diff options
author | Li Zefan <lizf@cn.fujitsu.com> | 2009-08-07 04:33:43 +0200 |
---|---|---|
committer | Steven Rostedt <rostedt@goodmis.org> | 2009-08-26 06:32:07 +0200 |
commit | 87a342f5db69d53ea70493bb1ec69c9047677038 (patch) | |
tree | 89ec97b3a32d6508d10f1598201e48a24c08c46e /kernel/trace/trace.h | |
parent | tracing/filters: Add __field_ext() to TRACE_EVENT (diff) | |
download | linux-87a342f5db69d53ea70493bb1ec69c9047677038.tar.xz linux-87a342f5db69d53ea70493bb1ec69c9047677038.zip |
tracing/filters: Support filtering for char * strings
Usually, char * entries are dangerous in traces because the string
can be released whereas a pointer to it can still wait to be read from
the ring buffer.
But sometimes we can assume it's safe, like in case of RO data
(eg: __file__ or __line__, used in bkl trace event). If these RO data
are in a module and so is the call to the trace event, then it's safe,
because the ring buffer will be flushed once this module get unloaded.
To allow char * to be treated as a string:
TRACE_EVENT(...,
TP_STRUCT__entry(
__field_ext(const char *, name, FILTER_PTR_STRING)
...
)
...
);
The filtering will not dereference "char *" unless the developer
explicitly sets FILTER_PTR_STR in __field_ext.
Signed-off-by: Li Zefan <lizf@cn.fujitsu.com>
LKML-Reference: <4A7B9287.90205@cn.fujitsu.com>
Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
Diffstat (limited to 'kernel/trace/trace.h')
0 files changed, 0 insertions, 0 deletions