2 * Copyright (C) 1991, 1992 Linus Torvalds
3 * Copyright (C) 2000, 2001, 2002 Andi Kleen, SuSE Labs
5 #include <linux/kallsyms.h>
6 #include <linux/kprobes.h>
7 #include <linux/uaccess.h>
8 #include <linux/hardirq.h>
9 #include <linux/kdebug.h>
10 #include <linux/export.h>
11 #include <linux/ptrace.h>
12 #include <linux/kexec.h>
13 #include <linux/sysfs.h>
14 #include <linux/bug.h>
15 #include <linux/nmi.h>
17 #include <asm/stacktrace.h>
19 const char *stack_type_name(enum stack_type type)
21 if (type == STACK_TYPE_IRQ)
24 if (type == STACK_TYPE_SOFTIRQ)
30 static bool in_hardirq_stack(unsigned long *stack, struct stack_info *info)
32 unsigned long *begin = (unsigned long *)this_cpu_read(hardirq_stack);
33 unsigned long *end = begin + (THREAD_SIZE / sizeof(long));
36 * This is a software stack, so 'end' can be a valid stack pointer.
37 * It just means the stack is empty.
39 if (stack < begin || stack > end)
42 info->type = STACK_TYPE_IRQ;
47 * See irq_32.c -- the next stack pointer is stored at the beginning of
50 info->next_sp = (unsigned long *)*begin;
55 static bool in_softirq_stack(unsigned long *stack, struct stack_info *info)
57 unsigned long *begin = (unsigned long *)this_cpu_read(softirq_stack);
58 unsigned long *end = begin + (THREAD_SIZE / sizeof(long));
61 * This is a software stack, so 'end' can be a valid stack pointer.
62 * It just means the stack is empty.
64 if (stack < begin || stack > end)
67 info->type = STACK_TYPE_SOFTIRQ;
72 * The next stack pointer is stored at the beginning of the stack.
75 info->next_sp = (unsigned long *)*begin;
80 int get_stack_info(unsigned long *stack, struct task_struct *task,
81 struct stack_info *info, unsigned long *visit_mask)
86 task = task ? : current;
88 if (in_task_stack(stack, task, info))
94 if (in_hardirq_stack(stack, info))
97 if (in_softirq_stack(stack, info))
104 * Make sure we don't iterate through any given stack more than once.
105 * If it comes up a second time then there's something wrong going on:
106 * just break out and report an unknown stack type.
109 if (*visit_mask & (1UL << info->type)) {
110 printk_deferred_once(KERN_WARNING "WARNING: stack recursion on stack type %d\n", info->type);
113 *visit_mask |= 1UL << info->type;
119 info->type = STACK_TYPE_UNKNOWN;
123 void show_regs(struct pt_regs *regs)
127 show_regs_print_info(KERN_EMERG);
128 __show_regs(regs, !user_mode(regs));
131 * When in-kernel, we also print out the stack and code at the
132 * time of the fault..
134 if (!user_mode(regs)) {
135 unsigned int code_prologue = code_bytes * 43 / 64;
136 unsigned int code_len = code_bytes;
140 show_trace_log_lvl(current, regs, NULL, KERN_EMERG);
144 ip = (u8 *)regs->ip - code_prologue;
145 if (ip < (u8 *)PAGE_OFFSET || probe_kernel_address(ip, c)) {
146 /* try starting at IP */
148 code_len = code_len - code_prologue + 1;
150 for (i = 0; i < code_len; i++, ip++) {
151 if (ip < (u8 *)PAGE_OFFSET ||
152 probe_kernel_address(ip, c)) {
153 pr_cont(" Bad EIP value.");
156 if (ip == (u8 *)regs->ip)
157 pr_cont(" <%02x>", c);
165 int is_valid_bugaddr(unsigned long ip)
169 if (ip < PAGE_OFFSET)
171 if (probe_kernel_address((unsigned short *)ip, ud2))
174 return ud2 == 0x0b0f;