arm64 function_graph tracer panic with CONFIG_DYNAMIC_FTRACE

AKASHI Takahiro takahiro.akashi at linaro.org
Thu Nov 12 21:51:07 PST 2015


Catalin,
(add lakml back to Cc)

On 11/13/2015 01:01 AM, Catalin Marinas wrote:
 > On Fri, Nov 13, 2015 at 12:00:42AM +0900, AKASHI Takahiro wrote:
 >> If possible, please try again with "select HAVE_FUNCTION_GRAPH_FP_TEST" added
 >> to CONFIG_ARM64.
 >> It will insert an additional check. I hope this will help.
 >
 > So it looks the the frame is off by some amount:

I was able to reproduce the problem on hikey, too.

 > # echo function_graph > /sys/kernel/debug/tracing/current_tracer
 > Bad frame pointer: expected ffffffc976b3bd50, received ffffffc976b3be60

The difference of fp's was 0x110(sizeof(pt_reg_t)=0x120).
It seems that an interrupt happened here (and we might have unwound one extra frame?).

 >    from func psci_cpu_suspend return to ffffffc00008d058

Always in the same place.

 > ------------[ cut here ]------------
 > WARNING: at /work/Linux/linux-2.6-aarch64/kernel/trace/trace_functions_graph.c:223
 > Modules linked in:
 >
 > CPU: 4 PID: 0 Comm: swapper/4 Not tainted 4.3.0+ #584
 > Hardware name: Juno (DT)
 > task: ffffffc976b22f00 ti: ffffffc976b38000 task.ti: ffffffc976b38000
 > PC is at ftrace_return_to_handler+0x11c/0x150
 > LR is at ftrace_return_to_handler+0x11c/0x150
 > pc : [<ffffffc000172034>] lr : [<ffffffc000172034>] pstate: 800001c5
 > sp : ffffffc976b3bdd0
 > x29: ffffffc976b3bdd0 x28: ffffffc0006c9000
 > x27: ffffffc000a29f20 x26: ffffffc976b3bf70
 > x25: 000000cc2c13e054 x24: 0000000000000004
 > x23: ffffffc000aeb790 x22: 0000000000000002
 > x21: ffffffc975503200 x20: ffffffc000aeb850
 > x19: 0000000000000002 x18: ffffffc000b3a920
 > x17: 0000000000000000 x16: 0000000000000000
 > x15: ffffffc000b3a5bf x14: 3739636666666666
 > x13: 6620646576696563 x12: 6572202c30356462
 > x11: 3362363739636666 x10: 00000000000000fc
 > x9 : ffffffc9768070c0 x8 : 0000000000001dd0
 > x7 : ffffffc9760f4c80 x6 : ffffffc9760f4c00
 > x5 : 00000000000084c0 x4 : 0000000000000001
 > x3 : ffffffc976b3bc50 x2 : 0000000000000001
 > x1 : 000000000000007f x0 : 000000000000007f
 >
 > ---[ end trace ac97c44ba7dabcce ]---
 > Call trace:
 > [<ffffffc000172034>] ftrace_return_to_handler+0x11c/0x150
 > [<ffffffc0000924bc>] return_to_handler+0x1c/0x40
 > [<ffffffc0000924a0>] return_to_handler+0x0/0x40
 > [<ffffffc0000924a0>] return_to_handler+0x0/0x40
 > [<ffffffc0000924a0>] return_to_handler+0x0/0x40
 > [<ffffffc0000924a0>] return_to_handler+0x0/0x40
 > [<ffffffc0000924a0>] return_to_handler+0x0/0x40
 > [<ffffffc0000924a0>] return_to_handler+0x0/0x40

These call stacks were:
   (psci_cpu_suspend)
   psci_suspend_finisher
   (cpu_suspend_enter?)
   cpu_suspend
   cpu_psci_cpu_suspend
   arm_cpuidle_suspend
   arm_enter_idle_state
   cpuidle_enter_state
   cpuidle_enter
   call_cpuidle
   (cpu_startup_entry?)

and if cpuidle is turned off(cpuidle.off=1), the panic never happens.
That is all what I know at this moment.

-Takahiro AKASHI


 > [<ffffffc000090208>] secondary_start_kernel+0x130/0x158
 > Unable to handle kernel NULL pointer dereference at virtual address 00000000
 > pgd = ffffffc000b68000
 > [00000000] *pgd=00000009f69ea003, *pud=00000009f69ea003, *pmd=00000009f69eb003, *pte=006000002c010707
 > Internal error: Oops: 96000006 [#1] PREEMPT SMP
   [snip]


On 11/12/2015 07:42 PM, Catalin Marinas wrote:
> Hi Takahiro,
>
> I was trying to assess what's working/not working in ftrace on arm64 and
> whether your recent patches are meant for 4.4 or can wait until 4.5.
> However, without any patches applied on a 4.3 kernel, enabling the
> function_graph tracer when CONFIG_DYNAMIC_FTRACE is enabled panics the
> kernel. Strangely, it does not happen if only a single CPU is on.
> However, with function_graph tracer on, onlining a second CPU leads to a
> similar panic.
>
> Below is the kernel panic with 2 CPUs online on a Juno board. There
> isn't much stack trace information for CPU 5 where the fault happened,
> the frame pointer (x29) seems corrupted as well. Any idea? Thanks.
>
> # echo function_graph > /sys/kernel/debug/tracing/current_tracer
> swapper/5[0]: undefined instruction: pc=ffffffc000a46698
> Code: 0009ccf8 ffffffc0 00000000 00000000 (00000030)
> Internal error: Oops - undefined instruction: 0 [#1] PREEMPT SMP
> Modules linked in:
> CPU: 5 PID: 0 Comm: swapper/5 Not tainted 4.3.0 #574
> Hardware name: Juno (DT)
> task: ffffffc976b23ac0 ti: ffffffc976b3c000 task.ti: ffffffc976b3c000
> PC is at cpu_online_bits+0x0/0x8
> LR is at cpu_online_bits+0x0/0x8
> pc : [<ffffffc000a46698>] lr : [<ffffffc000a46698>] pstate: 600001c5
> sp : ffffffc976b3ff40
> x29: 0000000000000002 x28: ffffffc000100c0c
> x27: ffffffc000aeb790 x26: ffffffc9758d5800
> x25: 0000000000000002 x24: ffffffc0000924a0
> x23: ffffffc976b3ff40 x22: ffffffc00056841c
> x21: ffffffc000a25b80 x20: ffffffc000aeb790
> x19: ffffffc9758d5800 x18: 0000000000000000
> x17: 0000000000000000 x16: 0000000000000000
> x15: 0000000000000000 x14: 0000000000000000
> x13: 0000000000000000 x12: 0000000034d5d91d
> x11: 0000000000000000 x10: 0000000000001000
> x9 : ffffffc9768070c0 x8 : 00000000000007d8
> x7 : 0000001b280eb7c4 x6 : 0000000000000015
> x5 : 000000000000000a x4 : ffffffc0792a4990
> x3 : ffffffffffffffa1 x2 : ffffffc0792a4800
> x1 : ffffffc0000949e0 x0 : ffffffffffffffa1
>
> Process swapper/5 (pid: 0, stack limit = 0xffffffc976b3c020)
> Stack: (0xffffffc976b3ff40 to 0xffffffc976b40000)
> ff40: ffffffc976b3ff70 ffffffc0000924a0 ffffffc976b3c000 ffffffc000a46000
> ff60: ffffffc000b20000 0000001b27d716c0 ffffffc976b3ffd0 ffffffc000090208
> ff80: 0000000000000005 0000000000000e12 ffffffc000b306a0 0000000000000000
> ffa0: 0000000000000000 0000000000000000 0000000080b65000 0000000080b68000
> ffc0: ffffffc0000827f0 0000000000000000 0000000000000000 00000000800827dc
> ffe0: 0000000000000000 0000000000000000 068824085611a721 280b8a0b05808446
> Call trace:
> Code: 0009ccf8 ffffffc0 00000000 00000000 (00000030)
> ---[ end trace 702bb2ed35464601 ]---
> Kernel panic - not syncing: Attempted to kill the idle task!
> CPU4: stopping
> CPU: 4 PID: 0 Comm: swapper/4 Tainted: G      D         4.3.0 #574
> Hardware name: Juno (DT)
> Call trace:
> [<ffffffc00008aaa8>] dump_backtrace+0x0/0x150
> [<ffffffc00008ac1c>] show_stack+0x24/0x30
> [<ffffffc0003b21a0>] dump_stack+0x90/0xd0
> [<ffffffc000090880>] handle_IPI+0x280/0x290
> [<ffffffc00008255c>] gic_handle_irq+0x94/0xb0
> Exception stack(0xffffffc976b3bd70 to 0xffffffc976b3be90)
> bd60:                                   0000001b2ed1ee8c ffffffc000aeb850
> bd80: ffffffc976b3bec0 ffffffc0005681dc 0000000080000145 ffffffc00009244c
> bda0: 0000000000000000 0000000000000001 ffffffc976b38000 0000000000000003
> bdc0: ffffffc976b38000 ffffffc000a282a8 ffffffc976b38000 ffffffc0000ecb28
> bde0: 00000000000006ed ffffffc9768070c0 00000000000007e0 ffffffc0006d04a8
> be00: 0000000000000001 0000000000005a0e 0000000000000001 ffffffc0006d04a8
> be20: 0000000000000000 0000000000000000 0000000000000001 0000001b2ed1ee8c
> be40: ffffffc000aeb850 ffffffc9758d5600 0000000000000000 ffffffc000aeb790
> be60: 0000000000000004 0000001b2e40a7ec ffffffc976b3bf70 ffffffc000a29f20
> be80: ffffffc0006c9000 ffffffc976b3bec0
> [<ffffffc0000855ac>] el1_irq+0x6c/0xe0
> [<ffffffc00056842c>] cpuidle_enter+0x34/0x48
> [<ffffffc000100c30>] call_cpuidle+0x48/0x80
> [<ffffffc000100e90>] cpu_startup_entry+0x228/0x308
> [<ffffffc000090208>] secondary_start_kernel+0x130/0x158
> ---[ end Kernel panic - not syncing: Attempted to kill the idle task!
>



More information about the linux-arm-kernel mailing list