Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp4801913ybh; Tue, 6 Aug 2019 18:32:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqwP2ZtcdQUv4ks6+ETsq3wPNrEK52uKEbssBDXB1tk5rHaEQYVUrtPEuMEH+HAIsn0lJveo X-Received: by 2002:a63:b46:: with SMTP id a6mr5634312pgl.235.1565141566886; Tue, 06 Aug 2019 18:32:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565141566; cv=none; d=google.com; s=arc-20160816; b=peH1sWhO2sv7Lr4DakICtENifOX/f2paBeCAy6XFzPRZ+2eeapH3PRwvvmXBx2V+hK WpHHLxUMflXcL2fpncTNxQ1zE8bgiGk2PegDUW7/OEx8PdXQlOMHreHh7UkXr5QsakjK m4ai0dKVSEiyhnwPmnnQF2gAXKCgy8lqBiIPAPJW5mPwSzV8qBQQxitiWtTf4FzvO5zx akZJYHOFM8Pa1WTgOEnsVRg1BR0iS5kCf0G0sEP/cb0dy8v5UUSNa1FD0RpiSoP33jF2 Ll+8XabWViH3gzgfpHazpV0gHUF1VwUNcDAZ22suKozHukP1ip75MvPUmwe9DzNANe4X z/Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=T+sIdUCYVl9gdRoUkUG8PgRAt1MU+/JJSzC8cSPoyKI=; b=PXaJvpMvCDrIdhwdJaWrlGADhFoWoygu14MDs+Nn8Df4aSaZlv9sgByBfXYftnLxjP K+d/tFtBAg1LKIbcRKX/3paEfWJaN9yVNA9wpUgzGZ4AmmSCGFUNm6F+zLNbWdygzzKP dlcce/LayZTohwTBHVevBPzCQkNvxK/ebdZqCybJtrAxD1KgAnYK1j22PQ2JDjcclrBv /cdWLYgqCxuxeYabeX/i6lxo3uY8MSAAAP5tb2TKkPsZdFFGn9bd6RRUrYweOUzMhCo7 NiqqxOvxy0K7mouxLx9zFwXTnlak7mpvSuFECIy1vDfwmdAC8dYWl8TFDkQdBZGNoguk aKIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=F4m9knoh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r3si15726844pjd.105.2019.08.06.18.32.28; Tue, 06 Aug 2019 18:32:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=F4m9knoh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727781AbfHGBbv (ORCPT + 99 others); Tue, 6 Aug 2019 21:31:51 -0400 Received: from mail-yb1-f195.google.com ([209.85.219.195]:34317 "EHLO mail-yb1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726340AbfHGBbu (ORCPT ); Tue, 6 Aug 2019 21:31:50 -0400 Received: by mail-yb1-f195.google.com with SMTP id q5so19346094ybp.1 for ; Tue, 06 Aug 2019 18:31:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=T+sIdUCYVl9gdRoUkUG8PgRAt1MU+/JJSzC8cSPoyKI=; b=F4m9knohPlyqe6iRBIqFogCxSMnpxfTnrNWZCR9yxgbB7jxuwk5G49Fr3Yk/Xw8ml9 BZedneP/R5GsmdKW1zaP8a4d6U9JK6r3soeGP9+77jQo83aNdUFu0Pg6auBFzgfb745n qZmIri2k5kirqo1rqRPqFtkeh+UaJ+gxE46qehbsLCBwyMGNAb4LzWNxxchylTugTGzF wLgGzWBtDpvrUKQxeBDO2XcdIgDVq4u0XiNjVcNspdW/kjB7dA7kKn81qOuPuEq5vT9D CCLS3aa+sHxb6m2tFFPS/rslez9LrTny5DfBMNa9fxii55Xz7IiwhaDAn2k/m6Tso2Db 5r3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=T+sIdUCYVl9gdRoUkUG8PgRAt1MU+/JJSzC8cSPoyKI=; b=MuZ1TJ3u3SyhH23aYJG0Z6DpylwC6YwOQ9IwMI0pe98RyF4GdvpNQ7wnM1iXDcj5jp tFHXOQQIxr/OXb+Gqq2RVaUG0xBbvOluzm/UuYAaFKeJyO4Nwauo9Z5a7Sqfo9hveTW2 ORyU1YV6XQSaSJEti+dVGqZJpECqAb7gyJssL6TOvQUP7bRwhsvcJWJwih4W4NkBYqmd mtq+VEIAQm867rmFZLRZzXZWytDHXyCYDnqHyIUjDQH+fAmUQIcX2Eh9zGetmtirlp83 HWPgF/Ggkzc31NC3yJD4pami6gbF0XHHcNitUjK19qnl1dzvUOoLBgSSTP4XAUpvI+CI THhg== X-Gm-Message-State: APjAAAViM6w9z5mGenrTfMdd+ohzvFSizO/XmD1YN1fto5m08gN9+o7D IcQcVRDYZ/08ncYvRiTi3IPf/Q== X-Received: by 2002:a25:5986:: with SMTP id n128mr4697126ybb.301.1565141510026; Tue, 06 Aug 2019 18:31:50 -0700 (PDT) Received: from leoy-ThinkPad-X240s (li1322-146.members.linode.com. [45.79.223.146]) by smtp.gmail.com with ESMTPSA id k20sm20014855ywm.106.2019.08.06.18.31.42 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 06 Aug 2019 18:31:49 -0700 (PDT) Date: Wed, 7 Aug 2019 09:31:39 +0800 From: Leo Yan To: Masami Hiramatsu Cc: Russell King , Oleg Nesterov , Catalin Marinas , Will Deacon , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Arnd Bergmann , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , "Naveen N. Rao" , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, clang-built-linux@googlegroups.com Subject: Re: [PATCH v2 0/3] arm/arm64: Add support for function error injection Message-ID: <20190807013139.GB6724@leoy-ThinkPad-X240s> References: <20190806100015.11256-1-leo.yan@linaro.org> <20190807090811.1e50eb3e1d5a7b85743748e7@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190807090811.1e50eb3e1d5a7b85743748e7@kernel.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 07, 2019 at 09:08:11AM +0900, Masami Hiramatsu wrote: > On Tue, 6 Aug 2019 18:00:12 +0800 > Leo Yan wrote: > > > This small patch set is to add support for function error injection; > > this can be used to eanble more advanced debugging feature, e.g. > > CONFIG_BPF_KPROBE_OVERRIDE. > > > > The patch 01/03 is to consolidate the function definition which can be > > suared cross architectures, patches 02,03/03 are used for enabling > > function error injection on arm64 and arm architecture respectively. > > > > I tested on arm64 platform Juno-r2 and one of my laptop with x86 > > architecture with below steps; I don't test for Arm architecture so > > only pass compilation. > > > > - Enable kernel configuration: > > CONFIG_BPF_KPROBE_OVERRIDE > > CONFIG_BTRFS_FS > > CONFIG_BPF_EVENTS=y > > CONFIG_KPROBES=y > > CONFIG_KPROBE_EVENTS=y > > CONFIG_BPF_KPROBE_OVERRIDE=y > > > > - Build samples/bpf on with Debian rootFS: > > # cd $kernel > > # make headers_install > > # make samples/bpf/ LLC=llc-7 CLANG=clang-7 > > > > - Run the sample tracex7: > > # dd if=/dev/zero of=testfile.img bs=1M seek=1000 count=1 > > # DEVICE=$(losetup --show -f testfile.img) > > # mkfs.btrfs -f $DEVICE > > # ./tracex7 testfile.img > > [ 1975.211781] BTRFS error (device (efault)): open_ctree failed > > mount: /mnt/linux-kernel/linux-cs-dev/samples/bpf/tmpmnt: mount(2) system call failed: Cannot allocate memory. > > > > Changes from v1: > > * Consolidated the function definition into asm-generic header (Will); > > * Used APIs to access pt_regs elements (Will); > > * Fixed typos in the comments (Will). > > This looks good to me. > > Reviewed-by: Masami Hiramatsu > > Thank you! Thanks a lot for reviewing, Masami. Leo.