Commit 19c5870c authored by Alexey Dobriyan's avatar Alexey Dobriyan Committed by Linus Torvalds

Use helpers to obtain task pid in printks (arch code)

One of the easiest things to isolate is the pid printed in kernel log.
There was a patch, that made this for arch-independent code, this one makes
so for arch/xxx files.

It took some time to cross-compile it, but hopefully these are all the
printks in arch code.
Signed-off-by: default avatarAlexey Dobriyan <adobriyan@openvz.org>
Signed-off-by: default avatarPavel Emelyanov <xemul@openvz.org>
Cc: <linux-arch@vger.kernel.org>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent ba25f9dc
...@@ -69,7 +69,7 @@ __down_failed(struct semaphore *sem) ...@@ -69,7 +69,7 @@ __down_failed(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down failed(%p)\n", printk("%s(%d): down failed(%p)\n",
tsk->comm, tsk->pid, sem); tsk->comm, task_pid_nr(tsk), sem);
#endif #endif
tsk->state = TASK_UNINTERRUPTIBLE; tsk->state = TASK_UNINTERRUPTIBLE;
...@@ -98,7 +98,7 @@ __down_failed(struct semaphore *sem) ...@@ -98,7 +98,7 @@ __down_failed(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down acquired(%p)\n", printk("%s(%d): down acquired(%p)\n",
tsk->comm, tsk->pid, sem); tsk->comm, task_pid_nr(tsk), sem);
#endif #endif
} }
...@@ -111,7 +111,7 @@ __down_failed_interruptible(struct semaphore *sem) ...@@ -111,7 +111,7 @@ __down_failed_interruptible(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down failed(%p)\n", printk("%s(%d): down failed(%p)\n",
tsk->comm, tsk->pid, sem); tsk->comm, task_pid_nr(tsk), sem);
#endif #endif
tsk->state = TASK_INTERRUPTIBLE; tsk->state = TASK_INTERRUPTIBLE;
...@@ -139,7 +139,7 @@ __down_failed_interruptible(struct semaphore *sem) ...@@ -139,7 +139,7 @@ __down_failed_interruptible(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down %s(%p)\n", printk("%s(%d): down %s(%p)\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
(ret < 0 ? "interrupted" : "acquired"), sem); (ret < 0 ? "interrupted" : "acquired"), sem);
#endif #endif
return ret; return ret;
...@@ -168,7 +168,7 @@ down(struct semaphore *sem) ...@@ -168,7 +168,7 @@ down(struct semaphore *sem)
#endif #endif
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down(%p) <count=%d> from %p\n", printk("%s(%d): down(%p) <count=%d> from %p\n",
current->comm, current->pid, sem, current->comm, task_pid_nr(current), sem,
atomic_read(&sem->count), __builtin_return_address(0)); atomic_read(&sem->count), __builtin_return_address(0));
#endif #endif
__down(sem); __down(sem);
...@@ -182,7 +182,7 @@ down_interruptible(struct semaphore *sem) ...@@ -182,7 +182,7 @@ down_interruptible(struct semaphore *sem)
#endif #endif
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down(%p) <count=%d> from %p\n", printk("%s(%d): down(%p) <count=%d> from %p\n",
current->comm, current->pid, sem, current->comm, task_pid_nr(current), sem,
atomic_read(&sem->count), __builtin_return_address(0)); atomic_read(&sem->count), __builtin_return_address(0));
#endif #endif
return __down_interruptible(sem); return __down_interruptible(sem);
...@@ -201,7 +201,7 @@ down_trylock(struct semaphore *sem) ...@@ -201,7 +201,7 @@ down_trylock(struct semaphore *sem)
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): down_trylock %s from %p\n", printk("%s(%d): down_trylock %s from %p\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
ret ? "failed" : "acquired", ret ? "failed" : "acquired",
__builtin_return_address(0)); __builtin_return_address(0));
#endif #endif
...@@ -217,7 +217,7 @@ up(struct semaphore *sem) ...@@ -217,7 +217,7 @@ up(struct semaphore *sem)
#endif #endif
#ifdef CONFIG_DEBUG_SEMAPHORE #ifdef CONFIG_DEBUG_SEMAPHORE
printk("%s(%d): up(%p) <count=%d> from %p\n", printk("%s(%d): up(%p) <count=%d> from %p\n",
current->comm, current->pid, sem, current->comm, task_pid_nr(current), sem,
atomic_read(&sem->count), __builtin_return_address(0)); atomic_read(&sem->count), __builtin_return_address(0));
#endif #endif
__up(sem); __up(sem);
......
...@@ -182,7 +182,7 @@ die_if_kernel(char * str, struct pt_regs *regs, long err, unsigned long *r9_15) ...@@ -182,7 +182,7 @@ die_if_kernel(char * str, struct pt_regs *regs, long err, unsigned long *r9_15)
#ifdef CONFIG_SMP #ifdef CONFIG_SMP
printk("CPU %d ", hard_smp_processor_id()); printk("CPU %d ", hard_smp_processor_id());
#endif #endif
printk("%s(%d): %s %ld\n", current->comm, current->pid, str, err); printk("%s(%d): %s %ld\n", current->comm, task_pid_nr(current), str, err);
dik_show_regs(regs, r9_15); dik_show_regs(regs, r9_15);
add_taint(TAINT_DIE); add_taint(TAINT_DIE);
dik_show_trace((unsigned long *)(regs+1)); dik_show_trace((unsigned long *)(regs+1));
...@@ -646,7 +646,7 @@ do_entUna(void * va, unsigned long opcode, unsigned long reg, ...@@ -646,7 +646,7 @@ do_entUna(void * va, unsigned long opcode, unsigned long reg,
lock_kernel(); lock_kernel();
printk("%s(%d): unhandled unaligned exception\n", printk("%s(%d): unhandled unaligned exception\n",
current->comm, current->pid); current->comm, task_pid_nr(current));
printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx\n", printk("pc = [<%016lx>] ra = [<%016lx>] ps = %04lx\n",
pc, una_reg(26), regs->ps); pc, una_reg(26), regs->ps);
...@@ -786,7 +786,7 @@ do_entUnaUser(void __user * va, unsigned long opcode, ...@@ -786,7 +786,7 @@ do_entUnaUser(void __user * va, unsigned long opcode,
} }
if (++cnt < 5) { if (++cnt < 5) {
printk("%s(%d): unaligned trap at %016lx: %p %lx %ld\n", printk("%s(%d): unaligned trap at %016lx: %p %lx %ld\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
regs->pc - 4, va, opcode, reg); regs->pc - 4, va, opcode, reg);
} }
last_time = jiffies; last_time = jiffies;
......
...@@ -194,7 +194,7 @@ do_page_fault(unsigned long address, unsigned long mmcsr, ...@@ -194,7 +194,7 @@ do_page_fault(unsigned long address, unsigned long mmcsr,
goto survive; goto survive;
} }
printk(KERN_ALERT "VM: killing process %s(%d)\n", printk(KERN_ALERT "VM: killing process %s(%d)\n",
current->comm, current->pid); current->comm, task_pid_nr(current));
if (!user_mode(regs)) if (!user_mode(regs))
goto no_context; goto no_context;
do_group_exit(SIGKILL); do_group_exit(SIGKILL);
......
...@@ -265,7 +265,7 @@ void __show_regs(struct pt_regs *regs) ...@@ -265,7 +265,7 @@ void __show_regs(struct pt_regs *regs)
void show_regs(struct pt_regs * regs) void show_regs(struct pt_regs * regs)
{ {
printk("\n"); printk("\n");
printk("Pid: %d, comm: %20s\n", current->pid, current->comm); printk("Pid: %d, comm: %20s\n", task_pid_nr(current), current->comm);
__show_regs(regs); __show_regs(regs);
__backtrace(); __backtrace();
} }
......
...@@ -382,16 +382,16 @@ static void clear_breakpoint(struct task_struct *task, struct debug_entry *bp) ...@@ -382,16 +382,16 @@ static void clear_breakpoint(struct task_struct *task, struct debug_entry *bp)
if (ret != 2 || old_insn.thumb != BREAKINST_THUMB) if (ret != 2 || old_insn.thumb != BREAKINST_THUMB)
printk(KERN_ERR "%s:%d: corrupted Thumb breakpoint at " printk(KERN_ERR "%s:%d: corrupted Thumb breakpoint at "
"0x%08lx (0x%04x)\n", task->comm, task->pid, "0x%08lx (0x%04x)\n", task->comm,
addr, old_insn.thumb); task_pid_nr(task), addr, old_insn.thumb);
} else { } else {
ret = swap_insn(task, addr & ~3, &old_insn.arm, ret = swap_insn(task, addr & ~3, &old_insn.arm,
&bp->insn.arm, 4); &bp->insn.arm, 4);
if (ret != 4 || old_insn.arm != BREAKINST_ARM) if (ret != 4 || old_insn.arm != BREAKINST_ARM)
printk(KERN_ERR "%s:%d: corrupted ARM breakpoint at " printk(KERN_ERR "%s:%d: corrupted ARM breakpoint at "
"0x%08lx (0x%08x)\n", task->comm, task->pid, "0x%08lx (0x%08x)\n", task->comm,
addr, old_insn.arm); task_pid_nr(task), addr, old_insn.arm);
} }
} }
......
...@@ -223,7 +223,7 @@ static void __die(const char *str, int err, struct thread_info *thread, struct p ...@@ -223,7 +223,7 @@ static void __die(const char *str, int err, struct thread_info *thread, struct p
print_modules(); print_modules();
__show_regs(regs); __show_regs(regs);
printk("Process %s (pid: %d, stack limit = 0x%p)\n", printk("Process %s (pid: %d, stack limit = 0x%p)\n",
tsk->comm, tsk->pid, thread + 1); tsk->comm, task_pid_nr(tsk), thread + 1);
if (!user_mode(regs) || in_interrupt()) { if (!user_mode(regs) || in_interrupt()) {
dump_mem("Stack: ", regs->ARM_sp, dump_mem("Stack: ", regs->ARM_sp,
...@@ -337,7 +337,7 @@ asmlinkage void __exception do_undefinstr(struct pt_regs *regs) ...@@ -337,7 +337,7 @@ asmlinkage void __exception do_undefinstr(struct pt_regs *regs)
#ifdef CONFIG_DEBUG_USER #ifdef CONFIG_DEBUG_USER
if (user_debug & UDBG_UNDEFINED) { if (user_debug & UDBG_UNDEFINED) {
printk(KERN_INFO "%s (%d): undefined instruction: pc=%p\n", printk(KERN_INFO "%s (%d): undefined instruction: pc=%p\n",
current->comm, current->pid, pc); current->comm, task_pid_nr(current), pc);
dump_instr(regs); dump_instr(regs);
} }
#endif #endif
...@@ -388,7 +388,7 @@ static int bad_syscall(int n, struct pt_regs *regs) ...@@ -388,7 +388,7 @@ static int bad_syscall(int n, struct pt_regs *regs)
#ifdef CONFIG_DEBUG_USER #ifdef CONFIG_DEBUG_USER
if (user_debug & UDBG_SYSCALL) { if (user_debug & UDBG_SYSCALL) {
printk(KERN_ERR "[%d] %s: obsolete system call %08x.\n", printk(KERN_ERR "[%d] %s: obsolete system call %08x.\n",
current->pid, current->comm, n); task_pid_nr(current), current->comm, n);
dump_instr(regs); dump_instr(regs);
} }
#endif #endif
...@@ -565,7 +565,7 @@ asmlinkage int arm_syscall(int no, struct pt_regs *regs) ...@@ -565,7 +565,7 @@ asmlinkage int arm_syscall(int no, struct pt_regs *regs)
*/ */
if (user_debug & UDBG_SYSCALL) { if (user_debug & UDBG_SYSCALL) {
printk("[%d] %s: arm syscall %d\n", printk("[%d] %s: arm syscall %d\n",
current->pid, current->comm, no); task_pid_nr(current), current->comm, no);
dump_instr(regs); dump_instr(regs);
if (user_mode(regs)) { if (user_mode(regs)) {
__show_regs(regs); __show_regs(regs);
...@@ -642,7 +642,7 @@ baddataabort(int code, unsigned long instr, struct pt_regs *regs) ...@@ -642,7 +642,7 @@ baddataabort(int code, unsigned long instr, struct pt_regs *regs)
#ifdef CONFIG_DEBUG_USER #ifdef CONFIG_DEBUG_USER
if (user_debug & UDBG_BADABORT) { if (user_debug & UDBG_BADABORT) {
printk(KERN_ERR "[%d] %s: bad data abort: code %d instr 0x%08lx\n", printk(KERN_ERR "[%d] %s: bad data abort: code %d instr 0x%08lx\n",
current->pid, current->comm, code, instr); task_pid_nr(current), current->comm, code, instr);
dump_instr(regs); dump_instr(regs);
show_pte(current->mm, addr); show_pte(current->mm, addr);
} }
......
...@@ -757,7 +757,7 @@ do_alignment(unsigned long addr, unsigned int fsr, struct pt_regs *regs) ...@@ -757,7 +757,7 @@ do_alignment(unsigned long addr, unsigned int fsr, struct pt_regs *regs)
if (ai_usermode & 1) if (ai_usermode & 1)
printk("Alignment trap: %s (%d) PC=0x%08lx Instr=0x%0*lx " printk("Alignment trap: %s (%d) PC=0x%08lx Instr=0x%0*lx "
"Address=0x%08lx FSR 0x%03x\n", current->comm, "Address=0x%08lx FSR 0x%03x\n", current->comm,
current->pid, instrptr, task_pid_nr(current), instrptr,
thumb_mode(regs) ? 4 : 8, thumb_mode(regs) ? 4 : 8,
thumb_mode(regs) ? tinstr : instr, thumb_mode(regs) ? tinstr : instr,
addr, fsr); addr, fsr);
......
...@@ -773,7 +773,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro ...@@ -773,7 +773,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro
if (flags & MAP_SHARED) if (flags & MAP_SHARED)
printk(KERN_INFO printk(KERN_INFO
"%s(%d): emulate_mmap() can't share head (addr=0x%lx)\n", "%s(%d): emulate_mmap() can't share head (addr=0x%lx)\n",
current->comm, current->pid, start); current->comm, task_pid_nr(current), start);
ret = mmap_subpage(file, start, min(PAGE_ALIGN(start), end), prot, flags, ret = mmap_subpage(file, start, min(PAGE_ALIGN(start), end), prot, flags,
off); off);
if (IS_ERR((void *) ret)) if (IS_ERR((void *) ret))
...@@ -786,7 +786,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro ...@@ -786,7 +786,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro
if (flags & MAP_SHARED) if (flags & MAP_SHARED)
printk(KERN_INFO printk(KERN_INFO
"%s(%d): emulate_mmap() can't share tail (end=0x%lx)\n", "%s(%d): emulate_mmap() can't share tail (end=0x%lx)\n",
current->comm, current->pid, end); current->comm, task_pid_nr(current), end);
ret = mmap_subpage(file, max(start, PAGE_START(end)), end, prot, flags, ret = mmap_subpage(file, max(start, PAGE_START(end)), end, prot, flags,
(off + len) - offset_in_page(end)); (off + len) - offset_in_page(end));
if (IS_ERR((void *) ret)) if (IS_ERR((void *) ret))
...@@ -816,7 +816,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro ...@@ -816,7 +816,7 @@ emulate_mmap (struct file *file, unsigned long start, unsigned long len, int pro
if ((flags & MAP_SHARED) && !is_congruent) if ((flags & MAP_SHARED) && !is_congruent)
printk(KERN_INFO "%s(%d): emulate_mmap() can't share contents of incongruent mmap " printk(KERN_INFO "%s(%d): emulate_mmap() can't share contents of incongruent mmap "
"(addr=0x%lx,off=0x%llx)\n", current->comm, current->pid, start, off); "(addr=0x%lx,off=0x%llx)\n", current->comm, task_pid_nr(current), start, off);
DBG("mmap_body: mapping [0x%lx-0x%lx) %s with poff 0x%llx\n", pstart, pend, DBG("mmap_body: mapping [0x%lx-0x%lx) %s with poff 0x%llx\n", pstart, pend,
is_congruent ? "congruent" : "not congruent", poff); is_congruent ? "congruent" : "not congruent", poff);
......
This diff is collapsed.
...@@ -44,11 +44,11 @@ default_validate(struct task_struct *task, unsigned int flags, int cpu, void *da ...@@ -44,11 +44,11 @@ default_validate(struct task_struct *task, unsigned int flags, int cpu, void *da
int ret = 0; int ret = 0;
if (data == NULL) { if (data == NULL) {
DPRINT(("[%d] no argument passed\n", task->pid)); DPRINT(("[%d] no argument passed\n", task_pid_nr(task)));
return -EINVAL; return -EINVAL;
} }
DPRINT(("[%d] validate flags=0x%x CPU%d\n", task->pid, flags, cpu)); DPRINT(("[%d] validate flags=0x%x CPU%d\n", task_pid_nr(task), flags, cpu));
/* /*
* must hold at least the buffer header + one minimally sized entry * must hold at least the buffer header + one minimally sized entry
...@@ -88,7 +88,7 @@ default_init(struct task_struct *task, void *buf, unsigned int flags, int cpu, v ...@@ -88,7 +88,7 @@ default_init(struct task_struct *task, void *buf, unsigned int flags, int cpu, v
hdr->hdr_count = 0UL; hdr->hdr_count = 0UL;
DPRINT(("[%d] buffer=%p buf_size=%lu hdr_size=%lu hdr_version=%u cur_offs=%lu\n", DPRINT(("[%d] buffer=%p buf_size=%lu hdr_size=%lu hdr_version=%u cur_offs=%lu\n",
task->pid, task_pid_nr(task),
buf, buf,
hdr->hdr_buf_size, hdr->hdr_buf_size,
sizeof(*hdr), sizeof(*hdr),
...@@ -245,7 +245,7 @@ default_restart(struct task_struct *task, pfm_ovfl_ctrl_t *ctrl, void *buf, stru ...@@ -245,7 +245,7 @@ default_restart(struct task_struct *task, pfm_ovfl_ctrl_t *ctrl, void *buf, stru
static int static int
default_exit(struct task_struct *task, void *buf, struct pt_regs *regs) default_exit(struct task_struct *task, void *buf, struct pt_regs *regs)
{ {
DPRINT(("[%d] exit(%p)\n", task->pid, buf)); DPRINT(("[%d] exit(%p)\n", task_pid_nr(task), buf));
return 0; return 0;
} }
......
...@@ -105,7 +105,8 @@ show_regs (struct pt_regs *regs) ...@@ -105,7 +105,8 @@ show_regs (struct pt_regs *regs)
unsigned long ip = regs->cr_iip + ia64_psr(regs)->ri; unsigned long ip = regs->cr_iip + ia64_psr(regs)->ri;
print_modules(); print_modules();
printk("\nPid: %d, CPU %d, comm: %20s\n", current->pid, smp_processor_id(), current->comm); printk("\nPid: %d, CPU %d, comm: %20s\n", task_pid_nr(current),
smp_processor_id(), current->comm);
printk("psr : %016lx ifs : %016lx ip : [<%016lx>] %s\n", printk("psr : %016lx ifs : %016lx ip : [<%016lx>] %s\n",
regs->cr_ipsr, regs->cr_ifs, ip, print_tainted()); regs->cr_ipsr, regs->cr_ifs, ip, print_tainted());
print_symbol("ip is at %s\n", ip); print_symbol("ip is at %s\n", ip);
......
...@@ -61,7 +61,7 @@ die (const char *str, struct pt_regs *regs, long err) ...@@ -61,7 +61,7 @@ die (const char *str, struct pt_regs *regs, long err)
if (++die.lock_owner_depth < 3) { if (++die.lock_owner_depth < 3) {
printk("%s[%d]: %s %ld [%d]\n", printk("%s[%d]: %s %ld [%d]\n",
current->comm, current->pid, str, err, ++die_counter); current->comm, task_pid_nr(current), str, err, ++die_counter);
(void) notify_die(DIE_OOPS, (char *)str, regs, err, 255, SIGSEGV); (void) notify_die(DIE_OOPS, (char *)str, regs, err, 255, SIGSEGV);
show_regs(regs); show_regs(regs);
} else } else
...@@ -315,7 +315,7 @@ handle_fpu_swa (int fp_fault, struct pt_regs *regs, unsigned long isr) ...@@ -315,7 +315,7 @@ handle_fpu_swa (int fp_fault, struct pt_regs *regs, unsigned long isr)
last.time = current_jiffies + 5 * HZ; last.time = current_jiffies + 5 * HZ;
printk(KERN_WARNING printk(KERN_WARNING
"%s(%d): floating-point assist fault at ip %016lx, isr %016lx\n", "%s(%d): floating-point assist fault at ip %016lx, isr %016lx\n",
current->comm, current->pid, regs->cr_iip + ia64_psr(regs)->ri, isr); current->comm, task_pid_nr(current), regs->cr_iip + ia64_psr(regs)->ri, isr);
} }
} }
} }
...@@ -453,7 +453,7 @@ ia64_fault (unsigned long vector, unsigned long isr, unsigned long ifa, ...@@ -453,7 +453,7 @@ ia64_fault (unsigned long vector, unsigned long isr, unsigned long ifa,
if (code == 8) { if (code == 8) {
# ifdef CONFIG_IA64_PRINT_HAZARDS # ifdef CONFIG_IA64_PRINT_HAZARDS
printk("%s[%d]: possible hazard @ ip=%016lx (pr = %016lx)\n", printk("%s[%d]: possible hazard @ ip=%016lx (pr = %016lx)\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
regs.cr_iip + ia64_psr(&regs)->ri, regs.pr); regs.cr_iip + ia64_psr(&regs)->ri, regs.pr);
# endif # endif
return; return;
......
...@@ -1340,7 +1340,8 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs) ...@@ -1340,7 +1340,8 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs)
size_t len; size_t len;
len = sprintf(buf, "%s(%d): unaligned access to 0x%016lx, " len = sprintf(buf, "%s(%d): unaligned access to 0x%016lx, "
"ip=0x%016lx\n\r", current->comm, current->pid, "ip=0x%016lx\n\r", current->comm,
task_pid_nr(current),
ifa, regs->cr_iip + ipsr->ri); ifa, regs->cr_iip + ipsr->ri);
/* /*
* Don't call tty_write_message() if we're in the kernel; we might * Don't call tty_write_message() if we're in the kernel; we might
...@@ -1363,7 +1364,7 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs) ...@@ -1363,7 +1364,7 @@ ia64_handle_unaligned (unsigned long ifa, struct pt_regs *regs)
"administrator\n" "administrator\n"
"echo 0 > /proc/sys/kernel/ignore-" "echo 0 > /proc/sys/kernel/ignore-"
"unaligned-usertrap to re-enable\n", "unaligned-usertrap to re-enable\n",
current->comm, current->pid); current->comm, task_pid_nr(current));
} }
} }
} else { } else {
......
...@@ -196,7 +196,7 @@ static void show_registers(struct pt_regs *regs) ...@@ -196,7 +196,7 @@ static void show_registers(struct pt_regs *regs)
printk("SPI: %08lx\n", sp); printk("SPI: %08lx\n", sp);
} }
printk("Process %s (pid: %d, process nr: %d, stackpage=%08lx)", printk("Process %s (pid: %d, process nr: %d, stackpage=%08lx)",
current->comm, current->pid, 0xffff & i, 4096+(unsigned long)current); current->comm, task_pid_nr(current), 0xffff & i, 4096+(unsigned long)current);
/* /*
* When in-kernel, we also print out the stack and code at the * When in-kernel, we also print out the stack and code at the
......
...@@ -900,7 +900,7 @@ void show_registers(struct pt_regs *regs) ...@@ -900,7 +900,7 @@ void show_registers(struct pt_regs *regs)
regs->d4, regs->d5, regs->a0, regs->a1); regs->d4, regs->d5, regs->a0, regs->a1);
printk("Process %s (pid: %d, task=%p)\n", printk("Process %s (pid: %d, task=%p)\n",
current->comm, current->pid, current); current->comm, task_pid_nr(current), current);
addr = (unsigned long)&fp->un; addr = (unsigned long)&fp->un;
printk("Frame format=%X ", regs->format); printk("Frame format=%X ", regs->format);
switch (regs->format) { switch (regs->format) {
...@@ -1038,7 +1038,7 @@ void bad_super_trap (struct frame *fp) ...@@ -1038,7 +1038,7 @@ void bad_super_trap (struct frame *fp)
fp->un.fmtb.daddr, space_names[ssw & DFC], fp->un.fmtb.daddr, space_names[ssw & DFC],
fp->ptregs.pc); fp->ptregs.pc);
} }
printk ("Current process id is %d\n", current->pid); printk ("Current process id is %d\n", task_pid_nr(current));
die_if_kernel("BAD KERNEL TRAP", &fp->ptregs, 0); die_if_kernel("BAD KERNEL TRAP", &fp->ptregs, 0);
} }
......
...@@ -314,7 +314,7 @@ void show_registers(const struct pt_regs *regs) ...@@ -314,7 +314,7 @@ void show_registers(const struct pt_regs *regs)
__show_regs(regs); __show_regs(regs);
print_modules(); print_modules();
printk("Process %s (pid: %d, threadinfo=%p, task=%p)\n", printk("Process %s (pid: %d, threadinfo=%p, task=%p)\n",
current->comm, current->pid, current_thread_info(), current); current->comm, task_pid_nr(current), current_thread_info(), current);
show_stacktrace(current, regs); show_stacktrace(current, regs);
show_code((unsigned int __user *) regs->cp0_epc); show_code((unsigned int __user *) regs->cp0_epc);
printk("\n"); printk("\n");
......
...@@ -219,7 +219,7 @@ void die_if_kernel(char *str, struct pt_regs *regs, long err) ...@@ -219,7 +219,7 @@ void die_if_kernel(char *str, struct pt_regs *regs, long err)
return; /* STFU */ return; /* STFU */
printk(KERN_CRIT "%s (pid %d): %s (code %ld) at " RFMT "\n", printk(KERN_CRIT "%s (pid %d): %s (code %ld) at " RFMT "\n",
current->comm, current->pid, str, err, regs->iaoq[0]); current->comm, task_pid_nr(current), str, err, regs->iaoq[0]);
#ifdef PRINT_USER_FAULTS #ifdef PRINT_USER_FAULTS
/* XXX for debugging only */ /* XXX for debugging only */
show_regs(regs); show_regs(regs);
...@@ -252,7 +252,7 @@ KERN_CRIT " || ||\n"); ...@@ -252,7 +252,7 @@ KERN_CRIT " || ||\n");
if (err) if (err)
printk(KERN_CRIT "%s (pid %d): %s (code %ld)\n", printk(KERN_CRIT "%s (pid %d): %s (code %ld)\n",
current->comm, current->pid, str, err); current->comm, task_pid_nr(current), str, err);
/* Wot's wrong wif bein' racy? */ /* Wot's wrong wif bein' racy? */
if (current->thread.flags & PARISC_KERNEL_DEATH) { if (current->thread.flags & PARISC_KERNEL_DEATH) {
...@@ -317,7 +317,7 @@ static void handle_break(struct pt_regs *regs) ...@@ -317,7 +317,7 @@ static void handle_break(struct pt_regs *regs)
if (unlikely(iir != GDB_BREAK_INSN)) { if (unlikely(iir != GDB_BREAK_INSN)) {
printk(KERN_DEBUG "break %d,%d: pid=%d command='%s'\n", printk(KERN_DEBUG "break %d,%d: pid=%d command='%s'\n",
iir & 31, (iir>>13) & ((1<<13)-1), iir & 31, (iir>>13) & ((1<<13)-1),
current->pid, current->comm); task_pid_nr(current), current->comm);
show_regs(regs); show_regs(regs);
} }
#endif #endif
...@@ -747,7 +747,7 @@ void handle_interruption(int code, struct pt_regs *regs) ...@@ -747,7 +747,7 @@ void handle_interruption(int code, struct pt_regs *regs)
if (user_mode(regs)) { if (user_mode(regs)) {
#ifdef PRINT_USER_FAULTS #ifdef PRINT_USER_FAULTS
printk(KERN_DEBUG "\nhandle_interruption() pid=%d command='%s'\n", printk(KERN_DEBUG "\nhandle_interruption() pid=%d command='%s'\n",
current->pid, current->comm); task_pid_nr(current), current->comm);
show_regs(regs); show_regs(regs);
#endif #endif
/* SIGBUS, for lack of a better one. */ /* SIGBUS, for lack of a better one. */
...@@ -772,7 +772,7 @@ void handle_interruption(int code, struct pt_regs *regs) ...@@ -772,7 +772,7 @@ void handle_interruption(int code, struct pt_regs *regs)
else else
printk(KERN_DEBUG "User Fault (long pointer) (fault %d) ", printk(KERN_DEBUG "User Fault (long pointer) (fault %d) ",
code); code);
printk("pid=%d command='%s'\n", current->pid, current->comm); printk("pid=%d command='%s'\n", task_pid_nr(current), current->comm);
show_regs(regs); show_regs(regs);
#endif #endif
si.si_signo = SIGSEGV; si.si_signo = SIGSEGV;
......
...@@ -469,7 +469,7 @@ void handle_unaligned(struct pt_regs *regs) ...@@ -469,7 +469,7 @@ void handle_unaligned(struct pt_regs *regs)
&& ++unaligned_count < 5) { && ++unaligned_count < 5) {
char buf[256]; char buf[256];
sprintf(buf, "%s(%d): unaligned access to 0x" RFMT " at ip=0x" RFMT "\n", sprintf(buf, "%s(%d): unaligned access to 0x" RFMT " at ip=0x" RFMT "\n",
current->comm, current->pid, regs->ior, regs->iaoq[0]); current->comm, task_pid_nr(current), regs->ior, regs->iaoq[0]);
printk(KERN_WARNING "%s", buf); printk(KERN_WARNING "%s", buf);
#ifdef DEBUG_UNALIGNED #ifdef DEBUG_UNALIGNED
show_regs(regs); show_regs(regs);
......
...@@ -211,7 +211,7 @@ void do_page_fault(struct pt_regs *regs, unsigned long code, ...@@ -211,7 +211,7 @@ void do_page_fault(struct pt_regs *regs, unsigned long code,
#ifdef PRINT_USER_FAULTS #ifdef PRINT_USER_FAULTS
printk(KERN_DEBUG "\n"); printk(KERN_DEBUG "\n");
printk(KERN_DEBUG "do_page_fault() pid=%d command='%s' type=%lu address=0x%08lx\n", printk(KERN_DEBUG "do_page_fault() pid=%d command='%s' type=%lu address=0x%08lx\n",
tsk->pid, tsk->comm, code, address); task_pid_nr(tsk), tsk->comm, code, address);
if (vma) { if (vma) {
printk(KERN_DEBUG "vm_start = 0x%08lx, vm_end = 0x%08lx\n", printk(KERN_DEBUG "vm_start = 0x%08lx, vm_end = 0x%08lx\n",
vma->vm_start, vma->vm_end); vma->vm_start, vma->vm_end);
......
...@@ -459,7 +459,7 @@ void show_regs(struct pt_regs * regs) ...@@ -459,7 +459,7 @@ void show_regs(struct pt_regs * regs)
printk("DAR: "REG", DSISR: "REG"\n", regs->dar, regs->dsisr); printk("DAR: "REG", DSISR: "REG"\n", regs->dar, regs->dsisr);
#endif #endif
printk("TASK = %p[%d] '%s' THREAD: %p", printk("TASK = %p[%d] '%s' THREAD: %p",
current, current->pid, current->comm, task_thread_info(current)); current, task_pid_nr(current), current->comm, task_thread_info(current));
#ifdef CONFIG_SMP #ifdef CONFIG_SMP
printk(" CPU: %d", smp_processor_id()); printk(" CPU: %d", smp_processor_id());
......
...@@ -881,7 +881,7 @@ void nonrecoverable_exception(struct pt_regs *regs) ...@@ -881,7 +881,7 @@ void nonrecoverable_exception(struct pt_regs *regs)
void trace_syscall(struct pt_regs *regs) void trace_syscall(struct pt_regs *regs)
{ {
printk("Task: %p(%d), PC: %08lX/%08lX, Syscall: %3ld, Result: %s%ld %s\n", printk("Task: %p(%d), PC: %08lX/%08lX, Syscall: %3ld, Result: %s%ld %s\n",
current, current->pid, regs->nip, regs->link, regs->gpr[0], current, task_pid_nr(current), regs->nip, regs->link, regs->gpr[0],
regs->ccr&0x10000000?"Error=":"", regs->gpr[3], print_tainted()); regs->ccr&0x10000000?"Error=":"", regs->gpr[3], print_tainted());
} }
......
...@@ -166,7 +166,7 @@ void show_regs(struct pt_regs *regs) ...@@ -166,7 +166,7 @@ void show_regs(struct pt_regs *regs)
printk("CPU: %d %s\n", task_thread_info(tsk)->cpu, print_tainted()); printk("CPU: %d %s\n", task_thread_info(tsk)->cpu, print_tainted());
printk("Process %s (pid: %d, task: %p, ksp: %p)\n", printk("Process %s (pid: %d, task: %p, ksp: %p)\n",
current->comm, current->pid, (void *) tsk, current->comm, task_pid_nr(current), (void *) tsk,
(void *) tsk->thread.ksp); (void *) tsk->thread.ksp);
show_registers(regs); show_registers(regs);
......
...@@ -121,7 +121,7 @@ void machine_power_off(void) ...@@ -121,7 +121,7 @@ void machine_power_off(void)
void show_regs(struct pt_regs * regs) void show_regs(struct pt_regs * regs)
{ {
printk("\n"); printk("\n");
printk("Pid : %d, Comm: %20s\n", current->pid, current->comm); printk("Pid : %d, Comm: %20s\n", task_pid_nr(current), current->comm);
print_symbol("PC is at %s\n", instruction_pointer(regs)); print_symbol("PC is at %s\n", instruction_pointer(regs));
printk("PC : %08lx SP : %08lx SR : %08lx ", printk("PC : %08lx SP : %08lx SR : %08lx ",
regs->pc, regs->regs[15], regs->sr); regs->pc, regs->regs[15], regs->sr);
......
...@@ -382,7 +382,7 @@ static int setup_frame(int sig, struct k_sigaction *ka, ...@@ -382,7 +382,7 @@ static int setup_frame(int sig, struct k_sigaction *ka,
set_fs(USER_DS); set_fs(USER_DS);
pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n", pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n",
current->comm, current->pid, frame, regs->pc, regs->pr); current->comm, task_pid_nr(current), frame, regs->pc, regs->pr);
flush_cache_sigtramp(regs->pr); flush_cache_sigtramp(regs->pr);
...@@ -462,7 +462,7 @@ static int setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info, ...@@ -462,7 +462,7 @@ static int setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info,
set_fs(USER_DS); set_fs(USER_DS);
pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n", pr_debug("SIG deliver (%s:%d): sp=%p pc=%08lx pr=%08lx\n",
current->comm, current->pid, frame, regs->pc, regs->pr); current->comm, task_pid_nr(current), frame, regs->pc, regs->pr);
flush_cache_sigtramp(regs->pr); flush_cache_sigtramp(regs->pr);
......
...@@ -95,8 +95,8 @@ void die(const char * str, struct pt_regs * regs, long err) ...@@ -95,8 +95,8 @@ void die(const char * str, struct pt_regs * regs, long err)
print_modules(); print_modules();
show_regs(regs); show_regs(regs);
printk("Process: %s (pid: %d, stack limit = %p)\n", printk("Process: %s (pid: %d, stack limit = %p)\n", current->comm,
current->comm, current->pid, task_stack_page(current) + 1); task_pid_nr(current), task_stack_page(current) + 1);
if (!user_mode(regs) || in_interrupt()) if (!user_mode(regs) || in_interrupt())
dump_mem("Stack: ", regs->regs[15], THREAD_SIZE + dump_mem("Stack: ", regs->regs[15], THREAD_SIZE +
...@@ -386,7 +386,8 @@ static int handle_unaligned_access(u16 instruction, struct pt_regs *regs) ...@@ -386,7 +386,8 @@ static int handle_unaligned_access(u16 instruction, struct pt_regs *regs)
printk(KERN_NOTICE "Fixing up unaligned userspace access " printk(KERN_NOTICE "Fixing up unaligned userspace access "
"in \"%s\" pid=%d pc=0x%p ins=0x%04hx\n", "in \"%s\" pid=%d pc=0x%p ins=0x%04hx\n",
current->comm,current->pid,(u16*)regs->pc,instruction); current->comm, task_pid_nr(current),
(u16 *)regs->pc, instruction);
} }
ret = -EFAULT; ret = -EFAULT;
......
...@@ -764,7 +764,7 @@ static int misaligned_fixup(struct pt_regs *regs) ...@@ -764,7 +764,7 @@ static int misaligned_fixup(struct pt_regs *regs)
--user_mode_unaligned_fixup_count; --user_mode_unaligned_fixup_count;
/* Only do 'count' worth of these reports, to remove a potential DoS against syslog */ /* Only do 'count' worth of these reports, to remove a potential DoS against syslog */
printk("Fixing up unaligned userspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n", printk("Fixing up unaligned userspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n",
current->comm, current->pid, (__u32)regs->pc, opcode); current->comm, task_pid_nr(current), (__u32)regs->pc, opcode);
} else } else
#endif #endif
if (!user_mode(regs) && (kernel_mode_unaligned_fixup_count > 0)) { if (!user_mode(regs) && (kernel_mode_unaligned_fixup_count > 0)) {
...@@ -774,7 +774,7 @@ static int misaligned_fixup(struct pt_regs *regs) ...@@ -774,7 +774,7 @@ static int misaligned_fixup(struct pt_regs *regs)
(__u32)regs->pc, opcode); (__u32)regs->pc, opcode);
} else { } else {
printk("Fixing up unaligned kernelspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n", printk("Fixing up unaligned kernelspace access in \"%s\" pid=%d pc=0x%08x ins=0x%08lx\n",
current->comm, current->pid, (__u32)regs->pc, opcode); current->comm, task_pid_nr(current), (__u32)regs->pc, opcode);
} }
} }
......
...@@ -81,7 +81,7 @@ static inline void print_vma(struct vm_area_struct *vma) ...@@ -81,7 +81,7 @@ static inline void print_vma(struct vm_area_struct *vma)
static inline void print_task(struct task_struct *tsk) static inline void print_task(struct task_struct *tsk)
{ {
printk("Task pid %d\n", tsk->pid); printk("Task pid %d\n", task_pid_nr(tsk));
} }
static pte_t *lookup_pte(struct mm_struct *mm, unsigned long address) static pte_t *lookup_pte(struct mm_struct *mm, unsigned long address)
...@@ -272,7 +272,7 @@ asmlinkage void do_page_fault(struct pt_regs *regs, unsigned long writeaccess, ...@@ -272,7 +272,7 @@ asmlinkage void do_page_fault(struct pt_regs *regs, unsigned long writeaccess,
* usermode, so only need a few */ * usermode, so only need a few */
count++; count++;
printk("user mode bad_area address=%08lx pid=%d (%s) pc=%08lx\n", printk("user mode bad_area address=%08lx pid=%d (%s) pc=%08lx\n",
address, current->pid, current->comm, address, task_pid_nr(current), current->comm,
(unsigned long) regs->pc); (unsigned long) regs->pc);
#if 0 #if 0
show_regs(regs); show_regs(regs);
......
...@@ -155,7 +155,7 @@ static inline void read_sunos_user(struct pt_regs *regs, unsigned long offset, ...@@ -155,7 +155,7 @@ static inline void read_sunos_user(struct pt_regs *regs, unsigned long offset,
/* Rest of them are completely unsupported. */ /* Rest of them are completely unsupported. */
default: default:
printk("%s [%d]: Wants to read user offset %ld\n", printk("%s [%d]: Wants to read user offset %ld\n",
current->comm, current->pid, offset); current->comm, task_pid_nr(current), offset);
pt_error_return(regs, EIO); pt_error_return(regs, EIO);
return; return;
} }
...@@ -222,7 +222,7 @@ static inline void write_sunos_user(struct pt_regs *regs, unsigned long offset, ...@@ -222,7 +222,7 @@ static inline void write_sunos_user(struct pt_regs *regs, unsigned long offset,
/* Rest of them are completely unsupported or "no-touch". */ /* Rest of them are completely unsupported or "no-touch". */
default: default:
printk("%s [%d]: Wants to write user offset %ld\n", printk("%s [%d]: Wants to write user offset %ld\n",
current->comm, current->pid, offset); current->comm, task_pid_nr(current), offset);
goto failure; goto failure;
} }
success: success:
......
...@@ -357,7 +357,7 @@ c_sys_nis_syscall (struct pt_regs *regs) ...@@ -357,7 +357,7 @@ c_sys_nis_syscall (struct pt_regs *regs)
if (count++ > 5) if (count++ > 5)
return -ENOSYS; return -ENOSYS;
printk ("%s[%d]: Unimplemented SPARC system call %d\n", printk ("%s[%d]: Unimplemented SPARC system call %d\n",
current->comm, current->pid, (int)regs->u_regs[1]); current->comm, task_pid_nr(current), (int)regs->u_regs[1]);
#ifdef DEBUG_UNIMP_SYSCALL #ifdef DEBUG_UNIMP_SYSCALL
show_regs (regs); show_regs (regs);
#endif #endif
......
...@@ -38,7 +38,7 @@ struct trap_trace_entry trapbuf[1024]; ...@@ -38,7 +38,7 @@ struct trap_trace_entry trapbuf[1024];
void syscall_trace_entry(struct pt_regs *regs) void syscall_trace_entry(struct pt_regs *regs)
{ {
printk("%s[%d]: ", current->comm, current->pid); printk("%s[%d]: ", current->comm, task_pid_nr(current));
printk("scall<%d> (could be %d)\n", (int) regs->u_regs[UREG_G1], printk("scall<%d> (could be %d)\n", (int) regs->u_regs[UREG_G1],
(int) regs->u_regs[UREG_I0]); (int) regs->u_regs[UREG_I0]);
} }
...@@ -99,7 +99,7 @@ void die_if_kernel(char *str, struct pt_regs *regs) ...@@ -99,7 +99,7 @@ void die_if_kernel(char *str, struct pt_regs *regs)
" /_| \\__/ |_\\\n" " /_| \\__/ |_\\\n"
" \\__U_/\n"); " \\__U_/\n");
printk("%s(%d): %s [#%d]\n", current->comm, current->pid, str, ++die_counter); printk("%s(%d): %s [#%d]\n", current->comm, task_pid_nr(current), str, ++die_counter);
show_regs(regs); show_regs(regs);
add_taint(TAINT_DIE); add_taint(TAINT_DIE);
......
...@@ -2225,7 +2225,7 @@ void die_if_kernel(char *str, struct pt_regs *regs) ...@@ -2225,7 +2225,7 @@ void die_if_kernel(char *str, struct pt_regs *regs)
" /_| \\__/ |_\\\n" " /_| \\__/ |_\\\n"
" \\__U_/\n"); " \\__U_/\n");
printk("%s(%d): %s [#%d]\n", current->comm, current->pid, str, ++die_counter); printk("%s(%d): %s [#%d]\n", current->comm, task_pid_nr(current), str, ++die_counter);
notify_die(DIE_OOPS, str, regs, 0, 255, SIGSEGV); notify_die(DIE_OOPS, str, regs, 0, 255, SIGSEGV);
__asm__ __volatile__("flushw"); __asm__ __volatile__("flushw");
__show_regs(regs); __show_regs(regs);
......
...@@ -15,8 +15,8 @@ void __show_regs(struct pt_regs * regs) ...@@ -15,8 +15,8 @@ void __show_regs(struct pt_regs * regs)
{ {
printk("\n"); printk("\n");
print_modules(); print_modules();
printk("Pid: %d, comm: %.20s %s %s\n", printk("Pid: %d, comm: %.20s %s %s\n", task_pid_nr(current),
current->pid, current->comm, print_tainted(), init_utsname()->release); current->comm, print_tainted(), init_utsname()->release);
printk("RIP: %04lx:[<%016lx>] ", PT_REGS_CS(regs) & 0xffff, printk("RIP: %04lx:[<%016lx>] ", PT_REGS_CS(regs) & 0xffff,
PT_REGS_RIP(regs)); PT_REGS_RIP(regs));
printk("\nRSP: %016lx EFLAGS: %08lx\n", PT_REGS_RSP(regs), printk("\nRSP: %016lx EFLAGS: %08lx\n", PT_REGS_RSP(regs),
......
...@@ -301,7 +301,7 @@ void show_regs(struct pt_regs * regs) ...@@ -301,7 +301,7 @@ void show_regs(struct pt_regs * regs)
unsigned long d0, d1, d2, d3, d6, d7; unsigned long d0, d1, d2, d3, d6, d7;
printk("\n"); printk("\n");
printk("Pid: %d, comm: %20s\n", current->pid, current->comm); printk("Pid: %d, comm: %20s\n", task_pid_nr(current), current->comm);
printk("EIP: %04x:[<%08lx>] CPU: %d\n",0xffff & regs->xcs,regs->eip, smp_processor_id()); printk("EIP: %04x:[<%08lx>] CPU: %d\n",0xffff & regs->xcs,regs->eip, smp_processor_id());
print_symbol("EIP is at %s\n", regs->eip); print_symbol("EIP is at %s\n", regs->eip);
......
...@@ -200,8 +200,8 @@ asmlinkage int sys_sigreturn(unsigned long __unused) ...@@ -200,8 +200,8 @@ asmlinkage int sys_sigreturn(unsigned long __unused)
if (show_unhandled_signals && printk_ratelimit()) if (show_unhandled_signals && printk_ratelimit())
printk("%s%s[%d] bad frame in sigreturn frame:%p eip:%lx" printk("%s%s[%d] bad frame in sigreturn frame:%p eip:%lx"
" esp:%lx oeax:%lx\n", " esp:%lx oeax:%lx\n",
current->pid > 1 ? KERN_INFO : KERN_EMERG, task_pid_nr(current) > 1 ? KERN_INFO : KERN_EMERG,
current->comm, current->pid, frame, regs->eip, current->comm, task_pid_nr(current), frame, regs->eip,
regs->esp, regs->orig_eax); regs->esp, regs->orig_eax);
force_sig(SIGSEGV, current); force_sig(SIGSEGV, current);
......
...@@ -316,7 +316,7 @@ void show_registers(struct pt_regs *regs) ...@@ -316,7 +316,7 @@ void show_registers(struct pt_regs *regs)
printk(KERN_EMERG "ds: %04x es: %04x fs: %04x gs: %04x ss: %04x\n", printk(KERN_EMERG "ds: %04x es: %04x fs: %04x gs: %04x ss: %04x\n",
regs->xds & 0xffff, regs->xes & 0xffff, regs->xfs & 0xffff, gs, ss); regs->xds & 0xffff, regs->xes & 0xffff, regs->xfs & 0xffff, gs, ss);
printk(KERN_EMERG "Process %.*s (pid: %d, ti=%p task=%p task.ti=%p)", printk(KERN_EMERG "Process %.*s (pid: %d, ti=%p task=%p task.ti=%p)",
TASK_COMM_LEN, current->comm, current->pid, TASK_COMM_LEN, current->comm, task_pid_nr(current),
current_thread_info(), current, task_thread_info(current)); current_thread_info(), current, task_thread_info(current));
/* /*
* When in-kernel, we also print out the stack and code at the * When in-kernel, we also print out the stack and code at the
...@@ -622,7 +622,7 @@ fastcall void __kprobes do_general_protection(struct pt_regs * regs, ...@@ -622,7 +622,7 @@ fastcall void __kprobes do_general_protection(struct pt_regs * regs,
printk_ratelimit()) printk_ratelimit())
printk(KERN_INFO printk(KERN_INFO
"%s[%d] general protection eip:%lx esp:%lx error:%lx\n", "%s[%d] general protection eip:%lx esp:%lx error:%lx\n",
current->comm, current->pid, current->comm, task_pid_nr(current),
regs->eip, regs->esp, error_code); regs->eip, regs->esp, error_code);
force_sig(SIGSEGV, current); force_sig(SIGSEGV, current);
......
...@@ -471,8 +471,8 @@ fastcall void __kprobes do_page_fault(struct pt_regs *regs, ...@@ -471,8 +471,8 @@ fastcall void __kprobes do_page_fault(struct pt_regs *regs,
printk_ratelimit()) { printk_ratelimit()) {
printk("%s%s[%d]: segfault at %08lx eip %08lx " printk("%s%s[%d]: segfault at %08lx eip %08lx "
"esp %08lx error %lx\n", "esp %08lx error %lx\n",
tsk->pid > 1 ? KERN_INFO : KERN_EMERG, task_pid_nr(tsk) > 1 ? KERN_INFO : KERN_EMERG,
tsk->comm, tsk->pid, address, regs->eip, tsk->comm, task_pid_nr(tsk), address, regs->eip,
regs->esp, error_code); regs->esp, error_code);
} }
tsk->thread.cr2 = address; tsk->thread.cr2 = address;
......
...@@ -176,7 +176,7 @@ void do_unhandled(struct pt_regs *regs, unsigned long exccause) ...@@ -176,7 +176,7 @@ void do_unhandled(struct pt_regs *regs, unsigned long exccause)
printk("Caught unhandled exception in '%s' " printk("Caught unhandled exception in '%s' "
"(pid = %d, pc = %#010lx) - should not happen\n" "(pid = %d, pc = %#010lx) - should not happen\n"
"\tEXCCAUSE is %ld\n", "\tEXCCAUSE is %ld\n",
current->comm, current->pid, regs->pc, exccause); current->comm, task_pid_nr(current), regs->pc, exccause);
force_sig(SIGILL, current); force_sig(SIGILL, current);
} }
...@@ -228,7 +228,7 @@ do_illegal_instruction(struct pt_regs *regs) ...@@ -228,7 +228,7 @@ do_illegal_instruction(struct pt_regs *regs)
/* If in user mode, send SIGILL signal to current process. */ /* If in user mode, send SIGILL signal to current process. */
printk("Illegal Instruction in '%s' (pid = %d, pc = %#010lx)\n", printk("Illegal Instruction in '%s' (pid = %d, pc = %#010lx)\n",
current->comm, current->pid, regs->pc); current->comm, task_pid_nr(current), regs->pc);
force_sig(SIGILL, current); force_sig(SIGILL, current);
} }
...@@ -254,7 +254,7 @@ do_unaligned_user (struct pt_regs *regs) ...@@ -254,7 +254,7 @@ do_unaligned_user (struct pt_regs *regs)
current->thread.error_code = -3; current->thread.error_code = -3;
printk("Unaligned memory access to %08lx in '%s' " printk("Unaligned memory access to %08lx in '%s' "
"(pid = %d, pc = %#010lx)\n", "(pid = %d, pc = %#010lx)\n",
regs->excvaddr, current->comm, current->pid, regs->pc); regs->excvaddr, current->comm, task_pid_nr(current), regs->pc);
info.si_signo = SIGBUS; info.si_signo = SIGBUS;
info.si_errno = 0; info.si_errno = 0;
info.si_code = BUS_ADRALN; info.si_code = BUS_ADRALN;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment