Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3705464pxk; Tue, 29 Sep 2020 04:18:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzqKe4xqovBMozn0atkTilRfUr97NtPWibmnhMMpW3g3i/Ru0iIPO9+T3AYOa3YFdNfYwmj X-Received: by 2002:a05:6402:17b5:: with SMTP id j21mr2568028edy.276.1601378312754; Tue, 29 Sep 2020 04:18:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601378312; cv=none; d=google.com; s=arc-20160816; b=mh2sbu8vEYVRQA6sU6LvqyqD8VfxHz8TnWCDMH1k+RmPz4aYOjPwlpt5DOvfcWhhdC UWWYwGuVycBd3Y38CzvQRyyUdmQrjl/16ti13SeYTdF0fPiOxkFvZJyWsFUBWw/UeWn+ wtReK68O4ZYjXar1fLxwAZTPTFeAXxCrcpJJG/KUayzB29M1TO9DF5Gq5uzLNdoL+aXZ c8k9DPpfg9j7Mw+6vxteT9WiqbtvkMbDFlebYVp/dBms5g7i55LKEevBRpGrtqO1ckfo JO6im2FJzC2ueBeJtwFXruwxJFPZEpEflYY4SEggXP4ug+ZoRRRFkP9yVRMcgfDzcate Eh6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dH0OS9e2j1+eb4fvHaDHI0xIjb9n11TYDx1Gch9Q3g8=; b=mjK54G2zdrRq+97x4DEfUvtInglIsMbSSyaWmlhGyKHa+Er9Ds5ho1tdB0bZoPpyAy 5skWg4wsB6jdkGRL0b5be7QDur0LWsxf2kJ6vMhZbi8+Lg9YXICSX8nsMRGoc+Yi17Yu rTjlZ7I7c+0X3nBf4nIZvvJ9phr7E7vdvYUOCwqKTwDUGge/zJ4AO0+KZwSteFTF9vuL hXU/v+mT7pR2m7G9yM6e6+uL5q5PBKo6MLRQQvG+dxXtQsoH+MOGoNCai0IisPxSIzh8 Ao0DAgmCTfL3gc1HWBAZCSVXoI065KVtYESJ9W5CnRntKcGrFcSWFRDQ+y5nLlDe58+D X+MQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=z8H6T32S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x99si2601464ede.160.2020.09.29.04.18.10; Tue, 29 Sep 2020 04:18:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=z8H6T32S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729446AbgI2LOk (ORCPT + 99 others); Tue, 29 Sep 2020 07:14:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:57660 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728561AbgI2LOc (ORCPT ); Tue, 29 Sep 2020 07:14:32 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3FC0021D41; Tue, 29 Sep 2020 11:14:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601378071; bh=luAx4X+I/dJfTAXORFZBzGx6TP/aQbWoHfjFpBNUjR8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=z8H6T32SbQhX6EWxwe6S2qNo8z5yK5wRtfWa+PedaFMVXcrrWVYL8cVy2/cLQXdDf QapX9YH4zbF5wwcIK6Uot74UEKZfivrrxxArC/Jqw3YED8Yfj7IyrhG+yeC86s1yX8 lev03jlJ7Klsl6jJPwOaQpx5K4wlB7ZBSPZboVI0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , "Steven Rostedt (VMware)" , Sasha Levin Subject: [PATCH 4.14 050/166] tracing: Set kernel_stacks caller size properly Date: Tue, 29 Sep 2020 12:59:22 +0200 Message-Id: <20200929105937.701380697@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105935.184737111@linuxfoundation.org> References: <20200929105935.184737111@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Josef Bacik [ Upstream commit cbc3b92ce037f5e7536f6db157d185cd8b8f615c ] I noticed when trying to use the trace-cmd python interface that reading the raw buffer wasn't working for kernel_stack events. This is because it uses a stubbed version of __dynamic_array that doesn't do the __data_loc trick and encode the length of the array into the field. Instead it just shows up as a size of 0. So change this to __array and set the len to FTRACE_STACK_ENTRIES since this is what we actually do in practice and matches how user_stack_trace works. Link: http://lkml.kernel.org/r/1411589652-1318-1-git-send-email-jbacik@fb.com Signed-off-by: Josef Bacik [ Pulled from the archeological digging of my INBOX ] Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Sasha Levin --- kernel/trace/trace_entries.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/trace/trace_entries.h b/kernel/trace/trace_entries.h index e3a658bac10fe..ff91acff72946 100644 --- a/kernel/trace/trace_entries.h +++ b/kernel/trace/trace_entries.h @@ -179,7 +179,7 @@ FTRACE_ENTRY(kernel_stack, stack_entry, F_STRUCT( __field( int, size ) - __dynamic_array(unsigned long, caller ) + __array( unsigned long, caller, FTRACE_STACK_ENTRIES ) ), F_printk("\t=> (" IP_FMT ")\n\t=> (" IP_FMT ")\n\t=> (" IP_FMT ")\n" -- 2.25.1