Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit e349b1b7 authored by Jonathan Corbet's avatar Jonathan Corbet
Browse files

Merge branch 'doc/4.9' into docs-next

parents 5dc6911f 5512128f
Loading
Loading
Loading
Loading
+190 −169
Original line number Original line Diff line number Diff line
Copyright 2010 Nicolas Palix <npalix@diku.dk>
.. Copyright 2010 Nicolas Palix <npalix@diku.dk>
Copyright 2010 Julia Lawall <julia@diku.dk>
.. Copyright 2010 Julia Lawall <julia@diku.dk>
Copyright 2010 Gilles Muller <Gilles.Muller@lip6.fr>
.. Copyright 2010 Gilles Muller <Gilles.Muller@lip6.fr>


.. highlight:: none

Coccinelle
==========

Coccinelle is a tool for pattern matching and text transformation that has
many uses in kernel development, including the application of complex,
tree-wide patches and detection of problematic programming patterns.


Getting Coccinelle
Getting Coccinelle
~~~~~~~~~~~~~~~~~~~~
-------------------


The semantic patches included in the kernel use features and options
The semantic patches included in the kernel use features and options
which are provided by Coccinelle version 1.0.0-rc11 and above.
which are provided by Coccinelle version 1.0.0-rc11 and above.
@@ -22,24 +30,23 @@ of many distributions, e.g. :
 - NetBSD
 - NetBSD
 - FreeBSD
 - FreeBSD



You can get the latest version released from the Coccinelle homepage at
You can get the latest version released from the Coccinelle homepage at
http://coccinelle.lip6.fr/
http://coccinelle.lip6.fr/


Information and tips about Coccinelle are also provided on the wiki
Information and tips about Coccinelle are also provided on the wiki
pages at http://cocci.ekstranet.diku.dk/wiki/doku.php
pages at http://cocci.ekstranet.diku.dk/wiki/doku.php


Once you have it, run the following command:
Once you have it, run the following command::


     	./configure
     	./configure
        make
        make


as a regular user, and install it with
as a regular user, and install it with::


        sudo make install
        sudo make install


Supplemental documentation
Supplemental documentation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---------------------------


For supplemental documentation refer to the wiki:
For supplemental documentation refer to the wiki:


@@ -48,48 +55,51 @@ https://bottest.wiki.kernel.org/coccicheck
The wiki documentation always refers to the linux-next version of the script.
The wiki documentation always refers to the linux-next version of the script.


Using Coccinelle on the Linux kernel
Using Coccinelle on the Linux kernel
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
------------------------------------


A Coccinelle-specific target is defined in the top level
A Coccinelle-specific target is defined in the top level
Makefile. This target is named 'coccicheck' and calls the 'coccicheck'
Makefile. This target is named ``coccicheck`` and calls the ``coccicheck``
front-end in the 'scripts' directory.
front-end in the ``scripts`` directory.


Four basic modes are defined: patch, report, context, and org. The mode to
Four basic modes are defined: ``patch``, ``report``, ``context``, and
use is specified by setting the MODE variable with 'MODE=<mode>'.
``org``. The mode to use is specified by setting the MODE variable with
``MODE=<mode>``.


'patch' proposes a fix, when possible.
- ``patch`` proposes a fix, when possible.


'report' generates a list in the following format:
- ``report`` generates a list in the following format:
  file:line:column-column: message
  file:line:column-column: message


'context' highlights lines of interest and their context in a
- ``context`` highlights lines of interest and their context in a
diff-like style.Lines of interest are indicated with '-'.
  diff-like style.Lines of interest are indicated with ``-``.


'org' generates a report in the Org mode format of Emacs.
- ``org`` generates a report in the Org mode format of Emacs.


Note that not all semantic patches implement all modes. For easy use
Note that not all semantic patches implement all modes. For easy use
of Coccinelle, the default mode is "report".
of Coccinelle, the default mode is "report".


Two other modes provide some common combinations of these modes.
Two other modes provide some common combinations of these modes.


'chain' tries the previous modes in the order above until one succeeds.
- ``chain`` tries the previous modes in the order above until one succeeds.


'rep+ctxt' runs successively the report mode and the context mode.
- ``rep+ctxt`` runs successively the report mode and the context mode.
  It should be used with the C option (described later)
  It should be used with the C option (described later)
  which checks the code on a file basis.
  which checks the code on a file basis.


Examples:
Examples
	To make a report for every semantic patch, run the following command:
~~~~~~~~

To make a report for every semantic patch, run the following command::


		make coccicheck MODE=report
		make coccicheck MODE=report


	To produce patches, run:
To produce patches, run::


		make coccicheck MODE=patch
		make coccicheck MODE=patch




The coccicheck target applies every semantic patch available in the
The coccicheck target applies every semantic patch available in the
sub-directories of 'scripts/coccinelle' to the entire Linux kernel.
sub-directories of ``scripts/coccinelle`` to the entire Linux kernel.


For each semantic patch, a commit message is proposed.  It gives a
For each semantic patch, a commit message is proposed.  It gives a
description of the problem being checked by the semantic patch, and
description of the problem being checked by the semantic patch, and
@@ -99,15 +109,15 @@ As any static code analyzer, Coccinelle produces false
positives. Thus, reports must be carefully checked, and patches
positives. Thus, reports must be carefully checked, and patches
reviewed.
reviewed.


To enable verbose messages set the V= variable, for example:
To enable verbose messages set the V= variable, for example::


   make coccicheck MODE=report V=1
   make coccicheck MODE=report V=1


Coccinelle parallelization
Coccinelle parallelization
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---------------------------


By default, coccicheck tries to run as parallel as possible. To change
By default, coccicheck tries to run as parallel as possible. To change
the parallelism, set the J= variable. For example, to run across 4 CPUs:
the parallelism, set the J= variable. For example, to run across 4 CPUs::


   make coccicheck MODE=report J=4
   make coccicheck MODE=report J=4


@@ -115,44 +125,47 @@ As of Coccinelle 1.0.2 Coccinelle uses Ocaml parmap for parallelization,
if support for this is detected you will benefit from parmap parallelization.
if support for this is detected you will benefit from parmap parallelization.


When parmap is enabled coccicheck will enable dynamic load balancing by using
When parmap is enabled coccicheck will enable dynamic load balancing by using
'--chunksize 1' argument, this ensures we keep feeding threads with work
``--chunksize 1`` argument, this ensures we keep feeding threads with work
one by one, so that we avoid the situation where most work gets done by only
one by one, so that we avoid the situation where most work gets done by only
a few threads. With dynamic load balancing, if a thread finishes early we keep
a few threads. With dynamic load balancing, if a thread finishes early we keep
feeding it more work.
feeding it more work.


When parmap is enabled, if an error occurs in Coccinelle, this error
When parmap is enabled, if an error occurs in Coccinelle, this error
value is propagated back, the return value of the 'make coccicheck'
value is propagated back, the return value of the ``make coccicheck``
captures this return value.
captures this return value.


Using Coccinelle with a single semantic patch
Using Coccinelle with a single semantic patch
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---------------------------------------------


The optional make variable COCCI can be used to check a single
The optional make variable COCCI can be used to check a single
semantic patch. In that case, the variable must be initialized with
semantic patch. In that case, the variable must be initialized with
the name of the semantic patch to apply.
the name of the semantic patch to apply.


For instance:
For instance::


	make coccicheck COCCI=<my_SP.cocci> MODE=patch
	make coccicheck COCCI=<my_SP.cocci> MODE=patch
or

or::

	make coccicheck COCCI=<my_SP.cocci> MODE=report
	make coccicheck COCCI=<my_SP.cocci> MODE=report




Controlling Which Files are Processed by Coccinelle
Controlling Which Files are Processed by Coccinelle
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---------------------------------------------------

By default the entire kernel source tree is checked.
By default the entire kernel source tree is checked.


To apply Coccinelle to a specific directory, M= can be used.
To apply Coccinelle to a specific directory, ``M=`` can be used.
For example, to check drivers/net/wireless/ one may write:
For example, to check drivers/net/wireless/ one may write::


    make coccicheck M=drivers/net/wireless/
    make coccicheck M=drivers/net/wireless/


To apply Coccinelle on a file basis, instead of a directory basis, the
To apply Coccinelle on a file basis, instead of a directory basis, the
following command may be used:
following command may be used::


    make C=1 CHECK="scripts/coccicheck"
    make C=1 CHECK="scripts/coccicheck"


To check only newly edited code, use the value 2 for the C flag, i.e.
To check only newly edited code, use the value 2 for the C flag, i.e.::


    make C=2 CHECK="scripts/coccicheck"
    make C=2 CHECK="scripts/coccicheck"


@@ -167,7 +180,7 @@ The "report" mode is the default. You can select another one with the
MODE variable explained above.
MODE variable explained above.


Debugging Coccinelle SmPL patches
Debugging Coccinelle SmPL patches
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---------------------------------


Using coccicheck is best as it provides in the spatch command line
Using coccicheck is best as it provides in the spatch command line
include options matching the options used when we compile the kernel.
include options matching the options used when we compile the kernel.
@@ -177,8 +190,8 @@ manually run Coccinelle with debug options added.
Alternatively you can debug running Coccinelle against SmPL patches
Alternatively you can debug running Coccinelle against SmPL patches
by asking for stderr to be redirected to stderr, by default stderr
by asking for stderr to be redirected to stderr, by default stderr
is redirected to /dev/null, if you'd like to capture stderr you
is redirected to /dev/null, if you'd like to capture stderr you
can specify the DEBUG_FILE="file.txt" option to coccicheck. For
can specify the ``DEBUG_FILE="file.txt"`` option to coccicheck. For
instance:
instance::


    rm -f cocci.err
    rm -f cocci.err
    make coccicheck COCCI=scripts/coccinelle/free/kfree.cocci MODE=report DEBUG_FILE=cocci.err
    make coccicheck COCCI=scripts/coccinelle/free/kfree.cocci MODE=report DEBUG_FILE=cocci.err
@@ -186,7 +199,7 @@ instance:


You can use SPFLAGS to add debugging flags, for instance you may want to
You can use SPFLAGS to add debugging flags, for instance you may want to
add both --profile --show-trying to SPFLAGS when debugging. For instance
add both --profile --show-trying to SPFLAGS when debugging. For instance
you may want to use:
you may want to use::


    rm -f err.log
    rm -f err.log
    export COCCI=scripts/coccinelle/misc/irqf_oneshot.cocci
    export COCCI=scripts/coccinelle/misc/irqf_oneshot.cocci
@@ -199,23 +212,23 @@ work.
DEBUG_FILE support is only supported when using coccinelle >= 1.2.
DEBUG_FILE support is only supported when using coccinelle >= 1.2.


.cocciconfig support
.cocciconfig support
~~~~~~~~~~~~~~~~~~~~~~
--------------------


Coccinelle supports reading .cocciconfig for default Coccinelle options that
Coccinelle supports reading .cocciconfig for default Coccinelle options that
should be used every time spatch is spawned, the order of precedence for
should be used every time spatch is spawned, the order of precedence for
variables for .cocciconfig is as follows:
variables for .cocciconfig is as follows:


  o Your current user's home directory is processed first
- Your current user's home directory is processed first
  o Your directory from which spatch is called is processed next
- Your directory from which spatch is called is processed next
  o The directory provided with the --dir option is processed last, if used
- The directory provided with the --dir option is processed last, if used


Since coccicheck runs through make, it naturally runs from the kernel
Since coccicheck runs through make, it naturally runs from the kernel
proper dir, as such the second rule above would be implied for picking up a
proper dir, as such the second rule above would be implied for picking up a
.cocciconfig when using 'make coccicheck'.
.cocciconfig when using ``make coccicheck``.


'make coccicheck' also supports using M= targets.If you do not supply
``make coccicheck`` also supports using M= targets.If you do not supply
any M= target, it is assumed you want to target the entire kernel.
any M= target, it is assumed you want to target the entire kernel.
The kernel coccicheck script has:
The kernel coccicheck script has::


    if [ "$KBUILD_EXTMOD" = "" ] ; then
    if [ "$KBUILD_EXTMOD" = "" ] ; then
        OPTIONS="--dir $srctree $COCCIINCLUDE"
        OPTIONS="--dir $srctree $COCCIINCLUDE"
@@ -235,12 +248,12 @@ override any of the kernel's .coccicheck's settings using SPFLAGS.


We help Coccinelle when used against Linux with a set of sensible defaults
We help Coccinelle when used against Linux with a set of sensible defaults
options for Linux with our own Linux .cocciconfig. This hints to coccinelle
options for Linux with our own Linux .cocciconfig. This hints to coccinelle
git can be used for 'git grep' queries over coccigrep. A timeout of 200
git can be used for ``git grep`` queries over coccigrep. A timeout of 200
seconds should suffice for now.
seconds should suffice for now.


The options picked up by coccinelle when reading a .cocciconfig do not appear
The options picked up by coccinelle when reading a .cocciconfig do not appear
as arguments to spatch processes running on your system, to confirm what
as arguments to spatch processes running on your system, to confirm what
options will be used by Coccinelle run:
options will be used by Coccinelle run::


      spatch --print-options-only
      spatch --print-options-only


@@ -253,79 +266,81 @@ desired. See below section "Additional flags" for more details on how to use
idutils.
idutils.


Additional flags
Additional flags
~~~~~~~~~~~~~~~~~~
----------------


Additional flags can be passed to spatch through the SPFLAGS
Additional flags can be passed to spatch through the SPFLAGS
variable. This works as Coccinelle respects the last flags
variable. This works as Coccinelle respects the last flags
given to it when options are in conflict.
given to it when options are in conflict. ::


    make SPFLAGS=--use-glimpse coccicheck
    make SPFLAGS=--use-glimpse coccicheck


Coccinelle supports idutils as well but requires coccinelle >= 1.0.6.
Coccinelle supports idutils as well but requires coccinelle >= 1.0.6.
When no ID file is specified coccinelle assumes your ID database file
When no ID file is specified coccinelle assumes your ID database file
is in the file .id-utils.index on the top level of the kernel, coccinelle
is in the file .id-utils.index on the top level of the kernel, coccinelle
carries a script scripts/idutils_index.sh which creates the database with
carries a script scripts/idutils_index.sh which creates the database with::


    mkid -i C --output .id-utils.index
    mkid -i C --output .id-utils.index


If you have another database filename you can also just symlink with this
If you have another database filename you can also just symlink with this
name.
name. ::


    make SPFLAGS=--use-idutils coccicheck
    make SPFLAGS=--use-idutils coccicheck


Alternatively you can specify the database filename explicitly, for
Alternatively you can specify the database filename explicitly, for
instance:
instance::


    make SPFLAGS="--use-idutils /full-path/to/ID" coccicheck
    make SPFLAGS="--use-idutils /full-path/to/ID" coccicheck


See spatch --help to learn more about spatch options.
See ``spatch --help`` to learn more about spatch options.


Note that the '--use-glimpse' and '--use-idutils' options
Note that the ``--use-glimpse`` and ``--use-idutils`` options
require external tools for indexing the code. None of them is
require external tools for indexing the code. None of them is
thus active by default. However, by indexing the code with
thus active by default. However, by indexing the code with
one of these tools, and according to the cocci file used,
one of these tools, and according to the cocci file used,
spatch could proceed the entire code base more quickly.
spatch could proceed the entire code base more quickly.


SmPL patch specific options
SmPL patch specific options
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
---------------------------


SmPL patches can have their own requirements for options passed
SmPL patches can have their own requirements for options passed
to Coccinelle. SmPL patch specific options can be provided by
to Coccinelle. SmPL patch specific options can be provided by
providing them at the top of the SmPL patch, for instance:
providing them at the top of the SmPL patch, for instance::


	// Options: --no-includes --include-headers
	// Options: --no-includes --include-headers


SmPL patch Coccinelle requirements
SmPL patch Coccinelle requirements
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
----------------------------------


As Coccinelle features get added some more advanced SmPL patches
As Coccinelle features get added some more advanced SmPL patches
may require newer versions of Coccinelle. If an SmPL patch requires
may require newer versions of Coccinelle. If an SmPL patch requires
at least a version of Coccinelle, this can be specified as follows,
at least a version of Coccinelle, this can be specified as follows,
as an example if requiring at least Coccinelle >= 1.0.5:
as an example if requiring at least Coccinelle >= 1.0.5::


	// Requires: 1.0.5
	// Requires: 1.0.5


Proposing new semantic patches
Proposing new semantic patches
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-------------------------------


New semantic patches can be proposed and submitted by kernel
New semantic patches can be proposed and submitted by kernel
developers. For sake of clarity, they should be organized in the
developers. For sake of clarity, they should be organized in the
sub-directories of 'scripts/coccinelle/'.
sub-directories of ``scripts/coccinelle/``.



Detailed description of the ``report`` mode
-------------------------------------------


 Detailed description of the 'report' mode
``report`` generates a list in the following format::
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


'report' generates a list in the following format:
  file:line:column-column: message
  file:line:column-column: message


Example:
Example
~~~~~~~


Running
Running::


	make coccicheck MODE=report COCCI=scripts/coccinelle/api/err_cast.cocci
	make coccicheck MODE=report COCCI=scripts/coccinelle/api/err_cast.cocci


will execute the following part of the SmPL script.
will execute the following part of the SmPL script::


   <smpl>
   <smpl>
   @r depends on !context && !patch && (org || report)@
   @r depends on !context && !patch && (org || report)@
@@ -345,25 +360,27 @@ coccilib.report.print_report(p[0], msg)
   </smpl>
   </smpl>


This SmPL excerpt generates entries on the standard output, as
This SmPL excerpt generates entries on the standard output, as
illustrated below:
illustrated below::


    /home/user/linux/crypto/ctr.c:188:9-16: ERR_CAST can be used with alg
    /home/user/linux/crypto/ctr.c:188:9-16: ERR_CAST can be used with alg
    /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth
    /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth
    /home/user/linux/crypto/xts.c:227:9-16: ERR_CAST can be used with alg
    /home/user/linux/crypto/xts.c:227:9-16: ERR_CAST can be used with alg




 Detailed description of the 'patch' mode
Detailed description of the ``patch`` mode
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
------------------------------------------


When the 'patch' mode is available, it proposes a fix for each problem
When the ``patch`` mode is available, it proposes a fix for each problem
identified.
identified.


Example:
Example
~~~~~~~

Running::


Running
	make coccicheck MODE=patch COCCI=scripts/coccinelle/api/err_cast.cocci
	make coccicheck MODE=patch COCCI=scripts/coccinelle/api/err_cast.cocci


will execute the following part of the SmPL script.
will execute the following part of the SmPL script::


    <smpl>
    <smpl>
    @ depends on !context && patch && !org && !report @
    @ depends on !context && patch && !org && !report @
@@ -375,7 +392,7 @@ expression x;
    </smpl>
    </smpl>


This SmPL excerpt generates patch hunks on the standard output, as
This SmPL excerpt generates patch hunks on the standard output, as
illustrated below:
illustrated below::


    diff -u -p a/crypto/ctr.c b/crypto/ctr.c
    diff -u -p a/crypto/ctr.c b/crypto/ctr.c
    --- a/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200
    --- a/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200
@@ -390,24 +407,26 @@ diff -u -p a/crypto/ctr.c b/crypto/ctr.c
 	/* Block size must be >= 4 bytes. */
 	/* Block size must be >= 4 bytes. */
 	err = -EINVAL;
 	err = -EINVAL;


 Detailed description of the 'context' mode
Detailed description of the ``context`` mode
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
--------------------------------------------


'context' highlights lines of interest and their context
``context`` highlights lines of interest and their context
in a diff-like style.
in a diff-like style.


NOTE: The diff-like output generated is NOT an applicable patch. The
      **NOTE**: The diff-like output generated is NOT an applicable patch. The
      intent of the 'context' mode is to highlight the important lines
      intent of the ``context`` mode is to highlight the important lines
      (annotated with minus, '-') and gives some surrounding context
      (annotated with minus, ``-``) and gives some surrounding context
      lines around. This output can be used with the diff mode of
      lines around. This output can be used with the diff mode of
      Emacs to review the code.
      Emacs to review the code.


Example:
Example
~~~~~~~

Running::


Running
	make coccicheck MODE=context COCCI=scripts/coccinelle/api/err_cast.cocci
	make coccicheck MODE=context COCCI=scripts/coccinelle/api/err_cast.cocci


will execute the following part of the SmPL script.
will execute the following part of the SmPL script::


    <smpl>
    <smpl>
    @ depends on context && !patch && !org && !report@
    @ depends on context && !patch && !org && !report@
@@ -418,7 +437,7 @@ expression x;
    </smpl>
    </smpl>


This SmPL excerpt generates diff hunks on the standard output, as
This SmPL excerpt generates diff hunks on the standard output, as
illustrated below:
illustrated below::


    diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing
    diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing
    --- /home/user/linux/crypto/ctr.c	2010-05-26 10:49:38.000000000 +0200
    --- /home/user/linux/crypto/ctr.c	2010-05-26 10:49:38.000000000 +0200
@@ -432,17 +451,19 @@ diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing
 	/* Block size must be >= 4 bytes. */
 	/* Block size must be >= 4 bytes. */
 	err = -EINVAL;
 	err = -EINVAL;


 Detailed description of the 'org' mode
Detailed description of the ``org`` mode
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
----------------------------------------

``org`` generates a report in the Org mode format of Emacs.


'org' generates a report in the Org mode format of Emacs.
Example
~~~~~~~


Example:
Running::


Running
	make coccicheck MODE=org COCCI=scripts/coccinelle/api/err_cast.cocci
	make coccicheck MODE=org COCCI=scripts/coccinelle/api/err_cast.cocci


will execute the following part of the SmPL script.
will execute the following part of the SmPL script::


    <smpl>
    <smpl>
    @r depends on !context && !patch && (org || report)@
    @r depends on !context && !patch && (org || report)@
@@ -463,7 +484,7 @@ coccilib.org.print_todo(p[0], msg_safe)
    </smpl>
    </smpl>


This SmPL excerpt generates Org entries on the standard output, as
This SmPL excerpt generates Org entries on the standard output, as
illustrated below:
illustrated below::


    * TODO [[view:/home/user/linux/crypto/ctr.c::face=ovl-face1::linb=188::colb=9::cole=16][ERR_CAST can be used with alg]]
    * TODO [[view:/home/user/linux/crypto/ctr.c::face=ovl-face1::linb=188::colb=9::cole=16][ERR_CAST can be used with alg]]
    * TODO [[view:/home/user/linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAST can be used with auth]]
    * TODO [[view:/home/user/linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAST can be used with auth]]
+256 −0
Original line number Original line Diff line number Diff line
Using gcov with the Linux kernel
Using gcov with the Linux kernel
================================
================================


1. Introduction
2. Preparation
3. Customization
4. Files
5. Modules
6. Separated build and test machines
7. Troubleshooting
Appendix A: sample script: gather_on_build.sh
Appendix B: sample script: gather_on_test.sh


1. Introduction
===============

gcov profiling kernel support enables the use of GCC's coverage testing
gcov profiling kernel support enables the use of GCC's coverage testing
tool gcov [1] with the Linux kernel. Coverage data of a running kernel
tool gcov_ with the Linux kernel. Coverage data of a running kernel
is exported in gcov-compatible format via the "gcov" debugfs directory.
is exported in gcov-compatible format via the "gcov" debugfs directory.
To get coverage data for a specific file, change to the kernel build
To get coverage data for a specific file, change to the kernel build
directory and use gcov with the -o option as follows (requires root):
directory and use gcov with the ``-o`` option as follows (requires root)::


    # cd /tmp/linux-out
    # cd /tmp/linux-out
    # gcov -o /sys/kernel/debug/gcov/tmp/linux-out/kernel spinlock.c
    # gcov -o /sys/kernel/debug/gcov/tmp/linux-out/kernel spinlock.c


This will create source code files annotated with execution counts
This will create source code files annotated with execution counts
in the current directory. In addition, graphical gcov front-ends such
in the current directory. In addition, graphical gcov front-ends such
as lcov [2] can be used to automate the process of collecting data
as lcov_ can be used to automate the process of collecting data
for the entire kernel and provide coverage overviews in HTML format.
for the entire kernel and provide coverage overviews in HTML format.


Possible uses:
Possible uses:
@@ -36,25 +22,23 @@ Possible uses:
* minimizing kernel configurations (do I need this option if the
* minimizing kernel configurations (do I need this option if the
  associated code is never run?)
  associated code is never run?)


--
.. _gcov: http://gcc.gnu.org/onlinedocs/gcc/Gcov.html

.. _lcov: http://ltp.sourceforge.net/coverage/lcov.php
[1] http://gcc.gnu.org/onlinedocs/gcc/Gcov.html
[2] http://ltp.sourceforge.net/coverage/lcov.php




2. Preparation
Preparation
==============
-----------


Configure the kernel with:
Configure the kernel with::


        CONFIG_DEBUG_FS=y
        CONFIG_DEBUG_FS=y
        CONFIG_GCOV_KERNEL=y
        CONFIG_GCOV_KERNEL=y


select the gcc's gcov format, default is autodetect based on gcc version:
select the gcc's gcov format, default is autodetect based on gcc version::


        CONFIG_GCOV_FORMAT_AUTODETECT=y
        CONFIG_GCOV_FORMAT_AUTODETECT=y


and to get coverage data for the entire kernel:
and to get coverage data for the entire kernel::


        CONFIG_GCOV_PROFILE_ALL=y
        CONFIG_GCOV_PROFILE_ALL=y


@@ -63,58 +47,62 @@ larger and run slower. Also CONFIG_GCOV_PROFILE_ALL may not be supported
on all architectures.
on all architectures.


Profiling data will only become accessible once debugfs has been
Profiling data will only become accessible once debugfs has been
mounted:
mounted::


        mount -t debugfs none /sys/kernel/debug
        mount -t debugfs none /sys/kernel/debug




3. Customization
Customization
================
-------------


To enable profiling for specific files or directories, add a line
To enable profiling for specific files or directories, add a line
similar to the following to the respective kernel Makefile:
similar to the following to the respective kernel Makefile:


        For a single file (e.g. main.o):
- For a single file (e.g. main.o)::

	GCOV_PROFILE_main.o := y
	GCOV_PROFILE_main.o := y


        For all files in one directory:
- For all files in one directory::

	GCOV_PROFILE := y
	GCOV_PROFILE := y


To exclude files from being profiled even when CONFIG_GCOV_PROFILE_ALL
To exclude files from being profiled even when CONFIG_GCOV_PROFILE_ALL
is specified, use:
is specified, use::


	GCOV_PROFILE_main.o := n
	GCOV_PROFILE_main.o := n
        and:

and::

	GCOV_PROFILE := n
	GCOV_PROFILE := n


Only files which are linked to the main kernel image or are compiled as
Only files which are linked to the main kernel image or are compiled as
kernel modules are supported by this mechanism.
kernel modules are supported by this mechanism.




4. Files
Files
========
-----


The gcov kernel support creates the following files in debugfs:
The gcov kernel support creates the following files in debugfs:


        /sys/kernel/debug/gcov
``/sys/kernel/debug/gcov``
	Parent directory for all gcov-related files.
	Parent directory for all gcov-related files.


        /sys/kernel/debug/gcov/reset
``/sys/kernel/debug/gcov/reset``
	Global reset file: resets all coverage data to zero when
	Global reset file: resets all coverage data to zero when
        written to.
        written to.


        /sys/kernel/debug/gcov/path/to/compile/dir/file.gcda
``/sys/kernel/debug/gcov/path/to/compile/dir/file.gcda``
	The actual gcov data file as understood by the gcov
	The actual gcov data file as understood by the gcov
        tool. Resets file coverage data to zero when written to.
        tool. Resets file coverage data to zero when written to.


        /sys/kernel/debug/gcov/path/to/compile/dir/file.gcno
``/sys/kernel/debug/gcov/path/to/compile/dir/file.gcno``
	Symbolic link to a static data file required by the gcov
	Symbolic link to a static data file required by the gcov
        tool. This file is generated by gcc when compiling with
        tool. This file is generated by gcc when compiling with
                option -ftest-coverage.
        option ``-ftest-coverage``.




5. Modules
Modules
==========
-------


Kernel modules may contain cleanup code which is only run during
Kernel modules may contain cleanup code which is only run during
module unload time. The gcov mechanism provides a means to collect
module unload time. The gcov mechanism provides a means to collect
@@ -124,7 +112,7 @@ Once the module is loaded again, the associated coverage counters are
initialized with the data from its previous instantiation.
initialized with the data from its previous instantiation.


This behavior can be deactivated by specifying the gcov_persist kernel
This behavior can be deactivated by specifying the gcov_persist kernel
parameter:
parameter::


        gcov_persist=0
        gcov_persist=0


@@ -132,8 +120,8 @@ At run-time, a user can also choose to discard data for an unloaded
module by writing to its data file or the global reset file.
module by writing to its data file or the global reset file.




6. Separated build and test machines
Separated build and test machines
====================================
---------------------------------


The gcov kernel profiling infrastructure is designed to work out-of-the
The gcov kernel profiling infrastructure is designed to work out-of-the
box for setups where kernels are built and run on the same machine. In
box for setups where kernels are built and run on the same machine. In
@@ -171,7 +159,7 @@ from the gcov directory in sysfs:
    These files can be copied to any location on the build machine. gcov
    These files can be copied to any location on the build machine. gcov
    must then be called with the -o option pointing to that directory.
    must then be called with the -o option pointing to that directory.


Example directory setup on the build machine:
    Example directory setup on the build machine::


      /tmp/linux:    kernel source tree
      /tmp/linux:    kernel source tree
      /tmp/out:      kernel build directory as specified by make O=
      /tmp/out:      kernel build directory as specified by make O=
@@ -181,29 +169,40 @@ Example directory setup on the build machine:
      [user@build] gcov -o /tmp/coverage/tmp/out/init main.c
      [user@build] gcov -o /tmp/coverage/tmp/out/init main.c




7. Troubleshooting
Troubleshooting
==================
---------------

Problem
    Compilation aborts during linker step.


Problem:  Compilation aborts during linker step.
Cause
Cause:    Profiling flags are specified for source files which are not
    Profiling flags are specified for source files which are not
    linked to the main kernel or which are linked by a custom
    linked to the main kernel or which are linked by a custom
    linker procedure.
    linker procedure.
Solution: Exclude affected source files from profiling by specifying

          GCOV_PROFILE := n or GCOV_PROFILE_basename.o := n in the
Solution
    Exclude affected source files from profiling by specifying
    ``GCOV_PROFILE := n`` or ``GCOV_PROFILE_basename.o := n`` in the
    corresponding Makefile.
    corresponding Makefile.


Problem:  Files copied from sysfs appear empty or incomplete.
Problem
Cause:    Due to the way seq_file works, some tools such as cp or tar
    Files copied from sysfs appear empty or incomplete.

Cause
    Due to the way seq_file works, some tools such as cp or tar
    may not correctly copy files from sysfs.
    may not correctly copy files from sysfs.
Solution: Use 'cat' to read .gcda files and 'cp -d' to copy links.

Solution
    Use ``cat``' to read ``.gcda`` files and ``cp -d`` to copy links.
    Alternatively use the mechanism shown in Appendix B.
    Alternatively use the mechanism shown in Appendix B.




Appendix A: gather_on_build.sh
Appendix A: gather_on_build.sh
==============================
------------------------------


Sample script to gather coverage meta files on the build machine
Sample script to gather coverage meta files on the build machine
(see 6a):
(see 6a)::

    #!/bin/bash
    #!/bin/bash


    KSRC=$1
    KSRC=$1
@@ -230,10 +229,10 @@ fi




Appendix B: gather_on_test.sh
Appendix B: gather_on_test.sh
=============================
-----------------------------


Sample script to gather coverage data files on the test machine
Sample script to gather coverage data files on the test machine
(see 6b):
(see 6b)::


    #!/bin/bash -e
    #!/bin/bash -e


+45 −32

File changed and moved.

Preview size limit exceeded, changes collapsed.

+173 −0

File changed and moved.

Preview size limit exceeded, changes collapsed.

+42 −42
Original line number Original line Diff line number Diff line
@@ -12,19 +12,19 @@ To achieve this goal it does not collect coverage in soft/hard interrupts
and instrumentation of some inherently non-deterministic parts of kernel is
and instrumentation of some inherently non-deterministic parts of kernel is
disbled (e.g. scheduler, locking).
disbled (e.g. scheduler, locking).


Usage:
Usage
======
-----


Configure kernel with:
Configure the kernel with::


        CONFIG_KCOV=y
        CONFIG_KCOV=y


CONFIG_KCOV requires gcc built on revision 231296 or later.
CONFIG_KCOV requires gcc built on revision 231296 or later.
Profiling data will only become accessible once debugfs has been mounted:
Profiling data will only become accessible once debugfs has been mounted::


        mount -t debugfs none /sys/kernel/debug
        mount -t debugfs none /sys/kernel/debug


The following program demonstrates kcov usage from within a test program:
The following program demonstrates kcov usage from within a test program::


    #include <stdio.h>
    #include <stdio.h>
    #include <stddef.h>
    #include <stddef.h>
@@ -85,7 +85,7 @@ int main(int argc, char **argv)
	return 0;
	return 0;
    }
    }


After piping through addr2line output of the program looks as follows:
After piping through addr2line output of the program looks as follows::


    SyS_read
    SyS_read
    fs/read_write.c:562
    fs/read_write.c:562
Loading