Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1967448ybh; Tue, 14 Jul 2020 11:54:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzs7FD0ZwaCF13B+5/HUPpzxaONSCFkY+insDY4jNsU5qi1p3qcS5asNdua01GSSW6gOPJo X-Received: by 2002:a17:906:6558:: with SMTP id u24mr5543420ejn.364.1594752879649; Tue, 14 Jul 2020 11:54:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594752879; cv=none; d=google.com; s=arc-20160816; b=LprI2VVhayfK32fKoTYpyYghgZSeYAO7eentaYGzCmBdcerqeyWt5tQDL6jQX4BrBZ PijJAy+MUJI+7PUVzZDaSElBeJ5Sfdkcm5aZ/9aVDWfNqDNMdUq9vDXBJDE6UDMwzjrG lb+7XpoifkyKFANb3qSnBLOaNJAvcXkWWhEP9Q7Kfb+I+4E+8L6mYsAOProYE5Fg/boC IU/ouXED3Mk3gNFGWYeXF72KjLliky6fOisyV4yQaDHKVsVzQqxrrVapZuAd1JJdkT+O BqO70dRIXGTRctQomdAIMZIaBf/bZfp+Ky+PM1JMqGehkbeRTp4hkVRB6EogfFL+hLBL PXWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=h6mYFDr+ixz0QqSmw1HiAWZ9qzNkCIt0A6bwM1Dp2hc=; b=rTVOpcaad8RHpRco2mH3n5mZrDf+luFyps2a/B2uvuxqGrffWzDc2J486j+rsZpxUG n4fNwkIejrBL2hO3u59EoilGFhml0k5YrjrfhmvHZ6B0cdTcazMkix7xCSdR7ZXv5fOu l6gYhsYJCge9Eot6k9B+VnYeI0l3aV1Wtk4FnU+OPWc+LC4j1eXb+5tDy4ArkTyYh12n wGs89WkXeIrzoqY6ySr41mIovQZq5uAcYfqDTjJyIw+70WsumAvpvfF7AQQPT78OJHKR mhf5JgtlCB1qXvO9LJdZja5o7q00CPvp+Mx6kqgEcruOQLzH9+SXfnkUR55Qh9ty2mFc 3uHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=T4DaWCGq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i26si10562763ejy.58.2020.07.14.11.54.15; Tue, 14 Jul 2020 11:54:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=T4DaWCGq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730313AbgGNSur (ORCPT + 99 others); Tue, 14 Jul 2020 14:50:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:46950 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729822AbgGNSuo (ORCPT ); Tue, 14 Jul 2020 14:50:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF3F122B2A; Tue, 14 Jul 2020 18:50:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594752644; bh=5Hw03hCETa3geWJT+1x20GX7IWtu0o/SVGlKB0Adm0M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T4DaWCGq6GyDOJ9ag3ZukQQb6BOlaB17TuUuc1+dakzgqOj7noToBs7WwdTYiiFt9 ggCI2yyRzl0Td+FsGNAl5GDNwwwOno4sMz1t3PwSX6BZqHHmXfVI3E/asTTlWO4BN/ kE5a2zq4PouLmGqx7J3xpDhsUMzTNTaYzo2wBpFU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wei Li , Douglas Anderson , Will Deacon , Sasha Levin Subject: [PATCH 5.4 057/109] arm64: kgdb: Fix single-step exception handling oops Date: Tue, 14 Jul 2020 20:44:00 +0200 Message-Id: <20200714184108.248882336@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200714184105.507384017@linuxfoundation.org> References: <20200714184105.507384017@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wei Li [ Upstream commit 8523c006264df65aac7d77284cc69aac46a6f842 ] After entering kdb due to breakpoint, when we execute 'ss' or 'go' (will delay installing breakpoints, do single-step first), it won't work correctly, and it will enter kdb due to oops. It's because the reason gotten in kdb_stub() is not as expected, and it seems that the ex_vector for single-step should be 0, like what arch powerpc/sh/parisc has implemented. Before the patch: Entering kdb (current=0xffff8000119e2dc0, pid 0) on processor 0 due to Keyboard Entry [0]kdb> bp printk Instruction(i) BP #0 at 0xffff8000101486cc (printk) is enabled addr at ffff8000101486cc, hardtype=0 installed=0 [0]kdb> g / # echo h > /proc/sysrq-trigger Entering kdb (current=0xffff0000fa878040, pid 266) on processor 3 due to Breakpoint @ 0xffff8000101486cc [3]kdb> ss Entering kdb (current=0xffff0000fa878040, pid 266) on processor 3 Oops: (null) due to oops @ 0xffff800010082ab8 CPU: 3 PID: 266 Comm: sh Not tainted 5.7.0-rc4-13839-gf0e5ad491718 #6 Hardware name: linux,dummy-virt (DT) pstate: 00000085 (nzcv daIf -PAN -UAO) pc : el1_irq+0x78/0x180 lr : __handle_sysrq+0x80/0x190 sp : ffff800015003bf0 x29: ffff800015003d20 x28: ffff0000fa878040 x27: 0000000000000000 x26: ffff80001126b1f0 x25: ffff800011b6a0d8 x24: 0000000000000000 x23: 0000000080200005 x22: ffff8000101486cc x21: ffff800015003d30 x20: 0000ffffffffffff x19: ffff8000119f2000 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 x8 : ffff800015003e50 x7 : 0000000000000002 x6 : 00000000380b9990 x5 : ffff8000106e99e8 x4 : ffff0000fadd83c0 x3 : 0000ffffffffffff x2 : ffff800011b6a0d8 x1 : ffff800011b6a000 x0 : ffff80001130c9d8 Call trace: el1_irq+0x78/0x180 printk+0x0/0x84 write_sysrq_trigger+0xb0/0x118 proc_reg_write+0xb4/0xe0 __vfs_write+0x18/0x40 vfs_write+0xb0/0x1b8 ksys_write+0x64/0xf0 __arm64_sys_write+0x14/0x20 el0_svc_common.constprop.2+0xb0/0x168 do_el0_svc+0x20/0x98 el0_sync_handler+0xec/0x1a8 el0_sync+0x140/0x180 [3]kdb> After the patch: Entering kdb (current=0xffff8000119e2dc0, pid 0) on processor 0 due to Keyboard Entry [0]kdb> bp printk Instruction(i) BP #0 at 0xffff8000101486cc (printk) is enabled addr at ffff8000101486cc, hardtype=0 installed=0 [0]kdb> g / # echo h > /proc/sysrq-trigger Entering kdb (current=0xffff0000fa852bc0, pid 268) on processor 0 due to Breakpoint @ 0xffff8000101486cc [0]kdb> g Entering kdb (current=0xffff0000fa852bc0, pid 268) on processor 0 due to Breakpoint @ 0xffff8000101486cc [0]kdb> ss Entering kdb (current=0xffff0000fa852bc0, pid 268) on processor 0 due to SS trap @ 0xffff800010082ab8 [0]kdb> Fixes: 44679a4f142b ("arm64: KGDB: Add step debugging support") Signed-off-by: Wei Li Tested-by: Douglas Anderson Reviewed-by: Douglas Anderson Link: https://lore.kernel.org/r/20200509214159.19680-2-liwei391@huawei.com Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/kgdb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/kernel/kgdb.c b/arch/arm64/kernel/kgdb.c index 43119922341f8..1a157ca33262d 100644 --- a/arch/arm64/kernel/kgdb.c +++ b/arch/arm64/kernel/kgdb.c @@ -252,7 +252,7 @@ static int kgdb_step_brk_fn(struct pt_regs *regs, unsigned int esr) if (!kgdb_single_step) return DBG_HOOK_ERROR; - kgdb_handle_exception(1, SIGTRAP, 0, regs); + kgdb_handle_exception(0, SIGTRAP, 0, regs); return DBG_HOOK_HANDLED; } NOKPROBE_SYMBOL(kgdb_step_brk_fn); -- 2.25.1