2 # SPDX-License-Identifier: GPL-2.0
3 # Disassemble the Code: line in Linux oopses
4 # usage: decodecode < oops.file
6 # options: set env. variable AFLAGS=options to pass options to "as";
7 # e.g., to decode an i386 oops on an x86_64 system, use:
8 # AFLAGS=--32 decodecode < 386.oops
9 # PC=hex - the PC (program counter) the oops points to
14 rm -f $T $T.s $T.o $T.oo $T.aa $T.dis
25 T=`mktemp` || die "cannot create temp file"
38 xdump="$(echo $i | grep '^[[:xdigit:]<>[:space:]]\+$')"
39 if [ -n "$xdump" ]; then
50 if [ -z "$code" ]; then
56 code=`echo $code | sed -e 's/.*Code: //'`
58 width=`expr index "$code" ' '`
59 width=$((($width-1)/2))
66 if [ -z "$ARCH" ]; then
68 aarch64*) ARCH=arm64 ;;
70 loongarch*) ARCH=loongarch ;;
74 # Params: (tmp_file, pc_sub)
79 ${CROSS_COMPILE}as $AFLAGS -o $t.o $t.s > /dev/null 2>&1
81 if [ "$ARCH" = "arm" ]; then
82 if [ $width -eq 2 ]; then
83 OBJDUMPFLAGS="-M force-thumb"
86 ${CROSS_COMPILE}strip $t.o
89 if [ "$ARCH" = "arm64" ]; then
90 if [ $width -eq 4 ]; then
94 ${CROSS_COMPILE}strip $t.o
97 if [ "$ARCH" = "riscv" ]; then
98 OBJDUMPFLAGS="-M no-aliases --section=.text -D"
99 ${CROSS_COMPILE}strip $t.o
102 if [ "$ARCH" = "loongarch" ]; then
103 ${CROSS_COMPILE}strip $t.o
106 if [ $pc_sub -ne 0 ]; then
108 adj_vma=$(( $PC - $pc_sub ))
109 OBJDUMPFLAGS="$OBJDUMPFLAGS --adjust-vma=$adj_vma"
113 ${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
114 grep -v "/tmp\|Disassembly\|\.text\|^$" > $t.dis 2>&1
117 # Match the maximum number of opcode bytes from @op_bytes contained within
121 # @op_bytes: The string of bytes from the Code: line
122 # @opline: The disassembled line coming from objdump
125 # The max number of opcode bytes from the beginning of @op_bytes which match
126 # the opcode bytes in the objdump line.
127 get_substr_opcode_bytes_num()
135 for opc in $op_bytes;
140 if [ "$ARCH" = "riscv" ]; then
141 opcode=$(echo $opcode | tr ' ' '\n' | tac | tr -d '\n')
144 # return if opcode bytes do not match @opline anymore
145 if ! echo $opline | grep -q "$opcode";
158 # Return the line number in objdump output to where the IP marker in the Code:
162 # @all_code: code in bytes without the marker
163 # @dis_file: disassembled file
164 # @ip_byte: The byte to which the IP points to
170 # num bytes including IP byte
171 local num_bytes_ip=$(( $3 + 1 * $width ))
173 # Add the two header lines (we're counting from 1).
177 all_code=$(echo $all_code | sed -e 's/[<>()]//g')
181 get_substr_opcode_bytes_num "$all_code" "$line"
184 if ! (( $ate_opcodes )); then
188 num_bytes_ip=$((num_bytes_ip - ($ate_opcodes * $width) ))
189 if (( $num_bytes_ip <= 0 )); then
193 # Delete matched opcode bytes from all_code. For that, compute
194 # how many chars those opcodes are represented by and include
197 # a byte is 2 chars, ate_opcodes is also the number of trailing
199 del_chars=$(( ($ate_opcodes * $width * 2) + $ate_opcodes ))
201 all_code=$(echo $all_code | sed -e "s!^.\{$del_chars\}!!")
210 marker=`expr index "$code" "\<"`
211 if [ $marker -eq 0 ]; then
212 marker=`expr index "$code" "\("`
216 if [ $marker -ne 0 ]; then
217 # How many bytes to subtract from the program counter
218 # in order to get to the beginning virtual address of the
220 pc_sub=$(( (($marker - 1) / (2 * $width + 1)) * $width ))
221 echo All code >> $T.oo
222 echo ======== >> $T.oo
223 beforemark=`echo "$code"`
224 echo -n " .$type 0x" > $T.s
226 echo $beforemark | sed -e 's/ /,0x/g; s/[<>()]//g' >> $T.s
232 get_faultlinenum "$code" "$T.dis" $pc_sub
235 # and fix code at-and-after marker
236 code=`echo "$code" | cut -c$((${marker} + 1))-`
238 rm -f $T.o $T.s $T.dis
241 echo Code starting with the faulting instruction > $T.aa
242 echo =========================================== >> $T.aa
243 code=`echo $code | sed -e 's/\r//;s/ [<(]/ /;s/[>)] / /;s/ /,0x/g; s/[>)]$//'`
244 echo -n " .$type 0x" > $T.s
249 cat $T.oo | sed -e "${faultlinenum}s/^\([^:]*:\)\(.*\)/\1\*\2\t\t<-- trapping instruction/"