Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2064702imm; Thu, 24 May 2018 05:18:03 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrNcrM9gZO/AqYW8KegmPaiO/GWa31dcW6pGo92bm4Lws97C/vzDGJ713SuW8nDP9dbwakf X-Received: by 2002:a63:a513:: with SMTP id n19-v6mr862338pgf.381.1527164283914; Thu, 24 May 2018 05:18:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527164283; cv=none; d=google.com; s=arc-20160816; b=G/6ryyTaJfZFQj4TNu89MVr6p2+BGwYpgOz705RTIaiNAeBL0QAMcYinhniZfaupos VIxnlxzeYy/g/0rJcHEWq0Co/EPld94tKFrz1aaBGg4QHTktjpG7haRiUROqogz/kIOZ ZWluuRiR5ODp5mcav3pjc4mwDl6ONmde4VMoOpGNDTEkjr/TD9bLkYCuHoKdbYXF62oK ko9qObOqxHiMd7HZZR63Glhd0fYd+NbaEA5ApcKwLG9kfynXHRvYxHnNcwP1KMPdQjD9 oGxTHJ2SUs6i2iJVU72VurKNn4+DkF7mD4nCafMuzh+qv7nc8cVFtRJfgQvxKvn2wH2R ReCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=k7s+RbclZLNgePGqjeOry5yRXD9D2OXnSPtpPVar8O0=; b=aYQeXjSHJAmVXdLBXnGJR5woQ/goO7nh50wgJYdtE5okp7lN5USYlwqW1hzspLPfHi aBIiepKJuqoNc215tN6XjnmHlGeGJKTxq5r8FQAzLfxKv5JVxNNp9V1d/EL3aggrLb6s 0Q4QQyrBx0cOEI2b6v0PTmWYHPVgvQ7MjBoo1wjG4bYQktRMed58XSOMqCXFVLQyoe6y 6zCTEqm4UaVSy2eRCvDemVBPN4LQKQfCuzwuliHK888WVtX4HXWNmSNZGFWfLAK4o8w6 ryIfLFKYDB+qD8xuzYVctw+DErcUbpji1uoTbCRky24yk8bzilFIoeSm0bQ9VAn25Boo dj8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vwRRh0dy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f19-v6si20388430plr.13.2018.05.24.05.17.49; Thu, 24 May 2018 05:18:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vwRRh0dy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966262AbeEXJl6 (ORCPT + 99 others); Thu, 24 May 2018 05:41:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:53606 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966216AbeEXJlu (ORCPT ); Thu, 24 May 2018 05:41:50 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9A71A20896; Thu, 24 May 2018 09:41:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527154910; bh=Lawy+EDs0Z4eBqmn5EbWNwF36rvUYCSeU70Qil/yNyU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vwRRh0dy5uepauY54guIUd0bbkkkDdDgdcBpHwzRQTThETlpD06pQ5gP74qwbBSdN Z2Yv9UCMV9WtRAbSp3eHpcwFDSQKliPrV5rfTi35IQsaCCLfXLPxcyPm8UJJmkbdna X/DKJX+ufkZvgdBT/gTnbRf18bvcwOaYgleq4Iqs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juergen Gross , "Steven Rostedt (VMware)" Subject: [PATCH 3.18 32/45] tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} Date: Thu, 24 May 2018 11:38:40 +0200 Message-Id: <20180524093124.653225826@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180524093120.599252450@linuxfoundation.org> References: <20180524093120.599252450@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Steven Rostedt (VMware) commit 45dd9b0666a162f8e4be76096716670cf1741f0e upstream. Doing an audit of trace events, I discovered two trace events in the xen subsystem that use a hack to create zero data size trace events. This is not what trace events are for. Trace events add memory footprint overhead, and if all you need to do is see if a function is hit or not, simply make that function noinline and use function tracer filtering. Worse yet, the hack used was: __array(char, x, 0) Which creates a static string of zero in length. There's assumptions about such constructs in ftrace that this is a dynamic string that is nul terminated. This is not the case with these tracepoints and can cause problems in various parts of ftrace. Nuke the trace events! Link: http://lkml.kernel.org/r/20180509144605.5a220327@gandalf.local.home Cc: stable@vger.kernel.org Fixes: 95a7d76897c1e ("xen/mmu: Use Xen specific TLB flush instead of the generic one.") Reviewed-by: Juergen Gross Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/mmu.c | 4 ---- include/trace/events/xen.h | 16 ---------------- 2 files changed, 20 deletions(-) --- a/arch/x86/xen/mmu.c +++ b/arch/x86/xen/mmu.c @@ -1246,8 +1246,6 @@ void xen_flush_tlb_all(void) struct mmuext_op *op; struct multicall_space mcs; - trace_xen_mmu_flush_tlb_all(0); - preempt_disable(); mcs = xen_mc_entry(sizeof(*op)); @@ -1265,8 +1263,6 @@ static void xen_flush_tlb(void) struct mmuext_op *op; struct multicall_space mcs; - trace_xen_mmu_flush_tlb(0); - preempt_disable(); mcs = xen_mc_entry(sizeof(*op)); --- a/include/trace/events/xen.h +++ b/include/trace/events/xen.h @@ -377,22 +377,6 @@ DECLARE_EVENT_CLASS(xen_mmu_pgd, DEFINE_XEN_MMU_PGD_EVENT(xen_mmu_pgd_pin); DEFINE_XEN_MMU_PGD_EVENT(xen_mmu_pgd_unpin); -TRACE_EVENT(xen_mmu_flush_tlb_all, - TP_PROTO(int x), - TP_ARGS(x), - TP_STRUCT__entry(__array(char, x, 0)), - TP_fast_assign((void)x), - TP_printk("%s", "") - ); - -TRACE_EVENT(xen_mmu_flush_tlb, - TP_PROTO(int x), - TP_ARGS(x), - TP_STRUCT__entry(__array(char, x, 0)), - TP_fast_assign((void)x), - TP_printk("%s", "") - ); - TRACE_EVENT(xen_mmu_flush_tlb_single, TP_PROTO(unsigned long addr), TP_ARGS(addr),