Re: [GIT PULL] tracing: Updates for v6.13

From: Linus Torvalds
Date: Fri Nov 22 2024 - 17:30:40 EST


On Fri, 22 Nov 2024 at 14:12, Steven Rostedt <rostedt@xxxxxxxxxxx> wrote:
>
> Hmm, if we make a __DO_TRACE_SYSCALL(), I don't think it needs to even have
> that condition parameter.

That was my point. The whole conditional - and the parameter - seems
to be completely pointless as far as I can tell.

That said, I think you can actually simplify things even further: if
you move the TO_CONDITION() checking into the caller, you could move
the locking there too.

IOW, instead of this pattern:

if (static_branch_unlikely(&__tracepoint_##name.key)) \
__DO_TRACE(name, \
TP_ARGS(args), \
TP_CONDITION(cond), 0); \

you could make it be something like this instead:

if (static_branch_unlikely(&__tracepoint_##name.key)) \
if (TP_CONDITION(cond)) \
scoped_guard(preempt_notrace) \
__DO_TRACE(name, TP_ARGS(args)); \

where __DO_TRACE() would get neither the "cond" argument _nor_ that
locking argument, because both are just done by the two users (the
other one would use "scoped_guard(rcu_read_trace)" of course.

And look, this is another reason why unconditional locking is a good
thing: now you can use the "guard()" model for the lock, and don't
need an explicit unlock, simplifying the code more.

Of course, you want "guard(rcu_read_trace)" (for system call events)
and "guard(preempt_notrace)" (for the regular trace event case), and
we don't have the "notrace" versions of those guard classes yet.

But adding those would literally be trivial, ie something like

DEFINE_LOCK_GUARD_0(rcu_notrace,
rcu_read_lock_notrace(), rcu_read_unlock_notrace())

wouldn't that make it all look really nice?

NOTE NOTE NOTE! I didn't actually try any of the above in real life,
so I might be missing some important detail. I'm just pointing out
that making this all unconditional and not based on random flags has
the potential for even more cleanups.

And I might have gotten the different lock names confused too.

Linus