trace_events.c 23 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204
  1. /*
  2. * event tracer
  3. *
  4. * Copyright (C) 2008 Red Hat Inc, Steven Rostedt <srostedt@redhat.com>
  5. *
  6. * - Added format output of fields of the trace point.
  7. * This was based off of work by Tom Zanussi <tzanussi@gmail.com>.
  8. *
  9. */
  10. #include <linux/workqueue.h>
  11. #include <linux/spinlock.h>
  12. #include <linux/kthread.h>
  13. #include <linux/debugfs.h>
  14. #include <linux/uaccess.h>
  15. #include <linux/module.h>
  16. #include <linux/ctype.h>
  17. #include <linux/delay.h>
  18. #include "trace_output.h"
  19. #define TRACE_SYSTEM "TRACE_SYSTEM"
  20. static DEFINE_MUTEX(event_mutex);
  21. LIST_HEAD(ftrace_events);
  22. int trace_define_field(struct ftrace_event_call *call, char *type,
  23. char *name, int offset, int size)
  24. {
  25. struct ftrace_event_field *field;
  26. field = kzalloc(sizeof(*field), GFP_KERNEL);
  27. if (!field)
  28. goto err;
  29. field->name = kstrdup(name, GFP_KERNEL);
  30. if (!field->name)
  31. goto err;
  32. field->type = kstrdup(type, GFP_KERNEL);
  33. if (!field->type)
  34. goto err;
  35. field->offset = offset;
  36. field->size = size;
  37. list_add(&field->link, &call->fields);
  38. return 0;
  39. err:
  40. if (field) {
  41. kfree(field->name);
  42. kfree(field->type);
  43. }
  44. kfree(field);
  45. return -ENOMEM;
  46. }
  47. EXPORT_SYMBOL_GPL(trace_define_field);
  48. static void ftrace_clear_events(void)
  49. {
  50. struct ftrace_event_call *call;
  51. list_for_each_entry(call, &ftrace_events, list) {
  52. if (call->enabled) {
  53. call->enabled = 0;
  54. call->unregfunc();
  55. }
  56. }
  57. }
  58. static void ftrace_event_enable_disable(struct ftrace_event_call *call,
  59. int enable)
  60. {
  61. switch (enable) {
  62. case 0:
  63. if (call->enabled) {
  64. call->enabled = 0;
  65. call->unregfunc();
  66. }
  67. break;
  68. case 1:
  69. if (!call->enabled) {
  70. call->enabled = 1;
  71. call->regfunc();
  72. }
  73. break;
  74. }
  75. }
  76. static int ftrace_set_clr_event(char *buf, int set)
  77. {
  78. struct ftrace_event_call *call;
  79. char *event = NULL, *sub = NULL, *match;
  80. int ret = -EINVAL;
  81. /*
  82. * The buf format can be <subsystem>:<event-name>
  83. * *:<event-name> means any event by that name.
  84. * :<event-name> is the same.
  85. *
  86. * <subsystem>:* means all events in that subsystem
  87. * <subsystem>: means the same.
  88. *
  89. * <name> (no ':') means all events in a subsystem with
  90. * the name <name> or any event that matches <name>
  91. */
  92. match = strsep(&buf, ":");
  93. if (buf) {
  94. sub = match;
  95. event = buf;
  96. match = NULL;
  97. if (!strlen(sub) || strcmp(sub, "*") == 0)
  98. sub = NULL;
  99. if (!strlen(event) || strcmp(event, "*") == 0)
  100. event = NULL;
  101. }
  102. mutex_lock(&event_mutex);
  103. list_for_each_entry(call, &ftrace_events, list) {
  104. if (!call->name || !call->regfunc)
  105. continue;
  106. if (match &&
  107. strcmp(match, call->name) != 0 &&
  108. strcmp(match, call->system) != 0)
  109. continue;
  110. if (sub && strcmp(sub, call->system) != 0)
  111. continue;
  112. if (event && strcmp(event, call->name) != 0)
  113. continue;
  114. ftrace_event_enable_disable(call, set);
  115. ret = 0;
  116. }
  117. mutex_unlock(&event_mutex);
  118. return ret;
  119. }
  120. /* 128 should be much more than enough */
  121. #define EVENT_BUF_SIZE 127
  122. static ssize_t
  123. ftrace_event_write(struct file *file, const char __user *ubuf,
  124. size_t cnt, loff_t *ppos)
  125. {
  126. size_t read = 0;
  127. int i, set = 1;
  128. ssize_t ret;
  129. char *buf;
  130. char ch;
  131. if (!cnt || cnt < 0)
  132. return 0;
  133. ret = tracing_update_buffers();
  134. if (ret < 0)
  135. return ret;
  136. ret = get_user(ch, ubuf++);
  137. if (ret)
  138. return ret;
  139. read++;
  140. cnt--;
  141. /* skip white space */
  142. while (cnt && isspace(ch)) {
  143. ret = get_user(ch, ubuf++);
  144. if (ret)
  145. return ret;
  146. read++;
  147. cnt--;
  148. }
  149. /* Only white space found? */
  150. if (isspace(ch)) {
  151. file->f_pos += read;
  152. ret = read;
  153. return ret;
  154. }
  155. buf = kmalloc(EVENT_BUF_SIZE+1, GFP_KERNEL);
  156. if (!buf)
  157. return -ENOMEM;
  158. if (cnt > EVENT_BUF_SIZE)
  159. cnt = EVENT_BUF_SIZE;
  160. i = 0;
  161. while (cnt && !isspace(ch)) {
  162. if (!i && ch == '!')
  163. set = 0;
  164. else
  165. buf[i++] = ch;
  166. ret = get_user(ch, ubuf++);
  167. if (ret)
  168. goto out_free;
  169. read++;
  170. cnt--;
  171. }
  172. buf[i] = 0;
  173. file->f_pos += read;
  174. ret = ftrace_set_clr_event(buf, set);
  175. if (ret)
  176. goto out_free;
  177. ret = read;
  178. out_free:
  179. kfree(buf);
  180. return ret;
  181. }
  182. static void *
  183. t_next(struct seq_file *m, void *v, loff_t *pos)
  184. {
  185. struct list_head *list = m->private;
  186. struct ftrace_event_call *call;
  187. (*pos)++;
  188. for (;;) {
  189. if (list == &ftrace_events)
  190. return NULL;
  191. call = list_entry(list, struct ftrace_event_call, list);
  192. /*
  193. * The ftrace subsystem is for showing formats only.
  194. * They can not be enabled or disabled via the event files.
  195. */
  196. if (call->regfunc)
  197. break;
  198. list = list->next;
  199. }
  200. m->private = list->next;
  201. return call;
  202. }
  203. static void *t_start(struct seq_file *m, loff_t *pos)
  204. {
  205. return t_next(m, NULL, pos);
  206. }
  207. static void *
  208. s_next(struct seq_file *m, void *v, loff_t *pos)
  209. {
  210. struct list_head *list = m->private;
  211. struct ftrace_event_call *call;
  212. (*pos)++;
  213. retry:
  214. if (list == &ftrace_events)
  215. return NULL;
  216. call = list_entry(list, struct ftrace_event_call, list);
  217. if (!call->enabled) {
  218. list = list->next;
  219. goto retry;
  220. }
  221. m->private = list->next;
  222. return call;
  223. }
  224. static void *s_start(struct seq_file *m, loff_t *pos)
  225. {
  226. return s_next(m, NULL, pos);
  227. }
  228. static int t_show(struct seq_file *m, void *v)
  229. {
  230. struct ftrace_event_call *call = v;
  231. if (strcmp(call->system, TRACE_SYSTEM) != 0)
  232. seq_printf(m, "%s:", call->system);
  233. seq_printf(m, "%s\n", call->name);
  234. return 0;
  235. }
  236. static void t_stop(struct seq_file *m, void *p)
  237. {
  238. }
  239. static int
  240. ftrace_event_seq_open(struct inode *inode, struct file *file)
  241. {
  242. int ret;
  243. const struct seq_operations *seq_ops;
  244. if ((file->f_mode & FMODE_WRITE) &&
  245. !(file->f_flags & O_APPEND))
  246. ftrace_clear_events();
  247. seq_ops = inode->i_private;
  248. ret = seq_open(file, seq_ops);
  249. if (!ret) {
  250. struct seq_file *m = file->private_data;
  251. m->private = ftrace_events.next;
  252. }
  253. return ret;
  254. }
  255. static ssize_t
  256. event_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
  257. loff_t *ppos)
  258. {
  259. struct ftrace_event_call *call = filp->private_data;
  260. char *buf;
  261. if (call->enabled)
  262. buf = "1\n";
  263. else
  264. buf = "0\n";
  265. return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
  266. }
  267. static ssize_t
  268. event_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
  269. loff_t *ppos)
  270. {
  271. struct ftrace_event_call *call = filp->private_data;
  272. char buf[64];
  273. unsigned long val;
  274. int ret;
  275. if (cnt >= sizeof(buf))
  276. return -EINVAL;
  277. if (copy_from_user(&buf, ubuf, cnt))
  278. return -EFAULT;
  279. buf[cnt] = 0;
  280. ret = strict_strtoul(buf, 10, &val);
  281. if (ret < 0)
  282. return ret;
  283. ret = tracing_update_buffers();
  284. if (ret < 0)
  285. return ret;
  286. switch (val) {
  287. case 0:
  288. case 1:
  289. mutex_lock(&event_mutex);
  290. ftrace_event_enable_disable(call, val);
  291. mutex_unlock(&event_mutex);
  292. break;
  293. default:
  294. return -EINVAL;
  295. }
  296. *ppos += cnt;
  297. return cnt;
  298. }
  299. #undef FIELD
  300. #define FIELD(type, name) \
  301. #type, "common_" #name, offsetof(typeof(field), name), \
  302. sizeof(field.name)
  303. static int trace_write_header(struct trace_seq *s)
  304. {
  305. struct trace_entry field;
  306. /* struct trace_entry */
  307. return trace_seq_printf(s,
  308. "\tfield:%s %s;\toffset:%zu;\tsize:%zu;\n"
  309. "\tfield:%s %s;\toffset:%zu;\tsize:%zu;\n"
  310. "\tfield:%s %s;\toffset:%zu;\tsize:%zu;\n"
  311. "\tfield:%s %s;\toffset:%zu;\tsize:%zu;\n"
  312. "\tfield:%s %s;\toffset:%zu;\tsize:%zu;\n"
  313. "\n",
  314. FIELD(unsigned char, type),
  315. FIELD(unsigned char, flags),
  316. FIELD(unsigned char, preempt_count),
  317. FIELD(int, pid),
  318. FIELD(int, tgid));
  319. }
  320. static ssize_t
  321. event_format_read(struct file *filp, char __user *ubuf, size_t cnt,
  322. loff_t *ppos)
  323. {
  324. struct ftrace_event_call *call = filp->private_data;
  325. struct trace_seq *s;
  326. char *buf;
  327. int r;
  328. if (*ppos)
  329. return 0;
  330. s = kmalloc(sizeof(*s), GFP_KERNEL);
  331. if (!s)
  332. return -ENOMEM;
  333. trace_seq_init(s);
  334. /* If any of the first writes fail, so will the show_format. */
  335. trace_seq_printf(s, "name: %s\n", call->name);
  336. trace_seq_printf(s, "ID: %d\n", call->id);
  337. trace_seq_printf(s, "format:\n");
  338. trace_write_header(s);
  339. r = call->show_format(s);
  340. if (!r) {
  341. /*
  342. * ug! The format output is bigger than a PAGE!!
  343. */
  344. buf = "FORMAT TOO BIG\n";
  345. r = simple_read_from_buffer(ubuf, cnt, ppos,
  346. buf, strlen(buf));
  347. goto out;
  348. }
  349. r = simple_read_from_buffer(ubuf, cnt, ppos,
  350. s->buffer, s->len);
  351. out:
  352. kfree(s);
  353. return r;
  354. }
  355. static ssize_t
  356. event_id_read(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
  357. {
  358. struct ftrace_event_call *call = filp->private_data;
  359. struct trace_seq *s;
  360. int r;
  361. if (*ppos)
  362. return 0;
  363. s = kmalloc(sizeof(*s), GFP_KERNEL);
  364. if (!s)
  365. return -ENOMEM;
  366. trace_seq_init(s);
  367. trace_seq_printf(s, "%d\n", call->id);
  368. r = simple_read_from_buffer(ubuf, cnt, ppos,
  369. s->buffer, s->len);
  370. kfree(s);
  371. return r;
  372. }
  373. static ssize_t
  374. event_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
  375. loff_t *ppos)
  376. {
  377. struct ftrace_event_call *call = filp->private_data;
  378. struct trace_seq *s;
  379. int r;
  380. if (*ppos)
  381. return 0;
  382. s = kmalloc(sizeof(*s), GFP_KERNEL);
  383. if (!s)
  384. return -ENOMEM;
  385. trace_seq_init(s);
  386. filter_print_preds(call, s);
  387. r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
  388. kfree(s);
  389. return r;
  390. }
  391. static ssize_t
  392. event_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
  393. loff_t *ppos)
  394. {
  395. struct ftrace_event_call *call = filp->private_data;
  396. char buf[64], *pbuf = buf;
  397. struct filter_pred *pred;
  398. int err;
  399. if (cnt >= sizeof(buf))
  400. return -EINVAL;
  401. if (copy_from_user(&buf, ubuf, cnt))
  402. return -EFAULT;
  403. buf[cnt] = '\0';
  404. pred = kzalloc(sizeof(*pred), GFP_KERNEL);
  405. if (!pred)
  406. return -ENOMEM;
  407. err = filter_parse(&pbuf, pred);
  408. if (err < 0) {
  409. filter_free_pred(pred);
  410. return err;
  411. }
  412. if (pred->clear) {
  413. filter_disable_preds(call);
  414. filter_free_pred(pred);
  415. return cnt;
  416. }
  417. err = filter_add_pred(call, pred);
  418. if (err < 0) {
  419. filter_free_pred(pred);
  420. return err;
  421. }
  422. filter_free_pred(pred);
  423. *ppos += cnt;
  424. return cnt;
  425. }
  426. static ssize_t
  427. subsystem_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
  428. loff_t *ppos)
  429. {
  430. struct event_subsystem *system = filp->private_data;
  431. struct trace_seq *s;
  432. int r;
  433. if (*ppos)
  434. return 0;
  435. s = kmalloc(sizeof(*s), GFP_KERNEL);
  436. if (!s)
  437. return -ENOMEM;
  438. trace_seq_init(s);
  439. filter_print_subsystem_preds(system, s);
  440. r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
  441. kfree(s);
  442. return r;
  443. }
  444. static ssize_t
  445. subsystem_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
  446. loff_t *ppos)
  447. {
  448. struct event_subsystem *system = filp->private_data;
  449. char buf[64], *pbuf = buf;
  450. struct filter_pred *pred;
  451. int err;
  452. if (cnt >= sizeof(buf))
  453. return -EINVAL;
  454. if (copy_from_user(&buf, ubuf, cnt))
  455. return -EFAULT;
  456. buf[cnt] = '\0';
  457. pred = kzalloc(sizeof(*pred), GFP_KERNEL);
  458. if (!pred)
  459. return -ENOMEM;
  460. err = filter_parse(&pbuf, pred);
  461. if (err < 0) {
  462. filter_free_pred(pred);
  463. return err;
  464. }
  465. if (pred->clear) {
  466. filter_free_subsystem_preds(system);
  467. filter_free_pred(pred);
  468. return cnt;
  469. }
  470. err = filter_add_subsystem_pred(system, pred);
  471. if (err < 0) {
  472. filter_free_subsystem_preds(system);
  473. filter_free_pred(pred);
  474. return err;
  475. }
  476. *ppos += cnt;
  477. return cnt;
  478. }
  479. static ssize_t
  480. show_header(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
  481. {
  482. int (*func)(struct trace_seq *s) = filp->private_data;
  483. struct trace_seq *s;
  484. int r;
  485. if (*ppos)
  486. return 0;
  487. s = kmalloc(sizeof(*s), GFP_KERNEL);
  488. if (!s)
  489. return -ENOMEM;
  490. trace_seq_init(s);
  491. func(s);
  492. r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
  493. kfree(s);
  494. return r;
  495. }
  496. static const struct seq_operations show_event_seq_ops = {
  497. .start = t_start,
  498. .next = t_next,
  499. .show = t_show,
  500. .stop = t_stop,
  501. };
  502. static const struct seq_operations show_set_event_seq_ops = {
  503. .start = s_start,
  504. .next = s_next,
  505. .show = t_show,
  506. .stop = t_stop,
  507. };
  508. static const struct file_operations ftrace_avail_fops = {
  509. .open = ftrace_event_seq_open,
  510. .read = seq_read,
  511. .llseek = seq_lseek,
  512. .release = seq_release,
  513. };
  514. static const struct file_operations ftrace_set_event_fops = {
  515. .open = ftrace_event_seq_open,
  516. .read = seq_read,
  517. .write = ftrace_event_write,
  518. .llseek = seq_lseek,
  519. .release = seq_release,
  520. };
  521. static const struct file_operations ftrace_enable_fops = {
  522. .open = tracing_open_generic,
  523. .read = event_enable_read,
  524. .write = event_enable_write,
  525. };
  526. static const struct file_operations ftrace_event_format_fops = {
  527. .open = tracing_open_generic,
  528. .read = event_format_read,
  529. };
  530. static const struct file_operations ftrace_event_id_fops = {
  531. .open = tracing_open_generic,
  532. .read = event_id_read,
  533. };
  534. static const struct file_operations ftrace_event_filter_fops = {
  535. .open = tracing_open_generic,
  536. .read = event_filter_read,
  537. .write = event_filter_write,
  538. };
  539. static const struct file_operations ftrace_subsystem_filter_fops = {
  540. .open = tracing_open_generic,
  541. .read = subsystem_filter_read,
  542. .write = subsystem_filter_write,
  543. };
  544. static const struct file_operations ftrace_show_header_fops = {
  545. .open = tracing_open_generic,
  546. .read = show_header,
  547. };
  548. static struct dentry *event_trace_events_dir(void)
  549. {
  550. static struct dentry *d_tracer;
  551. static struct dentry *d_events;
  552. if (d_events)
  553. return d_events;
  554. d_tracer = tracing_init_dentry();
  555. if (!d_tracer)
  556. return NULL;
  557. d_events = debugfs_create_dir("events", d_tracer);
  558. if (!d_events)
  559. pr_warning("Could not create debugfs "
  560. "'events' directory\n");
  561. return d_events;
  562. }
  563. static LIST_HEAD(event_subsystems);
  564. static struct dentry *
  565. event_subsystem_dir(const char *name, struct dentry *d_events)
  566. {
  567. struct event_subsystem *system;
  568. struct dentry *entry;
  569. /* First see if we did not already create this dir */
  570. list_for_each_entry(system, &event_subsystems, list) {
  571. if (strcmp(system->name, name) == 0)
  572. return system->entry;
  573. }
  574. /* need to create new entry */
  575. system = kmalloc(sizeof(*system), GFP_KERNEL);
  576. if (!system) {
  577. pr_warning("No memory to create event subsystem %s\n",
  578. name);
  579. return d_events;
  580. }
  581. system->entry = debugfs_create_dir(name, d_events);
  582. if (!system->entry) {
  583. pr_warning("Could not create event subsystem %s\n",
  584. name);
  585. kfree(system);
  586. return d_events;
  587. }
  588. system->name = kstrdup(name, GFP_KERNEL);
  589. if (!system->name) {
  590. debugfs_remove(system->entry);
  591. kfree(system);
  592. return d_events;
  593. }
  594. list_add(&system->list, &event_subsystems);
  595. system->preds = NULL;
  596. system->n_preds = 0;
  597. entry = debugfs_create_file("filter", 0644, system->entry, system,
  598. &ftrace_subsystem_filter_fops);
  599. if (!entry)
  600. pr_warning("Could not create debugfs "
  601. "'%s/filter' entry\n", name);
  602. return system->entry;
  603. }
  604. static int
  605. event_create_dir(struct ftrace_event_call *call, struct dentry *d_events)
  606. {
  607. struct dentry *entry;
  608. int ret;
  609. /*
  610. * If the trace point header did not define TRACE_SYSTEM
  611. * then the system would be called "TRACE_SYSTEM".
  612. */
  613. if (strcmp(call->system, TRACE_SYSTEM) != 0)
  614. d_events = event_subsystem_dir(call->system, d_events);
  615. if (call->raw_init) {
  616. ret = call->raw_init();
  617. if (ret < 0) {
  618. pr_warning("Could not initialize trace point"
  619. " events/%s\n", call->name);
  620. return ret;
  621. }
  622. }
  623. call->dir = debugfs_create_dir(call->name, d_events);
  624. if (!call->dir) {
  625. pr_warning("Could not create debugfs "
  626. "'%s' directory\n", call->name);
  627. return -1;
  628. }
  629. if (call->regfunc)
  630. entry = trace_create_file("enable", 0644, call->dir, call,
  631. &ftrace_enable_fops);
  632. if (call->id)
  633. entry = trace_create_file("id", 0444, call->dir, call,
  634. &ftrace_event_id_fops);
  635. if (call->define_fields) {
  636. ret = call->define_fields();
  637. if (ret < 0) {
  638. pr_warning("Could not initialize trace point"
  639. " events/%s\n", call->name);
  640. return ret;
  641. }
  642. entry = trace_create_file("filter", 0644, call->dir, call,
  643. &ftrace_event_filter_fops);
  644. }
  645. /* A trace may not want to export its format */
  646. if (!call->show_format)
  647. return 0;
  648. entry = trace_create_file("format", 0444, call->dir, call,
  649. &ftrace_event_format_fops);
  650. return 0;
  651. }
  652. #define for_each_event(event, start, end) \
  653. for (event = start; \
  654. (unsigned long)event < (unsigned long)end; \
  655. event++)
  656. #ifdef CONFIG_MODULES
  657. static void trace_module_add_events(struct module *mod)
  658. {
  659. struct ftrace_event_call *call, *start, *end;
  660. struct dentry *d_events;
  661. start = mod->trace_events;
  662. end = mod->trace_events + mod->num_trace_events;
  663. if (start == end)
  664. return;
  665. d_events = event_trace_events_dir();
  666. if (!d_events)
  667. return;
  668. for_each_event(call, start, end) {
  669. /* The linker may leave blanks */
  670. if (!call->name)
  671. continue;
  672. call->mod = mod;
  673. list_add(&call->list, &ftrace_events);
  674. event_create_dir(call, d_events);
  675. }
  676. }
  677. static void trace_module_remove_events(struct module *mod)
  678. {
  679. struct ftrace_event_call *call, *p;
  680. list_for_each_entry_safe(call, p, &ftrace_events, list) {
  681. if (call->mod == mod) {
  682. if (call->enabled) {
  683. call->enabled = 0;
  684. call->unregfunc();
  685. }
  686. if (call->event)
  687. unregister_ftrace_event(call->event);
  688. debugfs_remove_recursive(call->dir);
  689. list_del(&call->list);
  690. }
  691. }
  692. }
  693. static int trace_module_notify(struct notifier_block *self,
  694. unsigned long val, void *data)
  695. {
  696. struct module *mod = data;
  697. mutex_lock(&event_mutex);
  698. switch (val) {
  699. case MODULE_STATE_COMING:
  700. trace_module_add_events(mod);
  701. break;
  702. case MODULE_STATE_GOING:
  703. trace_module_remove_events(mod);
  704. break;
  705. }
  706. mutex_unlock(&event_mutex);
  707. return 0;
  708. }
  709. #else
  710. static int trace_module_notify(struct notifier_block *self,
  711. unsigned long val, void *data)
  712. {
  713. return 0;
  714. }
  715. #endif /* CONFIG_MODULES */
  716. struct notifier_block trace_module_nb = {
  717. .notifier_call = trace_module_notify,
  718. .priority = 0,
  719. };
  720. extern struct ftrace_event_call __start_ftrace_events[];
  721. extern struct ftrace_event_call __stop_ftrace_events[];
  722. static __init int event_trace_init(void)
  723. {
  724. struct ftrace_event_call *call;
  725. struct dentry *d_tracer;
  726. struct dentry *entry;
  727. struct dentry *d_events;
  728. int ret;
  729. d_tracer = tracing_init_dentry();
  730. if (!d_tracer)
  731. return 0;
  732. entry = debugfs_create_file("available_events", 0444, d_tracer,
  733. (void *)&show_event_seq_ops,
  734. &ftrace_avail_fops);
  735. if (!entry)
  736. pr_warning("Could not create debugfs "
  737. "'available_events' entry\n");
  738. entry = debugfs_create_file("set_event", 0644, d_tracer,
  739. (void *)&show_set_event_seq_ops,
  740. &ftrace_set_event_fops);
  741. if (!entry)
  742. pr_warning("Could not create debugfs "
  743. "'set_event' entry\n");
  744. d_events = event_trace_events_dir();
  745. if (!d_events)
  746. return 0;
  747. /* ring buffer internal formats */
  748. trace_create_file("header_page", 0444, d_events,
  749. ring_buffer_print_page_header,
  750. &ftrace_show_header_fops);
  751. trace_create_file("header_event", 0444, d_events,
  752. ring_buffer_print_entry_header,
  753. &ftrace_show_header_fops);
  754. for_each_event(call, __start_ftrace_events, __stop_ftrace_events) {
  755. /* The linker may leave blanks */
  756. if (!call->name)
  757. continue;
  758. list_add(&call->list, &ftrace_events);
  759. event_create_dir(call, d_events);
  760. }
  761. ret = register_module_notifier(&trace_module_nb);
  762. if (!ret)
  763. pr_warning("Failed to register trace events module notifier\n");
  764. return 0;
  765. }
  766. fs_initcall(event_trace_init);
  767. #ifdef CONFIG_FTRACE_STARTUP_TEST
  768. static DEFINE_SPINLOCK(test_spinlock);
  769. static DEFINE_SPINLOCK(test_spinlock_irq);
  770. static DEFINE_MUTEX(test_mutex);
  771. static __init void test_work(struct work_struct *dummy)
  772. {
  773. spin_lock(&test_spinlock);
  774. spin_lock_irq(&test_spinlock_irq);
  775. udelay(1);
  776. spin_unlock_irq(&test_spinlock_irq);
  777. spin_unlock(&test_spinlock);
  778. mutex_lock(&test_mutex);
  779. msleep(1);
  780. mutex_unlock(&test_mutex);
  781. }
  782. static __init int event_test_thread(void *unused)
  783. {
  784. void *test_malloc;
  785. test_malloc = kmalloc(1234, GFP_KERNEL);
  786. if (!test_malloc)
  787. pr_info("failed to kmalloc\n");
  788. schedule_on_each_cpu(test_work);
  789. kfree(test_malloc);
  790. set_current_state(TASK_INTERRUPTIBLE);
  791. while (!kthread_should_stop())
  792. schedule();
  793. return 0;
  794. }
  795. /*
  796. * Do various things that may trigger events.
  797. */
  798. static __init void event_test_stuff(void)
  799. {
  800. struct task_struct *test_thread;
  801. test_thread = kthread_run(event_test_thread, NULL, "test-events");
  802. msleep(1);
  803. kthread_stop(test_thread);
  804. }
  805. /*
  806. * For every trace event defined, we will test each trace point separately,
  807. * and then by groups, and finally all trace points.
  808. */
  809. static __init void event_trace_self_tests(void)
  810. {
  811. struct ftrace_event_call *call;
  812. struct event_subsystem *system;
  813. char *sysname;
  814. int ret;
  815. pr_info("Running tests on trace events:\n");
  816. list_for_each_entry(call, &ftrace_events, list) {
  817. /* Only test those that have a regfunc */
  818. if (!call->regfunc)
  819. continue;
  820. pr_info("Testing event %s: ", call->name);
  821. /*
  822. * If an event is already enabled, someone is using
  823. * it and the self test should not be on.
  824. */
  825. if (call->enabled) {
  826. pr_warning("Enabled event during self test!\n");
  827. WARN_ON_ONCE(1);
  828. continue;
  829. }
  830. call->enabled = 1;
  831. call->regfunc();
  832. event_test_stuff();
  833. call->unregfunc();
  834. call->enabled = 0;
  835. pr_cont("OK\n");
  836. }
  837. /* Now test at the sub system level */
  838. pr_info("Running tests on trace event systems:\n");
  839. list_for_each_entry(system, &event_subsystems, list) {
  840. /* the ftrace system is special, skip it */
  841. if (strcmp(system->name, "ftrace") == 0)
  842. continue;
  843. pr_info("Testing event system %s: ", system->name);
  844. /* ftrace_set_clr_event can modify the name passed in. */
  845. sysname = kstrdup(system->name, GFP_KERNEL);
  846. if (WARN_ON(!sysname)) {
  847. pr_warning("Can't allocate memory, giving up!\n");
  848. return;
  849. }
  850. ret = ftrace_set_clr_event(sysname, 1);
  851. kfree(sysname);
  852. if (WARN_ON_ONCE(ret)) {
  853. pr_warning("error enabling system %s\n",
  854. system->name);
  855. continue;
  856. }
  857. event_test_stuff();
  858. sysname = kstrdup(system->name, GFP_KERNEL);
  859. if (WARN_ON(!sysname)) {
  860. pr_warning("Can't allocate memory, giving up!\n");
  861. return;
  862. }
  863. ret = ftrace_set_clr_event(sysname, 0);
  864. kfree(sysname);
  865. if (WARN_ON_ONCE(ret))
  866. pr_warning("error disabling system %s\n",
  867. system->name);
  868. pr_cont("OK\n");
  869. }
  870. /* Test with all events enabled */
  871. pr_info("Running tests on all trace events:\n");
  872. pr_info("Testing all events: ");
  873. sysname = kmalloc(4, GFP_KERNEL);
  874. if (WARN_ON(!sysname)) {
  875. pr_warning("Can't allocate memory, giving up!\n");
  876. return;
  877. }
  878. memcpy(sysname, "*:*", 4);
  879. ret = ftrace_set_clr_event(sysname, 1);
  880. if (WARN_ON_ONCE(ret)) {
  881. kfree(sysname);
  882. pr_warning("error enabling all events\n");
  883. return;
  884. }
  885. event_test_stuff();
  886. /* reset sysname */
  887. memcpy(sysname, "*:*", 4);
  888. ret = ftrace_set_clr_event(sysname, 0);
  889. kfree(sysname);
  890. if (WARN_ON_ONCE(ret)) {
  891. pr_warning("error disabling all events\n");
  892. return;
  893. }
  894. pr_cont("OK\n");
  895. }
  896. #ifdef CONFIG_FUNCTION_TRACER
  897. static DEFINE_PER_CPU(atomic_t, test_event_disable);
  898. static void
  899. function_test_events_call(unsigned long ip, unsigned long parent_ip)
  900. {
  901. struct ring_buffer_event *event;
  902. struct ftrace_entry *entry;
  903. unsigned long flags;
  904. long disabled;
  905. int resched;
  906. int cpu;
  907. int pc;
  908. pc = preempt_count();
  909. resched = ftrace_preempt_disable();
  910. cpu = raw_smp_processor_id();
  911. disabled = atomic_inc_return(&per_cpu(test_event_disable, cpu));
  912. if (disabled != 1)
  913. goto out;
  914. local_save_flags(flags);
  915. event = trace_current_buffer_lock_reserve(TRACE_FN, sizeof(*entry),
  916. flags, pc);
  917. if (!event)
  918. goto out;
  919. entry = ring_buffer_event_data(event);
  920. entry->ip = ip;
  921. entry->parent_ip = parent_ip;
  922. trace_current_buffer_unlock_commit(event, flags, pc);
  923. out:
  924. atomic_dec(&per_cpu(test_event_disable, cpu));
  925. ftrace_preempt_enable(resched);
  926. }
  927. static struct ftrace_ops trace_ops __initdata =
  928. {
  929. .func = function_test_events_call,
  930. };
  931. static __init void event_trace_self_test_with_function(void)
  932. {
  933. register_ftrace_function(&trace_ops);
  934. pr_info("Running tests again, along with the function tracer\n");
  935. event_trace_self_tests();
  936. unregister_ftrace_function(&trace_ops);
  937. }
  938. #else
  939. static __init void event_trace_self_test_with_function(void)
  940. {
  941. }
  942. #endif
  943. static __init int event_trace_self_tests_init(void)
  944. {
  945. event_trace_self_tests();
  946. event_trace_self_test_with_function();
  947. return 0;
  948. }
  949. late_initcall(event_trace_self_tests);
  950. #endif