Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp2933124pxb; Thu, 10 Feb 2022 08:36:24 -0800 (PST) X-Google-Smtp-Source: ABdhPJzmfxGwON7mFLXIly2QGWBuRVb2xcWMrybmagmoU4mOLUwtUN5NvTKwuc60p5AZE7kNz8c0 X-Received: by 2002:a05:6a00:14d1:: with SMTP id w17mr8364772pfu.46.1644510984594; Thu, 10 Feb 2022 08:36:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644510984; cv=none; d=google.com; s=arc-20160816; b=irishWIbfcloFzBIbnJ4vb2Ft+tfwG3KnnLEH6Wba8gT37TpRFFho+SlPL9YjdVwKE fkIveuchSiqhrX8IdY1CPsXdl9knrkUJ+VjCUN+KAri3EP9Y1HRqEimvnNqtlY/Ji+G2 Vcp9Ttj2ng/uLOC2eazlDg3iBc+5dtCDri57FBISGEDEQEkv8mwluWISxtNoxPORUqTn D2P0cGfn+iJqbqQukiz3VGkmBknP3nxbv9o3yiXqdyZnzSkQq4jqzlY2vQqIo5Gio71g baqHRucEVeYErMpnsAibL+3QuKZSgS0FFjuueFhabQIcDwgg4WVeR64za7Ac02QwW2IE XcTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hjZNWb/vrnQYQGNxBbaEuWZb/Y3HjELWStwBx27Q2lU=; b=m1KudFy7SpreZEpFnS5Lk3sT5l9RkT14kxxTQgWkUfaO1Gk3siq1Z+g3LXwQaDHcAJ +YYiG7TuQIxWOrBuGbKIBvEOZx7r49A052mZls9vgo8Y826QACowmhZmCH5PdB4tQqEl HWie1cYJ8/uA0PmwwUURq54I3jv7R4MntrTuyRU6MDF/umjK7XW24X1519xmQwgRYue3 t2v/auYoOIs6EEBqm5IkZ0ipBDbVLNwz76lWzQa72BMvVlbPztVa/3rUTNNoLdyDyhuu 9YXG4nqzqHP8eyctdrnHcClRqeS48DaHocex8tG6xMDyapXjRqFSPi/CVS8oJelRqcFb d29Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qNoQcbB5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b7si2468115plg.335.2022.02.10.08.36.10; Thu, 10 Feb 2022 08:36:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qNoQcbB5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243669AbiBJPfE (ORCPT + 99 others); Thu, 10 Feb 2022 10:35:04 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:33984 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243665AbiBJPfC (ORCPT ); Thu, 10 Feb 2022 10:35:02 -0500 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6C14A1F1 for ; Thu, 10 Feb 2022 07:35:03 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id DEC04CE2497 for ; Thu, 10 Feb 2022 15:35:01 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CF8FEC340EF; Thu, 10 Feb 2022 15:34:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1644507300; bh=clEGNTWIfRsJvrby4PkDFMXE3z2jyTpXZkiGNgCi+OI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=qNoQcbB5Pj3ix0LecXz1t15EonLl6Gw+r+2yHLfKFJ2XIU7wB5fdADfV0RYF1YyDj frxzzJ8Ob8m3qpCMr+JHIxJ1RuLMID6b55O5msWNKkuz1rtSktQfgATm3kCwfVQYlE 8aVQkrL6TZQ2wNS/XomcQpSQLHs4O0Cc6JH66R30jQ/g2+7cOJeY4WSDdp7XJpLwWy g1ZqdaFdO2dSw4RWqE8rHdi5XDpqUCrg1ehEMq8cy/HwMl6iwUc1MIaCibNNz71kNA tQxA+YQqOlQm1+obo3Yb2x72psaeIsX0GPGQ9ZHmQBWp4HSirqbCMZKWtGzaQZhkhL OgK8J+p8ZOZSQ== Date: Thu, 10 Feb 2022 23:27:09 +0800 From: Jisheng Zhang To: Changbin Du Cc: Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] riscv: fix oops caused by irq on/off tracer Message-ID: References: <20220129004226.32868-1-changbin.du@gmail.com> <20220207123850.l4r5qjswaegwisbx@mail.google.com> <20220208003502.62gi5xhyg6bk2t2h@mail.google.com> <20220210133758.yzebffln6j76zme6@mail.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20220210133758.yzebffln6j76zme6@mail.google.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 10, 2022 at 09:37:58PM +0800, Changbin Du wrote: > On Thu, Feb 10, 2022 at 01:32:59AM +0800, Jisheng Zhang wrote: > [snip] > > Hi Changbin, > > > > I read the code and find that current riscv frame records during > > exception isn't as completed as other architectures. riscv only > > records frames from the ret_from_exception(). If we add completed > What do you mean for 'record'? > stack frame record. > > frame records as other arch do, then the issue you saw can also > > be fixed at the same time. > > > I don't think so. The problem is __builtin_return_address(1) trigger page fault > here. There's misunderstanding here. I interpret this bug as incomplete stackframes. This is current riscv stackframe during exception: high ---------------- top | | <- ret_from_exception ---------------- | | <- trace_hardirqs_on ----------------- low As you said, the CALLER_ADDR1 a.k.a __builtin_return_address(1) needs at least two parent call frames. If we complete the stackframes during exception as other arch does: high ---------------- top | | <- the synthetic stackframe from the interrupted point ---------------- ..... ---------------- | | <- ret_from_exception ---------------- | | <- trace_hardirqs_on ----------------- low Then we meet the "at least two parent call frames" requirement. IOW, my solution solve the problem from the entry.S side. One of the advantages would be we let interrupted point show up in dump_stack() as other arch do. What I'm not sure is whether it's safe to do so now since rc3 is released. > > > However, I'm not sure what's the best choice now. > > > > A simple demo to this incomplete frames: > > add dump_stack() in any ISR, then > > > > in riscv: > > [ 2.961294] Call Trace: > > [ 2.961460] [] dump_backtrace+0x1c/0x24 > > [ 2.961823] [] show_stack+0x2c/0x38 > > [ 2.962153] [] dump_stack_lvl+0x40/0x58 > > [ 2.962483] [] dump_stack+0x14/0x1c > > [ 2.962792] [] serial8250_interrupt+0x20/0x82 > > [ 2.963139] [] __handle_irq_event_percpu+0x4c/0x106 > > [ 2.963526] [] handle_irq_event+0x38/0x80 > > [ 2.963856] [] handle_fasteoi_irq+0x96/0x188 > > [ 2.964198] [] generic_handle_domain_irq+0x28/0x3a > > [ 2.964567] [] plic_handle_irq+0x88/0xec > > [ 2.964896] [] generic_handle_domain_irq+0x28/0x3a > > [ 2.965264] [] riscv_intc_irq+0x34/0x5c > > [ 2.965584] [] generic_handle_arch_irq+0x4a/0x74 > > [ 2.966068] [] ret_from_exception+0x0/0xc > > > > in x86: > > [ 1.191274] Call Trace: > > [ 1.192223] > > [ 1.192758] dump_stack_lvl+0x45/0x59 > > [ 1.192982] serial8250_interrupt+0x24/0x88 > > [ 1.193105] __handle_irq_event_percpu+0x66/0x1b0 > > [ 1.193239] handle_irq_event+0x34/0x70 > > [ 1.193345] handle_edge_irq+0x85/0x1e0 > > [ 1.193455] __common_interrupt+0x38/0x90 > > [ 1.193573] common_interrupt+0x73/0x90 > > [ 1.193809] > > [ 1.193889] > > [ 1.193956] asm_common_interrupt+0x1b/0x40 > > [ 1.194318] RIP: 0010:_raw_spin_unlock_irqrestore+0x1b/0x40 > > [ 1.194566] Code: 24 be 01 02 00 00 e9 54 20 bf ff 0f 1f 40 00 0f 1f > > 44 00 00 f7 c6 00f > > [ 1.195137] RSP: 0000:ffff888000243b68 EFLAGS: 00000246 > > [ 1.195314] RAX: 0000000000000000 RBX: ffffffff82025840 RCX: > > 0000000000000000 > > [ 1.195482] RDX: 0000000000000001 RSI: 0000000000000000 RDI: > > 0000000000000001 > > [ 1.195645] RBP: 0000000000000202 R08: ffffffffffffffff R09: > > 0000000000000000 > > [ 1.195808] R10: 00000000000000eb R11: 0000000000000000 R12: > > 0000000000000000 > > [ 1.195972] R13: 0000000000000040 R14: 0000000000000000 R15: > > ffff888000c39000 > > [ 1.196245] ? _raw_spin_unlock_irqrestore+0x15/0x40 > > [ 1.196373] serial8250_do_startup+0x42d/0x600 > > [ 1.196502] uart_port_startup+0x11b/0x270 > > [ 1.196619] uart_port_activate+0x3f/0x60 > > [ 1.196729] tty_port_open+0x7e/0xd0 > > [ 1.196835] ? _raw_spin_unlock+0x12/0x30 > > [ 1.196942] uart_open+0x1a/0x30 > > [ 1.197036] tty_open+0x153/0x7c0 > > [ 1.197144] chrdev_open+0xbf/0x230 > > [ 1.197253] ? cdev_device_add+0x90/0x90 > > [ 1.197359] do_dentry_open+0x13c/0x360 > > [ 1.197470] path_openat+0xb0c/0xe00 > > [ 1.197577] ? update_load_avg+0x5f/0x640 > > [ 1.197691] ? finish_task_switch.isra.0+0xac/0x240 > > [ 1.197821] do_filp_open+0xb2/0x150 > > [ 1.197935] ? preempt_schedule_thunk+0x16/0x18 > > [ 1.198049] ? preempt_schedule_common+0x90/0xd0 > > [ 1.198167] ? preempt_schedule_thunk+0x16/0x18 > > [ 1.198291] file_open_name+0xf1/0x1b0 > > [ 1.198397] filp_open+0x2c/0x50 > > [ 1.198495] console_on_rootfs+0x19/0x52 > > [ 1.198648] kernel_init_freeable+0x19a/0x1c7 > > [ 1.198765] ? rest_init+0xc0/0xc0 > > [ 1.198867] kernel_init+0x16/0x110 > > [ 1.198965] ret_from_fork+0x1f/0x30 > > [ 1.199131] > > > As I said before, this issue is not related to stackdump. > > Besides, you can see more calltrace on x86 that because x86 iterate all stacks > (kernel, irq or exception) when dumping stacktrace. While RISCV only show > calltrace of current stack. > I'm not sure whether there's misunderstanding. See above. Thanks