David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 2 | /* |
| 3 | * Stack tracing support |
| 4 | * |
| 5 | * Copyright (C) 2012 ARM Ltd. |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 6 | */ |
| 7 | #include <linux/kernel.h> |
| 8 | #include <linux/export.h> |
| 9 | #include <linux/ftrace.h> |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 10 | #include <linux/kprobes.h> |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 11 | #include <linux/sched.h> |
| 12 | #include <linux/sched/debug.h> |
| 13 | #include <linux/sched/task_stack.h> |
| 14 | #include <linux/stacktrace.h> |
| 15 | |
| 16 | #include <asm/irq.h> |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 17 | #include <asm/pointer_auth.h> |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 18 | #include <asm/stack_pointer.h> |
| 19 | #include <asm/stacktrace.h> |
| 20 | |
| 21 | /* |
| 22 | * AArch64 PCS assigns the frame pointer to x29. |
| 23 | * |
| 24 | * A simple function prologue looks like this: |
| 25 | * sub sp, sp, #0x10 |
| 26 | * stp x29, x30, [sp] |
| 27 | * mov x29, sp |
| 28 | * |
| 29 | * A simple function epilogue looks like this: |
| 30 | * mov sp, x29 |
| 31 | * ldp x29, x30, [sp] |
| 32 | * add sp, sp, #0x10 |
| 33 | */ |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 34 | |
| 35 | /* |
| 36 | * Unwind from one frame record (A) to the next frame record (B). |
| 37 | * |
| 38 | * We terminate early if the location of B indicates a malformed chain of frame |
| 39 | * records (e.g. a cycle), determined based on the location and fp value of A |
| 40 | * and the location (but not the fp value) of B. |
| 41 | */ |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 42 | int notrace unwind_frame(struct task_struct *tsk, struct stackframe *frame) |
| 43 | { |
| 44 | unsigned long fp = frame->fp; |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 45 | struct stack_info info; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 46 | |
| 47 | if (fp & 0xf) |
| 48 | return -EINVAL; |
| 49 | |
| 50 | if (!tsk) |
| 51 | tsk = current; |
| 52 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 53 | if (!on_accessible_stack(tsk, fp, &info)) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 54 | return -EINVAL; |
| 55 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 56 | if (test_bit(info.type, frame->stacks_done)) |
| 57 | return -EINVAL; |
| 58 | |
| 59 | /* |
| 60 | * As stacks grow downward, any valid record on the same stack must be |
| 61 | * at a strictly higher address than the prior record. |
| 62 | * |
| 63 | * Stacks can nest in several valid orders, e.g. |
| 64 | * |
| 65 | * TASK -> IRQ -> OVERFLOW -> SDEI_NORMAL |
| 66 | * TASK -> SDEI_NORMAL -> SDEI_CRITICAL -> OVERFLOW |
| 67 | * |
| 68 | * ... but the nesting itself is strict. Once we transition from one |
| 69 | * stack to another, it's never valid to unwind back to that first |
| 70 | * stack. |
| 71 | */ |
| 72 | if (info.type == frame->prev_type) { |
| 73 | if (fp <= frame->prev_fp) |
| 74 | return -EINVAL; |
| 75 | } else { |
| 76 | set_bit(frame->prev_type, frame->stacks_done); |
| 77 | } |
| 78 | |
| 79 | /* |
| 80 | * Record this frame record's values and location. The prev_fp and |
| 81 | * prev_type are only meaningful to the next unwind_frame() invocation. |
| 82 | */ |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 83 | frame->fp = READ_ONCE_NOCHECK(*(unsigned long *)(fp)); |
| 84 | frame->pc = READ_ONCE_NOCHECK(*(unsigned long *)(fp + 8)); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 85 | frame->prev_fp = fp; |
| 86 | frame->prev_type = info.type; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 87 | |
| 88 | #ifdef CONFIG_FUNCTION_GRAPH_TRACER |
| 89 | if (tsk->ret_stack && |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 90 | (ptrauth_strip_insn_pac(frame->pc) == (unsigned long)return_to_handler)) { |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 91 | struct ftrace_ret_stack *ret_stack; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 92 | /* |
| 93 | * This is a case where function graph tracer has |
| 94 | * modified a return address (LR) in a stack frame |
| 95 | * to hook a function return. |
| 96 | * So replace it to an original value. |
| 97 | */ |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 98 | ret_stack = ftrace_graph_get_ret_stack(tsk, frame->graph++); |
| 99 | if (WARN_ON_ONCE(!ret_stack)) |
| 100 | return -EINVAL; |
| 101 | frame->pc = ret_stack->ret; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 102 | } |
| 103 | #endif /* CONFIG_FUNCTION_GRAPH_TRACER */ |
| 104 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 105 | frame->pc = ptrauth_strip_insn_pac(frame->pc); |
| 106 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 107 | /* |
| 108 | * Frames created upon entry from EL0 have NULL FP and PC values, so |
| 109 | * don't bother reporting these. Frames created by __noreturn functions |
| 110 | * might have a valid FP even if PC is bogus, so only terminate where |
| 111 | * both are NULL. |
| 112 | */ |
| 113 | if (!frame->fp && !frame->pc) |
| 114 | return -EINVAL; |
| 115 | |
| 116 | return 0; |
| 117 | } |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 118 | NOKPROBE_SYMBOL(unwind_frame); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 119 | |
| 120 | void notrace walk_stackframe(struct task_struct *tsk, struct stackframe *frame, |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 121 | bool (*fn)(void *, unsigned long), void *data) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 122 | { |
| 123 | while (1) { |
| 124 | int ret; |
| 125 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 126 | if (!fn(data, frame->pc)) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 127 | break; |
| 128 | ret = unwind_frame(tsk, frame); |
| 129 | if (ret < 0) |
| 130 | break; |
| 131 | } |
| 132 | } |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 133 | NOKPROBE_SYMBOL(walk_stackframe); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 134 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 135 | static void dump_backtrace_entry(unsigned long where, const char *loglvl) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 136 | { |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 137 | printk("%s %pS\n", loglvl, (void *)where); |
| 138 | } |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 139 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 140 | void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk, |
| 141 | const char *loglvl) |
| 142 | { |
| 143 | struct stackframe frame; |
| 144 | int skip = 0; |
| 145 | |
| 146 | pr_debug("%s(regs = %p tsk = %p)\n", __func__, regs, tsk); |
| 147 | |
| 148 | if (regs) { |
| 149 | if (user_mode(regs)) |
| 150 | return; |
| 151 | skip = 1; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 152 | } |
| 153 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 154 | if (!tsk) |
| 155 | tsk = current; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 156 | |
| 157 | if (!try_get_task_stack(tsk)) |
| 158 | return; |
| 159 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 160 | if (tsk == current) { |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 161 | start_backtrace(&frame, |
| 162 | (unsigned long)__builtin_frame_address(0), |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 163 | (unsigned long)dump_backtrace); |
| 164 | } else { |
| 165 | /* |
| 166 | * task blocked in __switch_to |
| 167 | */ |
| 168 | start_backtrace(&frame, |
| 169 | thread_saved_fp(tsk), |
| 170 | thread_saved_pc(tsk)); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 171 | } |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 172 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 173 | printk("%sCall trace:\n", loglvl); |
| 174 | do { |
| 175 | /* skip until specified stack frame */ |
| 176 | if (!skip) { |
| 177 | dump_backtrace_entry(frame.pc, loglvl); |
| 178 | } else if (frame.fp == regs->regs[29]) { |
| 179 | skip = 0; |
| 180 | /* |
| 181 | * Mostly, this is the case where this function is |
| 182 | * called in panic/abort. As exception handler's |
| 183 | * stack frame does not contain the corresponding pc |
| 184 | * at which an exception has taken place, use regs->pc |
| 185 | * instead. |
| 186 | */ |
| 187 | dump_backtrace_entry(regs->pc, loglvl); |
| 188 | } |
| 189 | } while (!unwind_frame(tsk, &frame)); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 190 | |
| 191 | put_task_stack(tsk); |
| 192 | } |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 193 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 194 | void show_stack(struct task_struct *tsk, unsigned long *sp, const char *loglvl) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 195 | { |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 196 | dump_backtrace(NULL, tsk, loglvl); |
| 197 | barrier(); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 198 | } |
| 199 | |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 200 | #ifdef CONFIG_STACKTRACE |
| 201 | |
| 202 | noinline notrace void arch_stack_walk(stack_trace_consume_fn consume_entry, |
| 203 | void *cookie, struct task_struct *task, |
| 204 | struct pt_regs *regs) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 205 | { |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 206 | struct stackframe frame; |
| 207 | |
| 208 | if (regs) |
| 209 | start_backtrace(&frame, regs->regs[29], regs->pc); |
| 210 | else if (task == current) |
| 211 | start_backtrace(&frame, |
| 212 | (unsigned long)__builtin_frame_address(1), |
| 213 | (unsigned long)__builtin_return_address(0)); |
| 214 | else |
| 215 | start_backtrace(&frame, thread_saved_fp(task), |
| 216 | thread_saved_pc(task)); |
| 217 | |
| 218 | walk_stackframe(task, &frame, consume_entry, cookie); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 219 | } |
| 220 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 221 | #endif |