From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.2 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_2 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E0040C07E9E for ; Wed, 7 Jul 2021 22:45:24 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BF84761A33 for ; Wed, 7 Jul 2021 22:45:24 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231479AbhGGWsE (ORCPT ); Wed, 7 Jul 2021 18:48:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:35176 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230266AbhGGWsD (ORCPT ); Wed, 7 Jul 2021 18:48:03 -0400 Received: from rorschach.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BA9B861CAC; Wed, 7 Jul 2021 22:45:21 +0000 (UTC) Date: Wed, 7 Jul 2021 18:45:18 -0400 From: Steven Rostedt To: Andrii Nakryiko Cc: LKML , syzbot+721aa903751db87aa244@syzkaller.appspotmail.com, Tetsuo Handa , Mathieu Desnoyers , Ingo Molnar , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , netdev , bpf Subject: Re: [PATCH] tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing Message-ID: <20210707184518.618ae497@rorschach.local.home> In-Reply-To: References: <20210629095543.391ac606@oasis.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 7 Jul 2021 15:12:28 -0700 Andrii Nakryiko wrote: > There doesn't seem to be anything conceptually wrong with attaching > the same BPF program twice to the same tracepoint. Is it a hard > requirement to have a unique tp+callback combination, or was it done > mostly to detect an API misuse? How hard is it to support such use > cases? > > I was surprised to discover this is not supported (though I never had > a use for this, had to construct a test to see the warning). The callback is identified by the function and its data combination. If there's two callbacks calling the same function with the same data on the same tracepoint, one question is, why? And the second is how do you differentiate the two? -- Steve