ARM汇编实战1:内核函数netlink_lookup

这篇博客详细记录了一次ARM架构下内核函数netlink_lookup引发的异常情况。从堆栈信息中,可以看到异常发生在netlink_unicast、netlink_sendmsg等网络相关函数调用过程中。通过源代码分析,netlink_lookup函数用于查找指定协议和PID的套接字。反汇编代码展示了函数执行的具体步骤,包括哈希查找和锁操作。通过对异常细节的深入探讨,有助于理解内核网络子系统的运行机制。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

堆栈信息

Exception Class: Kernel (KE)
Current Executing Process:
[wpa_supplicant, 687][logwrapper, 686]
Backtrace:
[<c0327a40>] emmc_ipanic+0x4c/0x46c
[<c0068a8c>] notifier_call_chain+0x64/0xdc
[<c0068d34>] __atomic_notifier_call_chain+0x40/0x54
[<c0068d68>] atomic_notifier_call_chain+0x20/0x28
[<c0568654>] panic+0x7c/0x194
[<c00121e4>] die+0x120/0x2a0
[<c0568328>] __do_kernel_fault.part.9+0x5c/0x7c
[<c00157f8>] do_page_fault+0x23c/0x278
[<c0015960>] do_translation_fault+0xa0/0xa8
[<c00083c0>] do_DataAbort+0x7c/0x100
[<c000df58>] __dabt_svc+0x38/0x60
[<c045cab0>] netlink_unicast+0xac/0x204
[<c045cf70>] netlink_sendmsg+0x2c0/0x324
[<c0421318>] sock_sendmsg+0xac/0xcc
[<c04216c4>] __sys_sendmsg+0x2d4/0x2ec
[<c042314c>] sys_sendmsg+0x44/0x70
[<c000e500>] ret_fast_syscall+0x0/0x30
[<ffffffff>] 0xffffffff

Exception Detail Info:
<0>[ 1386.071540] (1)[687:wpa_supplicant]Internal error: Oops: 5 [#1] PREEMPT SMP ARM
<4>[ 1386.071553] (1)[687:wpa_supplicant]Modules linked in: wlan_mt bf1c3000  lowmemorydetect bf1bf000  ccci bf194000  ccci_plat bf165000  mtk_wmt_wifi bf161000  mtk_fm_drv bf136000  mtk_stp_bt bf129000  mtk_stp_gps bf11c000  mtk_stp_wmt bf091000  devinfo bf08d000  devapc bf088000  sec bf061000  vcodec_kernel_driver bf052000  bma2xx bf047000  mali bf000000
<4>[ 1386.071644] (1)[687:wpa_supplicant]CPU: 1    Tainted: G        W     (3.4.5 #1)
<4>[ 1386.071660] (1)[687:wpa_supplicant]
PC is at netlink_lookup.isra.17+0x38/0x10c
<4>[ 1386.071676] (1)[687:wpa_supplicant]
LR is at __raw_read_lock+0x24/0xa0
<4>[ 1386.071691] (1)[687:wpa_supplicant]pc : [<c045b7c0>]    lr : [<c0571280>]    psr: 60000013
<4>[ 1386.071699] (1)[687:wpa_supplicant]sp : dc99fcb0  ip : dc99fc88  fp : dc99fccc
<4>[ 1386.071714] (1)[687:wpa_supplicant]r10: 00000000  r9 : 00000028  r8 : 00000000
<4>[ 1386.071728] (1)[687:wpa_supplicant]r7 : dc99fcd4  r6 : 84000143  r5 : 00000380  r4 : 00000000
<4>[ 1386.071742] (1)[687:wpa_supplicant]r3 : 00000855  r2 : 0000beef  r1 : deadbeef  r0 : 840004c3
<4>[

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值