Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp177941ybt; Thu, 18 Jun 2020 22:17:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwrrOs3S4MiL83cKXYWFji3NbI5HNG9TCojJKri33jBLSiUwFVWUvwqxS0UPFj+fS4eRWrr X-Received: by 2002:a05:6402:3078:: with SMTP id bs24mr1530954edb.284.1592543845870; Thu, 18 Jun 2020 22:17:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592543845; cv=none; d=google.com; s=arc-20160816; b=QZGTl3DgH0z35ObTxmWXwRn1jlOvN/TY1002cN5B5MnNuMeDsFpgv86jYtKIfIKxOI QLwSwt5A5lShoOJX7v2j4XH+CaXqh9s9SCSBo+rX/tec0HzPGTF9gHiFbTQH61Bd/JGZ wPB0MYpRc3X0ijazTAhfBHddECyEgju8jJL8GJgrzlmESthRID7CdqzJfandf4MaGGmS 1l46rVEVW1+fMS1XA2rRutZW5LYTvMP/mQYJ1IKnOhKLIXWUmMMemJK1zejiTwQ0K9cq 2YCj8zqgCyUMJ5vYwoXRLkiTOUzewWm92IIg1M2Eh2c5KutuUsT12f8mZuuMVab7XDUu h19w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=qym/uq+4eK/eMnVKWRK6O4mDa77FyX49g8y5xf+Ehtk=; b=FjKSReDPw/og6tOW2scmRkNqXunVa0Bh7AY1I2G0eBUTBdp3NrXcgLg7r6BQsoM1NM To0A/BrFK15eCwtIczrDqieaCha+r3k0W2G0LXocENwrJ/jmagtGqN5nIgdhySA2NHV7 mggm7/yEP61SCdCz+dsmEBBVMFx/nL/OoFaYEzm9M9HOoIoruPzX4Eu5pfVKasic++3z 0T7KPc2VA+fHiC4LAcU3qtW7skHODbZZNbVkMJRiTAu79UXw+HRWcnefPodWdZR7V8gN eLMKMcA6YjCBt/a6RdCwERkDE+DquOE+syehhuukjSOhExL7pcqJFDA1CJVtNV4d3oJt dxFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VuVvV1Pw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kt18si3286186ejb.511.2020.06.18.22.17.03; Thu, 18 Jun 2020 22:17:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VuVvV1Pw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726899AbgFSFMo (ORCPT + 99 others); Fri, 19 Jun 2020 01:12:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:34602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725290AbgFSFMo (ORCPT ); Fri, 19 Jun 2020 01:12:44 -0400 Received: from devnote2 (NE2965lan1.rev.em-net.ne.jp [210.141.244.193]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 70B6220DD4; Fri, 19 Jun 2020 05:12:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592543563; bh=QVNKMxbWIq7XLlJL0MehvoZpWnGUrjeyAMPYeky8naw=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=VuVvV1PwGfdS/HmHbWPB7AaJArIGuSwK7Yc/SY8XbGrN4ySR+wz5E2X7S6oRJ0DKG I6bIFGmWkcTFP7fILQMnVErGDXxxzv/apW+74iCdIKfEBvXqcpuJD2owishBl8F8zx fFWH4SEDTqUMTNi9uGSFXIQ+mMh7EmcxuL7evQDo= Date: Fri, 19 Jun 2020 14:12:39 +0900 From: Masami Hiramatsu To: Ming Lei Cc: Ming Lei , "Naveen N. Rao" , Anil S Keshavamurthy , Linux Kernel Mailing List , "David S. Miller" , Steven Rostedt , linux-block Subject: Re: kprobe: __blkdev_put probe is missed Message-Id: <20200619141239.56f6dda0976453b790190ff7@kernel.org> In-Reply-To: <20200618231901.GA196099@T590> References: <20200618125438.GA191266@T590> <20200618225602.3f2cca3f0ed48427fc0a483b@kernel.org> <20200618231901.GA196099@T590> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ming, On Fri, 19 Jun 2020 07:19:01 +0800 Ming Lei wrote: > > I'm using 5.4 on ubuntu and can not reproduce it with kprobe_event. > > > > root@devnote2:/sys/kernel/tracing# uname -a > > Linux devnote2 5.4.0-37-generic #41-Ubuntu SMP Wed Jun 3 18:57:02 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux > > root@devnote2:/sys/kernel/tracing# echo p __blkdev_put > kprobe_events > > root@devnote2:/sys/kernel/tracing# echo 1 > events/kprobes/p___blkdev_put_0/enable > > root@devnote2:/sys/kernel/tracing# cat trace > > # tracer: nop > > # > > # entries-in-buffer/entries-written: 0/0 #P:8 > > # > > # _-----=> irqs-off > > # / _----=> need-resched > > # | / _---=> hardirq/softirq > > # || / _--=> preempt-depth > > # ||| / delay > > # TASK-PID CPU# |||| TIMESTAMP FUNCTION > > # | | | |||| | | > > root@devnote2:/sys/kernel/tracing# blockdev --getbsz /dev/nvme0n1 > > 4096 > > root@devnote2:/sys/kernel/tracing# cat trace > > # tracer: nop > > # > > # entries-in-buffer/entries-written: 1/1 #P:8 > > # > > # _-----=> irqs-off > > # / _----=> need-resched > > # | / _---=> hardirq/softirq > > # || / _--=> preempt-depth > > # ||| / delay > > # TASK-PID CPU# |||| TIMESTAMP FUNCTION > > # | | | |||| | | > > <...>-111740 [002] .... 301734.476991: p___blkdev_put_0: (__blkdev_put+0x0/0x1e0) > > > > Hmm, maybe some issue in the latest kernel...? > > Hello Masami, > > I am testing the latest upstream kernel, your trace actually reproduces > this issue. OK. > > After 'blockdev --getbsz /dev/nvme0n1' returns, __blkdev_put() should > have been called two times(one for partition, and the other for disk), > however kprobe trace just shows one time of calling this function. > > If trace_printk() is added at the entry of __blkdev_put() manually, > you will see that __blkdev_put() is called two times in 'blockdev > --getbsz /dev/nvme0n1'. OK, let me check again on the latest kernel. Here I tested with qemu. root@devnote2:/sys/kernel/debug/tracing# uname -a Linux devnote2 5.8.0-rc1+ #26 SMP PREEMPT Fri Jun 19 12:12:53 JST 2020 x86_64 x86_64 x86_64 GNU/Linux And we have a (virtual) sda with 1 partition. root@devnote2:/sys/kernel/debug/tracing# cat /proc/partitions major minor #blocks name 8 0 10240 sda 8 1 9216 sda1 OK, then let's make events (for sure) root@devnote2:/sys/kernel/debug/tracing# echo p __blkdev_put >> kprobe_events root@devnote2:/sys/kernel/debug/tracing# echo r __blkdev_put >> kprobe_events root@devnote2:/sys/kernel/debug/tracing# echo p blkdev_put >> kprobe_events There are 3 events in the kernel, blkdev_put() and __blkdev_put() and the return of __blkdev_put(). Then enable it and access to */dev/sda* (a disk) root@devnote2:/sys/kernel/debug/tracing# echo 1 > events/kprobes/enable root@devnote2:/sys/kernel/debug/tracing# blockdev --getbsz /dev/sda 4096 root@devnote2:/sys/kernel/debug/tracing# echo 0 > events/kprobes/enable root@devnote2:/sys/kernel/debug/tracing# cat trace # tracer: nop # # entries-in-buffer/entries-written: 3/3 #P:8 # # _-----=> irqs-off # / _----=> need-resched # | / _---=> hardirq/softirq # || / _--=> preempt-depth # ||| / delay # TASK-PID CPU# |||| TIMESTAMP FUNCTION # | | | |||| | | blockdev-185 [002] ...1 72.604266: p_blkdev_put_0: (blkdev_put+0x0/0x130) blockdev-185 [002] ...1 72.604276: p___blkdev_put_0: (__blkdev_put+0x0/0x220) blockdev-185 [002] d..2 72.604288: r___blkdev_put_0: (blkdev_put+0x50/0x130 <- __blkdev_put) So the __blkdev_put() is called once from blkdev_put(). Next, we do same trace with accessing */dev/sda1* (a partition). root@devnote2:/sys/kernel/debug/tracing# echo > trace root@devnote2:/sys/kernel/debug/tracing# echo 1 > events/kprobes/enable root@devnote2:/sys/kernel/debug/tracing# blockdev --getbsz /dev/sda1 4096 root@devnote2:/sys/kernel/debug/tracing# echo 0 > events/kprobes/enable root@devnote2:/sys/kernel/debug/tracing# cat trace # tracer: nop # # entries-in-buffer/entries-written: 5/5 #P:8 # # _-----=> irqs-off # / _----=> need-resched # | / _---=> hardirq/softirq # || / _--=> preempt-depth # ||| / delay # TASK-PID CPU# |||| TIMESTAMP FUNCTION # | | | |||| | | blockdev-191 [005] ...1 194.401517: p_blkdev_put_0: (blkdev_put+0x0/0x130) blockdev-191 [005] ...1 194.401527: p___blkdev_put_0: (__blkdev_put+0x0/0x220) blockdev-191 [005] ...1 194.401529: p___blkdev_put_0: (__blkdev_put+0x0/0x220) blockdev-191 [005] d..2 194.401535: r___blkdev_put_0: (__blkdev_put+0x1ea/0x220 <- __blkdev_put) blockdev-191 [005] d..2 194.401536: r___blkdev_put_0: (blkdev_put+0x50/0x130 <- __blkdev_put) In this case, we can see the __blkdev_put() is called twice, from blkdev_put() and __blkdev_put() itself (nested call). So, it seems that the kprobe event correctly works. Could you do same thing on your environment, and share the result? Thank you, -- Masami Hiramatsu