Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4447770ybi; Mon, 3 Jun 2019 11:01:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqwRaR+vxKr60dCleEIl1SijXkd5VfU2cF+NmAlALl8euG0rnU4QvzHQV6bCfKsW+4Q9YBrG X-Received: by 2002:a62:5bc1:: with SMTP id p184mr32840050pfb.154.1559584896251; Mon, 03 Jun 2019 11:01:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559584896; cv=none; d=google.com; s=arc-20160816; b=JSOY8F9Hlo96v24OC5G1aqnoxB3hBhMeNvRR40OUGezDlUjqo0ZauhAxd45DpmGxoM VRlJYqYlFhaY6KbJ+CF1K71qCYnMbPinzgg43ECdNLDqgtmP/rVx6ctuKbiNxFrY5msG 5B54/epFSWg4aK0lv3oUYUnM9jE5JGQi+Fcy4cSFhhU4jH1SqEfYr/zMA6P36Bb0M6xy gjI3eXRq1wyOybskfYvHc0MqNre3XXBPXzQQ2cgOVHPK4o6ynj70rqL4VDHbh9iHbcjY F6/dI5ZNpvCSHHbRub04U5mIe9dunRXGYkMz41/qbWun2FYshYi06xdw4QJC5IsHyFM8 13Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=NFFG3kp8FRDnsFVngkaG/dOX9OcBiEW27bn/p9CO/wY=; b=S5F8gAUC2ZaL83wPAG+IEjMotvZKNEdKD5bQBWESyj59N8zXPM3W2QiqLtRdqVufYx RQLh2SAmWUYBWn3/UUUSVOT0+q/fuJzX/gEGfYafkuZHkPrMiC8/pmlNKJn5oJCmEi4v Vzd3Soje4XM9ol8s41NSyLyz+KIr3+x8knm3FuOtTmKzrQjmydH11PcFxx9ZFP/PjEXI Yqd3LMmERMyV6mXgP5ve6wQT+KbRC1RFnVKhwML2Tc6yfzXq3wzuPhmRrNlfY9dU8if3 CMuZDLm+qmgnOmNOPEZqnaW1atuEeuyeK5M/LOh0yYWe5Z7f2vmB55Du6Nxi0HZEeqY7 ELYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=b3DqWePo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g7si1705747pgq.405.2019.06.03.11.01.19; Mon, 03 Jun 2019 11:01:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=b3DqWePo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727469AbfFCLwn (ORCPT + 99 others); Mon, 3 Jun 2019 07:52:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:47492 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726352AbfFCLwn (ORCPT ); Mon, 3 Jun 2019 07:52:43 -0400 Received: from devnote (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 96AB428165; Mon, 3 Jun 2019 11:52:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559562762; bh=zOwpJAPH6M0NmzaCyXh6SaFMtywFoRXb0kiXvELxV+w=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=b3DqWePoD1RgVvNfoSlMIZVZ0KQCmIwCPn+vPXx93QJVf5FW2oJRJY+zbYJ9HdBcj IS6mwI1sMOggtNsIX4j8Z/xY09HTxD3F9BoV3YDf0Sqt3aMOzzFitWsa7tRdinD21z is9dmJBBgVRSkuSpR+8Vvn5NODCUaz8odjq0tPjA= Date: Mon, 3 Jun 2019 20:52:38 +0900 From: Masami Hiramatsu To: Anders Roxell Cc: Steven Rostedt , Masami Hiramatsu , Ingo Molnar , "Naveen N . Rao" , Anil S Keshavamurthy , "David S . Miller" , Linux Kernel Mailing List , linux-doc@vger.kernel.org Subject: Re: [PATCH v2 2/2] tracing/kprobe: Add kprobe_event= boot parameter Message-Id: <20190603205238.3cef1ef724bda35d11369ea7@kernel.org> In-Reply-To: References: <155851393823.15728.9489409117921369593.stgit@devnote2> <155851395498.15728.830529496248543583.stgit@devnote2> <20190528083629.3c100256@gandalf.local.home> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Anders, Sorry for replying later. On Tue, 28 May 2019 15:39:15 +0200 Anders Roxell wrote: > On Tue, 28 May 2019 at 14:36, Steven Rostedt wrote: > > > > On Tue, 28 May 2019 14:23:43 +0200 > > Anders Roxell wrote: > > > > > On Wed, 22 May 2019 at 10:32, Masami Hiramatsu wrote: > > > > > > > > Add kprobe_event= boot parameter to define kprobe events > > > > at boot time. > > > > The definition syntax is similar to tracefs/kprobe_events > > > > interface, but use ',' and ';' instead of ' ' and '\n' > > > > respectively. e.g. > > > > > > > > kprobe_event=p,vfs_read,$arg1,$arg2 > > > > > > > > This puts a probe on vfs_read with argument1 and 2, and > > > > enable the new event. > > > > > > > > Signed-off-by: Masami Hiramatsu > > > > > > I built an arm64 kernel from todays linux-next tag next-20190528 and > > > ran in to this issue when I booted it up in qemu: Thank you for reporting! > [ 9.020354][ T1] Kprobe smoke test: started > [ 9.064132][ T1] Internal error: aarch64 BRK: f2000004 [#1] PREEMPT SMP > [ 9.067084][ T1] Modules linked in: > [ 9.068772][ T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted > 5.2.0-rc2-next-20190528-00019-g9a6008710716 #8 > [ 9.072893][ T1] Hardware name: linux,dummy-virt (DT) > [ 9.075143][ T1] pstate: 80400005 (Nzcv daif +PAN -UAO) > [ 9.077528][ T1] pc : kprobe_target+0x0/0x30 > [ 9.079479][ T1] lr : init_test_probes+0x134/0x540 > [ 9.081611][ T1] sp : ffff80003f51fbe0 > [ 9.083331][ T1] x29: ffff80003f51fbe0 x28: ffff200013c17820 > [ 9.085906][ T1] x27: ffff200015d3ab40 x26: ffff2000122bb120 > [ 9.088491][ T1] x25: 0000000000000000 x24: ffff200013c08ae0 > [ 9.091068][ T1] x23: ffff200015d39000 x22: ffff200013a15ac8 > [ 9.093667][ T1] x21: 1ffff00007ea3f86 x20: ffff200015d39420 > [ 9.096214][ T1] x19: ffff2000122bad20 x18: 0000000000001400 > [ 9.098831][ T1] x17: 0000000000000000 x16: ffff80003f510040 > [ 9.101410][ T1] x15: 0000000000001480 x14: 1ffff00007ea3ea2 > [ 9.103963][ T1] x13: 00000000f1f1f1f1 x12: ffff040002782e0d > [ 9.106549][ T1] x11: 1fffe40002782e0c x10: ffff040002782e0c > [ 9.109120][ T1] x9 : 1fffe40002782e0c x8 : dfff200000000000 > [ 9.111676][ T1] x7 : ffff040002782e0d x6 : ffff200013c17067 > [ 9.114234][ T1] x5 : ffff80003f510040 x4 : 0000000000000000 > [ 9.116843][ T1] x3 : ffff200010427508 x2 : 0000000000000000 > [ 9.119409][ T1] x1 : ffff200010426e10 x0 : 0000000000a6326b > [ 9.121980][ T1] Call trace: > [ 9.123380][ T1] kprobe_target+0x0/0x30 > [ 9.125205][ T1] init_kprobes+0x2b8/0x300 > [ 9.127074][ T1] do_one_initcall+0x4c0/0xa68 > [ 9.129076][ T1] kernel_init_freeable+0x3c4/0x4e4 > [ 9.131234][ T1] kernel_init+0x14/0x1fc > [ 9.133032][ T1] ret_from_fork+0x10/0x18 > [ 9.134908][ T1] Code: a9446bf9 f9402bfb a8d87bfd d65f03c0 (d4200080) > [ 9.137845][ T1] ---[ end trace 49243ee03446b072 ]--- > [ 9.140114][ T1] Kernel panic - not syncing: Fatal exception > [ 9.142684][ T1] ---[ end Kernel panic - not syncing: Fatal exception ]--- Ah, I think you hit this in [1/2], not this change. I guess arm64's breakpoint handler is not initialized at postcore_initcall(). I have to check the arch depend implementation on arm64. Thank you, -- Masami Hiramatsu