Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp3885477ybh; Tue, 6 Aug 2019 03:02:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqzyWCdwLveKKSmh6p5tj3TESQz/eardB7OKAHEAafHMVwGNfovbmTKIgU4r98i6e27WhWLk X-Received: by 2002:a63:1341:: with SMTP id 1mr2387065pgt.48.1565085726924; Tue, 06 Aug 2019 03:02:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565085726; cv=none; d=google.com; s=arc-20160816; b=CtlPA6alC3kzFQYXbMl1p8IgkfbZQTmY1W0J9/GNk7cQ4bf2anjCyhkXM+cmFMFHlZ PSHcmeb5RGoVr6C/vcf9FgQOtwBPsyiJ8wVyXebpaSBJH2txJymE+FX7jCZvDfc87/yi IITFY5KHill4ZjvznNlMqF3Ee+lX/0QdsauNEHBbt+qc/Agl7Rv+H+4albsXoNbCYkx/ lk6iPTTN7ABgakeXOmVFz7mDk1SL7gGkNk/fcYT4Y4UZXapnxTyR2eji3vPNte/wx9Pp Am5tpk0QkZPew61BJcxNI0AmNDqaQoTgkzrPdxTipvMeAR7/oQUcUQvgt034smzCBRJ2 6fXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=ss7tfuNN9gph1p4XOsDIlLKrMAe3sezcu2lcCyG5PrA=; b=TdYWa9xWg4XLuRrdxoPQaU9bLyDOMP5gFF6W0TT15GkfQ+k6swmXGcEeN8BmHnl5Jg JQqYUBQMElcbEGxAuC73AbPG0RqN/QAsoatVPGnWpjF5x1IKdxV4tqU2s9IT8jwgYxs4 kO5zNmSVNv4Seg8B7GZUxqCyF6DPZAzCwms9kaRccw4JU0SqvJPoiAivWOYHmSstw7yk CSIx2Hky8Em+e9iRHE3f09vUZ8xaQ14Dxy2M/s5VQffWQciF+E/vSOTV2/gyP4S1Ev0A mAL1dEsiCpJasIV3pU//ZkZwPPSzf7cqjgU6xpjbA7S2a8K5VKCnsbsJLSMrAivyMEwK p1wA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=llzpCKvf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16si41648189ply.133.2019.08.06.03.01.39; Tue, 06 Aug 2019 03:02:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=llzpCKvf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732537AbfHFKA5 (ORCPT + 99 others); Tue, 6 Aug 2019 06:00:57 -0400 Received: from mail-yb1-f193.google.com ([209.85.219.193]:38475 "EHLO mail-yb1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732312AbfHFKAy (ORCPT ); Tue, 6 Aug 2019 06:00:54 -0400 Received: by mail-yb1-f193.google.com with SMTP id j199so30426590ybg.5 for ; Tue, 06 Aug 2019 03:00:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=ss7tfuNN9gph1p4XOsDIlLKrMAe3sezcu2lcCyG5PrA=; b=llzpCKvfTJg9zx4WGbK3W8ELlbZszVisTWmKs2WgL7/QVGUzVblcBslqpxo6sHvB/2 XTxuH6yt7Pqho2/Dk3XQRm5ssQG4b0J5+VL1WLv3DvEuC4iWmLQBmcnIeEYbnhvQAS3d OaDIu3c8mjZ3MaC87uEx1ICI53UwFJn//mcEAXmhA1PI1HBLTuGVvr28BI74d7+vKFK8 g8I+2D4tta/rMVSZZQJJDzvZToRr0JlJ0xd4r32m0Z7Y3QGdloZvUkRz4PwUMa4SBbTJ ReTDwAvbKrd4coRI8s0r8TqxVgUjPfsoTdlSM5oAL4w7ndmTwVVuizbrsn36eLs160LV Gc3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=ss7tfuNN9gph1p4XOsDIlLKrMAe3sezcu2lcCyG5PrA=; b=rBUYYqRGG55+orOGSfR2nVE22QB2qdWM6A5wOaos2fKn93wm7QAdqkQNdyLM9MiJNb 8g2ZGaf+9V3PnEydCuFGX/ByinhKiXB6qtgZ5+ahr4UmC5IF88fLqzwgBB1suDoOhxZZ pJEtvZStmEQGupfubWcxAbZuBJ1LTxG2JsSHFfifp7wPTXIbquwT4dTaxqt+tNkSbzX3 cduH4JAz+/3zDyVdMYxLHI3gEOiZIh+MxYqgEkl0sSIscVRc7KUmApYUG9au4H1HECqQ VguIOk8bgbuaWGe9fhfO5u1wynjIkV4vb10zBvCkLPLO8yBpCB3qTzQD5cZJxSp9bhdh poUQ== X-Gm-Message-State: APjAAAVcFBnvLI9t5lTY/7wEgEJxA+YMRX1/uWk89PVRCmO+tXFy/njU X9AcV7MS1Mdv/KxYP0FETa/7Cw== X-Received: by 2002:a25:2005:: with SMTP id g5mr1786698ybg.410.1565085653130; Tue, 06 Aug 2019 03:00:53 -0700 (PDT) Received: from localhost.localdomain (li1322-146.members.linode.com. [45.79.223.146]) by smtp.gmail.com with ESMTPSA id h12sm18316685ywm.91.2019.08.06.03.00.42 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 06 Aug 2019 03:00:51 -0700 (PDT) From: Leo Yan To: Russell King , Oleg Nesterov , Catalin Marinas , Will Deacon , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , "Naveen N. Rao" , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, clang-built-linux@googlegroups.com, Masami Hiramatsu Cc: Leo Yan Subject: [PATCH v2 0/3] arm/arm64: Add support for function error injection Date: Tue, 6 Aug 2019 18:00:12 +0800 Message-Id: <20190806100015.11256-1-leo.yan@linaro.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This small patch set is to add support for function error injection; this can be used to eanble more advanced debugging feature, e.g. CONFIG_BPF_KPROBE_OVERRIDE. The patch 01/03 is to consolidate the function definition which can be suared cross architectures, patches 02,03/03 are used for enabling function error injection on arm64 and arm architecture respectively. I tested on arm64 platform Juno-r2 and one of my laptop with x86 architecture with below steps; I don't test for Arm architecture so only pass compilation. - Enable kernel configuration: CONFIG_BPF_KPROBE_OVERRIDE CONFIG_BTRFS_FS CONFIG_BPF_EVENTS=y CONFIG_KPROBES=y CONFIG_KPROBE_EVENTS=y CONFIG_BPF_KPROBE_OVERRIDE=y - Build samples/bpf on with Debian rootFS: # cd $kernel # make headers_install # make samples/bpf/ LLC=llc-7 CLANG=clang-7 - Run the sample tracex7: # dd if=/dev/zero of=testfile.img bs=1M seek=1000 count=1 # DEVICE=$(losetup --show -f testfile.img) # mkfs.btrfs -f $DEVICE # ./tracex7 testfile.img [ 1975.211781] BTRFS error (device (efault)): open_ctree failed mount: /mnt/linux-kernel/linux-cs-dev/samples/bpf/tmpmnt: mount(2) system call failed: Cannot allocate memory. Changes from v1: * Consolidated the function definition into asm-generic header (Will); * Used APIs to access pt_regs elements (Will); * Fixed typos in the comments (Will). Leo Yan (3): error-injection: Consolidate override function definition arm64: Add support for function error injection arm: Add support for function error injection arch/arm/Kconfig | 1 + arch/arm/include/asm/ptrace.h | 5 +++++ arch/arm/lib/Makefile | 2 ++ arch/arm/lib/error-inject.c | 19 +++++++++++++++++++ arch/arm64/Kconfig | 1 + arch/arm64/include/asm/ptrace.h | 5 +++++ arch/arm64/lib/Makefile | 2 ++ arch/arm64/lib/error-inject.c | 18 ++++++++++++++++++ arch/powerpc/include/asm/error-injection.h | 13 ------------- arch/x86/include/asm/error-injection.h | 13 ------------- include/asm-generic/error-injection.h | 6 ++++++ include/linux/error-injection.h | 6 +++--- 12 files changed, 62 insertions(+), 29 deletions(-) create mode 100644 arch/arm/lib/error-inject.c create mode 100644 arch/arm64/lib/error-inject.c delete mode 100644 arch/powerpc/include/asm/error-injection.h delete mode 100644 arch/x86/include/asm/error-injection.h -- 2.17.1