Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp19700ybz; Tue, 21 Apr 2020 14:16:59 -0700 (PDT) X-Google-Smtp-Source: APiQypLFaI8LvWGXEpEWnd3qtGDwINBsQcn6332GjBU9uTU67RXYc62B6JkTmLwQfmJQIZj2WyZ/ X-Received: by 2002:aa7:da0b:: with SMTP id r11mr21135143eds.63.1587503819633; Tue, 21 Apr 2020 14:16:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587503819; cv=none; d=google.com; s=arc-20160816; b=JJcSEG+Rg2YeN1pda3VaGc2SNC6iNIRw4KErsEi/c2jJYAwBssx8+UrPM9EZQX+Gyh MlsAIOs0Du2FGsk5c0Elodj1m+F/bgMXNvjDFShE1PJsS67rCIVmI/fSa1HTkjW52kYu w2afF7rvRszUy9X5/3uMYOiACJ/fX3KYJbGIOJcuEgnh1oeERDkLmh6d2tX2gUz4aWbf Xn2khTlIFwAJJZseklikBvHYOoj1+bmQfTGjEPiP+nrLpUDKoqkPfmQUGvFMO1ktThRt SrHVp6DBaKY6LeJWiaiw0fMC0rmMgyvegO+ZEJVBQ9AjxY1B72tnegMhP/5ivGjeyy0B FUHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=mJYvH0CE4/wZqoor5a8GmQPL/6GeWa4KAGNJ8Y7uZEA=; b=MIAxJPamnSTwnihGNf0FcVLgWikm2cg8DSppIUNnOo6PMi4Cib5ooT1mfAjm/0h0Of +IrEXXzGXBT+PoNZ0XLH8pAIPXCvFjf7UUuLJH5xK8RTtNnqzzb4W7ApMuhhgIlDRjg7 taatzgt2ICcVNHorLDEDUP/SGyJ20G6RgdO4nijXnmom1r+gm3fdn1/qL0eWaNoPtE0F BpuhQqtSlgPBY4ZYpomCF7TWcJ6Y2VgA3Azx4rXyQXNL8RP1idgMZmwpo+L1ozmKCCxB uJI9VyPL15PZK6KnejDOdylLpG3xfR3UzMMo+yPksWi5AA/1A+7FlmKDQc3gWv9bTse7 aslQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=kJd+C8iy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gx5si2379592ejb.74.2020.04.21.14.16.36; Tue, 21 Apr 2020 14:16:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=kJd+C8iy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726402AbgDUVPa (ORCPT + 99 others); Tue, 21 Apr 2020 17:15:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726335AbgDUVPZ (ORCPT ); Tue, 21 Apr 2020 17:15:25 -0400 Received: from mail-pf1-x442.google.com (mail-pf1-x442.google.com [IPv6:2607:f8b0:4864:20::442]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CF600C03C1A6 for ; Tue, 21 Apr 2020 14:15:23 -0700 (PDT) Received: by mail-pf1-x442.google.com with SMTP id 145so4933611pfw.13 for ; Tue, 21 Apr 2020 14:15:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=mJYvH0CE4/wZqoor5a8GmQPL/6GeWa4KAGNJ8Y7uZEA=; b=kJd+C8iy2SgY/FLRXeSVkJO+nnv/1XJy9qd6f5ZyeBeyuC32MXYg2CH+onXXoLPo1r 3EdZjhqsCb9jR3VQqZmIzjos5lIINXu+31S8eaG4KH8oHBIImlJnPftFei+NhUHvL4LV W1hnG7L8iG0ikcFUJamvna3SSc1bFgLHEMFjU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=mJYvH0CE4/wZqoor5a8GmQPL/6GeWa4KAGNJ8Y7uZEA=; b=mMLOyq1zm7c4x9qT1ScgGvK+C4/5e1sfCVEu/KZi/nyKJ+HIowojjZkKWDVZF1j66Y IllaLkqHG2mLSCBNeN3OgQcRW3QCYkFjP9lH05kmwDZmh4mGPc/L4pua42ZeOWLLJEo6 XxAIgdV2aVvbGOPwUw49z8ynVv5qN9yTRrUD+OhHC5QpJmY7ueSTwQUg9YwcbNP7pC6y 89erqJjQYVXxpM3W58bZHlQX8YPiFwfQfrA6Hhb991pI8fSr5n49ziPnLARuzaXUqqnF 3sTii1cbShSRNo0hzreetQjMwZ6vhsFcjwmH92kbE2KGLtMrA9RtQFY1JpAuqrQ4MoQV JlGw== X-Gm-Message-State: AGi0PuY9H1runyOoucNcXcw9PGPWN4ojueUQy35e3Is3AaRbQEuV5P8C vj/zH/uzQRg5KYWxOpAg/xyIIg== X-Received: by 2002:a62:7b03:: with SMTP id w3mr17166118pfc.313.1587503723328; Tue, 21 Apr 2020 14:15:23 -0700 (PDT) Received: from tictac2.mtv.corp.google.com ([2620:15c:202:1:24fa:e766:52c9:e3b2]) by smtp.gmail.com with ESMTPSA id c1sm3287880pfo.152.2020.04.21.14.15.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Apr 2020 14:15:22 -0700 (PDT) From: Douglas Anderson To: jason.wessel@windriver.com, daniel.thompson@linaro.org, gregkh@linuxfoundation.org Cc: kgdb-bugreport@lists.sourceforge.net, mingo@redhat.com, hpa@zytor.com, bp@alien8.de, linux-serial@vger.kernel.org, agross@kernel.org, tglx@linutronix.de, frowand.list@gmail.com, bjorn.andersson@linaro.org, jslaby@suse.com, catalin.marinas@arm.com, corbet@lwn.net, will@kernel.org, Douglas Anderson , Matt Mullins , Nadav Amit , Peter Zijlstra , Rick Edgecombe , linux-kernel@vger.kernel.org, x86@kernel.org Subject: [PATCH v2 4/9] kgdb: Delay "kgdbwait" to dbg_late_init() by default Date: Tue, 21 Apr 2020 14:14:42 -0700 Message-Id: <20200421141234.v2.4.I3113aea1b08d8ce36dc3720209392ae8b815201b@changeid> X-Mailer: git-send-email 2.26.1.301.g55bc3eb7cb9-goog In-Reply-To: <20200421211447.193860-1-dianders@chromium.org> References: <20200421211447.193860-1-dianders@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Using kgdb requires at least some level of architecture-level initialization. If nothing else, it relies on the architecture to pass breakpoints / crashes onto kgdb. On some architectures this all works super early, specifically it starts working at some point in time before Linux parses early_params's. On other architectures it doesn't. A survey of a few platforms: a) x86: Presumably it all works early since "ekgdboc" is documented to work here. b) arm64: Catching crashes works; with a simple patch breakpoints can also be made to work. c) arm: Nothing in kgdb works until paging_init() -> devicemaps_init() -> early_trap_init() Let's be conservative and, by default, process "kgdbwait" (which tells the kernel to drop into the debugger ASAP at boot) a bit later at dbg_late_init() time. If an architecture has tested it and wants to re-enable super early debugging, they can implement the weak function kgdb_arch_can_debug_early() to return true. We'll do this for x86 to start. It should be noted that dbg_late_init() is still called quite early in the system. Note that this patch doesn't affect when kgdb runs its init. If kgdb is set to initialize early it will still initialize when parsing early_params's. This patch _only_ inhibits the initial breakpoint from "kgdbwait". This means: * Without any extra patches arm64 platforms will at least catch crashes after kgdb inits. * arm platforms will catch crashes (and could handle a hardcoded kgdb_breakpoint()) any time after early_trap_init() runs, even before dbg_late_init(). Signed-off-by: Douglas Anderson Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov --- Changes in v2: None arch/x86/kernel/kgdb.c | 5 +++++ include/linux/kgdb.h | 22 ++++++++++++++++++++++ kernel/debug/debug_core.c | 29 +++++++++++++++++++---------- 3 files changed, 46 insertions(+), 10 deletions(-) diff --git a/arch/x86/kernel/kgdb.c b/arch/x86/kernel/kgdb.c index c44fe7d8d9a4..60c47787c588 100644 --- a/arch/x86/kernel/kgdb.c +++ b/arch/x86/kernel/kgdb.c @@ -673,6 +673,11 @@ void kgdb_arch_late(void) } } +bool kgdb_arch_can_debug_early(void) +{ + return true; +} + /** * kgdb_arch_exit - Perform any architecture specific uninitalization. * diff --git a/include/linux/kgdb.h b/include/linux/kgdb.h index b072aeb1fd78..7371517aeacc 100644 --- a/include/linux/kgdb.h +++ b/include/linux/kgdb.h @@ -226,6 +226,28 @@ extern int kgdb_arch_remove_breakpoint(struct kgdb_bkpt *bpt); */ extern void kgdb_arch_late(void); +/** + * kgdb_arch_can_debug_early - Check if OK to break before dbg_late_init() + * + * If an architecture can definitely handle entering the debugger when + * early_param's are parsed then it can override this function to return + * true. Otherwise if "kgdbwait" is passed on the kernel command line it + * won't actually be processed until dbg_late_init() just after the call + * to kgdb_arch_late() is made. + * + * NOTE: Even if this returns false we will still try to register kgdb to + * handle breakpoints and crashes when early_params's are parsed, we just + * won't act on the "kgdbwait" parameter until dbg_late_init(). If you + * get a crash and try to drop into kgdb somewhere between these two + * places you might or might not end up being able to use kgdb depending + * on exactly how far along the architecture has initted. + * + * ALSO: dbg_late_init() is actually still fairly early in the system + * boot process. + * + * Return: true if platform can handle kgdb early. + */ +extern bool kgdb_arch_can_debug_early(void); /** * struct kgdb_arch - Describe architecture specific values. diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c index 950dc667c823..8f178239856d 100644 --- a/kernel/debug/debug_core.c +++ b/kernel/debug/debug_core.c @@ -950,16 +950,32 @@ void kgdb_panic(const char *msg) kgdb_breakpoint(); } +static void kgdb_initial_breakpoint(void) +{ + kgdb_break_asap = 0; + + pr_crit("Waiting for connection from remote gdb...\n"); + kgdb_breakpoint(); +} + void __weak kgdb_arch_late(void) { } +bool __weak kgdb_arch_can_debug_early(void) +{ + return false; +} + void __init dbg_late_init(void) { dbg_is_early = false; if (kgdb_io_module_registered) kgdb_arch_late(); kdb_init(KDB_INIT_FULL); + + if (kgdb_io_module_registered && kgdb_break_asap) + kgdb_initial_breakpoint(); } static int @@ -1055,14 +1071,6 @@ void kgdb_schedule_breakpoint(void) } EXPORT_SYMBOL_GPL(kgdb_schedule_breakpoint); -static void kgdb_initial_breakpoint(void) -{ - kgdb_break_asap = 0; - - pr_crit("Waiting for connection from remote gdb...\n"); - kgdb_breakpoint(); -} - /** * kgdb_register_io_module - register KGDB IO module * @new_dbg_io_ops: the io ops vector @@ -1099,7 +1107,8 @@ int kgdb_register_io_module(struct kgdb_io *new_dbg_io_ops) /* Arm KGDB now. */ kgdb_register_callbacks(); - if (kgdb_break_asap) + if (kgdb_break_asap && + (!dbg_is_early || kgdb_arch_can_debug_early())) kgdb_initial_breakpoint(); return 0; @@ -1169,7 +1178,7 @@ static int __init opt_kgdb_wait(char *str) kgdb_break_asap = 1; kdb_init(KDB_INIT_EARLY); - if (kgdb_io_module_registered) + if (kgdb_io_module_registered && kgdb_arch_can_debug_early()) kgdb_initial_breakpoint(); return 0; -- 2.26.1.301.g55bc3eb7cb9-goog