linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Chen Lin <chen45464546@163.com>
To: will@kernel.org
Cc: catalin.marinas@arm.com, mark.rutland@arm.com,
	joey.gouly@arm.com, maz@kernel.org,
	linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org, chen.lin5@zte.com.cn,
	Chen Lin <chen45464546@163.com>
Subject: Re:Re: [PATCH] arm64: traps: add dump instr before BUG in kernel
Date: Wed, 13 Oct 2021 21:08:43 +0800	[thread overview]
Message-ID: <1634130523-2634-1-git-send-email-chen45464546@163.com> (raw)
In-Reply-To: <20211011100649.GB3681@willie-the-truck>

At 2021-10-11 17:06:50, "Will Deacon" <will@kernel.org> wrote:
>On Thu, Sep 30, 2021 at 10:41:30PM +0800, Chen Lin wrote:
>> At 2021-09-30 15:42:47, "Will Deacon" <will@kernel.org> wrote:
>> 
>> >On Wed, Sep 29, 2021 at 09:29:46PM +0800, Chen Lin wrote:
>> >> From: Chen Lin <chen.lin5@zte.com.cn>
>> >> 
>> >> we should dump the real instructions before BUG in kernel mode, and
>> >> compare this to the instructions from objdump.
>> >> 
>> >> Signed-off-by: Chen Lin <chen.lin5@zte.com.cn>
>> >> ---
>> >>  arch/arm64/kernel/traps.c |    7 ++++++-
>> >>  1 file changed, 6 insertions(+), 1 deletion(-)
>> >> 
>> >> diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c
>> >> index b03e383..621a9dd 100644
>> >> --- a/arch/arm64/kernel/traps.c
>> >> +++ b/arch/arm64/kernel/traps.c
>> >> @@ -495,7 +495,12 @@ void do_undefinstr(struct pt_regs *regs)
>> >>  	if (call_undef_hook(regs) == 0)
>> >>  		return;
>> >>  
>> >> -	BUG_ON(!user_mode(regs));
>> >> +	if (!user_mode(regs)) {
>> >> +		pr_emerg("Undef instruction in kernel, dump instr:");
>> >> +		dump_kernel_instr(KERN_EMERG, regs);
>> >> +		BUG();
>> >> +	}
>> >
>> >Hmm, I'm not completely convinced about this as the instruction in the
>> >i-cache could be completely different. I think the PC value (for addr2line)
>> >is a lot more useful, and we should be printing that already.
>> >
>> >Maybe you can elaborate on a situation where this information was helpful?
>> >
>> >Thanks,
>> >
>> >Will
>> 
>> Undef instruction occurs in some cases
>> 
>> 1. CPU do not have the permission to execute the instruction or the current CPU
>>  version does not support the instruction. For example, execute 
>>  'mrs x0, tcr_el3' under el1.
>
>This really shouldn't happen, but if it did, the PC would surely be enough
>to debug the problem?
>

yes, PC is enough in this situation.

>> 2. The instruction is a normal instruction, but it is changed during board 
>> running in some abnormal situation. eg: DDR bit flip, the normal instruction 
>> will become an undefined one. By printing the instruction, we can see the 
>> accurate instruction code and compare it with the instruction code from objdump
>> to determine that it is a DDR issue.
>
>Is this really something we should be designing our exception handlers for?
>If we're getting DDR bit flips for kernel .text, then it sounds like we need
>ECC and/or RAS features to deal with them.
>
>So I'm not really sold on this change.

1. About the DDR bit flip, YES, the instruction code information is really useless 
in the ideal state. The ideal state includes the following conditions like: the DDR 
controller do supports ECC, and also is configured correctly, such as ECC enabled 
and ECC fixing enabled. There may exist various old boards or abnormal DDR 
configurations in embedded systems.


2. DDR flip is just one example. Other examples include text segment being overwritten 
by DMA and other accidental writes, we want more info about what it writes. 
Another example, some instructions may change at runtime by ALTERNATIVE(oldinstr, newinstr, feature) 
or live patch, we want both the pc and the instruction code to double check what 
happened if illegal instruction exception happen at such points.


Personally, I think adding more information can make it easier to locate the above problems. 
Anyway, Thank you for your patience in reading and replying.
>
>Will


      reply	other threads:[~2021-10-13 13:10 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-09-29 13:29 [PATCH] arm64: traps: add dump instr before BUG in kernel Chen Lin
2021-09-30  8:42 ` Will Deacon
2021-09-30 14:41   ` Chen Lin
2021-10-11 10:06     ` Will Deacon
2021-10-13 13:08       ` Chen Lin [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1634130523-2634-1-git-send-email-chen45464546@163.com \
    --to=chen45464546@163.com \
    --cc=catalin.marinas@arm.com \
    --cc=chen.lin5@zte.com.cn \
    --cc=joey.gouly@arm.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mark.rutland@arm.com \
    --cc=maz@kernel.org \
    --cc=will@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).