Received: by 10.223.176.46 with SMTP id f43csp2650791wra; Mon, 22 Jan 2018 00:54:46 -0800 (PST) X-Google-Smtp-Source: AH8x225LufXXXfhjIAcYvbDZqGPj0NOBZ9fCNksvd9YQajBDkAfCUtqvvsILy1K5Vzn6iAspmS7x X-Received: by 10.98.87.201 with SMTP id i70mr7939202pfj.143.1516611286107; Mon, 22 Jan 2018 00:54:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516611286; cv=none; d=google.com; s=arc-20160816; b=VzZTLiJV58aB3nO3a9bF9/69d7McbTZUap1SNVl1Tke/T608Vu9MS78XecB47YWZtF 8JWJqe0D0nGHy1bZ8ntFtIhhUCDYaSFf8MgMkWwJrNFwppoprt46S29fy0i7nDOoKwtV NCRzD3OjkntZMYN39wDhoEAdu0VuFFGisQSr/IKyYQeas35WkWFeFbkI5tN+0cZdBOkA lncPBoLxb76jxyxqc4e3QKhxKvSesYisR5zljTPGCzAkH9OCHWCPJ2oO8SnAwt+rZpMO I2bmGVV1Q5E+3NFtk8qtw+nP0bIvX/Dy3tkYVYORaieRnKkmPUR2p1MXTWUOt+TnZhxy Y0UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=cQaYMkHZh3w8sotnzj6//LVaHbsvKiyyzJ56yRqpdEE=; b=g18bhJGXlISUDfl53XLXFQR3R60wQ2guo72WyowPM0kUyWWeKzKiqb05ihmCyr5Nxc BZIEV6bCOZC4U+2u0GITWjswG+EeonP2kgStKjFLEFKdDqlQXwgRHCbGPbXhIBjT1RaB Q9jlcgil7mygYwkiY/+IAEkkmpZkRJhxioJ5E/K73rbvVRN5D0pUtLh7AFpZZlnAnABh QHx1BAbRqBMTZWAbZKQ1nGKR6C3NkW+ChUFo4sXG8zDtj4fkCuhbK70vMn6TmhMdk+3p aBSqygJ21cby1hBbC9UKBYyWj9RtOuNQp3l7WtGqv4qIcUFJ6i+IAKVrVwKi27R2amw8 GOfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j9si6720288pgq.689.2018.01.22.00.54.31; Mon, 22 Jan 2018 00:54:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753350AbeAVIx6 (ORCPT + 99 others); Mon, 22 Jan 2018 03:53:58 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:34092 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753639AbeAVIxz (ORCPT ); Mon, 22 Jan 2018 03:53:55 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id B549FF00; Mon, 22 Jan 2018 08:53:54 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chuck Lever , "Steven Rostedt (VMware)" Subject: [PATCH 4.14 55/89] tracing: Fix converting enums from the map in trace_event_eval_update() Date: Mon, 22 Jan 2018 09:45:35 +0100 Message-Id: <20180122084000.204291831@linuxfoundation.org> X-Mailer: git-send-email 2.16.0 In-Reply-To: <20180122083954.683903493@linuxfoundation.org> References: <20180122083954.683903493@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Steven Rostedt (VMware) commit 1ebe1eaf2f02784921759992ae1fde1a9bec8fd0 upstream. Since enums do not get converted by the TRACE_EVENT macro into their values, the event format displaces the enum name and not the value. This breaks tools like perf and trace-cmd that need to interpret the raw binary data. To solve this, an enum map was created to convert these enums into their actual numbers on boot up. This is done by TRACE_EVENTS() adding a TRACE_DEFINE_ENUM() macro. Some enums were not being converted. This was caused by an optization that had a bug in it. All calls get checked against this enum map to see if it should be converted or not, and it compares the call's system to the system that the enum map was created under. If they match, then they call is processed. To cut down on the number of iterations needed to find the maps with a matching system, since calls and maps are grouped by system, when a match is made, the index into the map array is saved, so that the next call, if it belongs to the same system as the previous call, could start right at that array index and not have to scan all the previous arrays. The problem was, the saved index was used as the variable to know if this is a call in a new system or not. If the index was zero, it was assumed that the call is in a new system and would keep incrementing the saved index until it found a matching system. The issue arises when the first matching system was at index zero. The next map, if it belonged to the same system, would then think it was the first match and increment the index to one. If the next call belong to the same system, it would begin its search of the maps off by one, and miss the first enum that should be converted. This left a single enum not converted properly. Also add a comment to describe exactly what that index was for. It took me a bit too long to figure out what I was thinking when debugging this issue. Link: http://lkml.kernel.org/r/717BE572-2070-4C1E-9902-9F2E0FEDA4F8@oracle.com Fixes: 0c564a538aa93 ("tracing: Add TRACE_DEFINE_ENUM() macro to map enums to their values") Reported-by: Chuck Lever Teste-by: Chuck Lever Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace_events.c | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) --- a/kernel/trace/trace_events.c +++ b/kernel/trace/trace_events.c @@ -2213,6 +2213,7 @@ void trace_event_eval_update(struct trac { struct trace_event_call *call, *p; const char *last_system = NULL; + bool first = false; int last_i; int i; @@ -2220,15 +2221,28 @@ void trace_event_eval_update(struct trac list_for_each_entry_safe(call, p, &ftrace_events, list) { /* events are usually grouped together with systems */ if (!last_system || call->class->system != last_system) { + first = true; last_i = 0; last_system = call->class->system; } + /* + * Since calls are grouped by systems, the likelyhood that the + * next call in the iteration belongs to the same system as the + * previous call is high. As an optimization, we skip seaching + * for a map[] that matches the call's system if the last call + * was from the same system. That's what last_i is for. If the + * call has the same system as the previous call, then last_i + * will be the index of the first map[] that has a matching + * system. + */ for (i = last_i; i < len; i++) { if (call->class->system == map[i]->system) { /* Save the first system if need be */ - if (!last_i) + if (first) { last_i = i; + first = false; + } update_event_printk(call, map[i]); } }