Hi Tao,
On 03/10/24 16:04, Tao Liu wrote:
Hi Aditya & lianbo,
On Mon, Sep 23, 2024 at 5:00 AM Aditya Gupta <adityag@xxxxxxxxxxxxx> wrote:
Hi Tao,
On 18/09/24 05:12, Tao Liu wrote:
Previously the newsp read from stack is unchecked, it would expect
the newsp hold a valid sp pointer of the next stack frame by default,
which is not always true, see the following stack:
R1: c00000000a327660 NIP: c0000000002b9984
#0 [c00000000a327660] crash_setup_regs at c0000000002b9984
c00000000a327660: c00000000015a7b0 c000000001bc8600
c00000000a327670: 0000000000000000 c000000002e13b54
c00000000a327680: c00000000a327850 0000000000004000
c00000000a327690: c0000000002ba078 c0000000026f2ca8
The newsp will be c00000000015a7b0, which is not a valid stack pointer
and as a result it will fail the stack back trace afterwards. This usually
happens at the beginning of back trace, once we get the correct sp value,
the stack can be back traced successfully.
Seems weird that this issue occurred in the first place. The stack frame
should have a valid previous sp at 0th offset to sp, according to the
PowerISA document.
I finally figured out the reason for the faulty stack. The reason is
due to gcc, the previous inlined function crash_setup_regs is no
longer inlined, which led to a malformed stack, see the following:
crash> bt -f
R1: c00000000a327660 NIP: c0000000002b9984
[NIP : crash_setup_regs+68]
[LR : __crash_kexec+156]
#0 [c00000000a327660] crash_setup_regs at c0000000002b9984
c00000000a327660: c00000000015a7b0 c000000001bc8600
c00000000a327670: 0000000000000000 c000000002e13b54
crash> dis __crash_kexec
...
0xc0000000002ba054 <__crash_kexec+148>: addi r3,r1,40
0xc0000000002ba058 <__crash_kexec+152>: bl 0xc0000000002b9948
<crash_setup_regs+8>
0xc0000000002ba05c <__crash_kexec+156>: bl 0xc0000000002b7c58
<crash_save_vmcoreinfo+8>
0xc0000000002ba060 <__crash_kexec+160>: nop
0xc0000000002ba064 <__crash_kexec+164>: addi r3,r1,40
0xc0000000002ba068 <__crash_kexec+168>: bl 0xc00000000015a6e8
<machine_crash_shutdown+8>
0xc0000000002ba06c <__crash_kexec+172>: nop
0xc0000000002ba070 <__crash_kexec+176>: ld r3,0(r29)
0xc0000000002ba074 <__crash_kexec+180>: bl 0xc00000000015a738
<machine_kexec+8>
0xc0000000002ba078 <__crash_kexec+184>: nop
...
crash> dis crash_setup_regs
...
0xc0000000002b9948 <crash_setup_regs+8>: mflr r0
0xc0000000002b994c <crash_setup_regs+12>: cmpdi r4,0
0xc0000000002b9950 <crash_setup_regs+16>: std r0,16(r1)
0xc0000000002b9954 <crash_setup_regs+20>: stdu r1,-32(r1)
0xc0000000002b9958 <crash_setup_regs+24>: beq
0xc0000000002b9980 <crash_setup_regs+64>
...
0xc0000000002b9980 <crash_setup_regs+64>: bl
0xc00000000007a964 <ppc_save_regs>
0xc0000000002b9984 <crash_setup_regs+68>: nop
...
crash> dis ppc_save_regs
0xc00000000007a964 <ppc_save_regs>: addi r3,r3,-48
0xc00000000007a968 <ppc_save_regs+4>: std r0,48(r3)
0xc00000000007a96c <ppc_save_regs+8>: std r2,64(r3)
...
0xc00000000007a9fc <ppc_save_regs+152>: mflr r0
0xc00000000007aa00 <ppc_save_regs+156>: std r0,304(r3)
...
As we can see, NIP is c0000000002b9984, which is right after "bl
ppc_save_regs", which is expected because the NIP is assigned as the
value of LR in instruction 0xc00000000007a9fc and 0xc00000000007aa00,
and R1(sp) is also stored in ppc_save_regs. Since there is no stack
push in ppc_save_regs, the stack pointer remains to be the same as
crash_setup_regs()'s. crash_setup_regs() have stack push in
0xc0000000002b9954, so it has a lower stack frame than its parent
function __crash_kexec.
Then the execution will finally enter into machine_kexec():
crash_setup_regs(&fixed_regs, regs);
crash_save_vmcoreinfo();
machine_crash_shutdown(&fixed_regs);
machine_kexec(kexec_crash_image);
So the stack frame will be modified, that's why the c00000000a327660
address doesn't hold a valid stack address. However if function
crash_setup_regs() is inlined, it will have the same stack as its
parent function __crash_kexec, and later function calling will grow
down the stack thus will not modify this stack frame.
In fact, the crash_setup_regs() should always be inlined, in order to
have the same stack frame as its parent function __crash_kexec()'s. We
can see the function should be inlined in different archs:
static inline void crash_setup_regs(...)
But according to the disassembly above, crash_setup_regs() is not
inlined, which leads to this bug. For the above kernel, it's
6.10.0-15.el10.ppc64le compiled by gcc (GCC) 14.1.1. If we compile the
same kernel code with rhel9's gcc, aka gcc (GCC) 11.5.0, then the
function can be inlined as expected.
The same issue also exists in x86_64 arch. However I cannot dive into
gcc code why newer versions will make the inline function like this.
Or we can modify crash_setup_regs() to be the following:
static inline void __attribute__((always_inline)) crash_setup_regs(...)
Any thoughts?
Interesting. I had fixed a similar issue in the kernel earlier, with the
ppc64 register saving part.
Let's see, GCC apart, crash & gdb should have been able to handle this
inlining/not inlined right ?
Will look into it. Currently on leave till next 2 days. Will look after
that.
Thanks,
Aditya Gupta
Thanks,
Tao Liu
Anyways this patch is also good, doesn't seem problematic for the
previous working cases.
Thanks,
Aditya Gupta
This patch will search and check for the valid newsp at the beginning of
stack back trace. For the above example, a valid newsp would be assigned
as c00000000a327850.
Before:
crash> bt
...
#0 [c00000000a327660] crash_setup_regs at c0000000002b9984
After:
crash> bt
...
#0 [c00000000a327660] crash_setup_regs at c0000000002b9984
#1 [c00000000a327850] panic at c000000000167de4
#2 [c00000000a3278f0] sysrq_handle_crash at c000000000a4d3a8
#3 [c00000000a327950] __handle_sysrq at c000000000a4dec4
#4 [c00000000a3279f0] write_sysrq_trigger at c000000000a4e984
...
Signed-off-by: Tao Liu <ltao@xxxxxxxxxx>
---
ppc64.c | 13 +++++++++++++
1 file changed, 13 insertions(+)
diff --git a/ppc64.c b/ppc64.c
index 6e5f155..8af7b8a 100644
--- a/ppc64.c
+++ b/ppc64.c
@@ -2148,6 +2148,19 @@ ppc64_back_trace(struct gnu_request *req, struct bt_info *bt)
while (INSTACK(req->sp, bt)) {
newsp = *(ulong *)&bt->stackbuf[req->sp - bt->stackbase];
+
+ if (!newpc) {
+ ulong *up;
+ int i;
+ for (i = 0, up = (ulong *)&bt->stackbuf[req->sp - bt->stackbase];
+ i < (req->sp - bt->stackbase) / sizeof(ulong); i++, up++) {
+ if (INSTACK(*up, bt) && is_kernel_text(*(up + 2))) {
+ newsp = *up;
+ break;
+ }
+ }
+ }
+
if ((req->name = closest_symbol(req->pc)) == NULL) {
if (CRASHDEBUG(1)) {
error(FATAL,
--
Crash-utility mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxxxxxx
https://${domain_name}/admin/lists/devel.lists.crash-utility.osci.io/
Contribution Guidelines: https://github.com/crash-utility/crash/wiki