[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201015212931.mh4a5jt7pxqlzxsg@treble>
Date: Thu, 15 Oct 2020 16:29:31 -0500
From: Josh Poimboeuf <jpoimboe@...hat.com>
To: Mark Brown <broonie@...nel.org>
Cc: Mark Rutland <mark.rutland@....com>,
Miroslav Benes <mbenes@...e.cz>,
Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will@...nel.org>,
linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
live-patching@...r.kernel.org
Subject: Re: [RFC PATCH 0/3] arm64: Implement reliable stack trace
I can't see the original patch. Can the original poster (Mark B?) add
me to Cc on the next version?
It's also good practice to add lkml as well. That way, those of us not
copied can at least find the patch in the archives.
live-patching@...r.kernel.org would also be a good idea for this one.
On Thu, Oct 15, 2020 at 04:49:51PM +0100, Mark Brown wrote:
> On Thu, Oct 15, 2020 at 03:16:12PM +0100, Mark Rutland wrote:
> > On Thu, Oct 15, 2020 at 03:39:37PM +0200, Miroslav Benes wrote:
>
> > > I'll just copy an excerpt from my notes about the required guarantees.
> > > Written by Josh (CCed, he has better idea about the problem than me
> > > anyway).
>
> > > It also needs to:
> > > - detect preemption / page fault frames and return an error
> > > - only return success if it reaches the end of the task stack; for user
> > > tasks, that means the syscall barrier; for kthreads/idle tasks, that
> > > means finding a defined thread entry point
> > > - make sure it can't get into a recursive loop
> > > - make sure each return address is a valid text address
> > > - properly detect generated code hacks like function graph tracing and
> > > kretprobes
> > > "
>
> > It would be great if we could put something like the above into the
> > kernel tree, either under Documentation/ or in a comment somewhere for
> > the reliable stacktrace functions.
>
> Yes, please - the expecations are quite hard to follow at the minute,
> implementing it involves quite a bit of guesswork and cargo culting to
> figure out what the APIs are supposed to do.
Documentation is indeed long overdue. I suppose everyone's looking at
me. I can do that, but my bandwidth's limited for at least a few weeks.
[ Currently in week 4 of traveling cross-country with a camper
("caravan" in British-speak?), National Lampoon vacation style. ]
If by cargo culting, you mean reverse engineering the requirements due
to lack of documentation, that's fair.
Otherwise, if you see anything that doesn't make sense or that can be
improved, let me know.
> > AFAICT, existing architectures don't always handle all of the above in
> > arch_stack_walk_reliable(). For example, it looks like x86 assumes
> > unwiding through exceptions is reliable for !CONFIG_FRAME_POINTER, but I
> > think this might not always be true.
Why not?
What else are the existing arches missing from the above list?
> I certainly wouldn't have inferred the list from what's there :/
Fair, presumably because of missing documentation.
> The searching for a defined thread entry point for example isn't
> entirely visible in the implementations.
For now I'll speak only of x86, because I don't quite remember how
powerpc does it.
For thread entry points, aka the "end" of the stack:
- For ORC, the end of the stack is either pt_regs, or -- when unwinding
from kthreads, idle tasks, or irqs/exceptions in entry code --
UNWIND_HINT_EMPTY (found by the unwinder's check for orc->end.
[ Admittedly the implementation needs to be cleaned up a bit. EMPTY
is too broad and needs to be split into UNDEFINED and ENTRY. ]
- For frame pointers, by convention, the end of the stack for all tasks
is a defined stack offset: end of stack page - sizeof(pt_regs).
And yes, all that needs to be documented.
--
Josh
Powered by blists - more mailing lists