Hi  lianbo
attach patch v2.
lijiang <lijiang(a)redhat.com> 于2025年1月15日周三 16:42写道:
 Thank you for the patch, Guanyou.
 On Tue, Dec 31, 2024 at 7:22 PM <devel-request(a)lists.crash-utility.osci.io>
 wrote:
> Date: Thu, 26 Dec 2024 00:08:50 +0800
> From: Guanyou Chen <chenguanyou9338(a)gmail.com>
> Subject: [Crash-utility] [PATCH] arm64: add pac mask to better support
>         gdb stack unwind
> To: Lianbo <lijiang(a)redhat.com>, Tao Liu <ltao(a)redhat.com>,
>         devel(a)lists.crash-utility.osci.io
> Message-ID:
>         <
> CAHS3RMXJG6OxB_zmgnr60KriPOxo9tnb_63K+rjJHfk1t7aT0A(a)mail.gmail.com>
> Content-Type: multipart/mixed; boundary="0000000000009f35d6062a1a727c"
>
> --0000000000009f35d6062a1a727c
> Content-Type: multipart/alternative;
> boundary="0000000000009f35d5062a1a727a"
>
> --0000000000009f35d5062a1a727a
> Content-Type: text/plain; charset="UTF-8"
>
> Hi  Lianbo & Tao
>
> Currently, gdb passthroughs of 'bt', 'frame', 'up',
'down',
> 'info, locals' don't work on arm64 machine enabled pauth.
> This is due to gdb not knowing the lr register real values
> to unwind the stack frames.
>
>                                       ----------------------------
>            gdb passthrough (eg. "bt") |                          |
>    crash   -------------------------> |                          |
>                                       |      gdb_interface       |
>                                       |                          |
>                                       |                          |
>                                       |  ----------------------  |
>                get_kernel_pac_mask    |  |                    |  |
> crash_target<-------------------------+--|        gdb         |  |
>             --------------------------+->|                    |  |
>      arm64: CONFIG_ARM64_KERNELPACMASK|  |                    |  |
>      other: ~0UL                      |  |                    |  |
>                                       |  ----------------------  |
>                                       ----------------------------
>
> With the patch:
>     crash> gdb bt
>     #0  __switch_to (prev=prev@entry=0xffffff8001af92c0,
> next=next@entry=0xffffff889da7a580)
> at /proc/self/cwd/common/arch/arm64/kernel/process.c:569
>     #1  0xffffffd3602132c0 in context_switch (rq=0xffffff8a7295a080,
> prev=0xffffff8001af92c0, next=0xffffff889da7a580, rf=<optimized out>) at
> /proc/self/cwd/common/kernel/sched/core.c:5515
>     #2  __schedule (sched_mode=<optimized out>, sched_mode@entry
> =2147859424)
> at /proc/self/cwd/common/kernel/sched/core.c:6843
>     #3  0xffffffd3602136d8 in schedule () at
> /proc/self/cwd/common/kernel/sched/core.c:6917
>     ...
>
> Without the patch:
>     crash> gdb bt
>     #0  __switch_to (prev=0xffffff8001af92c0, next=0xffffff889da7a580) at
> /proc/self/cwd/common/arch/arm64/kernel/process.c:569
>     #1  0x9fc5c5d3602132c0 in ?? ()
>     Backtrace stopped: previous frame identical to this frame (corrupt
> stack?)
>
> Signed-off-by: Guanyou.Chen <chenguanyou(a)xiaomi.com>
> ---
>  gdb-10.2.patch  | 24 ++++++++++++++++++++++++
>  gdb_interface.c | 11 +++++++++++
>  2 files changed, 35 insertions(+)
>
> diff --git a/gdb-10.2.patch b/gdb-10.2.patch
> index c867660..4c13a6b 100644
> --- a/gdb-10.2.patch
> +++ b/gdb-10.2.patch
> @@ -16216,3 +16216,27 @@ exit 0
>         printf_filtered (_("Backtrace stopped: %s\n"),
>                  frame_stop_reason_string (trailing));
>     }
> +--- gdb-10.2/gdb/frame.c.orig
> ++++ gdb-10.2/gdb/frame.c
> +@@ -944,6 +944,10 @@ frame_find_by_id (struct frame_id id)
> +   return NULL;
> + }
> +
> ++#ifdef CRASH_MERGE
> ++extern "C" unsigned long crash_get_kernel_pac_mask(void);
> ++#endif
> ++
> + static CORE_ADDR
> + frame_unwind_pc (frame_info_ptr this_frame)
> + {
> +@@ -974,6 +978,10 @@ frame_unwind_pc (struct frame_info_ptr *this_frame)
> +       try
> +   {
> +     pc = gdbarch_unwind_pc (prev_gdbarch, this_frame);
> ++#ifdef CRASH_MERGE
> ++    CORE_ADDR mask = crash_get_kernel_pac_mask();
> ++    pc |= mask;
>
 Can you help double check if a sanity check needs to be added? I saw the
 value 'pc|mask' is always checked in crash code as below:
 ...
                 LR = regs->regs[30];
                 if (is_kernel_text (LR | ms->CONFIG_ARM64_KERNELPACMASK))
                         LR |= ms->CONFIG_ARM64_KERNELPACMASK;
 ...
 if yes, the value pc can be passed as an argument in
 crash_get_kernel_pac_mask(), and then deal with this one.
> ++#endif
> +     pc_p = true;
> +   }
> +       catch (const gdb_exception_error &ex)
> diff --git a/gdb_interface.c b/gdb_interface.c
> index 315711e..765dafe 100644
> --- a/gdb_interface.c
> +++ b/gdb_interface.c
> @@ -1083,3 +1083,14 @@ int crash_get_current_task_reg (int regno, const
> char *regname,
>     return machdep->get_current_task_reg(regno, regname, regsize, value);
>  }
>
> +/* arm64 kernel lr pac mask */
> +unsigned long crash_get_kernel_pac_mask(void);
> +unsigned long crash_get_kernel_pac_mask(void)
> +{
> +#ifdef ARM64
> +   struct machine_specific *ms = machdep->machspec;
> +   return ms->CONFIG_ARM64_KERNELPACMASK;
> +#else
> +   return ~0UL;
>
 The "~0UL" is 0xFFFFFFFFFFFFFFFF, is this expected? Or do you want it to
 overflow?
 ++    pc |= mask;
 It probably has the same result, but the "return 0UL" should be more
 readable. Please see kernel code:
         vmcoreinfo_append_str("NUMBER(KERNELPACMASK)=0x%llx\n",
 system_supports_address_auth() ?
                                                 ptrauth_kernel_pac_mask()
 : 0);
 BTW: I cannot apply your patch with git command, and ran into some issues,
 probably it is a coding issue.
 Thanks
 Lianbo
> +#endif /* !ARM64 */
> +}
> --
> 2.34.1
>
> Thanks,
> Guanyou
>