提交 19c5870c 编写于 作者: A Alexey Dobriyan 提交者: Linus Torvalds

Use helpers to obtain task pid in printks (arch code)

One of the easiest things to isolate is the pid printed in kernel log.
There was a patch, that made this for arch-independent code, this one makes
so for arch/xxx files.

It took some time to cross-compile it, but hopefully these are all the
printks in arch code.
Signed-off-by: NAlexey Dobriyan <adobriyan@openvz.org>
Signed-off-by: NPavel Emelyanov <xemul@openvz.org>
Cc: <linux-arch@vger.kernel.org>
Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
上级 ba25f9dc
...@@ -69,7 +69,7 @@ __down_failed(struct semaphore *sem) ...@@ -69,7 +69,7 @@ __down_failed(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down failed(%p)\n", printk("%s(%d): down failed(%p)\n",
tsk->comm, tsk->pid, sem); tsk->comm, task_pid_nr(tsk), sem);
#endif #endif
tsk->state = TASK_UNINTERRUPTIBLE; tsk->state = TASK_UNINTERRUPTIBLE;
...@@ -98,7 +98,7 @@ __down_failed(struct semaphore *sem) ...@@ -98,7 +98,7 @@ __down_failed(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down acquired(%p)\n", printk("%s(%d): down acquired(%p)\n",
tsk->comm, tsk->pid, sem); tsk->comm, task_pid_nr(tsk), sem);
#endif #endif
} }
...@@ -111,7 +111,7 @@ __down_failed_interruptible(struct semaphore *sem) ...@@ -111,7 +111,7 @@ __down_failed_interruptible(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down failed(%p)\n", printk("%s(%d): down failed(%p)\n",
tsk->comm, tsk->pid, sem); tsk->comm, task_pid_nr(tsk), sem);
#endif #endif
tsk->state = TASK_INTERRUPTIBLE; tsk->state = TASK_INTERRUPTIBLE;
...@@ -139,7 +139,7 @@ __down_failed_interruptible(struct semaphore *sem) ...@@ -139,7 +139,7 @@ __down_failed_interruptible(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down %s(%p)\n", printk("%s(%d): down %s(%p)\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
(ret < 0 ? "interrupted" : "acquired"), sem); (ret < 0 ? "interrupted" : "acquired"), sem);
#endif #endif
return ret; return ret;
...@@ -168,7 +168,7 @@ down(struct semaphore *sem) ...@@ -168,7 +168,7 @@ down(struct semaphore *sem)
#endif #endif
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down(%p) <count=%d> from %p\n", printk("%s(%d): down(%p) <count=%d> from %p\n",
current->comm, current->pid, sem, current->comm, task_pid_nr(current), sem,
atomic_read(&sem->count), __builtin_return_address(0)); atomic_read(&sem->count), __builtin_return_address(0));
#endif #endif
__down(sem); __down(sem);
...@@ -182,7 +182,7 @@ down_interruptible(struct semaphore *sem) ...@@ -182,7 +182,7 @@ down_interruptible(struct semaphore *sem)
#endif #endif
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down(%p) <count=%d> from %p\n", printk("%s(%d): down(%p) <count=%d> from %p\n",
current->comm, current->pid, sem, current->comm, task_pid_nr(current), sem,
atomic_read(&sem->count), __builtin_return_address(0)); atomic_read(&sem->count), __builtin_return_address(0));
#endif #endif
return __down_interruptible(sem); return __down_interruptible(sem);
...@@ -201,7 +201,7 @@ down_trylock(struct semaphore *sem) ...@@ -201,7 +201,7 @@ down_trylock(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down_trylock %s from %p\n", printk("%s(%d): down_trylock %s from %p\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
ret ? "failed" : "acquired", ret ? "failed" : "acquired",
__builtin_return_address(0)); __builtin_return_address(0));
#endif #endif
...@@ -217,7 +217,7 @@ up(struct semaphore *sem) ...@@ -217,7 +217,7 @@ up(struct semaphore *sem)
#endif #endif
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): up(%p) <count=%d> from %p\n", printk("%s(%d): up(%p) <count=%d> from %p\n",
current->comm, current->pid, sem, current->comm, task_pid_nr(current), sem,
atomic_read(&sem->count), __builtin_return_address(0)); atomic_read(&sem->count), __builtin_return_address(0));
#endif #endif
__up(sem); __up(sem);
......
...@@ -182,7 +182,7 @@ die_if_kernel(char * str, struct pt_regs *regs, long err, unsigned long *r9_15) ...@@ -182,7 +182,7 @@ die_if_kernel(char * str, struct pt_regs *regs, long err, unsigned long *r9_15)
#ifdef CONFIG_SMP #ifdef CONFIG_SMP
printk("CPU %d ", hard_smp_processor_id()); printk("CPU %d ", hard_smp_processor_id());
#endif #endif
printk("%s(%d): %s %ld\n", current->comm, current->pid, str, err); printk("%s(%d): %s %ld\n", current->comm, task_pid_nr(current), str, err);
dik_show_regs(regs, r9_15); dik_show_regs(regs, r9_15);
add_taint(TAINT_DIE); add_taint(TAINT_DIE);
dik_show_trace((unsigned long *)(regs+1)); dik_show_trace((unsigned long *)(regs+1));
...@@ -646,7 +646,7 @@ do_entUna(void * va, unsigned long opcode, unsigned long reg, ...@@ -646,7 +646,7 @@ do_entUna(void * va, unsigned long opcode, unsigned long reg,
lock_kernel(); lock_kernel();
printk("%s(%d): unhandled unaligned exception\n", printk("%s(%d): unhandled unaligned exception\n",
current->comm, current->pid); current->comm, task_pid_nr(current));
printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx\n", printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx\n",
pc, una_reg(26), regs->ps); pc, una_reg(26), regs->ps);
...@@ -786,7 +786,7 @@ do_entUnaUser(void __user * va, unsigned long opcode, ...@@ -786,7 +786,7 @@ do_entUnaUser(void __user * va, unsigned long opcode,
} }
if (++cnt < 5) { if (++cnt < 5) {
printk("%s(%d): unaligned trap at %016lx: %p %lx %ld\n", printk("%s(%d): unaligned trap at %016lx: %p %lx %ld\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
regs->pc - 4, va, opcode, reg); regs->pc - 4, va, opcode, reg);
} }
last_time = jiffies; last_time = jiffies;
......
...@@ -194,7 +194,7 @@ do_page_fault(unsigned long address, unsigned long mmcsr, ...@@ -194,7 +194,7 @@ do_page_fault(unsigned long address, unsigned long mmcsr,
goto survive; goto survive;
} }
printk(KERN_ALERT "VM: killing process %s(%d)\n", printk(KERN_ALERT "VM: killing process %s(%d)\n",
current->comm, current->pid); current->comm, task_pid_nr(current));
if (!user_mode(regs)) if (!user_mode(regs))
goto no_context; goto no_context;
do_group_exit(SIGKILL); do_group_exit(SIGKILL);
......
...@@ -265,7 +265,7 @@ void __show_regs(struct pt_regs *regs) ...@@ -265,7 +265,7 @@ void __show_regs(struct pt_regs *regs)
void show_regs(struct pt_regs * regs) void show_regs(struct pt_regs * regs)
{ {
printk("\n"); printk("\n");
printk("Pid: %d, comm: %20s\n", current->pid, current->comm); printk("Pid: %d, comm: %20s\n", task_pid_nr(current), current->comm);
__show_regs(regs); __show_regs(regs);
__backtrace(); __backtrace();
} }
......
...@@ -382,16 +382,16 @@ static void clear_breakpoint(struct task_struct *task, struct debug_entry *bp) ...@@ -382,16 +382,16 @@ static void clear_breakpoint(struct task_struct *task, struct debug_entry *bp)
if (ret != 2 || old_insn.thumb != BREAKINST_THUMB) if (ret != 2 || old_insn.thumb != BREAKINST_THUMB)
printk(KERN_ERR "%s:%d: corrupted Thumb breakpoint at " printk(KERN_ERR "%s:%d: corrupted Thumb breakpoint at "
"0x%08lx (0x%04x)\n", task->comm, task->pid, "0x%08lx (0x%04x)\n", task->comm,
addr, old_insn.thumb); task_pid_nr(task), addr, old_insn.thumb);
} else { } else {
ret = swap_insn(task, addr & ~3, &old_insn.arm, ret = swap_insn(task, addr & ~3, &old_insn.arm,
&bp->insn.arm, 4); &bp->insn.arm, 4);
if (ret != 4 || old_insn.arm != BREAKINST_ARM) if (ret != 4 || old_insn.arm != BREAKINST_ARM)
printk(KERN_ERR "%s:%d: corrupted ARM breakpoint at " printk(KERN_ERR "%s:%d: corrupted ARM breakpoint at "
"0x%08lx (0x%08x)\n", task->comm, task->pid, "0x%08lx (0x%08x)\n", task->comm,
addr, old_insn.arm); task_pid_nr(task), addr, old_insn.arm);
} }
} }
......
...@@ -223,7 +223,7 @@ static void __die(const char *str, int err, struct thread_info *thread, struct p ...@@ -223,7 +223,7 @@ static void __die(const char *str, int err, struct thread_info *thread, struct p
print_modules(); print_modules();
__show_regs(regs); __show_regs(regs);
printk("Process %s (pid: %d, stack limit = 0x%p)\n", printk("Process %s (pid: %d, stack limit = 0x%p)\n",
tsk->comm, tsk->pid, thread + 1); tsk->comm, task_pid_nr(tsk), thread + 1);
if (!user_mode(regs) || in_interrupt()) { if (!user_mode(regs) || in_interrupt()) {
dump_mem("Stack: ", regs->ARM_sp, dump_mem("Stack: ", regs->ARM_sp,
...@@ -337,7 +337,7 @@ asmlinkage void __exception do_undefinstr(struct pt_regs *regs) ...@@ -337,7 +337,7 @@ asmlinkage void __exception do_undefinstr(struct pt_regs *regs)
#ifdef CONFIG_DEBUG_USER #ifdef CONFIG_DEBUG_USER
if (user_debug & UDBG_UNDEFINED) { if (user_debug & UDBG_UNDEFINED) {
printk(KERN_INFO "%s (%d): undefined instruction: pc=%p\n", printk(KERN_INFO "%s (%d): undefined instruction: pc=%p\n",
current->comm, current->pid, pc); current->comm, task_pid_nr(current), pc);
dump_instr(regs); dump_instr(regs);
} }
#endif #endif
...@@ -388,7 +388,7 @@ static int bad_syscall(int n, struct pt_regs *regs) ...@@ -388,7 +388,7 @@ static int bad_syscall(int n, struct pt_regs *regs)
#ifdef CONFIG_DEBUG_USER #ifdef CONFIG_DEBUG_USER
if (user_debug & UDBG_SYSCALL) { if (user_debug & UDBG_SYSCALL) {
printk(KERN_ERR "[%d] %s: obsolete system call %08x.\n", printk(KERN_ERR "[%d] %s: obsolete system call %08x.\n",
current->pid, current->comm, n); task_pid_nr(current), current->comm, n);
dump_instr(regs); dump_instr(regs);
} }
#endif #endif
...@@ -565,7 +565,7 @@ asmlinkage int arm_syscall(int no, struct pt_regs *regs) ...@@ -565,7 +565,7 @@ asmlinkage int arm_syscall(int no, struct pt_regs *regs)
*/ */
if (user_debug & UDBG_SYSCALL) { if (user_debug & UDBG_SYSCALL) {
printk("[%d] %s: arm syscall %d\n", printk("[%d] %s: arm syscall %d\n",
current->pid, current->comm, no); task_pid_nr(current), current->comm, no);
dump_instr(regs); dump_instr(regs);
if (user_mode(regs)) { if (user_mode(regs)) {
__show_regs(regs); __show_regs(regs);
...@@ -642,7 +642,7 @@ baddataabort(int code, unsigned long instr, struct pt_regs *regs) ...@@ -642,7 +642,7 @@ baddataabort(int code, unsigned long instr, struct pt_regs *regs)
#ifdef CONFIG_DEBUG_USER #ifdef CONFIG_DEBUG_USER
if (user_debug & UDBG_BADABORT) { if (user_debug & UDBG_BADABORT) {
printk(KERN_ERR "[%d] %s: bad data abort: code %d instr 0x%08lx\n", printk(KERN_ERR "[%d] %s: bad data abort: code %d instr 0x%08lx\n",
current->pid, current->comm, code, instr); task_pid_nr(current), current->comm, code, instr);
dump_instr(regs); dump_instr(regs);
show_pte(current->mm, addr); show_pte(current->mm, addr);
} }
......
...@@ -757,7 +757,7 @@ do_alignment(unsigned long addr, unsigned int fsr, struct pt_regs *regs) ...@@ -757,7 +757,7 @@ do_alignment(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
if (ai_usermode & 1) if (ai_usermode & 1)
printk("Alignment trap: %s (%d) PC=0x%08lx Instr=0x%0*lx " printk("Alignment trap: %s (%d) PC=0x%08lx Instr=0x%0*lx "
"Address=0x%08lx FSR 0x%03x\n", current->comm, "Address=0x%08lx FSR 0x%03x\n", current->comm,
current->pid, instrptr, task_pid_nr(current), instrptr,
thumb_mode(regs) ? 4 : 8, thumb_mode(regs) ? 4 : 8,
thumb_mode(regs) ? tinstr : instr, thumb_mode(regs) ? tinstr : instr,
addr, fsr); addr, fsr);
......
...@@ -773,7 +773,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro ...@@ -773,7 +773,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro
if (flags & MAP_SHARED) if (flags & MAP_SHARED)
printk(KERN_INFO printk(KERN_INFO
"%s(%d): emulate_mmap() can't share head (addr=0x%lx)\n", "%s(%d): emulate_mmap() can't share head (addr=0x%lx)\n",
current->comm, current->pid, start); current->comm, task_pid_nr(current), start);
ret = mmap_subpage(file, start, min(PAGE_ALIGN(start), end), prot, flags, ret = mmap_subpage(file, start, min(PAGE_ALIGN(start), end), prot, flags,
off); off);
if (IS_ERR((void *) ret)) if (IS_ERR((void *) ret))
...@@ -786,7 +786,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro ...@@ -786,7 +786,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro
if (flags & MAP_SHARED) if (flags & MAP_SHARED)
printk(KERN_INFO printk(KERN_INFO
"%s(%d): emulate_mmap() can't share tail (end=0x%lx)\n", "%s(%d): emulate_mmap() can't share tail (end=0x%lx)\n",
current->comm, current->pid, end); current->comm, task_pid_nr(current), end);
ret = mmap_subpage(file, max(start, PAGE_START(end)), end, prot, flags, ret = mmap_subpage(file, max(start, PAGE_START(end)), end, prot, flags,
(off + len) - offset_in_page(end)); (off + len) - offset_in_page(end));
if (IS_ERR((void *) ret)) if (IS_ERR((void *) ret))
...@@ -816,7 +816,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro ...@@ -816,7 +816,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro
if ((flags & MAP_SHARED) && !is_congruent) if ((flags & MAP_SHARED) && !is_congruent)
printk(KERN_INFO "%s(%d): emulate_mmap() can't share contents of incongruent mmap " printk(KERN_INFO "%s(%d): emulate_mmap() can't share contents of incongruent mmap "
"(addr=0x%lx,off=0x%llx)\n", current->comm, current->pid, start, off); "(addr=0x%lx,off=0x%llx)\n", current->comm, task_pid_nr(current), start, off);
DBG("mmap_body: mapping [0x%lx-0x%lx) %s with poff 0x%llx\n", pstart, pend, DBG("mmap_body: mapping [0x%lx-0x%lx) %s with poff 0x%llx\n", pstart, pend,
is_congruent ? "congruent" : "not congruent", poff); is_congruent ? "congruent" : "not congruent", poff);
......
此差异已折叠。
...@@ -44,11 +44,11 @@ default_validate(struct task_struct *task, unsigned int flags, int cpu, void *da ...@@ -44,11 +44,11 @@ default_validate(struct task_struct *task, unsigned int flags, int cpu, void *da
int ret = 0; int ret = 0;
if (data == NULL) { if (data == NULL) {
DPRINT(("[%d] no argument passed\n", task->pid)); DPRINT(("[%d] no argument passed\n", task_pid_nr(task)));
return -EINVAL; return -EINVAL;
} }
DPRINT(("[%d] validate flags=0x%x CPU%d\n", task->pid, flags, cpu)); DPRINT(("[%d] validate flags=0x%x CPU%d\n", task_pid_nr(task), flags, cpu));
/* /*
* must hold at least the buffer header + one minimally sized entry * must hold at least the buffer header + one minimally sized entry
...@@ -88,7 +88,7 @@ default_init(struct task_struct *task, void *buf, unsigned int flags, int cpu, v ...@@ -88,7 +88,7 @@ default_init(struct task_struct *task, void *buf, unsigned int flags, int cpu, v
hdr->hdr_count = 0UL; hdr->hdr_count = 0UL;
DPRINT(("[%d] buffer=%p buf_size=%lu hdr_size=%lu hdr_version=%u cur_offs=%lu\n", DPRINT(("[%d] buffer=%p buf_size=%lu hdr_size=%lu hdr_version=%u cur_offs=%lu\n",
task->pid, task_pid_nr(task),
buf, buf,
hdr->hdr_buf_size, hdr->hdr_buf_size,
sizeof(*hdr), sizeof(*hdr),
...@@ -245,7 +245,7 @@ default_restart(struct task_struct *task, pfm_ovfl_ctrl_t *ctrl, void *buf, stru ...@@ -245,7 +245,7 @@ default_restart(struct task_struct *task, pfm_ovfl_ctrl_t *ctrl, void *buf, stru
static int static int
default_exit(struct task_struct *task, void *buf, struct pt_regs *regs) default_exit(struct task_struct *task, void *buf, struct pt_regs *regs)
{ {
DPRINT(("[%d] exit(%p)\n", task->pid, buf)); DPRINT(("[%d] exit(%p)\n", task_pid_nr(task), buf));
return 0; return 0;
} }
......
...@@ -105,7 +105,8 @@ show_regs (struct pt_regs *regs) ...@@ -105,7 +105,8 @@ show_regs (struct pt_regs *regs)
unsigned long ip = regs->cr_iip + ia64_psr(regs)->ri; unsigned long ip = regs->cr_iip + ia64_psr(regs)->ri;
print_modules(); print_modules();
printk("\nPid: %d, CPU %d, comm: %20s\n", current->pid, smp_processor_id(), current->comm); printk("\nPid: %d, CPU %d, comm: %20s\n", task_pid_nr(current),
smp_processor_id(), current->comm);
printk("psr : %016lx ifs : %016lx ip : [<%016lx>] %s\n", printk("psr : %016lx ifs : %016lx ip : [<%016lx>] %s\n",
regs->cr_ipsr, regs->cr_ifs, ip, print_tainted()); regs->cr_ipsr, regs->cr_ifs, ip, print_tainted());
print_symbol("ip is at %s\n", ip); print_symbol("ip is at %s\n", ip);
......
...@@ -61,7 +61,7 @@ die (const char *str, struct pt_regs *regs, long err) ...@@ -61,7 +61,7 @@ die (const char *str, struct pt_regs *regs, long err)
if (++die.lock_owner_depth < 3) { if (++die.lock_owner_depth < 3) {
printk("%s[%d]: %s %ld [%d]\n", printk("%s[%d]: %s %ld [%d]\n",
current->comm, current->pid, str, err, ++die_counter); current->comm, task_pid_nr(current), str, err, ++die_counter);
(void) notify_die(DIE_OOPS, (char *)str, regs, err, 255, SIGSEGV); (void) notify_die(DIE_OOPS, (char *)str, regs, err, 255, SIGSEGV);
show_regs(regs); show_regs(regs);
} else } else
...@@ -315,7 +315,7 @@ handle_fpu_swa (int fp_fault, struct pt_regs *regs, unsigned long isr) ...@@ -315,7 +315,7 @@ handle_fpu_swa (int fp_fault, struct pt_regs *regs, unsigned long isr)
last.time = current_jiffies + 5 * HZ; last.time = current_jiffies + 5 * HZ;
printk(KERN_WARNING printk(KERN_WARNING
"%s(%d): floating-point assist fault at ip %016lx, isr %016lx\n", "%s(%d): floating-point assist fault at ip %016lx, isr %016lx\n",
current->comm, current->pid, regs->cr_iip + ia64_psr(regs)->ri, isr); current->comm, task_pid_nr(current), regs->cr_iip + ia64_psr(regs)->ri, isr);
} }
} }
} }
...@@ -453,7 +453,7 @@ ia64_fault (unsigned long vector, unsigned long isr, unsigned long ifa, ...@@ -453,7 +453,7 @@ ia64_fault (unsigned long vector, unsigned long isr, unsigned long ifa,
if (code == 8) { if (code == 8) {
# ifdef CONFIG_IA64_PRINT_HAZARDS # ifdef CONFIG_IA64_PRINT_HAZARDS
printk("%s[%d]: possible hazard @ ip=%016lx (pr = %016lx)\n", printk("%s[%d]: possible hazard @ ip=%016lx (pr = %016lx)\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
regs.cr_iip + ia64_psr(&regs)->ri, regs.pr); regs.cr_iip + ia64_psr(&regs)->ri, regs.pr);
# endif # endif
return; return;
......
...@@ -1340,7 +1340,8 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs) ...@@ -1340,7 +1340,8 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs)
size_t len; size_t len;
len = sprintf(buf, "%s(%d): unaligned access to 0x%016lx, " len = sprintf(buf, "%s(%d): unaligned access to 0x%016lx, "
"ip=0x%016lx\n\r", current->comm, current->pid, "ip=0x%016lx\n\r", current->comm,
task_pid_nr(current),
ifa, regs->cr_iip + ipsr->ri); ifa, regs->cr_iip + ipsr->ri);
/* /*
* Don't call tty_write_message() if we're in the kernel; we might * Don't call tty_write_message() if we're in the kernel; we might
...@@ -1363,7 +1364,7 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs) ...@@ -1363,7 +1364,7 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs)
"administrator\n" "administrator\n"
"echo 0 > /proc/sys/kernel/ignore-" "echo 0 > /proc/sys/kernel/ignore-"
"unaligned-usertrap to re-enable\n", "unaligned-usertrap to re-enable\n",
current->comm, current->pid); current->comm, task_pid_nr(current));
} }
} }
} else { } else {
......
...@@ -196,7 +196,7 @@ static void show_registers(struct pt_regs *regs) ...@@ -196,7 +196,7 @@ static void show_registers(struct pt_regs *regs)
printk("SPI: %08lx\n", sp); printk("SPI: %08lx\n", sp);
} }
printk("Process %s (pid: %d, process nr: %d, stackpage=%08lx)", printk("Process %s (pid: %d, process nr: %d, stackpage=%08lx)",
current->comm, current->pid, 0xffff & i, 4096+(unsigned long)current); current->comm, task_pid_nr(current), 0xffff & i, 4096+(unsigned long)current);
/* /*
* When in-kernel, we also print out the stack and code at the * When in-kernel, we also print out the stack and code at the
......
...@@ -900,7 +900,7 @@ void show_registers(struct pt_regs *regs) ...@@ -900,7 +900,7 @@ void show_registers(struct pt_regs *regs)
regs->d4, regs->d5, regs->a0, regs->a1); regs->d4, regs->d5, regs->a0, regs->a1);
printk("Process %s (pid: %d, task=%p)\n", printk("Process %s (pid: %d, task=%p)\n",
current->comm, current->pid, current); current->comm, task_pid_nr(current), current);
addr = (unsigned long)&fp->un; addr = (unsigned long)&fp->un;
printk("Frame format=%X ", regs->format); printk("Frame format=%X ", regs->format);
switch (regs->format) { switch (regs->format) {
...@@ -1038,7 +1038,7 @@ void bad_super_trap (struct frame *fp) ...@@ -1038,7 +1038,7 @@ void bad_super_trap (struct frame *fp)
fp->un.fmtb.daddr, space_names[ssw & DFC], fp->un.fmtb.daddr, space_names[ssw & DFC],
fp->ptregs.pc); fp->ptregs.pc);
} }
printk ("Current process id is %d\n", current->pid); printk ("Current process id is %d\n", task_pid_nr(current));
die_if_kernel("BAD KERNEL TRAP", &fp->ptregs, 0); die_if_kernel("BAD KERNEL TRAP", &fp->ptregs, 0);
} }
......
...@@ -314,7 +314,7 @@ void show_registers(const struct pt_regs *regs) ...@@ -314,7 +314,7 @@ void show_registers(const struct pt_regs *regs)
__show_regs(regs); __show_regs(regs);
print_modules(); print_modules();
printk("Process %s (pid: %d, threadinfo=%p, task=%p)\n", printk("Process %s (pid: %d, threadinfo=%p, task=%p)\n",
current->comm, current->pid, current_thread_info(), current); current->comm, task_pid_nr(current), current_thread_info(), current);
show_stacktrace(current, regs); show_stacktrace(current, regs);
show_code((unsigned int __user *) regs->cp0_epc); show_code((unsigned int __user *) regs->cp0_epc);
printk("\n"); printk("\n");
......
...@@ -219,7 +219,7 @@ void die_if_kernel(char *str, struct pt_regs *regs, long err) ...@@ -219,7 +219,7 @@ void die_if_kernel(char *str, struct pt_regs *regs, long err)
return; /* STFU */ return; /* STFU */
printk(KERN_CRIT "%s (pid %d): %s (code %ld) at " RFMT "\n", printk(KERN_CRIT "%s (pid %d): %s (code %ld) at " RFMT "\n",
current->comm, current->pid, str, err, regs->iaoq[0]); current->comm, task_pid_nr(current), str, err, regs->iaoq[0]);
#ifdef PRINT_USER_FAULTS #ifdef PRINT_USER_FAULTS
/* XXX for debugging only */ /* XXX for debugging only */
show_regs(regs); show_regs(regs);
...@@ -252,7 +252,7 @@ KERN_CRIT " || ||\n"); ...@@ -252,7 +252,7 @@ KERN_CRIT " || ||\n");
if (err) if (err)
printk(KERN_CRIT "%s (pid %d): %s (code %ld)\n", printk(KERN_CRIT "%s (pid %d): %s (code %ld)\n",
current->comm, current->pid, str, err); current->comm, task_pid_nr(current), str, err);
/* Wot's wrong wif bein' racy? */ /* Wot's wrong wif bein' racy? */
if (current->thread.flags & PARISC_KERNEL_DEATH) { if (current->thread.flags & PARISC_KERNEL_DEATH) {
...@@ -317,7 +317,7 @@ static void handle_break(struct pt_regs *regs) ...@@ -317,7 +317,7 @@ static void handle_break(struct pt_regs *regs)
if (unlikely(iir != GDB_BREAK_INSN)) { if (unlikely(iir != GDB_BREAK_INSN)) {
printk(KERN_DEBUG "break %d,%d: pid=%d command='%s'\n", printk(KERN_DEBUG "break %d,%d: pid=%d command='%s'\n",
iir & 31, (iir>>13) & ((1<<13)-1), iir & 31, (iir>>13) & ((1<<13)-1),
current->pid, current->comm); task_pid_nr(current), current->comm);
show_regs(regs); show_regs(regs);
} }
#endif #endif
...@@ -747,7 +747,7 @@ void handle_interruption(int code, struct pt_regs *regs) ...@@ -747,7 +747,7 @@ void handle_interruption(int code, struct pt_regs *regs)
if (user_mode(regs)) { if (user_mode(regs)) {
#ifdef PRINT_USER_FAULTS #ifdef PRINT_USER_FAULTS
printk(KERN_DEBUG "\nhandle_interruption() pid=%d command='%s'\n", printk(KERN_DEBUG "\nhandle_interruption() pid=%d command='%s'\n",
current->pid, current->comm); task_pid_nr(current), current->comm);
show_regs(regs); show_regs(regs);
#endif #endif
/* SIGBUS, for lack of a better one. */ /* SIGBUS, for lack of a better one. */
...@@ -772,7 +772,7 @@ void handle_interruption(int code, struct pt_regs *regs) ...@@ -772,7 +772,7 @@ void handle_interruption(int code, struct pt_regs *regs)
else else
printk(KERN_DEBUG "User Fault (long pointer) (fault %d) ", printk(KERN_DEBUG "User Fault (long pointer) (fault %d) ",
code); code);
printk("pid=%d command='%s'\n", current->pid, current->comm); printk("pid=%d command='%s'\n", task_pid_nr(current), current->comm);
show_regs(regs); show_regs(regs);
#endif #endif
si.si_signo = SIGSEGV; si.si_signo = SIGSEGV;
......
...@@ -469,7 +469,7 @@ void handle_unaligned(struct pt_regs *regs) ...@@ -469,7 +469,7 @@ void handle_unaligned(struct pt_regs *regs)
&& ++unaligned_count < 5) { && ++unaligned_count < 5) {
char buf[256]; char buf[256];
sprintf(buf, "%s(%d): unaligned access to 0x" RFMT " at ip=0x" RFMT "\n", sprintf(buf, "%s(%d): unaligned access to 0x" RFMT " at ip=0x" RFMT "\n",
current->comm, current->pid, regs->ior, regs->iaoq[0]); current->comm, task_pid_nr(current), regs->ior, regs->iaoq[0]);
printk(KERN_WARNING "%s", buf); printk(KERN_WARNING "%s", buf);
#ifdef DEBUG_UNALIGNED #ifdef DEBUG_UNALIGNED
show_regs(regs); show_regs(regs);
......
...@@ -211,7 +211,7 @@ void do_page_fault(struct pt_regs *regs, unsigned long code, ...@@ -211,7 +211,7 @@ void do_page_fault(struct pt_regs *regs, unsigned long code,
#ifdef PRINT_USER_FAULTS #ifdef PRINT_USER_FAULTS
printk(KERN_DEBUG "\n"); printk(KERN_DEBUG "\n");
printk(KERN_DEBUG "do_page_fault() pid=%d command='%s' type=%lu address=0x%08lx\n", printk(KERN_DEBUG "do_page_fault() pid=%d command='%s' type=%lu address=0x%08lx\n",
tsk->pid, tsk->comm, code, address); task_pid_nr(tsk), tsk->comm, code, address);
if (vma) { if (vma) {
printk(KERN_DEBUG "vm_start = 0x%08lx, vm_end = 0x%08lx\n", printk(KERN_DEBUG "vm_start = 0x%08lx, vm_end = 0x%08lx\n",
vma->vm_start, vma->vm_end); vma->vm_start, vma->vm_end);
......
...@@ -459,7 +459,7 @@ void show_regs(struct pt_regs * regs) ...@@ -459,7 +459,7 @@ void show_regs(struct pt_regs * regs)
printk("DAR: "REG", DSISR: "REG"\n", regs->dar, regs->dsisr); printk("DAR: "REG", DSISR: "REG"\n", regs->dar, regs->dsisr);
#endif #endif
printk("TASK = %p[%d] '%s' THREAD: %p", printk("TASK = %p[%d] '%s' THREAD: %p",
current, current->pid, current->comm, task_thread_info(current)); current, task_pid_nr(current), current->comm, task_thread_info(current));
#ifdef CONFIG_SMP #ifdef CONFIG_SMP
printk(" CPU: %d", smp_processor_id()); printk(" CPU: %d", smp_processor_id());
......
...@@ -881,7 +881,7 @@ void nonrecoverable_exception(struct pt_regs *regs) ...@@ -881,7 +881,7 @@ void nonrecoverable_exception(struct pt_regs *regs)
void trace_syscall(struct pt_regs *regs) void trace_syscall(struct pt_regs *regs)
{ {
printk("Task: %p(%d), PC: %08lX/%08lX, Syscall: %3ld, Result: %s%ld %s\n", printk("Task: %p(%d), PC: %08lX/%08lX, Syscall: %3ld, Result: %s%ld %s\n",
current, current->pid, regs->nip, regs->link, regs->gpr[0], current, task_pid_nr(current), regs->nip, regs->link, regs->gpr[0],
regs->ccr&0x10000000?"Error=":"", regs->gpr[3], print_tainted()); regs->ccr&0x10000000?"Error=":"", regs->gpr[3], print_tainted());
} }
......
...@@ -166,7 +166,7 @@ void show_regs(struct pt_regs *regs) ...@@ -166,7 +166,7 @@ void show_regs(struct pt_regs *regs)
printk("CPU: %d %s\n", task_thread_info(tsk)->cpu, print_tainted()); printk("CPU: %d %s\n", task_thread_info(tsk)->cpu, print_tainted());
printk("Process %s (pid: %d, task: %p, ksp: %p)\n", printk("Process %s (pid: %d, task: %p, ksp: %p)\n",
current->comm, current->pid, (void *) tsk, current->comm, task_pid_nr(current), (void *) tsk,
(void *) tsk->thread.ksp); (void *) tsk->thread.ksp);
show_registers(regs); show_registers(regs);
......
...@@ -121,7 +121,7 @@ void machine_power_off(void) ...@@ -121,7 +121,7 @@ void machine_power_off(void)
void show_regs(struct pt_regs * regs) void show_regs(struct pt_regs * regs)
{ {
printk("\n"); printk("\n");
printk("Pid : %d, Comm: %20s\n", current->pid, current->comm); printk("Pid : %d, Comm: %20s\n", task_pid_nr(current), current->comm);
print_symbol("PC is at %s\n", instruction_pointer(regs)); print_symbol("PC is at %s\n", instruction_pointer(regs));
printk("PC : %08lx SP : %08lx SR : %08lx ", printk("PC : %08lx SP : %08lx SR : %08lx ",
regs->pc, regs->regs[15], regs->sr); regs->pc, regs->regs[15], regs->sr);
......
...@@ -382,7 +382,7 @@ static int setup_frame(int sig, struct k_sigaction *ka, ...@@ -382,7 +382,7 @@ static int setup_frame(int sig, struct k_sigaction *ka,
set_fs(USER_DS); set_fs(USER_DS);
pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n", pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n",
current->comm, current->pid, frame, regs->pc, regs->pr); current->comm, task_pid_nr(current), frame, regs->pc, regs->pr);
flush_cache_sigtramp(regs->pr); flush_cache_sigtramp(regs->pr);
...@@ -462,7 +462,7 @@ static int setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info, ...@@ -462,7 +462,7 @@ static int setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
set_fs(USER_DS); set_fs(USER_DS);
pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n", pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n",
current->comm, current->pid, frame, regs->pc, regs->pr); current->comm, task_pid_nr(current), frame, regs->pc, regs->pr);
flush_cache_sigtramp(regs->pr); flush_cache_sigtramp(regs->pr);
......
...@@ -95,8 +95,8 @@ void die(const char * str, struct pt_regs * regs, long err) ...@@ -95,8 +95,8 @@ void die(const char * str, struct pt_regs * regs, long err)
print_modules(); print_modules();
show_regs(regs); show_regs(regs);
printk("Process: %s (pid: %d, stack limit = %p)\n", printk("Process: %s (pid: %d, stack limit = %p)\n", current->comm,
current->comm, current->pid, task_stack_page(current) + 1); task_pid_nr(current), task_stack_page(current) + 1);
if (!user_mode(regs) || in_interrupt()) if (!user_mode(regs) || in_interrupt())
dump_mem("Stack: ", regs->regs[15], THREAD_SIZE + dump_mem("Stack: ", regs->regs[15], THREAD_SIZE +
...@@ -386,7 +386,8 @@ static int handle_unaligned_access(u16 instruction, struct pt_regs *regs) ...@@ -386,7 +386,8 @@ static int handle_unaligned_access(u16 instruction, struct pt_regs *regs)
printk(KERN_NOTICE "Fixing up unaligned userspace access " printk(KERN_NOTICE "Fixing up unaligned userspace access "
"in \"%s\" pid=%d pc=0x%p ins=0x%04hx\n", "in \"%s\" pid=%d pc=0x%p ins=0x%04hx\n",
current->comm,current->pid,(u16*)regs->pc,instruction); current->comm, task_pid_nr(current),
(u16 *)regs->pc, instruction);
} }
ret = -EFAULT; ret = -EFAULT;
......
...@@ -764,7 +764,7 @@ static int misaligned_fixup(struct pt_regs *regs) ...@@ -764,7 +764,7 @@ static int misaligned_fixup(struct pt_regs *regs)
--user_mode_unaligned_fixup_count; --user_mode_unaligned_fixup_count;
/* Only do 'count' worth of these reports, to remove a potential DoS against syslog */ /* Only do 'count' worth of these reports, to remove a potential DoS against syslog */
printk("Fixing up unaligned userspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n", printk("Fixing up unaligned userspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n",
current->comm, current->pid, (__u32)regs->pc, opcode); current->comm, task_pid_nr(current), (__u32)regs->pc, opcode);
} else } else
#endif #endif
if (!user_mode(regs) && (kernel_mode_unaligned_fixup_count > 0)) { if (!user_mode(regs) && (kernel_mode_unaligned_fixup_count > 0)) {
...@@ -774,7 +774,7 @@ static int misaligned_fixup(struct pt_regs *regs) ...@@ -774,7 +774,7 @@ static int misaligned_fixup(struct pt_regs *regs)
(__u32)regs->pc, opcode); (__u32)regs->pc, opcode);
} else { } else {
printk("Fixing up unaligned kernelspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n", printk("Fixing up unaligned kernelspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n",
current->comm, current->pid, (__u32)regs->pc, opcode); current->comm, task_pid_nr(current), (__u32)regs->pc, opcode);
} }
} }
......
...@@ -81,7 +81,7 @@ static inline void print_vma(struct vm_area_struct *vma) ...@@ -81,7 +81,7 @@ static inline void print_vma(struct vm_area_struct *vma)
static inline void print_task(struct task_struct *tsk) static inline void print_task(struct task_struct *tsk)
{ {
printk("Task pid %d\n", tsk->pid); printk("Task pid %d\n", task_pid_nr(tsk));
} }
static pte_t *lookup_pte(struct mm_struct *mm, unsigned long address) static pte_t *lookup_pte(struct mm_struct *mm, unsigned long address)
...@@ -272,7 +272,7 @@ asmlinkage void do_page_fault(struct pt_regs *regs, unsigned long writeaccess, ...@@ -272,7 +272,7 @@ asmlinkage void do_page_fault(struct pt_regs *regs, unsigned long writeaccess,
* usermode, so only need a few */ * usermode, so only need a few */
count++; count++;
printk("user mode bad_area address=%08lx pid=%d (%s) pc=%08lx\n", printk("user mode bad_area address=%08lx pid=%d (%s) pc=%08lx\n",
address, current->pid, current->comm, address, task_pid_nr(current), current->comm,
(unsigned long) regs->pc); (unsigned long) regs->pc);
#if 0 #if 0
show_regs(regs); show_regs(regs);
......
...@@ -155,7 +155,7 @@ static inline void read_sunos_user(struct pt_regs *regs, unsigned long offset, ...@@ -155,7 +155,7 @@ static inline void read_sunos_user(struct pt_regs *regs, unsigned long offset,
/* Rest of them are completely unsupported. */ /* Rest of them are completely unsupported. */
default: default:
printk("%s [%d]: Wants to read user offset %ld\n", printk("%s [%d]: Wants to read user offset %ld\n",
current->comm, current->pid, offset); current->comm, task_pid_nr(current), offset);
pt_error_return(regs, EIO); pt_error_return(regs, EIO);
return; return;
} }
...@@ -222,7 +222,7 @@ static inline void write_sunos_user(struct pt_regs *regs, unsigned long offset, ...@@ -222,7 +222,7 @@ static inline void write_sunos_user(struct pt_regs *regs, unsigned long offset,
/* Rest of them are completely unsupported or "no-touch". */ /* Rest of them are completely unsupported or "no-touch". */
default: default:
printk("%s [%d]: Wants to write user offset %ld\n", printk("%s [%d]: Wants to write user offset %ld\n",
current->comm, current->pid, offset); current->comm, task_pid_nr(current), offset);
goto failure; goto failure;
} }
success: success:
......
...@@ -357,7 +357,7 @@ c_sys_nis_syscall (struct pt_regs *regs) ...@@ -357,7 +357,7 @@ c_sys_nis_syscall (struct pt_regs *regs)
if (count++ > 5) if (count++ > 5)
return -ENOSYS; return -ENOSYS;
printk ("%s[%d]: Unimplemented SPARC system call %d\n", printk ("%s[%d]: Unimplemented SPARC system call %d\n",
current->comm, current->pid, (int)regs->u_regs[1]); current->comm, task_pid_nr(current), (int)regs->u_regs[1]);
#ifdef DEBUG_UNIMP_SYSCALL #ifdef DEBUG_UNIMP_SYSCALL
show_regs (regs); show_regs (regs);
#endif #endif
......
...@@ -38,7 +38,7 @@ struct trap_trace_entry trapbuf[1024]; ...@@ -38,7 +38,7 @@ struct trap_trace_entry trapbuf[1024];
void syscall_trace_entry(struct pt_regs *regs) void syscall_trace_entry(struct pt_regs *regs)
{ {
printk("%s[%d]: ", current->comm, current->pid); printk("%s[%d]: ", current->comm, task_pid_nr(current));
printk("scall<%d> (could be %d)\n", (int) regs->u_regs[UREG_G1], printk("scall<%d> (could be %d)\n", (int) regs->u_regs[UREG_G1],
(int) regs->u_regs[UREG_I0]); (int) regs->u_regs[UREG_I0]);
} }
...@@ -99,7 +99,7 @@ void die_if_kernel(char *str, struct pt_regs *regs) ...@@ -99,7 +99,7 @@ void die_if_kernel(char *str, struct pt_regs *regs)
" /_| \\__/ |_\\\n" " /_| \\__/ |_\\\n"
" \\__U_/\n"); " \\__U_/\n");
printk("%s(%d): %s [#%d]\n", current->comm, current->pid, str, ++die_counter); printk("%s(%d): %s [#%d]\n", current->comm, task_pid_nr(current), str, ++die_counter);
show_regs(regs); show_regs(regs);
add_taint(TAINT_DIE); add_taint(TAINT_DIE);
......
...@@ -2225,7 +2225,7 @@ void die_if_kernel(char *str, struct pt_regs *regs) ...@@ -2225,7 +2225,7 @@ void die_if_kernel(char *str, struct pt_regs *regs)
" /_| \\__/ |_\\\n" " /_| \\__/ |_\\\n"
" \\__U_/\n"); " \\__U_/\n");
printk("%s(%d): %s [#%d]\n", current->comm, current->pid, str, ++die_counter); printk("%s(%d): %s [#%d]\n", current->comm, task_pid_nr(current), str, ++die_counter);
notify_die(DIE_OOPS, str, regs, 0, 255, SIGSEGV); notify_die(DIE_OOPS, str, regs, 0, 255, SIGSEGV);
__asm__ __volatile__("flushw"); __asm__ __volatile__("flushw");
__show_regs(regs); __show_regs(regs);
......
...@@ -15,8 +15,8 @@ void __show_regs(struct pt_regs * regs) ...@@ -15,8 +15,8 @@ void __show_regs(struct pt_regs * regs)
{ {
printk("\n"); printk("\n");
print_modules(); print_modules();
printk("Pid: %d, comm: %.20s %s %s\n", printk("Pid: %d, comm: %.20s %s %s\n", task_pid_nr(current),
current->pid, current->comm, print_tainted(), init_utsname()->release); current->comm, print_tainted(), init_utsname()->release);
printk("RIP: %04lx:[<%016lx>] ", PT_REGS_CS(regs) & 0xffff, printk("RIP: %04lx:[<%016lx>] ", PT_REGS_CS(regs) & 0xffff,
PT_REGS_RIP(regs)); PT_REGS_RIP(regs));
printk("\nRSP: %016lx EFLAGS: %08lx\n", PT_REGS_RSP(regs), printk("\nRSP: %016lx EFLAGS: %08lx\n", PT_REGS_RSP(regs),
......
...@@ -301,7 +301,7 @@ void show_regs(struct pt_regs * regs) ...@@ -301,7 +301,7 @@ void show_regs(struct pt_regs * regs)
unsigned long d0, d1, d2, d3, d6, d7; unsigned long d0, d1, d2, d3, d6, d7;
printk("\n"); printk("\n");
printk("Pid: %d, comm: %20s\n", current->pid, current->comm); printk("Pid: %d, comm: %20s\n", task_pid_nr(current), current->comm);
printk("EIP: %04x:[<%08lx>] CPU: %d\n",0xffff & regs->xcs,regs->eip, smp_processor_id()); printk("EIP: %04x:[<%08lx>] CPU: %d\n",0xffff & regs->xcs,regs->eip, smp_processor_id());
print_symbol("EIP is at %s\n", regs->eip); print_symbol("EIP is at %s\n", regs->eip);
......
...@@ -200,8 +200,8 @@ asmlinkage int sys_sigreturn(unsigned long __unused) ...@@ -200,8 +200,8 @@ asmlinkage int sys_sigreturn(unsigned long __unused)
if (show_unhandled_signals && printk_ratelimit()) if (show_unhandled_signals && printk_ratelimit())
printk("%s%s[%d] bad frame in sigreturn frame:%p eip:%lx" printk("%s%s[%d] bad frame in sigreturn frame:%p eip:%lx"
" esp:%lx oeax:%lx\n", " esp:%lx oeax:%lx\n",
current->pid > 1 ? KERN_INFO : KERN_EMERG, task_pid_nr(current) > 1 ? KERN_INFO : KERN_EMERG,
current->comm, current->pid, frame, regs->eip, current->comm, task_pid_nr(current), frame, regs->eip,
regs->esp, regs->orig_eax); regs->esp, regs->orig_eax);
force_sig(SIGSEGV, current); force_sig(SIGSEGV, current);
......
...@@ -316,7 +316,7 @@ void show_registers(struct pt_regs *regs) ...@@ -316,7 +316,7 @@ void show_registers(struct pt_regs *regs)
printk(KERN_EMERG "ds: %04x es: %04x fs: %04x gs: %04x ss: %04x\n", printk(KERN_EMERG "ds: %04x es: %04x fs: %04x gs: %04x ss: %04x\n",
regs->xds & 0xffff, regs->xes & 0xffff, regs->xfs & 0xffff, gs, ss); regs->xds & 0xffff, regs->xes & 0xffff, regs->xfs & 0xffff, gs, ss);
printk(KERN_EMERG "Process %.*s (pid: %d, ti=%p task=%p task.ti=%p)", printk(KERN_EMERG "Process %.*s (pid: %d, ti=%p task=%p task.ti=%p)",
TASK_COMM_LEN, current->comm, current->pid, TASK_COMM_LEN, current->comm, task_pid_nr(current),
current_thread_info(), current, task_thread_info(current)); current_thread_info(), current, task_thread_info(current));
/* /*
* When in-kernel, we also print out the stack and code at the * When in-kernel, we also print out the stack and code at the
...@@ -622,7 +622,7 @@ fastcall void __kprobes do_general_protection(struct pt_regs * regs, ...@@ -622,7 +622,7 @@ fastcall void __kprobes do_general_protection(struct pt_regs * regs,
printk_ratelimit()) printk_ratelimit())
printk(KERN_INFO printk(KERN_INFO
"%s[%d] general protection eip:%lx esp:%lx error:%lx\n", "%s[%d] general protection eip:%lx esp:%lx error:%lx\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
regs->eip, regs->esp, error_code); regs->eip, regs->esp, error_code);
force_sig(SIGSEGV, current); force_sig(SIGSEGV, current);
......
...@@ -471,8 +471,8 @@ fastcall void __kprobes do_page_fault(struct pt_regs *regs, ...@@ -471,8 +471,8 @@ fastcall void __kprobes do_page_fault(struct pt_regs *regs,
printk_ratelimit()) { printk_ratelimit()) {
printk("%s%s[%d]: segfault at %08lx eip %08lx " printk("%s%s[%d]: segfault at %08lx eip %08lx "
"esp %08lx error %lx\n", "esp %08lx error %lx\n",
tsk->pid > 1 ? KERN_INFO : KERN_EMERG, task_pid_nr(tsk) > 1 ? KERN_INFO : KERN_EMERG,
tsk->comm, tsk->pid, address, regs->eip, tsk->comm, task_pid_nr(tsk), address, regs->eip,
regs->esp, error_code); regs->esp, error_code);
} }
tsk->thread.cr2 = address; tsk->thread.cr2 = address;
......
...@@ -176,7 +176,7 @@ void do_unhandled(struct pt_regs *regs, unsigned long exccause) ...@@ -176,7 +176,7 @@ void do_unhandled(struct pt_regs *regs, unsigned long exccause)
printk("Caught unhandled exception in '%s' " printk("Caught unhandled exception in '%s' "
"(pid = %d, pc = %#010lx) - should not happen\n" "(pid = %d, pc = %#010lx) - should not happen\n"
"\tEXCCAUSE is %ld\n", "\tEXCCAUSE is %ld\n",
current->comm, current->pid, regs->pc, exccause); current->comm, task_pid_nr(current), regs->pc, exccause);
force_sig(SIGILL, current); force_sig(SIGILL, current);
} }
...@@ -228,7 +228,7 @@ do_illegal_instruction(struct pt_regs *regs) ...@@ -228,7 +228,7 @@ do_illegal_instruction(struct pt_regs *regs)
/* If in user mode, send SIGILL signal to current process. */ /* If in user mode, send SIGILL signal to current process. */
printk("Illegal Instruction in '%s' (pid = %d, pc = %#010lx)\n", printk("Illegal Instruction in '%s' (pid = %d, pc = %#010lx)\n",
current->comm, current->pid, regs->pc); current->comm, task_pid_nr(current), regs->pc);
force_sig(SIGILL, current); force_sig(SIGILL, current);
} }
...@@ -254,7 +254,7 @@ do_unaligned_user (struct pt_regs *regs) ...@@ -254,7 +254,7 @@ do_unaligned_user (struct pt_regs *regs)
current->thread.error_code = -3; current->thread.error_code = -3;
printk("Unaligned memory access to %08lx in '%s' " printk("Unaligned memory access to %08lx in '%s' "
"(pid = %d, pc = %#010lx)\n", "(pid = %d, pc = %#010lx)\n",
regs->excvaddr, current->comm, current->pid, regs->pc); regs->excvaddr, current->comm, task_pid_nr(current), regs->pc);
info.si_signo = SIGBUS; info.si_signo = SIGBUS;
info.si_errno = 0; info.si_errno = 0;
info.si_code = BUS_ADRALN; info.si_code = BUS_ADRALN;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册