mirror of https://gitee.com/openkylin/linux.git
Merge branch 'tracing/core' into perf/core
Merge reason: to add event filter support we need the following commits from the tracing tree: 3f6fe06: tracing/filters: Unify the regex parsing helpers 1889d20: tracing/filters: Provide basic regex support 737f453: tracing/filters: Cleanup useless headers Signed-off-by: Ingo Molnar <mingo@elte.hu>
This commit is contained in:
commit
713490e02e
|
@ -779,6 +779,13 @@ and is between 256 and 4096 characters. It is defined in the file
|
||||||
by the set_ftrace_notrace file in the debugfs
|
by the set_ftrace_notrace file in the debugfs
|
||||||
tracing directory.
|
tracing directory.
|
||||||
|
|
||||||
|
ftrace_graph_filter=[function-list]
|
||||||
|
[FTRACE] Limit the top level callers functions traced
|
||||||
|
by the function graph tracer at boot up.
|
||||||
|
function-list is a comma separated list of functions
|
||||||
|
that can be changed at run time by the
|
||||||
|
set_graph_function file in the debugfs tracing directory.
|
||||||
|
|
||||||
gamecon.map[2|3]=
|
gamecon.map[2|3]=
|
||||||
[HW,JOY] Multisystem joystick and NES/SNES/PSX pad
|
[HW,JOY] Multisystem joystick and NES/SNES/PSX pad
|
||||||
support via parallel port (up to 5 devices per port)
|
support via parallel port (up to 5 devices per port)
|
||||||
|
|
|
@ -213,10 +213,19 @@ If you can't trace NMI functions, then skip this option.
|
||||||
<details to be filled>
|
<details to be filled>
|
||||||
|
|
||||||
|
|
||||||
HAVE_FTRACE_SYSCALLS
|
HAVE_SYSCALL_TRACEPOINTS
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
<details to be filled>
|
You need very few things to get the syscalls tracing in an arch.
|
||||||
|
|
||||||
|
- Have a NR_syscalls variable in <asm/unistd.h> that provides the number
|
||||||
|
of syscalls supported by the arch.
|
||||||
|
- Implement arch_syscall_addr() that resolves a syscall address from a
|
||||||
|
syscall number.
|
||||||
|
- Support the TIF_SYSCALL_TRACEPOINT thread flags
|
||||||
|
- Put the trace_sys_enter() and trace_sys_exit() tracepoints calls from ptrace
|
||||||
|
in the ptrace syscalls tracing path.
|
||||||
|
- Tag this arch as HAVE_SYSCALL_TRACEPOINTS.
|
||||||
|
|
||||||
|
|
||||||
HAVE_FTRACE_MCOUNT_RECORD
|
HAVE_FTRACE_MCOUNT_RECORD
|
||||||
|
|
|
@ -203,73 +203,10 @@ unsigned long prepare_ftrace_return(unsigned long ip, unsigned long parent)
|
||||||
|
|
||||||
#ifdef CONFIG_FTRACE_SYSCALLS
|
#ifdef CONFIG_FTRACE_SYSCALLS
|
||||||
|
|
||||||
extern unsigned long __start_syscalls_metadata[];
|
|
||||||
extern unsigned long __stop_syscalls_metadata[];
|
|
||||||
extern unsigned int sys_call_table[];
|
extern unsigned int sys_call_table[];
|
||||||
|
|
||||||
static struct syscall_metadata **syscalls_metadata;
|
unsigned long __init arch_syscall_addr(int nr)
|
||||||
|
|
||||||
struct syscall_metadata *syscall_nr_to_meta(int nr)
|
|
||||||
{
|
{
|
||||||
if (!syscalls_metadata || nr >= NR_syscalls || nr < 0)
|
return (unsigned long)sys_call_table[nr];
|
||||||
return NULL;
|
|
||||||
|
|
||||||
return syscalls_metadata[nr];
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int syscall_name_to_nr(char *name)
|
|
||||||
{
|
|
||||||
int i;
|
|
||||||
|
|
||||||
if (!syscalls_metadata)
|
|
||||||
return -1;
|
|
||||||
for (i = 0; i < NR_syscalls; i++)
|
|
||||||
if (syscalls_metadata[i])
|
|
||||||
if (!strcmp(syscalls_metadata[i]->name, name))
|
|
||||||
return i;
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
void set_syscall_enter_id(int num, int id)
|
|
||||||
{
|
|
||||||
syscalls_metadata[num]->enter_id = id;
|
|
||||||
}
|
|
||||||
|
|
||||||
void set_syscall_exit_id(int num, int id)
|
|
||||||
{
|
|
||||||
syscalls_metadata[num]->exit_id = id;
|
|
||||||
}
|
|
||||||
|
|
||||||
static struct syscall_metadata *find_syscall_meta(unsigned long syscall)
|
|
||||||
{
|
|
||||||
struct syscall_metadata *start;
|
|
||||||
struct syscall_metadata *stop;
|
|
||||||
char str[KSYM_SYMBOL_LEN];
|
|
||||||
|
|
||||||
start = (struct syscall_metadata *)__start_syscalls_metadata;
|
|
||||||
stop = (struct syscall_metadata *)__stop_syscalls_metadata;
|
|
||||||
kallsyms_lookup(syscall, NULL, NULL, NULL, str);
|
|
||||||
|
|
||||||
for ( ; start < stop; start++) {
|
|
||||||
if (start->name && !strcmp(start->name + 3, str + 3))
|
|
||||||
return start;
|
|
||||||
}
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int __init arch_init_ftrace_syscalls(void)
|
|
||||||
{
|
|
||||||
struct syscall_metadata *meta;
|
|
||||||
int i;
|
|
||||||
syscalls_metadata = kzalloc(sizeof(*syscalls_metadata) * NR_syscalls,
|
|
||||||
GFP_KERNEL);
|
|
||||||
if (!syscalls_metadata)
|
|
||||||
return -ENOMEM;
|
|
||||||
for (i = 0; i < NR_syscalls; i++) {
|
|
||||||
meta = find_syscall_meta((unsigned long)sys_call_table[i]);
|
|
||||||
syscalls_metadata[i] = meta;
|
|
||||||
}
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
arch_initcall(arch_init_ftrace_syscalls);
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -1185,17 +1185,14 @@ END(ftrace_graph_caller)
|
||||||
|
|
||||||
.globl return_to_handler
|
.globl return_to_handler
|
||||||
return_to_handler:
|
return_to_handler:
|
||||||
pushl $0
|
|
||||||
pushl %eax
|
pushl %eax
|
||||||
pushl %ecx
|
|
||||||
pushl %edx
|
pushl %edx
|
||||||
movl %ebp, %eax
|
movl %ebp, %eax
|
||||||
call ftrace_return_to_handler
|
call ftrace_return_to_handler
|
||||||
movl %eax, 0xc(%esp)
|
movl %eax, %ecx
|
||||||
popl %edx
|
popl %edx
|
||||||
popl %ecx
|
|
||||||
popl %eax
|
popl %eax
|
||||||
ret
|
jmp *%ecx
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
.section .rodata,"a"
|
.section .rodata,"a"
|
||||||
|
|
|
@ -155,11 +155,11 @@ GLOBAL(return_to_handler)
|
||||||
|
|
||||||
call ftrace_return_to_handler
|
call ftrace_return_to_handler
|
||||||
|
|
||||||
movq %rax, 16(%rsp)
|
movq %rax, %rdi
|
||||||
movq 8(%rsp), %rdx
|
movq 8(%rsp), %rdx
|
||||||
movq (%rsp), %rax
|
movq (%rsp), %rax
|
||||||
addq $16, %rsp
|
addq $24, %rsp
|
||||||
retq
|
jmp *%rdi
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -9,6 +9,8 @@
|
||||||
* the dangers of modifying code on the run.
|
* the dangers of modifying code on the run.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||||
|
|
||||||
#include <linux/spinlock.h>
|
#include <linux/spinlock.h>
|
||||||
#include <linux/hardirq.h>
|
#include <linux/hardirq.h>
|
||||||
#include <linux/uaccess.h>
|
#include <linux/uaccess.h>
|
||||||
|
@ -336,15 +338,15 @@ int __init ftrace_dyn_arch_init(void *data)
|
||||||
|
|
||||||
switch (faulted) {
|
switch (faulted) {
|
||||||
case 0:
|
case 0:
|
||||||
pr_info("ftrace: converting mcount calls to 0f 1f 44 00 00\n");
|
pr_info("converting mcount calls to 0f 1f 44 00 00\n");
|
||||||
memcpy(ftrace_nop, ftrace_test_p6nop, MCOUNT_INSN_SIZE);
|
memcpy(ftrace_nop, ftrace_test_p6nop, MCOUNT_INSN_SIZE);
|
||||||
break;
|
break;
|
||||||
case 1:
|
case 1:
|
||||||
pr_info("ftrace: converting mcount calls to 66 66 66 66 90\n");
|
pr_info("converting mcount calls to 66 66 66 66 90\n");
|
||||||
memcpy(ftrace_nop, ftrace_test_nop5, MCOUNT_INSN_SIZE);
|
memcpy(ftrace_nop, ftrace_test_nop5, MCOUNT_INSN_SIZE);
|
||||||
break;
|
break;
|
||||||
case 2:
|
case 2:
|
||||||
pr_info("ftrace: converting mcount calls to jmp . + 5\n");
|
pr_info("converting mcount calls to jmp . + 5\n");
|
||||||
memcpy(ftrace_nop, ftrace_test_jmp, MCOUNT_INSN_SIZE);
|
memcpy(ftrace_nop, ftrace_test_jmp, MCOUNT_INSN_SIZE);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -468,82 +470,10 @@ void prepare_ftrace_return(unsigned long *parent, unsigned long self_addr,
|
||||||
|
|
||||||
#ifdef CONFIG_FTRACE_SYSCALLS
|
#ifdef CONFIG_FTRACE_SYSCALLS
|
||||||
|
|
||||||
extern unsigned long __start_syscalls_metadata[];
|
|
||||||
extern unsigned long __stop_syscalls_metadata[];
|
|
||||||
extern unsigned long *sys_call_table;
|
extern unsigned long *sys_call_table;
|
||||||
|
|
||||||
static struct syscall_metadata **syscalls_metadata;
|
unsigned long __init arch_syscall_addr(int nr)
|
||||||
|
|
||||||
static struct syscall_metadata *find_syscall_meta(unsigned long *syscall)
|
|
||||||
{
|
{
|
||||||
struct syscall_metadata *start;
|
return (unsigned long)(&sys_call_table)[nr];
|
||||||
struct syscall_metadata *stop;
|
|
||||||
char str[KSYM_SYMBOL_LEN];
|
|
||||||
|
|
||||||
|
|
||||||
start = (struct syscall_metadata *)__start_syscalls_metadata;
|
|
||||||
stop = (struct syscall_metadata *)__stop_syscalls_metadata;
|
|
||||||
kallsyms_lookup((unsigned long) syscall, NULL, NULL, NULL, str);
|
|
||||||
|
|
||||||
for ( ; start < stop; start++) {
|
|
||||||
if (start->name && !strcmp(start->name, str))
|
|
||||||
return start;
|
|
||||||
}
|
}
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
struct syscall_metadata *syscall_nr_to_meta(int nr)
|
|
||||||
{
|
|
||||||
if (!syscalls_metadata || nr >= NR_syscalls || nr < 0)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
return syscalls_metadata[nr];
|
|
||||||
}
|
|
||||||
|
|
||||||
int syscall_name_to_nr(char *name)
|
|
||||||
{
|
|
||||||
int i;
|
|
||||||
|
|
||||||
if (!syscalls_metadata)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
for (i = 0; i < NR_syscalls; i++) {
|
|
||||||
if (syscalls_metadata[i]) {
|
|
||||||
if (!strcmp(syscalls_metadata[i]->name, name))
|
|
||||||
return i;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
void set_syscall_enter_id(int num, int id)
|
|
||||||
{
|
|
||||||
syscalls_metadata[num]->enter_id = id;
|
|
||||||
}
|
|
||||||
|
|
||||||
void set_syscall_exit_id(int num, int id)
|
|
||||||
{
|
|
||||||
syscalls_metadata[num]->exit_id = id;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int __init arch_init_ftrace_syscalls(void)
|
|
||||||
{
|
|
||||||
int i;
|
|
||||||
struct syscall_metadata *meta;
|
|
||||||
unsigned long **psys_syscall_table = &sys_call_table;
|
|
||||||
|
|
||||||
syscalls_metadata = kzalloc(sizeof(*syscalls_metadata) *
|
|
||||||
NR_syscalls, GFP_KERNEL);
|
|
||||||
if (!syscalls_metadata) {
|
|
||||||
WARN_ON(1);
|
|
||||||
return -ENOMEM;
|
|
||||||
}
|
|
||||||
|
|
||||||
for (i = 0; i < NR_syscalls; i++) {
|
|
||||||
meta = find_syscall_meta(psys_syscall_table[i]);
|
|
||||||
syscalls_metadata[i] = meta;
|
|
||||||
}
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
arch_initcall(arch_init_ftrace_syscalls);
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -1,12 +1,13 @@
|
||||||
/*
|
/*
|
||||||
* Written by Pekka Paalanen, 2008-2009 <pq@iki.fi>
|
* Written by Pekka Paalanen, 2008-2009 <pq@iki.fi>
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||||
|
|
||||||
#include <linux/module.h>
|
#include <linux/module.h>
|
||||||
#include <linux/io.h>
|
#include <linux/io.h>
|
||||||
#include <linux/mmiotrace.h>
|
#include <linux/mmiotrace.h>
|
||||||
|
|
||||||
#define MODULE_NAME "testmmiotrace"
|
|
||||||
|
|
||||||
static unsigned long mmio_address;
|
static unsigned long mmio_address;
|
||||||
module_param(mmio_address, ulong, 0);
|
module_param(mmio_address, ulong, 0);
|
||||||
MODULE_PARM_DESC(mmio_address, " Start address of the mapping of 16 kB "
|
MODULE_PARM_DESC(mmio_address, " Start address of the mapping of 16 kB "
|
||||||
|
@ -30,7 +31,7 @@ static unsigned v32(unsigned i)
|
||||||
static void do_write_test(void __iomem *p)
|
static void do_write_test(void __iomem *p)
|
||||||
{
|
{
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
pr_info(MODULE_NAME ": write test.\n");
|
pr_info("write test.\n");
|
||||||
mmiotrace_printk("Write test.\n");
|
mmiotrace_printk("Write test.\n");
|
||||||
|
|
||||||
for (i = 0; i < 256; i++)
|
for (i = 0; i < 256; i++)
|
||||||
|
@ -47,7 +48,7 @@ static void do_read_test(void __iomem *p)
|
||||||
{
|
{
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
unsigned errs[3] = { 0 };
|
unsigned errs[3] = { 0 };
|
||||||
pr_info(MODULE_NAME ": read test.\n");
|
pr_info("read test.\n");
|
||||||
mmiotrace_printk("Read test.\n");
|
mmiotrace_printk("Read test.\n");
|
||||||
|
|
||||||
for (i = 0; i < 256; i++)
|
for (i = 0; i < 256; i++)
|
||||||
|
@ -68,7 +69,7 @@ static void do_read_test(void __iomem *p)
|
||||||
|
|
||||||
static void do_read_far_test(void __iomem *p)
|
static void do_read_far_test(void __iomem *p)
|
||||||
{
|
{
|
||||||
pr_info(MODULE_NAME ": read far test.\n");
|
pr_info("read far test.\n");
|
||||||
mmiotrace_printk("Read far test.\n");
|
mmiotrace_printk("Read far test.\n");
|
||||||
|
|
||||||
ioread32(p + read_far);
|
ioread32(p + read_far);
|
||||||
|
@ -78,7 +79,7 @@ static void do_test(unsigned long size)
|
||||||
{
|
{
|
||||||
void __iomem *p = ioremap_nocache(mmio_address, size);
|
void __iomem *p = ioremap_nocache(mmio_address, size);
|
||||||
if (!p) {
|
if (!p) {
|
||||||
pr_err(MODULE_NAME ": could not ioremap, aborting.\n");
|
pr_err("could not ioremap, aborting.\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
mmiotrace_printk("ioremap returned %p.\n", p);
|
mmiotrace_printk("ioremap returned %p.\n", p);
|
||||||
|
@ -94,24 +95,22 @@ static int __init init(void)
|
||||||
unsigned long size = (read_far) ? (8 << 20) : (16 << 10);
|
unsigned long size = (read_far) ? (8 << 20) : (16 << 10);
|
||||||
|
|
||||||
if (mmio_address == 0) {
|
if (mmio_address == 0) {
|
||||||
pr_err(MODULE_NAME ": you have to use the module argument "
|
pr_err("you have to use the module argument mmio_address.\n");
|
||||||
"mmio_address.\n");
|
pr_err("DO NOT LOAD THIS MODULE UNLESS YOU REALLY KNOW WHAT YOU ARE DOING!\n");
|
||||||
pr_err(MODULE_NAME ": DO NOT LOAD THIS MODULE UNLESS"
|
|
||||||
" YOU REALLY KNOW WHAT YOU ARE DOING!\n");
|
|
||||||
return -ENXIO;
|
return -ENXIO;
|
||||||
}
|
}
|
||||||
|
|
||||||
pr_warning(MODULE_NAME ": WARNING: mapping %lu kB @ 0x%08lx in PCI "
|
pr_warning("WARNING: mapping %lu kB @ 0x%08lx in PCI address space, "
|
||||||
"address space, and writing 16 kB of rubbish in there.\n",
|
"and writing 16 kB of rubbish in there.\n",
|
||||||
size >> 10, mmio_address);
|
size >> 10, mmio_address);
|
||||||
do_test(size);
|
do_test(size);
|
||||||
pr_info(MODULE_NAME ": All done.\n");
|
pr_info("All done.\n");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void __exit cleanup(void)
|
static void __exit cleanup(void)
|
||||||
{
|
{
|
||||||
pr_debug(MODULE_NAME ": unloaded.\n");
|
pr_debug("unloaded.\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
module_init(init);
|
module_init(init);
|
||||||
|
|
|
@ -24,8 +24,21 @@ static inline int reacquire_kernel_lock(struct task_struct *task)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
extern void __lockfunc lock_kernel(void) __acquires(kernel_lock);
|
extern void __lockfunc
|
||||||
extern void __lockfunc unlock_kernel(void) __releases(kernel_lock);
|
_lock_kernel(const char *func, const char *file, int line)
|
||||||
|
__acquires(kernel_lock);
|
||||||
|
|
||||||
|
extern void __lockfunc
|
||||||
|
_unlock_kernel(const char *func, const char *file, int line)
|
||||||
|
__releases(kernel_lock);
|
||||||
|
|
||||||
|
#define lock_kernel() do { \
|
||||||
|
_lock_kernel(__func__, __FILE__, __LINE__); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define unlock_kernel() do { \
|
||||||
|
_unlock_kernel(__func__, __FILE__, __LINE__); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Various legacy drivers don't really need the BKL in a specific
|
* Various legacy drivers don't really need the BKL in a specific
|
||||||
|
@ -41,8 +54,8 @@ static inline void cycle_kernel_lock(void)
|
||||||
|
|
||||||
#else
|
#else
|
||||||
|
|
||||||
#define lock_kernel() do { } while(0)
|
#define lock_kernel()
|
||||||
#define unlock_kernel() do { } while(0)
|
#define unlock_kernel()
|
||||||
#define release_kernel_lock(task) do { } while(0)
|
#define release_kernel_lock(task) do { } while(0)
|
||||||
#define cycle_kernel_lock() do { } while(0)
|
#define cycle_kernel_lock() do { } while(0)
|
||||||
#define reacquire_kernel_lock(task) 0
|
#define reacquire_kernel_lock(task) 0
|
||||||
|
|
|
@ -0,0 +1,61 @@
|
||||||
|
#undef TRACE_SYSTEM
|
||||||
|
#define TRACE_SYSTEM bkl
|
||||||
|
|
||||||
|
#if !defined(_TRACE_BKL_H) || defined(TRACE_HEADER_MULTI_READ)
|
||||||
|
#define _TRACE_BKL_H
|
||||||
|
|
||||||
|
#include <linux/tracepoint.h>
|
||||||
|
|
||||||
|
TRACE_EVENT(lock_kernel,
|
||||||
|
|
||||||
|
TP_PROTO(const char *func, const char *file, int line),
|
||||||
|
|
||||||
|
TP_ARGS(func, file, line),
|
||||||
|
|
||||||
|
TP_STRUCT__entry(
|
||||||
|
__field( int, lock_depth )
|
||||||
|
__field_ext( const char *, func, FILTER_PTR_STRING )
|
||||||
|
__field_ext( const char *, file, FILTER_PTR_STRING )
|
||||||
|
__field( int, line )
|
||||||
|
),
|
||||||
|
|
||||||
|
TP_fast_assign(
|
||||||
|
/* We want to record the lock_depth after lock is acquired */
|
||||||
|
__entry->lock_depth = current->lock_depth + 1;
|
||||||
|
__entry->func = func;
|
||||||
|
__entry->file = file;
|
||||||
|
__entry->line = line;
|
||||||
|
),
|
||||||
|
|
||||||
|
TP_printk("depth: %d, %s:%d %s()", __entry->lock_depth,
|
||||||
|
__entry->file, __entry->line, __entry->func)
|
||||||
|
);
|
||||||
|
|
||||||
|
TRACE_EVENT(unlock_kernel,
|
||||||
|
|
||||||
|
TP_PROTO(const char *func, const char *file, int line),
|
||||||
|
|
||||||
|
TP_ARGS(func, file, line),
|
||||||
|
|
||||||
|
TP_STRUCT__entry(
|
||||||
|
__field(int, lock_depth)
|
||||||
|
__field(const char *, func)
|
||||||
|
__field(const char *, file)
|
||||||
|
__field(int, line)
|
||||||
|
),
|
||||||
|
|
||||||
|
TP_fast_assign(
|
||||||
|
__entry->lock_depth = current->lock_depth;
|
||||||
|
__entry->func = func;
|
||||||
|
__entry->file = file;
|
||||||
|
__entry->line = line;
|
||||||
|
),
|
||||||
|
|
||||||
|
TP_printk("depth: %d, %s:%d %s()", __entry->lock_depth,
|
||||||
|
__entry->file, __entry->line, __entry->func)
|
||||||
|
);
|
||||||
|
|
||||||
|
#endif /* _TRACE_BKL_H */
|
||||||
|
|
||||||
|
/* This part must be outside protection */
|
||||||
|
#include <trace/define_trace.h>
|
|
@ -33,7 +33,7 @@ struct syscall_metadata {
|
||||||
};
|
};
|
||||||
|
|
||||||
#ifdef CONFIG_FTRACE_SYSCALLS
|
#ifdef CONFIG_FTRACE_SYSCALLS
|
||||||
extern struct syscall_metadata *syscall_nr_to_meta(int nr);
|
extern unsigned long arch_syscall_addr(int nr);
|
||||||
extern int syscall_name_to_nr(char *name);
|
extern int syscall_name_to_nr(char *name);
|
||||||
void set_syscall_enter_id(int num, int id);
|
void set_syscall_enter_id(int num, int id);
|
||||||
void set_syscall_exit_id(int num, int id);
|
void set_syscall_exit_id(int num, int id);
|
||||||
|
|
|
@ -60,6 +60,13 @@ static int last_ftrace_enabled;
|
||||||
/* Quick disabling of function tracer. */
|
/* Quick disabling of function tracer. */
|
||||||
int function_trace_stop;
|
int function_trace_stop;
|
||||||
|
|
||||||
|
/* List for set_ftrace_pid's pids. */
|
||||||
|
LIST_HEAD(ftrace_pids);
|
||||||
|
struct ftrace_pid {
|
||||||
|
struct list_head list;
|
||||||
|
struct pid *pid;
|
||||||
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* ftrace_disabled is set when an anomaly is discovered.
|
* ftrace_disabled is set when an anomaly is discovered.
|
||||||
* ftrace_disabled is much stronger than ftrace_enabled.
|
* ftrace_disabled is much stronger than ftrace_enabled.
|
||||||
|
@ -78,6 +85,10 @@ ftrace_func_t ftrace_trace_function __read_mostly = ftrace_stub;
|
||||||
ftrace_func_t __ftrace_trace_function __read_mostly = ftrace_stub;
|
ftrace_func_t __ftrace_trace_function __read_mostly = ftrace_stub;
|
||||||
ftrace_func_t ftrace_pid_function __read_mostly = ftrace_stub;
|
ftrace_func_t ftrace_pid_function __read_mostly = ftrace_stub;
|
||||||
|
|
||||||
|
#ifdef CONFIG_FUNCTION_GRAPH_TRACER
|
||||||
|
static int ftrace_set_func(unsigned long *array, int *idx, char *buffer);
|
||||||
|
#endif
|
||||||
|
|
||||||
static void ftrace_list_func(unsigned long ip, unsigned long parent_ip)
|
static void ftrace_list_func(unsigned long ip, unsigned long parent_ip)
|
||||||
{
|
{
|
||||||
struct ftrace_ops *op = ftrace_list;
|
struct ftrace_ops *op = ftrace_list;
|
||||||
|
@ -155,7 +166,7 @@ static int __register_ftrace_function(struct ftrace_ops *ops)
|
||||||
else
|
else
|
||||||
func = ftrace_list_func;
|
func = ftrace_list_func;
|
||||||
|
|
||||||
if (ftrace_pid_trace) {
|
if (!list_empty(&ftrace_pids)) {
|
||||||
set_ftrace_pid_function(func);
|
set_ftrace_pid_function(func);
|
||||||
func = ftrace_pid_func;
|
func = ftrace_pid_func;
|
||||||
}
|
}
|
||||||
|
@ -203,7 +214,7 @@ static int __unregister_ftrace_function(struct ftrace_ops *ops)
|
||||||
if (ftrace_list->next == &ftrace_list_end) {
|
if (ftrace_list->next == &ftrace_list_end) {
|
||||||
ftrace_func_t func = ftrace_list->func;
|
ftrace_func_t func = ftrace_list->func;
|
||||||
|
|
||||||
if (ftrace_pid_trace) {
|
if (!list_empty(&ftrace_pids)) {
|
||||||
set_ftrace_pid_function(func);
|
set_ftrace_pid_function(func);
|
||||||
func = ftrace_pid_func;
|
func = ftrace_pid_func;
|
||||||
}
|
}
|
||||||
|
@ -231,7 +242,7 @@ static void ftrace_update_pid_func(void)
|
||||||
func = __ftrace_trace_function;
|
func = __ftrace_trace_function;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (ftrace_pid_trace) {
|
if (!list_empty(&ftrace_pids)) {
|
||||||
set_ftrace_pid_function(func);
|
set_ftrace_pid_function(func);
|
||||||
func = ftrace_pid_func;
|
func = ftrace_pid_func;
|
||||||
} else {
|
} else {
|
||||||
|
@ -821,8 +832,6 @@ static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
|
||||||
}
|
}
|
||||||
#endif /* CONFIG_FUNCTION_PROFILER */
|
#endif /* CONFIG_FUNCTION_PROFILER */
|
||||||
|
|
||||||
/* set when tracing only a pid */
|
|
||||||
struct pid *ftrace_pid_trace;
|
|
||||||
static struct pid * const ftrace_swapper_pid = &init_struct_pid;
|
static struct pid * const ftrace_swapper_pid = &init_struct_pid;
|
||||||
|
|
||||||
#ifdef CONFIG_DYNAMIC_FTRACE
|
#ifdef CONFIG_DYNAMIC_FTRACE
|
||||||
|
@ -1261,13 +1270,35 @@ static int ftrace_update_code(struct module *mod)
|
||||||
ftrace_new_addrs = p->newlist;
|
ftrace_new_addrs = p->newlist;
|
||||||
p->flags = 0L;
|
p->flags = 0L;
|
||||||
|
|
||||||
/* convert record (i.e, patch mcount-call with NOP) */
|
/*
|
||||||
if (ftrace_code_disable(mod, p)) {
|
* Do the initial record convertion from mcount jump
|
||||||
|
* to the NOP instructions.
|
||||||
|
*/
|
||||||
|
if (!ftrace_code_disable(mod, p)) {
|
||||||
|
ftrace_free_rec(p);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
p->flags |= FTRACE_FL_CONVERTED;
|
p->flags |= FTRACE_FL_CONVERTED;
|
||||||
ftrace_update_cnt++;
|
ftrace_update_cnt++;
|
||||||
} else
|
|
||||||
|
/*
|
||||||
|
* If the tracing is enabled, go ahead and enable the record.
|
||||||
|
*
|
||||||
|
* The reason not to enable the record immediatelly is the
|
||||||
|
* inherent check of ftrace_make_nop/ftrace_make_call for
|
||||||
|
* correct previous instructions. Making first the NOP
|
||||||
|
* conversion puts the module to the correct state, thus
|
||||||
|
* passing the ftrace_make_call check.
|
||||||
|
*/
|
||||||
|
if (ftrace_start_up) {
|
||||||
|
int failed = __ftrace_replace_code(p, 1);
|
||||||
|
if (failed) {
|
||||||
|
ftrace_bug(failed, p->ip);
|
||||||
ftrace_free_rec(p);
|
ftrace_free_rec(p);
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
stop = ftrace_now(raw_smp_processor_id());
|
stop = ftrace_now(raw_smp_processor_id());
|
||||||
ftrace_update_time = stop - start;
|
ftrace_update_time = stop - start;
|
||||||
|
@ -1656,60 +1687,6 @@ ftrace_regex_lseek(struct file *file, loff_t offset, int origin)
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
enum {
|
|
||||||
MATCH_FULL,
|
|
||||||
MATCH_FRONT_ONLY,
|
|
||||||
MATCH_MIDDLE_ONLY,
|
|
||||||
MATCH_END_ONLY,
|
|
||||||
};
|
|
||||||
|
|
||||||
/*
|
|
||||||
* (static function - no need for kernel doc)
|
|
||||||
*
|
|
||||||
* Pass in a buffer containing a glob and this function will
|
|
||||||
* set search to point to the search part of the buffer and
|
|
||||||
* return the type of search it is (see enum above).
|
|
||||||
* This does modify buff.
|
|
||||||
*
|
|
||||||
* Returns enum type.
|
|
||||||
* search returns the pointer to use for comparison.
|
|
||||||
* not returns 1 if buff started with a '!'
|
|
||||||
* 0 otherwise.
|
|
||||||
*/
|
|
||||||
static int
|
|
||||||
ftrace_setup_glob(char *buff, int len, char **search, int *not)
|
|
||||||
{
|
|
||||||
int type = MATCH_FULL;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
if (buff[0] == '!') {
|
|
||||||
*not = 1;
|
|
||||||
buff++;
|
|
||||||
len--;
|
|
||||||
} else
|
|
||||||
*not = 0;
|
|
||||||
|
|
||||||
*search = buff;
|
|
||||||
|
|
||||||
for (i = 0; i < len; i++) {
|
|
||||||
if (buff[i] == '*') {
|
|
||||||
if (!i) {
|
|
||||||
*search = buff + 1;
|
|
||||||
type = MATCH_END_ONLY;
|
|
||||||
} else {
|
|
||||||
if (type == MATCH_END_ONLY)
|
|
||||||
type = MATCH_MIDDLE_ONLY;
|
|
||||||
else
|
|
||||||
type = MATCH_FRONT_ONLY;
|
|
||||||
buff[i] = 0;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return type;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int ftrace_match(char *str, char *regex, int len, int type)
|
static int ftrace_match(char *str, char *regex, int len, int type)
|
||||||
{
|
{
|
||||||
int matched = 0;
|
int matched = 0;
|
||||||
|
@ -1758,7 +1735,7 @@ static void ftrace_match_records(char *buff, int len, int enable)
|
||||||
int not;
|
int not;
|
||||||
|
|
||||||
flag = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
|
flag = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
|
||||||
type = ftrace_setup_glob(buff, len, &search, ¬);
|
type = filter_parse_regex(buff, len, &search, ¬);
|
||||||
|
|
||||||
search_len = strlen(search);
|
search_len = strlen(search);
|
||||||
|
|
||||||
|
@ -1826,7 +1803,7 @@ static void ftrace_match_module_records(char *buff, char *mod, int enable)
|
||||||
}
|
}
|
||||||
|
|
||||||
if (strlen(buff)) {
|
if (strlen(buff)) {
|
||||||
type = ftrace_setup_glob(buff, strlen(buff), &search, ¬);
|
type = filter_parse_regex(buff, strlen(buff), &search, ¬);
|
||||||
search_len = strlen(search);
|
search_len = strlen(search);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1991,7 +1968,7 @@ register_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
|
||||||
int count = 0;
|
int count = 0;
|
||||||
char *search;
|
char *search;
|
||||||
|
|
||||||
type = ftrace_setup_glob(glob, strlen(glob), &search, ¬);
|
type = filter_parse_regex(glob, strlen(glob), &search, ¬);
|
||||||
len = strlen(search);
|
len = strlen(search);
|
||||||
|
|
||||||
/* we do not support '!' for function probes */
|
/* we do not support '!' for function probes */
|
||||||
|
@ -2068,7 +2045,7 @@ __unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
|
||||||
else if (glob) {
|
else if (glob) {
|
||||||
int not;
|
int not;
|
||||||
|
|
||||||
type = ftrace_setup_glob(glob, strlen(glob), &search, ¬);
|
type = filter_parse_regex(glob, strlen(glob), &search, ¬);
|
||||||
len = strlen(search);
|
len = strlen(search);
|
||||||
|
|
||||||
/* we do not support '!' for function probes */
|
/* we do not support '!' for function probes */
|
||||||
|
@ -2297,6 +2274,7 @@ void ftrace_set_notrace(unsigned char *buf, int len, int reset)
|
||||||
#define FTRACE_FILTER_SIZE COMMAND_LINE_SIZE
|
#define FTRACE_FILTER_SIZE COMMAND_LINE_SIZE
|
||||||
static char ftrace_notrace_buf[FTRACE_FILTER_SIZE] __initdata;
|
static char ftrace_notrace_buf[FTRACE_FILTER_SIZE] __initdata;
|
||||||
static char ftrace_filter_buf[FTRACE_FILTER_SIZE] __initdata;
|
static char ftrace_filter_buf[FTRACE_FILTER_SIZE] __initdata;
|
||||||
|
static char ftrace_graph_buf[FTRACE_FILTER_SIZE] __initdata;
|
||||||
|
|
||||||
static int __init set_ftrace_notrace(char *str)
|
static int __init set_ftrace_notrace(char *str)
|
||||||
{
|
{
|
||||||
|
@ -2312,6 +2290,31 @@ static int __init set_ftrace_filter(char *str)
|
||||||
}
|
}
|
||||||
__setup("ftrace_filter=", set_ftrace_filter);
|
__setup("ftrace_filter=", set_ftrace_filter);
|
||||||
|
|
||||||
|
#ifdef CONFIG_FUNCTION_GRAPH_TRACER
|
||||||
|
static int __init set_graph_function(char *str)
|
||||||
|
{
|
||||||
|
strlcpy(ftrace_graph_buf, str, FTRACE_FILTER_SIZE);
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
__setup("ftrace_graph_filter=", set_graph_function);
|
||||||
|
|
||||||
|
static void __init set_ftrace_early_graph(char *buf)
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
char *func;
|
||||||
|
|
||||||
|
while (buf) {
|
||||||
|
func = strsep(&buf, ",");
|
||||||
|
/* we allow only one expression at a time */
|
||||||
|
ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
|
||||||
|
func);
|
||||||
|
if (ret)
|
||||||
|
printk(KERN_DEBUG "ftrace: function %s not "
|
||||||
|
"traceable\n", func);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
|
||||||
|
|
||||||
static void __init set_ftrace_early_filter(char *buf, int enable)
|
static void __init set_ftrace_early_filter(char *buf, int enable)
|
||||||
{
|
{
|
||||||
char *func;
|
char *func;
|
||||||
|
@ -2328,6 +2331,10 @@ static void __init set_ftrace_early_filters(void)
|
||||||
set_ftrace_early_filter(ftrace_filter_buf, 1);
|
set_ftrace_early_filter(ftrace_filter_buf, 1);
|
||||||
if (ftrace_notrace_buf[0])
|
if (ftrace_notrace_buf[0])
|
||||||
set_ftrace_early_filter(ftrace_notrace_buf, 0);
|
set_ftrace_early_filter(ftrace_notrace_buf, 0);
|
||||||
|
#ifdef CONFIG_FUNCTION_GRAPH_TRACER
|
||||||
|
if (ftrace_graph_buf[0])
|
||||||
|
set_ftrace_early_graph(ftrace_graph_buf);
|
||||||
|
#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
|
@ -2513,7 +2520,7 @@ ftrace_set_func(unsigned long *array, int *idx, char *buffer)
|
||||||
return -ENODEV;
|
return -ENODEV;
|
||||||
|
|
||||||
/* decode regex */
|
/* decode regex */
|
||||||
type = ftrace_setup_glob(buffer, strlen(buffer), &search, ¬);
|
type = filter_parse_regex(buffer, strlen(buffer), &search, ¬);
|
||||||
if (not)
|
if (not)
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
|
@ -2624,7 +2631,7 @@ static __init int ftrace_init_dyn_debugfs(struct dentry *d_tracer)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int ftrace_convert_nops(struct module *mod,
|
static int ftrace_process_locs(struct module *mod,
|
||||||
unsigned long *start,
|
unsigned long *start,
|
||||||
unsigned long *end)
|
unsigned long *end)
|
||||||
{
|
{
|
||||||
|
@ -2684,7 +2691,7 @@ static void ftrace_init_module(struct module *mod,
|
||||||
{
|
{
|
||||||
if (ftrace_disabled || start == end)
|
if (ftrace_disabled || start == end)
|
||||||
return;
|
return;
|
||||||
ftrace_convert_nops(mod, start, end);
|
ftrace_process_locs(mod, start, end);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int ftrace_module_notify(struct notifier_block *self,
|
static int ftrace_module_notify(struct notifier_block *self,
|
||||||
|
@ -2745,7 +2752,7 @@ void __init ftrace_init(void)
|
||||||
|
|
||||||
last_ftrace_enabled = ftrace_enabled = 1;
|
last_ftrace_enabled = ftrace_enabled = 1;
|
||||||
|
|
||||||
ret = ftrace_convert_nops(NULL,
|
ret = ftrace_process_locs(NULL,
|
||||||
__start_mcount_loc,
|
__start_mcount_loc,
|
||||||
__stop_mcount_loc);
|
__stop_mcount_loc);
|
||||||
|
|
||||||
|
@ -2778,23 +2785,6 @@ static inline void ftrace_startup_enable(int command) { }
|
||||||
# define ftrace_shutdown_sysctl() do { } while (0)
|
# define ftrace_shutdown_sysctl() do { } while (0)
|
||||||
#endif /* CONFIG_DYNAMIC_FTRACE */
|
#endif /* CONFIG_DYNAMIC_FTRACE */
|
||||||
|
|
||||||
static ssize_t
|
|
||||||
ftrace_pid_read(struct file *file, char __user *ubuf,
|
|
||||||
size_t cnt, loff_t *ppos)
|
|
||||||
{
|
|
||||||
char buf[64];
|
|
||||||
int r;
|
|
||||||
|
|
||||||
if (ftrace_pid_trace == ftrace_swapper_pid)
|
|
||||||
r = sprintf(buf, "swapper tasks\n");
|
|
||||||
else if (ftrace_pid_trace)
|
|
||||||
r = sprintf(buf, "%u\n", pid_vnr(ftrace_pid_trace));
|
|
||||||
else
|
|
||||||
r = sprintf(buf, "no pid\n");
|
|
||||||
|
|
||||||
return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void clear_ftrace_swapper(void)
|
static void clear_ftrace_swapper(void)
|
||||||
{
|
{
|
||||||
struct task_struct *p;
|
struct task_struct *p;
|
||||||
|
@ -2845,14 +2835,12 @@ static void set_ftrace_pid(struct pid *pid)
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
}
|
}
|
||||||
|
|
||||||
static void clear_ftrace_pid_task(struct pid **pid)
|
static void clear_ftrace_pid_task(struct pid *pid)
|
||||||
{
|
{
|
||||||
if (*pid == ftrace_swapper_pid)
|
if (pid == ftrace_swapper_pid)
|
||||||
clear_ftrace_swapper();
|
clear_ftrace_swapper();
|
||||||
else
|
else
|
||||||
clear_ftrace_pid(*pid);
|
clear_ftrace_pid(pid);
|
||||||
|
|
||||||
*pid = NULL;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void set_ftrace_pid_task(struct pid *pid)
|
static void set_ftrace_pid_task(struct pid *pid)
|
||||||
|
@ -2863,11 +2851,140 @@ static void set_ftrace_pid_task(struct pid *pid)
|
||||||
set_ftrace_pid(pid);
|
set_ftrace_pid(pid);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int ftrace_pid_add(int p)
|
||||||
|
{
|
||||||
|
struct pid *pid;
|
||||||
|
struct ftrace_pid *fpid;
|
||||||
|
int ret = -EINVAL;
|
||||||
|
|
||||||
|
mutex_lock(&ftrace_lock);
|
||||||
|
|
||||||
|
if (!p)
|
||||||
|
pid = ftrace_swapper_pid;
|
||||||
|
else
|
||||||
|
pid = find_get_pid(p);
|
||||||
|
|
||||||
|
if (!pid)
|
||||||
|
goto out;
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
list_for_each_entry(fpid, &ftrace_pids, list)
|
||||||
|
if (fpid->pid == pid)
|
||||||
|
goto out_put;
|
||||||
|
|
||||||
|
ret = -ENOMEM;
|
||||||
|
|
||||||
|
fpid = kmalloc(sizeof(*fpid), GFP_KERNEL);
|
||||||
|
if (!fpid)
|
||||||
|
goto out_put;
|
||||||
|
|
||||||
|
list_add(&fpid->list, &ftrace_pids);
|
||||||
|
fpid->pid = pid;
|
||||||
|
|
||||||
|
set_ftrace_pid_task(pid);
|
||||||
|
|
||||||
|
ftrace_update_pid_func();
|
||||||
|
ftrace_startup_enable(0);
|
||||||
|
|
||||||
|
mutex_unlock(&ftrace_lock);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
out_put:
|
||||||
|
if (pid != ftrace_swapper_pid)
|
||||||
|
put_pid(pid);
|
||||||
|
|
||||||
|
out:
|
||||||
|
mutex_unlock(&ftrace_lock);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void ftrace_pid_reset(void)
|
||||||
|
{
|
||||||
|
struct ftrace_pid *fpid, *safe;
|
||||||
|
|
||||||
|
mutex_lock(&ftrace_lock);
|
||||||
|
list_for_each_entry_safe(fpid, safe, &ftrace_pids, list) {
|
||||||
|
struct pid *pid = fpid->pid;
|
||||||
|
|
||||||
|
clear_ftrace_pid_task(pid);
|
||||||
|
|
||||||
|
list_del(&fpid->list);
|
||||||
|
kfree(fpid);
|
||||||
|
}
|
||||||
|
|
||||||
|
ftrace_update_pid_func();
|
||||||
|
ftrace_startup_enable(0);
|
||||||
|
|
||||||
|
mutex_unlock(&ftrace_lock);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void *fpid_start(struct seq_file *m, loff_t *pos)
|
||||||
|
{
|
||||||
|
mutex_lock(&ftrace_lock);
|
||||||
|
|
||||||
|
if (list_empty(&ftrace_pids) && (!*pos))
|
||||||
|
return (void *) 1;
|
||||||
|
|
||||||
|
return seq_list_start(&ftrace_pids, *pos);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void *fpid_next(struct seq_file *m, void *v, loff_t *pos)
|
||||||
|
{
|
||||||
|
if (v == (void *)1)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
return seq_list_next(v, &ftrace_pids, pos);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void fpid_stop(struct seq_file *m, void *p)
|
||||||
|
{
|
||||||
|
mutex_unlock(&ftrace_lock);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int fpid_show(struct seq_file *m, void *v)
|
||||||
|
{
|
||||||
|
const struct ftrace_pid *fpid = list_entry(v, struct ftrace_pid, list);
|
||||||
|
|
||||||
|
if (v == (void *)1) {
|
||||||
|
seq_printf(m, "no pid\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (fpid->pid == ftrace_swapper_pid)
|
||||||
|
seq_printf(m, "swapper tasks\n");
|
||||||
|
else
|
||||||
|
seq_printf(m, "%u\n", pid_vnr(fpid->pid));
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static const struct seq_operations ftrace_pid_sops = {
|
||||||
|
.start = fpid_start,
|
||||||
|
.next = fpid_next,
|
||||||
|
.stop = fpid_stop,
|
||||||
|
.show = fpid_show,
|
||||||
|
};
|
||||||
|
|
||||||
|
static int
|
||||||
|
ftrace_pid_open(struct inode *inode, struct file *file)
|
||||||
|
{
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
|
if ((file->f_mode & FMODE_WRITE) &&
|
||||||
|
(file->f_flags & O_TRUNC))
|
||||||
|
ftrace_pid_reset();
|
||||||
|
|
||||||
|
if (file->f_mode & FMODE_READ)
|
||||||
|
ret = seq_open(file, &ftrace_pid_sops);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
static ssize_t
|
static ssize_t
|
||||||
ftrace_pid_write(struct file *filp, const char __user *ubuf,
|
ftrace_pid_write(struct file *filp, const char __user *ubuf,
|
||||||
size_t cnt, loff_t *ppos)
|
size_t cnt, loff_t *ppos)
|
||||||
{
|
{
|
||||||
struct pid *pid;
|
|
||||||
char buf[64];
|
char buf[64];
|
||||||
long val;
|
long val;
|
||||||
int ret;
|
int ret;
|
||||||
|
@ -2880,57 +2997,38 @@ ftrace_pid_write(struct file *filp, const char __user *ubuf,
|
||||||
|
|
||||||
buf[cnt] = 0;
|
buf[cnt] = 0;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Allow "echo > set_ftrace_pid" or "echo -n '' > set_ftrace_pid"
|
||||||
|
* to clean the filter quietly.
|
||||||
|
*/
|
||||||
|
strstrip(buf);
|
||||||
|
if (strlen(buf) == 0)
|
||||||
|
return 1;
|
||||||
|
|
||||||
ret = strict_strtol(buf, 10, &val);
|
ret = strict_strtol(buf, 10, &val);
|
||||||
if (ret < 0)
|
if (ret < 0)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
mutex_lock(&ftrace_lock);
|
ret = ftrace_pid_add(val);
|
||||||
if (val < 0) {
|
|
||||||
/* disable pid tracing */
|
|
||||||
if (!ftrace_pid_trace)
|
|
||||||
goto out;
|
|
||||||
|
|
||||||
clear_ftrace_pid_task(&ftrace_pid_trace);
|
return ret ? ret : cnt;
|
||||||
|
|
||||||
} else {
|
|
||||||
/* swapper task is special */
|
|
||||||
if (!val) {
|
|
||||||
pid = ftrace_swapper_pid;
|
|
||||||
if (pid == ftrace_pid_trace)
|
|
||||||
goto out;
|
|
||||||
} else {
|
|
||||||
pid = find_get_pid(val);
|
|
||||||
|
|
||||||
if (pid == ftrace_pid_trace) {
|
|
||||||
put_pid(pid);
|
|
||||||
goto out;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (ftrace_pid_trace)
|
static int
|
||||||
clear_ftrace_pid_task(&ftrace_pid_trace);
|
ftrace_pid_release(struct inode *inode, struct file *file)
|
||||||
|
{
|
||||||
|
if (file->f_mode & FMODE_READ)
|
||||||
|
seq_release(inode, file);
|
||||||
|
|
||||||
if (!pid)
|
return 0;
|
||||||
goto out;
|
|
||||||
|
|
||||||
ftrace_pid_trace = pid;
|
|
||||||
|
|
||||||
set_ftrace_pid_task(ftrace_pid_trace);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* update the function call */
|
|
||||||
ftrace_update_pid_func();
|
|
||||||
ftrace_startup_enable(0);
|
|
||||||
|
|
||||||
out:
|
|
||||||
mutex_unlock(&ftrace_lock);
|
|
||||||
|
|
||||||
return cnt;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static const struct file_operations ftrace_pid_fops = {
|
static const struct file_operations ftrace_pid_fops = {
|
||||||
.read = ftrace_pid_read,
|
.open = ftrace_pid_open,
|
||||||
.write = ftrace_pid_write,
|
.write = ftrace_pid_write,
|
||||||
|
.read = seq_read,
|
||||||
|
.llseek = seq_lseek,
|
||||||
|
.release = ftrace_pid_release,
|
||||||
};
|
};
|
||||||
|
|
||||||
static __init int ftrace_init_debugfs(void)
|
static __init int ftrace_init_debugfs(void)
|
||||||
|
|
|
@ -129,7 +129,7 @@ static int tracing_set_tracer(const char *buf);
|
||||||
static char bootup_tracer_buf[MAX_TRACER_SIZE] __initdata;
|
static char bootup_tracer_buf[MAX_TRACER_SIZE] __initdata;
|
||||||
static char *default_bootup_tracer;
|
static char *default_bootup_tracer;
|
||||||
|
|
||||||
static int __init set_ftrace(char *str)
|
static int __init set_cmdline_ftrace(char *str)
|
||||||
{
|
{
|
||||||
strncpy(bootup_tracer_buf, str, MAX_TRACER_SIZE);
|
strncpy(bootup_tracer_buf, str, MAX_TRACER_SIZE);
|
||||||
default_bootup_tracer = bootup_tracer_buf;
|
default_bootup_tracer = bootup_tracer_buf;
|
||||||
|
@ -137,7 +137,7 @@ static int __init set_ftrace(char *str)
|
||||||
ring_buffer_expanded = 1;
|
ring_buffer_expanded = 1;
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
__setup("ftrace=", set_ftrace);
|
__setup("ftrace=", set_cmdline_ftrace);
|
||||||
|
|
||||||
static int __init set_ftrace_dump_on_oops(char *str)
|
static int __init set_ftrace_dump_on_oops(char *str)
|
||||||
{
|
{
|
||||||
|
|
|
@ -483,10 +483,6 @@ static inline int ftrace_graph_addr(unsigned long addr)
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#else
|
#else
|
||||||
static inline int ftrace_trace_addr(unsigned long addr)
|
|
||||||
{
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
static inline int ftrace_graph_addr(unsigned long addr)
|
static inline int ftrace_graph_addr(unsigned long addr)
|
||||||
{
|
{
|
||||||
return 1;
|
return 1;
|
||||||
|
@ -500,12 +496,12 @@ print_graph_function(struct trace_iterator *iter)
|
||||||
}
|
}
|
||||||
#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
|
#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
|
||||||
|
|
||||||
extern struct pid *ftrace_pid_trace;
|
extern struct list_head ftrace_pids;
|
||||||
|
|
||||||
#ifdef CONFIG_FUNCTION_TRACER
|
#ifdef CONFIG_FUNCTION_TRACER
|
||||||
static inline int ftrace_trace_task(struct task_struct *task)
|
static inline int ftrace_trace_task(struct task_struct *task)
|
||||||
{
|
{
|
||||||
if (!ftrace_pid_trace)
|
if (list_empty(&ftrace_pids))
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
return test_tsk_trace_trace(task);
|
return test_tsk_trace_trace(task);
|
||||||
|
@ -699,15 +695,31 @@ struct event_subsystem {
|
||||||
};
|
};
|
||||||
|
|
||||||
struct filter_pred;
|
struct filter_pred;
|
||||||
|
struct regex;
|
||||||
|
|
||||||
typedef int (*filter_pred_fn_t) (struct filter_pred *pred, void *event,
|
typedef int (*filter_pred_fn_t) (struct filter_pred *pred, void *event,
|
||||||
int val1, int val2);
|
int val1, int val2);
|
||||||
|
|
||||||
|
typedef int (*regex_match_func)(char *str, struct regex *r, int len);
|
||||||
|
|
||||||
|
enum regex_type {
|
||||||
|
MATCH_FULL,
|
||||||
|
MATCH_FRONT_ONLY,
|
||||||
|
MATCH_MIDDLE_ONLY,
|
||||||
|
MATCH_END_ONLY,
|
||||||
|
};
|
||||||
|
|
||||||
|
struct regex {
|
||||||
|
char pattern[MAX_FILTER_STR_VAL];
|
||||||
|
int len;
|
||||||
|
int field_len;
|
||||||
|
regex_match_func match;
|
||||||
|
};
|
||||||
|
|
||||||
struct filter_pred {
|
struct filter_pred {
|
||||||
filter_pred_fn_t fn;
|
filter_pred_fn_t fn;
|
||||||
u64 val;
|
u64 val;
|
||||||
char str_val[MAX_FILTER_STR_VAL];
|
struct regex regex;
|
||||||
int str_len;
|
|
||||||
char *field_name;
|
char *field_name;
|
||||||
int offset;
|
int offset;
|
||||||
int not;
|
int not;
|
||||||
|
@ -715,6 +727,8 @@ struct filter_pred {
|
||||||
int pop_n;
|
int pop_n;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
extern enum regex_type
|
||||||
|
filter_parse_regex(char *buff, int len, char **search, int *not);
|
||||||
extern void print_event_filter(struct ftrace_event_call *call,
|
extern void print_event_filter(struct ftrace_event_call *call,
|
||||||
struct trace_seq *s);
|
struct trace_seq *s);
|
||||||
extern int apply_event_filter(struct ftrace_event_call *call,
|
extern int apply_event_filter(struct ftrace_event_call *call,
|
||||||
|
|
|
@ -878,7 +878,7 @@ event_subsystem_dir(const char *name, struct dentry *d_events)
|
||||||
"'%s/filter' entry\n", name);
|
"'%s/filter' entry\n", name);
|
||||||
}
|
}
|
||||||
|
|
||||||
entry = trace_create_file("enable", 0644, system->entry,
|
trace_create_file("enable", 0644, system->entry,
|
||||||
(void *)system->name,
|
(void *)system->name,
|
||||||
&ftrace_system_enable_fops);
|
&ftrace_system_enable_fops);
|
||||||
|
|
||||||
|
@ -892,7 +892,6 @@ event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
|
||||||
const struct file_operations *filter,
|
const struct file_operations *filter,
|
||||||
const struct file_operations *format)
|
const struct file_operations *format)
|
||||||
{
|
{
|
||||||
struct dentry *entry;
|
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -910,11 +909,11 @@ event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
|
||||||
}
|
}
|
||||||
|
|
||||||
if (call->regfunc)
|
if (call->regfunc)
|
||||||
entry = trace_create_file("enable", 0644, call->dir, call,
|
trace_create_file("enable", 0644, call->dir, call,
|
||||||
enable);
|
enable);
|
||||||
|
|
||||||
if (call->id && call->profile_enable)
|
if (call->id && call->profile_enable)
|
||||||
entry = trace_create_file("id", 0444, call->dir, call,
|
trace_create_file("id", 0444, call->dir, call,
|
||||||
id);
|
id);
|
||||||
|
|
||||||
if (call->define_fields) {
|
if (call->define_fields) {
|
||||||
|
@ -924,7 +923,7 @@ event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
|
||||||
" events/%s\n", call->name);
|
" events/%s\n", call->name);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
entry = trace_create_file("filter", 0644, call->dir, call,
|
trace_create_file("filter", 0644, call->dir, call,
|
||||||
filter);
|
filter);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -932,7 +931,7 @@ event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
|
||||||
if (!call->show_format)
|
if (!call->show_format)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
entry = trace_create_file("format", 0444, call->dir, call,
|
trace_create_file("format", 0444, call->dir, call,
|
||||||
format);
|
format);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
|
@ -18,8 +18,6 @@
|
||||||
* Copyright (C) 2009 Tom Zanussi <tzanussi@gmail.com>
|
* Copyright (C) 2009 Tom Zanussi <tzanussi@gmail.com>
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <linux/debugfs.h>
|
|
||||||
#include <linux/uaccess.h>
|
|
||||||
#include <linux/module.h>
|
#include <linux/module.h>
|
||||||
#include <linux/ctype.h>
|
#include <linux/ctype.h>
|
||||||
#include <linux/mutex.h>
|
#include <linux/mutex.h>
|
||||||
|
@ -197,9 +195,9 @@ static int filter_pred_string(struct filter_pred *pred, void *event,
|
||||||
char *addr = (char *)(event + pred->offset);
|
char *addr = (char *)(event + pred->offset);
|
||||||
int cmp, match;
|
int cmp, match;
|
||||||
|
|
||||||
cmp = strncmp(addr, pred->str_val, pred->str_len);
|
cmp = pred->regex.match(addr, &pred->regex, pred->regex.field_len);
|
||||||
|
|
||||||
match = (!cmp) ^ pred->not;
|
match = cmp ^ pred->not;
|
||||||
|
|
||||||
return match;
|
return match;
|
||||||
}
|
}
|
||||||
|
@ -211,9 +209,9 @@ static int filter_pred_pchar(struct filter_pred *pred, void *event,
|
||||||
char **addr = (char **)(event + pred->offset);
|
char **addr = (char **)(event + pred->offset);
|
||||||
int cmp, match;
|
int cmp, match;
|
||||||
|
|
||||||
cmp = strncmp(*addr, pred->str_val, pred->str_len);
|
cmp = pred->regex.match(*addr, &pred->regex, pred->regex.field_len);
|
||||||
|
|
||||||
match = (!cmp) ^ pred->not;
|
match = cmp ^ pred->not;
|
||||||
|
|
||||||
return match;
|
return match;
|
||||||
}
|
}
|
||||||
|
@ -237,9 +235,9 @@ static int filter_pred_strloc(struct filter_pred *pred, void *event,
|
||||||
char *addr = (char *)(event + str_loc);
|
char *addr = (char *)(event + str_loc);
|
||||||
int cmp, match;
|
int cmp, match;
|
||||||
|
|
||||||
cmp = strncmp(addr, pred->str_val, str_len);
|
cmp = pred->regex.match(addr, &pred->regex, str_len);
|
||||||
|
|
||||||
match = (!cmp) ^ pred->not;
|
match = cmp ^ pred->not;
|
||||||
|
|
||||||
return match;
|
return match;
|
||||||
}
|
}
|
||||||
|
@ -250,6 +248,124 @@ static int filter_pred_none(struct filter_pred *pred, void *event,
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Basic regex callbacks */
|
||||||
|
static int regex_match_full(char *str, struct regex *r, int len)
|
||||||
|
{
|
||||||
|
if (strncmp(str, r->pattern, len) == 0)
|
||||||
|
return 1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int regex_match_front(char *str, struct regex *r, int len)
|
||||||
|
{
|
||||||
|
if (strncmp(str, r->pattern, len) == 0)
|
||||||
|
return 1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int regex_match_middle(char *str, struct regex *r, int len)
|
||||||
|
{
|
||||||
|
if (strstr(str, r->pattern))
|
||||||
|
return 1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int regex_match_end(char *str, struct regex *r, int len)
|
||||||
|
{
|
||||||
|
char *ptr = strstr(str, r->pattern);
|
||||||
|
|
||||||
|
if (ptr && (ptr[r->len] == 0))
|
||||||
|
return 1;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* filter_parse_regex - parse a basic regex
|
||||||
|
* @buff: the raw regex
|
||||||
|
* @len: length of the regex
|
||||||
|
* @search: will point to the beginning of the string to compare
|
||||||
|
* @not: tell whether the match will have to be inverted
|
||||||
|
*
|
||||||
|
* This passes in a buffer containing a regex and this function will
|
||||||
|
* set search to point to the search part of the buffer and
|
||||||
|
* return the type of search it is (see enum above).
|
||||||
|
* This does modify buff.
|
||||||
|
*
|
||||||
|
* Returns enum type.
|
||||||
|
* search returns the pointer to use for comparison.
|
||||||
|
* not returns 1 if buff started with a '!'
|
||||||
|
* 0 otherwise.
|
||||||
|
*/
|
||||||
|
enum regex_type filter_parse_regex(char *buff, int len, char **search, int *not)
|
||||||
|
{
|
||||||
|
int type = MATCH_FULL;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (buff[0] == '!') {
|
||||||
|
*not = 1;
|
||||||
|
buff++;
|
||||||
|
len--;
|
||||||
|
} else
|
||||||
|
*not = 0;
|
||||||
|
|
||||||
|
*search = buff;
|
||||||
|
|
||||||
|
for (i = 0; i < len; i++) {
|
||||||
|
if (buff[i] == '*') {
|
||||||
|
if (!i) {
|
||||||
|
*search = buff + 1;
|
||||||
|
type = MATCH_END_ONLY;
|
||||||
|
} else {
|
||||||
|
if (type == MATCH_END_ONLY)
|
||||||
|
type = MATCH_MIDDLE_ONLY;
|
||||||
|
else
|
||||||
|
type = MATCH_FRONT_ONLY;
|
||||||
|
buff[i] = 0;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return type;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int filter_build_regex(struct filter_pred *pred)
|
||||||
|
{
|
||||||
|
struct regex *r = &pred->regex;
|
||||||
|
char *search, *dup;
|
||||||
|
enum regex_type type;
|
||||||
|
int not;
|
||||||
|
|
||||||
|
type = filter_parse_regex(r->pattern, r->len, &search, ¬);
|
||||||
|
dup = kstrdup(search, GFP_KERNEL);
|
||||||
|
if (!dup)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
strcpy(r->pattern, dup);
|
||||||
|
kfree(dup);
|
||||||
|
|
||||||
|
r->len = strlen(r->pattern);
|
||||||
|
|
||||||
|
switch (type) {
|
||||||
|
case MATCH_FULL:
|
||||||
|
r->match = regex_match_full;
|
||||||
|
break;
|
||||||
|
case MATCH_FRONT_ONLY:
|
||||||
|
r->match = regex_match_front;
|
||||||
|
break;
|
||||||
|
case MATCH_MIDDLE_ONLY:
|
||||||
|
r->match = regex_match_middle;
|
||||||
|
break;
|
||||||
|
case MATCH_END_ONLY:
|
||||||
|
r->match = regex_match_end;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
pred->not ^= not;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
/* return 1 if event matches, 0 otherwise (discard) */
|
/* return 1 if event matches, 0 otherwise (discard) */
|
||||||
int filter_match_preds(struct ftrace_event_call *call, void *rec)
|
int filter_match_preds(struct ftrace_event_call *call, void *rec)
|
||||||
{
|
{
|
||||||
|
@ -396,7 +512,7 @@ static void filter_clear_pred(struct filter_pred *pred)
|
||||||
{
|
{
|
||||||
kfree(pred->field_name);
|
kfree(pred->field_name);
|
||||||
pred->field_name = NULL;
|
pred->field_name = NULL;
|
||||||
pred->str_len = 0;
|
pred->regex.len = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int filter_set_pred(struct filter_pred *dest,
|
static int filter_set_pred(struct filter_pred *dest,
|
||||||
|
@ -660,21 +776,24 @@ static int filter_add_pred(struct filter_parse_state *ps,
|
||||||
}
|
}
|
||||||
|
|
||||||
if (is_string_field(field)) {
|
if (is_string_field(field)) {
|
||||||
pred->str_len = field->size;
|
ret = filter_build_regex(pred);
|
||||||
|
if (ret)
|
||||||
|
return ret;
|
||||||
|
|
||||||
if (field->filter_type == FILTER_STATIC_STRING)
|
if (field->filter_type == FILTER_STATIC_STRING) {
|
||||||
fn = filter_pred_string;
|
fn = filter_pred_string;
|
||||||
else if (field->filter_type == FILTER_DYN_STRING)
|
pred->regex.field_len = field->size;
|
||||||
|
} else if (field->filter_type == FILTER_DYN_STRING)
|
||||||
fn = filter_pred_strloc;
|
fn = filter_pred_strloc;
|
||||||
else {
|
else {
|
||||||
fn = filter_pred_pchar;
|
fn = filter_pred_pchar;
|
||||||
pred->str_len = strlen(pred->str_val);
|
pred->regex.field_len = strlen(pred->regex.pattern);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if (field->is_signed)
|
if (field->is_signed)
|
||||||
ret = strict_strtoll(pred->str_val, 0, &val);
|
ret = strict_strtoll(pred->regex.pattern, 0, &val);
|
||||||
else
|
else
|
||||||
ret = strict_strtoull(pred->str_val, 0, &val);
|
ret = strict_strtoull(pred->regex.pattern, 0, &val);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
parse_error(ps, FILT_ERR_ILLEGAL_INTVAL, 0);
|
parse_error(ps, FILT_ERR_ILLEGAL_INTVAL, 0);
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
@ -1045,8 +1164,8 @@ static struct filter_pred *create_pred(int op, char *operand1, char *operand2)
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
strcpy(pred->str_val, operand2);
|
strcpy(pred->regex.pattern, operand2);
|
||||||
pred->str_len = strlen(operand2);
|
pred->regex.len = strlen(pred->regex.pattern);
|
||||||
|
|
||||||
pred->op = op;
|
pred->op = op;
|
||||||
|
|
||||||
|
|
|
@ -14,6 +14,69 @@ static int sys_refcount_exit;
|
||||||
static DECLARE_BITMAP(enabled_enter_syscalls, NR_syscalls);
|
static DECLARE_BITMAP(enabled_enter_syscalls, NR_syscalls);
|
||||||
static DECLARE_BITMAP(enabled_exit_syscalls, NR_syscalls);
|
static DECLARE_BITMAP(enabled_exit_syscalls, NR_syscalls);
|
||||||
|
|
||||||
|
extern unsigned long __start_syscalls_metadata[];
|
||||||
|
extern unsigned long __stop_syscalls_metadata[];
|
||||||
|
|
||||||
|
static struct syscall_metadata **syscalls_metadata;
|
||||||
|
|
||||||
|
static struct syscall_metadata *find_syscall_meta(unsigned long syscall)
|
||||||
|
{
|
||||||
|
struct syscall_metadata *start;
|
||||||
|
struct syscall_metadata *stop;
|
||||||
|
char str[KSYM_SYMBOL_LEN];
|
||||||
|
|
||||||
|
|
||||||
|
start = (struct syscall_metadata *)__start_syscalls_metadata;
|
||||||
|
stop = (struct syscall_metadata *)__stop_syscalls_metadata;
|
||||||
|
kallsyms_lookup(syscall, NULL, NULL, NULL, str);
|
||||||
|
|
||||||
|
for ( ; start < stop; start++) {
|
||||||
|
/*
|
||||||
|
* Only compare after the "sys" prefix. Archs that use
|
||||||
|
* syscall wrappers may have syscalls symbols aliases prefixed
|
||||||
|
* with "SyS" instead of "sys", leading to an unwanted
|
||||||
|
* mismatch.
|
||||||
|
*/
|
||||||
|
if (start->name && !strcmp(start->name + 3, str + 3))
|
||||||
|
return start;
|
||||||
|
}
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
static struct syscall_metadata *syscall_nr_to_meta(int nr)
|
||||||
|
{
|
||||||
|
if (!syscalls_metadata || nr >= NR_syscalls || nr < 0)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
return syscalls_metadata[nr];
|
||||||
|
}
|
||||||
|
|
||||||
|
int syscall_name_to_nr(char *name)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (!syscalls_metadata)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
for (i = 0; i < NR_syscalls; i++) {
|
||||||
|
if (syscalls_metadata[i]) {
|
||||||
|
if (!strcmp(syscalls_metadata[i]->name, name))
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
void set_syscall_enter_id(int num, int id)
|
||||||
|
{
|
||||||
|
syscalls_metadata[num]->enter_id = id;
|
||||||
|
}
|
||||||
|
|
||||||
|
void set_syscall_exit_id(int num, int id)
|
||||||
|
{
|
||||||
|
syscalls_metadata[num]->exit_id = id;
|
||||||
|
}
|
||||||
|
|
||||||
enum print_line_t
|
enum print_line_t
|
||||||
print_syscall_enter(struct trace_iterator *iter, int flags)
|
print_syscall_enter(struct trace_iterator *iter, int flags)
|
||||||
{
|
{
|
||||||
|
@ -381,6 +444,29 @@ struct trace_event event_syscall_exit = {
|
||||||
.trace = print_syscall_exit,
|
.trace = print_syscall_exit,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
int __init init_ftrace_syscalls(void)
|
||||||
|
{
|
||||||
|
struct syscall_metadata *meta;
|
||||||
|
unsigned long addr;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
syscalls_metadata = kzalloc(sizeof(*syscalls_metadata) *
|
||||||
|
NR_syscalls, GFP_KERNEL);
|
||||||
|
if (!syscalls_metadata) {
|
||||||
|
WARN_ON(1);
|
||||||
|
return -ENOMEM;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i = 0; i < NR_syscalls; i++) {
|
||||||
|
addr = arch_syscall_addr(i);
|
||||||
|
meta = find_syscall_meta(addr);
|
||||||
|
syscalls_metadata[i] = meta;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
core_initcall(init_ftrace_syscalls);
|
||||||
|
|
||||||
#ifdef CONFIG_EVENT_PROFILE
|
#ifdef CONFIG_EVENT_PROFILE
|
||||||
|
|
||||||
static DECLARE_BITMAP(enabled_prof_enter_syscalls, NR_syscalls);
|
static DECLARE_BITMAP(enabled_prof_enter_syscalls, NR_syscalls);
|
||||||
|
|
|
@ -5,10 +5,13 @@
|
||||||
* relegated to obsolescence, but used by various less
|
* relegated to obsolescence, but used by various less
|
||||||
* important (or lazy) subsystems.
|
* important (or lazy) subsystems.
|
||||||
*/
|
*/
|
||||||
#include <linux/smp_lock.h>
|
|
||||||
#include <linux/module.h>
|
#include <linux/module.h>
|
||||||
#include <linux/kallsyms.h>
|
#include <linux/kallsyms.h>
|
||||||
#include <linux/semaphore.h>
|
#include <linux/semaphore.h>
|
||||||
|
#include <linux/smp_lock.h>
|
||||||
|
|
||||||
|
#define CREATE_TRACE_POINTS
|
||||||
|
#include <trace/events/bkl.h>
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The 'big kernel lock'
|
* The 'big kernel lock'
|
||||||
|
@ -113,21 +116,26 @@ static inline void __unlock_kernel(void)
|
||||||
* This cannot happen asynchronously, so we only need to
|
* This cannot happen asynchronously, so we only need to
|
||||||
* worry about other CPU's.
|
* worry about other CPU's.
|
||||||
*/
|
*/
|
||||||
void __lockfunc lock_kernel(void)
|
void __lockfunc _lock_kernel(const char *func, const char *file, int line)
|
||||||
{
|
{
|
||||||
int depth = current->lock_depth + 1;
|
int depth = current->lock_depth + 1;
|
||||||
|
|
||||||
|
trace_lock_kernel(func, file, line);
|
||||||
|
|
||||||
if (likely(!depth))
|
if (likely(!depth))
|
||||||
__lock_kernel();
|
__lock_kernel();
|
||||||
current->lock_depth = depth;
|
current->lock_depth = depth;
|
||||||
}
|
}
|
||||||
|
|
||||||
void __lockfunc unlock_kernel(void)
|
void __lockfunc _unlock_kernel(const char *func, const char *file, int line)
|
||||||
{
|
{
|
||||||
BUG_ON(current->lock_depth < 0);
|
BUG_ON(current->lock_depth < 0);
|
||||||
if (likely(--current->lock_depth < 0))
|
if (likely(--current->lock_depth < 0))
|
||||||
__unlock_kernel();
|
__unlock_kernel();
|
||||||
|
|
||||||
|
trace_unlock_kernel(func, file, line);
|
||||||
}
|
}
|
||||||
|
|
||||||
EXPORT_SYMBOL(lock_kernel);
|
EXPORT_SYMBOL(_lock_kernel);
|
||||||
EXPORT_SYMBOL(unlock_kernel);
|
EXPORT_SYMBOL(_unlock_kernel);
|
||||||
|
|
||||||
|
|
|
@ -119,6 +119,7 @@ my %text_sections = (
|
||||||
".sched.text" => 1,
|
".sched.text" => 1,
|
||||||
".spinlock.text" => 1,
|
".spinlock.text" => 1,
|
||||||
".irqentry.text" => 1,
|
".irqentry.text" => 1,
|
||||||
|
".text.unlikely" => 1,
|
||||||
);
|
);
|
||||||
|
|
||||||
$objdump = "objdump" if ((length $objdump) == 0);
|
$objdump = "objdump" if ((length $objdump) == 0);
|
||||||
|
|
Loading…
Reference in New Issue