powerpc/pmac: Add missing unlocks in error path
[linux-2.6/next.git] / kernel / trace / trace_events.c
blobc697c70433494d6e41e51656a767c9f575cdccba
1 /*
2 * event tracer
4 * Copyright (C) 2008 Red Hat Inc, Steven Rostedt <srostedt@redhat.com>
6 * - Added format output of fields of the trace point.
7 * This was based off of work by Tom Zanussi <tzanussi@gmail.com>.
9 */
11 #include <linux/workqueue.h>
12 #include <linux/spinlock.h>
13 #include <linux/kthread.h>
14 #include <linux/debugfs.h>
15 #include <linux/uaccess.h>
16 #include <linux/module.h>
17 #include <linux/ctype.h>
18 #include <linux/slab.h>
19 #include <linux/delay.h>
21 #include <asm/setup.h>
23 #include "trace_output.h"
25 #undef TRACE_SYSTEM
26 #define TRACE_SYSTEM "TRACE_SYSTEM"
28 DEFINE_MUTEX(event_mutex);
30 LIST_HEAD(ftrace_events);
32 int trace_define_field(struct ftrace_event_call *call, const char *type,
33 const char *name, int offset, int size, int is_signed,
34 int filter_type)
36 struct ftrace_event_field *field;
38 field = kzalloc(sizeof(*field), GFP_KERNEL);
39 if (!field)
40 goto err;
42 field->name = kstrdup(name, GFP_KERNEL);
43 if (!field->name)
44 goto err;
46 field->type = kstrdup(type, GFP_KERNEL);
47 if (!field->type)
48 goto err;
50 if (filter_type == FILTER_OTHER)
51 field->filter_type = filter_assign_type(type);
52 else
53 field->filter_type = filter_type;
55 field->offset = offset;
56 field->size = size;
57 field->is_signed = is_signed;
59 list_add(&field->link, &call->fields);
61 return 0;
63 err:
64 if (field)
65 kfree(field->name);
66 kfree(field);
68 return -ENOMEM;
70 EXPORT_SYMBOL_GPL(trace_define_field);
72 #define __common_field(type, item) \
73 ret = trace_define_field(call, #type, "common_" #item, \
74 offsetof(typeof(ent), item), \
75 sizeof(ent.item), \
76 is_signed_type(type), FILTER_OTHER); \
77 if (ret) \
78 return ret;
80 static int trace_define_common_fields(struct ftrace_event_call *call)
82 int ret;
83 struct trace_entry ent;
85 __common_field(unsigned short, type);
86 __common_field(unsigned char, flags);
87 __common_field(unsigned char, preempt_count);
88 __common_field(int, pid);
89 __common_field(int, lock_depth);
91 return ret;
94 void trace_destroy_fields(struct ftrace_event_call *call)
96 struct ftrace_event_field *field, *next;
98 list_for_each_entry_safe(field, next, &call->fields, link) {
99 list_del(&field->link);
100 kfree(field->type);
101 kfree(field->name);
102 kfree(field);
106 int trace_event_raw_init(struct ftrace_event_call *call)
108 int id;
110 id = register_ftrace_event(call->event);
111 if (!id)
112 return -ENODEV;
113 call->id = id;
114 INIT_LIST_HEAD(&call->fields);
116 return 0;
118 EXPORT_SYMBOL_GPL(trace_event_raw_init);
120 static int ftrace_event_enable_disable(struct ftrace_event_call *call,
121 int enable)
123 int ret = 0;
125 switch (enable) {
126 case 0:
127 if (call->enabled) {
128 call->enabled = 0;
129 tracing_stop_cmdline_record();
130 call->unregfunc(call);
132 break;
133 case 1:
134 if (!call->enabled) {
135 tracing_start_cmdline_record();
136 ret = call->regfunc(call);
137 if (ret) {
138 tracing_stop_cmdline_record();
139 pr_info("event trace: Could not enable event "
140 "%s\n", call->name);
141 break;
143 call->enabled = 1;
145 break;
148 return ret;
151 static void ftrace_clear_events(void)
153 struct ftrace_event_call *call;
155 mutex_lock(&event_mutex);
156 list_for_each_entry(call, &ftrace_events, list) {
157 ftrace_event_enable_disable(call, 0);
159 mutex_unlock(&event_mutex);
163 * __ftrace_set_clr_event(NULL, NULL, NULL, set) will set/unset all events.
165 static int __ftrace_set_clr_event(const char *match, const char *sub,
166 const char *event, int set)
168 struct ftrace_event_call *call;
169 int ret = -EINVAL;
171 mutex_lock(&event_mutex);
172 list_for_each_entry(call, &ftrace_events, list) {
174 if (!call->name || !call->regfunc)
175 continue;
177 if (match &&
178 strcmp(match, call->name) != 0 &&
179 strcmp(match, call->system) != 0)
180 continue;
182 if (sub && strcmp(sub, call->system) != 0)
183 continue;
185 if (event && strcmp(event, call->name) != 0)
186 continue;
188 ftrace_event_enable_disable(call, set);
190 ret = 0;
192 mutex_unlock(&event_mutex);
194 return ret;
197 static int ftrace_set_clr_event(char *buf, int set)
199 char *event = NULL, *sub = NULL, *match;
202 * The buf format can be <subsystem>:<event-name>
203 * *:<event-name> means any event by that name.
204 * :<event-name> is the same.
206 * <subsystem>:* means all events in that subsystem
207 * <subsystem>: means the same.
209 * <name> (no ':') means all events in a subsystem with
210 * the name <name> or any event that matches <name>
213 match = strsep(&buf, ":");
214 if (buf) {
215 sub = match;
216 event = buf;
217 match = NULL;
219 if (!strlen(sub) || strcmp(sub, "*") == 0)
220 sub = NULL;
221 if (!strlen(event) || strcmp(event, "*") == 0)
222 event = NULL;
225 return __ftrace_set_clr_event(match, sub, event, set);
229 * trace_set_clr_event - enable or disable an event
230 * @system: system name to match (NULL for any system)
231 * @event: event name to match (NULL for all events, within system)
232 * @set: 1 to enable, 0 to disable
234 * This is a way for other parts of the kernel to enable or disable
235 * event recording.
237 * Returns 0 on success, -EINVAL if the parameters do not match any
238 * registered events.
240 int trace_set_clr_event(const char *system, const char *event, int set)
242 return __ftrace_set_clr_event(NULL, system, event, set);
245 /* 128 should be much more than enough */
246 #define EVENT_BUF_SIZE 127
248 static ssize_t
249 ftrace_event_write(struct file *file, const char __user *ubuf,
250 size_t cnt, loff_t *ppos)
252 struct trace_parser parser;
253 ssize_t read, ret;
255 if (!cnt)
256 return 0;
258 ret = tracing_update_buffers();
259 if (ret < 0)
260 return ret;
262 if (trace_parser_get_init(&parser, EVENT_BUF_SIZE + 1))
263 return -ENOMEM;
265 read = trace_get_user(&parser, ubuf, cnt, ppos);
267 if (read >= 0 && trace_parser_loaded((&parser))) {
268 int set = 1;
270 if (*parser.buffer == '!')
271 set = 0;
273 parser.buffer[parser.idx] = 0;
275 ret = ftrace_set_clr_event(parser.buffer + !set, set);
276 if (ret)
277 goto out_put;
280 ret = read;
282 out_put:
283 trace_parser_put(&parser);
285 return ret;
288 static void *
289 t_next(struct seq_file *m, void *v, loff_t *pos)
291 struct ftrace_event_call *call = v;
293 (*pos)++;
295 list_for_each_entry_continue(call, &ftrace_events, list) {
297 * The ftrace subsystem is for showing formats only.
298 * They can not be enabled or disabled via the event files.
300 if (call->regfunc)
301 return call;
304 return NULL;
307 static void *t_start(struct seq_file *m, loff_t *pos)
309 struct ftrace_event_call *call;
310 loff_t l;
312 mutex_lock(&event_mutex);
314 call = list_entry(&ftrace_events, struct ftrace_event_call, list);
315 for (l = 0; l <= *pos; ) {
316 call = t_next(m, call, &l);
317 if (!call)
318 break;
320 return call;
323 static void *
324 s_next(struct seq_file *m, void *v, loff_t *pos)
326 struct ftrace_event_call *call = v;
328 (*pos)++;
330 list_for_each_entry_continue(call, &ftrace_events, list) {
331 if (call->enabled)
332 return call;
335 return NULL;
338 static void *s_start(struct seq_file *m, loff_t *pos)
340 struct ftrace_event_call *call;
341 loff_t l;
343 mutex_lock(&event_mutex);
345 call = list_entry(&ftrace_events, struct ftrace_event_call, list);
346 for (l = 0; l <= *pos; ) {
347 call = s_next(m, call, &l);
348 if (!call)
349 break;
351 return call;
354 static int t_show(struct seq_file *m, void *v)
356 struct ftrace_event_call *call = v;
358 if (strcmp(call->system, TRACE_SYSTEM) != 0)
359 seq_printf(m, "%s:", call->system);
360 seq_printf(m, "%s\n", call->name);
362 return 0;
365 static void t_stop(struct seq_file *m, void *p)
367 mutex_unlock(&event_mutex);
370 static int
371 ftrace_event_seq_open(struct inode *inode, struct file *file)
373 const struct seq_operations *seq_ops;
375 if ((file->f_mode & FMODE_WRITE) &&
376 (file->f_flags & O_TRUNC))
377 ftrace_clear_events();
379 seq_ops = inode->i_private;
380 return seq_open(file, seq_ops);
383 static ssize_t
384 event_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
385 loff_t *ppos)
387 struct ftrace_event_call *call = filp->private_data;
388 char *buf;
390 if (call->enabled)
391 buf = "1\n";
392 else
393 buf = "0\n";
395 return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
398 static ssize_t
399 event_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
400 loff_t *ppos)
402 struct ftrace_event_call *call = filp->private_data;
403 char buf[64];
404 unsigned long val;
405 int ret;
407 if (cnt >= sizeof(buf))
408 return -EINVAL;
410 if (copy_from_user(&buf, ubuf, cnt))
411 return -EFAULT;
413 buf[cnt] = 0;
415 ret = strict_strtoul(buf, 10, &val);
416 if (ret < 0)
417 return ret;
419 ret = tracing_update_buffers();
420 if (ret < 0)
421 return ret;
423 switch (val) {
424 case 0:
425 case 1:
426 mutex_lock(&event_mutex);
427 ret = ftrace_event_enable_disable(call, val);
428 mutex_unlock(&event_mutex);
429 break;
431 default:
432 return -EINVAL;
435 *ppos += cnt;
437 return ret ? ret : cnt;
440 static ssize_t
441 system_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
442 loff_t *ppos)
444 const char set_to_char[4] = { '?', '0', '1', 'X' };
445 const char *system = filp->private_data;
446 struct ftrace_event_call *call;
447 char buf[2];
448 int set = 0;
449 int ret;
451 mutex_lock(&event_mutex);
452 list_for_each_entry(call, &ftrace_events, list) {
453 if (!call->name || !call->regfunc)
454 continue;
456 if (system && strcmp(call->system, system) != 0)
457 continue;
460 * We need to find out if all the events are set
461 * or if all events or cleared, or if we have
462 * a mixture.
464 set |= (1 << !!call->enabled);
467 * If we have a mixture, no need to look further.
469 if (set == 3)
470 break;
472 mutex_unlock(&event_mutex);
474 buf[0] = set_to_char[set];
475 buf[1] = '\n';
477 ret = simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
479 return ret;
482 static ssize_t
483 system_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
484 loff_t *ppos)
486 const char *system = filp->private_data;
487 unsigned long val;
488 char buf[64];
489 ssize_t ret;
491 if (cnt >= sizeof(buf))
492 return -EINVAL;
494 if (copy_from_user(&buf, ubuf, cnt))
495 return -EFAULT;
497 buf[cnt] = 0;
499 ret = strict_strtoul(buf, 10, &val);
500 if (ret < 0)
501 return ret;
503 ret = tracing_update_buffers();
504 if (ret < 0)
505 return ret;
507 if (val != 0 && val != 1)
508 return -EINVAL;
510 ret = __ftrace_set_clr_event(NULL, system, NULL, val);
511 if (ret)
512 goto out;
514 ret = cnt;
516 out:
517 *ppos += cnt;
519 return ret;
522 static ssize_t
523 event_format_read(struct file *filp, char __user *ubuf, size_t cnt,
524 loff_t *ppos)
526 struct ftrace_event_call *call = filp->private_data;
527 struct ftrace_event_field *field;
528 struct trace_seq *s;
529 int common_field_count = 5;
530 char *buf;
531 int r = 0;
533 if (*ppos)
534 return 0;
536 s = kmalloc(sizeof(*s), GFP_KERNEL);
537 if (!s)
538 return -ENOMEM;
540 trace_seq_init(s);
542 trace_seq_printf(s, "name: %s\n", call->name);
543 trace_seq_printf(s, "ID: %d\n", call->id);
544 trace_seq_printf(s, "format:\n");
546 list_for_each_entry_reverse(field, &call->fields, link) {
548 * Smartly shows the array type(except dynamic array).
549 * Normal:
550 * field:TYPE VAR
551 * If TYPE := TYPE[LEN], it is shown:
552 * field:TYPE VAR[LEN]
554 const char *array_descriptor = strchr(field->type, '[');
556 if (!strncmp(field->type, "__data_loc", 10))
557 array_descriptor = NULL;
559 if (!array_descriptor) {
560 r = trace_seq_printf(s, "\tfield:%s %s;\toffset:%u;"
561 "\tsize:%u;\tsigned:%d;\n",
562 field->type, field->name, field->offset,
563 field->size, !!field->is_signed);
564 } else {
565 r = trace_seq_printf(s, "\tfield:%.*s %s%s;\toffset:%u;"
566 "\tsize:%u;\tsigned:%d;\n",
567 (int)(array_descriptor - field->type),
568 field->type, field->name,
569 array_descriptor, field->offset,
570 field->size, !!field->is_signed);
573 if (--common_field_count == 0)
574 r = trace_seq_printf(s, "\n");
576 if (!r)
577 break;
580 if (r)
581 r = trace_seq_printf(s, "\nprint fmt: %s\n",
582 call->print_fmt);
584 if (!r) {
586 * ug! The format output is bigger than a PAGE!!
588 buf = "FORMAT TOO BIG\n";
589 r = simple_read_from_buffer(ubuf, cnt, ppos,
590 buf, strlen(buf));
591 goto out;
594 r = simple_read_from_buffer(ubuf, cnt, ppos,
595 s->buffer, s->len);
596 out:
597 kfree(s);
598 return r;
601 static ssize_t
602 event_id_read(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
604 struct ftrace_event_call *call = filp->private_data;
605 struct trace_seq *s;
606 int r;
608 if (*ppos)
609 return 0;
611 s = kmalloc(sizeof(*s), GFP_KERNEL);
612 if (!s)
613 return -ENOMEM;
615 trace_seq_init(s);
616 trace_seq_printf(s, "%d\n", call->id);
618 r = simple_read_from_buffer(ubuf, cnt, ppos,
619 s->buffer, s->len);
620 kfree(s);
621 return r;
624 static ssize_t
625 event_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
626 loff_t *ppos)
628 struct ftrace_event_call *call = filp->private_data;
629 struct trace_seq *s;
630 int r;
632 if (*ppos)
633 return 0;
635 s = kmalloc(sizeof(*s), GFP_KERNEL);
636 if (!s)
637 return -ENOMEM;
639 trace_seq_init(s);
641 print_event_filter(call, s);
642 r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
644 kfree(s);
646 return r;
649 static ssize_t
650 event_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
651 loff_t *ppos)
653 struct ftrace_event_call *call = filp->private_data;
654 char *buf;
655 int err;
657 if (cnt >= PAGE_SIZE)
658 return -EINVAL;
660 buf = (char *)__get_free_page(GFP_TEMPORARY);
661 if (!buf)
662 return -ENOMEM;
664 if (copy_from_user(buf, ubuf, cnt)) {
665 free_page((unsigned long) buf);
666 return -EFAULT;
668 buf[cnt] = '\0';
670 err = apply_event_filter(call, buf);
671 free_page((unsigned long) buf);
672 if (err < 0)
673 return err;
675 *ppos += cnt;
677 return cnt;
680 static ssize_t
681 subsystem_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
682 loff_t *ppos)
684 struct event_subsystem *system = filp->private_data;
685 struct trace_seq *s;
686 int r;
688 if (*ppos)
689 return 0;
691 s = kmalloc(sizeof(*s), GFP_KERNEL);
692 if (!s)
693 return -ENOMEM;
695 trace_seq_init(s);
697 print_subsystem_event_filter(system, s);
698 r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
700 kfree(s);
702 return r;
705 static ssize_t
706 subsystem_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
707 loff_t *ppos)
709 struct event_subsystem *system = filp->private_data;
710 char *buf;
711 int err;
713 if (cnt >= PAGE_SIZE)
714 return -EINVAL;
716 buf = (char *)__get_free_page(GFP_TEMPORARY);
717 if (!buf)
718 return -ENOMEM;
720 if (copy_from_user(buf, ubuf, cnt)) {
721 free_page((unsigned long) buf);
722 return -EFAULT;
724 buf[cnt] = '\0';
726 err = apply_subsystem_event_filter(system, buf);
727 free_page((unsigned long) buf);
728 if (err < 0)
729 return err;
731 *ppos += cnt;
733 return cnt;
736 static ssize_t
737 show_header(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
739 int (*func)(struct trace_seq *s) = filp->private_data;
740 struct trace_seq *s;
741 int r;
743 if (*ppos)
744 return 0;
746 s = kmalloc(sizeof(*s), GFP_KERNEL);
747 if (!s)
748 return -ENOMEM;
750 trace_seq_init(s);
752 func(s);
753 r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
755 kfree(s);
757 return r;
760 static const struct seq_operations show_event_seq_ops = {
761 .start = t_start,
762 .next = t_next,
763 .show = t_show,
764 .stop = t_stop,
767 static const struct seq_operations show_set_event_seq_ops = {
768 .start = s_start,
769 .next = s_next,
770 .show = t_show,
771 .stop = t_stop,
774 static const struct file_operations ftrace_avail_fops = {
775 .open = ftrace_event_seq_open,
776 .read = seq_read,
777 .llseek = seq_lseek,
778 .release = seq_release,
781 static const struct file_operations ftrace_set_event_fops = {
782 .open = ftrace_event_seq_open,
783 .read = seq_read,
784 .write = ftrace_event_write,
785 .llseek = seq_lseek,
786 .release = seq_release,
789 static const struct file_operations ftrace_enable_fops = {
790 .open = tracing_open_generic,
791 .read = event_enable_read,
792 .write = event_enable_write,
795 static const struct file_operations ftrace_event_format_fops = {
796 .open = tracing_open_generic,
797 .read = event_format_read,
800 static const struct file_operations ftrace_event_id_fops = {
801 .open = tracing_open_generic,
802 .read = event_id_read,
805 static const struct file_operations ftrace_event_filter_fops = {
806 .open = tracing_open_generic,
807 .read = event_filter_read,
808 .write = event_filter_write,
811 static const struct file_operations ftrace_subsystem_filter_fops = {
812 .open = tracing_open_generic,
813 .read = subsystem_filter_read,
814 .write = subsystem_filter_write,
817 static const struct file_operations ftrace_system_enable_fops = {
818 .open = tracing_open_generic,
819 .read = system_enable_read,
820 .write = system_enable_write,
823 static const struct file_operations ftrace_show_header_fops = {
824 .open = tracing_open_generic,
825 .read = show_header,
828 static struct dentry *event_trace_events_dir(void)
830 static struct dentry *d_tracer;
831 static struct dentry *d_events;
833 if (d_events)
834 return d_events;
836 d_tracer = tracing_init_dentry();
837 if (!d_tracer)
838 return NULL;
840 d_events = debugfs_create_dir("events", d_tracer);
841 if (!d_events)
842 pr_warning("Could not create debugfs "
843 "'events' directory\n");
845 return d_events;
848 static LIST_HEAD(event_subsystems);
850 static struct dentry *
851 event_subsystem_dir(const char *name, struct dentry *d_events)
853 struct event_subsystem *system;
854 struct dentry *entry;
856 /* First see if we did not already create this dir */
857 list_for_each_entry(system, &event_subsystems, list) {
858 if (strcmp(system->name, name) == 0) {
859 system->nr_events++;
860 return system->entry;
864 /* need to create new entry */
865 system = kmalloc(sizeof(*system), GFP_KERNEL);
866 if (!system) {
867 pr_warning("No memory to create event subsystem %s\n",
868 name);
869 return d_events;
872 system->entry = debugfs_create_dir(name, d_events);
873 if (!system->entry) {
874 pr_warning("Could not create event subsystem %s\n",
875 name);
876 kfree(system);
877 return d_events;
880 system->nr_events = 1;
881 system->name = kstrdup(name, GFP_KERNEL);
882 if (!system->name) {
883 debugfs_remove(system->entry);
884 kfree(system);
885 return d_events;
888 list_add(&system->list, &event_subsystems);
890 system->filter = NULL;
892 system->filter = kzalloc(sizeof(struct event_filter), GFP_KERNEL);
893 if (!system->filter) {
894 pr_warning("Could not allocate filter for subsystem "
895 "'%s'\n", name);
896 return system->entry;
899 entry = debugfs_create_file("filter", 0644, system->entry, system,
900 &ftrace_subsystem_filter_fops);
901 if (!entry) {
902 kfree(system->filter);
903 system->filter = NULL;
904 pr_warning("Could not create debugfs "
905 "'%s/filter' entry\n", name);
908 trace_create_file("enable", 0644, system->entry,
909 (void *)system->name,
910 &ftrace_system_enable_fops);
912 return system->entry;
915 static int
916 event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
917 const struct file_operations *id,
918 const struct file_operations *enable,
919 const struct file_operations *filter,
920 const struct file_operations *format)
922 int ret;
925 * If the trace point header did not define TRACE_SYSTEM
926 * then the system would be called "TRACE_SYSTEM".
928 if (strcmp(call->system, TRACE_SYSTEM) != 0)
929 d_events = event_subsystem_dir(call->system, d_events);
931 call->dir = debugfs_create_dir(call->name, d_events);
932 if (!call->dir) {
933 pr_warning("Could not create debugfs "
934 "'%s' directory\n", call->name);
935 return -1;
938 if (call->regfunc)
939 trace_create_file("enable", 0644, call->dir, call,
940 enable);
942 if (call->id && call->perf_event_enable)
943 trace_create_file("id", 0444, call->dir, call,
944 id);
946 if (call->define_fields) {
947 ret = trace_define_common_fields(call);
948 if (!ret)
949 ret = call->define_fields(call);
950 if (ret < 0) {
951 pr_warning("Could not initialize trace point"
952 " events/%s\n", call->name);
953 return ret;
955 trace_create_file("filter", 0644, call->dir, call,
956 filter);
959 trace_create_file("format", 0444, call->dir, call,
960 format);
962 return 0;
965 static int __trace_add_event_call(struct ftrace_event_call *call)
967 struct dentry *d_events;
968 int ret;
970 if (!call->name)
971 return -EINVAL;
973 if (call->raw_init) {
974 ret = call->raw_init(call);
975 if (ret < 0) {
976 if (ret != -ENOSYS)
977 pr_warning("Could not initialize trace "
978 "events/%s\n", call->name);
979 return ret;
983 d_events = event_trace_events_dir();
984 if (!d_events)
985 return -ENOENT;
987 ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
988 &ftrace_enable_fops, &ftrace_event_filter_fops,
989 &ftrace_event_format_fops);
990 if (!ret)
991 list_add(&call->list, &ftrace_events);
993 return ret;
996 /* Add an additional event_call dynamically */
997 int trace_add_event_call(struct ftrace_event_call *call)
999 int ret;
1000 mutex_lock(&event_mutex);
1001 ret = __trace_add_event_call(call);
1002 mutex_unlock(&event_mutex);
1003 return ret;
1006 static void remove_subsystem_dir(const char *name)
1008 struct event_subsystem *system;
1010 if (strcmp(name, TRACE_SYSTEM) == 0)
1011 return;
1013 list_for_each_entry(system, &event_subsystems, list) {
1014 if (strcmp(system->name, name) == 0) {
1015 if (!--system->nr_events) {
1016 struct event_filter *filter = system->filter;
1018 debugfs_remove_recursive(system->entry);
1019 list_del(&system->list);
1020 if (filter) {
1021 kfree(filter->filter_string);
1022 kfree(filter);
1024 kfree(system->name);
1025 kfree(system);
1027 break;
1033 * Must be called under locking both of event_mutex and trace_event_mutex.
1035 static void __trace_remove_event_call(struct ftrace_event_call *call)
1037 ftrace_event_enable_disable(call, 0);
1038 if (call->event)
1039 __unregister_ftrace_event(call->event);
1040 debugfs_remove_recursive(call->dir);
1041 list_del(&call->list);
1042 trace_destroy_fields(call);
1043 destroy_preds(call);
1044 remove_subsystem_dir(call->system);
1047 /* Remove an event_call */
1048 void trace_remove_event_call(struct ftrace_event_call *call)
1050 mutex_lock(&event_mutex);
1051 down_write(&trace_event_mutex);
1052 __trace_remove_event_call(call);
1053 up_write(&trace_event_mutex);
1054 mutex_unlock(&event_mutex);
1057 #define for_each_event(event, start, end) \
1058 for (event = start; \
1059 (unsigned long)event < (unsigned long)end; \
1060 event++)
1062 #ifdef CONFIG_MODULES
1064 static LIST_HEAD(ftrace_module_file_list);
1067 * Modules must own their file_operations to keep up with
1068 * reference counting.
1070 struct ftrace_module_file_ops {
1071 struct list_head list;
1072 struct module *mod;
1073 struct file_operations id;
1074 struct file_operations enable;
1075 struct file_operations format;
1076 struct file_operations filter;
1079 static struct ftrace_module_file_ops *
1080 trace_create_file_ops(struct module *mod)
1082 struct ftrace_module_file_ops *file_ops;
1085 * This is a bit of a PITA. To allow for correct reference
1086 * counting, modules must "own" their file_operations.
1087 * To do this, we allocate the file operations that will be
1088 * used in the event directory.
1091 file_ops = kmalloc(sizeof(*file_ops), GFP_KERNEL);
1092 if (!file_ops)
1093 return NULL;
1095 file_ops->mod = mod;
1097 file_ops->id = ftrace_event_id_fops;
1098 file_ops->id.owner = mod;
1100 file_ops->enable = ftrace_enable_fops;
1101 file_ops->enable.owner = mod;
1103 file_ops->filter = ftrace_event_filter_fops;
1104 file_ops->filter.owner = mod;
1106 file_ops->format = ftrace_event_format_fops;
1107 file_ops->format.owner = mod;
1109 list_add(&file_ops->list, &ftrace_module_file_list);
1111 return file_ops;
1114 static void trace_module_add_events(struct module *mod)
1116 struct ftrace_module_file_ops *file_ops = NULL;
1117 struct ftrace_event_call *call, *start, *end;
1118 struct dentry *d_events;
1119 int ret;
1121 start = mod->trace_events;
1122 end = mod->trace_events + mod->num_trace_events;
1124 if (start == end)
1125 return;
1127 d_events = event_trace_events_dir();
1128 if (!d_events)
1129 return;
1131 for_each_event(call, start, end) {
1132 /* The linker may leave blanks */
1133 if (!call->name)
1134 continue;
1135 if (call->raw_init) {
1136 ret = call->raw_init(call);
1137 if (ret < 0) {
1138 if (ret != -ENOSYS)
1139 pr_warning("Could not initialize trace "
1140 "point events/%s\n", call->name);
1141 continue;
1145 * This module has events, create file ops for this module
1146 * if not already done.
1148 if (!file_ops) {
1149 file_ops = trace_create_file_ops(mod);
1150 if (!file_ops)
1151 return;
1153 call->mod = mod;
1154 ret = event_create_dir(call, d_events,
1155 &file_ops->id, &file_ops->enable,
1156 &file_ops->filter, &file_ops->format);
1157 if (!ret)
1158 list_add(&call->list, &ftrace_events);
1162 static void trace_module_remove_events(struct module *mod)
1164 struct ftrace_module_file_ops *file_ops;
1165 struct ftrace_event_call *call, *p;
1166 bool found = false;
1168 down_write(&trace_event_mutex);
1169 list_for_each_entry_safe(call, p, &ftrace_events, list) {
1170 if (call->mod == mod) {
1171 found = true;
1172 __trace_remove_event_call(call);
1176 /* Now free the file_operations */
1177 list_for_each_entry(file_ops, &ftrace_module_file_list, list) {
1178 if (file_ops->mod == mod)
1179 break;
1181 if (&file_ops->list != &ftrace_module_file_list) {
1182 list_del(&file_ops->list);
1183 kfree(file_ops);
1187 * It is safest to reset the ring buffer if the module being unloaded
1188 * registered any events.
1190 if (found)
1191 tracing_reset_current_online_cpus();
1192 up_write(&trace_event_mutex);
1195 static int trace_module_notify(struct notifier_block *self,
1196 unsigned long val, void *data)
1198 struct module *mod = data;
1200 mutex_lock(&event_mutex);
1201 switch (val) {
1202 case MODULE_STATE_COMING:
1203 trace_module_add_events(mod);
1204 break;
1205 case MODULE_STATE_GOING:
1206 trace_module_remove_events(mod);
1207 break;
1209 mutex_unlock(&event_mutex);
1211 return 0;
1213 #else
1214 static int trace_module_notify(struct notifier_block *self,
1215 unsigned long val, void *data)
1217 return 0;
1219 #endif /* CONFIG_MODULES */
1221 static struct notifier_block trace_module_nb = {
1222 .notifier_call = trace_module_notify,
1223 .priority = 0,
1226 extern struct ftrace_event_call __start_ftrace_events[];
1227 extern struct ftrace_event_call __stop_ftrace_events[];
1229 static char bootup_event_buf[COMMAND_LINE_SIZE] __initdata;
1231 static __init int setup_trace_event(char *str)
1233 strlcpy(bootup_event_buf, str, COMMAND_LINE_SIZE);
1234 ring_buffer_expanded = 1;
1235 tracing_selftest_disabled = 1;
1237 return 1;
1239 __setup("trace_event=", setup_trace_event);
1241 static __init int event_trace_init(void)
1243 struct ftrace_event_call *call;
1244 struct dentry *d_tracer;
1245 struct dentry *entry;
1246 struct dentry *d_events;
1247 int ret;
1248 char *buf = bootup_event_buf;
1249 char *token;
1251 d_tracer = tracing_init_dentry();
1252 if (!d_tracer)
1253 return 0;
1255 entry = debugfs_create_file("available_events", 0444, d_tracer,
1256 (void *)&show_event_seq_ops,
1257 &ftrace_avail_fops);
1258 if (!entry)
1259 pr_warning("Could not create debugfs "
1260 "'available_events' entry\n");
1262 entry = debugfs_create_file("set_event", 0644, d_tracer,
1263 (void *)&show_set_event_seq_ops,
1264 &ftrace_set_event_fops);
1265 if (!entry)
1266 pr_warning("Could not create debugfs "
1267 "'set_event' entry\n");
1269 d_events = event_trace_events_dir();
1270 if (!d_events)
1271 return 0;
1273 /* ring buffer internal formats */
1274 trace_create_file("header_page", 0444, d_events,
1275 ring_buffer_print_page_header,
1276 &ftrace_show_header_fops);
1278 trace_create_file("header_event", 0444, d_events,
1279 ring_buffer_print_entry_header,
1280 &ftrace_show_header_fops);
1282 trace_create_file("enable", 0644, d_events,
1283 NULL, &ftrace_system_enable_fops);
1285 for_each_event(call, __start_ftrace_events, __stop_ftrace_events) {
1286 /* The linker may leave blanks */
1287 if (!call->name)
1288 continue;
1289 if (call->raw_init) {
1290 ret = call->raw_init(call);
1291 if (ret < 0) {
1292 if (ret != -ENOSYS)
1293 pr_warning("Could not initialize trace "
1294 "point events/%s\n", call->name);
1295 continue;
1298 ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
1299 &ftrace_enable_fops,
1300 &ftrace_event_filter_fops,
1301 &ftrace_event_format_fops);
1302 if (!ret)
1303 list_add(&call->list, &ftrace_events);
1306 while (true) {
1307 token = strsep(&buf, ",");
1309 if (!token)
1310 break;
1311 if (!*token)
1312 continue;
1314 ret = ftrace_set_clr_event(token, 1);
1315 if (ret)
1316 pr_warning("Failed to enable trace event: %s\n", token);
1319 ret = register_module_notifier(&trace_module_nb);
1320 if (ret)
1321 pr_warning("Failed to register trace events module notifier\n");
1323 return 0;
1325 fs_initcall(event_trace_init);
1327 #ifdef CONFIG_FTRACE_STARTUP_TEST
1329 static DEFINE_SPINLOCK(test_spinlock);
1330 static DEFINE_SPINLOCK(test_spinlock_irq);
1331 static DEFINE_MUTEX(test_mutex);
1333 static __init void test_work(struct work_struct *dummy)
1335 spin_lock(&test_spinlock);
1336 spin_lock_irq(&test_spinlock_irq);
1337 udelay(1);
1338 spin_unlock_irq(&test_spinlock_irq);
1339 spin_unlock(&test_spinlock);
1341 mutex_lock(&test_mutex);
1342 msleep(1);
1343 mutex_unlock(&test_mutex);
1346 static __init int event_test_thread(void *unused)
1348 void *test_malloc;
1350 test_malloc = kmalloc(1234, GFP_KERNEL);
1351 if (!test_malloc)
1352 pr_info("failed to kmalloc\n");
1354 schedule_on_each_cpu(test_work);
1356 kfree(test_malloc);
1358 set_current_state(TASK_INTERRUPTIBLE);
1359 while (!kthread_should_stop())
1360 schedule();
1362 return 0;
1366 * Do various things that may trigger events.
1368 static __init void event_test_stuff(void)
1370 struct task_struct *test_thread;
1372 test_thread = kthread_run(event_test_thread, NULL, "test-events");
1373 msleep(1);
1374 kthread_stop(test_thread);
1378 * For every trace event defined, we will test each trace point separately,
1379 * and then by groups, and finally all trace points.
1381 static __init void event_trace_self_tests(void)
1383 struct ftrace_event_call *call;
1384 struct event_subsystem *system;
1385 int ret;
1387 pr_info("Running tests on trace events:\n");
1389 list_for_each_entry(call, &ftrace_events, list) {
1391 /* Only test those that have a regfunc */
1392 if (!call->regfunc)
1393 continue;
1396 * Testing syscall events here is pretty useless, but
1397 * we still do it if configured. But this is time consuming.
1398 * What we really need is a user thread to perform the
1399 * syscalls as we test.
1401 #ifndef CONFIG_EVENT_TRACE_TEST_SYSCALLS
1402 if (call->system &&
1403 strcmp(call->system, "syscalls") == 0)
1404 continue;
1405 #endif
1407 pr_info("Testing event %s: ", call->name);
1410 * If an event is already enabled, someone is using
1411 * it and the self test should not be on.
1413 if (call->enabled) {
1414 pr_warning("Enabled event during self test!\n");
1415 WARN_ON_ONCE(1);
1416 continue;
1419 ftrace_event_enable_disable(call, 1);
1420 event_test_stuff();
1421 ftrace_event_enable_disable(call, 0);
1423 pr_cont("OK\n");
1426 /* Now test at the sub system level */
1428 pr_info("Running tests on trace event systems:\n");
1430 list_for_each_entry(system, &event_subsystems, list) {
1432 /* the ftrace system is special, skip it */
1433 if (strcmp(system->name, "ftrace") == 0)
1434 continue;
1436 pr_info("Testing event system %s: ", system->name);
1438 ret = __ftrace_set_clr_event(NULL, system->name, NULL, 1);
1439 if (WARN_ON_ONCE(ret)) {
1440 pr_warning("error enabling system %s\n",
1441 system->name);
1442 continue;
1445 event_test_stuff();
1447 ret = __ftrace_set_clr_event(NULL, system->name, NULL, 0);
1448 if (WARN_ON_ONCE(ret))
1449 pr_warning("error disabling system %s\n",
1450 system->name);
1452 pr_cont("OK\n");
1455 /* Test with all events enabled */
1457 pr_info("Running tests on all trace events:\n");
1458 pr_info("Testing all events: ");
1460 ret = __ftrace_set_clr_event(NULL, NULL, NULL, 1);
1461 if (WARN_ON_ONCE(ret)) {
1462 pr_warning("error enabling all events\n");
1463 return;
1466 event_test_stuff();
1468 /* reset sysname */
1469 ret = __ftrace_set_clr_event(NULL, NULL, NULL, 0);
1470 if (WARN_ON_ONCE(ret)) {
1471 pr_warning("error disabling all events\n");
1472 return;
1475 pr_cont("OK\n");
1478 #ifdef CONFIG_FUNCTION_TRACER
1480 static DEFINE_PER_CPU(atomic_t, ftrace_test_event_disable);
1482 static void
1483 function_test_events_call(unsigned long ip, unsigned long parent_ip)
1485 struct ring_buffer_event *event;
1486 struct ring_buffer *buffer;
1487 struct ftrace_entry *entry;
1488 unsigned long flags;
1489 long disabled;
1490 int resched;
1491 int cpu;
1492 int pc;
1494 pc = preempt_count();
1495 resched = ftrace_preempt_disable();
1496 cpu = raw_smp_processor_id();
1497 disabled = atomic_inc_return(&per_cpu(ftrace_test_event_disable, cpu));
1499 if (disabled != 1)
1500 goto out;
1502 local_save_flags(flags);
1504 event = trace_current_buffer_lock_reserve(&buffer,
1505 TRACE_FN, sizeof(*entry),
1506 flags, pc);
1507 if (!event)
1508 goto out;
1509 entry = ring_buffer_event_data(event);
1510 entry->ip = ip;
1511 entry->parent_ip = parent_ip;
1513 trace_nowake_buffer_unlock_commit(buffer, event, flags, pc);
1515 out:
1516 atomic_dec(&per_cpu(ftrace_test_event_disable, cpu));
1517 ftrace_preempt_enable(resched);
1520 static struct ftrace_ops trace_ops __initdata =
1522 .func = function_test_events_call,
1525 static __init void event_trace_self_test_with_function(void)
1527 register_ftrace_function(&trace_ops);
1528 pr_info("Running tests again, along with the function tracer\n");
1529 event_trace_self_tests();
1530 unregister_ftrace_function(&trace_ops);
1532 #else
1533 static __init void event_trace_self_test_with_function(void)
1536 #endif
1538 static __init int event_trace_self_tests_init(void)
1540 if (!tracing_selftest_disabled) {
1541 event_trace_self_tests();
1542 event_trace_self_test_with_function();
1545 return 0;
1548 late_initcall(event_trace_self_tests_init);
1550 #endif