From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 58462 invoked by alias); 13 Jun 2016 16:15:56 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 58120 invoked by uid 89); 13 Jun 2016 16:15:53 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-3.3 required=5.0 tests=BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS autolearn=ham version=3.3.2 spammy=grace, Seems, Hardware, Scheduler X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Mon, 13 Jun 2016 16:15:38 +0000 Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E8ACB8553F; Mon, 13 Jun 2016 16:15:36 +0000 (UTC) Received: from [10.13.129.159] (dhcp129-159.rdu.redhat.com [10.13.129.159]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id u5DGFage021666; Mon, 13 Jun 2016 12:15:36 -0400 Subject: Re: exercising current aarch64 kprobe support with systemtap To: systemtap@sourceware.org, Dave Long , Pratyush Anand , Mark Brown References: <73cc2f02-691c-4f96-433f-4d3d0def8b50@redhat.com> From: William Cohen Message-ID: <7f507ccb-28ae-83f2-d5c1-4f286b3cf452@redhat.com> Date: Mon, 13 Jun 2016 16:15:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.1.1 MIME-Version: 1.0 In-Reply-To: <73cc2f02-691c-4f96-433f-4d3d0def8b50@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2016-q2/txt/msg00222.txt.bz2 On 06/13/2016 12:10 PM, William Cohen wrote: > I dummied up the hw_addr_*.stp tests to not run. The test made it further, but then got stuck spewing out: > > [ 1648.037580] Unexpected kernel single-step exception at EL1 > [ 1648.043060] Unexpected kernel single-step exception at EL1 > [ 1648.048540] Unexpected kernel single-step exception at EL1 I was able to get the start of when it starting spewning the single-step exception at EL1: [root@amd-seattle-03 systemtap]# [ 793.930801] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enabled or kernel.sched_schedstats=1 [ 793.965896] hrtimer: interrupt took 422795 ns [ 887.063206] ------------[ cut here ]------------ [ 887.067856] WARNING: CPU: 1 PID: 21315 at mm/page_counter.c:26 page_counter_cancel+0x5c/0x68 [ 887.076288] Modules linked in: stap_e307cc4760ef17e67f4e7cdd288c9472_1_21004(OE) vfat fat amd_xgbe i2c_designware_platform ipmi_si ptp i2c_designware_core i2c_core spi_pl022 sbsa_gwdt ccp ipmi_msghandler pps_core crc32_arm64 ghash_ce nfsd auth_rpcgss nfs_acl lockd grace sunrpc xfs libcrc32c [last unloaded: stap_d8856f77dba73cfbeacac8b8ae0b9f60__20838] [ 887.107716] [ 887.109202] CPU: 1 PID: 21315 Comm: echo Tainted: G W IOE 4.7.0-rc1panand+ #5 [ 887.117123] Hardware name: AMD Overdrive/Supercharger/Default string, BIOS ROD1001A 02/09/2016 [ 887.125738] Unexpected kernel single-step exception at EL1 [ 887.131241] Unexpected kernel single-step exception at EL1 -Will > > > This happens during the "systemtap.onthefly/kprobes_onthefly.exp" tests and can be reliably triggered running that portion of the systemtap tests with: > > make installcheck RUNTESTFLAGS="--debug systemtap.onthefly/kprobes_onthefly.exp" > > > Seems like the tests get past the following and then start spewing the error message: > > Executing: kill -KILL 22311 > kill: kill: sending signal to 22311 failed: No such process > PASS: kprobes_onthefly - otf_stress_hard_iter_2000 (survived) > > However the testsuite doesn't seem to make it through to print out the next test: > > PASS: hrtimer_onthefly - otf_stress_max_iter_5000 (survived) > > Note that this kernel (clone of https://github.com/pratyushanand/linux on test_upstream_arm64_devel branch) does have the patch to avoid having the atomic region search go before the start of a function by look for the "stp x29, x30, [sp, -#xx]!" > > -Will >