Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp4902556iob; Mon, 9 May 2022 04:29:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqFv5lU9aNoNXmpzBGmD/MJ0Gs7OTBInJap0tJNkj0lB7CzNYSjleunehR3686DwKQ3VcR X-Received: by 2002:a65:4c05:0:b0:3c2:43d8:af83 with SMTP id u5-20020a654c05000000b003c243d8af83mr12763860pgq.335.1652095777110; Mon, 09 May 2022 04:29:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652095777; cv=none; d=google.com; s=arc-20160816; b=X2m9wRybeM/7zIn3hfZCAZSIfLfimVsca2vc9Xi15wXqaCe2MQSDnpi6ViznyI9pUk mghUfLwZSNwcYoJlXbI7fNl8NRYhyCl5HD+GbxblU96cPJ7AdCdRiXfTWX2kME4z8tlf yNky4lrQN98m929YeN2JtT7lPGGo0uFJsC4pHONqfwB9sAzbdvBA/EdI17J9PzKb9pzP UBnFaR832GfdwfHSBAp8PpWrVz7bNUV2vsjREbACY9b7pE3QNNg6B4ro2SS6N7TNozU+ 6ODj9H5Tl+7jTJpNmL1iab2ZiknGqX7UAptRhfrJYWHHAWputW+sx3ZDjNCCocgKvBQ6 KPKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=AowRGRasopjKGAbpluHmYWETNwk2Wj/ARhfPt1Vl8x4=; b=BwbBaz7jKhCJG9ptvrqIOWe8HOdaupZS99JdaALsf6egWUeguYaJeSHquII6Ltn2cJ 5PSac2lZL6rzkW9N6r5NipgchozYapnbyWhe+847HD1q1dt4AybEKWBOr6zHeyzp+WKe NXfkZWXZaU9MUPjYEe8uwYlRwimwbVHE9sxMYdgvFqASDly9CYbOsJKia8U6avF2IxzX zccd8eTTBnUddmdWO5FxqLtgfPCE06NtKJ8t2iWqhfAFxspADu2s/sC4Gx92Wxl8+LFv jCwtCLZZQnwzrAhS/X61DWqYmJ9/rqO8nUtGu5/8IXbRsnBE1UjEbiuKRdiMRFsgBL3l DpiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=jloBBYCM; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id u6-20020a63ef06000000b003c1a428e951si14236986pgh.53.2022.05.09.04.29.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 May 2022 04:29:37 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=jloBBYCM; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 067A82B8276; Mon, 9 May 2022 03:36:32 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237978AbiEIJeE (ORCPT + 99 others); Mon, 9 May 2022 05:34:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40646 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237265AbiEIJ3J (ORCPT ); Mon, 9 May 2022 05:29:09 -0400 Received: from mail-wr1-x433.google.com (mail-wr1-x433.google.com [IPv6:2a00:1450:4864:20::433]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EB64020D562 for ; Mon, 9 May 2022 02:25:15 -0700 (PDT) Received: by mail-wr1-x433.google.com with SMTP id x18so18559488wrc.0 for ; Mon, 09 May 2022 02:25:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=AowRGRasopjKGAbpluHmYWETNwk2Wj/ARhfPt1Vl8x4=; b=jloBBYCMHF/3nKbVPNtscu6/gjJx+pmripYAaoMWTYv721Cotb2jz4/jDod5Ik5t1f UuDcjyJccqXHQa5/Mv9lq9HrxDxMwAr9C4N2vZmViovyFavKwxCHPSFH1wBHu6mFZ6yN ZUMtT+vafKr6neA3/wYEmh5tv+znJLo/C5f+2CKZ3xURsKPL22q4ef113Ps5io3CUmr2 mScKeFyhTy75MHBgGHn6LpE8FtR3RLBQ/t5p/aWtIAWo50AVmM2OHjvrCNXVtFY0A1x0 afbSqAK7NhoaSG9vkH/V+YBByGKcHFUIa+WPiiT7Vhj9Eb9m0KE0PC95Ka2s/8ZOYC6D 98eQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=AowRGRasopjKGAbpluHmYWETNwk2Wj/ARhfPt1Vl8x4=; b=sMoCXriJaTg5iv6IQuKu4plkyw1ABRI/HNmgpLhgXdqeUtbr0eC2DW9pcCj/oBTQPa tdANVuRarBi8Iu7kb7PzFYDSB9TlLd2C1mbypY8b1Uu2BCThhoEBXYIUFvOZrXWhPvyb YJT46oa3ermNvAqZVh77zV1dfyurDJ4b9fCfvgcdAoxo9TsDbPTf4B/DRRvcuiZAylS2 R2MrSvYa3nBpA+9KICU2/GPEG5rKCwsIo3aEtA0JBqsSWJL76LGgkeg1sTTSQY4nj9dl FqD/BGzM1kv/9pttma7kVejda+8X8hrPG2RLRcjv+myIXBWcIpxQ3D8e2N8IcLd2cdX7 DouQ== X-Gm-Message-State: AOAM530bI/fblEnBHRgykHYmD9pdH3egjWRFhYXWSdBrCR7JCeNHVQot TVL+1wwBiLYiV/rZCnCL/vc59w== X-Received: by 2002:a5d:6448:0:b0:20a:d70e:cc9 with SMTP id d8-20020a5d6448000000b0020ad70e0cc9mr13196081wrw.184.1652088314414; Mon, 09 May 2022 02:25:14 -0700 (PDT) Received: from maple.lan (cpc141216-aztw34-2-0-cust174.18-1.cable.virginm.net. [80.7.220.175]) by smtp.gmail.com with ESMTPSA id v12-20020a5d610c000000b0020c5253d8e1sm2025172wrt.45.2022.05.09.02.25.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 May 2022 02:25:13 -0700 (PDT) Date: Mon, 9 May 2022 10:25:11 +0100 From: Daniel Thompson To: Sumit Garg Cc: linux-arm-kernel@lists.infradead.org, dianders@chromium.org, will@kernel.org, liwei391@huawei.com, catalin.marinas@arm.com, mark.rutland@arm.com, mhiramat@kernel.org, jason.wessel@windriver.com, maz@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 1/2] arm64: entry: Skip single stepping interrupt handlers Message-ID: <20220509092511.vey3tigggg6tnek7@maple.lan> References: <20220413065458.88541-1-sumit.garg@linaro.org> <20220413065458.88541-2-sumit.garg@linaro.org> <20220506160649.ojwc4rqpyhxqyrdo@maple.lan> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 09, 2022 at 01:25:21PM +0530, Sumit Garg wrote: > Hi Daniel, > > On Fri, 6 May 2022 at 21:36, Daniel Thompson wrote: > > > > On Wed, Apr 13, 2022 at 12:24:57PM +0530, Sumit Garg wrote: > > > Current implementation allows single stepping into interrupt handlers > > > for interrupts that were received during single stepping. But interrupt > > > handlers aren't something that the user expect to debug. Moreover single > > > stepping interrupt handlers is risky as it may sometimes leads to > > > unbalanced locking when we resume from single-step debug. > > > > Why does single stepping interrupt handlers cause unbalanced locking > > (with the current code)? > > > > I have to dig deeper to completely answer this question but this is > based on observation from following warning splats seen while single > stepping interrupt handlers: > > [ 300.328300] WARNING: bad unlock balance detected! > [ 300.328608] 5.18.0-rc1-00016-g3e732ebf7316-dirty #6 Not tainted > [ 300.329058] ------------------------------------- > [ 300.329298] sh/173 is trying to release lock (dbg_slave_lock) at: > [ 300.329718] [] kgdb_cpu_enter+0x7ac/0x820 > [ 300.330029] but there are no more locks to release! > [ 300.330265] > [ 300.330265] other info that might help us debug this: > [ 300.330668] 4 locks held by sh/173: > [ 300.330891] #0: ffff4f5e454d8438 (sb_writers#3){.+.+}-{0:0}, at: > vfs_write+0x98/0x204 > [ 300.331735] #1: ffffd57c973bc2f0 (dbg_slave_lock){+.+.}-{2:2}, at: > kgdb_cpu_enter+0x5b4/0x820 > [ 300.332259] #2: ffffd57c973a9460 (rcu_read_lock){....}-{1:2}, at: > kgdb_cpu_enter+0xe0/0x820 > [ 300.332717] #3: ffffd57c973bc2a8 (dbg_master_lock){....}-{2:2}, > at: kgdb_cpu_enter+0x1ec/0x820 This splat tells us we entered the debugger from a regular task (echo g > /proc/sysrq-trigger by the looks of it) and exited the debugger from interrupt. As such I'd be inclined to describe this as a false positive: it occurs because we have not taught lockdep that the locks are effectively owned by the debug trap handler rather than the task/interrupt we trapped from. To be honest, for a very long time been inclined to replace dbg_slave_lock with an atomic flag instead. dbg_slave_lock isn't a lock in any meaningful sense since it is never contended for and literally only exists so that other cores can use raw_spin_is_locked() on it. However sorting out dbg_master_lock is a bit more complex though which is why I've never found the time for it (at least not yet). BTW I suspect this patch only avoids the simplest reproduction of this splat: I think a temporary breakpoint in the ISR that runs during the single step would also cause the single step to complete early, yielding the same splat. > > > Fix broken single-step implementation via skipping single-step over > > > interrupt handlers. The methodology is when we receive an interrupt from > > > EL1, check if we are single stepping (pstate.SS). If yes then we save > > > MDSCR_EL1.SS and clear the register bit if it was set. Then unmask only > > > D and leave I set. On return from the interrupt, set D and restore > > > MDSCR_EL1.SS. Along with this skip reschedule if we were stepping. > > > > Does this description really explains the motivation here. > > > > Isn't the goal to meet the user's expectation that when they step then > > the system will stop at PC+4 relative the instruction they are stepping > > (or PC+I for a branch that gets taken)? > > > > Yeah this matches my understanding as well. > > > To be clear, I've no objections to leaving interrupt handling enabled > > when single stepping (AFAIK it is similar to what x86 does) but I think > > this patch description will be difficult for future adventurers to > > comprehend. > > > > Okay, so does the below patch description sound apt? Not entirely. The lockdep splat still distracts from any explanation about why the patch is "the right thing to do". That the patch partially conceals a (false-positive) lockdep splat is nice but I don't think it should dominate the description of why single-step is unusable if a single step ends during interrupt handling. Surely a far more powerful motivation is that (currently) on systems when the timer interrupt (or any other fast-at-human-scale periodic interrupt) is active then it is impossible to step any code with interrupts unlocked because we will always end up stepping into the timer interrupt instead of stepping the user code. > " > Current implementation allows single stepping into interrupt handlers > for interrupts that were received during single stepping. But interrupt > handlers aren't something that the user expect to debug. As above, I think it is more than user expectation. With a 100Hz timer humans cannot react to the debugger fast enough to step before the next timer interrupt is due. > Moreover single > stepping interrupt handlers is risky as it may sometimes leads to > unbalanced locking when we resume from single-step debug: If you want to keep the comments about lockdep as an aside at the bottom the it is important to: s/stepping interrupt handlers/stepping into interrupt handlers/ ^^^^^^ > [ 300.328300] WARNING: bad unlock balance detected! > [ 300.328608] 5.18.0-rc1-00016-g3e732ebf7316-dirty #6 Not tainted > [ 300.329058] ------------------------------------- > [ 300.329298] sh/173 is trying to release lock (dbg_slave_lock) at: > [ 300.329718] [] kgdb_cpu_enter+0x7ac/0x820 > [ 300.330029] but there are no more locks to release! > [ 300.330265] > [ 300.330265] other info that might help us debug this: > [ 300.330668] 4 locks held by sh/173: > [ 300.330891] #0: ffff4f5e454d8438 (sb_writers#3){.+.+}-{0:0}, > at: vfs_write+0x98/0x204 > [ 300.331735] #1: ffffd57c973bc2f0 (dbg_slave_lock){+.+.}-{2:2}, > at: kgdb_cpu_enter+0x5b4/0x820 > [ 300.332259] #2: ffffd57c973a9460 (rcu_read_lock){....}-{1:2}, > at: kgdb_cpu_enter+0xe0/0x820 > [ 300.332717] #3: ffffd57c973bc2a8 > (dbg_master_lock){....}-{2:2}, at: kgdb_cpu_enter+0x1ec/0x820 > > The common user's expectation while single stepping is that when they > step then the system will stop at PC+4 or PC+I for a branch that gets > taken relative to the instruction they are stepping. So, fix broken single > step implementation via skipping single stepping interrupt handlers. > > The methodology is when we receive an interrupt from EL1, check if we > are single stepping (pstate.SS). If yes then we save MDSCR_EL1.SS and > clear the register bit if it was set. Then unmask only D and leave I set. On > return from the interrupt, set D and restore MDSCR_EL1.SS. Along with this > skip reschedule if we were stepping. > " > > -Sumit > > > > > Daniel. > > > > > > > Suggested-by: Will Deacon > > > Signed-off-by: Sumit Garg > > > --- > > > arch/arm64/kernel/entry-common.c | 18 +++++++++++++++++- > > > 1 file changed, 17 insertions(+), 1 deletion(-) > > > > > > diff --git a/arch/arm64/kernel/entry-common.c b/arch/arm64/kernel/entry-common.c > > > index 878c65aa7206..dd2d3af615de 100644 > > > --- a/arch/arm64/kernel/entry-common.c > > > +++ b/arch/arm64/kernel/entry-common.c > > > @@ -458,19 +458,35 @@ static __always_inline void __el1_irq(struct pt_regs *regs, > > > do_interrupt_handler(regs, handler); > > > irq_exit_rcu(); > > > > > > - arm64_preempt_schedule_irq(); > > > + /* Don't reschedule in case we are single stepping */ > > > + if (!(regs->pstate & DBG_SPSR_SS)) > > > + arm64_preempt_schedule_irq(); > > > > > > exit_to_kernel_mode(regs); > > > } > > > + > > > static void noinstr el1_interrupt(struct pt_regs *regs, > > > void (*handler)(struct pt_regs *)) > > > { > > > + unsigned long reg; > > > + > > > + /* Disable single stepping within interrupt handler */ > > > + if (regs->pstate & DBG_SPSR_SS) { > > > + reg = read_sysreg(mdscr_el1); > > > + write_sysreg(reg & ~DBG_MDSCR_SS, mdscr_el1); > > > + } > > > + > > > write_sysreg(DAIF_PROCCTX_NOIRQ, daif); > > > > > > if (IS_ENABLED(CONFIG_ARM64_PSEUDO_NMI) && !interrupts_enabled(regs)) > > > __el1_pnmi(regs, handler); > > > else > > > __el1_irq(regs, handler); > > > + > > > + if (regs->pstate & DBG_SPSR_SS) { > > > + write_sysreg(DAIF_PROCCTX_NOIRQ | PSR_D_BIT, daif); > > > + write_sysreg(reg, mdscr_el1); > > > + } > > > } > > > > > > asmlinkage void noinstr el1h_64_irq_handler(struct pt_regs *regs) > > > -- > > > 2.25.1