[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201103121304.GM6882@arm.com>
Date: Tue, 3 Nov 2020 12:13:04 +0000
From: Dave Martin <Dave.Martin@....com>
To: André Przywara <andre.przywara@....com>
Cc: "leo.yan@...aro.org" <leo.yan@...aro.org>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
Peter Zijlstra <peterz@...radead.org>,
Ingo Molnar <mingo@...hat.com>,
Mark Rutland <Mark.Rutland@....com>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
Jiri Olsa <jolsa@...hat.com>,
Namhyung Kim <namhyung@...nel.org>,
James Clark <James.Clark@....com>, Al Grant <Al.Grant@....com>,
Wei Li <liwei391@...wei.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v6 06/21] perf arm-spe: Refactor printing string to buffer
On Tue, Nov 03, 2020 at 10:13:49AM +0000, André Przywara wrote:
> On 03/11/2020 06:40, Leo Yan wrote:
>
> Hi Dave, Leo,
>
> > On Mon, Nov 02, 2020 at 05:06:53PM +0000, Dave Martin wrote:
> >> On Fri, Oct 30, 2020 at 02:57:09AM +0000, Leo Yan wrote:
> >>> When outputs strings to the decoding buffer with function snprintf(),
> >>> SPE decoder needs to detects if any error returns from snprintf() and if
> >>> so needs to directly bail out. If snprintf() returns success, it needs
> >>> to update buffer pointer and reduce the buffer length so can continue to
> >>> output the next string into the consequent memory space.
> >>>
> >>> This complex logics are spreading in the function arm_spe_pkt_desc() so
> >>> there has many duplicate codes for handling error detecting, increment
> >>> buffer pointer and decrement buffer size.
> >>>
> >>> To avoid the duplicate code, this patch introduces a new helper function
> >>> arm_spe_pkt_snprintf() which is used to wrap up the complex logics, and
> >>> it's used by the caller arm_spe_pkt_desc(); if printing buffer is called
> >>> for multiple times in a flow, the error is a cumulative value and simply
> >>> returns its final value.
> >>>
> >>> This patch also moves the variable 'blen' as the function's local
> >>> variable, this allows to remove the unnecessary braces and improve the
> >>> readability.
> >>>
> >>> Suggested-by: Dave Martin <Dave.Martin@....com>
> >>> Signed-off-by: Leo Yan <leo.yan@...aro.org>
> >>
> >> This looks like a good refacroting now, but as pointed out by Andre this
> >> patch is now rather hard to review, since it combines the refactoring
> >> with other changes.
> >>
> >> If reposting this series, it would be good if this could be split into a
> >> first patch that introduces arm_spe_pkt_snprintf() and just updates each
> >> snprintf() call site to use it, but without moving other code around or
> >> optimising anything, followed by one or more patches that clean up and
> >> simplify arm_spe_pkt_desc().
> >
> > I will respin the patch set and follow this approach.
>
> Well, I am afraid this is not easily possible.
>
> Dave: this patch is basically following the pattern turning this:
> ===============
> if (condition) {
> ret = snprintf(buf, buf_len, "foo");
> buf += ret;
> blen -= ret;
> }
> ...
> if (ret < 0)
> return ret;
> blen -= ret;
> return buf_len - blen;
> ===============
> into this:
> ---------------
> if (condition)
> arm_spe_pkt_snprintf(&err, &buf, &blen, "foo");
> ...
> return err ?: (int)(buf_len - blen);
> ---------------
>
> And "diff" is getting really ahead of itself here and tries to be super
> clever, which leads to this hard to read patch.
>
> But I don't think there is anything we can really do here, this is
> already the minimal version. Leo adds the optimisations only later on,
> in other patches.
OK, this is only nice-to-have, if feasible -- so I'd say Leo should not
bother to split this patch up unless it is easy to do and actually does
make the diff more intelligible!
>
> Cheers,
> Andre
>
>
> >
> >> If the series is otherwise mature though, then this rework may be
> >> overkill.
> >>
> >>> ---
> >>> .../arm-spe-decoder/arm-spe-pkt-decoder.c | 267 ++++++++----------
> >>> 1 file changed, 117 insertions(+), 150 deletions(-)
> >>>
> >>> diff --git a/tools/perf/util/arm-spe-decoder/arm-spe-pkt-decoder.c b/tools/perf/util/arm-spe-decoder/arm-spe-pkt-decoder.c
> >>> index 04fd7fd7c15f..1ecaf9805b79 100644
> >>> --- a/tools/perf/util/arm-spe-decoder/arm-spe-pkt-decoder.c
> >>> +++ b/tools/perf/util/arm-spe-decoder/arm-spe-pkt-decoder.c
> >>> @@ -9,6 +9,7 @@
> >>> #include <endian.h>
> >>> #include <byteswap.h>
> >>> #include <linux/bitops.h>
> >>> +#include <stdarg.h>
> >>>
> >>> #include "arm-spe-pkt-decoder.h"
> >>>
> >>> @@ -258,192 +259,158 @@ int arm_spe_get_packet(const unsigned char *buf, size_t len,
> >>> return ret;
> >>> }
> >>>
> >>> +static int arm_spe_pkt_snprintf(int *err, char **buf_p, size_t *blen,
> >>> + const char *fmt, ...)
> >>> +{
> >>> + va_list ap;
> >>> + int ret;
> >>> +
> >>> + /* Bail out if any error occurred */
> >>> + if (err && *err)
> >>> + return *err;
> >>> +
> >>> + va_start(ap, fmt);
> >>> + ret = vsnprintf(*buf_p, *blen, fmt, ap);
> >>> + va_end(ap);
> >>> +
> >>> + if (ret < 0) {
> >>> + if (err && !*err)
> >>> + *err = ret;
> >>
> >> What happens on buffer overrun (i.e., ret >= *blen)?
> >>
> >> It looks to me like we'll advance buf_p too far, blen will wrap around,
> >> and the string at *buf_p won't be null terminated. Because the return
> >> value is still >= 0, this condition will be returned up the stack as
> >> "success".
> >
> > Thanks for pointint out this. I never note for the potential issue
> > caused by returned value (ret >= *blen); checked again for the
> > manual, it says:
> >
> > "The functions snprintf() and vsnprintf() do not write more than size
> > bytes (including the terminating null byte ('\0')). If the output was
> > truncated due to this limit, then the return value is the number of
> > characters (excluding the terminating null byte) which would have
> > been written to the final string if enough space had been available.
> > Thus, a return value of size or more means that the output was
> > truncated."
> >
> >> Perhaps this can never happen given the actual buffer sizes and strings
> >> being printed, but it feels a bit unsafe.
> >>
> >>
> >> It may be better to clamp the adjustments to *buf_p and *blen to
> >> *blen - 1 in this case, and explicitly set (*buf_p)[*blen - 1] to '\0'.
> >> We _may_ want indicate failure in the return from arm_spe_pkt_desc() in
> >> this situation, but I don't know enough about how this code is called to
> >> enable me to judge that.
> >
> > The caller arm_spe_dump() will print out the string if the return
> > value > 0 [1]; so I think it can simply return the string length which
> > has been written to the buffer (with the clamped value). The function
> > can be refined as below:
> >
> > static int arm_spe_pkt_snprintf(int *err, char **buf_p, size_t *blen,
> > const char *fmt, ...)
> > {
> > va_list ap;
> > int ret;
> >
> > /* Bail out if any error occurred */
> > if (err && *err)
> > return *err;
> >
> > va_start(ap, fmt);
> > ret = vsnprintf(*buf_p, *blen - 1, fmt, ap);
I think this should still be *blen. Passing *blen - 1 here will limit
the number of chars of generated text (excluding the '\0') to *blen - 2,
which does not seem to be what is intended.
> > va_end(ap);
> >
> > if (ret < 0) {
> > if (err && !*err)
> > *err = ret;
> > } else {
> >
> > /*
> > * A return value of (*blen - 1) or more means that the
> > * output was truncated and the buffer is overrun.
> > */
> > if (ret >= (*blen - 1)) {
> > (*buf_p)[*blen - 1] = '\0';
> >
> > /*
> > * Set *err to -1 to avoid overflow if tries to
> > * fill this buffer sequentially.
> > */
> > if (err && !*err)
> > *err = -1;
Makes sense, though the important thing here is to make sure that the
caller knows the output was truncated.
> >
> > /* Clamp the size of characters printed */
> > ret = min(ret, *blen);
I'm not sure it matters, but it seems more logical for this to be
*blen - 1. Otherwise, the return value counts the '\0' that we just
added as one of the chars "printed". That seems a bit odd.
Alternatively, if nobody cares about the actual number returned, it may
make sense to stick to snprintf() semantics -- i.e., just return the
value that snprintf returned.
> > }
> >
> > *buf_p += ret;
> > *blen -= ret;
> > }
> >
> > return ret;
> > }
> >
> > [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/tools/perf/util/arm-spe.c#n116
> >
> >> (Note, this issue is not introduced by this patch, but this refactoring
> >> makes it easier to address it in a single place -- so it may now be
> >> worth doing so.)
> >
> > Agree.
> >
> >>> + } else {
> >>> + *buf_p += ret;
> >>> + *blen -= ret;
> >>> + }
> >>> +
> >>> + return ret;
> >>> +}
> >>> +
> >>> int arm_spe_pkt_desc(const struct arm_spe_pkt *packet, char *buf,
> >>> size_t buf_len)
> >>> {
> >>> - int ret, ns, el, idx = packet->index;
> >>> + int ns, el, idx = packet->index;
> >>> unsigned long long payload = packet->payload;
> >>> const char *name = arm_spe_pkt_name(packet->type);
> >>> + size_t blen = buf_len;
> >>> + int err = 0;
> >>>
> >>> switch (packet->type) {
> >>> case ARM_SPE_BAD:
> >>> case ARM_SPE_PAD:
> >>> case ARM_SPE_END:
> >>> - return snprintf(buf, buf_len, "%s", name);
> >>> - case ARM_SPE_EVENTS: {
> >>> - size_t blen = buf_len;
> >>> -
> >>> - ret = 0;
> >>> - ret = snprintf(buf, buf_len, "EV");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - if (payload & 0x1) {
> >>> - ret = snprintf(buf, buf_len, " EXCEPTION-GEN");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x2) {
> >>> - ret = snprintf(buf, buf_len, " RETIRED");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x4) {
> >>> - ret = snprintf(buf, buf_len, " L1D-ACCESS");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x8) {
> >>> - ret = snprintf(buf, buf_len, " L1D-REFILL");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x10) {
> >>> - ret = snprintf(buf, buf_len, " TLB-ACCESS");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x20) {
> >>> - ret = snprintf(buf, buf_len, " TLB-REFILL");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x40) {
> >>> - ret = snprintf(buf, buf_len, " NOT-TAKEN");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x80) {
> >>> - ret = snprintf(buf, buf_len, " MISPRED");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> + return arm_spe_pkt_snprintf(&err, &buf, &blen, "%s", name);
> >>> + case ARM_SPE_EVENTS:
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, "EV");
> >>> +
> >>> + if (payload & 0x1)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " EXCEPTION-GEN");
> >>> + if (payload & 0x2)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " RETIRED");
> >>> + if (payload & 0x4)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " L1D-ACCESS");
> >>> + if (payload & 0x8)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " L1D-REFILL");
> >>> + if (payload & 0x10)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " TLB-ACCESS");
> >>> + if (payload & 0x20)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " TLB-REFILL");
> >>> + if (payload & 0x40)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " NOT-TAKEN");
> >>> + if (payload & 0x80)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " MISPRED");
> >>> if (idx > 1) {
> >>> - if (payload & 0x100) {
> >>> - ret = snprintf(buf, buf_len, " LLC-ACCESS");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x200) {
> >>> - ret = snprintf(buf, buf_len, " LLC-REFILL");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> - if (payload & 0x400) {
> >>> - ret = snprintf(buf, buf_len, " REMOTE-ACCESS");
> >>> - buf += ret;
> >>> - blen -= ret;
> >>> - }
> >>> + if (payload & 0x100)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " LLC-ACCESS");
> >>> + if (payload & 0x200)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " LLC-REFILL");
> >>> + if (payload & 0x400)
> >>> + arm_spe_pkt_snprintf(&err, &buf, &blen, " REMOTE-ACCESS");
> >>> }
> >>> - if (ret < 0)
> >>> - return ret;
> >>> - blen -= ret;
> >>> - return buf_len - blen;
> >>
> >> It looks like we now fall off the bottom of the switch() here. It's
> >> preferable to add a break, both to document the intended code flow, and
> >> to avoid accidents if another case is added later.
> >
> > Will do this.
> >
> >>> - }
> >>> + return err ?: (int)(buf_len - blen);
> >>
> >> Nit: unexplained type cast. Does the result definitely fit into an int?
> >> If not, why doesn't it matter?
> >
> > The case is to dismiss the compiler warning.
> >
> > GCC doesn't compliant for the code:
> >
> > return buf_len - blen;
> >
> > But GCC compliants type mismatch after change to code:
> >
> > return err ?: buf_len - blen;
So, does buf_len - blen fit in an int?
> >
> >> Also:
> >>
> >> If the actual return value is important for the caller to determine the
> >> number of bytes appended, then it would be better to compute it in one
> >> place. Otherwise, it would be better to squash all success returns to 0,
> >> rather than spend effort computing a value that may be misleading or
> >> wrong anyway.
> >>
> >> In its current form, it's tricky to see whether this patch derives the
> >> return value consistently for all cases. In particular, if some code
> >> patch does one or more arm_spe_pkt_snprintf(), followed by a
> >> return arm_spe_pkt_snprintf(); then the return value (which only takes
> >> the last arm_spe_pkt_desc() into account) would be wrong. It would be
> >> preferable if the return value for the success case were always
> >> computed from buf_len and blen, to avoid this risk. (I'm not saying
> >> this bug exists, just that it's hard to see from the patch that it
> >> doesn't exist.)
> >
> > I think I can go back to return value "buf_len - blen" and don't
> > check "err" anymore.
Probably, now that blen is adjusted in one place -- at least for success
returns.
We still need to indicate failure though, so we may need to check err
in some places.
One option is to have snprintf() semantics for the return value of this
whole function too, so that the caller can detect truncation (if wanted)
by comparing the return value against buf_len. We'd need to make sure
all callers are updated appropriately if going down that route.
> >
> > If the string buffer is truncated due to size limitation, we can still
> > return "buf_len - blen" so can allow caller to dump string as
> > possible.
This really depends on what the caller is trying to do. In the case of
truncation, will we send unparseable junk to userspace? Will userspace
be able to detect that this has happened and recover gracefully?
> > If arm_spe_pkt_snprintf() returns -1 at the first call, "buf_len" is
> > equal to "blen", thus return value of "buf_len - blen" will be zero.
> > For this case, the caller will get to know there have no valid string
> > and will skip to print anything.
> >
> > Does this make sense?
Probably, though it's easy for callers to forget about such conventions
and assume that 0 means "success".
[...]
Cheers
---Dave
Powered by blists - more mailing lists