GNU Linux-libre 6.8.7-gnu
[releases.git] / arch / x86 / kernel / unwind_orc.c
1 // SPDX-License-Identifier: GPL-2.0-only
2 #include <linux/objtool.h>
3 #include <linux/module.h>
4 #include <linux/sort.h>
5 #include <asm/ptrace.h>
6 #include <asm/stacktrace.h>
7 #include <asm/unwind.h>
8 #include <asm/orc_types.h>
9 #include <asm/orc_lookup.h>
10 #include <asm/orc_header.h>
11
12 ORC_HEADER;
13
14 #define orc_warn(fmt, ...) \
15         printk_deferred_once(KERN_WARNING "WARNING: " fmt, ##__VA_ARGS__)
16
17 #define orc_warn_current(args...)                                       \
18 ({                                                                      \
19         static bool dumped_before;                                      \
20         if (state->task == current && !state->error) {                  \
21                 orc_warn(args);                                         \
22                 if (unwind_debug && !dumped_before) {                   \
23                         dumped_before = true;                           \
24                         unwind_dump(state);                             \
25                 }                                                       \
26         }                                                               \
27 })
28
29 extern int __start_orc_unwind_ip[];
30 extern int __stop_orc_unwind_ip[];
31 extern struct orc_entry __start_orc_unwind[];
32 extern struct orc_entry __stop_orc_unwind[];
33
34 static bool orc_init __ro_after_init;
35 static bool unwind_debug __ro_after_init;
36 static unsigned int lookup_num_blocks __ro_after_init;
37
38 static int __init unwind_debug_cmdline(char *str)
39 {
40         unwind_debug = true;
41
42         return 0;
43 }
44 early_param("unwind_debug", unwind_debug_cmdline);
45
46 static void unwind_dump(struct unwind_state *state)
47 {
48         static bool dumped_before;
49         unsigned long word, *sp;
50         struct stack_info stack_info = {0};
51         unsigned long visit_mask = 0;
52
53         if (dumped_before)
54                 return;
55
56         dumped_before = true;
57
58         printk_deferred("unwind stack type:%d next_sp:%p mask:0x%lx graph_idx:%d\n",
59                         state->stack_info.type, state->stack_info.next_sp,
60                         state->stack_mask, state->graph_idx);
61
62         for (sp = __builtin_frame_address(0); sp;
63              sp = PTR_ALIGN(stack_info.next_sp, sizeof(long))) {
64                 if (get_stack_info(sp, state->task, &stack_info, &visit_mask))
65                         break;
66
67                 for (; sp < stack_info.end; sp++) {
68
69                         word = READ_ONCE_NOCHECK(*sp);
70
71                         printk_deferred("%0*lx: %0*lx (%pB)\n", BITS_PER_LONG/4,
72                                         (unsigned long)sp, BITS_PER_LONG/4,
73                                         word, (void *)word);
74                 }
75         }
76 }
77
78 static inline unsigned long orc_ip(const int *ip)
79 {
80         return (unsigned long)ip + *ip;
81 }
82
83 static struct orc_entry *__orc_find(int *ip_table, struct orc_entry *u_table,
84                                     unsigned int num_entries, unsigned long ip)
85 {
86         int *first = ip_table;
87         int *last = ip_table + num_entries - 1;
88         int *mid, *found = first;
89
90         if (!num_entries)
91                 return NULL;
92
93         /*
94          * Do a binary range search to find the rightmost duplicate of a given
95          * starting address.  Some entries are section terminators which are
96          * "weak" entries for ensuring there are no gaps.  They should be
97          * ignored when they conflict with a real entry.
98          */
99         while (first <= last) {
100                 mid = first + ((last - first) / 2);
101
102                 if (orc_ip(mid) <= ip) {
103                         found = mid;
104                         first = mid + 1;
105                 } else
106                         last = mid - 1;
107         }
108
109         return u_table + (found - ip_table);
110 }
111
112 #ifdef CONFIG_MODULES
113 static struct orc_entry *orc_module_find(unsigned long ip)
114 {
115         struct module *mod;
116
117         mod = __module_address(ip);
118         if (!mod || !mod->arch.orc_unwind || !mod->arch.orc_unwind_ip)
119                 return NULL;
120         return __orc_find(mod->arch.orc_unwind_ip, mod->arch.orc_unwind,
121                           mod->arch.num_orcs, ip);
122 }
123 #else
124 static struct orc_entry *orc_module_find(unsigned long ip)
125 {
126         return NULL;
127 }
128 #endif
129
130 #ifdef CONFIG_DYNAMIC_FTRACE
131 static struct orc_entry *orc_find(unsigned long ip);
132
133 /*
134  * Ftrace dynamic trampolines do not have orc entries of their own.
135  * But they are copies of the ftrace entries that are static and
136  * defined in ftrace_*.S, which do have orc entries.
137  *
138  * If the unwinder comes across a ftrace trampoline, then find the
139  * ftrace function that was used to create it, and use that ftrace
140  * function's orc entry, as the placement of the return code in
141  * the stack will be identical.
142  */
143 static struct orc_entry *orc_ftrace_find(unsigned long ip)
144 {
145         struct ftrace_ops *ops;
146         unsigned long tramp_addr, offset;
147
148         ops = ftrace_ops_trampoline(ip);
149         if (!ops)
150                 return NULL;
151
152         /* Set tramp_addr to the start of the code copied by the trampoline */
153         if (ops->flags & FTRACE_OPS_FL_SAVE_REGS)
154                 tramp_addr = (unsigned long)ftrace_regs_caller;
155         else
156                 tramp_addr = (unsigned long)ftrace_caller;
157
158         /* Now place tramp_addr to the location within the trampoline ip is at */
159         offset = ip - ops->trampoline;
160         tramp_addr += offset;
161
162         /* Prevent unlikely recursion */
163         if (ip == tramp_addr)
164                 return NULL;
165
166         return orc_find(tramp_addr);
167 }
168 #else
169 static struct orc_entry *orc_ftrace_find(unsigned long ip)
170 {
171         return NULL;
172 }
173 #endif
174
175 /*
176  * If we crash with IP==0, the last successfully executed instruction
177  * was probably an indirect function call with a NULL function pointer,
178  * and we don't have unwind information for NULL.
179  * This hardcoded ORC entry for IP==0 allows us to unwind from a NULL function
180  * pointer into its parent and then continue normally from there.
181  */
182 static struct orc_entry null_orc_entry = {
183         .sp_offset = sizeof(long),
184         .sp_reg = ORC_REG_SP,
185         .bp_reg = ORC_REG_UNDEFINED,
186         .type = ORC_TYPE_CALL
187 };
188
189 /* Fake frame pointer entry -- used as a fallback for generated code */
190 static struct orc_entry orc_fp_entry = {
191         .type           = ORC_TYPE_CALL,
192         .sp_reg         = ORC_REG_BP,
193         .sp_offset      = 16,
194         .bp_reg         = ORC_REG_PREV_SP,
195         .bp_offset      = -16,
196 };
197
198 static struct orc_entry *orc_find(unsigned long ip)
199 {
200         static struct orc_entry *orc;
201
202         if (ip == 0)
203                 return &null_orc_entry;
204
205         /* For non-init vmlinux addresses, use the fast lookup table: */
206         if (ip >= LOOKUP_START_IP && ip < LOOKUP_STOP_IP) {
207                 unsigned int idx, start, stop;
208
209                 idx = (ip - LOOKUP_START_IP) / LOOKUP_BLOCK_SIZE;
210
211                 if (unlikely((idx >= lookup_num_blocks-1))) {
212                         orc_warn("WARNING: bad lookup idx: idx=%u num=%u ip=%pB\n",
213                                  idx, lookup_num_blocks, (void *)ip);
214                         return NULL;
215                 }
216
217                 start = orc_lookup[idx];
218                 stop = orc_lookup[idx + 1] + 1;
219
220                 if (unlikely((__start_orc_unwind + start >= __stop_orc_unwind) ||
221                              (__start_orc_unwind + stop > __stop_orc_unwind))) {
222                         orc_warn("WARNING: bad lookup value: idx=%u num=%u start=%u stop=%u ip=%pB\n",
223                                  idx, lookup_num_blocks, start, stop, (void *)ip);
224                         return NULL;
225                 }
226
227                 return __orc_find(__start_orc_unwind_ip + start,
228                                   __start_orc_unwind + start, stop - start, ip);
229         }
230
231         /* vmlinux .init slow lookup: */
232         if (is_kernel_inittext(ip))
233                 return __orc_find(__start_orc_unwind_ip, __start_orc_unwind,
234                                   __stop_orc_unwind_ip - __start_orc_unwind_ip, ip);
235
236         /* Module lookup: */
237         orc = orc_module_find(ip);
238         if (orc)
239                 return orc;
240
241         return orc_ftrace_find(ip);
242 }
243
244 #ifdef CONFIG_MODULES
245
246 static DEFINE_MUTEX(sort_mutex);
247 static int *cur_orc_ip_table = __start_orc_unwind_ip;
248 static struct orc_entry *cur_orc_table = __start_orc_unwind;
249
250 static void orc_sort_swap(void *_a, void *_b, int size)
251 {
252         struct orc_entry *orc_a, *orc_b;
253         int *a = _a, *b = _b, tmp;
254         int delta = _b - _a;
255
256         /* Swap the .orc_unwind_ip entries: */
257         tmp = *a;
258         *a = *b + delta;
259         *b = tmp - delta;
260
261         /* Swap the corresponding .orc_unwind entries: */
262         orc_a = cur_orc_table + (a - cur_orc_ip_table);
263         orc_b = cur_orc_table + (b - cur_orc_ip_table);
264         swap(*orc_a, *orc_b);
265 }
266
267 static int orc_sort_cmp(const void *_a, const void *_b)
268 {
269         struct orc_entry *orc_a;
270         const int *a = _a, *b = _b;
271         unsigned long a_val = orc_ip(a);
272         unsigned long b_val = orc_ip(b);
273
274         if (a_val > b_val)
275                 return 1;
276         if (a_val < b_val)
277                 return -1;
278
279         /*
280          * The "weak" section terminator entries need to always be first
281          * to ensure the lookup code skips them in favor of real entries.
282          * These terminator entries exist to handle any gaps created by
283          * whitelisted .o files which didn't get objtool generation.
284          */
285         orc_a = cur_orc_table + (a - cur_orc_ip_table);
286         return orc_a->type == ORC_TYPE_UNDEFINED ? -1 : 1;
287 }
288
289 void unwind_module_init(struct module *mod, void *_orc_ip, size_t orc_ip_size,
290                         void *_orc, size_t orc_size)
291 {
292         int *orc_ip = _orc_ip;
293         struct orc_entry *orc = _orc;
294         unsigned int num_entries = orc_ip_size / sizeof(int);
295
296         WARN_ON_ONCE(orc_ip_size % sizeof(int) != 0 ||
297                      orc_size % sizeof(*orc) != 0 ||
298                      num_entries != orc_size / sizeof(*orc));
299
300         /*
301          * The 'cur_orc_*' globals allow the orc_sort_swap() callback to
302          * associate an .orc_unwind_ip table entry with its corresponding
303          * .orc_unwind entry so they can both be swapped.
304          */
305         mutex_lock(&sort_mutex);
306         cur_orc_ip_table = orc_ip;
307         cur_orc_table = orc;
308         sort(orc_ip, num_entries, sizeof(int), orc_sort_cmp, orc_sort_swap);
309         mutex_unlock(&sort_mutex);
310
311         mod->arch.orc_unwind_ip = orc_ip;
312         mod->arch.orc_unwind = orc;
313         mod->arch.num_orcs = num_entries;
314 }
315 #endif
316
317 void __init unwind_init(void)
318 {
319         size_t orc_ip_size = (void *)__stop_orc_unwind_ip - (void *)__start_orc_unwind_ip;
320         size_t orc_size = (void *)__stop_orc_unwind - (void *)__start_orc_unwind;
321         size_t num_entries = orc_ip_size / sizeof(int);
322         struct orc_entry *orc;
323         int i;
324
325         if (!num_entries || orc_ip_size % sizeof(int) != 0 ||
326             orc_size % sizeof(struct orc_entry) != 0 ||
327             num_entries != orc_size / sizeof(struct orc_entry)) {
328                 orc_warn("WARNING: Bad or missing .orc_unwind table.  Disabling unwinder.\n");
329                 return;
330         }
331
332         /*
333          * Note, the orc_unwind and orc_unwind_ip tables were already
334          * sorted at build time via the 'sorttable' tool.
335          * It's ready for binary search straight away, no need to sort it.
336          */
337
338         /* Initialize the fast lookup table: */
339         lookup_num_blocks = orc_lookup_end - orc_lookup;
340         for (i = 0; i < lookup_num_blocks-1; i++) {
341                 orc = __orc_find(__start_orc_unwind_ip, __start_orc_unwind,
342                                  num_entries,
343                                  LOOKUP_START_IP + (LOOKUP_BLOCK_SIZE * i));
344                 if (!orc) {
345                         orc_warn("WARNING: Corrupt .orc_unwind table.  Disabling unwinder.\n");
346                         return;
347                 }
348
349                 orc_lookup[i] = orc - __start_orc_unwind;
350         }
351
352         /* Initialize the ending block: */
353         orc = __orc_find(__start_orc_unwind_ip, __start_orc_unwind, num_entries,
354                          LOOKUP_STOP_IP);
355         if (!orc) {
356                 orc_warn("WARNING: Corrupt .orc_unwind table.  Disabling unwinder.\n");
357                 return;
358         }
359         orc_lookup[lookup_num_blocks-1] = orc - __start_orc_unwind;
360
361         orc_init = true;
362 }
363
364 unsigned long unwind_get_return_address(struct unwind_state *state)
365 {
366         if (unwind_done(state))
367                 return 0;
368
369         return __kernel_text_address(state->ip) ? state->ip : 0;
370 }
371 EXPORT_SYMBOL_GPL(unwind_get_return_address);
372
373 unsigned long *unwind_get_return_address_ptr(struct unwind_state *state)
374 {
375         if (unwind_done(state))
376                 return NULL;
377
378         if (state->regs)
379                 return &state->regs->ip;
380
381         if (state->sp)
382                 return (unsigned long *)state->sp - 1;
383
384         return NULL;
385 }
386
387 static bool stack_access_ok(struct unwind_state *state, unsigned long _addr,
388                             size_t len)
389 {
390         struct stack_info *info = &state->stack_info;
391         void *addr = (void *)_addr;
392
393         if (on_stack(info, addr, len))
394                 return true;
395
396         return !get_stack_info(addr, state->task, info, &state->stack_mask) &&
397                 on_stack(info, addr, len);
398 }
399
400 static bool deref_stack_reg(struct unwind_state *state, unsigned long addr,
401                             unsigned long *val)
402 {
403         if (!stack_access_ok(state, addr, sizeof(long)))
404                 return false;
405
406         *val = READ_ONCE_NOCHECK(*(unsigned long *)addr);
407         return true;
408 }
409
410 static bool deref_stack_regs(struct unwind_state *state, unsigned long addr,
411                              unsigned long *ip, unsigned long *sp)
412 {
413         struct pt_regs *regs = (struct pt_regs *)addr;
414
415         /* x86-32 support will be more complicated due to the &regs->sp hack */
416         BUILD_BUG_ON(IS_ENABLED(CONFIG_X86_32));
417
418         if (!stack_access_ok(state, addr, sizeof(struct pt_regs)))
419                 return false;
420
421         *ip = READ_ONCE_NOCHECK(regs->ip);
422         *sp = READ_ONCE_NOCHECK(regs->sp);
423         return true;
424 }
425
426 static bool deref_stack_iret_regs(struct unwind_state *state, unsigned long addr,
427                                   unsigned long *ip, unsigned long *sp)
428 {
429         struct pt_regs *regs = (void *)addr - IRET_FRAME_OFFSET;
430
431         if (!stack_access_ok(state, addr, IRET_FRAME_SIZE))
432                 return false;
433
434         *ip = READ_ONCE_NOCHECK(regs->ip);
435         *sp = READ_ONCE_NOCHECK(regs->sp);
436         return true;
437 }
438
439 /*
440  * If state->regs is non-NULL, and points to a full pt_regs, just get the reg
441  * value from state->regs.
442  *
443  * Otherwise, if state->regs just points to IRET regs, and the previous frame
444  * had full regs, it's safe to get the value from the previous regs.  This can
445  * happen when early/late IRQ entry code gets interrupted by an NMI.
446  */
447 static bool get_reg(struct unwind_state *state, unsigned int reg_off,
448                     unsigned long *val)
449 {
450         unsigned int reg = reg_off/8;
451
452         if (!state->regs)
453                 return false;
454
455         if (state->full_regs) {
456                 *val = READ_ONCE_NOCHECK(((unsigned long *)state->regs)[reg]);
457                 return true;
458         }
459
460         if (state->prev_regs) {
461                 *val = READ_ONCE_NOCHECK(((unsigned long *)state->prev_regs)[reg]);
462                 return true;
463         }
464
465         return false;
466 }
467
468 bool unwind_next_frame(struct unwind_state *state)
469 {
470         unsigned long ip_p, sp, tmp, orig_ip = state->ip, prev_sp = state->sp;
471         enum stack_type prev_type = state->stack_info.type;
472         struct orc_entry *orc;
473         bool indirect = false;
474
475         if (unwind_done(state))
476                 return false;
477
478         /* Don't let modules unload while we're reading their ORC data. */
479         preempt_disable();
480
481         /* End-of-stack check for user tasks: */
482         if (state->regs && user_mode(state->regs))
483                 goto the_end;
484
485         /*
486          * Find the orc_entry associated with the text address.
487          *
488          * For a call frame (as opposed to a signal frame), state->ip points to
489          * the instruction after the call.  That instruction's stack layout
490          * could be different from the call instruction's layout, for example
491          * if the call was to a noreturn function.  So get the ORC data for the
492          * call instruction itself.
493          */
494         orc = orc_find(state->signal ? state->ip : state->ip - 1);
495         if (!orc) {
496                 /*
497                  * As a fallback, try to assume this code uses a frame pointer.
498                  * This is useful for generated code, like BPF, which ORC
499                  * doesn't know about.  This is just a guess, so the rest of
500                  * the unwind is no longer considered reliable.
501                  */
502                 orc = &orc_fp_entry;
503                 state->error = true;
504         } else {
505                 if (orc->type == ORC_TYPE_UNDEFINED)
506                         goto err;
507
508                 if (orc->type == ORC_TYPE_END_OF_STACK)
509                         goto the_end;
510         }
511
512         state->signal = orc->signal;
513
514         /* Find the previous frame's stack: */
515         switch (orc->sp_reg) {
516         case ORC_REG_SP:
517                 sp = state->sp + orc->sp_offset;
518                 break;
519
520         case ORC_REG_BP:
521                 sp = state->bp + orc->sp_offset;
522                 break;
523
524         case ORC_REG_SP_INDIRECT:
525                 sp = state->sp;
526                 indirect = true;
527                 break;
528
529         case ORC_REG_BP_INDIRECT:
530                 sp = state->bp + orc->sp_offset;
531                 indirect = true;
532                 break;
533
534         case ORC_REG_R10:
535                 if (!get_reg(state, offsetof(struct pt_regs, r10), &sp)) {
536                         orc_warn_current("missing R10 value at %pB\n",
537                                          (void *)state->ip);
538                         goto err;
539                 }
540                 break;
541
542         case ORC_REG_R13:
543                 if (!get_reg(state, offsetof(struct pt_regs, r13), &sp)) {
544                         orc_warn_current("missing R13 value at %pB\n",
545                                          (void *)state->ip);
546                         goto err;
547                 }
548                 break;
549
550         case ORC_REG_DI:
551                 if (!get_reg(state, offsetof(struct pt_regs, di), &sp)) {
552                         orc_warn_current("missing RDI value at %pB\n",
553                                          (void *)state->ip);
554                         goto err;
555                 }
556                 break;
557
558         case ORC_REG_DX:
559                 if (!get_reg(state, offsetof(struct pt_regs, dx), &sp)) {
560                         orc_warn_current("missing DX value at %pB\n",
561                                          (void *)state->ip);
562                         goto err;
563                 }
564                 break;
565
566         default:
567                 orc_warn("unknown SP base reg %d at %pB\n",
568                          orc->sp_reg, (void *)state->ip);
569                 goto err;
570         }
571
572         if (indirect) {
573                 if (!deref_stack_reg(state, sp, &sp))
574                         goto err;
575
576                 if (orc->sp_reg == ORC_REG_SP_INDIRECT)
577                         sp += orc->sp_offset;
578         }
579
580         /* Find IP, SP and possibly regs: */
581         switch (orc->type) {
582         case ORC_TYPE_CALL:
583                 ip_p = sp - sizeof(long);
584
585                 if (!deref_stack_reg(state, ip_p, &state->ip))
586                         goto err;
587
588                 state->ip = unwind_recover_ret_addr(state, state->ip,
589                                                     (unsigned long *)ip_p);
590                 state->sp = sp;
591                 state->regs = NULL;
592                 state->prev_regs = NULL;
593                 break;
594
595         case ORC_TYPE_REGS:
596                 if (!deref_stack_regs(state, sp, &state->ip, &state->sp)) {
597                         orc_warn_current("can't access registers at %pB\n",
598                                          (void *)orig_ip);
599                         goto err;
600                 }
601                 /*
602                  * There is a small chance to interrupt at the entry of
603                  * arch_rethook_trampoline() where the ORC info doesn't exist.
604                  * That point is right after the RET to arch_rethook_trampoline()
605                  * which was modified return address.
606                  * At that point, the @addr_p of the unwind_recover_rethook()
607                  * (this has to point the address of the stack entry storing
608                  * the modified return address) must be "SP - (a stack entry)"
609                  * because SP is incremented by the RET.
610                  */
611                 state->ip = unwind_recover_rethook(state, state->ip,
612                                 (unsigned long *)(state->sp - sizeof(long)));
613                 state->regs = (struct pt_regs *)sp;
614                 state->prev_regs = NULL;
615                 state->full_regs = true;
616                 break;
617
618         case ORC_TYPE_REGS_PARTIAL:
619                 if (!deref_stack_iret_regs(state, sp, &state->ip, &state->sp)) {
620                         orc_warn_current("can't access iret registers at %pB\n",
621                                          (void *)orig_ip);
622                         goto err;
623                 }
624                 /* See ORC_TYPE_REGS case comment. */
625                 state->ip = unwind_recover_rethook(state, state->ip,
626                                 (unsigned long *)(state->sp - sizeof(long)));
627
628                 if (state->full_regs)
629                         state->prev_regs = state->regs;
630                 state->regs = (void *)sp - IRET_FRAME_OFFSET;
631                 state->full_regs = false;
632                 break;
633
634         default:
635                 orc_warn("unknown .orc_unwind entry type %d at %pB\n",
636                          orc->type, (void *)orig_ip);
637                 goto err;
638         }
639
640         /* Find BP: */
641         switch (orc->bp_reg) {
642         case ORC_REG_UNDEFINED:
643                 if (get_reg(state, offsetof(struct pt_regs, bp), &tmp))
644                         state->bp = tmp;
645                 break;
646
647         case ORC_REG_PREV_SP:
648                 if (!deref_stack_reg(state, sp + orc->bp_offset, &state->bp))
649                         goto err;
650                 break;
651
652         case ORC_REG_BP:
653                 if (!deref_stack_reg(state, state->bp + orc->bp_offset, &state->bp))
654                         goto err;
655                 break;
656
657         default:
658                 orc_warn("unknown BP base reg %d for ip %pB\n",
659                          orc->bp_reg, (void *)orig_ip);
660                 goto err;
661         }
662
663         /* Prevent a recursive loop due to bad ORC data: */
664         if (state->stack_info.type == prev_type &&
665             on_stack(&state->stack_info, (void *)state->sp, sizeof(long)) &&
666             state->sp <= prev_sp) {
667                 orc_warn_current("stack going in the wrong direction? at %pB\n",
668                                  (void *)orig_ip);
669                 goto err;
670         }
671
672         preempt_enable();
673         return true;
674
675 err:
676         state->error = true;
677
678 the_end:
679         preempt_enable();
680         state->stack_info.type = STACK_TYPE_UNKNOWN;
681         return false;
682 }
683 EXPORT_SYMBOL_GPL(unwind_next_frame);
684
685 void __unwind_start(struct unwind_state *state, struct task_struct *task,
686                     struct pt_regs *regs, unsigned long *first_frame)
687 {
688         memset(state, 0, sizeof(*state));
689         state->task = task;
690
691         if (!orc_init)
692                 goto err;
693
694         /*
695          * Refuse to unwind the stack of a task while it's executing on another
696          * CPU.  This check is racy, but that's ok: the unwinder has other
697          * checks to prevent it from going off the rails.
698          */
699         if (task_on_another_cpu(task))
700                 goto err;
701
702         if (regs) {
703                 if (user_mode(regs))
704                         goto the_end;
705
706                 state->ip = regs->ip;
707                 state->sp = regs->sp;
708                 state->bp = regs->bp;
709                 state->regs = regs;
710                 state->full_regs = true;
711                 state->signal = true;
712
713         } else if (task == current) {
714                 asm volatile("lea (%%rip), %0\n\t"
715                              "mov %%rsp, %1\n\t"
716                              "mov %%rbp, %2\n\t"
717                              : "=r" (state->ip), "=r" (state->sp),
718                                "=r" (state->bp));
719
720         } else {
721                 struct inactive_task_frame *frame = (void *)task->thread.sp;
722
723                 state->sp = task->thread.sp + sizeof(*frame);
724                 state->bp = READ_ONCE_NOCHECK(frame->bp);
725                 state->ip = READ_ONCE_NOCHECK(frame->ret_addr);
726                 state->signal = (void *)state->ip == ret_from_fork;
727         }
728
729         if (get_stack_info((unsigned long *)state->sp, state->task,
730                            &state->stack_info, &state->stack_mask)) {
731                 /*
732                  * We weren't on a valid stack.  It's possible that
733                  * we overflowed a valid stack into a guard page.
734                  * See if the next page up is valid so that we can
735                  * generate some kind of backtrace if this happens.
736                  */
737                 void *next_page = (void *)PAGE_ALIGN((unsigned long)state->sp);
738                 state->error = true;
739                 if (get_stack_info(next_page, state->task, &state->stack_info,
740                                    &state->stack_mask))
741                         return;
742         }
743
744         /*
745          * The caller can provide the address of the first frame directly
746          * (first_frame) or indirectly (regs->sp) to indicate which stack frame
747          * to start unwinding at.  Skip ahead until we reach it.
748          */
749
750         /* When starting from regs, skip the regs frame: */
751         if (regs) {
752                 unwind_next_frame(state);
753                 return;
754         }
755
756         /* Otherwise, skip ahead to the user-specified starting frame: */
757         while (!unwind_done(state) &&
758                (!on_stack(&state->stack_info, first_frame, sizeof(long)) ||
759                         state->sp <= (unsigned long)first_frame))
760                 unwind_next_frame(state);
761
762         return;
763
764 err:
765         state->error = true;
766 the_end:
767         state->stack_info.type = STACK_TYPE_UNKNOWN;
768 }
769 EXPORT_SYMBOL_GPL(__unwind_start);