From: Namhyung Kim <namhyung@kernel.org>
To: Steven Rostedt <rostedt@goodmis.org>
Cc: Arnaldo Carvalho de Melo <acme@kernel.org>,
Ian Rogers <irogers@google.com>,
James Clark <james.clark@linaro.org>,
Jiri Olsa <jolsa@kernel.org>,
Adrian Hunter <adrian.hunter@intel.com>,
Peter Zijlstra <peterz@infradead.org>,
Ingo Molnar <mingo@kernel.org>,
LKML <linux-kernel@vger.kernel.org>,
linux-perf-users@vger.kernel.org,
Thomas Richter <tmricht@linux.ibm.com>,
Howard Chu <howardchu95@gmail.com>
Subject: Re: [PATCH] perf trace: Skip internal syscall arguments
Date: Sat, 29 Nov 2025 11:07:20 -0800 [thread overview]
Message-ID: <aStEaM9tcGlRclQ4@google.com> (raw)
In-Reply-To: <20251127203052.12a6a163@robin>
On Thu, Nov 27, 2025 at 08:30:52PM -0500, Steven Rostedt wrote:
> On Wed, 26 Nov 2025 20:44:18 -0800
> Namhyung Kim <namhyung@kernel.org> wrote:
>
> > Recent changes in the linux-next kernel will add new field for syscalls
> > to have contents in the userspace like below.
> >
> > # cat /sys/kernel/tracing/events/syscalls/sys_enter_write/format
> > name: sys_enter_write
> > ID: 758
> > format:
> > field:unsigned short common_type; offset:0; size:2; signed:0;
> > field:unsigned char common_flags; offset:2; size:1; signed:0;
> > field:unsigned char common_preempt_count; offset:3; size:1; signed:0;
> > field:int common_pid; offset:4; size:4; signed:1;
> >
> > field:int __syscall_nr; offset:8; size:4; signed:1;
> > field:unsigned int fd; offset:16; size:8; signed:0;
> > field:const char * buf; offset:24; size:8; signed:0;
> > field:size_t count; offset:32; size:8; signed:0;
> > field:__data_loc char[] __buf_val; offset:40; size:4; signed:0;
> >
> > print fmt: "fd: 0x%08lx, buf: 0x%08lx (%s), count: 0x%08lx", ((unsigned long)(REC->fd)),
> > ((unsigned long)(REC->buf)), __print_dynamic_array(__buf_val, 1),
> > ((unsigned long)(REC->count))
> >
> > We have a different way to handle those arguments and this change
> > confuses perf trace then make some tests failing. Fix it by skipping
> > the new fields that have "__data_loc char[]" type.
> >
> > Maybe we can switch to this instead of the BPF augmentation later.
> >
>
> Even with this patch applied, I still have a segfault with this command:
>
> # ./perf trace -e syscalls:sys_enter_write
What about this?
# ./perf trace -e write
Thanks,
Namhyung
> 0.000 sshd-session/5421 syscalls:sys_enter_write(perf: Segmentation fault
> #0 0x560ea815187a in dump_stack debug.c:366
> #1 0x560ea81518f0 in sighandler_dump_stack debug.c:378
> #2 0x7fb5e14d1df0 in __restore_rt libc_sigaction.c:0
> #3 0x560ea7fc0cec in syscall_arg__scnprintf_buf builtin-trace.c:1857
> #4 0x560ea7fc2692 in syscall_arg_fmt__scnprintf_val builtin-trace.c:2398
> #5 0x560ea7fc2aad in syscall__scnprintf_args builtin-trace.c:2476
> #6 0x560ea7fc3ea2 in trace__fprintf_sys_enter builtin-trace.c:2885
> #7 0x560ea7fc57a5 in trace__event_handler builtin-trace.c:3312
> #8 0x560ea7fc68dd in trace__handle_event builtin-trace.c:3649
> #9 0x560ea7fc7f7a in __trace__deliver_event builtin-trace.c:4183
> #10 0x560ea7fc80cc in trace__deliver_event builtin-trace.c:4209
> #11 0x560ea7fc92b7 in trace__run builtin-trace.c:4577
> #12 0x560ea7fcd648 in cmd_trace builtin-trace.c:5773
> #13 0x560ea7fd35e3 in run_builtin perf.c:349
> #14 0x560ea7fd387b in handle_internal_command perf.c:401
> #15 0x560ea7fd39d4 in run_argv perf.c:448
> #16 0x560ea7fd3d1d in main perf.c:555
> #17 0x7fb5e14bbca8 in __libc_start_call_main libc_start_call_main.h:74
> #18 0x7fb5e14bbd65 in __libc_start_main@@GLIBC_2.34 libc-start.c:128
> #19 0x560ea7f25f41 in _start perf[53f41]
> Segmentation fault
>
> This doesn't crash in a kernel without the __data_loc.
>
> -- Steve
next prev parent reply other threads:[~2025-11-29 19:07 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-27 4:44 [PATCH] perf trace: Skip internal syscall arguments Namhyung Kim
2025-11-27 7:10 ` Thomas Richter
2025-11-27 19:47 ` Howard Chu
2025-11-28 1:30 ` Steven Rostedt
2025-11-29 19:07 ` Namhyung Kim [this message]
2025-11-29 19:42 ` Steven Rostedt
2025-11-29 20:23 ` Namhyung Kim
2025-12-02 4:09 ` Namhyung Kim
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aStEaM9tcGlRclQ4@google.com \
--to=namhyung@kernel.org \
--cc=acme@kernel.org \
--cc=adrian.hunter@intel.com \
--cc=howardchu95@gmail.com \
--cc=irogers@google.com \
--cc=james.clark@linaro.org \
--cc=jolsa@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-perf-users@vger.kernel.org \
--cc=mingo@kernel.org \
--cc=peterz@infradead.org \
--cc=rostedt@goodmis.org \
--cc=tmricht@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).