On Wed, Dec 7, 2022 at 11:22 AM dinghui <dinghui(a)sangfor.com.cn> wrote:
 Hi, lijiang
 On 2022/12/7 10:55, lijiang wrote:
 > Hi, Ding
 > Thank you for the fix.
 > On Thu, Dec 1, 2022 at 8:00 PM <crash-utility-request(a)redhat.com> wrote:
 >> Date: Thu,  1 Dec 2022 15:01:45 +0800
 >> From: Ding Hui <dinghui(a)sangfor.com.cn>
 >> To: crash-utility(a)redhat.com
 >> Cc: Ding Hui <dinghui(a)sangfor.com.cn>
 >> Subject: [Crash-utility] [PATCH] arm64: fix backtraces of KASAN kernel
 >>          dumpfile truncated
 >> Message-ID: <20221201070145.10830-1-dinghui(a)sangfor.com.cn>
 >> Content-Type: text/plain; charset="US-ASCII"; x-default=true
 >>
 >> We met "bt" cmd on KASAN kernel vmcore display truncated backtraces
 >> like this:
 >>
 >> crash> bt
 >> PID: 4131   TASK: ffff8001521df000  CPU: 3   COMMAND: "bash"
 >>   #0 [ffff2000224b0cb0] machine_kexec_prepare at ffff2000200bff4c
 >>
 >
 > Can you help explain how to reproduce this issue? Or what's the
 > critical configuration of the kernel?  Can this issue be always
 > reproduced?
 >
 > I tried to reproduce it on the latest kernel(commit bce9332220bd )
 > with the CONFIG_KASAN*=y, but can not reproduce this error.
 >
 I can always reproduce the issue with openEuler-20.03-LTS-SP3.
 I recompile openEuler kernel-4.19.90-xxx with CONFIG_KASAN=y, the gcc is
 also from openEuler-20.03-LTS-SP3, version 7.3.0
 I think it may be related to compiler, do you see the similar assembly
 pattern when disassemble machine_kexec() or crash_save_cpu()?
 
Tried several times,  the similar phenomenon can be observed on
aarch64(built with the gcc-8.3.1) and this error can be reproduced.
After applying this patch, the crash tool works well for now(with or
without the current issue).
And this change looks good to me. So: Ack
Thanks.
Lianbo
 > crash> bt
 > PID: 23838    TASK: ffff3d83abe61300  CPU: 2    COMMAND: "bash"
 >   #0 [ffff800010587650] machine_kexec at ffffbb61b39bd460
 >   #1 [ffff8000105876a0] __crash_kexec at ffffbb61b3b8e2fc
 >   #2 [ffff8000105878c0] panic at ffffbb61b4b6c158
 >   #3 [ffff8000105879f0] sysrq_handle_crash at ffffbb61b43b1144
 >   #4 [ffff800010587a00] __handle_sysrq at ffffbb61b43b1ddc
 >   #5 [ffff800010587a80] write_sysrq_trigger at ffffbb61b43b26e0
 >   #6 [ffff800010587ab0] proc_reg_write at ffffbb61b3f9c4ac
 >   #7 [ffff800010587af0] vfs_write at ffffbb61b3ebeaf4
 >   #8 [ffff800010587c30] ksys_write at ffffbb61b3ebf054
 >   #9 [ffff800010587cd0] __arm64_sys_write at ffffbb61b3ebf144
 > #10 [ffff800010587df0] invoke_syscall.constprop.0 at ffffbb61b39afc88
 > #11 [ffff800010587e30] el0_svc_common.constprop.0 at ffffbb61b39afeac
 > #12 [ffff800010587e60] do_el0_svc at ffffbb61b39aff08
 > #13 [ffff800010587e80] el0_svc at ffffbb61b4b8defc
 > #14 [ffff800010587ea0] el0t_64_sync_handler at ffffbb61b4b8e274
 > #15 [ffff800010587fe0] el0t_64_sync at ffffbb61b39915bc
 >       PC: 0000ffffa42a4880   LR: 0000ffffa424321c   SP: 0000ffffe889dd60
 >      X29: 0000ffffe889dd60  X28: 0000000000000000  X27: 0000aaaad1c10000
 >      X26: 0000aaaad1c73018  X25: 0000aaaad1cb89bc  X24: 0000000000000002
 >      X23: 0000aaaadd9ce140  X22: 0000ffffa43e77e0  X21: 0000ffffa436a5c0
 >      X20: 0000aaaadd9ce140  X19: 0000000000000001  X18: 0000000000000000
 >      X17: 0000ffffa423ff50  X16: 0000ffffa4244600  X15: 0000ffffa4311350
 >      X14: 0000000000000000  X13: 0000000000000000  X12: 0000000000000000
 >      X11: 0000000000000020  X10: 0000000000000063   X9: 0000aaaadd9dc2c0
 >       X8: 0000000000000040   X7: 00000000ffffffff   X6: 0000000000000063
 >       X5: 0000aaaadd9ce141   X4: 0000aaaadd9dc2c1   X3: 0000ffffa43e7020
 >       X2: 0000000000000002   X1: 0000aaaadd9ce140   X0: 0000000000000001
 >      ORIG_X0: 0000000000000001  SYSCALLNO: 40  PSTATE: 20000000
 > crash>
 >
 >
 > Thanks.
 > Lianbo
 >
 >> After digging the root cause, it turns out that arm64_in_kdump_text()
 >> found wrong bt->bptr at "machine_kexec" branch.
 >>
 >> Disassemble machine_kexec() of KASAN vmlinux (gcc 7.3.0):
 >>
 >> crash> dis -x machine_kexec
 >> 0xffff2000200bff50 <machine_kexec>:     stp     x29, x30, [sp,#-208]!
 >> 0xffff2000200bff54 <machine_kexec+0x4>: mov     x29, sp
 >> 0xffff2000200bff58 <machine_kexec+0x8>: stp     x19, x20, [sp,#16]
 >> 0xffff2000200bff5c <machine_kexec+0xc>: str     x24, [sp,#56]
 >> 0xffff2000200bff60 <machine_kexec+0x10>:        str     x26, [sp,#72]
 >> 0xffff2000200bff64 <machine_kexec+0x14>:        mov     x2, #0x8ab3
 >> 0xffff2000200bff68 <machine_kexec+0x18>:        add     x1, x29, #0x70
 >> 0xffff2000200bff6c <machine_kexec+0x1c>:        lsr     x1, x1, #3
 >> 0xffff2000200bff70 <machine_kexec+0x20>:        movk    x2, #0x41b5, lsl
#16
 >> 0xffff2000200bff74 <machine_kexec+0x24>:        mov     x19,
#0x200000000000
 >> 0xffff2000200bff78 <machine_kexec+0x28>:        adrp    x3,
0xffff2000224b0000
 >> 0xffff2000200bff7c <machine_kexec+0x2c>:        movk    x19, #0xdfff, lsl
#48
 >> 0xffff2000200bff80 <machine_kexec+0x30>:        add     x3, x3, #0xcb0
 >> 0xffff2000200bff84 <machine_kexec+0x34>:        add     x4, x1, x19
 >> 0xffff2000200bff88 <machine_kexec+0x38>:        stp     x2, x3,
[x29,#112]
 >> 0xffff2000200bff8c <machine_kexec+0x3c>:        adrp    x2,
0xffff2000200bf000 <swsusp_arch_resume+0x1e8>
 >> 0xffff2000200bff90 <machine_kexec+0x40>:        add     x2, x2, #0xf50
 >> 0xffff2000200bff94 <machine_kexec+0x44>:        str     x2, [x29,#128]
 >> 0xffff2000200bff98 <machine_kexec+0x48>:        mov     w2, #0xf1f1f1f1
 >> 0xffff2000200bff9c <machine_kexec+0x4c>:        str     w2, [x1,x19]
 >> 0xffff2000200bffa0 <machine_kexec+0x50>:        mov     w2, #0xf200
 >> 0xffff2000200bffa4 <machine_kexec+0x54>:        mov     w1, #0xf3f3f3f3
 >> 0xffff2000200bffa8 <machine_kexec+0x58>:        movk    w2, #0xf2f2, lsl
#16
 >> 0xffff2000200bffac <machine_kexec+0x5c>:        stp     w2, w1, [x4,#4]
 >>
 >> We notice that:
 >> 1. machine_kexec() start address is 0xffff2000200bff50
 >> 2. the instruction at machine_kexec+0x44 store the same value
 >>     0xffff2000200bff50 (comes from 0xffff2000200bf000 + 0xf50)
 >>     into stack postion [x29,#128].
 >>
 >> When arm64_in_kdump_text() search LR from stack, it met
 >> 0xffff2000200bff50 firstly, so got wrong bt->bptr.
 >>
 >> We know that the real LR is always great than the start address
 >> of a function, so let's fix it by change the search conditon to
 >> (*ptr > xxx_start) && (*ptr < xxx_end).
 >>
 >> Signed-off-by: Ding Hui <dinghui(a)sangfor.com.cn>
 >> ---
 >>   arm64.c | 18 +++++++++---------
 >>   1 file changed, 9 insertions(+), 9 deletions(-)
 >>
 >> diff --git a/arm64.c b/arm64.c
 >> index c3e26a3..7e8a7db 100644
 >> --- a/arm64.c
 >> +++ b/arm64.c
 >> @@ -3479,7 +3479,7 @@ arm64_in_kdump_text(struct bt_info *bt, struct
arm64_stackframe *frame)
 >>          ms = machdep->machspec;
 >>          for (ptr = start - 8; ptr >= base; ptr--) {
 >>                  if (bt->flags & BT_OPT_BACK_TRACE) {
 >> -                       if ((*ptr >= ms->crash_kexec_start) &&
 >> +                       if ((*ptr > ms->crash_kexec_start) &&
 >>                              (*ptr < ms->crash_kexec_end) &&
 >>                              INSTACK(*(ptr - 1), bt)) {
 >>                                  bt->bptr = ((ulong)(ptr - 1) - (ulong)base)
 >> @@ -3488,7 +3488,7 @@ arm64_in_kdump_text(struct bt_info *bt, struct
arm64_stackframe *frame)
 >>                                          fprintf(fp, "%lx: %lx
(crash_kexec)\n", bt->bptr, *ptr);
 >>                                  return TRUE;
 >>                          }
 >> -                       if ((*ptr >= ms->crash_save_cpu_start) &&
 >> +                       if ((*ptr > ms->crash_save_cpu_start) &&
 >>                              (*ptr < ms->crash_save_cpu_end) &&
 >>                              INSTACK(*(ptr - 1), bt)) {
 >>                                  bt->bptr = ((ulong)(ptr - 1) - (ulong)base)
 >> @@ -3498,14 +3498,14 @@ arm64_in_kdump_text(struct bt_info *bt, struct
arm64_stackframe *frame)
 >>                                  return TRUE;
 >>                          }
 >>                  } else {
 >> -                       if ((*ptr >= ms->machine_kexec_start) &&
(*ptr < ms->machine_kexec_end)) {
 >> +                       if ((*ptr > ms->machine_kexec_start) &&
(*ptr < ms->machine_kexec_end)) {
 >>                                  bt->bptr = ((ulong)ptr - (ulong)base)
 >>                                             +
task_to_stackbase(bt->tc->task);
 >>                                  if (CRASHDEBUG(1))
 >>                                          fprintf(fp, "%lx: %lx
(machine_kexec)\n", bt->bptr, *ptr);
 >>                                  return TRUE;
 >>                          }
 >> -                       if ((*ptr >= ms->crash_kexec_start) &&
(*ptr < ms->crash_kexec_end)) {
 >> +                       if ((*ptr > ms->crash_kexec_start) &&
(*ptr < ms->crash_kexec_end)) {
 >>                                  /*
 >>                                   *  Stash the first crash_kexec frame in case
the machine_kexec
 >>                                   *  frame is not found.
 >> @@ -3519,7 +3519,7 @@ arm64_in_kdump_text(struct bt_info *bt, struct
arm64_stackframe *frame)
 >>                                  }
 >>                                  continue;
 >>                          }
 >> -                       if ((*ptr >= ms->crash_save_cpu_start) &&
(*ptr < ms->crash_save_cpu_end)) {
 >> +                       if ((*ptr > ms->crash_save_cpu_start) &&
(*ptr < ms->crash_save_cpu_end)) {
 >>                                  bt->bptr = ((ulong)ptr - (ulong)base)
 >>                                             +
task_to_stackbase(bt->tc->task);
 >>                                  if (CRASHDEBUG(1))
 >> @@ -3566,7 +3566,7 @@ arm64_in_kdump_text_on_irq_stack(struct bt_info *bt)
 >>
 >>          for (ptr = start - 8; ptr >= base; ptr--) {
 >>                  if (bt->flags & BT_OPT_BACK_TRACE) {
 >> -                       if ((*ptr >= ms->crash_kexec_start) &&
 >> +                       if ((*ptr > ms->crash_kexec_start) &&
 >>                              (*ptr < ms->crash_kexec_end) &&
 >>                              INSTACK(*(ptr - 1), bt)) {
 >>                                  bt->bptr = ((ulong)(ptr - 1) - (ulong)base)
+ stackbase;
 >> @@ -3576,7 +3576,7 @@ arm64_in_kdump_text_on_irq_stack(struct bt_info *bt)
 >>                                  FREEBUF(stackbuf);
 >>                                  return TRUE;
 >>                          }
 >> -                       if ((*ptr >= ms->crash_save_cpu_start) &&
 >> +                       if ((*ptr > ms->crash_save_cpu_start) &&
 >>                              (*ptr < ms->crash_save_cpu_end) &&
 >>                              INSTACK(*(ptr - 1), bt)) {
 >>                                  bt->bptr = ((ulong)(ptr - 1) - (ulong)base)
+ stackbase;
 >> @@ -3587,7 +3587,7 @@ arm64_in_kdump_text_on_irq_stack(struct bt_info *bt)
 >>                                  return TRUE;
 >>                          }
 >>                  } else {
 >> -                       if ((*ptr >= ms->crash_kexec_start) &&
(*ptr < ms->crash_kexec_end)) {
 >> +                       if ((*ptr > ms->crash_kexec_start) &&
(*ptr < ms->crash_kexec_end)) {
 >>                                  bt->bptr = ((ulong)ptr - (ulong)base) +
stackbase;
 >>                                  if (CRASHDEBUG(1))
 >>                                          fprintf(fp, "%lx: %lx (crash_kexec
on IRQ stack)\n",
 >> @@ -3595,7 +3595,7 @@ arm64_in_kdump_text_on_irq_stack(struct bt_info *bt)
 >>                                  FREEBUF(stackbuf);
 >>                                  return TRUE;
 >>                          }
 >> -                       if ((*ptr >= ms->crash_save_cpu_start) &&
(*ptr < ms->crash_save_cpu_end)) {
 >> +                       if ((*ptr > ms->crash_save_cpu_start) &&
(*ptr < ms->crash_save_cpu_end)) {
 >>                                  bt->bptr = ((ulong)ptr - (ulong)base) +
stackbase;
 >>                                  if (CRASHDEBUG(1))
 >>                                          fprintf(fp, "%lx: %lx
(crash_save_cpu on IRQ stack)\n",
 >> --
 >> 2.17.1
 >
 >
 --
 Thanks,
 - Ding Hui