Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp492362ybt; Mon, 6 Jul 2020 14:39:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8fCY8eYYjmuZU1poipvQvmzSlq61ixqREBrRE3iRnxiUNybIBT6Swk2HFyRP83qf0vFc3 X-Received: by 2002:a50:b086:: with SMTP id j6mr56012378edd.6.1594071552713; Mon, 06 Jul 2020 14:39:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594071552; cv=none; d=google.com; s=arc-20160816; b=BkuBCNkyZ9muQbR+QHT5Ue8tHNpRRJBP5Nw1foDae1MBNERPa3LMqjXFg/Jfs6CPHt QyNcL88k2DtBYHklTNXWwZR2iy/V29jN8D3DPaK7cRym7xhy7RfH/RKwAcFO8eP5aICg xHFNWv7zYLPvmFNv3MCrzLyM26EIwNcZQedm6JUmG1F+UQU6Puf9mgJdECaOgRGBvb7W bbJoedK7RvDLTUNFopQdOAPVcOvQBtYJ/hJawAIHdxGC5U3DoZWtDFRclsnZ0HfqtKJy z5jxU3t3tG5EtnAhes/FMPk2FpgOeRMFrES1XX1QXrR4p84pkWa3MB1Q+Lb098lSEcz5 dgww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=7IhQtauBFGwHx8ZByHdSAFoarIEwWxbNNteM8SgQLyg=; b=I412GCO5YhRORL+Hn7cTTirRcGtv6RzTojOgQFV4F4qN0AwX2BeLHR6UtrjPpRB4DD U/CNyo72obMNvTBkezfGgftTIWlP+VAvPzUk3/6KUqetlrCoEHyux7KKXR58Z3/4J5Pp 47/XToxivKQJ2IOmrvkhds5A8YVriDDrRvPIZXo3EvyEsxobZm+3nZncdYIRwSZ/9NFE g7s74Gfk94oYNApzoumKECCjSiZ04YDLAJvUZXHPs+qDNpwCEL4o+PJaqcJvBCr6Zp9c 3xdJwRZMEoMYPGfQaYf7AqzMwUzhEAxzGCK+VMYG+9O10ESB7xFe8hSG5L5n2+bEv9qf iO0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=i8AoOce2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r4si14783515edl.262.2020.07.06.14.38.49; Mon, 06 Jul 2020 14:39:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=i8AoOce2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726857AbgGFVhX (ORCPT + 99 others); Mon, 6 Jul 2020 17:37:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726001AbgGFVhX (ORCPT ); Mon, 6 Jul 2020 17:37:23 -0400 Received: from mail-ua1-x943.google.com (mail-ua1-x943.google.com [IPv6:2607:f8b0:4864:20::943]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EB080C061755 for ; Mon, 6 Jul 2020 14:37:22 -0700 (PDT) Received: by mail-ua1-x943.google.com with SMTP id f11so2050856uao.9 for ; Mon, 06 Jul 2020 14:37:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7IhQtauBFGwHx8ZByHdSAFoarIEwWxbNNteM8SgQLyg=; b=i8AoOce2VysOfXS2qbFb7pSjCfDFiu0zZeN+6cl6eNyihFvfHe+8lZw6ZGXrmZed6h ueHTpGwM551qJDJDfM4xIk2S7UxXTnCv/ydiEku+rNBbcx5fo0gskdwzNzEdtEMQgKW8 3N8T1vrgyNphnkRpkR9tol3fj72/1wlLJ4HvQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7IhQtauBFGwHx8ZByHdSAFoarIEwWxbNNteM8SgQLyg=; b=BMDXYyzqIjRX0pHWqh2WBmBCn3/rOlR6IV0g3nWr2W7Dvt2oxz9ZIzZFbwuOS9IN5u vAEREYwlvHzkH5m9lvV+hnXCnNeCxet1ZxIi9HAWFjzwYc/WPEFBcetcLpjjPrhev+8Z Ud0+qtozEjzpmadK32vxEGxI3dJsWGcJhynFqNZaSf5ABbWQP40Mq/DYeljK9XZBn3ED h0EEA+S7JjzbjWCzE/FkTotFI5zd6XXzHHbL7esRCT+GTfMJpg++0K6TBjYaFlYlOIX+ AnHPQZFdNN6XmcDJToNnJ9YhmMdP1hqNgkK5BQdcUF665z8ZvcmfO5hmhFwaltvkL1UX vmDw== X-Gm-Message-State: AOAM530OLcja19HEpOTNtHpY90Ksw3sdawHIwFtcnxo2b1LzgAVUgchi uCtCfOZ0Jq6L8Za3OxNlhLTsSzg7S/I= X-Received: by 2002:ab0:7858:: with SMTP id y24mr19079386uaq.89.1594071441503; Mon, 06 Jul 2020 14:37:21 -0700 (PDT) Received: from mail-ua1-f50.google.com (mail-ua1-f50.google.com. [209.85.222.50]) by smtp.gmail.com with ESMTPSA id n17sm5261160uao.14.2020.07.06.14.37.19 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 06 Jul 2020 14:37:20 -0700 (PDT) Received: by mail-ua1-f50.google.com with SMTP id h18so6568585uao.6 for ; Mon, 06 Jul 2020 14:37:19 -0700 (PDT) X-Received: by 2002:ab0:2eab:: with SMTP id y11mr33204909uay.22.1594071438979; Mon, 06 Jul 2020 14:37:18 -0700 (PDT) MIME-Version: 1.0 References: <20200509214159.19680-1-liwei391@huawei.com> <20200630072221.GA13332@willie-the-truck> In-Reply-To: <20200630072221.GA13332@willie-the-truck> From: Doug Anderson Date: Mon, 6 Jul 2020 14:37:05 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/4] arm64: kgdb/kdb: Fix single-step debugging issues To: Will Deacon Cc: "liwei (GF)" , Daniel Thompson , Jason Wessel , Marc Zyngier , Mark Rutland , Masami Hiramatsu , David Miller , Catalin Marinas , Linux ARM , LKML , liwei1412@163.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Tue, Jun 30, 2020 at 12:22 AM Will Deacon wrote: > > On Mon, Jun 29, 2020 at 02:20:11PM -0700, Doug Anderson wrote: > > On Sat, May 16, 2020 at 1:20 AM liwei (GF) wrote: > > > On 2020/5/14 8:34, Doug Anderson wrote: > > > > On Sat, May 9, 2020 at 6:49 AM Wei Li wrote: > > > >> > > > >> This patch set is to fix several issues of single-step debugging > > > >> in kgdb/kdb on arm64. > > > >> > > > >> It seems that these issues have been shelved a very long time, > > > >> but i still hope to solve them, as the single-step debugging > > > >> is an useful feature. > > > >> > > > >> Note: > > > >> Based on patch "arm64: cacheflush: Fix KGDB trap detection", > > > >> https://www.spinics.net/lists/arm-kernel/msg803741.html > > > >> > > > >> Wei Li (4): > > > >> arm64: kgdb: Fix single-step exception handling oops > > > >> arm64: Extract kprobes_save_local_irqflag() and > > > >> kprobes_restore_local_irqflag() > > > >> arm64: kgdb: Fix single-stepping into the irq handler wrongly > > > >> arm64: kgdb: Set PSTATE.SS to 1 to reenable single-step > > > >> > > > >> arch/arm64/include/asm/debug-monitors.h | 6 ++++++ > > > >> arch/arm64/kernel/debug-monitors.c | 28 ++++++++++++++++++++++++- > > > >> arch/arm64/kernel/kgdb.c | 16 +++++++++++--- > > > >> arch/arm64/kernel/probes/kprobes.c | 28 ++----------------------- > > > >> 4 files changed, 48 insertions(+), 30 deletions(-) > > > > > > > > Just an overall note that I'm very happy that you posted this patch > > > > series! It's always been a thorn in my side that stepping and > > > > breakpoints were so broken on arm64 and I'm really excited that you're > > > > fixing them. Now I'll have to get in the habit of using kgdb for more > > > > than just debugging crashes and maybe I can use it more for exploring > > > > how functions work more. :-) > > > > > I'll also note that with your patch series I'm even seeing the "call" > > > > feature of gdb working now. That has always been terribly broken for > > > > me. > > > > > > > Thanks for reviewing and testing this series. > > > Enjoy exploring the kernel with kgdb/kdb! :-) > > > > I'm curious to know if you plan another spin. The feedback you > > received was fairly minor so it hopefully shouldn't be too hard. I'd > > very much like to get your patches landed and I'd be happy to try to > > address the feedback and spin them myself if you're no longer > > available for it. > > I'd welcome some feedback on the proposal I sent out at the end of last > week: > > https://lore.kernel.org/r/20200626095551.GA9312@willie-the-truck > > which looks to solve some (all?) of these issues Actually, I'm pretty sure that patch #1 of Wei Li's patch series would still be needed. Would you object to landing it now just to get one patch outta the way? https://lkml.kernel.org/r/20200509214159.19680-2-liwei391@huawei.com > slightly differently, > because it turns out we need to perform some low-level surgery for > preempt-rt *anyway*... > > I'm particularly keen to hear any thoughts concerning the reschedule on > return to EL1 after handling an interrupt that hit during a step. Thanks for the pointer! Unfortunately this is yet another area that I'm keenly interested in it working but pretty much clueless about how this whole area of the system works. :-| My first question, though, is why would we want interrupts enabled while we're single stepping? If you're trying to get the processor to just step one instruction forward you don't really want a bunch of IRQs going off in the middle of it, do you? While in kgdb and debugging the kernel I would assume that a single step would run the very least amount of code that it could (other than debugger code). In general every time I exit kgdb (and re-start running the kernel normally) I sorta assume that there's a chance that something in the system will hit a timeout (maybe it's talking to external hardware that will give up or something). If I'm stepping through code I just want that little bit of code I'm running to move forward and the rest of the kernel to stand still. If I want the rest of the kernel to proceed I guess I'd set a breakpoint and then say "continue". It seemed like with Wei Li's patch that we were closing holes and being more consistent about keeping interrupts disabled when stepping and I liked that. Maybe if we made it so that taking interrupts didn't break everything then it would be _OK_ to let them fire, but if I had a choice I'd rather they didn't. ...of course, I'm looking at all this from the point of view of kgdb. I don't know nearly enough about how other parts of the kernel use single step to comment much on what would be best for them. Did what I said make sense at all, or was it gibberish? ...or not gibberish but not what you were looking for? -Doug