b8c0aa46b3
to the ftrace function callback infrastructure. It's introducing a way to allow different functions to call directly different trampolines instead of all calling the same "mcount" one. The only user of this for now is the function graph tracer, which always had a different trampoline, but the function tracer trampoline was called and did basically nothing, and then the function graph tracer trampoline was called. The difference now, is that the function graph tracer trampoline can be called directly if a function is only being traced by the function graph trampoline. If function tracing is also happening on the same function, the old way is still done. The accounting for this takes up more memory when function graph tracing is activated, as it needs to keep track of which functions it uses. I have a new way that wont take as much memory, but it's not ready yet for this merge window, and will have to wait for the next one. Another big change was the removal of the ftrace_start/stop() calls that were used by the suspend/resume code that stopped function tracing when entering into suspend and resume paths. The stop of ftrace was done because there was some function that would crash the system if one called smp_processor_id()! The stop/start was a big hammer to solve the issue at the time, which was when ftrace was first introduced into Linux. Now ftrace has better infrastructure to debug such issues, and I found the problem function and labeled it with "notrace" and function tracing can now safely be activated all the way down into the guts of suspend and resume. Other changes include clean ups of uprobe code. Clean up of the trace_seq() code. And other various small fixes and clean ups to ftrace and tracing. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAABAgAGBQJT35zXAAoJEKQekfcNnQGuOz0H/38zqM0nLFhrgvz3EPk2UOjn xqpX8qyb2V7TJZL+IqeXU2a5cQZl5ba0D4WtBGpxbTae3CJYiuQ87iKUNFoH0om5 FDpn80igb368k8V3qRdRsziKVCCf0XBd/NkHJXc0ZkfXGyzB2Ga4bBxALxp2gj9y bnO+vKo6+tWYKG4hyQb4P3LRXUrK8/LWEsPr39cH2QH1Rdj69Lx9CgrCdUVJmwcb Bj8hEiLXL/RYCFNn79A3wNTUvW0rG/AOIf4SLqXtasSRZ0ToaU0ZyDnrNv+0Ol47 rX8tSk+LfXchL9hpIvjCf1vlAYq3pO02favteR/jip3lx/dTjEDE4RJ9qtJzZ4Q= =fwQY -----END PGP SIGNATURE----- Merge tag 'trace-3.17' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace Pull tracing updates from Steven Rostedt: "This pull request has a lot of work done. The main thing is the changes to the ftrace function callback infrastructure. It's introducing a way to allow different functions to call directly different trampolines instead of all calling the same "mcount" one. The only user of this for now is the function graph tracer, which always had a different trampoline, but the function tracer trampoline was called and did basically nothing, and then the function graph tracer trampoline was called. The difference now, is that the function graph tracer trampoline can be called directly if a function is only being traced by the function graph trampoline. If function tracing is also happening on the same function, the old way is still done. The accounting for this takes up more memory when function graph tracing is activated, as it needs to keep track of which functions it uses. I have a new way that wont take as much memory, but it's not ready yet for this merge window, and will have to wait for the next one. Another big change was the removal of the ftrace_start/stop() calls that were used by the suspend/resume code that stopped function tracing when entering into suspend and resume paths. The stop of ftrace was done because there was some function that would crash the system if one called smp_processor_id()! The stop/start was a big hammer to solve the issue at the time, which was when ftrace was first introduced into Linux. Now ftrace has better infrastructure to debug such issues, and I found the problem function and labeled it with "notrace" and function tracing can now safely be activated all the way down into the guts of suspend and resume Other changes include clean ups of uprobe code, clean up of the trace_seq() code, and other various small fixes and clean ups to ftrace and tracing" * tag 'trace-3.17' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace: (57 commits) ftrace: Add warning if tramp hash does not match nr_trampolines ftrace: Fix trampoline hash update check on rec->flags ring-buffer: Use rb_page_size() instead of open coded head_page size ftrace: Rename ftrace_ops field from trampolines to nr_trampolines tracing: Convert local function_graph functions to static ftrace: Do not copy old hash when resetting tracing: let user specify tracing_thresh after selecting function_graph ring-buffer: Always run per-cpu ring buffer resize with schedule_work_on() tracing: Remove function_trace_stop and HAVE_FUNCTION_TRACE_MCOUNT_TEST s390/ftrace: remove check of obsolete variable function_trace_stop arm64, ftrace: Remove check of obsolete variable function_trace_stop Blackfin: ftrace: Remove check of obsolete variable function_trace_stop metag: ftrace: Remove check of obsolete variable function_trace_stop microblaze: ftrace: Remove check of obsolete variable function_trace_stop MIPS: ftrace: Remove check of obsolete variable function_trace_stop parisc: ftrace: Remove check of obsolete variable function_trace_stop sh: ftrace: Remove check of obsolete variable function_trace_stop sparc64,ftrace: Remove check of obsolete variable function_trace_stop tile: ftrace: Remove check of obsolete variable function_trace_stop ftrace: x86: Remove check of obsolete variable function_trace_stop ...
6900 lines
163 KiB
C
6900 lines
163 KiB
C
/*
|
|
* ring buffer based function tracer
|
|
*
|
|
* Copyright (C) 2007-2012 Steven Rostedt <srostedt@redhat.com>
|
|
* Copyright (C) 2008 Ingo Molnar <mingo@redhat.com>
|
|
*
|
|
* Originally taken from the RT patch by:
|
|
* Arnaldo Carvalho de Melo <acme@redhat.com>
|
|
*
|
|
* Based on code from the latency_tracer, that is:
|
|
* Copyright (C) 2004-2006 Ingo Molnar
|
|
* Copyright (C) 2004 Nadia Yvette Chambers
|
|
*/
|
|
#include <linux/ring_buffer.h>
|
|
#include <generated/utsrelease.h>
|
|
#include <linux/stacktrace.h>
|
|
#include <linux/writeback.h>
|
|
#include <linux/kallsyms.h>
|
|
#include <linux/seq_file.h>
|
|
#include <linux/notifier.h>
|
|
#include <linux/irqflags.h>
|
|
#include <linux/debugfs.h>
|
|
#include <linux/pagemap.h>
|
|
#include <linux/hardirq.h>
|
|
#include <linux/linkage.h>
|
|
#include <linux/uaccess.h>
|
|
#include <linux/kprobes.h>
|
|
#include <linux/ftrace.h>
|
|
#include <linux/module.h>
|
|
#include <linux/percpu.h>
|
|
#include <linux/splice.h>
|
|
#include <linux/kdebug.h>
|
|
#include <linux/string.h>
|
|
#include <linux/rwsem.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/ctype.h>
|
|
#include <linux/init.h>
|
|
#include <linux/poll.h>
|
|
#include <linux/nmi.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/sched/rt.h>
|
|
|
|
#include "trace.h"
|
|
#include "trace_output.h"
|
|
|
|
/*
|
|
* On boot up, the ring buffer is set to the minimum size, so that
|
|
* we do not waste memory on systems that are not using tracing.
|
|
*/
|
|
bool ring_buffer_expanded;
|
|
|
|
/*
|
|
* We need to change this state when a selftest is running.
|
|
* A selftest will lurk into the ring-buffer to count the
|
|
* entries inserted during the selftest although some concurrent
|
|
* insertions into the ring-buffer such as trace_printk could occurred
|
|
* at the same time, giving false positive or negative results.
|
|
*/
|
|
static bool __read_mostly tracing_selftest_running;
|
|
|
|
/*
|
|
* If a tracer is running, we do not want to run SELFTEST.
|
|
*/
|
|
bool __read_mostly tracing_selftest_disabled;
|
|
|
|
/* For tracers that don't implement custom flags */
|
|
static struct tracer_opt dummy_tracer_opt[] = {
|
|
{ }
|
|
};
|
|
|
|
static struct tracer_flags dummy_tracer_flags = {
|
|
.val = 0,
|
|
.opts = dummy_tracer_opt
|
|
};
|
|
|
|
static int
|
|
dummy_set_flag(struct trace_array *tr, u32 old_flags, u32 bit, int set)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* To prevent the comm cache from being overwritten when no
|
|
* tracing is active, only save the comm when a trace event
|
|
* occurred.
|
|
*/
|
|
static DEFINE_PER_CPU(bool, trace_cmdline_save);
|
|
|
|
/*
|
|
* Kill all tracing for good (never come back).
|
|
* It is initialized to 1 but will turn to zero if the initialization
|
|
* of the tracer is successful. But that is the only place that sets
|
|
* this back to zero.
|
|
*/
|
|
static int tracing_disabled = 1;
|
|
|
|
DEFINE_PER_CPU(int, ftrace_cpu_disabled);
|
|
|
|
cpumask_var_t __read_mostly tracing_buffer_mask;
|
|
|
|
/*
|
|
* ftrace_dump_on_oops - variable to dump ftrace buffer on oops
|
|
*
|
|
* If there is an oops (or kernel panic) and the ftrace_dump_on_oops
|
|
* is set, then ftrace_dump is called. This will output the contents
|
|
* of the ftrace buffers to the console. This is very useful for
|
|
* capturing traces that lead to crashes and outputing it to a
|
|
* serial console.
|
|
*
|
|
* It is default off, but you can enable it with either specifying
|
|
* "ftrace_dump_on_oops" in the kernel command line, or setting
|
|
* /proc/sys/kernel/ftrace_dump_on_oops
|
|
* Set 1 if you want to dump buffers of all CPUs
|
|
* Set 2 if you want to dump the buffer of the CPU that triggered oops
|
|
*/
|
|
|
|
enum ftrace_dump_mode ftrace_dump_on_oops;
|
|
|
|
/* When set, tracing will stop when a WARN*() is hit */
|
|
int __disable_trace_on_warning;
|
|
|
|
static int tracing_set_tracer(struct trace_array *tr, const char *buf);
|
|
|
|
#define MAX_TRACER_SIZE 100
|
|
static char bootup_tracer_buf[MAX_TRACER_SIZE] __initdata;
|
|
static char *default_bootup_tracer;
|
|
|
|
static bool allocate_snapshot;
|
|
|
|
static int __init set_cmdline_ftrace(char *str)
|
|
{
|
|
strlcpy(bootup_tracer_buf, str, MAX_TRACER_SIZE);
|
|
default_bootup_tracer = bootup_tracer_buf;
|
|
/* We are using ftrace early, expand it */
|
|
ring_buffer_expanded = true;
|
|
return 1;
|
|
}
|
|
__setup("ftrace=", set_cmdline_ftrace);
|
|
|
|
static int __init set_ftrace_dump_on_oops(char *str)
|
|
{
|
|
if (*str++ != '=' || !*str) {
|
|
ftrace_dump_on_oops = DUMP_ALL;
|
|
return 1;
|
|
}
|
|
|
|
if (!strcmp("orig_cpu", str)) {
|
|
ftrace_dump_on_oops = DUMP_ORIG;
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
__setup("ftrace_dump_on_oops", set_ftrace_dump_on_oops);
|
|
|
|
static int __init stop_trace_on_warning(char *str)
|
|
{
|
|
__disable_trace_on_warning = 1;
|
|
return 1;
|
|
}
|
|
__setup("traceoff_on_warning=", stop_trace_on_warning);
|
|
|
|
static int __init boot_alloc_snapshot(char *str)
|
|
{
|
|
allocate_snapshot = true;
|
|
/* We also need the main ring buffer expanded */
|
|
ring_buffer_expanded = true;
|
|
return 1;
|
|
}
|
|
__setup("alloc_snapshot", boot_alloc_snapshot);
|
|
|
|
|
|
static char trace_boot_options_buf[MAX_TRACER_SIZE] __initdata;
|
|
static char *trace_boot_options __initdata;
|
|
|
|
static int __init set_trace_boot_options(char *str)
|
|
{
|
|
strlcpy(trace_boot_options_buf, str, MAX_TRACER_SIZE);
|
|
trace_boot_options = trace_boot_options_buf;
|
|
return 0;
|
|
}
|
|
__setup("trace_options=", set_trace_boot_options);
|
|
|
|
static char trace_boot_clock_buf[MAX_TRACER_SIZE] __initdata;
|
|
static char *trace_boot_clock __initdata;
|
|
|
|
static int __init set_trace_boot_clock(char *str)
|
|
{
|
|
strlcpy(trace_boot_clock_buf, str, MAX_TRACER_SIZE);
|
|
trace_boot_clock = trace_boot_clock_buf;
|
|
return 0;
|
|
}
|
|
__setup("trace_clock=", set_trace_boot_clock);
|
|
|
|
|
|
unsigned long long ns2usecs(cycle_t nsec)
|
|
{
|
|
nsec += 500;
|
|
do_div(nsec, 1000);
|
|
return nsec;
|
|
}
|
|
|
|
/*
|
|
* The global_trace is the descriptor that holds the tracing
|
|
* buffers for the live tracing. For each CPU, it contains
|
|
* a link list of pages that will store trace entries. The
|
|
* page descriptor of the pages in the memory is used to hold
|
|
* the link list by linking the lru item in the page descriptor
|
|
* to each of the pages in the buffer per CPU.
|
|
*
|
|
* For each active CPU there is a data field that holds the
|
|
* pages for the buffer for that CPU. Each CPU has the same number
|
|
* of pages allocated for its buffer.
|
|
*/
|
|
static struct trace_array global_trace;
|
|
|
|
LIST_HEAD(ftrace_trace_arrays);
|
|
|
|
int trace_array_get(struct trace_array *this_tr)
|
|
{
|
|
struct trace_array *tr;
|
|
int ret = -ENODEV;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
list_for_each_entry(tr, &ftrace_trace_arrays, list) {
|
|
if (tr == this_tr) {
|
|
tr->ref++;
|
|
ret = 0;
|
|
break;
|
|
}
|
|
}
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void __trace_array_put(struct trace_array *this_tr)
|
|
{
|
|
WARN_ON(!this_tr->ref);
|
|
this_tr->ref--;
|
|
}
|
|
|
|
void trace_array_put(struct trace_array *this_tr)
|
|
{
|
|
mutex_lock(&trace_types_lock);
|
|
__trace_array_put(this_tr);
|
|
mutex_unlock(&trace_types_lock);
|
|
}
|
|
|
|
int filter_check_discard(struct ftrace_event_file *file, void *rec,
|
|
struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event)
|
|
{
|
|
if (unlikely(file->flags & FTRACE_EVENT_FL_FILTERED) &&
|
|
!filter_match_preds(file->filter, rec)) {
|
|
ring_buffer_discard_commit(buffer, event);
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
EXPORT_SYMBOL_GPL(filter_check_discard);
|
|
|
|
int call_filter_check_discard(struct ftrace_event_call *call, void *rec,
|
|
struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event)
|
|
{
|
|
if (unlikely(call->flags & TRACE_EVENT_FL_FILTERED) &&
|
|
!filter_match_preds(call->filter, rec)) {
|
|
ring_buffer_discard_commit(buffer, event);
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
EXPORT_SYMBOL_GPL(call_filter_check_discard);
|
|
|
|
static cycle_t buffer_ftrace_now(struct trace_buffer *buf, int cpu)
|
|
{
|
|
u64 ts;
|
|
|
|
/* Early boot up does not have a buffer yet */
|
|
if (!buf->buffer)
|
|
return trace_clock_local();
|
|
|
|
ts = ring_buffer_time_stamp(buf->buffer, cpu);
|
|
ring_buffer_normalize_time_stamp(buf->buffer, cpu, &ts);
|
|
|
|
return ts;
|
|
}
|
|
|
|
cycle_t ftrace_now(int cpu)
|
|
{
|
|
return buffer_ftrace_now(&global_trace.trace_buffer, cpu);
|
|
}
|
|
|
|
/**
|
|
* tracing_is_enabled - Show if global_trace has been disabled
|
|
*
|
|
* Shows if the global trace has been enabled or not. It uses the
|
|
* mirror flag "buffer_disabled" to be used in fast paths such as for
|
|
* the irqsoff tracer. But it may be inaccurate due to races. If you
|
|
* need to know the accurate state, use tracing_is_on() which is a little
|
|
* slower, but accurate.
|
|
*/
|
|
int tracing_is_enabled(void)
|
|
{
|
|
/*
|
|
* For quick access (irqsoff uses this in fast path), just
|
|
* return the mirror variable of the state of the ring buffer.
|
|
* It's a little racy, but we don't really care.
|
|
*/
|
|
smp_rmb();
|
|
return !global_trace.buffer_disabled;
|
|
}
|
|
|
|
/*
|
|
* trace_buf_size is the size in bytes that is allocated
|
|
* for a buffer. Note, the number of bytes is always rounded
|
|
* to page size.
|
|
*
|
|
* This number is purposely set to a low number of 16384.
|
|
* If the dump on oops happens, it will be much appreciated
|
|
* to not have to wait for all that output. Anyway this can be
|
|
* boot time and run time configurable.
|
|
*/
|
|
#define TRACE_BUF_SIZE_DEFAULT 1441792UL /* 16384 * 88 (sizeof(entry)) */
|
|
|
|
static unsigned long trace_buf_size = TRACE_BUF_SIZE_DEFAULT;
|
|
|
|
/* trace_types holds a link list of available tracers. */
|
|
static struct tracer *trace_types __read_mostly;
|
|
|
|
/*
|
|
* trace_types_lock is used to protect the trace_types list.
|
|
*/
|
|
DEFINE_MUTEX(trace_types_lock);
|
|
|
|
/*
|
|
* serialize the access of the ring buffer
|
|
*
|
|
* ring buffer serializes readers, but it is low level protection.
|
|
* The validity of the events (which returns by ring_buffer_peek() ..etc)
|
|
* are not protected by ring buffer.
|
|
*
|
|
* The content of events may become garbage if we allow other process consumes
|
|
* these events concurrently:
|
|
* A) the page of the consumed events may become a normal page
|
|
* (not reader page) in ring buffer, and this page will be rewrited
|
|
* by events producer.
|
|
* B) The page of the consumed events may become a page for splice_read,
|
|
* and this page will be returned to system.
|
|
*
|
|
* These primitives allow multi process access to different cpu ring buffer
|
|
* concurrently.
|
|
*
|
|
* These primitives don't distinguish read-only and read-consume access.
|
|
* Multi read-only access are also serialized.
|
|
*/
|
|
|
|
#ifdef CONFIG_SMP
|
|
static DECLARE_RWSEM(all_cpu_access_lock);
|
|
static DEFINE_PER_CPU(struct mutex, cpu_access_lock);
|
|
|
|
static inline void trace_access_lock(int cpu)
|
|
{
|
|
if (cpu == RING_BUFFER_ALL_CPUS) {
|
|
/* gain it for accessing the whole ring buffer. */
|
|
down_write(&all_cpu_access_lock);
|
|
} else {
|
|
/* gain it for accessing a cpu ring buffer. */
|
|
|
|
/* Firstly block other trace_access_lock(RING_BUFFER_ALL_CPUS). */
|
|
down_read(&all_cpu_access_lock);
|
|
|
|
/* Secondly block other access to this @cpu ring buffer. */
|
|
mutex_lock(&per_cpu(cpu_access_lock, cpu));
|
|
}
|
|
}
|
|
|
|
static inline void trace_access_unlock(int cpu)
|
|
{
|
|
if (cpu == RING_BUFFER_ALL_CPUS) {
|
|
up_write(&all_cpu_access_lock);
|
|
} else {
|
|
mutex_unlock(&per_cpu(cpu_access_lock, cpu));
|
|
up_read(&all_cpu_access_lock);
|
|
}
|
|
}
|
|
|
|
static inline void trace_access_lock_init(void)
|
|
{
|
|
int cpu;
|
|
|
|
for_each_possible_cpu(cpu)
|
|
mutex_init(&per_cpu(cpu_access_lock, cpu));
|
|
}
|
|
|
|
#else
|
|
|
|
static DEFINE_MUTEX(access_lock);
|
|
|
|
static inline void trace_access_lock(int cpu)
|
|
{
|
|
(void)cpu;
|
|
mutex_lock(&access_lock);
|
|
}
|
|
|
|
static inline void trace_access_unlock(int cpu)
|
|
{
|
|
(void)cpu;
|
|
mutex_unlock(&access_lock);
|
|
}
|
|
|
|
static inline void trace_access_lock_init(void)
|
|
{
|
|
}
|
|
|
|
#endif
|
|
|
|
/* trace_flags holds trace_options default values */
|
|
unsigned long trace_flags = TRACE_ITER_PRINT_PARENT | TRACE_ITER_PRINTK |
|
|
TRACE_ITER_ANNOTATE | TRACE_ITER_CONTEXT_INFO | TRACE_ITER_SLEEP_TIME |
|
|
TRACE_ITER_GRAPH_TIME | TRACE_ITER_RECORD_CMD | TRACE_ITER_OVERWRITE |
|
|
TRACE_ITER_IRQ_INFO | TRACE_ITER_MARKERS | TRACE_ITER_FUNCTION;
|
|
|
|
static void tracer_tracing_on(struct trace_array *tr)
|
|
{
|
|
if (tr->trace_buffer.buffer)
|
|
ring_buffer_record_on(tr->trace_buffer.buffer);
|
|
/*
|
|
* This flag is looked at when buffers haven't been allocated
|
|
* yet, or by some tracers (like irqsoff), that just want to
|
|
* know if the ring buffer has been disabled, but it can handle
|
|
* races of where it gets disabled but we still do a record.
|
|
* As the check is in the fast path of the tracers, it is more
|
|
* important to be fast than accurate.
|
|
*/
|
|
tr->buffer_disabled = 0;
|
|
/* Make the flag seen by readers */
|
|
smp_wmb();
|
|
}
|
|
|
|
/**
|
|
* tracing_on - enable tracing buffers
|
|
*
|
|
* This function enables tracing buffers that may have been
|
|
* disabled with tracing_off.
|
|
*/
|
|
void tracing_on(void)
|
|
{
|
|
tracer_tracing_on(&global_trace);
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_on);
|
|
|
|
/**
|
|
* __trace_puts - write a constant string into the trace buffer.
|
|
* @ip: The address of the caller
|
|
* @str: The constant string to write
|
|
* @size: The size of the string.
|
|
*/
|
|
int __trace_puts(unsigned long ip, const char *str, int size)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer *buffer;
|
|
struct print_entry *entry;
|
|
unsigned long irq_flags;
|
|
int alloc;
|
|
int pc;
|
|
|
|
if (!(trace_flags & TRACE_ITER_PRINTK))
|
|
return 0;
|
|
|
|
pc = preempt_count();
|
|
|
|
if (unlikely(tracing_selftest_running || tracing_disabled))
|
|
return 0;
|
|
|
|
alloc = sizeof(*entry) + size + 2; /* possible \n added */
|
|
|
|
local_save_flags(irq_flags);
|
|
buffer = global_trace.trace_buffer.buffer;
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_PRINT, alloc,
|
|
irq_flags, pc);
|
|
if (!event)
|
|
return 0;
|
|
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
|
|
memcpy(&entry->buf, str, size);
|
|
|
|
/* Add a newline if necessary */
|
|
if (entry->buf[size - 1] != '\n') {
|
|
entry->buf[size] = '\n';
|
|
entry->buf[size + 1] = '\0';
|
|
} else
|
|
entry->buf[size] = '\0';
|
|
|
|
__buffer_unlock_commit(buffer, event);
|
|
ftrace_trace_stack(buffer, irq_flags, 4, pc);
|
|
|
|
return size;
|
|
}
|
|
EXPORT_SYMBOL_GPL(__trace_puts);
|
|
|
|
/**
|
|
* __trace_bputs - write the pointer to a constant string into trace buffer
|
|
* @ip: The address of the caller
|
|
* @str: The constant string to write to the buffer to
|
|
*/
|
|
int __trace_bputs(unsigned long ip, const char *str)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer *buffer;
|
|
struct bputs_entry *entry;
|
|
unsigned long irq_flags;
|
|
int size = sizeof(struct bputs_entry);
|
|
int pc;
|
|
|
|
if (!(trace_flags & TRACE_ITER_PRINTK))
|
|
return 0;
|
|
|
|
pc = preempt_count();
|
|
|
|
if (unlikely(tracing_selftest_running || tracing_disabled))
|
|
return 0;
|
|
|
|
local_save_flags(irq_flags);
|
|
buffer = global_trace.trace_buffer.buffer;
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_BPUTS, size,
|
|
irq_flags, pc);
|
|
if (!event)
|
|
return 0;
|
|
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
entry->str = str;
|
|
|
|
__buffer_unlock_commit(buffer, event);
|
|
ftrace_trace_stack(buffer, irq_flags, 4, pc);
|
|
|
|
return 1;
|
|
}
|
|
EXPORT_SYMBOL_GPL(__trace_bputs);
|
|
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
/**
|
|
* trace_snapshot - take a snapshot of the current buffer.
|
|
*
|
|
* This causes a swap between the snapshot buffer and the current live
|
|
* tracing buffer. You can use this to take snapshots of the live
|
|
* trace when some condition is triggered, but continue to trace.
|
|
*
|
|
* Note, make sure to allocate the snapshot with either
|
|
* a tracing_snapshot_alloc(), or by doing it manually
|
|
* with: echo 1 > /sys/kernel/debug/tracing/snapshot
|
|
*
|
|
* If the snapshot buffer is not allocated, it will stop tracing.
|
|
* Basically making a permanent snapshot.
|
|
*/
|
|
void tracing_snapshot(void)
|
|
{
|
|
struct trace_array *tr = &global_trace;
|
|
struct tracer *tracer = tr->current_trace;
|
|
unsigned long flags;
|
|
|
|
if (in_nmi()) {
|
|
internal_trace_puts("*** SNAPSHOT CALLED FROM NMI CONTEXT ***\n");
|
|
internal_trace_puts("*** snapshot is being ignored ***\n");
|
|
return;
|
|
}
|
|
|
|
if (!tr->allocated_snapshot) {
|
|
internal_trace_puts("*** SNAPSHOT NOT ALLOCATED ***\n");
|
|
internal_trace_puts("*** stopping trace here! ***\n");
|
|
tracing_off();
|
|
return;
|
|
}
|
|
|
|
/* Note, snapshot can not be used when the tracer uses it */
|
|
if (tracer->use_max_tr) {
|
|
internal_trace_puts("*** LATENCY TRACER ACTIVE ***\n");
|
|
internal_trace_puts("*** Can not use snapshot (sorry) ***\n");
|
|
return;
|
|
}
|
|
|
|
local_irq_save(flags);
|
|
update_max_tr(tr, current, smp_processor_id());
|
|
local_irq_restore(flags);
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_snapshot);
|
|
|
|
static int resize_buffer_duplicate_size(struct trace_buffer *trace_buf,
|
|
struct trace_buffer *size_buf, int cpu_id);
|
|
static void set_buffer_entries(struct trace_buffer *buf, unsigned long val);
|
|
|
|
static int alloc_snapshot(struct trace_array *tr)
|
|
{
|
|
int ret;
|
|
|
|
if (!tr->allocated_snapshot) {
|
|
|
|
/* allocate spare buffer */
|
|
ret = resize_buffer_duplicate_size(&tr->max_buffer,
|
|
&tr->trace_buffer, RING_BUFFER_ALL_CPUS);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
tr->allocated_snapshot = true;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void free_snapshot(struct trace_array *tr)
|
|
{
|
|
/*
|
|
* We don't free the ring buffer. instead, resize it because
|
|
* The max_tr ring buffer has some state (e.g. ring->clock) and
|
|
* we want preserve it.
|
|
*/
|
|
ring_buffer_resize(tr->max_buffer.buffer, 1, RING_BUFFER_ALL_CPUS);
|
|
set_buffer_entries(&tr->max_buffer, 1);
|
|
tracing_reset_online_cpus(&tr->max_buffer);
|
|
tr->allocated_snapshot = false;
|
|
}
|
|
|
|
/**
|
|
* tracing_alloc_snapshot - allocate snapshot buffer.
|
|
*
|
|
* This only allocates the snapshot buffer if it isn't already
|
|
* allocated - it doesn't also take a snapshot.
|
|
*
|
|
* This is meant to be used in cases where the snapshot buffer needs
|
|
* to be set up for events that can't sleep but need to be able to
|
|
* trigger a snapshot.
|
|
*/
|
|
int tracing_alloc_snapshot(void)
|
|
{
|
|
struct trace_array *tr = &global_trace;
|
|
int ret;
|
|
|
|
ret = alloc_snapshot(tr);
|
|
WARN_ON(ret < 0);
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_alloc_snapshot);
|
|
|
|
/**
|
|
* trace_snapshot_alloc - allocate and take a snapshot of the current buffer.
|
|
*
|
|
* This is similar to trace_snapshot(), but it will allocate the
|
|
* snapshot buffer if it isn't already allocated. Use this only
|
|
* where it is safe to sleep, as the allocation may sleep.
|
|
*
|
|
* This causes a swap between the snapshot buffer and the current live
|
|
* tracing buffer. You can use this to take snapshots of the live
|
|
* trace when some condition is triggered, but continue to trace.
|
|
*/
|
|
void tracing_snapshot_alloc(void)
|
|
{
|
|
int ret;
|
|
|
|
ret = tracing_alloc_snapshot();
|
|
if (ret < 0)
|
|
return;
|
|
|
|
tracing_snapshot();
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_snapshot_alloc);
|
|
#else
|
|
void tracing_snapshot(void)
|
|
{
|
|
WARN_ONCE(1, "Snapshot feature not enabled, but internal snapshot used");
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_snapshot);
|
|
int tracing_alloc_snapshot(void)
|
|
{
|
|
WARN_ONCE(1, "Snapshot feature not enabled, but snapshot allocation used");
|
|
return -ENODEV;
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_alloc_snapshot);
|
|
void tracing_snapshot_alloc(void)
|
|
{
|
|
/* Give warning */
|
|
tracing_snapshot();
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_snapshot_alloc);
|
|
#endif /* CONFIG_TRACER_SNAPSHOT */
|
|
|
|
static void tracer_tracing_off(struct trace_array *tr)
|
|
{
|
|
if (tr->trace_buffer.buffer)
|
|
ring_buffer_record_off(tr->trace_buffer.buffer);
|
|
/*
|
|
* This flag is looked at when buffers haven't been allocated
|
|
* yet, or by some tracers (like irqsoff), that just want to
|
|
* know if the ring buffer has been disabled, but it can handle
|
|
* races of where it gets disabled but we still do a record.
|
|
* As the check is in the fast path of the tracers, it is more
|
|
* important to be fast than accurate.
|
|
*/
|
|
tr->buffer_disabled = 1;
|
|
/* Make the flag seen by readers */
|
|
smp_wmb();
|
|
}
|
|
|
|
/**
|
|
* tracing_off - turn off tracing buffers
|
|
*
|
|
* This function stops the tracing buffers from recording data.
|
|
* It does not disable any overhead the tracers themselves may
|
|
* be causing. This function simply causes all recording to
|
|
* the ring buffers to fail.
|
|
*/
|
|
void tracing_off(void)
|
|
{
|
|
tracer_tracing_off(&global_trace);
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_off);
|
|
|
|
void disable_trace_on_warning(void)
|
|
{
|
|
if (__disable_trace_on_warning)
|
|
tracing_off();
|
|
}
|
|
|
|
/**
|
|
* tracer_tracing_is_on - show real state of ring buffer enabled
|
|
* @tr : the trace array to know if ring buffer is enabled
|
|
*
|
|
* Shows real state of the ring buffer if it is enabled or not.
|
|
*/
|
|
static int tracer_tracing_is_on(struct trace_array *tr)
|
|
{
|
|
if (tr->trace_buffer.buffer)
|
|
return ring_buffer_record_is_on(tr->trace_buffer.buffer);
|
|
return !tr->buffer_disabled;
|
|
}
|
|
|
|
/**
|
|
* tracing_is_on - show state of ring buffers enabled
|
|
*/
|
|
int tracing_is_on(void)
|
|
{
|
|
return tracer_tracing_is_on(&global_trace);
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_is_on);
|
|
|
|
static int __init set_buf_size(char *str)
|
|
{
|
|
unsigned long buf_size;
|
|
|
|
if (!str)
|
|
return 0;
|
|
buf_size = memparse(str, &str);
|
|
/* nr_entries can not be zero */
|
|
if (buf_size == 0)
|
|
return 0;
|
|
trace_buf_size = buf_size;
|
|
return 1;
|
|
}
|
|
__setup("trace_buf_size=", set_buf_size);
|
|
|
|
static int __init set_tracing_thresh(char *str)
|
|
{
|
|
unsigned long threshold;
|
|
int ret;
|
|
|
|
if (!str)
|
|
return 0;
|
|
ret = kstrtoul(str, 0, &threshold);
|
|
if (ret < 0)
|
|
return 0;
|
|
tracing_thresh = threshold * 1000;
|
|
return 1;
|
|
}
|
|
__setup("tracing_thresh=", set_tracing_thresh);
|
|
|
|
unsigned long nsecs_to_usecs(unsigned long nsecs)
|
|
{
|
|
return nsecs / 1000;
|
|
}
|
|
|
|
/* These must match the bit postions in trace_iterator_flags */
|
|
static const char *trace_options[] = {
|
|
"print-parent",
|
|
"sym-offset",
|
|
"sym-addr",
|
|
"verbose",
|
|
"raw",
|
|
"hex",
|
|
"bin",
|
|
"block",
|
|
"stacktrace",
|
|
"trace_printk",
|
|
"ftrace_preempt",
|
|
"branch",
|
|
"annotate",
|
|
"userstacktrace",
|
|
"sym-userobj",
|
|
"printk-msg-only",
|
|
"context-info",
|
|
"latency-format",
|
|
"sleep-time",
|
|
"graph-time",
|
|
"record-cmd",
|
|
"overwrite",
|
|
"disable_on_free",
|
|
"irq-info",
|
|
"markers",
|
|
"function-trace",
|
|
NULL
|
|
};
|
|
|
|
static struct {
|
|
u64 (*func)(void);
|
|
const char *name;
|
|
int in_ns; /* is this clock in nanoseconds? */
|
|
} trace_clocks[] = {
|
|
{ trace_clock_local, "local", 1 },
|
|
{ trace_clock_global, "global", 1 },
|
|
{ trace_clock_counter, "counter", 0 },
|
|
{ trace_clock_jiffies, "uptime", 0 },
|
|
{ trace_clock, "perf", 1 },
|
|
ARCH_TRACE_CLOCKS
|
|
};
|
|
|
|
/*
|
|
* trace_parser_get_init - gets the buffer for trace parser
|
|
*/
|
|
int trace_parser_get_init(struct trace_parser *parser, int size)
|
|
{
|
|
memset(parser, 0, sizeof(*parser));
|
|
|
|
parser->buffer = kmalloc(size, GFP_KERNEL);
|
|
if (!parser->buffer)
|
|
return 1;
|
|
|
|
parser->size = size;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* trace_parser_put - frees the buffer for trace parser
|
|
*/
|
|
void trace_parser_put(struct trace_parser *parser)
|
|
{
|
|
kfree(parser->buffer);
|
|
}
|
|
|
|
/*
|
|
* trace_get_user - reads the user input string separated by space
|
|
* (matched by isspace(ch))
|
|
*
|
|
* For each string found the 'struct trace_parser' is updated,
|
|
* and the function returns.
|
|
*
|
|
* Returns number of bytes read.
|
|
*
|
|
* See kernel/trace/trace.h for 'struct trace_parser' details.
|
|
*/
|
|
int trace_get_user(struct trace_parser *parser, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
char ch;
|
|
size_t read = 0;
|
|
ssize_t ret;
|
|
|
|
if (!*ppos)
|
|
trace_parser_clear(parser);
|
|
|
|
ret = get_user(ch, ubuf++);
|
|
if (ret)
|
|
goto out;
|
|
|
|
read++;
|
|
cnt--;
|
|
|
|
/*
|
|
* The parser is not finished with the last write,
|
|
* continue reading the user input without skipping spaces.
|
|
*/
|
|
if (!parser->cont) {
|
|
/* skip white space */
|
|
while (cnt && isspace(ch)) {
|
|
ret = get_user(ch, ubuf++);
|
|
if (ret)
|
|
goto out;
|
|
read++;
|
|
cnt--;
|
|
}
|
|
|
|
/* only spaces were written */
|
|
if (isspace(ch)) {
|
|
*ppos += read;
|
|
ret = read;
|
|
goto out;
|
|
}
|
|
|
|
parser->idx = 0;
|
|
}
|
|
|
|
/* read the non-space input */
|
|
while (cnt && !isspace(ch)) {
|
|
if (parser->idx < parser->size - 1)
|
|
parser->buffer[parser->idx++] = ch;
|
|
else {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
ret = get_user(ch, ubuf++);
|
|
if (ret)
|
|
goto out;
|
|
read++;
|
|
cnt--;
|
|
}
|
|
|
|
/* We either got finished input or we have to wait for another call. */
|
|
if (isspace(ch)) {
|
|
parser->buffer[parser->idx] = 0;
|
|
parser->cont = false;
|
|
} else if (parser->idx < parser->size - 1) {
|
|
parser->cont = true;
|
|
parser->buffer[parser->idx++] = ch;
|
|
} else {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
*ppos += read;
|
|
ret = read;
|
|
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t trace_seq_to_buffer(struct trace_seq *s, void *buf, size_t cnt)
|
|
{
|
|
int len;
|
|
|
|
if (s->len <= s->readpos)
|
|
return -EBUSY;
|
|
|
|
len = s->len - s->readpos;
|
|
if (cnt > len)
|
|
cnt = len;
|
|
memcpy(buf, s->buffer + s->readpos, cnt);
|
|
|
|
s->readpos += cnt;
|
|
return cnt;
|
|
}
|
|
|
|
unsigned long __read_mostly tracing_thresh;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
/*
|
|
* Copy the new maximum trace into the separate maximum-trace
|
|
* structure. (this way the maximum trace is permanently saved,
|
|
* for later retrieval via /sys/kernel/debug/tracing/latency_trace)
|
|
*/
|
|
static void
|
|
__update_max_tr(struct trace_array *tr, struct task_struct *tsk, int cpu)
|
|
{
|
|
struct trace_buffer *trace_buf = &tr->trace_buffer;
|
|
struct trace_buffer *max_buf = &tr->max_buffer;
|
|
struct trace_array_cpu *data = per_cpu_ptr(trace_buf->data, cpu);
|
|
struct trace_array_cpu *max_data = per_cpu_ptr(max_buf->data, cpu);
|
|
|
|
max_buf->cpu = cpu;
|
|
max_buf->time_start = data->preempt_timestamp;
|
|
|
|
max_data->saved_latency = tr->max_latency;
|
|
max_data->critical_start = data->critical_start;
|
|
max_data->critical_end = data->critical_end;
|
|
|
|
memcpy(max_data->comm, tsk->comm, TASK_COMM_LEN);
|
|
max_data->pid = tsk->pid;
|
|
/*
|
|
* If tsk == current, then use current_uid(), as that does not use
|
|
* RCU. The irq tracer can be called out of RCU scope.
|
|
*/
|
|
if (tsk == current)
|
|
max_data->uid = current_uid();
|
|
else
|
|
max_data->uid = task_uid(tsk);
|
|
|
|
max_data->nice = tsk->static_prio - 20 - MAX_RT_PRIO;
|
|
max_data->policy = tsk->policy;
|
|
max_data->rt_priority = tsk->rt_priority;
|
|
|
|
/* record this tasks comm */
|
|
tracing_record_cmdline(tsk);
|
|
}
|
|
|
|
/**
|
|
* update_max_tr - snapshot all trace buffers from global_trace to max_tr
|
|
* @tr: tracer
|
|
* @tsk: the task with the latency
|
|
* @cpu: The cpu that initiated the trace.
|
|
*
|
|
* Flip the buffers between the @tr and the max_tr and record information
|
|
* about which task was the cause of this latency.
|
|
*/
|
|
void
|
|
update_max_tr(struct trace_array *tr, struct task_struct *tsk, int cpu)
|
|
{
|
|
struct ring_buffer *buf;
|
|
|
|
if (tr->stop_count)
|
|
return;
|
|
|
|
WARN_ON_ONCE(!irqs_disabled());
|
|
|
|
if (!tr->allocated_snapshot) {
|
|
/* Only the nop tracer should hit this when disabling */
|
|
WARN_ON_ONCE(tr->current_trace != &nop_trace);
|
|
return;
|
|
}
|
|
|
|
arch_spin_lock(&tr->max_lock);
|
|
|
|
buf = tr->trace_buffer.buffer;
|
|
tr->trace_buffer.buffer = tr->max_buffer.buffer;
|
|
tr->max_buffer.buffer = buf;
|
|
|
|
__update_max_tr(tr, tsk, cpu);
|
|
arch_spin_unlock(&tr->max_lock);
|
|
}
|
|
|
|
/**
|
|
* update_max_tr_single - only copy one trace over, and reset the rest
|
|
* @tr - tracer
|
|
* @tsk - task with the latency
|
|
* @cpu - the cpu of the buffer to copy.
|
|
*
|
|
* Flip the trace of a single CPU buffer between the @tr and the max_tr.
|
|
*/
|
|
void
|
|
update_max_tr_single(struct trace_array *tr, struct task_struct *tsk, int cpu)
|
|
{
|
|
int ret;
|
|
|
|
if (tr->stop_count)
|
|
return;
|
|
|
|
WARN_ON_ONCE(!irqs_disabled());
|
|
if (!tr->allocated_snapshot) {
|
|
/* Only the nop tracer should hit this when disabling */
|
|
WARN_ON_ONCE(tr->current_trace != &nop_trace);
|
|
return;
|
|
}
|
|
|
|
arch_spin_lock(&tr->max_lock);
|
|
|
|
ret = ring_buffer_swap_cpu(tr->max_buffer.buffer, tr->trace_buffer.buffer, cpu);
|
|
|
|
if (ret == -EBUSY) {
|
|
/*
|
|
* We failed to swap the buffer due to a commit taking
|
|
* place on this CPU. We fail to record, but we reset
|
|
* the max trace buffer (no one writes directly to it)
|
|
* and flag that it failed.
|
|
*/
|
|
trace_array_printk_buf(tr->max_buffer.buffer, _THIS_IP_,
|
|
"Failed to swap buffers due to commit in progress\n");
|
|
}
|
|
|
|
WARN_ON_ONCE(ret && ret != -EAGAIN && ret != -EBUSY);
|
|
|
|
__update_max_tr(tr, tsk, cpu);
|
|
arch_spin_unlock(&tr->max_lock);
|
|
}
|
|
#endif /* CONFIG_TRACER_MAX_TRACE */
|
|
|
|
static int wait_on_pipe(struct trace_iterator *iter)
|
|
{
|
|
/* Iterators are static, they should be filled or empty */
|
|
if (trace_buffer_iter(iter, iter->cpu_file))
|
|
return 0;
|
|
|
|
return ring_buffer_wait(iter->trace_buffer->buffer, iter->cpu_file);
|
|
}
|
|
|
|
#ifdef CONFIG_FTRACE_STARTUP_TEST
|
|
static int run_tracer_selftest(struct tracer *type)
|
|
{
|
|
struct trace_array *tr = &global_trace;
|
|
struct tracer *saved_tracer = tr->current_trace;
|
|
int ret;
|
|
|
|
if (!type->selftest || tracing_selftest_disabled)
|
|
return 0;
|
|
|
|
/*
|
|
* Run a selftest on this tracer.
|
|
* Here we reset the trace buffer, and set the current
|
|
* tracer to be this tracer. The tracer can then run some
|
|
* internal tracing to verify that everything is in order.
|
|
* If we fail, we do not register this tracer.
|
|
*/
|
|
tracing_reset_online_cpus(&tr->trace_buffer);
|
|
|
|
tr->current_trace = type;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (type->use_max_tr) {
|
|
/* If we expanded the buffers, make sure the max is expanded too */
|
|
if (ring_buffer_expanded)
|
|
ring_buffer_resize(tr->max_buffer.buffer, trace_buf_size,
|
|
RING_BUFFER_ALL_CPUS);
|
|
tr->allocated_snapshot = true;
|
|
}
|
|
#endif
|
|
|
|
/* the test is responsible for initializing and enabling */
|
|
pr_info("Testing tracer %s: ", type->name);
|
|
ret = type->selftest(type, tr);
|
|
/* the test is responsible for resetting too */
|
|
tr->current_trace = saved_tracer;
|
|
if (ret) {
|
|
printk(KERN_CONT "FAILED!\n");
|
|
/* Add the warning after printing 'FAILED' */
|
|
WARN_ON(1);
|
|
return -1;
|
|
}
|
|
/* Only reset on passing, to avoid touching corrupted buffers */
|
|
tracing_reset_online_cpus(&tr->trace_buffer);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (type->use_max_tr) {
|
|
tr->allocated_snapshot = false;
|
|
|
|
/* Shrink the max buffer again */
|
|
if (ring_buffer_expanded)
|
|
ring_buffer_resize(tr->max_buffer.buffer, 1,
|
|
RING_BUFFER_ALL_CPUS);
|
|
}
|
|
#endif
|
|
|
|
printk(KERN_CONT "PASSED\n");
|
|
return 0;
|
|
}
|
|
#else
|
|
static inline int run_tracer_selftest(struct tracer *type)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_FTRACE_STARTUP_TEST */
|
|
|
|
/**
|
|
* register_tracer - register a tracer with the ftrace system.
|
|
* @type - the plugin for the tracer
|
|
*
|
|
* Register a new plugin tracer.
|
|
*/
|
|
int register_tracer(struct tracer *type)
|
|
{
|
|
struct tracer *t;
|
|
int ret = 0;
|
|
|
|
if (!type->name) {
|
|
pr_info("Tracer must have a name\n");
|
|
return -1;
|
|
}
|
|
|
|
if (strlen(type->name) >= MAX_TRACER_SIZE) {
|
|
pr_info("Tracer has a name longer than %d\n", MAX_TRACER_SIZE);
|
|
return -1;
|
|
}
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
tracing_selftest_running = true;
|
|
|
|
for (t = trace_types; t; t = t->next) {
|
|
if (strcmp(type->name, t->name) == 0) {
|
|
/* already found */
|
|
pr_info("Tracer %s already registered\n",
|
|
type->name);
|
|
ret = -1;
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (!type->set_flag)
|
|
type->set_flag = &dummy_set_flag;
|
|
if (!type->flags)
|
|
type->flags = &dummy_tracer_flags;
|
|
else
|
|
if (!type->flags->opts)
|
|
type->flags->opts = dummy_tracer_opt;
|
|
|
|
ret = run_tracer_selftest(type);
|
|
if (ret < 0)
|
|
goto out;
|
|
|
|
type->next = trace_types;
|
|
trace_types = type;
|
|
|
|
out:
|
|
tracing_selftest_running = false;
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
if (ret || !default_bootup_tracer)
|
|
goto out_unlock;
|
|
|
|
if (strncmp(default_bootup_tracer, type->name, MAX_TRACER_SIZE))
|
|
goto out_unlock;
|
|
|
|
printk(KERN_INFO "Starting tracer '%s'\n", type->name);
|
|
/* Do we want this tracer to start on bootup? */
|
|
tracing_set_tracer(&global_trace, type->name);
|
|
default_bootup_tracer = NULL;
|
|
/* disable other selftests, since this will break it. */
|
|
tracing_selftest_disabled = true;
|
|
#ifdef CONFIG_FTRACE_STARTUP_TEST
|
|
printk(KERN_INFO "Disabling FTRACE selftests due to running tracer '%s'\n",
|
|
type->name);
|
|
#endif
|
|
|
|
out_unlock:
|
|
return ret;
|
|
}
|
|
|
|
void tracing_reset(struct trace_buffer *buf, int cpu)
|
|
{
|
|
struct ring_buffer *buffer = buf->buffer;
|
|
|
|
if (!buffer)
|
|
return;
|
|
|
|
ring_buffer_record_disable(buffer);
|
|
|
|
/* Make sure all commits have finished */
|
|
synchronize_sched();
|
|
ring_buffer_reset_cpu(buffer, cpu);
|
|
|
|
ring_buffer_record_enable(buffer);
|
|
}
|
|
|
|
void tracing_reset_online_cpus(struct trace_buffer *buf)
|
|
{
|
|
struct ring_buffer *buffer = buf->buffer;
|
|
int cpu;
|
|
|
|
if (!buffer)
|
|
return;
|
|
|
|
ring_buffer_record_disable(buffer);
|
|
|
|
/* Make sure all commits have finished */
|
|
synchronize_sched();
|
|
|
|
buf->time_start = buffer_ftrace_now(buf, buf->cpu);
|
|
|
|
for_each_online_cpu(cpu)
|
|
ring_buffer_reset_cpu(buffer, cpu);
|
|
|
|
ring_buffer_record_enable(buffer);
|
|
}
|
|
|
|
/* Must have trace_types_lock held */
|
|
void tracing_reset_all_online_cpus(void)
|
|
{
|
|
struct trace_array *tr;
|
|
|
|
list_for_each_entry(tr, &ftrace_trace_arrays, list) {
|
|
tracing_reset_online_cpus(&tr->trace_buffer);
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
tracing_reset_online_cpus(&tr->max_buffer);
|
|
#endif
|
|
}
|
|
}
|
|
|
|
#define SAVED_CMDLINES_DEFAULT 128
|
|
#define NO_CMDLINE_MAP UINT_MAX
|
|
static arch_spinlock_t trace_cmdline_lock = __ARCH_SPIN_LOCK_UNLOCKED;
|
|
struct saved_cmdlines_buffer {
|
|
unsigned map_pid_to_cmdline[PID_MAX_DEFAULT+1];
|
|
unsigned *map_cmdline_to_pid;
|
|
unsigned cmdline_num;
|
|
int cmdline_idx;
|
|
char *saved_cmdlines;
|
|
};
|
|
static struct saved_cmdlines_buffer *savedcmd;
|
|
|
|
/* temporary disable recording */
|
|
static atomic_t trace_record_cmdline_disabled __read_mostly;
|
|
|
|
static inline char *get_saved_cmdlines(int idx)
|
|
{
|
|
return &savedcmd->saved_cmdlines[idx * TASK_COMM_LEN];
|
|
}
|
|
|
|
static inline void set_cmdline(int idx, const char *cmdline)
|
|
{
|
|
memcpy(get_saved_cmdlines(idx), cmdline, TASK_COMM_LEN);
|
|
}
|
|
|
|
static int allocate_cmdlines_buffer(unsigned int val,
|
|
struct saved_cmdlines_buffer *s)
|
|
{
|
|
s->map_cmdline_to_pid = kmalloc(val * sizeof(*s->map_cmdline_to_pid),
|
|
GFP_KERNEL);
|
|
if (!s->map_cmdline_to_pid)
|
|
return -ENOMEM;
|
|
|
|
s->saved_cmdlines = kmalloc(val * TASK_COMM_LEN, GFP_KERNEL);
|
|
if (!s->saved_cmdlines) {
|
|
kfree(s->map_cmdline_to_pid);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
s->cmdline_idx = 0;
|
|
s->cmdline_num = val;
|
|
memset(&s->map_pid_to_cmdline, NO_CMDLINE_MAP,
|
|
sizeof(s->map_pid_to_cmdline));
|
|
memset(s->map_cmdline_to_pid, NO_CMDLINE_MAP,
|
|
val * sizeof(*s->map_cmdline_to_pid));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int trace_create_savedcmd(void)
|
|
{
|
|
int ret;
|
|
|
|
savedcmd = kmalloc(sizeof(*savedcmd), GFP_KERNEL);
|
|
if (!savedcmd)
|
|
return -ENOMEM;
|
|
|
|
ret = allocate_cmdlines_buffer(SAVED_CMDLINES_DEFAULT, savedcmd);
|
|
if (ret < 0) {
|
|
kfree(savedcmd);
|
|
savedcmd = NULL;
|
|
return -ENOMEM;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int is_tracing_stopped(void)
|
|
{
|
|
return global_trace.stop_count;
|
|
}
|
|
|
|
/**
|
|
* tracing_start - quick start of the tracer
|
|
*
|
|
* If tracing is enabled but was stopped by tracing_stop,
|
|
* this will start the tracer back up.
|
|
*/
|
|
void tracing_start(void)
|
|
{
|
|
struct ring_buffer *buffer;
|
|
unsigned long flags;
|
|
|
|
if (tracing_disabled)
|
|
return;
|
|
|
|
raw_spin_lock_irqsave(&global_trace.start_lock, flags);
|
|
if (--global_trace.stop_count) {
|
|
if (global_trace.stop_count < 0) {
|
|
/* Someone screwed up their debugging */
|
|
WARN_ON_ONCE(1);
|
|
global_trace.stop_count = 0;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
/* Prevent the buffers from switching */
|
|
arch_spin_lock(&global_trace.max_lock);
|
|
|
|
buffer = global_trace.trace_buffer.buffer;
|
|
if (buffer)
|
|
ring_buffer_record_enable(buffer);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
buffer = global_trace.max_buffer.buffer;
|
|
if (buffer)
|
|
ring_buffer_record_enable(buffer);
|
|
#endif
|
|
|
|
arch_spin_unlock(&global_trace.max_lock);
|
|
|
|
out:
|
|
raw_spin_unlock_irqrestore(&global_trace.start_lock, flags);
|
|
}
|
|
|
|
static void tracing_start_tr(struct trace_array *tr)
|
|
{
|
|
struct ring_buffer *buffer;
|
|
unsigned long flags;
|
|
|
|
if (tracing_disabled)
|
|
return;
|
|
|
|
/* If global, we need to also start the max tracer */
|
|
if (tr->flags & TRACE_ARRAY_FL_GLOBAL)
|
|
return tracing_start();
|
|
|
|
raw_spin_lock_irqsave(&tr->start_lock, flags);
|
|
|
|
if (--tr->stop_count) {
|
|
if (tr->stop_count < 0) {
|
|
/* Someone screwed up their debugging */
|
|
WARN_ON_ONCE(1);
|
|
tr->stop_count = 0;
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
buffer = tr->trace_buffer.buffer;
|
|
if (buffer)
|
|
ring_buffer_record_enable(buffer);
|
|
|
|
out:
|
|
raw_spin_unlock_irqrestore(&tr->start_lock, flags);
|
|
}
|
|
|
|
/**
|
|
* tracing_stop - quick stop of the tracer
|
|
*
|
|
* Light weight way to stop tracing. Use in conjunction with
|
|
* tracing_start.
|
|
*/
|
|
void tracing_stop(void)
|
|
{
|
|
struct ring_buffer *buffer;
|
|
unsigned long flags;
|
|
|
|
raw_spin_lock_irqsave(&global_trace.start_lock, flags);
|
|
if (global_trace.stop_count++)
|
|
goto out;
|
|
|
|
/* Prevent the buffers from switching */
|
|
arch_spin_lock(&global_trace.max_lock);
|
|
|
|
buffer = global_trace.trace_buffer.buffer;
|
|
if (buffer)
|
|
ring_buffer_record_disable(buffer);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
buffer = global_trace.max_buffer.buffer;
|
|
if (buffer)
|
|
ring_buffer_record_disable(buffer);
|
|
#endif
|
|
|
|
arch_spin_unlock(&global_trace.max_lock);
|
|
|
|
out:
|
|
raw_spin_unlock_irqrestore(&global_trace.start_lock, flags);
|
|
}
|
|
|
|
static void tracing_stop_tr(struct trace_array *tr)
|
|
{
|
|
struct ring_buffer *buffer;
|
|
unsigned long flags;
|
|
|
|
/* If global, we need to also stop the max tracer */
|
|
if (tr->flags & TRACE_ARRAY_FL_GLOBAL)
|
|
return tracing_stop();
|
|
|
|
raw_spin_lock_irqsave(&tr->start_lock, flags);
|
|
if (tr->stop_count++)
|
|
goto out;
|
|
|
|
buffer = tr->trace_buffer.buffer;
|
|
if (buffer)
|
|
ring_buffer_record_disable(buffer);
|
|
|
|
out:
|
|
raw_spin_unlock_irqrestore(&tr->start_lock, flags);
|
|
}
|
|
|
|
void trace_stop_cmdline_recording(void);
|
|
|
|
static int trace_save_cmdline(struct task_struct *tsk)
|
|
{
|
|
unsigned pid, idx;
|
|
|
|
if (!tsk->pid || unlikely(tsk->pid > PID_MAX_DEFAULT))
|
|
return 0;
|
|
|
|
/*
|
|
* It's not the end of the world if we don't get
|
|
* the lock, but we also don't want to spin
|
|
* nor do we want to disable interrupts,
|
|
* so if we miss here, then better luck next time.
|
|
*/
|
|
if (!arch_spin_trylock(&trace_cmdline_lock))
|
|
return 0;
|
|
|
|
idx = savedcmd->map_pid_to_cmdline[tsk->pid];
|
|
if (idx == NO_CMDLINE_MAP) {
|
|
idx = (savedcmd->cmdline_idx + 1) % savedcmd->cmdline_num;
|
|
|
|
/*
|
|
* Check whether the cmdline buffer at idx has a pid
|
|
* mapped. We are going to overwrite that entry so we
|
|
* need to clear the map_pid_to_cmdline. Otherwise we
|
|
* would read the new comm for the old pid.
|
|
*/
|
|
pid = savedcmd->map_cmdline_to_pid[idx];
|
|
if (pid != NO_CMDLINE_MAP)
|
|
savedcmd->map_pid_to_cmdline[pid] = NO_CMDLINE_MAP;
|
|
|
|
savedcmd->map_cmdline_to_pid[idx] = tsk->pid;
|
|
savedcmd->map_pid_to_cmdline[tsk->pid] = idx;
|
|
|
|
savedcmd->cmdline_idx = idx;
|
|
}
|
|
|
|
set_cmdline(idx, tsk->comm);
|
|
|
|
arch_spin_unlock(&trace_cmdline_lock);
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void __trace_find_cmdline(int pid, char comm[])
|
|
{
|
|
unsigned map;
|
|
|
|
if (!pid) {
|
|
strcpy(comm, "<idle>");
|
|
return;
|
|
}
|
|
|
|
if (WARN_ON_ONCE(pid < 0)) {
|
|
strcpy(comm, "<XXX>");
|
|
return;
|
|
}
|
|
|
|
if (pid > PID_MAX_DEFAULT) {
|
|
strcpy(comm, "<...>");
|
|
return;
|
|
}
|
|
|
|
map = savedcmd->map_pid_to_cmdline[pid];
|
|
if (map != NO_CMDLINE_MAP)
|
|
strcpy(comm, get_saved_cmdlines(map));
|
|
else
|
|
strcpy(comm, "<...>");
|
|
}
|
|
|
|
void trace_find_cmdline(int pid, char comm[])
|
|
{
|
|
preempt_disable();
|
|
arch_spin_lock(&trace_cmdline_lock);
|
|
|
|
__trace_find_cmdline(pid, comm);
|
|
|
|
arch_spin_unlock(&trace_cmdline_lock);
|
|
preempt_enable();
|
|
}
|
|
|
|
void tracing_record_cmdline(struct task_struct *tsk)
|
|
{
|
|
if (atomic_read(&trace_record_cmdline_disabled) || !tracing_is_on())
|
|
return;
|
|
|
|
if (!__this_cpu_read(trace_cmdline_save))
|
|
return;
|
|
|
|
if (trace_save_cmdline(tsk))
|
|
__this_cpu_write(trace_cmdline_save, false);
|
|
}
|
|
|
|
void
|
|
tracing_generic_entry_update(struct trace_entry *entry, unsigned long flags,
|
|
int pc)
|
|
{
|
|
struct task_struct *tsk = current;
|
|
|
|
entry->preempt_count = pc & 0xff;
|
|
entry->pid = (tsk) ? tsk->pid : 0;
|
|
entry->flags =
|
|
#ifdef CONFIG_TRACE_IRQFLAGS_SUPPORT
|
|
(irqs_disabled_flags(flags) ? TRACE_FLAG_IRQS_OFF : 0) |
|
|
#else
|
|
TRACE_FLAG_IRQS_NOSUPPORT |
|
|
#endif
|
|
((pc & HARDIRQ_MASK) ? TRACE_FLAG_HARDIRQ : 0) |
|
|
((pc & SOFTIRQ_MASK) ? TRACE_FLAG_SOFTIRQ : 0) |
|
|
(tif_need_resched() ? TRACE_FLAG_NEED_RESCHED : 0) |
|
|
(test_preempt_need_resched() ? TRACE_FLAG_PREEMPT_RESCHED : 0);
|
|
}
|
|
EXPORT_SYMBOL_GPL(tracing_generic_entry_update);
|
|
|
|
struct ring_buffer_event *
|
|
trace_buffer_lock_reserve(struct ring_buffer *buffer,
|
|
int type,
|
|
unsigned long len,
|
|
unsigned long flags, int pc)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
|
|
event = ring_buffer_lock_reserve(buffer, len);
|
|
if (event != NULL) {
|
|
struct trace_entry *ent = ring_buffer_event_data(event);
|
|
|
|
tracing_generic_entry_update(ent, flags, pc);
|
|
ent->type = type;
|
|
}
|
|
|
|
return event;
|
|
}
|
|
|
|
void
|
|
__buffer_unlock_commit(struct ring_buffer *buffer, struct ring_buffer_event *event)
|
|
{
|
|
__this_cpu_write(trace_cmdline_save, true);
|
|
ring_buffer_unlock_commit(buffer, event);
|
|
}
|
|
|
|
static inline void
|
|
__trace_buffer_unlock_commit(struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event,
|
|
unsigned long flags, int pc)
|
|
{
|
|
__buffer_unlock_commit(buffer, event);
|
|
|
|
ftrace_trace_stack(buffer, flags, 6, pc);
|
|
ftrace_trace_userstack(buffer, flags, pc);
|
|
}
|
|
|
|
void trace_buffer_unlock_commit(struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event,
|
|
unsigned long flags, int pc)
|
|
{
|
|
__trace_buffer_unlock_commit(buffer, event, flags, pc);
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_buffer_unlock_commit);
|
|
|
|
static struct ring_buffer *temp_buffer;
|
|
|
|
struct ring_buffer_event *
|
|
trace_event_buffer_lock_reserve(struct ring_buffer **current_rb,
|
|
struct ftrace_event_file *ftrace_file,
|
|
int type, unsigned long len,
|
|
unsigned long flags, int pc)
|
|
{
|
|
struct ring_buffer_event *entry;
|
|
|
|
*current_rb = ftrace_file->tr->trace_buffer.buffer;
|
|
entry = trace_buffer_lock_reserve(*current_rb,
|
|
type, len, flags, pc);
|
|
/*
|
|
* If tracing is off, but we have triggers enabled
|
|
* we still need to look at the event data. Use the temp_buffer
|
|
* to store the trace event for the tigger to use. It's recusive
|
|
* safe and will not be recorded anywhere.
|
|
*/
|
|
if (!entry && ftrace_file->flags & FTRACE_EVENT_FL_TRIGGER_COND) {
|
|
*current_rb = temp_buffer;
|
|
entry = trace_buffer_lock_reserve(*current_rb,
|
|
type, len, flags, pc);
|
|
}
|
|
return entry;
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_event_buffer_lock_reserve);
|
|
|
|
struct ring_buffer_event *
|
|
trace_current_buffer_lock_reserve(struct ring_buffer **current_rb,
|
|
int type, unsigned long len,
|
|
unsigned long flags, int pc)
|
|
{
|
|
*current_rb = global_trace.trace_buffer.buffer;
|
|
return trace_buffer_lock_reserve(*current_rb,
|
|
type, len, flags, pc);
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_current_buffer_lock_reserve);
|
|
|
|
void trace_current_buffer_unlock_commit(struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event,
|
|
unsigned long flags, int pc)
|
|
{
|
|
__trace_buffer_unlock_commit(buffer, event, flags, pc);
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_current_buffer_unlock_commit);
|
|
|
|
void trace_buffer_unlock_commit_regs(struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event,
|
|
unsigned long flags, int pc,
|
|
struct pt_regs *regs)
|
|
{
|
|
__buffer_unlock_commit(buffer, event);
|
|
|
|
ftrace_trace_stack_regs(buffer, flags, 0, pc, regs);
|
|
ftrace_trace_userstack(buffer, flags, pc);
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_buffer_unlock_commit_regs);
|
|
|
|
void trace_current_buffer_discard_commit(struct ring_buffer *buffer,
|
|
struct ring_buffer_event *event)
|
|
{
|
|
ring_buffer_discard_commit(buffer, event);
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_current_buffer_discard_commit);
|
|
|
|
void
|
|
trace_function(struct trace_array *tr,
|
|
unsigned long ip, unsigned long parent_ip, unsigned long flags,
|
|
int pc)
|
|
{
|
|
struct ftrace_event_call *call = &event_function;
|
|
struct ring_buffer *buffer = tr->trace_buffer.buffer;
|
|
struct ring_buffer_event *event;
|
|
struct ftrace_entry *entry;
|
|
|
|
/* If we are reading the ring buffer, don't trace */
|
|
if (unlikely(__this_cpu_read(ftrace_cpu_disabled)))
|
|
return;
|
|
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_FN, sizeof(*entry),
|
|
flags, pc);
|
|
if (!event)
|
|
return;
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
entry->parent_ip = parent_ip;
|
|
|
|
if (!call_filter_check_discard(call, entry, buffer, event))
|
|
__buffer_unlock_commit(buffer, event);
|
|
}
|
|
|
|
#ifdef CONFIG_STACKTRACE
|
|
|
|
#define FTRACE_STACK_MAX_ENTRIES (PAGE_SIZE / sizeof(unsigned long))
|
|
struct ftrace_stack {
|
|
unsigned long calls[FTRACE_STACK_MAX_ENTRIES];
|
|
};
|
|
|
|
static DEFINE_PER_CPU(struct ftrace_stack, ftrace_stack);
|
|
static DEFINE_PER_CPU(int, ftrace_stack_reserve);
|
|
|
|
static void __ftrace_trace_stack(struct ring_buffer *buffer,
|
|
unsigned long flags,
|
|
int skip, int pc, struct pt_regs *regs)
|
|
{
|
|
struct ftrace_event_call *call = &event_kernel_stack;
|
|
struct ring_buffer_event *event;
|
|
struct stack_entry *entry;
|
|
struct stack_trace trace;
|
|
int use_stack;
|
|
int size = FTRACE_STACK_ENTRIES;
|
|
|
|
trace.nr_entries = 0;
|
|
trace.skip = skip;
|
|
|
|
/*
|
|
* Since events can happen in NMIs there's no safe way to
|
|
* use the per cpu ftrace_stacks. We reserve it and if an interrupt
|
|
* or NMI comes in, it will just have to use the default
|
|
* FTRACE_STACK_SIZE.
|
|
*/
|
|
preempt_disable_notrace();
|
|
|
|
use_stack = __this_cpu_inc_return(ftrace_stack_reserve);
|
|
/*
|
|
* We don't need any atomic variables, just a barrier.
|
|
* If an interrupt comes in, we don't care, because it would
|
|
* have exited and put the counter back to what we want.
|
|
* We just need a barrier to keep gcc from moving things
|
|
* around.
|
|
*/
|
|
barrier();
|
|
if (use_stack == 1) {
|
|
trace.entries = this_cpu_ptr(ftrace_stack.calls);
|
|
trace.max_entries = FTRACE_STACK_MAX_ENTRIES;
|
|
|
|
if (regs)
|
|
save_stack_trace_regs(regs, &trace);
|
|
else
|
|
save_stack_trace(&trace);
|
|
|
|
if (trace.nr_entries > size)
|
|
size = trace.nr_entries;
|
|
} else
|
|
/* From now on, use_stack is a boolean */
|
|
use_stack = 0;
|
|
|
|
size *= sizeof(unsigned long);
|
|
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_STACK,
|
|
sizeof(*entry) + size, flags, pc);
|
|
if (!event)
|
|
goto out;
|
|
entry = ring_buffer_event_data(event);
|
|
|
|
memset(&entry->caller, 0, size);
|
|
|
|
if (use_stack)
|
|
memcpy(&entry->caller, trace.entries,
|
|
trace.nr_entries * sizeof(unsigned long));
|
|
else {
|
|
trace.max_entries = FTRACE_STACK_ENTRIES;
|
|
trace.entries = entry->caller;
|
|
if (regs)
|
|
save_stack_trace_regs(regs, &trace);
|
|
else
|
|
save_stack_trace(&trace);
|
|
}
|
|
|
|
entry->size = trace.nr_entries;
|
|
|
|
if (!call_filter_check_discard(call, entry, buffer, event))
|
|
__buffer_unlock_commit(buffer, event);
|
|
|
|
out:
|
|
/* Again, don't let gcc optimize things here */
|
|
barrier();
|
|
__this_cpu_dec(ftrace_stack_reserve);
|
|
preempt_enable_notrace();
|
|
|
|
}
|
|
|
|
void ftrace_trace_stack_regs(struct ring_buffer *buffer, unsigned long flags,
|
|
int skip, int pc, struct pt_regs *regs)
|
|
{
|
|
if (!(trace_flags & TRACE_ITER_STACKTRACE))
|
|
return;
|
|
|
|
__ftrace_trace_stack(buffer, flags, skip, pc, regs);
|
|
}
|
|
|
|
void ftrace_trace_stack(struct ring_buffer *buffer, unsigned long flags,
|
|
int skip, int pc)
|
|
{
|
|
if (!(trace_flags & TRACE_ITER_STACKTRACE))
|
|
return;
|
|
|
|
__ftrace_trace_stack(buffer, flags, skip, pc, NULL);
|
|
}
|
|
|
|
void __trace_stack(struct trace_array *tr, unsigned long flags, int skip,
|
|
int pc)
|
|
{
|
|
__ftrace_trace_stack(tr->trace_buffer.buffer, flags, skip, pc, NULL);
|
|
}
|
|
|
|
/**
|
|
* trace_dump_stack - record a stack back trace in the trace buffer
|
|
* @skip: Number of functions to skip (helper handlers)
|
|
*/
|
|
void trace_dump_stack(int skip)
|
|
{
|
|
unsigned long flags;
|
|
|
|
if (tracing_disabled || tracing_selftest_running)
|
|
return;
|
|
|
|
local_save_flags(flags);
|
|
|
|
/*
|
|
* Skip 3 more, seems to get us at the caller of
|
|
* this function.
|
|
*/
|
|
skip += 3;
|
|
__ftrace_trace_stack(global_trace.trace_buffer.buffer,
|
|
flags, skip, preempt_count(), NULL);
|
|
}
|
|
|
|
static DEFINE_PER_CPU(int, user_stack_count);
|
|
|
|
void
|
|
ftrace_trace_userstack(struct ring_buffer *buffer, unsigned long flags, int pc)
|
|
{
|
|
struct ftrace_event_call *call = &event_user_stack;
|
|
struct ring_buffer_event *event;
|
|
struct userstack_entry *entry;
|
|
struct stack_trace trace;
|
|
|
|
if (!(trace_flags & TRACE_ITER_USERSTACKTRACE))
|
|
return;
|
|
|
|
/*
|
|
* NMIs can not handle page faults, even with fix ups.
|
|
* The save user stack can (and often does) fault.
|
|
*/
|
|
if (unlikely(in_nmi()))
|
|
return;
|
|
|
|
/*
|
|
* prevent recursion, since the user stack tracing may
|
|
* trigger other kernel events.
|
|
*/
|
|
preempt_disable();
|
|
if (__this_cpu_read(user_stack_count))
|
|
goto out;
|
|
|
|
__this_cpu_inc(user_stack_count);
|
|
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_USER_STACK,
|
|
sizeof(*entry), flags, pc);
|
|
if (!event)
|
|
goto out_drop_count;
|
|
entry = ring_buffer_event_data(event);
|
|
|
|
entry->tgid = current->tgid;
|
|
memset(&entry->caller, 0, sizeof(entry->caller));
|
|
|
|
trace.nr_entries = 0;
|
|
trace.max_entries = FTRACE_STACK_ENTRIES;
|
|
trace.skip = 0;
|
|
trace.entries = entry->caller;
|
|
|
|
save_stack_trace_user(&trace);
|
|
if (!call_filter_check_discard(call, entry, buffer, event))
|
|
__buffer_unlock_commit(buffer, event);
|
|
|
|
out_drop_count:
|
|
__this_cpu_dec(user_stack_count);
|
|
out:
|
|
preempt_enable();
|
|
}
|
|
|
|
#ifdef UNUSED
|
|
static void __trace_userstack(struct trace_array *tr, unsigned long flags)
|
|
{
|
|
ftrace_trace_userstack(tr, flags, preempt_count());
|
|
}
|
|
#endif /* UNUSED */
|
|
|
|
#endif /* CONFIG_STACKTRACE */
|
|
|
|
/* created for use with alloc_percpu */
|
|
struct trace_buffer_struct {
|
|
char buffer[TRACE_BUF_SIZE];
|
|
};
|
|
|
|
static struct trace_buffer_struct *trace_percpu_buffer;
|
|
static struct trace_buffer_struct *trace_percpu_sirq_buffer;
|
|
static struct trace_buffer_struct *trace_percpu_irq_buffer;
|
|
static struct trace_buffer_struct *trace_percpu_nmi_buffer;
|
|
|
|
/*
|
|
* The buffer used is dependent on the context. There is a per cpu
|
|
* buffer for normal context, softirq contex, hard irq context and
|
|
* for NMI context. Thise allows for lockless recording.
|
|
*
|
|
* Note, if the buffers failed to be allocated, then this returns NULL
|
|
*/
|
|
static char *get_trace_buf(void)
|
|
{
|
|
struct trace_buffer_struct *percpu_buffer;
|
|
|
|
/*
|
|
* If we have allocated per cpu buffers, then we do not
|
|
* need to do any locking.
|
|
*/
|
|
if (in_nmi())
|
|
percpu_buffer = trace_percpu_nmi_buffer;
|
|
else if (in_irq())
|
|
percpu_buffer = trace_percpu_irq_buffer;
|
|
else if (in_softirq())
|
|
percpu_buffer = trace_percpu_sirq_buffer;
|
|
else
|
|
percpu_buffer = trace_percpu_buffer;
|
|
|
|
if (!percpu_buffer)
|
|
return NULL;
|
|
|
|
return this_cpu_ptr(&percpu_buffer->buffer[0]);
|
|
}
|
|
|
|
static int alloc_percpu_trace_buffer(void)
|
|
{
|
|
struct trace_buffer_struct *buffers;
|
|
struct trace_buffer_struct *sirq_buffers;
|
|
struct trace_buffer_struct *irq_buffers;
|
|
struct trace_buffer_struct *nmi_buffers;
|
|
|
|
buffers = alloc_percpu(struct trace_buffer_struct);
|
|
if (!buffers)
|
|
goto err_warn;
|
|
|
|
sirq_buffers = alloc_percpu(struct trace_buffer_struct);
|
|
if (!sirq_buffers)
|
|
goto err_sirq;
|
|
|
|
irq_buffers = alloc_percpu(struct trace_buffer_struct);
|
|
if (!irq_buffers)
|
|
goto err_irq;
|
|
|
|
nmi_buffers = alloc_percpu(struct trace_buffer_struct);
|
|
if (!nmi_buffers)
|
|
goto err_nmi;
|
|
|
|
trace_percpu_buffer = buffers;
|
|
trace_percpu_sirq_buffer = sirq_buffers;
|
|
trace_percpu_irq_buffer = irq_buffers;
|
|
trace_percpu_nmi_buffer = nmi_buffers;
|
|
|
|
return 0;
|
|
|
|
err_nmi:
|
|
free_percpu(irq_buffers);
|
|
err_irq:
|
|
free_percpu(sirq_buffers);
|
|
err_sirq:
|
|
free_percpu(buffers);
|
|
err_warn:
|
|
WARN(1, "Could not allocate percpu trace_printk buffer");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
static int buffers_allocated;
|
|
|
|
void trace_printk_init_buffers(void)
|
|
{
|
|
if (buffers_allocated)
|
|
return;
|
|
|
|
if (alloc_percpu_trace_buffer())
|
|
return;
|
|
|
|
/* trace_printk() is for debug use only. Don't use it in production. */
|
|
|
|
pr_warning("\n**********************************************************\n");
|
|
pr_warning("** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **\n");
|
|
pr_warning("** **\n");
|
|
pr_warning("** trace_printk() being used. Allocating extra memory. **\n");
|
|
pr_warning("** **\n");
|
|
pr_warning("** This means that this is a DEBUG kernel and it is **\n");
|
|
pr_warning("** unsafe for produciton use. **\n");
|
|
pr_warning("** **\n");
|
|
pr_warning("** If you see this message and you are not debugging **\n");
|
|
pr_warning("** the kernel, report this immediately to your vendor! **\n");
|
|
pr_warning("** **\n");
|
|
pr_warning("** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **\n");
|
|
pr_warning("**********************************************************\n");
|
|
|
|
/* Expand the buffers to set size */
|
|
tracing_update_buffers();
|
|
|
|
buffers_allocated = 1;
|
|
|
|
/*
|
|
* trace_printk_init_buffers() can be called by modules.
|
|
* If that happens, then we need to start cmdline recording
|
|
* directly here. If the global_trace.buffer is already
|
|
* allocated here, then this was called by module code.
|
|
*/
|
|
if (global_trace.trace_buffer.buffer)
|
|
tracing_start_cmdline_record();
|
|
}
|
|
|
|
void trace_printk_start_comm(void)
|
|
{
|
|
/* Start tracing comms if trace printk is set */
|
|
if (!buffers_allocated)
|
|
return;
|
|
tracing_start_cmdline_record();
|
|
}
|
|
|
|
static void trace_printk_start_stop_comm(int enabled)
|
|
{
|
|
if (!buffers_allocated)
|
|
return;
|
|
|
|
if (enabled)
|
|
tracing_start_cmdline_record();
|
|
else
|
|
tracing_stop_cmdline_record();
|
|
}
|
|
|
|
/**
|
|
* trace_vbprintk - write binary msg to tracing buffer
|
|
*
|
|
*/
|
|
int trace_vbprintk(unsigned long ip, const char *fmt, va_list args)
|
|
{
|
|
struct ftrace_event_call *call = &event_bprint;
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer *buffer;
|
|
struct trace_array *tr = &global_trace;
|
|
struct bprint_entry *entry;
|
|
unsigned long flags;
|
|
char *tbuffer;
|
|
int len = 0, size, pc;
|
|
|
|
if (unlikely(tracing_selftest_running || tracing_disabled))
|
|
return 0;
|
|
|
|
/* Don't pollute graph traces with trace_vprintk internals */
|
|
pause_graph_tracing();
|
|
|
|
pc = preempt_count();
|
|
preempt_disable_notrace();
|
|
|
|
tbuffer = get_trace_buf();
|
|
if (!tbuffer) {
|
|
len = 0;
|
|
goto out;
|
|
}
|
|
|
|
len = vbin_printf((u32 *)tbuffer, TRACE_BUF_SIZE/sizeof(int), fmt, args);
|
|
|
|
if (len > TRACE_BUF_SIZE/sizeof(int) || len < 0)
|
|
goto out;
|
|
|
|
local_save_flags(flags);
|
|
size = sizeof(*entry) + sizeof(u32) * len;
|
|
buffer = tr->trace_buffer.buffer;
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_BPRINT, size,
|
|
flags, pc);
|
|
if (!event)
|
|
goto out;
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
entry->fmt = fmt;
|
|
|
|
memcpy(entry->buf, tbuffer, sizeof(u32) * len);
|
|
if (!call_filter_check_discard(call, entry, buffer, event)) {
|
|
__buffer_unlock_commit(buffer, event);
|
|
ftrace_trace_stack(buffer, flags, 6, pc);
|
|
}
|
|
|
|
out:
|
|
preempt_enable_notrace();
|
|
unpause_graph_tracing();
|
|
|
|
return len;
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_vbprintk);
|
|
|
|
static int
|
|
__trace_array_vprintk(struct ring_buffer *buffer,
|
|
unsigned long ip, const char *fmt, va_list args)
|
|
{
|
|
struct ftrace_event_call *call = &event_print;
|
|
struct ring_buffer_event *event;
|
|
int len = 0, size, pc;
|
|
struct print_entry *entry;
|
|
unsigned long flags;
|
|
char *tbuffer;
|
|
|
|
if (tracing_disabled || tracing_selftest_running)
|
|
return 0;
|
|
|
|
/* Don't pollute graph traces with trace_vprintk internals */
|
|
pause_graph_tracing();
|
|
|
|
pc = preempt_count();
|
|
preempt_disable_notrace();
|
|
|
|
|
|
tbuffer = get_trace_buf();
|
|
if (!tbuffer) {
|
|
len = 0;
|
|
goto out;
|
|
}
|
|
|
|
len = vsnprintf(tbuffer, TRACE_BUF_SIZE, fmt, args);
|
|
if (len > TRACE_BUF_SIZE)
|
|
goto out;
|
|
|
|
local_save_flags(flags);
|
|
size = sizeof(*entry) + len + 1;
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_PRINT, size,
|
|
flags, pc);
|
|
if (!event)
|
|
goto out;
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
|
|
memcpy(&entry->buf, tbuffer, len);
|
|
entry->buf[len] = '\0';
|
|
if (!call_filter_check_discard(call, entry, buffer, event)) {
|
|
__buffer_unlock_commit(buffer, event);
|
|
ftrace_trace_stack(buffer, flags, 6, pc);
|
|
}
|
|
out:
|
|
preempt_enable_notrace();
|
|
unpause_graph_tracing();
|
|
|
|
return len;
|
|
}
|
|
|
|
int trace_array_vprintk(struct trace_array *tr,
|
|
unsigned long ip, const char *fmt, va_list args)
|
|
{
|
|
return __trace_array_vprintk(tr->trace_buffer.buffer, ip, fmt, args);
|
|
}
|
|
|
|
int trace_array_printk(struct trace_array *tr,
|
|
unsigned long ip, const char *fmt, ...)
|
|
{
|
|
int ret;
|
|
va_list ap;
|
|
|
|
if (!(trace_flags & TRACE_ITER_PRINTK))
|
|
return 0;
|
|
|
|
va_start(ap, fmt);
|
|
ret = trace_array_vprintk(tr, ip, fmt, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
int trace_array_printk_buf(struct ring_buffer *buffer,
|
|
unsigned long ip, const char *fmt, ...)
|
|
{
|
|
int ret;
|
|
va_list ap;
|
|
|
|
if (!(trace_flags & TRACE_ITER_PRINTK))
|
|
return 0;
|
|
|
|
va_start(ap, fmt);
|
|
ret = __trace_array_vprintk(buffer, ip, fmt, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
int trace_vprintk(unsigned long ip, const char *fmt, va_list args)
|
|
{
|
|
return trace_array_vprintk(&global_trace, ip, fmt, args);
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_vprintk);
|
|
|
|
static void trace_iterator_increment(struct trace_iterator *iter)
|
|
{
|
|
struct ring_buffer_iter *buf_iter = trace_buffer_iter(iter, iter->cpu);
|
|
|
|
iter->idx++;
|
|
if (buf_iter)
|
|
ring_buffer_read(buf_iter, NULL);
|
|
}
|
|
|
|
static struct trace_entry *
|
|
peek_next_entry(struct trace_iterator *iter, int cpu, u64 *ts,
|
|
unsigned long *lost_events)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer_iter *buf_iter = trace_buffer_iter(iter, cpu);
|
|
|
|
if (buf_iter)
|
|
event = ring_buffer_iter_peek(buf_iter, ts);
|
|
else
|
|
event = ring_buffer_peek(iter->trace_buffer->buffer, cpu, ts,
|
|
lost_events);
|
|
|
|
if (event) {
|
|
iter->ent_size = ring_buffer_event_length(event);
|
|
return ring_buffer_event_data(event);
|
|
}
|
|
iter->ent_size = 0;
|
|
return NULL;
|
|
}
|
|
|
|
static struct trace_entry *
|
|
__find_next_entry(struct trace_iterator *iter, int *ent_cpu,
|
|
unsigned long *missing_events, u64 *ent_ts)
|
|
{
|
|
struct ring_buffer *buffer = iter->trace_buffer->buffer;
|
|
struct trace_entry *ent, *next = NULL;
|
|
unsigned long lost_events = 0, next_lost = 0;
|
|
int cpu_file = iter->cpu_file;
|
|
u64 next_ts = 0, ts;
|
|
int next_cpu = -1;
|
|
int next_size = 0;
|
|
int cpu;
|
|
|
|
/*
|
|
* If we are in a per_cpu trace file, don't bother by iterating over
|
|
* all cpu and peek directly.
|
|
*/
|
|
if (cpu_file > RING_BUFFER_ALL_CPUS) {
|
|
if (ring_buffer_empty_cpu(buffer, cpu_file))
|
|
return NULL;
|
|
ent = peek_next_entry(iter, cpu_file, ent_ts, missing_events);
|
|
if (ent_cpu)
|
|
*ent_cpu = cpu_file;
|
|
|
|
return ent;
|
|
}
|
|
|
|
for_each_tracing_cpu(cpu) {
|
|
|
|
if (ring_buffer_empty_cpu(buffer, cpu))
|
|
continue;
|
|
|
|
ent = peek_next_entry(iter, cpu, &ts, &lost_events);
|
|
|
|
/*
|
|
* Pick the entry with the smallest timestamp:
|
|
*/
|
|
if (ent && (!next || ts < next_ts)) {
|
|
next = ent;
|
|
next_cpu = cpu;
|
|
next_ts = ts;
|
|
next_lost = lost_events;
|
|
next_size = iter->ent_size;
|
|
}
|
|
}
|
|
|
|
iter->ent_size = next_size;
|
|
|
|
if (ent_cpu)
|
|
*ent_cpu = next_cpu;
|
|
|
|
if (ent_ts)
|
|
*ent_ts = next_ts;
|
|
|
|
if (missing_events)
|
|
*missing_events = next_lost;
|
|
|
|
return next;
|
|
}
|
|
|
|
/* Find the next real entry, without updating the iterator itself */
|
|
struct trace_entry *trace_find_next_entry(struct trace_iterator *iter,
|
|
int *ent_cpu, u64 *ent_ts)
|
|
{
|
|
return __find_next_entry(iter, ent_cpu, NULL, ent_ts);
|
|
}
|
|
|
|
/* Find the next real entry, and increment the iterator to the next entry */
|
|
void *trace_find_next_entry_inc(struct trace_iterator *iter)
|
|
{
|
|
iter->ent = __find_next_entry(iter, &iter->cpu,
|
|
&iter->lost_events, &iter->ts);
|
|
|
|
if (iter->ent)
|
|
trace_iterator_increment(iter);
|
|
|
|
return iter->ent ? iter : NULL;
|
|
}
|
|
|
|
static void trace_consume(struct trace_iterator *iter)
|
|
{
|
|
ring_buffer_consume(iter->trace_buffer->buffer, iter->cpu, &iter->ts,
|
|
&iter->lost_events);
|
|
}
|
|
|
|
static void *s_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
struct trace_iterator *iter = m->private;
|
|
int i = (int)*pos;
|
|
void *ent;
|
|
|
|
WARN_ON_ONCE(iter->leftover);
|
|
|
|
(*pos)++;
|
|
|
|
/* can't go backwards */
|
|
if (iter->idx > i)
|
|
return NULL;
|
|
|
|
if (iter->idx < 0)
|
|
ent = trace_find_next_entry_inc(iter);
|
|
else
|
|
ent = iter;
|
|
|
|
while (ent && iter->idx < i)
|
|
ent = trace_find_next_entry_inc(iter);
|
|
|
|
iter->pos = *pos;
|
|
|
|
return ent;
|
|
}
|
|
|
|
void tracing_iter_reset(struct trace_iterator *iter, int cpu)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer_iter *buf_iter;
|
|
unsigned long entries = 0;
|
|
u64 ts;
|
|
|
|
per_cpu_ptr(iter->trace_buffer->data, cpu)->skipped_entries = 0;
|
|
|
|
buf_iter = trace_buffer_iter(iter, cpu);
|
|
if (!buf_iter)
|
|
return;
|
|
|
|
ring_buffer_iter_reset(buf_iter);
|
|
|
|
/*
|
|
* We could have the case with the max latency tracers
|
|
* that a reset never took place on a cpu. This is evident
|
|
* by the timestamp being before the start of the buffer.
|
|
*/
|
|
while ((event = ring_buffer_iter_peek(buf_iter, &ts))) {
|
|
if (ts >= iter->trace_buffer->time_start)
|
|
break;
|
|
entries++;
|
|
ring_buffer_read(buf_iter, NULL);
|
|
}
|
|
|
|
per_cpu_ptr(iter->trace_buffer->data, cpu)->skipped_entries = entries;
|
|
}
|
|
|
|
/*
|
|
* The current tracer is copied to avoid a global locking
|
|
* all around.
|
|
*/
|
|
static void *s_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
struct trace_iterator *iter = m->private;
|
|
struct trace_array *tr = iter->tr;
|
|
int cpu_file = iter->cpu_file;
|
|
void *p = NULL;
|
|
loff_t l = 0;
|
|
int cpu;
|
|
|
|
/*
|
|
* copy the tracer to avoid using a global lock all around.
|
|
* iter->trace is a copy of current_trace, the pointer to the
|
|
* name may be used instead of a strcmp(), as iter->trace->name
|
|
* will point to the same string as current_trace->name.
|
|
*/
|
|
mutex_lock(&trace_types_lock);
|
|
if (unlikely(tr->current_trace && iter->trace->name != tr->current_trace->name))
|
|
*iter->trace = *tr->current_trace;
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (iter->snapshot && iter->trace->use_max_tr)
|
|
return ERR_PTR(-EBUSY);
|
|
#endif
|
|
|
|
if (!iter->snapshot)
|
|
atomic_inc(&trace_record_cmdline_disabled);
|
|
|
|
if (*pos != iter->pos) {
|
|
iter->ent = NULL;
|
|
iter->cpu = 0;
|
|
iter->idx = -1;
|
|
|
|
if (cpu_file == RING_BUFFER_ALL_CPUS) {
|
|
for_each_tracing_cpu(cpu)
|
|
tracing_iter_reset(iter, cpu);
|
|
} else
|
|
tracing_iter_reset(iter, cpu_file);
|
|
|
|
iter->leftover = 0;
|
|
for (p = iter; p && l < *pos; p = s_next(m, p, &l))
|
|
;
|
|
|
|
} else {
|
|
/*
|
|
* If we overflowed the seq_file before, then we want
|
|
* to just reuse the trace_seq buffer again.
|
|
*/
|
|
if (iter->leftover)
|
|
p = iter;
|
|
else {
|
|
l = *pos - 1;
|
|
p = s_next(m, p, &l);
|
|
}
|
|
}
|
|
|
|
trace_event_read_lock();
|
|
trace_access_lock(cpu_file);
|
|
return p;
|
|
}
|
|
|
|
static void s_stop(struct seq_file *m, void *p)
|
|
{
|
|
struct trace_iterator *iter = m->private;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (iter->snapshot && iter->trace->use_max_tr)
|
|
return;
|
|
#endif
|
|
|
|
if (!iter->snapshot)
|
|
atomic_dec(&trace_record_cmdline_disabled);
|
|
|
|
trace_access_unlock(iter->cpu_file);
|
|
trace_event_read_unlock();
|
|
}
|
|
|
|
static void
|
|
get_total_entries(struct trace_buffer *buf,
|
|
unsigned long *total, unsigned long *entries)
|
|
{
|
|
unsigned long count;
|
|
int cpu;
|
|
|
|
*total = 0;
|
|
*entries = 0;
|
|
|
|
for_each_tracing_cpu(cpu) {
|
|
count = ring_buffer_entries_cpu(buf->buffer, cpu);
|
|
/*
|
|
* If this buffer has skipped entries, then we hold all
|
|
* entries for the trace and we need to ignore the
|
|
* ones before the time stamp.
|
|
*/
|
|
if (per_cpu_ptr(buf->data, cpu)->skipped_entries) {
|
|
count -= per_cpu_ptr(buf->data, cpu)->skipped_entries;
|
|
/* total is the same as the entries */
|
|
*total += count;
|
|
} else
|
|
*total += count +
|
|
ring_buffer_overrun_cpu(buf->buffer, cpu);
|
|
*entries += count;
|
|
}
|
|
}
|
|
|
|
static void print_lat_help_header(struct seq_file *m)
|
|
{
|
|
seq_puts(m, "# _------=> CPU# \n");
|
|
seq_puts(m, "# / _-----=> irqs-off \n");
|
|
seq_puts(m, "# | / _----=> need-resched \n");
|
|
seq_puts(m, "# || / _---=> hardirq/softirq \n");
|
|
seq_puts(m, "# ||| / _--=> preempt-depth \n");
|
|
seq_puts(m, "# |||| / delay \n");
|
|
seq_puts(m, "# cmd pid ||||| time | caller \n");
|
|
seq_puts(m, "# \\ / ||||| \\ | / \n");
|
|
}
|
|
|
|
static void print_event_info(struct trace_buffer *buf, struct seq_file *m)
|
|
{
|
|
unsigned long total;
|
|
unsigned long entries;
|
|
|
|
get_total_entries(buf, &total, &entries);
|
|
seq_printf(m, "# entries-in-buffer/entries-written: %lu/%lu #P:%d\n",
|
|
entries, total, num_online_cpus());
|
|
seq_puts(m, "#\n");
|
|
}
|
|
|
|
static void print_func_help_header(struct trace_buffer *buf, struct seq_file *m)
|
|
{
|
|
print_event_info(buf, m);
|
|
seq_puts(m, "# TASK-PID CPU# TIMESTAMP FUNCTION\n");
|
|
seq_puts(m, "# | | | | |\n");
|
|
}
|
|
|
|
static void print_func_help_header_irq(struct trace_buffer *buf, struct seq_file *m)
|
|
{
|
|
print_event_info(buf, m);
|
|
seq_puts(m, "# _-----=> irqs-off\n");
|
|
seq_puts(m, "# / _----=> need-resched\n");
|
|
seq_puts(m, "# | / _---=> hardirq/softirq\n");
|
|
seq_puts(m, "# || / _--=> preempt-depth\n");
|
|
seq_puts(m, "# ||| / delay\n");
|
|
seq_puts(m, "# TASK-PID CPU# |||| TIMESTAMP FUNCTION\n");
|
|
seq_puts(m, "# | | | |||| | |\n");
|
|
}
|
|
|
|
void
|
|
print_trace_header(struct seq_file *m, struct trace_iterator *iter)
|
|
{
|
|
unsigned long sym_flags = (trace_flags & TRACE_ITER_SYM_MASK);
|
|
struct trace_buffer *buf = iter->trace_buffer;
|
|
struct trace_array_cpu *data = per_cpu_ptr(buf->data, buf->cpu);
|
|
struct tracer *type = iter->trace;
|
|
unsigned long entries;
|
|
unsigned long total;
|
|
const char *name = "preemption";
|
|
|
|
name = type->name;
|
|
|
|
get_total_entries(buf, &total, &entries);
|
|
|
|
seq_printf(m, "# %s latency trace v1.1.5 on %s\n",
|
|
name, UTS_RELEASE);
|
|
seq_puts(m, "# -----------------------------------"
|
|
"---------------------------------\n");
|
|
seq_printf(m, "# latency: %lu us, #%lu/%lu, CPU#%d |"
|
|
" (M:%s VP:%d, KP:%d, SP:%d HP:%d",
|
|
nsecs_to_usecs(data->saved_latency),
|
|
entries,
|
|
total,
|
|
buf->cpu,
|
|
#if defined(CONFIG_PREEMPT_NONE)
|
|
"server",
|
|
#elif defined(CONFIG_PREEMPT_VOLUNTARY)
|
|
"desktop",
|
|
#elif defined(CONFIG_PREEMPT)
|
|
"preempt",
|
|
#else
|
|
"unknown",
|
|
#endif
|
|
/* These are reserved for later use */
|
|
0, 0, 0, 0);
|
|
#ifdef CONFIG_SMP
|
|
seq_printf(m, " #P:%d)\n", num_online_cpus());
|
|
#else
|
|
seq_puts(m, ")\n");
|
|
#endif
|
|
seq_puts(m, "# -----------------\n");
|
|
seq_printf(m, "# | task: %.16s-%d "
|
|
"(uid:%d nice:%ld policy:%ld rt_prio:%ld)\n",
|
|
data->comm, data->pid,
|
|
from_kuid_munged(seq_user_ns(m), data->uid), data->nice,
|
|
data->policy, data->rt_priority);
|
|
seq_puts(m, "# -----------------\n");
|
|
|
|
if (data->critical_start) {
|
|
seq_puts(m, "# => started at: ");
|
|
seq_print_ip_sym(&iter->seq, data->critical_start, sym_flags);
|
|
trace_print_seq(m, &iter->seq);
|
|
seq_puts(m, "\n# => ended at: ");
|
|
seq_print_ip_sym(&iter->seq, data->critical_end, sym_flags);
|
|
trace_print_seq(m, &iter->seq);
|
|
seq_puts(m, "\n#\n");
|
|
}
|
|
|
|
seq_puts(m, "#\n");
|
|
}
|
|
|
|
static void test_cpu_buff_start(struct trace_iterator *iter)
|
|
{
|
|
struct trace_seq *s = &iter->seq;
|
|
|
|
if (!(trace_flags & TRACE_ITER_ANNOTATE))
|
|
return;
|
|
|
|
if (!(iter->iter_flags & TRACE_FILE_ANNOTATE))
|
|
return;
|
|
|
|
if (cpumask_test_cpu(iter->cpu, iter->started))
|
|
return;
|
|
|
|
if (per_cpu_ptr(iter->trace_buffer->data, iter->cpu)->skipped_entries)
|
|
return;
|
|
|
|
cpumask_set_cpu(iter->cpu, iter->started);
|
|
|
|
/* Don't print started cpu buffer for the first entry of the trace */
|
|
if (iter->idx > 1)
|
|
trace_seq_printf(s, "##### CPU %u buffer started ####\n",
|
|
iter->cpu);
|
|
}
|
|
|
|
static enum print_line_t print_trace_fmt(struct trace_iterator *iter)
|
|
{
|
|
struct trace_seq *s = &iter->seq;
|
|
unsigned long sym_flags = (trace_flags & TRACE_ITER_SYM_MASK);
|
|
struct trace_entry *entry;
|
|
struct trace_event *event;
|
|
|
|
entry = iter->ent;
|
|
|
|
test_cpu_buff_start(iter);
|
|
|
|
event = ftrace_find_event(entry->type);
|
|
|
|
if (trace_flags & TRACE_ITER_CONTEXT_INFO) {
|
|
if (iter->iter_flags & TRACE_FILE_LAT_FMT) {
|
|
if (!trace_print_lat_context(iter))
|
|
goto partial;
|
|
} else {
|
|
if (!trace_print_context(iter))
|
|
goto partial;
|
|
}
|
|
}
|
|
|
|
if (event)
|
|
return event->funcs->trace(iter, sym_flags, event);
|
|
|
|
if (!trace_seq_printf(s, "Unknown type %d\n", entry->type))
|
|
goto partial;
|
|
|
|
return TRACE_TYPE_HANDLED;
|
|
partial:
|
|
return TRACE_TYPE_PARTIAL_LINE;
|
|
}
|
|
|
|
static enum print_line_t print_raw_fmt(struct trace_iterator *iter)
|
|
{
|
|
struct trace_seq *s = &iter->seq;
|
|
struct trace_entry *entry;
|
|
struct trace_event *event;
|
|
|
|
entry = iter->ent;
|
|
|
|
if (trace_flags & TRACE_ITER_CONTEXT_INFO) {
|
|
if (!trace_seq_printf(s, "%d %d %llu ",
|
|
entry->pid, iter->cpu, iter->ts))
|
|
goto partial;
|
|
}
|
|
|
|
event = ftrace_find_event(entry->type);
|
|
if (event)
|
|
return event->funcs->raw(iter, 0, event);
|
|
|
|
if (!trace_seq_printf(s, "%d ?\n", entry->type))
|
|
goto partial;
|
|
|
|
return TRACE_TYPE_HANDLED;
|
|
partial:
|
|
return TRACE_TYPE_PARTIAL_LINE;
|
|
}
|
|
|
|
static enum print_line_t print_hex_fmt(struct trace_iterator *iter)
|
|
{
|
|
struct trace_seq *s = &iter->seq;
|
|
unsigned char newline = '\n';
|
|
struct trace_entry *entry;
|
|
struct trace_event *event;
|
|
|
|
entry = iter->ent;
|
|
|
|
if (trace_flags & TRACE_ITER_CONTEXT_INFO) {
|
|
SEQ_PUT_HEX_FIELD_RET(s, entry->pid);
|
|
SEQ_PUT_HEX_FIELD_RET(s, iter->cpu);
|
|
SEQ_PUT_HEX_FIELD_RET(s, iter->ts);
|
|
}
|
|
|
|
event = ftrace_find_event(entry->type);
|
|
if (event) {
|
|
enum print_line_t ret = event->funcs->hex(iter, 0, event);
|
|
if (ret != TRACE_TYPE_HANDLED)
|
|
return ret;
|
|
}
|
|
|
|
SEQ_PUT_FIELD_RET(s, newline);
|
|
|
|
return TRACE_TYPE_HANDLED;
|
|
}
|
|
|
|
static enum print_line_t print_bin_fmt(struct trace_iterator *iter)
|
|
{
|
|
struct trace_seq *s = &iter->seq;
|
|
struct trace_entry *entry;
|
|
struct trace_event *event;
|
|
|
|
entry = iter->ent;
|
|
|
|
if (trace_flags & TRACE_ITER_CONTEXT_INFO) {
|
|
SEQ_PUT_FIELD_RET(s, entry->pid);
|
|
SEQ_PUT_FIELD_RET(s, iter->cpu);
|
|
SEQ_PUT_FIELD_RET(s, iter->ts);
|
|
}
|
|
|
|
event = ftrace_find_event(entry->type);
|
|
return event ? event->funcs->binary(iter, 0, event) :
|
|
TRACE_TYPE_HANDLED;
|
|
}
|
|
|
|
int trace_empty(struct trace_iterator *iter)
|
|
{
|
|
struct ring_buffer_iter *buf_iter;
|
|
int cpu;
|
|
|
|
/* If we are looking at one CPU buffer, only check that one */
|
|
if (iter->cpu_file != RING_BUFFER_ALL_CPUS) {
|
|
cpu = iter->cpu_file;
|
|
buf_iter = trace_buffer_iter(iter, cpu);
|
|
if (buf_iter) {
|
|
if (!ring_buffer_iter_empty(buf_iter))
|
|
return 0;
|
|
} else {
|
|
if (!ring_buffer_empty_cpu(iter->trace_buffer->buffer, cpu))
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
for_each_tracing_cpu(cpu) {
|
|
buf_iter = trace_buffer_iter(iter, cpu);
|
|
if (buf_iter) {
|
|
if (!ring_buffer_iter_empty(buf_iter))
|
|
return 0;
|
|
} else {
|
|
if (!ring_buffer_empty_cpu(iter->trace_buffer->buffer, cpu))
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* Called with trace_event_read_lock() held. */
|
|
enum print_line_t print_trace_line(struct trace_iterator *iter)
|
|
{
|
|
enum print_line_t ret;
|
|
|
|
if (iter->lost_events &&
|
|
!trace_seq_printf(&iter->seq, "CPU:%d [LOST %lu EVENTS]\n",
|
|
iter->cpu, iter->lost_events))
|
|
return TRACE_TYPE_PARTIAL_LINE;
|
|
|
|
if (iter->trace && iter->trace->print_line) {
|
|
ret = iter->trace->print_line(iter);
|
|
if (ret != TRACE_TYPE_UNHANDLED)
|
|
return ret;
|
|
}
|
|
|
|
if (iter->ent->type == TRACE_BPUTS &&
|
|
trace_flags & TRACE_ITER_PRINTK &&
|
|
trace_flags & TRACE_ITER_PRINTK_MSGONLY)
|
|
return trace_print_bputs_msg_only(iter);
|
|
|
|
if (iter->ent->type == TRACE_BPRINT &&
|
|
trace_flags & TRACE_ITER_PRINTK &&
|
|
trace_flags & TRACE_ITER_PRINTK_MSGONLY)
|
|
return trace_print_bprintk_msg_only(iter);
|
|
|
|
if (iter->ent->type == TRACE_PRINT &&
|
|
trace_flags & TRACE_ITER_PRINTK &&
|
|
trace_flags & TRACE_ITER_PRINTK_MSGONLY)
|
|
return trace_print_printk_msg_only(iter);
|
|
|
|
if (trace_flags & TRACE_ITER_BIN)
|
|
return print_bin_fmt(iter);
|
|
|
|
if (trace_flags & TRACE_ITER_HEX)
|
|
return print_hex_fmt(iter);
|
|
|
|
if (trace_flags & TRACE_ITER_RAW)
|
|
return print_raw_fmt(iter);
|
|
|
|
return print_trace_fmt(iter);
|
|
}
|
|
|
|
void trace_latency_header(struct seq_file *m)
|
|
{
|
|
struct trace_iterator *iter = m->private;
|
|
|
|
/* print nothing if the buffers are empty */
|
|
if (trace_empty(iter))
|
|
return;
|
|
|
|
if (iter->iter_flags & TRACE_FILE_LAT_FMT)
|
|
print_trace_header(m, iter);
|
|
|
|
if (!(trace_flags & TRACE_ITER_VERBOSE))
|
|
print_lat_help_header(m);
|
|
}
|
|
|
|
void trace_default_header(struct seq_file *m)
|
|
{
|
|
struct trace_iterator *iter = m->private;
|
|
|
|
if (!(trace_flags & TRACE_ITER_CONTEXT_INFO))
|
|
return;
|
|
|
|
if (iter->iter_flags & TRACE_FILE_LAT_FMT) {
|
|
/* print nothing if the buffers are empty */
|
|
if (trace_empty(iter))
|
|
return;
|
|
print_trace_header(m, iter);
|
|
if (!(trace_flags & TRACE_ITER_VERBOSE))
|
|
print_lat_help_header(m);
|
|
} else {
|
|
if (!(trace_flags & TRACE_ITER_VERBOSE)) {
|
|
if (trace_flags & TRACE_ITER_IRQ_INFO)
|
|
print_func_help_header_irq(iter->trace_buffer, m);
|
|
else
|
|
print_func_help_header(iter->trace_buffer, m);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void test_ftrace_alive(struct seq_file *m)
|
|
{
|
|
if (!ftrace_is_dead())
|
|
return;
|
|
seq_printf(m, "# WARNING: FUNCTION TRACING IS CORRUPTED\n");
|
|
seq_printf(m, "# MAY BE MISSING FUNCTION EVENTS\n");
|
|
}
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
static void show_snapshot_main_help(struct seq_file *m)
|
|
{
|
|
seq_printf(m, "# echo 0 > snapshot : Clears and frees snapshot buffer\n");
|
|
seq_printf(m, "# echo 1 > snapshot : Allocates snapshot buffer, if not already allocated.\n");
|
|
seq_printf(m, "# Takes a snapshot of the main buffer.\n");
|
|
seq_printf(m, "# echo 2 > snapshot : Clears snapshot buffer (but does not allocate or free)\n");
|
|
seq_printf(m, "# (Doesn't have to be '2' works with any number that\n");
|
|
seq_printf(m, "# is not a '0' or '1')\n");
|
|
}
|
|
|
|
static void show_snapshot_percpu_help(struct seq_file *m)
|
|
{
|
|
seq_printf(m, "# echo 0 > snapshot : Invalid for per_cpu snapshot file.\n");
|
|
#ifdef CONFIG_RING_BUFFER_ALLOW_SWAP
|
|
seq_printf(m, "# echo 1 > snapshot : Allocates snapshot buffer, if not already allocated.\n");
|
|
seq_printf(m, "# Takes a snapshot of the main buffer for this cpu.\n");
|
|
#else
|
|
seq_printf(m, "# echo 1 > snapshot : Not supported with this kernel.\n");
|
|
seq_printf(m, "# Must use main snapshot file to allocate.\n");
|
|
#endif
|
|
seq_printf(m, "# echo 2 > snapshot : Clears this cpu's snapshot buffer (but does not allocate)\n");
|
|
seq_printf(m, "# (Doesn't have to be '2' works with any number that\n");
|
|
seq_printf(m, "# is not a '0' or '1')\n");
|
|
}
|
|
|
|
static void print_snapshot_help(struct seq_file *m, struct trace_iterator *iter)
|
|
{
|
|
if (iter->tr->allocated_snapshot)
|
|
seq_printf(m, "#\n# * Snapshot is allocated *\n#\n");
|
|
else
|
|
seq_printf(m, "#\n# * Snapshot is freed *\n#\n");
|
|
|
|
seq_printf(m, "# Snapshot commands:\n");
|
|
if (iter->cpu_file == RING_BUFFER_ALL_CPUS)
|
|
show_snapshot_main_help(m);
|
|
else
|
|
show_snapshot_percpu_help(m);
|
|
}
|
|
#else
|
|
/* Should never be called */
|
|
static inline void print_snapshot_help(struct seq_file *m, struct trace_iterator *iter) { }
|
|
#endif
|
|
|
|
static int s_show(struct seq_file *m, void *v)
|
|
{
|
|
struct trace_iterator *iter = v;
|
|
int ret;
|
|
|
|
if (iter->ent == NULL) {
|
|
if (iter->tr) {
|
|
seq_printf(m, "# tracer: %s\n", iter->trace->name);
|
|
seq_puts(m, "#\n");
|
|
test_ftrace_alive(m);
|
|
}
|
|
if (iter->snapshot && trace_empty(iter))
|
|
print_snapshot_help(m, iter);
|
|
else if (iter->trace && iter->trace->print_header)
|
|
iter->trace->print_header(m);
|
|
else
|
|
trace_default_header(m);
|
|
|
|
} else if (iter->leftover) {
|
|
/*
|
|
* If we filled the seq_file buffer earlier, we
|
|
* want to just show it now.
|
|
*/
|
|
ret = trace_print_seq(m, &iter->seq);
|
|
|
|
/* ret should this time be zero, but you never know */
|
|
iter->leftover = ret;
|
|
|
|
} else {
|
|
print_trace_line(iter);
|
|
ret = trace_print_seq(m, &iter->seq);
|
|
/*
|
|
* If we overflow the seq_file buffer, then it will
|
|
* ask us for this data again at start up.
|
|
* Use that instead.
|
|
* ret is 0 if seq_file write succeeded.
|
|
* -1 otherwise.
|
|
*/
|
|
iter->leftover = ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Should be used after trace_array_get(), trace_types_lock
|
|
* ensures that i_cdev was already initialized.
|
|
*/
|
|
static inline int tracing_get_cpu(struct inode *inode)
|
|
{
|
|
if (inode->i_cdev) /* See trace_create_cpu_file() */
|
|
return (long)inode->i_cdev - 1;
|
|
return RING_BUFFER_ALL_CPUS;
|
|
}
|
|
|
|
static const struct seq_operations tracer_seq_ops = {
|
|
.start = s_start,
|
|
.next = s_next,
|
|
.stop = s_stop,
|
|
.show = s_show,
|
|
};
|
|
|
|
static struct trace_iterator *
|
|
__tracing_open(struct inode *inode, struct file *file, bool snapshot)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct trace_iterator *iter;
|
|
int cpu;
|
|
|
|
if (tracing_disabled)
|
|
return ERR_PTR(-ENODEV);
|
|
|
|
iter = __seq_open_private(file, &tracer_seq_ops, sizeof(*iter));
|
|
if (!iter)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
iter->buffer_iter = kzalloc(sizeof(*iter->buffer_iter) * num_possible_cpus(),
|
|
GFP_KERNEL);
|
|
if (!iter->buffer_iter)
|
|
goto release;
|
|
|
|
/*
|
|
* We make a copy of the current tracer to avoid concurrent
|
|
* changes on it while we are reading.
|
|
*/
|
|
mutex_lock(&trace_types_lock);
|
|
iter->trace = kzalloc(sizeof(*iter->trace), GFP_KERNEL);
|
|
if (!iter->trace)
|
|
goto fail;
|
|
|
|
*iter->trace = *tr->current_trace;
|
|
|
|
if (!zalloc_cpumask_var(&iter->started, GFP_KERNEL))
|
|
goto fail;
|
|
|
|
iter->tr = tr;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
/* Currently only the top directory has a snapshot */
|
|
if (tr->current_trace->print_max || snapshot)
|
|
iter->trace_buffer = &tr->max_buffer;
|
|
else
|
|
#endif
|
|
iter->trace_buffer = &tr->trace_buffer;
|
|
iter->snapshot = snapshot;
|
|
iter->pos = -1;
|
|
iter->cpu_file = tracing_get_cpu(inode);
|
|
mutex_init(&iter->mutex);
|
|
|
|
/* Notify the tracer early; before we stop tracing. */
|
|
if (iter->trace && iter->trace->open)
|
|
iter->trace->open(iter);
|
|
|
|
/* Annotate start of buffers if we had overruns */
|
|
if (ring_buffer_overruns(iter->trace_buffer->buffer))
|
|
iter->iter_flags |= TRACE_FILE_ANNOTATE;
|
|
|
|
/* Output in nanoseconds only if we are using a clock in nanoseconds. */
|
|
if (trace_clocks[tr->clock_id].in_ns)
|
|
iter->iter_flags |= TRACE_FILE_TIME_IN_NS;
|
|
|
|
/* stop the trace while dumping if we are not opening "snapshot" */
|
|
if (!iter->snapshot)
|
|
tracing_stop_tr(tr);
|
|
|
|
if (iter->cpu_file == RING_BUFFER_ALL_CPUS) {
|
|
for_each_tracing_cpu(cpu) {
|
|
iter->buffer_iter[cpu] =
|
|
ring_buffer_read_prepare(iter->trace_buffer->buffer, cpu);
|
|
}
|
|
ring_buffer_read_prepare_sync();
|
|
for_each_tracing_cpu(cpu) {
|
|
ring_buffer_read_start(iter->buffer_iter[cpu]);
|
|
tracing_iter_reset(iter, cpu);
|
|
}
|
|
} else {
|
|
cpu = iter->cpu_file;
|
|
iter->buffer_iter[cpu] =
|
|
ring_buffer_read_prepare(iter->trace_buffer->buffer, cpu);
|
|
ring_buffer_read_prepare_sync();
|
|
ring_buffer_read_start(iter->buffer_iter[cpu]);
|
|
tracing_iter_reset(iter, cpu);
|
|
}
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return iter;
|
|
|
|
fail:
|
|
mutex_unlock(&trace_types_lock);
|
|
kfree(iter->trace);
|
|
kfree(iter->buffer_iter);
|
|
release:
|
|
seq_release_private(inode, file);
|
|
return ERR_PTR(-ENOMEM);
|
|
}
|
|
|
|
int tracing_open_generic(struct inode *inode, struct file *filp)
|
|
{
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
filp->private_data = inode->i_private;
|
|
return 0;
|
|
}
|
|
|
|
bool tracing_is_disabled(void)
|
|
{
|
|
return (tracing_disabled) ? true: false;
|
|
}
|
|
|
|
/*
|
|
* Open and update trace_array ref count.
|
|
* Must have the current trace_array passed to it.
|
|
*/
|
|
static int tracing_open_generic_tr(struct inode *inode, struct file *filp)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
if (trace_array_get(tr) < 0)
|
|
return -ENODEV;
|
|
|
|
filp->private_data = inode->i_private;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int tracing_release(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct seq_file *m = file->private_data;
|
|
struct trace_iterator *iter;
|
|
int cpu;
|
|
|
|
if (!(file->f_mode & FMODE_READ)) {
|
|
trace_array_put(tr);
|
|
return 0;
|
|
}
|
|
|
|
/* Writes do not use seq_file */
|
|
iter = m->private;
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
for_each_tracing_cpu(cpu) {
|
|
if (iter->buffer_iter[cpu])
|
|
ring_buffer_read_finish(iter->buffer_iter[cpu]);
|
|
}
|
|
|
|
if (iter->trace && iter->trace->close)
|
|
iter->trace->close(iter);
|
|
|
|
if (!iter->snapshot)
|
|
/* reenable tracing if it was previously enabled */
|
|
tracing_start_tr(tr);
|
|
|
|
__trace_array_put(tr);
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
mutex_destroy(&iter->mutex);
|
|
free_cpumask_var(iter->started);
|
|
kfree(iter->trace);
|
|
kfree(iter->buffer_iter);
|
|
seq_release_private(inode, file);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int tracing_release_generic_tr(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
|
|
trace_array_put(tr);
|
|
return 0;
|
|
}
|
|
|
|
static int tracing_single_release_tr(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
|
|
trace_array_put(tr);
|
|
|
|
return single_release(inode, file);
|
|
}
|
|
|
|
static int tracing_open(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct trace_iterator *iter;
|
|
int ret = 0;
|
|
|
|
if (trace_array_get(tr) < 0)
|
|
return -ENODEV;
|
|
|
|
/* If this file was open for write, then erase contents */
|
|
if ((file->f_mode & FMODE_WRITE) && (file->f_flags & O_TRUNC)) {
|
|
int cpu = tracing_get_cpu(inode);
|
|
|
|
if (cpu == RING_BUFFER_ALL_CPUS)
|
|
tracing_reset_online_cpus(&tr->trace_buffer);
|
|
else
|
|
tracing_reset(&tr->trace_buffer, cpu);
|
|
}
|
|
|
|
if (file->f_mode & FMODE_READ) {
|
|
iter = __tracing_open(inode, file, false);
|
|
if (IS_ERR(iter))
|
|
ret = PTR_ERR(iter);
|
|
else if (trace_flags & TRACE_ITER_LATENCY_FMT)
|
|
iter->iter_flags |= TRACE_FILE_LAT_FMT;
|
|
}
|
|
|
|
if (ret < 0)
|
|
trace_array_put(tr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Some tracers are not suitable for instance buffers.
|
|
* A tracer is always available for the global array (toplevel)
|
|
* or if it explicitly states that it is.
|
|
*/
|
|
static bool
|
|
trace_ok_for_array(struct tracer *t, struct trace_array *tr)
|
|
{
|
|
return (tr->flags & TRACE_ARRAY_FL_GLOBAL) || t->allow_instances;
|
|
}
|
|
|
|
/* Find the next tracer that this trace array may use */
|
|
static struct tracer *
|
|
get_tracer_for_array(struct trace_array *tr, struct tracer *t)
|
|
{
|
|
while (t && !trace_ok_for_array(t, tr))
|
|
t = t->next;
|
|
|
|
return t;
|
|
}
|
|
|
|
static void *
|
|
t_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
struct trace_array *tr = m->private;
|
|
struct tracer *t = v;
|
|
|
|
(*pos)++;
|
|
|
|
if (t)
|
|
t = get_tracer_for_array(tr, t->next);
|
|
|
|
return t;
|
|
}
|
|
|
|
static void *t_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
struct trace_array *tr = m->private;
|
|
struct tracer *t;
|
|
loff_t l = 0;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
t = get_tracer_for_array(tr, trace_types);
|
|
for (; t && l < *pos; t = t_next(m, t, &l))
|
|
;
|
|
|
|
return t;
|
|
}
|
|
|
|
static void t_stop(struct seq_file *m, void *p)
|
|
{
|
|
mutex_unlock(&trace_types_lock);
|
|
}
|
|
|
|
static int t_show(struct seq_file *m, void *v)
|
|
{
|
|
struct tracer *t = v;
|
|
|
|
if (!t)
|
|
return 0;
|
|
|
|
seq_printf(m, "%s", t->name);
|
|
if (t->next)
|
|
seq_putc(m, ' ');
|
|
else
|
|
seq_putc(m, '\n');
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct seq_operations show_traces_seq_ops = {
|
|
.start = t_start,
|
|
.next = t_next,
|
|
.stop = t_stop,
|
|
.show = t_show,
|
|
};
|
|
|
|
static int show_traces_open(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct seq_file *m;
|
|
int ret;
|
|
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
ret = seq_open(file, &show_traces_seq_ops);
|
|
if (ret)
|
|
return ret;
|
|
|
|
m = file->private_data;
|
|
m->private = tr;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_write_stub(struct file *filp, const char __user *ubuf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
return count;
|
|
}
|
|
|
|
loff_t tracing_lseek(struct file *file, loff_t offset, int whence)
|
|
{
|
|
int ret;
|
|
|
|
if (file->f_mode & FMODE_READ)
|
|
ret = seq_lseek(file, offset, whence);
|
|
else
|
|
file->f_pos = ret = 0;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static const struct file_operations tracing_fops = {
|
|
.open = tracing_open,
|
|
.read = seq_read,
|
|
.write = tracing_write_stub,
|
|
.llseek = tracing_lseek,
|
|
.release = tracing_release,
|
|
};
|
|
|
|
static const struct file_operations show_traces_fops = {
|
|
.open = show_traces_open,
|
|
.read = seq_read,
|
|
.release = seq_release,
|
|
.llseek = seq_lseek,
|
|
};
|
|
|
|
/*
|
|
* The tracer itself will not take this lock, but still we want
|
|
* to provide a consistent cpumask to user-space:
|
|
*/
|
|
static DEFINE_MUTEX(tracing_cpumask_update_lock);
|
|
|
|
/*
|
|
* Temporary storage for the character representation of the
|
|
* CPU bitmask (and one more byte for the newline):
|
|
*/
|
|
static char mask_str[NR_CPUS + 1];
|
|
|
|
static ssize_t
|
|
tracing_cpumask_read(struct file *filp, char __user *ubuf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = file_inode(filp)->i_private;
|
|
int len;
|
|
|
|
mutex_lock(&tracing_cpumask_update_lock);
|
|
|
|
len = cpumask_scnprintf(mask_str, count, tr->tracing_cpumask);
|
|
if (count - len < 2) {
|
|
count = -EINVAL;
|
|
goto out_err;
|
|
}
|
|
len += sprintf(mask_str + len, "\n");
|
|
count = simple_read_from_buffer(ubuf, count, ppos, mask_str, NR_CPUS+1);
|
|
|
|
out_err:
|
|
mutex_unlock(&tracing_cpumask_update_lock);
|
|
|
|
return count;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_cpumask_write(struct file *filp, const char __user *ubuf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = file_inode(filp)->i_private;
|
|
cpumask_var_t tracing_cpumask_new;
|
|
int err, cpu;
|
|
|
|
if (!alloc_cpumask_var(&tracing_cpumask_new, GFP_KERNEL))
|
|
return -ENOMEM;
|
|
|
|
err = cpumask_parse_user(ubuf, count, tracing_cpumask_new);
|
|
if (err)
|
|
goto err_unlock;
|
|
|
|
mutex_lock(&tracing_cpumask_update_lock);
|
|
|
|
local_irq_disable();
|
|
arch_spin_lock(&tr->max_lock);
|
|
for_each_tracing_cpu(cpu) {
|
|
/*
|
|
* Increase/decrease the disabled counter if we are
|
|
* about to flip a bit in the cpumask:
|
|
*/
|
|
if (cpumask_test_cpu(cpu, tr->tracing_cpumask) &&
|
|
!cpumask_test_cpu(cpu, tracing_cpumask_new)) {
|
|
atomic_inc(&per_cpu_ptr(tr->trace_buffer.data, cpu)->disabled);
|
|
ring_buffer_record_disable_cpu(tr->trace_buffer.buffer, cpu);
|
|
}
|
|
if (!cpumask_test_cpu(cpu, tr->tracing_cpumask) &&
|
|
cpumask_test_cpu(cpu, tracing_cpumask_new)) {
|
|
atomic_dec(&per_cpu_ptr(tr->trace_buffer.data, cpu)->disabled);
|
|
ring_buffer_record_enable_cpu(tr->trace_buffer.buffer, cpu);
|
|
}
|
|
}
|
|
arch_spin_unlock(&tr->max_lock);
|
|
local_irq_enable();
|
|
|
|
cpumask_copy(tr->tracing_cpumask, tracing_cpumask_new);
|
|
|
|
mutex_unlock(&tracing_cpumask_update_lock);
|
|
free_cpumask_var(tracing_cpumask_new);
|
|
|
|
return count;
|
|
|
|
err_unlock:
|
|
free_cpumask_var(tracing_cpumask_new);
|
|
|
|
return err;
|
|
}
|
|
|
|
static const struct file_operations tracing_cpumask_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.read = tracing_cpumask_read,
|
|
.write = tracing_cpumask_write,
|
|
.release = tracing_release_generic_tr,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
static int tracing_trace_options_show(struct seq_file *m, void *v)
|
|
{
|
|
struct tracer_opt *trace_opts;
|
|
struct trace_array *tr = m->private;
|
|
u32 tracer_flags;
|
|
int i;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
tracer_flags = tr->current_trace->flags->val;
|
|
trace_opts = tr->current_trace->flags->opts;
|
|
|
|
for (i = 0; trace_options[i]; i++) {
|
|
if (trace_flags & (1 << i))
|
|
seq_printf(m, "%s\n", trace_options[i]);
|
|
else
|
|
seq_printf(m, "no%s\n", trace_options[i]);
|
|
}
|
|
|
|
for (i = 0; trace_opts[i].name; i++) {
|
|
if (tracer_flags & trace_opts[i].bit)
|
|
seq_printf(m, "%s\n", trace_opts[i].name);
|
|
else
|
|
seq_printf(m, "no%s\n", trace_opts[i].name);
|
|
}
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int __set_tracer_option(struct trace_array *tr,
|
|
struct tracer_flags *tracer_flags,
|
|
struct tracer_opt *opts, int neg)
|
|
{
|
|
struct tracer *trace = tr->current_trace;
|
|
int ret;
|
|
|
|
ret = trace->set_flag(tr, tracer_flags->val, opts->bit, !neg);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (neg)
|
|
tracer_flags->val &= ~opts->bit;
|
|
else
|
|
tracer_flags->val |= opts->bit;
|
|
return 0;
|
|
}
|
|
|
|
/* Try to assign a tracer specific option */
|
|
static int set_tracer_option(struct trace_array *tr, char *cmp, int neg)
|
|
{
|
|
struct tracer *trace = tr->current_trace;
|
|
struct tracer_flags *tracer_flags = trace->flags;
|
|
struct tracer_opt *opts = NULL;
|
|
int i;
|
|
|
|
for (i = 0; tracer_flags->opts[i].name; i++) {
|
|
opts = &tracer_flags->opts[i];
|
|
|
|
if (strcmp(cmp, opts->name) == 0)
|
|
return __set_tracer_option(tr, trace->flags, opts, neg);
|
|
}
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Some tracers require overwrite to stay enabled */
|
|
int trace_keep_overwrite(struct tracer *tracer, u32 mask, int set)
|
|
{
|
|
if (tracer->enabled && (mask & TRACE_ITER_OVERWRITE) && !set)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int set_tracer_flag(struct trace_array *tr, unsigned int mask, int enabled)
|
|
{
|
|
/* do nothing if flag is already set */
|
|
if (!!(trace_flags & mask) == !!enabled)
|
|
return 0;
|
|
|
|
/* Give the tracer a chance to approve the change */
|
|
if (tr->current_trace->flag_changed)
|
|
if (tr->current_trace->flag_changed(tr, mask, !!enabled))
|
|
return -EINVAL;
|
|
|
|
if (enabled)
|
|
trace_flags |= mask;
|
|
else
|
|
trace_flags &= ~mask;
|
|
|
|
if (mask == TRACE_ITER_RECORD_CMD)
|
|
trace_event_enable_cmd_record(enabled);
|
|
|
|
if (mask == TRACE_ITER_OVERWRITE) {
|
|
ring_buffer_change_overwrite(tr->trace_buffer.buffer, enabled);
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
ring_buffer_change_overwrite(tr->max_buffer.buffer, enabled);
|
|
#endif
|
|
}
|
|
|
|
if (mask == TRACE_ITER_PRINTK)
|
|
trace_printk_start_stop_comm(enabled);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int trace_set_options(struct trace_array *tr, char *option)
|
|
{
|
|
char *cmp;
|
|
int neg = 0;
|
|
int ret = -ENODEV;
|
|
int i;
|
|
|
|
cmp = strstrip(option);
|
|
|
|
if (strncmp(cmp, "no", 2) == 0) {
|
|
neg = 1;
|
|
cmp += 2;
|
|
}
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
for (i = 0; trace_options[i]; i++) {
|
|
if (strcmp(cmp, trace_options[i]) == 0) {
|
|
ret = set_tracer_flag(tr, 1 << i, !neg);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* If no option could be set, test the specific tracer options */
|
|
if (!trace_options[i])
|
|
ret = set_tracer_option(tr, cmp, neg);
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_trace_options_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct seq_file *m = filp->private_data;
|
|
struct trace_array *tr = m->private;
|
|
char buf[64];
|
|
int ret;
|
|
|
|
if (cnt >= sizeof(buf))
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
ret = trace_set_options(tr, buf);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static int tracing_trace_options_open(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
int ret;
|
|
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
if (trace_array_get(tr) < 0)
|
|
return -ENODEV;
|
|
|
|
ret = single_open(file, tracing_trace_options_show, inode->i_private);
|
|
if (ret < 0)
|
|
trace_array_put(tr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static const struct file_operations tracing_iter_fops = {
|
|
.open = tracing_trace_options_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = tracing_single_release_tr,
|
|
.write = tracing_trace_options_write,
|
|
};
|
|
|
|
static const char readme_msg[] =
|
|
"tracing mini-HOWTO:\n\n"
|
|
"# echo 0 > tracing_on : quick way to disable tracing\n"
|
|
"# echo 1 > tracing_on : quick way to re-enable tracing\n\n"
|
|
" Important files:\n"
|
|
" trace\t\t\t- The static contents of the buffer\n"
|
|
"\t\t\t To clear the buffer write into this file: echo > trace\n"
|
|
" trace_pipe\t\t- A consuming read to see the contents of the buffer\n"
|
|
" current_tracer\t- function and latency tracers\n"
|
|
" available_tracers\t- list of configured tracers for current_tracer\n"
|
|
" buffer_size_kb\t- view and modify size of per cpu buffer\n"
|
|
" buffer_total_size_kb - view total size of all cpu buffers\n\n"
|
|
" trace_clock\t\t-change the clock used to order events\n"
|
|
" local: Per cpu clock but may not be synced across CPUs\n"
|
|
" global: Synced across CPUs but slows tracing down.\n"
|
|
" counter: Not a clock, but just an increment\n"
|
|
" uptime: Jiffy counter from time of boot\n"
|
|
" perf: Same clock that perf events use\n"
|
|
#ifdef CONFIG_X86_64
|
|
" x86-tsc: TSC cycle counter\n"
|
|
#endif
|
|
"\n trace_marker\t\t- Writes into this file writes into the kernel buffer\n"
|
|
" tracing_cpumask\t- Limit which CPUs to trace\n"
|
|
" instances\t\t- Make sub-buffers with: mkdir instances/foo\n"
|
|
"\t\t\t Remove sub-buffer with rmdir\n"
|
|
" trace_options\t\t- Set format or modify how tracing happens\n"
|
|
"\t\t\t Disable an option by adding a suffix 'no' to the\n"
|
|
"\t\t\t option name\n"
|
|
" saved_cmdlines_size\t- echo command number in here to store comm-pid list\n"
|
|
#ifdef CONFIG_DYNAMIC_FTRACE
|
|
"\n available_filter_functions - list of functions that can be filtered on\n"
|
|
" set_ftrace_filter\t- echo function name in here to only trace these\n"
|
|
"\t\t\t functions\n"
|
|
"\t accepts: func_full_name, *func_end, func_begin*, *func_middle*\n"
|
|
"\t modules: Can select a group via module\n"
|
|
"\t Format: :mod:<module-name>\n"
|
|
"\t example: echo :mod:ext3 > set_ftrace_filter\n"
|
|
"\t triggers: a command to perform when function is hit\n"
|
|
"\t Format: <function>:<trigger>[:count]\n"
|
|
"\t trigger: traceon, traceoff\n"
|
|
"\t\t enable_event:<system>:<event>\n"
|
|
"\t\t disable_event:<system>:<event>\n"
|
|
#ifdef CONFIG_STACKTRACE
|
|
"\t\t stacktrace\n"
|
|
#endif
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
"\t\t snapshot\n"
|
|
#endif
|
|
"\t\t dump\n"
|
|
"\t\t cpudump\n"
|
|
"\t example: echo do_fault:traceoff > set_ftrace_filter\n"
|
|
"\t echo do_trap:traceoff:3 > set_ftrace_filter\n"
|
|
"\t The first one will disable tracing every time do_fault is hit\n"
|
|
"\t The second will disable tracing at most 3 times when do_trap is hit\n"
|
|
"\t The first time do trap is hit and it disables tracing, the\n"
|
|
"\t counter will decrement to 2. If tracing is already disabled,\n"
|
|
"\t the counter will not decrement. It only decrements when the\n"
|
|
"\t trigger did work\n"
|
|
"\t To remove trigger without count:\n"
|
|
"\t echo '!<function>:<trigger> > set_ftrace_filter\n"
|
|
"\t To remove trigger with a count:\n"
|
|
"\t echo '!<function>:<trigger>:0 > set_ftrace_filter\n"
|
|
" set_ftrace_notrace\t- echo function name in here to never trace.\n"
|
|
"\t accepts: func_full_name, *func_end, func_begin*, *func_middle*\n"
|
|
"\t modules: Can select a group via module command :mod:\n"
|
|
"\t Does not accept triggers\n"
|
|
#endif /* CONFIG_DYNAMIC_FTRACE */
|
|
#ifdef CONFIG_FUNCTION_TRACER
|
|
" set_ftrace_pid\t- Write pid(s) to only function trace those pids\n"
|
|
"\t\t (function)\n"
|
|
#endif
|
|
#ifdef CONFIG_FUNCTION_GRAPH_TRACER
|
|
" set_graph_function\t- Trace the nested calls of a function (function_graph)\n"
|
|
" set_graph_notrace\t- Do not trace the nested calls of a function (function_graph)\n"
|
|
" max_graph_depth\t- Trace a limited depth of nested calls (0 is unlimited)\n"
|
|
#endif
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
"\n snapshot\t\t- Like 'trace' but shows the content of the static\n"
|
|
"\t\t\t snapshot buffer. Read the contents for more\n"
|
|
"\t\t\t information\n"
|
|
#endif
|
|
#ifdef CONFIG_STACK_TRACER
|
|
" stack_trace\t\t- Shows the max stack trace when active\n"
|
|
" stack_max_size\t- Shows current max stack size that was traced\n"
|
|
"\t\t\t Write into this file to reset the max size (trigger a\n"
|
|
"\t\t\t new trace)\n"
|
|
#ifdef CONFIG_DYNAMIC_FTRACE
|
|
" stack_trace_filter\t- Like set_ftrace_filter but limits what stack_trace\n"
|
|
"\t\t\t traces\n"
|
|
#endif
|
|
#endif /* CONFIG_STACK_TRACER */
|
|
" events/\t\t- Directory containing all trace event subsystems:\n"
|
|
" enable\t\t- Write 0/1 to enable/disable tracing of all events\n"
|
|
" events/<system>/\t- Directory containing all trace events for <system>:\n"
|
|
" enable\t\t- Write 0/1 to enable/disable tracing of all <system>\n"
|
|
"\t\t\t events\n"
|
|
" filter\t\t- If set, only events passing filter are traced\n"
|
|
" events/<system>/<event>/\t- Directory containing control files for\n"
|
|
"\t\t\t <event>:\n"
|
|
" enable\t\t- Write 0/1 to enable/disable tracing of <event>\n"
|
|
" filter\t\t- If set, only events passing filter are traced\n"
|
|
" trigger\t\t- If set, a command to perform when event is hit\n"
|
|
"\t Format: <trigger>[:count][if <filter>]\n"
|
|
"\t trigger: traceon, traceoff\n"
|
|
"\t enable_event:<system>:<event>\n"
|
|
"\t disable_event:<system>:<event>\n"
|
|
#ifdef CONFIG_STACKTRACE
|
|
"\t\t stacktrace\n"
|
|
#endif
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
"\t\t snapshot\n"
|
|
#endif
|
|
"\t example: echo traceoff > events/block/block_unplug/trigger\n"
|
|
"\t echo traceoff:3 > events/block/block_unplug/trigger\n"
|
|
"\t echo 'enable_event:kmem:kmalloc:3 if nr_rq > 1' > \\\n"
|
|
"\t events/block/block_unplug/trigger\n"
|
|
"\t The first disables tracing every time block_unplug is hit.\n"
|
|
"\t The second disables tracing the first 3 times block_unplug is hit.\n"
|
|
"\t The third enables the kmalloc event the first 3 times block_unplug\n"
|
|
"\t is hit and has value of greater than 1 for the 'nr_rq' event field.\n"
|
|
"\t Like function triggers, the counter is only decremented if it\n"
|
|
"\t enabled or disabled tracing.\n"
|
|
"\t To remove a trigger without a count:\n"
|
|
"\t echo '!<trigger> > <system>/<event>/trigger\n"
|
|
"\t To remove a trigger with a count:\n"
|
|
"\t echo '!<trigger>:0 > <system>/<event>/trigger\n"
|
|
"\t Filters can be ignored when removing a trigger.\n"
|
|
;
|
|
|
|
static ssize_t
|
|
tracing_readme_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
return simple_read_from_buffer(ubuf, cnt, ppos,
|
|
readme_msg, strlen(readme_msg));
|
|
}
|
|
|
|
static const struct file_operations tracing_readme_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = tracing_readme_read,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
static void *saved_cmdlines_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
unsigned int *ptr = v;
|
|
|
|
if (*pos || m->count)
|
|
ptr++;
|
|
|
|
(*pos)++;
|
|
|
|
for (; ptr < &savedcmd->map_cmdline_to_pid[savedcmd->cmdline_num];
|
|
ptr++) {
|
|
if (*ptr == -1 || *ptr == NO_CMDLINE_MAP)
|
|
continue;
|
|
|
|
return ptr;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void *saved_cmdlines_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
void *v;
|
|
loff_t l = 0;
|
|
|
|
preempt_disable();
|
|
arch_spin_lock(&trace_cmdline_lock);
|
|
|
|
v = &savedcmd->map_cmdline_to_pid[0];
|
|
while (l <= *pos) {
|
|
v = saved_cmdlines_next(m, v, &l);
|
|
if (!v)
|
|
return NULL;
|
|
}
|
|
|
|
return v;
|
|
}
|
|
|
|
static void saved_cmdlines_stop(struct seq_file *m, void *v)
|
|
{
|
|
arch_spin_unlock(&trace_cmdline_lock);
|
|
preempt_enable();
|
|
}
|
|
|
|
static int saved_cmdlines_show(struct seq_file *m, void *v)
|
|
{
|
|
char buf[TASK_COMM_LEN];
|
|
unsigned int *pid = v;
|
|
|
|
__trace_find_cmdline(*pid, buf);
|
|
seq_printf(m, "%d %s\n", *pid, buf);
|
|
return 0;
|
|
}
|
|
|
|
static const struct seq_operations tracing_saved_cmdlines_seq_ops = {
|
|
.start = saved_cmdlines_start,
|
|
.next = saved_cmdlines_next,
|
|
.stop = saved_cmdlines_stop,
|
|
.show = saved_cmdlines_show,
|
|
};
|
|
|
|
static int tracing_saved_cmdlines_open(struct inode *inode, struct file *filp)
|
|
{
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
return seq_open(filp, &tracing_saved_cmdlines_seq_ops);
|
|
}
|
|
|
|
static const struct file_operations tracing_saved_cmdlines_fops = {
|
|
.open = tracing_saved_cmdlines_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release,
|
|
};
|
|
|
|
static ssize_t
|
|
tracing_saved_cmdlines_size_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
char buf[64];
|
|
int r;
|
|
|
|
arch_spin_lock(&trace_cmdline_lock);
|
|
r = scnprintf(buf, sizeof(buf), "%u\n", savedcmd->cmdline_num);
|
|
arch_spin_unlock(&trace_cmdline_lock);
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
}
|
|
|
|
static void free_saved_cmdlines_buffer(struct saved_cmdlines_buffer *s)
|
|
{
|
|
kfree(s->saved_cmdlines);
|
|
kfree(s->map_cmdline_to_pid);
|
|
kfree(s);
|
|
}
|
|
|
|
static int tracing_resize_saved_cmdlines(unsigned int val)
|
|
{
|
|
struct saved_cmdlines_buffer *s, *savedcmd_temp;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
if (allocate_cmdlines_buffer(val, s) < 0) {
|
|
kfree(s);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
arch_spin_lock(&trace_cmdline_lock);
|
|
savedcmd_temp = savedcmd;
|
|
savedcmd = s;
|
|
arch_spin_unlock(&trace_cmdline_lock);
|
|
free_saved_cmdlines_buffer(savedcmd_temp);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_saved_cmdlines_size_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
/* must have at least 1 entry or less than PID_MAX_DEFAULT */
|
|
if (!val || val > PID_MAX_DEFAULT)
|
|
return -EINVAL;
|
|
|
|
ret = tracing_resize_saved_cmdlines((unsigned int)val);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static const struct file_operations tracing_saved_cmdlines_size_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = tracing_saved_cmdlines_size_read,
|
|
.write = tracing_saved_cmdlines_size_write,
|
|
};
|
|
|
|
static ssize_t
|
|
tracing_set_trace_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = filp->private_data;
|
|
char buf[MAX_TRACER_SIZE+2];
|
|
int r;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
r = sprintf(buf, "%s\n", tr->current_trace->name);
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
}
|
|
|
|
int tracer_init(struct tracer *t, struct trace_array *tr)
|
|
{
|
|
tracing_reset_online_cpus(&tr->trace_buffer);
|
|
return t->init(tr);
|
|
}
|
|
|
|
static void set_buffer_entries(struct trace_buffer *buf, unsigned long val)
|
|
{
|
|
int cpu;
|
|
|
|
for_each_tracing_cpu(cpu)
|
|
per_cpu_ptr(buf->data, cpu)->entries = val;
|
|
}
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
/* resize @tr's buffer to the size of @size_tr's entries */
|
|
static int resize_buffer_duplicate_size(struct trace_buffer *trace_buf,
|
|
struct trace_buffer *size_buf, int cpu_id)
|
|
{
|
|
int cpu, ret = 0;
|
|
|
|
if (cpu_id == RING_BUFFER_ALL_CPUS) {
|
|
for_each_tracing_cpu(cpu) {
|
|
ret = ring_buffer_resize(trace_buf->buffer,
|
|
per_cpu_ptr(size_buf->data, cpu)->entries, cpu);
|
|
if (ret < 0)
|
|
break;
|
|
per_cpu_ptr(trace_buf->data, cpu)->entries =
|
|
per_cpu_ptr(size_buf->data, cpu)->entries;
|
|
}
|
|
} else {
|
|
ret = ring_buffer_resize(trace_buf->buffer,
|
|
per_cpu_ptr(size_buf->data, cpu_id)->entries, cpu_id);
|
|
if (ret == 0)
|
|
per_cpu_ptr(trace_buf->data, cpu_id)->entries =
|
|
per_cpu_ptr(size_buf->data, cpu_id)->entries;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* CONFIG_TRACER_MAX_TRACE */
|
|
|
|
static int __tracing_resize_ring_buffer(struct trace_array *tr,
|
|
unsigned long size, int cpu)
|
|
{
|
|
int ret;
|
|
|
|
/*
|
|
* If kernel or user changes the size of the ring buffer
|
|
* we use the size that was given, and we can forget about
|
|
* expanding it later.
|
|
*/
|
|
ring_buffer_expanded = true;
|
|
|
|
/* May be called before buffers are initialized */
|
|
if (!tr->trace_buffer.buffer)
|
|
return 0;
|
|
|
|
ret = ring_buffer_resize(tr->trace_buffer.buffer, size, cpu);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (!(tr->flags & TRACE_ARRAY_FL_GLOBAL) ||
|
|
!tr->current_trace->use_max_tr)
|
|
goto out;
|
|
|
|
ret = ring_buffer_resize(tr->max_buffer.buffer, size, cpu);
|
|
if (ret < 0) {
|
|
int r = resize_buffer_duplicate_size(&tr->trace_buffer,
|
|
&tr->trace_buffer, cpu);
|
|
if (r < 0) {
|
|
/*
|
|
* AARGH! We are left with different
|
|
* size max buffer!!!!
|
|
* The max buffer is our "snapshot" buffer.
|
|
* When a tracer needs a snapshot (one of the
|
|
* latency tracers), it swaps the max buffer
|
|
* with the saved snap shot. We succeeded to
|
|
* update the size of the main buffer, but failed to
|
|
* update the size of the max buffer. But when we tried
|
|
* to reset the main buffer to the original size, we
|
|
* failed there too. This is very unlikely to
|
|
* happen, but if it does, warn and kill all
|
|
* tracing.
|
|
*/
|
|
WARN_ON(1);
|
|
tracing_disabled = 1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
if (cpu == RING_BUFFER_ALL_CPUS)
|
|
set_buffer_entries(&tr->max_buffer, size);
|
|
else
|
|
per_cpu_ptr(tr->max_buffer.data, cpu)->entries = size;
|
|
|
|
out:
|
|
#endif /* CONFIG_TRACER_MAX_TRACE */
|
|
|
|
if (cpu == RING_BUFFER_ALL_CPUS)
|
|
set_buffer_entries(&tr->trace_buffer, size);
|
|
else
|
|
per_cpu_ptr(tr->trace_buffer.data, cpu)->entries = size;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t tracing_resize_ring_buffer(struct trace_array *tr,
|
|
unsigned long size, int cpu_id)
|
|
{
|
|
int ret = size;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
if (cpu_id != RING_BUFFER_ALL_CPUS) {
|
|
/* make sure, this cpu is enabled in the mask */
|
|
if (!cpumask_test_cpu(cpu_id, tracing_buffer_mask)) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
ret = __tracing_resize_ring_buffer(tr, size, cpu_id);
|
|
if (ret < 0)
|
|
ret = -ENOMEM;
|
|
|
|
out:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* tracing_update_buffers - used by tracing facility to expand ring buffers
|
|
*
|
|
* To save on memory when the tracing is never used on a system with it
|
|
* configured in. The ring buffers are set to a minimum size. But once
|
|
* a user starts to use the tracing facility, then they need to grow
|
|
* to their default size.
|
|
*
|
|
* This function is to be called when a tracer is about to be used.
|
|
*/
|
|
int tracing_update_buffers(void)
|
|
{
|
|
int ret = 0;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
if (!ring_buffer_expanded)
|
|
ret = __tracing_resize_ring_buffer(&global_trace, trace_buf_size,
|
|
RING_BUFFER_ALL_CPUS);
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
struct trace_option_dentry;
|
|
|
|
static struct trace_option_dentry *
|
|
create_trace_option_files(struct trace_array *tr, struct tracer *tracer);
|
|
|
|
static void
|
|
destroy_trace_option_files(struct trace_option_dentry *topts);
|
|
|
|
/*
|
|
* Used to clear out the tracer before deletion of an instance.
|
|
* Must have trace_types_lock held.
|
|
*/
|
|
static void tracing_set_nop(struct trace_array *tr)
|
|
{
|
|
if (tr->current_trace == &nop_trace)
|
|
return;
|
|
|
|
tr->current_trace->enabled--;
|
|
|
|
if (tr->current_trace->reset)
|
|
tr->current_trace->reset(tr);
|
|
|
|
tr->current_trace = &nop_trace;
|
|
}
|
|
|
|
static int tracing_set_tracer(struct trace_array *tr, const char *buf)
|
|
{
|
|
static struct trace_option_dentry *topts;
|
|
struct tracer *t;
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
bool had_max_tr;
|
|
#endif
|
|
int ret = 0;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
if (!ring_buffer_expanded) {
|
|
ret = __tracing_resize_ring_buffer(tr, trace_buf_size,
|
|
RING_BUFFER_ALL_CPUS);
|
|
if (ret < 0)
|
|
goto out;
|
|
ret = 0;
|
|
}
|
|
|
|
for (t = trace_types; t; t = t->next) {
|
|
if (strcmp(t->name, buf) == 0)
|
|
break;
|
|
}
|
|
if (!t) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
if (t == tr->current_trace)
|
|
goto out;
|
|
|
|
/* Some tracers are only allowed for the top level buffer */
|
|
if (!trace_ok_for_array(t, tr)) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
trace_branch_disable();
|
|
|
|
tr->current_trace->enabled--;
|
|
|
|
if (tr->current_trace->reset)
|
|
tr->current_trace->reset(tr);
|
|
|
|
/* Current trace needs to be nop_trace before synchronize_sched */
|
|
tr->current_trace = &nop_trace;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
had_max_tr = tr->allocated_snapshot;
|
|
|
|
if (had_max_tr && !t->use_max_tr) {
|
|
/*
|
|
* We need to make sure that the update_max_tr sees that
|
|
* current_trace changed to nop_trace to keep it from
|
|
* swapping the buffers after we resize it.
|
|
* The update_max_tr is called from interrupts disabled
|
|
* so a synchronized_sched() is sufficient.
|
|
*/
|
|
synchronize_sched();
|
|
free_snapshot(tr);
|
|
}
|
|
#endif
|
|
/* Currently, only the top instance has options */
|
|
if (tr->flags & TRACE_ARRAY_FL_GLOBAL) {
|
|
destroy_trace_option_files(topts);
|
|
topts = create_trace_option_files(tr, t);
|
|
}
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (t->use_max_tr && !had_max_tr) {
|
|
ret = alloc_snapshot(tr);
|
|
if (ret < 0)
|
|
goto out;
|
|
}
|
|
#endif
|
|
|
|
if (t->init) {
|
|
ret = tracer_init(t, tr);
|
|
if (ret)
|
|
goto out;
|
|
}
|
|
|
|
tr->current_trace = t;
|
|
tr->current_trace->enabled++;
|
|
trace_branch_enable(tr);
|
|
out:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_set_trace_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = filp->private_data;
|
|
char buf[MAX_TRACER_SIZE+1];
|
|
int i;
|
|
size_t ret;
|
|
int err;
|
|
|
|
ret = cnt;
|
|
|
|
if (cnt > MAX_TRACER_SIZE)
|
|
cnt = MAX_TRACER_SIZE;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
/* strip ending whitespace. */
|
|
for (i = cnt - 1; i > 0 && isspace(buf[i]); i--)
|
|
buf[i] = 0;
|
|
|
|
err = tracing_set_tracer(tr, buf);
|
|
if (err)
|
|
return err;
|
|
|
|
*ppos += ret;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_nsecs_read(unsigned long *ptr, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
char buf[64];
|
|
int r;
|
|
|
|
r = snprintf(buf, sizeof(buf), "%ld\n",
|
|
*ptr == (unsigned long)-1 ? -1 : nsecs_to_usecs(*ptr));
|
|
if (r > sizeof(buf))
|
|
r = sizeof(buf);
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_nsecs_write(unsigned long *ptr, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
*ptr = val * 1000;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_thresh_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
return tracing_nsecs_read(&tracing_thresh, ubuf, cnt, ppos);
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_thresh_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = filp->private_data;
|
|
int ret;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
ret = tracing_nsecs_write(&tracing_thresh, ubuf, cnt, ppos);
|
|
if (ret < 0)
|
|
goto out;
|
|
|
|
if (tr->current_trace->update_thresh) {
|
|
ret = tr->current_trace->update_thresh(tr);
|
|
if (ret < 0)
|
|
goto out;
|
|
}
|
|
|
|
ret = cnt;
|
|
out:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_max_lat_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
return tracing_nsecs_read(filp->private_data, ubuf, cnt, ppos);
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_max_lat_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
return tracing_nsecs_write(filp->private_data, ubuf, cnt, ppos);
|
|
}
|
|
|
|
static int tracing_open_pipe(struct inode *inode, struct file *filp)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct trace_iterator *iter;
|
|
int ret = 0;
|
|
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
if (trace_array_get(tr) < 0)
|
|
return -ENODEV;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
/* create a buffer to store the information to pass to userspace */
|
|
iter = kzalloc(sizeof(*iter), GFP_KERNEL);
|
|
if (!iter) {
|
|
ret = -ENOMEM;
|
|
__trace_array_put(tr);
|
|
goto out;
|
|
}
|
|
|
|
/*
|
|
* We make a copy of the current tracer to avoid concurrent
|
|
* changes on it while we are reading.
|
|
*/
|
|
iter->trace = kmalloc(sizeof(*iter->trace), GFP_KERNEL);
|
|
if (!iter->trace) {
|
|
ret = -ENOMEM;
|
|
goto fail;
|
|
}
|
|
*iter->trace = *tr->current_trace;
|
|
|
|
if (!alloc_cpumask_var(&iter->started, GFP_KERNEL)) {
|
|
ret = -ENOMEM;
|
|
goto fail;
|
|
}
|
|
|
|
/* trace pipe does not show start of buffer */
|
|
cpumask_setall(iter->started);
|
|
|
|
if (trace_flags & TRACE_ITER_LATENCY_FMT)
|
|
iter->iter_flags |= TRACE_FILE_LAT_FMT;
|
|
|
|
/* Output in nanoseconds only if we are using a clock in nanoseconds. */
|
|
if (trace_clocks[tr->clock_id].in_ns)
|
|
iter->iter_flags |= TRACE_FILE_TIME_IN_NS;
|
|
|
|
iter->tr = tr;
|
|
iter->trace_buffer = &tr->trace_buffer;
|
|
iter->cpu_file = tracing_get_cpu(inode);
|
|
mutex_init(&iter->mutex);
|
|
filp->private_data = iter;
|
|
|
|
if (iter->trace->pipe_open)
|
|
iter->trace->pipe_open(iter);
|
|
|
|
nonseekable_open(inode, filp);
|
|
out:
|
|
mutex_unlock(&trace_types_lock);
|
|
return ret;
|
|
|
|
fail:
|
|
kfree(iter->trace);
|
|
kfree(iter);
|
|
__trace_array_put(tr);
|
|
mutex_unlock(&trace_types_lock);
|
|
return ret;
|
|
}
|
|
|
|
static int tracing_release_pipe(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_iterator *iter = file->private_data;
|
|
struct trace_array *tr = inode->i_private;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
if (iter->trace->pipe_close)
|
|
iter->trace->pipe_close(iter);
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
free_cpumask_var(iter->started);
|
|
mutex_destroy(&iter->mutex);
|
|
kfree(iter->trace);
|
|
kfree(iter);
|
|
|
|
trace_array_put(tr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static unsigned int
|
|
trace_poll(struct trace_iterator *iter, struct file *filp, poll_table *poll_table)
|
|
{
|
|
/* Iterators are static, they should be filled or empty */
|
|
if (trace_buffer_iter(iter, iter->cpu_file))
|
|
return POLLIN | POLLRDNORM;
|
|
|
|
if (trace_flags & TRACE_ITER_BLOCK)
|
|
/*
|
|
* Always select as readable when in blocking mode
|
|
*/
|
|
return POLLIN | POLLRDNORM;
|
|
else
|
|
return ring_buffer_poll_wait(iter->trace_buffer->buffer, iter->cpu_file,
|
|
filp, poll_table);
|
|
}
|
|
|
|
static unsigned int
|
|
tracing_poll_pipe(struct file *filp, poll_table *poll_table)
|
|
{
|
|
struct trace_iterator *iter = filp->private_data;
|
|
|
|
return trace_poll(iter, filp, poll_table);
|
|
}
|
|
|
|
/* Must be called with trace_types_lock mutex held. */
|
|
static int tracing_wait_pipe(struct file *filp)
|
|
{
|
|
struct trace_iterator *iter = filp->private_data;
|
|
int ret;
|
|
|
|
while (trace_empty(iter)) {
|
|
|
|
if ((filp->f_flags & O_NONBLOCK)) {
|
|
return -EAGAIN;
|
|
}
|
|
|
|
/*
|
|
* We block until we read something and tracing is disabled.
|
|
* We still block if tracing is disabled, but we have never
|
|
* read anything. This allows a user to cat this file, and
|
|
* then enable tracing. But after we have read something,
|
|
* we give an EOF when tracing is again disabled.
|
|
*
|
|
* iter->pos will be 0 if we haven't read anything.
|
|
*/
|
|
if (!tracing_is_on() && iter->pos)
|
|
break;
|
|
|
|
mutex_unlock(&iter->mutex);
|
|
|
|
ret = wait_on_pipe(iter);
|
|
|
|
mutex_lock(&iter->mutex);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (signal_pending(current))
|
|
return -EINTR;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Consumer reader.
|
|
*/
|
|
static ssize_t
|
|
tracing_read_pipe(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_iterator *iter = filp->private_data;
|
|
struct trace_array *tr = iter->tr;
|
|
ssize_t sret;
|
|
|
|
/* return any leftover data */
|
|
sret = trace_seq_to_user(&iter->seq, ubuf, cnt);
|
|
if (sret != -EBUSY)
|
|
return sret;
|
|
|
|
trace_seq_init(&iter->seq);
|
|
|
|
/* copy the tracer to avoid using a global lock all around */
|
|
mutex_lock(&trace_types_lock);
|
|
if (unlikely(iter->trace->name != tr->current_trace->name))
|
|
*iter->trace = *tr->current_trace;
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
/*
|
|
* Avoid more than one consumer on a single file descriptor
|
|
* This is just a matter of traces coherency, the ring buffer itself
|
|
* is protected.
|
|
*/
|
|
mutex_lock(&iter->mutex);
|
|
if (iter->trace->read) {
|
|
sret = iter->trace->read(iter, filp, ubuf, cnt, ppos);
|
|
if (sret)
|
|
goto out;
|
|
}
|
|
|
|
waitagain:
|
|
sret = tracing_wait_pipe(filp);
|
|
if (sret <= 0)
|
|
goto out;
|
|
|
|
/* stop when tracing is finished */
|
|
if (trace_empty(iter)) {
|
|
sret = 0;
|
|
goto out;
|
|
}
|
|
|
|
if (cnt >= PAGE_SIZE)
|
|
cnt = PAGE_SIZE - 1;
|
|
|
|
/* reset all but tr, trace, and overruns */
|
|
memset(&iter->seq, 0,
|
|
sizeof(struct trace_iterator) -
|
|
offsetof(struct trace_iterator, seq));
|
|
cpumask_clear(iter->started);
|
|
iter->pos = -1;
|
|
|
|
trace_event_read_lock();
|
|
trace_access_lock(iter->cpu_file);
|
|
while (trace_find_next_entry_inc(iter) != NULL) {
|
|
enum print_line_t ret;
|
|
int len = iter->seq.len;
|
|
|
|
ret = print_trace_line(iter);
|
|
if (ret == TRACE_TYPE_PARTIAL_LINE) {
|
|
/* don't print partial lines */
|
|
iter->seq.len = len;
|
|
break;
|
|
}
|
|
if (ret != TRACE_TYPE_NO_CONSUME)
|
|
trace_consume(iter);
|
|
|
|
if (iter->seq.len >= cnt)
|
|
break;
|
|
|
|
/*
|
|
* Setting the full flag means we reached the trace_seq buffer
|
|
* size and we should leave by partial output condition above.
|
|
* One of the trace_seq_* functions is not used properly.
|
|
*/
|
|
WARN_ONCE(iter->seq.full, "full flag set for trace type %d",
|
|
iter->ent->type);
|
|
}
|
|
trace_access_unlock(iter->cpu_file);
|
|
trace_event_read_unlock();
|
|
|
|
/* Now copy what we have to the user */
|
|
sret = trace_seq_to_user(&iter->seq, ubuf, cnt);
|
|
if (iter->seq.readpos >= iter->seq.len)
|
|
trace_seq_init(&iter->seq);
|
|
|
|
/*
|
|
* If there was nothing to send to user, in spite of consuming trace
|
|
* entries, go back to wait for more entries.
|
|
*/
|
|
if (sret == -EBUSY)
|
|
goto waitagain;
|
|
|
|
out:
|
|
mutex_unlock(&iter->mutex);
|
|
|
|
return sret;
|
|
}
|
|
|
|
static void tracing_spd_release_pipe(struct splice_pipe_desc *spd,
|
|
unsigned int idx)
|
|
{
|
|
__free_page(spd->pages[idx]);
|
|
}
|
|
|
|
static const struct pipe_buf_operations tracing_pipe_buf_ops = {
|
|
.can_merge = 0,
|
|
.confirm = generic_pipe_buf_confirm,
|
|
.release = generic_pipe_buf_release,
|
|
.steal = generic_pipe_buf_steal,
|
|
.get = generic_pipe_buf_get,
|
|
};
|
|
|
|
static size_t
|
|
tracing_fill_pipe_page(size_t rem, struct trace_iterator *iter)
|
|
{
|
|
size_t count;
|
|
int ret;
|
|
|
|
/* Seq buffer is page-sized, exactly what we need. */
|
|
for (;;) {
|
|
count = iter->seq.len;
|
|
ret = print_trace_line(iter);
|
|
count = iter->seq.len - count;
|
|
if (rem < count) {
|
|
rem = 0;
|
|
iter->seq.len -= count;
|
|
break;
|
|
}
|
|
if (ret == TRACE_TYPE_PARTIAL_LINE) {
|
|
iter->seq.len -= count;
|
|
break;
|
|
}
|
|
|
|
if (ret != TRACE_TYPE_NO_CONSUME)
|
|
trace_consume(iter);
|
|
rem -= count;
|
|
if (!trace_find_next_entry_inc(iter)) {
|
|
rem = 0;
|
|
iter->ent = NULL;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return rem;
|
|
}
|
|
|
|
static ssize_t tracing_splice_read_pipe(struct file *filp,
|
|
loff_t *ppos,
|
|
struct pipe_inode_info *pipe,
|
|
size_t len,
|
|
unsigned int flags)
|
|
{
|
|
struct page *pages_def[PIPE_DEF_BUFFERS];
|
|
struct partial_page partial_def[PIPE_DEF_BUFFERS];
|
|
struct trace_iterator *iter = filp->private_data;
|
|
struct splice_pipe_desc spd = {
|
|
.pages = pages_def,
|
|
.partial = partial_def,
|
|
.nr_pages = 0, /* This gets updated below. */
|
|
.nr_pages_max = PIPE_DEF_BUFFERS,
|
|
.flags = flags,
|
|
.ops = &tracing_pipe_buf_ops,
|
|
.spd_release = tracing_spd_release_pipe,
|
|
};
|
|
struct trace_array *tr = iter->tr;
|
|
ssize_t ret;
|
|
size_t rem;
|
|
unsigned int i;
|
|
|
|
if (splice_grow_spd(pipe, &spd))
|
|
return -ENOMEM;
|
|
|
|
/* copy the tracer to avoid using a global lock all around */
|
|
mutex_lock(&trace_types_lock);
|
|
if (unlikely(iter->trace->name != tr->current_trace->name))
|
|
*iter->trace = *tr->current_trace;
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
mutex_lock(&iter->mutex);
|
|
|
|
if (iter->trace->splice_read) {
|
|
ret = iter->trace->splice_read(iter, filp,
|
|
ppos, pipe, len, flags);
|
|
if (ret)
|
|
goto out_err;
|
|
}
|
|
|
|
ret = tracing_wait_pipe(filp);
|
|
if (ret <= 0)
|
|
goto out_err;
|
|
|
|
if (!iter->ent && !trace_find_next_entry_inc(iter)) {
|
|
ret = -EFAULT;
|
|
goto out_err;
|
|
}
|
|
|
|
trace_event_read_lock();
|
|
trace_access_lock(iter->cpu_file);
|
|
|
|
/* Fill as many pages as possible. */
|
|
for (i = 0, rem = len; i < spd.nr_pages_max && rem; i++) {
|
|
spd.pages[i] = alloc_page(GFP_KERNEL);
|
|
if (!spd.pages[i])
|
|
break;
|
|
|
|
rem = tracing_fill_pipe_page(rem, iter);
|
|
|
|
/* Copy the data into the page, so we can start over. */
|
|
ret = trace_seq_to_buffer(&iter->seq,
|
|
page_address(spd.pages[i]),
|
|
iter->seq.len);
|
|
if (ret < 0) {
|
|
__free_page(spd.pages[i]);
|
|
break;
|
|
}
|
|
spd.partial[i].offset = 0;
|
|
spd.partial[i].len = iter->seq.len;
|
|
|
|
trace_seq_init(&iter->seq);
|
|
}
|
|
|
|
trace_access_unlock(iter->cpu_file);
|
|
trace_event_read_unlock();
|
|
mutex_unlock(&iter->mutex);
|
|
|
|
spd.nr_pages = i;
|
|
|
|
ret = splice_to_pipe(pipe, &spd);
|
|
out:
|
|
splice_shrink_spd(&spd);
|
|
return ret;
|
|
|
|
out_err:
|
|
mutex_unlock(&iter->mutex);
|
|
goto out;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_entries_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct inode *inode = file_inode(filp);
|
|
struct trace_array *tr = inode->i_private;
|
|
int cpu = tracing_get_cpu(inode);
|
|
char buf[64];
|
|
int r = 0;
|
|
ssize_t ret;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
if (cpu == RING_BUFFER_ALL_CPUS) {
|
|
int cpu, buf_size_same;
|
|
unsigned long size;
|
|
|
|
size = 0;
|
|
buf_size_same = 1;
|
|
/* check if all cpu sizes are same */
|
|
for_each_tracing_cpu(cpu) {
|
|
/* fill in the size from first enabled cpu */
|
|
if (size == 0)
|
|
size = per_cpu_ptr(tr->trace_buffer.data, cpu)->entries;
|
|
if (size != per_cpu_ptr(tr->trace_buffer.data, cpu)->entries) {
|
|
buf_size_same = 0;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (buf_size_same) {
|
|
if (!ring_buffer_expanded)
|
|
r = sprintf(buf, "%lu (expanded: %lu)\n",
|
|
size >> 10,
|
|
trace_buf_size >> 10);
|
|
else
|
|
r = sprintf(buf, "%lu\n", size >> 10);
|
|
} else
|
|
r = sprintf(buf, "X\n");
|
|
} else
|
|
r = sprintf(buf, "%lu\n", per_cpu_ptr(tr->trace_buffer.data, cpu)->entries >> 10);
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
ret = simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_entries_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct inode *inode = file_inode(filp);
|
|
struct trace_array *tr = inode->i_private;
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
/* must have at least 1 entry */
|
|
if (!val)
|
|
return -EINVAL;
|
|
|
|
/* value is in KB */
|
|
val <<= 10;
|
|
ret = tracing_resize_ring_buffer(tr, val, tracing_get_cpu(inode));
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_total_entries_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = filp->private_data;
|
|
char buf[64];
|
|
int r, cpu;
|
|
unsigned long size = 0, expanded_size = 0;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
for_each_tracing_cpu(cpu) {
|
|
size += per_cpu_ptr(tr->trace_buffer.data, cpu)->entries >> 10;
|
|
if (!ring_buffer_expanded)
|
|
expanded_size += trace_buf_size >> 10;
|
|
}
|
|
if (ring_buffer_expanded)
|
|
r = sprintf(buf, "%lu\n", size);
|
|
else
|
|
r = sprintf(buf, "%lu (expanded: %lu)\n", size, expanded_size);
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_free_buffer_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
/*
|
|
* There is no need to read what the user has written, this function
|
|
* is just to make sure that there is no error when "echo" is used
|
|
*/
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static int
|
|
tracing_free_buffer_release(struct inode *inode, struct file *filp)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
|
|
/* disable tracing ? */
|
|
if (trace_flags & TRACE_ITER_STOP_ON_FREE)
|
|
tracer_tracing_off(tr);
|
|
/* resize the ring buffer to 0 */
|
|
tracing_resize_ring_buffer(tr, 0, RING_BUFFER_ALL_CPUS);
|
|
|
|
trace_array_put(tr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_mark_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *fpos)
|
|
{
|
|
unsigned long addr = (unsigned long)ubuf;
|
|
struct trace_array *tr = filp->private_data;
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer *buffer;
|
|
struct print_entry *entry;
|
|
unsigned long irq_flags;
|
|
struct page *pages[2];
|
|
void *map_page[2];
|
|
int nr_pages = 1;
|
|
ssize_t written;
|
|
int offset;
|
|
int size;
|
|
int len;
|
|
int ret;
|
|
int i;
|
|
|
|
if (tracing_disabled)
|
|
return -EINVAL;
|
|
|
|
if (!(trace_flags & TRACE_ITER_MARKERS))
|
|
return -EINVAL;
|
|
|
|
if (cnt > TRACE_BUF_SIZE)
|
|
cnt = TRACE_BUF_SIZE;
|
|
|
|
/*
|
|
* Userspace is injecting traces into the kernel trace buffer.
|
|
* We want to be as non intrusive as possible.
|
|
* To do so, we do not want to allocate any special buffers
|
|
* or take any locks, but instead write the userspace data
|
|
* straight into the ring buffer.
|
|
*
|
|
* First we need to pin the userspace buffer into memory,
|
|
* which, most likely it is, because it just referenced it.
|
|
* But there's no guarantee that it is. By using get_user_pages_fast()
|
|
* and kmap_atomic/kunmap_atomic() we can get access to the
|
|
* pages directly. We then write the data directly into the
|
|
* ring buffer.
|
|
*/
|
|
BUILD_BUG_ON(TRACE_BUF_SIZE >= PAGE_SIZE);
|
|
|
|
/* check if we cross pages */
|
|
if ((addr & PAGE_MASK) != ((addr + cnt) & PAGE_MASK))
|
|
nr_pages = 2;
|
|
|
|
offset = addr & (PAGE_SIZE - 1);
|
|
addr &= PAGE_MASK;
|
|
|
|
ret = get_user_pages_fast(addr, nr_pages, 0, pages);
|
|
if (ret < nr_pages) {
|
|
while (--ret >= 0)
|
|
put_page(pages[ret]);
|
|
written = -EFAULT;
|
|
goto out;
|
|
}
|
|
|
|
for (i = 0; i < nr_pages; i++)
|
|
map_page[i] = kmap_atomic(pages[i]);
|
|
|
|
local_save_flags(irq_flags);
|
|
size = sizeof(*entry) + cnt + 2; /* possible \n added */
|
|
buffer = tr->trace_buffer.buffer;
|
|
event = trace_buffer_lock_reserve(buffer, TRACE_PRINT, size,
|
|
irq_flags, preempt_count());
|
|
if (!event) {
|
|
/* Ring buffer disabled, return as if not open for write */
|
|
written = -EBADF;
|
|
goto out_unlock;
|
|
}
|
|
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = _THIS_IP_;
|
|
|
|
if (nr_pages == 2) {
|
|
len = PAGE_SIZE - offset;
|
|
memcpy(&entry->buf, map_page[0] + offset, len);
|
|
memcpy(&entry->buf[len], map_page[1], cnt - len);
|
|
} else
|
|
memcpy(&entry->buf, map_page[0] + offset, cnt);
|
|
|
|
if (entry->buf[cnt - 1] != '\n') {
|
|
entry->buf[cnt] = '\n';
|
|
entry->buf[cnt + 1] = '\0';
|
|
} else
|
|
entry->buf[cnt] = '\0';
|
|
|
|
__buffer_unlock_commit(buffer, event);
|
|
|
|
written = cnt;
|
|
|
|
*fpos += written;
|
|
|
|
out_unlock:
|
|
for (i = 0; i < nr_pages; i++){
|
|
kunmap_atomic(map_page[i]);
|
|
put_page(pages[i]);
|
|
}
|
|
out:
|
|
return written;
|
|
}
|
|
|
|
static int tracing_clock_show(struct seq_file *m, void *v)
|
|
{
|
|
struct trace_array *tr = m->private;
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(trace_clocks); i++)
|
|
seq_printf(m,
|
|
"%s%s%s%s", i ? " " : "",
|
|
i == tr->clock_id ? "[" : "", trace_clocks[i].name,
|
|
i == tr->clock_id ? "]" : "");
|
|
seq_putc(m, '\n');
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int tracing_set_clock(struct trace_array *tr, const char *clockstr)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(trace_clocks); i++) {
|
|
if (strcmp(trace_clocks[i].name, clockstr) == 0)
|
|
break;
|
|
}
|
|
if (i == ARRAY_SIZE(trace_clocks))
|
|
return -EINVAL;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
tr->clock_id = i;
|
|
|
|
ring_buffer_set_clock(tr->trace_buffer.buffer, trace_clocks[i].func);
|
|
|
|
/*
|
|
* New clock may not be consistent with the previous clock.
|
|
* Reset the buffer so that it doesn't have incomparable timestamps.
|
|
*/
|
|
tracing_reset_online_cpus(&tr->trace_buffer);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (tr->flags & TRACE_ARRAY_FL_GLOBAL && tr->max_buffer.buffer)
|
|
ring_buffer_set_clock(tr->max_buffer.buffer, trace_clocks[i].func);
|
|
tracing_reset_online_cpus(&tr->max_buffer);
|
|
#endif
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t tracing_clock_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *fpos)
|
|
{
|
|
struct seq_file *m = filp->private_data;
|
|
struct trace_array *tr = m->private;
|
|
char buf[64];
|
|
const char *clockstr;
|
|
int ret;
|
|
|
|
if (cnt >= sizeof(buf))
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
clockstr = strstrip(buf);
|
|
|
|
ret = tracing_set_clock(tr, clockstr);
|
|
if (ret)
|
|
return ret;
|
|
|
|
*fpos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static int tracing_clock_open(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
int ret;
|
|
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
if (trace_array_get(tr))
|
|
return -ENODEV;
|
|
|
|
ret = single_open(file, tracing_clock_show, inode->i_private);
|
|
if (ret < 0)
|
|
trace_array_put(tr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
struct ftrace_buffer_info {
|
|
struct trace_iterator iter;
|
|
void *spare;
|
|
unsigned int read;
|
|
};
|
|
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
static int tracing_snapshot_open(struct inode *inode, struct file *file)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct trace_iterator *iter;
|
|
struct seq_file *m;
|
|
int ret = 0;
|
|
|
|
if (trace_array_get(tr) < 0)
|
|
return -ENODEV;
|
|
|
|
if (file->f_mode & FMODE_READ) {
|
|
iter = __tracing_open(inode, file, true);
|
|
if (IS_ERR(iter))
|
|
ret = PTR_ERR(iter);
|
|
} else {
|
|
/* Writes still need the seq_file to hold the private data */
|
|
ret = -ENOMEM;
|
|
m = kzalloc(sizeof(*m), GFP_KERNEL);
|
|
if (!m)
|
|
goto out;
|
|
iter = kzalloc(sizeof(*iter), GFP_KERNEL);
|
|
if (!iter) {
|
|
kfree(m);
|
|
goto out;
|
|
}
|
|
ret = 0;
|
|
|
|
iter->tr = tr;
|
|
iter->trace_buffer = &tr->max_buffer;
|
|
iter->cpu_file = tracing_get_cpu(inode);
|
|
m->private = iter;
|
|
file->private_data = m;
|
|
}
|
|
out:
|
|
if (ret < 0)
|
|
trace_array_put(tr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_snapshot_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct seq_file *m = filp->private_data;
|
|
struct trace_iterator *iter = m->private;
|
|
struct trace_array *tr = iter->tr;
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
if (tr->current_trace->use_max_tr) {
|
|
ret = -EBUSY;
|
|
goto out;
|
|
}
|
|
|
|
switch (val) {
|
|
case 0:
|
|
if (iter->cpu_file != RING_BUFFER_ALL_CPUS) {
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
if (tr->allocated_snapshot)
|
|
free_snapshot(tr);
|
|
break;
|
|
case 1:
|
|
/* Only allow per-cpu swap if the ring buffer supports it */
|
|
#ifndef CONFIG_RING_BUFFER_ALLOW_SWAP
|
|
if (iter->cpu_file != RING_BUFFER_ALL_CPUS) {
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
#endif
|
|
if (!tr->allocated_snapshot) {
|
|
ret = alloc_snapshot(tr);
|
|
if (ret < 0)
|
|
break;
|
|
}
|
|
local_irq_disable();
|
|
/* Now, we're going to swap */
|
|
if (iter->cpu_file == RING_BUFFER_ALL_CPUS)
|
|
update_max_tr(tr, current, smp_processor_id());
|
|
else
|
|
update_max_tr_single(tr, current, iter->cpu_file);
|
|
local_irq_enable();
|
|
break;
|
|
default:
|
|
if (tr->allocated_snapshot) {
|
|
if (iter->cpu_file == RING_BUFFER_ALL_CPUS)
|
|
tracing_reset_online_cpus(&tr->max_buffer);
|
|
else
|
|
tracing_reset(&tr->max_buffer, iter->cpu_file);
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (ret >= 0) {
|
|
*ppos += cnt;
|
|
ret = cnt;
|
|
}
|
|
out:
|
|
mutex_unlock(&trace_types_lock);
|
|
return ret;
|
|
}
|
|
|
|
static int tracing_snapshot_release(struct inode *inode, struct file *file)
|
|
{
|
|
struct seq_file *m = file->private_data;
|
|
int ret;
|
|
|
|
ret = tracing_release(inode, file);
|
|
|
|
if (file->f_mode & FMODE_READ)
|
|
return ret;
|
|
|
|
/* If write only, the seq_file is just a stub */
|
|
if (m)
|
|
kfree(m->private);
|
|
kfree(m);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int tracing_buffers_open(struct inode *inode, struct file *filp);
|
|
static ssize_t tracing_buffers_read(struct file *filp, char __user *ubuf,
|
|
size_t count, loff_t *ppos);
|
|
static int tracing_buffers_release(struct inode *inode, struct file *file);
|
|
static ssize_t tracing_buffers_splice_read(struct file *file, loff_t *ppos,
|
|
struct pipe_inode_info *pipe, size_t len, unsigned int flags);
|
|
|
|
static int snapshot_raw_open(struct inode *inode, struct file *filp)
|
|
{
|
|
struct ftrace_buffer_info *info;
|
|
int ret;
|
|
|
|
ret = tracing_buffers_open(inode, filp);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
info = filp->private_data;
|
|
|
|
if (info->iter.trace->use_max_tr) {
|
|
tracing_buffers_release(inode, filp);
|
|
return -EBUSY;
|
|
}
|
|
|
|
info->iter.snapshot = true;
|
|
info->iter.trace_buffer = &info->iter.tr->max_buffer;
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif /* CONFIG_TRACER_SNAPSHOT */
|
|
|
|
|
|
static const struct file_operations tracing_thresh_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = tracing_thresh_read,
|
|
.write = tracing_thresh_write,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
static const struct file_operations tracing_max_lat_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = tracing_max_lat_read,
|
|
.write = tracing_max_lat_write,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
static const struct file_operations set_tracer_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = tracing_set_trace_read,
|
|
.write = tracing_set_trace_write,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
static const struct file_operations tracing_pipe_fops = {
|
|
.open = tracing_open_pipe,
|
|
.poll = tracing_poll_pipe,
|
|
.read = tracing_read_pipe,
|
|
.splice_read = tracing_splice_read_pipe,
|
|
.release = tracing_release_pipe,
|
|
.llseek = no_llseek,
|
|
};
|
|
|
|
static const struct file_operations tracing_entries_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.read = tracing_entries_read,
|
|
.write = tracing_entries_write,
|
|
.llseek = generic_file_llseek,
|
|
.release = tracing_release_generic_tr,
|
|
};
|
|
|
|
static const struct file_operations tracing_total_entries_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.read = tracing_total_entries_read,
|
|
.llseek = generic_file_llseek,
|
|
.release = tracing_release_generic_tr,
|
|
};
|
|
|
|
static const struct file_operations tracing_free_buffer_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.write = tracing_free_buffer_write,
|
|
.release = tracing_free_buffer_release,
|
|
};
|
|
|
|
static const struct file_operations tracing_mark_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.write = tracing_mark_write,
|
|
.llseek = generic_file_llseek,
|
|
.release = tracing_release_generic_tr,
|
|
};
|
|
|
|
static const struct file_operations trace_clock_fops = {
|
|
.open = tracing_clock_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = tracing_single_release_tr,
|
|
.write = tracing_clock_write,
|
|
};
|
|
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
static const struct file_operations snapshot_fops = {
|
|
.open = tracing_snapshot_open,
|
|
.read = seq_read,
|
|
.write = tracing_snapshot_write,
|
|
.llseek = tracing_lseek,
|
|
.release = tracing_snapshot_release,
|
|
};
|
|
|
|
static const struct file_operations snapshot_raw_fops = {
|
|
.open = snapshot_raw_open,
|
|
.read = tracing_buffers_read,
|
|
.release = tracing_buffers_release,
|
|
.splice_read = tracing_buffers_splice_read,
|
|
.llseek = no_llseek,
|
|
};
|
|
|
|
#endif /* CONFIG_TRACER_SNAPSHOT */
|
|
|
|
static int tracing_buffers_open(struct inode *inode, struct file *filp)
|
|
{
|
|
struct trace_array *tr = inode->i_private;
|
|
struct ftrace_buffer_info *info;
|
|
int ret;
|
|
|
|
if (tracing_disabled)
|
|
return -ENODEV;
|
|
|
|
if (trace_array_get(tr) < 0)
|
|
return -ENODEV;
|
|
|
|
info = kzalloc(sizeof(*info), GFP_KERNEL);
|
|
if (!info) {
|
|
trace_array_put(tr);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
info->iter.tr = tr;
|
|
info->iter.cpu_file = tracing_get_cpu(inode);
|
|
info->iter.trace = tr->current_trace;
|
|
info->iter.trace_buffer = &tr->trace_buffer;
|
|
info->spare = NULL;
|
|
/* Force reading ring buffer for first read */
|
|
info->read = (unsigned int)-1;
|
|
|
|
filp->private_data = info;
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
ret = nonseekable_open(inode, filp);
|
|
if (ret < 0)
|
|
trace_array_put(tr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static unsigned int
|
|
tracing_buffers_poll(struct file *filp, poll_table *poll_table)
|
|
{
|
|
struct ftrace_buffer_info *info = filp->private_data;
|
|
struct trace_iterator *iter = &info->iter;
|
|
|
|
return trace_poll(iter, filp, poll_table);
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_buffers_read(struct file *filp, char __user *ubuf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct ftrace_buffer_info *info = filp->private_data;
|
|
struct trace_iterator *iter = &info->iter;
|
|
ssize_t ret;
|
|
ssize_t size;
|
|
|
|
if (!count)
|
|
return 0;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (iter->snapshot && iter->tr->current_trace->use_max_tr) {
|
|
size = -EBUSY;
|
|
goto out_unlock;
|
|
}
|
|
#endif
|
|
|
|
if (!info->spare)
|
|
info->spare = ring_buffer_alloc_read_page(iter->trace_buffer->buffer,
|
|
iter->cpu_file);
|
|
size = -ENOMEM;
|
|
if (!info->spare)
|
|
goto out_unlock;
|
|
|
|
/* Do we have previous read data to read? */
|
|
if (info->read < PAGE_SIZE)
|
|
goto read;
|
|
|
|
again:
|
|
trace_access_lock(iter->cpu_file);
|
|
ret = ring_buffer_read_page(iter->trace_buffer->buffer,
|
|
&info->spare,
|
|
count,
|
|
iter->cpu_file, 0);
|
|
trace_access_unlock(iter->cpu_file);
|
|
|
|
if (ret < 0) {
|
|
if (trace_empty(iter)) {
|
|
if ((filp->f_flags & O_NONBLOCK)) {
|
|
size = -EAGAIN;
|
|
goto out_unlock;
|
|
}
|
|
mutex_unlock(&trace_types_lock);
|
|
ret = wait_on_pipe(iter);
|
|
mutex_lock(&trace_types_lock);
|
|
if (ret) {
|
|
size = ret;
|
|
goto out_unlock;
|
|
}
|
|
if (signal_pending(current)) {
|
|
size = -EINTR;
|
|
goto out_unlock;
|
|
}
|
|
goto again;
|
|
}
|
|
size = 0;
|
|
goto out_unlock;
|
|
}
|
|
|
|
info->read = 0;
|
|
read:
|
|
size = PAGE_SIZE - info->read;
|
|
if (size > count)
|
|
size = count;
|
|
|
|
ret = copy_to_user(ubuf, info->spare + info->read, size);
|
|
if (ret == size) {
|
|
size = -EFAULT;
|
|
goto out_unlock;
|
|
}
|
|
size -= ret;
|
|
|
|
*ppos += size;
|
|
info->read += size;
|
|
|
|
out_unlock:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return size;
|
|
}
|
|
|
|
static int tracing_buffers_release(struct inode *inode, struct file *file)
|
|
{
|
|
struct ftrace_buffer_info *info = file->private_data;
|
|
struct trace_iterator *iter = &info->iter;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
__trace_array_put(iter->tr);
|
|
|
|
if (info->spare)
|
|
ring_buffer_free_read_page(iter->trace_buffer->buffer, info->spare);
|
|
kfree(info);
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct buffer_ref {
|
|
struct ring_buffer *buffer;
|
|
void *page;
|
|
int ref;
|
|
};
|
|
|
|
static void buffer_pipe_buf_release(struct pipe_inode_info *pipe,
|
|
struct pipe_buffer *buf)
|
|
{
|
|
struct buffer_ref *ref = (struct buffer_ref *)buf->private;
|
|
|
|
if (--ref->ref)
|
|
return;
|
|
|
|
ring_buffer_free_read_page(ref->buffer, ref->page);
|
|
kfree(ref);
|
|
buf->private = 0;
|
|
}
|
|
|
|
static void buffer_pipe_buf_get(struct pipe_inode_info *pipe,
|
|
struct pipe_buffer *buf)
|
|
{
|
|
struct buffer_ref *ref = (struct buffer_ref *)buf->private;
|
|
|
|
ref->ref++;
|
|
}
|
|
|
|
/* Pipe buffer operations for a buffer. */
|
|
static const struct pipe_buf_operations buffer_pipe_buf_ops = {
|
|
.can_merge = 0,
|
|
.confirm = generic_pipe_buf_confirm,
|
|
.release = buffer_pipe_buf_release,
|
|
.steal = generic_pipe_buf_steal,
|
|
.get = buffer_pipe_buf_get,
|
|
};
|
|
|
|
/*
|
|
* Callback from splice_to_pipe(), if we need to release some pages
|
|
* at the end of the spd in case we error'ed out in filling the pipe.
|
|
*/
|
|
static void buffer_spd_release(struct splice_pipe_desc *spd, unsigned int i)
|
|
{
|
|
struct buffer_ref *ref =
|
|
(struct buffer_ref *)spd->partial[i].private;
|
|
|
|
if (--ref->ref)
|
|
return;
|
|
|
|
ring_buffer_free_read_page(ref->buffer, ref->page);
|
|
kfree(ref);
|
|
spd->partial[i].private = 0;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_buffers_splice_read(struct file *file, loff_t *ppos,
|
|
struct pipe_inode_info *pipe, size_t len,
|
|
unsigned int flags)
|
|
{
|
|
struct ftrace_buffer_info *info = file->private_data;
|
|
struct trace_iterator *iter = &info->iter;
|
|
struct partial_page partial_def[PIPE_DEF_BUFFERS];
|
|
struct page *pages_def[PIPE_DEF_BUFFERS];
|
|
struct splice_pipe_desc spd = {
|
|
.pages = pages_def,
|
|
.partial = partial_def,
|
|
.nr_pages_max = PIPE_DEF_BUFFERS,
|
|
.flags = flags,
|
|
.ops = &buffer_pipe_buf_ops,
|
|
.spd_release = buffer_spd_release,
|
|
};
|
|
struct buffer_ref *ref;
|
|
int entries, size, i;
|
|
ssize_t ret;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
if (iter->snapshot && iter->tr->current_trace->use_max_tr) {
|
|
ret = -EBUSY;
|
|
goto out;
|
|
}
|
|
#endif
|
|
|
|
if (splice_grow_spd(pipe, &spd)) {
|
|
ret = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
if (*ppos & (PAGE_SIZE - 1)) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
if (len & (PAGE_SIZE - 1)) {
|
|
if (len < PAGE_SIZE) {
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
len &= PAGE_MASK;
|
|
}
|
|
|
|
again:
|
|
trace_access_lock(iter->cpu_file);
|
|
entries = ring_buffer_entries_cpu(iter->trace_buffer->buffer, iter->cpu_file);
|
|
|
|
for (i = 0; i < spd.nr_pages_max && len && entries; i++, len -= PAGE_SIZE) {
|
|
struct page *page;
|
|
int r;
|
|
|
|
ref = kzalloc(sizeof(*ref), GFP_KERNEL);
|
|
if (!ref)
|
|
break;
|
|
|
|
ref->ref = 1;
|
|
ref->buffer = iter->trace_buffer->buffer;
|
|
ref->page = ring_buffer_alloc_read_page(ref->buffer, iter->cpu_file);
|
|
if (!ref->page) {
|
|
kfree(ref);
|
|
break;
|
|
}
|
|
|
|
r = ring_buffer_read_page(ref->buffer, &ref->page,
|
|
len, iter->cpu_file, 1);
|
|
if (r < 0) {
|
|
ring_buffer_free_read_page(ref->buffer, ref->page);
|
|
kfree(ref);
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* zero out any left over data, this is going to
|
|
* user land.
|
|
*/
|
|
size = ring_buffer_page_len(ref->page);
|
|
if (size < PAGE_SIZE)
|
|
memset(ref->page + size, 0, PAGE_SIZE - size);
|
|
|
|
page = virt_to_page(ref->page);
|
|
|
|
spd.pages[i] = page;
|
|
spd.partial[i].len = PAGE_SIZE;
|
|
spd.partial[i].offset = 0;
|
|
spd.partial[i].private = (unsigned long)ref;
|
|
spd.nr_pages++;
|
|
*ppos += PAGE_SIZE;
|
|
|
|
entries = ring_buffer_entries_cpu(iter->trace_buffer->buffer, iter->cpu_file);
|
|
}
|
|
|
|
trace_access_unlock(iter->cpu_file);
|
|
spd.nr_pages = i;
|
|
|
|
/* did we read anything? */
|
|
if (!spd.nr_pages) {
|
|
if ((file->f_flags & O_NONBLOCK) || (flags & SPLICE_F_NONBLOCK)) {
|
|
ret = -EAGAIN;
|
|
goto out;
|
|
}
|
|
mutex_unlock(&trace_types_lock);
|
|
ret = wait_on_pipe(iter);
|
|
mutex_lock(&trace_types_lock);
|
|
if (ret)
|
|
goto out;
|
|
if (signal_pending(current)) {
|
|
ret = -EINTR;
|
|
goto out;
|
|
}
|
|
goto again;
|
|
}
|
|
|
|
ret = splice_to_pipe(pipe, &spd);
|
|
splice_shrink_spd(&spd);
|
|
out:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static const struct file_operations tracing_buffers_fops = {
|
|
.open = tracing_buffers_open,
|
|
.read = tracing_buffers_read,
|
|
.poll = tracing_buffers_poll,
|
|
.release = tracing_buffers_release,
|
|
.splice_read = tracing_buffers_splice_read,
|
|
.llseek = no_llseek,
|
|
};
|
|
|
|
static ssize_t
|
|
tracing_stats_read(struct file *filp, char __user *ubuf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct inode *inode = file_inode(filp);
|
|
struct trace_array *tr = inode->i_private;
|
|
struct trace_buffer *trace_buf = &tr->trace_buffer;
|
|
int cpu = tracing_get_cpu(inode);
|
|
struct trace_seq *s;
|
|
unsigned long cnt;
|
|
unsigned long long t;
|
|
unsigned long usec_rem;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
cnt = ring_buffer_entries_cpu(trace_buf->buffer, cpu);
|
|
trace_seq_printf(s, "entries: %ld\n", cnt);
|
|
|
|
cnt = ring_buffer_overrun_cpu(trace_buf->buffer, cpu);
|
|
trace_seq_printf(s, "overrun: %ld\n", cnt);
|
|
|
|
cnt = ring_buffer_commit_overrun_cpu(trace_buf->buffer, cpu);
|
|
trace_seq_printf(s, "commit overrun: %ld\n", cnt);
|
|
|
|
cnt = ring_buffer_bytes_cpu(trace_buf->buffer, cpu);
|
|
trace_seq_printf(s, "bytes: %ld\n", cnt);
|
|
|
|
if (trace_clocks[tr->clock_id].in_ns) {
|
|
/* local or global for trace_clock */
|
|
t = ns2usecs(ring_buffer_oldest_event_ts(trace_buf->buffer, cpu));
|
|
usec_rem = do_div(t, USEC_PER_SEC);
|
|
trace_seq_printf(s, "oldest event ts: %5llu.%06lu\n",
|
|
t, usec_rem);
|
|
|
|
t = ns2usecs(ring_buffer_time_stamp(trace_buf->buffer, cpu));
|
|
usec_rem = do_div(t, USEC_PER_SEC);
|
|
trace_seq_printf(s, "now ts: %5llu.%06lu\n", t, usec_rem);
|
|
} else {
|
|
/* counter or tsc mode for trace_clock */
|
|
trace_seq_printf(s, "oldest event ts: %llu\n",
|
|
ring_buffer_oldest_event_ts(trace_buf->buffer, cpu));
|
|
|
|
trace_seq_printf(s, "now ts: %llu\n",
|
|
ring_buffer_time_stamp(trace_buf->buffer, cpu));
|
|
}
|
|
|
|
cnt = ring_buffer_dropped_events_cpu(trace_buf->buffer, cpu);
|
|
trace_seq_printf(s, "dropped events: %ld\n", cnt);
|
|
|
|
cnt = ring_buffer_read_events_cpu(trace_buf->buffer, cpu);
|
|
trace_seq_printf(s, "read events: %ld\n", cnt);
|
|
|
|
count = simple_read_from_buffer(ubuf, count, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct file_operations tracing_stats_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.read = tracing_stats_read,
|
|
.llseek = generic_file_llseek,
|
|
.release = tracing_release_generic_tr,
|
|
};
|
|
|
|
#ifdef CONFIG_DYNAMIC_FTRACE
|
|
|
|
int __weak ftrace_arch_read_dyn_info(char *buf, int size)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t
|
|
tracing_read_dyn_info(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
static char ftrace_dyn_info_buffer[1024];
|
|
static DEFINE_MUTEX(dyn_info_mutex);
|
|
unsigned long *p = filp->private_data;
|
|
char *buf = ftrace_dyn_info_buffer;
|
|
int size = ARRAY_SIZE(ftrace_dyn_info_buffer);
|
|
int r;
|
|
|
|
mutex_lock(&dyn_info_mutex);
|
|
r = sprintf(buf, "%ld ", *p);
|
|
|
|
r += ftrace_arch_read_dyn_info(buf+r, (size-1)-r);
|
|
buf[r++] = '\n';
|
|
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
|
|
mutex_unlock(&dyn_info_mutex);
|
|
|
|
return r;
|
|
}
|
|
|
|
static const struct file_operations tracing_dyn_info_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = tracing_read_dyn_info,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
#endif /* CONFIG_DYNAMIC_FTRACE */
|
|
|
|
#if defined(CONFIG_TRACER_SNAPSHOT) && defined(CONFIG_DYNAMIC_FTRACE)
|
|
static void
|
|
ftrace_snapshot(unsigned long ip, unsigned long parent_ip, void **data)
|
|
{
|
|
tracing_snapshot();
|
|
}
|
|
|
|
static void
|
|
ftrace_count_snapshot(unsigned long ip, unsigned long parent_ip, void **data)
|
|
{
|
|
unsigned long *count = (long *)data;
|
|
|
|
if (!*count)
|
|
return;
|
|
|
|
if (*count != -1)
|
|
(*count)--;
|
|
|
|
tracing_snapshot();
|
|
}
|
|
|
|
static int
|
|
ftrace_snapshot_print(struct seq_file *m, unsigned long ip,
|
|
struct ftrace_probe_ops *ops, void *data)
|
|
{
|
|
long count = (long)data;
|
|
|
|
seq_printf(m, "%ps:", (void *)ip);
|
|
|
|
seq_printf(m, "snapshot");
|
|
|
|
if (count == -1)
|
|
seq_printf(m, ":unlimited\n");
|
|
else
|
|
seq_printf(m, ":count=%ld\n", count);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static struct ftrace_probe_ops snapshot_probe_ops = {
|
|
.func = ftrace_snapshot,
|
|
.print = ftrace_snapshot_print,
|
|
};
|
|
|
|
static struct ftrace_probe_ops snapshot_count_probe_ops = {
|
|
.func = ftrace_count_snapshot,
|
|
.print = ftrace_snapshot_print,
|
|
};
|
|
|
|
static int
|
|
ftrace_trace_snapshot_callback(struct ftrace_hash *hash,
|
|
char *glob, char *cmd, char *param, int enable)
|
|
{
|
|
struct ftrace_probe_ops *ops;
|
|
void *count = (void *)-1;
|
|
char *number;
|
|
int ret;
|
|
|
|
/* hash funcs only work with set_ftrace_filter */
|
|
if (!enable)
|
|
return -EINVAL;
|
|
|
|
ops = param ? &snapshot_count_probe_ops : &snapshot_probe_ops;
|
|
|
|
if (glob[0] == '!') {
|
|
unregister_ftrace_function_probe_func(glob+1, ops);
|
|
return 0;
|
|
}
|
|
|
|
if (!param)
|
|
goto out_reg;
|
|
|
|
number = strsep(¶m, ":");
|
|
|
|
if (!strlen(number))
|
|
goto out_reg;
|
|
|
|
/*
|
|
* We use the callback data field (which is a pointer)
|
|
* as our counter.
|
|
*/
|
|
ret = kstrtoul(number, 0, (unsigned long *)&count);
|
|
if (ret)
|
|
return ret;
|
|
|
|
out_reg:
|
|
ret = register_ftrace_function_probe(glob, ops, count);
|
|
|
|
if (ret >= 0)
|
|
alloc_snapshot(&global_trace);
|
|
|
|
return ret < 0 ? ret : 0;
|
|
}
|
|
|
|
static struct ftrace_func_command ftrace_snapshot_cmd = {
|
|
.name = "snapshot",
|
|
.func = ftrace_trace_snapshot_callback,
|
|
};
|
|
|
|
static __init int register_snapshot_cmd(void)
|
|
{
|
|
return register_ftrace_command(&ftrace_snapshot_cmd);
|
|
}
|
|
#else
|
|
static inline __init int register_snapshot_cmd(void) { return 0; }
|
|
#endif /* defined(CONFIG_TRACER_SNAPSHOT) && defined(CONFIG_DYNAMIC_FTRACE) */
|
|
|
|
struct dentry *tracing_init_dentry_tr(struct trace_array *tr)
|
|
{
|
|
if (tr->dir)
|
|
return tr->dir;
|
|
|
|
if (!debugfs_initialized())
|
|
return NULL;
|
|
|
|
if (tr->flags & TRACE_ARRAY_FL_GLOBAL)
|
|
tr->dir = debugfs_create_dir("tracing", NULL);
|
|
|
|
if (!tr->dir)
|
|
pr_warn_once("Could not create debugfs directory 'tracing'\n");
|
|
|
|
return tr->dir;
|
|
}
|
|
|
|
struct dentry *tracing_init_dentry(void)
|
|
{
|
|
return tracing_init_dentry_tr(&global_trace);
|
|
}
|
|
|
|
static struct dentry *tracing_dentry_percpu(struct trace_array *tr, int cpu)
|
|
{
|
|
struct dentry *d_tracer;
|
|
|
|
if (tr->percpu_dir)
|
|
return tr->percpu_dir;
|
|
|
|
d_tracer = tracing_init_dentry_tr(tr);
|
|
if (!d_tracer)
|
|
return NULL;
|
|
|
|
tr->percpu_dir = debugfs_create_dir("per_cpu", d_tracer);
|
|
|
|
WARN_ONCE(!tr->percpu_dir,
|
|
"Could not create debugfs directory 'per_cpu/%d'\n", cpu);
|
|
|
|
return tr->percpu_dir;
|
|
}
|
|
|
|
static struct dentry *
|
|
trace_create_cpu_file(const char *name, umode_t mode, struct dentry *parent,
|
|
void *data, long cpu, const struct file_operations *fops)
|
|
{
|
|
struct dentry *ret = trace_create_file(name, mode, parent, data, fops);
|
|
|
|
if (ret) /* See tracing_get_cpu() */
|
|
ret->d_inode->i_cdev = (void *)(cpu + 1);
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
tracing_init_debugfs_percpu(struct trace_array *tr, long cpu)
|
|
{
|
|
struct dentry *d_percpu = tracing_dentry_percpu(tr, cpu);
|
|
struct dentry *d_cpu;
|
|
char cpu_dir[30]; /* 30 characters should be more than enough */
|
|
|
|
if (!d_percpu)
|
|
return;
|
|
|
|
snprintf(cpu_dir, 30, "cpu%ld", cpu);
|
|
d_cpu = debugfs_create_dir(cpu_dir, d_percpu);
|
|
if (!d_cpu) {
|
|
pr_warning("Could not create debugfs '%s' entry\n", cpu_dir);
|
|
return;
|
|
}
|
|
|
|
/* per cpu trace_pipe */
|
|
trace_create_cpu_file("trace_pipe", 0444, d_cpu,
|
|
tr, cpu, &tracing_pipe_fops);
|
|
|
|
/* per cpu trace */
|
|
trace_create_cpu_file("trace", 0644, d_cpu,
|
|
tr, cpu, &tracing_fops);
|
|
|
|
trace_create_cpu_file("trace_pipe_raw", 0444, d_cpu,
|
|
tr, cpu, &tracing_buffers_fops);
|
|
|
|
trace_create_cpu_file("stats", 0444, d_cpu,
|
|
tr, cpu, &tracing_stats_fops);
|
|
|
|
trace_create_cpu_file("buffer_size_kb", 0444, d_cpu,
|
|
tr, cpu, &tracing_entries_fops);
|
|
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
trace_create_cpu_file("snapshot", 0644, d_cpu,
|
|
tr, cpu, &snapshot_fops);
|
|
|
|
trace_create_cpu_file("snapshot_raw", 0444, d_cpu,
|
|
tr, cpu, &snapshot_raw_fops);
|
|
#endif
|
|
}
|
|
|
|
#ifdef CONFIG_FTRACE_SELFTEST
|
|
/* Let selftest have access to static functions in this file */
|
|
#include "trace_selftest.c"
|
|
#endif
|
|
|
|
struct trace_option_dentry {
|
|
struct tracer_opt *opt;
|
|
struct tracer_flags *flags;
|
|
struct trace_array *tr;
|
|
struct dentry *entry;
|
|
};
|
|
|
|
static ssize_t
|
|
trace_options_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct trace_option_dentry *topt = filp->private_data;
|
|
char *buf;
|
|
|
|
if (topt->flags->val & topt->opt->bit)
|
|
buf = "1\n";
|
|
else
|
|
buf = "0\n";
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
|
|
}
|
|
|
|
static ssize_t
|
|
trace_options_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct trace_option_dentry *topt = filp->private_data;
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (val != 0 && val != 1)
|
|
return -EINVAL;
|
|
|
|
if (!!(topt->flags->val & topt->opt->bit) != val) {
|
|
mutex_lock(&trace_types_lock);
|
|
ret = __set_tracer_option(topt->tr, topt->flags,
|
|
topt->opt, !val);
|
|
mutex_unlock(&trace_types_lock);
|
|
if (ret)
|
|
return ret;
|
|
}
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
|
|
static const struct file_operations trace_options_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = trace_options_read,
|
|
.write = trace_options_write,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
static ssize_t
|
|
trace_options_core_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
long index = (long)filp->private_data;
|
|
char *buf;
|
|
|
|
if (trace_flags & (1 << index))
|
|
buf = "1\n";
|
|
else
|
|
buf = "0\n";
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
|
|
}
|
|
|
|
static ssize_t
|
|
trace_options_core_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = &global_trace;
|
|
long index = (long)filp->private_data;
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (val != 0 && val != 1)
|
|
return -EINVAL;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
ret = set_tracer_flag(tr, 1 << index, val);
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static const struct file_operations trace_options_core_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = trace_options_core_read,
|
|
.write = trace_options_core_write,
|
|
.llseek = generic_file_llseek,
|
|
};
|
|
|
|
struct dentry *trace_create_file(const char *name,
|
|
umode_t mode,
|
|
struct dentry *parent,
|
|
void *data,
|
|
const struct file_operations *fops)
|
|
{
|
|
struct dentry *ret;
|
|
|
|
ret = debugfs_create_file(name, mode, parent, data, fops);
|
|
if (!ret)
|
|
pr_warning("Could not create debugfs '%s' entry\n", name);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static struct dentry *trace_options_init_dentry(struct trace_array *tr)
|
|
{
|
|
struct dentry *d_tracer;
|
|
|
|
if (tr->options)
|
|
return tr->options;
|
|
|
|
d_tracer = tracing_init_dentry_tr(tr);
|
|
if (!d_tracer)
|
|
return NULL;
|
|
|
|
tr->options = debugfs_create_dir("options", d_tracer);
|
|
if (!tr->options) {
|
|
pr_warning("Could not create debugfs directory 'options'\n");
|
|
return NULL;
|
|
}
|
|
|
|
return tr->options;
|
|
}
|
|
|
|
static void
|
|
create_trace_option_file(struct trace_array *tr,
|
|
struct trace_option_dentry *topt,
|
|
struct tracer_flags *flags,
|
|
struct tracer_opt *opt)
|
|
{
|
|
struct dentry *t_options;
|
|
|
|
t_options = trace_options_init_dentry(tr);
|
|
if (!t_options)
|
|
return;
|
|
|
|
topt->flags = flags;
|
|
topt->opt = opt;
|
|
topt->tr = tr;
|
|
|
|
topt->entry = trace_create_file(opt->name, 0644, t_options, topt,
|
|
&trace_options_fops);
|
|
|
|
}
|
|
|
|
static struct trace_option_dentry *
|
|
create_trace_option_files(struct trace_array *tr, struct tracer *tracer)
|
|
{
|
|
struct trace_option_dentry *topts;
|
|
struct tracer_flags *flags;
|
|
struct tracer_opt *opts;
|
|
int cnt;
|
|
|
|
if (!tracer)
|
|
return NULL;
|
|
|
|
flags = tracer->flags;
|
|
|
|
if (!flags || !flags->opts)
|
|
return NULL;
|
|
|
|
opts = flags->opts;
|
|
|
|
for (cnt = 0; opts[cnt].name; cnt++)
|
|
;
|
|
|
|
topts = kcalloc(cnt + 1, sizeof(*topts), GFP_KERNEL);
|
|
if (!topts)
|
|
return NULL;
|
|
|
|
for (cnt = 0; opts[cnt].name; cnt++)
|
|
create_trace_option_file(tr, &topts[cnt], flags,
|
|
&opts[cnt]);
|
|
|
|
return topts;
|
|
}
|
|
|
|
static void
|
|
destroy_trace_option_files(struct trace_option_dentry *topts)
|
|
{
|
|
int cnt;
|
|
|
|
if (!topts)
|
|
return;
|
|
|
|
for (cnt = 0; topts[cnt].opt; cnt++)
|
|
debugfs_remove(topts[cnt].entry);
|
|
|
|
kfree(topts);
|
|
}
|
|
|
|
static struct dentry *
|
|
create_trace_option_core_file(struct trace_array *tr,
|
|
const char *option, long index)
|
|
{
|
|
struct dentry *t_options;
|
|
|
|
t_options = trace_options_init_dentry(tr);
|
|
if (!t_options)
|
|
return NULL;
|
|
|
|
return trace_create_file(option, 0644, t_options, (void *)index,
|
|
&trace_options_core_fops);
|
|
}
|
|
|
|
static __init void create_trace_options_dir(struct trace_array *tr)
|
|
{
|
|
struct dentry *t_options;
|
|
int i;
|
|
|
|
t_options = trace_options_init_dentry(tr);
|
|
if (!t_options)
|
|
return;
|
|
|
|
for (i = 0; trace_options[i]; i++)
|
|
create_trace_option_core_file(tr, trace_options[i], i);
|
|
}
|
|
|
|
static ssize_t
|
|
rb_simple_read(struct file *filp, char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = filp->private_data;
|
|
char buf[64];
|
|
int r;
|
|
|
|
r = tracer_tracing_is_on(tr);
|
|
r = sprintf(buf, "%d\n", r);
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
}
|
|
|
|
static ssize_t
|
|
rb_simple_write(struct file *filp, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_array *tr = filp->private_data;
|
|
struct ring_buffer *buffer = tr->trace_buffer.buffer;
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (buffer) {
|
|
mutex_lock(&trace_types_lock);
|
|
if (val) {
|
|
tracer_tracing_on(tr);
|
|
if (tr->current_trace->start)
|
|
tr->current_trace->start(tr);
|
|
} else {
|
|
tracer_tracing_off(tr);
|
|
if (tr->current_trace->stop)
|
|
tr->current_trace->stop(tr);
|
|
}
|
|
mutex_unlock(&trace_types_lock);
|
|
}
|
|
|
|
(*ppos)++;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static const struct file_operations rb_simple_fops = {
|
|
.open = tracing_open_generic_tr,
|
|
.read = rb_simple_read,
|
|
.write = rb_simple_write,
|
|
.release = tracing_release_generic_tr,
|
|
.llseek = default_llseek,
|
|
};
|
|
|
|
struct dentry *trace_instance_dir;
|
|
|
|
static void
|
|
init_tracer_debugfs(struct trace_array *tr, struct dentry *d_tracer);
|
|
|
|
static int
|
|
allocate_trace_buffer(struct trace_array *tr, struct trace_buffer *buf, int size)
|
|
{
|
|
enum ring_buffer_flags rb_flags;
|
|
|
|
rb_flags = trace_flags & TRACE_ITER_OVERWRITE ? RB_FL_OVERWRITE : 0;
|
|
|
|
buf->tr = tr;
|
|
|
|
buf->buffer = ring_buffer_alloc(size, rb_flags);
|
|
if (!buf->buffer)
|
|
return -ENOMEM;
|
|
|
|
buf->data = alloc_percpu(struct trace_array_cpu);
|
|
if (!buf->data) {
|
|
ring_buffer_free(buf->buffer);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
/* Allocate the first page for all buffers */
|
|
set_buffer_entries(&tr->trace_buffer,
|
|
ring_buffer_size(tr->trace_buffer.buffer, 0));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int allocate_trace_buffers(struct trace_array *tr, int size)
|
|
{
|
|
int ret;
|
|
|
|
ret = allocate_trace_buffer(tr, &tr->trace_buffer, size);
|
|
if (ret)
|
|
return ret;
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
ret = allocate_trace_buffer(tr, &tr->max_buffer,
|
|
allocate_snapshot ? size : 1);
|
|
if (WARN_ON(ret)) {
|
|
ring_buffer_free(tr->trace_buffer.buffer);
|
|
free_percpu(tr->trace_buffer.data);
|
|
return -ENOMEM;
|
|
}
|
|
tr->allocated_snapshot = allocate_snapshot;
|
|
|
|
/*
|
|
* Only the top level trace array gets its snapshot allocated
|
|
* from the kernel command line.
|
|
*/
|
|
allocate_snapshot = false;
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static void free_trace_buffer(struct trace_buffer *buf)
|
|
{
|
|
if (buf->buffer) {
|
|
ring_buffer_free(buf->buffer);
|
|
buf->buffer = NULL;
|
|
free_percpu(buf->data);
|
|
buf->data = NULL;
|
|
}
|
|
}
|
|
|
|
static void free_trace_buffers(struct trace_array *tr)
|
|
{
|
|
if (!tr)
|
|
return;
|
|
|
|
free_trace_buffer(&tr->trace_buffer);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
free_trace_buffer(&tr->max_buffer);
|
|
#endif
|
|
}
|
|
|
|
static int new_instance_create(const char *name)
|
|
{
|
|
struct trace_array *tr;
|
|
int ret;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
ret = -EEXIST;
|
|
list_for_each_entry(tr, &ftrace_trace_arrays, list) {
|
|
if (tr->name && strcmp(tr->name, name) == 0)
|
|
goto out_unlock;
|
|
}
|
|
|
|
ret = -ENOMEM;
|
|
tr = kzalloc(sizeof(*tr), GFP_KERNEL);
|
|
if (!tr)
|
|
goto out_unlock;
|
|
|
|
tr->name = kstrdup(name, GFP_KERNEL);
|
|
if (!tr->name)
|
|
goto out_free_tr;
|
|
|
|
if (!alloc_cpumask_var(&tr->tracing_cpumask, GFP_KERNEL))
|
|
goto out_free_tr;
|
|
|
|
cpumask_copy(tr->tracing_cpumask, cpu_all_mask);
|
|
|
|
raw_spin_lock_init(&tr->start_lock);
|
|
|
|
tr->max_lock = (arch_spinlock_t)__ARCH_SPIN_LOCK_UNLOCKED;
|
|
|
|
tr->current_trace = &nop_trace;
|
|
|
|
INIT_LIST_HEAD(&tr->systems);
|
|
INIT_LIST_HEAD(&tr->events);
|
|
|
|
if (allocate_trace_buffers(tr, trace_buf_size) < 0)
|
|
goto out_free_tr;
|
|
|
|
tr->dir = debugfs_create_dir(name, trace_instance_dir);
|
|
if (!tr->dir)
|
|
goto out_free_tr;
|
|
|
|
ret = event_trace_add_tracer(tr->dir, tr);
|
|
if (ret) {
|
|
debugfs_remove_recursive(tr->dir);
|
|
goto out_free_tr;
|
|
}
|
|
|
|
init_tracer_debugfs(tr, tr->dir);
|
|
|
|
list_add(&tr->list, &ftrace_trace_arrays);
|
|
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return 0;
|
|
|
|
out_free_tr:
|
|
free_trace_buffers(tr);
|
|
free_cpumask_var(tr->tracing_cpumask);
|
|
kfree(tr->name);
|
|
kfree(tr);
|
|
|
|
out_unlock:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
static int instance_delete(const char *name)
|
|
{
|
|
struct trace_array *tr;
|
|
int found = 0;
|
|
int ret;
|
|
|
|
mutex_lock(&trace_types_lock);
|
|
|
|
ret = -ENODEV;
|
|
list_for_each_entry(tr, &ftrace_trace_arrays, list) {
|
|
if (tr->name && strcmp(tr->name, name) == 0) {
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (!found)
|
|
goto out_unlock;
|
|
|
|
ret = -EBUSY;
|
|
if (tr->ref)
|
|
goto out_unlock;
|
|
|
|
list_del(&tr->list);
|
|
|
|
tracing_set_nop(tr);
|
|
event_trace_del_tracer(tr);
|
|
ftrace_destroy_function_files(tr);
|
|
debugfs_remove_recursive(tr->dir);
|
|
free_trace_buffers(tr);
|
|
|
|
kfree(tr->name);
|
|
kfree(tr);
|
|
|
|
ret = 0;
|
|
|
|
out_unlock:
|
|
mutex_unlock(&trace_types_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int instance_mkdir (struct inode *inode, struct dentry *dentry, umode_t mode)
|
|
{
|
|
struct dentry *parent;
|
|
int ret;
|
|
|
|
/* Paranoid: Make sure the parent is the "instances" directory */
|
|
parent = hlist_entry(inode->i_dentry.first, struct dentry, d_alias);
|
|
if (WARN_ON_ONCE(parent != trace_instance_dir))
|
|
return -ENOENT;
|
|
|
|
/*
|
|
* The inode mutex is locked, but debugfs_create_dir() will also
|
|
* take the mutex. As the instances directory can not be destroyed
|
|
* or changed in any other way, it is safe to unlock it, and
|
|
* let the dentry try. If two users try to make the same dir at
|
|
* the same time, then the new_instance_create() will determine the
|
|
* winner.
|
|
*/
|
|
mutex_unlock(&inode->i_mutex);
|
|
|
|
ret = new_instance_create(dentry->d_iname);
|
|
|
|
mutex_lock(&inode->i_mutex);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int instance_rmdir(struct inode *inode, struct dentry *dentry)
|
|
{
|
|
struct dentry *parent;
|
|
int ret;
|
|
|
|
/* Paranoid: Make sure the parent is the "instances" directory */
|
|
parent = hlist_entry(inode->i_dentry.first, struct dentry, d_alias);
|
|
if (WARN_ON_ONCE(parent != trace_instance_dir))
|
|
return -ENOENT;
|
|
|
|
/* The caller did a dget() on dentry */
|
|
mutex_unlock(&dentry->d_inode->i_mutex);
|
|
|
|
/*
|
|
* The inode mutex is locked, but debugfs_create_dir() will also
|
|
* take the mutex. As the instances directory can not be destroyed
|
|
* or changed in any other way, it is safe to unlock it, and
|
|
* let the dentry try. If two users try to make the same dir at
|
|
* the same time, then the instance_delete() will determine the
|
|
* winner.
|
|
*/
|
|
mutex_unlock(&inode->i_mutex);
|
|
|
|
ret = instance_delete(dentry->d_iname);
|
|
|
|
mutex_lock_nested(&inode->i_mutex, I_MUTEX_PARENT);
|
|
mutex_lock(&dentry->d_inode->i_mutex);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static const struct inode_operations instance_dir_inode_operations = {
|
|
.lookup = simple_lookup,
|
|
.mkdir = instance_mkdir,
|
|
.rmdir = instance_rmdir,
|
|
};
|
|
|
|
static __init void create_trace_instances(struct dentry *d_tracer)
|
|
{
|
|
trace_instance_dir = debugfs_create_dir("instances", d_tracer);
|
|
if (WARN_ON(!trace_instance_dir))
|
|
return;
|
|
|
|
/* Hijack the dir inode operations, to allow mkdir */
|
|
trace_instance_dir->d_inode->i_op = &instance_dir_inode_operations;
|
|
}
|
|
|
|
static void
|
|
init_tracer_debugfs(struct trace_array *tr, struct dentry *d_tracer)
|
|
{
|
|
int cpu;
|
|
|
|
trace_create_file("available_tracers", 0444, d_tracer,
|
|
tr, &show_traces_fops);
|
|
|
|
trace_create_file("current_tracer", 0644, d_tracer,
|
|
tr, &set_tracer_fops);
|
|
|
|
trace_create_file("tracing_cpumask", 0644, d_tracer,
|
|
tr, &tracing_cpumask_fops);
|
|
|
|
trace_create_file("trace_options", 0644, d_tracer,
|
|
tr, &tracing_iter_fops);
|
|
|
|
trace_create_file("trace", 0644, d_tracer,
|
|
tr, &tracing_fops);
|
|
|
|
trace_create_file("trace_pipe", 0444, d_tracer,
|
|
tr, &tracing_pipe_fops);
|
|
|
|
trace_create_file("buffer_size_kb", 0644, d_tracer,
|
|
tr, &tracing_entries_fops);
|
|
|
|
trace_create_file("buffer_total_size_kb", 0444, d_tracer,
|
|
tr, &tracing_total_entries_fops);
|
|
|
|
trace_create_file("free_buffer", 0200, d_tracer,
|
|
tr, &tracing_free_buffer_fops);
|
|
|
|
trace_create_file("trace_marker", 0220, d_tracer,
|
|
tr, &tracing_mark_fops);
|
|
|
|
trace_create_file("trace_clock", 0644, d_tracer, tr,
|
|
&trace_clock_fops);
|
|
|
|
trace_create_file("tracing_on", 0644, d_tracer,
|
|
tr, &rb_simple_fops);
|
|
|
|
#ifdef CONFIG_TRACER_MAX_TRACE
|
|
trace_create_file("tracing_max_latency", 0644, d_tracer,
|
|
&tr->max_latency, &tracing_max_lat_fops);
|
|
#endif
|
|
|
|
if (ftrace_create_function_files(tr, d_tracer))
|
|
WARN(1, "Could not allocate function filter files");
|
|
|
|
#ifdef CONFIG_TRACER_SNAPSHOT
|
|
trace_create_file("snapshot", 0644, d_tracer,
|
|
tr, &snapshot_fops);
|
|
#endif
|
|
|
|
for_each_tracing_cpu(cpu)
|
|
tracing_init_debugfs_percpu(tr, cpu);
|
|
|
|
}
|
|
|
|
static __init int tracer_init_debugfs(void)
|
|
{
|
|
struct dentry *d_tracer;
|
|
|
|
trace_access_lock_init();
|
|
|
|
d_tracer = tracing_init_dentry();
|
|
if (!d_tracer)
|
|
return 0;
|
|
|
|
init_tracer_debugfs(&global_trace, d_tracer);
|
|
|
|
trace_create_file("tracing_thresh", 0644, d_tracer,
|
|
&global_trace, &tracing_thresh_fops);
|
|
|
|
trace_create_file("README", 0444, d_tracer,
|
|
NULL, &tracing_readme_fops);
|
|
|
|
trace_create_file("saved_cmdlines", 0444, d_tracer,
|
|
NULL, &tracing_saved_cmdlines_fops);
|
|
|
|
trace_create_file("saved_cmdlines_size", 0644, d_tracer,
|
|
NULL, &tracing_saved_cmdlines_size_fops);
|
|
|
|
#ifdef CONFIG_DYNAMIC_FTRACE
|
|
trace_create_file("dyn_ftrace_total_info", 0444, d_tracer,
|
|
&ftrace_update_tot_cnt, &tracing_dyn_info_fops);
|
|
#endif
|
|
|
|
create_trace_instances(d_tracer);
|
|
|
|
create_trace_options_dir(&global_trace);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int trace_panic_handler(struct notifier_block *this,
|
|
unsigned long event, void *unused)
|
|
{
|
|
if (ftrace_dump_on_oops)
|
|
ftrace_dump(ftrace_dump_on_oops);
|
|
return NOTIFY_OK;
|
|
}
|
|
|
|
static struct notifier_block trace_panic_notifier = {
|
|
.notifier_call = trace_panic_handler,
|
|
.next = NULL,
|
|
.priority = 150 /* priority: INT_MAX >= x >= 0 */
|
|
};
|
|
|
|
static int trace_die_handler(struct notifier_block *self,
|
|
unsigned long val,
|
|
void *data)
|
|
{
|
|
switch (val) {
|
|
case DIE_OOPS:
|
|
if (ftrace_dump_on_oops)
|
|
ftrace_dump(ftrace_dump_on_oops);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
return NOTIFY_OK;
|
|
}
|
|
|
|
static struct notifier_block trace_die_notifier = {
|
|
.notifier_call = trace_die_handler,
|
|
.priority = 200
|
|
};
|
|
|
|
/*
|
|
* printk is set to max of 1024, we really don't need it that big.
|
|
* Nothing should be printing 1000 characters anyway.
|
|
*/
|
|
#define TRACE_MAX_PRINT 1000
|
|
|
|
/*
|
|
* Define here KERN_TRACE so that we have one place to modify
|
|
* it if we decide to change what log level the ftrace dump
|
|
* should be at.
|
|
*/
|
|
#define KERN_TRACE KERN_EMERG
|
|
|
|
void
|
|
trace_printk_seq(struct trace_seq *s)
|
|
{
|
|
/* Probably should print a warning here. */
|
|
if (s->len >= TRACE_MAX_PRINT)
|
|
s->len = TRACE_MAX_PRINT;
|
|
|
|
/* should be zero ended, but we are paranoid. */
|
|
s->buffer[s->len] = 0;
|
|
|
|
printk(KERN_TRACE "%s", s->buffer);
|
|
|
|
trace_seq_init(s);
|
|
}
|
|
|
|
void trace_init_global_iter(struct trace_iterator *iter)
|
|
{
|
|
iter->tr = &global_trace;
|
|
iter->trace = iter->tr->current_trace;
|
|
iter->cpu_file = RING_BUFFER_ALL_CPUS;
|
|
iter->trace_buffer = &global_trace.trace_buffer;
|
|
|
|
if (iter->trace && iter->trace->open)
|
|
iter->trace->open(iter);
|
|
|
|
/* Annotate start of buffers if we had overruns */
|
|
if (ring_buffer_overruns(iter->trace_buffer->buffer))
|
|
iter->iter_flags |= TRACE_FILE_ANNOTATE;
|
|
|
|
/* Output in nanoseconds only if we are using a clock in nanoseconds. */
|
|
if (trace_clocks[iter->tr->clock_id].in_ns)
|
|
iter->iter_flags |= TRACE_FILE_TIME_IN_NS;
|
|
}
|
|
|
|
void ftrace_dump(enum ftrace_dump_mode oops_dump_mode)
|
|
{
|
|
/* use static because iter can be a bit big for the stack */
|
|
static struct trace_iterator iter;
|
|
static atomic_t dump_running;
|
|
unsigned int old_userobj;
|
|
unsigned long flags;
|
|
int cnt = 0, cpu;
|
|
|
|
/* Only allow one dump user at a time. */
|
|
if (atomic_inc_return(&dump_running) != 1) {
|
|
atomic_dec(&dump_running);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Always turn off tracing when we dump.
|
|
* We don't need to show trace output of what happens
|
|
* between multiple crashes.
|
|
*
|
|
* If the user does a sysrq-z, then they can re-enable
|
|
* tracing with echo 1 > tracing_on.
|
|
*/
|
|
tracing_off();
|
|
|
|
local_irq_save(flags);
|
|
|
|
/* Simulate the iterator */
|
|
trace_init_global_iter(&iter);
|
|
|
|
for_each_tracing_cpu(cpu) {
|
|
atomic_inc(&per_cpu_ptr(iter.tr->trace_buffer.data, cpu)->disabled);
|
|
}
|
|
|
|
old_userobj = trace_flags & TRACE_ITER_SYM_USEROBJ;
|
|
|
|
/* don't look at user memory in panic mode */
|
|
trace_flags &= ~TRACE_ITER_SYM_USEROBJ;
|
|
|
|
switch (oops_dump_mode) {
|
|
case DUMP_ALL:
|
|
iter.cpu_file = RING_BUFFER_ALL_CPUS;
|
|
break;
|
|
case DUMP_ORIG:
|
|
iter.cpu_file = raw_smp_processor_id();
|
|
break;
|
|
case DUMP_NONE:
|
|
goto out_enable;
|
|
default:
|
|
printk(KERN_TRACE "Bad dumping mode, switching to all CPUs dump\n");
|
|
iter.cpu_file = RING_BUFFER_ALL_CPUS;
|
|
}
|
|
|
|
printk(KERN_TRACE "Dumping ftrace buffer:\n");
|
|
|
|
/* Did function tracer already get disabled? */
|
|
if (ftrace_is_dead()) {
|
|
printk("# WARNING: FUNCTION TRACING IS CORRUPTED\n");
|
|
printk("# MAY BE MISSING FUNCTION EVENTS\n");
|
|
}
|
|
|
|
/*
|
|
* We need to stop all tracing on all CPUS to read the
|
|
* the next buffer. This is a bit expensive, but is
|
|
* not done often. We fill all what we can read,
|
|
* and then release the locks again.
|
|
*/
|
|
|
|
while (!trace_empty(&iter)) {
|
|
|
|
if (!cnt)
|
|
printk(KERN_TRACE "---------------------------------\n");
|
|
|
|
cnt++;
|
|
|
|
/* reset all but tr, trace, and overruns */
|
|
memset(&iter.seq, 0,
|
|
sizeof(struct trace_iterator) -
|
|
offsetof(struct trace_iterator, seq));
|
|
iter.iter_flags |= TRACE_FILE_LAT_FMT;
|
|
iter.pos = -1;
|
|
|
|
if (trace_find_next_entry_inc(&iter) != NULL) {
|
|
int ret;
|
|
|
|
ret = print_trace_line(&iter);
|
|
if (ret != TRACE_TYPE_NO_CONSUME)
|
|
trace_consume(&iter);
|
|
}
|
|
touch_nmi_watchdog();
|
|
|
|
trace_printk_seq(&iter.seq);
|
|
}
|
|
|
|
if (!cnt)
|
|
printk(KERN_TRACE " (ftrace buffer empty)\n");
|
|
else
|
|
printk(KERN_TRACE "---------------------------------\n");
|
|
|
|
out_enable:
|
|
trace_flags |= old_userobj;
|
|
|
|
for_each_tracing_cpu(cpu) {
|
|
atomic_dec(&per_cpu_ptr(iter.trace_buffer->data, cpu)->disabled);
|
|
}
|
|
atomic_dec(&dump_running);
|
|
local_irq_restore(flags);
|
|
}
|
|
EXPORT_SYMBOL_GPL(ftrace_dump);
|
|
|
|
__init static int tracer_alloc_buffers(void)
|
|
{
|
|
int ring_buf_size;
|
|
int ret = -ENOMEM;
|
|
|
|
|
|
if (!alloc_cpumask_var(&tracing_buffer_mask, GFP_KERNEL))
|
|
goto out;
|
|
|
|
if (!alloc_cpumask_var(&global_trace.tracing_cpumask, GFP_KERNEL))
|
|
goto out_free_buffer_mask;
|
|
|
|
/* Only allocate trace_printk buffers if a trace_printk exists */
|
|
if (__stop___trace_bprintk_fmt != __start___trace_bprintk_fmt)
|
|
/* Must be called before global_trace.buffer is allocated */
|
|
trace_printk_init_buffers();
|
|
|
|
/* To save memory, keep the ring buffer size to its minimum */
|
|
if (ring_buffer_expanded)
|
|
ring_buf_size = trace_buf_size;
|
|
else
|
|
ring_buf_size = 1;
|
|
|
|
cpumask_copy(tracing_buffer_mask, cpu_possible_mask);
|
|
cpumask_copy(global_trace.tracing_cpumask, cpu_all_mask);
|
|
|
|
raw_spin_lock_init(&global_trace.start_lock);
|
|
|
|
/* Used for event triggers */
|
|
temp_buffer = ring_buffer_alloc(PAGE_SIZE, RB_FL_OVERWRITE);
|
|
if (!temp_buffer)
|
|
goto out_free_cpumask;
|
|
|
|
if (trace_create_savedcmd() < 0)
|
|
goto out_free_temp_buffer;
|
|
|
|
/* TODO: make the number of buffers hot pluggable with CPUS */
|
|
if (allocate_trace_buffers(&global_trace, ring_buf_size) < 0) {
|
|
printk(KERN_ERR "tracer: failed to allocate ring buffer!\n");
|
|
WARN_ON(1);
|
|
goto out_free_savedcmd;
|
|
}
|
|
|
|
if (global_trace.buffer_disabled)
|
|
tracing_off();
|
|
|
|
if (trace_boot_clock) {
|
|
ret = tracing_set_clock(&global_trace, trace_boot_clock);
|
|
if (ret < 0)
|
|
pr_warning("Trace clock %s not defined, going back to default\n",
|
|
trace_boot_clock);
|
|
}
|
|
|
|
/*
|
|
* register_tracer() might reference current_trace, so it
|
|
* needs to be set before we register anything. This is
|
|
* just a bootstrap of current_trace anyway.
|
|
*/
|
|
global_trace.current_trace = &nop_trace;
|
|
|
|
global_trace.max_lock = (arch_spinlock_t)__ARCH_SPIN_LOCK_UNLOCKED;
|
|
|
|
ftrace_init_global_array_ops(&global_trace);
|
|
|
|
register_tracer(&nop_trace);
|
|
|
|
/* All seems OK, enable tracing */
|
|
tracing_disabled = 0;
|
|
|
|
atomic_notifier_chain_register(&panic_notifier_list,
|
|
&trace_panic_notifier);
|
|
|
|
register_die_notifier(&trace_die_notifier);
|
|
|
|
global_trace.flags = TRACE_ARRAY_FL_GLOBAL;
|
|
|
|
INIT_LIST_HEAD(&global_trace.systems);
|
|
INIT_LIST_HEAD(&global_trace.events);
|
|
list_add(&global_trace.list, &ftrace_trace_arrays);
|
|
|
|
while (trace_boot_options) {
|
|
char *option;
|
|
|
|
option = strsep(&trace_boot_options, ",");
|
|
trace_set_options(&global_trace, option);
|
|
}
|
|
|
|
register_snapshot_cmd();
|
|
|
|
return 0;
|
|
|
|
out_free_savedcmd:
|
|
free_saved_cmdlines_buffer(savedcmd);
|
|
out_free_temp_buffer:
|
|
ring_buffer_free(temp_buffer);
|
|
out_free_cpumask:
|
|
free_cpumask_var(global_trace.tracing_cpumask);
|
|
out_free_buffer_mask:
|
|
free_cpumask_var(tracing_buffer_mask);
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
__init static int clear_boot_tracer(void)
|
|
{
|
|
/*
|
|
* The default tracer at boot buffer is an init section.
|
|
* This function is called in lateinit. If we did not
|
|
* find the boot tracer, then clear it out, to prevent
|
|
* later registration from accessing the buffer that is
|
|
* about to be freed.
|
|
*/
|
|
if (!default_bootup_tracer)
|
|
return 0;
|
|
|
|
printk(KERN_INFO "ftrace bootup tracer '%s' not registered.\n",
|
|
default_bootup_tracer);
|
|
default_bootup_tracer = NULL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
early_initcall(tracer_alloc_buffers);
|
|
fs_initcall(tracer_init_debugfs);
|
|
late_initcall(clear_boot_tracer);
|