mirror of
https://github.com/torvalds/linux.git
synced 2024-11-01 09:41:44 +00:00
5a0e3ad6af
percpu.h is included by sched.h and module.h and thus ends up being included when building most .c files. percpu.h includes slab.h which in turn includes gfp.h making everything defined by the two files universally available and complicating inclusion dependencies. percpu.h -> slab.h dependency is about to be removed. Prepare for this change by updating users of gfp and slab facilities include those headers directly instead of assuming availability. As this conversion needs to touch large number of source files, the following script is used as the basis of conversion. http://userweb.kernel.org/~tj/misc/slabh-sweep.py The script does the followings. * Scan files for gfp and slab usages and update includes such that only the necessary includes are there. ie. if only gfp is used, gfp.h, if slab is used, slab.h. * When the script inserts a new include, it looks at the include blocks and try to put the new include such that its order conforms to its surrounding. It's put in the include block which contains core kernel includes, in the same order that the rest are ordered - alphabetical, Christmas tree, rev-Xmas-tree or at the end if there doesn't seem to be any matching order. * If the script can't find a place to put a new include (mostly because the file doesn't have fitting include block), it prints out an error message indicating which .h file needs to be added to the file. The conversion was done in the following steps. 1. The initial automatic conversion of all .c files updated slightly over 4000 files, deleting around 700 includes and adding ~480 gfp.h and ~3000 slab.h inclusions. The script emitted errors for ~400 files. 2. Each error was manually checked. Some didn't need the inclusion, some needed manual addition while adding it to implementation .h or embedding .c file was more appropriate for others. This step added inclusions to around 150 files. 3. The script was run again and the output was compared to the edits from #2 to make sure no file was left behind. 4. Several build tests were done and a couple of problems were fixed. e.g. lib/decompress_*.c used malloc/free() wrappers around slab APIs requiring slab.h to be added manually. 5. The script was run on all .h files but without automatically editing them as sprinkling gfp.h and slab.h inclusions around .h files could easily lead to inclusion dependency hell. Most gfp.h inclusion directives were ignored as stuff from gfp.h was usually wildly available and often used in preprocessor macros. Each slab.h inclusion directive was examined and added manually as necessary. 6. percpu.h was updated not to include slab.h. 7. Build test were done on the following configurations and failures were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my distributed build env didn't work with gcov compiles) and a few more options had to be turned off depending on archs to make things build (like ipr on powerpc/64 which failed due to missing writeq). * x86 and x86_64 UP and SMP allmodconfig and a custom test config. * powerpc and powerpc64 SMP allmodconfig * sparc and sparc64 SMP allmodconfig * ia64 SMP allmodconfig * s390 SMP allmodconfig * alpha SMP allmodconfig * um on x86_64 SMP allmodconfig 8. percpu.h modifications were reverted so that it could be applied as a separate patch and serve as bisection point. Given the fact that I had only a couple of failures from tests on step 6, I'm fairly confident about the coverage of this conversion patch. If there is a breakage, it's likely to be something in one of the arch headers which should be easily discoverable easily on most builds of the specific arch. Signed-off-by: Tejun Heo <tj@kernel.org> Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org> Cc: Ingo Molnar <mingo@redhat.com> Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
1551 lines
32 KiB
C
1551 lines
32 KiB
C
/*
|
|
* event tracer
|
|
*
|
|
* Copyright (C) 2008 Red Hat Inc, Steven Rostedt <srostedt@redhat.com>
|
|
*
|
|
* - Added format output of fields of the trace point.
|
|
* This was based off of work by Tom Zanussi <tzanussi@gmail.com>.
|
|
*
|
|
*/
|
|
|
|
#include <linux/workqueue.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/debugfs.h>
|
|
#include <linux/uaccess.h>
|
|
#include <linux/module.h>
|
|
#include <linux/ctype.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/delay.h>
|
|
|
|
#include <asm/setup.h>
|
|
|
|
#include "trace_output.h"
|
|
|
|
#undef TRACE_SYSTEM
|
|
#define TRACE_SYSTEM "TRACE_SYSTEM"
|
|
|
|
DEFINE_MUTEX(event_mutex);
|
|
|
|
LIST_HEAD(ftrace_events);
|
|
|
|
int trace_define_field(struct ftrace_event_call *call, const char *type,
|
|
const char *name, int offset, int size, int is_signed,
|
|
int filter_type)
|
|
{
|
|
struct ftrace_event_field *field;
|
|
|
|
field = kzalloc(sizeof(*field), GFP_KERNEL);
|
|
if (!field)
|
|
goto err;
|
|
|
|
field->name = kstrdup(name, GFP_KERNEL);
|
|
if (!field->name)
|
|
goto err;
|
|
|
|
field->type = kstrdup(type, GFP_KERNEL);
|
|
if (!field->type)
|
|
goto err;
|
|
|
|
if (filter_type == FILTER_OTHER)
|
|
field->filter_type = filter_assign_type(type);
|
|
else
|
|
field->filter_type = filter_type;
|
|
|
|
field->offset = offset;
|
|
field->size = size;
|
|
field->is_signed = is_signed;
|
|
|
|
list_add(&field->link, &call->fields);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
if (field)
|
|
kfree(field->name);
|
|
kfree(field);
|
|
|
|
return -ENOMEM;
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_define_field);
|
|
|
|
#define __common_field(type, item) \
|
|
ret = trace_define_field(call, #type, "common_" #item, \
|
|
offsetof(typeof(ent), item), \
|
|
sizeof(ent.item), \
|
|
is_signed_type(type), FILTER_OTHER); \
|
|
if (ret) \
|
|
return ret;
|
|
|
|
static int trace_define_common_fields(struct ftrace_event_call *call)
|
|
{
|
|
int ret;
|
|
struct trace_entry ent;
|
|
|
|
__common_field(unsigned short, type);
|
|
__common_field(unsigned char, flags);
|
|
__common_field(unsigned char, preempt_count);
|
|
__common_field(int, pid);
|
|
__common_field(int, lock_depth);
|
|
|
|
return ret;
|
|
}
|
|
|
|
void trace_destroy_fields(struct ftrace_event_call *call)
|
|
{
|
|
struct ftrace_event_field *field, *next;
|
|
|
|
list_for_each_entry_safe(field, next, &call->fields, link) {
|
|
list_del(&field->link);
|
|
kfree(field->type);
|
|
kfree(field->name);
|
|
kfree(field);
|
|
}
|
|
}
|
|
|
|
int trace_event_raw_init(struct ftrace_event_call *call)
|
|
{
|
|
int id;
|
|
|
|
id = register_ftrace_event(call->event);
|
|
if (!id)
|
|
return -ENODEV;
|
|
call->id = id;
|
|
INIT_LIST_HEAD(&call->fields);
|
|
|
|
return 0;
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_event_raw_init);
|
|
|
|
static int ftrace_event_enable_disable(struct ftrace_event_call *call,
|
|
int enable)
|
|
{
|
|
int ret = 0;
|
|
|
|
switch (enable) {
|
|
case 0:
|
|
if (call->enabled) {
|
|
call->enabled = 0;
|
|
tracing_stop_cmdline_record();
|
|
call->unregfunc(call);
|
|
}
|
|
break;
|
|
case 1:
|
|
if (!call->enabled) {
|
|
tracing_start_cmdline_record();
|
|
ret = call->regfunc(call);
|
|
if (ret) {
|
|
tracing_stop_cmdline_record();
|
|
pr_info("event trace: Could not enable event "
|
|
"%s\n", call->name);
|
|
break;
|
|
}
|
|
call->enabled = 1;
|
|
}
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void ftrace_clear_events(void)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
|
|
mutex_lock(&event_mutex);
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
ftrace_event_enable_disable(call, 0);
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
}
|
|
|
|
/*
|
|
* __ftrace_set_clr_event(NULL, NULL, NULL, set) will set/unset all events.
|
|
*/
|
|
static int __ftrace_set_clr_event(const char *match, const char *sub,
|
|
const char *event, int set)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
int ret = -EINVAL;
|
|
|
|
mutex_lock(&event_mutex);
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
|
|
if (!call->name || !call->regfunc)
|
|
continue;
|
|
|
|
if (match &&
|
|
strcmp(match, call->name) != 0 &&
|
|
strcmp(match, call->system) != 0)
|
|
continue;
|
|
|
|
if (sub && strcmp(sub, call->system) != 0)
|
|
continue;
|
|
|
|
if (event && strcmp(event, call->name) != 0)
|
|
continue;
|
|
|
|
ftrace_event_enable_disable(call, set);
|
|
|
|
ret = 0;
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int ftrace_set_clr_event(char *buf, int set)
|
|
{
|
|
char *event = NULL, *sub = NULL, *match;
|
|
|
|
/*
|
|
* The buf format can be <subsystem>:<event-name>
|
|
* *:<event-name> means any event by that name.
|
|
* :<event-name> is the same.
|
|
*
|
|
* <subsystem>:* means all events in that subsystem
|
|
* <subsystem>: means the same.
|
|
*
|
|
* <name> (no ':') means all events in a subsystem with
|
|
* the name <name> or any event that matches <name>
|
|
*/
|
|
|
|
match = strsep(&buf, ":");
|
|
if (buf) {
|
|
sub = match;
|
|
event = buf;
|
|
match = NULL;
|
|
|
|
if (!strlen(sub) || strcmp(sub, "*") == 0)
|
|
sub = NULL;
|
|
if (!strlen(event) || strcmp(event, "*") == 0)
|
|
event = NULL;
|
|
}
|
|
|
|
return __ftrace_set_clr_event(match, sub, event, set);
|
|
}
|
|
|
|
/**
|
|
* trace_set_clr_event - enable or disable an event
|
|
* @system: system name to match (NULL for any system)
|
|
* @event: event name to match (NULL for all events, within system)
|
|
* @set: 1 to enable, 0 to disable
|
|
*
|
|
* This is a way for other parts of the kernel to enable or disable
|
|
* event recording.
|
|
*
|
|
* Returns 0 on success, -EINVAL if the parameters do not match any
|
|
* registered events.
|
|
*/
|
|
int trace_set_clr_event(const char *system, const char *event, int set)
|
|
{
|
|
return __ftrace_set_clr_event(NULL, system, event, set);
|
|
}
|
|
|
|
/* 128 should be much more than enough */
|
|
#define EVENT_BUF_SIZE 127
|
|
|
|
static ssize_t
|
|
ftrace_event_write(struct file *file, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_parser parser;
|
|
ssize_t read, ret;
|
|
|
|
if (!cnt)
|
|
return 0;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
if (trace_parser_get_init(&parser, EVENT_BUF_SIZE + 1))
|
|
return -ENOMEM;
|
|
|
|
read = trace_get_user(&parser, ubuf, cnt, ppos);
|
|
|
|
if (read >= 0 && trace_parser_loaded((&parser))) {
|
|
int set = 1;
|
|
|
|
if (*parser.buffer == '!')
|
|
set = 0;
|
|
|
|
parser.buffer[parser.idx] = 0;
|
|
|
|
ret = ftrace_set_clr_event(parser.buffer + !set, set);
|
|
if (ret)
|
|
goto out_put;
|
|
}
|
|
|
|
ret = read;
|
|
|
|
out_put:
|
|
trace_parser_put(&parser);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void *
|
|
t_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call = v;
|
|
|
|
(*pos)++;
|
|
|
|
list_for_each_entry_continue(call, &ftrace_events, list) {
|
|
/*
|
|
* The ftrace subsystem is for showing formats only.
|
|
* They can not be enabled or disabled via the event files.
|
|
*/
|
|
if (call->regfunc)
|
|
return call;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void *t_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
loff_t l;
|
|
|
|
mutex_lock(&event_mutex);
|
|
|
|
call = list_entry(&ftrace_events, struct ftrace_event_call, list);
|
|
for (l = 0; l <= *pos; ) {
|
|
call = t_next(m, call, &l);
|
|
if (!call)
|
|
break;
|
|
}
|
|
return call;
|
|
}
|
|
|
|
static void *
|
|
s_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call = v;
|
|
|
|
(*pos)++;
|
|
|
|
list_for_each_entry_continue(call, &ftrace_events, list) {
|
|
if (call->enabled)
|
|
return call;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void *s_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
loff_t l;
|
|
|
|
mutex_lock(&event_mutex);
|
|
|
|
call = list_entry(&ftrace_events, struct ftrace_event_call, list);
|
|
for (l = 0; l <= *pos; ) {
|
|
call = s_next(m, call, &l);
|
|
if (!call)
|
|
break;
|
|
}
|
|
return call;
|
|
}
|
|
|
|
static int t_show(struct seq_file *m, void *v)
|
|
{
|
|
struct ftrace_event_call *call = v;
|
|
|
|
if (strcmp(call->system, TRACE_SYSTEM) != 0)
|
|
seq_printf(m, "%s:", call->system);
|
|
seq_printf(m, "%s\n", call->name);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void t_stop(struct seq_file *m, void *p)
|
|
{
|
|
mutex_unlock(&event_mutex);
|
|
}
|
|
|
|
static int
|
|
ftrace_event_seq_open(struct inode *inode, struct file *file)
|
|
{
|
|
const struct seq_operations *seq_ops;
|
|
|
|
if ((file->f_mode & FMODE_WRITE) &&
|
|
(file->f_flags & O_TRUNC))
|
|
ftrace_clear_events();
|
|
|
|
seq_ops = inode->i_private;
|
|
return seq_open(file, seq_ops);
|
|
}
|
|
|
|
static ssize_t
|
|
event_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
char *buf;
|
|
|
|
if (call->enabled)
|
|
buf = "1\n";
|
|
else
|
|
buf = "0\n";
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
|
|
}
|
|
|
|
static ssize_t
|
|
event_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
char buf[64];
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
if (cnt >= sizeof(buf))
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
ret = strict_strtoul(buf, 10, &val);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
switch (val) {
|
|
case 0:
|
|
case 1:
|
|
mutex_lock(&event_mutex);
|
|
ret = ftrace_event_enable_disable(call, val);
|
|
mutex_unlock(&event_mutex);
|
|
break;
|
|
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
|
|
*ppos += cnt;
|
|
|
|
return ret ? ret : cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
system_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
const char set_to_char[4] = { '?', '0', '1', 'X' };
|
|
const char *system = filp->private_data;
|
|
struct ftrace_event_call *call;
|
|
char buf[2];
|
|
int set = 0;
|
|
int ret;
|
|
|
|
mutex_lock(&event_mutex);
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
if (!call->name || !call->regfunc)
|
|
continue;
|
|
|
|
if (system && strcmp(call->system, system) != 0)
|
|
continue;
|
|
|
|
/*
|
|
* We need to find out if all the events are set
|
|
* or if all events or cleared, or if we have
|
|
* a mixture.
|
|
*/
|
|
set |= (1 << !!call->enabled);
|
|
|
|
/*
|
|
* If we have a mixture, no need to look further.
|
|
*/
|
|
if (set == 3)
|
|
break;
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
|
|
buf[0] = set_to_char[set];
|
|
buf[1] = '\n';
|
|
|
|
ret = simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
system_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
const char *system = filp->private_data;
|
|
unsigned long val;
|
|
char buf[64];
|
|
ssize_t ret;
|
|
|
|
if (cnt >= sizeof(buf))
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
ret = strict_strtoul(buf, 10, &val);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
if (val != 0 && val != 1)
|
|
return -EINVAL;
|
|
|
|
ret = __ftrace_set_clr_event(NULL, system, NULL, val);
|
|
if (ret)
|
|
goto out;
|
|
|
|
ret = cnt;
|
|
|
|
out:
|
|
*ppos += cnt;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
event_format_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
struct ftrace_event_field *field;
|
|
struct trace_seq *s;
|
|
int common_field_count = 5;
|
|
char *buf;
|
|
int r = 0;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
trace_seq_printf(s, "name: %s\n", call->name);
|
|
trace_seq_printf(s, "ID: %d\n", call->id);
|
|
trace_seq_printf(s, "format:\n");
|
|
|
|
list_for_each_entry_reverse(field, &call->fields, link) {
|
|
/*
|
|
* Smartly shows the array type(except dynamic array).
|
|
* Normal:
|
|
* field:TYPE VAR
|
|
* If TYPE := TYPE[LEN], it is shown:
|
|
* field:TYPE VAR[LEN]
|
|
*/
|
|
const char *array_descriptor = strchr(field->type, '[');
|
|
|
|
if (!strncmp(field->type, "__data_loc", 10))
|
|
array_descriptor = NULL;
|
|
|
|
if (!array_descriptor) {
|
|
r = trace_seq_printf(s, "\tfield:%s %s;\toffset:%u;"
|
|
"\tsize:%u;\tsigned:%d;\n",
|
|
field->type, field->name, field->offset,
|
|
field->size, !!field->is_signed);
|
|
} else {
|
|
r = trace_seq_printf(s, "\tfield:%.*s %s%s;\toffset:%u;"
|
|
"\tsize:%u;\tsigned:%d;\n",
|
|
(int)(array_descriptor - field->type),
|
|
field->type, field->name,
|
|
array_descriptor, field->offset,
|
|
field->size, !!field->is_signed);
|
|
}
|
|
|
|
if (--common_field_count == 0)
|
|
r = trace_seq_printf(s, "\n");
|
|
|
|
if (!r)
|
|
break;
|
|
}
|
|
|
|
if (r)
|
|
r = trace_seq_printf(s, "\nprint fmt: %s\n",
|
|
call->print_fmt);
|
|
|
|
if (!r) {
|
|
/*
|
|
* ug! The format output is bigger than a PAGE!!
|
|
*/
|
|
buf = "FORMAT TOO BIG\n";
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos,
|
|
buf, strlen(buf));
|
|
goto out;
|
|
}
|
|
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos,
|
|
s->buffer, s->len);
|
|
out:
|
|
kfree(s);
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
event_id_read(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
trace_seq_printf(s, "%d\n", call->id);
|
|
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos,
|
|
s->buffer, s->len);
|
|
kfree(s);
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
event_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
print_event_filter(call, s);
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
event_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
char *buf;
|
|
int err;
|
|
|
|
if (cnt >= PAGE_SIZE)
|
|
return -EINVAL;
|
|
|
|
buf = (char *)__get_free_page(GFP_TEMPORARY);
|
|
if (!buf)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(buf, ubuf, cnt)) {
|
|
free_page((unsigned long) buf);
|
|
return -EFAULT;
|
|
}
|
|
buf[cnt] = '\0';
|
|
|
|
err = apply_event_filter(call, buf);
|
|
free_page((unsigned long) buf);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
subsystem_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct event_subsystem *system = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
print_subsystem_event_filter(system, s);
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
subsystem_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct event_subsystem *system = filp->private_data;
|
|
char *buf;
|
|
int err;
|
|
|
|
if (cnt >= PAGE_SIZE)
|
|
return -EINVAL;
|
|
|
|
buf = (char *)__get_free_page(GFP_TEMPORARY);
|
|
if (!buf)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(buf, ubuf, cnt)) {
|
|
free_page((unsigned long) buf);
|
|
return -EFAULT;
|
|
}
|
|
buf[cnt] = '\0';
|
|
|
|
err = apply_subsystem_event_filter(system, buf);
|
|
free_page((unsigned long) buf);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
show_header(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
|
|
{
|
|
int (*func)(struct trace_seq *s) = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
func(s);
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return r;
|
|
}
|
|
|
|
static const struct seq_operations show_event_seq_ops = {
|
|
.start = t_start,
|
|
.next = t_next,
|
|
.show = t_show,
|
|
.stop = t_stop,
|
|
};
|
|
|
|
static const struct seq_operations show_set_event_seq_ops = {
|
|
.start = s_start,
|
|
.next = s_next,
|
|
.show = t_show,
|
|
.stop = t_stop,
|
|
};
|
|
|
|
static const struct file_operations ftrace_avail_fops = {
|
|
.open = ftrace_event_seq_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release,
|
|
};
|
|
|
|
static const struct file_operations ftrace_set_event_fops = {
|
|
.open = ftrace_event_seq_open,
|
|
.read = seq_read,
|
|
.write = ftrace_event_write,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release,
|
|
};
|
|
|
|
static const struct file_operations ftrace_enable_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_enable_read,
|
|
.write = event_enable_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_event_format_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_format_read,
|
|
};
|
|
|
|
static const struct file_operations ftrace_event_id_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_id_read,
|
|
};
|
|
|
|
static const struct file_operations ftrace_event_filter_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_filter_read,
|
|
.write = event_filter_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_subsystem_filter_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = subsystem_filter_read,
|
|
.write = subsystem_filter_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_system_enable_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = system_enable_read,
|
|
.write = system_enable_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_show_header_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = show_header,
|
|
};
|
|
|
|
static struct dentry *event_trace_events_dir(void)
|
|
{
|
|
static struct dentry *d_tracer;
|
|
static struct dentry *d_events;
|
|
|
|
if (d_events)
|
|
return d_events;
|
|
|
|
d_tracer = tracing_init_dentry();
|
|
if (!d_tracer)
|
|
return NULL;
|
|
|
|
d_events = debugfs_create_dir("events", d_tracer);
|
|
if (!d_events)
|
|
pr_warning("Could not create debugfs "
|
|
"'events' directory\n");
|
|
|
|
return d_events;
|
|
}
|
|
|
|
static LIST_HEAD(event_subsystems);
|
|
|
|
static struct dentry *
|
|
event_subsystem_dir(const char *name, struct dentry *d_events)
|
|
{
|
|
struct event_subsystem *system;
|
|
struct dentry *entry;
|
|
|
|
/* First see if we did not already create this dir */
|
|
list_for_each_entry(system, &event_subsystems, list) {
|
|
if (strcmp(system->name, name) == 0) {
|
|
system->nr_events++;
|
|
return system->entry;
|
|
}
|
|
}
|
|
|
|
/* need to create new entry */
|
|
system = kmalloc(sizeof(*system), GFP_KERNEL);
|
|
if (!system) {
|
|
pr_warning("No memory to create event subsystem %s\n",
|
|
name);
|
|
return d_events;
|
|
}
|
|
|
|
system->entry = debugfs_create_dir(name, d_events);
|
|
if (!system->entry) {
|
|
pr_warning("Could not create event subsystem %s\n",
|
|
name);
|
|
kfree(system);
|
|
return d_events;
|
|
}
|
|
|
|
system->nr_events = 1;
|
|
system->name = kstrdup(name, GFP_KERNEL);
|
|
if (!system->name) {
|
|
debugfs_remove(system->entry);
|
|
kfree(system);
|
|
return d_events;
|
|
}
|
|
|
|
list_add(&system->list, &event_subsystems);
|
|
|
|
system->filter = NULL;
|
|
|
|
system->filter = kzalloc(sizeof(struct event_filter), GFP_KERNEL);
|
|
if (!system->filter) {
|
|
pr_warning("Could not allocate filter for subsystem "
|
|
"'%s'\n", name);
|
|
return system->entry;
|
|
}
|
|
|
|
entry = debugfs_create_file("filter", 0644, system->entry, system,
|
|
&ftrace_subsystem_filter_fops);
|
|
if (!entry) {
|
|
kfree(system->filter);
|
|
system->filter = NULL;
|
|
pr_warning("Could not create debugfs "
|
|
"'%s/filter' entry\n", name);
|
|
}
|
|
|
|
trace_create_file("enable", 0644, system->entry,
|
|
(void *)system->name,
|
|
&ftrace_system_enable_fops);
|
|
|
|
return system->entry;
|
|
}
|
|
|
|
static int
|
|
event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
|
|
const struct file_operations *id,
|
|
const struct file_operations *enable,
|
|
const struct file_operations *filter,
|
|
const struct file_operations *format)
|
|
{
|
|
int ret;
|
|
|
|
/*
|
|
* If the trace point header did not define TRACE_SYSTEM
|
|
* then the system would be called "TRACE_SYSTEM".
|
|
*/
|
|
if (strcmp(call->system, TRACE_SYSTEM) != 0)
|
|
d_events = event_subsystem_dir(call->system, d_events);
|
|
|
|
call->dir = debugfs_create_dir(call->name, d_events);
|
|
if (!call->dir) {
|
|
pr_warning("Could not create debugfs "
|
|
"'%s' directory\n", call->name);
|
|
return -1;
|
|
}
|
|
|
|
if (call->regfunc)
|
|
trace_create_file("enable", 0644, call->dir, call,
|
|
enable);
|
|
|
|
if (call->id && call->perf_event_enable)
|
|
trace_create_file("id", 0444, call->dir, call,
|
|
id);
|
|
|
|
if (call->define_fields) {
|
|
ret = trace_define_common_fields(call);
|
|
if (!ret)
|
|
ret = call->define_fields(call);
|
|
if (ret < 0) {
|
|
pr_warning("Could not initialize trace point"
|
|
" events/%s\n", call->name);
|
|
return ret;
|
|
}
|
|
trace_create_file("filter", 0644, call->dir, call,
|
|
filter);
|
|
}
|
|
|
|
trace_create_file("format", 0444, call->dir, call,
|
|
format);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int __trace_add_event_call(struct ftrace_event_call *call)
|
|
{
|
|
struct dentry *d_events;
|
|
int ret;
|
|
|
|
if (!call->name)
|
|
return -EINVAL;
|
|
|
|
if (call->raw_init) {
|
|
ret = call->raw_init(call);
|
|
if (ret < 0) {
|
|
if (ret != -ENOSYS)
|
|
pr_warning("Could not initialize trace "
|
|
"events/%s\n", call->name);
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
d_events = event_trace_events_dir();
|
|
if (!d_events)
|
|
return -ENOENT;
|
|
|
|
ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
|
|
&ftrace_enable_fops, &ftrace_event_filter_fops,
|
|
&ftrace_event_format_fops);
|
|
if (!ret)
|
|
list_add(&call->list, &ftrace_events);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Add an additional event_call dynamically */
|
|
int trace_add_event_call(struct ftrace_event_call *call)
|
|
{
|
|
int ret;
|
|
mutex_lock(&event_mutex);
|
|
ret = __trace_add_event_call(call);
|
|
mutex_unlock(&event_mutex);
|
|
return ret;
|
|
}
|
|
|
|
static void remove_subsystem_dir(const char *name)
|
|
{
|
|
struct event_subsystem *system;
|
|
|
|
if (strcmp(name, TRACE_SYSTEM) == 0)
|
|
return;
|
|
|
|
list_for_each_entry(system, &event_subsystems, list) {
|
|
if (strcmp(system->name, name) == 0) {
|
|
if (!--system->nr_events) {
|
|
struct event_filter *filter = system->filter;
|
|
|
|
debugfs_remove_recursive(system->entry);
|
|
list_del(&system->list);
|
|
if (filter) {
|
|
kfree(filter->filter_string);
|
|
kfree(filter);
|
|
}
|
|
kfree(system->name);
|
|
kfree(system);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Must be called under locking both of event_mutex and trace_event_mutex.
|
|
*/
|
|
static void __trace_remove_event_call(struct ftrace_event_call *call)
|
|
{
|
|
ftrace_event_enable_disable(call, 0);
|
|
if (call->event)
|
|
__unregister_ftrace_event(call->event);
|
|
debugfs_remove_recursive(call->dir);
|
|
list_del(&call->list);
|
|
trace_destroy_fields(call);
|
|
destroy_preds(call);
|
|
remove_subsystem_dir(call->system);
|
|
}
|
|
|
|
/* Remove an event_call */
|
|
void trace_remove_event_call(struct ftrace_event_call *call)
|
|
{
|
|
mutex_lock(&event_mutex);
|
|
down_write(&trace_event_mutex);
|
|
__trace_remove_event_call(call);
|
|
up_write(&trace_event_mutex);
|
|
mutex_unlock(&event_mutex);
|
|
}
|
|
|
|
#define for_each_event(event, start, end) \
|
|
for (event = start; \
|
|
(unsigned long)event < (unsigned long)end; \
|
|
event++)
|
|
|
|
#ifdef CONFIG_MODULES
|
|
|
|
static LIST_HEAD(ftrace_module_file_list);
|
|
|
|
/*
|
|
* Modules must own their file_operations to keep up with
|
|
* reference counting.
|
|
*/
|
|
struct ftrace_module_file_ops {
|
|
struct list_head list;
|
|
struct module *mod;
|
|
struct file_operations id;
|
|
struct file_operations enable;
|
|
struct file_operations format;
|
|
struct file_operations filter;
|
|
};
|
|
|
|
static struct ftrace_module_file_ops *
|
|
trace_create_file_ops(struct module *mod)
|
|
{
|
|
struct ftrace_module_file_ops *file_ops;
|
|
|
|
/*
|
|
* This is a bit of a PITA. To allow for correct reference
|
|
* counting, modules must "own" their file_operations.
|
|
* To do this, we allocate the file operations that will be
|
|
* used in the event directory.
|
|
*/
|
|
|
|
file_ops = kmalloc(sizeof(*file_ops), GFP_KERNEL);
|
|
if (!file_ops)
|
|
return NULL;
|
|
|
|
file_ops->mod = mod;
|
|
|
|
file_ops->id = ftrace_event_id_fops;
|
|
file_ops->id.owner = mod;
|
|
|
|
file_ops->enable = ftrace_enable_fops;
|
|
file_ops->enable.owner = mod;
|
|
|
|
file_ops->filter = ftrace_event_filter_fops;
|
|
file_ops->filter.owner = mod;
|
|
|
|
file_ops->format = ftrace_event_format_fops;
|
|
file_ops->format.owner = mod;
|
|
|
|
list_add(&file_ops->list, &ftrace_module_file_list);
|
|
|
|
return file_ops;
|
|
}
|
|
|
|
static void trace_module_add_events(struct module *mod)
|
|
{
|
|
struct ftrace_module_file_ops *file_ops = NULL;
|
|
struct ftrace_event_call *call, *start, *end;
|
|
struct dentry *d_events;
|
|
int ret;
|
|
|
|
start = mod->trace_events;
|
|
end = mod->trace_events + mod->num_trace_events;
|
|
|
|
if (start == end)
|
|
return;
|
|
|
|
d_events = event_trace_events_dir();
|
|
if (!d_events)
|
|
return;
|
|
|
|
for_each_event(call, start, end) {
|
|
/* The linker may leave blanks */
|
|
if (!call->name)
|
|
continue;
|
|
if (call->raw_init) {
|
|
ret = call->raw_init(call);
|
|
if (ret < 0) {
|
|
if (ret != -ENOSYS)
|
|
pr_warning("Could not initialize trace "
|
|
"point events/%s\n", call->name);
|
|
continue;
|
|
}
|
|
}
|
|
/*
|
|
* This module has events, create file ops for this module
|
|
* if not already done.
|
|
*/
|
|
if (!file_ops) {
|
|
file_ops = trace_create_file_ops(mod);
|
|
if (!file_ops)
|
|
return;
|
|
}
|
|
call->mod = mod;
|
|
ret = event_create_dir(call, d_events,
|
|
&file_ops->id, &file_ops->enable,
|
|
&file_ops->filter, &file_ops->format);
|
|
if (!ret)
|
|
list_add(&call->list, &ftrace_events);
|
|
}
|
|
}
|
|
|
|
static void trace_module_remove_events(struct module *mod)
|
|
{
|
|
struct ftrace_module_file_ops *file_ops;
|
|
struct ftrace_event_call *call, *p;
|
|
bool found = false;
|
|
|
|
down_write(&trace_event_mutex);
|
|
list_for_each_entry_safe(call, p, &ftrace_events, list) {
|
|
if (call->mod == mod) {
|
|
found = true;
|
|
__trace_remove_event_call(call);
|
|
}
|
|
}
|
|
|
|
/* Now free the file_operations */
|
|
list_for_each_entry(file_ops, &ftrace_module_file_list, list) {
|
|
if (file_ops->mod == mod)
|
|
break;
|
|
}
|
|
if (&file_ops->list != &ftrace_module_file_list) {
|
|
list_del(&file_ops->list);
|
|
kfree(file_ops);
|
|
}
|
|
|
|
/*
|
|
* It is safest to reset the ring buffer if the module being unloaded
|
|
* registered any events.
|
|
*/
|
|
if (found)
|
|
tracing_reset_current_online_cpus();
|
|
up_write(&trace_event_mutex);
|
|
}
|
|
|
|
static int trace_module_notify(struct notifier_block *self,
|
|
unsigned long val, void *data)
|
|
{
|
|
struct module *mod = data;
|
|
|
|
mutex_lock(&event_mutex);
|
|
switch (val) {
|
|
case MODULE_STATE_COMING:
|
|
trace_module_add_events(mod);
|
|
break;
|
|
case MODULE_STATE_GOING:
|
|
trace_module_remove_events(mod);
|
|
break;
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
static int trace_module_notify(struct notifier_block *self,
|
|
unsigned long val, void *data)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_MODULES */
|
|
|
|
static struct notifier_block trace_module_nb = {
|
|
.notifier_call = trace_module_notify,
|
|
.priority = 0,
|
|
};
|
|
|
|
extern struct ftrace_event_call __start_ftrace_events[];
|
|
extern struct ftrace_event_call __stop_ftrace_events[];
|
|
|
|
static char bootup_event_buf[COMMAND_LINE_SIZE] __initdata;
|
|
|
|
static __init int setup_trace_event(char *str)
|
|
{
|
|
strlcpy(bootup_event_buf, str, COMMAND_LINE_SIZE);
|
|
ring_buffer_expanded = 1;
|
|
tracing_selftest_disabled = 1;
|
|
|
|
return 1;
|
|
}
|
|
__setup("trace_event=", setup_trace_event);
|
|
|
|
static __init int event_trace_init(void)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
struct dentry *d_tracer;
|
|
struct dentry *entry;
|
|
struct dentry *d_events;
|
|
int ret;
|
|
char *buf = bootup_event_buf;
|
|
char *token;
|
|
|
|
d_tracer = tracing_init_dentry();
|
|
if (!d_tracer)
|
|
return 0;
|
|
|
|
entry = debugfs_create_file("available_events", 0444, d_tracer,
|
|
(void *)&show_event_seq_ops,
|
|
&ftrace_avail_fops);
|
|
if (!entry)
|
|
pr_warning("Could not create debugfs "
|
|
"'available_events' entry\n");
|
|
|
|
entry = debugfs_create_file("set_event", 0644, d_tracer,
|
|
(void *)&show_set_event_seq_ops,
|
|
&ftrace_set_event_fops);
|
|
if (!entry)
|
|
pr_warning("Could not create debugfs "
|
|
"'set_event' entry\n");
|
|
|
|
d_events = event_trace_events_dir();
|
|
if (!d_events)
|
|
return 0;
|
|
|
|
/* ring buffer internal formats */
|
|
trace_create_file("header_page", 0444, d_events,
|
|
ring_buffer_print_page_header,
|
|
&ftrace_show_header_fops);
|
|
|
|
trace_create_file("header_event", 0444, d_events,
|
|
ring_buffer_print_entry_header,
|
|
&ftrace_show_header_fops);
|
|
|
|
trace_create_file("enable", 0644, d_events,
|
|
NULL, &ftrace_system_enable_fops);
|
|
|
|
for_each_event(call, __start_ftrace_events, __stop_ftrace_events) {
|
|
/* The linker may leave blanks */
|
|
if (!call->name)
|
|
continue;
|
|
if (call->raw_init) {
|
|
ret = call->raw_init(call);
|
|
if (ret < 0) {
|
|
if (ret != -ENOSYS)
|
|
pr_warning("Could not initialize trace "
|
|
"point events/%s\n", call->name);
|
|
continue;
|
|
}
|
|
}
|
|
ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
|
|
&ftrace_enable_fops,
|
|
&ftrace_event_filter_fops,
|
|
&ftrace_event_format_fops);
|
|
if (!ret)
|
|
list_add(&call->list, &ftrace_events);
|
|
}
|
|
|
|
while (true) {
|
|
token = strsep(&buf, ",");
|
|
|
|
if (!token)
|
|
break;
|
|
if (!*token)
|
|
continue;
|
|
|
|
ret = ftrace_set_clr_event(token, 1);
|
|
if (ret)
|
|
pr_warning("Failed to enable trace event: %s\n", token);
|
|
}
|
|
|
|
ret = register_module_notifier(&trace_module_nb);
|
|
if (ret)
|
|
pr_warning("Failed to register trace events module notifier\n");
|
|
|
|
return 0;
|
|
}
|
|
fs_initcall(event_trace_init);
|
|
|
|
#ifdef CONFIG_FTRACE_STARTUP_TEST
|
|
|
|
static DEFINE_SPINLOCK(test_spinlock);
|
|
static DEFINE_SPINLOCK(test_spinlock_irq);
|
|
static DEFINE_MUTEX(test_mutex);
|
|
|
|
static __init void test_work(struct work_struct *dummy)
|
|
{
|
|
spin_lock(&test_spinlock);
|
|
spin_lock_irq(&test_spinlock_irq);
|
|
udelay(1);
|
|
spin_unlock_irq(&test_spinlock_irq);
|
|
spin_unlock(&test_spinlock);
|
|
|
|
mutex_lock(&test_mutex);
|
|
msleep(1);
|
|
mutex_unlock(&test_mutex);
|
|
}
|
|
|
|
static __init int event_test_thread(void *unused)
|
|
{
|
|
void *test_malloc;
|
|
|
|
test_malloc = kmalloc(1234, GFP_KERNEL);
|
|
if (!test_malloc)
|
|
pr_info("failed to kmalloc\n");
|
|
|
|
schedule_on_each_cpu(test_work);
|
|
|
|
kfree(test_malloc);
|
|
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
|
while (!kthread_should_stop())
|
|
schedule();
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Do various things that may trigger events.
|
|
*/
|
|
static __init void event_test_stuff(void)
|
|
{
|
|
struct task_struct *test_thread;
|
|
|
|
test_thread = kthread_run(event_test_thread, NULL, "test-events");
|
|
msleep(1);
|
|
kthread_stop(test_thread);
|
|
}
|
|
|
|
/*
|
|
* For every trace event defined, we will test each trace point separately,
|
|
* and then by groups, and finally all trace points.
|
|
*/
|
|
static __init void event_trace_self_tests(void)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
struct event_subsystem *system;
|
|
int ret;
|
|
|
|
pr_info("Running tests on trace events:\n");
|
|
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
|
|
/* Only test those that have a regfunc */
|
|
if (!call->regfunc)
|
|
continue;
|
|
|
|
/*
|
|
* Testing syscall events here is pretty useless, but
|
|
* we still do it if configured. But this is time consuming.
|
|
* What we really need is a user thread to perform the
|
|
* syscalls as we test.
|
|
*/
|
|
#ifndef CONFIG_EVENT_TRACE_TEST_SYSCALLS
|
|
if (call->system &&
|
|
strcmp(call->system, "syscalls") == 0)
|
|
continue;
|
|
#endif
|
|
|
|
pr_info("Testing event %s: ", call->name);
|
|
|
|
/*
|
|
* If an event is already enabled, someone is using
|
|
* it and the self test should not be on.
|
|
*/
|
|
if (call->enabled) {
|
|
pr_warning("Enabled event during self test!\n");
|
|
WARN_ON_ONCE(1);
|
|
continue;
|
|
}
|
|
|
|
ftrace_event_enable_disable(call, 1);
|
|
event_test_stuff();
|
|
ftrace_event_enable_disable(call, 0);
|
|
|
|
pr_cont("OK\n");
|
|
}
|
|
|
|
/* Now test at the sub system level */
|
|
|
|
pr_info("Running tests on trace event systems:\n");
|
|
|
|
list_for_each_entry(system, &event_subsystems, list) {
|
|
|
|
/* the ftrace system is special, skip it */
|
|
if (strcmp(system->name, "ftrace") == 0)
|
|
continue;
|
|
|
|
pr_info("Testing event system %s: ", system->name);
|
|
|
|
ret = __ftrace_set_clr_event(NULL, system->name, NULL, 1);
|
|
if (WARN_ON_ONCE(ret)) {
|
|
pr_warning("error enabling system %s\n",
|
|
system->name);
|
|
continue;
|
|
}
|
|
|
|
event_test_stuff();
|
|
|
|
ret = __ftrace_set_clr_event(NULL, system->name, NULL, 0);
|
|
if (WARN_ON_ONCE(ret))
|
|
pr_warning("error disabling system %s\n",
|
|
system->name);
|
|
|
|
pr_cont("OK\n");
|
|
}
|
|
|
|
/* Test with all events enabled */
|
|
|
|
pr_info("Running tests on all trace events:\n");
|
|
pr_info("Testing all events: ");
|
|
|
|
ret = __ftrace_set_clr_event(NULL, NULL, NULL, 1);
|
|
if (WARN_ON_ONCE(ret)) {
|
|
pr_warning("error enabling all events\n");
|
|
return;
|
|
}
|
|
|
|
event_test_stuff();
|
|
|
|
/* reset sysname */
|
|
ret = __ftrace_set_clr_event(NULL, NULL, NULL, 0);
|
|
if (WARN_ON_ONCE(ret)) {
|
|
pr_warning("error disabling all events\n");
|
|
return;
|
|
}
|
|
|
|
pr_cont("OK\n");
|
|
}
|
|
|
|
#ifdef CONFIG_FUNCTION_TRACER
|
|
|
|
static DEFINE_PER_CPU(atomic_t, ftrace_test_event_disable);
|
|
|
|
static void
|
|
function_test_events_call(unsigned long ip, unsigned long parent_ip)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer *buffer;
|
|
struct ftrace_entry *entry;
|
|
unsigned long flags;
|
|
long disabled;
|
|
int resched;
|
|
int cpu;
|
|
int pc;
|
|
|
|
pc = preempt_count();
|
|
resched = ftrace_preempt_disable();
|
|
cpu = raw_smp_processor_id();
|
|
disabled = atomic_inc_return(&per_cpu(ftrace_test_event_disable, cpu));
|
|
|
|
if (disabled != 1)
|
|
goto out;
|
|
|
|
local_save_flags(flags);
|
|
|
|
event = trace_current_buffer_lock_reserve(&buffer,
|
|
TRACE_FN, sizeof(*entry),
|
|
flags, pc);
|
|
if (!event)
|
|
goto out;
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
entry->parent_ip = parent_ip;
|
|
|
|
trace_nowake_buffer_unlock_commit(buffer, event, flags, pc);
|
|
|
|
out:
|
|
atomic_dec(&per_cpu(ftrace_test_event_disable, cpu));
|
|
ftrace_preempt_enable(resched);
|
|
}
|
|
|
|
static struct ftrace_ops trace_ops __initdata =
|
|
{
|
|
.func = function_test_events_call,
|
|
};
|
|
|
|
static __init void event_trace_self_test_with_function(void)
|
|
{
|
|
register_ftrace_function(&trace_ops);
|
|
pr_info("Running tests again, along with the function tracer\n");
|
|
event_trace_self_tests();
|
|
unregister_ftrace_function(&trace_ops);
|
|
}
|
|
#else
|
|
static __init void event_trace_self_test_with_function(void)
|
|
{
|
|
}
|
|
#endif
|
|
|
|
static __init int event_trace_self_tests_init(void)
|
|
{
|
|
if (!tracing_selftest_disabled) {
|
|
event_trace_self_tests();
|
|
event_trace_self_test_with_function();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
late_initcall(event_trace_self_tests_init);
|
|
|
|
#endif
|