Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
e5a81b62 SR |
2 | /* |
3 | * Copyright (C) 2008 Steven Rostedt <srostedt@redhat.com> | |
4 | * | |
5 | */ | |
68db0cf1 | 6 | #include <linux/sched/task_stack.h> |
e5a81b62 | 7 | #include <linux/stacktrace.h> |
17911ff3 | 8 | #include <linux/security.h> |
e5a81b62 SR |
9 | #include <linux/kallsyms.h> |
10 | #include <linux/seq_file.h> | |
11 | #include <linux/spinlock.h> | |
12 | #include <linux/uaccess.h> | |
e5a81b62 SR |
13 | #include <linux/ftrace.h> |
14 | #include <linux/module.h> | |
f38f1d2a | 15 | #include <linux/sysctl.h> |
e5a81b62 | 16 | #include <linux/init.h> |
762e1207 SR |
17 | |
18 | #include <asm/setup.h> | |
19 | ||
e5a81b62 SR |
20 | #include "trace.h" |
21 | ||
3d9a8072 TG |
22 | #define STACK_TRACE_ENTRIES 500 |
23 | ||
24 | static unsigned long stack_dump_trace[STACK_TRACE_ENTRIES]; | |
25 | static unsigned stack_trace_index[STACK_TRACE_ENTRIES]; | |
1b6cced6 | 26 | |
9f50c91b | 27 | static unsigned int stack_trace_nr_entries; |
3d9a8072 TG |
28 | static unsigned long stack_trace_max_size; |
29 | static arch_spinlock_t stack_trace_max_lock = | |
edc35bd7 | 30 | (arch_spinlock_t)__ARCH_SPIN_LOCK_UNLOCKED; |
e5a81b62 | 31 | |
8aaf1ee7 | 32 | DEFINE_PER_CPU(int, disable_stack_tracer); |
f38f1d2a SR |
33 | static DEFINE_MUTEX(stack_sysctl_mutex); |
34 | ||
35 | int stack_tracer_enabled; | |
e5a81b62 | 36 | |
3d9a8072 | 37 | static void print_max_stack(void) |
e3172181 MK |
38 | { |
39 | long i; | |
40 | int size; | |
41 | ||
42 | pr_emerg(" Depth Size Location (%d entries)\n" | |
43 | " ----- ---- --------\n", | |
9f50c91b | 44 | stack_trace_nr_entries); |
e3172181 | 45 | |
9f50c91b TG |
46 | for (i = 0; i < stack_trace_nr_entries; i++) { |
47 | if (i + 1 == stack_trace_nr_entries) | |
bb99d8cc | 48 | size = stack_trace_index[i]; |
e3172181 | 49 | else |
bb99d8cc | 50 | size = stack_trace_index[i] - stack_trace_index[i+1]; |
e3172181 | 51 | |
bb99d8cc | 52 | pr_emerg("%3ld) %8d %5d %pS\n", i, stack_trace_index[i], |
e3172181 MK |
53 | size, (void *)stack_dump_trace[i]); |
54 | } | |
55 | } | |
56 | ||
58fe7a87 SRV |
57 | /* |
58 | * The stack tracer looks for a maximum stack at each call from a function. It | |
59 | * registers a callback from ftrace, and in that callback it examines the stack | |
60 | * size. It determines the stack size from the variable passed in, which is the | |
61 | * address of a local variable in the stack_trace_call() callback function. | |
62 | * The stack size is calculated by the address of the local variable to the top | |
63 | * of the current stack. If that size is smaller than the currently saved max | |
64 | * stack size, nothing more is done. | |
65 | * | |
66 | * If the size of the stack is greater than the maximum recorded size, then the | |
67 | * following algorithm takes place. | |
68 | * | |
69 | * For architectures (like x86) that store the function's return address before | |
70 | * saving the function's local variables, the stack will look something like | |
71 | * this: | |
72 | * | |
73 | * [ top of stack ] | |
74 | * 0: sys call entry frame | |
75 | * 10: return addr to entry code | |
76 | * 11: start of sys_foo frame | |
77 | * 20: return addr to sys_foo | |
78 | * 21: start of kernel_func_bar frame | |
79 | * 30: return addr to kernel_func_bar | |
80 | * 31: [ do trace stack here ] | |
81 | * | |
82 | * The save_stack_trace() is called returning all the functions it finds in the | |
83 | * current stack. Which would be (from the bottom of the stack to the top): | |
84 | * | |
85 | * return addr to kernel_func_bar | |
86 | * return addr to sys_foo | |
87 | * return addr to entry code | |
88 | * | |
89 | * Now to figure out how much each of these functions' local variable size is, | |
90 | * a search of the stack is made to find these values. When a match is made, it | |
91 | * is added to the stack_dump_trace[] array. The offset into the stack is saved | |
92 | * in the stack_trace_index[] array. The above example would show: | |
93 | * | |
94 | * stack_dump_trace[] | stack_trace_index[] | |
95 | * ------------------ + ------------------- | |
96 | * return addr to kernel_func_bar | 30 | |
97 | * return addr to sys_foo | 20 | |
98 | * return addr to entry | 10 | |
99 | * | |
100 | * The print_max_stack() function above, uses these values to print the size of | |
101 | * each function's portion of the stack. | |
102 | * | |
103 | * for (i = 0; i < nr_entries; i++) { | |
104 | * size = i == nr_entries - 1 ? stack_trace_index[i] : | |
105 | * stack_trace_index[i] - stack_trace_index[i+1] | |
106 | * print "%d %d %d %s\n", i, stack_trace_index[i], size, stack_dump_trace[i]); | |
107 | * } | |
108 | * | |
109 | * The above shows | |
110 | * | |
111 | * depth size location | |
112 | * ----- ---- -------- | |
113 | * 0 30 10 kernel_func_bar | |
114 | * 1 20 10 sys_foo | |
115 | * 2 10 10 entry code | |
116 | * | |
117 | * Now for architectures that might save the return address after the functions | |
118 | * local variables (saving the link register before calling nested functions), | |
119 | * this will cause the stack to look a little different: | |
120 | * | |
121 | * [ top of stack ] | |
122 | * 0: sys call entry frame | |
123 | * 10: start of sys_foo_frame | |
124 | * 19: return addr to entry code << lr saved before calling kernel_func_bar | |
125 | * 20: start of kernel_func_bar frame | |
126 | * 29: return addr to sys_foo_frame << lr saved before calling next function | |
127 | * 30: [ do trace stack here ] | |
128 | * | |
129 | * Although the functions returned by save_stack_trace() may be the same, the | |
130 | * placement in the stack will be different. Using the same algorithm as above | |
131 | * would yield: | |
132 | * | |
133 | * stack_dump_trace[] | stack_trace_index[] | |
134 | * ------------------ + ------------------- | |
135 | * return addr to kernel_func_bar | 30 | |
136 | * return addr to sys_foo | 29 | |
137 | * return addr to entry | 19 | |
138 | * | |
139 | * Where the mapping is off by one: | |
140 | * | |
141 | * kernel_func_bar stack frame size is 29 - 19 not 30 - 29! | |
142 | * | |
143 | * To fix this, if the architecture sets ARCH_RET_ADDR_AFTER_LOCAL_VARS the | |
144 | * values in stack_trace_index[] are shifted by one to and the number of | |
145 | * stack trace entries is decremented by one. | |
146 | * | |
147 | * stack_dump_trace[] | stack_trace_index[] | |
148 | * ------------------ + ------------------- | |
149 | * return addr to kernel_func_bar | 29 | |
150 | * return addr to sys_foo | 19 | |
151 | * | |
152 | * Although the entry function is not displayed, the first function (sys_foo) | |
153 | * will still include the stack size of it. | |
154 | */ | |
3d9a8072 | 155 | static void check_stack(unsigned long ip, unsigned long *stack) |
e5a81b62 | 156 | { |
e3172181 | 157 | unsigned long this_size, flags; unsigned long *p, *top, *start; |
4df29712 | 158 | static int tracer_frame; |
6aa7de05 | 159 | int frame_size = READ_ONCE(tracer_frame); |
72ac426a | 160 | int i, x; |
e5a81b62 | 161 | |
87889501 | 162 | this_size = ((unsigned long)stack) & (THREAD_SIZE-1); |
e5a81b62 | 163 | this_size = THREAD_SIZE - this_size; |
4df29712 SRRH |
164 | /* Remove the frame of the tracer */ |
165 | this_size -= frame_size; | |
e5a81b62 | 166 | |
bb99d8cc | 167 | if (this_size <= stack_trace_max_size) |
e5a81b62 SR |
168 | return; |
169 | ||
81520a1b | 170 | /* we do not handle interrupt stacks yet */ |
87889501 | 171 | if (!object_is_on_stack(stack)) |
81520a1b SR |
172 | return; |
173 | ||
1904be1b SRRH |
174 | /* Can't do this from NMI context (can cause deadlocks) */ |
175 | if (in_nmi()) | |
176 | return; | |
177 | ||
a5e25883 | 178 | local_irq_save(flags); |
d332736d | 179 | arch_spin_lock(&stack_trace_max_lock); |
e5a81b62 | 180 | |
4df29712 SRRH |
181 | /* In case another CPU set the tracer_frame on us */ |
182 | if (unlikely(!frame_size)) | |
183 | this_size -= tracer_frame; | |
184 | ||
e5a81b62 | 185 | /* a race could have already updated it */ |
bb99d8cc | 186 | if (this_size <= stack_trace_max_size) |
e5a81b62 SR |
187 | goto out; |
188 | ||
bb99d8cc | 189 | stack_trace_max_size = this_size; |
e5a81b62 | 190 | |
9f50c91b TG |
191 | stack_trace_nr_entries = stack_trace_save(stack_dump_trace, |
192 | ARRAY_SIZE(stack_dump_trace) - 1, | |
193 | 0); | |
e5a81b62 | 194 | |
72ac426a | 195 | /* Skip over the overhead of the stack tracer itself */ |
9f50c91b | 196 | for (i = 0; i < stack_trace_nr_entries; i++) { |
72ac426a SRRH |
197 | if (stack_dump_trace[i] == ip) |
198 | break; | |
199 | } | |
d4ecbfc4 | 200 | |
6ccd8371 SR |
201 | /* |
202 | * Some archs may not have the passed in ip in the dump. | |
203 | * If that happens, we need to show everything. | |
204 | */ | |
9f50c91b | 205 | if (i == stack_trace_nr_entries) |
6ccd8371 SR |
206 | i = 0; |
207 | ||
1b6cced6 SR |
208 | /* |
209 | * Now find where in the stack these are. | |
210 | */ | |
72ac426a | 211 | x = 0; |
87889501 | 212 | start = stack; |
1b6cced6 SR |
213 | top = (unsigned long *) |
214 | (((unsigned long)start & ~(THREAD_SIZE-1)) + THREAD_SIZE); | |
215 | ||
216 | /* | |
217 | * Loop through all the entries. One of the entries may | |
218 | * for some reason be missed on the stack, so we may | |
219 | * have to account for them. If they are all there, this | |
220 | * loop will only happen once. This code only takes place | |
221 | * on a new max, so it is far from a fast path. | |
222 | */ | |
9f50c91b | 223 | while (i < stack_trace_nr_entries) { |
0a37119d | 224 | int found = 0; |
1b6cced6 | 225 | |
bb99d8cc | 226 | stack_trace_index[x] = this_size; |
1b6cced6 SR |
227 | p = start; |
228 | ||
9f50c91b | 229 | for (; p < top && i < stack_trace_nr_entries; p++) { |
6e22c836 YS |
230 | /* |
231 | * The READ_ONCE_NOCHECK is used to let KASAN know that | |
232 | * this is not a stack-out-of-bounds error. | |
233 | */ | |
234 | if ((READ_ONCE_NOCHECK(*p)) == stack_dump_trace[i]) { | |
72ac426a | 235 | stack_dump_trace[x] = stack_dump_trace[i++]; |
bb99d8cc | 236 | this_size = stack_trace_index[x++] = |
1b6cced6 | 237 | (top - p) * sizeof(unsigned long); |
0a37119d | 238 | found = 1; |
1b6cced6 SR |
239 | /* Start the search from here */ |
240 | start = p + 1; | |
4df29712 SRRH |
241 | /* |
242 | * We do not want to show the overhead | |
243 | * of the stack tracer stack in the | |
244 | * max stack. If we haven't figured | |
245 | * out what that is, then figure it out | |
246 | * now. | |
247 | */ | |
72ac426a | 248 | if (unlikely(!tracer_frame)) { |
4df29712 SRRH |
249 | tracer_frame = (p - stack) * |
250 | sizeof(unsigned long); | |
bb99d8cc | 251 | stack_trace_max_size -= tracer_frame; |
4df29712 | 252 | } |
1b6cced6 SR |
253 | } |
254 | } | |
255 | ||
0a37119d SR |
256 | if (!found) |
257 | i++; | |
1b6cced6 SR |
258 | } |
259 | ||
f7edb451 SRV |
260 | #ifdef ARCH_FTRACE_SHIFT_STACK_TRACER |
261 | /* | |
262 | * Some archs will store the link register before calling | |
263 | * nested functions. This means the saved return address | |
264 | * comes after the local storage, and we need to shift | |
265 | * for that. | |
266 | */ | |
267 | if (x > 1) { | |
268 | memmove(&stack_trace_index[0], &stack_trace_index[1], | |
269 | sizeof(stack_trace_index[0]) * (x - 1)); | |
270 | x--; | |
271 | } | |
272 | #endif | |
273 | ||
9f50c91b | 274 | stack_trace_nr_entries = x; |
72ac426a | 275 | |
a70857e4 | 276 | if (task_stack_end_corrupted(current)) { |
3d9a8072 | 277 | print_max_stack(); |
e3172181 MK |
278 | BUG(); |
279 | } | |
280 | ||
e5a81b62 | 281 | out: |
d332736d | 282 | arch_spin_unlock(&stack_trace_max_lock); |
a5e25883 | 283 | local_irq_restore(flags); |
e5a81b62 SR |
284 | } |
285 | ||
b8299d36 SRV |
286 | /* Some archs may not define MCOUNT_INSN_SIZE */ |
287 | #ifndef MCOUNT_INSN_SIZE | |
288 | # define MCOUNT_INSN_SIZE 0 | |
289 | #endif | |
290 | ||
e5a81b62 | 291 | static void |
a1e2e31d | 292 | stack_trace_call(unsigned long ip, unsigned long parent_ip, |
d19ad077 | 293 | struct ftrace_ops *op, struct ftrace_regs *fregs) |
e5a81b62 | 294 | { |
87889501 | 295 | unsigned long stack; |
e5a81b62 | 296 | |
5168ae50 | 297 | preempt_disable_notrace(); |
e5a81b62 | 298 | |
e5a81b62 | 299 | /* no atomic needed, we only modify this variable by this cpu */ |
8aaf1ee7 SRV |
300 | __this_cpu_inc(disable_stack_tracer); |
301 | if (__this_cpu_read(disable_stack_tracer) != 1) | |
e5a81b62 SR |
302 | goto out; |
303 | ||
b00d607b SRV |
304 | /* If rcu is not watching, then save stack trace can fail */ |
305 | if (!rcu_is_watching()) | |
306 | goto out; | |
307 | ||
72ac426a | 308 | ip += MCOUNT_INSN_SIZE; |
4df29712 SRRH |
309 | |
310 | check_stack(ip, &stack); | |
e5a81b62 SR |
311 | |
312 | out: | |
8aaf1ee7 | 313 | __this_cpu_dec(disable_stack_tracer); |
e5a81b62 | 314 | /* prevent recursion in schedule */ |
5168ae50 | 315 | preempt_enable_notrace(); |
e5a81b62 SR |
316 | } |
317 | ||
318 | static struct ftrace_ops trace_ops __read_mostly = | |
319 | { | |
320 | .func = stack_trace_call, | |
321 | }; | |
322 | ||
323 | static ssize_t | |
324 | stack_max_size_read(struct file *filp, char __user *ubuf, | |
325 | size_t count, loff_t *ppos) | |
326 | { | |
327 | unsigned long *ptr = filp->private_data; | |
328 | char buf[64]; | |
329 | int r; | |
330 | ||
331 | r = snprintf(buf, sizeof(buf), "%ld\n", *ptr); | |
332 | if (r > sizeof(buf)) | |
333 | r = sizeof(buf); | |
334 | return simple_read_from_buffer(ubuf, count, ppos, buf, r); | |
335 | } | |
336 | ||
337 | static ssize_t | |
338 | stack_max_size_write(struct file *filp, const char __user *ubuf, | |
339 | size_t count, loff_t *ppos) | |
340 | { | |
341 | long *ptr = filp->private_data; | |
342 | unsigned long val, flags; | |
e5a81b62 SR |
343 | int ret; |
344 | ||
22fe9b54 PH |
345 | ret = kstrtoul_from_user(ubuf, count, 10, &val); |
346 | if (ret) | |
e5a81b62 SR |
347 | return ret; |
348 | ||
a5e25883 | 349 | local_irq_save(flags); |
4f48f8b7 LJ |
350 | |
351 | /* | |
352 | * In case we trace inside arch_spin_lock() or after (NMI), | |
353 | * we will cause circular lock, so we also need to increase | |
8aaf1ee7 | 354 | * the percpu disable_stack_tracer here. |
4f48f8b7 | 355 | */ |
8aaf1ee7 | 356 | __this_cpu_inc(disable_stack_tracer); |
4f48f8b7 | 357 | |
d332736d | 358 | arch_spin_lock(&stack_trace_max_lock); |
e5a81b62 | 359 | *ptr = val; |
d332736d | 360 | arch_spin_unlock(&stack_trace_max_lock); |
4f48f8b7 | 361 | |
8aaf1ee7 | 362 | __this_cpu_dec(disable_stack_tracer); |
a5e25883 | 363 | local_irq_restore(flags); |
e5a81b62 SR |
364 | |
365 | return count; | |
366 | } | |
367 | ||
f38f1d2a | 368 | static const struct file_operations stack_max_size_fops = { |
e5a81b62 SR |
369 | .open = tracing_open_generic, |
370 | .read = stack_max_size_read, | |
371 | .write = stack_max_size_write, | |
6038f373 | 372 | .llseek = default_llseek, |
e5a81b62 SR |
373 | }; |
374 | ||
375 | static void * | |
2fc5f0cf | 376 | __next(struct seq_file *m, loff_t *pos) |
e5a81b62 | 377 | { |
2fc5f0cf | 378 | long n = *pos - 1; |
e5a81b62 | 379 | |
9f50c91b | 380 | if (n >= stack_trace_nr_entries) |
e5a81b62 SR |
381 | return NULL; |
382 | ||
2fc5f0cf | 383 | m->private = (void *)n; |
1b6cced6 | 384 | return &m->private; |
e5a81b62 SR |
385 | } |
386 | ||
2fc5f0cf LZ |
387 | static void * |
388 | t_next(struct seq_file *m, void *v, loff_t *pos) | |
e5a81b62 | 389 | { |
2fc5f0cf LZ |
390 | (*pos)++; |
391 | return __next(m, pos); | |
392 | } | |
e5a81b62 | 393 | |
2fc5f0cf LZ |
394 | static void *t_start(struct seq_file *m, loff_t *pos) |
395 | { | |
e5a81b62 | 396 | local_irq_disable(); |
4f48f8b7 | 397 | |
8aaf1ee7 | 398 | __this_cpu_inc(disable_stack_tracer); |
4f48f8b7 | 399 | |
d332736d | 400 | arch_spin_lock(&stack_trace_max_lock); |
e5a81b62 | 401 | |
522a110b LW |
402 | if (*pos == 0) |
403 | return SEQ_START_TOKEN; | |
404 | ||
2fc5f0cf | 405 | return __next(m, pos); |
e5a81b62 SR |
406 | } |
407 | ||
408 | static void t_stop(struct seq_file *m, void *p) | |
409 | { | |
d332736d | 410 | arch_spin_unlock(&stack_trace_max_lock); |
4f48f8b7 | 411 | |
8aaf1ee7 | 412 | __this_cpu_dec(disable_stack_tracer); |
4f48f8b7 | 413 | |
e5a81b62 SR |
414 | local_irq_enable(); |
415 | } | |
416 | ||
962e3707 | 417 | static void trace_lookup_stack(struct seq_file *m, long i) |
e5a81b62 | 418 | { |
1b6cced6 | 419 | unsigned long addr = stack_dump_trace[i]; |
e5a81b62 | 420 | |
962e3707 | 421 | seq_printf(m, "%pS\n", (void *)addr); |
e5a81b62 SR |
422 | } |
423 | ||
e447e1df SR |
424 | static void print_disabled(struct seq_file *m) |
425 | { | |
426 | seq_puts(m, "#\n" | |
427 | "# Stack tracer disabled\n" | |
428 | "#\n" | |
429 | "# To enable the stack tracer, either add 'stacktrace' to the\n" | |
430 | "# kernel command line\n" | |
431 | "# or 'echo 1 > /proc/sys/kernel/stack_tracer_enabled'\n" | |
432 | "#\n"); | |
433 | } | |
434 | ||
e5a81b62 SR |
435 | static int t_show(struct seq_file *m, void *v) |
436 | { | |
522a110b | 437 | long i; |
1b6cced6 SR |
438 | int size; |
439 | ||
522a110b | 440 | if (v == SEQ_START_TOKEN) { |
eb1871f3 | 441 | seq_printf(m, " Depth Size Location" |
1b6cced6 | 442 | " (%d entries)\n" |
eb1871f3 | 443 | " ----- ---- --------\n", |
9f50c91b | 444 | stack_trace_nr_entries); |
e447e1df | 445 | |
bb99d8cc | 446 | if (!stack_tracer_enabled && !stack_trace_max_size) |
e447e1df SR |
447 | print_disabled(m); |
448 | ||
1b6cced6 SR |
449 | return 0; |
450 | } | |
e5a81b62 | 451 | |
522a110b LW |
452 | i = *(long *)v; |
453 | ||
9f50c91b | 454 | if (i >= stack_trace_nr_entries) |
e5a81b62 SR |
455 | return 0; |
456 | ||
9f50c91b | 457 | if (i + 1 == stack_trace_nr_entries) |
bb99d8cc | 458 | size = stack_trace_index[i]; |
1b6cced6 | 459 | else |
bb99d8cc | 460 | size = stack_trace_index[i] - stack_trace_index[i+1]; |
1b6cced6 | 461 | |
bb99d8cc | 462 | seq_printf(m, "%3ld) %8d %5d ", i, stack_trace_index[i], size); |
1b6cced6 SR |
463 | |
464 | trace_lookup_stack(m, i); | |
e5a81b62 SR |
465 | |
466 | return 0; | |
467 | } | |
468 | ||
f38f1d2a | 469 | static const struct seq_operations stack_trace_seq_ops = { |
e5a81b62 SR |
470 | .start = t_start, |
471 | .next = t_next, | |
472 | .stop = t_stop, | |
473 | .show = t_show, | |
474 | }; | |
475 | ||
476 | static int stack_trace_open(struct inode *inode, struct file *file) | |
477 | { | |
17911ff3 SRV |
478 | int ret; |
479 | ||
480 | ret = security_locked_down(LOCKDOWN_TRACEFS); | |
481 | if (ret) | |
482 | return ret; | |
483 | ||
d8cc1ab7 | 484 | return seq_open(file, &stack_trace_seq_ops); |
e5a81b62 SR |
485 | } |
486 | ||
f38f1d2a | 487 | static const struct file_operations stack_trace_fops = { |
e5a81b62 SR |
488 | .open = stack_trace_open, |
489 | .read = seq_read, | |
490 | .llseek = seq_lseek, | |
d8cc1ab7 | 491 | .release = seq_release, |
e5a81b62 SR |
492 | }; |
493 | ||
bbd1d27d SRV |
494 | #ifdef CONFIG_DYNAMIC_FTRACE |
495 | ||
d2d45c7a SR |
496 | static int |
497 | stack_trace_filter_open(struct inode *inode, struct file *file) | |
498 | { | |
0f179765 SRV |
499 | struct ftrace_ops *ops = inode->i_private; |
500 | ||
17911ff3 | 501 | /* Checks for tracefs lockdown */ |
0f179765 | 502 | return ftrace_regex_open(ops, FTRACE_ITER_FILTER, |
d2d45c7a SR |
503 | inode, file); |
504 | } | |
505 | ||
506 | static const struct file_operations stack_trace_filter_fops = { | |
507 | .open = stack_trace_filter_open, | |
508 | .read = seq_read, | |
509 | .write = ftrace_filter_write, | |
098c879e | 510 | .llseek = tracing_lseek, |
d2d45c7a SR |
511 | .release = ftrace_regex_release, |
512 | }; | |
513 | ||
bbd1d27d SRV |
514 | #endif /* CONFIG_DYNAMIC_FTRACE */ |
515 | ||
f38f1d2a | 516 | int |
7ff0d449 CH |
517 | stack_trace_sysctl(struct ctl_table *table, int write, void *buffer, |
518 | size_t *lenp, loff_t *ppos) | |
f38f1d2a | 519 | { |
3d9a8072 | 520 | int was_enabled; |
f38f1d2a SR |
521 | int ret; |
522 | ||
523 | mutex_lock(&stack_sysctl_mutex); | |
3d9a8072 | 524 | was_enabled = !!stack_tracer_enabled; |
f38f1d2a | 525 | |
8d65af78 | 526 | ret = proc_dointvec(table, write, buffer, lenp, ppos); |
f38f1d2a | 527 | |
3d9a8072 | 528 | if (ret || !write || (was_enabled == !!stack_tracer_enabled)) |
f38f1d2a SR |
529 | goto out; |
530 | ||
f38f1d2a SR |
531 | if (stack_tracer_enabled) |
532 | register_ftrace_function(&trace_ops); | |
533 | else | |
534 | unregister_ftrace_function(&trace_ops); | |
f38f1d2a SR |
535 | out: |
536 | mutex_unlock(&stack_sysctl_mutex); | |
537 | return ret; | |
538 | } | |
539 | ||
762e1207 SR |
540 | static char stack_trace_filter_buf[COMMAND_LINE_SIZE+1] __initdata; |
541 | ||
f38f1d2a SR |
542 | static __init int enable_stacktrace(char *str) |
543 | { | |
3d739c1f SRV |
544 | int len; |
545 | ||
546 | if ((len = str_has_prefix(str, "_filter="))) | |
547 | strncpy(stack_trace_filter_buf, str + len, COMMAND_LINE_SIZE); | |
762e1207 | 548 | |
e05a43b7 | 549 | stack_tracer_enabled = 1; |
f38f1d2a SR |
550 | return 1; |
551 | } | |
552 | __setup("stacktrace", enable_stacktrace); | |
553 | ||
e5a81b62 SR |
554 | static __init int stack_trace_init(void) |
555 | { | |
22c36b18 | 556 | int ret; |
e5a81b62 | 557 | |
22c36b18 WY |
558 | ret = tracing_init_dentry(); |
559 | if (ret) | |
ed6f1c99 | 560 | return 0; |
e5a81b62 | 561 | |
22c36b18 | 562 | trace_create_file("stack_max_size", 0644, NULL, |
bb99d8cc | 563 | &stack_trace_max_size, &stack_max_size_fops); |
e5a81b62 | 564 | |
22c36b18 | 565 | trace_create_file("stack_trace", 0444, NULL, |
5452af66 | 566 | NULL, &stack_trace_fops); |
e5a81b62 | 567 | |
bbd1d27d | 568 | #ifdef CONFIG_DYNAMIC_FTRACE |
22c36b18 | 569 | trace_create_file("stack_trace_filter", 0644, NULL, |
0f179765 | 570 | &trace_ops, &stack_trace_filter_fops); |
bbd1d27d | 571 | #endif |
d2d45c7a | 572 | |
762e1207 SR |
573 | if (stack_trace_filter_buf[0]) |
574 | ftrace_set_early_filter(&trace_ops, stack_trace_filter_buf, 1); | |
575 | ||
e05a43b7 | 576 | if (stack_tracer_enabled) |
f38f1d2a | 577 | register_ftrace_function(&trace_ops); |
e5a81b62 SR |
578 | |
579 | return 0; | |
580 | } | |
581 | ||
582 | device_initcall(stack_trace_init); |