diff options
author | Stephen Rothwell <sfr@canb.auug.org.au> | 2015-03-12 01:58:34 -0400 |
---|---|---|
committer | Steven Rostedt <rostedt@goodmis.org> | 2015-03-25 08:57:23 -0400 |
commit | d9a16d3ab8770357015c85a07387f1d2676a4773 (patch) | |
tree | dda7ffadc88f05c45f121074103a4c0e09c7f57e /kernel/trace/trace_probe.c | |
parent | 754cb0071a5c9576ccfa6523969ef6a2f6a71676 (diff) |
trace: Don't use __weak in header files
The commit that added a check for this to checkpatch says:
"Using weak declarations can have unintended link defects. The __weak on
the declaration causes non-weak definitions to become weak."
In this case, when a PowerPC kernel is built with CONFIG_KPROBE_EVENT
but not CONFIG_UPROBE_EVENT, it generates the following warning:
WARNING: 1 bad relocations
c0000000014f2190 R_PPC64_ADDR64 uprobes_fetch_type_table
This is fixed by passing the fetch_table arrays to
traceprobe_parse_probe_arg() which also means that they can never be NULL.
Link: http://lkml.kernel.org/r/20150312165834.4482cb48@canb.auug.org.au
Acked-by: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
Diffstat (limited to 'kernel/trace/trace_probe.c')
-rw-r--r-- | kernel/trace/trace_probe.c | 19 |
1 files changed, 7 insertions, 12 deletions
diff --git a/kernel/trace/trace_probe.c b/kernel/trace/trace_probe.c index b983b2fd2ca1..1769a81da8a7 100644 --- a/kernel/trace/trace_probe.c +++ b/kernel/trace/trace_probe.c | |||
@@ -356,17 +356,14 @@ static int parse_probe_vars(char *arg, const struct fetch_type *t, | |||
356 | 356 | ||
357 | /* Recursive argument parser */ | 357 | /* Recursive argument parser */ |
358 | static int parse_probe_arg(char *arg, const struct fetch_type *t, | 358 | static int parse_probe_arg(char *arg, const struct fetch_type *t, |
359 | struct fetch_param *f, bool is_return, bool is_kprobe) | 359 | struct fetch_param *f, bool is_return, bool is_kprobe, |
360 | const struct fetch_type *ftbl) | ||
360 | { | 361 | { |
361 | const struct fetch_type *ftbl; | ||
362 | unsigned long param; | 362 | unsigned long param; |
363 | long offset; | 363 | long offset; |
364 | char *tmp; | 364 | char *tmp; |
365 | int ret = 0; | 365 | int ret = 0; |
366 | 366 | ||
367 | ftbl = is_kprobe ? kprobes_fetch_type_table : uprobes_fetch_type_table; | ||
368 | BUG_ON(ftbl == NULL); | ||
369 | |||
370 | switch (arg[0]) { | 367 | switch (arg[0]) { |
371 | case '$': | 368 | case '$': |
372 | ret = parse_probe_vars(arg + 1, t, f, is_return, is_kprobe); | 369 | ret = parse_probe_vars(arg + 1, t, f, is_return, is_kprobe); |
@@ -447,7 +444,7 @@ static int parse_probe_arg(char *arg, const struct fetch_type *t, | |||
447 | dprm->fetch_size = get_fetch_size_function(t, | 444 | dprm->fetch_size = get_fetch_size_function(t, |
448 | dprm->fetch, ftbl); | 445 | dprm->fetch, ftbl); |
449 | ret = parse_probe_arg(arg, t2, &dprm->orig, is_return, | 446 | ret = parse_probe_arg(arg, t2, &dprm->orig, is_return, |
450 | is_kprobe); | 447 | is_kprobe, ftbl); |
451 | if (ret) | 448 | if (ret) |
452 | kfree(dprm); | 449 | kfree(dprm); |
453 | else { | 450 | else { |
@@ -505,15 +502,12 @@ static int __parse_bitfield_probe_arg(const char *bf, | |||
505 | 502 | ||
506 | /* String length checking wrapper */ | 503 | /* String length checking wrapper */ |
507 | int traceprobe_parse_probe_arg(char *arg, ssize_t *size, | 504 | int traceprobe_parse_probe_arg(char *arg, ssize_t *size, |
508 | struct probe_arg *parg, bool is_return, bool is_kprobe) | 505 | struct probe_arg *parg, bool is_return, bool is_kprobe, |
506 | const struct fetch_type *ftbl) | ||
509 | { | 507 | { |
510 | const struct fetch_type *ftbl; | ||
511 | const char *t; | 508 | const char *t; |
512 | int ret; | 509 | int ret; |
513 | 510 | ||
514 | ftbl = is_kprobe ? kprobes_fetch_type_table : uprobes_fetch_type_table; | ||
515 | BUG_ON(ftbl == NULL); | ||
516 | |||
517 | if (strlen(arg) > MAX_ARGSTR_LEN) { | 511 | if (strlen(arg) > MAX_ARGSTR_LEN) { |
518 | pr_info("Argument is too long.: %s\n", arg); | 512 | pr_info("Argument is too long.: %s\n", arg); |
519 | return -ENOSPC; | 513 | return -ENOSPC; |
@@ -535,7 +529,8 @@ int traceprobe_parse_probe_arg(char *arg, ssize_t *size, | |||
535 | } | 529 | } |
536 | parg->offset = *size; | 530 | parg->offset = *size; |
537 | *size += parg->type->size; | 531 | *size += parg->type->size; |
538 | ret = parse_probe_arg(arg, parg->type, &parg->fetch, is_return, is_kprobe); | 532 | ret = parse_probe_arg(arg, parg->type, &parg->fetch, is_return, |
533 | is_kprobe, ftbl); | ||
539 | 534 | ||
540 | if (ret >= 0 && t != NULL) | 535 | if (ret >= 0 && t != NULL) |
541 | ret = __parse_bitfield_probe_arg(t, parg->type, &parg->fetch); | 536 | ret = __parse_bitfield_probe_arg(t, parg->type, &parg->fetch); |