[roll] Roll fuchsia [kernel][lockup] Don't deref an invalid shadow call stack pointer

When generating a DAP backtrace for a locked up CPU, don't read the
memory pointed to by the SCSP unless it's a kernel address and mapped.

Pull the backtrace generation logic out of DumpRegistersAndBacktrace
and into its own method GetBacktraceFromDapState so that it can be
easily tested.

Add test for GetBacktraceFromDapState.

Original-Bug: 93993
Test: k ut lockup_detector
Original-Reviewed-on: https://fuchsia-review.googlesource.com/c/fuchsia/+/648093
Original-Revision: ccfec06e16b3d125105f314697401a6314e55e58
GitOrigin-RevId: 77f44dc23f7cac51e0813e7798241fe2e5cef21f
Change-Id: Idb6addd50f716db7a04d8f867208a18a32e0ed7f
1 file changed
tree: 560c56c4064d89d4074d5fc1ee0668cca00aa412
  1. infra/
  2. third_party/
  3. cts
  4. firmware
  5. flower
  6. jiri.lock
  7. minimal
  8. prebuilts
  9. README.md
  10. stem
  11. test_durations
  12. toolchain
README.md

Integration

This repository contains Fuchsia's Global Integration manifest files.

Making changes

All changes should be made to the internal version of this repository. Our infrastructure automatically updates this version when the internal one changes.

Currently all changes must be made by a Google employee. Non-Google employees wishing to make a change can ask for assistance via the IRC channel #fuchsia on Freenode.

Obtaining the source

First install Jiri.

Next run:

$ jiri init
$ jiri import minimal https://fuchsia.googlesource.com/integration
$ jiri update

Third party

Third party projects should have their own subdirectory in ./third_party.