From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 875AFC00140 for ; Fri, 5 Aug 2022 22:26:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241320AbiHEWZ7 (ORCPT ); Fri, 5 Aug 2022 18:25:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40020 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237744AbiHEWZ5 (ORCPT ); Fri, 5 Aug 2022 18:25:57 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2FBC1705E for ; Fri, 5 Aug 2022 15:25:55 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5F05260DDE for ; Fri, 5 Aug 2022 22:25:55 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EC4F9C433D6; Fri, 5 Aug 2022 22:25:53 +0000 (UTC) Date: Fri, 5 Aug 2022 18:25:52 -0400 From: Steven Rostedt To: Ivan Babrou Cc: Daniel Dao , kernel-team , Ingo Molnar , linux-kernel , Masami Hiramatsu Subject: Re: 5.15 ftrace bug when enabling function_graph Message-ID: <20220805182552.742c4162@gandalf.local.home> In-Reply-To: References: <20220223115457.7bb575c1@gandalf.local.home> <20220805145333.1360dbbb@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 5 Aug 2022 13:14:47 -0700 Ivan Babrou wrote: > On Fri, Aug 5, 2022 at 11:53 AM Steven Rostedt wrote: > > > > On Fri, 5 Aug 2022 11:37:56 -0700 > > Ivan Babrou wrote: > > > > > root@foo:~# echo 'bpf_dispatcher_*_func' > > > > /sys/kernel/tracing/set_ftrace_notrace > > > > > > root@foo:~# trace-cmd record -p function_graph -l handle_mm_fault -P 3367417 > > > plugin 'function_graph' > > > Hit Ctrl^C to stop recording > > > > > > > [1459709.204253] ------------[ ftrace bug ]------------ > > > [1459709.204257] ftrace failed to modify > > > [1459709.204262] [] bpf_dispatcher_xdp_func+0x0/0x10 > > > [1459709.204275] actual: ffffffe9:ffffff9b:76:ffffffb0:14 > > > [1459709.204302] Setting ftrace call site to call ftrace function > > > [1459709.204305] ftrace record flags: 10000001 > > > [1459709.204309] (1) > > > expected tramp: ffffffffabc4bcb0 > > > [1459709.204325] ------------[ cut here ]------------ > > > > Did you reboot since the error happened? Because the command you showed > > should not have touched bpf_dispatcher_xdp_func. > > I did reboot, but I can reproduce if you have things for me to try. Let's see if this works manually. Reboot again. Make sure the above "ftrace bug" is not there. If not already mounted, as root: # mount -t tracefs tracefs /sys/krenel/tracing # cd /sys/kernel/tracing # cat enabled_functions Let me know what is there. # echo handle_mm_fault > set_ftrace_filter # cat set_ftrace_filter to make sure that handle_mm_fault is listed. # echo function_graph > current_tracer If it fails again, let me know. It should not, but if it does, it needs to be investigated. Oh, and what exactly is this kernel version. The backtrace you posted shows: 5.15.19-cloudflare-2022.2.1 If you can not reproduce this on a vanilla 5.15.19 kernel, then it may be a bad backport of some patch. -- Steve