/** * @file backtrace.c * * @remark Copyright 2002 OProfile authors * @remark Read the file COPYING * * @author John Levon * @author David Smith */ #include #include #include #include #include struct frame_head { struct frame_head * ebp; unsigned long ret; } __attribute__((packed)); static struct frame_head * dump_kernel_backtrace(struct frame_head * head) { oprofile_add_trace(head->ret); /* frame pointers should strictly progress back up the stack * (towards higher addresses) */ if (head >= head->ebp) return NULL; return head->ebp; } static struct frame_head * dump_user_backtrace(struct frame_head * head) { struct frame_head bufhead[2]; /* Also check accessibility of one struct frame_head beyond */ if (!access_ok(VERIFY_READ, head, sizeof(bufhead))) return NULL; if (__copy_from_user_inatomic(bufhead, head, sizeof(bufhead))) return NULL; oprofile_add_trace(bufhead[0].ret); /* frame pointers should strictly progress back up the stack * (towards higher addresses) */ if (head >= bufhead[0].ebp) return NULL; return bufhead[0].ebp; } /* * | | /\ Higher addresses * | | * --------------- stack base (address of current_thread_info) * | thread info | * . . * | stack | * --------------- saved regs->ebp value if valid (frame_head address) * . . * --------------- saved regs->rsp value if x86_64 * | | * --------------- struct pt_regs * stored on stack if 32-bit * | | * . . * | | * --------------- %esp * | | * | | \/ Lower addresses * * Thus, regs (or regs->rsp for x86_64) <-> stack base restricts the * valid(ish) ebp values. Note: (1) for x86_64, NMI and several other * exceptions use special stacks, maintained by the interrupt stack table * (IST). These stacks are set up in trap_init() in * arch/x86_64/kernel/traps.c. Thus, for x86_64, regs now does not point * to the kernel stack; instead, it points to some location on the NMI * stack. On the other hand, regs->rsp is the stack pointer saved when the * NMI occurred. (2) For 32-bit, regs->esp is not valid because the * processor does not save %esp on the kernel stack when interrupts occur * in the kernel mode. */ #ifdef CONFIG_FRAME_POINTER static int valid_kernel_stack(struct frame_head * head, struct pt_regs * regs) { unsigned long headaddr = (unsigned long)head; #ifdef CONFIG_X86_64 unsigned long stack = (unsigned long)regs->rsp; #else unsigned long stack = (unsigned long)regs; #endif unsigned long stack_base = (stack & ~(THREAD_SIZE - 1)) + THREAD_SIZE; return headaddr > stack && headaddr < stack_base; } #else /* without fp, it's just junk */ static int valid_kernel_stack(struct frame_head * head, struct pt_regs * regs) { return 0; } #endif void x86_backtrace(struct pt_regs * const regs, unsigned int depth) { struct frame_head *head; #ifdef CONFIG_X86_64 head = (struct frame_head *)regs->rbp; #else head = (struct frame_head *)regs->ebp; #endif if (!user_mode_vm(regs)) { while (depth-- && valid_kernel_stack(head, regs)) head = dump_kernel_backtrace(head); return; } while (depth-- && head) head = dump_user_backtrace(head); }