4331595650
Conflicts: tools/perf/Makefile Merge reason: - fix the conflict - pick up the pr_*() infrastructure to queue up dependent patch Signed-off-by: Ingo Molnar <mingo@elte.hu>
1522 lines
32 KiB
C
1522 lines
32 KiB
C
/*
|
|
* event tracer
|
|
*
|
|
* Copyright (C) 2008 Red Hat Inc, Steven Rostedt <srostedt@redhat.com>
|
|
*
|
|
* - Added format output of fields of the trace point.
|
|
* This was based off of work by Tom Zanussi <tzanussi@gmail.com>.
|
|
*
|
|
*/
|
|
|
|
#include <linux/workqueue.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/debugfs.h>
|
|
#include <linux/uaccess.h>
|
|
#include <linux/module.h>
|
|
#include <linux/ctype.h>
|
|
#include <linux/delay.h>
|
|
|
|
#include <asm/setup.h>
|
|
|
|
#include "trace_output.h"
|
|
|
|
#undef TRACE_SYSTEM
|
|
#define TRACE_SYSTEM "TRACE_SYSTEM"
|
|
|
|
DEFINE_MUTEX(event_mutex);
|
|
|
|
LIST_HEAD(ftrace_events);
|
|
|
|
int trace_define_field(struct ftrace_event_call *call, const char *type,
|
|
const char *name, int offset, int size, int is_signed,
|
|
int filter_type)
|
|
{
|
|
struct ftrace_event_field *field;
|
|
|
|
field = kzalloc(sizeof(*field), GFP_KERNEL);
|
|
if (!field)
|
|
goto err;
|
|
|
|
field->name = kstrdup(name, GFP_KERNEL);
|
|
if (!field->name)
|
|
goto err;
|
|
|
|
field->type = kstrdup(type, GFP_KERNEL);
|
|
if (!field->type)
|
|
goto err;
|
|
|
|
if (filter_type == FILTER_OTHER)
|
|
field->filter_type = filter_assign_type(type);
|
|
else
|
|
field->filter_type = filter_type;
|
|
|
|
field->offset = offset;
|
|
field->size = size;
|
|
field->is_signed = is_signed;
|
|
|
|
list_add(&field->link, &call->fields);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
if (field) {
|
|
kfree(field->name);
|
|
kfree(field->type);
|
|
}
|
|
kfree(field);
|
|
|
|
return -ENOMEM;
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_define_field);
|
|
|
|
#define __common_field(type, item) \
|
|
ret = trace_define_field(call, #type, "common_" #item, \
|
|
offsetof(typeof(ent), item), \
|
|
sizeof(ent.item), \
|
|
is_signed_type(type), FILTER_OTHER); \
|
|
if (ret) \
|
|
return ret;
|
|
|
|
int trace_define_common_fields(struct ftrace_event_call *call)
|
|
{
|
|
int ret;
|
|
struct trace_entry ent;
|
|
|
|
__common_field(unsigned short, type);
|
|
__common_field(unsigned char, flags);
|
|
__common_field(unsigned char, preempt_count);
|
|
__common_field(int, pid);
|
|
__common_field(int, lock_depth);
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(trace_define_common_fields);
|
|
|
|
void trace_destroy_fields(struct ftrace_event_call *call)
|
|
{
|
|
struct ftrace_event_field *field, *next;
|
|
|
|
list_for_each_entry_safe(field, next, &call->fields, link) {
|
|
list_del(&field->link);
|
|
kfree(field->type);
|
|
kfree(field->name);
|
|
kfree(field);
|
|
}
|
|
}
|
|
|
|
static void ftrace_event_enable_disable(struct ftrace_event_call *call,
|
|
int enable)
|
|
{
|
|
switch (enable) {
|
|
case 0:
|
|
if (call->enabled) {
|
|
call->enabled = 0;
|
|
tracing_stop_cmdline_record();
|
|
call->unregfunc(call);
|
|
}
|
|
break;
|
|
case 1:
|
|
if (!call->enabled) {
|
|
call->enabled = 1;
|
|
tracing_start_cmdline_record();
|
|
call->regfunc(call);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void ftrace_clear_events(void)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
|
|
mutex_lock(&event_mutex);
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
ftrace_event_enable_disable(call, 0);
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
}
|
|
|
|
/*
|
|
* __ftrace_set_clr_event(NULL, NULL, NULL, set) will set/unset all events.
|
|
*/
|
|
static int __ftrace_set_clr_event(const char *match, const char *sub,
|
|
const char *event, int set)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
int ret = -EINVAL;
|
|
|
|
mutex_lock(&event_mutex);
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
|
|
if (!call->name || !call->regfunc)
|
|
continue;
|
|
|
|
if (match &&
|
|
strcmp(match, call->name) != 0 &&
|
|
strcmp(match, call->system) != 0)
|
|
continue;
|
|
|
|
if (sub && strcmp(sub, call->system) != 0)
|
|
continue;
|
|
|
|
if (event && strcmp(event, call->name) != 0)
|
|
continue;
|
|
|
|
ftrace_event_enable_disable(call, set);
|
|
|
|
ret = 0;
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int ftrace_set_clr_event(char *buf, int set)
|
|
{
|
|
char *event = NULL, *sub = NULL, *match;
|
|
|
|
/*
|
|
* The buf format can be <subsystem>:<event-name>
|
|
* *:<event-name> means any event by that name.
|
|
* :<event-name> is the same.
|
|
*
|
|
* <subsystem>:* means all events in that subsystem
|
|
* <subsystem>: means the same.
|
|
*
|
|
* <name> (no ':') means all events in a subsystem with
|
|
* the name <name> or any event that matches <name>
|
|
*/
|
|
|
|
match = strsep(&buf, ":");
|
|
if (buf) {
|
|
sub = match;
|
|
event = buf;
|
|
match = NULL;
|
|
|
|
if (!strlen(sub) || strcmp(sub, "*") == 0)
|
|
sub = NULL;
|
|
if (!strlen(event) || strcmp(event, "*") == 0)
|
|
event = NULL;
|
|
}
|
|
|
|
return __ftrace_set_clr_event(match, sub, event, set);
|
|
}
|
|
|
|
/**
|
|
* trace_set_clr_event - enable or disable an event
|
|
* @system: system name to match (NULL for any system)
|
|
* @event: event name to match (NULL for all events, within system)
|
|
* @set: 1 to enable, 0 to disable
|
|
*
|
|
* This is a way for other parts of the kernel to enable or disable
|
|
* event recording.
|
|
*
|
|
* Returns 0 on success, -EINVAL if the parameters do not match any
|
|
* registered events.
|
|
*/
|
|
int trace_set_clr_event(const char *system, const char *event, int set)
|
|
{
|
|
return __ftrace_set_clr_event(NULL, system, event, set);
|
|
}
|
|
|
|
/* 128 should be much more than enough */
|
|
#define EVENT_BUF_SIZE 127
|
|
|
|
static ssize_t
|
|
ftrace_event_write(struct file *file, const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct trace_parser parser;
|
|
ssize_t read, ret;
|
|
|
|
if (!cnt)
|
|
return 0;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
if (trace_parser_get_init(&parser, EVENT_BUF_SIZE + 1))
|
|
return -ENOMEM;
|
|
|
|
read = trace_get_user(&parser, ubuf, cnt, ppos);
|
|
|
|
if (read >= 0 && trace_parser_loaded((&parser))) {
|
|
int set = 1;
|
|
|
|
if (*parser.buffer == '!')
|
|
set = 0;
|
|
|
|
parser.buffer[parser.idx] = 0;
|
|
|
|
ret = ftrace_set_clr_event(parser.buffer + !set, set);
|
|
if (ret)
|
|
goto out_put;
|
|
}
|
|
|
|
ret = read;
|
|
|
|
out_put:
|
|
trace_parser_put(&parser);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void *
|
|
t_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call = v;
|
|
|
|
(*pos)++;
|
|
|
|
list_for_each_entry_continue(call, &ftrace_events, list) {
|
|
/*
|
|
* The ftrace subsystem is for showing formats only.
|
|
* They can not be enabled or disabled via the event files.
|
|
*/
|
|
if (call->regfunc)
|
|
return call;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void *t_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
loff_t l;
|
|
|
|
mutex_lock(&event_mutex);
|
|
|
|
call = list_entry(&ftrace_events, struct ftrace_event_call, list);
|
|
for (l = 0; l <= *pos; ) {
|
|
call = t_next(m, call, &l);
|
|
if (!call)
|
|
break;
|
|
}
|
|
return call;
|
|
}
|
|
|
|
static void *
|
|
s_next(struct seq_file *m, void *v, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call = v;
|
|
|
|
(*pos)++;
|
|
|
|
list_for_each_entry_continue(call, &ftrace_events, list) {
|
|
if (call->enabled)
|
|
return call;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void *s_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
loff_t l;
|
|
|
|
mutex_lock(&event_mutex);
|
|
|
|
call = list_entry(&ftrace_events, struct ftrace_event_call, list);
|
|
for (l = 0; l <= *pos; ) {
|
|
call = s_next(m, call, &l);
|
|
if (!call)
|
|
break;
|
|
}
|
|
return call;
|
|
}
|
|
|
|
static int t_show(struct seq_file *m, void *v)
|
|
{
|
|
struct ftrace_event_call *call = v;
|
|
|
|
if (strcmp(call->system, TRACE_SYSTEM) != 0)
|
|
seq_printf(m, "%s:", call->system);
|
|
seq_printf(m, "%s\n", call->name);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void t_stop(struct seq_file *m, void *p)
|
|
{
|
|
mutex_unlock(&event_mutex);
|
|
}
|
|
|
|
static int
|
|
ftrace_event_seq_open(struct inode *inode, struct file *file)
|
|
{
|
|
const struct seq_operations *seq_ops;
|
|
|
|
if ((file->f_mode & FMODE_WRITE) &&
|
|
(file->f_flags & O_TRUNC))
|
|
ftrace_clear_events();
|
|
|
|
seq_ops = inode->i_private;
|
|
return seq_open(file, seq_ops);
|
|
}
|
|
|
|
static ssize_t
|
|
event_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
char *buf;
|
|
|
|
if (call->enabled)
|
|
buf = "1\n";
|
|
else
|
|
buf = "0\n";
|
|
|
|
return simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
|
|
}
|
|
|
|
static ssize_t
|
|
event_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
char buf[64];
|
|
unsigned long val;
|
|
int ret;
|
|
|
|
if (cnt >= sizeof(buf))
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
ret = strict_strtoul(buf, 10, &val);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
switch (val) {
|
|
case 0:
|
|
case 1:
|
|
mutex_lock(&event_mutex);
|
|
ftrace_event_enable_disable(call, val);
|
|
mutex_unlock(&event_mutex);
|
|
break;
|
|
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
system_enable_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
const char set_to_char[4] = { '?', '0', '1', 'X' };
|
|
const char *system = filp->private_data;
|
|
struct ftrace_event_call *call;
|
|
char buf[2];
|
|
int set = 0;
|
|
int ret;
|
|
|
|
mutex_lock(&event_mutex);
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
if (!call->name || !call->regfunc)
|
|
continue;
|
|
|
|
if (system && strcmp(call->system, system) != 0)
|
|
continue;
|
|
|
|
/*
|
|
* We need to find out if all the events are set
|
|
* or if all events or cleared, or if we have
|
|
* a mixture.
|
|
*/
|
|
set |= (1 << !!call->enabled);
|
|
|
|
/*
|
|
* If we have a mixture, no need to look further.
|
|
*/
|
|
if (set == 3)
|
|
break;
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
|
|
buf[0] = set_to_char[set];
|
|
buf[1] = '\n';
|
|
|
|
ret = simple_read_from_buffer(ubuf, cnt, ppos, buf, 2);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t
|
|
system_enable_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
const char *system = filp->private_data;
|
|
unsigned long val;
|
|
char buf[64];
|
|
ssize_t ret;
|
|
|
|
if (cnt >= sizeof(buf))
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
ret = strict_strtoul(buf, 10, &val);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
ret = tracing_update_buffers();
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
if (val != 0 && val != 1)
|
|
return -EINVAL;
|
|
|
|
ret = __ftrace_set_clr_event(NULL, system, NULL, val);
|
|
if (ret)
|
|
goto out;
|
|
|
|
ret = cnt;
|
|
|
|
out:
|
|
*ppos += cnt;
|
|
|
|
return ret;
|
|
}
|
|
|
|
extern char *__bad_type_size(void);
|
|
|
|
#undef FIELD
|
|
#define FIELD(type, name) \
|
|
sizeof(type) != sizeof(field.name) ? __bad_type_size() : \
|
|
#type, "common_" #name, offsetof(typeof(field), name), \
|
|
sizeof(field.name), is_signed_type(type)
|
|
|
|
static int trace_write_header(struct trace_seq *s)
|
|
{
|
|
struct trace_entry field;
|
|
|
|
/* struct trace_entry */
|
|
return trace_seq_printf(s,
|
|
"\tfield:%s %s;\toffset:%zu;\tsize:%zu;\tsigned:%u;\n"
|
|
"\tfield:%s %s;\toffset:%zu;\tsize:%zu;\tsigned:%u;\n"
|
|
"\tfield:%s %s;\toffset:%zu;\tsize:%zu;\tsigned:%u;\n"
|
|
"\tfield:%s %s;\toffset:%zu;\tsize:%zu;\tsigned:%u;\n"
|
|
"\tfield:%s %s;\toffset:%zu;\tsize:%zu;\tsigned:%u;\n"
|
|
"\n",
|
|
FIELD(unsigned short, type),
|
|
FIELD(unsigned char, flags),
|
|
FIELD(unsigned char, preempt_count),
|
|
FIELD(int, pid),
|
|
FIELD(int, lock_depth));
|
|
}
|
|
|
|
static ssize_t
|
|
event_format_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
struct trace_seq *s;
|
|
char *buf;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
/* If any of the first writes fail, so will the show_format. */
|
|
|
|
trace_seq_printf(s, "name: %s\n", call->name);
|
|
trace_seq_printf(s, "ID: %d\n", call->id);
|
|
trace_seq_printf(s, "format:\n");
|
|
trace_write_header(s);
|
|
|
|
r = call->show_format(call, s);
|
|
if (!r) {
|
|
/*
|
|
* ug! The format output is bigger than a PAGE!!
|
|
*/
|
|
buf = "FORMAT TOO BIG\n";
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos,
|
|
buf, strlen(buf));
|
|
goto out;
|
|
}
|
|
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos,
|
|
s->buffer, s->len);
|
|
out:
|
|
kfree(s);
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
event_id_read(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
trace_seq_printf(s, "%d\n", call->id);
|
|
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos,
|
|
s->buffer, s->len);
|
|
kfree(s);
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
event_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
print_event_filter(call, s);
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
event_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct ftrace_event_call *call = filp->private_data;
|
|
char *buf;
|
|
int err;
|
|
|
|
if (cnt >= PAGE_SIZE)
|
|
return -EINVAL;
|
|
|
|
buf = (char *)__get_free_page(GFP_TEMPORARY);
|
|
if (!buf)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(buf, ubuf, cnt)) {
|
|
free_page((unsigned long) buf);
|
|
return -EFAULT;
|
|
}
|
|
buf[cnt] = '\0';
|
|
|
|
err = apply_event_filter(call, buf);
|
|
free_page((unsigned long) buf);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
subsystem_filter_read(struct file *filp, char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct event_subsystem *system = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
print_subsystem_event_filter(system, s);
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return r;
|
|
}
|
|
|
|
static ssize_t
|
|
subsystem_filter_write(struct file *filp, const char __user *ubuf, size_t cnt,
|
|
loff_t *ppos)
|
|
{
|
|
struct event_subsystem *system = filp->private_data;
|
|
char *buf;
|
|
int err;
|
|
|
|
if (cnt >= PAGE_SIZE)
|
|
return -EINVAL;
|
|
|
|
buf = (char *)__get_free_page(GFP_TEMPORARY);
|
|
if (!buf)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(buf, ubuf, cnt)) {
|
|
free_page((unsigned long) buf);
|
|
return -EFAULT;
|
|
}
|
|
buf[cnt] = '\0';
|
|
|
|
err = apply_subsystem_event_filter(system, buf);
|
|
free_page((unsigned long) buf);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
*ppos += cnt;
|
|
|
|
return cnt;
|
|
}
|
|
|
|
static ssize_t
|
|
show_header(struct file *filp, char __user *ubuf, size_t cnt, loff_t *ppos)
|
|
{
|
|
int (*func)(struct trace_seq *s) = filp->private_data;
|
|
struct trace_seq *s;
|
|
int r;
|
|
|
|
if (*ppos)
|
|
return 0;
|
|
|
|
s = kmalloc(sizeof(*s), GFP_KERNEL);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
trace_seq_init(s);
|
|
|
|
func(s);
|
|
r = simple_read_from_buffer(ubuf, cnt, ppos, s->buffer, s->len);
|
|
|
|
kfree(s);
|
|
|
|
return r;
|
|
}
|
|
|
|
static const struct seq_operations show_event_seq_ops = {
|
|
.start = t_start,
|
|
.next = t_next,
|
|
.show = t_show,
|
|
.stop = t_stop,
|
|
};
|
|
|
|
static const struct seq_operations show_set_event_seq_ops = {
|
|
.start = s_start,
|
|
.next = s_next,
|
|
.show = t_show,
|
|
.stop = t_stop,
|
|
};
|
|
|
|
static const struct file_operations ftrace_avail_fops = {
|
|
.open = ftrace_event_seq_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release,
|
|
};
|
|
|
|
static const struct file_operations ftrace_set_event_fops = {
|
|
.open = ftrace_event_seq_open,
|
|
.read = seq_read,
|
|
.write = ftrace_event_write,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release,
|
|
};
|
|
|
|
static const struct file_operations ftrace_enable_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_enable_read,
|
|
.write = event_enable_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_event_format_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_format_read,
|
|
};
|
|
|
|
static const struct file_operations ftrace_event_id_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_id_read,
|
|
};
|
|
|
|
static const struct file_operations ftrace_event_filter_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = event_filter_read,
|
|
.write = event_filter_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_subsystem_filter_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = subsystem_filter_read,
|
|
.write = subsystem_filter_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_system_enable_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = system_enable_read,
|
|
.write = system_enable_write,
|
|
};
|
|
|
|
static const struct file_operations ftrace_show_header_fops = {
|
|
.open = tracing_open_generic,
|
|
.read = show_header,
|
|
};
|
|
|
|
static struct dentry *event_trace_events_dir(void)
|
|
{
|
|
static struct dentry *d_tracer;
|
|
static struct dentry *d_events;
|
|
|
|
if (d_events)
|
|
return d_events;
|
|
|
|
d_tracer = tracing_init_dentry();
|
|
if (!d_tracer)
|
|
return NULL;
|
|
|
|
d_events = debugfs_create_dir("events", d_tracer);
|
|
if (!d_events)
|
|
pr_warning("Could not create debugfs "
|
|
"'events' directory\n");
|
|
|
|
return d_events;
|
|
}
|
|
|
|
static LIST_HEAD(event_subsystems);
|
|
|
|
static struct dentry *
|
|
event_subsystem_dir(const char *name, struct dentry *d_events)
|
|
{
|
|
struct event_subsystem *system;
|
|
struct dentry *entry;
|
|
|
|
/* First see if we did not already create this dir */
|
|
list_for_each_entry(system, &event_subsystems, list) {
|
|
if (strcmp(system->name, name) == 0) {
|
|
system->nr_events++;
|
|
return system->entry;
|
|
}
|
|
}
|
|
|
|
/* need to create new entry */
|
|
system = kmalloc(sizeof(*system), GFP_KERNEL);
|
|
if (!system) {
|
|
pr_warning("No memory to create event subsystem %s\n",
|
|
name);
|
|
return d_events;
|
|
}
|
|
|
|
system->entry = debugfs_create_dir(name, d_events);
|
|
if (!system->entry) {
|
|
pr_warning("Could not create event subsystem %s\n",
|
|
name);
|
|
kfree(system);
|
|
return d_events;
|
|
}
|
|
|
|
system->nr_events = 1;
|
|
system->name = kstrdup(name, GFP_KERNEL);
|
|
if (!system->name) {
|
|
debugfs_remove(system->entry);
|
|
kfree(system);
|
|
return d_events;
|
|
}
|
|
|
|
list_add(&system->list, &event_subsystems);
|
|
|
|
system->filter = NULL;
|
|
|
|
system->filter = kzalloc(sizeof(struct event_filter), GFP_KERNEL);
|
|
if (!system->filter) {
|
|
pr_warning("Could not allocate filter for subsystem "
|
|
"'%s'\n", name);
|
|
return system->entry;
|
|
}
|
|
|
|
entry = debugfs_create_file("filter", 0644, system->entry, system,
|
|
&ftrace_subsystem_filter_fops);
|
|
if (!entry) {
|
|
kfree(system->filter);
|
|
system->filter = NULL;
|
|
pr_warning("Could not create debugfs "
|
|
"'%s/filter' entry\n", name);
|
|
}
|
|
|
|
trace_create_file("enable", 0644, system->entry,
|
|
(void *)system->name,
|
|
&ftrace_system_enable_fops);
|
|
|
|
return system->entry;
|
|
}
|
|
|
|
static int
|
|
event_create_dir(struct ftrace_event_call *call, struct dentry *d_events,
|
|
const struct file_operations *id,
|
|
const struct file_operations *enable,
|
|
const struct file_operations *filter,
|
|
const struct file_operations *format)
|
|
{
|
|
int ret;
|
|
|
|
/*
|
|
* If the trace point header did not define TRACE_SYSTEM
|
|
* then the system would be called "TRACE_SYSTEM".
|
|
*/
|
|
if (strcmp(call->system, TRACE_SYSTEM) != 0)
|
|
d_events = event_subsystem_dir(call->system, d_events);
|
|
|
|
call->dir = debugfs_create_dir(call->name, d_events);
|
|
if (!call->dir) {
|
|
pr_warning("Could not create debugfs "
|
|
"'%s' directory\n", call->name);
|
|
return -1;
|
|
}
|
|
|
|
if (call->regfunc)
|
|
trace_create_file("enable", 0644, call->dir, call,
|
|
enable);
|
|
|
|
if (call->id && call->profile_enable)
|
|
trace_create_file("id", 0444, call->dir, call,
|
|
id);
|
|
|
|
if (call->define_fields) {
|
|
ret = call->define_fields(call);
|
|
if (ret < 0) {
|
|
pr_warning("Could not initialize trace point"
|
|
" events/%s\n", call->name);
|
|
return ret;
|
|
}
|
|
trace_create_file("filter", 0644, call->dir, call,
|
|
filter);
|
|
}
|
|
|
|
/* A trace may not want to export its format */
|
|
if (!call->show_format)
|
|
return 0;
|
|
|
|
trace_create_file("format", 0444, call->dir, call,
|
|
format);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int __trace_add_event_call(struct ftrace_event_call *call)
|
|
{
|
|
struct dentry *d_events;
|
|
int ret;
|
|
|
|
if (!call->name)
|
|
return -EINVAL;
|
|
|
|
if (call->raw_init) {
|
|
ret = call->raw_init(call);
|
|
if (ret < 0) {
|
|
if (ret != -ENOSYS)
|
|
pr_warning("Could not initialize trace "
|
|
"events/%s\n", call->name);
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
d_events = event_trace_events_dir();
|
|
if (!d_events)
|
|
return -ENOENT;
|
|
|
|
ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
|
|
&ftrace_enable_fops, &ftrace_event_filter_fops,
|
|
&ftrace_event_format_fops);
|
|
if (!ret)
|
|
list_add(&call->list, &ftrace_events);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Add an additional event_call dynamically */
|
|
int trace_add_event_call(struct ftrace_event_call *call)
|
|
{
|
|
int ret;
|
|
mutex_lock(&event_mutex);
|
|
ret = __trace_add_event_call(call);
|
|
mutex_unlock(&event_mutex);
|
|
return ret;
|
|
}
|
|
|
|
static void remove_subsystem_dir(const char *name)
|
|
{
|
|
struct event_subsystem *system;
|
|
|
|
if (strcmp(name, TRACE_SYSTEM) == 0)
|
|
return;
|
|
|
|
list_for_each_entry(system, &event_subsystems, list) {
|
|
if (strcmp(system->name, name) == 0) {
|
|
if (!--system->nr_events) {
|
|
struct event_filter *filter = system->filter;
|
|
|
|
debugfs_remove_recursive(system->entry);
|
|
list_del(&system->list);
|
|
if (filter) {
|
|
kfree(filter->filter_string);
|
|
kfree(filter);
|
|
}
|
|
kfree(system->name);
|
|
kfree(system);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Must be called under locking both of event_mutex and trace_event_mutex.
|
|
*/
|
|
static void __trace_remove_event_call(struct ftrace_event_call *call)
|
|
{
|
|
ftrace_event_enable_disable(call, 0);
|
|
if (call->event)
|
|
__unregister_ftrace_event(call->event);
|
|
debugfs_remove_recursive(call->dir);
|
|
list_del(&call->list);
|
|
trace_destroy_fields(call);
|
|
destroy_preds(call);
|
|
remove_subsystem_dir(call->system);
|
|
}
|
|
|
|
/* Remove an event_call */
|
|
void trace_remove_event_call(struct ftrace_event_call *call)
|
|
{
|
|
mutex_lock(&event_mutex);
|
|
down_write(&trace_event_mutex);
|
|
__trace_remove_event_call(call);
|
|
up_write(&trace_event_mutex);
|
|
mutex_unlock(&event_mutex);
|
|
}
|
|
|
|
#define for_each_event(event, start, end) \
|
|
for (event = start; \
|
|
(unsigned long)event < (unsigned long)end; \
|
|
event++)
|
|
|
|
#ifdef CONFIG_MODULES
|
|
|
|
static LIST_HEAD(ftrace_module_file_list);
|
|
|
|
/*
|
|
* Modules must own their file_operations to keep up with
|
|
* reference counting.
|
|
*/
|
|
struct ftrace_module_file_ops {
|
|
struct list_head list;
|
|
struct module *mod;
|
|
struct file_operations id;
|
|
struct file_operations enable;
|
|
struct file_operations format;
|
|
struct file_operations filter;
|
|
};
|
|
|
|
static struct ftrace_module_file_ops *
|
|
trace_create_file_ops(struct module *mod)
|
|
{
|
|
struct ftrace_module_file_ops *file_ops;
|
|
|
|
/*
|
|
* This is a bit of a PITA. To allow for correct reference
|
|
* counting, modules must "own" their file_operations.
|
|
* To do this, we allocate the file operations that will be
|
|
* used in the event directory.
|
|
*/
|
|
|
|
file_ops = kmalloc(sizeof(*file_ops), GFP_KERNEL);
|
|
if (!file_ops)
|
|
return NULL;
|
|
|
|
file_ops->mod = mod;
|
|
|
|
file_ops->id = ftrace_event_id_fops;
|
|
file_ops->id.owner = mod;
|
|
|
|
file_ops->enable = ftrace_enable_fops;
|
|
file_ops->enable.owner = mod;
|
|
|
|
file_ops->filter = ftrace_event_filter_fops;
|
|
file_ops->filter.owner = mod;
|
|
|
|
file_ops->format = ftrace_event_format_fops;
|
|
file_ops->format.owner = mod;
|
|
|
|
list_add(&file_ops->list, &ftrace_module_file_list);
|
|
|
|
return file_ops;
|
|
}
|
|
|
|
static void trace_module_add_events(struct module *mod)
|
|
{
|
|
struct ftrace_module_file_ops *file_ops = NULL;
|
|
struct ftrace_event_call *call, *start, *end;
|
|
struct dentry *d_events;
|
|
int ret;
|
|
|
|
start = mod->trace_events;
|
|
end = mod->trace_events + mod->num_trace_events;
|
|
|
|
if (start == end)
|
|
return;
|
|
|
|
d_events = event_trace_events_dir();
|
|
if (!d_events)
|
|
return;
|
|
|
|
for_each_event(call, start, end) {
|
|
/* The linker may leave blanks */
|
|
if (!call->name)
|
|
continue;
|
|
if (call->raw_init) {
|
|
ret = call->raw_init(call);
|
|
if (ret < 0) {
|
|
if (ret != -ENOSYS)
|
|
pr_warning("Could not initialize trace "
|
|
"point events/%s\n", call->name);
|
|
continue;
|
|
}
|
|
}
|
|
/*
|
|
* This module has events, create file ops for this module
|
|
* if not already done.
|
|
*/
|
|
if (!file_ops) {
|
|
file_ops = trace_create_file_ops(mod);
|
|
if (!file_ops)
|
|
return;
|
|
}
|
|
call->mod = mod;
|
|
ret = event_create_dir(call, d_events,
|
|
&file_ops->id, &file_ops->enable,
|
|
&file_ops->filter, &file_ops->format);
|
|
if (!ret)
|
|
list_add(&call->list, &ftrace_events);
|
|
}
|
|
}
|
|
|
|
static void trace_module_remove_events(struct module *mod)
|
|
{
|
|
struct ftrace_module_file_ops *file_ops;
|
|
struct ftrace_event_call *call, *p;
|
|
bool found = false;
|
|
|
|
down_write(&trace_event_mutex);
|
|
list_for_each_entry_safe(call, p, &ftrace_events, list) {
|
|
if (call->mod == mod) {
|
|
found = true;
|
|
__trace_remove_event_call(call);
|
|
}
|
|
}
|
|
|
|
/* Now free the file_operations */
|
|
list_for_each_entry(file_ops, &ftrace_module_file_list, list) {
|
|
if (file_ops->mod == mod)
|
|
break;
|
|
}
|
|
if (&file_ops->list != &ftrace_module_file_list) {
|
|
list_del(&file_ops->list);
|
|
kfree(file_ops);
|
|
}
|
|
|
|
/*
|
|
* It is safest to reset the ring buffer if the module being unloaded
|
|
* registered any events.
|
|
*/
|
|
if (found)
|
|
tracing_reset_current_online_cpus();
|
|
up_write(&trace_event_mutex);
|
|
}
|
|
|
|
static int trace_module_notify(struct notifier_block *self,
|
|
unsigned long val, void *data)
|
|
{
|
|
struct module *mod = data;
|
|
|
|
mutex_lock(&event_mutex);
|
|
switch (val) {
|
|
case MODULE_STATE_COMING:
|
|
trace_module_add_events(mod);
|
|
break;
|
|
case MODULE_STATE_GOING:
|
|
trace_module_remove_events(mod);
|
|
break;
|
|
}
|
|
mutex_unlock(&event_mutex);
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
static int trace_module_notify(struct notifier_block *self,
|
|
unsigned long val, void *data)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_MODULES */
|
|
|
|
static struct notifier_block trace_module_nb = {
|
|
.notifier_call = trace_module_notify,
|
|
.priority = 0,
|
|
};
|
|
|
|
extern struct ftrace_event_call __start_ftrace_events[];
|
|
extern struct ftrace_event_call __stop_ftrace_events[];
|
|
|
|
static char bootup_event_buf[COMMAND_LINE_SIZE] __initdata;
|
|
|
|
static __init int setup_trace_event(char *str)
|
|
{
|
|
strlcpy(bootup_event_buf, str, COMMAND_LINE_SIZE);
|
|
ring_buffer_expanded = 1;
|
|
tracing_selftest_disabled = 1;
|
|
|
|
return 1;
|
|
}
|
|
__setup("trace_event=", setup_trace_event);
|
|
|
|
static __init int event_trace_init(void)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
struct dentry *d_tracer;
|
|
struct dentry *entry;
|
|
struct dentry *d_events;
|
|
int ret;
|
|
char *buf = bootup_event_buf;
|
|
char *token;
|
|
|
|
d_tracer = tracing_init_dentry();
|
|
if (!d_tracer)
|
|
return 0;
|
|
|
|
entry = debugfs_create_file("available_events", 0444, d_tracer,
|
|
(void *)&show_event_seq_ops,
|
|
&ftrace_avail_fops);
|
|
if (!entry)
|
|
pr_warning("Could not create debugfs "
|
|
"'available_events' entry\n");
|
|
|
|
entry = debugfs_create_file("set_event", 0644, d_tracer,
|
|
(void *)&show_set_event_seq_ops,
|
|
&ftrace_set_event_fops);
|
|
if (!entry)
|
|
pr_warning("Could not create debugfs "
|
|
"'set_event' entry\n");
|
|
|
|
d_events = event_trace_events_dir();
|
|
if (!d_events)
|
|
return 0;
|
|
|
|
/* ring buffer internal formats */
|
|
trace_create_file("header_page", 0444, d_events,
|
|
ring_buffer_print_page_header,
|
|
&ftrace_show_header_fops);
|
|
|
|
trace_create_file("header_event", 0444, d_events,
|
|
ring_buffer_print_entry_header,
|
|
&ftrace_show_header_fops);
|
|
|
|
trace_create_file("enable", 0644, d_events,
|
|
NULL, &ftrace_system_enable_fops);
|
|
|
|
for_each_event(call, __start_ftrace_events, __stop_ftrace_events) {
|
|
/* The linker may leave blanks */
|
|
if (!call->name)
|
|
continue;
|
|
if (call->raw_init) {
|
|
ret = call->raw_init(call);
|
|
if (ret < 0) {
|
|
if (ret != -ENOSYS)
|
|
pr_warning("Could not initialize trace "
|
|
"point events/%s\n", call->name);
|
|
continue;
|
|
}
|
|
}
|
|
ret = event_create_dir(call, d_events, &ftrace_event_id_fops,
|
|
&ftrace_enable_fops,
|
|
&ftrace_event_filter_fops,
|
|
&ftrace_event_format_fops);
|
|
if (!ret)
|
|
list_add(&call->list, &ftrace_events);
|
|
}
|
|
|
|
while (true) {
|
|
token = strsep(&buf, ",");
|
|
|
|
if (!token)
|
|
break;
|
|
if (!*token)
|
|
continue;
|
|
|
|
ret = ftrace_set_clr_event(token, 1);
|
|
if (ret)
|
|
pr_warning("Failed to enable trace event: %s\n", token);
|
|
}
|
|
|
|
ret = register_module_notifier(&trace_module_nb);
|
|
if (ret)
|
|
pr_warning("Failed to register trace events module notifier\n");
|
|
|
|
return 0;
|
|
}
|
|
fs_initcall(event_trace_init);
|
|
|
|
#ifdef CONFIG_FTRACE_STARTUP_TEST
|
|
|
|
static DEFINE_SPINLOCK(test_spinlock);
|
|
static DEFINE_SPINLOCK(test_spinlock_irq);
|
|
static DEFINE_MUTEX(test_mutex);
|
|
|
|
static __init void test_work(struct work_struct *dummy)
|
|
{
|
|
spin_lock(&test_spinlock);
|
|
spin_lock_irq(&test_spinlock_irq);
|
|
udelay(1);
|
|
spin_unlock_irq(&test_spinlock_irq);
|
|
spin_unlock(&test_spinlock);
|
|
|
|
mutex_lock(&test_mutex);
|
|
msleep(1);
|
|
mutex_unlock(&test_mutex);
|
|
}
|
|
|
|
static __init int event_test_thread(void *unused)
|
|
{
|
|
void *test_malloc;
|
|
|
|
test_malloc = kmalloc(1234, GFP_KERNEL);
|
|
if (!test_malloc)
|
|
pr_info("failed to kmalloc\n");
|
|
|
|
schedule_on_each_cpu(test_work);
|
|
|
|
kfree(test_malloc);
|
|
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
|
while (!kthread_should_stop())
|
|
schedule();
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Do various things that may trigger events.
|
|
*/
|
|
static __init void event_test_stuff(void)
|
|
{
|
|
struct task_struct *test_thread;
|
|
|
|
test_thread = kthread_run(event_test_thread, NULL, "test-events");
|
|
msleep(1);
|
|
kthread_stop(test_thread);
|
|
}
|
|
|
|
/*
|
|
* For every trace event defined, we will test each trace point separately,
|
|
* and then by groups, and finally all trace points.
|
|
*/
|
|
static __init void event_trace_self_tests(void)
|
|
{
|
|
struct ftrace_event_call *call;
|
|
struct event_subsystem *system;
|
|
int ret;
|
|
|
|
pr_info("Running tests on trace events:\n");
|
|
|
|
list_for_each_entry(call, &ftrace_events, list) {
|
|
|
|
/* Only test those that have a regfunc */
|
|
if (!call->regfunc)
|
|
continue;
|
|
|
|
/*
|
|
* Testing syscall events here is pretty useless, but
|
|
* we still do it if configured. But this is time consuming.
|
|
* What we really need is a user thread to perform the
|
|
* syscalls as we test.
|
|
*/
|
|
#ifndef CONFIG_EVENT_TRACE_TEST_SYSCALLS
|
|
if (call->system &&
|
|
strcmp(call->system, "syscalls") == 0)
|
|
continue;
|
|
#endif
|
|
|
|
pr_info("Testing event %s: ", call->name);
|
|
|
|
/*
|
|
* If an event is already enabled, someone is using
|
|
* it and the self test should not be on.
|
|
*/
|
|
if (call->enabled) {
|
|
pr_warning("Enabled event during self test!\n");
|
|
WARN_ON_ONCE(1);
|
|
continue;
|
|
}
|
|
|
|
ftrace_event_enable_disable(call, 1);
|
|
event_test_stuff();
|
|
ftrace_event_enable_disable(call, 0);
|
|
|
|
pr_cont("OK\n");
|
|
}
|
|
|
|
/* Now test at the sub system level */
|
|
|
|
pr_info("Running tests on trace event systems:\n");
|
|
|
|
list_for_each_entry(system, &event_subsystems, list) {
|
|
|
|
/* the ftrace system is special, skip it */
|
|
if (strcmp(system->name, "ftrace") == 0)
|
|
continue;
|
|
|
|
pr_info("Testing event system %s: ", system->name);
|
|
|
|
ret = __ftrace_set_clr_event(NULL, system->name, NULL, 1);
|
|
if (WARN_ON_ONCE(ret)) {
|
|
pr_warning("error enabling system %s\n",
|
|
system->name);
|
|
continue;
|
|
}
|
|
|
|
event_test_stuff();
|
|
|
|
ret = __ftrace_set_clr_event(NULL, system->name, NULL, 0);
|
|
if (WARN_ON_ONCE(ret))
|
|
pr_warning("error disabling system %s\n",
|
|
system->name);
|
|
|
|
pr_cont("OK\n");
|
|
}
|
|
|
|
/* Test with all events enabled */
|
|
|
|
pr_info("Running tests on all trace events:\n");
|
|
pr_info("Testing all events: ");
|
|
|
|
ret = __ftrace_set_clr_event(NULL, NULL, NULL, 1);
|
|
if (WARN_ON_ONCE(ret)) {
|
|
pr_warning("error enabling all events\n");
|
|
return;
|
|
}
|
|
|
|
event_test_stuff();
|
|
|
|
/* reset sysname */
|
|
ret = __ftrace_set_clr_event(NULL, NULL, NULL, 0);
|
|
if (WARN_ON_ONCE(ret)) {
|
|
pr_warning("error disabling all events\n");
|
|
return;
|
|
}
|
|
|
|
pr_cont("OK\n");
|
|
}
|
|
|
|
#ifdef CONFIG_FUNCTION_TRACER
|
|
|
|
static DEFINE_PER_CPU(atomic_t, ftrace_test_event_disable);
|
|
|
|
static void
|
|
function_test_events_call(unsigned long ip, unsigned long parent_ip)
|
|
{
|
|
struct ring_buffer_event *event;
|
|
struct ring_buffer *buffer;
|
|
struct ftrace_entry *entry;
|
|
unsigned long flags;
|
|
long disabled;
|
|
int resched;
|
|
int cpu;
|
|
int pc;
|
|
|
|
pc = preempt_count();
|
|
resched = ftrace_preempt_disable();
|
|
cpu = raw_smp_processor_id();
|
|
disabled = atomic_inc_return(&per_cpu(ftrace_test_event_disable, cpu));
|
|
|
|
if (disabled != 1)
|
|
goto out;
|
|
|
|
local_save_flags(flags);
|
|
|
|
event = trace_current_buffer_lock_reserve(&buffer,
|
|
TRACE_FN, sizeof(*entry),
|
|
flags, pc);
|
|
if (!event)
|
|
goto out;
|
|
entry = ring_buffer_event_data(event);
|
|
entry->ip = ip;
|
|
entry->parent_ip = parent_ip;
|
|
|
|
trace_nowake_buffer_unlock_commit(buffer, event, flags, pc);
|
|
|
|
out:
|
|
atomic_dec(&per_cpu(ftrace_test_event_disable, cpu));
|
|
ftrace_preempt_enable(resched);
|
|
}
|
|
|
|
static struct ftrace_ops trace_ops __initdata =
|
|
{
|
|
.func = function_test_events_call,
|
|
};
|
|
|
|
static __init void event_trace_self_test_with_function(void)
|
|
{
|
|
register_ftrace_function(&trace_ops);
|
|
pr_info("Running tests again, along with the function tracer\n");
|
|
event_trace_self_tests();
|
|
unregister_ftrace_function(&trace_ops);
|
|
}
|
|
#else
|
|
static __init void event_trace_self_test_with_function(void)
|
|
{
|
|
}
|
|
#endif
|
|
|
|
static __init int event_trace_self_tests_init(void)
|
|
{
|
|
if (!tracing_selftest_disabled) {
|
|
event_trace_self_tests();
|
|
event_trace_self_test_with_function();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
late_initcall(event_trace_self_tests_init);
|
|
|
|
#endif
|