* [RFC PATCH v2 0/1] Return EADDRNOTAVAIL when func matches several symbols during kprobe creation @ 2023-08-24 10:37 Francis Laniel 2023-08-24 10:37 ` [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols Francis Laniel 0 siblings, 1 reply; 6+ messages in thread From: Francis Laniel @ 2023-08-24 10:37 UTC (permalink / raw) To: linux-kernel; +Cc: Masami Hiramatsu, linux-trace-kernel, Francis Laniel Hi. In the kernel source code, it exists different functions which share the same name but which have, of course, different addresses as they can be defined in different modules: # Kernel was compiled with CONFIG_NTFS_FS and CONFIG_NTFS3_FS as built-in. root@vm-amd64:~# grep ntfs_file_write_iter /proc/kallsyms ffffffff814ce3c0 t __pfx_ntfs_file_write_iter ffffffff814ce3d0 t ntfs_file_write_iter ffffffff814fc8a0 t __pfx_ntfs_file_write_iter ffffffff814fc8b0 t ntfs_file_write_iter This can be source of troubles when you create a PMU kprobe for such a function, as it will only install one for the first address (e.g. 0xffffffff814ce3d0 in the above). This could lead to some troubles were BPF based tools does not report any event because the second function is not called: root@vm-amd64:/mnt# mount | grep /mnt /foo.img on /mnt type ntfs3 (rw,relatime,uid=0,gid=0,iocharset=utf8) # ig is a tool which installs a PMU kprobe on ntfs_file_write_iter(). root@vm-amd64:/mnt# ig trace fsslower -m 0 -f ntfs3 --host &> /tmp/foo & [1] 207 root@vm-amd64:/mnt# dd if=./foo of=./bar count=3 3+0 records in 3+0 records out 1536 bytes (1.5 kB, 1.5 KiB) copied, 0.00543323 s, 283 kB/s root@vm-amd64:/mnt# fg ig trace fsslower -m 0 -f ntfs3 --host &> /tmp/foo ^Croot@vm-amd64:/mnt# more /tmp/foo RUNTIME.CONTAINERNAME RUNTIME.CONTAIN… PID COMM T BYTES OFFSET LAT FILE 214 dd R 512 0 766 foo 214 dd R 512 512 9 foo 214 dd As you can see in the above, only read events are reported and no write because the kprobe is installed for the old ntfs_file_write_iter() and not the ntfs3 one. The same behavior occurs with sysfs kprobe: root@vm-amd64:/# echo 'p:probe/ntfs_file_write_iter ntfs_file_write_iter' > /sys/kernel/tracing/kprobe_events root@vm-amd64:/# cat /sys/kernel/tracing/kprobe_events p:probe/ntfs_file_write_iter ntfs_file_write_iter root@vm-amd64:/# mount | grep /mnt /foo.img on /mnt type ntfs3 (rw,relatime,uid=0,gid=0,iocharset=utf8) root@vm-amd64:/# perf record -e probe:ntfs_file_write_iter & [1] 210 root@vm-amd64:/# cd /mnt/ root@vm-amd64:/mnt# dd if=./foo of=./bar count=3 3+0 records in 3+0 records out 1536 bytes (1.5 kB, 1.5 KiB) copied, 0.00234793 s, 654 kB/s root@vm-amd64:/mnt# cd - / root@vm-amd64:/# fg perf record -e probe:ntfs_file_write_iter ^C[ perf record: Woken up 1 times to write data ] [ perf record: Captured and wrote 0.056 MB perf.data ] root@vm-amd64:/# perf report Error: The perf.data data has no samples! # To display the perf.data header info, please use --header/--header-only optio> # In this contribution, I modified the functions creating sysfs and PMU kprobes to test if the function name given as argument matches several symbols. In this case, these functions return EADDRNOTAVAIL to indicate the user to use addr and offs to remove this ambiguity. So, when the above BPF tool is run, the following error message is printed: root@vm-amd64:~# ig trace fsslower -m 0 -f ntfs3 --host &> /tmp/foo & [1] 228 root@vm-amd64:~# more /tmp/foo RUNTIME.CONTAINERNAME RUNTIME.CONTAIN… PID COMM T BYTES OFFSET LAT FILE Error: running gadget: running gadget: installing tracer: attaching kprobe: crea ting perf_kprobe PMU (arch-specific fallback for "ntfs_file_write_iter"): token ntfs_file_write_iter: opening perf event: cannot assign requested address And the same with sysfs kprobe: root@vm-amd64:/# echo 'p:probe/ntfs_file_write_iter ntfs_file_write_iter' > /sys/kernel/tracing/kprobe_events -bash: echo: write error: Cannot assign requested address Note that, this does not influence perf as it installs kprobes as offset on _text: root@vm-amd64:/# perf probe --add ntfs_file_write_iter Added new events: probe:ntfs_file_write_iter (on ntfs_file_write_iter) probe:ntfs_file_write_iter (on ntfs_file_write_iter) ... root@vm-amd64:/# cat /sys/kernel/tracing/kprobe_events p:probe/ntfs_file_write_iter _text+5039088 p:probe/ntfs_file_write_iter _text+5228752 Note that, this contribution is the conclusion of a previous RFC which intended to install a PMU kprobe for all matching symbols [1, 2]. If you see any way to improve this contribution, particularly if you have an idea to add tests or documentation for this behavior, please share your feedback. Changes since: v1: * Use EADDRNOTAVAIL instead of adding a new error code. * Correct also this behavior for sysfs kprobe. Francis Laniel (1): tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols kernel/trace/trace_kprobe.c | 42 +++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) Best regards and thank you in advance. --- [1]: https://lore.kernel.org/lkml/20230816163517.112518-1-flaniel@linux.microsoft.com/ [2]: https://lore.kernel.org/lkml/20230819101105.b0c104ae4494a7d1f2eea742@kernel.org/ -- 2.34.1 ^ permalink raw reply [flat|nested] 6+ messages in thread
* [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols 2023-08-24 10:37 [RFC PATCH v2 0/1] Return EADDRNOTAVAIL when func matches several symbols during kprobe creation Francis Laniel @ 2023-08-24 10:37 ` Francis Laniel 2023-08-24 13:02 ` Masami Hiramatsu 0 siblings, 1 reply; 6+ messages in thread From: Francis Laniel @ 2023-08-24 10:37 UTC (permalink / raw) To: linux-kernel Cc: Masami Hiramatsu, linux-trace-kernel, Francis Laniel, Steven Rostedt Previously to this commit, if func matches several symbols, a kprobe, being either sysfs or PMU, would only be installed for the first matching address. This could lead to some misunderstanding when some BPF code was never called because it was attached to a function which was indeed not call, because the effectively called one has no kprobes. So, this commit returns EADDRNOTAVAIL when func matches several symbols. This way, user needs to use addr to remove the ambiguity. Suggested-by: Masami Hiramatsu <mhiramat@kernel.org> Signed-off-by: Francis Laniel <flaniel@linux.microsoft.com> Link: https://lore.kernel.org/lkml/20230819101105.b0c104ae4494a7d1f2eea742@kernel.org/ --- kernel/trace/trace_kprobe.c | 42 +++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c index 23dba01831f7..0c8dd6ba650b 100644 --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -705,6 +705,25 @@ static struct notifier_block trace_kprobe_module_nb = { .priority = 1 /* Invoked after kprobe module callback */ }; +static int count_symbols(void *data, unsigned long unused) +{ + unsigned int *count = data; + + (*count)++; + + return 0; +} + +static unsigned int func_name_several_symbols(char *func_name) +{ + unsigned int count; + + count = 0; + kallsyms_on_each_match_symbol(count_symbols, func_name, &count); + + return count > 1; +} + static int __trace_kprobe_create(int argc, const char *argv[]) { /* @@ -836,6 +855,18 @@ static int __trace_kprobe_create(int argc, const char *argv[]) } } + /* + * If user specifies KSYM, we check it does not correspond to several + * symbols. + * If this is the case, we return EADDRNOTAVAIL to indicate the user + * he/she should use ADDR rather than KSYM to remove the ambiguity. + */ + if (symbol && func_name_several_symbols(symbol)) { + ret = -EADDRNOTAVAIL; + + goto error; + } + trace_probe_log_set_index(0); if (event) { ret = traceprobe_parse_event_name(&event, &group, gbuf, @@ -1699,6 +1730,7 @@ static int unregister_kprobe_event(struct trace_kprobe *tk) } #ifdef CONFIG_PERF_EVENTS + /* create a trace_kprobe, but don't add it to global lists */ struct trace_event_call * create_local_trace_kprobe(char *func, void *addr, unsigned long offs, @@ -1709,6 +1741,16 @@ create_local_trace_kprobe(char *func, void *addr, unsigned long offs, int ret; char *event; + /* + * If user specifies func, we check that function name does not + * correspond to several symbols. + * If this is the case, we return EADDRNOTAVAIL to indicate the user + * he/she should use addr and offs rather than func to remove the + * ambiguity. + */ + if (func && func_name_several_symbols(func)) + return ERR_PTR(-EADDRNOTAVAIL); + /* * local trace_kprobes are not added to dyn_event, so they are never * searched in find_trace_kprobe(). Therefore, there is no concern of -- 2.34.1 ^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols 2023-08-24 10:37 ` [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols Francis Laniel @ 2023-08-24 13:02 ` Masami Hiramatsu 2023-08-24 14:31 ` Francis Laniel 0 siblings, 1 reply; 6+ messages in thread From: Masami Hiramatsu @ 2023-08-24 13:02 UTC (permalink / raw) To: Francis Laniel Cc: linux-kernel, Masami Hiramatsu, linux-trace-kernel, Steven Rostedt On Thu, 24 Aug 2023 12:37:34 +0200 Francis Laniel <flaniel@linux.microsoft.com> wrote: > Previously to this commit, if func matches several symbols, a kprobe, being > either sysfs or PMU, would only be installed for the first matching address. > This could lead to some misunderstanding when some BPF code was never called > because it was attached to a function which was indeed not call, because the > effectively called one has no kprobes. > > So, this commit returns EADDRNOTAVAIL when func matches several symbols. > This way, user needs to use addr to remove the ambiguity. Thanks for update the patch. I have some comments there. > > Suggested-by: Masami Hiramatsu <mhiramat@kernel.org> > Signed-off-by: Francis Laniel <flaniel@linux.microsoft.com> > Link: https://lore.kernel.org/lkml/20230819101105.b0c104ae4494a7d1f2eea742@kernel.org/ > --- > kernel/trace/trace_kprobe.c | 42 +++++++++++++++++++++++++++++++++++++ > 1 file changed, 42 insertions(+) > > diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c > index 23dba01831f7..0c8dd6ba650b 100644 > --- a/kernel/trace/trace_kprobe.c > +++ b/kernel/trace/trace_kprobe.c > @@ -705,6 +705,25 @@ static struct notifier_block trace_kprobe_module_nb = { > .priority = 1 /* Invoked after kprobe module callback */ > }; > > +static int count_symbols(void *data, unsigned long unused) > +{ > + unsigned int *count = data; > + > + (*count)++; > + > + return 0; > +} > + > +static unsigned int func_name_several_symbols(char *func_name) If this returns boolean, please use 'bool' for return type. Also, I think 'func_name_is_unique()' is more natural. > +{ > + unsigned int count; > + > + count = 0; > + kallsyms_on_each_match_symbol(count_symbols, func_name, &count); > + > + return count > 1; > +} > + > static int __trace_kprobe_create(int argc, const char *argv[]) > { > /* > @@ -836,6 +855,18 @@ static int __trace_kprobe_create(int argc, const char *argv[]) > } > } > > + /* > + * If user specifies KSYM, we check it does not correspond to several > + * symbols. > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > + * he/she should use ADDR rather than KSYM to remove the ambiguity. > + */ > + if (symbol && func_name_several_symbols(symbol)) { Then, here will be if (symbol && !func_name_is_unique(symbol)) { > + ret = -EADDRNOTAVAIL; > + > + goto error; > + } > + > trace_probe_log_set_index(0); > if (event) { > ret = traceprobe_parse_event_name(&event, &group, gbuf, > @@ -1699,6 +1730,7 @@ static int unregister_kprobe_event(struct trace_kprobe *tk) > } > > #ifdef CONFIG_PERF_EVENTS > + > /* create a trace_kprobe, but don't add it to global lists */ > struct trace_event_call * > create_local_trace_kprobe(char *func, void *addr, unsigned long offs, > @@ -1709,6 +1741,16 @@ create_local_trace_kprobe(char *func, void *addr, unsigned long offs, > int ret; > char *event; > > + /* > + * If user specifies func, we check that function name does not > + * correspond to several symbols. > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > + * he/she should use addr and offs rather than func to remove the > + * ambiguity. > + */ > + if (func && func_name_several_symbols(func)) Ditto. Thanks! > + return ERR_PTR(-EADDRNOTAVAIL); > + > /* > * local trace_kprobes are not added to dyn_event, so they are never > * searched in find_trace_kprobe(). Therefore, there is no concern of > -- > 2.34.1 > -- Masami Hiramatsu (Google) <mhiramat@kernel.org> ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols 2023-08-24 13:02 ` Masami Hiramatsu @ 2023-08-24 14:31 ` Francis Laniel 2023-08-24 14:47 ` Masami Hiramatsu 0 siblings, 1 reply; 6+ messages in thread From: Francis Laniel @ 2023-08-24 14:31 UTC (permalink / raw) To: Masami Hiramatsu Cc: linux-kernel, Masami Hiramatsu, linux-trace-kernel, Steven Rostedt Hi. Le jeudi 24 août 2023, 15:02:27 CEST Masami Hiramatsu a écrit : > On Thu, 24 Aug 2023 12:37:34 +0200 > > Francis Laniel <flaniel@linux.microsoft.com> wrote: > > Previously to this commit, if func matches several symbols, a kprobe, > > being > > either sysfs or PMU, would only be installed for the first matching > > address. This could lead to some misunderstanding when some BPF code was > > never called because it was attached to a function which was indeed not > > call, because the effectively called one has no kprobes. > > > > So, this commit returns EADDRNOTAVAIL when func matches several symbols. > > This way, user needs to use addr to remove the ambiguity. > > Thanks for update the patch. I have some comments there. > > > Suggested-by: Masami Hiramatsu <mhiramat@kernel.org> > > Signed-off-by: Francis Laniel <flaniel@linux.microsoft.com> > > Link: > > https://lore.kernel.org/lkml/20230819101105.b0c104ae4494a7d1f2eea742@kern > > el.org/ --- > > > > kernel/trace/trace_kprobe.c | 42 +++++++++++++++++++++++++++++++++++++ > > 1 file changed, 42 insertions(+) > > > > diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c > > index 23dba01831f7..0c8dd6ba650b 100644 > > --- a/kernel/trace/trace_kprobe.c > > +++ b/kernel/trace/trace_kprobe.c > > @@ -705,6 +705,25 @@ static struct notifier_block trace_kprobe_module_nb = > > {> > > .priority = 1 /* Invoked after kprobe module callback */ > > > > }; > > > > +static int count_symbols(void *data, unsigned long unused) > > +{ > > + unsigned int *count = data; > > + > > + (*count)++; > > + > > + return 0; > > +} > > + > > +static unsigned int func_name_several_symbols(char *func_name) > > If this returns boolean, please use 'bool' for return type. > Also, I think 'func_name_is_unique()' is more natural. > This name sounds better but it means it will check count == 1. I am fine with it, but please see my below comment. > > +{ > > + unsigned int count; > > + > > + count = 0; > > + kallsyms_on_each_match_symbol(count_symbols, func_name, &count); > > + > > + return count > 1; > > +} > > + > > > > static int __trace_kprobe_create(int argc, const char *argv[]) > > { > > > > /* > > > > @@ -836,6 +855,18 @@ static int __trace_kprobe_create(int argc, const char > > *argv[])> > > } > > > > } > > > > + /* > > + * If user specifies KSYM, we check it does not correspond to several > > + * symbols. > > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > > + * he/she should use ADDR rather than KSYM to remove the ambiguity. > > + */ > > + if (symbol && func_name_several_symbols(symbol)) { > > Then, here will be > > if (symbol && !func_name_is_unique(symbol)) { > I am fine with the above, but it means if users gives an unknown symbol, we will return EADDRNOTAVAIL instead of currently returning ENOENT. Is it OK? > > + ret = -EADDRNOTAVAIL; > > + > > + goto error; > > + } > > + > > > > trace_probe_log_set_index(0); > > if (event) { > > > > ret = traceprobe_parse_event_name(&event, &group, gbuf, > > > > @@ -1699,6 +1730,7 @@ static int unregister_kprobe_event(struct > > trace_kprobe *tk)> > > } > > > > #ifdef CONFIG_PERF_EVENTS > > > > + > > > > /* create a trace_kprobe, but don't add it to global lists */ > > struct trace_event_call * > > create_local_trace_kprobe(char *func, void *addr, unsigned long offs, > > > > @@ -1709,6 +1741,16 @@ create_local_trace_kprobe(char *func, void *addr, > > unsigned long offs,> > > int ret; > > char *event; > > > > + /* > > + * If user specifies func, we check that function name does not > > + * correspond to several symbols. > > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > > + * he/she should use addr and offs rather than func to remove the > > + * ambiguity. > > + */ > > + if (func && func_name_several_symbols(func)) > > Ditto. > > Thanks! > > > + return ERR_PTR(-EADDRNOTAVAIL); > > + > > > > /* > > > > * local trace_kprobes are not added to dyn_event, so they are never > > * searched in find_trace_kprobe(). Therefore, there is no concern of Best regards. ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols 2023-08-24 14:31 ` Francis Laniel @ 2023-08-24 14:47 ` Masami Hiramatsu 2023-08-24 16:09 ` Francis Laniel 0 siblings, 1 reply; 6+ messages in thread From: Masami Hiramatsu @ 2023-08-24 14:47 UTC (permalink / raw) To: Francis Laniel; +Cc: linux-kernel, linux-trace-kernel, Steven Rostedt On Thu, 24 Aug 2023 16:31:13 +0200 Francis Laniel <flaniel@linux.microsoft.com> wrote: > Hi. > > Le jeudi 24 août 2023, 15:02:27 CEST Masami Hiramatsu a écrit : > > On Thu, 24 Aug 2023 12:37:34 +0200 > > > > Francis Laniel <flaniel@linux.microsoft.com> wrote: > > > Previously to this commit, if func matches several symbols, a kprobe, > > > being > > > either sysfs or PMU, would only be installed for the first matching > > > address. This could lead to some misunderstanding when some BPF code was > > > never called because it was attached to a function which was indeed not > > > call, because the effectively called one has no kprobes. > > > > > > So, this commit returns EADDRNOTAVAIL when func matches several symbols. > > > This way, user needs to use addr to remove the ambiguity. > > > > Thanks for update the patch. I have some comments there. > > > > > Suggested-by: Masami Hiramatsu <mhiramat@kernel.org> > > > Signed-off-by: Francis Laniel <flaniel@linux.microsoft.com> > > > Link: > > > https://lore.kernel.org/lkml/20230819101105.b0c104ae4494a7d1f2eea742@kern > > > el.org/ --- > > > > > > kernel/trace/trace_kprobe.c | 42 +++++++++++++++++++++++++++++++++++++ > > > 1 file changed, 42 insertions(+) > > > > > > diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c > > > index 23dba01831f7..0c8dd6ba650b 100644 > > > --- a/kernel/trace/trace_kprobe.c > > > +++ b/kernel/trace/trace_kprobe.c > > > @@ -705,6 +705,25 @@ static struct notifier_block trace_kprobe_module_nb = > > > {> > > > .priority = 1 /* Invoked after kprobe module callback */ > > > > > > }; > > > > > > +static int count_symbols(void *data, unsigned long unused) > > > +{ > > > + unsigned int *count = data; > > > + > > > + (*count)++; > > > + > > > + return 0; > > > +} > > > + > > > +static unsigned int func_name_several_symbols(char *func_name) > > > > If this returns boolean, please use 'bool' for return type. > > Also, I think 'func_name_is_unique()' is more natural. > > > > This name sounds better but it means it will check count == 1. > I am fine with it, but please see my below comment. > > > > +{ > > > + unsigned int count; > > > + > > > + count = 0; > > > + kallsyms_on_each_match_symbol(count_symbols, func_name, &count); > > > + > > > + return count > 1; > > > +} > > > + > > > > > > static int __trace_kprobe_create(int argc, const char *argv[]) > > > { > > > > > > /* > > > > > > @@ -836,6 +855,18 @@ static int __trace_kprobe_create(int argc, const char > > > *argv[])> > > > } > > > > > > } > > > > > > + /* > > > + * If user specifies KSYM, we check it does not correspond to several > > > + * symbols. > > > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > > > + * he/she should use ADDR rather than KSYM to remove the ambiguity. > > > + */ > > > + if (symbol && func_name_several_symbols(symbol)) { > > > > Then, here will be > > > > if (symbol && !func_name_is_unique(symbol)) { > > > > I am fine with the above, but it means if users gives an unknown symbol, we > will return EADDRNOTAVAIL instead of currently returning ENOENT. > Is it OK? Ah, good catch! Hm, then what about 'int number_of_same_symbols()' ? if (symbol) { num = number_of_same_symbols(symbol); if (num > 1) return -EADDRNOTAVAIL; else if (num == 0) return -ENOENT; } Thank you, > > > > + ret = -EADDRNOTAVAIL; > > > + > > > + goto error; > > > + } > > > + > > > > > > trace_probe_log_set_index(0); > > > if (event) { > > > > > > ret = traceprobe_parse_event_name(&event, &group, gbuf, > > > > > > @@ -1699,6 +1730,7 @@ static int unregister_kprobe_event(struct > > > trace_kprobe *tk)> > > > } > > > > > > #ifdef CONFIG_PERF_EVENTS > > > > > > + > > > > > > /* create a trace_kprobe, but don't add it to global lists */ > > > struct trace_event_call * > > > create_local_trace_kprobe(char *func, void *addr, unsigned long offs, > > > > > > @@ -1709,6 +1741,16 @@ create_local_trace_kprobe(char *func, void *addr, > > > unsigned long offs,> > > > int ret; > > > char *event; > > > > > > + /* > > > + * If user specifies func, we check that function name does not > > > + * correspond to several symbols. > > > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > > > + * he/she should use addr and offs rather than func to remove the > > > + * ambiguity. > > > + */ > > > + if (func && func_name_several_symbols(func)) > > > > Ditto. > > > > Thanks! > > > > > + return ERR_PTR(-EADDRNOTAVAIL); > > > + > > > > > > /* > > > > > > * local trace_kprobes are not added to dyn_event, so they are never > > > * searched in find_trace_kprobe(). Therefore, there is no concern of > > Best regards. > > -- Masami Hiramatsu (Google) <mhiramat@kernel.org> ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols 2023-08-24 14:47 ` Masami Hiramatsu @ 2023-08-24 16:09 ` Francis Laniel 0 siblings, 0 replies; 6+ messages in thread From: Francis Laniel @ 2023-08-24 16:09 UTC (permalink / raw) To: Masami Hiramatsu; +Cc: linux-kernel, linux-trace-kernel, Steven Rostedt Le jeudi 24 août 2023, 16:47:21 CEST Masami Hiramatsu a écrit : > On Thu, 24 Aug 2023 16:31:13 +0200 > > Francis Laniel <flaniel@linux.microsoft.com> wrote: > > Hi. > > > > Le jeudi 24 août 2023, 15:02:27 CEST Masami Hiramatsu a écrit : > > > On Thu, 24 Aug 2023 12:37:34 +0200 > > > > > > Francis Laniel <flaniel@linux.microsoft.com> wrote: > > > > Previously to this commit, if func matches several symbols, a kprobe, > > > > being > > > > either sysfs or PMU, would only be installed for the first matching > > > > address. This could lead to some misunderstanding when some BPF code > > > > was > > > > never called because it was attached to a function which was indeed > > > > not > > > > call, because the effectively called one has no kprobes. > > > > > > > > So, this commit returns EADDRNOTAVAIL when func matches several > > > > symbols. > > > > This way, user needs to use addr to remove the ambiguity. > > > > > > Thanks for update the patch. I have some comments there. > > > > > > > Suggested-by: Masami Hiramatsu <mhiramat@kernel.org> > > > > Signed-off-by: Francis Laniel <flaniel@linux.microsoft.com> > > > > Link: > > > > https://lore.kernel.org/lkml/20230819101105.b0c104ae4494a7d1f2eea742@k > > > > ern > > > > el.org/ --- > > > > > > > > kernel/trace/trace_kprobe.c | 42 > > > > +++++++++++++++++++++++++++++++++++++ > > > > 1 file changed, 42 insertions(+) > > > > > > > > diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c > > > > index 23dba01831f7..0c8dd6ba650b 100644 > > > > --- a/kernel/trace/trace_kprobe.c > > > > +++ b/kernel/trace/trace_kprobe.c > > > > @@ -705,6 +705,25 @@ static struct notifier_block > > > > trace_kprobe_module_nb = > > > > {> > > > > > > > > .priority = 1 /* Invoked after kprobe module callback */ > > > > > > > > }; > > > > > > > > +static int count_symbols(void *data, unsigned long unused) > > > > +{ > > > > + unsigned int *count = data; > > > > + > > > > + (*count)++; > > > > + > > > > + return 0; > > > > +} > > > > + > > > > +static unsigned int func_name_several_symbols(char *func_name) > > > > > > If this returns boolean, please use 'bool' for return type. > > > Also, I think 'func_name_is_unique()' is more natural. > > > > This name sounds better but it means it will check count == 1. > > I am fine with it, but please see my below comment. > > > > > > +{ > > > > + unsigned int count; > > > > + > > > > + count = 0; > > > > + kallsyms_on_each_match_symbol(count_symbols, func_name, &count); > > > > + > > > > + return count > 1; > > > > +} > > > > + > > > > > > > > static int __trace_kprobe_create(int argc, const char *argv[]) > > > > { > > > > > > > > /* > > > > > > > > @@ -836,6 +855,18 @@ static int __trace_kprobe_create(int argc, const > > > > char > > > > *argv[])> > > > > > > > > } > > > > > > > > } > > > > > > > > + /* > > > > + * If user specifies KSYM, we check it does not correspond to > > > > several > > > > + * symbols. > > > > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > > > > + * he/she should use ADDR rather than KSYM to remove the ambiguity. > > > > + */ > > > > + if (symbol && func_name_several_symbols(symbol)) { > > > > > > Then, here will be > > > > > > if (symbol && !func_name_is_unique(symbol)) { > > > > I am fine with the above, but it means if users gives an unknown symbol, > > we > > will return EADDRNOTAVAIL instead of currently returning ENOENT. > > Is it OK? > > Ah, good catch! Hm, then what about 'int number_of_same_symbols()' ? > > > if (symbol) { > num = number_of_same_symbols(symbol); > if (num > 1) > return -EADDRNOTAVAIL; > else if (num == 0) > return -ENOENT; > } Done in the v3 :D! > Thank you, > > > > > + ret = -EADDRNOTAVAIL; > > > > + > > > > + goto error; > > > > + } > > > > + > > > > > > > > trace_probe_log_set_index(0); > > > > if (event) { > > > > > > > > ret = traceprobe_parse_event_name(&event, &group, gbuf, > > > > > > > > @@ -1699,6 +1730,7 @@ static int unregister_kprobe_event(struct > > > > trace_kprobe *tk)> > > > > > > > > } > > > > > > > > #ifdef CONFIG_PERF_EVENTS > > > > > > > > + > > > > > > > > /* create a trace_kprobe, but don't add it to global lists */ > > > > struct trace_event_call * > > > > create_local_trace_kprobe(char *func, void *addr, unsigned long offs, > > > > > > > > @@ -1709,6 +1741,16 @@ create_local_trace_kprobe(char *func, void > > > > *addr, > > > > unsigned long offs,> > > > > > > > > int ret; > > > > char *event; > > > > > > > > + /* > > > > + * If user specifies func, we check that function name does not > > > > + * correspond to several symbols. > > > > + * If this is the case, we return EADDRNOTAVAIL to indicate the user > > > > + * he/she should use addr and offs rather than func to remove the > > > > + * ambiguity. > > > > + */ > > > > + if (func && func_name_several_symbols(func)) > > > > > > Ditto. > > > > > > Thanks! > > > > > > > + return ERR_PTR(-EADDRNOTAVAIL); > > > > + > > > > > > > > /* > > > > > > > > * local trace_kprobes are not added to dyn_event, so they are never > > > > * searched in find_trace_kprobe(). Therefore, there is no concern > > > > of > > > > Best regards. ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2023-08-24 16:10 UTC | newest] Thread overview: 6+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2023-08-24 10:37 [RFC PATCH v2 0/1] Return EADDRNOTAVAIL when func matches several symbols during kprobe creation Francis Laniel 2023-08-24 10:37 ` [RFC PATCH v2 1/1] tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols Francis Laniel 2023-08-24 13:02 ` Masami Hiramatsu 2023-08-24 14:31 ` Francis Laniel 2023-08-24 14:47 ` Masami Hiramatsu 2023-08-24 16:09 ` Francis Laniel
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).