2 * Copyright (C) 1991, 1992 Linus Torvalds
3 * Copyright (C) 2000, 2001, 2002 Andi Kleen, SuSE Labs
5 #include <linux/kallsyms.h>
6 #include <linux/kprobes.h>
7 #include <linux/uaccess.h>
8 #include <linux/utsname.h>
9 #include <linux/hardirq.h>
10 #include <linux/kdebug.h>
11 #include <linux/module.h>
12 #include <linux/ptrace.h>
13 #include <linux/ftrace.h>
14 #include <linux/kexec.h>
15 #include <linux/bug.h>
16 #include <linux/nmi.h>
17 #include <linux/sysfs.h>
19 #include <asm/stacktrace.h>
22 int panic_on_unrecovered_nmi
;
24 unsigned int code_bytes
= 64;
25 int kstack_depth_to_print
= 3 * STACKSLOTS_PER_LINE
;
26 static int die_counter
;
28 static void printk_stack_address(unsigned long address
, int reliable
,
31 printk("%s [<%p>] %s%pB\n",
32 (char *)data
, (void *)address
, reliable
? "" : "? ",
36 void printk_address(unsigned long address
)
38 pr_cont(" [<%p>] %pS\n", (void *)address
, (void *)address
);
42 * x86-64 can have up to three kernel stacks:
45 * severe exception (double fault, nmi, stack fault, debug, mce) hardware stack
48 static inline int valid_stack_ptr(struct task_struct
*task
,
49 void *p
, unsigned int size
, void *end
)
51 void *t
= task_stack_page(task
);
53 if (p
< end
&& p
>= (end
-THREAD_SIZE
))
58 return p
>= t
&& p
< t
+ THREAD_SIZE
- size
;
62 print_context_stack(struct task_struct
*task
,
63 unsigned long *stack
, unsigned long bp
,
64 const struct stacktrace_ops
*ops
, void *data
,
65 unsigned long *end
, int *graph
)
67 struct stack_frame
*frame
= (struct stack_frame
*)bp
;
70 * If we overflowed the stack into a guard page, jump back to the
71 * bottom of the usable stack.
73 if ((unsigned long)task_stack_page(task
) - (unsigned long)stack
<
75 stack
= (unsigned long *)task_stack_page(task
);
77 while (valid_stack_ptr(task
, stack
, sizeof(*stack
), end
)) {
78 unsigned long addr
= *stack
;
80 if (__kernel_text_address(addr
)) {
81 unsigned long real_addr
;
84 if ((unsigned long) stack
== bp
+ sizeof(long)) {
86 frame
= frame
->next_frame
;
87 bp
= (unsigned long) frame
;
91 * When function graph tracing is enabled for a
92 * function, its return address on the stack is
93 * replaced with the address of an ftrace handler
94 * (return_to_handler). In that case, before printing
95 * the "real" address, we want to print the handler
96 * address as an "unreliable" hint that function graph
97 * tracing was involved.
99 real_addr
= ftrace_graph_ret_addr(task
, graph
, addr
,
101 if (real_addr
!= addr
)
102 ops
->address(data
, addr
, 0);
104 ops
->address(data
, real_addr
, reliable
);
110 EXPORT_SYMBOL_GPL(print_context_stack
);
113 print_context_stack_bp(struct task_struct
*task
,
114 unsigned long *stack
, unsigned long bp
,
115 const struct stacktrace_ops
*ops
, void *data
,
116 unsigned long *end
, int *graph
)
118 struct stack_frame
*frame
= (struct stack_frame
*)bp
;
119 unsigned long *retp
= &frame
->return_address
;
121 while (valid_stack_ptr(task
, retp
, sizeof(*retp
), end
)) {
122 unsigned long addr
= *retp
;
123 unsigned long real_addr
;
125 if (!__kernel_text_address(addr
))
128 real_addr
= ftrace_graph_ret_addr(task
, graph
, addr
, retp
);
129 if (ops
->address(data
, real_addr
, 1))
132 frame
= frame
->next_frame
;
133 retp
= &frame
->return_address
;
136 return (unsigned long)frame
;
138 EXPORT_SYMBOL_GPL(print_context_stack_bp
);
140 static int print_trace_stack(void *data
, char *name
)
142 printk("%s <%s> ", (char *)data
, name
);
147 * Print one address/symbol entries per line.
149 static int print_trace_address(void *data
, unsigned long addr
, int reliable
)
151 touch_nmi_watchdog();
152 printk_stack_address(addr
, reliable
, data
);
156 static const struct stacktrace_ops print_trace_ops
= {
157 .stack
= print_trace_stack
,
158 .address
= print_trace_address
,
159 .walk_stack
= print_context_stack
,
163 show_trace_log_lvl(struct task_struct
*task
, struct pt_regs
*regs
,
164 unsigned long *stack
, unsigned long bp
, char *log_lvl
)
166 printk("%sCall Trace:\n", log_lvl
);
167 dump_trace(task
, regs
, stack
, bp
, &print_trace_ops
, log_lvl
);
170 void show_stack(struct task_struct
*task
, unsigned long *sp
)
172 unsigned long bp
= 0;
176 * Stack frames below this one aren't interesting. Don't show them
177 * if we're printing for %current.
179 if (!sp
&& (!task
|| task
== current
)) {
181 bp
= stack_frame(current
, NULL
);
184 show_stack_log_lvl(task
, NULL
, sp
, bp
, "");
187 void show_stack_regs(struct pt_regs
*regs
)
189 show_stack_log_lvl(current
, regs
, (unsigned long *)regs
->sp
, regs
->bp
, "");
192 static arch_spinlock_t die_lock
= __ARCH_SPIN_LOCK_UNLOCKED
;
193 static int die_owner
= -1;
194 static unsigned int die_nest_count
;
196 unsigned long oops_begin(void)
203 /* racy, but better than risking deadlock. */
204 raw_local_irq_save(flags
);
205 cpu
= smp_processor_id();
206 if (!arch_spin_trylock(&die_lock
)) {
207 if (cpu
== die_owner
)
208 /* nested oops. should stop eventually */;
210 arch_spin_lock(&die_lock
);
218 EXPORT_SYMBOL_GPL(oops_begin
);
219 NOKPROBE_SYMBOL(oops_begin
);
221 void __noreturn
rewind_stack_do_exit(int signr
);
223 void oops_end(unsigned long flags
, struct pt_regs
*regs
, int signr
)
225 if (regs
&& kexec_should_crash(current
))
230 add_taint(TAINT_DIE
, LOCKDEP_NOW_UNRELIABLE
);
233 /* Nest count reaches zero, release the lock. */
234 arch_spin_unlock(&die_lock
);
235 raw_local_irq_restore(flags
);
241 panic("Fatal exception in interrupt");
243 panic("Fatal exception");
246 * We're not going to return, but we might be on an IST stack or
247 * have very little stack space left. Rewind the stack and kill
250 rewind_stack_do_exit(signr
);
252 NOKPROBE_SYMBOL(oops_end
);
254 int __die(const char *str
, struct pt_regs
*regs
, long err
)
261 "%s: %04lx [#%d]%s%s%s%s\n", str
, err
& 0xffff, ++die_counter
,
262 IS_ENABLED(CONFIG_PREEMPT
) ? " PREEMPT" : "",
263 IS_ENABLED(CONFIG_SMP
) ? " SMP" : "",
264 debug_pagealloc_enabled() ? " DEBUG_PAGEALLOC" : "",
265 IS_ENABLED(CONFIG_KASAN
) ? " KASAN" : "");
267 if (notify_die(DIE_OOPS
, str
, regs
, err
,
268 current
->thread
.trap_nr
, SIGSEGV
) == NOTIFY_STOP
)
274 if (user_mode(regs
)) {
276 ss
= regs
->ss
& 0xffff;
278 sp
= kernel_stack_pointer(regs
);
281 printk(KERN_EMERG
"EIP: [<%08lx>] ", regs
->ip
);
282 print_symbol("%s", regs
->ip
);
283 printk(" SS:ESP %04x:%08lx\n", ss
, sp
);
285 /* Executive summary in case the oops scrolled away */
286 printk(KERN_ALERT
"RIP ");
287 printk_address(regs
->ip
);
288 printk(" RSP <%016lx>\n", regs
->sp
);
292 NOKPROBE_SYMBOL(__die
);
295 * This is gone through when something in the kernel has done something bad
296 * and is about to be terminated:
298 void die(const char *str
, struct pt_regs
*regs
, long err
)
300 unsigned long flags
= oops_begin();
303 if (!user_mode(regs
))
304 report_bug(regs
->ip
, regs
);
306 if (__die(str
, regs
, err
))
308 oops_end(flags
, regs
, sig
);
311 static int __init
kstack_setup(char *s
)
319 ret
= kstrtoul(s
, 0, &val
);
322 kstack_depth_to_print
= val
;
325 early_param("kstack", kstack_setup
);
327 static int __init
code_bytes_setup(char *s
)
335 ret
= kstrtoul(s
, 0, &val
);
340 if (code_bytes
> 8192)
345 __setup("code_bytes=", code_bytes_setup
);