[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6db50470-ac37-0328-37a2-760665668b5f@efficios.com>
Date: Wed, 7 Dec 2022 10:18:13 -0500
From: Mathieu Desnoyers <mathieu.desnoyers@...icios.com>
To: Michael Ellerman <mpe@...erman.id.au>,
Michael Jeanson <mjeanson@...icios.com>,
Christophe Leroy <christophe.leroy@...roup.eu>,
Steven Rostedt <rostedt@...dmis.org>
Cc: "stable@...r.kernel.org" <stable@...r.kernel.org>,
Masami Hiramatsu <mhiramat@...nel.org>,
Mark Rutland <mark.rutland@....com>,
Nicholas Piggin <npiggin@...il.com>,
Michal Suchanek <msuchanek@...e.de>,
"linuxppc-dev@...ts.ozlabs.org" <linuxppc-dev@...ts.ozlabs.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] powerpc/ftrace: fix syscall tracing on PPC64_ELF_ABI_V1
On 2022-12-06 21:09, Michael Ellerman wrote:
> Mathieu Desnoyers <mathieu.desnoyers@...icios.com> writes:
>> On 2022-12-05 17:50, Michael Ellerman wrote:
>>> Michael Jeanson <mjeanson@...icios.com> writes:
>>>> On 2022-12-05 15:11, Michael Jeanson wrote:
>>>>>>>> Michael Jeanson <mjeanson@...icios.com> writes:
>>>>>>>>> In v5.7 the powerpc syscall entry/exit logic was rewritten in C, on
>>>>>>>>> PPC64_ELF_ABI_V1 this resulted in the symbols in the syscall table
>>>>>>>>> changing from their dot prefixed variant to the non-prefixed ones.
>>>>>>>>>
>>>>>>>>> Since ftrace prefixes a dot to the syscall names when matching them to
>>>>>>>>> build its syscall event list, this resulted in no syscall events being
>>>>>>>>> available.
>>>>>>>>>
>>>>>>>>> Remove the PPC64_ELF_ABI_V1 specific version of
>>>>>>>>> arch_syscall_match_sym_name to have the same behavior across all powerpc
>>>>>>>>> variants.
>>>>>>>>
>>>>>>>> This doesn't seem to work for me.
>>>>>>>>
>>>>>>>> Event with it applied I still don't see anything in
>>>>>>>> /sys/kernel/debug/tracing/events/syscalls
>>>>>>>>
>>>>>>>> Did we break it in some other way recently?
>>>>>>>>
>>>>>>>> cheers
>>>>
>>>> I did some further testing, my config also enabled KALLSYMS_ALL, when I remove
>>>> it there is indeed no syscall events.
>>>
>>> Aha, OK that explains it I guess.
>>>
>>> I was using ppc64_guest_defconfig which has ABI_V1 and FTRACE_SYSCALLS,
>>> but does not have KALLSYMS_ALL. So I guess there's some other bug
>>> lurking in there.
>>
>> I don't have the setup handy to validate it, but I suspect it is caused
>> by the way scripts/kallsyms.c:symbol_valid() checks whether a symbol
>> entry needs to be integrated into the assembler output when
>> --all-symbols is not specified. It only keeps symbols which addresses
>> are in the text range. On PPC64_ELF_ABI_V1, this means only the
>> dot-prefixed symbols will be kept (those point to the function begin),
>> leaving out the non-dot-prefixed symbols (those point to the function
>> descriptors).
>
> OK. So I guess it never worked without KALLSYMS_ALL.
I suspect it worked prior to kernel v5.7, because back then the PPC64
ABIv1 system call table contained pointers to the text section
(beginning of functions) rather than function descriptors.
So changing this system call table to point to C functions introduced
the dot-prefix match issue for syscall tracing as well as a dependency
on KALLSYMS_ALL.
>
> It seems like most distros enable KALLSYMS_ALL, so I guess that's why
> we've never noticed.
Or very few people run recent PPC64 ABIv1 kernels :)
>
>> So I see two possible solutions there: either we ensure that
>> FTRACE_SYSCALLS selects KALLSYMS_ALL on PPC64_ELF_ABI_V1, or we modify
>> scripts/kallsyms.c:symbol_valid() to also include function descriptor
>> symbols. This would mean accepting symbols pointing into the .opd ELF
>> section.
>
> My only worry is that will cause some other breakage, because .opd
> symbols are not really "text" in the normal sense, ie. you can't execute
> them directly.
AFAIU adding the .opd section to scripts/kallsyms.c text_ranges will
only affect the result of symbol_valid(), which decides which symbols
get pulled into a KALLSYMS=n/KALLSYMS_ALL=n kernel build. Considering
that a KALLSYMS_ALL=y build pulls those function descriptor symbols into
the image without breaking anything, I don't see why adding the .opd
section to this script text_ranges would have any ill side-effect.
>
> On the other hand the help for KALLSYMS_ALL says:
>
> "Normally kallsyms only contains the symbols of functions"
>
> But without .opd included that's not really true. In practice it
> probably doesn't really matter, because eg. backtraces will point to dot
> symbols which can be resolved.
Indeed, I don't see this affecting backtraces, but as soon as a lookup
depends on comparing the C function pointer to a function descriptor,
the .opd symbols are needed. Not having those function descriptor
symbols in KALLSYMS_ALL=n builds seems rather error-prone.
>
>> IMHO the second option would be better because it does not increase the
>> kernel image size as much as KALLSYMS_ALL.
>
> Yes I agree.
>
> Even if that did break something, any breakage would be limited to
> arches which uses function descriptors, which are now all rare.
Yes, it would only impact those arches using function descriptors, which
are broken today with respect to system call tracing. Are you aware of
other architectures other than PPC64 ELF ABI v1 supported by the Linux
kernel that use function descriptors ?
>
> Relatedly we have a patch in next to optionally use ABIv2 for 64-bit big
> endian builds.
Interesting. Does it require a matching user-space ? (built with PPC64
ABIv2 ?) Does it handle legacy PPC32 executables ?
Thanks,
Mathieu
--
Mathieu Desnoyers
EfficiOS Inc.
https://www.efficios.com
Powered by blists - more mailing lists