mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-29 14:05:19 +08:00
708b137639
Currently when unwinding starts from pt_regs or encounters pt_regs along the way unwinder tries to yield 2 unwinding entries: 1. (reliable) ip1: pt_regs->psw.addr, sp1: regs->gprs[15] 2. (non-reliable) ip2: sp1->gprs[8] (r14), sp2: regs->gprs[15] In case of kretprobes those are identical and serves no other purpose than causing confusion over duplicated entries and cause kprobes tests to fail. So, skip a duplicate non-reliable entry in this case. With that kretprobes and unwinder implementation now comply with ARCH_CORRECT_STACKTRACE_ON_KRETPROBE. Reviewed-by: Tobias Huschle <huschle@linux.ibm.com> Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
179 lines
4.7 KiB
C
179 lines
4.7 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#include <linux/sched.h>
|
|
#include <linux/sched/task.h>
|
|
#include <linux/sched/task_stack.h>
|
|
#include <linux/interrupt.h>
|
|
#include <asm/sections.h>
|
|
#include <asm/ptrace.h>
|
|
#include <asm/bitops.h>
|
|
#include <asm/stacktrace.h>
|
|
#include <asm/unwind.h>
|
|
|
|
unsigned long unwind_get_return_address(struct unwind_state *state)
|
|
{
|
|
if (unwind_done(state))
|
|
return 0;
|
|
return __kernel_text_address(state->ip) ? state->ip : 0;
|
|
}
|
|
EXPORT_SYMBOL_GPL(unwind_get_return_address);
|
|
|
|
static bool outside_of_stack(struct unwind_state *state, unsigned long sp)
|
|
{
|
|
return (sp <= state->sp) ||
|
|
(sp > state->stack_info.end - sizeof(struct stack_frame));
|
|
}
|
|
|
|
static bool update_stack_info(struct unwind_state *state, unsigned long sp)
|
|
{
|
|
struct stack_info *info = &state->stack_info;
|
|
unsigned long *mask = &state->stack_mask;
|
|
|
|
/* New stack pointer leaves the current stack */
|
|
if (get_stack_info(sp, state->task, info, mask) != 0 ||
|
|
!on_stack(info, sp, sizeof(struct stack_frame)))
|
|
/* 'sp' does not point to a valid stack */
|
|
return false;
|
|
return true;
|
|
}
|
|
|
|
static inline bool is_final_pt_regs(struct unwind_state *state,
|
|
struct pt_regs *regs)
|
|
{
|
|
/* user mode or kernel thread pt_regs at the bottom of task stack */
|
|
if (task_pt_regs(state->task) == regs)
|
|
return true;
|
|
|
|
/* user mode pt_regs at the bottom of irq stack */
|
|
return state->stack_info.type == STACK_TYPE_IRQ &&
|
|
state->stack_info.end - sizeof(struct pt_regs) == (unsigned long)regs &&
|
|
READ_ONCE_NOCHECK(regs->psw.mask) & PSW_MASK_PSTATE;
|
|
}
|
|
|
|
bool unwind_next_frame(struct unwind_state *state)
|
|
{
|
|
struct stack_info *info = &state->stack_info;
|
|
struct stack_frame *sf;
|
|
struct pt_regs *regs;
|
|
unsigned long sp, ip;
|
|
bool reliable;
|
|
|
|
regs = state->regs;
|
|
if (unlikely(regs)) {
|
|
sp = state->sp;
|
|
sf = (struct stack_frame *) sp;
|
|
ip = READ_ONCE_NOCHECK(sf->gprs[8]);
|
|
reliable = false;
|
|
regs = NULL;
|
|
/* skip bogus %r14 or if is the same as regs->psw.addr */
|
|
if (!__kernel_text_address(ip) || state->ip == unwind_recover_ret_addr(state, ip)) {
|
|
state->regs = NULL;
|
|
return unwind_next_frame(state);
|
|
}
|
|
} else {
|
|
sf = (struct stack_frame *) state->sp;
|
|
sp = READ_ONCE_NOCHECK(sf->back_chain);
|
|
if (likely(sp)) {
|
|
/* Non-zero back-chain points to the previous frame */
|
|
if (unlikely(outside_of_stack(state, sp))) {
|
|
if (!update_stack_info(state, sp))
|
|
goto out_err;
|
|
}
|
|
sf = (struct stack_frame *) sp;
|
|
ip = READ_ONCE_NOCHECK(sf->gprs[8]);
|
|
reliable = true;
|
|
} else {
|
|
/* No back-chain, look for a pt_regs structure */
|
|
sp = state->sp + STACK_FRAME_OVERHEAD;
|
|
if (!on_stack(info, sp, sizeof(struct pt_regs)))
|
|
goto out_err;
|
|
regs = (struct pt_regs *) sp;
|
|
if (is_final_pt_regs(state, regs))
|
|
goto out_stop;
|
|
ip = READ_ONCE_NOCHECK(regs->psw.addr);
|
|
sp = READ_ONCE_NOCHECK(regs->gprs[15]);
|
|
if (unlikely(outside_of_stack(state, sp))) {
|
|
if (!update_stack_info(state, sp))
|
|
goto out_err;
|
|
}
|
|
reliable = true;
|
|
}
|
|
}
|
|
|
|
/* Sanity check: ABI requires SP to be aligned 8 bytes. */
|
|
if (sp & 0x7)
|
|
goto out_err;
|
|
|
|
/* Update unwind state */
|
|
state->sp = sp;
|
|
state->regs = regs;
|
|
state->reliable = reliable;
|
|
state->ip = unwind_recover_ret_addr(state, ip);
|
|
return true;
|
|
|
|
out_err:
|
|
state->error = true;
|
|
out_stop:
|
|
state->stack_info.type = STACK_TYPE_UNKNOWN;
|
|
return false;
|
|
}
|
|
EXPORT_SYMBOL_GPL(unwind_next_frame);
|
|
|
|
void __unwind_start(struct unwind_state *state, struct task_struct *task,
|
|
struct pt_regs *regs, unsigned long first_frame)
|
|
{
|
|
struct stack_info *info = &state->stack_info;
|
|
struct stack_frame *sf;
|
|
unsigned long ip, sp;
|
|
|
|
memset(state, 0, sizeof(*state));
|
|
state->task = task;
|
|
state->regs = regs;
|
|
|
|
/* Don't even attempt to start from user mode regs: */
|
|
if (regs && user_mode(regs)) {
|
|
info->type = STACK_TYPE_UNKNOWN;
|
|
return;
|
|
}
|
|
|
|
/* Get the instruction pointer from pt_regs or the stack frame */
|
|
if (regs) {
|
|
ip = regs->psw.addr;
|
|
sp = regs->gprs[15];
|
|
} else if (task == current) {
|
|
sp = current_frame_address();
|
|
} else {
|
|
sp = task->thread.ksp;
|
|
}
|
|
|
|
/* Get current stack pointer and initialize stack info */
|
|
if (!update_stack_info(state, sp)) {
|
|
/* Something is wrong with the stack pointer */
|
|
info->type = STACK_TYPE_UNKNOWN;
|
|
state->error = true;
|
|
return;
|
|
}
|
|
|
|
if (!regs) {
|
|
/* Stack frame is within valid stack */
|
|
sf = (struct stack_frame *)sp;
|
|
ip = READ_ONCE_NOCHECK(sf->gprs[8]);
|
|
}
|
|
|
|
/* Update unwind state */
|
|
state->sp = sp;
|
|
state->reliable = true;
|
|
state->ip = unwind_recover_ret_addr(state, ip);
|
|
|
|
if (!first_frame)
|
|
return;
|
|
/* Skip through the call chain to the specified starting frame */
|
|
while (!unwind_done(state)) {
|
|
if (on_stack(&state->stack_info, first_frame, sizeof(struct stack_frame))) {
|
|
if (state->sp >= first_frame)
|
|
break;
|
|
}
|
|
unwind_next_frame(state);
|
|
}
|
|
}
|
|
EXPORT_SYMBOL_GPL(__unwind_start);
|