Description of problem: an7 ck26_rc1内核 Breakpoint overflow signal handler: FAILED! 只在arm内核失败,x86上成功 an8上也是失败 Version-Release number of selected component (if applicable): # cat /etc/os-release NAME="Anolis OS" VERSION="7.7" ID="anolis" ID_LIKE="rhel fedora centos" VERSION_ID="7.7" PRETTY_NAME="Anolis OS 7.7" ANSI_COLOR="0;31" HOME_URL="https://openanolis.cn/" BUG_REPORT_URL="https://bugs.openanolis.cn/" CENTOS_MANTISBT_PROJECT="CentOS-7" CENTOS_MANTISBT_PROJECT_VERSION="7" REDHAT_SUPPORT_PRODUCT="centos" REDHAT_SUPPORT_PRODUCT_VERSION="7" [root@iZ2zebfu2pfe96wy4xb5lrZ ~]# lscpu Architecture: aarch64 Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 NUMA node(s): 1 Model: 1 BogoMIPS: 50.00 NUMA node0 CPU(s): 0-3 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp ssbs How reproducible: # perf test -v 19 19: Breakpoint overflow signal handler : --- start --- test child forked, pid 27422 count1 1, count2 0, count3 2, overflow 1, overflows_2 0 failed: wrong overflow hit failed: wrong overflow_2 hit failed: wrong count for bp2 test child finished with -1 ---- end ---- Breakpoint overflow signal handler: FAILED! Additional info: # rpm -qa|grep glibc glibc-common-2.17-323.1.an7.1.aarch64 glibc-devel-2.17-323.1.an7.1.aarch64 glibc-static-2.17-323.1.an7.1.aarch64 glibc-2.17-323.1.an7.1.aarch64 glibc-headers-2.17-323.1.an7.1.aarch64 [root@iZ2zebfu2pfe96wy4xb5lsZ test2]# gcc --version gcc (GCC) 4.8.5 20150623 (Anolis 4.8.5-44.0.1) Copyright (C) 2015 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. # rpm -qa|grep perf perf-4.19.91-26_rc1.an7.aarch64 gperftools-libs-2.6.1-1.an7.aarch64 python-perf-4.19.91-26_rc1.an7.aarch64
看起来是个历史问题 https://yhbt.net/lore/all/5677F6E3.9050902@huawei.com/t/ upstream 似乎也没解决。 请@baolin 确认一下。
这个问题由 ARM BreakPoint 硬件设计引起,社区就这个问题有过两次讨论 https://lkml.org/lkml/2018/11/15/205 https://lkml.org/lkml/2015/12/23/477 其中提到的解决方案未能进入主线,邮件中 maintainer 不建议在 arm64 hw_breakpoint 代码中做修改。 最终社区暂时略过了这个 test。 https://lore.kernel.org/all/20191229162518.590431950@linuxfoundation.org/
1127 和这个是同一个问题,补丁已合入 ANCK。
问题单关闭