From patchwork Tue Jul 16 11:12:59 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Leo Yan X-Patchwork-Id: 169051 Delivered-To: patch@linaro.org Received: by 2002:a92:4782:0:0:0:0:0 with SMTP id e2csp703137ilk; Tue, 16 Jul 2019 04:13:22 -0700 (PDT) X-Google-Smtp-Source: APXvYqy9+Vu0ijo8G79sc6EpeW1fjWgaJ72rCx8OFIbCRge9nxWO9An4qxBW6MJkHTd0hdzVEH1+ X-Received: by 2002:a63:1046:: with SMTP id 6mr33735514pgq.111.1563275602298; Tue, 16 Jul 2019 04:13:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563275602; cv=none; d=google.com; s=arc-20160816; b=RNP2iOoI9NL3fqG/uhWx72nux1AMp4Q5c+5XRw85EQkzPxWeEYJhox6YyCzsYP9SvC d9JffA2Kz6C5LeIkFIsaZuWRyMoZDxsGpVWnKWqLImDh33kC6VlWycNuU3CjuSzqEUQO B23+4JOoSROObK2uBkZczBRnbpjqyINyt9z0lbNjpL/HN79ngA6SyzVc98vxM6hJMDtM L98T+SpGx99MVcYj+M485xKitOqCQEHmkQc8kqkpzl/Y/mANsFfjH2QyZ4hIFgf0ZM4j BR7d4Mx2UFXJtBvZ6UNfx/VuxeuQXgGtJic+MtNjVUxCaC27pP6ShdozNgqmy6nSaDdu nGig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=l8lUDijBiyY5cnjhjm2bVu88mH5lRLrGchTwxKmKfRM=; b=OISBBHFnd4QsNpAYmy/irgUlCC7OmGGcw/i38w45jJF+GB83Z3v6tpvAJmI6Mc96xg N5N64/j3AIFFEX/5/gPEiUoaEq8lA54hCkrNsEUqGKeDdOSpTZQ7D4eJz0ipK8Fq+IpP 46NXV5KJtixDLdIlk1Hg0wTq7jxkmHCcG21heS+/2gs4oUyLlqjZbm7fL5p9m/7IBuJM Qtp0g4ky1mX8SinyI/nY2yAX74p9igx9Zv2mueqrS6TvqxhSZAJBN28m5xhYHifUp5T/ 47I4A8hrBQf1WueSUPn2eP7LjG+V8saTafkXhjJ/RzyeACvw0SHFTXWCOv5lk19z3BB+ QTkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=n+WcafFy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s9si18318083plr.146.2019.07.16.04.13.21; Tue, 16 Jul 2019 04:13:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=n+WcafFy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387603AbfGPLNU (ORCPT + 29 others); Tue, 16 Jul 2019 07:13:20 -0400 Received: from mail-pf1-f196.google.com ([209.85.210.196]:33965 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387539AbfGPLNU (ORCPT ); Tue, 16 Jul 2019 07:13:20 -0400 Received: by mail-pf1-f196.google.com with SMTP id b13so8961990pfo.1 for ; Tue, 16 Jul 2019 04:13:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=l8lUDijBiyY5cnjhjm2bVu88mH5lRLrGchTwxKmKfRM=; b=n+WcafFy/24JXY2LfhO+hw1ngbjN1W/bcJu99Sy2jNXlHMVIp+hq+Kw0Z8D3nCpVu3 p615sFT47ypPa/pyRofK9aC5YX4c9pUMTqeia6e2T3YfaHhYc+/Qt/zfpomkHJCaqUIs Wa3K+jFwzvvLdB4h0f0p454uZScZX3rew/arPvBW6/L4VybGE25GvXdNvixCxHe4AZIL b0bAxU83fAlmu7KERFHiUOtHyA3bG7H+ByV4pFA9tuojhnFXGGBzvpkK7kPhO+KCbAEm 5fcmvjoiCZmwESd8VfOcMHf0txSN7uCQOGKcgWmHgCdDKMFNNj5ed8K2ZlMvVyPzifGd Fkbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=l8lUDijBiyY5cnjhjm2bVu88mH5lRLrGchTwxKmKfRM=; b=kH7ZXs7oJKlcqppe9RumUc6iUuogNb66gdC+Cxel/+HFZviN0UjhUfcRVRUx0NsFIU drojEvkUY4Rbz3Pfwo69ySe8xi/OEgydRc3DKB6k/NE/pEZ2P8IdsQ2wQNeIgwYlAeXk vcg0l1y+hYF753b5I9+5KypSUSpg29BJcS77g1EMz9QPsV2NNI/c+QXlUuTR2GO5JG/H gLBlFflzqvjXjdOKoRtw1mN2cNd/iqX35jioE7IA4SPIle5ou9s83Zfb/+3a4uoptqqI FcG9wfG6z4/MqKrrLRX640BZR4fJQXALWa9Q33ZNWhB9iXt25uNbHEWkO2+zlpaUrrHh vPhg== X-Gm-Message-State: APjAAAWTLcRxiqThnz8bkXLqjJD5TRCtAt6jVrk4yzK6yJQikGmPpHYL RYY20UQDzhp/0k685tepSqtltQ== X-Received: by 2002:a63:e356:: with SMTP id o22mr32978109pgj.150.1563275599407; Tue, 16 Jul 2019 04:13:19 -0700 (PDT) Received: from localhost.localdomain (li1433-81.members.linode.com. [45.33.106.81]) by smtp.gmail.com with ESMTPSA id 21sm19324907pjh.25.2019.07.16.04.13.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 16 Jul 2019 04:13:18 -0700 (PDT) From: Leo Yan To: Russell King , Oleg Nesterov , Catalin Marinas , Will Deacon , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Arnd Bergmann , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, Masami Hiramatsu , Justin He Cc: Leo Yan Subject: [PATCH 0/2] arm/arm64: Add support for function error injection Date: Tue, 16 Jul 2019 19:12:59 +0800 Message-Id: <20190716111301.1855-1-leo.yan@linaro.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This small patch set is to add support for function error injection; this can be used to eanble more advanced debugging feature, e.g. CONFIG_BPF_KPROBE_OVERRIDE. I only tested the first patch on arm64 platform Juno-r2 with below steps; the second patch is for arm arch, but I absent the platform for the testing so only pass compilation. - Enable kernel configuration: CONFIG_BPF_KPROBE_OVERRIDE CONFIG_BTRFS_FS CONFIG_BPF_EVENTS=y CONFIG_KPROBES=y CONFIG_KPROBE_EVENTS=y CONFIG_BPF_KPROBE_OVERRIDE=y - Build samples/bpf on Juno-r2 board with Debian rootFS: # cd $kernel # make headers_install # make samples/bpf/ LLC=llc-7 CLANG=clang-7 - Run the sample tracex7: # ./tracex7 /dev/sdb1 [ 1975.211781] BTRFS error (device (efault)): open_ctree failed mount: /mnt/linux-kernel/linux-cs-dev/samples/bpf/tmpmnt: mount(2) system call failed: Cannot allocate memory. Leo Yan (2): arm64: Add support for function error injection arm: Add support for function error injection arch/arm/Kconfig | 1 + arch/arm/include/asm/error-injection.h | 13 +++++++++++++ arch/arm/include/asm/ptrace.h | 5 +++++ arch/arm/lib/Makefile | 2 ++ arch/arm/lib/error-inject.c | 19 +++++++++++++++++++ arch/arm64/Kconfig | 1 + arch/arm64/include/asm/error-injection.h | 13 +++++++++++++ arch/arm64/include/asm/ptrace.h | 5 +++++ arch/arm64/lib/Makefile | 2 ++ arch/arm64/lib/error-inject.c | 19 +++++++++++++++++++ 10 files changed, 80 insertions(+) create mode 100644 arch/arm/include/asm/error-injection.h create mode 100644 arch/arm/lib/error-inject.c create mode 100644 arch/arm64/include/asm/error-injection.h create mode 100644 arch/arm64/lib/error-inject.c -- 2.17.1 Reviewed-by: Masami Hiramatsu