Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8475BC6FA99 for ; Fri, 10 Mar 2023 23:34:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229874AbjCJXeR (ORCPT ); Fri, 10 Mar 2023 18:34:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44686 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231676AbjCJXeM (ORCPT ); Fri, 10 Mar 2023 18:34:12 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3998A62FE4; Fri, 10 Mar 2023 15:33:57 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id AF16361D7D; Fri, 10 Mar 2023 23:33:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AD96DC433D2; Fri, 10 Mar 2023 23:33:53 +0000 (UTC) Date: Fri, 10 Mar 2023 18:33:52 -0500 From: Steven Rostedt To: zwisler@kernel.org Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org, Ross Zwisler , Alexei Starovoitov , Andrii Nakryiko , Daniel Borkmann , Hao Luo , Jason Gunthorpe , Jiri Olsa , John Fastabend , KP Singh , Leon Romanovsky , Martin KaFai Lau , Mykola Lysenko , Shuah Khan , Song Liu , Stanislav Fomichev , Yonghong Song , linux-kselftest@vger.kernel.org, linux-rdma@vger.kernel.org, linux-trace-kernel@vger.kernel.org, "Michael S . Tsirkin" Subject: Re: [PATCH bpf-next v3 2/2] selftests/bpf: use canonical ftrace path Message-ID: <20230310183352.2943e633@gandalf.local.home> In-Reply-To: <20230310175209.2130880-2-zwisler@kernel.org> References: <20230310175209.2130880-1-zwisler@kernel.org> <20230310175209.2130880-2-zwisler@kernel.org> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 10 Mar 2023 10:52:09 -0700 zwisler@kernel.org wrote: > diff --git a/tools/testing/selftests/bpf/get_cgroup_id_user.c b/tools/testing/selftests/bpf/get_cgroup_id_user.c > index 156743cf5870..4fa61ac8a0ee 100644 > --- a/tools/testing/selftests/bpf/get_cgroup_id_user.c > +++ b/tools/testing/selftests/bpf/get_cgroup_id_user.c > @@ -86,8 +86,12 @@ int main(int argc, char **argv) > pid = getpid(); > bpf_map_update_elem(pidmap_fd, &key, &pid, 0); > > - snprintf(buf, sizeof(buf), > - "/sys/kernel/debug/tracing/events/%s/id", probe_name); > + if (access("/sys/kernel/tracing/trace", F_OK) == 0) > + snprintf(buf, sizeof(buf), > + "/sys/kernel/tracing/events/%s/id", probe_name); > + else > + snprintf(buf, sizeof(buf), > + "/sys/kernel/debug/tracing/events/%s/id", probe_name); I don't know how the BPF folks feel, but I do know some kernel developers prefer that if you need to break a single command into multiple lines that you then need to add brackets around it. As it makes it easier to read. if (access("/sys/kernel/tracing/trace", F_OK) == 0) { snprintf(buf, sizeof(buf), "/sys/kernel/tracing/events/%s/id", probe_name); } else { snprintf(buf, sizeof(buf), "/sys/kernel/debug/tracing/events/%s/id", probe_name); } > efd = open(buf, O_RDONLY, 0); > if (CHECK(efd < 0, "open", "err %d errno %d\n", efd, errno)) > goto close_prog; > diff --git a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c > index 113dba349a57..22be0a9a5a0a 100644 > --- a/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c > +++ b/tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c > @@ -338,7 +338,12 @@ static int get_syms(char ***symsp, size_t *cntp, bool kernel) > * Filtering out duplicates by using hashmap__add, which won't > * add existing entry. > */ > - f = fopen("/sys/kernel/debug/tracing/available_filter_functions", "r"); > + > + if (access("/sys/kernel/tracing/trace", F_OK) == 0) > + f = fopen("/sys/kernel/tracing/available_filter_functions", "r"); > + else > + f = fopen("/sys/kernel/debug/tracing/available_filter_functions", "r"); > + > if (!f) > return -EINVAL; > > diff --git a/tools/testing/selftests/bpf/prog_tests/task_fd_query_tp.c b/tools/testing/selftests/bpf/prog_tests/task_fd_query_tp.c > index c717741bf8b6..60f92fd3c37a 100644 > --- a/tools/testing/selftests/bpf/prog_tests/task_fd_query_tp.c > +++ b/tools/testing/selftests/bpf/prog_tests/task_fd_query_tp.c > @@ -17,8 +17,12 @@ static void test_task_fd_query_tp_core(const char *probe_name, > if (CHECK(err, "bpf_prog_test_load", "err %d errno %d\n", err, errno)) > goto close_prog; > > - snprintf(buf, sizeof(buf), > - "/sys/kernel/debug/tracing/events/%s/id", probe_name); > + if (access("/sys/kernel/tracing/trace", F_OK) == 0) > + snprintf(buf, sizeof(buf), > + "/sys/kernel/tracing/events/%s/id", probe_name); > + else > + snprintf(buf, sizeof(buf), > + "/sys/kernel/debug/tracing/events/%s/id", probe_name); Same here. > efd = open(buf, O_RDONLY, 0); > if (CHECK(efd < 0, "open", "err %d errno %d\n", efd, errno)) > goto close_prog; > diff --git a/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c b/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c > index 770fcc3bb1ba..d3e377fa8e9b 100644 > --- a/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c > +++ b/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c > @@ -16,8 +16,12 @@ void serial_test_tp_attach_query(void) > for (i = 0; i < num_progs; i++) > obj[i] = NULL; > > - snprintf(buf, sizeof(buf), > - "/sys/kernel/debug/tracing/events/sched/sched_switch/id"); > + if (access("/sys/kernel/tracing/trace", F_OK) == 0) > + snprintf(buf, sizeof(buf), > + "/sys/kernel/tracing/events/sched/sched_switch/id"); > + else > + snprintf(buf, sizeof(buf), > + "/sys/kernel/debug/tracing/events/sched/sched_switch/id"); and here. But perhaps the BPF folks don't care? -- Steve > efd = open(buf, O_RDONLY, 0); > if (CHECK(efd < 0, "open", "err %d errno %d\n", efd, errno)) > return;