2006-07-03 14:24:40 +07:00
|
|
|
/*
|
|
|
|
* Stack trace management functions
|
|
|
|
*
|
2009-01-31 08:03:42 +07:00
|
|
|
* Copyright (C) 2006-2009 Red Hat, Inc., Ingo Molnar <mingo@redhat.com>
|
2006-07-03 14:24:40 +07:00
|
|
|
*/
|
|
|
|
#include <linux/sched.h>
|
2017-02-09 00:51:35 +07:00
|
|
|
#include <linux/sched/debug.h>
|
2017-02-09 00:51:37 +07:00
|
|
|
#include <linux/sched/task_stack.h>
|
2006-07-03 14:24:40 +07:00
|
|
|
#include <linux/stacktrace.h>
|
2016-07-14 07:18:56 +07:00
|
|
|
#include <linux/export.h>
|
2008-11-22 18:28:47 +07:00
|
|
|
#include <linux/uaccess.h>
|
2006-09-26 15:52:34 +07:00
|
|
|
#include <asm/stacktrace.h>
|
2016-09-17 02:18:14 +07:00
|
|
|
#include <asm/unwind.h>
|
2006-07-03 14:24:40 +07:00
|
|
|
|
2019-04-25 16:45:22 +07:00
|
|
|
void arch_stack_walk(stack_trace_consume_fn consume_entry, void *cookie,
|
|
|
|
struct task_struct *task, struct pt_regs *regs)
|
2008-01-26 03:08:34 +07:00
|
|
|
{
|
2016-09-17 02:18:14 +07:00
|
|
|
struct unwind_state state;
|
|
|
|
unsigned long addr;
|
2008-01-26 03:08:34 +07:00
|
|
|
|
2020-09-14 22:34:07 +07:00
|
|
|
if (regs && !consume_entry(cookie, regs->ip))
|
2019-04-25 16:45:22 +07:00
|
|
|
return;
|
2006-07-03 14:24:40 +07:00
|
|
|
|
2016-09-17 02:18:14 +07:00
|
|
|
for (unwind_start(&state, task, regs, NULL); !unwind_done(&state);
|
|
|
|
unwind_next_frame(&state)) {
|
|
|
|
addr = unwind_get_return_address(&state);
|
2020-09-14 22:34:07 +07:00
|
|
|
if (!addr || !consume_entry(cookie, addr))
|
2016-09-17 02:18:14 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2008-01-26 03:08:34 +07:00
|
|
|
|
2006-07-03 14:24:40 +07:00
|
|
|
/*
|
2019-04-25 16:45:22 +07:00
|
|
|
* This function returns an error if it detects any unreliable features of the
|
|
|
|
* stack. Otherwise it guarantees that the stack trace is reliable.
|
|
|
|
*
|
|
|
|
* If the task is not 'current', the caller *must* ensure the task is inactive.
|
2006-07-03 14:24:40 +07:00
|
|
|
*/
|
2019-04-25 16:45:22 +07:00
|
|
|
int arch_stack_walk_reliable(stack_trace_consume_fn consume_entry,
|
|
|
|
void *cookie, struct task_struct *task)
|
2017-02-14 08:42:28 +07:00
|
|
|
{
|
|
|
|
struct unwind_state state;
|
|
|
|
struct pt_regs *regs;
|
|
|
|
unsigned long addr;
|
|
|
|
|
2018-05-18 13:47:10 +07:00
|
|
|
for (unwind_start(&state, task, NULL, NULL);
|
|
|
|
!unwind_done(&state) && !unwind_error(&state);
|
2017-02-14 08:42:28 +07:00
|
|
|
unwind_next_frame(&state)) {
|
|
|
|
|
2017-12-31 23:18:06 +07:00
|
|
|
regs = unwind_get_entry_regs(&state, NULL);
|
2017-02-14 08:42:28 +07:00
|
|
|
if (regs) {
|
2018-05-18 13:47:10 +07:00
|
|
|
/* Success path for user tasks */
|
|
|
|
if (user_mode(regs))
|
2019-04-10 17:27:56 +07:00
|
|
|
return 0;
|
2018-05-18 13:47:10 +07:00
|
|
|
|
2017-02-14 08:42:28 +07:00
|
|
|
/*
|
|
|
|
* Kernel mode registers on the stack indicate an
|
|
|
|
* in-kernel interrupt or exception (e.g., preemption
|
|
|
|
* or a page fault), which can make frame pointers
|
|
|
|
* unreliable.
|
|
|
|
*/
|
2018-05-18 13:47:11 +07:00
|
|
|
if (IS_ENABLED(CONFIG_FRAME_POINTER))
|
|
|
|
return -EINVAL;
|
2017-02-14 08:42:28 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
addr = unwind_get_return_address(&state);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A NULL or invalid return address probably means there's some
|
|
|
|
* generated code which __kernel_text_address() doesn't know
|
|
|
|
* about.
|
|
|
|
*/
|
2018-05-18 13:47:09 +07:00
|
|
|
if (!addr)
|
2017-02-14 08:42:28 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
2020-09-14 22:34:07 +07:00
|
|
|
if (!consume_entry(cookie, addr))
|
2017-02-14 08:42:28 +07:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for stack corruption */
|
2018-05-18 13:47:09 +07:00
|
|
|
if (unwind_error(&state))
|
2017-02-14 08:42:28 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-11-22 18:28:47 +07:00
|
|
|
/* Userspace stacktrace - based on kernel/trace/trace_sysprof.c */
|
|
|
|
|
2010-05-20 02:35:17 +07:00
|
|
|
struct stack_frame_user {
|
2008-11-22 18:28:47 +07:00
|
|
|
const void __user *next_fp;
|
2008-11-23 17:39:06 +07:00
|
|
|
unsigned long ret_addr;
|
2008-11-22 18:28:47 +07:00
|
|
|
};
|
|
|
|
|
2010-05-20 02:35:17 +07:00
|
|
|
static int
|
2020-02-15 23:28:09 +07:00
|
|
|
copy_stack_frame(const struct stack_frame_user __user *fp,
|
|
|
|
struct stack_frame_user *frame)
|
2008-11-22 18:28:47 +07:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2019-07-22 15:32:16 +07:00
|
|
|
if (__range_not_ok(fp, sizeof(*frame), TASK_SIZE))
|
2008-11-22 18:28:47 +07:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
pagefault_disable();
|
2020-02-15 23:28:09 +07:00
|
|
|
if (__get_user(frame->next_fp, &fp->next_fp) ||
|
|
|
|
__get_user(frame->ret_addr, &fp->ret_addr))
|
2008-11-22 18:28:47 +07:00
|
|
|
ret = 0;
|
|
|
|
pagefault_enable();
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-04-25 16:45:22 +07:00
|
|
|
void arch_stack_walk_user(stack_trace_consume_fn consume_entry, void *cookie,
|
|
|
|
const struct pt_regs *regs)
|
2008-11-23 17:39:06 +07:00
|
|
|
{
|
|
|
|
const void __user *fp = (const void __user *)regs->bp;
|
|
|
|
|
2020-09-14 22:34:07 +07:00
|
|
|
if (!consume_entry(cookie, regs->ip))
|
2019-04-25 16:45:22 +07:00
|
|
|
return;
|
2008-11-23 17:39:06 +07:00
|
|
|
|
2019-04-25 16:45:22 +07:00
|
|
|
while (1) {
|
2010-05-20 02:35:17 +07:00
|
|
|
struct stack_frame_user frame;
|
2008-11-23 17:39:06 +07:00
|
|
|
|
|
|
|
frame.next_fp = NULL;
|
|
|
|
frame.ret_addr = 0;
|
|
|
|
if (!copy_stack_frame(fp, &frame))
|
|
|
|
break;
|
|
|
|
if ((unsigned long)fp < regs->sp)
|
|
|
|
break;
|
2019-07-11 09:35:01 +07:00
|
|
|
if (!frame.ret_addr)
|
|
|
|
break;
|
2020-09-14 22:34:07 +07:00
|
|
|
if (!consume_entry(cookie, frame.ret_addr))
|
2008-11-23 17:39:06 +07:00
|
|
|
break;
|
|
|
|
fp = frame.next_fp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|