[PATCH] ARM: 2761/1: OProfile: Add call graphing support for arm
[linux-2.6/openmoko-kernel/knife-kernel.git] / arch / arm / oprofile / backtrace.c
blobec58d3e2eb8bef453dd8b7ba17db4d672c3debd9
1 /*
2 * Arm specific backtracing code for oprofile
4 * Copyright 2005 Openedhand Ltd.
6 * Author: Richard Purdie <rpurdie@openedhand.com>
8 * Based on i386 oprofile backtrace code by John Levon, David Smith
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2 as
12 * published by the Free Software Foundation.
16 #include <linux/oprofile.h>
17 #include <linux/sched.h>
18 #include <linux/mm.h>
19 #include <asm/ptrace.h>
20 #include <asm/uaccess.h>
24 * The registers we're interested in are at the end of the variable
25 * length saved register structure. The fp points at the end of this
26 * structure so the address of this struct is:
27 * (struct frame_tail *)(xxx->fp)-1
29 struct frame_tail {
30 struct frame_tail *fp;
31 unsigned long sp;
32 unsigned long lr;
33 } __attribute__((packed));
36 #ifdef CONFIG_FRAME_POINTER
37 static struct frame_tail* kernel_backtrace(struct frame_tail *tail)
39 oprofile_add_trace(tail->lr);
41 /* frame pointers should strictly progress back up the stack
42 * (towards higher addresses) */
43 if (tail >= tail->fp)
44 return NULL;
46 return tail->fp-1;
48 #endif
50 static struct frame_tail* user_backtrace(struct frame_tail *tail)
52 struct frame_tail buftail;
54 /* hardware pte might not be valid due to dirty/accessed bit emulation
55 * so we use copy_from_user and benefit from exception fixups */
56 if (copy_from_user(&buftail, tail, sizeof(struct frame_tail)))
57 return NULL;
59 oprofile_add_trace(buftail.lr);
61 /* frame pointers should strictly progress back up the stack
62 * (towards higher addresses) */
63 if (tail >= buftail.fp)
64 return NULL;
66 return buftail.fp-1;
69 /* Compare two addresses and see if they're on the same page */
70 #define CMP_ADDR_EQUAL(x,y,offset) ((((unsigned long) x) >> PAGE_SHIFT) \
71 == ((((unsigned long) y) + offset) >> PAGE_SHIFT))
73 /* check that the page(s) containing the frame tail are present */
74 static int pages_present(struct frame_tail *tail)
76 struct mm_struct * mm = current->mm;
78 if (!check_user_page_readable(mm, (unsigned long)tail))
79 return 0;
81 if (CMP_ADDR_EQUAL(tail, tail, 8))
82 return 1;
84 if (!check_user_page_readable(mm, ((unsigned long)tail) + 8))
85 return 0;
87 return 1;
91 * | | /\ Higher addresses
92 * | |
93 * --------------- stack base (address of current_thread_info)
94 * | thread info |
95 * . .
96 * | stack |
97 * --------------- saved regs->ARM_fp value if valid (frame_tail address)
98 * . .
99 * --------------- struct pt_regs stored on stack (struct pt_regs *)
100 * | |
101 * . .
102 * | |
103 * --------------- %esp
104 * | |
105 * | | \/ Lower addresses
107 * Thus, &pt_regs <-> stack base restricts the valid(ish) fp values
109 static int valid_kernel_stack(struct frame_tail *tail, struct pt_regs *regs)
111 unsigned long tailaddr = (unsigned long)tail;
112 unsigned long stack = (unsigned long)regs;
113 unsigned long stack_base = (stack & ~(THREAD_SIZE - 1)) + THREAD_SIZE;
115 return (tailaddr > stack) && (tailaddr < stack_base);
118 void arm_backtrace(struct pt_regs const *regs, unsigned int depth)
120 struct frame_tail *tail;
121 unsigned long last_address = 0;
123 tail = ((struct frame_tail *) regs->ARM_fp) - 1;
125 if (!user_mode(regs)) {
127 #ifdef CONFIG_FRAME_POINTER
128 while (depth-- && tail && valid_kernel_stack(tail, regs)) {
129 tail = kernel_backtrace(tail);
131 #endif
132 return;
135 while (depth-- && tail && !((unsigned long) tail & 3)) {
136 if ((!CMP_ADDR_EQUAL(last_address, tail, 0)
137 || !CMP_ADDR_EQUAL(last_address, tail, 8))
138 && !pages_present(tail))
139 return;
140 last_address = (unsigned long) tail;
141 tail = user_backtrace(tail);