2 # SPDX-License-Identifier: GPL-2.0
3 # Disassemble the Code: line in Linux oopses
4 # usage: decodecode < oops.file
6 # options: set env. variable AFLAGS=options to pass options to "as";
7 # e.g., to decode an i386 oops on an x86_64 system, use:
8 # AFLAGS=--32 decodecode < 386.oops
9 # PC=hex - the PC (program counter) the oops points to
14 rm -f $T $T.s
$T.o
$T.oo
$T.aa
$T.dis
25 T
=`mktemp` || die
"cannot create temp file"
38 xdump
="$(echo $i | grep '^[[:xdigit:]<>[:space:]]\+$')"
39 if [ -n "$xdump" ]; then
50 if [ -z "$code" ]; then
56 code
=`echo $code | sed -e 's/.*Code: //'`
58 width
=`expr index "$code" ' '`
59 width
=$
((($width-1)/2))
66 if [ -z "$ARCH" ]; then
68 aarch64
*) ARCH
=arm64
;;
70 loongarch
*) ARCH
=loongarch
;;
74 # Params: (tmp_file, pc_sub)
79 ${CROSS_COMPILE}as
$AFLAGS -o $t.o
$t.s
> /dev
/null
2>&1
81 if [ "$ARCH" = "arm" ]; then
82 if [ $width -eq 2 ]; then
83 OBJDUMPFLAGS
="-M force-thumb"
86 ${CROSS_COMPILE}strip
$t.o
89 if [ "$ARCH" = "arm64" ]; then
90 if [ $width -eq 4 ]; then
94 ${CROSS_COMPILE}strip
$t.o
97 if [ "$ARCH" = "riscv" ]; then
98 OBJDUMPFLAGS
="-M no-aliases --section=.text -D"
99 ${CROSS_COMPILE}strip
$t.o
102 if [ "$ARCH" = "loongarch" ]; then
103 ${CROSS_COMPILE}strip
$t.o
106 if [ $pc_sub -ne 0 ]; then
108 adj_vma
=$
(( $PC - $pc_sub ))
109 OBJDUMPFLAGS
="$OBJDUMPFLAGS --adjust-vma=$adj_vma"
113 ${CROSS_COMPILE}objdump
$OBJDUMPFLAGS -S $t.o | \
114 grep -v "/tmp\|Disassembly\|\.text\|^$" > $t.dis
2>&1
117 # Match the maximum number of opcode bytes from @op_bytes contained within
121 # @op_bytes: The string of bytes from the Code: line
122 # @opline: The disassembled line coming from objdump
125 # The max number of opcode bytes from the beginning of @op_bytes which match
126 # the opcode bytes in the objdump line.
127 get_substr_opcode_bytes_num
()
135 for opc
in $op_bytes;
140 if [ "$ARCH" = "riscv" ]; then
141 opcode
=$
(echo $opcode |
tr ' ' '\n' |
tac |
tr -d '\n')
144 # return if opcode bytes do not match @opline anymore
145 if ! echo $opline |
grep -q "$opcode";
158 # Return the line number in objdump output to where the IP marker in the Code:
162 # @all_code: code in bytes without the marker
163 # @dis_file: disassembled file
164 # @ip_byte: The byte to which the IP points to
170 # num bytes including IP byte
171 local num_bytes_ip
=$
(( $3 + 1 * $width ))
173 # Add the two header lines (we're counting from 1).
177 all_code
=$
(echo $all_code |
sed -e 's/[<>()]//g')
181 get_substr_opcode_bytes_num
"$all_code" "$line"
184 if ! (( $ate_opcodes )); then
188 num_bytes_ip
=$
((num_bytes_ip
- ($ate_opcodes * $width) ))
189 if (( $num_bytes_ip <= 0 )); then
193 # Delete matched opcode bytes from all_code. For that, compute
194 # how many chars those opcodes are represented by and include
197 # a byte is 2 chars, ate_opcodes is also the number of trailing
199 del_chars
=$
(( ($ate_opcodes * $width * 2) + $ate_opcodes ))
201 all_code
=$
(echo $all_code |
sed -e "s!^.\{$del_chars\}!!")
210 marker
=`expr index "$code" "\<"`
211 if [ $marker -eq 0 ]; then
212 marker
=`expr index "$code" "\("`
216 if [ $marker -ne 0 ]; then
217 # How many bytes to subtract from the program counter
218 # in order to get to the beginning virtual address of the
220 pc_sub
=$
(( (($marker - 1) / (2 * $width + 1)) * $width ))
221 echo All code
>> $T.oo
222 echo ======== >> $T.oo
223 beforemark
=`echo "$code"`
224 echo -n " .$type 0x" > $T.s
226 echo $beforemark |
sed -e 's/ /,0x/g; s/[<>()]//g' >> $T.s
232 get_faultlinenum
"$code" "$T.dis" $pc_sub
235 # and fix code at-and-after marker
236 code
=`echo "$code" | cut -c$((${marker} + 1))-`
238 rm -f $T.o
$T.s
$T.dis
241 echo Code starting with the faulting instruction
> $T.aa
242 echo =========================================== >> $T.aa
243 code
=`echo $code | sed -e 's/\r//;s/ [<(]/ /;s/[>)] / /;s/ /,0x/g; s/[>)]$//'`
244 echo -n " .$type 0x" > $T.s
249 cat $T.oo |
sed -e "${faultlinenum}s/^\([^:]*:\)\(.*\)/\1\*\2\t\t<-- trapping instruction/"