1 # SPDX-License-Identifier: GPL-2.0-only
3 # Architectures that offer an FUNCTION_TRACER implementation should
4 # select HAVE_FUNCTION_TRACER:
7 config USER_STACKTRACE_SUPPORT
18 depends on HAVE_RETHOOK
20 Enable generic return hooking feature. This is an internal
21 API, which will be used by other function-entry hooking
22 features like fprobe and kprobes.
24 config HAVE_FUNCTION_TRACER
27 See Documentation/trace/ftrace-design.rst
29 config HAVE_FUNCTION_GRAPH_TRACER
32 See Documentation/trace/ftrace-design.rst
34 config HAVE_FUNCTION_GRAPH_RETVAL
37 config HAVE_DYNAMIC_FTRACE
40 See Documentation/trace/ftrace-design.rst
42 config HAVE_DYNAMIC_FTRACE_WITH_REGS
45 config HAVE_DYNAMIC_FTRACE_WITH_DIRECT_CALLS
48 config HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
51 config HAVE_DYNAMIC_FTRACE_WITH_ARGS
54 If this is set, then arguments and stack can be found from
55 the ftrace_regs passed into the function callback regs parameter
56 by default, even without setting the REGS flag in the ftrace_ops.
57 This allows for use of ftrace_regs_get_argument() and
58 ftrace_regs_get_stack_pointer().
60 config HAVE_DYNAMIC_FTRACE_NO_PATCHABLE
63 If the architecture generates __patchable_function_entries sections
64 but does not want them included in the ftrace locations.
66 config HAVE_FTRACE_MCOUNT_RECORD
69 See Documentation/trace/ftrace-design.rst
71 config HAVE_SYSCALL_TRACEPOINTS
74 See Documentation/trace/ftrace-design.rst
79 Arch supports the gcc options -pg with -mfentry
81 config HAVE_NOP_MCOUNT
84 Arch supports the gcc options -pg with -mrecord-mcount and -nop-mcount
86 config HAVE_OBJTOOL_MCOUNT
89 Arch supports objtool --mcount
91 config HAVE_OBJTOOL_NOP_MCOUNT
94 Arch supports the objtool options --mcount with --mnop.
95 An architecture can select this if it wants to enable nop'ing
98 config HAVE_C_RECORDMCOUNT
101 C version of recordmcount available?
103 config HAVE_BUILDTIME_MCOUNT_SORT
106 An architecture selects this if it sorts the mcount_loc section
109 config BUILDTIME_MCOUNT_SORT
112 depends on HAVE_BUILDTIME_MCOUNT_SORT && DYNAMIC_FTRACE
114 Sort the mcount_loc section at build time.
116 config TRACER_MAX_TRACE
128 select CONTEXT_SWITCH_TRACER
132 config CONTEXT_SWITCH_TRACER
135 config RING_BUFFER_ALLOW_SWAP
138 Allow the use of ring_buffer_swap_cpu.
139 Adds a very slight overhead to tracing when enabled.
141 config PREEMPTIRQ_TRACEPOINTS
143 depends on TRACE_PREEMPT_TOGGLE || TRACE_IRQFLAGS
147 Create preempt/irq toggle tracepoints if needed, so that other parts
148 of the kernel can use them to generate or add hooks to them.
150 # All tracer options should select GENERIC_TRACER. For those options that are
151 # enabled by all tracers (context switch and event tracer) they select TRACING.
152 # This allows those options to appear when no other tracer is selected. But the
153 # options do not appear when something else selects it. We need the two options
154 # GENERIC_TRACER and TRACING to avoid circular dependencies to accomplish the
155 # hiding of the automatic options.
160 select STACKTRACE if STACKTRACE_SUPPORT
166 select NEED_TASKS_RCU
168 config GENERIC_TRACER
173 # Minimum requirements an architecture has to meet for us to
174 # be able to offer generic tracing facilities:
176 config TRACING_SUPPORT
178 depends on TRACE_IRQFLAGS_SUPPORT
179 depends on STACKTRACE_SUPPORT
184 depends on TRACING_SUPPORT
185 default y if DEBUG_KERNEL
187 Enable the kernel tracing infrastructure.
191 config BOOTTIME_TRACING
192 bool "Boot-time Tracing support"
196 Enable developer to setup ftrace subsystem via supplemental
197 kernel cmdline at boot time for debugging (tracing) driver
198 initialization and boot process.
200 config FUNCTION_TRACER
201 bool "Kernel Function Tracer"
202 depends on HAVE_FUNCTION_TRACER
204 select GENERIC_TRACER
205 select CONTEXT_SWITCH_TRACER
207 select NEED_TASKS_RCU
208 select TASKS_RUDE_RCU
210 Enable the kernel to trace every kernel function. This is done
211 by using a compiler feature to insert a small, 5-byte No-Operation
212 instruction at the beginning of every kernel function, which NOP
213 sequence is then dynamically patched into a tracer call when
214 tracing is enabled by the administrator. If it's runtime disabled
215 (the bootup default), then the overhead of the instructions is very
216 small and not measurable even in micro-benchmarks (at least on
217 x86, but may have impact on other architectures).
219 config FUNCTION_GRAPH_TRACER
220 bool "Kernel Function Graph Tracer"
221 depends on HAVE_FUNCTION_GRAPH_TRACER
222 depends on FUNCTION_TRACER
223 depends on !X86_32 || !CC_OPTIMIZE_FOR_SIZE
226 Enable the kernel to trace a function at both its return
228 Its first purpose is to trace the duration of functions and
229 draw a call graph for each thread with some information like
230 the return value. This is done by setting the current return
231 address on the current task structure into a stack of calls.
233 config FUNCTION_GRAPH_RETVAL
234 bool "Kernel Function Graph Return Value"
235 depends on HAVE_FUNCTION_GRAPH_RETVAL
236 depends on FUNCTION_GRAPH_TRACER
239 Support recording and printing the function return value when
240 using function graph tracer. It can be helpful to locate functions
241 that return errors. This feature is off by default, and you can
242 enable it via the trace option funcgraph-retval.
243 See Documentation/trace/ftrace.rst
245 config FUNCTION_GRAPH_RETADDR
246 bool "Kernel Function Graph Return Address"
247 depends on FUNCTION_GRAPH_TRACER
250 Support recording and printing the function return address when
251 using function graph tracer. It can be helpful to locate code line that
252 the function is called. This feature is off by default, and you can
253 enable it via the trace option funcgraph-retaddr.
255 config DYNAMIC_FTRACE
256 bool "enable/disable function tracing dynamically"
257 depends on FUNCTION_TRACER
258 depends on HAVE_DYNAMIC_FTRACE
261 This option will modify all the calls to function tracing
262 dynamically (will patch them out of the binary image and
263 replace them with a No-Op instruction) on boot up. During
264 compile time, a table is made of all the locations that ftrace
265 can function trace, and this table is linked into the kernel
266 image. When this is enabled, functions can be individually
267 enabled, and the functions not enabled will not affect
268 performance of the system.
270 See the files in /sys/kernel/tracing:
271 available_filter_functions
275 This way a CONFIG_FUNCTION_TRACER kernel is slightly larger, but
276 otherwise has native performance as long as no tracing is active.
278 config DYNAMIC_FTRACE_WITH_REGS
280 depends on DYNAMIC_FTRACE
281 depends on HAVE_DYNAMIC_FTRACE_WITH_REGS
283 config DYNAMIC_FTRACE_WITH_DIRECT_CALLS
285 depends on DYNAMIC_FTRACE_WITH_REGS || DYNAMIC_FTRACE_WITH_ARGS
286 depends on HAVE_DYNAMIC_FTRACE_WITH_DIRECT_CALLS
288 config DYNAMIC_FTRACE_WITH_CALL_OPS
290 depends on HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
292 config DYNAMIC_FTRACE_WITH_ARGS
294 depends on DYNAMIC_FTRACE
295 depends on HAVE_DYNAMIC_FTRACE_WITH_ARGS
298 bool "Kernel Function Probe (fprobe)"
299 depends on FUNCTION_TRACER
300 depends on DYNAMIC_FTRACE_WITH_REGS
301 depends on HAVE_RETHOOK
305 This option enables kernel function probe (fprobe) based on ftrace.
306 The fprobe is similar to kprobes, but probes only for kernel function
307 entries and exits. This also can probe multiple functions by one
312 config FUNCTION_PROFILER
313 bool "Kernel function profiler"
314 depends on FUNCTION_TRACER
317 This option enables the kernel function profiler. A file is created
318 in debugfs called function_profile_enabled which defaults to zero.
319 When a 1 is echoed into this file profiling begins, and when a
320 zero is entered, profiling stops. A "functions" file is created in
321 the trace_stat directory; this file shows the list of functions that
322 have been hit and their counters.
327 bool "Trace max stack"
328 depends on HAVE_FUNCTION_TRACER
329 select FUNCTION_TRACER
333 This special tracer records the maximum stack footprint of the
334 kernel and displays it in /sys/kernel/tracing/stack_trace.
336 This tracer works by hooking into every function call that the
337 kernel executes, and keeping a maximum stack depth value and
338 stack-trace saved. If this is configured with DYNAMIC_FTRACE
339 then it will not have any overhead while the stack tracer
342 To enable the stack tracer on bootup, pass in 'stacktrace'
343 on the kernel command line.
345 The stack tracer can also be enabled or disabled via the
346 sysctl kernel.stack_tracer_enabled
350 config TRACE_PREEMPT_TOGGLE
353 Enables hooks which will be called when preemption is first disabled,
356 config IRQSOFF_TRACER
357 bool "Interrupts-off Latency Tracer"
359 depends on TRACE_IRQFLAGS_SUPPORT
360 select TRACE_IRQFLAGS
361 select GENERIC_TRACER
362 select TRACER_MAX_TRACE
363 select RING_BUFFER_ALLOW_SWAP
364 select TRACER_SNAPSHOT
365 select TRACER_SNAPSHOT_PER_CPU_SWAP
367 This option measures the time spent in irqs-off critical
368 sections, with microsecond accuracy.
370 The default measurement method is a maximum search, which is
371 disabled by default and can be runtime (re-)started
374 echo 0 > /sys/kernel/tracing/tracing_max_latency
376 (Note that kernel size and overhead increase with this option
377 enabled. This option and the preempt-off timing option can be
378 used together or separately.)
380 config PREEMPT_TRACER
381 bool "Preemption-off Latency Tracer"
383 depends on PREEMPTION
384 select GENERIC_TRACER
385 select TRACER_MAX_TRACE
386 select RING_BUFFER_ALLOW_SWAP
387 select TRACER_SNAPSHOT
388 select TRACER_SNAPSHOT_PER_CPU_SWAP
389 select TRACE_PREEMPT_TOGGLE
391 This option measures the time spent in preemption-off critical
392 sections, with microsecond accuracy.
394 The default measurement method is a maximum search, which is
395 disabled by default and can be runtime (re-)started
398 echo 0 > /sys/kernel/tracing/tracing_max_latency
400 (Note that kernel size and overhead increase with this option
401 enabled. This option and the irqs-off timing option can be
402 used together or separately.)
405 bool "Scheduling Latency Tracer"
406 select GENERIC_TRACER
407 select CONTEXT_SWITCH_TRACER
408 select TRACER_MAX_TRACE
409 select TRACER_SNAPSHOT
411 This tracer tracks the latency of the highest priority task
412 to be scheduled in, starting from the point it has woken up.
415 bool "Tracer to detect hardware latencies (like SMIs)"
416 select GENERIC_TRACER
417 select TRACER_MAX_TRACE
419 This tracer, when enabled will create one or more kernel threads,
420 depending on what the cpumask file is set to, which each thread
421 spinning in a loop looking for interruptions caused by
422 something other than the kernel. For example, if a
423 System Management Interrupt (SMI) takes a noticeable amount of
424 time, this tracer will detect it. This is useful for testing
425 if a system is reliable for Real Time tasks.
427 Some files are created in the tracing directory when this
430 hwlat_detector/width - time in usecs for how long to spin for
431 hwlat_detector/window - time in usecs between the start of each
434 A kernel thread is created that will spin with interrupts disabled
435 for "width" microseconds in every "window" cycle. It will not spin
436 for "window - width" microseconds, where the system can
439 The output will appear in the trace and trace_pipe files.
441 When the tracer is not running, it has no affect on the system,
442 but when it is running, it can cause the system to be
443 periodically non responsive. Do not run this tracer on a
446 To enable this tracer, echo in "hwlat" into the current_tracer
447 file. Every time a latency is greater than tracing_thresh, it will
448 be recorded into the ring buffer.
450 config OSNOISE_TRACER
451 bool "OS Noise tracer"
452 select GENERIC_TRACER
453 select TRACER_MAX_TRACE
455 In the context of high-performance computing (HPC), the Operating
456 System Noise (osnoise) refers to the interference experienced by an
457 application due to activities inside the operating system. In the
458 context of Linux, NMIs, IRQs, SoftIRQs, and any other system thread
459 can cause noise to the system. Moreover, hardware-related jobs can
460 also cause noise, for example, via SMIs.
462 The osnoise tracer leverages the hwlat_detector by running a similar
463 loop with preemption, SoftIRQs and IRQs enabled, thus allowing all
464 the sources of osnoise during its execution. The osnoise tracer takes
465 note of the entry and exit point of any source of interferences,
466 increasing a per-cpu interference counter. It saves an interference
467 counter for each source of interference. The interference counter for
468 NMI, IRQs, SoftIRQs, and threads is increased anytime the tool
469 observes these interferences' entry events. When a noise happens
470 without any interference from the operating system level, the
471 hardware noise counter increases, pointing to a hardware-related
472 noise. In this way, osnoise can account for any source of
473 interference. At the end of the period, the osnoise tracer prints
474 the sum of all noise, the max single noise, the percentage of CPU
475 available for the thread, and the counters for the noise sources.
477 In addition to the tracer, a set of tracepoints were added to
478 facilitate the identification of the osnoise source.
480 The output will appear in the trace and trace_pipe files.
482 To enable this tracer, echo in "osnoise" into the current_tracer
485 config TIMERLAT_TRACER
486 bool "Timerlat tracer"
487 select OSNOISE_TRACER
488 select GENERIC_TRACER
490 The timerlat tracer aims to help the preemptive kernel developers
491 to find sources of wakeup latencies of real-time threads.
493 The tracer creates a per-cpu kernel thread with real-time priority.
494 The tracer thread sets a periodic timer to wakeup itself, and goes
495 to sleep waiting for the timer to fire. At the wakeup, the thread
496 then computes a wakeup latency value as the difference between
497 the current time and the absolute time that the timer was set
500 The tracer prints two lines at every activation. The first is the
501 timer latency observed at the hardirq context before the
502 activation of the thread. The second is the timer latency observed
503 by the thread, which is the same level that cyclictest reports. The
504 ACTIVATION ID field serves to relate the irq execution to its
505 respective thread execution.
507 The tracer is build on top of osnoise tracer, and the osnoise:
508 events can be used to trace the source of interference from NMI,
509 IRQs and other threads. It also enables the capture of the
510 stacktrace at the IRQ context, which helps to identify the code
511 path that can cause thread delay.
514 bool "Memory mapped IO tracing"
515 depends on HAVE_MMIOTRACE_SUPPORT && PCI
516 select GENERIC_TRACER
518 Mmiotrace traces Memory Mapped I/O access and is meant for
519 debugging and reverse engineering. It is called from the ioremap
520 implementation and works via page faults. Tracing is disabled by
521 default and can be enabled at run-time.
523 See Documentation/trace/mmiotrace.rst.
524 If you are not helping to develop drivers, say N.
526 config ENABLE_DEFAULT_TRACERS
527 bool "Trace process context switches and events"
528 depends on !GENERIC_TRACER
531 This tracer hooks to various trace points in the kernel,
532 allowing the user to pick and choose which trace point they
533 want to trace. It also includes the sched_switch tracer plugin.
535 config FTRACE_SYSCALLS
536 bool "Trace syscalls"
537 depends on HAVE_SYSCALL_TRACEPOINTS
538 select GENERIC_TRACER
541 Basic tracer to catch the syscall entry and exit events.
543 config TRACER_SNAPSHOT
544 bool "Create a snapshot trace buffer"
545 select TRACER_MAX_TRACE
547 Allow tracing users to take snapshot of the current buffer using the
548 ftrace interface, e.g.:
550 echo 1 > /sys/kernel/tracing/snapshot
553 config TRACER_SNAPSHOT_PER_CPU_SWAP
554 bool "Allow snapshot to swap per CPU"
555 depends on TRACER_SNAPSHOT
556 select RING_BUFFER_ALLOW_SWAP
558 Allow doing a snapshot of a single CPU buffer instead of a
559 full swap (all buffers). If this is set, then the following is
562 echo 1 > /sys/kernel/tracing/per_cpu/cpu2/snapshot
564 After which, only the tracing buffer for CPU 2 was swapped with
565 the main tracing buffer, and the other CPU buffers remain the same.
567 When this is enabled, this adds a little more overhead to the
568 trace recording, as it needs to add some checks to synchronize
569 recording with swaps. But this does not affect the performance
570 of the overall system. This is enabled by default when the preempt
571 or irq latency tracers are enabled, as those need to swap as well
572 and already adds the overhead (plus a lot more).
574 config TRACE_BRANCH_PROFILING
576 select GENERIC_TRACER
579 prompt "Branch Profiling"
580 default BRANCH_PROFILE_NONE
582 The branch profiling is a software profiler. It will add hooks
583 into the C conditionals to test which path a branch takes.
585 The likely/unlikely profiler only looks at the conditions that
586 are annotated with a likely or unlikely macro.
588 The "all branch" profiler will profile every if-statement in the
589 kernel. This profiler will also enable the likely/unlikely
592 Either of the above profilers adds a bit of overhead to the system.
593 If unsure, choose "No branch profiling".
595 config BRANCH_PROFILE_NONE
596 bool "No branch profiling"
598 No branch profiling. Branch profiling adds a bit of overhead.
599 Only enable it if you want to analyse the branching behavior.
600 Otherwise keep it disabled.
602 config PROFILE_ANNOTATED_BRANCHES
603 bool "Trace likely/unlikely profiler"
604 select TRACE_BRANCH_PROFILING
606 This tracer profiles all likely and unlikely macros
607 in the kernel. It will display the results in:
609 /sys/kernel/tracing/trace_stat/branch_annotated
611 Note: this will add a significant overhead; only turn this
612 on if you need to profile the system's use of these macros.
614 config PROFILE_ALL_BRANCHES
615 bool "Profile all if conditionals" if !FORTIFY_SOURCE
616 select TRACE_BRANCH_PROFILING
618 This tracer profiles all branch conditions. Every if ()
619 taken in the kernel is recorded whether it hit or miss.
620 The results will be displayed in:
622 /sys/kernel/tracing/trace_stat/branch_all
624 This option also enables the likely/unlikely profiler.
626 This configuration, when enabled, will impose a great overhead
627 on the system. This should only be enabled when the system
628 is to be analyzed in much detail.
631 config TRACING_BRANCHES
634 Selected by tracers that will trace the likely and unlikely
635 conditions. This prevents the tracers themselves from being
636 profiled. Profiling the tracing infrastructure can only happen
637 when the likelys and unlikelys are not being traced.
640 bool "Trace likely/unlikely instances"
641 depends on TRACE_BRANCH_PROFILING
642 select TRACING_BRANCHES
644 This traces the events of likely and unlikely condition
645 calls in the kernel. The difference between this and the
646 "Trace likely/unlikely profiler" is that this is not a
647 histogram of the callers, but actually places the calling
648 events into a running trace buffer to see when and where the
649 events happened, as well as their results.
653 config BLK_DEV_IO_TRACE
654 bool "Support for tracing block IO actions"
660 select GENERIC_TRACER
663 Say Y here if you want to be able to trace the block layer actions
664 on a given queue. Tracing allows you to see any traffic happening
665 on a block device queue. For more information (and the userspace
666 support tools needed), fetch the blktrace tools from:
668 git://git.kernel.dk/blktrace.git
670 Tracing also is possible using the ftrace interface, e.g.:
672 echo 1 > /sys/block/sda/sda1/trace/enable
673 echo blk > /sys/kernel/tracing/current_tracer
674 cat /sys/kernel/tracing/trace_pipe
680 depends on HAVE_REGS_AND_STACK_ACCESS_API
681 bool "Enable fprobe-based dynamic events"
684 select DYNAMIC_EVENTS
687 This allows user to add tracing events on the function entry and
688 exit via ftrace interface. The syntax is same as the kprobe events
689 and the kprobe events on function entry and exit will be
690 transparently converted to this fprobe events.
692 config PROBE_EVENTS_BTF_ARGS
693 depends on HAVE_FUNCTION_ARG_ACCESS_API
694 depends on FPROBE_EVENTS || KPROBE_EVENTS
695 depends on DEBUG_INFO_BTF && BPF_SYSCALL
696 bool "Support BTF function arguments for probe events"
699 The user can specify the arguments of the probe event using the names
700 of the arguments of the probed function, when the probe location is a
701 kernel function entry or a tracepoint.
702 This is available only if BTF (BPF Type Format) support is enabled.
706 depends on HAVE_REGS_AND_STACK_ACCESS_API
707 bool "Enable kprobes-based dynamic events"
710 select DYNAMIC_EVENTS
713 This allows the user to add tracing events (similar to tracepoints)
714 on the fly via the ftrace interface. See
715 Documentation/trace/kprobetrace.rst for more details.
717 Those events can be inserted wherever kprobes can probe, and record
718 various register and memory values.
720 This option is also required by perf-probe subcommand of perf tools.
721 If you want to use perf tools, this option is strongly recommended.
723 config KPROBE_EVENTS_ON_NOTRACE
724 bool "Do NOT protect notrace function from kprobe events"
725 depends on KPROBE_EVENTS
726 depends on DYNAMIC_FTRACE
729 This is only for the developers who want to debug ftrace itself
732 If kprobes can use ftrace instead of breakpoint, ftrace related
733 functions are protected from kprobe-events to prevent an infinite
734 recursion or any unexpected execution path which leads to a kernel
737 This option disables such protection and allows you to put kprobe
738 events on ftrace functions for debugging ftrace by itself.
739 Note that this might let you shoot yourself in the foot.
744 bool "Enable uprobes-based dynamic events"
745 depends on ARCH_SUPPORTS_UPROBES
747 depends on PERF_EVENTS
750 select DYNAMIC_EVENTS
754 This allows the user to add tracing events on top of userspace
755 dynamic events (similar to tracepoints) on the fly via the trace
756 events interface. Those events can be inserted wherever uprobes
757 can probe, and record various registers.
758 This option is required if you plan to use perf-probe subcommand
759 of perf tools on user space applications.
762 depends on BPF_SYSCALL
763 depends on (KPROBE_EVENTS || UPROBE_EVENTS) && PERF_EVENTS
767 This allows the user to attach BPF programs to kprobe, uprobe, and
770 config DYNAMIC_EVENTS
776 config BPF_KPROBE_OVERRIDE
777 bool "Enable BPF programs to override a kprobed function"
778 depends on BPF_EVENTS
779 depends on FUNCTION_ERROR_INJECTION
782 Allows BPF to override the execution of a probed function and
783 set a different return value. This is used for error injection.
785 config FTRACE_MCOUNT_RECORD
787 depends on DYNAMIC_FTRACE
788 depends on HAVE_FTRACE_MCOUNT_RECORD
790 config FTRACE_MCOUNT_USE_PATCHABLE_FUNCTION_ENTRY
792 depends on FTRACE_MCOUNT_RECORD
794 config FTRACE_MCOUNT_USE_CC
796 depends on $(cc-option,-mrecord-mcount)
797 depends on !FTRACE_MCOUNT_USE_PATCHABLE_FUNCTION_ENTRY
798 depends on FTRACE_MCOUNT_RECORD
800 config FTRACE_MCOUNT_USE_OBJTOOL
802 depends on HAVE_OBJTOOL_MCOUNT
803 depends on !FTRACE_MCOUNT_USE_PATCHABLE_FUNCTION_ENTRY
804 depends on !FTRACE_MCOUNT_USE_CC
805 depends on FTRACE_MCOUNT_RECORD
808 config FTRACE_MCOUNT_USE_RECORDMCOUNT
810 depends on !FTRACE_MCOUNT_USE_PATCHABLE_FUNCTION_ENTRY
811 depends on !FTRACE_MCOUNT_USE_CC
812 depends on !FTRACE_MCOUNT_USE_OBJTOOL
813 depends on FTRACE_MCOUNT_RECORD
817 depends on ARCH_HAVE_NMI_SAFE_CMPXCHG
819 tracing_map is a special-purpose lock-free map for tracing,
820 separated out as a stand-alone facility in order to allow it
821 to be shared between multiple tracers. It isn't meant to be
822 generally used outside of that context, and is normally
823 selected by tracers that use it.
826 bool "Synthetic trace events"
828 select DYNAMIC_EVENTS
831 Synthetic events are user-defined trace events that can be
832 used to combine data from other trace events or in fact any
833 data source. Synthetic events can be generated indirectly
834 via the trace() action of histogram triggers or directly
835 by way of an in-kernel API.
837 See Documentation/trace/events.rst or
838 Documentation/trace/histogram.rst for details and examples.
843 bool "User trace events"
845 select DYNAMIC_EVENTS
847 User trace events are user-defined trace events that
848 can be used like an existing kernel trace event. User trace
849 events are generated by writing to a tracefs file. User
850 processes can determine if their tracing events should be
851 generated by registering a value and bit with the kernel
852 that reflects when it is enabled or not.
854 See Documentation/trace/user_events.rst.
858 bool "Histogram triggers"
859 depends on ARCH_HAVE_NMI_SAFE_CMPXCHG
862 select DYNAMIC_EVENTS
866 Hist triggers allow one or more arbitrary trace event fields
867 to be aggregated into hash tables and dumped to stdout by
868 reading a debugfs/tracefs file. They're useful for
869 gathering quick and dirty (though precise) summaries of
870 event activity as an initial guide for further investigation
871 using more advanced tools.
873 Inter-event tracing of quantities such as latencies is also
874 supported using hist triggers under this option.
876 See Documentation/trace/histogram.rst.
879 config TRACE_EVENT_INJECT
880 bool "Trace event injection"
883 Allow user-space to inject a specific trace event into the ring
884 buffer. This is mainly used for testing purpose.
888 config TRACEPOINT_BENCHMARK
889 bool "Add tracepoint that benchmarks tracepoints"
891 This option creates the tracepoint "benchmark:benchmark_event".
892 When the tracepoint is enabled, it kicks off a kernel thread that
893 goes into an infinite loop (calling cond_resched() to let other tasks
894 run), and calls the tracepoint. Each iteration will record the time
895 it took to write to the tracepoint and the next iteration that
896 data will be passed to the tracepoint itself. That is, the tracepoint
897 will report the time it took to do the previous tracepoint.
898 The string written to the tracepoint is a static string of 128 bytes
899 to keep the time the same. The initial string is simply a write of
900 "START". The second string records the cold cache time of the first
901 write which is not added to the rest of the calculations.
903 As it is a tight loop, it benchmarks as hot cache. That's fine because
904 we care most about hot paths that are probably in cache already.
906 An example of the output:
909 first=3672 [COLD CACHED]
910 last=632 first=3672 max=632 min=632 avg=316 std=446 std^2=199712
911 last=278 first=3672 max=632 min=278 avg=303 std=316 std^2=100337
912 last=277 first=3672 max=632 min=277 avg=296 std=258 std^2=67064
913 last=273 first=3672 max=632 min=273 avg=292 std=224 std^2=50411
914 last=273 first=3672 max=632 min=273 avg=288 std=200 std^2=40389
915 last=281 first=3672 max=632 min=273 avg=287 std=183 std^2=33666
918 config RING_BUFFER_BENCHMARK
919 tristate "Ring buffer benchmark stress tester"
920 depends on RING_BUFFER
922 This option creates a test to stress the ring buffer and benchmark it.
923 It creates its own ring buffer such that it will not interfere with
924 any other users of the ring buffer (such as ftrace). It then creates
925 a producer and consumer that will run for 10 seconds and sleep for
926 10 seconds. Each interval it will print out the number of events
927 it recorded and give a rough estimate of how long each iteration took.
929 It does not disable interrupts or raise its priority, so it may be
930 affected by processes that are running.
934 config TRACE_EVAL_MAP_FILE
935 bool "Show eval mappings for trace events"
938 The "print fmt" of the trace events will show the enum/sizeof names
939 instead of their values. This can cause problems for user space tools
940 that use this string to parse the raw data as user space does not know
941 how to convert the string to its value.
943 To fix this, there's a special macro in the kernel that can be used
944 to convert an enum/sizeof into its value. If this macro is used, then
945 the print fmt strings will be converted to their values.
947 If something does not get converted properly, this option can be
948 used to show what enums/sizeof the kernel tried to convert.
950 This option is for debugging the conversions. A file is created
951 in the tracing directory called "eval_map" that will show the
952 names matched with their values and what trace event system they
955 Normally, the mapping of the strings to values will be freed after
956 boot up or module load. With this option, they will not be freed, as
957 they are needed for the "eval_map" file. Enabling this option will
958 increase the memory footprint of the running kernel.
962 config FTRACE_RECORD_RECURSION
963 bool "Record functions that recurse in function tracing"
964 depends on FUNCTION_TRACER
966 All callbacks that attach to the function tracing have some sort
967 of protection against recursion. Even though the protection exists,
968 it adds overhead. This option will create a file in the tracefs
969 file system called "recursed_functions" that will list the functions
970 that triggered a recursion.
972 This will add more overhead to cases that have recursion.
976 config FTRACE_RECORD_RECURSION_SIZE
977 int "Max number of recursed functions to record"
979 depends on FTRACE_RECORD_RECURSION
981 This defines the limit of number of functions that can be
982 listed in the "recursed_functions" file, that lists all
983 the functions that caused a recursion to happen.
984 This file can be reset, but the limit can not change in
987 config FTRACE_VALIDATE_RCU_IS_WATCHING
988 bool "Validate RCU is on during ftrace execution"
989 depends on FUNCTION_TRACER
990 depends on ARCH_WANTS_NO_INSTR
992 All callbacks that attach to the function tracing have some sort of
993 protection against recursion. This option is only to verify that
994 ftrace (and other users of ftrace_test_recursion_trylock()) are not
995 called outside of RCU, as if they are, it can cause a race. But it
996 also has a noticeable overhead when enabled.
1000 config RING_BUFFER_RECORD_RECURSION
1001 bool "Record functions that recurse in the ring buffer"
1002 depends on FTRACE_RECORD_RECURSION
1003 # default y, because it is coupled with FTRACE_RECORD_RECURSION
1006 The ring buffer has its own internal recursion. Although when
1007 recursion happens it won't cause harm because of the protection,
1008 but it does cause unwanted overhead. Enabling this option will
1009 place where recursion was detected into the ftrace "recursed_functions"
1012 This will add more overhead to cases that have recursion.
1014 config GCOV_PROFILE_FTRACE
1015 bool "Enable GCOV profiling on ftrace subsystem"
1016 depends on GCOV_KERNEL
1018 Enable GCOV profiling on ftrace subsystem for checking
1019 which functions/lines are tested.
1023 Note that on a kernel compiled with this config, ftrace will
1024 run significantly slower.
1026 config FTRACE_SELFTEST
1029 config FTRACE_STARTUP_TEST
1030 bool "Perform a startup test on ftrace"
1031 depends on GENERIC_TRACER
1032 select FTRACE_SELFTEST
1034 This option performs a series of startup tests on ftrace. On bootup
1035 a series of tests are made to verify that the tracer is
1036 functioning properly. It will do tests on all the configured
1039 config EVENT_TRACE_STARTUP_TEST
1040 bool "Run selftest on trace events"
1041 depends on FTRACE_STARTUP_TEST
1044 This option performs a test on all trace events in the system.
1045 It basically just enables each event and runs some code that
1046 will trigger events (not necessarily the event it enables)
1047 This may take some time run as there are a lot of events.
1049 config EVENT_TRACE_TEST_SYSCALLS
1050 bool "Run selftest on syscall events"
1051 depends on EVENT_TRACE_STARTUP_TEST
1053 This option will also enable testing every syscall event.
1054 It only enables the event and disables it and runs various loads
1055 with the event enabled. This adds a bit more time for kernel boot
1056 up since it runs this on every system call defined.
1058 TBD - enable a way to actually call the syscalls as we test their
1061 config FTRACE_SORT_STARTUP_TEST
1062 bool "Verify compile time sorting of ftrace functions"
1063 depends on DYNAMIC_FTRACE
1064 depends on BUILDTIME_MCOUNT_SORT
1066 Sorting of the mcount_loc sections that is used to find the
1067 where the ftrace knows where to patch functions for tracing
1068 and other callbacks is done at compile time. But if the sort
1069 is not done correctly, it will cause non-deterministic failures.
1070 When this is set, the sorted sections will be verified that they
1071 are in deed sorted and will warn if they are not.
1075 config RING_BUFFER_STARTUP_TEST
1076 bool "Ring buffer startup self test"
1077 depends on RING_BUFFER
1079 Run a simple self test on the ring buffer on boot up. Late in the
1080 kernel boot sequence, the test will start that kicks off
1081 a thread per cpu. Each thread will write various size events
1082 into the ring buffer. Another thread is created to send IPIs
1083 to each of the threads, where the IPI handler will also write
1084 to the ring buffer, to test/stress the nesting ability.
1085 If any anomalies are discovered, a warning will be displayed
1086 and all ring buffers will be disabled.
1088 The test runs for 10 seconds. This will slow your boot time
1089 by at least 10 more seconds.
1091 At the end of the test, statistics and more checks are done.
1092 It will output the stats of each per cpu buffer: What
1093 was written, the sizes, what was read, what was lost, and
1094 other similar details.
1098 config RING_BUFFER_VALIDATE_TIME_DELTAS
1099 bool "Verify ring buffer time stamp deltas"
1100 depends on RING_BUFFER
1102 This will audit the time stamps on the ring buffer sub
1103 buffer to make sure that all the time deltas for the
1104 events on a sub buffer matches the current time stamp.
1105 This audit is performed for every event that is not
1106 interrupted, or interrupting another event. A check
1107 is also made when traversing sub buffers to make sure
1108 that all the deltas on the previous sub buffer do not
1109 add up to be greater than the current time stamp.
1111 NOTE: This adds significant overhead to recording of events,
1112 and should only be used to test the logic of the ring buffer.
1113 Do not use it on production systems.
1115 Only say Y if you understand what this does, and you
1116 still want it enabled. Otherwise say N
1118 config MMIOTRACE_TEST
1119 tristate "Test module for mmiotrace"
1120 depends on MMIOTRACE && m
1122 This is a dumb module for testing mmiotrace. It is very dangerous
1123 as it will write garbage to IO memory starting at a given address.
1124 However, it should be safe to use on e.g. unused portion of VRAM.
1126 Say N, unless you absolutely know what you are doing.
1128 config PREEMPTIRQ_DELAY_TEST
1129 tristate "Test module to create a preempt / IRQ disable delay thread to test latency tracers"
1132 Select this option to build a test module that can help test latency
1133 tracers by executing a preempt or irq disable section with a user
1134 configurable delay. The module busy waits for the duration of the
1137 For example, the following invocation generates a burst of three
1138 irq-disabled critical sections for 500us:
1139 modprobe preemptirq_delay_test test_mode=irq delay=500 burst_size=3
1141 What's more, if you want to attach the test on the cpu which the latency
1142 tracer is running on, specify cpu_affinity=cpu_num at the end of the
1147 config SYNTH_EVENT_GEN_TEST
1148 tristate "Test module for in-kernel synthetic event generation"
1149 depends on SYNTH_EVENTS && m
1151 This option creates a test module to check the base
1152 functionality of in-kernel synthetic event definition and
1155 To test, insert the module, and then check the trace buffer
1156 for the generated sample events.
1160 config KPROBE_EVENT_GEN_TEST
1161 tristate "Test module for in-kernel kprobe event generation"
1162 depends on KPROBE_EVENTS && m
1164 This option creates a test module to check the base
1165 functionality of in-kernel kprobe event definition.
1167 To test, insert the module, and then check the trace buffer
1168 for the generated kprobe events.
1172 config HIST_TRIGGERS_DEBUG
1173 bool "Hist trigger debug support"
1174 depends on HIST_TRIGGERS
1176 Add "hist_debug" file for each event, which when read will
1177 dump out a bunch of internal details about the hist triggers
1178 defined on that event.
1180 The hist_debug file serves a couple of purposes:
1182 - Helps developers verify that nothing is broken.
1184 - Provides educational information to support the details
1185 of the hist trigger internals as described by
1186 Documentation/trace/histogram-design.rst.
1188 The hist_debug output only covers the data structures
1189 related to the histogram definitions themselves and doesn't
1190 display the internals of map buckets or variable values of
1195 source "kernel/trace/rv/Kconfig"