Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3878694imu; Fri, 30 Nov 2018 07:24:57 -0800 (PST) X-Google-Smtp-Source: AFSGD/WkkTdu4oPDtRxS40t8nCB1kd4LK5k46Ixz4pj42Cd0t9y4nRwIm29h9bex0RT5VsJov+rw X-Received: by 2002:a62:6503:: with SMTP id z3mr5848781pfb.169.1543591497655; Fri, 30 Nov 2018 07:24:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543591497; cv=none; d=google.com; s=arc-20160816; b=R9mFOQ3S40acGDkRlwERM5kiYLkI7OPprgXvt+wA1wRKhm5NyjhRa2Dqjn1sDF1l8O oOYlS1RMda8rsOUkADM3sGz/ZXTzlITJ8W7v56SUWamXoNP4BXex7utnIasY2dptWsok DmH3PkDltVG70G4mMWp2fWg0z7aKF8CE3HVk6h4lwIhDaiFBe9pcfhtKFcQ3HxrbLst2 2ML8v1WbxfXKCsAsQobjWbUMynt4wDHN4d0RXgNKbKrvnG6JXWVOyrc2ZRFUpKbGrPpj Tpf4vPhCo7kyHdyXpod7EZi2TA2TLc14NxcCcJwJyqIA/JbJZuWgeMpKhU0eL5sudykP L6vQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=Ip0JGCWdksGHA1mtboIvcvVvXs9vdrvnAezl56XCejE=; b=wziUhwywnkZ3eEdzBJd2kgjwWggnr+8iSNDd81WzKbKrEZQSiG98FZYI4UzOQyP581 FmF91mOrKurWtBs3+MzRWrvO3p56WWaNqrF18qAfOffO3J66YQCO9v+dWYbBwj93DzHk BDJF5wNqV4xZmpMZ2/+/SLoTtmyP13UGyG3y/UNghjcF+y+l5LtE9jqE3PcttFHTck8Z Kwjn8v4yCapxuhAIx9Tz3ejFPkkoWCKtd3JEl6uIzJAUW57h9gInYxVjOi41paeYEw96 plS7b4k/RDEb4T1Pv2bdacO0aMrbxDVfr4U4AWjdJywjYOzMUTNquJjPrbWoFZFBi4Ky 1BbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m4si5205790pgj.61.2018.11.30.07.24.34; Fri, 30 Nov 2018 07:24:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726762AbeLACb4 (ORCPT + 99 others); Fri, 30 Nov 2018 21:31:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:51008 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726127AbeLACb4 (ORCPT ); Fri, 30 Nov 2018 21:31:56 -0500 Received: from gandalf.local.home (cpe-66-24-56-78.stny.res.rr.com [66.24.56.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8724C20868; Fri, 30 Nov 2018 15:22:15 +0000 (UTC) Date: Fri, 30 Nov 2018 10:22:14 -0500 From: Steven Rostedt To: Anders Roxell Cc: mingo@redhat.com, keescook@chromium.org, catalin.marinas@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Arnd Bergmann Subject: Re: [PATCH 2/3] tracing: instruct KCOV not to track tracing files Message-ID: <20181130102214.21e1f8f6@gandalf.local.home> In-Reply-To: <20181130150935.27493-1-anders.roxell@linaro.org> References: <20181130150935.27493-1-anders.roxell@linaro.org> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 30 Nov 2018 16:09:35 +0100 Anders Roxell wrote: > When we have KCOV enabled and running ftrace startup tests we end up in > a softlockup. Kcov and ftrace tracing each other makes it really slow: > > [ 275.141388] Testing tracer wakeup_dl: PASSED > [ 304.738345] Testing tracer function_graph: > [ 716.236822] watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [ksoftirqd/0:9] > > Rework so that we don't let KCOV look at tracing files. Could probably > be more selective here, but in in general letting KCOV and ftrace check > each isn't the best idea. > > Co-developed-by: Arnd Bergmann > Signed-off-by: Arnd Bergmann > Signed-off-by: Anders Roxell > --- > kernel/trace/Makefile | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/kernel/trace/Makefile b/kernel/trace/Makefile > index f81dadbc7c4a..c7c73b976103 100644 > --- a/kernel/trace/Makefile > +++ b/kernel/trace/Makefile > @@ -6,6 +6,11 @@ ifdef CONFIG_FUNCTION_TRACER > ORIG_CFLAGS := $(KBUILD_CFLAGS) > KBUILD_CFLAGS = $(subst $(CC_FLAGS_FTRACE),,$(ORIG_CFLAGS)) > > +# If instrumentation of this dir is enabled, the function tracer gets really > +# slow. Probably could be more selective here, but note that files related > +# to tracing.shouldn't be traced anyway. > +KCOV_INSTRUMENT := n > + The entire directory is also set to not be traced by function tracing, which also is a bit overkill, as there's functions in this directory that can (and probably should) be. Acked-by: Steven Rostedt (VMware) -- Steve > ifdef CONFIG_FTRACE_SELFTEST > # selftest needs instrumentation > CFLAGS_trace_selftest_dynamic.o = $(CC_FLAGS_FTRACE)