Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp8056954ybi; Tue, 9 Jul 2019 08:27:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgqvprhClxQ0G5VX/rIuQsra7JhMmr7BJ80l86Ykyhio7Cvf1ifkioyn6ciP+uPGbWIwXV X-Received: by 2002:a17:90a:bb94:: with SMTP id v20mr758890pjr.88.1562686064409; Tue, 09 Jul 2019 08:27:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562686064; cv=none; d=google.com; s=arc-20160816; b=y1W0ubNNUZzywRm+bScXqkMt/NNjiwLqQbJMSywlDFDutCCVZ41YMTw4901neNOqK4 nOUUhPSaJufoShIHXmUny2fMgOl9q+u+f9V05ttFqyMb/Y2NMm07kGsuXVH+8eWVNOav J0mdi8i+etV09miJ2IDgJXK4xgZzxN9x6DvMUpVE4Qspa4Q+yeNr3FmSkaPxUSliLd/G 90NxwevSr7esDwsL+rjK4fYE6A5Fs9XfC9gI9n7qHCqx2GMmoaNYecOEdQ5YGkVuhqFJ o3R+5Qf66v1aVzrgqP5pI9HOXFjklrEe/IUWKbcQkKyIxPx2hR3/bO4/AZRch7cWkVn2 ymBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=RbgFqSVgb4jrDcd4VjIZNzA/3Sw6bnh67J29LkpadRc=; b=aq++F5s4KoGLpFvjKMQdceEtNm9EgZFuxWzxgYZqw2WNJjrXBSZqy89Tjdpfy3hyNd 3Yblraabv08P1yD8Cs+rsRpukoyMHAKLk6cu6bwgYqDgmNHoeJZ5b07jg1TYxJI0qKLD 03D/EeCqV+HoyrwwBoql9ZNP87rpa1K1uU/OVnKlT1d0SeQzs3ABc9Kt6g61yTf21xeM 79TiV3F7ZNkml5bhE1sRqHACYC5V9JS3qnjJwBUhEWvUFW5WLEL/ysu/0EjgzA9K1LSm LDNkxKDDXIoZ1nzjpkiMxsnKclr3wODSo3BSW6RITmJIOvSv0ZXhnRHXAsPYBbtpiAPZ HVDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id go9si21768922plb.268.2019.07.09.08.27.28; Tue, 09 Jul 2019 08:27:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726435AbfGIPZv (ORCPT + 99 others); Tue, 9 Jul 2019 11:25:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:60446 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726055AbfGIPZv (ORCPT ); Tue, 9 Jul 2019 11:25:51 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F397621537; Tue, 9 Jul 2019 15:25:49 +0000 (UTC) Date: Tue, 9 Jul 2019 11:25:48 -0400 From: Steven Rostedt To: Masami Hiramatsu Cc: Anders Roxell , James Morse , "Naveen N . Rao" , Anil S Keshavamurthy , David Miller , Masami Hiramatsu , Linux ARM , Linux Kernel Mailing List Subject: Re: kprobes sanity test fails on next-20190708 Message-ID: <20190709112548.25edc9a7@gandalf.local.home> In-Reply-To: <20190709213657.1447f508bd6b72495ec225d9@gmail.com> References: <20190708141136.GA3239@localhost.localdomain> <20190709213657.1447f508bd6b72495ec225d9@gmail.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 9 Jul 2019 21:36:57 +0900 Masami Hiramatsu wrote: > On Tue, 9 Jul 2019 12:19:15 +0200 > Anders Roxell wrote: > > > On Mon, 8 Jul 2019 at 17:56, James Morse wrote: > > > > > > Hi, > > > > > > On 08/07/2019 15:11, Anders Roxell wrote: > > > > argh... resending, with plaintext... Sorry =/ > > > > > > > > I tried to build a next-201908 defconfig + CONFIG_KPROBES=y and > > > > CONFIG_KPROBES_SANITY_TEST=y > > > > > > > > I get the following Call trace, any ideas? > > > > I've tried tags back to next-20190525 and they also failes... I haven't > > > > found a commit that works yet. > > > > > > > > [ 0.098694] Kprobe smoke test: started > > > > [ 0.102001] audit: type=2000 audit(0.088:1): state=initialized > > > > audit_enabled=0 res=1 > > > > [ 0.104753] Internal error: aarch64 BRK: f2000004 [#1] PREEMPT SMP > > > > > > This sounds like the issue Mark reported: > > > https://lore.kernel.org/r/20190702165008.GC34718@lakrids.cambridge.arm.com > > > > > > It doesn't look like Steve's patch has percolated into next yet: > > > https://lore.kernel.org/lkml/20190703103715.32579c25@gandalf.local.home/ I forgot to push it after sending it. :-( > > > > > > Could you give that a try to see if this is a new issue? > > > > The patch didn't apply cleanly. > > However, when I resolved the issue it works. > > I'm a bit embarrassed since I now remembered that I reported it a while back. > > https://lore.kernel.org/lkml/20190625191545.245259106@goodmis.org/ > > > > Both patches resolved the issue. > > I've tested both. > > In that case, the later one (move postcore to subsys) seems good to me. > > Delaying the test is just avoiding the issue that the selftest found, > since right after init_kprobes() are called, the kprobe is ready for use. > This means that the selftest must be run as the first user of the kprobes > and it must be run right after initialize kprobes. I agree. I pushed to my repo in the for-next branch. Care to test that? git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace.git -- Steve