Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932622AbdLRFdt (ORCPT ); Mon, 18 Dec 2017 00:33:49 -0500 Received: from mail-pf0-f193.google.com ([209.85.192.193]:39662 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932429AbdLRFds (ORCPT ); Mon, 18 Dec 2017 00:33:48 -0500 X-Google-Smtp-Source: ACJfBosThzC4gajPFm15AHPbwtwZPr3lYQxexc/1hTC3Rm31jiGsTvDP2WGIOJ0EqgVH62C9ORw9uw== Date: Mon, 18 Dec 2017 15:33:34 +1000 From: Nicholas Piggin To: Josh Poimboeuf Cc: Torsten Duwe , linux-kernel@vger.kernel.org, Jiri Kosina , live-patching@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH] On ppc64le we HAVE_RELIABLE_STACKTRACE Message-ID: <20171218153334.618c0b66@roar.ozlabs.ibm.com> In-Reply-To: <20171218025854.angid7h33gnmxsrg@treble> References: <20171005124313.GA25100@lst.de> <9f388c9a-8d74-865a-b113-f77322918b39@linux.vnet.ibm.com> <20171017144733.GB2136@lst.de> <95e6f942-88b7-0208-0eb0-2f5462aec410@linux.vnet.ibm.com> <20171020120739.GA20306@lst.de> <1508547548.5662.2.camel@gmail.com> <39bb7180-1adf-4df6-c9ba-c6f92754767f@linux.vnet.ibm.com> <20171212113912.GA1907@lst.de> <20171212140501.44vf4xcz6jhbqofd@treble> <20171215194009.349b04da@roar.ozlabs.ibm.com> <20171218025854.angid7h33gnmxsrg@treble> Organization: IBM X-Mailer: Claws Mail 3.15.1-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2651 Lines: 69 On Sun, 17 Dec 2017 20:58:54 -0600 Josh Poimboeuf wrote: > On Fri, Dec 15, 2017 at 07:40:09PM +1000, Nicholas Piggin wrote: > > On Tue, 12 Dec 2017 08:05:01 -0600 > > Josh Poimboeuf wrote: > > > > > On Tue, Dec 12, 2017 at 12:39:12PM +0100, Torsten Duwe wrote: > > > > Hi all, > > > > > > > > The "Power Architecture 64-Bit ELF V2 ABI" says in section 2.3.2.3: > > > > > > > > [...] There are several rules that must be adhered to in order to ensure > > > > reliable and consistent call chain backtracing: > > > > > > > > * Before a function calls any other function, it shall establish its > > > > own stack frame, whose size shall be a multiple of 16 bytes. > > > > > > What about leaf functions? If a leaf function doesn't establish a stack > > > frame, and it has inline asm which contains a blr to another function, > > > this ABI is broken. > > Oops, I meant to say "bl" instead of "blr". > > > > Also, even for non-leaf functions, is it possible for GCC to insert the > > > inline asm before it sets up the stack frame? (This is an occasional > > > problem on x86.) > > > > Inline asm must not have control transfer out of the statement unless > > it is asm goto. > > Can inline asm have calls to other functions? I don't believe so. > > > > Also, what about hand-coded asm? > > > > Should follow the same rules if it uses the stack. > > How is that enforced? It's not, AFAIK. Gcc doesn't understand what's inside asm(""). > > > > > To me this sounds like the equivalent of HAVE_RELIABLE_STACKTRACE. > > > > This patch may be unneccessarily limited to ppc64le, but OTOH the only > > > > user of this flag so far is livepatching, which is only implemented on > > > > PPCs with 64-LE, a.k.a. ELF ABI v2. > > > > > > In addition to fixing the above issues, the unwinder also needs to > > > detect interrupts (i.e., preemption) and page faults on the stack of a > > > blocked task. If a function were preempted before it created a stack > > > frame, or if a leaf function blocked on a page fault, the stack trace > > > will skip the function's caller, so such a trace will need to be > > > reported to livepatch as unreliable. > > > > I don't think there is much problem there for powerpc. Stack frame > > creation and function call with return pointer are each atomic. > > What if the function is interrupted before it creates the stack frame? > Then there will be no stack frame, but you still get the caller address because it's saved in LR register as part of the function call. Then you get the caller's caller in its stack frame. Thanks, Nick