From: Masami Hiramatsu (Google) <mhiramat@kernel.org>
To: Steven Rostedt <rostedt@goodmis.org>
Cc: linux-trace-kernel@vger.kernel.org, linux-kernel@vger.kernel.org,
Florent Revest <revest@chromium.org>,
Mark Rutland <mark.rutland@arm.com>,
Will Deacon <will@kernel.org>,
Mathieu Desnoyers <mathieu.desnoyers@efficios.com>,
Martin KaFai Lau <martin.lau@linux.dev>,
bpf@vger.kernel.org
Subject: Re: [PATCH v9.1 05/11] tracing/probes: Move event parameter fetching code to common parser
Date: Sun, 14 May 2023 13:11:06 +0900 [thread overview]
Message-ID: <20230514131106.e90758b46eb69faa4f0722be@kernel.org> (raw)
In-Reply-To: <20230505174032.052cbc7c@gandalf.local.home>
On Fri, 5 May 2023 17:40:32 -0400
Steven Rostedt <rostedt@goodmis.org> wrote:
> On Tue, 2 May 2023 11:18:03 +0900
> "Masami Hiramatsu (Google)" <mhiramat@kernel.org> wrote:
>
> > --- a/kernel/trace/trace_probe.c
> > +++ b/kernel/trace/trace_probe.c
> > @@ -283,27 +283,53 @@ int traceprobe_parse_event_name(const char **pevent, const char **pgroup,
> > return 0;
> > }
> >
> > +static int parse_trace_event_arg(char *arg, struct fetch_insn *code,
> > + struct traceprobe_parse_context *ctx)
> > +{
> > + struct ftrace_event_field *field;
> > + struct list_head *head;
> > +
> > + head = trace_get_fields(ctx->event);
> > + list_for_each_entry(field, head, link) {
> > + if (!strcmp(arg, field->name)) {
> > + code->op = FETCH_OP_TP_ARG;
> > + code->data = field;
> > + return 0;
> > + }
> > + }
> > + return -ENOENT;
> > +}
> > +
> > #define PARAM_MAX_STACK (THREAD_SIZE / sizeof(unsigned long))
> >
> > static int parse_probe_vars(char *arg, const struct fetch_type *t,
> > - struct fetch_insn *code, unsigned int flags, int offs)
> > + struct fetch_insn *code,
> > + struct traceprobe_parse_context *ctx)
> > {
> > unsigned long param;
> > int ret = 0;
> > int len;
> >
> > - if (flags & TPARG_FL_TEVENT) {
> > + if (ctx->flags & TPARG_FL_TEVENT) {
> > if (code->data)
> > return -EFAULT;
> > - code->data = kstrdup(arg, GFP_KERNEL);
> > - if (!code->data)
> > - return -ENOMEM;
> > - code->op = FETCH_OP_TP_ARG;
> > - } else if (strcmp(arg, "retval") == 0) {
> > - if (flags & TPARG_FL_RETURN) {
> > + ret = parse_trace_event_arg(arg, code, ctx);
> > + if (!ret)
> > + return 0;
> > + if (strcmp(arg, "comm") == 0 || strcmp(arg, "COMM") == 0) {
> > + code->op = FETCH_OP_COMM;
> > + return 0;
> > + }
> > + /* backward compatibility */
> > + ctx->offset = 0;
> > + goto inval_var;
> > + }
>
> So this is a bit inconsistent in this function. We have here an if
> statement that returns 0 on success, and jumps to inval_var if it reaches
> the end.
Ah, got it. So it repeating the same pattern in this function.
>
> The rest of the if statements below, also goes to inval_var, or returns
> error, or just falls through the if statement to return ret. It's somewhat
> random.
And here is another pattern.
>
> This should be cleaned up (see patch at the end).
OK, I'll take it.
Thanks!
>
> > +
> > + if (strcmp(arg, "retval") == 0) {
> > + if (ctx->flags & TPARG_FL_RETURN) {
> > code->op = FETCH_OP_RETVAL;
> > } else {
> > - trace_probe_log_err(offs, RETVAL_ON_PROBE);
> > + trace_probe_log_err(ctx->offset, RETVAL_ON_PROBE);
> > ret = -EINVAL;
> > }
> > } else if ((len = str_has_prefix(arg, "stack"))) {
> > @@ -313,9 +339,9 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> > ret = kstrtoul(arg + len, 10, ¶m);
> > if (ret) {
> > goto inval_var;
> > - } else if ((flags & TPARG_FL_KERNEL) &&
> > + } else if ((ctx->flags & TPARG_FL_KERNEL) &&
> > param > PARAM_MAX_STACK) {
> > - trace_probe_log_err(offs, BAD_STACK_NUM);
> > + trace_probe_log_err(ctx->offset, BAD_STACK_NUM);
> > ret = -EINVAL;
> > } else {
> > code->op = FETCH_OP_STACK;
> > @@ -326,13 +352,13 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> > } else if (strcmp(arg, "comm") == 0 || strcmp(arg, "COMM") == 0) {
> > code->op = FETCH_OP_COMM;
> > #ifdef CONFIG_HAVE_FUNCTION_ARG_ACCESS_API
> > - } else if (tparg_is_function_entry(flags) &&
> > + } else if (tparg_is_function_entry(ctx->flags) &&
> > (len = str_has_prefix(arg, "arg"))) {
> > ret = kstrtoul(arg + len, 10, ¶m);
> > if (ret) {
> > goto inval_var;
> > } else if (!param || param > PARAM_MAX_STACK) {
> > - trace_probe_log_err(offs, BAD_ARG_NUM);
> > + trace_probe_log_err(ctx->offset, BAD_ARG_NUM);
> > return -EINVAL;
> > }
> > code->op = FETCH_OP_ARG;
> > @@ -341,7 +367,7 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> > * The tracepoint probe will probe a stub function, and the
> > * first parameter of the stub is a dummy and should be ignored.
> > */
> > - if (flags & TPARG_FL_TPOINT)
> > + if (ctx->flags & TPARG_FL_TPOINT)
> > code->param++;
> > #endif
> > } else
> > @@ -350,7 +376,7 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> > return ret;
> >
> > inval_var:
> > - trace_probe_log_err(offs, BAD_VAR);
> > + trace_probe_log_err(ctx->offset, BAD_VAR);
> > return -EINVAL;
> > }
> >
>
>
> diff --git a/kernel/trace/trace_probe.c b/kernel/trace/trace_probe.c
> index 84a9f0446390..a30aab8cef7f 100644
> --- a/kernel/trace/trace_probe.c
> +++ b/kernel/trace/trace_probe.c
> @@ -307,6 +307,7 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> struct traceprobe_parse_context *ctx)
> {
> unsigned long param;
> + int err = BAD_VAR;
> int ret = 0;
> int len;
>
> @@ -322,45 +323,61 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> }
> /* backward compatibility */
> ctx->offset = 0;
> - goto inval_var;
> + goto inval;
> }
>
> if (strcmp(arg, "retval") == 0) {
> if (ctx->flags & TPARG_FL_RETURN) {
> code->op = FETCH_OP_RETVAL;
> - } else {
> - trace_probe_log_err(ctx->offset, RETVAL_ON_PROBE);
> - ret = -EINVAL;
> + return 0;
> }
> - } else if ((len = str_has_prefix(arg, "stack"))) {
> + err = RETVAL_ON_PROBE;
> + ret = -EINVAL;
> + goto inval;
> + }
> +
> + if ((len = str_has_prefix(arg, "stack"))) {
> +
> if (arg[len] == '\0') {
> code->op = FETCH_OP_STACKP;
> - } else if (isdigit(arg[len])) {
> + return 0;
> + }
> +
> + if (isdigit(arg[len])) {
> ret = kstrtoul(arg + len, 10, ¶m);
> - if (ret) {
> - goto inval_var;
> - } else if ((ctx->flags & TPARG_FL_KERNEL) &&
> - param > PARAM_MAX_STACK) {
> - trace_probe_log_err(ctx->offset, BAD_STACK_NUM);
> + if (ret)
> + goto inval;
> +
> + if ((ctx->flags & TPARG_FL_KERNEL) &&
> + param > PARAM_MAX_STACK) {
> + err = BAD_STACK_NUM;
> ret = -EINVAL;
> - } else {
> - code->op = FETCH_OP_STACK;
> - code->param = (unsigned int)param;
> + goto inval;
> }
> - } else
> - goto inval_var;
> - } else if (strcmp(arg, "comm") == 0 || strcmp(arg, "COMM") == 0) {
> + code->op = FETCH_OP_STACK;
> + code->param = (unsigned int)param;
> + return 0;
> + }
> + goto inval;
> + }
> +
> + if (strcmp(arg, "comm") == 0 || strcmp(arg, "COMM") == 0) {
> code->op = FETCH_OP_COMM;
> + return 0;
> + }
> +
> #ifdef CONFIG_HAVE_FUNCTION_ARG_ACCESS_API
> - } else if (tparg_is_function_entry(ctx->flags) &&
> - (len = str_has_prefix(arg, "arg"))) {
> + if (tparg_is_function_entry(ctx->flags) &&
> + (len = str_has_prefix(arg, "arg"))) {
> ret = kstrtoul(arg + len, 10, ¶m);
> - if (ret) {
> - goto inval_var;
> - } else if (!param || param > PARAM_MAX_STACK) {
> - trace_probe_log_err(ctx->offset, BAD_ARG_NUM);
> - return -EINVAL;
> + if (ret)
> + goto inval;
> +
> + if (!param || param > PARAM_MAX_STACK) {
> + err = BAD_ARG_NUM;
> + goto inval;
> }
> +
> code->op = FETCH_OP_ARG;
> code->param = (unsigned int)param - 1;
> /*
> @@ -369,14 +386,11 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t,
> */
> if (ctx->flags & TPARG_FL_TPOINT)
> code->param++;
> + return 0;
> #endif
> - } else
> - goto inval_var;
> -
> - return ret;
>
> -inval_var:
> - trace_probe_log_err(ctx->offset, BAD_VAR);
> +inval:
> + trace_probe_log_err(ctx->offset, err);
> return -EINVAL;
> }
>
--
Masami Hiramatsu (Google) <mhiramat@kernel.org>
next prev parent reply other threads:[~2023-05-14 4:11 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-05-02 2:17 [PATCH v9.1 00/11] tracing: Add fprobe/tracepoint events Masami Hiramatsu (Google)
2023-05-02 2:17 ` [PATCH v9.1 01/11] fprobe: Pass return address to the handlers Masami Hiramatsu (Google)
2023-05-05 15:21 ` Steven Rostedt
2023-05-09 14:51 ` Masami Hiramatsu
2023-05-02 2:17 ` [PATCH v9.1 02/11] tracing/probes: Add fprobe events for tracing function entry and exit Masami Hiramatsu (Google)
2023-05-05 16:12 ` Steven Rostedt
2023-05-09 15:08 ` Masami Hiramatsu
2023-05-02 2:17 ` [PATCH v9.1 03/11] selftests/ftrace: Add fprobe related testcases Masami Hiramatsu (Google)
2023-05-02 2:17 ` [PATCH v9.1 04/11] tracing/probes: Add tracepoint support on fprobe_events Masami Hiramatsu (Google)
2023-05-02 2:18 ` [PATCH v9.1 05/11] tracing/probes: Move event parameter fetching code to common parser Masami Hiramatsu (Google)
2023-05-05 21:40 ` Steven Rostedt
2023-05-14 4:11 ` Masami Hiramatsu [this message]
2023-05-02 2:18 ` [PATCH v9.1 06/11] tracing/probes: Support function parameters if BTF is available Masami Hiramatsu (Google)
2023-05-02 2:18 ` [PATCH v9.1 07/11] tracing/probes: Add $$args meta argument for all function args Masami Hiramatsu (Google)
2023-05-05 21:48 ` Steven Rostedt
2023-05-14 3:02 ` Masami Hiramatsu
2023-05-02 2:18 ` [PATCH v9.1 08/11] tracing/probes: Add BTF retval type support Masami Hiramatsu (Google)
2023-05-02 2:18 ` [PATCH v9.1 09/11] selftests/ftrace: Add tracepoint probe test case Masami Hiramatsu (Google)
2023-05-02 2:18 ` [PATCH v9.1 10/11] selftests/ftrace: Add BTF arguments test cases Masami Hiramatsu (Google)
2023-05-02 2:18 ` [PATCH v9.1 11/11] Documentation: tracing/probes: Add fprobe event tracing document Masami Hiramatsu (Google)
2023-05-05 15:20 ` Steven Rostedt
2023-05-09 14:58 ` Masami Hiramatsu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230514131106.e90758b46eb69faa4f0722be@kernel.org \
--to=mhiramat@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-trace-kernel@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=martin.lau@linux.dev \
--cc=mathieu.desnoyers@efficios.com \
--cc=revest@chromium.org \
--cc=rostedt@goodmis.org \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).