From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2F993C001DB for ; Sat, 5 Aug 2023 04:31:18 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4F8DD8D0002; Sat, 5 Aug 2023 00:31:18 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 4A9808D0001; Sat, 5 Aug 2023 00:31:18 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 370C58D0002; Sat, 5 Aug 2023 00:31:18 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 26C6B8D0001 for ; Sat, 5 Aug 2023 00:31:18 -0400 (EDT) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id D97A34082C for ; Sat, 5 Aug 2023 04:31:17 +0000 (UTC) X-FDA: 81088776594.12.84A450C Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.20]) by imf27.hostedemail.com (Postfix) with ESMTP id 99D7A4000A for ; Sat, 5 Aug 2023 04:31:14 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=DcX0vudU; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf27.hostedemail.com: domain of lkp@intel.com designates 134.134.136.20 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1691209875; a=rsa-sha256; cv=none; b=1GF57QjTv+A8Ybd+bhAIJMCjmoOtNKHmT16icCMEt/B8t7GRWiwxpxZIEgWKwWSM2WnNOG K63P+eqiN7i1Uw0wTYpmBoc41sEe6ivCs0C0yiXw0Jxq6veOdOVOSCS6WD/hwN1uwIWjXQ qc1eDOc4HVHtB2AKtO865+jD+9N6CE4= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=DcX0vudU; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf27.hostedemail.com: domain of lkp@intel.com designates 134.134.136.20 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1691209875; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=1PwK0Vv2NJko/WRDKhfGpySx3wCs8T8R/bISqr27LZE=; b=U3EtBMCLoOa9hUiwmz+IspHAAHs0H0wU7WCI9M9d2uK8FgLXf3OiPXoM+ucZRZmTxEL5Xq t4OwkqLWIjBOok8LX1ulOIUV67H5KdZeWTUEZ5Pl9NEbnZiljhL81NLcyqAUaUK5fczxgX EaZ0/AaPg4Z7kK3CLVU7vLG/u5RobsI= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1691209874; x=1722745874; h=date:from:to:cc:subject:message-id:mime-version; bh=EKIMg1s7TxnyhInBuXvogh8gxQa65xRg5GieUu8ap7I=; b=DcX0vudUYnSZ9D6Ix8YI/bCs0pNYDTn9KG+/H0TsIttW74rdqQzqdmBF zjcfoqxqGn0WZFZapLdU+5f7AMLetmdVrutyUIltEJCG0TNZV6njFc4dO 2lORK30r9aQ0Q+ClGfOHBkr+AVCI3eUOT8ARrrtRrEvCNpJNm+FeRsYa7 ONqppxNHn0tf+e/xeDlK4QdKCwnZrRI98yNtHChroWm4MBHBVy4YvYkRd iOk1ITLIH76hFl+rqExjdMjawQQnwKzYeNtWYmD5VbaZENmnc+adD90iv wcIDXjdIBZjs+BeptV8H+ouSYaIkETzH+3DM/gukT1pXejjh9s7S6Wrau Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10792"; a="360353489" X-IronPort-AV: E=Sophos;i="6.01,256,1684825200"; d="scan'208";a="360353489" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Aug 2023 21:31:12 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10792"; a="759849642" X-IronPort-AV: E=Sophos;i="6.01,256,1684825200"; d="scan'208";a="759849642" Received: from lkp-server01.sh.intel.com (HELO d1ccc7e87e8f) ([10.239.97.150]) by orsmga008.jf.intel.com with ESMTP; 04 Aug 2023 21:31:10 -0700 Received: from kbuild by d1ccc7e87e8f with local (Exim 4.96) (envelope-from ) id 1qS8wY-0003JP-0R; Sat, 05 Aug 2023 04:31:10 +0000 Date: Sat, 5 Aug 2023 12:30:30 +0800 From: kernel test robot To: Douglas Anderson Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Andrew Morton , Linux Memory Management List Subject: [akpm-mm:mm-nonmm-unstable 54/56] kernel/watchdog.c:526:36: error: too many arguments to function call, expected 0, have 1 Message-ID: <202308051236.R7HDiE39-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspam-User: X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 99D7A4000A X-Stat-Signature: jt63da5pk4e84t46z6ito3e4c59k5pe8 X-HE-Tag: 1691209874-691049 X-HE-Meta: U2FsdGVkX18vSYaI6gX7CBX8/m9ISpTl1lz7iA/q9qqb4MfnQ/FUKNJw+xAGy1KC9Nb7C33lrGjFlXKL4mQ0aDqGYNDr8fmc61k0p/OfjoZF8GqZsZmiIdDJCCm18VR0Jwl1bSroqCXMnRFtSIXesgHYKGvzlcUGlobYAl4beIV+aaJjYg8fhCD5vVHYE9c/LJZQ8tlctTC9AdpnvgIgFhw2n2SX4xhMrN++MuaQYH5gasMkC1rbXz6WY9QP1cyaT6jDZcHt1s602MVQCbfCiKPb9k6GO+qUziI9IS+p42HkLZtyZ3leIgIrGgtA+z0LwCWMp1jRNH4PJw0Ws5nWBSmjD85AD6g1C9pfZmFi4ao5H5M5ntVumxsHJ6oS/VPyQS5CSVXC1l+7tth6hJq1Jlu0zQ7wr9Hhl6uNzdYRapxdUkRhtsluCoDOevMi+azbcHIt1d9wajwluxGtZbLoaZ6A/270oi5rfZHjniyRzjU2VSoQmykmFV0pq9YwMPmejKjCNe+3DDy75i2CjudOIeZEKhxylCZsqhE5PeU+aR2Gwt0hmNTrxP7QMXQM5dfppkSrr4Z4Q4IGLG2GEvs9euntdqWsXQWmX7yjL8wsw593ikCH8msTjZ80iu+6XmVwoJ7ryZ5QaBEj1Nmey3FA+W4UsTvCN3ckUZIWQIQH2lUO6CJxRZ+eV9qQPpD4B3ctN7OT82NsTDdXSjYS5vlYgFXuKaCyOMsQNIeEV2ksj2dVSVLOQyG0fIXikfDVuVn6irH5gk+M+DbhsHMKpUuCte6LPLxMb3iScS26E+wO7MoDF8791lLkSYa48xvP4R4wj8psGaYorj88k+dd+s/XbRZ72j+7TI0BahzBfqjNl6eGqCv7fLaVDLtG+s469cMcTqD+NkCzbgV89Zxed1IqM1B9GVrKMOeOtllfxsi7iaCFndU2ctgyUarTqreCxpmmarjv6l1wx1YApE42/Hr 9ZUC3A8/ UZW/ZujVeSSWwj9VU5KNJP3woP/5f/A3+4tFeGUXx6hzfYwJFEAQH4kyko+FO6bdOY2dVahmS4NEixNTWA6SJiwU3BENsRHd7w1hA7PW+uHsthOUIl92w8YSFuc+RSjugUT3B8nmOtdjb6DHQr6MFRjpaOpm5KCmVL+sDUeej3Uysa6berZwxH8OAU5Lc2LwOrO/Wu4PnAy0n+TEkLAx0ztKtccA5K2cvfZjzE5kFX3IDZb6Op0rn1NahJoYnXdYC5sy1Qx2rsyXgER4BONKKjCYCSQDTnyHiGbnt8bz6rrXigtkGGI/rOPCtsw== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-nonmm-unstable head: b1cb25d092e113f8a4424a37c94b1d41cb430511 commit: 0ca1d340a231ec8e8f2586c4bf2dc8c4f7d4ddc9 [54/56] nmi_backtrace: allow excluding an arbitrary CPU config: um-randconfig-r034-20230731 (https://download.01.org/0day-ci/archive/20230805/202308051236.R7HDiE39-lkp@intel.com/config) compiler: clang version 16.0.4 (https://github.com/llvm/llvm-project.git ae42196bc493ffe877a7e3dff8be32035dea4d07) reproduce: (https://download.01.org/0day-ci/archive/20230805/202308051236.R7HDiE39-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202308051236.R7HDiE39-lkp@intel.com/ All errors (new ones prefixed by >>): In file included from kernel/watchdog.c:21: In file included from include/linux/tick.h:8: In file included from include/linux/clockchips.h:14: In file included from include/linux/clocksource.h:22: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:547:31: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] val = __raw_readb(PCI_IOBASE + addr); ~~~~~~~~~~ ^ include/asm-generic/io.h:560:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr)); ~~~~~~~~~~ ^ include/uapi/linux/byteorder/little_endian.h:37:51: note: expanded from macro '__le16_to_cpu' #define __le16_to_cpu(x) ((__force __u16)(__le16)(x)) ^ In file included from kernel/watchdog.c:21: In file included from include/linux/tick.h:8: In file included from include/linux/clockchips.h:14: In file included from include/linux/clocksource.h:22: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:573:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] val = __le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr)); ~~~~~~~~~~ ^ include/uapi/linux/byteorder/little_endian.h:35:51: note: expanded from macro '__le32_to_cpu' #define __le32_to_cpu(x) ((__force __u32)(__le32)(x)) ^ In file included from kernel/watchdog.c:21: In file included from include/linux/tick.h:8: In file included from include/linux/clockchips.h:14: In file included from include/linux/clocksource.h:22: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:584:33: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] __raw_writeb(value, PCI_IOBASE + addr); ~~~~~~~~~~ ^ include/asm-generic/io.h:594:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr); ~~~~~~~~~~ ^ include/asm-generic/io.h:604:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr); ~~~~~~~~~~ ^ include/asm-generic/io.h:692:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] readsb(PCI_IOBASE + addr, buffer, count); ~~~~~~~~~~ ^ include/asm-generic/io.h:700:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] readsw(PCI_IOBASE + addr, buffer, count); ~~~~~~~~~~ ^ include/asm-generic/io.h:708:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] readsl(PCI_IOBASE + addr, buffer, count); ~~~~~~~~~~ ^ include/asm-generic/io.h:717:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] writesb(PCI_IOBASE + addr, buffer, count); ~~~~~~~~~~ ^ include/asm-generic/io.h:726:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] writesw(PCI_IOBASE + addr, buffer, count); ~~~~~~~~~~ ^ include/asm-generic/io.h:735:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] writesl(PCI_IOBASE + addr, buffer, count); ~~~~~~~~~~ ^ >> kernel/watchdog.c:526:36: error: too many arguments to function call, expected 0, have 1 trigger_allbutcpu_cpu_backtrace(smp_processor_id()); ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^~~~~~~~~~~~~~~~~~ include/linux/smp.h:271:29: note: expanded from macro 'smp_processor_id' # define smp_processor_id() __smp_processor_id() ^~~~~~~~~~~~~~~~~~~~ include/linux/smp.h:264:31: note: expanded from macro '__smp_processor_id' #define __smp_processor_id(x) raw_smp_processor_id(x) ^~~~~~~~~~~~~~~~~~~~~~~ include/linux/smp.h:198:34: note: expanded from macro 'raw_smp_processor_id' #define raw_smp_processor_id() 0 ^ include/linux/nmi.h:193:20: note: 'trigger_allbutcpu_cpu_backtrace' declared here static inline bool trigger_allbutcpu_cpu_backtrace(void) ^ 12 warnings and 1 error generated. vim +526 kernel/watchdog.c 441 442 /* watchdog kicker functions */ 443 static enum hrtimer_restart watchdog_timer_fn(struct hrtimer *hrtimer) 444 { 445 unsigned long touch_ts, period_ts, now; 446 struct pt_regs *regs = get_irq_regs(); 447 int duration; 448 int softlockup_all_cpu_backtrace = sysctl_softlockup_all_cpu_backtrace; 449 450 if (!watchdog_enabled) 451 return HRTIMER_NORESTART; 452 453 watchdog_hardlockup_kick(); 454 455 /* kick the softlockup detector */ 456 if (completion_done(this_cpu_ptr(&softlockup_completion))) { 457 reinit_completion(this_cpu_ptr(&softlockup_completion)); 458 stop_one_cpu_nowait(smp_processor_id(), 459 softlockup_fn, NULL, 460 this_cpu_ptr(&softlockup_stop_work)); 461 } 462 463 /* .. and repeat */ 464 hrtimer_forward_now(hrtimer, ns_to_ktime(sample_period)); 465 466 /* 467 * Read the current timestamp first. It might become invalid anytime 468 * when a virtual machine is stopped by the host or when the watchog 469 * is touched from NMI. 470 */ 471 now = get_timestamp(); 472 /* 473 * If a virtual machine is stopped by the host it can look to 474 * the watchdog like a soft lockup. This function touches the watchdog. 475 */ 476 kvm_check_and_clear_guest_paused(); 477 /* 478 * The stored timestamp is comparable with @now only when not touched. 479 * It might get touched anytime from NMI. Make sure that is_softlockup() 480 * uses the same (valid) value. 481 */ 482 period_ts = READ_ONCE(*this_cpu_ptr(&watchdog_report_ts)); 483 484 /* Reset the interval when touched by known problematic code. */ 485 if (period_ts == SOFTLOCKUP_DELAY_REPORT) { 486 if (unlikely(__this_cpu_read(softlockup_touch_sync))) { 487 /* 488 * If the time stamp was touched atomically 489 * make sure the scheduler tick is up to date. 490 */ 491 __this_cpu_write(softlockup_touch_sync, false); 492 sched_clock_tick(); 493 } 494 495 update_report_ts(); 496 return HRTIMER_RESTART; 497 } 498 499 /* Check for a softlockup. */ 500 touch_ts = __this_cpu_read(watchdog_touch_ts); 501 duration = is_softlockup(touch_ts, period_ts, now); 502 if (unlikely(duration)) { 503 /* 504 * Prevent multiple soft-lockup reports if one cpu is already 505 * engaged in dumping all cpu back traces. 506 */ 507 if (softlockup_all_cpu_backtrace) { 508 if (test_and_set_bit_lock(0, &soft_lockup_nmi_warn)) 509 return HRTIMER_RESTART; 510 } 511 512 /* Start period for the next softlockup warning. */ 513 update_report_ts(); 514 515 pr_emerg("BUG: soft lockup - CPU#%d stuck for %us! [%s:%d]\n", 516 smp_processor_id(), duration, 517 current->comm, task_pid_nr(current)); 518 print_modules(); 519 print_irqtrace_events(current); 520 if (regs) 521 show_regs(regs); 522 else 523 dump_stack(); 524 525 if (softlockup_all_cpu_backtrace) { > 526 trigger_allbutcpu_cpu_backtrace(smp_processor_id()); 527 clear_bit_unlock(0, &soft_lockup_nmi_warn); 528 } 529 530 add_taint(TAINT_SOFTLOCKUP, LOCKDEP_STILL_OK); 531 if (softlockup_panic) 532 panic("softlockup: hung tasks"); 533 } 534 535 return HRTIMER_RESTART; 536 } 537 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki