Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp562462ybi; Wed, 17 Jul 2019 01:16:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqy2HFU71mC+Te3bCScp2sdnkwwvMiLDBSAbNoOcfwnuAWMQwHuvvL2NxAuiQrvCsatkcIzj X-Received: by 2002:a63:4823:: with SMTP id v35mr12198508pga.138.1563351412031; Wed, 17 Jul 2019 01:16:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563351412; cv=none; d=google.com; s=arc-20160816; b=MVEtoeCkTBiFr1fp4euEhA0j+ct2RkOUDuhMqCPZFsPuP9Aeu6zwxctPzKfXkc0uZ4 MFpPW2xRihLApiwNWY5kWl92lw4CAcIhwtR1/FOqcNm/qdZ7lQu7hyv1X9UJppJvr/J1 9JuPpCNYp91CFE8ZwKFqw+W0BU6gGYPkN+Fjg1PFjliDv4oclhjxrrGlgHQBgL4FovvK 5kEoaUXfM/VTg80Wa12y6gEDDqxPv7Sm24G8tzAq8jsYvTl8/t8I04I3/Qs3U33rbLFc Boc4KbpSVEl+uLixAC0zCRGu0u8ZcNr+rNDbDtxghyEEwyqBE+3nlkg7IXBfFIWM8ZSq zv2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=/f7OgW0o9ZNPt/YPHVcf8OqBFwXKG1xblF9Y+OGzR2k=; b=04vQnT/9BOQ2O9LHs1COQovWh3GJLd2hmrPmvFl+4nay4aVP94WtpihNsjc+P06Qi2 PZTBx3oIIG3VBqVq720W0U+C0z5ZaKtsml8Y29VTK3P4tXKQGc4kaB/DjbzrAgo0CmMc PP1Yt/2lrtxDIAV7vEgOutw0iGShm/OxOhJbXuVjnEQQykmdyKAqgDBBPsLUt8dMsGO/ shl+eYHvlvJWZddUFPOo7EnDkgn/uXZio9VBlBj+z0gHB85DzCmQcSv9CpKW4MxT70Rc 2pliixa1NkRefWOHamugrN+QOIoP7LyJNuDF4Uww5Th4sDpBLEdFlWbSXvomZZ2Vt0ed PT7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=sl76CQFt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t6si16393367pgu.154.2019.07.17.01.16.35; Wed, 17 Jul 2019 01:16:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=sl76CQFt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728313AbfGQIPI (ORCPT + 99 others); Wed, 17 Jul 2019 04:15:08 -0400 Received: from mail-pg1-f194.google.com ([209.85.215.194]:35751 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726190AbfGQIPH (ORCPT ); Wed, 17 Jul 2019 04:15:07 -0400 Received: by mail-pg1-f194.google.com with SMTP id s1so4471111pgr.2 for ; Wed, 17 Jul 2019 01:15:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=/f7OgW0o9ZNPt/YPHVcf8OqBFwXKG1xblF9Y+OGzR2k=; b=sl76CQFtTSyOEUptCth+jHwbMqlZmCIAocfmi0GCg+JJXWyhblEVpA2LXBPnuKd3ay 8nobOMYKh5otbxtdX3YNfmnKOeno4Ghi3VtlQ+Sh7sMHvb2gub4hQuu+m5rnzcwgf4jg Hv06Kxh5DjiVaGX3sqyMbOwiK9DNVgQQuX+Ak/IR8xafBC0k8Kxbfvr6JRExUVZ81lbQ pfyNhfLDli3+ak7+l29GxDmLl1SAKj0e1iEnSbcN7jw08+H7e6B6yBD5WAXdWRTe71/s mToP0O/aoAyYNCf1qq+4q5xIT4z29Wh+e0Ezt9LZjSzIgd7xJL7Nd00q0vB4RAW7K1xp 9xlA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=/f7OgW0o9ZNPt/YPHVcf8OqBFwXKG1xblF9Y+OGzR2k=; b=YuxMO4jMy9MvXjb5LflRw2rOw5tASnYwcLjG56vYs90MDB5uAeEYCwujbxXPOt4/R9 /GXT4IKKFKIY8MOdss4ELHxlkAwbmSF/IXX2UrkqFps46FZdXTxUjRox2I7XOXreGxgj eloPWkvfND2B1CSiopXP/R6GPCT0zI+ag31Q8C9BWzaqPgein+OVXPV3wuFJz+TZj5I0 kwj/bp9up65zseJTQ5feExiaVszPWFsnaNx5qmd3srRrx1sZjesZxxOOzkek6ZxgeFRF swmigbPWBtuHKwBmZ/bhjJbAZ0coWg74Xa5ELNy1+bRDA/63oGDlOhvQ0VHYNy4R0mbx lpyg== X-Gm-Message-State: APjAAAVwKa0P0xtBJtqdAGUrOJdj94mDeHqIOaTe28jUxgOZ1WM7DydL tFN2lQmWVOyuTRaphQMQmG6WMQ== X-Received: by 2002:a65:518a:: with SMTP id h10mr39032287pgq.117.1563351307012; Wed, 17 Jul 2019 01:15:07 -0700 (PDT) Received: from leoy-ThinkPad-X240s (li1433-81.members.linode.com. [45.33.106.81]) by smtp.gmail.com with ESMTPSA id a6sm21429043pjs.31.2019.07.17.01.15.02 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 17 Jul 2019 01:15:06 -0700 (PDT) Date: Wed, 17 Jul 2019 16:14:56 +0800 From: Leo Yan To: Masami Hiramatsu Cc: Russell King , Oleg Nesterov , Catalin Marinas , Will Deacon , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Arnd Bergmann , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, Justin He Subject: Re: [PATCH 0/2] arm/arm64: Add support for function error injection Message-ID: <20190717081456.GB20476@leoy-ThinkPad-X240s> References: <20190716111301.1855-1-leo.yan@linaro.org> <20190717165222.62e02b99ebc16e23c3b81de2@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190717165222.62e02b99ebc16e23c3b81de2@kernel.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 17, 2019 at 04:52:22PM +0900, Masami Hiramatsu wrote: > On Tue, 16 Jul 2019 19:12:59 +0800 > Leo Yan wrote: > > > This small patch set is to add support for function error injection; > > this can be used to eanble more advanced debugging feature, e.g. > > CONFIG_BPF_KPROBE_OVERRIDE. > > > > I only tested the first patch on arm64 platform Juno-r2 with below > > steps; the second patch is for arm arch, but I absent the platform > > for the testing so only pass compilation. > > > > - Enable kernel configuration: > > CONFIG_BPF_KPROBE_OVERRIDE > > CONFIG_BTRFS_FS > > CONFIG_BPF_EVENTS=y > > CONFIG_KPROBES=y > > CONFIG_KPROBE_EVENTS=y > > CONFIG_BPF_KPROBE_OVERRIDE=y > > - Build samples/bpf on Juno-r2 board with Debian rootFS: > > # cd $kernel > > # make headers_install > > # make samples/bpf/ LLC=llc-7 CLANG=clang-7 > > - Run the sample tracex7: > > # ./tracex7 /dev/sdb1 > > [ 1975.211781] BTRFS error (device (efault)): open_ctree failed > > mount: /mnt/linux-kernel/linux-cs-dev/samples/bpf/tmpmnt: mount(2) system call failed: Cannot allocate memory. > > This series looks good to me from the view point of override usage :) > > Reviewed-by: Masami Hiramatsu > > For this series. > > Thank you, Thank you for reviewing, Masami. > > > > > > Leo Yan (2): > > arm64: Add support for function error injection > > arm: Add support for function error injection > > > > arch/arm/Kconfig | 1 + > > arch/arm/include/asm/error-injection.h | 13 +++++++++++++ > > arch/arm/include/asm/ptrace.h | 5 +++++ > > arch/arm/lib/Makefile | 2 ++ > > arch/arm/lib/error-inject.c | 19 +++++++++++++++++++ > > arch/arm64/Kconfig | 1 + > > arch/arm64/include/asm/error-injection.h | 13 +++++++++++++ > > arch/arm64/include/asm/ptrace.h | 5 +++++ > > arch/arm64/lib/Makefile | 2 ++ > > arch/arm64/lib/error-inject.c | 19 +++++++++++++++++++ > > 10 files changed, 80 insertions(+) > > create mode 100644 arch/arm/include/asm/error-injection.h > > create mode 100644 arch/arm/lib/error-inject.c > > create mode 100644 arch/arm64/include/asm/error-injection.h > > create mode 100644 arch/arm64/lib/error-inject.c > > > > -- > > 2.17.1 > > > > > -- > Masami Hiramatsu