edac, mce: Filter out invalid values
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / kernel / trace / trace_events.c
blobbeab8bf2f3108d06208c4d291cf8360e2a5e3c9f
1 /*
2 * event tracer
4 * Copyright (C) 2008 Red Hat Inc, Steven Rostedt <srostedt@redhat.com>
6 * - Added format output of fields of the trace point.
7 * This was based off of work by Tom Zanussi <tzanussi@gmail.com>.
9 */
11 #include <linux/workqueue.h>
12 #include <linux/spinlock.h>
13 #include <linux/kthread.h>
14 #include <linux/debugfs.h>
15 #include <linux/uaccess.h>
16 #include <linux/module.h>
17 #include <linux/ctype.h>
18 #include <linux/delay.h>
20 #include <asm/setup.h>
22 #include "trace_output.h"
24 #undef TRACE_SYSTEM
25 #define TRACE_SYSTEM "TRACE_SYSTEM"
27 DEFINE_MUTEX(event_mutex);
29 LIST_HEAD(ftrace_events);
31 int trace_define_field(struct ftrace_event_call *call, const char *type,
32 const char *name, int offset, int size, int is_signed,
33 int filter_type)
35 struct ftrace_event_field *field;
37 field = kzalloc(sizeof(*field), GFP_KERNEL);
38 if (!field)
39 goto err;
41 field->name = kstrdup(name, GFP_KERNEL);
42 if (!field->name)
43 goto err;
45 field->type = kstrdup(type, GFP_KERNEL);
46 if (!field->type)
47 goto err;
49 if (filter_type == FILTER_OTHER)
50 field->filter_type = filter_assign_type(type);
51 else
52 field->filter_type = filter_type;
54 field->offset = offset;
55 field->size = size;
56 field->is_signed = is_signed;
58 list_add(&field->link, &call->fields);
60 return 0;
62 err:
63 if (field)
64 kfree(field->name);
65 kfree(field);
67 return -ENOMEM;
69 EXPORT_SYMBOL_GPL(trace_define_field);
71 #define __common_field(type, item) \
72 ret = trace_define_field(call, #type, "common_" #item, \
73 offsetof(typeof(ent), item), \
74 sizeof(ent.item), \
75 is_signed_type(type), FILTER_OTHER); \
76 if (ret) \
77 return ret;
79 static int trace_define_common_fields(struct ftrace_event_call *call)
81 int ret;
82 struct trace_entry ent;
84 __common_field(unsigned short, type);
85 __common_field(unsigned char, flags);
86 __common_field(unsigned char, preempt_count);
87 __common_field(int, pid);
88 __common_field(int, lock_depth);
90 return ret;
93 void trace_destroy_fields(struct ftrace_event_call *call)
95 struct ftrace_event_field *field, *next;
97 list_for_each_entry_safe(field, next, &call->fields, link) {
98 list_del(&field->link);
99 kfree(field->type);
100 kfree(field->name);
101 kfree(field);
105 int trace_event_raw_init(struct ftrace_event_call *call)
107 int id;
109 id = register_ftrace_event(call->event);
110 if (!id)
111 return -ENODEV;
112 call->id = id;
113 INIT_LIST_HEAD(&call->fields);
115 return 0;
117 EXPORT_SYMBOL_GPL(trace_event_raw_init);
119 static int ftrace_event_enable_disable(struct ftrace_event_call *call,
120 int enable)
122 int ret = 0;
124 switch (enable) {
125 case 0:
126 if (call->enabled) {
127 call->enabled = 0;
128 tracing_stop_cmdline_record();
129 call->unregfunc(call);
131 break;
132 case 1:
133 if (!call->enabled) {
134 tracing_start_cmdline_record();
135 ret = call->regfunc(call);
136 if (ret) {
137 tracing_stop_cmdline_record();
138 pr_info("event trace: Could not enable event "
139 "%s\n", call->name);
140 break;
142 call->enabled = 1;
144 break;
147 return ret;
150 static void ftrace_clear_events(void)
152 struct ftrace_event_call *call;
154 mutex_lock(&event_mutex);
155 list_for_each_entry(call, &ftrace_events, list) {
156 ftrace_event_enable_disable(call, 0);
158 mutex_unlock(&event_mutex);
162 * __ftrace_set_clr_event(NULL, NULL, NULL, set) will set/unset all events.
164 static int __ftrace_set_clr_event(const char *match, const char *sub,
165 const char *event, int set)
167 struct ftrace_event_call *call;
168 int ret = -EINVAL;
170 mutex_lock(&event_mutex);
171 list_for_each_entry(call, &ftrace_events, list) {
173 if (!call->name || !call->regfunc)
174 continue;
176 if (match &&
177 strcmp(match, call->name) != 0 &&
178 strcmp(match, call->system) != 0)
179 continue;
181 if (sub && strcmp(sub, call->system) != 0)
182 continue;
184 if (event && strcmp(event, call->name) != 0)
185 continue;
187 ftrace_event_enable_disable(call, set);
189 ret = 0;
191 mutex_unlock(&event_mutex);
193 return ret;
196 static int ftrace_set_clr_event(char *buf, int set)
198 char *event = NULL, *sub = NULL, *match;
201 * The buf format can be <subsystem>:<event-name>
202 * *:<event-name> means any event by that name.
203 * :<event-name> is the same.
205 * <subsystem>:* means all events in that subsystem
206 * <subsystem>: means the same.
208 * <name> (no ':') means all events in a subsystem with
209 * the name <name> or any event that matches <name>
212 match = strsep(&buf, ":");
213 if (buf) {
214 sub = match;
215 event = buf;
216 match = NULL;
218 if (!strlen(sub) || strcmp(sub, "*") == 0)
219 sub = NULL;
220 if (!strlen(event) || strcmp(event, "*") == 0)
221 event = NULL;
224 return __ftrace_set_clr_event(match, sub, event, set);
228 * trace_set_clr_event - enable or disable an event
229 * @system: system name to match (NULL for any system)
230 * @event: event name to match (NULL for all events, within system)
231 * @set: 1 to enable, 0 to disable
233 * This is a way for other parts of the kernel to enable or disable
234 * event recording.
236 * Returns 0 on success, -EINVAL if the parameters do not match any
237 * registered events.
239 int trace_set_clr_event(const char *system, const char *event, int set)
241 return __ftrace_set_clr_event(NULL, system, event, set);
244 /* 128 should be much more than enough */
245 #define EVENT_BUF_SIZE 127
247 static ssize_t
248 ftrace_event_write(struct file *file, const char __user *ubuf,
249 size_t cnt, loff_t *ppos)
251 struct trace_parser parser;
252 ssize_t read, ret;
254 if (!cnt)
255 return 0;
257 ret = tracing_update_buffers();
258 if (ret < 0)
259 return ret;
261 if (trace_parser_get_init(&parser, EVENT_BUF_SIZE + 1))
262 return -ENOMEM;
264 read = trace_get_user(&parser, ubuf, cnt, ppos);
266 if (read >= 0 && trace_parser_loaded((&parser))) {
267 int set = 1;
269 if (*parser.buffer == '!')
270 set = 0;
272 parser.buffer[parser.idx] = 0;
274 ret = ftrace_set_clr_event(parser.buffer + !set, set);
275 if (ret)
276 goto out_put;
279 ret = read;
281 out_put:
282 trace_parser_put(&parser);
284 return ret;
287 static void *
288 t_next(struct seq_file *m, void *v, loff_t *pos)
290 struct ftrace_event_call *call = v;
292 (*pos)++;
294 list_for_each_entry_continue(call, &ftrace_events, list) {
296 * The ftrace subsystem is for showing formats only.
297 * They can not be enabled or disabled via the event files.
299 if (call->regfunc)
300 return call;
303 return NULL;
306 static void *t_start(struct seq_file *m, loff_t *pos)
308 struct ftrace_event_call *call;
309 loff_t l;
311 mutex_lock(&event_mutex);
313 call = list_entry(&ftrace_events, struct ftrace_event_call, list);
314 for (l = 0; l <= *pos; ) {
315 call = t_next(m, call, &l);
316 if (!call)
317 break;
319 return call;
322 static void *
323 s_next(struct seq_file *m, void *v, loff_t *pos)
325 struct ftrace_event_call *call = v;
327 (*pos)++;
329 list_for_each_entry_continue(call, &ftrace_events, list) {
330 if (call->enabled)
331 return call;
334 return NULL;
337 static void *s_start(struct seq_file *m, loff_t *pos)
339 struct ftrace_event_call *call;
340 loff_t l;
342 mutex_lock(&event_mutex);
344 call = list_entry(&ftrace_events, struct ftrace_event_call, list);
345 for (l = 0; l <= *pos; ) {
346 call = s_next(m, call, &l);
347 if (!call)
348 break;
350 return call;
353 static int t_show(struct seq_file *m, void *v)
355 struct ftrace_event_call *call = v;
357 if (strcmp(call->system, TRACE_SYSTEM) != 0)
358 seq_printf(m, "%s:", call->system);
359 seq_printf(m, "%s\n", call->name);
361 return 0;
364 static void t_stop(struct seq_file *m, void *p)
366 mutex_unlock(&event_mutex);
369 static int
370 ftrace_event_seq_open(struct inode *inode, struct file *file)
372 const struct seq_operations *seq_ops;
374 if ((file->f_mode & FMODE_WRITE) &&
375 (file->f_flags & O_TRUNC))
376 ftrace_clear_events();
378 seq_ops = inode->i_private;
379 return seq_open(file, seq_ops);
382 static ssize_t
383 event_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
384 loff_t *ppos)
386 struct ftrace_event_call *call = filp->private_data;
387 char *buf;
389 if (call->enabled)
390 buf = "1\n";
391 else
392 buf = "0\n";
394 return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
397 static ssize_t
398 event_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
399 loff_t *ppos)
401 struct ftrace_event_call *call = filp->private_data;
402 char buf[64];
403 unsigned long val;
404 int ret;
406 if (cnt >= sizeof(buf))
407 return -EINVAL;
409 if (copy_from_user(&buf, ubuf, cnt))
410 return -EFAULT;
412 buf[cnt] = 0;
414 ret = strict_strtoul(buf, 10, &val);
415 if (ret < 0)
416 return ret;
418 ret = tracing_update_buffers();
419 if (ret < 0)
420 return ret;
422 switch (val) {
423 case 0:
424 case 1:
425 mutex_lock(&event_mutex);
426 ret = ftrace_event_enable_disable(call, val);
427 mutex_unlock(&event_mutex);
428 break;
430 default:
431 return -EINVAL;
434 *ppos += cnt;
436 return ret ? ret : cnt;
439 static ssize_t
440 system_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
441 loff_t *ppos)
443 const char set_to_char[4] = { '?', '0', '1', 'X' };
444 const char *system = filp->private_data;
445 struct ftrace_event_call *call;
446 char buf[2];
447 int set = 0;
448 int ret;
450 mutex_lock(&event_mutex);
451 list_for_each_entry(call, &ftrace_events, list) {
452 if (!call->name || !call->regfunc)
453 continue;
455 if (system && strcmp(call->system, system) != 0)
456 continue;
459 * We need to find out if all the events are set
460 * or if all events or cleared, or if we have
461 * a mixture.
463 set |= (1 << !!call->enabled);
466 * If we have a mixture, no need to look further.
468 if (set == 3)
469 break;
471 mutex_unlock(&event_mutex);
473 buf[0] = set_to_char[set];
474 buf[1] = '\n';
476 ret = simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
478 return ret;
481 static ssize_t
482 system_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
483 loff_t *ppos)
485 const char *system = filp->private_data;
486 unsigned long val;
487 char buf[64];
488 ssize_t ret;
490 if (cnt >= sizeof(buf))
491 return -EINVAL;
493 if (copy_from_user(&buf, ubuf, cnt))
494 return -EFAULT;
496 buf[cnt] = 0;
498 ret = strict_strtoul(buf, 10, &val);
499 if (ret < 0)
500 return ret;
502 ret = tracing_update_buffers();
503 if (ret < 0)
504 return ret;
506 if (val != 0 && val != 1)
507 return -EINVAL;
509 ret = __ftrace_set_clr_event(NULL, system, NULL, val);
510 if (ret)
511 goto out;
513 ret = cnt;
515 out:
516 *ppos += cnt;
518 return ret;
521 static ssize_t
522 event_format_read(struct file *filp, char __user *ubuf, size_t cnt,
523 loff_t *ppos)
525 struct ftrace_event_call *call = filp->private_data;
526 struct ftrace_event_field *field;
527 struct trace_seq *s;
528 int common_field_count = 5;
529 char *buf;
530 int r = 0;
532 if (*ppos)
533 return 0;
535 s = kmalloc(sizeof(*s), GFP_KERNEL);
536 if (!s)
537 return -ENOMEM;
539 trace_seq_init(s);
541 trace_seq_printf(s, "name: %s\n", call->name);
542 trace_seq_printf(s, "ID: %d\n", call->id);
543 trace_seq_printf(s, "format:\n");
545 list_for_each_entry_reverse(field, &call->fields, link) {
547 * Smartly shows the array type(except dynamic array).
548 * Normal:
549 * field:TYPE VAR
550 * If TYPE := TYPE[LEN], it is shown:
551 * field:TYPE VAR[LEN]
553 const char *array_descriptor = strchr(field->type, '[');
555 if (!strncmp(field->type, "__data_loc", 10))
556 array_descriptor = NULL;
558 if (!array_descriptor) {
559 r = trace_seq_printf(s, "\tfield:%s %s;\toffset:%u;"
560 "\tsize:%u;\tsigned:%d;\n",
561 field->type, field->name, field->offset,
562 field->size, !!field->is_signed);
563 } else {
564 r = trace_seq_printf(s, "\tfield:%.*s %s%s;\toffset:%u;"
565 "\tsize:%u;\tsigned:%d;\n",
566 (int)(array_descriptor - field->type),
567 field->type, field->name,
568 array_descriptor, field->offset,
569 field->size, !!field->is_signed);
572 if (--common_field_count == 0)
573 r = trace_seq_printf(s, "\n");
575 if (!r)
576 break;
579 if (r)
580 r = trace_seq_printf(s, "\nprint fmt: %s\n",
581 call->print_fmt);
583 if (!r) {
585 * ug! The format output is bigger than a PAGE!!
587 buf = "FORMAT TOO BIG\n";
588 r = simple_read_from_buffer(ubuf, cnt, ppos,
589 buf, strlen(buf));
590 goto out;
593 r = simple_read_from_buffer(ubuf, cnt, ppos,
594 s->buffer, s->len);
595 out:
596 kfree(s);
597 return r;
600 static ssize_t
601 event_id_read(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
603 struct ftrace_event_call *call = filp->private_data;
604 struct trace_seq *s;
605 int r;
607 if (*ppos)
608 return 0;
610 s = kmalloc(sizeof(*s), GFP_KERNEL);
611 if (!s)
612 return -ENOMEM;
614 trace_seq_init(s);
615 trace_seq_printf(s, "%d\n", call->id);
617 r = simple_read_from_buffer(ubuf, cnt, ppos,
618 s->buffer, s->len);
619 kfree(s);
620 return r;
623 static ssize_t
624 event_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
625 loff_t *ppos)
627 struct ftrace_event_call *call = filp->private_data;
628 struct trace_seq *s;
629 int r;
631 if (*ppos)
632 return 0;
634 s = kmalloc(sizeof(*s), GFP_KERNEL);
635 if (!s)
636 return -ENOMEM;
638 trace_seq_init(s);
640 print_event_filter(call, s);
641 r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
643 kfree(s);
645 return r;
648 static ssize_t
649 event_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
650 loff_t *ppos)
652 struct ftrace_event_call *call = filp->private_data;
653 char *buf;
654 int err;
656 if (cnt >= PAGE_SIZE)
657 return -EINVAL;
659 buf = (char *)__get_free_page(GFP_TEMPORARY);
660 if (!buf)
661 return -ENOMEM;
663 if (copy_from_user(buf, ubuf, cnt)) {
664 free_page((unsigned long) buf);
665 return -EFAULT;
667 buf[cnt] = '\0';
669 err = apply_event_filter(call, buf);
670 free_page((unsigned long) buf);
671 if (err < 0)
672 return err;
674 *ppos += cnt;
676 return cnt;
679 static ssize_t
680 subsystem_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
681 loff_t *ppos)
683 struct event_subsystem *system = filp->private_data;
684 struct trace_seq *s;
685 int r;
687 if (*ppos)
688 return 0;
690 s = kmalloc(sizeof(*s), GFP_KERNEL);
691 if (!s)
692 return -ENOMEM;
694 trace_seq_init(s);
696 print_subsystem_event_filter(system, s);
697 r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
699 kfree(s);
701 return r;
704 static ssize_t
705 subsystem_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
706 loff_t *ppos)
708 struct event_subsystem *system = filp->private_data;
709 char *buf;
710 int err;
712 if (cnt >= PAGE_SIZE)
713 return -EINVAL;
715 buf = (char *)__get_free_page(GFP_TEMPORARY);
716 if (!buf)
717 return -ENOMEM;
719 if (copy_from_user(buf, ubuf, cnt)) {
720 free_page((unsigned long) buf);
721 return -EFAULT;
723 buf[cnt] = '\0';
725 err = apply_subsystem_event_filter(system, buf);
726 free_page((unsigned long) buf);
727 if (err < 0)
728 return err;
730 *ppos += cnt;
732 return cnt;
735 static ssize_t
736 show_header(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
738 int (*func)(struct trace_seq *s) = filp->private_data;
739 struct trace_seq *s;
740 int r;
742 if (*ppos)
743 return 0;
745 s = kmalloc(sizeof(*s), GFP_KERNEL);
746 if (!s)
747 return -ENOMEM;
749 trace_seq_init(s);
751 func(s);
752 r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
754 kfree(s);
756 return r;
759 static const struct seq_operations show_event_seq_ops = {
760 .start = t_start,
761 .next = t_next,
762 .show = t_show,
763 .stop = t_stop,
766 static const struct seq_operations show_set_event_seq_ops = {
767 .start = s_start,
768 .next = s_next,
769 .show = t_show,
770 .stop = t_stop,
773 static const struct file_operations ftrace_avail_fops = {
774 .open = ftrace_event_seq_open,
775 .read = seq_read,
776 .llseek = seq_lseek,
777 .release = seq_release,
780 static const struct file_operations ftrace_set_event_fops = {
781 .open = ftrace_event_seq_open,
782 .read = seq_read,
783 .write = ftrace_event_write,
784 .llseek = seq_lseek,
785 .release = seq_release,
788 static const struct file_operations ftrace_enable_fops = {
789 .open = tracing_open_generic,
790 .read = event_enable_read,
791 .write = event_enable_write,
794 static const struct file_operations ftrace_event_format_fops = {
795 .open = tracing_open_generic,
796 .read = event_format_read,
799 static const struct file_operations ftrace_event_id_fops = {
800 .open = tracing_open_generic,
801 .read = event_id_read,
804 static const struct file_operations ftrace_event_filter_fops = {
805 .open = tracing_open_generic,
806 .read = event_filter_read,
807 .write = event_filter_write,
810 static const struct file_operations ftrace_subsystem_filter_fops = {
811 .open = tracing_open_generic,
812 .read = subsystem_filter_read,
813 .write = subsystem_filter_write,
816 static const struct file_operations ftrace_system_enable_fops = {
817 .open = tracing_open_generic,
818 .read = system_enable_read,
819 .write = system_enable_write,
822 static const struct file_operations ftrace_show_header_fops = {
823 .open = tracing_open_generic,
824 .read = show_header,
827 static struct dentry *event_trace_events_dir(void)
829 static struct dentry *d_tracer;
830 static struct dentry *d_events;
832 if (d_events)
833 return d_events;
835 d_tracer = tracing_init_dentry();
836 if (!d_tracer)
837 return NULL;
839 d_events = debugfs_create_dir("events", d_tracer);
840 if (!d_events)
841 pr_warning("Could not create debugfs "
842 "'events' directory\n");
844 return d_events;
847 static LIST_HEAD(event_subsystems);
849 static struct dentry *
850 event_subsystem_dir(const char *name, struct dentry *d_events)
852 struct event_subsystem *system;
853 struct dentry *entry;
855 /* First see if we did not already create this dir */
856 list_for_each_entry(system, &event_subsystems, list) {
857 if (strcmp(system->name, name) == 0) {
858 system->nr_events++;
859 return system->entry;
863 /* need to create new entry */
864 system = kmalloc(sizeof(*system), GFP_KERNEL);
865 if (!system) {
866 pr_warning("No memory to create event subsystem %s\n",
867 name);
868 return d_events;
871 system->entry = debugfs_create_dir(name, d_events);
872 if (!system->entry) {
873 pr_warning("Could not create event subsystem %s\n",
874 name);
875 kfree(system);
876 return d_events;
879 system->nr_events = 1;
880 system->name = kstrdup(name, GFP_KERNEL);
881 if (!system->name) {
882 debugfs_remove(system->entry);
883 kfree(system);
884 return d_events;
887 list_add(&system->list, &event_subsystems);
889 system->filter = NULL;
891 system->filter = kzalloc(sizeof(struct event_filter), GFP_KERNEL);
892 if (!system->filter) {
893 pr_warning("Could not allocate filter for subsystem "
894 "'%s'\n", name);
895 return system->entry;
898 entry = debugfs_create_file("filter", 0644, system->entry, system,
899 &ftrace_subsystem_filter_fops);
900 if (!entry) {
901 kfree(system->filter);
902 system->filter = NULL;
903 pr_warning("Could not create debugfs "
904 "'%s/filter' entry\n", name);
907 trace_create_file("enable", 0644, system->entry,
908 (void *)system->name,
909 &ftrace_system_enable_fops);
911 return system->entry;
914 static int
915 event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
916 const struct file_operations *id,
917 const struct file_operations *enable,
918 const struct file_operations *filter,
919 const struct file_operations *format)
921 int ret;
924 * If the trace point header did not define TRACE_SYSTEM
925 * then the system would be called "TRACE_SYSTEM".
927 if (strcmp(call->system, TRACE_SYSTEM) != 0)
928 d_events = event_subsystem_dir(call->system, d_events);
930 call->dir = debugfs_create_dir(call->name, d_events);
931 if (!call->dir) {
932 pr_warning("Could not create debugfs "
933 "'%s' directory\n", call->name);
934 return -1;
937 if (call->regfunc)
938 trace_create_file("enable", 0644, call->dir, call,
939 enable);
941 if (call->id && call->perf_event_enable)
942 trace_create_file("id", 0444, call->dir, call,
943 id);
945 if (call->define_fields) {
946 ret = trace_define_common_fields(call);
947 if (!ret)
948 ret = call->define_fields(call);
949 if (ret < 0) {
950 pr_warning("Could not initialize trace point"
951 " events/%s\n", call->name);
952 return ret;
954 trace_create_file("filter", 0644, call->dir, call,
955 filter);
958 trace_create_file("format", 0444, call->dir, call,
959 format);
961 return 0;
964 static int __trace_add_event_call(struct ftrace_event_call *call)
966 struct dentry *d_events;
967 int ret;
969 if (!call->name)
970 return -EINVAL;
972 if (call->raw_init) {
973 ret = call->raw_init(call);
974 if (ret < 0) {
975 if (ret != -ENOSYS)
976 pr_warning("Could not initialize trace "
977 "events/%s\n", call->name);
978 return ret;
982 d_events = event_trace_events_dir();
983 if (!d_events)
984 return -ENOENT;
986 ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
987 &ftrace_enable_fops, &ftrace_event_filter_fops,
988 &ftrace_event_format_fops);
989 if (!ret)
990 list_add(&call->list, &ftrace_events);
992 return ret;
995 /* Add an additional event_call dynamically */
996 int trace_add_event_call(struct ftrace_event_call *call)
998 int ret;
999 mutex_lock(&event_mutex);
1000 ret = __trace_add_event_call(call);
1001 mutex_unlock(&event_mutex);
1002 return ret;
1005 static void remove_subsystem_dir(const char *name)
1007 struct event_subsystem *system;
1009 if (strcmp(name, TRACE_SYSTEM) == 0)
1010 return;
1012 list_for_each_entry(system, &event_subsystems, list) {
1013 if (strcmp(system->name, name) == 0) {
1014 if (!--system->nr_events) {
1015 struct event_filter *filter = system->filter;
1017 debugfs_remove_recursive(system->entry);
1018 list_del(&system->list);
1019 if (filter) {
1020 kfree(filter->filter_string);
1021 kfree(filter);
1023 kfree(system->name);
1024 kfree(system);
1026 break;
1032 * Must be called under locking both of event_mutex and trace_event_mutex.
1034 static void __trace_remove_event_call(struct ftrace_event_call *call)
1036 ftrace_event_enable_disable(call, 0);
1037 if (call->event)
1038 __unregister_ftrace_event(call->event);
1039 debugfs_remove_recursive(call->dir);
1040 list_del(&call->list);
1041 trace_destroy_fields(call);
1042 destroy_preds(call);
1043 remove_subsystem_dir(call->system);
1046 /* Remove an event_call */
1047 void trace_remove_event_call(struct ftrace_event_call *call)
1049 mutex_lock(&event_mutex);
1050 down_write(&trace_event_mutex);
1051 __trace_remove_event_call(call);
1052 up_write(&trace_event_mutex);
1053 mutex_unlock(&event_mutex);
1056 #define for_each_event(event, start, end) \
1057 for (event = start; \
1058 (unsigned long)event < (unsigned long)end; \
1059 event++)
1061 #ifdef CONFIG_MODULES
1063 static LIST_HEAD(ftrace_module_file_list);
1066 * Modules must own their file_operations to keep up with
1067 * reference counting.
1069 struct ftrace_module_file_ops {
1070 struct list_head list;
1071 struct module *mod;
1072 struct file_operations id;
1073 struct file_operations enable;
1074 struct file_operations format;
1075 struct file_operations filter;
1078 static struct ftrace_module_file_ops *
1079 trace_create_file_ops(struct module *mod)
1081 struct ftrace_module_file_ops *file_ops;
1084 * This is a bit of a PITA. To allow for correct reference
1085 * counting, modules must "own" their file_operations.
1086 * To do this, we allocate the file operations that will be
1087 * used in the event directory.
1090 file_ops = kmalloc(sizeof(*file_ops), GFP_KERNEL);
1091 if (!file_ops)
1092 return NULL;
1094 file_ops->mod = mod;
1096 file_ops->id = ftrace_event_id_fops;
1097 file_ops->id.owner = mod;
1099 file_ops->enable = ftrace_enable_fops;
1100 file_ops->enable.owner = mod;
1102 file_ops->filter = ftrace_event_filter_fops;
1103 file_ops->filter.owner = mod;
1105 file_ops->format = ftrace_event_format_fops;
1106 file_ops->format.owner = mod;
1108 list_add(&file_ops->list, &ftrace_module_file_list);
1110 return file_ops;
1113 static void trace_module_add_events(struct module *mod)
1115 struct ftrace_module_file_ops *file_ops = NULL;
1116 struct ftrace_event_call *call, *start, *end;
1117 struct dentry *d_events;
1118 int ret;
1120 start = mod->trace_events;
1121 end = mod->trace_events + mod->num_trace_events;
1123 if (start == end)
1124 return;
1126 d_events = event_trace_events_dir();
1127 if (!d_events)
1128 return;
1130 for_each_event(call, start, end) {
1131 /* The linker may leave blanks */
1132 if (!call->name)
1133 continue;
1134 if (call->raw_init) {
1135 ret = call->raw_init(call);
1136 if (ret < 0) {
1137 if (ret != -ENOSYS)
1138 pr_warning("Could not initialize trace "
1139 "point events/%s\n", call->name);
1140 continue;
1144 * This module has events, create file ops for this module
1145 * if not already done.
1147 if (!file_ops) {
1148 file_ops = trace_create_file_ops(mod);
1149 if (!file_ops)
1150 return;
1152 call->mod = mod;
1153 ret = event_create_dir(call, d_events,
1154 &file_ops->id, &file_ops->enable,
1155 &file_ops->filter, &file_ops->format);
1156 if (!ret)
1157 list_add(&call->list, &ftrace_events);
1161 static void trace_module_remove_events(struct module *mod)
1163 struct ftrace_module_file_ops *file_ops;
1164 struct ftrace_event_call *call, *p;
1165 bool found = false;
1167 down_write(&trace_event_mutex);
1168 list_for_each_entry_safe(call, p, &ftrace_events, list) {
1169 if (call->mod == mod) {
1170 found = true;
1171 __trace_remove_event_call(call);
1175 /* Now free the file_operations */
1176 list_for_each_entry(file_ops, &ftrace_module_file_list, list) {
1177 if (file_ops->mod == mod)
1178 break;
1180 if (&file_ops->list != &ftrace_module_file_list) {
1181 list_del(&file_ops->list);
1182 kfree(file_ops);
1186 * It is safest to reset the ring buffer if the module being unloaded
1187 * registered any events.
1189 if (found)
1190 tracing_reset_current_online_cpus();
1191 up_write(&trace_event_mutex);
1194 static int trace_module_notify(struct notifier_block *self,
1195 unsigned long val, void *data)
1197 struct module *mod = data;
1199 mutex_lock(&event_mutex);
1200 switch (val) {
1201 case MODULE_STATE_COMING:
1202 trace_module_add_events(mod);
1203 break;
1204 case MODULE_STATE_GOING:
1205 trace_module_remove_events(mod);
1206 break;
1208 mutex_unlock(&event_mutex);
1210 return 0;
1212 #else
1213 static int trace_module_notify(struct notifier_block *self,
1214 unsigned long val, void *data)
1216 return 0;
1218 #endif /* CONFIG_MODULES */
1220 static struct notifier_block trace_module_nb = {
1221 .notifier_call = trace_module_notify,
1222 .priority = 0,
1225 extern struct ftrace_event_call __start_ftrace_events[];
1226 extern struct ftrace_event_call __stop_ftrace_events[];
1228 static char bootup_event_buf[COMMAND_LINE_SIZE] __initdata;
1230 static __init int setup_trace_event(char *str)
1232 strlcpy(bootup_event_buf, str, COMMAND_LINE_SIZE);
1233 ring_buffer_expanded = 1;
1234 tracing_selftest_disabled = 1;
1236 return 1;
1238 __setup("trace_event=", setup_trace_event);
1240 static __init int event_trace_init(void)
1242 struct ftrace_event_call *call;
1243 struct dentry *d_tracer;
1244 struct dentry *entry;
1245 struct dentry *d_events;
1246 int ret;
1247 char *buf = bootup_event_buf;
1248 char *token;
1250 d_tracer = tracing_init_dentry();
1251 if (!d_tracer)
1252 return 0;
1254 entry = debugfs_create_file("available_events", 0444, d_tracer,
1255 (void *)&show_event_seq_ops,
1256 &ftrace_avail_fops);
1257 if (!entry)
1258 pr_warning("Could not create debugfs "
1259 "'available_events' entry\n");
1261 entry = debugfs_create_file("set_event", 0644, d_tracer,
1262 (void *)&show_set_event_seq_ops,
1263 &ftrace_set_event_fops);
1264 if (!entry)
1265 pr_warning("Could not create debugfs "
1266 "'set_event' entry\n");
1268 d_events = event_trace_events_dir();
1269 if (!d_events)
1270 return 0;
1272 /* ring buffer internal formats */
1273 trace_create_file("header_page", 0444, d_events,
1274 ring_buffer_print_page_header,
1275 &ftrace_show_header_fops);
1277 trace_create_file("header_event", 0444, d_events,
1278 ring_buffer_print_entry_header,
1279 &ftrace_show_header_fops);
1281 trace_create_file("enable", 0644, d_events,
1282 NULL, &ftrace_system_enable_fops);
1284 for_each_event(call, __start_ftrace_events, __stop_ftrace_events) {
1285 /* The linker may leave blanks */
1286 if (!call->name)
1287 continue;
1288 if (call->raw_init) {
1289 ret = call->raw_init(call);
1290 if (ret < 0) {
1291 if (ret != -ENOSYS)
1292 pr_warning("Could not initialize trace "
1293 "point events/%s\n", call->name);
1294 continue;
1297 ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
1298 &ftrace_enable_fops,
1299 &ftrace_event_filter_fops,
1300 &ftrace_event_format_fops);
1301 if (!ret)
1302 list_add(&call->list, &ftrace_events);
1305 while (true) {
1306 token = strsep(&buf, ",");
1308 if (!token)
1309 break;
1310 if (!*token)
1311 continue;
1313 ret = ftrace_set_clr_event(token, 1);
1314 if (ret)
1315 pr_warning("Failed to enable trace event: %s\n", token);
1318 ret = register_module_notifier(&trace_module_nb);
1319 if (ret)
1320 pr_warning("Failed to register trace events module notifier\n");
1322 return 0;
1324 fs_initcall(event_trace_init);
1326 #ifdef CONFIG_FTRACE_STARTUP_TEST
1328 static DEFINE_SPINLOCK(test_spinlock);
1329 static DEFINE_SPINLOCK(test_spinlock_irq);
1330 static DEFINE_MUTEX(test_mutex);
1332 static __init void test_work(struct work_struct *dummy)
1334 spin_lock(&test_spinlock);
1335 spin_lock_irq(&test_spinlock_irq);
1336 udelay(1);
1337 spin_unlock_irq(&test_spinlock_irq);
1338 spin_unlock(&test_spinlock);
1340 mutex_lock(&test_mutex);
1341 msleep(1);
1342 mutex_unlock(&test_mutex);
1345 static __init int event_test_thread(void *unused)
1347 void *test_malloc;
1349 test_malloc = kmalloc(1234, GFP_KERNEL);
1350 if (!test_malloc)
1351 pr_info("failed to kmalloc\n");
1353 schedule_on_each_cpu(test_work);
1355 kfree(test_malloc);
1357 set_current_state(TASK_INTERRUPTIBLE);
1358 while (!kthread_should_stop())
1359 schedule();
1361 return 0;
1365 * Do various things that may trigger events.
1367 static __init void event_test_stuff(void)
1369 struct task_struct *test_thread;
1371 test_thread = kthread_run(event_test_thread, NULL, "test-events");
1372 msleep(1);
1373 kthread_stop(test_thread);
1377 * For every trace event defined, we will test each trace point separately,
1378 * and then by groups, and finally all trace points.
1380 static __init void event_trace_self_tests(void)
1382 struct ftrace_event_call *call;
1383 struct event_subsystem *system;
1384 int ret;
1386 pr_info("Running tests on trace events:\n");
1388 list_for_each_entry(call, &ftrace_events, list) {
1390 /* Only test those that have a regfunc */
1391 if (!call->regfunc)
1392 continue;
1395 * Testing syscall events here is pretty useless, but
1396 * we still do it if configured. But this is time consuming.
1397 * What we really need is a user thread to perform the
1398 * syscalls as we test.
1400 #ifndef CONFIG_EVENT_TRACE_TEST_SYSCALLS
1401 if (call->system &&
1402 strcmp(call->system, "syscalls") == 0)
1403 continue;
1404 #endif
1406 pr_info("Testing event %s: ", call->name);
1409 * If an event is already enabled, someone is using
1410 * it and the self test should not be on.
1412 if (call->enabled) {
1413 pr_warning("Enabled event during self test!\n");
1414 WARN_ON_ONCE(1);
1415 continue;
1418 ftrace_event_enable_disable(call, 1);
1419 event_test_stuff();
1420 ftrace_event_enable_disable(call, 0);
1422 pr_cont("OK\n");
1425 /* Now test at the sub system level */
1427 pr_info("Running tests on trace event systems:\n");
1429 list_for_each_entry(system, &event_subsystems, list) {
1431 /* the ftrace system is special, skip it */
1432 if (strcmp(system->name, "ftrace") == 0)
1433 continue;
1435 pr_info("Testing event system %s: ", system->name);
1437 ret = __ftrace_set_clr_event(NULL, system->name, NULL, 1);
1438 if (WARN_ON_ONCE(ret)) {
1439 pr_warning("error enabling system %s\n",
1440 system->name);
1441 continue;
1444 event_test_stuff();
1446 ret = __ftrace_set_clr_event(NULL, system->name, NULL, 0);
1447 if (WARN_ON_ONCE(ret))
1448 pr_warning("error disabling system %s\n",
1449 system->name);
1451 pr_cont("OK\n");
1454 /* Test with all events enabled */
1456 pr_info("Running tests on all trace events:\n");
1457 pr_info("Testing all events: ");
1459 ret = __ftrace_set_clr_event(NULL, NULL, NULL, 1);
1460 if (WARN_ON_ONCE(ret)) {
1461 pr_warning("error enabling all events\n");
1462 return;
1465 event_test_stuff();
1467 /* reset sysname */
1468 ret = __ftrace_set_clr_event(NULL, NULL, NULL, 0);
1469 if (WARN_ON_ONCE(ret)) {
1470 pr_warning("error disabling all events\n");
1471 return;
1474 pr_cont("OK\n");
1477 #ifdef CONFIG_FUNCTION_TRACER
1479 static DEFINE_PER_CPU(atomic_t, ftrace_test_event_disable);
1481 static void
1482 function_test_events_call(unsigned long ip, unsigned long parent_ip)
1484 struct ring_buffer_event *event;
1485 struct ring_buffer *buffer;
1486 struct ftrace_entry *entry;
1487 unsigned long flags;
1488 long disabled;
1489 int resched;
1490 int cpu;
1491 int pc;
1493 pc = preempt_count();
1494 resched = ftrace_preempt_disable();
1495 cpu = raw_smp_processor_id();
1496 disabled = atomic_inc_return(&per_cpu(ftrace_test_event_disable, cpu));
1498 if (disabled != 1)
1499 goto out;
1501 local_save_flags(flags);
1503 event = trace_current_buffer_lock_reserve(&buffer,
1504 TRACE_FN, sizeof(*entry),
1505 flags, pc);
1506 if (!event)
1507 goto out;
1508 entry = ring_buffer_event_data(event);
1509 entry->ip = ip;
1510 entry->parent_ip = parent_ip;
1512 trace_nowake_buffer_unlock_commit(buffer, event, flags, pc);
1514 out:
1515 atomic_dec(&per_cpu(ftrace_test_event_disable, cpu));
1516 ftrace_preempt_enable(resched);
1519 static struct ftrace_ops trace_ops __initdata =
1521 .func = function_test_events_call,
1524 static __init void event_trace_self_test_with_function(void)
1526 register_ftrace_function(&trace_ops);
1527 pr_info("Running tests again, along with the function tracer\n");
1528 event_trace_self_tests();
1529 unregister_ftrace_function(&trace_ops);
1531 #else
1532 static __init void event_trace_self_test_with_function(void)
1535 #endif
1537 static __init int event_trace_self_tests_init(void)
1539 if (!tracing_selftest_disabled) {
1540 event_trace_self_tests();
1541 event_trace_self_test_with_function();
1544 return 0;
1547 late_initcall(event_trace_self_tests_init);
1549 #endif