tracing/kprobes: Don't pass addr=ip to perf_trace_buf_submit()
[deliverable/linux.git] / kernel / trace / ftrace.c
CommitLineData
16444a8a
ACM
1/*
2 * Infrastructure for profiling code inserted by 'gcc -pg'.
3 *
4 * Copyright (C) 2007-2008 Steven Rostedt <srostedt@redhat.com>
5 * Copyright (C) 2004-2008 Ingo Molnar <mingo@redhat.com>
6 *
7 * Originally ported from the -rt patch by:
8 * Copyright (C) 2007 Arnaldo Carvalho de Melo <acme@redhat.com>
9 *
10 * Based on code in the latency_tracer, that is:
11 *
12 * Copyright (C) 2004-2006 Ingo Molnar
6d49e352 13 * Copyright (C) 2004 Nadia Yvette Chambers
16444a8a
ACM
14 */
15
3d083395
SR
16#include <linux/stop_machine.h>
17#include <linux/clocksource.h>
18#include <linux/kallsyms.h>
5072c59f 19#include <linux/seq_file.h>
4a2b8dda 20#include <linux/suspend.h>
5072c59f 21#include <linux/debugfs.h>
3d083395 22#include <linux/hardirq.h>
2d8b820b 23#include <linux/kthread.h>
5072c59f 24#include <linux/uaccess.h>
5855fead 25#include <linux/bsearch.h>
56d82e00 26#include <linux/module.h>
2d8b820b 27#include <linux/ftrace.h>
b0fc494f 28#include <linux/sysctl.h>
5a0e3ad6 29#include <linux/slab.h>
5072c59f 30#include <linux/ctype.h>
68950619 31#include <linux/sort.h>
3d083395 32#include <linux/list.h>
59df055f 33#include <linux/hash.h>
3f379b03 34#include <linux/rcupdate.h>
3d083395 35
ad8d75ff 36#include <trace/events/sched.h>
8aef2d28 37
2af15d6a 38#include <asm/setup.h>
395a59d0 39
0706f1c4 40#include "trace_output.h"
bac429f0 41#include "trace_stat.h"
16444a8a 42
6912896e 43#define FTRACE_WARN_ON(cond) \
0778d9ad
SR
44 ({ \
45 int ___r = cond; \
46 if (WARN_ON(___r)) \
6912896e 47 ftrace_kill(); \
0778d9ad
SR
48 ___r; \
49 })
6912896e
SR
50
51#define FTRACE_WARN_ON_ONCE(cond) \
0778d9ad
SR
52 ({ \
53 int ___r = cond; \
54 if (WARN_ON_ONCE(___r)) \
6912896e 55 ftrace_kill(); \
0778d9ad
SR
56 ___r; \
57 })
6912896e 58
8fc0c701
SR
59/* hash bits for specific function selection */
60#define FTRACE_HASH_BITS 7
61#define FTRACE_FUNC_HASHSIZE (1 << FTRACE_HASH_BITS)
33dc9b12
SR
62#define FTRACE_HASH_DEFAULT_BITS 10
63#define FTRACE_HASH_MAX_BITS 12
8fc0c701 64
e248491a
JO
65#define FL_GLOBAL_CONTROL_MASK (FTRACE_OPS_FL_GLOBAL | FTRACE_OPS_FL_CONTROL)
66
f04f24fb
MH
67#ifdef CONFIG_DYNAMIC_FTRACE
68#define INIT_REGEX_LOCK(opsname) \
69 .regex_lock = __MUTEX_INITIALIZER(opsname.regex_lock),
70#else
71#define INIT_REGEX_LOCK(opsname)
72#endif
73
2f5f6ad9
SR
74static struct ftrace_ops ftrace_list_end __read_mostly = {
75 .func = ftrace_stub,
395b97a3 76 .flags = FTRACE_OPS_FL_RECURSION_SAFE | FTRACE_OPS_FL_STUB,
2f5f6ad9
SR
77};
78
4eebcc81
SR
79/* ftrace_enabled is a method to turn ftrace on or off */
80int ftrace_enabled __read_mostly;
d61f82d0 81static int last_ftrace_enabled;
b0fc494f 82
60a7ecf4 83/* Quick disabling of function tracer. */
2f5f6ad9
SR
84int function_trace_stop __read_mostly;
85
86/* Current function tracing op */
87struct ftrace_ops *function_trace_op __read_mostly = &ftrace_list_end;
60a7ecf4 88
756d17ee 89/* List for set_ftrace_pid's pids. */
90LIST_HEAD(ftrace_pids);
91struct ftrace_pid {
92 struct list_head list;
93 struct pid *pid;
94};
95
4eebcc81
SR
96/*
97 * ftrace_disabled is set when an anomaly is discovered.
98 * ftrace_disabled is much stronger than ftrace_enabled.
99 */
100static int ftrace_disabled __read_mostly;
101
52baf119 102static DEFINE_MUTEX(ftrace_lock);
b0fc494f 103
b848914c 104static struct ftrace_ops *ftrace_global_list __read_mostly = &ftrace_list_end;
e248491a 105static struct ftrace_ops *ftrace_control_list __read_mostly = &ftrace_list_end;
b848914c 106static struct ftrace_ops *ftrace_ops_list __read_mostly = &ftrace_list_end;
16444a8a 107ftrace_func_t ftrace_trace_function __read_mostly = ftrace_stub;
df4fc315 108ftrace_func_t ftrace_pid_function __read_mostly = ftrace_stub;
2b499381 109static struct ftrace_ops global_ops;
e248491a 110static struct ftrace_ops control_ops;
16444a8a 111
2f5f6ad9
SR
112#if ARCH_SUPPORTS_FTRACE_OPS
113static void ftrace_ops_list_func(unsigned long ip, unsigned long parent_ip,
a1e2e31d 114 struct ftrace_ops *op, struct pt_regs *regs);
2f5f6ad9
SR
115#else
116/* See comment below, where ftrace_ops_list_func is defined */
117static void ftrace_ops_no_ops(unsigned long ip, unsigned long parent_ip);
118#define ftrace_ops_list_func ((ftrace_func_t)ftrace_ops_no_ops)
119#endif
b848914c 120
0a016409
SR
121/*
122 * Traverse the ftrace_global_list, invoking all entries. The reason that we
1bb539ca 123 * can use rcu_dereference_raw_notrace() is that elements removed from this list
0a016409 124 * are simply leaked, so there is no need to interact with a grace-period
1bb539ca 125 * mechanism. The rcu_dereference_raw_notrace() calls are needed to handle
0a016409
SR
126 * concurrent insertions into the ftrace_global_list.
127 *
128 * Silly Alpha and silly pointer-speculation compiler optimizations!
129 */
130#define do_for_each_ftrace_op(op, list) \
1bb539ca 131 op = rcu_dereference_raw_notrace(list); \
0a016409
SR
132 do
133
134/*
135 * Optimized for just a single item in the list (as that is the normal case).
136 */
137#define while_for_each_ftrace_op(op) \
1bb539ca 138 while (likely(op = rcu_dereference_raw_notrace((op)->next)) && \
0a016409
SR
139 unlikely((op) != &ftrace_list_end))
140
f04f24fb
MH
141static inline void ftrace_ops_init(struct ftrace_ops *ops)
142{
143#ifdef CONFIG_DYNAMIC_FTRACE
144 if (!(ops->flags & FTRACE_OPS_FL_INITIALIZED)) {
145 mutex_init(&ops->regex_lock);
146 ops->flags |= FTRACE_OPS_FL_INITIALIZED;
147 }
148#endif
149}
150
ea701f11
SR
151/**
152 * ftrace_nr_registered_ops - return number of ops registered
153 *
154 * Returns the number of ftrace_ops registered and tracing functions
155 */
156int ftrace_nr_registered_ops(void)
157{
158 struct ftrace_ops *ops;
159 int cnt = 0;
160
161 mutex_lock(&ftrace_lock);
162
163 for (ops = ftrace_ops_list;
164 ops != &ftrace_list_end; ops = ops->next)
165 cnt++;
166
167 mutex_unlock(&ftrace_lock);
168
169 return cnt;
170}
171
2f5f6ad9
SR
172static void
173ftrace_global_list_func(unsigned long ip, unsigned long parent_ip,
a1e2e31d 174 struct ftrace_ops *op, struct pt_regs *regs)
16444a8a 175{
c29f122c
SR
176 int bit;
177
edc15caf
SR
178 bit = trace_test_and_set_recursion(TRACE_GLOBAL_START, TRACE_GLOBAL_MAX);
179 if (bit < 0)
b1cff0ad 180 return;
16444a8a 181
0a016409 182 do_for_each_ftrace_op(op, ftrace_global_list) {
a1e2e31d 183 op->func(ip, parent_ip, op, regs);
0a016409 184 } while_for_each_ftrace_op(op);
edc15caf
SR
185
186 trace_clear_recursion(bit);
16444a8a
ACM
187}
188
2f5f6ad9 189static void ftrace_pid_func(unsigned long ip, unsigned long parent_ip,
a1e2e31d 190 struct ftrace_ops *op, struct pt_regs *regs)
df4fc315 191{
0ef8cde5 192 if (!test_tsk_trace_trace(current))
df4fc315
SR
193 return;
194
a1e2e31d 195 ftrace_pid_function(ip, parent_ip, op, regs);
df4fc315
SR
196}
197
198static void set_ftrace_pid_function(ftrace_func_t func)
199{
200 /* do not set ftrace_pid_function to itself! */
201 if (func != ftrace_pid_func)
202 ftrace_pid_function = func;
203}
204
16444a8a 205/**
3d083395 206 * clear_ftrace_function - reset the ftrace function
16444a8a 207 *
3d083395
SR
208 * This NULLs the ftrace function and in essence stops
209 * tracing. There may be lag
16444a8a 210 */
3d083395 211void clear_ftrace_function(void)
16444a8a 212{
3d083395 213 ftrace_trace_function = ftrace_stub;
df4fc315 214 ftrace_pid_function = ftrace_stub;
3d083395
SR
215}
216
e248491a
JO
217static void control_ops_disable_all(struct ftrace_ops *ops)
218{
219 int cpu;
220
221 for_each_possible_cpu(cpu)
222 *per_cpu_ptr(ops->disabled, cpu) = 1;
223}
224
225static int control_ops_alloc(struct ftrace_ops *ops)
226{
227 int __percpu *disabled;
228
229 disabled = alloc_percpu(int);
230 if (!disabled)
231 return -ENOMEM;
232
233 ops->disabled = disabled;
234 control_ops_disable_all(ops);
235 return 0;
236}
237
238static void control_ops_free(struct ftrace_ops *ops)
239{
240 free_percpu(ops->disabled);
241}
242
2b499381 243static void update_global_ops(void)
491d0dcf
SR
244{
245 ftrace_func_t func;
246
247 /*
248 * If there's only one function registered, then call that
249 * function directly. Otherwise, we need to iterate over the
250 * registered callers.
251 */
b848914c 252 if (ftrace_global_list == &ftrace_list_end ||
63503794 253 ftrace_global_list->next == &ftrace_list_end) {
b848914c 254 func = ftrace_global_list->func;
63503794
SR
255 /*
256 * As we are calling the function directly.
257 * If it does not have recursion protection,
258 * the function_trace_op needs to be updated
259 * accordingly.
260 */
261 if (ftrace_global_list->flags & FTRACE_OPS_FL_RECURSION_SAFE)
262 global_ops.flags |= FTRACE_OPS_FL_RECURSION_SAFE;
263 else
264 global_ops.flags &= ~FTRACE_OPS_FL_RECURSION_SAFE;
265 } else {
b848914c 266 func = ftrace_global_list_func;
63503794
SR
267 /* The list has its own recursion protection. */
268 global_ops.flags |= FTRACE_OPS_FL_RECURSION_SAFE;
269 }
270
491d0dcf
SR
271
272 /* If we filter on pids, update to use the pid function */
273 if (!list_empty(&ftrace_pids)) {
274 set_ftrace_pid_function(func);
275 func = ftrace_pid_func;
276 }
2b499381
SR
277
278 global_ops.func = func;
279}
280
281static void update_ftrace_function(void)
282{
283 ftrace_func_t func;
284
285 update_global_ops();
286
cdbe61bf
SR
287 /*
288 * If we are at the end of the list and this ops is
4740974a
SR
289 * recursion safe and not dynamic and the arch supports passing ops,
290 * then have the mcount trampoline call the function directly.
cdbe61bf 291 */
b848914c 292 if (ftrace_ops_list == &ftrace_list_end ||
cdbe61bf 293 (ftrace_ops_list->next == &ftrace_list_end &&
2f5f6ad9 294 !(ftrace_ops_list->flags & FTRACE_OPS_FL_DYNAMIC) &&
4740974a 295 (ftrace_ops_list->flags & FTRACE_OPS_FL_RECURSION_SAFE) &&
ccf3672d 296 !FTRACE_FORCE_LIST_FUNC)) {
2f5f6ad9
SR
297 /* Set the ftrace_ops that the arch callback uses */
298 if (ftrace_ops_list == &global_ops)
299 function_trace_op = ftrace_global_list;
300 else
301 function_trace_op = ftrace_ops_list;
b848914c 302 func = ftrace_ops_list->func;
2f5f6ad9
SR
303 } else {
304 /* Just use the default ftrace_ops */
305 function_trace_op = &ftrace_list_end;
b848914c 306 func = ftrace_ops_list_func;
2f5f6ad9 307 }
2b499381 308
491d0dcf 309 ftrace_trace_function = func;
491d0dcf
SR
310}
311
2b499381 312static void add_ftrace_ops(struct ftrace_ops **list, struct ftrace_ops *ops)
3d083395 313{
2b499381 314 ops->next = *list;
16444a8a 315 /*
b848914c 316 * We are entering ops into the list but another
16444a8a
ACM
317 * CPU might be walking that list. We need to make sure
318 * the ops->next pointer is valid before another CPU sees
b848914c 319 * the ops pointer included into the list.
16444a8a 320 */
2b499381 321 rcu_assign_pointer(*list, ops);
16444a8a
ACM
322}
323
2b499381 324static int remove_ftrace_ops(struct ftrace_ops **list, struct ftrace_ops *ops)
16444a8a 325{
16444a8a 326 struct ftrace_ops **p;
16444a8a
ACM
327
328 /*
3d083395
SR
329 * If we are removing the last function, then simply point
330 * to the ftrace_stub.
16444a8a 331 */
2b499381
SR
332 if (*list == ops && ops->next == &ftrace_list_end) {
333 *list = &ftrace_list_end;
e6ea44e9 334 return 0;
16444a8a
ACM
335 }
336
2b499381 337 for (p = list; *p != &ftrace_list_end; p = &(*p)->next)
16444a8a
ACM
338 if (*p == ops)
339 break;
340
e6ea44e9
SR
341 if (*p != ops)
342 return -1;
16444a8a
ACM
343
344 *p = (*p)->next;
2b499381
SR
345 return 0;
346}
16444a8a 347
e248491a
JO
348static void add_ftrace_list_ops(struct ftrace_ops **list,
349 struct ftrace_ops *main_ops,
350 struct ftrace_ops *ops)
351{
352 int first = *list == &ftrace_list_end;
353 add_ftrace_ops(list, ops);
354 if (first)
355 add_ftrace_ops(&ftrace_ops_list, main_ops);
356}
357
358static int remove_ftrace_list_ops(struct ftrace_ops **list,
359 struct ftrace_ops *main_ops,
360 struct ftrace_ops *ops)
361{
362 int ret = remove_ftrace_ops(list, ops);
363 if (!ret && *list == &ftrace_list_end)
364 ret = remove_ftrace_ops(&ftrace_ops_list, main_ops);
365 return ret;
366}
367
2b499381
SR
368static int __register_ftrace_function(struct ftrace_ops *ops)
369{
8d240dd8 370 if (unlikely(ftrace_disabled))
2b499381
SR
371 return -ENODEV;
372
373 if (FTRACE_WARN_ON(ops == &global_ops))
374 return -EINVAL;
375
b848914c
SR
376 if (WARN_ON(ops->flags & FTRACE_OPS_FL_ENABLED))
377 return -EBUSY;
378
e248491a
JO
379 /* We don't support both control and global flags set. */
380 if ((ops->flags & FL_GLOBAL_CONTROL_MASK) == FL_GLOBAL_CONTROL_MASK)
381 return -EINVAL;
382
06aeaaea 383#ifndef CONFIG_DYNAMIC_FTRACE_WITH_REGS
08f6fba5
SR
384 /*
385 * If the ftrace_ops specifies SAVE_REGS, then it only can be used
386 * if the arch supports it, or SAVE_REGS_IF_SUPPORTED is also set.
387 * Setting SAVE_REGS_IF_SUPPORTED makes SAVE_REGS irrelevant.
388 */
389 if (ops->flags & FTRACE_OPS_FL_SAVE_REGS &&
390 !(ops->flags & FTRACE_OPS_FL_SAVE_REGS_IF_SUPPORTED))
391 return -EINVAL;
392
393 if (ops->flags & FTRACE_OPS_FL_SAVE_REGS_IF_SUPPORTED)
394 ops->flags |= FTRACE_OPS_FL_SAVE_REGS;
395#endif
396
cdbe61bf
SR
397 if (!core_kernel_data((unsigned long)ops))
398 ops->flags |= FTRACE_OPS_FL_DYNAMIC;
399
b848914c 400 if (ops->flags & FTRACE_OPS_FL_GLOBAL) {
e248491a 401 add_ftrace_list_ops(&ftrace_global_list, &global_ops, ops);
b848914c 402 ops->flags |= FTRACE_OPS_FL_ENABLED;
e248491a
JO
403 } else if (ops->flags & FTRACE_OPS_FL_CONTROL) {
404 if (control_ops_alloc(ops))
405 return -ENOMEM;
406 add_ftrace_list_ops(&ftrace_control_list, &control_ops, ops);
b848914c
SR
407 } else
408 add_ftrace_ops(&ftrace_ops_list, ops);
409
2b499381
SR
410 if (ftrace_enabled)
411 update_ftrace_function();
412
413 return 0;
414}
415
7614c3dc
SR
416static void ftrace_sync(struct work_struct *work)
417{
418 /*
419 * This function is just a stub to implement a hard force
420 * of synchronize_sched(). This requires synchronizing
421 * tasks even in userspace and idle.
422 *
423 * Yes, function tracing is rude.
424 */
425}
426
2b499381
SR
427static int __unregister_ftrace_function(struct ftrace_ops *ops)
428{
429 int ret;
430
431 if (ftrace_disabled)
432 return -ENODEV;
433
b848914c
SR
434 if (WARN_ON(!(ops->flags & FTRACE_OPS_FL_ENABLED)))
435 return -EBUSY;
436
2b499381
SR
437 if (FTRACE_WARN_ON(ops == &global_ops))
438 return -EINVAL;
439
b848914c 440 if (ops->flags & FTRACE_OPS_FL_GLOBAL) {
e248491a
JO
441 ret = remove_ftrace_list_ops(&ftrace_global_list,
442 &global_ops, ops);
b848914c
SR
443 if (!ret)
444 ops->flags &= ~FTRACE_OPS_FL_ENABLED;
e248491a
JO
445 } else if (ops->flags & FTRACE_OPS_FL_CONTROL) {
446 ret = remove_ftrace_list_ops(&ftrace_control_list,
447 &control_ops, ops);
448 if (!ret) {
449 /*
450 * The ftrace_ops is now removed from the list,
451 * so there'll be no new users. We must ensure
452 * all current users are done before we free
453 * the control data.
7614c3dc
SR
454 * Note synchronize_sched() is not enough, as we
455 * use preempt_disable() to do RCU, but the function
456 * tracer can be called where RCU is not active
457 * (before user_exit()).
e248491a 458 */
7614c3dc 459 schedule_on_each_cpu(ftrace_sync);
e248491a
JO
460 control_ops_free(ops);
461 }
b848914c
SR
462 } else
463 ret = remove_ftrace_ops(&ftrace_ops_list, ops);
464
2b499381
SR
465 if (ret < 0)
466 return ret;
b848914c 467
491d0dcf
SR
468 if (ftrace_enabled)
469 update_ftrace_function();
16444a8a 470
cdbe61bf
SR
471 /*
472 * Dynamic ops may be freed, we must make sure that all
473 * callers are done before leaving this function.
7614c3dc
SR
474 *
475 * Again, normal synchronize_sched() is not good enough.
476 * We need to do a hard force of sched synchronization.
cdbe61bf
SR
477 */
478 if (ops->flags & FTRACE_OPS_FL_DYNAMIC)
7614c3dc
SR
479 schedule_on_each_cpu(ftrace_sync);
480
cdbe61bf 481
e6ea44e9 482 return 0;
3d083395
SR
483}
484
df4fc315
SR
485static void ftrace_update_pid_func(void)
486{
491d0dcf 487 /* Only do something if we are tracing something */
df4fc315 488 if (ftrace_trace_function == ftrace_stub)
10dd3ebe 489 return;
df4fc315 490
491d0dcf 491 update_ftrace_function();
df4fc315
SR
492}
493
493762fc
SR
494#ifdef CONFIG_FUNCTION_PROFILER
495struct ftrace_profile {
496 struct hlist_node node;
497 unsigned long ip;
498 unsigned long counter;
0706f1c4
SR
499#ifdef CONFIG_FUNCTION_GRAPH_TRACER
500 unsigned long long time;
e330b3bc 501 unsigned long long time_squared;
0706f1c4 502#endif
8fc0c701
SR
503};
504
493762fc
SR
505struct ftrace_profile_page {
506 struct ftrace_profile_page *next;
507 unsigned long index;
508 struct ftrace_profile records[];
d61f82d0
SR
509};
510
cafb168a
SR
511struct ftrace_profile_stat {
512 atomic_t disabled;
513 struct hlist_head *hash;
514 struct ftrace_profile_page *pages;
515 struct ftrace_profile_page *start;
516 struct tracer_stat stat;
517};
518
493762fc
SR
519#define PROFILE_RECORDS_SIZE \
520 (PAGE_SIZE - offsetof(struct ftrace_profile_page, records))
5072c59f 521
493762fc
SR
522#define PROFILES_PER_PAGE \
523 (PROFILE_RECORDS_SIZE / sizeof(struct ftrace_profile))
3d083395 524
fb9fb015
SR
525static int ftrace_profile_enabled __read_mostly;
526
527/* ftrace_profile_lock - synchronize the enable and disable of the profiler */
bac429f0
SR
528static DEFINE_MUTEX(ftrace_profile_lock);
529
cafb168a 530static DEFINE_PER_CPU(struct ftrace_profile_stat, ftrace_profile_stats);
493762fc 531
20079ebe
NK
532#define FTRACE_PROFILE_HASH_BITS 10
533#define FTRACE_PROFILE_HASH_SIZE (1 << FTRACE_PROFILE_HASH_BITS)
493762fc 534
bac429f0
SR
535static void *
536function_stat_next(void *v, int idx)
537{
493762fc
SR
538 struct ftrace_profile *rec = v;
539 struct ftrace_profile_page *pg;
bac429f0 540
493762fc 541 pg = (struct ftrace_profile_page *)((unsigned long)rec & PAGE_MASK);
bac429f0
SR
542
543 again:
0296e425
LZ
544 if (idx != 0)
545 rec++;
546
bac429f0
SR
547 if ((void *)rec >= (void *)&pg->records[pg->index]) {
548 pg = pg->next;
549 if (!pg)
550 return NULL;
551 rec = &pg->records[0];
493762fc
SR
552 if (!rec->counter)
553 goto again;
bac429f0
SR
554 }
555
bac429f0
SR
556 return rec;
557}
558
559static void *function_stat_start(struct tracer_stat *trace)
560{
cafb168a
SR
561 struct ftrace_profile_stat *stat =
562 container_of(trace, struct ftrace_profile_stat, stat);
563
564 if (!stat || !stat->start)
565 return NULL;
566
567 return function_stat_next(&stat->start->records[0], 0);
bac429f0
SR
568}
569
0706f1c4
SR
570#ifdef CONFIG_FUNCTION_GRAPH_TRACER
571/* function graph compares on total time */
572static int function_stat_cmp(void *p1, void *p2)
573{
574 struct ftrace_profile *a = p1;
575 struct ftrace_profile *b = p2;
576
577 if (a->time < b->time)
578 return -1;
579 if (a->time > b->time)
580 return 1;
581 else
582 return 0;
583}
584#else
585/* not function graph compares against hits */
bac429f0
SR
586static int function_stat_cmp(void *p1, void *p2)
587{
493762fc
SR
588 struct ftrace_profile *a = p1;
589 struct ftrace_profile *b = p2;
bac429f0
SR
590
591 if (a->counter < b->counter)
592 return -1;
593 if (a->counter > b->counter)
594 return 1;
595 else
596 return 0;
597}
0706f1c4 598#endif
bac429f0
SR
599
600static int function_stat_headers(struct seq_file *m)
601{
0706f1c4 602#ifdef CONFIG_FUNCTION_GRAPH_TRACER
34886c8b 603 seq_printf(m, " Function "
e330b3bc 604 "Hit Time Avg s^2\n"
34886c8b 605 " -------- "
e330b3bc 606 "--- ---- --- ---\n");
0706f1c4 607#else
bac429f0
SR
608 seq_printf(m, " Function Hit\n"
609 " -------- ---\n");
0706f1c4 610#endif
bac429f0
SR
611 return 0;
612}
613
614static int function_stat_show(struct seq_file *m, void *v)
615{
493762fc 616 struct ftrace_profile *rec = v;
bac429f0 617 char str[KSYM_SYMBOL_LEN];
3aaba20f 618 int ret = 0;
0706f1c4 619#ifdef CONFIG_FUNCTION_GRAPH_TRACER
34886c8b
SR
620 static struct trace_seq s;
621 unsigned long long avg;
e330b3bc 622 unsigned long long stddev;
0706f1c4 623#endif
3aaba20f
LZ
624 mutex_lock(&ftrace_profile_lock);
625
626 /* we raced with function_profile_reset() */
627 if (unlikely(rec->counter == 0)) {
628 ret = -EBUSY;
629 goto out;
630 }
bac429f0
SR
631
632 kallsyms_lookup(rec->ip, NULL, NULL, NULL, str);
0706f1c4
SR
633 seq_printf(m, " %-30.30s %10lu", str, rec->counter);
634
635#ifdef CONFIG_FUNCTION_GRAPH_TRACER
636 seq_printf(m, " ");
34886c8b
SR
637 avg = rec->time;
638 do_div(avg, rec->counter);
639
e330b3bc
CD
640 /* Sample standard deviation (s^2) */
641 if (rec->counter <= 1)
642 stddev = 0;
643 else {
52d85d76
JL
644 /*
645 * Apply Welford's method:
646 * s^2 = 1 / (n * (n-1)) * (n * \Sum (x_i)^2 - (\Sum x_i)^2)
647 */
648 stddev = rec->counter * rec->time_squared -
649 rec->time * rec->time;
650
e330b3bc
CD
651 /*
652 * Divide only 1000 for ns^2 -> us^2 conversion.
653 * trace_print_graph_duration will divide 1000 again.
654 */
52d85d76 655 do_div(stddev, rec->counter * (rec->counter - 1) * 1000);
e330b3bc
CD
656 }
657
34886c8b
SR
658 trace_seq_init(&s);
659 trace_print_graph_duration(rec->time, &s);
660 trace_seq_puts(&s, " ");
661 trace_print_graph_duration(avg, &s);
e330b3bc
CD
662 trace_seq_puts(&s, " ");
663 trace_print_graph_duration(stddev, &s);
0706f1c4 664 trace_print_seq(m, &s);
0706f1c4
SR
665#endif
666 seq_putc(m, '\n');
3aaba20f
LZ
667out:
668 mutex_unlock(&ftrace_profile_lock);
bac429f0 669
3aaba20f 670 return ret;
bac429f0
SR
671}
672
cafb168a 673static void ftrace_profile_reset(struct ftrace_profile_stat *stat)
bac429f0 674{
493762fc 675 struct ftrace_profile_page *pg;
bac429f0 676
cafb168a 677 pg = stat->pages = stat->start;
bac429f0 678
493762fc
SR
679 while (pg) {
680 memset(pg->records, 0, PROFILE_RECORDS_SIZE);
681 pg->index = 0;
682 pg = pg->next;
bac429f0
SR
683 }
684
cafb168a 685 memset(stat->hash, 0,
493762fc
SR
686 FTRACE_PROFILE_HASH_SIZE * sizeof(struct hlist_head));
687}
bac429f0 688
cafb168a 689int ftrace_profile_pages_init(struct ftrace_profile_stat *stat)
493762fc
SR
690{
691 struct ftrace_profile_page *pg;
318e0a73
SR
692 int functions;
693 int pages;
493762fc 694 int i;
bac429f0 695
493762fc 696 /* If we already allocated, do nothing */
cafb168a 697 if (stat->pages)
493762fc 698 return 0;
bac429f0 699
cafb168a
SR
700 stat->pages = (void *)get_zeroed_page(GFP_KERNEL);
701 if (!stat->pages)
493762fc 702 return -ENOMEM;
bac429f0 703
318e0a73
SR
704#ifdef CONFIG_DYNAMIC_FTRACE
705 functions = ftrace_update_tot_cnt;
706#else
707 /*
708 * We do not know the number of functions that exist because
709 * dynamic tracing is what counts them. With past experience
710 * we have around 20K functions. That should be more than enough.
711 * It is highly unlikely we will execute every function in
712 * the kernel.
713 */
714 functions = 20000;
715#endif
716
cafb168a 717 pg = stat->start = stat->pages;
bac429f0 718
318e0a73
SR
719 pages = DIV_ROUND_UP(functions, PROFILES_PER_PAGE);
720
39e30cd1 721 for (i = 1; i < pages; i++) {
493762fc 722 pg->next = (void *)get_zeroed_page(GFP_KERNEL);
493762fc 723 if (!pg->next)
318e0a73 724 goto out_free;
493762fc
SR
725 pg = pg->next;
726 }
727
728 return 0;
318e0a73
SR
729
730 out_free:
731 pg = stat->start;
732 while (pg) {
733 unsigned long tmp = (unsigned long)pg;
734
735 pg = pg->next;
736 free_page(tmp);
737 }
738
318e0a73
SR
739 stat->pages = NULL;
740 stat->start = NULL;
741
742 return -ENOMEM;
bac429f0
SR
743}
744
cafb168a 745static int ftrace_profile_init_cpu(int cpu)
bac429f0 746{
cafb168a 747 struct ftrace_profile_stat *stat;
493762fc 748 int size;
bac429f0 749
cafb168a
SR
750 stat = &per_cpu(ftrace_profile_stats, cpu);
751
752 if (stat->hash) {
493762fc 753 /* If the profile is already created, simply reset it */
cafb168a 754 ftrace_profile_reset(stat);
493762fc
SR
755 return 0;
756 }
bac429f0 757
493762fc
SR
758 /*
759 * We are profiling all functions, but usually only a few thousand
760 * functions are hit. We'll make a hash of 1024 items.
761 */
762 size = FTRACE_PROFILE_HASH_SIZE;
bac429f0 763
cafb168a 764 stat->hash = kzalloc(sizeof(struct hlist_head) * size, GFP_KERNEL);
493762fc 765
cafb168a 766 if (!stat->hash)
493762fc
SR
767 return -ENOMEM;
768
318e0a73 769 /* Preallocate the function profiling pages */
cafb168a
SR
770 if (ftrace_profile_pages_init(stat) < 0) {
771 kfree(stat->hash);
772 stat->hash = NULL;
493762fc
SR
773 return -ENOMEM;
774 }
775
776 return 0;
bac429f0
SR
777}
778
cafb168a
SR
779static int ftrace_profile_init(void)
780{
781 int cpu;
782 int ret = 0;
783
784 for_each_online_cpu(cpu) {
785 ret = ftrace_profile_init_cpu(cpu);
786 if (ret)
787 break;
788 }
789
790 return ret;
791}
792
493762fc 793/* interrupts must be disabled */
cafb168a
SR
794static struct ftrace_profile *
795ftrace_find_profiled_func(struct ftrace_profile_stat *stat, unsigned long ip)
bac429f0 796{
493762fc 797 struct ftrace_profile *rec;
bac429f0 798 struct hlist_head *hhd;
bac429f0
SR
799 unsigned long key;
800
20079ebe 801 key = hash_long(ip, FTRACE_PROFILE_HASH_BITS);
cafb168a 802 hhd = &stat->hash[key];
bac429f0
SR
803
804 if (hlist_empty(hhd))
805 return NULL;
806
1bb539ca 807 hlist_for_each_entry_rcu_notrace(rec, hhd, node) {
bac429f0 808 if (rec->ip == ip)
493762fc
SR
809 return rec;
810 }
811
812 return NULL;
813}
814
cafb168a
SR
815static void ftrace_add_profile(struct ftrace_profile_stat *stat,
816 struct ftrace_profile *rec)
493762fc
SR
817{
818 unsigned long key;
819
20079ebe 820 key = hash_long(rec->ip, FTRACE_PROFILE_HASH_BITS);
cafb168a 821 hlist_add_head_rcu(&rec->node, &stat->hash[key]);
493762fc
SR
822}
823
318e0a73
SR
824/*
825 * The memory is already allocated, this simply finds a new record to use.
826 */
493762fc 827static struct ftrace_profile *
318e0a73 828ftrace_profile_alloc(struct ftrace_profile_stat *stat, unsigned long ip)
493762fc
SR
829{
830 struct ftrace_profile *rec = NULL;
831
318e0a73 832 /* prevent recursion (from NMIs) */
cafb168a 833 if (atomic_inc_return(&stat->disabled) != 1)
493762fc
SR
834 goto out;
835
493762fc 836 /*
318e0a73
SR
837 * Try to find the function again since an NMI
838 * could have added it
493762fc 839 */
cafb168a 840 rec = ftrace_find_profiled_func(stat, ip);
493762fc 841 if (rec)
cafb168a 842 goto out;
493762fc 843
cafb168a
SR
844 if (stat->pages->index == PROFILES_PER_PAGE) {
845 if (!stat->pages->next)
846 goto out;
847 stat->pages = stat->pages->next;
bac429f0 848 }
493762fc 849
cafb168a 850 rec = &stat->pages->records[stat->pages->index++];
493762fc 851 rec->ip = ip;
cafb168a 852 ftrace_add_profile(stat, rec);
493762fc 853
bac429f0 854 out:
cafb168a 855 atomic_dec(&stat->disabled);
bac429f0
SR
856
857 return rec;
858}
859
860static void
2f5f6ad9 861function_profile_call(unsigned long ip, unsigned long parent_ip,
a1e2e31d 862 struct ftrace_ops *ops, struct pt_regs *regs)
bac429f0 863{
cafb168a 864 struct ftrace_profile_stat *stat;
493762fc 865 struct ftrace_profile *rec;
bac429f0
SR
866 unsigned long flags;
867
868 if (!ftrace_profile_enabled)
869 return;
870
871 local_irq_save(flags);
cafb168a
SR
872
873 stat = &__get_cpu_var(ftrace_profile_stats);
0f6ce3de 874 if (!stat->hash || !ftrace_profile_enabled)
cafb168a
SR
875 goto out;
876
877 rec = ftrace_find_profiled_func(stat, ip);
493762fc 878 if (!rec) {
318e0a73 879 rec = ftrace_profile_alloc(stat, ip);
493762fc
SR
880 if (!rec)
881 goto out;
882 }
bac429f0
SR
883
884 rec->counter++;
885 out:
886 local_irq_restore(flags);
887}
888
0706f1c4
SR
889#ifdef CONFIG_FUNCTION_GRAPH_TRACER
890static int profile_graph_entry(struct ftrace_graph_ent *trace)
891{
a1e2e31d 892 function_profile_call(trace->func, 0, NULL, NULL);
0706f1c4
SR
893 return 1;
894}
895
896static void profile_graph_return(struct ftrace_graph_ret *trace)
897{
cafb168a 898 struct ftrace_profile_stat *stat;
a2a16d6a 899 unsigned long long calltime;
0706f1c4 900 struct ftrace_profile *rec;
cafb168a 901 unsigned long flags;
0706f1c4
SR
902
903 local_irq_save(flags);
cafb168a 904 stat = &__get_cpu_var(ftrace_profile_stats);
0f6ce3de 905 if (!stat->hash || !ftrace_profile_enabled)
cafb168a
SR
906 goto out;
907
37e44bc5
SR
908 /* If the calltime was zero'd ignore it */
909 if (!trace->calltime)
910 goto out;
911
a2a16d6a
SR
912 calltime = trace->rettime - trace->calltime;
913
914 if (!(trace_flags & TRACE_ITER_GRAPH_TIME)) {
915 int index;
916
917 index = trace->depth;
918
919 /* Append this call time to the parent time to subtract */
920 if (index)
921 current->ret_stack[index - 1].subtime += calltime;
922
923 if (current->ret_stack[index].subtime < calltime)
924 calltime -= current->ret_stack[index].subtime;
925 else
926 calltime = 0;
927 }
928
cafb168a 929 rec = ftrace_find_profiled_func(stat, trace->func);
e330b3bc 930 if (rec) {
a2a16d6a 931 rec->time += calltime;
e330b3bc
CD
932 rec->time_squared += calltime * calltime;
933 }
a2a16d6a 934
cafb168a 935 out:
0706f1c4
SR
936 local_irq_restore(flags);
937}
938
939static int register_ftrace_profiler(void)
940{
941 return register_ftrace_graph(&profile_graph_return,
942 &profile_graph_entry);
943}
944
945static void unregister_ftrace_profiler(void)
946{
947 unregister_ftrace_graph();
948}
949#else
bd38c0e6 950static struct ftrace_ops ftrace_profile_ops __read_mostly = {
fb9fb015 951 .func = function_profile_call,
f04f24fb
MH
952 .flags = FTRACE_OPS_FL_RECURSION_SAFE | FTRACE_OPS_FL_INITIALIZED,
953 INIT_REGEX_LOCK(ftrace_profile_ops)
bac429f0
SR
954};
955
0706f1c4
SR
956static int register_ftrace_profiler(void)
957{
958 return register_ftrace_function(&ftrace_profile_ops);
959}
960
961static void unregister_ftrace_profiler(void)
962{
963 unregister_ftrace_function(&ftrace_profile_ops);
964}
965#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
966
bac429f0
SR
967static ssize_t
968ftrace_profile_write(struct file *filp, const char __user *ubuf,
969 size_t cnt, loff_t *ppos)
970{
971 unsigned long val;
bac429f0
SR
972 int ret;
973
22fe9b54
PH
974 ret = kstrtoul_from_user(ubuf, cnt, 10, &val);
975 if (ret)
bac429f0
SR
976 return ret;
977
978 val = !!val;
979
980 mutex_lock(&ftrace_profile_lock);
981 if (ftrace_profile_enabled ^ val) {
982 if (val) {
493762fc
SR
983 ret = ftrace_profile_init();
984 if (ret < 0) {
985 cnt = ret;
986 goto out;
987 }
988
0706f1c4
SR
989 ret = register_ftrace_profiler();
990 if (ret < 0) {
991 cnt = ret;
992 goto out;
993 }
bac429f0
SR
994 ftrace_profile_enabled = 1;
995 } else {
996 ftrace_profile_enabled = 0;
0f6ce3de
SR
997 /*
998 * unregister_ftrace_profiler calls stop_machine
999 * so this acts like an synchronize_sched.
1000 */
0706f1c4 1001 unregister_ftrace_profiler();
bac429f0
SR
1002 }
1003 }
493762fc 1004 out:
bac429f0
SR
1005 mutex_unlock(&ftrace_profile_lock);
1006
cf8517cf 1007 *ppos += cnt;
bac429f0
SR
1008
1009 return cnt;
1010}
1011
493762fc
SR
1012static ssize_t
1013ftrace_profile_read(struct file *filp, char __user *ubuf,
1014 size_t cnt, loff_t *ppos)
1015{
fb9fb015 1016 char buf[64]; /* big enough to hold a number */
493762fc
SR
1017 int r;
1018
1019 r = sprintf(buf, "%u\n", ftrace_profile_enabled);
1020 return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
1021}
1022
bac429f0
SR
1023static const struct file_operations ftrace_profile_fops = {
1024 .open = tracing_open_generic,
1025 .read = ftrace_profile_read,
1026 .write = ftrace_profile_write,
6038f373 1027 .llseek = default_llseek,
bac429f0
SR
1028};
1029
cafb168a
SR
1030/* used to initialize the real stat files */
1031static struct tracer_stat function_stats __initdata = {
fb9fb015
SR
1032 .name = "functions",
1033 .stat_start = function_stat_start,
1034 .stat_next = function_stat_next,
1035 .stat_cmp = function_stat_cmp,
1036 .stat_headers = function_stat_headers,
1037 .stat_show = function_stat_show
cafb168a
SR
1038};
1039
6ab5d668 1040static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
bac429f0 1041{
cafb168a 1042 struct ftrace_profile_stat *stat;
bac429f0 1043 struct dentry *entry;
cafb168a 1044 char *name;
bac429f0 1045 int ret;
cafb168a
SR
1046 int cpu;
1047
1048 for_each_possible_cpu(cpu) {
1049 stat = &per_cpu(ftrace_profile_stats, cpu);
1050
1051 /* allocate enough for function name + cpu number */
1052 name = kmalloc(32, GFP_KERNEL);
1053 if (!name) {
1054 /*
1055 * The files created are permanent, if something happens
1056 * we still do not free memory.
1057 */
cafb168a
SR
1058 WARN(1,
1059 "Could not allocate stat file for cpu %d\n",
1060 cpu);
1061 return;
1062 }
1063 stat->stat = function_stats;
1064 snprintf(name, 32, "function%d", cpu);
1065 stat->stat.name = name;
1066 ret = register_stat_tracer(&stat->stat);
1067 if (ret) {
1068 WARN(1,
1069 "Could not register function stat for cpu %d\n",
1070 cpu);
1071 kfree(name);
1072 return;
1073 }
bac429f0
SR
1074 }
1075
1076 entry = debugfs_create_file("function_profile_enabled", 0644,
1077 d_tracer, NULL, &ftrace_profile_fops);
1078 if (!entry)
1079 pr_warning("Could not create debugfs "
1080 "'function_profile_enabled' entry\n");
1081}
1082
bac429f0 1083#else /* CONFIG_FUNCTION_PROFILER */
6ab5d668 1084static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
bac429f0
SR
1085{
1086}
bac429f0
SR
1087#endif /* CONFIG_FUNCTION_PROFILER */
1088
493762fc
SR
1089static struct pid * const ftrace_swapper_pid = &init_struct_pid;
1090
7f49ef69
SRRH
1091loff_t
1092ftrace_filter_lseek(struct file *file, loff_t offset, int whence)
1093{
1094 loff_t ret;
1095
1096 if (file->f_mode & FMODE_READ)
1097 ret = seq_lseek(file, offset, whence);
1098 else
1099 file->f_pos = ret = 1;
1100
1101 return ret;
1102}
1103
493762fc
SR
1104#ifdef CONFIG_DYNAMIC_FTRACE
1105
1106#ifndef CONFIG_FTRACE_MCOUNT_RECORD
1107# error Dynamic ftrace depends on MCOUNT_RECORD
1108#endif
1109
1110static struct hlist_head ftrace_func_hash[FTRACE_FUNC_HASHSIZE] __read_mostly;
1111
1112struct ftrace_func_probe {
1113 struct hlist_node node;
1114 struct ftrace_probe_ops *ops;
1115 unsigned long flags;
1116 unsigned long ip;
1117 void *data;
7818b388 1118 struct list_head free_list;
493762fc
SR
1119};
1120
b448c4e3
SR
1121struct ftrace_func_entry {
1122 struct hlist_node hlist;
1123 unsigned long ip;
1124};
1125
1126struct ftrace_hash {
1127 unsigned long size_bits;
1128 struct hlist_head *buckets;
1129 unsigned long count;
07fd5515 1130 struct rcu_head rcu;
b448c4e3
SR
1131};
1132
33dc9b12
SR
1133/*
1134 * We make these constant because no one should touch them,
1135 * but they are used as the default "empty hash", to avoid allocating
1136 * it all the time. These are in a read only section such that if
1137 * anyone does try to modify it, it will cause an exception.
1138 */
1139static const struct hlist_head empty_buckets[1];
1140static const struct ftrace_hash empty_hash = {
1141 .buckets = (struct hlist_head *)empty_buckets,
1cf41dd7 1142};
33dc9b12 1143#define EMPTY_HASH ((struct ftrace_hash *)&empty_hash)
493762fc 1144
2b499381 1145static struct ftrace_ops global_ops = {
f45948e8 1146 .func = ftrace_stub,
33dc9b12
SR
1147 .notrace_hash = EMPTY_HASH,
1148 .filter_hash = EMPTY_HASH,
f04f24fb
MH
1149 .flags = FTRACE_OPS_FL_RECURSION_SAFE | FTRACE_OPS_FL_INITIALIZED,
1150 INIT_REGEX_LOCK(global_ops)
f45948e8
SR
1151};
1152
493762fc
SR
1153struct ftrace_page {
1154 struct ftrace_page *next;
a7900875 1155 struct dyn_ftrace *records;
493762fc 1156 int index;
a7900875 1157 int size;
493762fc
SR
1158};
1159
85ae32ae
SR
1160static struct ftrace_page *ftrace_new_pgs;
1161
a7900875
SR
1162#define ENTRY_SIZE sizeof(struct dyn_ftrace)
1163#define ENTRIES_PER_PAGE (PAGE_SIZE / ENTRY_SIZE)
493762fc
SR
1164
1165/* estimate from running different kernels */
1166#define NR_TO_INIT 10000
1167
1168static struct ftrace_page *ftrace_pages_start;
1169static struct ftrace_page *ftrace_pages;
1170
06a51d93
SR
1171static bool ftrace_hash_empty(struct ftrace_hash *hash)
1172{
1173 return !hash || !hash->count;
1174}
1175
b448c4e3
SR
1176static struct ftrace_func_entry *
1177ftrace_lookup_ip(struct ftrace_hash *hash, unsigned long ip)
1178{
1179 unsigned long key;
1180 struct ftrace_func_entry *entry;
1181 struct hlist_head *hhd;
b448c4e3 1182
06a51d93 1183 if (ftrace_hash_empty(hash))
b448c4e3
SR
1184 return NULL;
1185
1186 if (hash->size_bits > 0)
1187 key = hash_long(ip, hash->size_bits);
1188 else
1189 key = 0;
1190
1191 hhd = &hash->buckets[key];
1192
1bb539ca 1193 hlist_for_each_entry_rcu_notrace(entry, hhd, hlist) {
b448c4e3
SR
1194 if (entry->ip == ip)
1195 return entry;
1196 }
1197 return NULL;
1198}
1199
33dc9b12
SR
1200static void __add_hash_entry(struct ftrace_hash *hash,
1201 struct ftrace_func_entry *entry)
b448c4e3 1202{
b448c4e3
SR
1203 struct hlist_head *hhd;
1204 unsigned long key;
1205
b448c4e3 1206 if (hash->size_bits)
33dc9b12 1207 key = hash_long(entry->ip, hash->size_bits);
b448c4e3
SR
1208 else
1209 key = 0;
1210
b448c4e3
SR
1211 hhd = &hash->buckets[key];
1212 hlist_add_head(&entry->hlist, hhd);
1213 hash->count++;
33dc9b12
SR
1214}
1215
1216static int add_hash_entry(struct ftrace_hash *hash, unsigned long ip)
1217{
1218 struct ftrace_func_entry *entry;
1219
1220 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
1221 if (!entry)
1222 return -ENOMEM;
1223
1224 entry->ip = ip;
1225 __add_hash_entry(hash, entry);
b448c4e3
SR
1226
1227 return 0;
1228}
1229
1230static void
33dc9b12 1231free_hash_entry(struct ftrace_hash *hash,
b448c4e3
SR
1232 struct ftrace_func_entry *entry)
1233{
1234 hlist_del(&entry->hlist);
1235 kfree(entry);
1236 hash->count--;
1237}
1238
33dc9b12
SR
1239static void
1240remove_hash_entry(struct ftrace_hash *hash,
1241 struct ftrace_func_entry *entry)
1242{
1243 hlist_del(&entry->hlist);
1244 hash->count--;
1245}
1246
b448c4e3
SR
1247static void ftrace_hash_clear(struct ftrace_hash *hash)
1248{
1249 struct hlist_head *hhd;
b67bfe0d 1250 struct hlist_node *tn;
b448c4e3
SR
1251 struct ftrace_func_entry *entry;
1252 int size = 1 << hash->size_bits;
1253 int i;
1254
33dc9b12
SR
1255 if (!hash->count)
1256 return;
1257
b448c4e3
SR
1258 for (i = 0; i < size; i++) {
1259 hhd = &hash->buckets[i];
b67bfe0d 1260 hlist_for_each_entry_safe(entry, tn, hhd, hlist)
33dc9b12 1261 free_hash_entry(hash, entry);
b448c4e3
SR
1262 }
1263 FTRACE_WARN_ON(hash->count);
1264}
1265
33dc9b12
SR
1266static void free_ftrace_hash(struct ftrace_hash *hash)
1267{
1268 if (!hash || hash == EMPTY_HASH)
1269 return;
1270 ftrace_hash_clear(hash);
1271 kfree(hash->buckets);
1272 kfree(hash);
1273}
1274
07fd5515
SR
1275static void __free_ftrace_hash_rcu(struct rcu_head *rcu)
1276{
1277 struct ftrace_hash *hash;
1278
1279 hash = container_of(rcu, struct ftrace_hash, rcu);
1280 free_ftrace_hash(hash);
1281}
1282
1283static void free_ftrace_hash_rcu(struct ftrace_hash *hash)
1284{
1285 if (!hash || hash == EMPTY_HASH)
1286 return;
1287 call_rcu_sched(&hash->rcu, __free_ftrace_hash_rcu);
1288}
1289
5500fa51
JO
1290void ftrace_free_filter(struct ftrace_ops *ops)
1291{
f04f24fb 1292 ftrace_ops_init(ops);
5500fa51
JO
1293 free_ftrace_hash(ops->filter_hash);
1294 free_ftrace_hash(ops->notrace_hash);
1295}
1296
33dc9b12
SR
1297static struct ftrace_hash *alloc_ftrace_hash(int size_bits)
1298{
1299 struct ftrace_hash *hash;
1300 int size;
1301
1302 hash = kzalloc(sizeof(*hash), GFP_KERNEL);
1303 if (!hash)
1304 return NULL;
1305
1306 size = 1 << size_bits;
47b0edcb 1307 hash->buckets = kcalloc(size, sizeof(*hash->buckets), GFP_KERNEL);
33dc9b12
SR
1308
1309 if (!hash->buckets) {
1310 kfree(hash);
1311 return NULL;
1312 }
1313
1314 hash->size_bits = size_bits;
1315
1316 return hash;
1317}
1318
1319static struct ftrace_hash *
1320alloc_and_copy_ftrace_hash(int size_bits, struct ftrace_hash *hash)
1321{
1322 struct ftrace_func_entry *entry;
1323 struct ftrace_hash *new_hash;
33dc9b12
SR
1324 int size;
1325 int ret;
1326 int i;
1327
1328 new_hash = alloc_ftrace_hash(size_bits);
1329 if (!new_hash)
1330 return NULL;
1331
1332 /* Empty hash? */
06a51d93 1333 if (ftrace_hash_empty(hash))
33dc9b12
SR
1334 return new_hash;
1335
1336 size = 1 << hash->size_bits;
1337 for (i = 0; i < size; i++) {
b67bfe0d 1338 hlist_for_each_entry(entry, &hash->buckets[i], hlist) {
33dc9b12
SR
1339 ret = add_hash_entry(new_hash, entry->ip);
1340 if (ret < 0)
1341 goto free_hash;
1342 }
1343 }
1344
1345 FTRACE_WARN_ON(new_hash->count != hash->count);
1346
1347 return new_hash;
1348
1349 free_hash:
1350 free_ftrace_hash(new_hash);
1351 return NULL;
1352}
1353
41fb61c2
SR
1354static void
1355ftrace_hash_rec_disable(struct ftrace_ops *ops, int filter_hash);
1356static void
1357ftrace_hash_rec_enable(struct ftrace_ops *ops, int filter_hash);
1358
33dc9b12 1359static int
41fb61c2
SR
1360ftrace_hash_move(struct ftrace_ops *ops, int enable,
1361 struct ftrace_hash **dst, struct ftrace_hash *src)
33dc9b12
SR
1362{
1363 struct ftrace_func_entry *entry;
b67bfe0d 1364 struct hlist_node *tn;
33dc9b12 1365 struct hlist_head *hhd;
07fd5515
SR
1366 struct ftrace_hash *old_hash;
1367 struct ftrace_hash *new_hash;
33dc9b12
SR
1368 int size = src->count;
1369 int bits = 0;
41fb61c2 1370 int ret;
33dc9b12
SR
1371 int i;
1372
41fb61c2
SR
1373 /*
1374 * Remove the current set, update the hash and add
1375 * them back.
1376 */
1377 ftrace_hash_rec_disable(ops, enable);
1378
33dc9b12
SR
1379 /*
1380 * If the new source is empty, just free dst and assign it
1381 * the empty_hash.
1382 */
1383 if (!src->count) {
07fd5515
SR
1384 free_ftrace_hash_rcu(*dst);
1385 rcu_assign_pointer(*dst, EMPTY_HASH);
d4d34b98
SR
1386 /* still need to update the function records */
1387 ret = 0;
1388 goto out;
33dc9b12
SR
1389 }
1390
33dc9b12
SR
1391 /*
1392 * Make the hash size about 1/2 the # found
1393 */
1394 for (size /= 2; size; size >>= 1)
1395 bits++;
1396
1397 /* Don't allocate too much */
1398 if (bits > FTRACE_HASH_MAX_BITS)
1399 bits = FTRACE_HASH_MAX_BITS;
1400
41fb61c2 1401 ret = -ENOMEM;
07fd5515
SR
1402 new_hash = alloc_ftrace_hash(bits);
1403 if (!new_hash)
41fb61c2 1404 goto out;
33dc9b12
SR
1405
1406 size = 1 << src->size_bits;
1407 for (i = 0; i < size; i++) {
1408 hhd = &src->buckets[i];
b67bfe0d 1409 hlist_for_each_entry_safe(entry, tn, hhd, hlist) {
33dc9b12 1410 remove_hash_entry(src, entry);
07fd5515 1411 __add_hash_entry(new_hash, entry);
33dc9b12
SR
1412 }
1413 }
1414
07fd5515
SR
1415 old_hash = *dst;
1416 rcu_assign_pointer(*dst, new_hash);
1417 free_ftrace_hash_rcu(old_hash);
1418
41fb61c2
SR
1419 ret = 0;
1420 out:
1421 /*
1422 * Enable regardless of ret:
1423 * On success, we enable the new hash.
1424 * On failure, we re-enable the original hash.
1425 */
1426 ftrace_hash_rec_enable(ops, enable);
1427
1428 return ret;
33dc9b12
SR
1429}
1430
b848914c
SR
1431/*
1432 * Test the hashes for this ops to see if we want to call
1433 * the ops->func or not.
1434 *
1435 * It's a match if the ip is in the ops->filter_hash or
1436 * the filter_hash does not exist or is empty,
1437 * AND
1438 * the ip is not in the ops->notrace_hash.
cdbe61bf
SR
1439 *
1440 * This needs to be called with preemption disabled as
1441 * the hashes are freed with call_rcu_sched().
b848914c
SR
1442 */
1443static int
1444ftrace_ops_test(struct ftrace_ops *ops, unsigned long ip)
1445{
1446 struct ftrace_hash *filter_hash;
1447 struct ftrace_hash *notrace_hash;
1448 int ret;
1449
1bb539ca
SR
1450 filter_hash = rcu_dereference_raw_notrace(ops->filter_hash);
1451 notrace_hash = rcu_dereference_raw_notrace(ops->notrace_hash);
b848914c 1452
06a51d93 1453 if ((ftrace_hash_empty(filter_hash) ||
b848914c 1454 ftrace_lookup_ip(filter_hash, ip)) &&
06a51d93 1455 (ftrace_hash_empty(notrace_hash) ||
b848914c
SR
1456 !ftrace_lookup_ip(notrace_hash, ip)))
1457 ret = 1;
1458 else
1459 ret = 0;
b848914c
SR
1460
1461 return ret;
1462}
1463
493762fc
SR
1464/*
1465 * This is a double for. Do not use 'break' to break out of the loop,
1466 * you must use a goto.
1467 */
1468#define do_for_each_ftrace_rec(pg, rec) \
1469 for (pg = ftrace_pages_start; pg; pg = pg->next) { \
1470 int _____i; \
1471 for (_____i = 0; _____i < pg->index; _____i++) { \
1472 rec = &pg->records[_____i];
1473
1474#define while_for_each_ftrace_rec() \
1475 } \
1476 }
1477
5855fead
SR
1478
1479static int ftrace_cmp_recs(const void *a, const void *b)
1480{
a650e02a
SR
1481 const struct dyn_ftrace *key = a;
1482 const struct dyn_ftrace *rec = b;
5855fead 1483
a650e02a 1484 if (key->flags < rec->ip)
5855fead 1485 return -1;
a650e02a
SR
1486 if (key->ip >= rec->ip + MCOUNT_INSN_SIZE)
1487 return 1;
5855fead
SR
1488 return 0;
1489}
1490
f0cf973a 1491static unsigned long ftrace_location_range(unsigned long start, unsigned long end)
c88fd863
SR
1492{
1493 struct ftrace_page *pg;
1494 struct dyn_ftrace *rec;
5855fead 1495 struct dyn_ftrace key;
c88fd863 1496
a650e02a
SR
1497 key.ip = start;
1498 key.flags = end; /* overload flags, as it is unsigned long */
5855fead
SR
1499
1500 for (pg = ftrace_pages_start; pg; pg = pg->next) {
a650e02a
SR
1501 if (end < pg->records[0].ip ||
1502 start >= (pg->records[pg->index - 1].ip + MCOUNT_INSN_SIZE))
9644302e 1503 continue;
5855fead
SR
1504 rec = bsearch(&key, pg->records, pg->index,
1505 sizeof(struct dyn_ftrace),
1506 ftrace_cmp_recs);
1507 if (rec)
f0cf973a 1508 return rec->ip;
5855fead 1509 }
c88fd863
SR
1510
1511 return 0;
1512}
1513
a650e02a
SR
1514/**
1515 * ftrace_location - return true if the ip giving is a traced location
1516 * @ip: the instruction pointer to check
1517 *
f0cf973a 1518 * Returns rec->ip if @ip given is a pointer to a ftrace location.
a650e02a
SR
1519 * That is, the instruction that is either a NOP or call to
1520 * the function tracer. It checks the ftrace internal tables to
1521 * determine if the address belongs or not.
1522 */
f0cf973a 1523unsigned long ftrace_location(unsigned long ip)
a650e02a
SR
1524{
1525 return ftrace_location_range(ip, ip);
1526}
1527
1528/**
1529 * ftrace_text_reserved - return true if range contains an ftrace location
1530 * @start: start of range to search
1531 * @end: end of range to search (inclusive). @end points to the last byte to check.
1532 *
1533 * Returns 1 if @start and @end contains a ftrace location.
1534 * That is, the instruction that is either a NOP or call to
1535 * the function tracer. It checks the ftrace internal tables to
1536 * determine if the address belongs or not.
1537 */
1538int ftrace_text_reserved(void *start, void *end)
1539{
f0cf973a
SR
1540 unsigned long ret;
1541
1542 ret = ftrace_location_range((unsigned long)start,
1543 (unsigned long)end);
1544
1545 return (int)!!ret;
a650e02a
SR
1546}
1547
ed926f9b
SR
1548static void __ftrace_hash_rec_update(struct ftrace_ops *ops,
1549 int filter_hash,
1550 bool inc)
1551{
1552 struct ftrace_hash *hash;
1553 struct ftrace_hash *other_hash;
1554 struct ftrace_page *pg;
1555 struct dyn_ftrace *rec;
1556 int count = 0;
1557 int all = 0;
1558
1559 /* Only update if the ops has been registered */
1560 if (!(ops->flags & FTRACE_OPS_FL_ENABLED))
1561 return;
1562
1563 /*
1564 * In the filter_hash case:
1565 * If the count is zero, we update all records.
1566 * Otherwise we just update the items in the hash.
1567 *
1568 * In the notrace_hash case:
1569 * We enable the update in the hash.
1570 * As disabling notrace means enabling the tracing,
1571 * and enabling notrace means disabling, the inc variable
1572 * gets inversed.
1573 */
1574 if (filter_hash) {
1575 hash = ops->filter_hash;
1576 other_hash = ops->notrace_hash;
06a51d93 1577 if (ftrace_hash_empty(hash))
ed926f9b
SR
1578 all = 1;
1579 } else {
1580 inc = !inc;
1581 hash = ops->notrace_hash;
1582 other_hash = ops->filter_hash;
1583 /*
1584 * If the notrace hash has no items,
1585 * then there's nothing to do.
1586 */
06a51d93 1587 if (ftrace_hash_empty(hash))
ed926f9b
SR
1588 return;
1589 }
1590
1591 do_for_each_ftrace_rec(pg, rec) {
1592 int in_other_hash = 0;
1593 int in_hash = 0;
1594 int match = 0;
1595
1596 if (all) {
1597 /*
1598 * Only the filter_hash affects all records.
1599 * Update if the record is not in the notrace hash.
1600 */
b848914c 1601 if (!other_hash || !ftrace_lookup_ip(other_hash, rec->ip))
ed926f9b
SR
1602 match = 1;
1603 } else {
06a51d93
SR
1604 in_hash = !!ftrace_lookup_ip(hash, rec->ip);
1605 in_other_hash = !!ftrace_lookup_ip(other_hash, rec->ip);
ed926f9b
SR
1606
1607 /*
1608 *
1609 */
1610 if (filter_hash && in_hash && !in_other_hash)
1611 match = 1;
1612 else if (!filter_hash && in_hash &&
06a51d93 1613 (in_other_hash || ftrace_hash_empty(other_hash)))
ed926f9b
SR
1614 match = 1;
1615 }
1616 if (!match)
1617 continue;
1618
1619 if (inc) {
1620 rec->flags++;
1621 if (FTRACE_WARN_ON((rec->flags & ~FTRACE_FL_MASK) == FTRACE_REF_MAX))
1622 return;
08f6fba5
SR
1623 /*
1624 * If any ops wants regs saved for this function
1625 * then all ops will get saved regs.
1626 */
1627 if (ops->flags & FTRACE_OPS_FL_SAVE_REGS)
1628 rec->flags |= FTRACE_FL_REGS;
ed926f9b
SR
1629 } else {
1630 if (FTRACE_WARN_ON((rec->flags & ~FTRACE_FL_MASK) == 0))
1631 return;
1632 rec->flags--;
1633 }
1634 count++;
1635 /* Shortcut, if we handled all records, we are done. */
1636 if (!all && count == hash->count)
1637 return;
1638 } while_for_each_ftrace_rec();
1639}
1640
1641static void ftrace_hash_rec_disable(struct ftrace_ops *ops,
1642 int filter_hash)
1643{
1644 __ftrace_hash_rec_update(ops, filter_hash, 0);
1645}
1646
1647static void ftrace_hash_rec_enable(struct ftrace_ops *ops,
1648 int filter_hash)
1649{
1650 __ftrace_hash_rec_update(ops, filter_hash, 1);
1651}
1652
b17e8a37
SR
1653static void print_ip_ins(const char *fmt, unsigned char *p)
1654{
1655 int i;
1656
1657 printk(KERN_CONT "%s", fmt);
1658
1659 for (i = 0; i < MCOUNT_INSN_SIZE; i++)
1660 printk(KERN_CONT "%s%02x", i ? ":" : "", p[i]);
1661}
1662
c88fd863
SR
1663/**
1664 * ftrace_bug - report and shutdown function tracer
1665 * @failed: The failed type (EFAULT, EINVAL, EPERM)
1666 * @ip: The address that failed
1667 *
1668 * The arch code that enables or disables the function tracing
1669 * can call ftrace_bug() when it has detected a problem in
1670 * modifying the code. @failed should be one of either:
1671 * EFAULT - if the problem happens on reading the @ip address
1672 * EINVAL - if what is read at @ip is not what was expected
1673 * EPERM - if the problem happens on writting to the @ip address
1674 */
1675void ftrace_bug(int failed, unsigned long ip)
b17e8a37
SR
1676{
1677 switch (failed) {
1678 case -EFAULT:
1679 FTRACE_WARN_ON_ONCE(1);
1680 pr_info("ftrace faulted on modifying ");
1681 print_ip_sym(ip);
1682 break;
1683 case -EINVAL:
1684 FTRACE_WARN_ON_ONCE(1);
1685 pr_info("ftrace failed to modify ");
1686 print_ip_sym(ip);
b17e8a37 1687 print_ip_ins(" actual: ", (unsigned char *)ip);
b17e8a37
SR
1688 printk(KERN_CONT "\n");
1689 break;
1690 case -EPERM:
1691 FTRACE_WARN_ON_ONCE(1);
1692 pr_info("ftrace faulted on writing ");
1693 print_ip_sym(ip);
1694 break;
1695 default:
1696 FTRACE_WARN_ON_ONCE(1);
1697 pr_info("ftrace faulted on unknown error ");
1698 print_ip_sym(ip);
1699 }
1700}
1701
c88fd863 1702static int ftrace_check_record(struct dyn_ftrace *rec, int enable, int update)
5072c59f 1703{
64fbcd16 1704 unsigned long flag = 0UL;
e7d3737e 1705
982c350b 1706 /*
30fb6aa7 1707 * If we are updating calls:
982c350b 1708 *
ed926f9b
SR
1709 * If the record has a ref count, then we need to enable it
1710 * because someone is using it.
982c350b 1711 *
ed926f9b
SR
1712 * Otherwise we make sure its disabled.
1713 *
30fb6aa7 1714 * If we are disabling calls, then disable all records that
ed926f9b 1715 * are enabled.
982c350b 1716 */
c88fd863 1717 if (enable && (rec->flags & ~FTRACE_FL_MASK))
ed926f9b 1718 flag = FTRACE_FL_ENABLED;
982c350b 1719
08f6fba5
SR
1720 /*
1721 * If enabling and the REGS flag does not match the REGS_EN, then
1722 * do not ignore this record. Set flags to fail the compare against
1723 * ENABLED.
1724 */
1725 if (flag &&
1726 (!(rec->flags & FTRACE_FL_REGS) != !(rec->flags & FTRACE_FL_REGS_EN)))
1727 flag |= FTRACE_FL_REGS;
1728
64fbcd16
XG
1729 /* If the state of this record hasn't changed, then do nothing */
1730 if ((rec->flags & FTRACE_FL_ENABLED) == flag)
c88fd863 1731 return FTRACE_UPDATE_IGNORE;
982c350b 1732
64fbcd16 1733 if (flag) {
08f6fba5
SR
1734 /* Save off if rec is being enabled (for return value) */
1735 flag ^= rec->flags & FTRACE_FL_ENABLED;
1736
1737 if (update) {
c88fd863 1738 rec->flags |= FTRACE_FL_ENABLED;
08f6fba5
SR
1739 if (flag & FTRACE_FL_REGS) {
1740 if (rec->flags & FTRACE_FL_REGS)
1741 rec->flags |= FTRACE_FL_REGS_EN;
1742 else
1743 rec->flags &= ~FTRACE_FL_REGS_EN;
1744 }
1745 }
1746
1747 /*
1748 * If this record is being updated from a nop, then
1749 * return UPDATE_MAKE_CALL.
1750 * Otherwise, if the EN flag is set, then return
1751 * UPDATE_MODIFY_CALL_REGS to tell the caller to convert
1752 * from the non-save regs, to a save regs function.
1753 * Otherwise,
1754 * return UPDATE_MODIFY_CALL to tell the caller to convert
1755 * from the save regs, to a non-save regs function.
1756 */
1757 if (flag & FTRACE_FL_ENABLED)
1758 return FTRACE_UPDATE_MAKE_CALL;
1759 else if (rec->flags & FTRACE_FL_REGS_EN)
1760 return FTRACE_UPDATE_MODIFY_CALL_REGS;
1761 else
1762 return FTRACE_UPDATE_MODIFY_CALL;
c88fd863
SR
1763 }
1764
08f6fba5
SR
1765 if (update) {
1766 /* If there's no more users, clear all flags */
1767 if (!(rec->flags & ~FTRACE_FL_MASK))
1768 rec->flags = 0;
1769 else
1770 /* Just disable the record (keep REGS state) */
1771 rec->flags &= ~FTRACE_FL_ENABLED;
1772 }
c88fd863
SR
1773
1774 return FTRACE_UPDATE_MAKE_NOP;
1775}
1776
1777/**
1778 * ftrace_update_record, set a record that now is tracing or not
1779 * @rec: the record to update
1780 * @enable: set to 1 if the record is tracing, zero to force disable
1781 *
1782 * The records that represent all functions that can be traced need
1783 * to be updated when tracing has been enabled.
1784 */
1785int ftrace_update_record(struct dyn_ftrace *rec, int enable)
1786{
1787 return ftrace_check_record(rec, enable, 1);
1788}
1789
1790/**
1791 * ftrace_test_record, check if the record has been enabled or not
1792 * @rec: the record to test
1793 * @enable: set to 1 to check if enabled, 0 if it is disabled
1794 *
1795 * The arch code may need to test if a record is already set to
1796 * tracing to determine how to modify the function code that it
1797 * represents.
1798 */
1799int ftrace_test_record(struct dyn_ftrace *rec, int enable)
1800{
1801 return ftrace_check_record(rec, enable, 0);
1802}
1803
1804static int
1805__ftrace_replace_code(struct dyn_ftrace *rec, int enable)
1806{
08f6fba5 1807 unsigned long ftrace_old_addr;
c88fd863
SR
1808 unsigned long ftrace_addr;
1809 int ret;
1810
c88fd863
SR
1811 ret = ftrace_update_record(rec, enable);
1812
08f6fba5
SR
1813 if (rec->flags & FTRACE_FL_REGS)
1814 ftrace_addr = (unsigned long)FTRACE_REGS_ADDR;
1815 else
1816 ftrace_addr = (unsigned long)FTRACE_ADDR;
1817
c88fd863
SR
1818 switch (ret) {
1819 case FTRACE_UPDATE_IGNORE:
1820 return 0;
1821
1822 case FTRACE_UPDATE_MAKE_CALL:
64fbcd16 1823 return ftrace_make_call(rec, ftrace_addr);
c88fd863
SR
1824
1825 case FTRACE_UPDATE_MAKE_NOP:
1826 return ftrace_make_nop(NULL, rec, ftrace_addr);
08f6fba5
SR
1827
1828 case FTRACE_UPDATE_MODIFY_CALL_REGS:
1829 case FTRACE_UPDATE_MODIFY_CALL:
1830 if (rec->flags & FTRACE_FL_REGS)
1831 ftrace_old_addr = (unsigned long)FTRACE_ADDR;
1832 else
1833 ftrace_old_addr = (unsigned long)FTRACE_REGS_ADDR;
1834
1835 return ftrace_modify_call(rec, ftrace_old_addr, ftrace_addr);
5072c59f
SR
1836 }
1837
c88fd863 1838 return -1; /* unknow ftrace bug */
5072c59f
SR
1839}
1840
e4f5d544 1841void __weak ftrace_replace_code(int enable)
3c1720f0 1842{
3c1720f0
SR
1843 struct dyn_ftrace *rec;
1844 struct ftrace_page *pg;
6a24a244 1845 int failed;
3c1720f0 1846
45a4a237
SR
1847 if (unlikely(ftrace_disabled))
1848 return;
1849
265c831c 1850 do_for_each_ftrace_rec(pg, rec) {
e4f5d544 1851 failed = __ftrace_replace_code(rec, enable);
fa9d13cf 1852 if (failed) {
3279ba37
SR
1853 ftrace_bug(failed, rec->ip);
1854 /* Stop processing */
1855 return;
3c1720f0 1856 }
265c831c 1857 } while_for_each_ftrace_rec();
3c1720f0
SR
1858}
1859
c88fd863
SR
1860struct ftrace_rec_iter {
1861 struct ftrace_page *pg;
1862 int index;
1863};
1864
1865/**
1866 * ftrace_rec_iter_start, start up iterating over traced functions
1867 *
1868 * Returns an iterator handle that is used to iterate over all
1869 * the records that represent address locations where functions
1870 * are traced.
1871 *
1872 * May return NULL if no records are available.
1873 */
1874struct ftrace_rec_iter *ftrace_rec_iter_start(void)
1875{
1876 /*
1877 * We only use a single iterator.
1878 * Protected by the ftrace_lock mutex.
1879 */
1880 static struct ftrace_rec_iter ftrace_rec_iter;
1881 struct ftrace_rec_iter *iter = &ftrace_rec_iter;
1882
1883 iter->pg = ftrace_pages_start;
1884 iter->index = 0;
1885
1886 /* Could have empty pages */
1887 while (iter->pg && !iter->pg->index)
1888 iter->pg = iter->pg->next;
1889
1890 if (!iter->pg)
1891 return NULL;
1892
1893 return iter;
1894}
1895
1896/**
1897 * ftrace_rec_iter_next, get the next record to process.
1898 * @iter: The handle to the iterator.
1899 *
1900 * Returns the next iterator after the given iterator @iter.
1901 */
1902struct ftrace_rec_iter *ftrace_rec_iter_next(struct ftrace_rec_iter *iter)
1903{
1904 iter->index++;
1905
1906 if (iter->index >= iter->pg->index) {
1907 iter->pg = iter->pg->next;
1908 iter->index = 0;
1909
1910 /* Could have empty pages */
1911 while (iter->pg && !iter->pg->index)
1912 iter->pg = iter->pg->next;
1913 }
1914
1915 if (!iter->pg)
1916 return NULL;
1917
1918 return iter;
1919}
1920
1921/**
1922 * ftrace_rec_iter_record, get the record at the iterator location
1923 * @iter: The current iterator location
1924 *
1925 * Returns the record that the current @iter is at.
1926 */
1927struct dyn_ftrace *ftrace_rec_iter_record(struct ftrace_rec_iter *iter)
1928{
1929 return &iter->pg->records[iter->index];
1930}
1931
492a7ea5 1932static int
31e88909 1933ftrace_code_disable(struct module *mod, struct dyn_ftrace *rec)
3c1720f0
SR
1934{
1935 unsigned long ip;
593eb8a2 1936 int ret;
3c1720f0
SR
1937
1938 ip = rec->ip;
1939
45a4a237
SR
1940 if (unlikely(ftrace_disabled))
1941 return 0;
1942
25aac9dc 1943 ret = ftrace_make_nop(mod, rec, MCOUNT_ADDR);
593eb8a2 1944 if (ret) {
31e88909 1945 ftrace_bug(ret, ip);
492a7ea5 1946 return 0;
37ad5084 1947 }
492a7ea5 1948 return 1;
3c1720f0
SR
1949}
1950
000ab691
SR
1951/*
1952 * archs can override this function if they must do something
1953 * before the modifying code is performed.
1954 */
1955int __weak ftrace_arch_code_modify_prepare(void)
1956{
1957 return 0;
1958}
1959
1960/*
1961 * archs can override this function if they must do something
1962 * after the modifying code is performed.
1963 */
1964int __weak ftrace_arch_code_modify_post_process(void)
1965{
1966 return 0;
1967}
1968
8ed3e2cf 1969void ftrace_modify_all_code(int command)
3d083395 1970{
8ed3e2cf 1971 if (command & FTRACE_UPDATE_CALLS)
d61f82d0 1972 ftrace_replace_code(1);
8ed3e2cf 1973 else if (command & FTRACE_DISABLE_CALLS)
d61f82d0
SR
1974 ftrace_replace_code(0);
1975
8ed3e2cf 1976 if (command & FTRACE_UPDATE_TRACE_FUNC)
d61f82d0
SR
1977 ftrace_update_ftrace_func(ftrace_trace_function);
1978
8ed3e2cf 1979 if (command & FTRACE_START_FUNC_RET)
5a45cfe1 1980 ftrace_enable_ftrace_graph_caller();
8ed3e2cf 1981 else if (command & FTRACE_STOP_FUNC_RET)
5a45cfe1 1982 ftrace_disable_ftrace_graph_caller();
8ed3e2cf
SR
1983}
1984
1985static int __ftrace_modify_code(void *data)
1986{
1987 int *command = data;
1988
1989 ftrace_modify_all_code(*command);
5a45cfe1 1990
d61f82d0 1991 return 0;
3d083395
SR
1992}
1993
c88fd863
SR
1994/**
1995 * ftrace_run_stop_machine, go back to the stop machine method
1996 * @command: The command to tell ftrace what to do
1997 *
1998 * If an arch needs to fall back to the stop machine method, the
1999 * it can call this function.
2000 */
2001void ftrace_run_stop_machine(int command)
2002{
2003 stop_machine(__ftrace_modify_code, &command, NULL);
2004}
2005
2006/**
2007 * arch_ftrace_update_code, modify the code to trace or not trace
2008 * @command: The command that needs to be done
2009 *
2010 * Archs can override this function if it does not need to
2011 * run stop_machine() to modify code.
2012 */
2013void __weak arch_ftrace_update_code(int command)
2014{
2015 ftrace_run_stop_machine(command);
2016}
2017
e309b41d 2018static void ftrace_run_update_code(int command)
3d083395 2019{
000ab691
SR
2020 int ret;
2021
2022 ret = ftrace_arch_code_modify_prepare();
2023 FTRACE_WARN_ON(ret);
2024 if (ret)
2025 return;
c88fd863
SR
2026 /*
2027 * Do not call function tracer while we update the code.
2028 * We are in stop machine.
2029 */
2030 function_trace_stop++;
000ab691 2031
c88fd863
SR
2032 /*
2033 * By default we use stop_machine() to modify the code.
2034 * But archs can do what ever they want as long as it
2035 * is safe. The stop_machine() is the safest, but also
2036 * produces the most overhead.
2037 */
2038 arch_ftrace_update_code(command);
2039
c88fd863 2040 function_trace_stop--;
000ab691
SR
2041
2042 ret = ftrace_arch_code_modify_post_process();
2043 FTRACE_WARN_ON(ret);
3d083395
SR
2044}
2045
d61f82d0 2046static ftrace_func_t saved_ftrace_func;
60a7ecf4 2047static int ftrace_start_up;
b848914c 2048static int global_start_up;
df4fc315
SR
2049
2050static void ftrace_startup_enable(int command)
2051{
2052 if (saved_ftrace_func != ftrace_trace_function) {
2053 saved_ftrace_func = ftrace_trace_function;
2054 command |= FTRACE_UPDATE_TRACE_FUNC;
2055 }
2056
2057 if (!command || !ftrace_enabled)
2058 return;
2059
2060 ftrace_run_update_code(command);
2061}
d61f82d0 2062
a1cd6173 2063static int ftrace_startup(struct ftrace_ops *ops, int command)
3d083395 2064{
b848914c
SR
2065 bool hash_enable = true;
2066
4eebcc81 2067 if (unlikely(ftrace_disabled))
a1cd6173 2068 return -ENODEV;
4eebcc81 2069
60a7ecf4 2070 ftrace_start_up++;
30fb6aa7 2071 command |= FTRACE_UPDATE_CALLS;
d61f82d0 2072
b848914c
SR
2073 /* ops marked global share the filter hashes */
2074 if (ops->flags & FTRACE_OPS_FL_GLOBAL) {
2075 ops = &global_ops;
2076 /* Don't update hash if global is already set */
2077 if (global_start_up)
2078 hash_enable = false;
2079 global_start_up++;
2080 }
2081
ed926f9b 2082 ops->flags |= FTRACE_OPS_FL_ENABLED;
b848914c 2083 if (hash_enable)
ed926f9b
SR
2084 ftrace_hash_rec_enable(ops, 1);
2085
df4fc315 2086 ftrace_startup_enable(command);
a1cd6173
SR
2087
2088 return 0;
3d083395
SR
2089}
2090
bd69c30b 2091static void ftrace_shutdown(struct ftrace_ops *ops, int command)
3d083395 2092{
b848914c
SR
2093 bool hash_disable = true;
2094
4eebcc81
SR
2095 if (unlikely(ftrace_disabled))
2096 return;
2097
60a7ecf4 2098 ftrace_start_up--;
9ea1a153
FW
2099 /*
2100 * Just warn in case of unbalance, no need to kill ftrace, it's not
2101 * critical but the ftrace_call callers may be never nopped again after
2102 * further ftrace uses.
2103 */
2104 WARN_ON_ONCE(ftrace_start_up < 0);
2105
b848914c
SR
2106 if (ops->flags & FTRACE_OPS_FL_GLOBAL) {
2107 ops = &global_ops;
2108 global_start_up--;
2109 WARN_ON_ONCE(global_start_up < 0);
2110 /* Don't update hash if global still has users */
2111 if (global_start_up) {
2112 WARN_ON_ONCE(!ftrace_start_up);
2113 hash_disable = false;
2114 }
2115 }
2116
2117 if (hash_disable)
ed926f9b
SR
2118 ftrace_hash_rec_disable(ops, 1);
2119
b848914c 2120 if (ops != &global_ops || !global_start_up)
ed926f9b 2121 ops->flags &= ~FTRACE_OPS_FL_ENABLED;
b848914c 2122
30fb6aa7 2123 command |= FTRACE_UPDATE_CALLS;
3d083395 2124
d61f82d0
SR
2125 if (saved_ftrace_func != ftrace_trace_function) {
2126 saved_ftrace_func = ftrace_trace_function;
2127 command |= FTRACE_UPDATE_TRACE_FUNC;
2128 }
3d083395 2129
d61f82d0 2130 if (!command || !ftrace_enabled)
e6ea44e9 2131 return;
d61f82d0
SR
2132
2133 ftrace_run_update_code(command);
3d083395
SR
2134}
2135
e309b41d 2136static void ftrace_startup_sysctl(void)
b0fc494f 2137{
4eebcc81
SR
2138 if (unlikely(ftrace_disabled))
2139 return;
2140
d61f82d0
SR
2141 /* Force update next time */
2142 saved_ftrace_func = NULL;
60a7ecf4
SR
2143 /* ftrace_start_up is true if we want ftrace running */
2144 if (ftrace_start_up)
30fb6aa7 2145 ftrace_run_update_code(FTRACE_UPDATE_CALLS);
b0fc494f
SR
2146}
2147
e309b41d 2148static void ftrace_shutdown_sysctl(void)
b0fc494f 2149{
4eebcc81
SR
2150 if (unlikely(ftrace_disabled))
2151 return;
2152
60a7ecf4
SR
2153 /* ftrace_start_up is true if ftrace is running */
2154 if (ftrace_start_up)
79e406d7 2155 ftrace_run_update_code(FTRACE_DISABLE_CALLS);
b0fc494f
SR
2156}
2157
3d083395
SR
2158static cycle_t ftrace_update_time;
2159static unsigned long ftrace_update_cnt;
2160unsigned long ftrace_update_tot_cnt;
2161
f7bc8b61
SR
2162static int ops_traces_mod(struct ftrace_ops *ops)
2163{
2164 struct ftrace_hash *hash;
2165
2166 hash = ops->filter_hash;
06a51d93 2167 return ftrace_hash_empty(hash);
f7bc8b61
SR
2168}
2169
31e88909 2170static int ftrace_update_code(struct module *mod)
3d083395 2171{
85ae32ae 2172 struct ftrace_page *pg;
e94142a6 2173 struct dyn_ftrace *p;
f22f9a89 2174 cycle_t start, stop;
f7bc8b61 2175 unsigned long ref = 0;
85ae32ae 2176 int i;
f7bc8b61
SR
2177
2178 /*
2179 * When adding a module, we need to check if tracers are
2180 * currently enabled and if they are set to trace all functions.
2181 * If they are, we need to enable the module functions as well
2182 * as update the reference counts for those function records.
2183 */
2184 if (mod) {
2185 struct ftrace_ops *ops;
2186
2187 for (ops = ftrace_ops_list;
2188 ops != &ftrace_list_end; ops = ops->next) {
2189 if (ops->flags & FTRACE_OPS_FL_ENABLED &&
2190 ops_traces_mod(ops))
2191 ref++;
2192 }
2193 }
3d083395 2194
750ed1a4 2195 start = ftrace_now(raw_smp_processor_id());
3d083395
SR
2196 ftrace_update_cnt = 0;
2197
85ae32ae 2198 for (pg = ftrace_new_pgs; pg; pg = pg->next) {
3d083395 2199
85ae32ae
SR
2200 for (i = 0; i < pg->index; i++) {
2201 /* If something went wrong, bail without enabling anything */
2202 if (unlikely(ftrace_disabled))
2203 return -1;
f22f9a89 2204
85ae32ae
SR
2205 p = &pg->records[i];
2206 p->flags = ref;
f22f9a89 2207
85ae32ae
SR
2208 /*
2209 * Do the initial record conversion from mcount jump
2210 * to the NOP instructions.
2211 */
2212 if (!ftrace_code_disable(mod, p))
2213 break;
5cb084bb 2214
85ae32ae 2215 ftrace_update_cnt++;
5cb084bb 2216
85ae32ae
SR
2217 /*
2218 * If the tracing is enabled, go ahead and enable the record.
2219 *
2220 * The reason not to enable the record immediatelly is the
2221 * inherent check of ftrace_make_nop/ftrace_make_call for
2222 * correct previous instructions. Making first the NOP
2223 * conversion puts the module to the correct state, thus
2224 * passing the ftrace_make_call check.
2225 */
2226 if (ftrace_start_up && ref) {
2227 int failed = __ftrace_replace_code(p, 1);
2228 if (failed)
2229 ftrace_bug(failed, p->ip);
2230 }
5cb084bb 2231 }
3d083395
SR
2232 }
2233
85ae32ae
SR
2234 ftrace_new_pgs = NULL;
2235
750ed1a4 2236 stop = ftrace_now(raw_smp_processor_id());
3d083395
SR
2237 ftrace_update_time = stop - start;
2238 ftrace_update_tot_cnt += ftrace_update_cnt;
2239
16444a8a
ACM
2240 return 0;
2241}
2242
a7900875 2243static int ftrace_allocate_records(struct ftrace_page *pg, int count)
3c1720f0 2244{
a7900875 2245 int order;
3c1720f0 2246 int cnt;
3c1720f0 2247
a7900875
SR
2248 if (WARN_ON(!count))
2249 return -EINVAL;
2250
2251 order = get_count_order(DIV_ROUND_UP(count, ENTRIES_PER_PAGE));
3c1720f0
SR
2252
2253 /*
a7900875
SR
2254 * We want to fill as much as possible. No more than a page
2255 * may be empty.
3c1720f0 2256 */
a7900875
SR
2257 while ((PAGE_SIZE << order) / ENTRY_SIZE >= count + ENTRIES_PER_PAGE)
2258 order--;
3c1720f0 2259
a7900875
SR
2260 again:
2261 pg->records = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO, order);
3c1720f0 2262
a7900875
SR
2263 if (!pg->records) {
2264 /* if we can't allocate this size, try something smaller */
2265 if (!order)
2266 return -ENOMEM;
2267 order >>= 1;
2268 goto again;
2269 }
3c1720f0 2270
a7900875
SR
2271 cnt = (PAGE_SIZE << order) / ENTRY_SIZE;
2272 pg->size = cnt;
3c1720f0 2273
a7900875
SR
2274 if (cnt > count)
2275 cnt = count;
2276
2277 return cnt;
2278}
2279
2280static struct ftrace_page *
2281ftrace_allocate_pages(unsigned long num_to_init)
2282{
2283 struct ftrace_page *start_pg;
2284 struct ftrace_page *pg;
2285 int order;
2286 int cnt;
2287
2288 if (!num_to_init)
2289 return 0;
2290
2291 start_pg = pg = kzalloc(sizeof(*pg), GFP_KERNEL);
2292 if (!pg)
2293 return NULL;
2294
2295 /*
2296 * Try to allocate as much as possible in one continues
2297 * location that fills in all of the space. We want to
2298 * waste as little space as possible.
2299 */
2300 for (;;) {
2301 cnt = ftrace_allocate_records(pg, num_to_init);
2302 if (cnt < 0)
2303 goto free_pages;
2304
2305 num_to_init -= cnt;
2306 if (!num_to_init)
3c1720f0
SR
2307 break;
2308
a7900875
SR
2309 pg->next = kzalloc(sizeof(*pg), GFP_KERNEL);
2310 if (!pg->next)
2311 goto free_pages;
2312
3c1720f0
SR
2313 pg = pg->next;
2314 }
2315
a7900875
SR
2316 return start_pg;
2317
2318 free_pages:
2319 while (start_pg) {
2320 order = get_count_order(pg->size / ENTRIES_PER_PAGE);
2321 free_pages((unsigned long)pg->records, order);
2322 start_pg = pg->next;
2323 kfree(pg);
2324 pg = start_pg;
2325 }
2326 pr_info("ftrace: FAILED to allocate memory for functions\n");
2327 return NULL;
2328}
2329
2330static int __init ftrace_dyn_table_alloc(unsigned long num_to_init)
2331{
2332 int cnt;
2333
2334 if (!num_to_init) {
2335 pr_info("ftrace: No functions to be traced?\n");
2336 return -1;
2337 }
2338
2339 cnt = num_to_init / ENTRIES_PER_PAGE;
2340 pr_info("ftrace: allocating %ld entries in %d pages\n",
2341 num_to_init, cnt + 1);
2342
3c1720f0
SR
2343 return 0;
2344}
2345
5072c59f
SR
2346#define FTRACE_BUFF_MAX (KSYM_SYMBOL_LEN+4) /* room for wildcards */
2347
2348struct ftrace_iterator {
98c4fd04 2349 loff_t pos;
4aeb6967
SR
2350 loff_t func_pos;
2351 struct ftrace_page *pg;
2352 struct dyn_ftrace *func;
2353 struct ftrace_func_probe *probe;
2354 struct trace_parser parser;
1cf41dd7 2355 struct ftrace_hash *hash;
33dc9b12 2356 struct ftrace_ops *ops;
4aeb6967
SR
2357 int hidx;
2358 int idx;
2359 unsigned flags;
5072c59f
SR
2360};
2361
8fc0c701 2362static void *
4aeb6967 2363t_hash_next(struct seq_file *m, loff_t *pos)
8fc0c701
SR
2364{
2365 struct ftrace_iterator *iter = m->private;
4aeb6967 2366 struct hlist_node *hnd = NULL;
8fc0c701
SR
2367 struct hlist_head *hhd;
2368
8fc0c701 2369 (*pos)++;
98c4fd04 2370 iter->pos = *pos;
8fc0c701 2371
4aeb6967
SR
2372 if (iter->probe)
2373 hnd = &iter->probe->node;
8fc0c701
SR
2374 retry:
2375 if (iter->hidx >= FTRACE_FUNC_HASHSIZE)
2376 return NULL;
2377
2378 hhd = &ftrace_func_hash[iter->hidx];
2379
2380 if (hlist_empty(hhd)) {
2381 iter->hidx++;
2382 hnd = NULL;
2383 goto retry;
2384 }
2385
2386 if (!hnd)
2387 hnd = hhd->first;
2388 else {
2389 hnd = hnd->next;
2390 if (!hnd) {
2391 iter->hidx++;
2392 goto retry;
2393 }
2394 }
2395
4aeb6967
SR
2396 if (WARN_ON_ONCE(!hnd))
2397 return NULL;
2398
2399 iter->probe = hlist_entry(hnd, struct ftrace_func_probe, node);
2400
2401 return iter;
8fc0c701
SR
2402}
2403
2404static void *t_hash_start(struct seq_file *m, loff_t *pos)
2405{
2406 struct ftrace_iterator *iter = m->private;
2407 void *p = NULL;
d82d6244
LZ
2408 loff_t l;
2409
69a3083c
SR
2410 if (!(iter->flags & FTRACE_ITER_DO_HASH))
2411 return NULL;
2412
2bccfffd
SR
2413 if (iter->func_pos > *pos)
2414 return NULL;
8fc0c701 2415
d82d6244 2416 iter->hidx = 0;
2bccfffd 2417 for (l = 0; l <= (*pos - iter->func_pos); ) {
4aeb6967 2418 p = t_hash_next(m, &l);
d82d6244
LZ
2419 if (!p)
2420 break;
2421 }
4aeb6967
SR
2422 if (!p)
2423 return NULL;
2424
98c4fd04
SR
2425 /* Only set this if we have an item */
2426 iter->flags |= FTRACE_ITER_HASH;
2427
4aeb6967 2428 return iter;
8fc0c701
SR
2429}
2430
4aeb6967
SR
2431static int
2432t_hash_show(struct seq_file *m, struct ftrace_iterator *iter)
8fc0c701 2433{
b6887d79 2434 struct ftrace_func_probe *rec;
8fc0c701 2435
4aeb6967
SR
2436 rec = iter->probe;
2437 if (WARN_ON_ONCE(!rec))
2438 return -EIO;
8fc0c701 2439
809dcf29
SR
2440 if (rec->ops->print)
2441 return rec->ops->print(m, rec->ip, rec->ops, rec->data);
2442
b375a11a 2443 seq_printf(m, "%ps:%ps", (void *)rec->ip, (void *)rec->ops->func);
8fc0c701
SR
2444
2445 if (rec->data)
2446 seq_printf(m, ":%p", rec->data);
2447 seq_putc(m, '\n');
2448
2449 return 0;
2450}
2451
e309b41d 2452static void *
5072c59f
SR
2453t_next(struct seq_file *m, void *v, loff_t *pos)
2454{
2455 struct ftrace_iterator *iter = m->private;
fc13cb0c 2456 struct ftrace_ops *ops = iter->ops;
5072c59f
SR
2457 struct dyn_ftrace *rec = NULL;
2458
45a4a237
SR
2459 if (unlikely(ftrace_disabled))
2460 return NULL;
2461
8fc0c701 2462 if (iter->flags & FTRACE_ITER_HASH)
4aeb6967 2463 return t_hash_next(m, pos);
8fc0c701 2464
5072c59f 2465 (*pos)++;
1106b699 2466 iter->pos = iter->func_pos = *pos;
5072c59f 2467
0c75a3ed 2468 if (iter->flags & FTRACE_ITER_PRINTALL)
57c072c7 2469 return t_hash_start(m, pos);
0c75a3ed 2470
5072c59f
SR
2471 retry:
2472 if (iter->idx >= iter->pg->index) {
2473 if (iter->pg->next) {
2474 iter->pg = iter->pg->next;
2475 iter->idx = 0;
2476 goto retry;
2477 }
2478 } else {
2479 rec = &iter->pg->records[iter->idx++];
32082309 2480 if (((iter->flags & FTRACE_ITER_FILTER) &&
f45948e8 2481 !(ftrace_lookup_ip(ops->filter_hash, rec->ip))) ||
0183fb1c 2482
41c52c0d 2483 ((iter->flags & FTRACE_ITER_NOTRACE) &&
647bcd03
SR
2484 !ftrace_lookup_ip(ops->notrace_hash, rec->ip)) ||
2485
2486 ((iter->flags & FTRACE_ITER_ENABLED) &&
23ea9c4d 2487 !(rec->flags & FTRACE_FL_ENABLED))) {
647bcd03 2488
5072c59f
SR
2489 rec = NULL;
2490 goto retry;
2491 }
2492 }
2493
4aeb6967 2494 if (!rec)
57c072c7 2495 return t_hash_start(m, pos);
4aeb6967
SR
2496
2497 iter->func = rec;
2498
2499 return iter;
5072c59f
SR
2500}
2501
98c4fd04
SR
2502static void reset_iter_read(struct ftrace_iterator *iter)
2503{
2504 iter->pos = 0;
2505 iter->func_pos = 0;
70f77b3f 2506 iter->flags &= ~(FTRACE_ITER_PRINTALL | FTRACE_ITER_HASH);
5072c59f
SR
2507}
2508
2509static void *t_start(struct seq_file *m, loff_t *pos)
2510{
2511 struct ftrace_iterator *iter = m->private;
fc13cb0c 2512 struct ftrace_ops *ops = iter->ops;
5072c59f 2513 void *p = NULL;
694ce0a5 2514 loff_t l;
5072c59f 2515
8fc0c701 2516 mutex_lock(&ftrace_lock);
45a4a237
SR
2517
2518 if (unlikely(ftrace_disabled))
2519 return NULL;
2520
98c4fd04
SR
2521 /*
2522 * If an lseek was done, then reset and start from beginning.
2523 */
2524 if (*pos < iter->pos)
2525 reset_iter_read(iter);
2526
0c75a3ed
SR
2527 /*
2528 * For set_ftrace_filter reading, if we have the filter
2529 * off, we can short cut and just print out that all
2530 * functions are enabled.
2531 */
06a51d93
SR
2532 if (iter->flags & FTRACE_ITER_FILTER &&
2533 ftrace_hash_empty(ops->filter_hash)) {
0c75a3ed 2534 if (*pos > 0)
8fc0c701 2535 return t_hash_start(m, pos);
0c75a3ed 2536 iter->flags |= FTRACE_ITER_PRINTALL;
df091625
CW
2537 /* reset in case of seek/pread */
2538 iter->flags &= ~FTRACE_ITER_HASH;
0c75a3ed
SR
2539 return iter;
2540 }
2541
8fc0c701
SR
2542 if (iter->flags & FTRACE_ITER_HASH)
2543 return t_hash_start(m, pos);
2544
98c4fd04
SR
2545 /*
2546 * Unfortunately, we need to restart at ftrace_pages_start
2547 * every time we let go of the ftrace_mutex. This is because
2548 * those pointers can change without the lock.
2549 */
694ce0a5
LZ
2550 iter->pg = ftrace_pages_start;
2551 iter->idx = 0;
2552 for (l = 0; l <= *pos; ) {
2553 p = t_next(m, p, &l);
2554 if (!p)
2555 break;
50cdaf08 2556 }
5821e1b7 2557
69a3083c
SR
2558 if (!p)
2559 return t_hash_start(m, pos);
4aeb6967
SR
2560
2561 return iter;
5072c59f
SR
2562}
2563
2564static void t_stop(struct seq_file *m, void *p)
2565{
8fc0c701 2566 mutex_unlock(&ftrace_lock);
5072c59f
SR
2567}
2568
2569static int t_show(struct seq_file *m, void *v)
2570{
0c75a3ed 2571 struct ftrace_iterator *iter = m->private;
4aeb6967 2572 struct dyn_ftrace *rec;
5072c59f 2573
8fc0c701 2574 if (iter->flags & FTRACE_ITER_HASH)
4aeb6967 2575 return t_hash_show(m, iter);
8fc0c701 2576
0c75a3ed
SR
2577 if (iter->flags & FTRACE_ITER_PRINTALL) {
2578 seq_printf(m, "#### all functions enabled ####\n");
2579 return 0;
2580 }
2581
4aeb6967
SR
2582 rec = iter->func;
2583
5072c59f
SR
2584 if (!rec)
2585 return 0;
2586
647bcd03
SR
2587 seq_printf(m, "%ps", (void *)rec->ip);
2588 if (iter->flags & FTRACE_ITER_ENABLED)
08f6fba5
SR
2589 seq_printf(m, " (%ld)%s",
2590 rec->flags & ~FTRACE_FL_MASK,
2591 rec->flags & FTRACE_FL_REGS ? " R" : "");
647bcd03 2592 seq_printf(m, "\n");
5072c59f
SR
2593
2594 return 0;
2595}
2596
88e9d34c 2597static const struct seq_operations show_ftrace_seq_ops = {
5072c59f
SR
2598 .start = t_start,
2599 .next = t_next,
2600 .stop = t_stop,
2601 .show = t_show,
2602};
2603
e309b41d 2604static int
5072c59f
SR
2605ftrace_avail_open(struct inode *inode, struct file *file)
2606{
2607 struct ftrace_iterator *iter;
5072c59f 2608
4eebcc81
SR
2609 if (unlikely(ftrace_disabled))
2610 return -ENODEV;
2611
50e18b94
JO
2612 iter = __seq_open_private(file, &show_ftrace_seq_ops, sizeof(*iter));
2613 if (iter) {
2614 iter->pg = ftrace_pages_start;
2615 iter->ops = &global_ops;
4bf39a94 2616 }
5072c59f 2617
50e18b94 2618 return iter ? 0 : -ENOMEM;
5072c59f
SR
2619}
2620
647bcd03
SR
2621static int
2622ftrace_enabled_open(struct inode *inode, struct file *file)
2623{
2624 struct ftrace_iterator *iter;
647bcd03
SR
2625
2626 if (unlikely(ftrace_disabled))
2627 return -ENODEV;
2628
50e18b94
JO
2629 iter = __seq_open_private(file, &show_ftrace_seq_ops, sizeof(*iter));
2630 if (iter) {
2631 iter->pg = ftrace_pages_start;
2632 iter->flags = FTRACE_ITER_ENABLED;
2633 iter->ops = &global_ops;
647bcd03
SR
2634 }
2635
50e18b94 2636 return iter ? 0 : -ENOMEM;
647bcd03
SR
2637}
2638
1cf41dd7 2639static void ftrace_filter_reset(struct ftrace_hash *hash)
5072c59f 2640{
52baf119 2641 mutex_lock(&ftrace_lock);
1cf41dd7 2642 ftrace_hash_clear(hash);
52baf119 2643 mutex_unlock(&ftrace_lock);
5072c59f
SR
2644}
2645
fc13cb0c
SR
2646/**
2647 * ftrace_regex_open - initialize function tracer filter files
2648 * @ops: The ftrace_ops that hold the hash filters
2649 * @flag: The type of filter to process
2650 * @inode: The inode, usually passed in to your open routine
2651 * @file: The file, usually passed in to your open routine
2652 *
2653 * ftrace_regex_open() initializes the filter files for the
2654 * @ops. Depending on @flag it may process the filter hash or
2655 * the notrace hash of @ops. With this called from the open
2656 * routine, you can use ftrace_filter_write() for the write
2657 * routine if @flag has FTRACE_ITER_FILTER set, or
2658 * ftrace_notrace_write() if @flag has FTRACE_ITER_NOTRACE set.
7f49ef69 2659 * ftrace_filter_lseek() should be used as the lseek routine, and
fc13cb0c
SR
2660 * release must call ftrace_regex_release().
2661 */
2662int
f45948e8 2663ftrace_regex_open(struct ftrace_ops *ops, int flag,
1cf41dd7 2664 struct inode *inode, struct file *file)
5072c59f
SR
2665{
2666 struct ftrace_iterator *iter;
f45948e8 2667 struct ftrace_hash *hash;
5072c59f
SR
2668 int ret = 0;
2669
f04f24fb
MH
2670 ftrace_ops_init(ops);
2671
4eebcc81
SR
2672 if (unlikely(ftrace_disabled))
2673 return -ENODEV;
2674
5072c59f
SR
2675 iter = kzalloc(sizeof(*iter), GFP_KERNEL);
2676 if (!iter)
2677 return -ENOMEM;
2678
689fd8b6 2679 if (trace_parser_get_init(&iter->parser, FTRACE_BUFF_MAX)) {
2680 kfree(iter);
2681 return -ENOMEM;
2682 }
2683
3f2367ba
MH
2684 iter->ops = ops;
2685 iter->flags = flag;
2686
2687 mutex_lock(&ops->regex_lock);
2688
f45948e8
SR
2689 if (flag & FTRACE_ITER_NOTRACE)
2690 hash = ops->notrace_hash;
2691 else
2692 hash = ops->filter_hash;
2693
33dc9b12 2694 if (file->f_mode & FMODE_WRITE) {
33dc9b12 2695 iter->hash = alloc_and_copy_ftrace_hash(FTRACE_HASH_DEFAULT_BITS, hash);
33dc9b12
SR
2696 if (!iter->hash) {
2697 trace_parser_put(&iter->parser);
2698 kfree(iter);
3f2367ba
MH
2699 ret = -ENOMEM;
2700 goto out_unlock;
33dc9b12
SR
2701 }
2702 }
1cf41dd7 2703
5072c59f 2704 if ((file->f_mode & FMODE_WRITE) &&
8650ae32 2705 (file->f_flags & O_TRUNC))
33dc9b12 2706 ftrace_filter_reset(iter->hash);
5072c59f
SR
2707
2708 if (file->f_mode & FMODE_READ) {
2709 iter->pg = ftrace_pages_start;
5072c59f
SR
2710
2711 ret = seq_open(file, &show_ftrace_seq_ops);
2712 if (!ret) {
2713 struct seq_file *m = file->private_data;
2714 m->private = iter;
79fe249c 2715 } else {
33dc9b12
SR
2716 /* Failed */
2717 free_ftrace_hash(iter->hash);
79fe249c 2718 trace_parser_put(&iter->parser);
5072c59f 2719 kfree(iter);
79fe249c 2720 }
5072c59f
SR
2721 } else
2722 file->private_data = iter;
3f2367ba
MH
2723
2724 out_unlock:
f04f24fb 2725 mutex_unlock(&ops->regex_lock);
5072c59f
SR
2726
2727 return ret;
2728}
2729
41c52c0d
SR
2730static int
2731ftrace_filter_open(struct inode *inode, struct file *file)
2732{
69a3083c
SR
2733 return ftrace_regex_open(&global_ops,
2734 FTRACE_ITER_FILTER | FTRACE_ITER_DO_HASH,
2735 inode, file);
41c52c0d
SR
2736}
2737
2738static int
2739ftrace_notrace_open(struct inode *inode, struct file *file)
2740{
f45948e8 2741 return ftrace_regex_open(&global_ops, FTRACE_ITER_NOTRACE,
1cf41dd7 2742 inode, file);
41c52c0d
SR
2743}
2744
64e7c440 2745static int ftrace_match(char *str, char *regex, int len, int type)
9f4801e3 2746{
9f4801e3 2747 int matched = 0;
751e9983 2748 int slen;
9f4801e3 2749
9f4801e3
SR
2750 switch (type) {
2751 case MATCH_FULL:
2752 if (strcmp(str, regex) == 0)
2753 matched = 1;
2754 break;
2755 case MATCH_FRONT_ONLY:
2756 if (strncmp(str, regex, len) == 0)
2757 matched = 1;
2758 break;
2759 case MATCH_MIDDLE_ONLY:
2760 if (strstr(str, regex))
2761 matched = 1;
2762 break;
2763 case MATCH_END_ONLY:
751e9983
LZ
2764 slen = strlen(str);
2765 if (slen >= len && memcmp(str + slen - len, regex, len) == 0)
9f4801e3
SR
2766 matched = 1;
2767 break;
2768 }
2769
2770 return matched;
2771}
2772
b448c4e3 2773static int
1cf41dd7 2774enter_record(struct ftrace_hash *hash, struct dyn_ftrace *rec, int not)
996e87be 2775{
b448c4e3 2776 struct ftrace_func_entry *entry;
b448c4e3
SR
2777 int ret = 0;
2778
1cf41dd7
SR
2779 entry = ftrace_lookup_ip(hash, rec->ip);
2780 if (not) {
2781 /* Do nothing if it doesn't exist */
2782 if (!entry)
2783 return 0;
b448c4e3 2784
33dc9b12 2785 free_hash_entry(hash, entry);
1cf41dd7
SR
2786 } else {
2787 /* Do nothing if it exists */
2788 if (entry)
2789 return 0;
b448c4e3 2790
1cf41dd7 2791 ret = add_hash_entry(hash, rec->ip);
b448c4e3
SR
2792 }
2793 return ret;
996e87be
SR
2794}
2795
64e7c440 2796static int
b9df92d2
SR
2797ftrace_match_record(struct dyn_ftrace *rec, char *mod,
2798 char *regex, int len, int type)
64e7c440
SR
2799{
2800 char str[KSYM_SYMBOL_LEN];
b9df92d2
SR
2801 char *modname;
2802
2803 kallsyms_lookup(rec->ip, NULL, NULL, &modname, str);
2804
2805 if (mod) {
2806 /* module lookup requires matching the module */
2807 if (!modname || strcmp(modname, mod))
2808 return 0;
2809
2810 /* blank search means to match all funcs in the mod */
2811 if (!len)
2812 return 1;
2813 }
64e7c440 2814
64e7c440
SR
2815 return ftrace_match(str, regex, len, type);
2816}
2817
1cf41dd7
SR
2818static int
2819match_records(struct ftrace_hash *hash, char *buff,
2820 int len, char *mod, int not)
9f4801e3 2821{
b9df92d2 2822 unsigned search_len = 0;
9f4801e3
SR
2823 struct ftrace_page *pg;
2824 struct dyn_ftrace *rec;
b9df92d2
SR
2825 int type = MATCH_FULL;
2826 char *search = buff;
311d16da 2827 int found = 0;
b448c4e3 2828 int ret;
9f4801e3 2829
b9df92d2
SR
2830 if (len) {
2831 type = filter_parse_regex(buff, len, &search, &not);
2832 search_len = strlen(search);
2833 }
9f4801e3 2834
52baf119 2835 mutex_lock(&ftrace_lock);
265c831c 2836
b9df92d2
SR
2837 if (unlikely(ftrace_disabled))
2838 goto out_unlock;
9f4801e3 2839
265c831c 2840 do_for_each_ftrace_rec(pg, rec) {
b9df92d2 2841 if (ftrace_match_record(rec, mod, search, search_len, type)) {
1cf41dd7 2842 ret = enter_record(hash, rec, not);
b448c4e3
SR
2843 if (ret < 0) {
2844 found = ret;
2845 goto out_unlock;
2846 }
311d16da 2847 found = 1;
265c831c
SR
2848 }
2849 } while_for_each_ftrace_rec();
b9df92d2 2850 out_unlock:
52baf119 2851 mutex_unlock(&ftrace_lock);
311d16da
LZ
2852
2853 return found;
5072c59f
SR
2854}
2855
64e7c440 2856static int
1cf41dd7 2857ftrace_match_records(struct ftrace_hash *hash, char *buff, int len)
64e7c440 2858{
1cf41dd7 2859 return match_records(hash, buff, len, NULL, 0);
64e7c440
SR
2860}
2861
1cf41dd7
SR
2862static int
2863ftrace_match_module_records(struct ftrace_hash *hash, char *buff, char *mod)
64e7c440 2864{
64e7c440 2865 int not = 0;
6a24a244 2866
64e7c440
SR
2867 /* blank or '*' mean the same */
2868 if (strcmp(buff, "*") == 0)
2869 buff[0] = 0;
2870
2871 /* handle the case of 'dont filter this module' */
2872 if (strcmp(buff, "!") == 0 || strcmp(buff, "!*") == 0) {
2873 buff[0] = 0;
2874 not = 1;
2875 }
2876
1cf41dd7 2877 return match_records(hash, buff, strlen(buff), mod, not);
64e7c440
SR
2878}
2879
f6180773
SR
2880/*
2881 * We register the module command as a template to show others how
2882 * to register the a command as well.
2883 */
2884
2885static int
43dd61c9
SR
2886ftrace_mod_callback(struct ftrace_hash *hash,
2887 char *func, char *cmd, char *param, int enable)
f6180773
SR
2888{
2889 char *mod;
b448c4e3 2890 int ret = -EINVAL;
f6180773
SR
2891
2892 /*
2893 * cmd == 'mod' because we only registered this func
2894 * for the 'mod' ftrace_func_command.
2895 * But if you register one func with multiple commands,
2896 * you can tell which command was used by the cmd
2897 * parameter.
2898 */
2899
2900 /* we must have a module name */
2901 if (!param)
b448c4e3 2902 return ret;
f6180773
SR
2903
2904 mod = strsep(&param, ":");
2905 if (!strlen(mod))
b448c4e3 2906 return ret;
f6180773 2907
1cf41dd7 2908 ret = ftrace_match_module_records(hash, func, mod);
b448c4e3
SR
2909 if (!ret)
2910 ret = -EINVAL;
2911 if (ret < 0)
2912 return ret;
2913
2914 return 0;
f6180773
SR
2915}
2916
2917static struct ftrace_func_command ftrace_mod_cmd = {
2918 .name = "mod",
2919 .func = ftrace_mod_callback,
2920};
2921
2922static int __init ftrace_mod_cmd_init(void)
2923{
2924 return register_ftrace_command(&ftrace_mod_cmd);
2925}
6f415672 2926core_initcall(ftrace_mod_cmd_init);
f6180773 2927
2f5f6ad9 2928static void function_trace_probe_call(unsigned long ip, unsigned long parent_ip,
a1e2e31d 2929 struct ftrace_ops *op, struct pt_regs *pt_regs)
59df055f 2930{
b6887d79 2931 struct ftrace_func_probe *entry;
59df055f 2932 struct hlist_head *hhd;
59df055f 2933 unsigned long key;
59df055f
SR
2934
2935 key = hash_long(ip, FTRACE_HASH_BITS);
2936
2937 hhd = &ftrace_func_hash[key];
2938
2939 if (hlist_empty(hhd))
2940 return;
2941
2942 /*
2943 * Disable preemption for these calls to prevent a RCU grace
2944 * period. This syncs the hash iteration and freeing of items
2945 * on the hash. rcu_read_lock is too dangerous here.
2946 */
5168ae50 2947 preempt_disable_notrace();
1bb539ca 2948 hlist_for_each_entry_rcu_notrace(entry, hhd, node) {
59df055f
SR
2949 if (entry->ip == ip)
2950 entry->ops->func(ip, parent_ip, &entry->data);
2951 }
5168ae50 2952 preempt_enable_notrace();
59df055f
SR
2953}
2954
b6887d79 2955static struct ftrace_ops trace_probe_ops __read_mostly =
59df055f 2956{
fb9fb015 2957 .func = function_trace_probe_call,
f04f24fb
MH
2958 .flags = FTRACE_OPS_FL_INITIALIZED,
2959 INIT_REGEX_LOCK(trace_probe_ops)
59df055f
SR
2960};
2961
b6887d79 2962static int ftrace_probe_registered;
59df055f 2963
b6887d79 2964static void __enable_ftrace_function_probe(void)
59df055f 2965{
b848914c 2966 int ret;
59df055f
SR
2967 int i;
2968
19dd603e
SRRH
2969 if (ftrace_probe_registered) {
2970 /* still need to update the function call sites */
2971 if (ftrace_enabled)
2972 ftrace_run_update_code(FTRACE_UPDATE_CALLS);
59df055f 2973 return;
19dd603e 2974 }
59df055f
SR
2975
2976 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
2977 struct hlist_head *hhd = &ftrace_func_hash[i];
2978 if (hhd->first)
2979 break;
2980 }
2981 /* Nothing registered? */
2982 if (i == FTRACE_FUNC_HASHSIZE)
2983 return;
2984
b848914c
SR
2985 ret = __register_ftrace_function(&trace_probe_ops);
2986 if (!ret)
a1cd6173 2987 ret = ftrace_startup(&trace_probe_ops, 0);
b848914c 2988
b6887d79 2989 ftrace_probe_registered = 1;
59df055f
SR
2990}
2991
b6887d79 2992static void __disable_ftrace_function_probe(void)
59df055f 2993{
b848914c 2994 int ret;
59df055f
SR
2995 int i;
2996
b6887d79 2997 if (!ftrace_probe_registered)
59df055f
SR
2998 return;
2999
3000 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
3001 struct hlist_head *hhd = &ftrace_func_hash[i];
3002 if (hhd->first)
3003 return;
3004 }
3005
3006 /* no more funcs left */
b848914c
SR
3007 ret = __unregister_ftrace_function(&trace_probe_ops);
3008 if (!ret)
3009 ftrace_shutdown(&trace_probe_ops, 0);
3010
b6887d79 3011 ftrace_probe_registered = 0;
59df055f
SR
3012}
3013
3014
7818b388 3015static void ftrace_free_entry(struct ftrace_func_probe *entry)
59df055f 3016{
59df055f 3017 if (entry->ops->free)
e67efb93 3018 entry->ops->free(entry->ops, entry->ip, &entry->data);
59df055f
SR
3019 kfree(entry);
3020}
3021
59df055f 3022int
b6887d79 3023register_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
3024 void *data)
3025{
b6887d79 3026 struct ftrace_func_probe *entry;
e1df4cb6
SRRH
3027 struct ftrace_hash **orig_hash = &trace_probe_ops.filter_hash;
3028 struct ftrace_hash *hash;
59df055f
SR
3029 struct ftrace_page *pg;
3030 struct dyn_ftrace *rec;
59df055f 3031 int type, len, not;
6a24a244 3032 unsigned long key;
59df055f
SR
3033 int count = 0;
3034 char *search;
e1df4cb6 3035 int ret;
59df055f 3036
3f6fe06d 3037 type = filter_parse_regex(glob, strlen(glob), &search, &not);
59df055f
SR
3038 len = strlen(search);
3039
b6887d79 3040 /* we do not support '!' for function probes */
59df055f
SR
3041 if (WARN_ON(not))
3042 return -EINVAL;
3043
3f2367ba 3044 mutex_lock(&trace_probe_ops.regex_lock);
59df055f 3045
e1df4cb6
SRRH
3046 hash = alloc_and_copy_ftrace_hash(FTRACE_HASH_DEFAULT_BITS, *orig_hash);
3047 if (!hash) {
3048 count = -ENOMEM;
5ae0bf59 3049 goto out;
e1df4cb6
SRRH
3050 }
3051
3052 if (unlikely(ftrace_disabled)) {
3053 count = -ENODEV;
5ae0bf59 3054 goto out;
e1df4cb6 3055 }
59df055f 3056
5ae0bf59
SRRH
3057 mutex_lock(&ftrace_lock);
3058
45a4a237 3059 do_for_each_ftrace_rec(pg, rec) {
59df055f 3060
b9df92d2 3061 if (!ftrace_match_record(rec, NULL, search, len, type))
59df055f
SR
3062 continue;
3063
3064 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
3065 if (!entry) {
b6887d79 3066 /* If we did not process any, then return error */
59df055f
SR
3067 if (!count)
3068 count = -ENOMEM;
3069 goto out_unlock;
3070 }
3071
3072 count++;
3073
3074 entry->data = data;
3075
3076 /*
3077 * The caller might want to do something special
3078 * for each function we find. We call the callback
3079 * to give the caller an opportunity to do so.
3080 */
e67efb93
SRRH
3081 if (ops->init) {
3082 if (ops->init(ops, rec->ip, &entry->data) < 0) {
59df055f
SR
3083 /* caller does not like this func */
3084 kfree(entry);
3085 continue;
3086 }
3087 }
3088
e1df4cb6
SRRH
3089 ret = enter_record(hash, rec, 0);
3090 if (ret < 0) {
3091 kfree(entry);
3092 count = ret;
3093 goto out_unlock;
3094 }
3095
59df055f
SR
3096 entry->ops = ops;
3097 entry->ip = rec->ip;
3098
3099 key = hash_long(entry->ip, FTRACE_HASH_BITS);
3100 hlist_add_head_rcu(&entry->node, &ftrace_func_hash[key]);
3101
3102 } while_for_each_ftrace_rec();
e1df4cb6
SRRH
3103
3104 ret = ftrace_hash_move(&trace_probe_ops, 1, orig_hash, hash);
3105 if (ret < 0)
3106 count = ret;
3107
b6887d79 3108 __enable_ftrace_function_probe();
59df055f
SR
3109
3110 out_unlock:
5ae0bf59
SRRH
3111 mutex_unlock(&ftrace_lock);
3112 out:
3f2367ba 3113 mutex_unlock(&trace_probe_ops.regex_lock);
e1df4cb6 3114 free_ftrace_hash(hash);
59df055f
SR
3115
3116 return count;
3117}
3118
3119enum {
b6887d79
SR
3120 PROBE_TEST_FUNC = 1,
3121 PROBE_TEST_DATA = 2
59df055f
SR
3122};
3123
3124static void
b6887d79 3125__unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
3126 void *data, int flags)
3127{
e1df4cb6 3128 struct ftrace_func_entry *rec_entry;
b6887d79 3129 struct ftrace_func_probe *entry;
7818b388 3130 struct ftrace_func_probe *p;
e1df4cb6 3131 struct ftrace_hash **orig_hash = &trace_probe_ops.filter_hash;
7818b388 3132 struct list_head free_list;
e1df4cb6 3133 struct ftrace_hash *hash;
b67bfe0d 3134 struct hlist_node *tmp;
59df055f
SR
3135 char str[KSYM_SYMBOL_LEN];
3136 int type = MATCH_FULL;
3137 int i, len = 0;
3138 char *search;
3139
b36461da 3140 if (glob && (strcmp(glob, "*") == 0 || !strlen(glob)))
59df055f 3141 glob = NULL;
b36461da 3142 else if (glob) {
59df055f
SR
3143 int not;
3144
3f6fe06d 3145 type = filter_parse_regex(glob, strlen(glob), &search, &not);
59df055f
SR
3146 len = strlen(search);
3147
b6887d79 3148 /* we do not support '!' for function probes */
59df055f
SR
3149 if (WARN_ON(not))
3150 return;
3151 }
3152
3f2367ba 3153 mutex_lock(&trace_probe_ops.regex_lock);
e1df4cb6
SRRH
3154
3155 hash = alloc_and_copy_ftrace_hash(FTRACE_HASH_DEFAULT_BITS, *orig_hash);
3156 if (!hash)
3157 /* Hmm, should report this somehow */
3158 goto out_unlock;
3159
7818b388
SRRH
3160 INIT_LIST_HEAD(&free_list);
3161
59df055f
SR
3162 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
3163 struct hlist_head *hhd = &ftrace_func_hash[i];
3164
b67bfe0d 3165 hlist_for_each_entry_safe(entry, tmp, hhd, node) {
59df055f
SR
3166
3167 /* break up if statements for readability */
b6887d79 3168 if ((flags & PROBE_TEST_FUNC) && entry->ops != ops)
59df055f
SR
3169 continue;
3170
b6887d79 3171 if ((flags & PROBE_TEST_DATA) && entry->data != data)
59df055f
SR
3172 continue;
3173
3174 /* do this last, since it is the most expensive */
3175 if (glob) {
3176 kallsyms_lookup(entry->ip, NULL, NULL,
3177 NULL, str);
3178 if (!ftrace_match(str, glob, len, type))
3179 continue;
3180 }
3181
e1df4cb6
SRRH
3182 rec_entry = ftrace_lookup_ip(hash, entry->ip);
3183 /* It is possible more than one entry had this ip */
3184 if (rec_entry)
3185 free_hash_entry(hash, rec_entry);
3186
740466bc 3187 hlist_del_rcu(&entry->node);
7818b388 3188 list_add(&entry->free_list, &free_list);
59df055f
SR
3189 }
3190 }
3f2367ba 3191 mutex_lock(&ftrace_lock);
b6887d79 3192 __disable_ftrace_function_probe();
e1df4cb6
SRRH
3193 /*
3194 * Remove after the disable is called. Otherwise, if the last
3195 * probe is removed, a null hash means *all enabled*.
3196 */
3197 ftrace_hash_move(&trace_probe_ops, 1, orig_hash, hash);
7818b388
SRRH
3198 synchronize_sched();
3199 list_for_each_entry_safe(entry, p, &free_list, free_list) {
3200 list_del(&entry->free_list);
3201 ftrace_free_entry(entry);
3202 }
3f2367ba 3203 mutex_unlock(&ftrace_lock);
7818b388 3204
e1df4cb6 3205 out_unlock:
3f2367ba 3206 mutex_unlock(&trace_probe_ops.regex_lock);
e1df4cb6 3207 free_ftrace_hash(hash);
59df055f
SR
3208}
3209
3210void
b6887d79 3211unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
3212 void *data)
3213{
b6887d79
SR
3214 __unregister_ftrace_function_probe(glob, ops, data,
3215 PROBE_TEST_FUNC | PROBE_TEST_DATA);
59df055f
SR
3216}
3217
3218void
b6887d79 3219unregister_ftrace_function_probe_func(char *glob, struct ftrace_probe_ops *ops)
59df055f 3220{
b6887d79 3221 __unregister_ftrace_function_probe(glob, ops, NULL, PROBE_TEST_FUNC);
59df055f
SR
3222}
3223
b6887d79 3224void unregister_ftrace_function_probe_all(char *glob)
59df055f 3225{
b6887d79 3226 __unregister_ftrace_function_probe(glob, NULL, NULL, 0);
59df055f
SR
3227}
3228
f6180773
SR
3229static LIST_HEAD(ftrace_commands);
3230static DEFINE_MUTEX(ftrace_cmd_mutex);
3231
3232int register_ftrace_command(struct ftrace_func_command *cmd)
3233{
3234 struct ftrace_func_command *p;
3235 int ret = 0;
3236
3237 mutex_lock(&ftrace_cmd_mutex);
3238 list_for_each_entry(p, &ftrace_commands, list) {
3239 if (strcmp(cmd->name, p->name) == 0) {
3240 ret = -EBUSY;
3241 goto out_unlock;
3242 }
3243 }
3244 list_add(&cmd->list, &ftrace_commands);
3245 out_unlock:
3246 mutex_unlock(&ftrace_cmd_mutex);
3247
3248 return ret;
3249}
3250
3251int unregister_ftrace_command(struct ftrace_func_command *cmd)
3252{
3253 struct ftrace_func_command *p, *n;
3254 int ret = -ENODEV;
3255
3256 mutex_lock(&ftrace_cmd_mutex);
3257 list_for_each_entry_safe(p, n, &ftrace_commands, list) {
3258 if (strcmp(cmd->name, p->name) == 0) {
3259 ret = 0;
3260 list_del_init(&p->list);
3261 goto out_unlock;
3262 }
3263 }
3264 out_unlock:
3265 mutex_unlock(&ftrace_cmd_mutex);
3266
3267 return ret;
3268}
3269
33dc9b12
SR
3270static int ftrace_process_regex(struct ftrace_hash *hash,
3271 char *buff, int len, int enable)
64e7c440 3272{
f6180773 3273 char *func, *command, *next = buff;
6a24a244 3274 struct ftrace_func_command *p;
0aff1c0c 3275 int ret = -EINVAL;
64e7c440
SR
3276
3277 func = strsep(&next, ":");
3278
3279 if (!next) {
1cf41dd7 3280 ret = ftrace_match_records(hash, func, len);
b448c4e3
SR
3281 if (!ret)
3282 ret = -EINVAL;
3283 if (ret < 0)
3284 return ret;
3285 return 0;
64e7c440
SR
3286 }
3287
f6180773 3288 /* command found */
64e7c440
SR
3289
3290 command = strsep(&next, ":");
3291
f6180773
SR
3292 mutex_lock(&ftrace_cmd_mutex);
3293 list_for_each_entry(p, &ftrace_commands, list) {
3294 if (strcmp(p->name, command) == 0) {
43dd61c9 3295 ret = p->func(hash, func, command, next, enable);
f6180773
SR
3296 goto out_unlock;
3297 }
64e7c440 3298 }
f6180773
SR
3299 out_unlock:
3300 mutex_unlock(&ftrace_cmd_mutex);
64e7c440 3301
f6180773 3302 return ret;
64e7c440
SR
3303}
3304
e309b41d 3305static ssize_t
41c52c0d
SR
3306ftrace_regex_write(struct file *file, const char __user *ubuf,
3307 size_t cnt, loff_t *ppos, int enable)
5072c59f
SR
3308{
3309 struct ftrace_iterator *iter;
689fd8b6 3310 struct trace_parser *parser;
3311 ssize_t ret, read;
5072c59f 3312
4ba7978e 3313 if (!cnt)
5072c59f
SR
3314 return 0;
3315
5072c59f
SR
3316 if (file->f_mode & FMODE_READ) {
3317 struct seq_file *m = file->private_data;
3318 iter = m->private;
3319 } else
3320 iter = file->private_data;
3321
f04f24fb 3322 if (unlikely(ftrace_disabled))
3f2367ba
MH
3323 return -ENODEV;
3324
3325 /* iter->hash is a local copy, so we don't need regex_lock */
f04f24fb 3326
689fd8b6 3327 parser = &iter->parser;
3328 read = trace_get_user(parser, ubuf, cnt, ppos);
5072c59f 3329
4ba7978e 3330 if (read >= 0 && trace_parser_loaded(parser) &&
689fd8b6 3331 !trace_parser_cont(parser)) {
33dc9b12 3332 ret = ftrace_process_regex(iter->hash, parser->buffer,
689fd8b6 3333 parser->idx, enable);
313254a9 3334 trace_parser_clear(parser);
7c088b51 3335 if (ret < 0)
3f2367ba 3336 goto out;
eda1e328 3337 }
5072c59f 3338
5072c59f 3339 ret = read;
3f2367ba 3340 out:
5072c59f
SR
3341 return ret;
3342}
3343
fc13cb0c 3344ssize_t
41c52c0d
SR
3345ftrace_filter_write(struct file *file, const char __user *ubuf,
3346 size_t cnt, loff_t *ppos)
3347{
3348 return ftrace_regex_write(file, ubuf, cnt, ppos, 1);
3349}
3350
fc13cb0c 3351ssize_t
41c52c0d
SR
3352ftrace_notrace_write(struct file *file, const char __user *ubuf,
3353 size_t cnt, loff_t *ppos)
3354{
3355 return ftrace_regex_write(file, ubuf, cnt, ppos, 0);
3356}
3357
33dc9b12 3358static int
647664ea
MH
3359ftrace_match_addr(struct ftrace_hash *hash, unsigned long ip, int remove)
3360{
3361 struct ftrace_func_entry *entry;
3362
3363 if (!ftrace_location(ip))
3364 return -EINVAL;
3365
3366 if (remove) {
3367 entry = ftrace_lookup_ip(hash, ip);
3368 if (!entry)
3369 return -ENOENT;
3370 free_hash_entry(hash, entry);
3371 return 0;
3372 }
3373
3374 return add_hash_entry(hash, ip);
3375}
3376
3377static int
3378ftrace_set_hash(struct ftrace_ops *ops, unsigned char *buf, int len,
3379 unsigned long ip, int remove, int reset, int enable)
41c52c0d 3380{
33dc9b12 3381 struct ftrace_hash **orig_hash;
f45948e8 3382 struct ftrace_hash *hash;
33dc9b12 3383 int ret;
f45948e8 3384
936e074b
SR
3385 /* All global ops uses the global ops filters */
3386 if (ops->flags & FTRACE_OPS_FL_GLOBAL)
3387 ops = &global_ops;
3388
41c52c0d 3389 if (unlikely(ftrace_disabled))
33dc9b12 3390 return -ENODEV;
41c52c0d 3391
3f2367ba
MH
3392 mutex_lock(&ops->regex_lock);
3393
f45948e8 3394 if (enable)
33dc9b12 3395 orig_hash = &ops->filter_hash;
f45948e8 3396 else
33dc9b12
SR
3397 orig_hash = &ops->notrace_hash;
3398
3399 hash = alloc_and_copy_ftrace_hash(FTRACE_HASH_DEFAULT_BITS, *orig_hash);
3f2367ba
MH
3400 if (!hash) {
3401 ret = -ENOMEM;
3402 goto out_regex_unlock;
3403 }
f45948e8 3404
41c52c0d 3405 if (reset)
1cf41dd7 3406 ftrace_filter_reset(hash);
ac483c44
JO
3407 if (buf && !ftrace_match_records(hash, buf, len)) {
3408 ret = -EINVAL;
3409 goto out_regex_unlock;
3410 }
647664ea
MH
3411 if (ip) {
3412 ret = ftrace_match_addr(hash, ip, remove);
3413 if (ret < 0)
3414 goto out_regex_unlock;
3415 }
33dc9b12
SR
3416
3417 mutex_lock(&ftrace_lock);
41fb61c2 3418 ret = ftrace_hash_move(ops, enable, orig_hash, hash);
072126f4
SR
3419 if (!ret && ops->flags & FTRACE_OPS_FL_ENABLED
3420 && ftrace_enabled)
30fb6aa7 3421 ftrace_run_update_code(FTRACE_UPDATE_CALLS);
072126f4 3422
33dc9b12
SR
3423 mutex_unlock(&ftrace_lock);
3424
ac483c44 3425 out_regex_unlock:
f04f24fb 3426 mutex_unlock(&ops->regex_lock);
33dc9b12
SR
3427
3428 free_ftrace_hash(hash);
3429 return ret;
41c52c0d
SR
3430}
3431
647664ea
MH
3432static int
3433ftrace_set_addr(struct ftrace_ops *ops, unsigned long ip, int remove,
3434 int reset, int enable)
3435{
3436 return ftrace_set_hash(ops, 0, 0, ip, remove, reset, enable);
3437}
3438
3439/**
3440 * ftrace_set_filter_ip - set a function to filter on in ftrace by address
3441 * @ops - the ops to set the filter with
3442 * @ip - the address to add to or remove from the filter.
3443 * @remove - non zero to remove the ip from the filter
3444 * @reset - non zero to reset all filters before applying this filter.
3445 *
3446 * Filters denote which functions should be enabled when tracing is enabled
3447 * If @ip is NULL, it failes to update filter.
3448 */
3449int ftrace_set_filter_ip(struct ftrace_ops *ops, unsigned long ip,
3450 int remove, int reset)
3451{
f04f24fb 3452 ftrace_ops_init(ops);
647664ea
MH
3453 return ftrace_set_addr(ops, ip, remove, reset, 1);
3454}
3455EXPORT_SYMBOL_GPL(ftrace_set_filter_ip);
3456
3457static int
3458ftrace_set_regex(struct ftrace_ops *ops, unsigned char *buf, int len,
3459 int reset, int enable)
3460{
3461 return ftrace_set_hash(ops, buf, len, 0, 0, reset, enable);
3462}
3463
77a2b37d
SR
3464/**
3465 * ftrace_set_filter - set a function to filter on in ftrace
936e074b
SR
3466 * @ops - the ops to set the filter with
3467 * @buf - the string that holds the function filter text.
3468 * @len - the length of the string.
3469 * @reset - non zero to reset all filters before applying this filter.
3470 *
3471 * Filters denote which functions should be enabled when tracing is enabled.
3472 * If @buf is NULL and reset is set, all functions will be enabled for tracing.
3473 */
ac483c44 3474int ftrace_set_filter(struct ftrace_ops *ops, unsigned char *buf,
936e074b
SR
3475 int len, int reset)
3476{
f04f24fb 3477 ftrace_ops_init(ops);
ac483c44 3478 return ftrace_set_regex(ops, buf, len, reset, 1);
936e074b
SR
3479}
3480EXPORT_SYMBOL_GPL(ftrace_set_filter);
3481
3482/**
3483 * ftrace_set_notrace - set a function to not trace in ftrace
3484 * @ops - the ops to set the notrace filter with
3485 * @buf - the string that holds the function notrace text.
3486 * @len - the length of the string.
3487 * @reset - non zero to reset all filters before applying this filter.
3488 *
3489 * Notrace Filters denote which functions should not be enabled when tracing
3490 * is enabled. If @buf is NULL and reset is set, all functions will be enabled
3491 * for tracing.
3492 */
ac483c44 3493int ftrace_set_notrace(struct ftrace_ops *ops, unsigned char *buf,
936e074b
SR
3494 int len, int reset)
3495{
f04f24fb 3496 ftrace_ops_init(ops);
ac483c44 3497 return ftrace_set_regex(ops, buf, len, reset, 0);
936e074b
SR
3498}
3499EXPORT_SYMBOL_GPL(ftrace_set_notrace);
3500/**
3501 * ftrace_set_filter - set a function to filter on in ftrace
3502 * @ops - the ops to set the filter with
77a2b37d
SR
3503 * @buf - the string that holds the function filter text.
3504 * @len - the length of the string.
3505 * @reset - non zero to reset all filters before applying this filter.
3506 *
3507 * Filters denote which functions should be enabled when tracing is enabled.
3508 * If @buf is NULL and reset is set, all functions will be enabled for tracing.
3509 */
936e074b 3510void ftrace_set_global_filter(unsigned char *buf, int len, int reset)
77a2b37d 3511{
f45948e8 3512 ftrace_set_regex(&global_ops, buf, len, reset, 1);
41c52c0d 3513}
936e074b 3514EXPORT_SYMBOL_GPL(ftrace_set_global_filter);
4eebcc81 3515
41c52c0d
SR
3516/**
3517 * ftrace_set_notrace - set a function to not trace in ftrace
936e074b 3518 * @ops - the ops to set the notrace filter with
41c52c0d
SR
3519 * @buf - the string that holds the function notrace text.
3520 * @len - the length of the string.
3521 * @reset - non zero to reset all filters before applying this filter.
3522 *
3523 * Notrace Filters denote which functions should not be enabled when tracing
3524 * is enabled. If @buf is NULL and reset is set, all functions will be enabled
3525 * for tracing.
3526 */
936e074b 3527void ftrace_set_global_notrace(unsigned char *buf, int len, int reset)
41c52c0d 3528{
f45948e8 3529 ftrace_set_regex(&global_ops, buf, len, reset, 0);
77a2b37d 3530}
936e074b 3531EXPORT_SYMBOL_GPL(ftrace_set_global_notrace);
77a2b37d 3532
2af15d6a
SR
3533/*
3534 * command line interface to allow users to set filters on boot up.
3535 */
3536#define FTRACE_FILTER_SIZE COMMAND_LINE_SIZE
3537static char ftrace_notrace_buf[FTRACE_FILTER_SIZE] __initdata;
3538static char ftrace_filter_buf[FTRACE_FILTER_SIZE] __initdata;
3539
3540static int __init set_ftrace_notrace(char *str)
3541{
75761cc1 3542 strlcpy(ftrace_notrace_buf, str, FTRACE_FILTER_SIZE);
2af15d6a
SR
3543 return 1;
3544}
3545__setup("ftrace_notrace=", set_ftrace_notrace);
3546
3547static int __init set_ftrace_filter(char *str)
3548{
75761cc1 3549 strlcpy(ftrace_filter_buf, str, FTRACE_FILTER_SIZE);
2af15d6a
SR
3550 return 1;
3551}
3552__setup("ftrace_filter=", set_ftrace_filter);
3553
369bc18f 3554#ifdef CONFIG_FUNCTION_GRAPH_TRACER
f6060f46 3555static char ftrace_graph_buf[FTRACE_FILTER_SIZE] __initdata;
801c29fd
SR
3556static int ftrace_set_func(unsigned long *array, int *idx, char *buffer);
3557
369bc18f
SA
3558static int __init set_graph_function(char *str)
3559{
06f43d66 3560 strlcpy(ftrace_graph_buf, str, FTRACE_FILTER_SIZE);
369bc18f
SA
3561 return 1;
3562}
3563__setup("ftrace_graph_filter=", set_graph_function);
3564
3565static void __init set_ftrace_early_graph(char *buf)
3566{
3567 int ret;
3568 char *func;
3569
3570 while (buf) {
3571 func = strsep(&buf, ",");
3572 /* we allow only one expression at a time */
3573 ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
3574 func);
3575 if (ret)
3576 printk(KERN_DEBUG "ftrace: function %s not "
3577 "traceable\n", func);
3578 }
3579}
3580#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
3581
2a85a37f
SR
3582void __init
3583ftrace_set_early_filter(struct ftrace_ops *ops, char *buf, int enable)
2af15d6a
SR
3584{
3585 char *func;
3586
f04f24fb
MH
3587 ftrace_ops_init(ops);
3588
2af15d6a
SR
3589 while (buf) {
3590 func = strsep(&buf, ",");
f45948e8 3591 ftrace_set_regex(ops, func, strlen(func), 0, enable);
2af15d6a
SR
3592 }
3593}
3594
3595static void __init set_ftrace_early_filters(void)
3596{
3597 if (ftrace_filter_buf[0])
2a85a37f 3598 ftrace_set_early_filter(&global_ops, ftrace_filter_buf, 1);
2af15d6a 3599 if (ftrace_notrace_buf[0])
2a85a37f 3600 ftrace_set_early_filter(&global_ops, ftrace_notrace_buf, 0);
369bc18f
SA
3601#ifdef CONFIG_FUNCTION_GRAPH_TRACER
3602 if (ftrace_graph_buf[0])
3603 set_ftrace_early_graph(ftrace_graph_buf);
3604#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2af15d6a
SR
3605}
3606
fc13cb0c 3607int ftrace_regex_release(struct inode *inode, struct file *file)
5072c59f
SR
3608{
3609 struct seq_file *m = (struct seq_file *)file->private_data;
3610 struct ftrace_iterator *iter;
33dc9b12 3611 struct ftrace_hash **orig_hash;
689fd8b6 3612 struct trace_parser *parser;
ed926f9b 3613 int filter_hash;
33dc9b12 3614 int ret;
5072c59f 3615
5072c59f
SR
3616 if (file->f_mode & FMODE_READ) {
3617 iter = m->private;
5072c59f
SR
3618 seq_release(inode, file);
3619 } else
3620 iter = file->private_data;
3621
689fd8b6 3622 parser = &iter->parser;
3623 if (trace_parser_loaded(parser)) {
3624 parser->buffer[parser->idx] = 0;
1cf41dd7 3625 ftrace_match_records(iter->hash, parser->buffer, parser->idx);
5072c59f
SR
3626 }
3627
689fd8b6 3628 trace_parser_put(parser);
689fd8b6 3629
3f2367ba
MH
3630 mutex_lock(&iter->ops->regex_lock);
3631
058e297d 3632 if (file->f_mode & FMODE_WRITE) {
ed926f9b
SR
3633 filter_hash = !!(iter->flags & FTRACE_ITER_FILTER);
3634
3635 if (filter_hash)
33dc9b12 3636 orig_hash = &iter->ops->filter_hash;
ed926f9b
SR
3637 else
3638 orig_hash = &iter->ops->notrace_hash;
33dc9b12 3639
058e297d 3640 mutex_lock(&ftrace_lock);
41fb61c2
SR
3641 ret = ftrace_hash_move(iter->ops, filter_hash,
3642 orig_hash, iter->hash);
3643 if (!ret && (iter->ops->flags & FTRACE_OPS_FL_ENABLED)
3644 && ftrace_enabled)
30fb6aa7 3645 ftrace_run_update_code(FTRACE_UPDATE_CALLS);
41fb61c2 3646
058e297d
SR
3647 mutex_unlock(&ftrace_lock);
3648 }
3f2367ba
MH
3649
3650 mutex_unlock(&iter->ops->regex_lock);
33dc9b12
SR
3651 free_ftrace_hash(iter->hash);
3652 kfree(iter);
058e297d 3653
5072c59f
SR
3654 return 0;
3655}
3656
5e2336a0 3657static const struct file_operations ftrace_avail_fops = {
5072c59f
SR
3658 .open = ftrace_avail_open,
3659 .read = seq_read,
3660 .llseek = seq_lseek,
3be04b47 3661 .release = seq_release_private,
5072c59f
SR
3662};
3663
647bcd03
SR
3664static const struct file_operations ftrace_enabled_fops = {
3665 .open = ftrace_enabled_open,
3666 .read = seq_read,
3667 .llseek = seq_lseek,
3668 .release = seq_release_private,
3669};
3670
5e2336a0 3671static const struct file_operations ftrace_filter_fops = {
5072c59f 3672 .open = ftrace_filter_open,
850a80cf 3673 .read = seq_read,
5072c59f 3674 .write = ftrace_filter_write,
6a76f8c0 3675 .llseek = ftrace_filter_lseek,
1cf41dd7 3676 .release = ftrace_regex_release,
5072c59f
SR
3677};
3678
5e2336a0 3679static const struct file_operations ftrace_notrace_fops = {
41c52c0d 3680 .open = ftrace_notrace_open,
850a80cf 3681 .read = seq_read,
41c52c0d 3682 .write = ftrace_notrace_write,
6a76f8c0 3683 .llseek = ftrace_filter_lseek,
1cf41dd7 3684 .release = ftrace_regex_release,
41c52c0d
SR
3685};
3686
ea4e2bc4
SR
3687#ifdef CONFIG_FUNCTION_GRAPH_TRACER
3688
3689static DEFINE_MUTEX(graph_lock);
3690
3691int ftrace_graph_count;
c7c6b1fe 3692int ftrace_graph_filter_enabled;
ea4e2bc4
SR
3693unsigned long ftrace_graph_funcs[FTRACE_GRAPH_MAX_FUNCS] __read_mostly;
3694
3695static void *
85951842 3696__g_next(struct seq_file *m, loff_t *pos)
ea4e2bc4 3697{
85951842 3698 if (*pos >= ftrace_graph_count)
ea4e2bc4 3699 return NULL;
a4ec5e0c 3700 return &ftrace_graph_funcs[*pos];
85951842 3701}
ea4e2bc4 3702
85951842
LZ
3703static void *
3704g_next(struct seq_file *m, void *v, loff_t *pos)
3705{
3706 (*pos)++;
3707 return __g_next(m, pos);
ea4e2bc4
SR
3708}
3709
3710static void *g_start(struct seq_file *m, loff_t *pos)
3711{
ea4e2bc4
SR
3712 mutex_lock(&graph_lock);
3713
f9349a8f 3714 /* Nothing, tell g_show to print all functions are enabled */
c7c6b1fe 3715 if (!ftrace_graph_filter_enabled && !*pos)
f9349a8f
FW
3716 return (void *)1;
3717
85951842 3718 return __g_next(m, pos);
ea4e2bc4
SR
3719}
3720
3721static void g_stop(struct seq_file *m, void *p)
3722{
3723 mutex_unlock(&graph_lock);
3724}
3725
3726static int g_show(struct seq_file *m, void *v)
3727{
3728 unsigned long *ptr = v;
ea4e2bc4
SR
3729
3730 if (!ptr)
3731 return 0;
3732
f9349a8f
FW
3733 if (ptr == (unsigned long *)1) {
3734 seq_printf(m, "#### all functions enabled ####\n");
3735 return 0;
3736 }
3737
b375a11a 3738 seq_printf(m, "%ps\n", (void *)*ptr);
ea4e2bc4
SR
3739
3740 return 0;
3741}
3742
88e9d34c 3743static const struct seq_operations ftrace_graph_seq_ops = {
ea4e2bc4
SR
3744 .start = g_start,
3745 .next = g_next,
3746 .stop = g_stop,
3747 .show = g_show,
3748};
3749
3750static int
3751ftrace_graph_open(struct inode *inode, struct file *file)
3752{
3753 int ret = 0;
3754
3755 if (unlikely(ftrace_disabled))
3756 return -ENODEV;
3757
3758 mutex_lock(&graph_lock);
3759 if ((file->f_mode & FMODE_WRITE) &&
8650ae32 3760 (file->f_flags & O_TRUNC)) {
c7c6b1fe 3761 ftrace_graph_filter_enabled = 0;
ea4e2bc4
SR
3762 ftrace_graph_count = 0;
3763 memset(ftrace_graph_funcs, 0, sizeof(ftrace_graph_funcs));
3764 }
a4ec5e0c 3765 mutex_unlock(&graph_lock);
ea4e2bc4 3766
a4ec5e0c 3767 if (file->f_mode & FMODE_READ)
ea4e2bc4 3768 ret = seq_open(file, &ftrace_graph_seq_ops);
ea4e2bc4
SR
3769
3770 return ret;
3771}
3772
87827111
LZ
3773static int
3774ftrace_graph_release(struct inode *inode, struct file *file)
3775{
3776 if (file->f_mode & FMODE_READ)
3777 seq_release(inode, file);
3778 return 0;
3779}
3780
ea4e2bc4 3781static int
f9349a8f 3782ftrace_set_func(unsigned long *array, int *idx, char *buffer)
ea4e2bc4 3783{
ea4e2bc4
SR
3784 struct dyn_ftrace *rec;
3785 struct ftrace_page *pg;
f9349a8f 3786 int search_len;
c7c6b1fe 3787 int fail = 1;
f9349a8f
FW
3788 int type, not;
3789 char *search;
3790 bool exists;
3791 int i;
ea4e2bc4 3792
f9349a8f 3793 /* decode regex */
3f6fe06d 3794 type = filter_parse_regex(buffer, strlen(buffer), &search, &not);
c7c6b1fe
LZ
3795 if (!not && *idx >= FTRACE_GRAPH_MAX_FUNCS)
3796 return -EBUSY;
f9349a8f
FW
3797
3798 search_len = strlen(search);
3799
52baf119 3800 mutex_lock(&ftrace_lock);
45a4a237
SR
3801
3802 if (unlikely(ftrace_disabled)) {
3803 mutex_unlock(&ftrace_lock);
3804 return -ENODEV;
3805 }
3806
265c831c
SR
3807 do_for_each_ftrace_rec(pg, rec) {
3808
b9df92d2 3809 if (ftrace_match_record(rec, NULL, search, search_len, type)) {
c7c6b1fe 3810 /* if it is in the array */
f9349a8f 3811 exists = false;
c7c6b1fe 3812 for (i = 0; i < *idx; i++) {
f9349a8f
FW
3813 if (array[i] == rec->ip) {
3814 exists = true;
265c831c
SR
3815 break;
3816 }
c7c6b1fe
LZ
3817 }
3818
3819 if (!not) {
3820 fail = 0;
3821 if (!exists) {
3822 array[(*idx)++] = rec->ip;
3823 if (*idx >= FTRACE_GRAPH_MAX_FUNCS)
3824 goto out;
3825 }
3826 } else {
3827 if (exists) {
3828 array[i] = array[--(*idx)];
3829 array[*idx] = 0;
3830 fail = 0;
3831 }
3832 }
ea4e2bc4 3833 }
265c831c 3834 } while_for_each_ftrace_rec();
c7c6b1fe 3835out:
52baf119 3836 mutex_unlock(&ftrace_lock);
ea4e2bc4 3837
c7c6b1fe
LZ
3838 if (fail)
3839 return -EINVAL;
3840
9f50afcc
NK
3841 ftrace_graph_filter_enabled = !!(*idx);
3842
c7c6b1fe 3843 return 0;
ea4e2bc4
SR
3844}
3845
3846static ssize_t
3847ftrace_graph_write(struct file *file, const char __user *ubuf,
3848 size_t cnt, loff_t *ppos)
3849{
689fd8b6 3850 struct trace_parser parser;
4ba7978e 3851 ssize_t read, ret;
ea4e2bc4 3852
c7c6b1fe 3853 if (!cnt)
ea4e2bc4
SR
3854 return 0;
3855
3856 mutex_lock(&graph_lock);
3857
689fd8b6 3858 if (trace_parser_get_init(&parser, FTRACE_BUFF_MAX)) {
3859 ret = -ENOMEM;
1eb90f13 3860 goto out_unlock;
ea4e2bc4
SR
3861 }
3862
689fd8b6 3863 read = trace_get_user(&parser, ubuf, cnt, ppos);
ea4e2bc4 3864
4ba7978e 3865 if (read >= 0 && trace_parser_loaded((&parser))) {
689fd8b6 3866 parser.buffer[parser.idx] = 0;
3867
3868 /* we allow only one expression at a time */
a4ec5e0c 3869 ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
689fd8b6 3870 parser.buffer);
ea4e2bc4 3871 if (ret)
1eb90f13 3872 goto out_free;
ea4e2bc4 3873 }
ea4e2bc4
SR
3874
3875 ret = read;
1eb90f13
LZ
3876
3877out_free:
689fd8b6 3878 trace_parser_put(&parser);
1eb90f13 3879out_unlock:
ea4e2bc4
SR
3880 mutex_unlock(&graph_lock);
3881
3882 return ret;
3883}
3884
3885static const struct file_operations ftrace_graph_fops = {
87827111
LZ
3886 .open = ftrace_graph_open,
3887 .read = seq_read,
3888 .write = ftrace_graph_write,
6a76f8c0 3889 .llseek = ftrace_filter_lseek,
87827111 3890 .release = ftrace_graph_release,
ea4e2bc4
SR
3891};
3892#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
3893
df4fc315 3894static __init int ftrace_init_dyn_debugfs(struct dentry *d_tracer)
5072c59f 3895{
5072c59f 3896
5452af66
FW
3897 trace_create_file("available_filter_functions", 0444,
3898 d_tracer, NULL, &ftrace_avail_fops);
5072c59f 3899
647bcd03
SR
3900 trace_create_file("enabled_functions", 0444,
3901 d_tracer, NULL, &ftrace_enabled_fops);
3902
5452af66
FW
3903 trace_create_file("set_ftrace_filter", 0644, d_tracer,
3904 NULL, &ftrace_filter_fops);
41c52c0d 3905
5452af66 3906 trace_create_file("set_ftrace_notrace", 0644, d_tracer,
41c52c0d 3907 NULL, &ftrace_notrace_fops);
ad90c0e3 3908
ea4e2bc4 3909#ifdef CONFIG_FUNCTION_GRAPH_TRACER
5452af66 3910 trace_create_file("set_graph_function", 0444, d_tracer,
ea4e2bc4
SR
3911 NULL,
3912 &ftrace_graph_fops);
ea4e2bc4
SR
3913#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
3914
5072c59f
SR
3915 return 0;
3916}
3917
9fd49328 3918static int ftrace_cmp_ips(const void *a, const void *b)
68950619 3919{
9fd49328
SR
3920 const unsigned long *ipa = a;
3921 const unsigned long *ipb = b;
68950619 3922
9fd49328
SR
3923 if (*ipa > *ipb)
3924 return 1;
3925 if (*ipa < *ipb)
3926 return -1;
3927 return 0;
3928}
3929
3930static void ftrace_swap_ips(void *a, void *b, int size)
3931{
3932 unsigned long *ipa = a;
3933 unsigned long *ipb = b;
3934 unsigned long t;
3935
3936 t = *ipa;
3937 *ipa = *ipb;
3938 *ipb = t;
68950619
SR
3939}
3940
5cb084bb 3941static int ftrace_process_locs(struct module *mod,
31e88909 3942 unsigned long *start,
68bf21aa
SR
3943 unsigned long *end)
3944{
706c81f8 3945 struct ftrace_page *start_pg;
a7900875 3946 struct ftrace_page *pg;
706c81f8 3947 struct dyn_ftrace *rec;
a7900875 3948 unsigned long count;
68bf21aa
SR
3949 unsigned long *p;
3950 unsigned long addr;
4376cac6 3951 unsigned long flags = 0; /* Shut up gcc */
a7900875
SR
3952 int ret = -ENOMEM;
3953
3954 count = end - start;
3955
3956 if (!count)
3957 return 0;
3958
9fd49328
SR
3959 sort(start, count, sizeof(*start),
3960 ftrace_cmp_ips, ftrace_swap_ips);
3961
706c81f8
SR
3962 start_pg = ftrace_allocate_pages(count);
3963 if (!start_pg)
a7900875 3964 return -ENOMEM;
68bf21aa 3965
e6ea44e9 3966 mutex_lock(&ftrace_lock);
a7900875 3967
32082309
SR
3968 /*
3969 * Core and each module needs their own pages, as
3970 * modules will free them when they are removed.
3971 * Force a new page to be allocated for modules.
3972 */
a7900875
SR
3973 if (!mod) {
3974 WARN_ON(ftrace_pages || ftrace_pages_start);
3975 /* First initialization */
706c81f8 3976 ftrace_pages = ftrace_pages_start = start_pg;
a7900875 3977 } else {
32082309 3978 if (!ftrace_pages)
a7900875 3979 goto out;
32082309 3980
a7900875
SR
3981 if (WARN_ON(ftrace_pages->next)) {
3982 /* Hmm, we have free pages? */
3983 while (ftrace_pages->next)
3984 ftrace_pages = ftrace_pages->next;
32082309 3985 }
a7900875 3986
706c81f8 3987 ftrace_pages->next = start_pg;
32082309
SR
3988 }
3989
68bf21aa 3990 p = start;
706c81f8 3991 pg = start_pg;
68bf21aa
SR
3992 while (p < end) {
3993 addr = ftrace_call_adjust(*p++);
20e5227e
SR
3994 /*
3995 * Some architecture linkers will pad between
3996 * the different mcount_loc sections of different
3997 * object files to satisfy alignments.
3998 * Skip any NULL pointers.
3999 */
4000 if (!addr)
4001 continue;
706c81f8
SR
4002
4003 if (pg->index == pg->size) {
4004 /* We should have allocated enough */
4005 if (WARN_ON(!pg->next))
4006 break;
4007 pg = pg->next;
4008 }
4009
4010 rec = &pg->records[pg->index++];
4011 rec->ip = addr;
68bf21aa
SR
4012 }
4013
706c81f8
SR
4014 /* We should have used all pages */
4015 WARN_ON(pg->next);
4016
4017 /* Assign the last page to ftrace_pages */
4018 ftrace_pages = pg;
4019
85ae32ae 4020 /* These new locations need to be initialized */
706c81f8 4021 ftrace_new_pgs = start_pg;
85ae32ae 4022
a4f18ed1 4023 /*
4376cac6
SR
4024 * We only need to disable interrupts on start up
4025 * because we are modifying code that an interrupt
4026 * may execute, and the modification is not atomic.
4027 * But for modules, nothing runs the code we modify
4028 * until we are finished with it, and there's no
4029 * reason to cause large interrupt latencies while we do it.
a4f18ed1 4030 */
4376cac6
SR
4031 if (!mod)
4032 local_irq_save(flags);
31e88909 4033 ftrace_update_code(mod);
4376cac6
SR
4034 if (!mod)
4035 local_irq_restore(flags);
a7900875
SR
4036 ret = 0;
4037 out:
e6ea44e9 4038 mutex_unlock(&ftrace_lock);
68bf21aa 4039
a7900875 4040 return ret;
68bf21aa
SR
4041}
4042
93eb677d 4043#ifdef CONFIG_MODULES
32082309
SR
4044
4045#define next_to_ftrace_page(p) container_of(p, struct ftrace_page, next)
4046
e7247a15 4047void ftrace_release_mod(struct module *mod)
93eb677d
SR
4048{
4049 struct dyn_ftrace *rec;
32082309 4050 struct ftrace_page **last_pg;
93eb677d 4051 struct ftrace_page *pg;
a7900875 4052 int order;
93eb677d 4053
45a4a237
SR
4054 mutex_lock(&ftrace_lock);
4055
e7247a15 4056 if (ftrace_disabled)
45a4a237 4057 goto out_unlock;
93eb677d 4058
32082309
SR
4059 /*
4060 * Each module has its own ftrace_pages, remove
4061 * them from the list.
4062 */
4063 last_pg = &ftrace_pages_start;
4064 for (pg = ftrace_pages_start; pg; pg = *last_pg) {
4065 rec = &pg->records[0];
e7247a15 4066 if (within_module_core(rec->ip, mod)) {
93eb677d 4067 /*
32082309
SR
4068 * As core pages are first, the first
4069 * page should never be a module page.
93eb677d 4070 */
32082309
SR
4071 if (WARN_ON(pg == ftrace_pages_start))
4072 goto out_unlock;
4073
4074 /* Check if we are deleting the last page */
4075 if (pg == ftrace_pages)
4076 ftrace_pages = next_to_ftrace_page(last_pg);
4077
4078 *last_pg = pg->next;
a7900875
SR
4079 order = get_count_order(pg->size / ENTRIES_PER_PAGE);
4080 free_pages((unsigned long)pg->records, order);
4081 kfree(pg);
32082309
SR
4082 } else
4083 last_pg = &pg->next;
4084 }
45a4a237 4085 out_unlock:
93eb677d
SR
4086 mutex_unlock(&ftrace_lock);
4087}
4088
4089static void ftrace_init_module(struct module *mod,
4090 unsigned long *start, unsigned long *end)
90d595fe 4091{
00fd61ae 4092 if (ftrace_disabled || start == end)
fed1939c 4093 return;
5cb084bb 4094 ftrace_process_locs(mod, start, end);
90d595fe
SR
4095}
4096
8c189ea6
SRRH
4097static int ftrace_module_notify_enter(struct notifier_block *self,
4098 unsigned long val, void *data)
93eb677d
SR
4099{
4100 struct module *mod = data;
4101
8c189ea6 4102 if (val == MODULE_STATE_COMING)
93eb677d
SR
4103 ftrace_init_module(mod, mod->ftrace_callsites,
4104 mod->ftrace_callsites +
4105 mod->num_ftrace_callsites);
8c189ea6
SRRH
4106 return 0;
4107}
4108
4109static int ftrace_module_notify_exit(struct notifier_block *self,
4110 unsigned long val, void *data)
4111{
4112 struct module *mod = data;
4113
4114 if (val == MODULE_STATE_GOING)
e7247a15 4115 ftrace_release_mod(mod);
93eb677d
SR
4116
4117 return 0;
4118}
4119#else
8c189ea6
SRRH
4120static int ftrace_module_notify_enter(struct notifier_block *self,
4121 unsigned long val, void *data)
4122{
4123 return 0;
4124}
4125static int ftrace_module_notify_exit(struct notifier_block *self,
4126 unsigned long val, void *data)
93eb677d
SR
4127{
4128 return 0;
4129}
4130#endif /* CONFIG_MODULES */
4131
8c189ea6
SRRH
4132struct notifier_block ftrace_module_enter_nb = {
4133 .notifier_call = ftrace_module_notify_enter,
c1bf08ac 4134 .priority = INT_MAX, /* Run before anything that can use kprobes */
93eb677d
SR
4135};
4136
8c189ea6
SRRH
4137struct notifier_block ftrace_module_exit_nb = {
4138 .notifier_call = ftrace_module_notify_exit,
4139 .priority = INT_MIN, /* Run after anything that can remove kprobes */
4140};
4141
68bf21aa
SR
4142extern unsigned long __start_mcount_loc[];
4143extern unsigned long __stop_mcount_loc[];
4144
4145void __init ftrace_init(void)
4146{
4147 unsigned long count, addr, flags;
4148 int ret;
4149
4150 /* Keep the ftrace pointer to the stub */
4151 addr = (unsigned long)ftrace_stub;
4152
4153 local_irq_save(flags);
4154 ftrace_dyn_arch_init(&addr);
4155 local_irq_restore(flags);
4156
4157 /* ftrace_dyn_arch_init places the return code in addr */
4158 if (addr)
4159 goto failed;
4160
4161 count = __stop_mcount_loc - __start_mcount_loc;
4162
4163 ret = ftrace_dyn_table_alloc(count);
4164 if (ret)
4165 goto failed;
4166
4167 last_ftrace_enabled = ftrace_enabled = 1;
4168
5cb084bb 4169 ret = ftrace_process_locs(NULL,
31e88909 4170 __start_mcount_loc,
68bf21aa
SR
4171 __stop_mcount_loc);
4172
8c189ea6
SRRH
4173 ret = register_module_notifier(&ftrace_module_enter_nb);
4174 if (ret)
4175 pr_warning("Failed to register trace ftrace module enter notifier\n");
4176
4177 ret = register_module_notifier(&ftrace_module_exit_nb);
24ed0c4b 4178 if (ret)
8c189ea6 4179 pr_warning("Failed to register trace ftrace module exit notifier\n");
93eb677d 4180
2af15d6a
SR
4181 set_ftrace_early_filters();
4182
68bf21aa
SR
4183 return;
4184 failed:
4185 ftrace_disabled = 1;
4186}
68bf21aa 4187
3d083395 4188#else
0b6e4d56 4189
2b499381 4190static struct ftrace_ops global_ops = {
bd69c30b 4191 .func = ftrace_stub,
f04f24fb
MH
4192 .flags = FTRACE_OPS_FL_RECURSION_SAFE | FTRACE_OPS_FL_INITIALIZED,
4193 INIT_REGEX_LOCK(global_ops)
bd69c30b
SR
4194};
4195
0b6e4d56
FW
4196static int __init ftrace_nodyn_init(void)
4197{
4198 ftrace_enabled = 1;
4199 return 0;
4200}
6f415672 4201core_initcall(ftrace_nodyn_init);
0b6e4d56 4202
df4fc315
SR
4203static inline int ftrace_init_dyn_debugfs(struct dentry *d_tracer) { return 0; }
4204static inline void ftrace_startup_enable(int command) { }
5a45cfe1 4205/* Keep as macros so we do not need to define the commands */
3b6cfdb1
SR
4206# define ftrace_startup(ops, command) \
4207 ({ \
4208 (ops)->flags |= FTRACE_OPS_FL_ENABLED; \
4209 0; \
4210 })
bd69c30b 4211# define ftrace_shutdown(ops, command) do { } while (0)
c7aafc54
IM
4212# define ftrace_startup_sysctl() do { } while (0)
4213# define ftrace_shutdown_sysctl() do { } while (0)
b848914c
SR
4214
4215static inline int
4216ftrace_ops_test(struct ftrace_ops *ops, unsigned long ip)
4217{
4218 return 1;
4219}
4220
3d083395
SR
4221#endif /* CONFIG_DYNAMIC_FTRACE */
4222
e248491a 4223static void
2f5f6ad9 4224ftrace_ops_control_func(unsigned long ip, unsigned long parent_ip,
a1e2e31d 4225 struct ftrace_ops *op, struct pt_regs *regs)
e248491a 4226{
e248491a
JO
4227 if (unlikely(trace_recursion_test(TRACE_CONTROL_BIT)))
4228 return;
4229
4230 /*
4231 * Some of the ops may be dynamically allocated,
4232 * they must be freed after a synchronize_sched().
4233 */
4234 preempt_disable_notrace();
4235 trace_recursion_set(TRACE_CONTROL_BIT);
0a016409 4236 do_for_each_ftrace_op(op, ftrace_control_list) {
395b97a3
SRRH
4237 if (!(op->flags & FTRACE_OPS_FL_STUB) &&
4238 !ftrace_function_local_disabled(op) &&
e248491a 4239 ftrace_ops_test(op, ip))
a1e2e31d 4240 op->func(ip, parent_ip, op, regs);
0a016409 4241 } while_for_each_ftrace_op(op);
e248491a
JO
4242 trace_recursion_clear(TRACE_CONTROL_BIT);
4243 preempt_enable_notrace();
4244}
4245
4246static struct ftrace_ops control_ops = {
f04f24fb
MH
4247 .func = ftrace_ops_control_func,
4248 .flags = FTRACE_OPS_FL_RECURSION_SAFE | FTRACE_OPS_FL_INITIALIZED,
4249 INIT_REGEX_LOCK(control_ops)
e248491a
JO
4250};
4251
2f5f6ad9
SR
4252static inline void
4253__ftrace_ops_list_func(unsigned long ip, unsigned long parent_ip,
a1e2e31d 4254 struct ftrace_ops *ignored, struct pt_regs *regs)
b848914c 4255{
cdbe61bf 4256 struct ftrace_ops *op;
edc15caf 4257 int bit;
b848914c 4258
ccf3672d
SR
4259 if (function_trace_stop)
4260 return;
4261
edc15caf
SR
4262 bit = trace_test_and_set_recursion(TRACE_LIST_START, TRACE_LIST_MAX);
4263 if (bit < 0)
4264 return;
b1cff0ad 4265
cdbe61bf
SR
4266 /*
4267 * Some of the ops may be dynamically allocated,
4268 * they must be freed after a synchronize_sched().
4269 */
4270 preempt_disable_notrace();
0a016409 4271 do_for_each_ftrace_op(op, ftrace_ops_list) {
b848914c 4272 if (ftrace_ops_test(op, ip))
a1e2e31d 4273 op->func(ip, parent_ip, op, regs);
0a016409 4274 } while_for_each_ftrace_op(op);
cdbe61bf 4275 preempt_enable_notrace();
edc15caf 4276 trace_clear_recursion(bit);
b848914c
SR
4277}
4278
2f5f6ad9
SR
4279/*
4280 * Some archs only support passing ip and parent_ip. Even though
4281 * the list function ignores the op parameter, we do not want any
4282 * C side effects, where a function is called without the caller
4283 * sending a third parameter.
a1e2e31d
SR
4284 * Archs are to support both the regs and ftrace_ops at the same time.
4285 * If they support ftrace_ops, it is assumed they support regs.
4286 * If call backs want to use regs, they must either check for regs
06aeaaea
MH
4287 * being NULL, or CONFIG_DYNAMIC_FTRACE_WITH_REGS.
4288 * Note, CONFIG_DYNAMIC_FTRACE_WITH_REGS expects a full regs to be saved.
a1e2e31d
SR
4289 * An architecture can pass partial regs with ftrace_ops and still
4290 * set the ARCH_SUPPORT_FTARCE_OPS.
2f5f6ad9
SR
4291 */
4292#if ARCH_SUPPORTS_FTRACE_OPS
4293static void ftrace_ops_list_func(unsigned long ip, unsigned long parent_ip,
a1e2e31d 4294 struct ftrace_ops *op, struct pt_regs *regs)
2f5f6ad9 4295{
a1e2e31d 4296 __ftrace_ops_list_func(ip, parent_ip, NULL, regs);
2f5f6ad9
SR
4297}
4298#else
4299static void ftrace_ops_no_ops(unsigned long ip, unsigned long parent_ip)
4300{
a1e2e31d 4301 __ftrace_ops_list_func(ip, parent_ip, NULL, NULL);
2f5f6ad9
SR
4302}
4303#endif
4304
e32d8956 4305static void clear_ftrace_swapper(void)
978f3a45
SR
4306{
4307 struct task_struct *p;
e32d8956 4308 int cpu;
978f3a45 4309
e32d8956
SR
4310 get_online_cpus();
4311 for_each_online_cpu(cpu) {
4312 p = idle_task(cpu);
978f3a45 4313 clear_tsk_trace_trace(p);
e32d8956
SR
4314 }
4315 put_online_cpus();
4316}
978f3a45 4317
e32d8956
SR
4318static void set_ftrace_swapper(void)
4319{
4320 struct task_struct *p;
4321 int cpu;
4322
4323 get_online_cpus();
4324 for_each_online_cpu(cpu) {
4325 p = idle_task(cpu);
4326 set_tsk_trace_trace(p);
4327 }
4328 put_online_cpus();
978f3a45
SR
4329}
4330
e32d8956
SR
4331static void clear_ftrace_pid(struct pid *pid)
4332{
4333 struct task_struct *p;
4334
229c4ef8 4335 rcu_read_lock();
e32d8956
SR
4336 do_each_pid_task(pid, PIDTYPE_PID, p) {
4337 clear_tsk_trace_trace(p);
4338 } while_each_pid_task(pid, PIDTYPE_PID, p);
229c4ef8
ON
4339 rcu_read_unlock();
4340
e32d8956
SR
4341 put_pid(pid);
4342}
4343
4344static void set_ftrace_pid(struct pid *pid)
978f3a45
SR
4345{
4346 struct task_struct *p;
4347
229c4ef8 4348 rcu_read_lock();
978f3a45
SR
4349 do_each_pid_task(pid, PIDTYPE_PID, p) {
4350 set_tsk_trace_trace(p);
4351 } while_each_pid_task(pid, PIDTYPE_PID, p);
229c4ef8 4352 rcu_read_unlock();
978f3a45
SR
4353}
4354
756d17ee 4355static void clear_ftrace_pid_task(struct pid *pid)
e32d8956 4356{
756d17ee 4357 if (pid == ftrace_swapper_pid)
e32d8956
SR
4358 clear_ftrace_swapper();
4359 else
756d17ee 4360 clear_ftrace_pid(pid);
e32d8956
SR
4361}
4362
4363static void set_ftrace_pid_task(struct pid *pid)
4364{
4365 if (pid == ftrace_swapper_pid)
4366 set_ftrace_swapper();
4367 else
4368 set_ftrace_pid(pid);
4369}
4370
756d17ee 4371static int ftrace_pid_add(int p)
df4fc315 4372{
978f3a45 4373 struct pid *pid;
756d17ee 4374 struct ftrace_pid *fpid;
4375 int ret = -EINVAL;
df4fc315 4376
756d17ee 4377 mutex_lock(&ftrace_lock);
df4fc315 4378
756d17ee 4379 if (!p)
4380 pid = ftrace_swapper_pid;
4381 else
4382 pid = find_get_pid(p);
df4fc315 4383
756d17ee 4384 if (!pid)
4385 goto out;
df4fc315 4386
756d17ee 4387 ret = 0;
df4fc315 4388
756d17ee 4389 list_for_each_entry(fpid, &ftrace_pids, list)
4390 if (fpid->pid == pid)
4391 goto out_put;
978f3a45 4392
756d17ee 4393 ret = -ENOMEM;
df4fc315 4394
756d17ee 4395 fpid = kmalloc(sizeof(*fpid), GFP_KERNEL);
4396 if (!fpid)
4397 goto out_put;
df4fc315 4398
756d17ee 4399 list_add(&fpid->list, &ftrace_pids);
4400 fpid->pid = pid;
0ef8cde5 4401
756d17ee 4402 set_ftrace_pid_task(pid);
978f3a45 4403
756d17ee 4404 ftrace_update_pid_func();
4405 ftrace_startup_enable(0);
4406
4407 mutex_unlock(&ftrace_lock);
4408 return 0;
4409
4410out_put:
4411 if (pid != ftrace_swapper_pid)
4412 put_pid(pid);
978f3a45 4413
756d17ee 4414out:
4415 mutex_unlock(&ftrace_lock);
4416 return ret;
4417}
4418
4419static void ftrace_pid_reset(void)
4420{
4421 struct ftrace_pid *fpid, *safe;
978f3a45 4422
756d17ee 4423 mutex_lock(&ftrace_lock);
4424 list_for_each_entry_safe(fpid, safe, &ftrace_pids, list) {
4425 struct pid *pid = fpid->pid;
4426
4427 clear_ftrace_pid_task(pid);
4428
4429 list_del(&fpid->list);
4430 kfree(fpid);
df4fc315
SR
4431 }
4432
df4fc315
SR
4433 ftrace_update_pid_func();
4434 ftrace_startup_enable(0);
4435
e6ea44e9 4436 mutex_unlock(&ftrace_lock);
756d17ee 4437}
df4fc315 4438
756d17ee 4439static void *fpid_start(struct seq_file *m, loff_t *pos)
4440{
4441 mutex_lock(&ftrace_lock);
4442
4443 if (list_empty(&ftrace_pids) && (!*pos))
4444 return (void *) 1;
4445
4446 return seq_list_start(&ftrace_pids, *pos);
4447}
4448
4449static void *fpid_next(struct seq_file *m, void *v, loff_t *pos)
4450{
4451 if (v == (void *)1)
4452 return NULL;
4453
4454 return seq_list_next(v, &ftrace_pids, pos);
4455}
4456
4457static void fpid_stop(struct seq_file *m, void *p)
4458{
4459 mutex_unlock(&ftrace_lock);
4460}
4461
4462static int fpid_show(struct seq_file *m, void *v)
4463{
4464 const struct ftrace_pid *fpid = list_entry(v, struct ftrace_pid, list);
4465
4466 if (v == (void *)1) {
4467 seq_printf(m, "no pid\n");
4468 return 0;
4469 }
4470
4471 if (fpid->pid == ftrace_swapper_pid)
4472 seq_printf(m, "swapper tasks\n");
4473 else
4474 seq_printf(m, "%u\n", pid_vnr(fpid->pid));
4475
4476 return 0;
4477}
4478
4479static const struct seq_operations ftrace_pid_sops = {
4480 .start = fpid_start,
4481 .next = fpid_next,
4482 .stop = fpid_stop,
4483 .show = fpid_show,
4484};
4485
4486static int
4487ftrace_pid_open(struct inode *inode, struct file *file)
4488{
4489 int ret = 0;
4490
4491 if ((file->f_mode & FMODE_WRITE) &&
4492 (file->f_flags & O_TRUNC))
4493 ftrace_pid_reset();
4494
4495 if (file->f_mode & FMODE_READ)
4496 ret = seq_open(file, &ftrace_pid_sops);
4497
4498 return ret;
4499}
4500
df4fc315
SR
4501static ssize_t
4502ftrace_pid_write(struct file *filp, const char __user *ubuf,
4503 size_t cnt, loff_t *ppos)
4504{
457dc928 4505 char buf[64], *tmp;
df4fc315
SR
4506 long val;
4507 int ret;
4508
4509 if (cnt >= sizeof(buf))
4510 return -EINVAL;
4511
4512 if (copy_from_user(&buf, ubuf, cnt))
4513 return -EFAULT;
4514
4515 buf[cnt] = 0;
4516
756d17ee 4517 /*
4518 * Allow "echo > set_ftrace_pid" or "echo -n '' > set_ftrace_pid"
4519 * to clean the filter quietly.
4520 */
457dc928
IM
4521 tmp = strstrip(buf);
4522 if (strlen(tmp) == 0)
756d17ee 4523 return 1;
4524
bcd83ea6 4525 ret = kstrtol(tmp, 10, &val);
df4fc315
SR
4526 if (ret < 0)
4527 return ret;
4528
756d17ee 4529 ret = ftrace_pid_add(val);
df4fc315 4530
756d17ee 4531 return ret ? ret : cnt;
4532}
df4fc315 4533
756d17ee 4534static int
4535ftrace_pid_release(struct inode *inode, struct file *file)
4536{
4537 if (file->f_mode & FMODE_READ)
4538 seq_release(inode, file);
df4fc315 4539
756d17ee 4540 return 0;
df4fc315
SR
4541}
4542
5e2336a0 4543static const struct file_operations ftrace_pid_fops = {
756d17ee 4544 .open = ftrace_pid_open,
4545 .write = ftrace_pid_write,
4546 .read = seq_read,
6a76f8c0 4547 .llseek = ftrace_filter_lseek,
756d17ee 4548 .release = ftrace_pid_release,
df4fc315
SR
4549};
4550
4551static __init int ftrace_init_debugfs(void)
4552{
4553 struct dentry *d_tracer;
df4fc315
SR
4554
4555 d_tracer = tracing_init_dentry();
4556 if (!d_tracer)
4557 return 0;
4558
4559 ftrace_init_dyn_debugfs(d_tracer);
4560
5452af66
FW
4561 trace_create_file("set_ftrace_pid", 0644, d_tracer,
4562 NULL, &ftrace_pid_fops);
493762fc
SR
4563
4564 ftrace_profile_debugfs(d_tracer);
4565
df4fc315
SR
4566 return 0;
4567}
df4fc315
SR
4568fs_initcall(ftrace_init_debugfs);
4569
a2bb6a3d 4570/**
81adbdc0 4571 * ftrace_kill - kill ftrace
a2bb6a3d
SR
4572 *
4573 * This function should be used by panic code. It stops ftrace
4574 * but in a not so nice way. If you need to simply kill ftrace
4575 * from a non-atomic section, use ftrace_kill.
4576 */
81adbdc0 4577void ftrace_kill(void)
a2bb6a3d
SR
4578{
4579 ftrace_disabled = 1;
4580 ftrace_enabled = 0;
a2bb6a3d
SR
4581 clear_ftrace_function();
4582}
4583
e0a413f6
SR
4584/**
4585 * Test if ftrace is dead or not.
4586 */
4587int ftrace_is_dead(void)
4588{
4589 return ftrace_disabled;
4590}
4591
16444a8a 4592/**
3d083395
SR
4593 * register_ftrace_function - register a function for profiling
4594 * @ops - ops structure that holds the function for profiling.
16444a8a 4595 *
3d083395
SR
4596 * Register a function to be called by all functions in the
4597 * kernel.
4598 *
4599 * Note: @ops->func and all the functions it calls must be labeled
4600 * with "notrace", otherwise it will go into a
4601 * recursive loop.
16444a8a 4602 */
3d083395 4603int register_ftrace_function(struct ftrace_ops *ops)
16444a8a 4604{
45a4a237 4605 int ret = -1;
4eebcc81 4606
f04f24fb
MH
4607 ftrace_ops_init(ops);
4608
e6ea44e9 4609 mutex_lock(&ftrace_lock);
e7d3737e 4610
b0fc494f 4611 ret = __register_ftrace_function(ops);
b848914c 4612 if (!ret)
a1cd6173 4613 ret = ftrace_startup(ops, 0);
b848914c 4614
e6ea44e9 4615 mutex_unlock(&ftrace_lock);
8d240dd8 4616
b0fc494f 4617 return ret;
3d083395 4618}
cdbe61bf 4619EXPORT_SYMBOL_GPL(register_ftrace_function);
3d083395
SR
4620
4621/**
32632920 4622 * unregister_ftrace_function - unregister a function for profiling.
3d083395
SR
4623 * @ops - ops structure that holds the function to unregister
4624 *
4625 * Unregister a function that was added to be called by ftrace profiling.
4626 */
4627int unregister_ftrace_function(struct ftrace_ops *ops)
4628{
4629 int ret;
4630
e6ea44e9 4631 mutex_lock(&ftrace_lock);
3d083395 4632 ret = __unregister_ftrace_function(ops);
b848914c
SR
4633 if (!ret)
4634 ftrace_shutdown(ops, 0);
e6ea44e9 4635 mutex_unlock(&ftrace_lock);
b0fc494f
SR
4636
4637 return ret;
4638}
cdbe61bf 4639EXPORT_SYMBOL_GPL(unregister_ftrace_function);
b0fc494f 4640
e309b41d 4641int
b0fc494f 4642ftrace_enable_sysctl(struct ctl_table *table, int write,
8d65af78 4643 void __user *buffer, size_t *lenp,
b0fc494f
SR
4644 loff_t *ppos)
4645{
45a4a237 4646 int ret = -ENODEV;
4eebcc81 4647
e6ea44e9 4648 mutex_lock(&ftrace_lock);
b0fc494f 4649
45a4a237
SR
4650 if (unlikely(ftrace_disabled))
4651 goto out;
4652
4653 ret = proc_dointvec(table, write, buffer, lenp, ppos);
b0fc494f 4654
a32c7765 4655 if (ret || !write || (last_ftrace_enabled == !!ftrace_enabled))
b0fc494f
SR
4656 goto out;
4657
a32c7765 4658 last_ftrace_enabled = !!ftrace_enabled;
b0fc494f
SR
4659
4660 if (ftrace_enabled) {
4661
4662 ftrace_startup_sysctl();
4663
4664 /* we are starting ftrace again */
5000c418
JK
4665 if (ftrace_ops_list != &ftrace_list_end)
4666 update_ftrace_function();
b0fc494f
SR
4667
4668 } else {
4669 /* stopping ftrace calls (just send to ftrace_stub) */
4670 ftrace_trace_function = ftrace_stub;
4671
4672 ftrace_shutdown_sysctl();
4673 }
4674
4675 out:
e6ea44e9 4676 mutex_unlock(&ftrace_lock);
3d083395 4677 return ret;
16444a8a 4678}
f17845e5 4679
fb52607a 4680#ifdef CONFIG_FUNCTION_GRAPH_TRACER
e7d3737e 4681
597af815 4682static int ftrace_graph_active;
4a2b8dda 4683static struct notifier_block ftrace_suspend_notifier;
e7d3737e 4684
e49dc19c
SR
4685int ftrace_graph_entry_stub(struct ftrace_graph_ent *trace)
4686{
4687 return 0;
4688}
4689
287b6e68
FW
4690/* The callbacks that hook a function */
4691trace_func_graph_ret_t ftrace_graph_return =
4692 (trace_func_graph_ret_t)ftrace_stub;
e49dc19c 4693trace_func_graph_ent_t ftrace_graph_entry = ftrace_graph_entry_stub;
f201ae23
FW
4694
4695/* Try to assign a return stack array on FTRACE_RETSTACK_ALLOC_SIZE tasks. */
4696static int alloc_retstack_tasklist(struct ftrace_ret_stack **ret_stack_list)
4697{
4698 int i;
4699 int ret = 0;
4700 unsigned long flags;
4701 int start = 0, end = FTRACE_RETSTACK_ALLOC_SIZE;
4702 struct task_struct *g, *t;
4703
4704 for (i = 0; i < FTRACE_RETSTACK_ALLOC_SIZE; i++) {
4705 ret_stack_list[i] = kmalloc(FTRACE_RETFUNC_DEPTH
4706 * sizeof(struct ftrace_ret_stack),
4707 GFP_KERNEL);
4708 if (!ret_stack_list[i]) {
4709 start = 0;
4710 end = i;
4711 ret = -ENOMEM;
4712 goto free;
4713 }
4714 }
4715
4716 read_lock_irqsave(&tasklist_lock, flags);
4717 do_each_thread(g, t) {
4718 if (start == end) {
4719 ret = -EAGAIN;
4720 goto unlock;
4721 }
4722
4723 if (t->ret_stack == NULL) {
380c4b14 4724 atomic_set(&t->tracing_graph_pause, 0);
f201ae23 4725 atomic_set(&t->trace_overrun, 0);
26c01624
SR
4726 t->curr_ret_stack = -1;
4727 /* Make sure the tasks see the -1 first: */
4728 smp_wmb();
4729 t->ret_stack = ret_stack_list[start++];
f201ae23
FW
4730 }
4731 } while_each_thread(g, t);
4732
4733unlock:
4734 read_unlock_irqrestore(&tasklist_lock, flags);
4735free:
4736 for (i = start; i < end; i++)
4737 kfree(ret_stack_list[i]);
4738 return ret;
4739}
4740
8aef2d28 4741static void
38516ab5
SR
4742ftrace_graph_probe_sched_switch(void *ignore,
4743 struct task_struct *prev, struct task_struct *next)
8aef2d28
SR
4744{
4745 unsigned long long timestamp;
4746 int index;
4747
be6f164a
SR
4748 /*
4749 * Does the user want to count the time a function was asleep.
4750 * If so, do not update the time stamps.
4751 */
4752 if (trace_flags & TRACE_ITER_SLEEP_TIME)
4753 return;
4754
8aef2d28
SR
4755 timestamp = trace_clock_local();
4756
4757 prev->ftrace_timestamp = timestamp;
4758
4759 /* only process tasks that we timestamped */
4760 if (!next->ftrace_timestamp)
4761 return;
4762
4763 /*
4764 * Update all the counters in next to make up for the
4765 * time next was sleeping.
4766 */
4767 timestamp -= next->ftrace_timestamp;
4768
4769 for (index = next->curr_ret_stack; index >= 0; index--)
4770 next->ret_stack[index].calltime += timestamp;
4771}
4772
f201ae23 4773/* Allocate a return stack for each task */
fb52607a 4774static int start_graph_tracing(void)
f201ae23
FW
4775{
4776 struct ftrace_ret_stack **ret_stack_list;
5b058bcd 4777 int ret, cpu;
f201ae23
FW
4778
4779 ret_stack_list = kmalloc(FTRACE_RETSTACK_ALLOC_SIZE *
4780 sizeof(struct ftrace_ret_stack *),
4781 GFP_KERNEL);
4782
4783 if (!ret_stack_list)
4784 return -ENOMEM;
4785
5b058bcd 4786 /* The cpu_boot init_task->ret_stack will never be freed */
179c498a
SR
4787 for_each_online_cpu(cpu) {
4788 if (!idle_task(cpu)->ret_stack)
868baf07 4789 ftrace_graph_init_idle_task(idle_task(cpu), cpu);
179c498a 4790 }
5b058bcd 4791
f201ae23
FW
4792 do {
4793 ret = alloc_retstack_tasklist(ret_stack_list);
4794 } while (ret == -EAGAIN);
4795
8aef2d28 4796 if (!ret) {
38516ab5 4797 ret = register_trace_sched_switch(ftrace_graph_probe_sched_switch, NULL);
8aef2d28
SR
4798 if (ret)
4799 pr_info("ftrace_graph: Couldn't activate tracepoint"
4800 " probe to kernel_sched_switch\n");
4801 }
4802
f201ae23
FW
4803 kfree(ret_stack_list);
4804 return ret;
4805}
4806
4a2b8dda
FW
4807/*
4808 * Hibernation protection.
4809 * The state of the current task is too much unstable during
4810 * suspend/restore to disk. We want to protect against that.
4811 */
4812static int
4813ftrace_suspend_notifier_call(struct notifier_block *bl, unsigned long state,
4814 void *unused)
4815{
4816 switch (state) {
4817 case PM_HIBERNATION_PREPARE:
4818 pause_graph_tracing();
4819 break;
4820
4821 case PM_POST_HIBERNATION:
4822 unpause_graph_tracing();
4823 break;
4824 }
4825 return NOTIFY_DONE;
4826}
4827
287b6e68
FW
4828int register_ftrace_graph(trace_func_graph_ret_t retfunc,
4829 trace_func_graph_ent_t entryfunc)
15e6cb36 4830{
e7d3737e
FW
4831 int ret = 0;
4832
e6ea44e9 4833 mutex_lock(&ftrace_lock);
e7d3737e 4834
05ce5818 4835 /* we currently allow only one tracer registered at a time */
597af815 4836 if (ftrace_graph_active) {
05ce5818
SR
4837 ret = -EBUSY;
4838 goto out;
4839 }
4840
4a2b8dda
FW
4841 ftrace_suspend_notifier.notifier_call = ftrace_suspend_notifier_call;
4842 register_pm_notifier(&ftrace_suspend_notifier);
4843
597af815 4844 ftrace_graph_active++;
fb52607a 4845 ret = start_graph_tracing();
f201ae23 4846 if (ret) {
597af815 4847 ftrace_graph_active--;
f201ae23
FW
4848 goto out;
4849 }
e53a6319 4850
287b6e68
FW
4851 ftrace_graph_return = retfunc;
4852 ftrace_graph_entry = entryfunc;
e53a6319 4853
a1cd6173 4854 ret = ftrace_startup(&global_ops, FTRACE_START_FUNC_RET);
e7d3737e
FW
4855
4856out:
e6ea44e9 4857 mutex_unlock(&ftrace_lock);
e7d3737e 4858 return ret;
15e6cb36
FW
4859}
4860
fb52607a 4861void unregister_ftrace_graph(void)
15e6cb36 4862{
e6ea44e9 4863 mutex_lock(&ftrace_lock);
e7d3737e 4864
597af815 4865 if (unlikely(!ftrace_graph_active))
2aad1b76
SR
4866 goto out;
4867
597af815 4868 ftrace_graph_active--;
287b6e68 4869 ftrace_graph_return = (trace_func_graph_ret_t)ftrace_stub;
e49dc19c 4870 ftrace_graph_entry = ftrace_graph_entry_stub;
bd69c30b 4871 ftrace_shutdown(&global_ops, FTRACE_STOP_FUNC_RET);
4a2b8dda 4872 unregister_pm_notifier(&ftrace_suspend_notifier);
38516ab5 4873 unregister_trace_sched_switch(ftrace_graph_probe_sched_switch, NULL);
e7d3737e 4874
2aad1b76 4875 out:
e6ea44e9 4876 mutex_unlock(&ftrace_lock);
15e6cb36 4877}
f201ae23 4878
868baf07
SR
4879static DEFINE_PER_CPU(struct ftrace_ret_stack *, idle_ret_stack);
4880
4881static void
4882graph_init_task(struct task_struct *t, struct ftrace_ret_stack *ret_stack)
4883{
4884 atomic_set(&t->tracing_graph_pause, 0);
4885 atomic_set(&t->trace_overrun, 0);
4886 t->ftrace_timestamp = 0;
25985edc 4887 /* make curr_ret_stack visible before we add the ret_stack */
868baf07
SR
4888 smp_wmb();
4889 t->ret_stack = ret_stack;
4890}
4891
4892/*
4893 * Allocate a return stack for the idle task. May be the first
4894 * time through, or it may be done by CPU hotplug online.
4895 */
4896void ftrace_graph_init_idle_task(struct task_struct *t, int cpu)
4897{
4898 t->curr_ret_stack = -1;
4899 /*
4900 * The idle task has no parent, it either has its own
4901 * stack or no stack at all.
4902 */
4903 if (t->ret_stack)
4904 WARN_ON(t->ret_stack != per_cpu(idle_ret_stack, cpu));
4905
4906 if (ftrace_graph_active) {
4907 struct ftrace_ret_stack *ret_stack;
4908
4909 ret_stack = per_cpu(idle_ret_stack, cpu);
4910 if (!ret_stack) {
4911 ret_stack = kmalloc(FTRACE_RETFUNC_DEPTH
4912 * sizeof(struct ftrace_ret_stack),
4913 GFP_KERNEL);
4914 if (!ret_stack)
4915 return;
4916 per_cpu(idle_ret_stack, cpu) = ret_stack;
4917 }
4918 graph_init_task(t, ret_stack);
4919 }
4920}
4921
f201ae23 4922/* Allocate a return stack for newly created task */
fb52607a 4923void ftrace_graph_init_task(struct task_struct *t)
f201ae23 4924{
84047e36
SR
4925 /* Make sure we do not use the parent ret_stack */
4926 t->ret_stack = NULL;
ea14eb71 4927 t->curr_ret_stack = -1;
84047e36 4928
597af815 4929 if (ftrace_graph_active) {
82310a32
SR
4930 struct ftrace_ret_stack *ret_stack;
4931
4932 ret_stack = kmalloc(FTRACE_RETFUNC_DEPTH
f201ae23
FW
4933 * sizeof(struct ftrace_ret_stack),
4934 GFP_KERNEL);
82310a32 4935 if (!ret_stack)
f201ae23 4936 return;
868baf07 4937 graph_init_task(t, ret_stack);
84047e36 4938 }
f201ae23
FW
4939}
4940
fb52607a 4941void ftrace_graph_exit_task(struct task_struct *t)
f201ae23 4942{
eae849ca
FW
4943 struct ftrace_ret_stack *ret_stack = t->ret_stack;
4944
f201ae23 4945 t->ret_stack = NULL;
eae849ca
FW
4946 /* NULL must become visible to IRQs before we free it: */
4947 barrier();
4948
4949 kfree(ret_stack);
f201ae23 4950}
14a866c5
SR
4951
4952void ftrace_graph_stop(void)
4953{
4954 ftrace_stop();
4955}
15e6cb36 4956#endif
This page took 0.678767 seconds and 5 git commands to generate.