Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1791788imu; Tue, 6 Nov 2018 04:32:03 -0800 (PST) X-Google-Smtp-Source: AJdET5d8HU6zlgiNyK2d2wHvNL2gHDhnEefs8UaWdPMSv9rta6PlVRs8UnaDefshY+Wn7gBHvd7e X-Received: by 2002:a63:af45:: with SMTP id s5-v6mr23688907pgo.125.1541507523721; Tue, 06 Nov 2018 04:32:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541507523; cv=none; d=google.com; s=arc-20160816; b=hKoppvb79dJne6r3Ew1xcOqyo0FeRTEG96l1DSC/B9vBtGuuTH3YTwPb6P7r3/KAoO lbHlQjbbIWQHwu62+aePbclNRb75yepWnCbf571XodMgcbiXUuL9uS1066A95K+BtQy6 UlwVZkGuTem5Isib94A6ve3q4O5ArNiI6SiAJC+IrAlEIlL1NKWTshCIBO9jEGSBFnss twnR49C+g/ptOIua6ur/ZIvzyvbfDaZ7+hXb1K2vtg09lvX79bW+G9d+8mpRBR2BkZE4 5FErNb/L/nq5ilUOJBqrvvqi0F3kn/rBV/xPG9ohgfrBJh9tdRsHFxPblXzhZDVw8/cH zBJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=rSu0j6cbXP+WndyozD7gPzpye6fbX/KsJpo2RrFJqeU=; b=WInHpS2B0lPirZ0aGarNrSpsSdda8wNaskayoo6honBOTBWJWOBEVWDhX5UOqDfWER BHiR/YpL1ytvKT94yLbMrgJBGuGjgxQ91xjef/7Xmq848TWDSc+iqUrGLCj7pFA1HhrN tlmc9KxnM5L05G6V0fXUCsRa1OqfJnO7TqADsZJeRELfUJi7NAXIGdNnYRRVCMuTsCOK CXm/2i6zDUfCgkHSMTlhvMQmvzkp1kTjiZfd6sjT+tB+KY0g3ud0nuNtMgl+cb1zXNCA Xz03yuxRk2YlF6Gi4CPZtGbflIMmMYPTtCcBrpMGcaLnSVOXF5Zqo71/doBmwdVBvWp2 Z88Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id go17si7712982plb.266.2018.11.06.04.31.44; Tue, 06 Nov 2018 04:32:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730492AbeKFVyg (ORCPT + 99 others); Tue, 6 Nov 2018 16:54:36 -0500 Received: from foss.arm.com ([217.140.101.70]:60444 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729711AbeKFVyg (ORCPT ); Tue, 6 Nov 2018 16:54:36 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1AE92A78; Tue, 6 Nov 2018 04:29:37 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 95F7F3F5CF; Tue, 6 Nov 2018 04:29:35 -0800 (PST) Date: Tue, 6 Nov 2018 12:29:33 +0000 From: Mark Rutland To: Dave P Martin Cc: Daniel Thompson , Zhaoyang Huang , Catalin Marinas , Will Deacon , Michael Weiser , James Morse , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] arch/arm64 : fix error in dump_backtrace Message-ID: <20181106122932.652iuh3c4qhe63gl@lakrids.cambridge.arm.com> References: <1541488775-29610-1-git-send-email-huangzhaoyang@gmail.com> <20181106083901.erezwtcomiijvdrk@salmiak> <20181106085751.hrp7qkp53cftgew6@holly.lan> <20181106110019.36ps3tyakvocwst4@lakrids.cambridge.arm.com> <20181106113247.GF3500@e103592.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181106113247.GF3500@e103592.cambridge.arm.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 06, 2018 at 11:32:50AM +0000, Dave P Martin wrote: > On Tue, Nov 06, 2018 at 11:00:19AM +0000, Mark Rutland wrote: > > On Tue, Nov 06, 2018 at 08:57:51AM +0000, Daniel Thompson wrote: > > > On Tue, Nov 06, 2018 at 08:39:01AM +0000, Mark Rutland wrote: > > > > On Tue, Nov 06, 2018 at 03:19:35PM +0800, Zhaoyang Huang wrote: > > > > > From: Zhaoyang Huang > > > > > > > > > > In some cases, the instruction of "bl foo1" will be the last one of the > > > > > foo2[1], which will cause the lr be the first instruction of the adjacent > > > > > foo3[2]. Hence, the backtrace will show the weird result as bellow[3]. > > > > > The patch will fix it by miner 4 of the lr when dump_backtrace > > > > > > > > This has come up in the past (and a similar patch has been applied, then > > > > reverted). > > > > > > > > In general, we don't know that a function call was made via BL, and therefore > > > > cannot know that LR - 4 is the address of the caller. The caller could set up > > > > the LR as it likes, then B or BR to the callee, and depending on how the basic > > > > blocks get laid out in memory, LR - 4 might point at something completely > > > > different. > > > > > > > > More ideally, the compiler wouldn't end a function with a BL. When does that > > > > happen, and is there some way we could arrange for that to not happen? e.g. > > > > somehow pad a NOP after the BL. > > > > > > It's a consequence of having __noreturn isn't it? __noreturn frees the > > > compiler from the burden of having to produce a valid return stack... so > > > it doesn't and unwinding becomes hard. > > > > In that case, the compiler could equally just use B rather than BL, > > which this patch doesn't solve. > > > > The documentation for the GCC noreturn attribute [1] says: > > > > | In order to preserve backtraces, GCC will never turn calls to noreturn > > | functions into tail calls. > > > > ... so clearly it's not intended to mess up backtracing. > > Which is a bit odd, since every call to a noreturn function is a tail- > call by definition, and other tail-calls are typically optimised to a B > (thus interfering with backtracing in all except the noreturn case). > > Avoiding this would require a change to the compiler, and since there's > no obvious correct answer anyway, I guess we shouldn't hold our breath. > > > IIUC we mostly use noreturn to prevent warings about uninitialised > > variables and such after a call to a noreturn function. I think > > optimization is a secondary concern. > > Agreed. > > > We could ask the GCC folk if they can ensure that a noreturn function > > call leave thes LR pointing into the caller, e.g. by padding with a NOP: > > > > BL > > NOP > > > > That seems cheap enough, and would keep backtraces reliable. > > -fpatchable-function-entry=1,1 does almost the right thing, by > inserting 1 NOP at the start of each function, and putting the function > entry point after that (1) NOP. Neat hack, but unfortunately insufficient in general since: * The next function may be notrace or asm, and hence will not have a preceding NOP. * There may not be a next function (e.g. for the final instruction in .text), and the LR value may point at some data symbol. * This relies on the preceding NOP being accounted as part of the previous function, which feels like a bug given we should have the function size somewhere. Generally, I think that trying to bodge around the exiting behaviour is going to cause just as many problems as it solves, and worse, makes it harder to consistently analyse a backtrace. IMO, we shouldn't change the kernel here. Thanks, Mark.