|
@@ -76,7 +76,7 @@ void show_trace_log_lvl(struct task_struct *task, struct pt_regs *regs,
|
|
|
* - hardirq stack
|
|
|
*/
|
|
|
for (regs = NULL; stack; stack = stack_info.next_sp) {
|
|
|
- const char *str_begin, *str_end;
|
|
|
+ const char *stack_name;
|
|
|
|
|
|
/*
|
|
|
* If we overflowed the task stack into a guard page, jump back
|
|
@@ -88,9 +88,9 @@ void show_trace_log_lvl(struct task_struct *task, struct pt_regs *regs,
|
|
|
if (get_stack_info(stack, task, &stack_info, &visit_mask))
|
|
|
break;
|
|
|
|
|
|
- stack_type_str(stack_info.type, &str_begin, &str_end);
|
|
|
- if (str_begin)
|
|
|
- printk("%s <%s>\n", log_lvl, str_begin);
|
|
|
+ stack_name = stack_type_name(stack_info.type);
|
|
|
+ if (stack_name)
|
|
|
+ printk("%s <%s>\n", log_lvl, stack_name);
|
|
|
|
|
|
/*
|
|
|
* Scan the stack, printing any text addresses we find. At the
|
|
@@ -155,8 +155,8 @@ void show_trace_log_lvl(struct task_struct *task, struct pt_regs *regs,
|
|
|
__show_regs(regs, 0);
|
|
|
}
|
|
|
|
|
|
- if (str_end)
|
|
|
- printk("%s <%s>\n", log_lvl, str_end);
|
|
|
+ if (stack_name)
|
|
|
+ printk("%s </%s>\n", log_lvl, stack_name);
|
|
|
}
|
|
|
}
|
|
|
|