lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1550186711.2498.10.camel@kernel.org>
Date:   Thu, 14 Feb 2019 17:25:11 -0600
From:   Tom Zanussi <zanussi@...nel.org>
To:     Steven Rostedt <rostedt@...dmis.org>
Cc:     tglx@...utronix.de, mhiramat@...nel.org, namhyung@...nel.org,
        vedang.patel@...el.com, bigeasy@...utronix.de,
        joel@...lfernandes.org, mathieu.desnoyers@...icios.com,
        julia@...com, linux-kernel@...r.kernel.org,
        linux-rt-users@...r.kernel.org
Subject: Re: [PATCH v15 05/15] tracing: Add conditional snapshot

Hi Steve,

On Thu, 2019-02-14 at 18:11 -0500, Steven Rostedt wrote:
> On Wed, 13 Feb 2019 17:42:45 -0600
> Tom Zanussi <zanussi@...nel.org> wrote:
> 
> > +
> > +/**
> > + * tracing_snapshot_cond_enable - enable conditional snapshot for
> > an instance
> > + * @tr:		The tracing instance
> > + * @cond_data:	User data to associate with the snapshot
> > + * @update:	Implementation of the cond_snapshot update
> > function
> > + *
> > + * Check whether the conditional snapshot for the given instance
> > has
> > + * already been enabled, or if the current tracer is already using
> > a
> > + * snapshot; if so, return -EBUSY, else create a cond_snapshot and
> > + * save the cond_data and update function inside.
> > + *
> > + * Returns 0 if successful, error otherwise.
> > + */
> > +int tracing_snapshot_cond_enable(struct trace_array *tr, void
> > *cond_data,
> > +				 cond_update_fn_t update)
> > +{
> > +	struct cond_snapshot *cond_snapshot;
> > +	int ret = 0;
> > +
> > +	cond_snapshot = kzalloc(sizeof(*cond_snapshot),
> > GFP_KERNEL);
> > +	if (!cond_snapshot)
> > +		return -ENOMEM;
> > +
> > +	cond_snapshot->cond_data = cond_data;
> > +	cond_snapshot->update = update;
> > +
> > +	mutex_lock(&trace_types_lock);
> > +
> > +	ret = tracing_alloc_snapshot_instance(tr);
> > +	if (ret)
> > +		goto fail_unlock;
> > +
> > +	if (tr->current_trace->use_max_tr) {
> > +		ret = -EBUSY;
> > +		goto fail_unlock;
> > +	}
> > +
> > +	if (tr->cond_snapshot) {
> > +		ret = -EBUSY;
> > +		goto fail_unlock;
> > +	}
> > +
> > +	arch_spin_lock(&tr->max_lock);
> > +	tr->cond_snapshot = cond_snapshot;
> > +	arch_spin_unlock(&tr->max_lock);
> > +
> > +	mutex_unlock(&trace_types_lock);
> > +
> > +	return ret;
> > +
> > + fail_unlock:
> > +        mutex_unlock(&trace_types_lock);
> > +        kfree(cond_snapshot);
> > +        return ret;
> 
> Some whitespace damage here. No need to resend, I fixed it.
> 

OK, thanks.

> 
> > +}
> > +EXPORT_SYMBOL_GPL(tracing_snapshot_cond_enable);
> > +
> 
> I also added this change on top of your series.
> 
> diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c
> index 0460cc0f28fd..2cf3c747a357 100644
> --- a/kernel/trace/trace.c
> +++ b/kernel/trace/trace.c
> @@ -1116,6 +1116,14 @@ int tracing_snapshot_cond_enable(struct
> trace_array *tr, void *cond_data,
>  		goto fail_unlock;
>  	}
>  
> +	/*
> +	 * The cond_snapshot can only change to NULL without the
> +	 * trace_types_lock. We don't care if we race with it going
> +	 * to NULL, but we want to make sure that it's not set to
> +	 * something other than NULL when we get here, which we can
> +	 * do safely with only holding the trace_types_lock and not
> +	 * having to take the max_lock.
> +	 */
>  	if (tr->cond_snapshot) {
>  		ret = -EBUSY;
>  		goto fail_unlock;
> 

Looks good, thanks for adding that back.

Tom

> I'll start testing your series now.
> 
> Thanks!
> 
> -- Steve
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ