[PATCH V2] arm64:ftrace: add save_stack_trace_regs()

James Morse james.morse at arm.com
Fri Sep 2 03:50:15 PDT 2016


Hi Pratyush,

On 01/09/16 14:35, Pratyush Anand wrote:
> Implement save_stack_trace_regs, so that stacktrace of a kprobe events can be
> obtained.

Hmm, kconfig enables 'CONFIG_KPROBE_EVENT' if we select KPROBES and FTRACE, this
calls save_stack_trace_regs(), which we haven't implemented, giving:
[  373.406982] save_stack_trace_regs() not implemented yet.
[  373.413020] ------------[ cut here ]------------
[  373.417601] WARNING: CPU: 1 PID: 0 at ../kernel/stacktrace.c:74 save_stack_tr
ace_regs+0x3c/0x48
[  373.426212] Modules linked in:
[  373.429238]
[  373.430716] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.8.0-rc4-dirty #5128
[  373.437606] Hardware name: ARM Juno development board (r1) (DT)
[  373.443466] task: ffff800975dd1900 task.stack: ffff800975ddc000
[  373.449327] PC is at save_stack_trace_regs+0x3c/0x48
[  373.454242] LR is at save_stack_trace_regs+0x3c/0x48
[  373.459156] pc : [<ffff000008126c64>] lr : [<ffff000008126c64>] pstate: 600003c5
[  373.466476] sp : ffff80097ef52c00

[  373.554836] Call trace:
[  373.641153] [<ffff000008126c64>] save_stack_trace_regs+0x3c/0x48
[  373.647104] [<ffff00000817a0b0>] __ftrace_trace_stack+0x168/0x208
[  373.653138] [<ffff00000817ad40>] trace_buffer_unlock_commit_regs+0x5c/0x7c
[  373.659946] [<ffff00000818d57c>] kprobe_trace_func+0x308/0x3d8
[  373.665721] [<ffff00000818defc>] kprobe_dispatcher+0x58/0x60
[  373.671327] [<ffff0000088d8cfc>] kprobe_breakpoint_handler+0xbc/0x18c
[  373.677705] [<ffff0000080851b8>] brk_handler+0x50/0x90
[  373.682792] [<ffff000008081300>] do_debug_exception+0x50/0xbc


I guess hitting a WARN_ONCE() while using a 'kernel hacking' feature isn't
serious enough to make this a fix.


> diff --git a/arch/arm64/kernel/stacktrace.c b/arch/arm64/kernel/stacktrace.c
> index d9751a4769e7..bd6d9d8087f0 100644
> --- a/arch/arm64/kernel/stacktrace.c
> +++ b/arch/arm64/kernel/stacktrace.c
> @@ -152,6 +152,24 @@ static int save_trace(struct stackframe *frame, void *d)
>  	return trace->nr_entries >= trace->max_entries;
>  }
>  
> +void save_stack_trace_regs(struct pt_regs *regs, struct stack_trace *trace)
> +{
> +	struct stack_trace_data data;
> +	struct stackframe frame;
> +
> +	data.trace = trace;
> +	data.skip = trace->skip;
> +	data.no_sched_functions = 0;
> +
> +	frame.fp = regs->regs[29];
> +	frame.sp = regs->sp;
> +	frame.pc = regs->pc;

What happens when a kprobe-event runs over a frame the function graph tracer has
meddled with? You need:

#ifdef CONFIG_FUNCTION_GRAPH_TRACER
	frame.graph = current->curr_ret_stack;
#endif

> +
> +	walk_stackframe(current, &frame, save_trace, &data);
> +	if (trace->nr_entries < trace->max_entries)
> +		trace->entries[trace->nr_entries++] = ULONG_MAX;
> +}
> +
>  void save_stack_trace_tsk(struct task_struct *tsk, struct stack_trace *trace)
>  {
>  	struct stack_trace_data data;
> 

Reviewed-by: James Morse <james.morse at arm.com>


Thanks,

James






More information about the linux-arm-kernel mailing list