1 // SPDX-License-Identifier: GPL-2.0-only
2 #include <linux/objtool.h>
3 #include <linux/module.h>
4 #include <linux/sort.h>
5 #include <asm/ptrace.h>
6 #include <asm/stacktrace.h>
7 #include <asm/unwind.h>
8 #include <asm/orc_types.h>
9 #include <asm/orc_lookup.h>
10 
11 #define orc_warn(fmt, ...) \
12 	printk_deferred_once(KERN_WARNING "WARNING: " fmt, ##__VA_ARGS__)
13 
14 #define orc_warn_current(args...)					\
15 ({									\
16 	if (state->task == current)					\
17 		orc_warn(args);						\
18 })
19 
20 extern int __start_orc_unwind_ip[];
21 extern int __stop_orc_unwind_ip[];
22 extern struct orc_entry __start_orc_unwind[];
23 extern struct orc_entry __stop_orc_unwind[];
24 
25 static bool orc_init __ro_after_init;
26 static unsigned int lookup_num_blocks __ro_after_init;
27 
orc_ip(const int * ip)28 static inline unsigned long orc_ip(const int *ip)
29 {
30 	return (unsigned long)ip + *ip;
31 }
32 
__orc_find(int * ip_table,struct orc_entry * u_table,unsigned int num_entries,unsigned long ip)33 static struct orc_entry *__orc_find(int *ip_table, struct orc_entry *u_table,
34 				    unsigned int num_entries, unsigned long ip)
35 {
36 	int *first = ip_table;
37 	int *last = ip_table + num_entries - 1;
38 	int *mid = first, *found = first;
39 
40 	if (!num_entries)
41 		return NULL;
42 
43 	/*
44 	 * Do a binary range search to find the rightmost duplicate of a given
45 	 * starting address.  Some entries are section terminators which are
46 	 * "weak" entries for ensuring there are no gaps.  They should be
47 	 * ignored when they conflict with a real entry.
48 	 */
49 	while (first <= last) {
50 		mid = first + ((last - first) / 2);
51 
52 		if (orc_ip(mid) <= ip) {
53 			found = mid;
54 			first = mid + 1;
55 		} else
56 			last = mid - 1;
57 	}
58 
59 	return u_table + (found - ip_table);
60 }
61 
62 #ifdef CONFIG_MODULES
orc_module_find(unsigned long ip)63 static struct orc_entry *orc_module_find(unsigned long ip)
64 {
65 	struct module *mod;
66 
67 	mod = __module_address(ip);
68 	if (!mod || !mod->arch.orc_unwind || !mod->arch.orc_unwind_ip)
69 		return NULL;
70 	return __orc_find(mod->arch.orc_unwind_ip, mod->arch.orc_unwind,
71 			  mod->arch.num_orcs, ip);
72 }
73 #else
orc_module_find(unsigned long ip)74 static struct orc_entry *orc_module_find(unsigned long ip)
75 {
76 	return NULL;
77 }
78 #endif
79 
80 #ifdef CONFIG_DYNAMIC_FTRACE
81 static struct orc_entry *orc_find(unsigned long ip);
82 
83 /*
84  * Ftrace dynamic trampolines do not have orc entries of their own.
85  * But they are copies of the ftrace entries that are static and
86  * defined in ftrace_*.S, which do have orc entries.
87  *
88  * If the unwinder comes across a ftrace trampoline, then find the
89  * ftrace function that was used to create it, and use that ftrace
90  * function's orc entry, as the placement of the return code in
91  * the stack will be identical.
92  */
orc_ftrace_find(unsigned long ip)93 static struct orc_entry *orc_ftrace_find(unsigned long ip)
94 {
95 	struct ftrace_ops *ops;
96 	unsigned long caller;
97 
98 	ops = ftrace_ops_trampoline(ip);
99 	if (!ops)
100 		return NULL;
101 
102 	if (ops->flags & FTRACE_OPS_FL_SAVE_REGS)
103 		caller = (unsigned long)ftrace_regs_call;
104 	else
105 		caller = (unsigned long)ftrace_call;
106 
107 	/* Prevent unlikely recursion */
108 	if (ip == caller)
109 		return NULL;
110 
111 	return orc_find(caller);
112 }
113 #else
orc_ftrace_find(unsigned long ip)114 static struct orc_entry *orc_ftrace_find(unsigned long ip)
115 {
116 	return NULL;
117 }
118 #endif
119 
120 /*
121  * If we crash with IP==0, the last successfully executed instruction
122  * was probably an indirect function call with a NULL function pointer,
123  * and we don't have unwind information for NULL.
124  * This hardcoded ORC entry for IP==0 allows us to unwind from a NULL function
125  * pointer into its parent and then continue normally from there.
126  */
127 static struct orc_entry null_orc_entry = {
128 	.sp_offset = sizeof(long),
129 	.sp_reg = ORC_REG_SP,
130 	.bp_reg = ORC_REG_UNDEFINED,
131 	.type = UNWIND_HINT_TYPE_CALL
132 };
133 
134 /* Fake frame pointer entry -- used as a fallback for generated code */
135 static struct orc_entry orc_fp_entry = {
136 	.type		= UNWIND_HINT_TYPE_CALL,
137 	.sp_reg		= ORC_REG_BP,
138 	.sp_offset	= 16,
139 	.bp_reg		= ORC_REG_PREV_SP,
140 	.bp_offset	= -16,
141 	.end		= 0,
142 };
143 
orc_find(unsigned long ip)144 static struct orc_entry *orc_find(unsigned long ip)
145 {
146 	static struct orc_entry *orc;
147 
148 	if (ip == 0)
149 		return &null_orc_entry;
150 
151 	/* For non-init vmlinux addresses, use the fast lookup table: */
152 	if (ip >= LOOKUP_START_IP && ip < LOOKUP_STOP_IP) {
153 		unsigned int idx, start, stop;
154 
155 		idx = (ip - LOOKUP_START_IP) / LOOKUP_BLOCK_SIZE;
156 
157 		if (unlikely((idx >= lookup_num_blocks-1))) {
158 			orc_warn("WARNING: bad lookup idx: idx=%u num=%u ip=%pB\n",
159 				 idx, lookup_num_blocks, (void *)ip);
160 			return NULL;
161 		}
162 
163 		start = orc_lookup[idx];
164 		stop = orc_lookup[idx + 1] + 1;
165 
166 		if (unlikely((__start_orc_unwind + start >= __stop_orc_unwind) ||
167 			     (__start_orc_unwind + stop > __stop_orc_unwind))) {
168 			orc_warn("WARNING: bad lookup value: idx=%u num=%u start=%u stop=%u ip=%pB\n",
169 				 idx, lookup_num_blocks, start, stop, (void *)ip);
170 			return NULL;
171 		}
172 
173 		return __orc_find(__start_orc_unwind_ip + start,
174 				  __start_orc_unwind + start, stop - start, ip);
175 	}
176 
177 	/* vmlinux .init slow lookup: */
178 	if (init_kernel_text(ip))
179 		return __orc_find(__start_orc_unwind_ip, __start_orc_unwind,
180 				  __stop_orc_unwind_ip - __start_orc_unwind_ip, ip);
181 
182 	/* Module lookup: */
183 	orc = orc_module_find(ip);
184 	if (orc)
185 		return orc;
186 
187 	return orc_ftrace_find(ip);
188 }
189 
190 #ifdef CONFIG_MODULES
191 
192 static DEFINE_MUTEX(sort_mutex);
193 static int *cur_orc_ip_table = __start_orc_unwind_ip;
194 static struct orc_entry *cur_orc_table = __start_orc_unwind;
195 
orc_sort_swap(void * _a,void * _b,int size)196 static void orc_sort_swap(void *_a, void *_b, int size)
197 {
198 	struct orc_entry *orc_a, *orc_b;
199 	struct orc_entry orc_tmp;
200 	int *a = _a, *b = _b, tmp;
201 	int delta = _b - _a;
202 
203 	/* Swap the .orc_unwind_ip entries: */
204 	tmp = *a;
205 	*a = *b + delta;
206 	*b = tmp - delta;
207 
208 	/* Swap the corresponding .orc_unwind entries: */
209 	orc_a = cur_orc_table + (a - cur_orc_ip_table);
210 	orc_b = cur_orc_table + (b - cur_orc_ip_table);
211 	orc_tmp = *orc_a;
212 	*orc_a = *orc_b;
213 	*orc_b = orc_tmp;
214 }
215 
orc_sort_cmp(const void * _a,const void * _b)216 static int orc_sort_cmp(const void *_a, const void *_b)
217 {
218 	struct orc_entry *orc_a;
219 	const int *a = _a, *b = _b;
220 	unsigned long a_val = orc_ip(a);
221 	unsigned long b_val = orc_ip(b);
222 
223 	if (a_val > b_val)
224 		return 1;
225 	if (a_val < b_val)
226 		return -1;
227 
228 	/*
229 	 * The "weak" section terminator entries need to always be on the left
230 	 * to ensure the lookup code skips them in favor of real entries.
231 	 * These terminator entries exist to handle any gaps created by
232 	 * whitelisted .o files which didn't get objtool generation.
233 	 */
234 	orc_a = cur_orc_table + (a - cur_orc_ip_table);
235 	return orc_a->sp_reg == ORC_REG_UNDEFINED && !orc_a->end ? -1 : 1;
236 }
237 
unwind_module_init(struct module * mod,void * _orc_ip,size_t orc_ip_size,void * _orc,size_t orc_size)238 void unwind_module_init(struct module *mod, void *_orc_ip, size_t orc_ip_size,
239 			void *_orc, size_t orc_size)
240 {
241 	int *orc_ip = _orc_ip;
242 	struct orc_entry *orc = _orc;
243 	unsigned int num_entries = orc_ip_size / sizeof(int);
244 
245 	WARN_ON_ONCE(orc_ip_size % sizeof(int) != 0 ||
246 		     orc_size % sizeof(*orc) != 0 ||
247 		     num_entries != orc_size / sizeof(*orc));
248 
249 	/*
250 	 * The 'cur_orc_*' globals allow the orc_sort_swap() callback to
251 	 * associate an .orc_unwind_ip table entry with its corresponding
252 	 * .orc_unwind entry so they can both be swapped.
253 	 */
254 	mutex_lock(&sort_mutex);
255 	cur_orc_ip_table = orc_ip;
256 	cur_orc_table = orc;
257 	sort(orc_ip, num_entries, sizeof(int), orc_sort_cmp, orc_sort_swap);
258 	mutex_unlock(&sort_mutex);
259 
260 	mod->arch.orc_unwind_ip = orc_ip;
261 	mod->arch.orc_unwind = orc;
262 	mod->arch.num_orcs = num_entries;
263 }
264 #endif
265 
unwind_init(void)266 void __init unwind_init(void)
267 {
268 	size_t orc_ip_size = (void *)__stop_orc_unwind_ip - (void *)__start_orc_unwind_ip;
269 	size_t orc_size = (void *)__stop_orc_unwind - (void *)__start_orc_unwind;
270 	size_t num_entries = orc_ip_size / sizeof(int);
271 	struct orc_entry *orc;
272 	int i;
273 
274 	if (!num_entries || orc_ip_size % sizeof(int) != 0 ||
275 	    orc_size % sizeof(struct orc_entry) != 0 ||
276 	    num_entries != orc_size / sizeof(struct orc_entry)) {
277 		orc_warn("WARNING: Bad or missing .orc_unwind table.  Disabling unwinder.\n");
278 		return;
279 	}
280 
281 	/*
282 	 * Note, the orc_unwind and orc_unwind_ip tables were already
283 	 * sorted at build time via the 'sorttable' tool.
284 	 * It's ready for binary search straight away, no need to sort it.
285 	 */
286 
287 	/* Initialize the fast lookup table: */
288 	lookup_num_blocks = orc_lookup_end - orc_lookup;
289 	for (i = 0; i < lookup_num_blocks-1; i++) {
290 		orc = __orc_find(__start_orc_unwind_ip, __start_orc_unwind,
291 				 num_entries,
292 				 LOOKUP_START_IP + (LOOKUP_BLOCK_SIZE * i));
293 		if (!orc) {
294 			orc_warn("WARNING: Corrupt .orc_unwind table.  Disabling unwinder.\n");
295 			return;
296 		}
297 
298 		orc_lookup[i] = orc - __start_orc_unwind;
299 	}
300 
301 	/* Initialize the ending block: */
302 	orc = __orc_find(__start_orc_unwind_ip, __start_orc_unwind, num_entries,
303 			 LOOKUP_STOP_IP);
304 	if (!orc) {
305 		orc_warn("WARNING: Corrupt .orc_unwind table.  Disabling unwinder.\n");
306 		return;
307 	}
308 	orc_lookup[lookup_num_blocks-1] = orc - __start_orc_unwind;
309 
310 	orc_init = true;
311 }
312 
unwind_get_return_address(struct unwind_state * state)313 unsigned long unwind_get_return_address(struct unwind_state *state)
314 {
315 	if (unwind_done(state))
316 		return 0;
317 
318 	return __kernel_text_address(state->ip) ? state->ip : 0;
319 }
320 EXPORT_SYMBOL_GPL(unwind_get_return_address);
321 
unwind_get_return_address_ptr(struct unwind_state * state)322 unsigned long *unwind_get_return_address_ptr(struct unwind_state *state)
323 {
324 	if (unwind_done(state))
325 		return NULL;
326 
327 	if (state->regs)
328 		return &state->regs->ip;
329 
330 	if (state->sp)
331 		return (unsigned long *)state->sp - 1;
332 
333 	return NULL;
334 }
335 
stack_access_ok(struct unwind_state * state,unsigned long _addr,size_t len)336 static bool stack_access_ok(struct unwind_state *state, unsigned long _addr,
337 			    size_t len)
338 {
339 	struct stack_info *info = &state->stack_info;
340 	void *addr = (void *)_addr;
341 
342 	if (!on_stack(info, addr, len) &&
343 	    (get_stack_info(addr, state->task, info, &state->stack_mask)))
344 		return false;
345 
346 	return true;
347 }
348 
deref_stack_reg(struct unwind_state * state,unsigned long addr,unsigned long * val)349 static bool deref_stack_reg(struct unwind_state *state, unsigned long addr,
350 			    unsigned long *val)
351 {
352 	if (!stack_access_ok(state, addr, sizeof(long)))
353 		return false;
354 
355 	*val = READ_ONCE_NOCHECK(*(unsigned long *)addr);
356 	return true;
357 }
358 
deref_stack_regs(struct unwind_state * state,unsigned long addr,unsigned long * ip,unsigned long * sp)359 static bool deref_stack_regs(struct unwind_state *state, unsigned long addr,
360 			     unsigned long *ip, unsigned long *sp)
361 {
362 	struct pt_regs *regs = (struct pt_regs *)addr;
363 
364 	/* x86-32 support will be more complicated due to the &regs->sp hack */
365 	BUILD_BUG_ON(IS_ENABLED(CONFIG_X86_32));
366 
367 	if (!stack_access_ok(state, addr, sizeof(struct pt_regs)))
368 		return false;
369 
370 	*ip = regs->ip;
371 	*sp = regs->sp;
372 	return true;
373 }
374 
deref_stack_iret_regs(struct unwind_state * state,unsigned long addr,unsigned long * ip,unsigned long * sp)375 static bool deref_stack_iret_regs(struct unwind_state *state, unsigned long addr,
376 				  unsigned long *ip, unsigned long *sp)
377 {
378 	struct pt_regs *regs = (void *)addr - IRET_FRAME_OFFSET;
379 
380 	if (!stack_access_ok(state, addr, IRET_FRAME_SIZE))
381 		return false;
382 
383 	*ip = regs->ip;
384 	*sp = regs->sp;
385 	return true;
386 }
387 
388 /*
389  * If state->regs is non-NULL, and points to a full pt_regs, just get the reg
390  * value from state->regs.
391  *
392  * Otherwise, if state->regs just points to IRET regs, and the previous frame
393  * had full regs, it's safe to get the value from the previous regs.  This can
394  * happen when early/late IRQ entry code gets interrupted by an NMI.
395  */
get_reg(struct unwind_state * state,unsigned int reg_off,unsigned long * val)396 static bool get_reg(struct unwind_state *state, unsigned int reg_off,
397 		    unsigned long *val)
398 {
399 	unsigned int reg = reg_off/8;
400 
401 	if (!state->regs)
402 		return false;
403 
404 	if (state->full_regs) {
405 		*val = ((unsigned long *)state->regs)[reg];
406 		return true;
407 	}
408 
409 	if (state->prev_regs) {
410 		*val = ((unsigned long *)state->prev_regs)[reg];
411 		return true;
412 	}
413 
414 	return false;
415 }
416 
unwind_next_frame(struct unwind_state * state)417 bool unwind_next_frame(struct unwind_state *state)
418 {
419 	unsigned long ip_p, sp, tmp, orig_ip = state->ip, prev_sp = state->sp;
420 	enum stack_type prev_type = state->stack_info.type;
421 	struct orc_entry *orc;
422 	bool indirect = false;
423 
424 	if (unwind_done(state))
425 		return false;
426 
427 	/* Don't let modules unload while we're reading their ORC data. */
428 	preempt_disable();
429 
430 	/* End-of-stack check for user tasks: */
431 	if (state->regs && user_mode(state->regs))
432 		goto the_end;
433 
434 	/*
435 	 * Find the orc_entry associated with the text address.
436 	 *
437 	 * For a call frame (as opposed to a signal frame), state->ip points to
438 	 * the instruction after the call.  That instruction's stack layout
439 	 * could be different from the call instruction's layout, for example
440 	 * if the call was to a noreturn function.  So get the ORC data for the
441 	 * call instruction itself.
442 	 */
443 	orc = orc_find(state->signal ? state->ip : state->ip - 1);
444 	if (!orc) {
445 		/*
446 		 * As a fallback, try to assume this code uses a frame pointer.
447 		 * This is useful for generated code, like BPF, which ORC
448 		 * doesn't know about.  This is just a guess, so the rest of
449 		 * the unwind is no longer considered reliable.
450 		 */
451 		orc = &orc_fp_entry;
452 		state->error = true;
453 	}
454 
455 	/* End-of-stack check for kernel threads: */
456 	if (orc->sp_reg == ORC_REG_UNDEFINED) {
457 		if (!orc->end)
458 			goto err;
459 
460 		goto the_end;
461 	}
462 
463 	/* Find the previous frame's stack: */
464 	switch (orc->sp_reg) {
465 	case ORC_REG_SP:
466 		sp = state->sp + orc->sp_offset;
467 		break;
468 
469 	case ORC_REG_BP:
470 		sp = state->bp + orc->sp_offset;
471 		break;
472 
473 	case ORC_REG_SP_INDIRECT:
474 		sp = state->sp + orc->sp_offset;
475 		indirect = true;
476 		break;
477 
478 	case ORC_REG_BP_INDIRECT:
479 		sp = state->bp + orc->sp_offset;
480 		indirect = true;
481 		break;
482 
483 	case ORC_REG_R10:
484 		if (!get_reg(state, offsetof(struct pt_regs, r10), &sp)) {
485 			orc_warn_current("missing R10 value at %pB\n",
486 					 (void *)state->ip);
487 			goto err;
488 		}
489 		break;
490 
491 	case ORC_REG_R13:
492 		if (!get_reg(state, offsetof(struct pt_regs, r13), &sp)) {
493 			orc_warn_current("missing R13 value at %pB\n",
494 					 (void *)state->ip);
495 			goto err;
496 		}
497 		break;
498 
499 	case ORC_REG_DI:
500 		if (!get_reg(state, offsetof(struct pt_regs, di), &sp)) {
501 			orc_warn_current("missing RDI value at %pB\n",
502 					 (void *)state->ip);
503 			goto err;
504 		}
505 		break;
506 
507 	case ORC_REG_DX:
508 		if (!get_reg(state, offsetof(struct pt_regs, dx), &sp)) {
509 			orc_warn_current("missing DX value at %pB\n",
510 					 (void *)state->ip);
511 			goto err;
512 		}
513 		break;
514 
515 	default:
516 		orc_warn("unknown SP base reg %d at %pB\n",
517 			 orc->sp_reg, (void *)state->ip);
518 		goto err;
519 	}
520 
521 	if (indirect) {
522 		if (!deref_stack_reg(state, sp, &sp))
523 			goto err;
524 	}
525 
526 	/* Find IP, SP and possibly regs: */
527 	switch (orc->type) {
528 	case UNWIND_HINT_TYPE_CALL:
529 		ip_p = sp - sizeof(long);
530 
531 		if (!deref_stack_reg(state, ip_p, &state->ip))
532 			goto err;
533 
534 		state->ip = ftrace_graph_ret_addr(state->task, &state->graph_idx,
535 						  state->ip, (void *)ip_p);
536 
537 		state->sp = sp;
538 		state->regs = NULL;
539 		state->prev_regs = NULL;
540 		state->signal = false;
541 		break;
542 
543 	case UNWIND_HINT_TYPE_REGS:
544 		if (!deref_stack_regs(state, sp, &state->ip, &state->sp)) {
545 			orc_warn_current("can't access registers at %pB\n",
546 					 (void *)orig_ip);
547 			goto err;
548 		}
549 
550 		state->regs = (struct pt_regs *)sp;
551 		state->prev_regs = NULL;
552 		state->full_regs = true;
553 		state->signal = true;
554 		break;
555 
556 	case UNWIND_HINT_TYPE_REGS_PARTIAL:
557 		if (!deref_stack_iret_regs(state, sp, &state->ip, &state->sp)) {
558 			orc_warn_current("can't access iret registers at %pB\n",
559 					 (void *)orig_ip);
560 			goto err;
561 		}
562 
563 		if (state->full_regs)
564 			state->prev_regs = state->regs;
565 		state->regs = (void *)sp - IRET_FRAME_OFFSET;
566 		state->full_regs = false;
567 		state->signal = true;
568 		break;
569 
570 	default:
571 		orc_warn("unknown .orc_unwind entry type %d at %pB\n",
572 			 orc->type, (void *)orig_ip);
573 		goto err;
574 	}
575 
576 	/* Find BP: */
577 	switch (orc->bp_reg) {
578 	case ORC_REG_UNDEFINED:
579 		if (get_reg(state, offsetof(struct pt_regs, bp), &tmp))
580 			state->bp = tmp;
581 		break;
582 
583 	case ORC_REG_PREV_SP:
584 		if (!deref_stack_reg(state, sp + orc->bp_offset, &state->bp))
585 			goto err;
586 		break;
587 
588 	case ORC_REG_BP:
589 		if (!deref_stack_reg(state, state->bp + orc->bp_offset, &state->bp))
590 			goto err;
591 		break;
592 
593 	default:
594 		orc_warn("unknown BP base reg %d for ip %pB\n",
595 			 orc->bp_reg, (void *)orig_ip);
596 		goto err;
597 	}
598 
599 	/* Prevent a recursive loop due to bad ORC data: */
600 	if (state->stack_info.type == prev_type &&
601 	    on_stack(&state->stack_info, (void *)state->sp, sizeof(long)) &&
602 	    state->sp <= prev_sp) {
603 		orc_warn_current("stack going in the wrong direction? at %pB\n",
604 				 (void *)orig_ip);
605 		goto err;
606 	}
607 
608 	preempt_enable();
609 	return true;
610 
611 err:
612 	state->error = true;
613 
614 the_end:
615 	preempt_enable();
616 	state->stack_info.type = STACK_TYPE_UNKNOWN;
617 	return false;
618 }
619 EXPORT_SYMBOL_GPL(unwind_next_frame);
620 
__unwind_start(struct unwind_state * state,struct task_struct * task,struct pt_regs * regs,unsigned long * first_frame)621 void __unwind_start(struct unwind_state *state, struct task_struct *task,
622 		    struct pt_regs *regs, unsigned long *first_frame)
623 {
624 	memset(state, 0, sizeof(*state));
625 	state->task = task;
626 
627 	if (!orc_init)
628 		goto err;
629 
630 	/*
631 	 * Refuse to unwind the stack of a task while it's executing on another
632 	 * CPU.  This check is racy, but that's ok: the unwinder has other
633 	 * checks to prevent it from going off the rails.
634 	 */
635 	if (task_on_another_cpu(task))
636 		goto err;
637 
638 	if (regs) {
639 		if (user_mode(regs))
640 			goto the_end;
641 
642 		state->ip = regs->ip;
643 		state->sp = regs->sp;
644 		state->bp = regs->bp;
645 		state->regs = regs;
646 		state->full_regs = true;
647 		state->signal = true;
648 
649 	} else if (task == current) {
650 		asm volatile("lea (%%rip), %0\n\t"
651 			     "mov %%rsp, %1\n\t"
652 			     "mov %%rbp, %2\n\t"
653 			     : "=r" (state->ip), "=r" (state->sp),
654 			       "=r" (state->bp));
655 
656 	} else {
657 		struct inactive_task_frame *frame = (void *)task->thread.sp;
658 
659 		state->sp = task->thread.sp + sizeof(*frame);
660 		state->bp = READ_ONCE_NOCHECK(frame->bp);
661 		state->ip = READ_ONCE_NOCHECK(frame->ret_addr);
662 		state->signal = (void *)state->ip == ret_from_fork;
663 	}
664 
665 	if (get_stack_info((unsigned long *)state->sp, state->task,
666 			   &state->stack_info, &state->stack_mask)) {
667 		/*
668 		 * We weren't on a valid stack.  It's possible that
669 		 * we overflowed a valid stack into a guard page.
670 		 * See if the next page up is valid so that we can
671 		 * generate some kind of backtrace if this happens.
672 		 */
673 		void *next_page = (void *)PAGE_ALIGN((unsigned long)state->sp);
674 		state->error = true;
675 		if (get_stack_info(next_page, state->task, &state->stack_info,
676 				   &state->stack_mask))
677 			return;
678 	}
679 
680 	/*
681 	 * The caller can provide the address of the first frame directly
682 	 * (first_frame) or indirectly (regs->sp) to indicate which stack frame
683 	 * to start unwinding at.  Skip ahead until we reach it.
684 	 */
685 
686 	/* When starting from regs, skip the regs frame: */
687 	if (regs) {
688 		unwind_next_frame(state);
689 		return;
690 	}
691 
692 	/* Otherwise, skip ahead to the user-specified starting frame: */
693 	while (!unwind_done(state) &&
694 	       (!on_stack(&state->stack_info, first_frame, sizeof(long)) ||
695 			state->sp < (unsigned long)first_frame))
696 		unwind_next_frame(state);
697 
698 	return;
699 
700 err:
701 	state->error = true;
702 the_end:
703 	state->stack_info.type = STACK_TYPE_UNKNOWN;
704 }
705 EXPORT_SYMBOL_GPL(__unwind_start);
706