]> git.ipfire.org Git - thirdparty/linux.git/blame - lib/dynamic_debug.c
binder: Return EFAULT if we fail BINDER_ENABLE_ONEWAY_SPAM_DETECTION
[thirdparty/linux.git] / lib / dynamic_debug.c
CommitLineData
e9d376f0
JB
1/*
2 * lib/dynamic_debug.c
3 *
4 * make pr_debug()/dev_dbg() calls runtime configurable based upon their
5 * source module.
6 *
7 * Copyright (C) 2008 Jason Baron <jbaron@redhat.com>
8 * By Greg Banks <gnb@melbourne.sgi.com>
9 * Copyright (c) 2008 Silicon Graphics Inc. All Rights Reserved.
8ba6ebf5 10 * Copyright (C) 2011 Bart Van Assche. All Rights Reserved.
578b1e07 11 * Copyright (C) 2013 Du, Changbin <changbin.du@gmail.com>
e9d376f0
JB
12 */
13
5aa9ffbb 14#define pr_fmt(fmt) "dyndbg: " fmt
4ad275e5 15
e9d376f0
JB
16#include <linux/kernel.h>
17#include <linux/module.h>
fef15d2f
GKH
18#include <linux/moduleparam.h>
19#include <linux/kallsyms.h>
20#include <linux/types.h>
e9d376f0 21#include <linux/mutex.h>
fef15d2f 22#include <linux/proc_fs.h>
e9d376f0 23#include <linux/seq_file.h>
fef15d2f
GKH
24#include <linux/list.h>
25#include <linux/sysctl.h>
e9d376f0 26#include <linux/ctype.h>
fef15d2f 27#include <linux/string.h>
578b1e07 28#include <linux/parser.h>
d338b137 29#include <linux/string_helpers.h>
fef15d2f 30#include <linux/uaccess.h>
e9d376f0
JB
31#include <linux/dynamic_debug.h>
32#include <linux/debugfs.h>
5a0e3ad6 33#include <linux/slab.h>
fef15d2f 34#include <linux/jump_label.h>
8ba6ebf5 35#include <linux/hardirq.h>
e8d9792a 36#include <linux/sched.h>
fef15d2f 37#include <linux/device.h>
ffa10cb4 38#include <linux/netdevice.h>
e9d376f0 39
923abb9d
GP
40#include <rdma/ib_verbs.h>
41
e5ebffe1
JC
42extern struct _ddebug __start___dyndbg[];
43extern struct _ddebug __stop___dyndbg[];
e9d376f0 44
e9d376f0
JB
45struct ddebug_table {
46 struct list_head link;
3e406b1d 47 const char *mod_name;
e9d376f0 48 unsigned int num_ddebugs;
e9d376f0
JB
49 struct _ddebug *ddebugs;
50};
51
52struct ddebug_query {
53 const char *filename;
54 const char *module;
55 const char *function;
56 const char *format;
57 unsigned int first_lineno, last_lineno;
58};
59
60struct ddebug_iter {
61 struct ddebug_table *table;
62 unsigned int idx;
63};
64
84da83a6
JC
65struct flag_settings {
66 unsigned int flags;
67 unsigned int mask;
68};
69
e9d376f0
JB
70static DEFINE_MUTEX(ddebug_lock);
71static LIST_HEAD(ddebug_tables);
f657fd21 72static int verbose;
74df138d 73module_param(verbose, int, 0644);
e9d376f0 74
2b678319
JC
75/* Return the path relative to source root */
76static inline const char *trim_prefix(const char *path)
77{
78 int skip = strlen(__FILE__) - strlen("lib/dynamic_debug.c");
79
80 if (strncmp(path, __FILE__, skip))
81 skip = 0; /* prefix mismatch, don't skip */
82
83 return path + skip;
84}
85
8ba6ebf5
BVA
86static struct { unsigned flag:8; char opt_char; } opt_array[] = {
87 { _DPRINTK_FLAGS_PRINT, 'p' },
88 { _DPRINTK_FLAGS_INCL_MODNAME, 'm' },
89 { _DPRINTK_FLAGS_INCL_FUNCNAME, 'f' },
90 { _DPRINTK_FLAGS_INCL_LINENO, 'l' },
91 { _DPRINTK_FLAGS_INCL_TID, 't' },
5ca7d2a6 92 { _DPRINTK_FLAGS_NONE, '_' },
8ba6ebf5
BVA
93};
94
f678ce8c
JC
95struct flagsbuf { char buf[ARRAY_SIZE(opt_array)+1]; };
96
e9d376f0 97/* format a string into buf[] which describes the _ddebug's flags */
f678ce8c 98static char *ddebug_describe_flags(unsigned int flags, struct flagsbuf *fb)
e9d376f0 99{
f678ce8c 100 char *p = fb->buf;
8ba6ebf5 101 int i;
e9d376f0 102
8ba6ebf5 103 for (i = 0; i < ARRAY_SIZE(opt_array); ++i)
f678ce8c 104 if (flags & opt_array[i].flag)
8ba6ebf5 105 *p++ = opt_array[i].opt_char;
f678ce8c 106 if (p == fb->buf)
5ca7d2a6 107 *p++ = '_';
e9d376f0
JB
108 *p = '\0';
109
f678ce8c 110 return fb->buf;
e9d376f0
JB
111}
112
481c0e33 113#define vnpr_info(lvl, fmt, ...) \
b8ccd5de 114do { \
481c0e33 115 if (verbose >= lvl) \
f657fd21 116 pr_info(fmt, ##__VA_ARGS__); \
574b3725
JC
117} while (0)
118
481c0e33
JC
119#define vpr_info(fmt, ...) vnpr_info(1, fmt, ##__VA_ARGS__)
120#define v2pr_info(fmt, ...) vnpr_info(2, fmt, ##__VA_ARGS__)
121
f657fd21
JP
122static void vpr_info_dq(const struct ddebug_query *query, const char *msg)
123{
124 /* trim any trailing newlines */
125 int fmtlen = 0;
126
127 if (query->format) {
128 fmtlen = strlen(query->format);
129 while (fmtlen && query->format[fmtlen - 1] == '\n')
130 fmtlen--;
131 }
132
133 vpr_info("%s: func=\"%s\" file=\"%s\" module=\"%s\" format=\"%.*s\" lineno=%u-%u\n",
134 msg,
f62fc08f
JC
135 query->function ?: "",
136 query->filename ?: "",
137 query->module ?: "",
138 fmtlen, query->format ?: "",
f657fd21
JP
139 query->first_lineno, query->last_lineno);
140}
141
e9d376f0 142/*
85f7f6c0
JC
143 * Search the tables for _ddebug's which match the given `query' and
144 * apply the `flags' and `mask' to them. Returns number of matching
145 * callsites, normally the same as number of changes. If verbose,
146 * logs the changes. Takes ddebug_lock.
e9d376f0 147 */
85f7f6c0 148static int ddebug_change(const struct ddebug_query *query,
84da83a6 149 struct flag_settings *modifiers)
e9d376f0
JB
150{
151 int i;
152 struct ddebug_table *dt;
153 unsigned int newflags;
154 unsigned int nfound = 0;
f678ce8c 155 struct flagsbuf fbuf;
e9d376f0
JB
156
157 /* search for matching ddebugs */
158 mutex_lock(&ddebug_lock);
159 list_for_each_entry(dt, &ddebug_tables, link) {
160
161 /* match against the module name */
578b1e07
CD
162 if (query->module &&
163 !match_wildcard(query->module, dt->mod_name))
e9d376f0
JB
164 continue;
165
f657fd21 166 for (i = 0; i < dt->num_ddebugs; i++) {
e9d376f0
JB
167 struct _ddebug *dp = &dt->ddebugs[i];
168
169 /* match against the source filename */
d6a238d2 170 if (query->filename &&
578b1e07
CD
171 !match_wildcard(query->filename, dp->filename) &&
172 !match_wildcard(query->filename,
173 kbasename(dp->filename)) &&
174 !match_wildcard(query->filename,
175 trim_prefix(dp->filename)))
e9d376f0
JB
176 continue;
177
178 /* match against the function */
d6a238d2 179 if (query->function &&
578b1e07 180 !match_wildcard(query->function, dp->function))
e9d376f0
JB
181 continue;
182
183 /* match against the format */
4b334484
JC
184 if (query->format) {
185 if (*query->format == '^') {
186 char *p;
187 /* anchored search. match must be at beginning */
188 p = strstr(dp->format, query->format+1);
189 if (p != dp->format)
190 continue;
191 } else if (!strstr(dp->format, query->format))
192 continue;
193 }
e9d376f0
JB
194
195 /* match against the line number range */
196 if (query->first_lineno &&
197 dp->lineno < query->first_lineno)
198 continue;
199 if (query->last_lineno &&
200 dp->lineno > query->last_lineno)
201 continue;
202
203 nfound++;
204
84da83a6 205 newflags = (dp->flags & modifiers->mask) | modifiers->flags;
e9d376f0
JB
206 if (newflags == dp->flags)
207 continue;
e9666d10 208#ifdef CONFIG_JUMP_LABEL
9049fc74 209 if (dp->flags & _DPRINTK_FLAGS_PRINT) {
84da83a6 210 if (!(modifiers->flags & _DPRINTK_FLAGS_PRINT))
9049fc74 211 static_branch_disable(&dp->key.dd_key_true);
84da83a6 212 } else if (modifiers->flags & _DPRINTK_FLAGS_PRINT)
9049fc74
JB
213 static_branch_enable(&dp->key.dd_key_true);
214#endif
e9d376f0 215 dp->flags = newflags;
481c0e33 216 v2pr_info("changed %s:%d [%s]%s =%s\n",
f657fd21
JP
217 trim_prefix(dp->filename), dp->lineno,
218 dt->mod_name, dp->function,
f678ce8c 219 ddebug_describe_flags(dp->flags, &fbuf));
e9d376f0
JB
220 }
221 }
222 mutex_unlock(&ddebug_lock);
223
224 if (!nfound && verbose)
4ad275e5 225 pr_info("no matches for query\n");
85f7f6c0
JC
226
227 return nfound;
e9d376f0
JB
228}
229
e9d376f0
JB
230/*
231 * Split the buffer `buf' into space-separated words.
9898abb3
GB
232 * Handles simple " and ' quoting, i.e. without nested,
233 * embedded or escaped \". Return the number of words
234 * or <0 on error.
e9d376f0
JB
235 */
236static int ddebug_tokenize(char *buf, char *words[], int maxwords)
237{
238 int nwords = 0;
239
9898abb3
GB
240 while (*buf) {
241 char *end;
242
243 /* Skip leading whitespace */
e7d2860b 244 buf = skip_spaces(buf);
9898abb3
GB
245 if (!*buf)
246 break; /* oh, it was trailing whitespace */
8bd6026e
JC
247 if (*buf == '#')
248 break; /* token starts comment, skip rest of line */
9898abb3 249
07100be7 250 /* find `end' of word, whitespace separated or quoted */
9898abb3
GB
251 if (*buf == '"' || *buf == '\'') {
252 int quote = *buf++;
f657fd21 253 for (end = buf; *end && *end != quote; end++)
9898abb3 254 ;
18c216c5
JC
255 if (!*end) {
256 pr_err("unclosed quote: %s\n", buf);
9898abb3 257 return -EINVAL; /* unclosed quote */
18c216c5 258 }
9898abb3 259 } else {
7f6e1f30 260 for (end = buf; *end && !isspace(*end); end++)
9898abb3
GB
261 ;
262 BUG_ON(end == buf);
263 }
9898abb3 264
07100be7 265 /* `buf' is start of word, `end' is one past its end */
18c216c5
JC
266 if (nwords == maxwords) {
267 pr_err("too many words, legal max <=%d\n", maxwords);
9898abb3 268 return -EINVAL; /* ran out of words[] before bytes */
18c216c5 269 }
9898abb3
GB
270 if (*end)
271 *end++ = '\0'; /* terminate the word */
272 words[nwords++] = buf;
273 buf = end;
274 }
e9d376f0
JB
275
276 if (verbose) {
277 int i;
4ad275e5 278 pr_info("split into words:");
f657fd21 279 for (i = 0; i < nwords; i++)
4ad275e5
JP
280 pr_cont(" \"%s\"", words[i]);
281 pr_cont("\n");
e9d376f0
JB
282 }
283
284 return nwords;
285}
286
287/*
288 * Parse a single line number. Note that the empty string ""
289 * is treated as a special case and converted to zero, which
290 * is later treated as a "don't care" value.
291 */
292static inline int parse_lineno(const char *str, unsigned int *val)
293{
e9d376f0
JB
294 BUG_ON(str == NULL);
295 if (*str == '\0') {
296 *val = 0;
297 return 0;
298 }
4592599a 299 if (kstrtouint(str, 10, val) < 0) {
18c216c5
JC
300 pr_err("bad line-number: %s\n", str);
301 return -EINVAL;
302 }
303 return 0;
e9d376f0
JB
304}
305
8037072d
JC
306static int parse_linerange(struct ddebug_query *query, const char *first)
307{
308 char *last = strchr(first, '-');
309
310 if (query->first_lineno || query->last_lineno) {
311 pr_err("match-spec: line used 2x\n");
312 return -EINVAL;
313 }
314 if (last)
315 *last++ = '\0';
316 if (parse_lineno(first, &query->first_lineno) < 0)
317 return -EINVAL;
318 if (last) {
319 /* range <first>-<last> */
320 if (parse_lineno(last, &query->last_lineno) < 0)
321 return -EINVAL;
322
323 /* special case for last lineno not specified */
324 if (query->last_lineno == 0)
325 query->last_lineno = UINT_MAX;
326
327 if (query->last_lineno < query->first_lineno) {
328 pr_err("last-line:%d < 1st-line:%d\n",
329 query->last_lineno,
330 query->first_lineno);
331 return -EINVAL;
332 }
333 } else {
334 query->last_lineno = query->first_lineno;
335 }
336 vpr_info("parsed line %d-%d\n", query->first_lineno,
337 query->last_lineno);
338 return 0;
339}
340
820874c7
JC
341static int check_set(const char **dest, char *src, char *name)
342{
343 int rc = 0;
344
345 if (*dest) {
346 rc = -EINVAL;
f657fd21
JP
347 pr_err("match-spec:%s val:%s overridden by %s\n",
348 name, *dest, src);
820874c7
JC
349 }
350 *dest = src;
351 return rc;
352}
353
e9d376f0
JB
354/*
355 * Parse words[] as a ddebug query specification, which is a series
952e934d 356 * of (keyword, value) pairs chosen from these possibilities:
e9d376f0
JB
357 *
358 * func <function-name>
359 * file <full-pathname>
360 * file <base-filename>
361 * module <module-name>
362 * format <escaped-string-to-find-in-format>
363 * line <lineno>
364 * line <first-lineno>-<last-lineno> // where either may be empty
820874c7
JC
365 *
366 * Only 1 of each type is allowed.
367 * Returns 0 on success, <0 on error.
e9d376f0
JB
368 */
369static int ddebug_parse_query(char *words[], int nwords,
8e59b5cf 370 struct ddebug_query *query, const char *modname)
e9d376f0
JB
371{
372 unsigned int i;
bd8c154a 373 int rc = 0;
aaebe329 374 char *fline;
952e934d
GKH
375
376 /* check we have an even number of words */
377 if (nwords % 2 != 0) {
378 pr_err("expecting pairs of match-spec <value>\n");
379 return -EINVAL;
380 }
e9d376f0 381
7f6e1f30 382 if (modname)
8e59b5cf
JC
383 /* support $modname.dyndbg=<multiple queries> */
384 query->module = modname;
385
952e934d 386 for (i = 0; i < nwords; i += 2) {
e5e5fcef
JC
387 char *keyword = words[i];
388 char *arg = words[i+1];
389
390 if (!strcmp(keyword, "func")) {
391 rc = check_set(&query->function, arg, "func");
392 } else if (!strcmp(keyword, "file")) {
393 if (check_set(&query->filename, arg, "file"))
aaebe329
JC
394 return -EINVAL;
395
396 /* tail :$info is function or line-range */
397 fline = strchr(query->filename, ':');
398 if (!fline)
7b1ae248 399 continue;
aaebe329
JC
400 *fline++ = '\0';
401 if (isalpha(*fline) || *fline == '*' || *fline == '?') {
402 /* take as function name */
403 if (check_set(&query->function, fline, "func"))
404 return -EINVAL;
405 } else {
406 if (parse_linerange(query, fline))
407 return -EINVAL;
408 }
e5e5fcef
JC
409 } else if (!strcmp(keyword, "module")) {
410 rc = check_set(&query->module, arg, "module");
411 } else if (!strcmp(keyword, "format")) {
412 string_unescape_inplace(arg, UNESCAPE_SPACE |
d338b137
AS
413 UNESCAPE_OCTAL |
414 UNESCAPE_SPECIAL);
e5e5fcef
JC
415 rc = check_set(&query->format, arg, "format");
416 } else if (!strcmp(keyword, "line")) {
417 if (parse_linerange(query, arg))
e9d376f0 418 return -EINVAL;
e9d376f0 419 } else {
e5e5fcef 420 pr_err("unknown keyword \"%s\"\n", keyword);
e9d376f0
JB
421 return -EINVAL;
422 }
820874c7
JC
423 if (rc)
424 return rc;
e9d376f0 425 }
574b3725 426 vpr_info_dq(query, "parsed");
e9d376f0
JB
427 return 0;
428}
429
430/*
431 * Parse `str' as a flags specification, format [-+=][p]+.
432 * Sets up *maskp and *flagsp to be used when changing the
433 * flags fields of matched _ddebug's. Returns 0 on success
434 * or <0 on error.
435 */
84da83a6 436static int ddebug_parse_flags(const char *str, struct flag_settings *modifiers)
e9d376f0 437{
84da83a6 438 int op, i;
e9d376f0
JB
439
440 switch (*str) {
441 case '+':
442 case '-':
443 case '=':
444 op = *str++;
445 break;
446 default:
18c216c5 447 pr_err("bad flag-op %c, at start of %s\n", *str, str);
e9d376f0
JB
448 return -EINVAL;
449 }
b8ccd5de 450 vpr_info("op='%c'\n", op);
e9d376f0 451
f657fd21 452 for (; *str ; ++str) {
8ba6ebf5
BVA
453 for (i = ARRAY_SIZE(opt_array) - 1; i >= 0; i--) {
454 if (*str == opt_array[i].opt_char) {
84da83a6 455 modifiers->flags |= opt_array[i].flag;
8ba6ebf5
BVA
456 break;
457 }
e9d376f0 458 }
18c216c5 459 if (i < 0) {
0b8f96be 460 pr_err("unknown flag '%c'\n", *str);
8ba6ebf5 461 return -EINVAL;
18c216c5 462 }
e9d376f0 463 }
84da83a6 464 vpr_info("flags=0x%x\n", modifiers->flags);
e9d376f0 465
84da83a6 466 /* calculate final flags, mask based upon op */
e9d376f0
JB
467 switch (op) {
468 case '=':
84da83a6
JC
469 /* modifiers->flags already set */
470 modifiers->mask = 0;
e9d376f0
JB
471 break;
472 case '+':
84da83a6 473 modifiers->mask = ~0U;
e9d376f0
JB
474 break;
475 case '-':
84da83a6
JC
476 modifiers->mask = ~modifiers->flags;
477 modifiers->flags = 0;
e9d376f0
JB
478 break;
479 }
84da83a6
JC
480 vpr_info("*flagsp=0x%x *maskp=0x%x\n", modifiers->flags, modifiers->mask);
481
e9d376f0
JB
482 return 0;
483}
484
8e59b5cf 485static int ddebug_exec_query(char *query_string, const char *modname)
fd89cfb8 486{
84da83a6 487 struct flag_settings modifiers = {};
9c9d0acb 488 struct ddebug_query query = {};
fd89cfb8 489#define MAXWORDS 9
85f7f6c0 490 int nwords, nfound;
fd89cfb8
TR
491 char *words[MAXWORDS];
492
493 nwords = ddebug_tokenize(query_string, words, MAXWORDS);
18c216c5
JC
494 if (nwords <= 0) {
495 pr_err("tokenize failed\n");
fd89cfb8 496 return -EINVAL;
18c216c5
JC
497 }
498 /* check flags 1st (last arg) so query is pairs of spec,val */
84da83a6 499 if (ddebug_parse_flags(words[nwords-1], &modifiers)) {
18c216c5 500 pr_err("flags parse failed\n");
fd89cfb8 501 return -EINVAL;
18c216c5
JC
502 }
503 if (ddebug_parse_query(words, nwords-1, &query, modname)) {
504 pr_err("query parse failed\n");
fd89cfb8 505 return -EINVAL;
18c216c5 506 }
fd89cfb8 507 /* actually go and implement the change */
84da83a6 508 nfound = ddebug_change(&query, &modifiers);
f657fd21 509 vpr_info_dq(&query, nfound ? "applied" : "no-match");
85f7f6c0
JC
510
511 return nfound;
512}
513
514/* handle multiple queries in query string, continue on error, return
515 last error or number of matching callsites. Module name is either
516 in param (for boot arg) or perhaps in query string.
517*/
a2d375ed 518static int ddebug_exec_queries(char *query, const char *modname)
85f7f6c0
JC
519{
520 char *split;
521 int i, errs = 0, exitcode = 0, rc, nfound = 0;
522
523 for (i = 0; query; query = split) {
524 split = strpbrk(query, ";\n");
525 if (split)
526 *split++ = '\0';
527
528 query = skip_spaces(query);
529 if (!query || !*query || *query == '#')
530 continue;
531
b8ccd5de 532 vpr_info("query %d: \"%s\"\n", i, query);
85f7f6c0 533
8e59b5cf 534 rc = ddebug_exec_query(query, modname);
85f7f6c0
JC
535 if (rc < 0) {
536 errs++;
537 exitcode = rc;
f657fd21 538 } else {
85f7f6c0 539 nfound += rc;
f657fd21 540 }
85f7f6c0
JC
541 i++;
542 }
b8ccd5de 543 vpr_info("processed %d queries, with %d matches, %d errs\n",
85f7f6c0
JC
544 i, nfound, errs);
545
546 if (exitcode)
547 return exitcode;
548 return nfound;
fd89cfb8 549}
a2d375ed
JC
550
551/**
552 * dynamic_debug_exec_queries - select and change dynamic-debug prints
553 * @query: query-string described in admin-guide/dynamic-debug-howto
554 * @modname: string containing module name, usually &module.mod_name
555 *
556 * This uses the >/proc/dynamic_debug/control reader, allowing module
557 * authors to modify their dynamic-debug callsites. The modname is
558 * canonically struct module.mod_name, but can also be null or a
559 * module-wildcard, for example: "drm*".
560 */
561int dynamic_debug_exec_queries(const char *query, const char *modname)
562{
563 int rc;
3577afb0 564 char *qry; /* writable copy of query */
a2d375ed 565
3577afb0
JC
566 if (!query) {
567 pr_err("non-null query/command string expected\n");
568 return -EINVAL;
569 }
570 qry = kstrndup(query, PAGE_SIZE, GFP_KERNEL);
571 if (!qry)
a2d375ed
JC
572 return -ENOMEM;
573
574 rc = ddebug_exec_queries(qry, modname);
575 kfree(qry);
576 return rc;
577}
578EXPORT_SYMBOL_GPL(dynamic_debug_exec_queries);
fd89cfb8 579
431625da
JB
580#define PREFIX_SIZE 64
581
582static int remaining(int wrote)
583{
584 if (PREFIX_SIZE - wrote > 0)
585 return PREFIX_SIZE - wrote;
586 return 0;
587}
588
589static char *dynamic_emit_prefix(const struct _ddebug *desc, char *buf)
8ba6ebf5 590{
431625da
JB
591 int pos_after_tid;
592 int pos = 0;
8ba6ebf5 593
798efc60
JP
594 *buf = '\0';
595
431625da 596 if (desc->flags & _DPRINTK_FLAGS_INCL_TID) {
8ba6ebf5 597 if (in_interrupt())
798efc60 598 pos += snprintf(buf + pos, remaining(pos), "<intr> ");
8ba6ebf5 599 else
431625da 600 pos += snprintf(buf + pos, remaining(pos), "[%d] ",
798efc60 601 task_pid_vnr(current));
8ba6ebf5 602 }
431625da
JB
603 pos_after_tid = pos;
604 if (desc->flags & _DPRINTK_FLAGS_INCL_MODNAME)
605 pos += snprintf(buf + pos, remaining(pos), "%s:",
798efc60 606 desc->modname);
431625da
JB
607 if (desc->flags & _DPRINTK_FLAGS_INCL_FUNCNAME)
608 pos += snprintf(buf + pos, remaining(pos), "%s:",
798efc60 609 desc->function);
431625da 610 if (desc->flags & _DPRINTK_FLAGS_INCL_LINENO)
07100be7 611 pos += snprintf(buf + pos, remaining(pos), "%d:",
798efc60 612 desc->lineno);
431625da
JB
613 if (pos - pos_after_tid)
614 pos += snprintf(buf + pos, remaining(pos), " ");
615 if (pos >= PREFIX_SIZE)
616 buf[PREFIX_SIZE - 1] = '\0';
6c2140ee 617
431625da 618 return buf;
6c2140ee
JP
619}
620
906d2015 621void __dynamic_pr_debug(struct _ddebug *descriptor, const char *fmt, ...)
8ba6ebf5
BVA
622{
623 va_list args;
431625da
JB
624 struct va_format vaf;
625 char buf[PREFIX_SIZE];
8ba6ebf5
BVA
626
627 BUG_ON(!descriptor);
628 BUG_ON(!fmt);
629
630 va_start(args, fmt);
798efc60 631
431625da
JB
632 vaf.fmt = fmt;
633 vaf.va = &args;
798efc60 634
906d2015 635 printk(KERN_DEBUG "%s%pV", dynamic_emit_prefix(descriptor, buf), &vaf);
798efc60 636
8ba6ebf5 637 va_end(args);
8ba6ebf5
BVA
638}
639EXPORT_SYMBOL(__dynamic_pr_debug);
640
906d2015 641void __dynamic_dev_dbg(struct _ddebug *descriptor,
cbc46635
JP
642 const struct device *dev, const char *fmt, ...)
643{
644 struct va_format vaf;
645 va_list args;
cbc46635
JP
646
647 BUG_ON(!descriptor);
648 BUG_ON(!fmt);
649
650 va_start(args, fmt);
798efc60 651
cbc46635
JP
652 vaf.fmt = fmt;
653 vaf.va = &args;
798efc60
JP
654
655 if (!dev) {
906d2015 656 printk(KERN_DEBUG "(NULL device *): %pV", &vaf);
798efc60
JP
657 } else {
658 char buf[PREFIX_SIZE];
798efc60 659
a39d4a85 660 dev_printk_emit(LOGLEVEL_DEBUG, dev, "%s%s %s: %pV",
906d2015
JP
661 dynamic_emit_prefix(descriptor, buf),
662 dev_driver_string(dev), dev_name(dev),
663 &vaf);
798efc60
JP
664 }
665
cbc46635 666 va_end(args);
cbc46635
JP
667}
668EXPORT_SYMBOL(__dynamic_dev_dbg);
669
0feefd97
JB
670#ifdef CONFIG_NET
671
906d2015
JP
672void __dynamic_netdev_dbg(struct _ddebug *descriptor,
673 const struct net_device *dev, const char *fmt, ...)
ffa10cb4
JB
674{
675 struct va_format vaf;
676 va_list args;
ffa10cb4
JB
677
678 BUG_ON(!descriptor);
679 BUG_ON(!fmt);
680
681 va_start(args, fmt);
b004ff49 682
ffa10cb4
JB
683 vaf.fmt = fmt;
684 vaf.va = &args;
b004ff49
JP
685
686 if (dev && dev->dev.parent) {
687 char buf[PREFIX_SIZE];
666f355f 688
a39d4a85 689 dev_printk_emit(LOGLEVEL_DEBUG, dev->dev.parent,
906d2015
JP
690 "%s%s %s %s%s: %pV",
691 dynamic_emit_prefix(descriptor, buf),
692 dev_driver_string(dev->dev.parent),
693 dev_name(dev->dev.parent),
694 netdev_name(dev), netdev_reg_state(dev),
695 &vaf);
b004ff49 696 } else if (dev) {
906d2015
JP
697 printk(KERN_DEBUG "%s%s: %pV", netdev_name(dev),
698 netdev_reg_state(dev), &vaf);
b004ff49 699 } else {
906d2015 700 printk(KERN_DEBUG "(NULL net_device): %pV", &vaf);
b004ff49
JP
701 }
702
ffa10cb4 703 va_end(args);
ffa10cb4
JB
704}
705EXPORT_SYMBOL(__dynamic_netdev_dbg);
706
0feefd97
JB
707#endif
708
923abb9d
GP
709#if IS_ENABLED(CONFIG_INFINIBAND)
710
711void __dynamic_ibdev_dbg(struct _ddebug *descriptor,
712 const struct ib_device *ibdev, const char *fmt, ...)
713{
714 struct va_format vaf;
715 va_list args;
716
717 va_start(args, fmt);
718
719 vaf.fmt = fmt;
720 vaf.va = &args;
721
722 if (ibdev && ibdev->dev.parent) {
723 char buf[PREFIX_SIZE];
724
725 dev_printk_emit(LOGLEVEL_DEBUG, ibdev->dev.parent,
726 "%s%s %s %s: %pV",
727 dynamic_emit_prefix(descriptor, buf),
728 dev_driver_string(ibdev->dev.parent),
729 dev_name(ibdev->dev.parent),
730 dev_name(&ibdev->dev),
731 &vaf);
732 } else if (ibdev) {
733 printk(KERN_DEBUG "%s: %pV", dev_name(&ibdev->dev), &vaf);
734 } else {
735 printk(KERN_DEBUG "(NULL ib_device): %pV", &vaf);
736 }
737
738 va_end(args);
739}
740EXPORT_SYMBOL(__dynamic_ibdev_dbg);
741
742#endif
743
bc757f6f
JC
744#define DDEBUG_STRING_SIZE 1024
745static __initdata char ddebug_setup_string[DDEBUG_STRING_SIZE];
746
a648ec05
TR
747static __init int ddebug_setup_query(char *str)
748{
bc757f6f 749 if (strlen(str) >= DDEBUG_STRING_SIZE) {
4ad275e5 750 pr_warn("ddebug boot param string too large\n");
a648ec05
TR
751 return 0;
752 }
bc757f6f 753 strlcpy(ddebug_setup_string, str, DDEBUG_STRING_SIZE);
a648ec05
TR
754 return 1;
755}
756
757__setup("ddebug_query=", ddebug_setup_query);
758
e9d376f0 759/*
231821d4 760 * File_ops->write method for <debugfs>/dynamic_debug/control. Gathers the
e9d376f0
JB
761 * command text from userspace, parses and executes it.
762 */
7281491c 763#define USER_BUF_PAGE 4096
e9d376f0
JB
764static ssize_t ddebug_proc_write(struct file *file, const char __user *ubuf,
765 size_t len, loff_t *offp)
766{
7281491c 767 char *tmpbuf;
fd89cfb8 768 int ret;
e9d376f0
JB
769
770 if (len == 0)
771 return 0;
7281491c
JC
772 if (len > USER_BUF_PAGE - 1) {
773 pr_warn("expected <%d bytes into control\n", USER_BUF_PAGE);
e9d376f0 774 return -E2BIG;
7281491c 775 }
16e5c1fc
AV
776 tmpbuf = memdup_user_nul(ubuf, len);
777 if (IS_ERR(tmpbuf))
778 return PTR_ERR(tmpbuf);
b8ccd5de 779 vpr_info("read %d bytes from userspace\n", (int)len);
e9d376f0 780
8e59b5cf 781 ret = ddebug_exec_queries(tmpbuf, NULL);
7281491c 782 kfree(tmpbuf);
85f7f6c0 783 if (ret < 0)
fd89cfb8 784 return ret;
e9d376f0
JB
785
786 *offp += len;
787 return len;
788}
789
790/*
791 * Set the iterator to point to the first _ddebug object
792 * and return a pointer to that first object. Returns
793 * NULL if there are no _ddebugs at all.
794 */
795static struct _ddebug *ddebug_iter_first(struct ddebug_iter *iter)
796{
797 if (list_empty(&ddebug_tables)) {
798 iter->table = NULL;
799 iter->idx = 0;
800 return NULL;
801 }
802 iter->table = list_entry(ddebug_tables.next,
803 struct ddebug_table, link);
804 iter->idx = 0;
805 return &iter->table->ddebugs[iter->idx];
806}
807
808/*
809 * Advance the iterator to point to the next _ddebug
810 * object from the one the iterator currently points at,
811 * and returns a pointer to the new _ddebug. Returns
812 * NULL if the iterator has seen all the _ddebugs.
813 */
814static struct _ddebug *ddebug_iter_next(struct ddebug_iter *iter)
815{
816 if (iter->table == NULL)
817 return NULL;
818 if (++iter->idx == iter->table->num_ddebugs) {
819 /* iterate to next table */
820 iter->idx = 0;
821 if (list_is_last(&iter->table->link, &ddebug_tables)) {
822 iter->table = NULL;
823 return NULL;
824 }
825 iter->table = list_entry(iter->table->link.next,
826 struct ddebug_table, link);
827 }
828 return &iter->table->ddebugs[iter->idx];
829}
830
831/*
832 * Seq_ops start method. Called at the start of every
833 * read() call from userspace. Takes the ddebug_lock and
834 * seeks the seq_file's iterator to the given position.
835 */
836static void *ddebug_proc_start(struct seq_file *m, loff_t *pos)
837{
838 struct ddebug_iter *iter = m->private;
839 struct _ddebug *dp;
840 int n = *pos;
841
e9d376f0
JB
842 mutex_lock(&ddebug_lock);
843
844 if (!n)
845 return SEQ_START_TOKEN;
846 if (n < 0)
847 return NULL;
848 dp = ddebug_iter_first(iter);
849 while (dp != NULL && --n > 0)
850 dp = ddebug_iter_next(iter);
851 return dp;
852}
853
854/*
855 * Seq_ops next method. Called several times within a read()
856 * call from userspace, with ddebug_lock held. Walks to the
857 * next _ddebug object with a special case for the header line.
858 */
859static void *ddebug_proc_next(struct seq_file *m, void *p, loff_t *pos)
860{
861 struct ddebug_iter *iter = m->private;
862 struct _ddebug *dp;
863
e9d376f0
JB
864 if (p == SEQ_START_TOKEN)
865 dp = ddebug_iter_first(iter);
866 else
867 dp = ddebug_iter_next(iter);
868 ++*pos;
869 return dp;
870}
871
872/*
873 * Seq_ops show method. Called several times within a read()
874 * call from userspace, with ddebug_lock held. Formats the
875 * current _ddebug as a single human-readable line, with a
876 * special case for the header line.
877 */
878static int ddebug_proc_show(struct seq_file *m, void *p)
879{
880 struct ddebug_iter *iter = m->private;
881 struct _ddebug *dp = p;
f678ce8c 882 struct flagsbuf flags;
e9d376f0 883
e9d376f0
JB
884 if (p == SEQ_START_TOKEN) {
885 seq_puts(m,
f657fd21 886 "# filename:lineno [module]function flags format\n");
e9d376f0
JB
887 return 0;
888 }
889
5ca7d2a6 890 seq_printf(m, "%s:%u [%s]%s =%s \"",
f657fd21
JP
891 trim_prefix(dp->filename), dp->lineno,
892 iter->table->mod_name, dp->function,
f678ce8c 893 ddebug_describe_flags(dp->flags, &flags));
e9d376f0
JB
894 seq_escape(m, dp->format, "\t\r\n\"");
895 seq_puts(m, "\"\n");
896
897 return 0;
898}
899
900/*
901 * Seq_ops stop method. Called at the end of each read()
902 * call from userspace. Drops ddebug_lock.
903 */
904static void ddebug_proc_stop(struct seq_file *m, void *p)
905{
e9d376f0
JB
906 mutex_unlock(&ddebug_lock);
907}
908
909static const struct seq_operations ddebug_proc_seqops = {
910 .start = ddebug_proc_start,
911 .next = ddebug_proc_next,
912 .show = ddebug_proc_show,
913 .stop = ddebug_proc_stop
914};
915
e9d376f0
JB
916static int ddebug_proc_open(struct inode *inode, struct file *file)
917{
b8ccd5de 918 vpr_info("called\n");
4bad78c5
RJ
919 return seq_open_private(file, &ddebug_proc_seqops,
920 sizeof(struct ddebug_iter));
e9d376f0
JB
921}
922
923static const struct file_operations ddebug_proc_fops = {
924 .owner = THIS_MODULE,
925 .open = ddebug_proc_open,
926 .read = seq_read,
927 .llseek = seq_lseek,
928 .release = seq_release_private,
929 .write = ddebug_proc_write
930};
931
239a5791
GKH
932static const struct proc_ops proc_fops = {
933 .proc_open = ddebug_proc_open,
934 .proc_read = seq_read,
935 .proc_lseek = seq_lseek,
936 .proc_release = seq_release_private,
937 .proc_write = ddebug_proc_write
938};
939
e9d376f0
JB
940/*
941 * Allocate a new ddebug_table for the given module
942 * and add it to the global list.
943 */
944int ddebug_add_module(struct _ddebug *tab, unsigned int n,
945 const char *name)
946{
947 struct ddebug_table *dt;
e9d376f0
JB
948
949 dt = kzalloc(sizeof(*dt), GFP_KERNEL);
513770f5
RV
950 if (dt == NULL) {
951 pr_err("error adding module: %s\n", name);
e9d376f0 952 return -ENOMEM;
513770f5 953 }
cdf6d006
RV
954 /*
955 * For built-in modules, name lives in .rodata and is
956 * immortal. For loaded modules, name points at the name[]
957 * member of struct module, which lives at least as long as
958 * this struct ddebug_table.
959 */
960 dt->mod_name = name;
e9d376f0 961 dt->num_ddebugs = n;
e9d376f0
JB
962 dt->ddebugs = tab;
963
964 mutex_lock(&ddebug_lock);
47e9f5a8 965 list_add(&dt->link, &ddebug_tables);
e9d376f0
JB
966 mutex_unlock(&ddebug_lock);
967
b52a95ea 968 v2pr_info("%3u debug prints in module %s\n", n, dt->mod_name);
e9d376f0
JB
969 return 0;
970}
e9d376f0 971
6ab676e9
JC
972/* helper for ddebug_dyndbg_(boot|module)_param_cb */
973static int ddebug_dyndbg_param_cb(char *param, char *val,
974 const char *modname, int on_err)
b48420c1 975{
b48420c1
JC
976 char *sep;
977
978 sep = strchr(param, '.');
979 if (sep) {
6ab676e9 980 /* needed only for ddebug_dyndbg_boot_param_cb */
b48420c1
JC
981 *sep = '\0';
982 modname = param;
983 param = sep + 1;
984 }
985 if (strcmp(param, "dyndbg"))
6ab676e9 986 return on_err; /* determined by caller */
b48420c1 987
8e59b5cf
JC
988 ddebug_exec_queries((val ? val : "+p"), modname);
989
b48420c1
JC
990 return 0; /* query failure shouldnt stop module load */
991}
992
6ab676e9
JC
993/* handle both dyndbg and $module.dyndbg params at boot */
994static int ddebug_dyndbg_boot_param_cb(char *param, char *val,
ecc86170 995 const char *unused, void *arg)
b48420c1 996{
6ab676e9
JC
997 vpr_info("%s=\"%s\"\n", param, val);
998 return ddebug_dyndbg_param_cb(param, val, NULL, 0);
999}
b48420c1 1000
6ab676e9
JC
1001/*
1002 * modprobe foo finds foo.params in boot-args, strips "foo.", and
1003 * passes them to load_module(). This callback gets unknown params,
1004 * processes dyndbg params, rejects others.
1005 */
1006int ddebug_dyndbg_module_param_cb(char *param, char *val, const char *module)
1007{
1008 vpr_info("module: %s %s=\"%s\"\n", module, param, val);
1009 return ddebug_dyndbg_param_cb(param, val, module, -ENOENT);
b48420c1
JC
1010}
1011
e9d376f0
JB
1012static void ddebug_table_free(struct ddebug_table *dt)
1013{
1014 list_del_init(&dt->link);
e9d376f0
JB
1015 kfree(dt);
1016}
1017
1018/*
1019 * Called in response to a module being unloaded. Removes
1020 * any ddebug_table's which point at the module.
1021 */
ff49d74a 1022int ddebug_remove_module(const char *mod_name)
e9d376f0
JB
1023{
1024 struct ddebug_table *dt, *nextdt;
1025 int ret = -ENOENT;
1026
481c0e33 1027 v2pr_info("removing module \"%s\"\n", mod_name);
e9d376f0
JB
1028
1029 mutex_lock(&ddebug_lock);
1030 list_for_each_entry_safe(dt, nextdt, &ddebug_tables, link) {
4573fe15 1031 if (dt->mod_name == mod_name) {
e9d376f0
JB
1032 ddebug_table_free(dt);
1033 ret = 0;
4573fe15 1034 break;
e9d376f0
JB
1035 }
1036 }
1037 mutex_unlock(&ddebug_lock);
1038 return ret;
1039}
e9d376f0
JB
1040
1041static void ddebug_remove_all_tables(void)
1042{
1043 mutex_lock(&ddebug_lock);
1044 while (!list_empty(&ddebug_tables)) {
1045 struct ddebug_table *dt = list_entry(ddebug_tables.next,
1046 struct ddebug_table,
1047 link);
1048 ddebug_table_free(dt);
1049 }
1050 mutex_unlock(&ddebug_lock);
1051}
1052
6a5c083d
TR
1053static __initdata int ddebug_init_success;
1054
239a5791 1055static int __init dynamic_debug_init_control(void)
e9d376f0 1056{
239a5791
GKH
1057 struct proc_dir_entry *procfs_dir;
1058 struct dentry *debugfs_dir;
6a5c083d
TR
1059
1060 if (!ddebug_init_success)
1061 return -ENODEV;
e9d376f0 1062
239a5791
GKH
1063 /* Create the control file in debugfs if it is enabled */
1064 if (debugfs_initialized()) {
1065 debugfs_dir = debugfs_create_dir("dynamic_debug", NULL);
1066 debugfs_create_file("control", 0644, debugfs_dir, NULL,
1067 &ddebug_proc_fops);
1068 }
1069
1070 /* Also create the control file in procfs */
1071 procfs_dir = proc_mkdir("dynamic_debug", NULL);
1072 if (procfs_dir)
1073 proc_create("control", 0644, procfs_dir, &proc_fops);
9fd714cd 1074
6a5c083d
TR
1075 return 0;
1076}
1077
1078static int __init dynamic_debug_init(void)
1079{
1080 struct _ddebug *iter, *iter_start;
1081 const char *modname = NULL;
b48420c1 1082 char *cmdline;
6a5c083d 1083 int ret = 0;
41076927 1084 int n = 0, entries = 0, modct = 0;
6a5c083d 1085
e5ebffe1 1086 if (&__start___dyndbg == &__stop___dyndbg) {
ceabef7d
OZ
1087 if (IS_ENABLED(CONFIG_DYNAMIC_DEBUG)) {
1088 pr_warn("_ddebug table is empty in a CONFIG_DYNAMIC_DEBUG build\n");
1089 return 1;
1090 }
1091 pr_info("Ignore empty _ddebug table in a CONFIG_DYNAMIC_DEBUG_CORE build\n");
1092 ddebug_init_success = 1;
1093 return 0;
b5b78f83 1094 }
e5ebffe1 1095 iter = __start___dyndbg;
b5b78f83
JC
1096 modname = iter->modname;
1097 iter_start = iter;
e5ebffe1 1098 for (; iter < __stop___dyndbg; iter++) {
41076927 1099 entries++;
b5b78f83 1100 if (strcmp(modname, iter->modname)) {
41076927 1101 modct++;
b5b78f83
JC
1102 ret = ddebug_add_module(iter_start, n, modname);
1103 if (ret)
af442399 1104 goto out_err;
b5b78f83
JC
1105 n = 0;
1106 modname = iter->modname;
1107 iter_start = iter;
e9d376f0 1108 }
b5b78f83 1109 n++;
e9d376f0 1110 }
b5b78f83
JC
1111 ret = ddebug_add_module(iter_start, n, modname);
1112 if (ret)
af442399 1113 goto out_err;
a648ec05 1114
af442399 1115 ddebug_init_success = 1;
81d0c2c6 1116 vpr_info("%d modules, %d entries and %d bytes in ddebug tables, %d bytes in __dyndbg section\n",
f657fd21 1117 modct, entries, (int)(modct * sizeof(struct ddebug_table)),
81d0c2c6 1118 (int)(entries * sizeof(struct _ddebug)));
af442399
JC
1119
1120 /* apply ddebug_query boot param, dont unload tables on err */
a648ec05 1121 if (ddebug_setup_string[0] != '\0') {
f657fd21 1122 pr_warn("ddebug_query param name is deprecated, change it to dyndbg\n");
8e59b5cf 1123 ret = ddebug_exec_queries(ddebug_setup_string, NULL);
85f7f6c0 1124 if (ret < 0)
f657fd21 1125 pr_warn("Invalid ddebug boot param %s\n",
4ad275e5 1126 ddebug_setup_string);
a648ec05 1127 else
85f7f6c0 1128 pr_info("%d changes by ddebug_query\n", ret);
a648ec05 1129 }
b48420c1
JC
1130 /* now that ddebug tables are loaded, process all boot args
1131 * again to find and activate queries given in dyndbg params.
1132 * While this has already been done for known boot params, it
1133 * ignored the unknown ones (dyndbg in particular). Reusing
1134 * parse_args avoids ad-hoc parsing. This will also attempt
1135 * to activate queries for not-yet-loaded modules, which is
1136 * slightly noisy if verbose, but harmless.
1137 */
1138 cmdline = kstrdup(saved_command_line, GFP_KERNEL);
1139 parse_args("dyndbg params", cmdline, NULL,
ecc86170 1140 0, 0, 0, NULL, &ddebug_dyndbg_boot_param_cb);
b48420c1 1141 kfree(cmdline);
af442399 1142 return 0;
a648ec05 1143
af442399
JC
1144out_err:
1145 ddebug_remove_all_tables();
e9d376f0
JB
1146 return 0;
1147}
6a5c083d 1148/* Allow early initialization for boot messages via boot param */
3ec5652a 1149early_initcall(dynamic_debug_init);
b48420c1 1150
6a5c083d 1151/* Debugfs setup must be done later */
239a5791 1152fs_initcall(dynamic_debug_init_control);