Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1834909ybn; Thu, 26 Sep 2019 02:58:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqzYmJTuydyySQIzazXyVdrqTPDvhSXrd7XeVyWxHO60y5mIN3RUDz2A6bOLnDGQZlfg1Uq5 X-Received: by 2002:a50:af26:: with SMTP id g35mr2608670edd.129.1569491914108; Thu, 26 Sep 2019 02:58:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569491914; cv=none; d=google.com; s=arc-20160816; b=Tyy9ciolwiIKG0qAgGa6jMWPXcRgVky7b20TUEijVsecSjczBesttupW18jb6xRVj8 s88rKeY7kniJvx/2hugL1ImKKHYWe3MK5DyxG5RiPXrSnYOjD1GS1T3c/yodlRLr39Nu ErbLQatDVXs+DIJI9N8GsmuDYg5tbsSUaryVSDwz5tHutT3zQUqKNgYYBnv73YD2zQCi GYF/7o8WrmevS/mwr5Ras+apocwjOr/rATC5hJEGHer9tPLT+mtqwD67H+aq/nVwv78h gqSdUoi9hrY3JWl6hDDVD5tyztQndtfFB5PbYe4XkwSYujCB3OtzBn68/vr1Msoen7As oZ+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=h/RTPptMzVlxWY6kHXdS0P3xSNWevs200xt+aATskwU=; b=i4xh74FtOlgcOegD0axB8KcJ60jHrEUy9o7myRIt7037Qp9+zi7N3svU/WjXJqu1ym BqQkPN7vRgzccba6ZEZbIjI1GKL1VohKSq6ecdx9I84tdd0+rjlP7CNJmdJbcaSuq3hL TnbQnB3i+eKv7YPpRqS4fNPjtyj7374H2jKyBkCewlghowDeyRr7j18a5Qd0x6yWzvE+ ck2TAPafwvTiGczde4uZkt/WuXieR5QZ16xGrznEBH4UHf9QJGz2oZ5RnLqCCE7z1K5F Ue79rBcgHuNidaHD770hNMLhacSepBrA4YsHQawIYK/bLhDZJdxJxHPwqgl3SA9nV8t0 rZMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=erg1HrlJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h48si1018169ede.31.2019.09.26.02.58.11; Thu, 26 Sep 2019 02:58:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=erg1HrlJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392734AbfIYUDQ (ORCPT + 99 others); Wed, 25 Sep 2019 16:03:16 -0400 Received: from mail-io1-f68.google.com ([209.85.166.68]:44880 "EHLO mail-io1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729118AbfIYUDP (ORCPT ); Wed, 25 Sep 2019 16:03:15 -0400 Received: by mail-io1-f68.google.com with SMTP id j4so84706iog.11 for ; Wed, 25 Sep 2019 13:03:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=h/RTPptMzVlxWY6kHXdS0P3xSNWevs200xt+aATskwU=; b=erg1HrlJng3dStEDefsrPZCNWQSvBlUR8Da1WM8mj7tT7syQA+1jnrAgrs+oaKM63S tXi4rvN+XMuX+yHICWCEYgS15KCtl0iFfVyl6EdEfEmkMNMZB4hgQzGbJU39gy9jR/F5 Y8zQ11MMPrhJuWEd7d/t/OcE/0fNbzNthWUm0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=h/RTPptMzVlxWY6kHXdS0P3xSNWevs200xt+aATskwU=; b=piBDyoAsItl7ObcUqx0jj2UTX0Eb9XaD2BzTerZi0PMVe9sXi78HCocsz4z6M//RRT 3t09/kqsalyzJl0Yrxlq1CmEPRhxuOpG0KyMoh7pvQtwEGPuejdB3sm9kcutIYKtJW83 wUv1kfagDtw1bGzbWHwDKg4J4CV2NPbQhUKeBaJnz1jNQc9aGJULiTZwYfrgBGzKZz/g W4Ri9fEApHQRCmIFlhw4edJ+kYHND75v5aZEcT1hJgVRRFRdV2/ZTI3Dwia3BFZrjjt1 tYVECoizWr1QGtiwszmFuoajiKkt6d2xPi50+eg9TK8GAbZXQO16jsipqCwciJPw9Nez zK9A== X-Gm-Message-State: APjAAAWjMkGnkBFIDDN1myGsfFRTxKglxhwdDXJbY0jeuU8T4Sdwfa1X +otCZG8vXOOrL1TJ73qKNb5wmlZvvTc= X-Received: by 2002:a6b:8e92:: with SMTP id q140mr1277109iod.205.1569441794220; Wed, 25 Sep 2019 13:03:14 -0700 (PDT) Received: from mail-io1-f49.google.com (mail-io1-f49.google.com. [209.85.166.49]) by smtp.gmail.com with ESMTPSA id g8sm300733ioc.0.2019.09.25.13.03.13 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 25 Sep 2019 13:03:13 -0700 (PDT) Received: by mail-io1-f49.google.com with SMTP id a1so172965ioc.6 for ; Wed, 25 Sep 2019 13:03:13 -0700 (PDT) X-Received: by 2002:a92:4a11:: with SMTP id m17mr1653859ilf.142.1569441793167; Wed, 25 Sep 2019 13:03:13 -0700 (PDT) MIME-Version: 1.0 References: <20190731183732.178134-1-dianders@chromium.org> <20190830145237.aoysubwetqe3eggj@holly.lan> In-Reply-To: <20190830145237.aoysubwetqe3eggj@holly.lan> From: Doug Anderson Date: Wed, 25 Sep 2019 13:03:02 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] kdb: Fix stack crawling on 'running' CPUs that aren't the master To: Daniel Thompson Cc: Catalin Marinas , Will Deacon , Jason Wessel , kgdb-bugreport@lists.sourceforge.net, Christophe Leroy , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Fri, Aug 30, 2019 at 7:52 AM Daniel Thompson wrote: > > On Wed, Jul 31, 2019 at 11:37:32AM -0700, Douglas Anderson wrote: > > In kdb when you do 'btc' (back trace on CPU) it doesn't necessarily > > give you the right info. Specifically on many architectures > > (including arm64, where I tested) you can't dump the stack of a > > "running" process that isn't the process running on the current CPU. > > This can be seen by this: > > > > echo SOFTLOCKUP > /sys/kernel/debug/provoke-crash/DIRECT > > # wait 2 seconds > > g > > > > Here's what I see now on rk3399-gru-kevin. I see the stack crawl for > > the CPU that handled the sysrq but everything else just shows me stuck > > in __switch_to() which is bogus: > > > > ====== > > > > [0]kdb> btc > > btc: cpu status: Currently on cpu 0 > > Available cpus: 0, 1-3(I), 4, 5(I) > > Stack traceback for pid 0 > > 0xffffff801101a9c0 0 0 1 0 R 0xffffff801101b3b0 *swapper/0 > > Call trace: > > dump_backtrace+0x0/0x138 > > ... > > kgdb_compiled_brk_fn+0x34/0x44 > > ... > > sysrq_handle_dbg+0x34/0x5c > > Stack traceback for pid 0 > > 0xffffffc0f175a040 0 0 1 1 I 0xffffffc0f175aa30 swapper/1 > > Call trace: > > __switch_to+0x1e4/0x240 > > 0xffffffc0f65616c0 > > Stack traceback for pid 0 > > 0xffffffc0f175d040 0 0 1 2 I 0xffffffc0f175da30 swapper/2 > > Call trace: > > __switch_to+0x1e4/0x240 > > 0xffffffc0f65806c0 > > Stack traceback for pid 0 > > 0xffffffc0f175b040 0 0 1 3 I 0xffffffc0f175ba30 swapper/3 > > Call trace: > > __switch_to+0x1e4/0x240 > > 0xffffffc0f659f6c0 > > Stack traceback for pid 1474 > > 0xffffffc0dde8b040 1474 727 1 4 R 0xffffffc0dde8ba30 bash > > Call trace: > > __switch_to+0x1e4/0x240 > > __schedule+0x464/0x618 > > 0xffffffc0dde8b040 > > Stack traceback for pid 0 > > 0xffffffc0f17b0040 0 0 1 5 I 0xffffffc0f17b0a30 swapper/5 > > Call trace: > > __switch_to+0x1e4/0x240 > > 0xffffffc0f65dd6c0 > > > > === > > > > The problem is that 'btc' eventually boils down to > > show_stack(task_struct, NULL); > > > > ...and show_stack() doesn't work for "running" CPUs because their > > registers haven't been stashed. > > > > On x86 things might work better (I haven't tested) because kdb has a > > special case for x86 in kdb_show_stack() where it passes the stack > > pointer to show_stack(). This wouldn't work on arm64 where the stack > > crawling function seems needs the "fp" and "pc", not the "sp" which is > > presumably why arm64's show_stack() function totally ignores the "sp" > > parameter. > > > > NOTE: we _can_ get a good stack dump for all the cpus if we manually > > switch each one to the kdb master and do a back trace. AKA: > > cpu 4 > > bt > > ...will give the expected trace. That's because now arm64's > > dump_backtrace will now see that "tsk == current" and go through a > > different path. > > > > In this patch I fix the problems by catching a request to stack crawl > > a task that's running on a CPU and then I ask that CPU to do the stack > > crawl. > > > > NOTE: this will (presumably) change what stack crawls are printed for > > x86 machines. Now kdb functions will show up in the stack crawl. > > Presumably this is OK but if it's not we can go back and add a special > > case for x86 again. > > > > Signed-off-by: Douglas Anderson > > I think this approach can be made work but there are problems as things > exist today, see below. > > > > --- > > > > Changes in v2: > > - Totally new approach; now arch agnostic. > > > > kernel/debug/debug_core.c | 5 +++++ > > kernel/debug/debug_core.h | 1 + > > kernel/debug/kdb/kdb_bt.c | 44 ++++++++++++++++++++++++++++++--------- > > 3 files changed, 40 insertions(+), 10 deletions(-) > > > > diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c > > index 5cc608de6883..a89c72714fe6 100644 > > --- a/kernel/debug/debug_core.c > > +++ b/kernel/debug/debug_core.c > > @@ -92,6 +92,8 @@ static int kgdb_use_con; > > bool dbg_is_early = true; > > /* Next cpu to become the master debug core */ > > int dbg_switch_cpu; > > +/* cpu number of slave we request a stack crawl of */ > > +int dbg_slave_dumpstack_cpu = -1; > > > > /* Use kdb or gdbserver mode */ > > int dbg_kdb_mode = 1; > > @@ -580,6 +582,9 @@ static int kgdb_cpu_enter(struct kgdb_state *ks, struct pt_regs *regs, > > atomic_xchg(&kgdb_active, cpu); > > break; > > } > > + } else if (dbg_slave_dumpstack_cpu == cpu) { > > Couldn't this be encoded in the exception state? Yup, but it requires exporting the exception state from debug_core.c (or exporting a function that sets this). Ah, but below you said you wanted the whole stack crawling on a CPU moved to debug_core.c, so done. > > + dump_stack(); > > + dbg_slave_dumpstack_cpu = -1; > > > } else if (kgdb_info[cpu].exception_state & DCPU_IS_SLAVE) { > > if (!raw_spin_is_locked(&dbg_slave_lock)) > > goto return_normal; > > diff --git a/kernel/debug/debug_core.h b/kernel/debug/debug_core.h > > index b4a7c326d546..dca74d5caef2 100644 > > --- a/kernel/debug/debug_core.h > > +++ b/kernel/debug/debug_core.h > > @@ -62,6 +62,7 @@ extern int dbg_io_get_char(void); > > /* Switch from one cpu to another */ > > #define DBG_SWITCH_CPU_EVENT -123456 > > extern int dbg_switch_cpu; > > +extern int dbg_slave_dumpstack_cpu; > > > > /* gdbstub interface functions */ > > extern int gdb_serial_stub(struct kgdb_state *ks); > > diff --git a/kernel/debug/kdb/kdb_bt.c b/kernel/debug/kdb/kdb_bt.c > > index 7e2379aa0a1e..10095ae05826 100644 > > --- a/kernel/debug/kdb/kdb_bt.c > > +++ b/kernel/debug/kdb/kdb_bt.c > > @@ -10,6 +10,7 @@ > > */ > > > > #include > > +#include > > #include > > #include > > #include > > @@ -22,20 +23,43 @@ > > static void kdb_show_stack(struct task_struct *p, void *addr) > > { > > int old_lvl = console_loglevel; > > + int time_left; > > + int cpu; > > + > > console_loglevel = CONSOLE_LOGLEVEL_MOTORMOUTH; > > kdb_trap_printk++; > > - kdb_set_current_task(p); > > - if (addr) { > > - show_stack((struct task_struct *)p, addr); > > - } else if (kdb_current_regs) { > > -#ifdef CONFIG_X86 > > - show_stack(p, &kdb_current_regs->sp); > > -#else > > - show_stack(p, NULL); > > -#endif > > + > > + if (!addr && kdb_task_has_cpu(p)) { > > + cpu = kdb_process_cpu(p); > > + > > + if (cpu == raw_smp_processor_id()) { > > + dump_stack(); > > + goto exit; > > This goto is not for error recovery but looks like it is. Why can't we > use normal control flow here (extracting the remote stack dump logic > into a seperate function if the right margin is getting too close)? > > In fact to be honest a function call would be useful anyway since I'd > rather have all the resulting horror in a single file (debug_core.c). Sure. Done. > > + } > > + > > + /* > > + * In general architectures don't support dumping the stack > > + * of a "running" process that's not the current one so if > > + * we want to dump the stack of a running process that's not > > + * the master then we'll set a global letting the slave > > + * (which should be looping) know to dump its own stack. > > + */ > > + dbg_slave_dumpstack_cpu = cpu; > > + for (time_left = MSEC_PER_SEC; time_left; time_left--) { > > + udelay(1000); > > + if (dbg_slave_dumpstack_cpu == -1) > > + break; > > + } > > This timeout does not interact correctly with the pager (the timer does > not get reset when we sit in the pager loop waiting for user to tell us > to continue). Nice catch, thanks. Probably the easiest thing to do is to get rid of this timeout but put in a check to make sure that the CPU has the "IN_SLAVE" flag set. This was important since you otherwise could get into this code path by doing "ps" to see what process was running on a non-rounded-up CPU and then "btp ". v3 should handle this without the timeout. -Doug