kernel-stacks 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. Kernel stacks on x86-64 bit
  2. ---------------------------
  3. Most of the text from Keith Owens, hacked by AK
  4. x86_64 page size (PAGE_SIZE) is 4K.
  5. Like all other architectures, x86_64 has a kernel stack for every
  6. active thread. These thread stacks are THREAD_SIZE (2*PAGE_SIZE) big.
  7. These stacks contain useful data as long as a thread is alive or a
  8. zombie. While the thread is in user space the kernel stack is empty
  9. except for the thread_info structure at the bottom.
  10. In addition to the per thread stacks, there are specialized stacks
  11. associated with each CPU. These stacks are only used while the kernel
  12. is in control on that CPU; when a CPU returns to user space the
  13. specialized stacks contain no useful data. The main CPU stacks are:
  14. * Interrupt stack. IRQSTACKSIZE
  15. Used for external hardware interrupts. If this is the first external
  16. hardware interrupt (i.e. not a nested hardware interrupt) then the
  17. kernel switches from the current task to the interrupt stack. Like
  18. the split thread and interrupt stacks on i386, this gives more room
  19. for kernel interrupt processing without having to increase the size
  20. of every per thread stack.
  21. The interrupt stack is also used when processing a softirq.
  22. Switching to the kernel interrupt stack is done by software based on a
  23. per CPU interrupt nest counter. This is needed because x86-64 "IST"
  24. hardware stacks cannot nest without races.
  25. x86_64 also has a feature which is not available on i386, the ability
  26. to automatically switch to a new stack for designated events such as
  27. double fault or NMI, which makes it easier to handle these unusual
  28. events on x86_64. This feature is called the Interrupt Stack Table
  29. (IST). There can be up to 7 IST entries per CPU. The IST code is an
  30. index into the Task State Segment (TSS). The IST entries in the TSS
  31. point to dedicated stacks; each stack can be a different size.
  32. An IST is selected by a non-zero value in the IST field of an
  33. interrupt-gate descriptor. When an interrupt occurs and the hardware
  34. loads such a descriptor, the hardware automatically sets the new stack
  35. pointer based on the IST value, then invokes the interrupt handler. If
  36. the interrupt came from user mode, then the interrupt handler prologue
  37. will switch back to the per-thread stack. If software wants to allow
  38. nested IST interrupts then the handler must adjust the IST values on
  39. entry to and exit from the interrupt handler. (This is occasionally
  40. done, e.g. for debug exceptions.)
  41. Events with different IST codes (i.e. with different stacks) can be
  42. nested. For example, a debug interrupt can safely be interrupted by an
  43. NMI. arch/x86_64/kernel/entry.S::paranoidentry adjusts the stack
  44. pointers on entry to and exit from all IST events, in theory allowing
  45. IST events with the same code to be nested. However in most cases, the
  46. stack size allocated to an IST assumes no nesting for the same code.
  47. If that assumption is ever broken then the stacks will become corrupt.
  48. The currently assigned IST stacks are :-
  49. * DOUBLEFAULT_STACK. EXCEPTION_STKSZ (PAGE_SIZE).
  50. Used for interrupt 8 - Double Fault Exception (#DF).
  51. Invoked when handling one exception causes another exception. Happens
  52. when the kernel is very confused (e.g. kernel stack pointer corrupt).
  53. Using a separate stack allows the kernel to recover from it well enough
  54. in many cases to still output an oops.
  55. * NMI_STACK. EXCEPTION_STKSZ (PAGE_SIZE).
  56. Used for non-maskable interrupts (NMI).
  57. NMI can be delivered at any time, including when the kernel is in the
  58. middle of switching stacks. Using IST for NMI events avoids making
  59. assumptions about the previous state of the kernel stack.
  60. * DEBUG_STACK. DEBUG_STKSZ
  61. Used for hardware debug interrupts (interrupt 1) and for software
  62. debug interrupts (INT3).
  63. When debugging a kernel, debug interrupts (both hardware and
  64. software) can occur at any time. Using IST for these interrupts
  65. avoids making assumptions about the previous state of the kernel
  66. stack.
  67. * MCE_STACK. EXCEPTION_STKSZ (PAGE_SIZE).
  68. Used for interrupt 18 - Machine Check Exception (#MC).
  69. MCE can be delivered at any time, including when the kernel is in the
  70. middle of switching stacks. Using IST for MCE events avoids making
  71. assumptions about the previous state of the kernel stack.
  72. For more details see the Intel IA32 or AMD AMD64 architecture manuals.
  73. Printing backtraces on x86
  74. --------------------------
  75. The question about the '?' preceding function names in an x86 stacktrace
  76. keeps popping up, here's an indepth explanation. It helps if the reader
  77. stares at print_context_stack() and the whole machinery in and around
  78. arch/x86/kernel/dumpstack.c.
  79. Adapted from Ingo's mail, Message-ID: <20150521101614.GA10889@gmail.com>:
  80. We always scan the full kernel stack for return addresses stored on
  81. the kernel stack(s) [*], from stack top to stack bottom, and print out
  82. anything that 'looks like' a kernel text address.
  83. If it fits into the frame pointer chain, we print it without a question
  84. mark, knowing that it's part of the real backtrace.
  85. If the address does not fit into our expected frame pointer chain we
  86. still print it, but we print a '?'. It can mean two things:
  87. - either the address is not part of the call chain: it's just stale
  88. values on the kernel stack, from earlier function calls. This is
  89. the common case.
  90. - or it is part of the call chain, but the frame pointer was not set
  91. up properly within the function, so we don't recognize it.
  92. This way we will always print out the real call chain (plus a few more
  93. entries), regardless of whether the frame pointer was set up correctly
  94. or not - but in most cases we'll get the call chain right as well. The
  95. entries printed are strictly in stack order, so you can deduce more
  96. information from that as well.
  97. The most important property of this method is that we _never_ lose
  98. information: we always strive to print _all_ addresses on the stack(s)
  99. that look like kernel text addresses, so if debug information is wrong,
  100. we still print out the real call chain as well - just with more question
  101. marks than ideal.
  102. [*] For things like IRQ and IST stacks, we also scan those stacks, in
  103. the right order, and try to cross from one stack into another
  104. reconstructing the call chain. This works most of the time.