Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <unistd.h> | 5 #include <unistd.h> |
| 6 | 6 |
| 7 #include "base/file_util.h" | 7 #include "base/file_util.h" |
| 8 #include "base/string_util.h" | 8 #include "base/string_util.h" |
| 9 #include "chromeos/syslog_logging.h" | 9 #include "chromeos/syslog_logging.h" |
| 10 #include "chromeos/test_helpers.h" | 10 #include "chromeos/test_helpers.h" |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 43 } | 43 } |
| 44 protected: | 44 protected: |
| 45 void WriteStringToFile(const FilePath &file_path, | 45 void WriteStringToFile(const FilePath &file_path, |
| 46 const char *data) { | 46 const char *data) { |
| 47 ASSERT_EQ(strlen(data), | 47 ASSERT_EQ(strlen(data), |
| 48 file_util::WriteFile(file_path, data, strlen(data))); | 48 file_util::WriteFile(file_path, data, strlen(data))); |
| 49 } | 49 } |
| 50 | 50 |
| 51 void SetUpSuccessfulCollect(); | 51 void SetUpSuccessfulCollect(); |
| 52 void CheckPreservedDumpClear(); | 52 void CheckPreservedDumpClear(); |
| 53 void ComputeKernelStackSignatureCommon(); | |
| 53 | 54 |
| 54 KernelCollector collector_; | 55 KernelCollector collector_; |
| 55 FilePath test_kcrash_; | 56 FilePath test_kcrash_; |
| 56 }; | 57 }; |
| 57 | 58 |
| 59 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureBase) { | |
| 60 // Make sure the normal build architecture is detected | |
| 61 EXPECT_TRUE(collector_.GetArch() != KernelCollector::archUnknown); | |
| 62 } | |
| 63 | |
| 58 TEST_F(KernelCollectorTest, LoadPreservedDump) { | 64 TEST_F(KernelCollectorTest, LoadPreservedDump) { |
| 59 ASSERT_FALSE(file_util::PathExists(test_kcrash_)); | 65 ASSERT_FALSE(file_util::PathExists(test_kcrash_)); |
| 60 std::string dump; | 66 std::string dump; |
| 61 ASSERT_FALSE(collector_.LoadPreservedDump(&dump)); | 67 ASSERT_FALSE(collector_.LoadPreservedDump(&dump)); |
| 62 WriteStringToFile(test_kcrash_, ""); | 68 WriteStringToFile(test_kcrash_, ""); |
| 63 ASSERT_TRUE(collector_.LoadPreservedDump(&dump)); | 69 ASSERT_TRUE(collector_.LoadPreservedDump(&dump)); |
| 64 ASSERT_EQ("", dump); | 70 ASSERT_EQ("", dump); |
| 65 WriteStringToFile(test_kcrash_, "something"); | 71 WriteStringToFile(test_kcrash_, "something"); |
| 66 ASSERT_TRUE(collector_.LoadPreservedDump(&dump)); | 72 ASSERT_TRUE(collector_.LoadPreservedDump(&dump)); |
| 67 ASSERT_EQ("something", dump); | 73 ASSERT_EQ("something", dump); |
| (...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 155 filename = filename.substr(0, end_pos); | 161 filename = filename.substr(0, end_pos); |
| 156 ASSERT_EQ(0, filename.find(kTestCrashDirectory)); | 162 ASSERT_EQ(0, filename.find(kTestCrashDirectory)); |
| 157 ASSERT_TRUE(file_util::PathExists(FilePath(filename))); | 163 ASSERT_TRUE(file_util::PathExists(FilePath(filename))); |
| 158 std::string contents; | 164 std::string contents; |
| 159 ASSERT_TRUE(file_util::ReadFileToString(FilePath(filename), &contents)); | 165 ASSERT_TRUE(file_util::ReadFileToString(FilePath(filename), &contents)); |
| 160 ASSERT_EQ("something", contents); | 166 ASSERT_EQ("something", contents); |
| 161 | 167 |
| 162 CheckPreservedDumpClear(); | 168 CheckPreservedDumpClear(); |
| 163 } | 169 } |
| 164 | 170 |
| 165 TEST_F(KernelCollectorTest, ComputeKernelStackSignature) { | 171 // Perform tests which are common across architectures |
| 172 void KernelCollectorTest::ComputeKernelStackSignatureCommon() { | |
| 173 std::string signature; | |
| 174 | |
| 175 const char kStackButNoPC[] = | |
| 176 "<4>[ 6066.829029] [<790340af>] __do_softirq+0xa6/0x143\n"; | |
| 177 EXPECT_TRUE( | |
| 178 collector_.ComputeKernelStackSignature(kStackButNoPC, &signature, false)); | |
| 179 EXPECT_EQ("kernel--83615F0A", signature); | |
| 180 | |
| 181 const char kMissingEverything[] = | |
| 182 "<4>[ 6066.829029] [<790340af>] ? __do_softirq+0xa6/0x143\n"; | |
| 183 EXPECT_FALSE( | |
| 184 collector_.ComputeKernelStackSignature(kMissingEverything, | |
| 185 &signature, | |
| 186 false)); | |
| 187 | |
| 188 // Long message. | |
| 189 const char kTruncatedMessage[] = | |
| 190 "<0>[ 87.485611] Kernel panic - not syncing: 01234567890123456789" | |
| 191 "01234567890123456789X\n"; | |
| 192 EXPECT_TRUE( | |
| 193 collector_.ComputeKernelStackSignature(kTruncatedMessage, | |
| 194 &signature, | |
| 195 false)); | |
| 196 EXPECT_EQ("kernel-0123456789012345678901234567890123456789-00000000", | |
| 197 signature); | |
| 198 } | |
| 199 | |
| 200 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureARM) { | |
| 201 const char kBugToPanic[] = | |
| 202 "<5>[ 123.412524] Modules linked in:\n" | |
| 203 "<5>[ 123.412534] CPU: 0 Tainted: G W " | |
| 204 "(2.6.37-01030-g51cee64 #153)\n" | |
| 205 "<5>[ 123.412552] PC is at write_breakme+0xd0/0x1b4\n" | |
| 206 "<5>[ 123.412560] LR is at write_breakme+0xc8/0x1b4\n" | |
| 207 "<5>[ 123.412569] pc : [<c0058220>] lr : [<c005821c>] " | |
| 208 "psr: 60000013\n" | |
| 209 "<5>[ 123.412574] sp : f4e0ded8 ip : c04d104c fp : 000e45e0\n" | |
| 210 "<5>[ 123.412581] r10: 400ff000 r9 : f4e0c000 r8 : 00000004\n" | |
| 211 "<5>[ 123.412589] r7 : f4e0df80 r6 : f4820c80 r5 : 00000004 " | |
| 212 "r4 : f4e0dee8\n" | |
| 213 "<5>[ 123.412598] r3 : 00000000 r2 : f4e0decc r1 : c05f88a9 " | |
| 214 "r0 : 00000039\n" | |
| 215 "<5>[ 123.412608] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA " | |
| 216 "ARM Segment user\n" | |
| 217 "<5>[ 123.412617] Control: 10c53c7d Table: 34dcc04a DAC: 00000015\n" | |
| 218 "<0>[ 123.412626] Process bash (pid: 1014, stack limit = 0xf4e0c2f8)\n" | |
| 219 "<0>[ 123.412634] Stack: (0xf4e0ded8 to 0xf4e0e000)\n" | |
| 220 "<0>[ 123.412641] dec0: " | |
| 221 " f4e0dee8 c0183678\n" | |
| 222 "<0>[ 123.412654] dee0: 00000000 00000000 00677562 0000081f c06a6a78 " | |
| 223 "400ff000 f4e0dfb0 00000000\n" | |
| 224 "<0>[ 123.412666] df00: bec7ab44 000b1719 bec7ab0c c004f498 bec7a314 " | |
| 225 "c024acc8 00000001 c018359c\n" | |
| 226 "<0>[ 123.412679] df20: f4e0df34 c04d10fc f5803c80 271beb39 000e45e0 " | |
| 227 "f5803c80 c018359c c017bfe0\n" | |
| 228 "<0>[ 123.412691] df40: 00000004 f4820c80 400ff000 f4e0df80 00000004 " | |
| 229 "f4e0c000 00000000 c01383e4\n" | |
| 230 "<0>[ 123.412703] df60: f4820c80 400ff000 f4820c80 400ff000 00000000 " | |
| 231 "00000000 00000004 c0138578\n" | |
| 232 "<0>[ 123.412715] df80: 00000000 00000000 00000004 00000000 00000004 " | |
| 233 "402f95d0 00000004 00000004\n" | |
| 234 "<0>[ 123.412727] dfa0: c0054984 c00547c0 00000004 402f95d0 00000001 " | |
| 235 "400ff000 00000004 00000000\n" | |
| 236 "<0>[ 123.412739] dfc0: 00000004 402f95d0 00000004 00000004 400ff000 " | |
| 237 "000c194c bec7ab58 000e45e0\n" | |
| 238 "<0>[ 123.412751] dfe0: 00000000 bec7aad8 40232520 40284e9c 60000010 " | |
| 239 "00000001 00000000 00000000\n" | |
| 240 "<5>[ 39.496577] Backtrace:\n" | |
| 241 "<5>[ 123.412782] [<c0058220>] (__bug+0x20/0x2c) from [<c0183678>] " | |
| 242 "(write_breakme+0xdc/0x1bc)\n" | |
| 243 "<5>[ 123.412798] [<c0183678>] (write_breakme+0xdc/0x1bc) from " | |
| 244 "[<c017bfe0>] (proc_reg_write+0x88/0x9c)\n"; | |
| 245 std::string signature; | |
| 246 | |
| 247 collector_.SetArch(KernelCollector::archArm); | |
| 248 EXPECT_TRUE( | |
| 249 collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false)); | |
| 250 EXPECT_EQ("kernel-write_breakme-97D3E92F", signature); | |
| 251 | |
| 252 const char kPCButNoStack[] = | |
|
kmixter1
2011/04/05 23:29:11
So kPCButNoStack/kPCLineTooOld/kExamplePanicOnly a
sjg
2011/04/06 02:02:57
They look different to me?
| |
| 253 "<5>[ 123.412552] PC is at write_breakme+0xd0/0x1b4"; | |
| 254 EXPECT_TRUE( | |
| 255 collector_.ComputeKernelStackSignature(kPCButNoStack, &signature, false)); | |
| 256 EXPECT_EQ("kernel-write_breakme-00000000", signature); | |
| 257 | |
| 258 const char kPCLineTooOld[] = | |
| 259 "<4>[ 123.402137] [<790970c6>] ignored_function+0x67f/0x96d\n" | |
| 260 "<5>[ 123.412552] PC is at write_breakme+0xd0/0x1b4\n" | |
| 261 "<4>[ 180.502026] Backtrace:\n" | |
| 262 "<0>[ 180.502026] Kernel panic - not syncing: Fatal exception\n" | |
| 263 "<4>[ 180.502806] [<79379aba>] printk+0x14/0x1a\n"; | |
| 264 | |
| 265 EXPECT_TRUE( | |
| 266 collector_.ComputeKernelStackSignature(kPCLineTooOld, &signature, false)); | |
| 267 EXPECT_EQ("kernel-Fatal exception-ED4C84FE", signature); | |
| 268 | |
| 269 // Panic without EIP line. | |
|
kmixter1
2011/04/05 23:29:11
The EIP typo will go away if you combine these. :)
sjg
2011/04/06 02:02:57
Ooops, saw that a while back and forgot to fix...
| |
| 270 const char kExamplePanicOnly[] = | |
| 271 "<0>[ 39.543808] Kernel panic - not syncing: Testing panic\n" | |
| 272 "<5>[ 39.543815] Backtrace:\n" | |
| 273 "<5>[ 39.543840] [<c005ca30>] (unwind_backtrace+0x0/0xf8) from " | |
| 274 "[<c04caf38>] (panic+0x68/0x190)\n" | |
| 275 "<5>[ 39.543856] [<c04caf38>] (panic+0x68/0x190) from [<c005a93c>] " | |
| 276 "(die+0x2bc/0x330)\n" | |
| 277 "<5>[ 39.543871] [<c005a93c>] (die+0x2bc/0x330) from [<c00511e0>] " | |
| 278 "(do_undefinstr+0x120/0x138)\n" | |
| 279 "<5>[ 39.543892] [<c00511e0>] (do_undefinstr+0x120/0x138) from " | |
| 280 "[<c04ced84>] (__und_svc+0x44/0x60)\n"; | |
| 281 EXPECT_TRUE( | |
| 282 collector_.ComputeKernelStackSignature(kExamplePanicOnly, | |
| 283 &signature, | |
| 284 false)); | |
| 285 EXPECT_EQ("kernel-Testing panic-735A6297", signature); | |
| 286 ComputeKernelStackSignatureCommon(); | |
| 287 } | |
| 288 | |
| 289 | |
| 290 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureX86) { | |
| 166 const char kBugToPanic[] = | 291 const char kBugToPanic[] = |
| 167 "<4>[ 6066.829029] [<79039d16>] ? run_timer_softirq+0x165/0x1e6\n" | 292 "<4>[ 6066.829029] [<79039d16>] ? run_timer_softirq+0x165/0x1e6\n" |
| 168 "<4>[ 6066.829029] [<790340af>] ignore_old_stack+0xa6/0x143\n" | 293 "<4>[ 6066.829029] [<790340af>] ignore_old_stack+0xa6/0x143\n" |
| 169 "<0>[ 6066.829029] EIP: [<b82d7c15>] ieee80211_stop_tx_ba_session+" | 294 "<0>[ 6066.829029] EIP: [<b82d7c15>] ieee80211_stop_tx_ba_session+" |
| 170 "0xa3/0xb5 [mac80211] SS:ESP 0068:7951febc\n" | 295 "0xa3/0xb5 [mac80211] SS:ESP 0068:7951febc\n" |
| 171 "<0>[ 6066.829029] CR2: 00000000323038a7\n" | 296 "<0>[ 6066.829029] CR2: 00000000323038a7\n" |
| 172 "<4>[ 6066.845422] ---[ end trace 12b058bb46c43500 ]---\n" | 297 "<4>[ 6066.845422] ---[ end trace 12b058bb46c43500 ]---\n" |
| 173 "<0>[ 6066.845747] Kernel panic - not syncing: Fatal exception " | 298 "<0>[ 6066.845747] Kernel panic - not syncing: Fatal exception " |
| 174 "in interrupt\n" | 299 "in interrupt\n" |
| 175 "<0>[ 6066.846902] Call Trace:\n" | 300 "<0>[ 6066.846902] Call Trace:\n" |
| 176 "<4>[ 6066.846902] [<7937a07b>] ? printk+0x14/0x19\n" | 301 "<4>[ 6066.846902] [<7937a07b>] ? printk+0x14/0x19\n" |
| 177 "<4>[ 6066.949779] [<79379fc1>] panic+0x3e/0xe4\n" | 302 "<4>[ 6066.949779] [<79379fc1>] panic+0x3e/0xe4\n" |
| 178 "<4>[ 6066.949971] [<7937c5c5>] oops_end+0x73/0x81\n" | 303 "<4>[ 6066.949971] [<7937c5c5>] oops_end+0x73/0x81\n" |
| 179 "<4>[ 6066.950208] [<7901b260>] no_context+0x10d/0x117\n"; | 304 "<4>[ 6066.950208] [<7901b260>] no_context+0x10d/0x117\n"; |
| 180 std::string signature; | 305 std::string signature; |
| 306 | |
| 307 collector_.SetArch(KernelCollector::archX86); | |
| 181 EXPECT_TRUE( | 308 EXPECT_TRUE( |
| 182 collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false)); | 309 collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false)); |
| 183 EXPECT_EQ("kernel-ieee80211_stop_tx_ba_session-DE253569", signature); | 310 EXPECT_EQ("kernel-ieee80211_stop_tx_ba_session-DE253569", signature); |
| 184 | 311 |
| 185 const char kPCButNoStack[] = | 312 const char kPCButNoStack[] = |
| 186 "<0>[ 6066.829029] EIP: [<b82d7c15>] ieee80211_stop_tx_ba_session+"; | 313 "<0>[ 6066.829029] EIP: [<b82d7c15>] ieee80211_stop_tx_ba_session+"; |
| 187 EXPECT_TRUE( | 314 EXPECT_TRUE( |
| 188 collector_.ComputeKernelStackSignature(kPCButNoStack, &signature, false)); | 315 collector_.ComputeKernelStackSignature(kPCButNoStack, &signature, false)); |
| 189 EXPECT_EQ("kernel-ieee80211_stop_tx_ba_session-00000000", signature); | 316 EXPECT_EQ("kernel-ieee80211_stop_tx_ba_session-00000000", signature); |
| 190 | 317 |
| 191 const char kStackButNoPC[] = | |
| 192 "<4>[ 6066.829029] [<790340af>] __do_softirq+0xa6/0x143\n"; | |
| 193 EXPECT_TRUE( | |
| 194 collector_.ComputeKernelStackSignature(kStackButNoPC, &signature, false)); | |
| 195 EXPECT_EQ("kernel--83615F0A", signature); | |
| 196 | |
| 197 const char kMissingEverything[] = | |
| 198 "<4>[ 6066.829029] [<790340af>] ? __do_softirq+0xa6/0x143\n"; | |
| 199 EXPECT_FALSE( | |
| 200 collector_.ComputeKernelStackSignature(kMissingEverything, | |
| 201 &signature, | |
| 202 false)); | |
| 203 | |
| 204 const char kBreakmeBug[] = | 318 const char kBreakmeBug[] = |
| 205 "<4>[ 180.492137] [<790970c6>] ? handle_mm_fault+0x67f/0x96d\n" | 319 "<4>[ 180.492137] [<790970c6>] ? handle_mm_fault+0x67f/0x96d\n" |
| 206 "<4>[ 180.492137] [<790dcdfe>] ? proc_reg_write+0x5f/0x73\n" | 320 "<4>[ 180.492137] [<790dcdfe>] ? proc_reg_write+0x5f/0x73\n" |
| 207 "<4>[ 180.492137] [<790e2224>] ? write_breakme+0x0/0x108\n" | 321 "<4>[ 180.492137] [<790e2224>] ? write_breakme+0x0/0x108\n" |
| 208 "<4>[ 180.492137] [<790dcd9f>] ? proc_reg_write+0x0/0x73\n" | 322 "<4>[ 180.492137] [<790dcd9f>] ? proc_reg_write+0x0/0x73\n" |
| 209 "<4>[ 180.492137] [<790ac0aa>] vfs_write+0x85/0xe4\n" | 323 "<4>[ 180.492137] [<790ac0aa>] vfs_write+0x85/0xe4\n" |
| 210 "<0>[ 180.492137] Code: c6 44 05 b2 00 89 d8 e8 0c ef 09 00 85 c0 75 " | 324 "<0>[ 180.492137] Code: c6 44 05 b2 00 89 d8 e8 0c ef 09 00 85 c0 75 " |
| 211 "0b c7 00 00 00 00 00 e9 8e 00 00 00 ba e6 75 4b 79 89 d8 e8 f1 ee 09 " | 325 "0b c7 00 00 00 00 00 e9 8e 00 00 00 ba e6 75 4b 79 89 d8 e8 f1 ee 09 " |
| 212 "00 85 c0 75 04 <0f> 0b eb fe ba 58 47 49 79 89 d8 e8 dd ee 09 00 85 " | 326 "00 85 c0 75 04 <0f> 0b eb fe ba 58 47 49 79 89 d8 e8 dd ee 09 00 85 " |
| 213 "c0 75 0a 68\n" | 327 "c0 75 0a 68\n" |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 248 "C 2.6.32.23+drm33.10 #1\n" | 362 "C 2.6.32.23+drm33.10 #1\n" |
| 249 "<4>[ 87.485639] Call Trace:\n" | 363 "<4>[ 87.485639] Call Trace:\n" |
| 250 "<4>[ 87.485660] [<8133f71d>] ? printk+0x14/0x17\n" | 364 "<4>[ 87.485660] [<8133f71d>] ? printk+0x14/0x17\n" |
| 251 "<4>[ 87.485674] [<8133f663>] panic+0x3e/0xe4\n" | 365 "<4>[ 87.485674] [<8133f663>] panic+0x3e/0xe4\n" |
| 252 "<4>[ 87.485689] [<810d062e>] write_breakme+0xaa/0x124\n"; | 366 "<4>[ 87.485689] [<810d062e>] write_breakme+0xaa/0x124\n"; |
| 253 EXPECT_TRUE( | 367 EXPECT_TRUE( |
| 254 collector_.ComputeKernelStackSignature(kExamplePanicOnly, | 368 collector_.ComputeKernelStackSignature(kExamplePanicOnly, |
| 255 &signature, | 369 &signature, |
| 256 false)); | 370 false)); |
| 257 EXPECT_EQ("kernel-Testing panic-E0FC3552", signature); | 371 EXPECT_EQ("kernel-Testing panic-E0FC3552", signature); |
| 258 | 372 ComputeKernelStackSignatureCommon(); |
| 259 // Long message. | |
| 260 const char kTruncatedMessage[] = | |
| 261 "<0>[ 87.485611] Kernel panic - not syncing: 01234567890123456789" | |
| 262 "01234567890123456789X\n"; | |
| 263 EXPECT_TRUE( | |
| 264 collector_.ComputeKernelStackSignature(kTruncatedMessage, | |
| 265 &signature, | |
| 266 false)); | |
| 267 EXPECT_EQ("kernel-0123456789012345678901234567890123456789-00000000", | |
| 268 signature); | |
| 269 | |
| 270 } | 373 } |
| 271 | 374 |
| 272 int main(int argc, char **argv) { | 375 int main(int argc, char **argv) { |
| 273 SetUpTests(&argc, argv, false); | 376 SetUpTests(&argc, argv, false); |
| 274 return RUN_ALL_TESTS(); | 377 return RUN_ALL_TESTS(); |
| 275 } | 378 } |
| OLD | NEW |