do not match @opline anymore
140 if ! echo $opline | grep -q "$opcode";
153 # Return the line number in objdump output to where the IP marker in the Code:
157 # @all_code: code in bytes without the marker
158 # @dis_file: disassembled file
159 # @ip_byte: The byte to which the IP points to
165 # num bytes including IP byte
166 local num_bytes_ip=$(( $3 + 1 * $width ))
168 # Add the two header lines (we're counting from 1).
172 all_code=$(echo $all_code | sed -e 's/[<>()]//g')
176 get_substr_opcode_bytes_num "$all_code" "$line"
179 if ! (( $ate_opcodes )); then
183 num_bytes_ip=$((num_bytes_ip - ($ate_opcodes * $width) ))
184 if (( $num_bytes_ip <= 0 )); then
188 # Delete matched opcode bytes from all_code. For that, compute
189 # how many chars those opcodes are represented by and include
192 # a byte is 2 chars, ate_opcodes is also the number of trailing
194 del_chars=$(( ($ate_opcodes * $width * 2) + $ate_opcodes ))
196 all_code=$(echo $all_code | sed -e "s!^.\{$del_chars\}!!")
205 marker=`expr index "$code" "\<"`
206 if [ $marker -eq 0 ]; then
207 marker=`expr index "$code" "\("`
211 if [ $marker -ne 0 ]; then
212 # How many bytes to subtract from the program counter
213 # in order to get to the beginning virtual address of the
215 pc_sub=$(( (($marker - 1) / (2 * $width + 1)) * $width ))
216 echo All code >> $T.oo
217 echo ======== >> $T.oo
218 beforemark=`echo "$code"`
219 echo -n " .$type 0x" > $T.s
221 echo $beforemark | sed -e 's/ /,0x/g; s/[<>()]//g' >> $T.s
227 get_faultlinenum "$code" "$T.dis" $pc_sub
230 # and fix code at-and-after marker
231 code=`echo "$code" | cut -c$((${marker} + 1))-`
233 rm -f $T.o $T.s $T.dis
236 echo Code starting with the faulting instruction > $T.aa
237 echo =========================================== >> $T.aa
238 code=`echo $code | sed -e 's/\r//;s/ [<(]/ /;s/[>)] / /;s/ /,0x/g; s/[>)]$//'`
239 echo -n " .$type 0x" > $T.s
244 cat $T.oo | sed -e "${faultlinenum}s/^\([^:]*:\)\(.*\)/\1\*\2\t\t<-- trapping instruction/"