From nobody Thu Dec 26 23:14:09 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 72ED8146D76; Fri, 29 Nov 2024 16:47:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898873; cv=none; b=EONIU05T0GfABKaE5ZABMGZifdkWPXh1mFUeiGhpt8WYSwEGkZfPO4ST5WSbBwDkWSrfKSw55xv4fu+/V3wXKyGiGw6cCrqYRgZ8DYUBDNblAOX4T093GxaVp83XvELm0BZ9H9beKmoV2iLmR75mjwlTfIs55RnpX5pLeBHapeU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898873; c=relaxed/simple; bh=OUbH2yDyiXtr4xG2OF1k8+O5wk66wGWYCe1qQImrZI0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=JP4tnRrSi4SbGJPd4PMZDau4k6/1T+v+ug/jmKUsRTT4LuBqOanO7V7FO1MmbtmrA9kDRt9zbxhBnVRXFLMldJklS+nxFbmjRBt77cOnrSq/0PS2vuK0YdH5FkwIFJVmOT9vLg4aWMchnEbqMVEwi4GYF6v4UFX7VjaMBqchWtk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=rodo0E3u; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="rodo0E3u" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 77342C4CECF; Fri, 29 Nov 2024 16:47:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732898873; bh=OUbH2yDyiXtr4xG2OF1k8+O5wk66wGWYCe1qQImrZI0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rodo0E3ucGOXZtm+E9Nh9EYunpwfCGafZ568xD4A5Z+93CVl46qgPTfdXBLLO9oIU CBuVMiTD/9gIMq8UX3koBHxmXggg3GcOJgFA3BiSX1JZT74C8E3o1x3Z1Nld+77LsU jeZm9znsWXg9Kvap+JKtlueu0FmRafVoFilnQnSRd6NgU9oSBX8s2YRTfX2j/f/tKy pAggNK5t/Vk2aVUNTGzpOsxA+GNz2hyzJrlIKWJj6vh1lBo+nkgY2+F+rxsCkeBQaR u6Xe+Znbs3SWJ1O0nvRHw+M72Bc04wl/t1hZi9hOjHtsuP6L1MCZ4uTlWWGSMzOQEl u7Ux8ZX6255Wg== From: "Masami Hiramatsu (Google)" To: Steven Rostedt , Naveen N Rao Cc: Anil S Keshavamurthy , Masami Hiramatsu , "David S . Miller" , Mathieu Desnoyers , Oleg Nesterov , Tzvetomir Stoyanov , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v2 1/6] tracing/eprobe: Fix to release eprobe when failed to add dyn_event Date: Sat, 30 Nov 2024 01:47:47 +0900 Message-ID: <173289886698.73724.1959899350183686006.stgit@devnote2> X-Mailer: git-send-email 2.43.0 In-Reply-To: <173289885627.73724.13632317993038475335.stgit@devnote2> References: <173289885627.73724.13632317993038475335.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Masami Hiramatsu (Google) Fix eprobe event to unregister event call and release eprobe when it fails to add dynamic event correctly. Fixes: 7491e2c44278 ("tracing: Add a probe that attaches to trace events") Signed-off-by: Masami Hiramatsu (Google) --- kernel/trace/trace_eprobe.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/kernel/trace/trace_eprobe.c b/kernel/trace/trace_eprobe.c index ebda68ee9abf..be8be0c1aaf0 100644 --- a/kernel/trace/trace_eprobe.c +++ b/kernel/trace/trace_eprobe.c @@ -963,6 +963,11 @@ static int __trace_eprobe_create(int argc, const char = *argv[]) goto error; } ret =3D dyn_event_add(&ep->devent, &ep->tp.event->call); + if (ret < 0) { + trace_probe_unregister_event_call(&ep->tp); + mutex_unlock(&event_mutex); + goto error; + } mutex_unlock(&event_mutex); return ret; parse_error: From nobody Thu Dec 26 23:14:09 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0137119C54D; Fri, 29 Nov 2024 16:48:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898884; cv=none; b=eturyf7HypEulJfrvkrUWgGNicxgV6wkTZDzEr2mOTrAoh8wuT+fFEw4/SVgEwUCkBBMQYK5bUb6NWPrbowguN9GJl3leno64fx8p6+ypBaXs1kl/124FoaARSMf5Us3mrxXax2603lVRVm6EnIg/2bc+95U4oIYulTmhBeeWCs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898884; c=relaxed/simple; bh=cLxIbSGBoRaPw3169/Ujnl5h46Pq1YmSYLjEwUEjjI4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=X3alxcuV8JpTRmNxIQD3ayIdq0CWuZeUTw0P4+wl4pVQ451YsSb1Ait1iHVtXOl8uvDATQ7s6pGtxTq601DCH/jAVkcF7EWVktaQoKEvZ4jIkNYiGpu1wfkZcBW43aqPFtkDhwXmYPQ6VKhJPIMdjueNLtY4BBP9XxzfJ2Epbh4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=p0ENWV5f; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="p0ENWV5f" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A178AC4CECF; Fri, 29 Nov 2024 16:48:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732898883; bh=cLxIbSGBoRaPw3169/Ujnl5h46Pq1YmSYLjEwUEjjI4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=p0ENWV5f8UnLZ1wJ0txhZnsWVicVguA5Jn3cj+/RzUcLKS1hiaUQ6ImdlXyss3KO5 5PXbvgb9rfNPJKqqybXOfhzmZ7gSO5HD1qpxU+LiO00PRrofxj5GSkqqlObxX0dnjm yTV6R4WWBXEo28FzYVjqOChMnLaIvmnPXdPoltdIFfzDjs8bs7l7CyCf73U98RdZMh CYj/SHoSxYAoQtzj1rDoctyiCfApEgeu1o0H1x/LKD8cQKra96MBAs4m5MPcMXg3TJ 0R/xtG0LXOOoMzMK1pPjJZy9InUAA+u8PVBhVwvFUjDX2p/NyLmEu2UdKNjeDd9Ynj d2EBXASXvPT+Q== From: "Masami Hiramatsu (Google)" To: Steven Rostedt , Naveen N Rao Cc: Anil S Keshavamurthy , Masami Hiramatsu , "David S . Miller" , Mathieu Desnoyers , Oleg Nesterov , Tzvetomir Stoyanov , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v2 2/6] kprobes: Adopt guard() and scoped_guard() Date: Sat, 30 Nov 2024 01:47:58 +0900 Message-ID: <173289887835.73724.608223217359025939.stgit@devnote2> X-Mailer: git-send-email 2.43.0 In-Reply-To: <173289885627.73724.13632317993038475335.stgit@devnote2> References: <173289885627.73724.13632317993038475335.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Masami Hiramatsu (Google) Use guard() or scoped_guard() for critical sections rather than discrete lock/unlock pairs. Signed-off-by: Masami Hiramatsu (Google) --- kernel/kprobes.c | 205 +++++++++++++++++++++++---------------------------= ---- 1 file changed, 89 insertions(+), 116 deletions(-) diff --git a/kernel/kprobes.c b/kernel/kprobes.c index cb9dbdafbbcf..62b5b08d809d 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -141,10 +141,9 @@ static int collect_garbage_slots(struct kprobe_insn_ca= che *c); kprobe_opcode_t *__get_insn_slot(struct kprobe_insn_cache *c) { struct kprobe_insn_page *kip; - kprobe_opcode_t *slot =3D NULL; =20 /* Since the slot array is not protected by rcu, we need a mutex */ - mutex_lock(&c->mutex); + guard(mutex)(&c->mutex); retry: rcu_read_lock(); list_for_each_entry_rcu(kip, &c->pages, list) { @@ -155,9 +154,8 @@ kprobe_opcode_t *__get_insn_slot(struct kprobe_insn_cac= he *c) if (kip->slot_used[i] =3D=3D SLOT_CLEAN) { kip->slot_used[i] =3D SLOT_USED; kip->nused++; - slot =3D kip->insns + (i * c->insn_size); rcu_read_unlock(); - goto out; + return kip->insns + (i * c->insn_size); } } /* kip->nused is broken. Fix it. */ @@ -174,12 +172,12 @@ kprobe_opcode_t *__get_insn_slot(struct kprobe_insn_c= ache *c) /* All out of space. Need to allocate a new page. */ kip =3D kmalloc(struct_size(kip, slot_used, slots_per_page(c)), GFP_KERNE= L); if (!kip) - goto out; + return NULL; =20 kip->insns =3D c->alloc(); if (!kip->insns) { kfree(kip); - goto out; + return NULL; } INIT_LIST_HEAD(&kip->list); memset(kip->slot_used, SLOT_CLEAN, slots_per_page(c)); @@ -188,14 +186,12 @@ kprobe_opcode_t *__get_insn_slot(struct kprobe_insn_c= ache *c) kip->ngarbage =3D 0; kip->cache =3D c; list_add_rcu(&kip->list, &c->pages); - slot =3D kip->insns; =20 /* Record the perf ksymbol register event after adding the page */ perf_event_ksymbol(PERF_RECORD_KSYMBOL_TYPE_OOL, (unsigned long)kip->insn= s, PAGE_SIZE, false, c->sym); -out: - mutex_unlock(&c->mutex); - return slot; + + return kip->insns; } =20 /* Return true if all garbages are collected, otherwise false. */ @@ -256,7 +252,7 @@ void __free_insn_slot(struct kprobe_insn_cache *c, struct kprobe_insn_page *kip; long idx; =20 - mutex_lock(&c->mutex); + guard(mutex)(&c->mutex); rcu_read_lock(); list_for_each_entry_rcu(kip, &c->pages, list) { idx =3D ((long)slot - (long)kip->insns) / @@ -282,7 +278,6 @@ void __free_insn_slot(struct kprobe_insn_cache *c, collect_one_slot(kip, idx); } } - mutex_unlock(&c->mutex); } =20 /* @@ -638,10 +633,9 @@ static void kprobe_optimizer(struct work_struct *work) mutex_unlock(&kprobe_mutex); } =20 -/* Wait for completing optimization and unoptimization */ -void wait_for_kprobe_optimizer(void) +static void wait_for_kprobe_optimizer_locked(void) { - mutex_lock(&kprobe_mutex); + lockdep_assert_held(&kprobe_mutex); =20 while (!list_empty(&optimizing_list) || !list_empty(&unoptimizing_list)) { mutex_unlock(&kprobe_mutex); @@ -653,8 +647,14 @@ void wait_for_kprobe_optimizer(void) =20 mutex_lock(&kprobe_mutex); } +} =20 - mutex_unlock(&kprobe_mutex); +/* Wait for completing optimization and unoptimization */ +void wait_for_kprobe_optimizer(void) +{ + guard(mutex)(&kprobe_mutex); + + wait_for_kprobe_optimizer_locked(); } =20 bool optprobe_queued_unopt(struct optimized_kprobe *op) @@ -884,10 +884,10 @@ static void optimize_all_kprobes(void) struct kprobe *p; unsigned int i; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); /* If optimization is already allowed, just return. */ if (kprobes_allow_optimization) - goto out; + return; =20 cpus_read_lock(); kprobes_allow_optimization =3D true; @@ -899,8 +899,6 @@ static void optimize_all_kprobes(void) } cpus_read_unlock(); pr_info("kprobe jump-optimization is enabled. All kprobes are optimized i= f possible.\n"); -out: - mutex_unlock(&kprobe_mutex); } =20 #ifdef CONFIG_SYSCTL @@ -910,12 +908,10 @@ static void unoptimize_all_kprobes(void) struct kprobe *p; unsigned int i; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); /* If optimization is already prohibited, just return. */ - if (!kprobes_allow_optimization) { - mutex_unlock(&kprobe_mutex); + if (!kprobes_allow_optimization) return; - } =20 cpus_read_lock(); kprobes_allow_optimization =3D false; @@ -927,10 +923,8 @@ static void unoptimize_all_kprobes(void) } } cpus_read_unlock(); - mutex_unlock(&kprobe_mutex); - /* Wait for unoptimizing completion. */ - wait_for_kprobe_optimizer(); + wait_for_kprobe_optimizer_locked(); pr_info("kprobe jump-optimization is disabled. All kprobes are based on s= oftware breakpoint.\n"); } =20 @@ -942,7 +936,7 @@ static int proc_kprobes_optimization_handler(const stru= ct ctl_table *table, { int ret; =20 - mutex_lock(&kprobe_sysctl_mutex); + guard(mutex)(&kprobe_sysctl_mutex); sysctl_kprobes_optimization =3D kprobes_allow_optimization ? 1 : 0; ret =3D proc_dointvec_minmax(table, write, buffer, length, ppos); =20 @@ -950,7 +944,6 @@ static int proc_kprobes_optimization_handler(const stru= ct ctl_table *table, optimize_all_kprobes(); else unoptimize_all_kprobes(); - mutex_unlock(&kprobe_sysctl_mutex); =20 return ret; } @@ -1025,7 +1018,8 @@ static void __disarm_kprobe(struct kprobe *p, bool re= opt) #define __arm_kprobe(p) arch_arm_kprobe(p) #define __disarm_kprobe(p, o) arch_disarm_kprobe(p) #define kprobe_disarmed(p) kprobe_disabled(p) -#define wait_for_kprobe_optimizer() do {} while (0) +#define wait_for_kprobe_optimizer_locked() \ + lockdep_assert_held(&kprobe_mutex) =20 static int reuse_unused_kprobe(struct kprobe *ap) { @@ -1489,6 +1483,7 @@ _kprobe_addr(kprobe_opcode_t *addr, const char *symbo= l_name, static kprobe_opcode_t *kprobe_addr(struct kprobe *p) { bool on_func_entry; + return _kprobe_addr(p->addr, p->symbol_name, p->offset, &on_func_entry); } =20 @@ -1523,14 +1518,12 @@ static struct kprobe *__get_valid_kprobe(struct kpr= obe *p) */ static inline int warn_kprobe_rereg(struct kprobe *p) { - int ret =3D 0; + guard(mutex)(&kprobe_mutex); =20 - mutex_lock(&kprobe_mutex); if (WARN_ON_ONCE(__get_valid_kprobe(p))) - ret =3D -EINVAL; - mutex_unlock(&kprobe_mutex); + return -EINVAL; =20 - return ret; + return 0; } =20 static int check_ftrace_location(struct kprobe *p) @@ -1618,44 +1611,17 @@ static int check_kprobe_address_safe(struct kprobe = *p, return ret; } =20 -int register_kprobe(struct kprobe *p) +static int __register_kprobe(struct kprobe *p) { int ret; struct kprobe *old_p; - struct module *probed_mod; - kprobe_opcode_t *addr; - bool on_func_entry; - - /* Adjust probe address from symbol */ - addr =3D _kprobe_addr(p->addr, p->symbol_name, p->offset, &on_func_entry); - if (IS_ERR(addr)) - return PTR_ERR(addr); - p->addr =3D addr; - - ret =3D warn_kprobe_rereg(p); - if (ret) - return ret; =20 - /* User can pass only KPROBE_FLAG_DISABLED to register_kprobe */ - p->flags &=3D KPROBE_FLAG_DISABLED; - p->nmissed =3D 0; - INIT_LIST_HEAD(&p->list); - - ret =3D check_kprobe_address_safe(p, &probed_mod); - if (ret) - return ret; - - mutex_lock(&kprobe_mutex); - - if (on_func_entry) - p->flags |=3D KPROBE_FLAG_ON_FUNC_ENTRY; + guard(mutex)(&kprobe_mutex); =20 old_p =3D get_kprobe(p->addr); - if (old_p) { + if (old_p) /* Since this may unoptimize 'old_p', locking 'text_mutex'. */ - ret =3D register_aggr_kprobe(old_p, p); - goto out; - } + return register_aggr_kprobe(old_p, p); =20 cpus_read_lock(); /* Prevent text modification */ @@ -1664,7 +1630,7 @@ int register_kprobe(struct kprobe *p) mutex_unlock(&text_mutex); cpus_read_unlock(); if (ret) - goto out; + return ret; =20 INIT_HLIST_NODE(&p->hlist); hlist_add_head_rcu(&p->hlist, @@ -1675,14 +1641,43 @@ int register_kprobe(struct kprobe *p) if (ret) { hlist_del_rcu(&p->hlist); synchronize_rcu(); - goto out; } } =20 /* Try to optimize kprobe */ try_to_optimize_kprobe(p); -out: - mutex_unlock(&kprobe_mutex); + return 0; +} + +int register_kprobe(struct kprobe *p) +{ + int ret; + struct module *probed_mod; + kprobe_opcode_t *addr; + bool on_func_entry; + + /* Canonicalize probe address from symbol */ + addr =3D _kprobe_addr(p->addr, p->symbol_name, p->offset, &on_func_entry); + if (IS_ERR(addr)) + return PTR_ERR(addr); + p->addr =3D addr; + + ret =3D warn_kprobe_rereg(p); + if (ret) + return ret; + + /* User can pass only KPROBE_FLAG_DISABLED to register_kprobe */ + p->flags &=3D KPROBE_FLAG_DISABLED; + if (on_func_entry) + p->flags |=3D KPROBE_FLAG_ON_FUNC_ENTRY; + p->nmissed =3D 0; + INIT_LIST_HEAD(&p->list); + + ret =3D check_kprobe_address_safe(p, &probed_mod); + if (ret) + return ret; + + ret =3D __register_kprobe(p); =20 if (probed_mod) module_put(probed_mod); @@ -1858,12 +1853,11 @@ void unregister_kprobes(struct kprobe **kps, int nu= m) =20 if (num <=3D 0) return; - mutex_lock(&kprobe_mutex); - for (i =3D 0; i < num; i++) - if (__unregister_kprobe_top(kps[i]) < 0) - kps[i]->addr =3D NULL; - mutex_unlock(&kprobe_mutex); - + scoped_guard(mutex, &kprobe_mutex) { + for (i =3D 0; i < num; i++) + if (__unregister_kprobe_top(kps[i]) < 0) + kps[i]->addr =3D NULL; + } synchronize_rcu(); for (i =3D 0; i < num; i++) if (kps[i]->addr) @@ -2302,8 +2296,9 @@ void unregister_kretprobes(struct kretprobe **rps, in= t num) =20 if (num <=3D 0) return; - mutex_lock(&kprobe_mutex); for (i =3D 0; i < num; i++) { + guard(mutex)(&kprobe_mutex); + if (__unregister_kprobe_top(&rps[i]->kp) < 0) rps[i]->kp.addr =3D NULL; #ifdef CONFIG_KRETPROBE_ON_RETHOOK @@ -2312,7 +2307,6 @@ void unregister_kretprobes(struct kretprobe **rps, in= t num) rcu_assign_pointer(rps[i]->rph->rp, NULL); #endif } - mutex_unlock(&kprobe_mutex); =20 synchronize_rcu(); for (i =3D 0; i < num; i++) { @@ -2393,18 +2387,14 @@ static void kill_kprobe(struct kprobe *p) /* Disable one kprobe */ int disable_kprobe(struct kprobe *kp) { - int ret =3D 0; struct kprobe *p; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); =20 /* Disable this kprobe */ p =3D __disable_kprobe(kp); - if (IS_ERR(p)) - ret =3D PTR_ERR(p); =20 - mutex_unlock(&kprobe_mutex); - return ret; + return IS_ERR(p) ? PTR_ERR(p) : 0; } EXPORT_SYMBOL_GPL(disable_kprobe); =20 @@ -2414,20 +2404,16 @@ int enable_kprobe(struct kprobe *kp) int ret =3D 0; struct kprobe *p; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); =20 /* Check whether specified probe is valid. */ p =3D __get_valid_kprobe(kp); - if (unlikely(p =3D=3D NULL)) { - ret =3D -EINVAL; - goto out; - } + if (unlikely(p =3D=3D NULL)) + return -EINVAL; =20 - if (kprobe_gone(kp)) { + if (kprobe_gone(kp)) /* This kprobe has gone, we couldn't enable it. */ - ret =3D -EINVAL; - goto out; - } + return -EINVAL; =20 if (p !=3D kp) kp->flags &=3D ~KPROBE_FLAG_DISABLED; @@ -2441,8 +2427,6 @@ int enable_kprobe(struct kprobe *kp) kp->flags |=3D KPROBE_FLAG_DISABLED; } } -out: - mutex_unlock(&kprobe_mutex); return ret; } EXPORT_SYMBOL_GPL(enable_kprobe); @@ -2630,11 +2614,11 @@ static int kprobes_module_callback(struct notifier_= block *nb, unsigned int i; int checkcore =3D (val =3D=3D MODULE_STATE_GOING); =20 - if (val =3D=3D MODULE_STATE_COMING) { - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); + + if (val =3D=3D MODULE_STATE_COMING) add_module_kprobe_blacklist(mod); - mutex_unlock(&kprobe_mutex); - } + if (val !=3D MODULE_STATE_GOING && val !=3D MODULE_STATE_LIVE) return NOTIFY_DONE; =20 @@ -2644,7 +2628,6 @@ static int kprobes_module_callback(struct notifier_bl= ock *nb, * notified, only '.init.text' section would be freed. We need to * disable kprobes which have been inserted in the sections. */ - mutex_lock(&kprobe_mutex); for (i =3D 0; i < KPROBE_TABLE_SIZE; i++) { head =3D &kprobe_table[i]; hlist_for_each_entry(p, head, hlist) @@ -2667,7 +2650,6 @@ static int kprobes_module_callback(struct notifier_bl= ock *nb, } if (val =3D=3D MODULE_STATE_GOING) remove_module_kprobe_blacklist(mod); - mutex_unlock(&kprobe_mutex); return NOTIFY_DONE; } =20 @@ -2695,7 +2677,7 @@ void kprobe_free_init_mem(void) struct kprobe *p; int i; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); =20 /* Kill all kprobes on initmem because the target code has been freed. */ for (i =3D 0; i < KPROBE_TABLE_SIZE; i++) { @@ -2705,8 +2687,6 @@ void kprobe_free_init_mem(void) kill_kprobe(p); } } - - mutex_unlock(&kprobe_mutex); } =20 static int __init init_kprobes(void) @@ -2902,11 +2882,11 @@ static int arm_all_kprobes(void) unsigned int i, total =3D 0, errors =3D 0; int err, ret =3D 0; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); =20 /* If kprobes are armed, just return */ if (!kprobes_all_disarmed) - goto already_enabled; + return 0; =20 /* * optimize_kprobe() called by arm_kprobe() checks @@ -2936,8 +2916,6 @@ static int arm_all_kprobes(void) else pr_info("Kprobes globally enabled\n"); =20 -already_enabled: - mutex_unlock(&kprobe_mutex); return ret; } =20 @@ -2948,13 +2926,11 @@ static int disarm_all_kprobes(void) unsigned int i, total =3D 0, errors =3D 0; int err, ret =3D 0; =20 - mutex_lock(&kprobe_mutex); + guard(mutex)(&kprobe_mutex); =20 /* If kprobes are already disarmed, just return */ - if (kprobes_all_disarmed) { - mutex_unlock(&kprobe_mutex); + if (kprobes_all_disarmed) return 0; - } =20 kprobes_all_disarmed =3D true; =20 @@ -2979,11 +2955,8 @@ static int disarm_all_kprobes(void) else pr_info("Kprobes globally disabled\n"); =20 - mutex_unlock(&kprobe_mutex); - /* Wait for disarming all kprobes by optimizer */ - wait_for_kprobe_optimizer(); - + wait_for_kprobe_optimizer_locked(); return ret; } From nobody Thu Dec 26 23:14:09 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 262DD14C5B3; Fri, 29 Nov 2024 16:48:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898894; cv=none; b=bzTv4O+tceVnnGfIZ/DiN7AntpSs/0L9BjOvPTWblXVtP8CVmNHH1On7hPO2UmuROcd6W2NuorVrj9bvWm6dRrsYGwQZnDfP70o9AhsQ6r4ez7tkvZnR9ixQLJvQcJyyx2v07nYLFkaTypWWO07BlA2SecFt/Alf8I+hj+OQwuM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898894; c=relaxed/simple; bh=lKW+UN1gtrpdcRVL8HfEsiSm3Hrt7GReKZv5w97QAsk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=kJuQhZGc+uqej9fAb76h9P++zg82DeqBctRenU7vcsdaN1BghhmYGjvYj04hU2Rh3RKXLMMUnf5zxqdGU3eUyoPs9/Zgufk6x46KpDsBmEnIflUfo9ZzDLH5Wuw0kyPlLThvL2xcrgpApzXA3kBXSdjFBNGgtspzNwBZn+5aQ0E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=BqkQQdPA; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="BqkQQdPA" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 497F6C4CECF; Fri, 29 Nov 2024 16:48:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732898893; bh=lKW+UN1gtrpdcRVL8HfEsiSm3Hrt7GReKZv5w97QAsk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BqkQQdPAEfiFQPKT1bwY1lfQ5e2sTpoxwx+o/H1iZsD3anJjG3Y4vmq6gm20HDqFO F3g7RPe6A1D5yOfahRxPnvkTZk7e5ngR6nZyRLT340Lq9FsvggPFULH5azz76jhf9t 6GUxQq2+W/dW+a2YRjINDQHIFVMCBecxFpi7CRLyHw/1qknPDeFysAmTV/bXoDRoyd lo4/Wl4iB4epy6aPiFo46s+cE0S8B9YtteZDo15rTD2hCIyhflnVtjMnro8C2ZUTUN 4KR8Ifv/W3e9/gYLVwTlORUNorBE9kfTrk0LI0yPKIDOQzGeZwcZeOg4bbJbc5a0rq OCqB1WoVlhgLQ== From: "Masami Hiramatsu (Google)" To: Steven Rostedt , Naveen N Rao Cc: Anil S Keshavamurthy , Masami Hiramatsu , "David S . Miller" , Mathieu Desnoyers , Oleg Nesterov , Tzvetomir Stoyanov , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v2 3/6] tracing/kprobe: Adopt guard() and scoped_guard() Date: Sat, 30 Nov 2024 01:48:08 +0900 Message-ID: <173289888883.73724.6586200652276577583.stgit@devnote2> X-Mailer: git-send-email 2.43.0 In-Reply-To: <173289885627.73724.13632317993038475335.stgit@devnote2> References: <173289885627.73724.13632317993038475335.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Masami Hiramatsu (Google) Use guard() or scoped_guard() in kprobe events for critical sections rather than discrete lock/unlock pairs. Signed-off-by: Masami Hiramatsu (Google) --- kernel/trace/trace_kprobe.c | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c index 263fac44d3ca..bae26eb14449 100644 --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -634,7 +634,7 @@ static int register_trace_kprobe(struct trace_kprobe *t= k) struct trace_kprobe *old_tk; int ret; =20 - mutex_lock(&event_mutex); + guard(mutex)(&event_mutex); =20 old_tk =3D find_trace_kprobe(trace_probe_name(&tk->tp), trace_probe_group_name(&tk->tp)); @@ -642,11 +642,9 @@ static int register_trace_kprobe(struct trace_kprobe *= tk) if (trace_kprobe_is_return(tk) !=3D trace_kprobe_is_return(old_tk)) { trace_probe_log_set_index(0); trace_probe_log_err(0, DIFF_PROBE_TYPE); - ret =3D -EEXIST; - } else { - ret =3D append_trace_kprobe(tk, old_tk); + return -EEXIST; } - goto end; + return append_trace_kprobe(tk, old_tk); } =20 /* Register new event */ @@ -657,7 +655,7 @@ static int register_trace_kprobe(struct trace_kprobe *t= k) trace_probe_log_err(0, EVENT_EXIST); } else pr_warn("Failed to register probe event(%d)\n", ret); - goto end; + return ret; } =20 /* Register k*probe */ @@ -672,8 +670,6 @@ static int register_trace_kprobe(struct trace_kprobe *t= k) else dyn_event_add(&tk->devent, trace_probe_event_call(&tk->tp)); =20 -end: - mutex_unlock(&event_mutex); return ret; } =20 @@ -706,7 +702,7 @@ static int trace_kprobe_module_callback(struct notifier= _block *nb, return NOTIFY_DONE; =20 /* Update probes on coming module */ - mutex_lock(&event_mutex); + guard(mutex)(&event_mutex); for_each_trace_kprobe(tk, pos) { if (trace_kprobe_within_module(tk, mod)) { /* Don't need to check busy - this should have gone. */ @@ -718,7 +714,6 @@ static int trace_kprobe_module_callback(struct notifier= _block *nb, module_name(mod), ret); } } - mutex_unlock(&event_mutex); =20 return NOTIFY_DONE; } @@ -1968,13 +1963,12 @@ static __init void enable_boot_kprobe_events(void) struct trace_kprobe *tk; struct dyn_event *pos; =20 - mutex_lock(&event_mutex); + guard(mutex)(&event_mutex); for_each_trace_kprobe(tk, pos) { list_for_each_entry(file, &tr->events, list) if (file->event_call =3D=3D trace_probe_event_call(&tk->tp)) trace_event_enable_disable(file, 1, 0); } - mutex_unlock(&event_mutex); } =20 static __init void setup_boot_kprobe_events(void) From nobody Thu Dec 26 23:14:09 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 05B2D19C54D; Fri, 29 Nov 2024 16:48:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898905; cv=none; b=MEG/QiKprpylwVnFXD+Ld3z/z207BR32lurZDEypADu2N00w+o65e0IeWaZiIwt1TPOZSiThfFSIMhrJy5qftgUwlQLGa95MfBfWYIyaimiX5YZZlzQyMb4mqtI6ITlx9XUgh8ltcmFpqydB+jy4CsnDLExu4mQH5eIaoQimj/0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898905; c=relaxed/simple; bh=Pn9iO5fb1Uyq2JUaftRQXEt+EqpdYbktQYXQ1bfxaiA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=bxO6xjeYqbPYHJmG0oGx8WAI4NMuyB9kTiKlpCXF0WJ4qZhKF6Vd0OtSTAPAblMdOIjCI0Y09yJ1ghtcLmrz+x3DSLbEkXP4sp8kKMey2g+NaYZRKO7xeIVk3yBAkD+PLrHj2Q14QAE3SdG/+HeTi8R/c2WJUTz78AgldAWsOSI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=o0UDwCI9; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="o0UDwCI9" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9D55DC4CECF; Fri, 29 Nov 2024 16:48:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732898904; bh=Pn9iO5fb1Uyq2JUaftRQXEt+EqpdYbktQYXQ1bfxaiA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=o0UDwCI9VqCr+CNIHvT6qT0Un3AUy7No8wzmF+b4fRipRYCEoKYG8jLxBKwke52Hu 0MPzdteR2npBaN0zdKjXAnCr8xRwPCT6ryO6W6HpIcPnEfNjgW1WSuAclkke7rMIaw cIpA1a8tE1Tf+/NHCWobJC0hfStyur/g7OSxMeMoZMFLfI9Zw/hojrLM6hOexgm5pp nBnC945fowFfK19moYbVIV5mmaOPtBxq4/owXYLK7H0+Ql2dfcWumEPECnjb3o3ekw bPZyc0B1DPAhxXO5RJXv3vK9DMekw47+CGwe8mslPWFPz8DcXvWQ0BIEP1saAowS/y r8D/vqbWeFUOA== From: "Masami Hiramatsu (Google)" To: Steven Rostedt , Naveen N Rao Cc: Anil S Keshavamurthy , Masami Hiramatsu , "David S . Miller" , Mathieu Desnoyers , Oleg Nesterov , Tzvetomir Stoyanov , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v2 4/6] tracing/uprobe: Adopt guard() and scoped_guard() Date: Sat, 30 Nov 2024 01:48:19 +0900 Message-ID: <173289889911.73724.12457932738419630525.stgit@devnote2> X-Mailer: git-send-email 2.43.0 In-Reply-To: <173289885627.73724.13632317993038475335.stgit@devnote2> References: <173289885627.73724.13632317993038475335.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Masami Hiramatsu (Google) Use guard() or scoped_guard() in uprobe events for critical sections rather than discrete lock/unlock pairs. Signed-off-by: Masami Hiramatsu (Google) --- kernel/trace/trace_uprobe.c | 15 +++++---------- 1 file changed, 5 insertions(+), 10 deletions(-) diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c index b30fc8fcd095..4150ab1d835e 100644 --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -496,11 +496,11 @@ static int register_trace_uprobe(struct trace_uprobe = *tu) struct trace_uprobe *old_tu; int ret; =20 - mutex_lock(&event_mutex); + guard(mutex)(&event_mutex); =20 ret =3D validate_ref_ctr_offset(tu); if (ret) - goto end; + return ret; =20 /* register as an event */ old_tu =3D find_probe_event(trace_probe_name(&tu->tp), @@ -509,11 +509,9 @@ static int register_trace_uprobe(struct trace_uprobe *= tu) if (is_ret_probe(tu) !=3D is_ret_probe(old_tu)) { trace_probe_log_set_index(0); trace_probe_log_err(0, DIFF_PROBE_TYPE); - ret =3D -EEXIST; - } else { - ret =3D append_trace_uprobe(tu, old_tu); + return -EEXIST; } - goto end; + return append_trace_uprobe(tu, old_tu); } =20 ret =3D register_uprobe_event(tu); @@ -523,14 +521,11 @@ static int register_trace_uprobe(struct trace_uprobe = *tu) trace_probe_log_err(0, EVENT_EXIST); } else pr_warn("Failed to register probe event(%d)\n", ret); - goto end; + return ret; } =20 dyn_event_add(&tu->devent, trace_probe_event_call(&tu->tp)); =20 -end: - mutex_unlock(&event_mutex); - return ret; } From nobody Thu Dec 26 23:14:09 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B3C9819D084; Fri, 29 Nov 2024 16:48:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898914; cv=none; b=r+eJygqowudkHDW2jrqIfqwYIgcgDJg0/M3YFC5XImwbrqLRqe4Ti2gyj+rIf3UW3KbVoo61JiMkeAb1qrJvELNuv4vfRWorQDsdEp4wsQ98Q4/E/DeDTefbdk9I2WsD+UcnmObS0sBaE8gqL2iDvFzPP/WDNRKG9OaMAnc8AM4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898914; c=relaxed/simple; bh=WFkIPpXulUXbAywnDNU8HT3l+4sMs3bGc3TO2sEeTkY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=BbdgR6lE1ctGBA2uSy0BOG+udVMtzL/Z9LfIb/TnGdfTtbDf5vFHbJaGv5ejgcNhBkaxBq+LHTBzBDOMjTTYhIHpeXcw2PgzjItx9xxH6OhQ8ld0SNItfVbEGXT7PQ3qSzBOdASQzG/9dZh0RfGt4lx8puwfTwS0zSDmyBLZmZU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=qi4/eRSy; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="qi4/eRSy" Received: by smtp.kernel.org (Postfix) with ESMTPSA id F022AC4CECF; Fri, 29 Nov 2024 16:48:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732898914; bh=WFkIPpXulUXbAywnDNU8HT3l+4sMs3bGc3TO2sEeTkY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qi4/eRSy/UFINbJk3GZv08ieXTkR4Z7ysx1ZF5yGNSTdhtwH3mrzzDp7PLtLM6KEn vmt7/VfYHa1Kx3YjbO8sCRApT9HaG/6uZd4YtuW6o0UKPkKL7m//e3sTSubfwYZFgl 5O9bHvC8L1lgJ/Gcc1E0mmfYSWHX0Ev64v+lDE0KAYA8jY2gWS1mXDhnMbuoin+IXk tc+CRWcJz2kYoz0VVxFZWDKNXYlqjBo2rhJVEDNtotkajtwdIXcT5Dvblfe0rg3rIK Hed/YC41bSIM3/nNh+qq5/kVlSQFNXV/5GlRvs6qEO0DtZQsIHt/0jRCf5a7zWIL51 jaYgj41tGIZ1g== From: "Masami Hiramatsu (Google)" To: Steven Rostedt , Naveen N Rao Cc: Anil S Keshavamurthy , Masami Hiramatsu , "David S . Miller" , Mathieu Desnoyers , Oleg Nesterov , Tzvetomir Stoyanov , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v2 5/6] tracing/eprobe: Adopt guard() and scoped_guard() Date: Sat, 30 Nov 2024 01:48:30 +0900 Message-ID: <173289890996.73724.17421347964110362029.stgit@devnote2> X-Mailer: git-send-email 2.43.0 In-Reply-To: <173289885627.73724.13632317993038475335.stgit@devnote2> References: <173289885627.73724.13632317993038475335.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Masami Hiramatsu (Google) Use guard() or scoped_guard() in eprobe events for critical sections rather than discrete lock/unlock pairs. Signed-off-by: Masami Hiramatsu (Google) --- kernel/trace/trace_eprobe.c | 36 +++++++++++++++++------------------- 1 file changed, 17 insertions(+), 19 deletions(-) diff --git a/kernel/trace/trace_eprobe.c b/kernel/trace/trace_eprobe.c index be8be0c1aaf0..82fd637cfc19 100644 --- a/kernel/trace/trace_eprobe.c +++ b/kernel/trace/trace_eprobe.c @@ -917,10 +917,10 @@ static int __trace_eprobe_create(int argc, const char= *argv[]) goto error; } =20 - mutex_lock(&event_mutex); - event_call =3D find_and_get_event(sys_name, sys_event); - ep =3D alloc_event_probe(group, event, event_call, argc - 2); - mutex_unlock(&event_mutex); + scoped_guard(mutex, &event_mutex) { + event_call =3D find_and_get_event(sys_name, sys_event); + ep =3D alloc_event_probe(group, event, event_call, argc - 2); + } =20 if (IS_ERR(ep)) { ret =3D PTR_ERR(ep); @@ -952,23 +952,21 @@ static int __trace_eprobe_create(int argc, const char= *argv[]) if (ret < 0) goto error; init_trace_eprobe_call(ep); - mutex_lock(&event_mutex); - ret =3D trace_probe_register_event_call(&ep->tp); - if (ret) { - if (ret =3D=3D -EEXIST) { - trace_probe_log_set_index(0); - trace_probe_log_err(0, EVENT_EXIST); + scoped_guard(mutex, &event_mutex) { + ret =3D trace_probe_register_event_call(&ep->tp); + if (ret) { + if (ret =3D=3D -EEXIST) { + trace_probe_log_set_index(0); + trace_probe_log_err(0, EVENT_EXIST); + } + goto error; + } + ret =3D dyn_event_add(&ep->devent, &ep->tp.event->call); + if (ret < 0) { + trace_probe_unregister_event_call(&ep->tp); + goto error; } - mutex_unlock(&event_mutex); - goto error; - } - ret =3D dyn_event_add(&ep->devent, &ep->tp.event->call); - if (ret < 0) { - trace_probe_unregister_event_call(&ep->tp); - mutex_unlock(&event_mutex); - goto error; } - mutex_unlock(&event_mutex); return ret; parse_error: ret =3D -EINVAL; From nobody Thu Dec 26 23:14:09 2024 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3AB2278276; Fri, 29 Nov 2024 16:48:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898925; cv=none; b=pKpFbzZrGjsICqFJBHM85J6hPNJ90tYW9N8mFXCK6EoZ5lOiqjfd6JD+xLqMh7wblkHOzZ4HgJeRrAy9jIMcjR1QBOIz6olK+7Ok56xxjEq5M6VmGaBPtlr3G4PmbmRCE/1MKG8iZRfj6OlC7Md7auIy5UPh+XPhmDtdA6rbrec= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732898925; c=relaxed/simple; bh=/wkJeDupE0S2YFw2GJZXNRuiJiFo7UvOtoxklJ0O1A8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=VYqTxqeRlLfPvhWM7/8v90Snfiad2eOuOY+u7o36OxiEaEYO1hPNnw7d8HkW7+b3lAfpuvylK2Ik+eGp+eqHnPB9QrjxYnvSJDkUq5LXmOHVbGm7FNVXP8K8yCvTeWCFBfVM7r6eLQMduJuGDXYvXt0IHhqGUkwVGO89o8U3vyo= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=iobigL/S; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="iobigL/S" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 08DA4C4CED2; Fri, 29 Nov 2024 16:48:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732898925; bh=/wkJeDupE0S2YFw2GJZXNRuiJiFo7UvOtoxklJ0O1A8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iobigL/Smk8BLze7nrcfcJZOvfMFXJsrXMc2tyWYylQVDuDpha7HAeMFj5gUCsRFz OAP6mpFQOYJgDhzTz14t3afrsfN79FocbczYMcQYuaKNytWUqiX3ftICNKLJr786vy T2pzf0FMHM67H1QHZ1AVz/Ps1X2TzvOB8qOsSjPtlaYfrLiHUlYHnz7qW2aXBSXbGT icbiWDEBp2egNIX9AsXHN+EN0C+O9Uk8mY640xsGHyci6GphY1BV2yXZztFEi23em4 Sz2jfZCN9QUsc31uLf3cZxaReuz9eaIlBoX9Bx2ycgTZ79bkeDV2Mmjn4If2Gw4IVn b6Wvpbiy0O+eQ== From: "Masami Hiramatsu (Google)" To: Steven Rostedt , Naveen N Rao Cc: Anil S Keshavamurthy , Masami Hiramatsu , "David S . Miller" , Mathieu Desnoyers , Oleg Nesterov , Tzvetomir Stoyanov , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH v2 6/6] tracing/dynevent: Adopt guard() and scoped_guard() Date: Sat, 30 Nov 2024 01:48:40 +0900 Message-ID: <173289891992.73724.9491350426847416169.stgit@devnote2> X-Mailer: git-send-email 2.43.0 In-Reply-To: <173289885627.73724.13632317993038475335.stgit@devnote2> References: <173289885627.73724.13632317993038475335.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Masami Hiramatsu (Google) Use guard() or scoped_guard() in dynamic events for critical sections rather than discrete lock/unlock pairs. Signed-off-by: Masami Hiramatsu (Google) --- Changes in v2: - Use scoped_guard() instead of guard() to avoid goto warnings. --- kernel/trace/trace_dynevent.c | 35 ++++++++++++++++------------------- 1 file changed, 16 insertions(+), 19 deletions(-) diff --git a/kernel/trace/trace_dynevent.c b/kernel/trace/trace_dynevent.c index 4376887e0d8a..eb8f669c15e1 100644 --- a/kernel/trace/trace_dynevent.c +++ b/kernel/trace/trace_dynevent.c @@ -63,9 +63,8 @@ int dyn_event_register(struct dyn_event_operations *ops) return -EINVAL; =20 INIT_LIST_HEAD(&ops->list); - mutex_lock(&dyn_event_ops_mutex); + guard(mutex)(&dyn_event_ops_mutex); list_add_tail(&ops->list, &dyn_event_ops_list); - mutex_unlock(&dyn_event_ops_mutex); return 0; } =20 @@ -106,20 +105,20 @@ int dyn_event_release(const char *raw_command, struct= dyn_event_operations *type goto out; } =20 - mutex_lock(&event_mutex); - for_each_dyn_event_safe(pos, n) { - if (type && type !=3D pos->ops) - continue; - if (!pos->ops->match(system, event, - argc - 1, (const char **)argv + 1, pos)) - continue; - - ret =3D pos->ops->free(pos); - if (ret) - break; + scoped_guard(mutex, &event_mutex) { + for_each_dyn_event_safe(pos, n) { + if (type && type !=3D pos->ops) + continue; + if (!pos->ops->match(system, event, + argc - 1, (const char **)argv + 1, pos)) + continue; + + ret =3D pos->ops->free(pos); + if (ret) + break; + } + tracing_reset_all_online_cpus(); } - tracing_reset_all_online_cpus(); - mutex_unlock(&event_mutex); out: argv_free(argv); return ret; @@ -133,13 +132,12 @@ static int create_dyn_event(const char *raw_command) if (raw_command[0] =3D=3D '-' || raw_command[0] =3D=3D '!') return dyn_event_release(raw_command, NULL); =20 - mutex_lock(&dyn_event_ops_mutex); + guard(mutex)(&dyn_event_ops_mutex); list_for_each_entry(ops, &dyn_event_ops_list, list) { ret =3D ops->create(raw_command); if (!ret || ret !=3D -ECANCELED) break; } - mutex_unlock(&dyn_event_ops_mutex); if (ret =3D=3D -ECANCELED) ret =3D -EINVAL; =20 @@ -198,7 +196,7 @@ int dyn_events_release_all(struct dyn_event_operations = *type) struct dyn_event *ev, *tmp; int ret =3D 0; =20 - mutex_lock(&event_mutex); + guard(mutex)(&event_mutex); for_each_dyn_event(ev) { if (type && ev->ops !=3D type) continue; @@ -216,7 +214,6 @@ int dyn_events_release_all(struct dyn_event_operations = *type) } out: tracing_reset_all_online_cpus(); - mutex_unlock(&event_mutex); =20 return ret; }