[ltt-dev] LTTng 2.0 on ARM
Dave Martin
dave.martin at linaro.org
Wed Sep 14 06:09:31 EDT 2011
On Tue, Sep 13, 2011 at 11:14:47PM +0530, Rabin Vincent wrote:
> On Tue, Sep 13, 2011 at 21:20, Mathieu Desnoyers
> <compudj at krystal.dyndns.org> wrote:
> > * Avik Sil (avik.sil at linaro.org) wrote:
> >> On Tuesday 13 September 2011 12:35 AM, Mathieu Desnoyers wrote:
> >> > * Avik Sil (avik.sil at linaro.org) wrote:
> >> >> [ 1139.173522] vmalloc_sync_all_sym: c00a1d14
> >> >> [ 1139.180877] Internal error: Oops - undefined instruction: 0 [#1]
> >> >> PREEMPT SMP
> >> >> [ 1139.191284] Modules linked in: lttng_ftrace(+)
> >> >> [ 1139.198974] CPU: 1 Not tainted (3.0.0-1004-linaro-omap #6)
> >> >> [ 1139.208099] PC is at vmalloc_sync_all+0x0/0x8
> >> >> [ 1139.215667] LR is at init_module+0x1c/0x28 [lttng_ftrace]
> >> >> [ 1139.224304] pc : [<c00a1d14>] lr : [<bf800211>] psr: 60000113
> >> >> [ 1139.224304] sp : ebb11f50 ip : 00000000 fp : 00000000
> >> >> [ 1139.242401] r10: 00000000 r9 : 00000000 r8 : c06a2f00
> >> >> [ 1139.250793] r7 : bf8001f5 r6 : 00000000 r5 : 00182008 r4 : c00a1d14
> >> >> [ 1139.260559] r3 : 271aed1f r2 : ebb11f44 r1 : bf8003a6 r0 : 00000034
> >> >> [ 1139.270233] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM
> [...]
> >> Disassembly of section .text:
> >>
> >> c00a1d14 <vmalloc_sync_all>:
> >> c00a1d14: b500 push {lr}
> >> c00a1d16: f76a fa9d bl c000c254 <__gnu_mcount_nc>
> >> c00a1d1a: 4770 bx lr
> >>
> [...]
> >> >
> >> > We have to keep in mind that this could also be a ftrace function tracer
> >> > bug, in which case the surrounding of 0xc00a1d14 from the vmlinux image
> >> > will not match the instructions in memory. Can you dump the hex content
> >> > around 0xc00a1d14 just before the vmalloc_sync_all gets called and
> >> > compare with the disassembly ?
> >>
> >> The hex content dump shows:
> >>
> >> [ 150.810119] c00a1d14: b500 f85d eb04 4770
> >>
> >> So it seems your guess is right, the content of vmlinux image
> >> surrounding 0xc00a1d14 is not matching the instruction in memory. By
> >> grepping objdump I found that instruction 'f85d eb04' translates to
> >> "ldr.w lr, [sp], #4".
> >
> > I'm adding the ARM function tracer developers in CC. Maybe they can
> > enlighten us.
>
> ftrace has indeed overwritten the instructions here, but it's done it
> correctly. The problem here is that you're trying to execute a Thumb-2
> function in ARM mode. This is unrelated to ftrace, I've reproduced it
> here with a Thumb-2 kernel without ftrace enabled with just this code:
>
> static int __init late(void)
> {
> void (*v)(void);
>
> v = (void *) kallsyms_lookup_name("vmalloc_sync_all");
> printk("%s addr %p\n", __func__, v);
>
> v();
>
> return 0;
> }
> late_initcall(late);
>
> which leads to this:
>
> late addr c010ed7c
> Internal error: Oops - undefined instruction: 0 [#1] PREEMPT SMP
> CPU: 0 Not tainted (3.1.0-rc2+ #339)
> PC is at late+0x4/0x28
> LR is at late+0x17/0x28
> pc : [<c010ed80>] lr : [<c010ed93>] psr: 40000013
> sp : c782dfb0 ip : 00000000 fp : 00000000
> r10: 00000000 r9 : 00000000 r8 : 00000000
> r7 : 00000033 r6 : 00000000 r5 : c010ed7d r4 : c010ed7c
> r3 : c010ed7c r2 : c782dfa4 r1 : c00f0963 r0 : 00000025
> Flags: nZcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment kernel
> Control: 50c53c7d Table: 0000406a DAC: 00000015
> Process swapper (pid: 1, stack limit = 0xc782c2f0)
> Stack: (0xc782dfb0 to 0xc782e000)
> dfa0: c011ab7c c010b66b 00000000 00000000
> dfc0: 0000007f c01295ac c000ca81 c011ab7c c011ab94 c000ca81 00000033 00000000
> dfe0: 00000000 c010b765 00000000 00000000 c010b701 c000ca81 00000000 00000000
> [<c010ed80>] (late+0x4/0x28) from [<c010b66b>] (do_one_initcall+0x63/0xf8)
> [<c010b66b>] (do_one_initcall+0x63/0xf8) from [<c010b765>]
> (kernel_init+0x65/0xd8)
> [<c010b765>] (kernel_init+0x65/0xd8) from [<c000ca81>]
> (kernel_thread_exit+0x1/0x6)
> Code: c0125e20 c01307ac 47702000 4806b510 (f81ef727)
>
> The problem is that the addresses returned by kallsyms_lookup_name()
> does not have the zero bit, which is what is expected for Thumb
> functions because the BLX instruction which is used to call them uses
> this bit to determines which mode to switch into. Since it's cleared,
> you switch to ARM mode and attempt to execute Thumb-2 code, with obvious
> results.
>
> A cursory look at the parties involved shows that nm doesn't show the
> zero bit (even though it's set in the vmlinux symbol table), and
> scripts/kallsyms builds the table by parsing nm's output.
It's not quite as simple as saying "the output of nm is wrong" though...
When getting the address of a function, there are actually two
separate answers:
a) the pointer which can be used to call the function
b) the address of the start of the function body
On many arches these they are identical, but on some they are different.
On ARM, they are identical for ARM code but different for Thumb code
(because the Thumb bit must be set in case (a) but not in case (b))
It may be worth looking at what is done in the kernel for ia64 and ppc64.
I believe that (a) and (b) are quite different for these because
functions are called through descriptors. Don't quote me on that though:
I'm mostly ignorant about these arches.
For the Thumb-2 kernel case, we can probably hack around this: there
are various places in the kernel where we just force-set the Thumb bit
in addresses without really knowing what the target code is. We get
away with this because the kernel is (very nearly) 100% Thumb code
for a Thumb-2 kernel.
However, if the kernel already has a correct approach for solving this
problem, we should probably be using it.
Cheers
---Dave
More information about the linux-arm-kernel
mailing list