Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp4623978pxb; Tue, 25 Jan 2022 14:49:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJxksIfeKITv0dFOsDHyxvMo9lv8W8REdjJGuzaL7hdq4yZCe8+DmTiyfS1myiSl0bNs950u X-Received: by 2002:a17:90b:3852:: with SMTP id nl18mr5755325pjb.228.1643150962650; Tue, 25 Jan 2022 14:49:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643150962; cv=none; d=google.com; s=arc-20160816; b=tdhAnW3eS5IIZz27enSnp5m3CB6Wyp2d4i1q9K7+t3wBmiE8kab19pPHgg3VtMN9LT /HZ4QlO15SntTZxHstdb788o9Hb11ACQNua9XAwEVDEFDaMUsWlNi0SZ+uS5CymmPe5I EPYgeEzoXQaLIpdeiI7diU+yF56ANXr+dvSIrJ34H8R8PTuHHOHTBFdRdw/irJPdJ/2J 3gMGu5+ZSb3o5NURPdye7NMHBVULqcI+OwCH2DBYPp9FHHSWz1LEW+kTUuKno580n5EI VGpWlVA/tEt+nHYL9rAzrehvOCKfPpWqsCa6t7BdYeMdEb5lFjm9meRx9gAVYeL0m52/ 2IRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=QctrMSSmadCS3PH0vApvBCrsWjyIJD5yLkVyJETGe/E=; b=wXDG06+bXGLnTeEzY8tsYUHyOG3nobV8BC5BFx4Gp/yXMui5Yrf7mDvXqv3bOE9U3i Vh6p4zmikaqE60V2OhBih1ZLJkUrlaL90+G1UHeggqUIJzxjcYsDnbH5l4NQ5z/8BsmZ zGMGNgLiyVnLOGYYQuUo0eBTUyrc/nrCTuLUDAEEgdPlud3g1N0BbC/4GOshH9CrCDW6 P7Q7HovIh6vCF6HsojQnLH6yznrXCU2uwtxEuClPbXoeoCu6t7oX+FgpMXshxWmrV7Cd k1fnIKegGgH39TnM4aI3/gXi5ne2Xe0O5O6CkO1WeOzccLLGMgcE5ygaLayvy4D2TyN2 NbXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t10si10321511plg.41.2022.01.25.14.49.10; Tue, 25 Jan 2022 14:49:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351393AbiAYPj0 (ORCPT + 99 others); Tue, 25 Jan 2022 10:39:26 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:46462 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378931AbiAYPgT (ORCPT ); Tue, 25 Jan 2022 10:36:19 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 67268616ED; Tue, 25 Jan 2022 15:36:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 259B7C340E0; Tue, 25 Jan 2022 15:36:09 +0000 (UTC) Date: Tue, 25 Jan 2022 10:36:07 -0500 From: Steven Rostedt To: Stephen Rothwell Cc: Chuck Lever , Linux Kernel Mailing List , Linux Next Mailing List , Anna Schumaker , Trond Myklebust , NFS Mailing List Subject: Re: linux-next: runtime warning in next-20220125 Message-ID: <20220125103607.2dc307e2@gandalf.local.home> In-Reply-To: <20220125100138.0d19c8ca@gandalf.local.home> References: <20220125160505.068dbb52@canb.auug.org.au> <20220125162146.13872bdb@canb.auug.org.au> <20220125100138.0d19c8ca@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Tue, 25 Jan 2022 10:01:38 -0500 Steven Rostedt wrote: > On Tue, 25 Jan 2022 16:21:46 +1100 > Stephen Rothwell wrote: > > > Hi all, > > > > On Tue, 25 Jan 2022 16:05:05 +1100 Stephen Rothwell wrote: > > > > > > My qemu boot test of a powerpc pseries_le_defconfig kernel produces the > > > following trace: > > > > > > ------------[ cut here ]------------ > > > WARNING: CPU: 0 PID: 0 at kernel/trace/trace_events.c:417 trace_event_raw_init+0x194/0x730 > > > Modules linked in: > > > CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.0-rc1 #2 > > > NIP: c0000000002bdbb4 LR: c0000000002bdcb0 CTR: c0000000002bdb70 > > > > > > I have no idea what has caused this :-( Maybe commit > > > > > > 5544d5318802 ("SUNRPC: Same as SVC_RQST_ENDPOINT, but without the xid") > > > > Actually, reverting commits > > > > 6ff851d98af8 ("SUNRPC: Improve sockaddr handling in the svc_xprt_create_error trace point") > > 5544d5318802 ("SUNRPC: Same as SVC_RQST_ENDPOINT, but without the xid") > > e2d3613db12a ("SUNRPC: Record endpoint information in trace log") > > > > makes the warning go away. > > > > We added a new way to save items on the ring buffer, but did not update the > safety checks to know about them. I'll fix this shortly. > This should fix it: I'll make it a real patch and start running it through my tests. -- Steve diff --git a/kernel/trace/trace_events.c b/kernel/trace/trace_events.c index 3147614c1812..f527ae807e77 100644 --- a/kernel/trace/trace_events.c +++ b/kernel/trace/trace_events.c @@ -384,6 +384,12 @@ static void test_event_printk(struct trace_event_call *call) if (!(dereference_flags & (1ULL << arg))) goto next_arg; + /* Check for __get_sockaddr */; + if (str_has_prefix(fmt + i, "__get_sockaddr(")) { + dereference_flags &= ~(1ULL << arg); + goto next_arg; + } + /* Find the REC-> in the argument */ c = strchr(fmt + i, ','); r = strstr(fmt + i, "REC->");