On Wed, Mar 6, 2024 at 6:30 PM Daisuke Hatayama (Fujitsu) <
d.hatay...@fujitsu.com> wrote:

> Lianbo,
>
> Thank you for your work.
>
> > Some objects format may potentially support copy relocations, but
> > currently the maybe_copied is always initialized to 0 in the symbol().
> > And the type is 'mst_file_bss', not always the 'mst_bss' or 'mst_data'
> > in the lookup_minimal_symbol_linkage(). For example:
> >
> > (gdb) p *msymbol
> > $42 = {<general_symbol_info> = {m_name = 0x349812f "test_no_static",
> value = {ivalue = 8, block = 0x8,
> >       bytes = 0x8 <error: Cannot access memory at address 0x8>, address
> = 8, common_block = 0x8, chain = 0x8}, language_specific = {
> >       obstack = 0x0, demangled_name = 0x0}, m_language = language_auto,
> ada_mangled = 0, section = 20}, size = 4,
> >   filename = 0x6db3440 "test_sanity.c", type = mst_file_bss,
> created_by_gdb = 0, target_flag_1 = 0, target_flag_2 = 0, has_size = 1,
> >   maybe_copied = 0, name_set = 1, hash_next = 0x0, demangled_hash_next =
> 0x0}
>
> The current description lacks explanation of when this issue
> occurs. Please write that the issue occurs when the corresponding
> kernel is built with CONFIG_CALL_DEPTH_TRACKING=y.
>
>
Thank you for the comment, Hatayama.

I should describe more background on this issue in the patch log. The
current issue can be easily reproduced with the following kernel commit:

commit 80e4c1cd42fff110bfdae8fce7ac4f22465f9664 (HEAD)
Author: Thomas Gleixner <t...@linutronix.de>
Date:   Thu Sep 15 13:11:19 2022 +0200

    x86/retbleed: Add X86_FEATURE_CALL_DEPTH

    Intel SKL CPUs fall back to other predictors when the RSB underflows.
The
    only microcode mitigation is IBRS which is insanely expensive. It comes
    with performance drops of up to 30% depending on the workload.

    A way less expensive, but nevertheless horrible mitigation is to track
the
    call depth in software and overeagerly fill the RSB when returns
underflow
    the software counter.

    Provide a configuration symbol and a CPU misfeature bit.

    Signed-off-by: Thomas Gleixner <t...@linutronix.de>
    Signed-off-by: Peter Zijlstra (Intel) <pet...@infradead.org>
    Link: https://lore.kernel.org/r/20220915111147.056176...@infradead.org

After reverting the above commit, the current issue may disappear. And
originally I tried to find the clue how this kernel commit changes affected
the gdb, I have not found the clue for the time being. But later I noticed
that the gdb gets the correct offset address of a global variable
'test_no_static', which is an expected behavior from the gdb perspective
because of copy relocations, probably some object files potentially support
the copy relocations, just like this.

It would also be good to describe the fact that the issue occurs at
> least on RHEL9 kernel.
>

This is an upstream issue, I have reproduced it on the upstream kernel with
the above kernel commit changes.


>
> > This causes a problem that the 'p' command can not work well as
> > expected, and always gets an error:
> >
> >   crash> mod -s test_sanity /home/test_sanity.ko
> >        MODULE       NAME                         BASE           SIZE
> OBJECT FILE
> >   ffffffffc1084040  test_sanity            ffffffffc1082000    16384
> /home/test_sanity.ko
> >   crash> p test_no_static
> >   p: gdb request failed: p test_no_static
> >   crash>
> >
> > With the patch:
> >   crash> mod -s test_sanity /home/test_sanity.ko
> >        MODULE       NAME                         BASE           SIZE
> OBJECT FILE
> >   ffffffffc1084040  test_sanity            ffffffffc1082000    16384
> /home/test_sanity.ko
> >   crash> p test_no_static
> >   test_no_static = $1 = 5
> >   crash>
>
> It's correct that p command doesn't work as expected, but it doesn't
> always result in some error. This issue is failure of calculating
> relocated address of static symbols. If the calculated address happens
> to be the address where read can be successfull, it doesn't result in
> read error but outputs some bogus value.
>

It's true, but the bogus value is not an expected result because of an
incorrect address.
That is why the maybe_copied flag is initialized to 1, as I mentioned
above, some objfile may potentially support the copy relocations.


Thanks.
Lianbo


>
> To make this clear, I think it's better to set debug level 4 and to
> have p command output calculated virtual address as debug messages.
>
> For example:
>
>     crash> sym -M | grep -E " test_no"
>     ffffffffc0da7580 (B) test_no
>     ffffffffc0da7584 (b) test_no_static
>     crash> set debug 4
>     debug: 4
>     crash> p test_no
>     p: per_cpu_symbol_search(test_no): NULL
>     test_no = <readmem: ffffffffc0da7580, KVADDR, "gdb_readmem callback",
> 4, (ROE), 560d2d483400>
>     <read_diskdump: addr: ffffffffc0da7580 paddr: 10b263580 cnt: 4>
>     $3 = 5
>     crash> p test_no_static
>     p: per_cpu_symbol_search(test_no_static): NULL
>     test_no_static = <readmem: ffffffffc0d9f004, KVADDR, "gdb_readmem
> callback", 4, (ROE), 560d2dc9b100>
>     <read_diskdump: addr: ffffffffc0d9f004 paddr: 108bfc004 cnt: 4>
>     $4 = -1869574000
>
>
>
--
Crash-utility mailing list -- devel@lists.crash-utility.osci.io
To unsubscribe send an email to devel-le...@lists.crash-utility.osci.io
https://${domain_name}/admin/lists/devel.lists.crash-utility.osci.io/
Contribution Guidelines: https://github.com/crash-utility/crash/wiki

Reply via email to