Message ID | 20240125073923.2252057-1-yebin10@huawei.com |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-38082-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:2553:b0:103:945f:af90 with SMTP id p19csp1477017dyi; Wed, 24 Jan 2024 23:39:09 -0800 (PST) X-Google-Smtp-Source: AGHT+IHFTAFgpwMbwcnhHelxbXq4QcLUAyVf4LYa2wsjO9bs8wrms8ygq0tbyRTfdxBrjWcrvwh3 X-Received: by 2002:a05:620a:1:b0:781:3a8a:8eca with SMTP id j1-20020a05620a000100b007813a8a8ecamr787927qki.46.1706168349717; Wed, 24 Jan 2024 23:39:09 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706168349; cv=pass; d=google.com; s=arc-20160816; b=BJaj/7s63prE6v7nQWWnpykZayBSILUat9JLtbQ4JadzoCgjufJKgDh/yUzmwxJB/L hwGustfyqpk9jFnXdzDx7cmoOdECvnTqBnHEs2vFfP57WDvKlY8GmKvLlgwqMU0E65zU x3Kj57RztXWkTXv21oQKD/RLExlGFXys18t4BmzlcrkobnZ3qYFMgW8XelKaFGaXXNSO +ZJRwLsghEh01W1xOrVgElxYR7XZETKRlt7SpULw+RHt9JweoUXYOFnoaiAucIESIjjG OOi6Y95ijRZ0tqCJzPksyPt/2rxDrcRINCDDSd0z8xV4vNJcU+nJOxExqeLzlgxRfy/z kh6Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=7LCevDc/sxasNxhfnH5r6nXM7hArveRxnxy8zo0LTcA=; fh=Us/DORbzHj5XmgnBeJW+VlCBdo2pSXKHAejHonylCvY=; b=B8B3LRnqcYT+stZqpLa4rAcsQiLvvuTkYnY0p0FxLBFzLj8oTKDa7D/yJVA0QhtUyN hQV0elExmXD1LwXqmT/M9Dn0mNVTlIuKkg4HerKp9tOXwBRG+7Uvo7WI8hFlbFwiEuMl GA2IoyQNex1rW+5eGBa9EChlujX/WjO4ISstgYKtUkU9UoC6aOasOgGDkMwpO5w4Kmk+ pdc6lio/z6W9mXN+EOAkUT9y0xvA0WnbLBvPkeJZXwU3G83C7nCQ/xmQFg/jxKOacAuc K47h7s4PfYKjRBOSZMCrS/RwL384pxVf30UpW9la2az8HFZuZW18v23NDqWoRdg6hPhm i7BQ== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=huawei.com dmarc=pass fromdomain=huawei.com); spf=pass (google.com: domain of linux-kernel+bounces-38082-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-38082-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id bp42-20020a05620a45aa00b0078326a6f8c2si13368140qkb.404.2024.01.24.23.39.09 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Jan 2024 23:39:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-38082-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=huawei.com dmarc=pass fromdomain=huawei.com); spf=pass (google.com: domain of linux-kernel+bounces-38082-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-38082-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 5DF0A1C228CB for <ouuuleilei@gmail.com>; Thu, 25 Jan 2024 07:39:09 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 77FC9134A3; Thu, 25 Jan 2024 07:38:50 +0000 (UTC) Received: from szxga07-in.huawei.com (szxga07-in.huawei.com [45.249.212.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5BD5C12B66; Thu, 25 Jan 2024 07:38:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.249.212.35 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706168328; cv=none; b=npt1i9MCrKQsmf8iSQ0T7PxxYzq5GL8wZ8iOegunGs+EhLEixr06rSs8exrtjO0zLCDfhlUVoyBX6FcRJEbNnG60RhCXhNZu9ZL+Zsg5Q2kt4gUOhrGHocoBRYDC6s3xJwkCLXPUpssmpmXlFTZOY9vh/Bpw4whnKHKMUcIEmXU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706168328; c=relaxed/simple; bh=M/cXM+bzz+FgkUlXZ4uVPd0XapBvnJkUwgDAbNphc/g=; h=From:To:CC:Subject:Date:Message-ID:MIME-Version:Content-Type; b=g9GM7MsXMeKJUD6trm10Rn5rDBbI+ocgFG79o6fQeNZo2dCFhtLfA1zmtxoo0E8yHYTj1/A1ZbsUjzvGm1DmO8Rj0qWHNSFXK2fPIUHV/GjrVY9UemafzO4Drw+m4c2WAW9KS3B6UHVAXE+unA8+gdFambActywtdmJ5DZL7k+o= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com; spf=pass smtp.mailfrom=huawei.com; arc=none smtp.client-ip=45.249.212.35 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Received: from mail.maildlp.com (unknown [172.19.162.112]) by szxga07-in.huawei.com (SkyGuard) with ESMTP id 4TLCMG1ZW8z1Q8Cm; Thu, 25 Jan 2024 15:36:58 +0800 (CST) Received: from canpemm500010.china.huawei.com (unknown [7.192.105.118]) by mail.maildlp.com (Postfix) with ESMTPS id 98E1D14011B; Thu, 25 Jan 2024 15:38:28 +0800 (CST) Received: from huawei.com (10.175.127.227) by canpemm500010.china.huawei.com (7.192.105.118) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 25 Jan 2024 15:36:50 +0800 From: Ye Bin <yebin10@huawei.com> To: <rostedt@goodmis.org>, <mhiramat@kernel.org>, <mathieu.desnoyers@efficios.com>, <linux-trace-kernel@vger.kernel.org> CC: <linux-kernel@vger.kernel.org>, <yebin10@huawei.com> Subject: [PATCH v5 0/8] support '%pd' and '%pD' for print file name Date: Thu, 25 Jan 2024 15:39:15 +0800 Message-ID: <20240125073923.2252057-1-yebin10@huawei.com> X-Mailer: git-send-email 2.31.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To canpemm500010.china.huawei.com (7.192.105.118) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1789047183932193280 X-GMAIL-MSGID: 1789047183932193280 |
Series |
support '%pd' and '%pD' for print file name
|
|
Message
Ye Bin
Jan. 25, 2024, 7:39 a.m. UTC
During fault locating, the file name needs to be printed based on the dentry/file address. The offset needs to be calculated each time, which is troublesome. Similar to printk, kprobe supports printing file names for dentry/file addresses. Diff v5 vs v4: 1. Use glob_match() instead of str_has_suffix(), so remove the first patch; 2. Allocate buffer from heap for expand dentry; 3. Support "%pd/%pD" print type for fprobe; 4. Use $arg1 instead of origin register in test case; 5. Add test case for fprobe; Diff v4 vs v3: 1. Use "argv[i][idx + 3] == 'd'" instead of "argv[i][strlen(argv[i]) - 1] == 'd'" to judge print format in PATCH[4/7]; Diff v3 vs v2: 1. Return the index of where the suffix was found in str_has_suffix(); Diff v2 vs v1: 1. Use "%pd/%pD" print format instead of "pd/pD" print format; 2. Add "%pd/%pD" in README; 3. Expand "%pd/%pD" argument before parameter parsing; 4. Add more detail information in ftrace documentation; 5. Add test cases for new print format in selftests/ftrace; Ye Bin (8): tracing/probes: add traceprobe_expand_dentry_args() helper tracing/probes: support '%pd' type for print struct dentry's name tracing/probes: support '%pD' type for print struct file's name tracing/probes: support '%pd/%pD' type for fprobe tracing: add new type "%pd/%pD" in readme_msg[] Documentation: tracing: add new type '%pd' and '%pD' for kprobe selftests/ftrace: add kprobe test cases for VFS type "%pd" and "%pD" selftests/ftrace: add fprobe test cases for VFS type "%pd" and "%pD" Documentation/trace/kprobetrace.rst | 8 ++- kernel/trace/trace.c | 2 +- kernel/trace/trace_fprobe.c | 6 ++ kernel/trace/trace_kprobe.c | 6 ++ kernel/trace/trace_probe.c | 63 +++++++++++++++++++ kernel/trace/trace_probe.h | 2 + .../ftrace/test.d/dynevent/fprobe_args_vfs.tc | 40 ++++++++++++ .../ftrace/test.d/kprobe/kprobe_args_vfs.tc | 43 +++++++++++++ 8 files changed, 167 insertions(+), 3 deletions(-) create mode 100644 tools/testing/selftests/ftrace/test.d/dynevent/fprobe_args_vfs.tc create mode 100644 tools/testing/selftests/ftrace/test.d/kprobe/kprobe_args_vfs.tc
Comments
Hi Ye, On Thu, 25 Jan 2024 15:39:16 +0800 Ye Bin <yebin10@huawei.com> wrote: > Add traceprobe_expand_dentry_args() to expand dentry args. this API is > prepare to support "%pd" print format for kprobe. > > Signed-off-by: Ye Bin <yebin10@huawei.com> > --- > kernel/trace/trace_probe.c | 50 ++++++++++++++++++++++++++++++++++++++ > kernel/trace/trace_probe.h | 2 ++ > 2 files changed, 52 insertions(+) > > diff --git a/kernel/trace/trace_probe.c b/kernel/trace/trace_probe.c > index 4dc74d73fc1d..0c1caf0f474a 100644 > --- a/kernel/trace/trace_probe.c > +++ b/kernel/trace/trace_probe.c > @@ -1565,6 +1565,56 @@ const char **traceprobe_expand_meta_args(int argc, const char *argv[], > return ERR_PTR(ret); > } > > +/* @buf: *buf must be equal to NULL. Caller must to free *buf */ > +int traceprobe_expand_dentry_args(int argc, const char *argv[], char **buf) > +{ > + int i, used, ret; > + int bufsize = MAX_DENTRY_ARGS_LEN; nit: this bufsize is consistent, thus you should use the MAX_DENTRY_ARGS_LEN directly. (or add 'const' or maybe you can update bufsize as remaining size) Thanks, > + char *tmpbuf = NULL; > + > + if (*buf) > + return -EINVAL; > + > + used = 0; > + for (i = 0; i < argc; i++) { > + if (glob_match("*:%pd", argv[i])) { > + char *tmp; > + char *equal; > + > + if (!tmpbuf) { > + tmpbuf = kmalloc(bufsize, GFP_KERNEL); > + if (!tmpbuf) > + return -ENOMEM; > + } > + > + tmp = kstrdup(argv[i], GFP_KERNEL); > + if (!tmp) > + goto nomem; > + > + equal = strchr(tmp, '='); > + if (equal) > + *equal = '\0'; > + tmp[strlen(argv[i]) - 4] = '\0'; > + ret = snprintf(tmpbuf + used, bufsize - used, > + "%s%s+0x0(+0x%zx(%s)):string", > + equal ? tmp : "", equal ? "=" : "", > + offsetof(struct dentry, d_name.name), > + equal ? equal + 1 : tmp); > + kfree(tmp); > + if (ret >= bufsize - used) > + goto nomem; > + argv[i] = tmpbuf + used; > + used += ret + 1; > + } > + } > + > + *buf = tmpbuf; > + return 0; > +nomem: > + kfree(tmpbuf); > + return -ENOMEM; > +} > + > void traceprobe_finish_parse(struct traceprobe_parse_context *ctx) > { > clear_btf_context(ctx); > diff --git a/kernel/trace/trace_probe.h b/kernel/trace/trace_probe.h > index 850d9ecb6765..5800513439f3 100644 > --- a/kernel/trace/trace_probe.h > +++ b/kernel/trace/trace_probe.h > @@ -34,6 +34,7 @@ > #define MAX_ARRAY_LEN 64 > #define MAX_ARG_NAME_LEN 32 > #define MAX_BTF_ARGS_LEN 128 > +#define MAX_DENTRY_ARGS_LEN 256 > #define MAX_STRING_SIZE PATH_MAX > #define MAX_ARG_BUF_LEN (MAX_TRACE_ARGS * MAX_ARG_NAME_LEN) > > @@ -402,6 +403,7 @@ extern int traceprobe_parse_probe_arg(struct trace_probe *tp, int i, > const char **traceprobe_expand_meta_args(int argc, const char *argv[], > int *new_argc, char *buf, int bufsize, > struct traceprobe_parse_context *ctx); > +extern int traceprobe_expand_dentry_args(int argc, const char *argv[], char **buf); > > extern int traceprobe_update_arg(struct probe_arg *arg); > extern void traceprobe_free_probe_arg(struct probe_arg *arg); > -- > 2.31.1 >
On Thu, 25 Jan 2024 15:39:19 +0800 Ye Bin <yebin10@huawei.com> wrote: > Support print type '%pd/%pD' for print dentry's or file's name. > nit: Looks good to me. but the patch ordering seems a bit strange. This should be next to [2/8]. Acked-by: Masami Hiramatsu (Google) <mhiramat@kernel.org> Thank you, > Signed-off-by: Ye Bin <yebin10@huawei.com> > --- > kernel/trace/trace_fprobe.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/kernel/trace/trace_fprobe.c b/kernel/trace/trace_fprobe.c > index 7d2ddbcfa377..988d68e906ad 100644 > --- a/kernel/trace/trace_fprobe.c > +++ b/kernel/trace/trace_fprobe.c > @@ -976,6 +976,7 @@ static int __trace_fprobe_create(int argc, const char *argv[]) > char gbuf[MAX_EVENT_NAME_LEN]; > char sbuf[KSYM_NAME_LEN]; > char abuf[MAX_BTF_ARGS_LEN]; > + char *dbuf = NULL; > bool is_tracepoint = false; > struct tracepoint *tpoint = NULL; > struct traceprobe_parse_context ctx = { > @@ -1086,6 +1087,10 @@ static int __trace_fprobe_create(int argc, const char *argv[]) > argv = new_argv; > } > > + ret = traceprobe_expand_dentry_args(argc, argv, &dbuf); > + if (ret) > + goto out; > + > /* setup a probe */ > tf = alloc_trace_fprobe(group, event, symbol, tpoint, maxactive, > argc, is_return); > @@ -1131,6 +1136,7 @@ static int __trace_fprobe_create(int argc, const char *argv[]) > trace_probe_log_clear(); > kfree(new_argv); > kfree(symbol); > + kfree(dbuf); > return ret; > > parse_error: > -- > 2.31.1 >