]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - kernel/trace/ftrace.c
tracing: Do not reset *pos in set_ftrace_filter
[mirror_ubuntu-artful-kernel.git] / kernel / trace / ftrace.c
CommitLineData
16444a8a
ACM
1/*
2 * Infrastructure for profiling code inserted by 'gcc -pg'.
3 *
4 * Copyright (C) 2007-2008 Steven Rostedt <srostedt@redhat.com>
5 * Copyright (C) 2004-2008 Ingo Molnar <mingo@redhat.com>
6 *
7 * Originally ported from the -rt patch by:
8 * Copyright (C) 2007 Arnaldo Carvalho de Melo <acme@redhat.com>
9 *
10 * Based on code in the latency_tracer, that is:
11 *
12 * Copyright (C) 2004-2006 Ingo Molnar
13 * Copyright (C) 2004 William Lee Irwin III
14 */
15
3d083395
SR
16#include <linux/stop_machine.h>
17#include <linux/clocksource.h>
18#include <linux/kallsyms.h>
5072c59f 19#include <linux/seq_file.h>
4a2b8dda 20#include <linux/suspend.h>
5072c59f 21#include <linux/debugfs.h>
3d083395 22#include <linux/hardirq.h>
2d8b820b 23#include <linux/kthread.h>
5072c59f 24#include <linux/uaccess.h>
2d8b820b 25#include <linux/ftrace.h>
b0fc494f 26#include <linux/sysctl.h>
5a0e3ad6 27#include <linux/slab.h>
5072c59f 28#include <linux/ctype.h>
3d083395 29#include <linux/list.h>
59df055f 30#include <linux/hash.h>
3f379b03 31#include <linux/rcupdate.h>
3d083395 32
ad8d75ff 33#include <trace/events/sched.h>
8aef2d28 34
395a59d0 35#include <asm/ftrace.h>
2af15d6a 36#include <asm/setup.h>
395a59d0 37
0706f1c4 38#include "trace_output.h"
bac429f0 39#include "trace_stat.h"
16444a8a 40
6912896e
SR
41#define FTRACE_WARN_ON(cond) \
42 do { \
43 if (WARN_ON(cond)) \
44 ftrace_kill(); \
45 } while (0)
46
47#define FTRACE_WARN_ON_ONCE(cond) \
48 do { \
49 if (WARN_ON_ONCE(cond)) \
50 ftrace_kill(); \
51 } while (0)
52
8fc0c701
SR
53/* hash bits for specific function selection */
54#define FTRACE_HASH_BITS 7
55#define FTRACE_FUNC_HASHSIZE (1 << FTRACE_HASH_BITS)
56
4eebcc81
SR
57/* ftrace_enabled is a method to turn ftrace on or off */
58int ftrace_enabled __read_mostly;
d61f82d0 59static int last_ftrace_enabled;
b0fc494f 60
60a7ecf4
SR
61/* Quick disabling of function tracer. */
62int function_trace_stop;
63
756d17ee 64/* List for set_ftrace_pid's pids. */
65LIST_HEAD(ftrace_pids);
66struct ftrace_pid {
67 struct list_head list;
68 struct pid *pid;
69};
70
4eebcc81
SR
71/*
72 * ftrace_disabled is set when an anomaly is discovered.
73 * ftrace_disabled is much stronger than ftrace_enabled.
74 */
75static int ftrace_disabled __read_mostly;
76
52baf119 77static DEFINE_MUTEX(ftrace_lock);
b0fc494f 78
16444a8a
ACM
79static struct ftrace_ops ftrace_list_end __read_mostly =
80{
fb9fb015 81 .func = ftrace_stub,
16444a8a
ACM
82};
83
84static struct ftrace_ops *ftrace_list __read_mostly = &ftrace_list_end;
85ftrace_func_t ftrace_trace_function __read_mostly = ftrace_stub;
60a7ecf4 86ftrace_func_t __ftrace_trace_function __read_mostly = ftrace_stub;
df4fc315 87ftrace_func_t ftrace_pid_function __read_mostly = ftrace_stub;
16444a8a 88
3f379b03
PM
89/*
90 * Traverse the ftrace_list, invoking all entries. The reason that we
91 * can use rcu_dereference_raw() is that elements removed from this list
92 * are simply leaked, so there is no need to interact with a grace-period
93 * mechanism. The rcu_dereference_raw() calls are needed to handle
94 * concurrent insertions into the ftrace_list.
95 *
96 * Silly Alpha and silly pointer-speculation compiler optimizations!
97 */
f2252935 98static void ftrace_list_func(unsigned long ip, unsigned long parent_ip)
16444a8a 99{
3f379b03 100 struct ftrace_ops *op = rcu_dereference_raw(ftrace_list); /*see above*/
16444a8a
ACM
101
102 while (op != &ftrace_list_end) {
16444a8a 103 op->func(ip, parent_ip);
3f379b03 104 op = rcu_dereference_raw(op->next); /*see above*/
16444a8a
ACM
105 };
106}
107
df4fc315
SR
108static void ftrace_pid_func(unsigned long ip, unsigned long parent_ip)
109{
0ef8cde5 110 if (!test_tsk_trace_trace(current))
df4fc315
SR
111 return;
112
113 ftrace_pid_function(ip, parent_ip);
114}
115
116static void set_ftrace_pid_function(ftrace_func_t func)
117{
118 /* do not set ftrace_pid_function to itself! */
119 if (func != ftrace_pid_func)
120 ftrace_pid_function = func;
121}
122
16444a8a 123/**
3d083395 124 * clear_ftrace_function - reset the ftrace function
16444a8a 125 *
3d083395
SR
126 * This NULLs the ftrace function and in essence stops
127 * tracing. There may be lag
16444a8a 128 */
3d083395 129void clear_ftrace_function(void)
16444a8a 130{
3d083395 131 ftrace_trace_function = ftrace_stub;
60a7ecf4 132 __ftrace_trace_function = ftrace_stub;
df4fc315 133 ftrace_pid_function = ftrace_stub;
3d083395
SR
134}
135
60a7ecf4
SR
136#ifndef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
137/*
138 * For those archs that do not test ftrace_trace_stop in their
139 * mcount call site, we need to do it from C.
140 */
141static void ftrace_test_stop_func(unsigned long ip, unsigned long parent_ip)
142{
143 if (function_trace_stop)
144 return;
145
146 __ftrace_trace_function(ip, parent_ip);
147}
148#endif
149
e309b41d 150static int __register_ftrace_function(struct ftrace_ops *ops)
3d083395 151{
16444a8a
ACM
152 ops->next = ftrace_list;
153 /*
154 * We are entering ops into the ftrace_list but another
155 * CPU might be walking that list. We need to make sure
156 * the ops->next pointer is valid before another CPU sees
157 * the ops pointer included into the ftrace_list.
158 */
3f379b03 159 rcu_assign_pointer(ftrace_list, ops);
3d083395 160
b0fc494f 161 if (ftrace_enabled) {
df4fc315
SR
162 ftrace_func_t func;
163
164 if (ops->next == &ftrace_list_end)
165 func = ops->func;
166 else
167 func = ftrace_list_func;
168
756d17ee 169 if (!list_empty(&ftrace_pids)) {
df4fc315
SR
170 set_ftrace_pid_function(func);
171 func = ftrace_pid_func;
172 }
173
b0fc494f
SR
174 /*
175 * For one func, simply call it directly.
176 * For more than one func, call the chain.
177 */
60a7ecf4 178#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
df4fc315 179 ftrace_trace_function = func;
60a7ecf4 180#else
df4fc315 181 __ftrace_trace_function = func;
60a7ecf4
SR
182 ftrace_trace_function = ftrace_test_stop_func;
183#endif
b0fc494f 184 }
3d083395 185
16444a8a
ACM
186 return 0;
187}
188
e309b41d 189static int __unregister_ftrace_function(struct ftrace_ops *ops)
16444a8a 190{
16444a8a 191 struct ftrace_ops **p;
16444a8a
ACM
192
193 /*
3d083395
SR
194 * If we are removing the last function, then simply point
195 * to the ftrace_stub.
16444a8a
ACM
196 */
197 if (ftrace_list == ops && ops->next == &ftrace_list_end) {
198 ftrace_trace_function = ftrace_stub;
199 ftrace_list = &ftrace_list_end;
e6ea44e9 200 return 0;
16444a8a
ACM
201 }
202
203 for (p = &ftrace_list; *p != &ftrace_list_end; p = &(*p)->next)
204 if (*p == ops)
205 break;
206
e6ea44e9
SR
207 if (*p != ops)
208 return -1;
16444a8a
ACM
209
210 *p = (*p)->next;
211
b0fc494f
SR
212 if (ftrace_enabled) {
213 /* If we only have one func left, then call that directly */
df4fc315
SR
214 if (ftrace_list->next == &ftrace_list_end) {
215 ftrace_func_t func = ftrace_list->func;
216
756d17ee 217 if (!list_empty(&ftrace_pids)) {
df4fc315
SR
218 set_ftrace_pid_function(func);
219 func = ftrace_pid_func;
220 }
221#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
222 ftrace_trace_function = func;
223#else
224 __ftrace_trace_function = func;
225#endif
226 }
b0fc494f 227 }
16444a8a 228
e6ea44e9 229 return 0;
3d083395
SR
230}
231
df4fc315
SR
232static void ftrace_update_pid_func(void)
233{
234 ftrace_func_t func;
235
df4fc315 236 if (ftrace_trace_function == ftrace_stub)
10dd3ebe 237 return;
df4fc315 238
33974093 239#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
df4fc315 240 func = ftrace_trace_function;
33974093
MF
241#else
242 func = __ftrace_trace_function;
243#endif
df4fc315 244
756d17ee 245 if (!list_empty(&ftrace_pids)) {
df4fc315
SR
246 set_ftrace_pid_function(func);
247 func = ftrace_pid_func;
248 } else {
66eafebc
LW
249 if (func == ftrace_pid_func)
250 func = ftrace_pid_function;
df4fc315
SR
251 }
252
253#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
254 ftrace_trace_function = func;
255#else
256 __ftrace_trace_function = func;
257#endif
df4fc315
SR
258}
259
493762fc
SR
260#ifdef CONFIG_FUNCTION_PROFILER
261struct ftrace_profile {
262 struct hlist_node node;
263 unsigned long ip;
264 unsigned long counter;
0706f1c4
SR
265#ifdef CONFIG_FUNCTION_GRAPH_TRACER
266 unsigned long long time;
e330b3bc 267 unsigned long long time_squared;
0706f1c4 268#endif
8fc0c701
SR
269};
270
493762fc
SR
271struct ftrace_profile_page {
272 struct ftrace_profile_page *next;
273 unsigned long index;
274 struct ftrace_profile records[];
d61f82d0
SR
275};
276
cafb168a
SR
277struct ftrace_profile_stat {
278 atomic_t disabled;
279 struct hlist_head *hash;
280 struct ftrace_profile_page *pages;
281 struct ftrace_profile_page *start;
282 struct tracer_stat stat;
283};
284
493762fc
SR
285#define PROFILE_RECORDS_SIZE \
286 (PAGE_SIZE - offsetof(struct ftrace_profile_page, records))
5072c59f 287
493762fc
SR
288#define PROFILES_PER_PAGE \
289 (PROFILE_RECORDS_SIZE / sizeof(struct ftrace_profile))
3d083395 290
fb9fb015
SR
291static int ftrace_profile_bits __read_mostly;
292static int ftrace_profile_enabled __read_mostly;
293
294/* ftrace_profile_lock - synchronize the enable and disable of the profiler */
bac429f0
SR
295static DEFINE_MUTEX(ftrace_profile_lock);
296
cafb168a 297static DEFINE_PER_CPU(struct ftrace_profile_stat, ftrace_profile_stats);
493762fc
SR
298
299#define FTRACE_PROFILE_HASH_SIZE 1024 /* must be power of 2 */
300
bac429f0
SR
301static void *
302function_stat_next(void *v, int idx)
303{
493762fc
SR
304 struct ftrace_profile *rec = v;
305 struct ftrace_profile_page *pg;
bac429f0 306
493762fc 307 pg = (struct ftrace_profile_page *)((unsigned long)rec & PAGE_MASK);
bac429f0
SR
308
309 again:
0296e425
LZ
310 if (idx != 0)
311 rec++;
312
bac429f0
SR
313 if ((void *)rec >= (void *)&pg->records[pg->index]) {
314 pg = pg->next;
315 if (!pg)
316 return NULL;
317 rec = &pg->records[0];
493762fc
SR
318 if (!rec->counter)
319 goto again;
bac429f0
SR
320 }
321
bac429f0
SR
322 return rec;
323}
324
325static void *function_stat_start(struct tracer_stat *trace)
326{
cafb168a
SR
327 struct ftrace_profile_stat *stat =
328 container_of(trace, struct ftrace_profile_stat, stat);
329
330 if (!stat || !stat->start)
331 return NULL;
332
333 return function_stat_next(&stat->start->records[0], 0);
bac429f0
SR
334}
335
0706f1c4
SR
336#ifdef CONFIG_FUNCTION_GRAPH_TRACER
337/* function graph compares on total time */
338static int function_stat_cmp(void *p1, void *p2)
339{
340 struct ftrace_profile *a = p1;
341 struct ftrace_profile *b = p2;
342
343 if (a->time < b->time)
344 return -1;
345 if (a->time > b->time)
346 return 1;
347 else
348 return 0;
349}
350#else
351/* not function graph compares against hits */
bac429f0
SR
352static int function_stat_cmp(void *p1, void *p2)
353{
493762fc
SR
354 struct ftrace_profile *a = p1;
355 struct ftrace_profile *b = p2;
bac429f0
SR
356
357 if (a->counter < b->counter)
358 return -1;
359 if (a->counter > b->counter)
360 return 1;
361 else
362 return 0;
363}
0706f1c4 364#endif
bac429f0
SR
365
366static int function_stat_headers(struct seq_file *m)
367{
0706f1c4 368#ifdef CONFIG_FUNCTION_GRAPH_TRACER
34886c8b 369 seq_printf(m, " Function "
e330b3bc 370 "Hit Time Avg s^2\n"
34886c8b 371 " -------- "
e330b3bc 372 "--- ---- --- ---\n");
0706f1c4 373#else
bac429f0
SR
374 seq_printf(m, " Function Hit\n"
375 " -------- ---\n");
0706f1c4 376#endif
bac429f0
SR
377 return 0;
378}
379
380static int function_stat_show(struct seq_file *m, void *v)
381{
493762fc 382 struct ftrace_profile *rec = v;
bac429f0 383 char str[KSYM_SYMBOL_LEN];
3aaba20f 384 int ret = 0;
0706f1c4 385#ifdef CONFIG_FUNCTION_GRAPH_TRACER
34886c8b
SR
386 static struct trace_seq s;
387 unsigned long long avg;
e330b3bc 388 unsigned long long stddev;
0706f1c4 389#endif
3aaba20f
LZ
390 mutex_lock(&ftrace_profile_lock);
391
392 /* we raced with function_profile_reset() */
393 if (unlikely(rec->counter == 0)) {
394 ret = -EBUSY;
395 goto out;
396 }
bac429f0
SR
397
398 kallsyms_lookup(rec->ip, NULL, NULL, NULL, str);
0706f1c4
SR
399 seq_printf(m, " %-30.30s %10lu", str, rec->counter);
400
401#ifdef CONFIG_FUNCTION_GRAPH_TRACER
402 seq_printf(m, " ");
34886c8b
SR
403 avg = rec->time;
404 do_div(avg, rec->counter);
405
e330b3bc
CD
406 /* Sample standard deviation (s^2) */
407 if (rec->counter <= 1)
408 stddev = 0;
409 else {
410 stddev = rec->time_squared - rec->counter * avg * avg;
411 /*
412 * Divide only 1000 for ns^2 -> us^2 conversion.
413 * trace_print_graph_duration will divide 1000 again.
414 */
415 do_div(stddev, (rec->counter - 1) * 1000);
416 }
417
34886c8b
SR
418 trace_seq_init(&s);
419 trace_print_graph_duration(rec->time, &s);
420 trace_seq_puts(&s, " ");
421 trace_print_graph_duration(avg, &s);
e330b3bc
CD
422 trace_seq_puts(&s, " ");
423 trace_print_graph_duration(stddev, &s);
0706f1c4 424 trace_print_seq(m, &s);
0706f1c4
SR
425#endif
426 seq_putc(m, '\n');
3aaba20f
LZ
427out:
428 mutex_unlock(&ftrace_profile_lock);
bac429f0 429
3aaba20f 430 return ret;
bac429f0
SR
431}
432
cafb168a 433static void ftrace_profile_reset(struct ftrace_profile_stat *stat)
bac429f0 434{
493762fc 435 struct ftrace_profile_page *pg;
bac429f0 436
cafb168a 437 pg = stat->pages = stat->start;
bac429f0 438
493762fc
SR
439 while (pg) {
440 memset(pg->records, 0, PROFILE_RECORDS_SIZE);
441 pg->index = 0;
442 pg = pg->next;
bac429f0
SR
443 }
444
cafb168a 445 memset(stat->hash, 0,
493762fc
SR
446 FTRACE_PROFILE_HASH_SIZE * sizeof(struct hlist_head));
447}
bac429f0 448
cafb168a 449int ftrace_profile_pages_init(struct ftrace_profile_stat *stat)
493762fc
SR
450{
451 struct ftrace_profile_page *pg;
318e0a73
SR
452 int functions;
453 int pages;
493762fc 454 int i;
bac429f0 455
493762fc 456 /* If we already allocated, do nothing */
cafb168a 457 if (stat->pages)
493762fc 458 return 0;
bac429f0 459
cafb168a
SR
460 stat->pages = (void *)get_zeroed_page(GFP_KERNEL);
461 if (!stat->pages)
493762fc 462 return -ENOMEM;
bac429f0 463
318e0a73
SR
464#ifdef CONFIG_DYNAMIC_FTRACE
465 functions = ftrace_update_tot_cnt;
466#else
467 /*
468 * We do not know the number of functions that exist because
469 * dynamic tracing is what counts them. With past experience
470 * we have around 20K functions. That should be more than enough.
471 * It is highly unlikely we will execute every function in
472 * the kernel.
473 */
474 functions = 20000;
475#endif
476
cafb168a 477 pg = stat->start = stat->pages;
bac429f0 478
318e0a73
SR
479 pages = DIV_ROUND_UP(functions, PROFILES_PER_PAGE);
480
481 for (i = 0; i < pages; i++) {
493762fc 482 pg->next = (void *)get_zeroed_page(GFP_KERNEL);
493762fc 483 if (!pg->next)
318e0a73 484 goto out_free;
493762fc
SR
485 pg = pg->next;
486 }
487
488 return 0;
318e0a73
SR
489
490 out_free:
491 pg = stat->start;
492 while (pg) {
493 unsigned long tmp = (unsigned long)pg;
494
495 pg = pg->next;
496 free_page(tmp);
497 }
498
499 free_page((unsigned long)stat->pages);
500 stat->pages = NULL;
501 stat->start = NULL;
502
503 return -ENOMEM;
bac429f0
SR
504}
505
cafb168a 506static int ftrace_profile_init_cpu(int cpu)
bac429f0 507{
cafb168a 508 struct ftrace_profile_stat *stat;
493762fc 509 int size;
bac429f0 510
cafb168a
SR
511 stat = &per_cpu(ftrace_profile_stats, cpu);
512
513 if (stat->hash) {
493762fc 514 /* If the profile is already created, simply reset it */
cafb168a 515 ftrace_profile_reset(stat);
493762fc
SR
516 return 0;
517 }
bac429f0 518
493762fc
SR
519 /*
520 * We are profiling all functions, but usually only a few thousand
521 * functions are hit. We'll make a hash of 1024 items.
522 */
523 size = FTRACE_PROFILE_HASH_SIZE;
bac429f0 524
cafb168a 525 stat->hash = kzalloc(sizeof(struct hlist_head) * size, GFP_KERNEL);
493762fc 526
cafb168a 527 if (!stat->hash)
493762fc
SR
528 return -ENOMEM;
529
cafb168a
SR
530 if (!ftrace_profile_bits) {
531 size--;
493762fc 532
cafb168a
SR
533 for (; size; size >>= 1)
534 ftrace_profile_bits++;
535 }
493762fc 536
318e0a73 537 /* Preallocate the function profiling pages */
cafb168a
SR
538 if (ftrace_profile_pages_init(stat) < 0) {
539 kfree(stat->hash);
540 stat->hash = NULL;
493762fc
SR
541 return -ENOMEM;
542 }
543
544 return 0;
bac429f0
SR
545}
546
cafb168a
SR
547static int ftrace_profile_init(void)
548{
549 int cpu;
550 int ret = 0;
551
552 for_each_online_cpu(cpu) {
553 ret = ftrace_profile_init_cpu(cpu);
554 if (ret)
555 break;
556 }
557
558 return ret;
559}
560
493762fc 561/* interrupts must be disabled */
cafb168a
SR
562static struct ftrace_profile *
563ftrace_find_profiled_func(struct ftrace_profile_stat *stat, unsigned long ip)
bac429f0 564{
493762fc 565 struct ftrace_profile *rec;
bac429f0
SR
566 struct hlist_head *hhd;
567 struct hlist_node *n;
bac429f0
SR
568 unsigned long key;
569
bac429f0 570 key = hash_long(ip, ftrace_profile_bits);
cafb168a 571 hhd = &stat->hash[key];
bac429f0
SR
572
573 if (hlist_empty(hhd))
574 return NULL;
575
bac429f0
SR
576 hlist_for_each_entry_rcu(rec, n, hhd, node) {
577 if (rec->ip == ip)
493762fc
SR
578 return rec;
579 }
580
581 return NULL;
582}
583
cafb168a
SR
584static void ftrace_add_profile(struct ftrace_profile_stat *stat,
585 struct ftrace_profile *rec)
493762fc
SR
586{
587 unsigned long key;
588
589 key = hash_long(rec->ip, ftrace_profile_bits);
cafb168a 590 hlist_add_head_rcu(&rec->node, &stat->hash[key]);
493762fc
SR
591}
592
318e0a73
SR
593/*
594 * The memory is already allocated, this simply finds a new record to use.
595 */
493762fc 596static struct ftrace_profile *
318e0a73 597ftrace_profile_alloc(struct ftrace_profile_stat *stat, unsigned long ip)
493762fc
SR
598{
599 struct ftrace_profile *rec = NULL;
600
318e0a73 601 /* prevent recursion (from NMIs) */
cafb168a 602 if (atomic_inc_return(&stat->disabled) != 1)
493762fc
SR
603 goto out;
604
493762fc 605 /*
318e0a73
SR
606 * Try to find the function again since an NMI
607 * could have added it
493762fc 608 */
cafb168a 609 rec = ftrace_find_profiled_func(stat, ip);
493762fc 610 if (rec)
cafb168a 611 goto out;
493762fc 612
cafb168a
SR
613 if (stat->pages->index == PROFILES_PER_PAGE) {
614 if (!stat->pages->next)
615 goto out;
616 stat->pages = stat->pages->next;
bac429f0 617 }
493762fc 618
cafb168a 619 rec = &stat->pages->records[stat->pages->index++];
493762fc 620 rec->ip = ip;
cafb168a 621 ftrace_add_profile(stat, rec);
493762fc 622
bac429f0 623 out:
cafb168a 624 atomic_dec(&stat->disabled);
bac429f0
SR
625
626 return rec;
627}
628
629static void
630function_profile_call(unsigned long ip, unsigned long parent_ip)
631{
cafb168a 632 struct ftrace_profile_stat *stat;
493762fc 633 struct ftrace_profile *rec;
bac429f0
SR
634 unsigned long flags;
635
636 if (!ftrace_profile_enabled)
637 return;
638
639 local_irq_save(flags);
cafb168a
SR
640
641 stat = &__get_cpu_var(ftrace_profile_stats);
0f6ce3de 642 if (!stat->hash || !ftrace_profile_enabled)
cafb168a
SR
643 goto out;
644
645 rec = ftrace_find_profiled_func(stat, ip);
493762fc 646 if (!rec) {
318e0a73 647 rec = ftrace_profile_alloc(stat, ip);
493762fc
SR
648 if (!rec)
649 goto out;
650 }
bac429f0
SR
651
652 rec->counter++;
653 out:
654 local_irq_restore(flags);
655}
656
0706f1c4
SR
657#ifdef CONFIG_FUNCTION_GRAPH_TRACER
658static int profile_graph_entry(struct ftrace_graph_ent *trace)
659{
660 function_profile_call(trace->func, 0);
661 return 1;
662}
663
664static void profile_graph_return(struct ftrace_graph_ret *trace)
665{
cafb168a 666 struct ftrace_profile_stat *stat;
a2a16d6a 667 unsigned long long calltime;
0706f1c4 668 struct ftrace_profile *rec;
cafb168a 669 unsigned long flags;
0706f1c4
SR
670
671 local_irq_save(flags);
cafb168a 672 stat = &__get_cpu_var(ftrace_profile_stats);
0f6ce3de 673 if (!stat->hash || !ftrace_profile_enabled)
cafb168a
SR
674 goto out;
675
37e44bc5
SR
676 /* If the calltime was zero'd ignore it */
677 if (!trace->calltime)
678 goto out;
679
a2a16d6a
SR
680 calltime = trace->rettime - trace->calltime;
681
682 if (!(trace_flags & TRACE_ITER_GRAPH_TIME)) {
683 int index;
684
685 index = trace->depth;
686
687 /* Append this call time to the parent time to subtract */
688 if (index)
689 current->ret_stack[index - 1].subtime += calltime;
690
691 if (current->ret_stack[index].subtime < calltime)
692 calltime -= current->ret_stack[index].subtime;
693 else
694 calltime = 0;
695 }
696
cafb168a 697 rec = ftrace_find_profiled_func(stat, trace->func);
e330b3bc 698 if (rec) {
a2a16d6a 699 rec->time += calltime;
e330b3bc
CD
700 rec->time_squared += calltime * calltime;
701 }
a2a16d6a 702
cafb168a 703 out:
0706f1c4
SR
704 local_irq_restore(flags);
705}
706
707static int register_ftrace_profiler(void)
708{
709 return register_ftrace_graph(&profile_graph_return,
710 &profile_graph_entry);
711}
712
713static void unregister_ftrace_profiler(void)
714{
715 unregister_ftrace_graph();
716}
717#else
bac429f0
SR
718static struct ftrace_ops ftrace_profile_ops __read_mostly =
719{
fb9fb015 720 .func = function_profile_call,
bac429f0
SR
721};
722
0706f1c4
SR
723static int register_ftrace_profiler(void)
724{
725 return register_ftrace_function(&ftrace_profile_ops);
726}
727
728static void unregister_ftrace_profiler(void)
729{
730 unregister_ftrace_function(&ftrace_profile_ops);
731}
732#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
733
bac429f0
SR
734static ssize_t
735ftrace_profile_write(struct file *filp, const char __user *ubuf,
736 size_t cnt, loff_t *ppos)
737{
738 unsigned long val;
fb9fb015 739 char buf[64]; /* big enough to hold a number */
bac429f0
SR
740 int ret;
741
bac429f0
SR
742 if (cnt >= sizeof(buf))
743 return -EINVAL;
744
745 if (copy_from_user(&buf, ubuf, cnt))
746 return -EFAULT;
747
748 buf[cnt] = 0;
749
750 ret = strict_strtoul(buf, 10, &val);
751 if (ret < 0)
752 return ret;
753
754 val = !!val;
755
756 mutex_lock(&ftrace_profile_lock);
757 if (ftrace_profile_enabled ^ val) {
758 if (val) {
493762fc
SR
759 ret = ftrace_profile_init();
760 if (ret < 0) {
761 cnt = ret;
762 goto out;
763 }
764
0706f1c4
SR
765 ret = register_ftrace_profiler();
766 if (ret < 0) {
767 cnt = ret;
768 goto out;
769 }
bac429f0
SR
770 ftrace_profile_enabled = 1;
771 } else {
772 ftrace_profile_enabled = 0;
0f6ce3de
SR
773 /*
774 * unregister_ftrace_profiler calls stop_machine
775 * so this acts like an synchronize_sched.
776 */
0706f1c4 777 unregister_ftrace_profiler();
bac429f0
SR
778 }
779 }
493762fc 780 out:
bac429f0
SR
781 mutex_unlock(&ftrace_profile_lock);
782
cf8517cf 783 *ppos += cnt;
bac429f0
SR
784
785 return cnt;
786}
787
493762fc
SR
788static ssize_t
789ftrace_profile_read(struct file *filp, char __user *ubuf,
790 size_t cnt, loff_t *ppos)
791{
fb9fb015 792 char buf[64]; /* big enough to hold a number */
493762fc
SR
793 int r;
794
795 r = sprintf(buf, "%u\n", ftrace_profile_enabled);
796 return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
797}
798
bac429f0
SR
799static const struct file_operations ftrace_profile_fops = {
800 .open = tracing_open_generic,
801 .read = ftrace_profile_read,
802 .write = ftrace_profile_write,
803};
804
cafb168a
SR
805/* used to initialize the real stat files */
806static struct tracer_stat function_stats __initdata = {
fb9fb015
SR
807 .name = "functions",
808 .stat_start = function_stat_start,
809 .stat_next = function_stat_next,
810 .stat_cmp = function_stat_cmp,
811 .stat_headers = function_stat_headers,
812 .stat_show = function_stat_show
cafb168a
SR
813};
814
6ab5d668 815static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
bac429f0 816{
cafb168a 817 struct ftrace_profile_stat *stat;
bac429f0 818 struct dentry *entry;
cafb168a 819 char *name;
bac429f0 820 int ret;
cafb168a
SR
821 int cpu;
822
823 for_each_possible_cpu(cpu) {
824 stat = &per_cpu(ftrace_profile_stats, cpu);
825
826 /* allocate enough for function name + cpu number */
827 name = kmalloc(32, GFP_KERNEL);
828 if (!name) {
829 /*
830 * The files created are permanent, if something happens
831 * we still do not free memory.
832 */
cafb168a
SR
833 WARN(1,
834 "Could not allocate stat file for cpu %d\n",
835 cpu);
836 return;
837 }
838 stat->stat = function_stats;
839 snprintf(name, 32, "function%d", cpu);
840 stat->stat.name = name;
841 ret = register_stat_tracer(&stat->stat);
842 if (ret) {
843 WARN(1,
844 "Could not register function stat for cpu %d\n",
845 cpu);
846 kfree(name);
847 return;
848 }
bac429f0
SR
849 }
850
851 entry = debugfs_create_file("function_profile_enabled", 0644,
852 d_tracer, NULL, &ftrace_profile_fops);
853 if (!entry)
854 pr_warning("Could not create debugfs "
855 "'function_profile_enabled' entry\n");
856}
857
bac429f0 858#else /* CONFIG_FUNCTION_PROFILER */
6ab5d668 859static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
bac429f0
SR
860{
861}
bac429f0
SR
862#endif /* CONFIG_FUNCTION_PROFILER */
863
493762fc
SR
864static struct pid * const ftrace_swapper_pid = &init_struct_pid;
865
866#ifdef CONFIG_DYNAMIC_FTRACE
867
868#ifndef CONFIG_FTRACE_MCOUNT_RECORD
869# error Dynamic ftrace depends on MCOUNT_RECORD
870#endif
871
872static struct hlist_head ftrace_func_hash[FTRACE_FUNC_HASHSIZE] __read_mostly;
873
874struct ftrace_func_probe {
875 struct hlist_node node;
876 struct ftrace_probe_ops *ops;
877 unsigned long flags;
878 unsigned long ip;
879 void *data;
880 struct rcu_head rcu;
881};
882
883enum {
884 FTRACE_ENABLE_CALLS = (1 << 0),
885 FTRACE_DISABLE_CALLS = (1 << 1),
886 FTRACE_UPDATE_TRACE_FUNC = (1 << 2),
887 FTRACE_ENABLE_MCOUNT = (1 << 3),
888 FTRACE_DISABLE_MCOUNT = (1 << 4),
889 FTRACE_START_FUNC_RET = (1 << 5),
890 FTRACE_STOP_FUNC_RET = (1 << 6),
891};
892
893static int ftrace_filtered;
894
895static struct dyn_ftrace *ftrace_new_addrs;
896
897static DEFINE_MUTEX(ftrace_regex_lock);
898
899struct ftrace_page {
900 struct ftrace_page *next;
901 int index;
902 struct dyn_ftrace records[];
903};
904
905#define ENTRIES_PER_PAGE \
906 ((PAGE_SIZE - sizeof(struct ftrace_page)) / sizeof(struct dyn_ftrace))
907
908/* estimate from running different kernels */
909#define NR_TO_INIT 10000
910
911static struct ftrace_page *ftrace_pages_start;
912static struct ftrace_page *ftrace_pages;
913
914static struct dyn_ftrace *ftrace_free_records;
915
916/*
917 * This is a double for. Do not use 'break' to break out of the loop,
918 * you must use a goto.
919 */
920#define do_for_each_ftrace_rec(pg, rec) \
921 for (pg = ftrace_pages_start; pg; pg = pg->next) { \
922 int _____i; \
923 for (_____i = 0; _____i < pg->index; _____i++) { \
924 rec = &pg->records[_____i];
925
926#define while_for_each_ftrace_rec() \
927 } \
928 }
929
e309b41d 930static void ftrace_free_rec(struct dyn_ftrace *rec)
37ad5084 931{
ee000b7f 932 rec->freelist = ftrace_free_records;
37ad5084
SR
933 ftrace_free_records = rec;
934 rec->flags |= FTRACE_FL_FREE;
935}
936
e309b41d 937static struct dyn_ftrace *ftrace_alloc_dyn_node(unsigned long ip)
3c1720f0 938{
37ad5084
SR
939 struct dyn_ftrace *rec;
940
941 /* First check for freed records */
942 if (ftrace_free_records) {
943 rec = ftrace_free_records;
944
37ad5084 945 if (unlikely(!(rec->flags & FTRACE_FL_FREE))) {
6912896e 946 FTRACE_WARN_ON_ONCE(1);
37ad5084
SR
947 ftrace_free_records = NULL;
948 return NULL;
949 }
950
ee000b7f 951 ftrace_free_records = rec->freelist;
37ad5084
SR
952 memset(rec, 0, sizeof(*rec));
953 return rec;
954 }
955
3c1720f0 956 if (ftrace_pages->index == ENTRIES_PER_PAGE) {
08f5ac90
SR
957 if (!ftrace_pages->next) {
958 /* allocate another page */
959 ftrace_pages->next =
960 (void *)get_zeroed_page(GFP_KERNEL);
961 if (!ftrace_pages->next)
962 return NULL;
963 }
3c1720f0
SR
964 ftrace_pages = ftrace_pages->next;
965 }
966
967 return &ftrace_pages->records[ftrace_pages->index++];
968}
969
08f5ac90 970static struct dyn_ftrace *
d61f82d0 971ftrace_record_ip(unsigned long ip)
3d083395 972{
08f5ac90 973 struct dyn_ftrace *rec;
3d083395 974
f3c7ac40 975 if (ftrace_disabled)
08f5ac90 976 return NULL;
3d083395 977
08f5ac90
SR
978 rec = ftrace_alloc_dyn_node(ip);
979 if (!rec)
980 return NULL;
3d083395 981
08f5ac90 982 rec->ip = ip;
ee000b7f 983 rec->newlist = ftrace_new_addrs;
e94142a6 984 ftrace_new_addrs = rec;
3d083395 985
08f5ac90 986 return rec;
3d083395
SR
987}
988
b17e8a37
SR
989static void print_ip_ins(const char *fmt, unsigned char *p)
990{
991 int i;
992
993 printk(KERN_CONT "%s", fmt);
994
995 for (i = 0; i < MCOUNT_INSN_SIZE; i++)
996 printk(KERN_CONT "%s%02x", i ? ":" : "", p[i]);
997}
998
31e88909 999static void ftrace_bug(int failed, unsigned long ip)
b17e8a37
SR
1000{
1001 switch (failed) {
1002 case -EFAULT:
1003 FTRACE_WARN_ON_ONCE(1);
1004 pr_info("ftrace faulted on modifying ");
1005 print_ip_sym(ip);
1006 break;
1007 case -EINVAL:
1008 FTRACE_WARN_ON_ONCE(1);
1009 pr_info("ftrace failed to modify ");
1010 print_ip_sym(ip);
b17e8a37 1011 print_ip_ins(" actual: ", (unsigned char *)ip);
b17e8a37
SR
1012 printk(KERN_CONT "\n");
1013 break;
1014 case -EPERM:
1015 FTRACE_WARN_ON_ONCE(1);
1016 pr_info("ftrace faulted on writing ");
1017 print_ip_sym(ip);
1018 break;
1019 default:
1020 FTRACE_WARN_ON_ONCE(1);
1021 pr_info("ftrace faulted on unknown error ");
1022 print_ip_sym(ip);
1023 }
1024}
1025
3c1720f0 1026
2cfa1978
MH
1027/* Return 1 if the address range is reserved for ftrace */
1028int ftrace_text_reserved(void *start, void *end)
1029{
1030 struct dyn_ftrace *rec;
1031 struct ftrace_page *pg;
1032
1033 do_for_each_ftrace_rec(pg, rec) {
1034 if (rec->ip <= (unsigned long)end &&
1035 rec->ip + MCOUNT_INSN_SIZE > (unsigned long)start)
1036 return 1;
1037 } while_for_each_ftrace_rec();
1038 return 0;
1039}
1040
1041
0eb96701 1042static int
31e88909 1043__ftrace_replace_code(struct dyn_ftrace *rec, int enable)
5072c59f 1044{
e7d3737e 1045 unsigned long ftrace_addr;
64fbcd16 1046 unsigned long flag = 0UL;
e7d3737e 1047
f0001207 1048 ftrace_addr = (unsigned long)FTRACE_ADDR;
5072c59f 1049
982c350b 1050 /*
64fbcd16
XG
1051 * If this record is not to be traced or we want to disable it,
1052 * then disable it.
982c350b 1053 *
64fbcd16 1054 * If we want to enable it and filtering is off, then enable it.
982c350b 1055 *
64fbcd16
XG
1056 * If we want to enable it and filtering is on, enable it only if
1057 * it's filtered
982c350b 1058 */
64fbcd16
XG
1059 if (enable && !(rec->flags & FTRACE_FL_NOTRACE)) {
1060 if (!ftrace_filtered || (rec->flags & FTRACE_FL_FILTER))
1061 flag = FTRACE_FL_ENABLED;
1062 }
982c350b 1063
64fbcd16
XG
1064 /* If the state of this record hasn't changed, then do nothing */
1065 if ((rec->flags & FTRACE_FL_ENABLED) == flag)
1066 return 0;
982c350b 1067
64fbcd16
XG
1068 if (flag) {
1069 rec->flags |= FTRACE_FL_ENABLED;
1070 return ftrace_make_call(rec, ftrace_addr);
5072c59f
SR
1071 }
1072
64fbcd16
XG
1073 rec->flags &= ~FTRACE_FL_ENABLED;
1074 return ftrace_make_nop(NULL, rec, ftrace_addr);
5072c59f
SR
1075}
1076
e309b41d 1077static void ftrace_replace_code(int enable)
3c1720f0 1078{
3c1720f0
SR
1079 struct dyn_ftrace *rec;
1080 struct ftrace_page *pg;
6a24a244 1081 int failed;
3c1720f0 1082
265c831c
SR
1083 do_for_each_ftrace_rec(pg, rec) {
1084 /*
fa9d13cf
Z
1085 * Skip over free records, records that have
1086 * failed and not converted.
265c831c
SR
1087 */
1088 if (rec->flags & FTRACE_FL_FREE ||
fa9d13cf 1089 rec->flags & FTRACE_FL_FAILED ||
03303549 1090 !(rec->flags & FTRACE_FL_CONVERTED))
265c831c
SR
1091 continue;
1092
265c831c 1093 failed = __ftrace_replace_code(rec, enable);
fa9d13cf 1094 if (failed) {
265c831c 1095 rec->flags |= FTRACE_FL_FAILED;
3279ba37
SR
1096 ftrace_bug(failed, rec->ip);
1097 /* Stop processing */
1098 return;
3c1720f0 1099 }
265c831c 1100 } while_for_each_ftrace_rec();
3c1720f0
SR
1101}
1102
492a7ea5 1103static int
31e88909 1104ftrace_code_disable(struct module *mod, struct dyn_ftrace *rec)
3c1720f0
SR
1105{
1106 unsigned long ip;
593eb8a2 1107 int ret;
3c1720f0
SR
1108
1109 ip = rec->ip;
1110
25aac9dc 1111 ret = ftrace_make_nop(mod, rec, MCOUNT_ADDR);
593eb8a2 1112 if (ret) {
31e88909 1113 ftrace_bug(ret, ip);
3c1720f0 1114 rec->flags |= FTRACE_FL_FAILED;
492a7ea5 1115 return 0;
37ad5084 1116 }
492a7ea5 1117 return 1;
3c1720f0
SR
1118}
1119
000ab691
SR
1120/*
1121 * archs can override this function if they must do something
1122 * before the modifying code is performed.
1123 */
1124int __weak ftrace_arch_code_modify_prepare(void)
1125{
1126 return 0;
1127}
1128
1129/*
1130 * archs can override this function if they must do something
1131 * after the modifying code is performed.
1132 */
1133int __weak ftrace_arch_code_modify_post_process(void)
1134{
1135 return 0;
1136}
1137
e309b41d 1138static int __ftrace_modify_code(void *data)
3d083395 1139{
d61f82d0
SR
1140 int *command = data;
1141
a3583244 1142 if (*command & FTRACE_ENABLE_CALLS)
d61f82d0 1143 ftrace_replace_code(1);
a3583244 1144 else if (*command & FTRACE_DISABLE_CALLS)
d61f82d0
SR
1145 ftrace_replace_code(0);
1146
1147 if (*command & FTRACE_UPDATE_TRACE_FUNC)
1148 ftrace_update_ftrace_func(ftrace_trace_function);
1149
5a45cfe1
SR
1150 if (*command & FTRACE_START_FUNC_RET)
1151 ftrace_enable_ftrace_graph_caller();
1152 else if (*command & FTRACE_STOP_FUNC_RET)
1153 ftrace_disable_ftrace_graph_caller();
1154
d61f82d0 1155 return 0;
3d083395
SR
1156}
1157
e309b41d 1158static void ftrace_run_update_code(int command)
3d083395 1159{
000ab691
SR
1160 int ret;
1161
1162 ret = ftrace_arch_code_modify_prepare();
1163 FTRACE_WARN_ON(ret);
1164 if (ret)
1165 return;
1166
784e2d76 1167 stop_machine(__ftrace_modify_code, &command, NULL);
000ab691
SR
1168
1169 ret = ftrace_arch_code_modify_post_process();
1170 FTRACE_WARN_ON(ret);
3d083395
SR
1171}
1172
d61f82d0 1173static ftrace_func_t saved_ftrace_func;
60a7ecf4 1174static int ftrace_start_up;
df4fc315
SR
1175
1176static void ftrace_startup_enable(int command)
1177{
1178 if (saved_ftrace_func != ftrace_trace_function) {
1179 saved_ftrace_func = ftrace_trace_function;
1180 command |= FTRACE_UPDATE_TRACE_FUNC;
1181 }
1182
1183 if (!command || !ftrace_enabled)
1184 return;
1185
1186 ftrace_run_update_code(command);
1187}
d61f82d0 1188
5a45cfe1 1189static void ftrace_startup(int command)
3d083395 1190{
4eebcc81
SR
1191 if (unlikely(ftrace_disabled))
1192 return;
1193
60a7ecf4 1194 ftrace_start_up++;
982c350b 1195 command |= FTRACE_ENABLE_CALLS;
d61f82d0 1196
df4fc315 1197 ftrace_startup_enable(command);
3d083395
SR
1198}
1199
5a45cfe1 1200static void ftrace_shutdown(int command)
3d083395 1201{
4eebcc81
SR
1202 if (unlikely(ftrace_disabled))
1203 return;
1204
60a7ecf4 1205 ftrace_start_up--;
9ea1a153
FW
1206 /*
1207 * Just warn in case of unbalance, no need to kill ftrace, it's not
1208 * critical but the ftrace_call callers may be never nopped again after
1209 * further ftrace uses.
1210 */
1211 WARN_ON_ONCE(ftrace_start_up < 0);
1212
60a7ecf4 1213 if (!ftrace_start_up)
d61f82d0 1214 command |= FTRACE_DISABLE_CALLS;
3d083395 1215
d61f82d0
SR
1216 if (saved_ftrace_func != ftrace_trace_function) {
1217 saved_ftrace_func = ftrace_trace_function;
1218 command |= FTRACE_UPDATE_TRACE_FUNC;
1219 }
3d083395 1220
d61f82d0 1221 if (!command || !ftrace_enabled)
e6ea44e9 1222 return;
d61f82d0
SR
1223
1224 ftrace_run_update_code(command);
3d083395
SR
1225}
1226
e309b41d 1227static void ftrace_startup_sysctl(void)
b0fc494f 1228{
d61f82d0
SR
1229 int command = FTRACE_ENABLE_MCOUNT;
1230
4eebcc81
SR
1231 if (unlikely(ftrace_disabled))
1232 return;
1233
d61f82d0
SR
1234 /* Force update next time */
1235 saved_ftrace_func = NULL;
60a7ecf4
SR
1236 /* ftrace_start_up is true if we want ftrace running */
1237 if (ftrace_start_up)
d61f82d0
SR
1238 command |= FTRACE_ENABLE_CALLS;
1239
1240 ftrace_run_update_code(command);
b0fc494f
SR
1241}
1242
e309b41d 1243static void ftrace_shutdown_sysctl(void)
b0fc494f 1244{
d61f82d0
SR
1245 int command = FTRACE_DISABLE_MCOUNT;
1246
4eebcc81
SR
1247 if (unlikely(ftrace_disabled))
1248 return;
1249
60a7ecf4
SR
1250 /* ftrace_start_up is true if ftrace is running */
1251 if (ftrace_start_up)
d61f82d0
SR
1252 command |= FTRACE_DISABLE_CALLS;
1253
1254 ftrace_run_update_code(command);
b0fc494f
SR
1255}
1256
3d083395
SR
1257static cycle_t ftrace_update_time;
1258static unsigned long ftrace_update_cnt;
1259unsigned long ftrace_update_tot_cnt;
1260
31e88909 1261static int ftrace_update_code(struct module *mod)
3d083395 1262{
e94142a6 1263 struct dyn_ftrace *p;
f22f9a89 1264 cycle_t start, stop;
3d083395 1265
750ed1a4 1266 start = ftrace_now(raw_smp_processor_id());
3d083395
SR
1267 ftrace_update_cnt = 0;
1268
e94142a6 1269 while (ftrace_new_addrs) {
3d083395 1270
08f5ac90
SR
1271 /* If something went wrong, bail without enabling anything */
1272 if (unlikely(ftrace_disabled))
1273 return -1;
f22f9a89 1274
e94142a6 1275 p = ftrace_new_addrs;
ee000b7f 1276 ftrace_new_addrs = p->newlist;
e94142a6 1277 p->flags = 0L;
f22f9a89 1278
5cb084bb
JO
1279 /*
1280 * Do the initial record convertion from mcount jump
1281 * to the NOP instructions.
1282 */
1283 if (!ftrace_code_disable(mod, p)) {
08f5ac90 1284 ftrace_free_rec(p);
5cb084bb
JO
1285 continue;
1286 }
1287
1288 p->flags |= FTRACE_FL_CONVERTED;
1289 ftrace_update_cnt++;
1290
1291 /*
1292 * If the tracing is enabled, go ahead and enable the record.
1293 *
1294 * The reason not to enable the record immediatelly is the
1295 * inherent check of ftrace_make_nop/ftrace_make_call for
1296 * correct previous instructions. Making first the NOP
1297 * conversion puts the module to the correct state, thus
1298 * passing the ftrace_make_call check.
1299 */
1300 if (ftrace_start_up) {
1301 int failed = __ftrace_replace_code(p, 1);
1302 if (failed) {
1303 ftrace_bug(failed, p->ip);
1304 ftrace_free_rec(p);
1305 }
1306 }
3d083395
SR
1307 }
1308
750ed1a4 1309 stop = ftrace_now(raw_smp_processor_id());
3d083395
SR
1310 ftrace_update_time = stop - start;
1311 ftrace_update_tot_cnt += ftrace_update_cnt;
1312
16444a8a
ACM
1313 return 0;
1314}
1315
68bf21aa 1316static int __init ftrace_dyn_table_alloc(unsigned long num_to_init)
3c1720f0
SR
1317{
1318 struct ftrace_page *pg;
1319 int cnt;
1320 int i;
3c1720f0
SR
1321
1322 /* allocate a few pages */
1323 ftrace_pages_start = (void *)get_zeroed_page(GFP_KERNEL);
1324 if (!ftrace_pages_start)
1325 return -1;
1326
1327 /*
1328 * Allocate a few more pages.
1329 *
1330 * TODO: have some parser search vmlinux before
1331 * final linking to find all calls to ftrace.
1332 * Then we can:
1333 * a) know how many pages to allocate.
1334 * and/or
1335 * b) set up the table then.
1336 *
1337 * The dynamic code is still necessary for
1338 * modules.
1339 */
1340
1341 pg = ftrace_pages = ftrace_pages_start;
1342
68bf21aa 1343 cnt = num_to_init / ENTRIES_PER_PAGE;
08f5ac90 1344 pr_info("ftrace: allocating %ld entries in %d pages\n",
5821e1b7 1345 num_to_init, cnt + 1);
3c1720f0
SR
1346
1347 for (i = 0; i < cnt; i++) {
1348 pg->next = (void *)get_zeroed_page(GFP_KERNEL);
1349
1350 /* If we fail, we'll try later anyway */
1351 if (!pg->next)
1352 break;
1353
1354 pg = pg->next;
1355 }
1356
1357 return 0;
1358}
1359
5072c59f
SR
1360enum {
1361 FTRACE_ITER_FILTER = (1 << 0),
689fd8b6 1362 FTRACE_ITER_NOTRACE = (1 << 1),
1363 FTRACE_ITER_FAILURES = (1 << 2),
1364 FTRACE_ITER_PRINTALL = (1 << 3),
1365 FTRACE_ITER_HASH = (1 << 4),
5072c59f
SR
1366};
1367
1368#define FTRACE_BUFF_MAX (KSYM_SYMBOL_LEN+4) /* room for wildcards */
1369
1370struct ftrace_iterator {
2bccfffd 1371 loff_t func_pos;
5072c59f 1372 struct ftrace_page *pg;
8fc0c701 1373 int hidx;
431aa3fb 1374 int idx;
5072c59f 1375 unsigned flags;
689fd8b6 1376 struct trace_parser parser;
5072c59f
SR
1377};
1378
8fc0c701
SR
1379static void *
1380t_hash_next(struct seq_file *m, void *v, loff_t *pos)
1381{
1382 struct ftrace_iterator *iter = m->private;
1383 struct hlist_node *hnd = v;
1384 struct hlist_head *hhd;
1385
1386 WARN_ON(!(iter->flags & FTRACE_ITER_HASH));
1387
1388 (*pos)++;
1389
1390 retry:
1391 if (iter->hidx >= FTRACE_FUNC_HASHSIZE)
1392 return NULL;
1393
1394 hhd = &ftrace_func_hash[iter->hidx];
1395
1396 if (hlist_empty(hhd)) {
1397 iter->hidx++;
1398 hnd = NULL;
1399 goto retry;
1400 }
1401
1402 if (!hnd)
1403 hnd = hhd->first;
1404 else {
1405 hnd = hnd->next;
1406 if (!hnd) {
1407 iter->hidx++;
1408 goto retry;
1409 }
1410 }
1411
1412 return hnd;
1413}
1414
1415static void *t_hash_start(struct seq_file *m, loff_t *pos)
1416{
1417 struct ftrace_iterator *iter = m->private;
1418 void *p = NULL;
d82d6244
LZ
1419 loff_t l;
1420
1421 if (!(iter->flags & FTRACE_ITER_HASH))
2bccfffd
SR
1422 iter->func_pos = *pos;
1423
1424 if (iter->func_pos > *pos)
1425 return NULL;
8fc0c701
SR
1426
1427 iter->flags |= FTRACE_ITER_HASH;
1428
d82d6244 1429 iter->hidx = 0;
2bccfffd 1430 for (l = 0; l <= (*pos - iter->func_pos); ) {
d82d6244
LZ
1431 p = t_hash_next(m, p, &l);
1432 if (!p)
1433 break;
1434 }
1435 return p;
8fc0c701
SR
1436}
1437
1438static int t_hash_show(struct seq_file *m, void *v)
1439{
b6887d79 1440 struct ftrace_func_probe *rec;
8fc0c701 1441 struct hlist_node *hnd = v;
8fc0c701 1442
b6887d79 1443 rec = hlist_entry(hnd, struct ftrace_func_probe, node);
8fc0c701 1444
809dcf29
SR
1445 if (rec->ops->print)
1446 return rec->ops->print(m, rec->ip, rec->ops, rec->data);
1447
b375a11a 1448 seq_printf(m, "%ps:%ps", (void *)rec->ip, (void *)rec->ops->func);
8fc0c701
SR
1449
1450 if (rec->data)
1451 seq_printf(m, ":%p", rec->data);
1452 seq_putc(m, '\n');
1453
1454 return 0;
1455}
1456
e309b41d 1457static void *
5072c59f
SR
1458t_next(struct seq_file *m, void *v, loff_t *pos)
1459{
1460 struct ftrace_iterator *iter = m->private;
1461 struct dyn_ftrace *rec = NULL;
1462
8fc0c701
SR
1463 if (iter->flags & FTRACE_ITER_HASH)
1464 return t_hash_next(m, v, pos);
1465
5072c59f
SR
1466 (*pos)++;
1467
0c75a3ed
SR
1468 if (iter->flags & FTRACE_ITER_PRINTALL)
1469 return NULL;
1470
5072c59f
SR
1471 retry:
1472 if (iter->idx >= iter->pg->index) {
1473 if (iter->pg->next) {
1474 iter->pg = iter->pg->next;
1475 iter->idx = 0;
1476 goto retry;
1477 }
1478 } else {
1479 rec = &iter->pg->records[iter->idx++];
a9fdda33
SR
1480 if ((rec->flags & FTRACE_FL_FREE) ||
1481
1482 (!(iter->flags & FTRACE_ITER_FAILURES) &&
eb9a7bf0
AS
1483 (rec->flags & FTRACE_FL_FAILED)) ||
1484
1485 ((iter->flags & FTRACE_ITER_FAILURES) &&
a9fdda33 1486 !(rec->flags & FTRACE_FL_FAILED)) ||
eb9a7bf0 1487
0183fb1c
SR
1488 ((iter->flags & FTRACE_ITER_FILTER) &&
1489 !(rec->flags & FTRACE_FL_FILTER)) ||
1490
41c52c0d
SR
1491 ((iter->flags & FTRACE_ITER_NOTRACE) &&
1492 !(rec->flags & FTRACE_FL_NOTRACE))) {
5072c59f
SR
1493 rec = NULL;
1494 goto retry;
1495 }
1496 }
1497
5072c59f
SR
1498 return rec;
1499}
1500
1501static void *t_start(struct seq_file *m, loff_t *pos)
1502{
1503 struct ftrace_iterator *iter = m->private;
1504 void *p = NULL;
694ce0a5 1505 loff_t l;
5072c59f 1506
8fc0c701 1507 mutex_lock(&ftrace_lock);
0c75a3ed
SR
1508 /*
1509 * For set_ftrace_filter reading, if we have the filter
1510 * off, we can short cut and just print out that all
1511 * functions are enabled.
1512 */
1513 if (iter->flags & FTRACE_ITER_FILTER && !ftrace_filtered) {
1514 if (*pos > 0)
8fc0c701 1515 return t_hash_start(m, pos);
0c75a3ed 1516 iter->flags |= FTRACE_ITER_PRINTALL;
df091625
CW
1517 /* reset in case of seek/pread */
1518 iter->flags &= ~FTRACE_ITER_HASH;
0c75a3ed
SR
1519 return iter;
1520 }
1521
8fc0c701
SR
1522 if (iter->flags & FTRACE_ITER_HASH)
1523 return t_hash_start(m, pos);
1524
694ce0a5
LZ
1525 iter->pg = ftrace_pages_start;
1526 iter->idx = 0;
1527 for (l = 0; l <= *pos; ) {
1528 p = t_next(m, p, &l);
1529 if (!p)
1530 break;
50cdaf08 1531 }
5821e1b7 1532
694ce0a5 1533 if (!p && iter->flags & FTRACE_ITER_FILTER)
8fc0c701
SR
1534 return t_hash_start(m, pos);
1535
5072c59f
SR
1536 return p;
1537}
1538
1539static void t_stop(struct seq_file *m, void *p)
1540{
8fc0c701 1541 mutex_unlock(&ftrace_lock);
5072c59f
SR
1542}
1543
1544static int t_show(struct seq_file *m, void *v)
1545{
0c75a3ed 1546 struct ftrace_iterator *iter = m->private;
5072c59f 1547 struct dyn_ftrace *rec = v;
5072c59f 1548
8fc0c701
SR
1549 if (iter->flags & FTRACE_ITER_HASH)
1550 return t_hash_show(m, v);
1551
0c75a3ed
SR
1552 if (iter->flags & FTRACE_ITER_PRINTALL) {
1553 seq_printf(m, "#### all functions enabled ####\n");
1554 return 0;
1555 }
1556
5072c59f
SR
1557 if (!rec)
1558 return 0;
1559
b375a11a 1560 seq_printf(m, "%ps\n", (void *)rec->ip);
5072c59f
SR
1561
1562 return 0;
1563}
1564
88e9d34c 1565static const struct seq_operations show_ftrace_seq_ops = {
5072c59f
SR
1566 .start = t_start,
1567 .next = t_next,
1568 .stop = t_stop,
1569 .show = t_show,
1570};
1571
e309b41d 1572static int
5072c59f
SR
1573ftrace_avail_open(struct inode *inode, struct file *file)
1574{
1575 struct ftrace_iterator *iter;
1576 int ret;
1577
4eebcc81
SR
1578 if (unlikely(ftrace_disabled))
1579 return -ENODEV;
1580
5072c59f
SR
1581 iter = kzalloc(sizeof(*iter), GFP_KERNEL);
1582 if (!iter)
1583 return -ENOMEM;
1584
1585 iter->pg = ftrace_pages_start;
5072c59f
SR
1586
1587 ret = seq_open(file, &show_ftrace_seq_ops);
1588 if (!ret) {
1589 struct seq_file *m = file->private_data;
4bf39a94 1590
5072c59f 1591 m->private = iter;
4bf39a94 1592 } else {
5072c59f 1593 kfree(iter);
4bf39a94 1594 }
5072c59f
SR
1595
1596 return ret;
1597}
1598
eb9a7bf0
AS
1599static int
1600ftrace_failures_open(struct inode *inode, struct file *file)
1601{
1602 int ret;
1603 struct seq_file *m;
1604 struct ftrace_iterator *iter;
1605
1606 ret = ftrace_avail_open(inode, file);
1607 if (!ret) {
1608 m = (struct seq_file *)file->private_data;
1609 iter = (struct ftrace_iterator *)m->private;
1610 iter->flags = FTRACE_ITER_FAILURES;
1611 }
1612
1613 return ret;
1614}
1615
1616
41c52c0d 1617static void ftrace_filter_reset(int enable)
5072c59f
SR
1618{
1619 struct ftrace_page *pg;
1620 struct dyn_ftrace *rec;
41c52c0d 1621 unsigned long type = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
5072c59f 1622
52baf119 1623 mutex_lock(&ftrace_lock);
41c52c0d
SR
1624 if (enable)
1625 ftrace_filtered = 0;
265c831c
SR
1626 do_for_each_ftrace_rec(pg, rec) {
1627 if (rec->flags & FTRACE_FL_FAILED)
1628 continue;
1629 rec->flags &= ~type;
1630 } while_for_each_ftrace_rec();
52baf119 1631 mutex_unlock(&ftrace_lock);
5072c59f
SR
1632}
1633
e309b41d 1634static int
41c52c0d 1635ftrace_regex_open(struct inode *inode, struct file *file, int enable)
5072c59f
SR
1636{
1637 struct ftrace_iterator *iter;
1638 int ret = 0;
1639
4eebcc81
SR
1640 if (unlikely(ftrace_disabled))
1641 return -ENODEV;
1642
5072c59f
SR
1643 iter = kzalloc(sizeof(*iter), GFP_KERNEL);
1644 if (!iter)
1645 return -ENOMEM;
1646
689fd8b6 1647 if (trace_parser_get_init(&iter->parser, FTRACE_BUFF_MAX)) {
1648 kfree(iter);
1649 return -ENOMEM;
1650 }
1651
41c52c0d 1652 mutex_lock(&ftrace_regex_lock);
5072c59f 1653 if ((file->f_mode & FMODE_WRITE) &&
8650ae32 1654 (file->f_flags & O_TRUNC))
41c52c0d 1655 ftrace_filter_reset(enable);
5072c59f
SR
1656
1657 if (file->f_mode & FMODE_READ) {
1658 iter->pg = ftrace_pages_start;
41c52c0d
SR
1659 iter->flags = enable ? FTRACE_ITER_FILTER :
1660 FTRACE_ITER_NOTRACE;
5072c59f
SR
1661
1662 ret = seq_open(file, &show_ftrace_seq_ops);
1663 if (!ret) {
1664 struct seq_file *m = file->private_data;
1665 m->private = iter;
79fe249c
LZ
1666 } else {
1667 trace_parser_put(&iter->parser);
5072c59f 1668 kfree(iter);
79fe249c 1669 }
5072c59f
SR
1670 } else
1671 file->private_data = iter;
41c52c0d 1672 mutex_unlock(&ftrace_regex_lock);
5072c59f
SR
1673
1674 return ret;
1675}
1676
41c52c0d
SR
1677static int
1678ftrace_filter_open(struct inode *inode, struct file *file)
1679{
1680 return ftrace_regex_open(inode, file, 1);
1681}
1682
1683static int
1684ftrace_notrace_open(struct inode *inode, struct file *file)
1685{
1686 return ftrace_regex_open(inode, file, 0);
1687}
1688
e309b41d 1689static loff_t
41c52c0d 1690ftrace_regex_lseek(struct file *file, loff_t offset, int origin)
5072c59f
SR
1691{
1692 loff_t ret;
1693
1694 if (file->f_mode & FMODE_READ)
1695 ret = seq_lseek(file, offset, origin);
1696 else
1697 file->f_pos = ret = 1;
1698
1699 return ret;
1700}
1701
64e7c440 1702static int ftrace_match(char *str, char *regex, int len, int type)
9f4801e3 1703{
9f4801e3 1704 int matched = 0;
751e9983 1705 int slen;
9f4801e3 1706
9f4801e3
SR
1707 switch (type) {
1708 case MATCH_FULL:
1709 if (strcmp(str, regex) == 0)
1710 matched = 1;
1711 break;
1712 case MATCH_FRONT_ONLY:
1713 if (strncmp(str, regex, len) == 0)
1714 matched = 1;
1715 break;
1716 case MATCH_MIDDLE_ONLY:
1717 if (strstr(str, regex))
1718 matched = 1;
1719 break;
1720 case MATCH_END_ONLY:
751e9983
LZ
1721 slen = strlen(str);
1722 if (slen >= len && memcmp(str + slen - len, regex, len) == 0)
9f4801e3
SR
1723 matched = 1;
1724 break;
1725 }
1726
1727 return matched;
1728}
1729
64e7c440
SR
1730static int
1731ftrace_match_record(struct dyn_ftrace *rec, char *regex, int len, int type)
1732{
1733 char str[KSYM_SYMBOL_LEN];
1734
1735 kallsyms_lookup(rec->ip, NULL, NULL, NULL, str);
1736 return ftrace_match(str, regex, len, type);
1737}
1738
311d16da 1739static int ftrace_match_records(char *buff, int len, int enable)
9f4801e3 1740{
6a24a244 1741 unsigned int search_len;
9f4801e3
SR
1742 struct ftrace_page *pg;
1743 struct dyn_ftrace *rec;
6a24a244
SR
1744 unsigned long flag;
1745 char *search;
9f4801e3 1746 int type;
9f4801e3 1747 int not;
311d16da 1748 int found = 0;
9f4801e3 1749
6a24a244 1750 flag = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
3f6fe06d 1751 type = filter_parse_regex(buff, len, &search, &not);
9f4801e3
SR
1752
1753 search_len = strlen(search);
1754
52baf119 1755 mutex_lock(&ftrace_lock);
265c831c 1756 do_for_each_ftrace_rec(pg, rec) {
265c831c
SR
1757
1758 if (rec->flags & FTRACE_FL_FAILED)
1759 continue;
9f4801e3
SR
1760
1761 if (ftrace_match_record(rec, search, search_len, type)) {
265c831c
SR
1762 if (not)
1763 rec->flags &= ~flag;
1764 else
1765 rec->flags |= flag;
311d16da 1766 found = 1;
265c831c 1767 }
e68746a2
SR
1768 /*
1769 * Only enable filtering if we have a function that
1770 * is filtered on.
1771 */
1772 if (enable && (rec->flags & FTRACE_FL_FILTER))
1773 ftrace_filtered = 1;
265c831c 1774 } while_for_each_ftrace_rec();
52baf119 1775 mutex_unlock(&ftrace_lock);
311d16da
LZ
1776
1777 return found;
5072c59f
SR
1778}
1779
64e7c440
SR
1780static int
1781ftrace_match_module_record(struct dyn_ftrace *rec, char *mod,
1782 char *regex, int len, int type)
1783{
1784 char str[KSYM_SYMBOL_LEN];
1785 char *modname;
1786
1787 kallsyms_lookup(rec->ip, NULL, NULL, &modname, str);
1788
1789 if (!modname || strcmp(modname, mod))
1790 return 0;
1791
1792 /* blank search means to match all funcs in the mod */
1793 if (len)
1794 return ftrace_match(str, regex, len, type);
1795 else
1796 return 1;
1797}
1798
311d16da 1799static int ftrace_match_module_records(char *buff, char *mod, int enable)
64e7c440 1800{
6a24a244 1801 unsigned search_len = 0;
64e7c440
SR
1802 struct ftrace_page *pg;
1803 struct dyn_ftrace *rec;
1804 int type = MATCH_FULL;
6a24a244
SR
1805 char *search = buff;
1806 unsigned long flag;
64e7c440 1807 int not = 0;
311d16da 1808 int found = 0;
64e7c440 1809
6a24a244
SR
1810 flag = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
1811
64e7c440
SR
1812 /* blank or '*' mean the same */
1813 if (strcmp(buff, "*") == 0)
1814 buff[0] = 0;
1815
1816 /* handle the case of 'dont filter this module' */
1817 if (strcmp(buff, "!") == 0 || strcmp(buff, "!*") == 0) {
1818 buff[0] = 0;
1819 not = 1;
1820 }
1821
1822 if (strlen(buff)) {
3f6fe06d 1823 type = filter_parse_regex(buff, strlen(buff), &search, &not);
64e7c440
SR
1824 search_len = strlen(search);
1825 }
1826
52baf119 1827 mutex_lock(&ftrace_lock);
64e7c440
SR
1828 do_for_each_ftrace_rec(pg, rec) {
1829
1830 if (rec->flags & FTRACE_FL_FAILED)
1831 continue;
1832
1833 if (ftrace_match_module_record(rec, mod,
1834 search, search_len, type)) {
1835 if (not)
1836 rec->flags &= ~flag;
1837 else
1838 rec->flags |= flag;
311d16da 1839 found = 1;
64e7c440 1840 }
e68746a2
SR
1841 if (enable && (rec->flags & FTRACE_FL_FILTER))
1842 ftrace_filtered = 1;
64e7c440
SR
1843
1844 } while_for_each_ftrace_rec();
52baf119 1845 mutex_unlock(&ftrace_lock);
311d16da
LZ
1846
1847 return found;
64e7c440
SR
1848}
1849
f6180773
SR
1850/*
1851 * We register the module command as a template to show others how
1852 * to register the a command as well.
1853 */
1854
1855static int
1856ftrace_mod_callback(char *func, char *cmd, char *param, int enable)
1857{
1858 char *mod;
1859
1860 /*
1861 * cmd == 'mod' because we only registered this func
1862 * for the 'mod' ftrace_func_command.
1863 * But if you register one func with multiple commands,
1864 * you can tell which command was used by the cmd
1865 * parameter.
1866 */
1867
1868 /* we must have a module name */
1869 if (!param)
1870 return -EINVAL;
1871
1872 mod = strsep(&param, ":");
1873 if (!strlen(mod))
1874 return -EINVAL;
1875
311d16da
LZ
1876 if (ftrace_match_module_records(func, mod, enable))
1877 return 0;
1878 return -EINVAL;
f6180773
SR
1879}
1880
1881static struct ftrace_func_command ftrace_mod_cmd = {
1882 .name = "mod",
1883 .func = ftrace_mod_callback,
1884};
1885
1886static int __init ftrace_mod_cmd_init(void)
1887{
1888 return register_ftrace_command(&ftrace_mod_cmd);
1889}
1890device_initcall(ftrace_mod_cmd_init);
1891
59df055f 1892static void
b6887d79 1893function_trace_probe_call(unsigned long ip, unsigned long parent_ip)
59df055f 1894{
b6887d79 1895 struct ftrace_func_probe *entry;
59df055f
SR
1896 struct hlist_head *hhd;
1897 struct hlist_node *n;
1898 unsigned long key;
59df055f
SR
1899
1900 key = hash_long(ip, FTRACE_HASH_BITS);
1901
1902 hhd = &ftrace_func_hash[key];
1903
1904 if (hlist_empty(hhd))
1905 return;
1906
1907 /*
1908 * Disable preemption for these calls to prevent a RCU grace
1909 * period. This syncs the hash iteration and freeing of items
1910 * on the hash. rcu_read_lock is too dangerous here.
1911 */
5168ae50 1912 preempt_disable_notrace();
59df055f
SR
1913 hlist_for_each_entry_rcu(entry, n, hhd, node) {
1914 if (entry->ip == ip)
1915 entry->ops->func(ip, parent_ip, &entry->data);
1916 }
5168ae50 1917 preempt_enable_notrace();
59df055f
SR
1918}
1919
b6887d79 1920static struct ftrace_ops trace_probe_ops __read_mostly =
59df055f 1921{
fb9fb015 1922 .func = function_trace_probe_call,
59df055f
SR
1923};
1924
b6887d79 1925static int ftrace_probe_registered;
59df055f 1926
b6887d79 1927static void __enable_ftrace_function_probe(void)
59df055f
SR
1928{
1929 int i;
1930
b6887d79 1931 if (ftrace_probe_registered)
59df055f
SR
1932 return;
1933
1934 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
1935 struct hlist_head *hhd = &ftrace_func_hash[i];
1936 if (hhd->first)
1937 break;
1938 }
1939 /* Nothing registered? */
1940 if (i == FTRACE_FUNC_HASHSIZE)
1941 return;
1942
b6887d79 1943 __register_ftrace_function(&trace_probe_ops);
59df055f 1944 ftrace_startup(0);
b6887d79 1945 ftrace_probe_registered = 1;
59df055f
SR
1946}
1947
b6887d79 1948static void __disable_ftrace_function_probe(void)
59df055f
SR
1949{
1950 int i;
1951
b6887d79 1952 if (!ftrace_probe_registered)
59df055f
SR
1953 return;
1954
1955 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
1956 struct hlist_head *hhd = &ftrace_func_hash[i];
1957 if (hhd->first)
1958 return;
1959 }
1960
1961 /* no more funcs left */
b6887d79 1962 __unregister_ftrace_function(&trace_probe_ops);
59df055f 1963 ftrace_shutdown(0);
b6887d79 1964 ftrace_probe_registered = 0;
59df055f
SR
1965}
1966
1967
1968static void ftrace_free_entry_rcu(struct rcu_head *rhp)
1969{
b6887d79
SR
1970 struct ftrace_func_probe *entry =
1971 container_of(rhp, struct ftrace_func_probe, rcu);
59df055f
SR
1972
1973 if (entry->ops->free)
1974 entry->ops->free(&entry->data);
1975 kfree(entry);
1976}
1977
1978
1979int
b6887d79 1980register_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
1981 void *data)
1982{
b6887d79 1983 struct ftrace_func_probe *entry;
59df055f
SR
1984 struct ftrace_page *pg;
1985 struct dyn_ftrace *rec;
59df055f 1986 int type, len, not;
6a24a244 1987 unsigned long key;
59df055f
SR
1988 int count = 0;
1989 char *search;
1990
3f6fe06d 1991 type = filter_parse_regex(glob, strlen(glob), &search, &not);
59df055f
SR
1992 len = strlen(search);
1993
b6887d79 1994 /* we do not support '!' for function probes */
59df055f
SR
1995 if (WARN_ON(not))
1996 return -EINVAL;
1997
1998 mutex_lock(&ftrace_lock);
1999 do_for_each_ftrace_rec(pg, rec) {
2000
2001 if (rec->flags & FTRACE_FL_FAILED)
2002 continue;
2003
2004 if (!ftrace_match_record(rec, search, len, type))
2005 continue;
2006
2007 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
2008 if (!entry) {
b6887d79 2009 /* If we did not process any, then return error */
59df055f
SR
2010 if (!count)
2011 count = -ENOMEM;
2012 goto out_unlock;
2013 }
2014
2015 count++;
2016
2017 entry->data = data;
2018
2019 /*
2020 * The caller might want to do something special
2021 * for each function we find. We call the callback
2022 * to give the caller an opportunity to do so.
2023 */
2024 if (ops->callback) {
2025 if (ops->callback(rec->ip, &entry->data) < 0) {
2026 /* caller does not like this func */
2027 kfree(entry);
2028 continue;
2029 }
2030 }
2031
2032 entry->ops = ops;
2033 entry->ip = rec->ip;
2034
2035 key = hash_long(entry->ip, FTRACE_HASH_BITS);
2036 hlist_add_head_rcu(&entry->node, &ftrace_func_hash[key]);
2037
2038 } while_for_each_ftrace_rec();
b6887d79 2039 __enable_ftrace_function_probe();
59df055f
SR
2040
2041 out_unlock:
2042 mutex_unlock(&ftrace_lock);
2043
2044 return count;
2045}
2046
2047enum {
b6887d79
SR
2048 PROBE_TEST_FUNC = 1,
2049 PROBE_TEST_DATA = 2
59df055f
SR
2050};
2051
2052static void
b6887d79 2053__unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
2054 void *data, int flags)
2055{
b6887d79 2056 struct ftrace_func_probe *entry;
59df055f
SR
2057 struct hlist_node *n, *tmp;
2058 char str[KSYM_SYMBOL_LEN];
2059 int type = MATCH_FULL;
2060 int i, len = 0;
2061 char *search;
2062
b36461da 2063 if (glob && (strcmp(glob, "*") == 0 || !strlen(glob)))
59df055f 2064 glob = NULL;
b36461da 2065 else if (glob) {
59df055f
SR
2066 int not;
2067
3f6fe06d 2068 type = filter_parse_regex(glob, strlen(glob), &search, &not);
59df055f
SR
2069 len = strlen(search);
2070
b6887d79 2071 /* we do not support '!' for function probes */
59df055f
SR
2072 if (WARN_ON(not))
2073 return;
2074 }
2075
2076 mutex_lock(&ftrace_lock);
2077 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
2078 struct hlist_head *hhd = &ftrace_func_hash[i];
2079
2080 hlist_for_each_entry_safe(entry, n, tmp, hhd, node) {
2081
2082 /* break up if statements for readability */
b6887d79 2083 if ((flags & PROBE_TEST_FUNC) && entry->ops != ops)
59df055f
SR
2084 continue;
2085
b6887d79 2086 if ((flags & PROBE_TEST_DATA) && entry->data != data)
59df055f
SR
2087 continue;
2088
2089 /* do this last, since it is the most expensive */
2090 if (glob) {
2091 kallsyms_lookup(entry->ip, NULL, NULL,
2092 NULL, str);
2093 if (!ftrace_match(str, glob, len, type))
2094 continue;
2095 }
2096
2097 hlist_del(&entry->node);
2098 call_rcu(&entry->rcu, ftrace_free_entry_rcu);
2099 }
2100 }
b6887d79 2101 __disable_ftrace_function_probe();
59df055f
SR
2102 mutex_unlock(&ftrace_lock);
2103}
2104
2105void
b6887d79 2106unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
2107 void *data)
2108{
b6887d79
SR
2109 __unregister_ftrace_function_probe(glob, ops, data,
2110 PROBE_TEST_FUNC | PROBE_TEST_DATA);
59df055f
SR
2111}
2112
2113void
b6887d79 2114unregister_ftrace_function_probe_func(char *glob, struct ftrace_probe_ops *ops)
59df055f 2115{
b6887d79 2116 __unregister_ftrace_function_probe(glob, ops, NULL, PROBE_TEST_FUNC);
59df055f
SR
2117}
2118
b6887d79 2119void unregister_ftrace_function_probe_all(char *glob)
59df055f 2120{
b6887d79 2121 __unregister_ftrace_function_probe(glob, NULL, NULL, 0);
59df055f
SR
2122}
2123
f6180773
SR
2124static LIST_HEAD(ftrace_commands);
2125static DEFINE_MUTEX(ftrace_cmd_mutex);
2126
2127int register_ftrace_command(struct ftrace_func_command *cmd)
2128{
2129 struct ftrace_func_command *p;
2130 int ret = 0;
2131
2132 mutex_lock(&ftrace_cmd_mutex);
2133 list_for_each_entry(p, &ftrace_commands, list) {
2134 if (strcmp(cmd->name, p->name) == 0) {
2135 ret = -EBUSY;
2136 goto out_unlock;
2137 }
2138 }
2139 list_add(&cmd->list, &ftrace_commands);
2140 out_unlock:
2141 mutex_unlock(&ftrace_cmd_mutex);
2142
2143 return ret;
2144}
2145
2146int unregister_ftrace_command(struct ftrace_func_command *cmd)
2147{
2148 struct ftrace_func_command *p, *n;
2149 int ret = -ENODEV;
2150
2151 mutex_lock(&ftrace_cmd_mutex);
2152 list_for_each_entry_safe(p, n, &ftrace_commands, list) {
2153 if (strcmp(cmd->name, p->name) == 0) {
2154 ret = 0;
2155 list_del_init(&p->list);
2156 goto out_unlock;
2157 }
2158 }
2159 out_unlock:
2160 mutex_unlock(&ftrace_cmd_mutex);
2161
2162 return ret;
2163}
2164
64e7c440
SR
2165static int ftrace_process_regex(char *buff, int len, int enable)
2166{
f6180773 2167 char *func, *command, *next = buff;
6a24a244 2168 struct ftrace_func_command *p;
f6180773 2169 int ret = -EINVAL;
64e7c440
SR
2170
2171 func = strsep(&next, ":");
2172
2173 if (!next) {
311d16da
LZ
2174 if (ftrace_match_records(func, len, enable))
2175 return 0;
2176 return ret;
64e7c440
SR
2177 }
2178
f6180773 2179 /* command found */
64e7c440
SR
2180
2181 command = strsep(&next, ":");
2182
f6180773
SR
2183 mutex_lock(&ftrace_cmd_mutex);
2184 list_for_each_entry(p, &ftrace_commands, list) {
2185 if (strcmp(p->name, command) == 0) {
2186 ret = p->func(func, command, next, enable);
2187 goto out_unlock;
2188 }
64e7c440 2189 }
f6180773
SR
2190 out_unlock:
2191 mutex_unlock(&ftrace_cmd_mutex);
64e7c440 2192
f6180773 2193 return ret;
64e7c440
SR
2194}
2195
e309b41d 2196static ssize_t
41c52c0d
SR
2197ftrace_regex_write(struct file *file, const char __user *ubuf,
2198 size_t cnt, loff_t *ppos, int enable)
5072c59f
SR
2199{
2200 struct ftrace_iterator *iter;
689fd8b6 2201 struct trace_parser *parser;
2202 ssize_t ret, read;
5072c59f 2203
4ba7978e 2204 if (!cnt)
5072c59f
SR
2205 return 0;
2206
41c52c0d 2207 mutex_lock(&ftrace_regex_lock);
5072c59f
SR
2208
2209 if (file->f_mode & FMODE_READ) {
2210 struct seq_file *m = file->private_data;
2211 iter = m->private;
2212 } else
2213 iter = file->private_data;
2214
689fd8b6 2215 parser = &iter->parser;
2216 read = trace_get_user(parser, ubuf, cnt, ppos);
5072c59f 2217
4ba7978e 2218 if (read >= 0 && trace_parser_loaded(parser) &&
689fd8b6 2219 !trace_parser_cont(parser)) {
2220 ret = ftrace_process_regex(parser->buffer,
2221 parser->idx, enable);
313254a9 2222 trace_parser_clear(parser);
5072c59f 2223 if (ret)
ed146b25 2224 goto out_unlock;
eda1e328 2225 }
5072c59f 2226
5072c59f 2227 ret = read;
ed146b25 2228out_unlock:
689fd8b6 2229 mutex_unlock(&ftrace_regex_lock);
ed146b25 2230
5072c59f
SR
2231 return ret;
2232}
2233
41c52c0d
SR
2234static ssize_t
2235ftrace_filter_write(struct file *file, const char __user *ubuf,
2236 size_t cnt, loff_t *ppos)
2237{
2238 return ftrace_regex_write(file, ubuf, cnt, ppos, 1);
2239}
2240
2241static ssize_t
2242ftrace_notrace_write(struct file *file, const char __user *ubuf,
2243 size_t cnt, loff_t *ppos)
2244{
2245 return ftrace_regex_write(file, ubuf, cnt, ppos, 0);
2246}
2247
2248static void
2249ftrace_set_regex(unsigned char *buf, int len, int reset, int enable)
2250{
2251 if (unlikely(ftrace_disabled))
2252 return;
2253
2254 mutex_lock(&ftrace_regex_lock);
2255 if (reset)
2256 ftrace_filter_reset(enable);
2257 if (buf)
7f24b31b 2258 ftrace_match_records(buf, len, enable);
41c52c0d
SR
2259 mutex_unlock(&ftrace_regex_lock);
2260}
2261
77a2b37d
SR
2262/**
2263 * ftrace_set_filter - set a function to filter on in ftrace
2264 * @buf - the string that holds the function filter text.
2265 * @len - the length of the string.
2266 * @reset - non zero to reset all filters before applying this filter.
2267 *
2268 * Filters denote which functions should be enabled when tracing is enabled.
2269 * If @buf is NULL and reset is set, all functions will be enabled for tracing.
2270 */
e309b41d 2271void ftrace_set_filter(unsigned char *buf, int len, int reset)
77a2b37d 2272{
41c52c0d
SR
2273 ftrace_set_regex(buf, len, reset, 1);
2274}
4eebcc81 2275
41c52c0d
SR
2276/**
2277 * ftrace_set_notrace - set a function to not trace in ftrace
2278 * @buf - the string that holds the function notrace text.
2279 * @len - the length of the string.
2280 * @reset - non zero to reset all filters before applying this filter.
2281 *
2282 * Notrace Filters denote which functions should not be enabled when tracing
2283 * is enabled. If @buf is NULL and reset is set, all functions will be enabled
2284 * for tracing.
2285 */
2286void ftrace_set_notrace(unsigned char *buf, int len, int reset)
2287{
2288 ftrace_set_regex(buf, len, reset, 0);
77a2b37d
SR
2289}
2290
2af15d6a
SR
2291/*
2292 * command line interface to allow users to set filters on boot up.
2293 */
2294#define FTRACE_FILTER_SIZE COMMAND_LINE_SIZE
2295static char ftrace_notrace_buf[FTRACE_FILTER_SIZE] __initdata;
2296static char ftrace_filter_buf[FTRACE_FILTER_SIZE] __initdata;
2297
2298static int __init set_ftrace_notrace(char *str)
2299{
2300 strncpy(ftrace_notrace_buf, str, FTRACE_FILTER_SIZE);
2301 return 1;
2302}
2303__setup("ftrace_notrace=", set_ftrace_notrace);
2304
2305static int __init set_ftrace_filter(char *str)
2306{
2307 strncpy(ftrace_filter_buf, str, FTRACE_FILTER_SIZE);
2308 return 1;
2309}
2310__setup("ftrace_filter=", set_ftrace_filter);
2311
369bc18f 2312#ifdef CONFIG_FUNCTION_GRAPH_TRACER
f6060f46 2313static char ftrace_graph_buf[FTRACE_FILTER_SIZE] __initdata;
801c29fd
SR
2314static int ftrace_set_func(unsigned long *array, int *idx, char *buffer);
2315
369bc18f
SA
2316static int __init set_graph_function(char *str)
2317{
06f43d66 2318 strlcpy(ftrace_graph_buf, str, FTRACE_FILTER_SIZE);
369bc18f
SA
2319 return 1;
2320}
2321__setup("ftrace_graph_filter=", set_graph_function);
2322
2323static void __init set_ftrace_early_graph(char *buf)
2324{
2325 int ret;
2326 char *func;
2327
2328 while (buf) {
2329 func = strsep(&buf, ",");
2330 /* we allow only one expression at a time */
2331 ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
2332 func);
2333 if (ret)
2334 printk(KERN_DEBUG "ftrace: function %s not "
2335 "traceable\n", func);
2336 }
2337}
2338#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2339
2af15d6a
SR
2340static void __init set_ftrace_early_filter(char *buf, int enable)
2341{
2342 char *func;
2343
2344 while (buf) {
2345 func = strsep(&buf, ",");
2346 ftrace_set_regex(func, strlen(func), 0, enable);
2347 }
2348}
2349
2350static void __init set_ftrace_early_filters(void)
2351{
2352 if (ftrace_filter_buf[0])
2353 set_ftrace_early_filter(ftrace_filter_buf, 1);
2354 if (ftrace_notrace_buf[0])
2355 set_ftrace_early_filter(ftrace_notrace_buf, 0);
369bc18f
SA
2356#ifdef CONFIG_FUNCTION_GRAPH_TRACER
2357 if (ftrace_graph_buf[0])
2358 set_ftrace_early_graph(ftrace_graph_buf);
2359#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2af15d6a
SR
2360}
2361
e309b41d 2362static int
41c52c0d 2363ftrace_regex_release(struct inode *inode, struct file *file, int enable)
5072c59f
SR
2364{
2365 struct seq_file *m = (struct seq_file *)file->private_data;
2366 struct ftrace_iterator *iter;
689fd8b6 2367 struct trace_parser *parser;
5072c59f 2368
41c52c0d 2369 mutex_lock(&ftrace_regex_lock);
5072c59f
SR
2370 if (file->f_mode & FMODE_READ) {
2371 iter = m->private;
2372
2373 seq_release(inode, file);
2374 } else
2375 iter = file->private_data;
2376
689fd8b6 2377 parser = &iter->parser;
2378 if (trace_parser_loaded(parser)) {
2379 parser->buffer[parser->idx] = 0;
2380 ftrace_match_records(parser->buffer, parser->idx, enable);
5072c59f
SR
2381 }
2382
e6ea44e9 2383 mutex_lock(&ftrace_lock);
ee02a2e5 2384 if (ftrace_start_up && ftrace_enabled)
5072c59f 2385 ftrace_run_update_code(FTRACE_ENABLE_CALLS);
e6ea44e9 2386 mutex_unlock(&ftrace_lock);
5072c59f 2387
689fd8b6 2388 trace_parser_put(parser);
5072c59f 2389 kfree(iter);
689fd8b6 2390
41c52c0d 2391 mutex_unlock(&ftrace_regex_lock);
5072c59f
SR
2392 return 0;
2393}
2394
41c52c0d
SR
2395static int
2396ftrace_filter_release(struct inode *inode, struct file *file)
2397{
2398 return ftrace_regex_release(inode, file, 1);
2399}
2400
2401static int
2402ftrace_notrace_release(struct inode *inode, struct file *file)
2403{
2404 return ftrace_regex_release(inode, file, 0);
2405}
2406
5e2336a0 2407static const struct file_operations ftrace_avail_fops = {
5072c59f
SR
2408 .open = ftrace_avail_open,
2409 .read = seq_read,
2410 .llseek = seq_lseek,
3be04b47 2411 .release = seq_release_private,
5072c59f
SR
2412};
2413
5e2336a0 2414static const struct file_operations ftrace_failures_fops = {
eb9a7bf0
AS
2415 .open = ftrace_failures_open,
2416 .read = seq_read,
2417 .llseek = seq_lseek,
3be04b47 2418 .release = seq_release_private,
eb9a7bf0
AS
2419};
2420
5e2336a0 2421static const struct file_operations ftrace_filter_fops = {
5072c59f 2422 .open = ftrace_filter_open,
850a80cf 2423 .read = seq_read,
5072c59f 2424 .write = ftrace_filter_write,
9c55cb12 2425 .llseek = no_llseek,
5072c59f
SR
2426 .release = ftrace_filter_release,
2427};
2428
5e2336a0 2429static const struct file_operations ftrace_notrace_fops = {
41c52c0d 2430 .open = ftrace_notrace_open,
850a80cf 2431 .read = seq_read,
41c52c0d
SR
2432 .write = ftrace_notrace_write,
2433 .llseek = ftrace_regex_lseek,
2434 .release = ftrace_notrace_release,
2435};
2436
ea4e2bc4
SR
2437#ifdef CONFIG_FUNCTION_GRAPH_TRACER
2438
2439static DEFINE_MUTEX(graph_lock);
2440
2441int ftrace_graph_count;
c7c6b1fe 2442int ftrace_graph_filter_enabled;
ea4e2bc4
SR
2443unsigned long ftrace_graph_funcs[FTRACE_GRAPH_MAX_FUNCS] __read_mostly;
2444
2445static void *
85951842 2446__g_next(struct seq_file *m, loff_t *pos)
ea4e2bc4 2447{
85951842 2448 if (*pos >= ftrace_graph_count)
ea4e2bc4 2449 return NULL;
a4ec5e0c 2450 return &ftrace_graph_funcs[*pos];
85951842 2451}
ea4e2bc4 2452
85951842
LZ
2453static void *
2454g_next(struct seq_file *m, void *v, loff_t *pos)
2455{
2456 (*pos)++;
2457 return __g_next(m, pos);
ea4e2bc4
SR
2458}
2459
2460static void *g_start(struct seq_file *m, loff_t *pos)
2461{
ea4e2bc4
SR
2462 mutex_lock(&graph_lock);
2463
f9349a8f 2464 /* Nothing, tell g_show to print all functions are enabled */
c7c6b1fe 2465 if (!ftrace_graph_filter_enabled && !*pos)
f9349a8f
FW
2466 return (void *)1;
2467
85951842 2468 return __g_next(m, pos);
ea4e2bc4
SR
2469}
2470
2471static void g_stop(struct seq_file *m, void *p)
2472{
2473 mutex_unlock(&graph_lock);
2474}
2475
2476static int g_show(struct seq_file *m, void *v)
2477{
2478 unsigned long *ptr = v;
ea4e2bc4
SR
2479
2480 if (!ptr)
2481 return 0;
2482
f9349a8f
FW
2483 if (ptr == (unsigned long *)1) {
2484 seq_printf(m, "#### all functions enabled ####\n");
2485 return 0;
2486 }
2487
b375a11a 2488 seq_printf(m, "%ps\n", (void *)*ptr);
ea4e2bc4
SR
2489
2490 return 0;
2491}
2492
88e9d34c 2493static const struct seq_operations ftrace_graph_seq_ops = {
ea4e2bc4
SR
2494 .start = g_start,
2495 .next = g_next,
2496 .stop = g_stop,
2497 .show = g_show,
2498};
2499
2500static int
2501ftrace_graph_open(struct inode *inode, struct file *file)
2502{
2503 int ret = 0;
2504
2505 if (unlikely(ftrace_disabled))
2506 return -ENODEV;
2507
2508 mutex_lock(&graph_lock);
2509 if ((file->f_mode & FMODE_WRITE) &&
8650ae32 2510 (file->f_flags & O_TRUNC)) {
c7c6b1fe 2511 ftrace_graph_filter_enabled = 0;
ea4e2bc4
SR
2512 ftrace_graph_count = 0;
2513 memset(ftrace_graph_funcs, 0, sizeof(ftrace_graph_funcs));
2514 }
a4ec5e0c 2515 mutex_unlock(&graph_lock);
ea4e2bc4 2516
a4ec5e0c 2517 if (file->f_mode & FMODE_READ)
ea4e2bc4 2518 ret = seq_open(file, &ftrace_graph_seq_ops);
ea4e2bc4
SR
2519
2520 return ret;
2521}
2522
87827111
LZ
2523static int
2524ftrace_graph_release(struct inode *inode, struct file *file)
2525{
2526 if (file->f_mode & FMODE_READ)
2527 seq_release(inode, file);
2528 return 0;
2529}
2530
ea4e2bc4 2531static int
f9349a8f 2532ftrace_set_func(unsigned long *array, int *idx, char *buffer)
ea4e2bc4 2533{
ea4e2bc4
SR
2534 struct dyn_ftrace *rec;
2535 struct ftrace_page *pg;
f9349a8f 2536 int search_len;
c7c6b1fe 2537 int fail = 1;
f9349a8f
FW
2538 int type, not;
2539 char *search;
2540 bool exists;
2541 int i;
ea4e2bc4
SR
2542
2543 if (ftrace_disabled)
2544 return -ENODEV;
2545
f9349a8f 2546 /* decode regex */
3f6fe06d 2547 type = filter_parse_regex(buffer, strlen(buffer), &search, &not);
c7c6b1fe
LZ
2548 if (!not && *idx >= FTRACE_GRAPH_MAX_FUNCS)
2549 return -EBUSY;
f9349a8f
FW
2550
2551 search_len = strlen(search);
2552
52baf119 2553 mutex_lock(&ftrace_lock);
265c831c
SR
2554 do_for_each_ftrace_rec(pg, rec) {
2555
2556 if (rec->flags & (FTRACE_FL_FAILED | FTRACE_FL_FREE))
2557 continue;
2558
f9349a8f 2559 if (ftrace_match_record(rec, search, search_len, type)) {
c7c6b1fe 2560 /* if it is in the array */
f9349a8f 2561 exists = false;
c7c6b1fe 2562 for (i = 0; i < *idx; i++) {
f9349a8f
FW
2563 if (array[i] == rec->ip) {
2564 exists = true;
265c831c
SR
2565 break;
2566 }
c7c6b1fe
LZ
2567 }
2568
2569 if (!not) {
2570 fail = 0;
2571 if (!exists) {
2572 array[(*idx)++] = rec->ip;
2573 if (*idx >= FTRACE_GRAPH_MAX_FUNCS)
2574 goto out;
2575 }
2576 } else {
2577 if (exists) {
2578 array[i] = array[--(*idx)];
2579 array[*idx] = 0;
2580 fail = 0;
2581 }
2582 }
ea4e2bc4 2583 }
265c831c 2584 } while_for_each_ftrace_rec();
c7c6b1fe 2585out:
52baf119 2586 mutex_unlock(&ftrace_lock);
ea4e2bc4 2587
c7c6b1fe
LZ
2588 if (fail)
2589 return -EINVAL;
2590
2591 ftrace_graph_filter_enabled = 1;
2592 return 0;
ea4e2bc4
SR
2593}
2594
2595static ssize_t
2596ftrace_graph_write(struct file *file, const char __user *ubuf,
2597 size_t cnt, loff_t *ppos)
2598{
689fd8b6 2599 struct trace_parser parser;
4ba7978e 2600 ssize_t read, ret;
ea4e2bc4 2601
c7c6b1fe 2602 if (!cnt)
ea4e2bc4
SR
2603 return 0;
2604
2605 mutex_lock(&graph_lock);
2606
689fd8b6 2607 if (trace_parser_get_init(&parser, FTRACE_BUFF_MAX)) {
2608 ret = -ENOMEM;
1eb90f13 2609 goto out_unlock;
ea4e2bc4
SR
2610 }
2611
689fd8b6 2612 read = trace_get_user(&parser, ubuf, cnt, ppos);
ea4e2bc4 2613
4ba7978e 2614 if (read >= 0 && trace_parser_loaded((&parser))) {
689fd8b6 2615 parser.buffer[parser.idx] = 0;
2616
2617 /* we allow only one expression at a time */
a4ec5e0c 2618 ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
689fd8b6 2619 parser.buffer);
ea4e2bc4 2620 if (ret)
1eb90f13 2621 goto out_free;
ea4e2bc4 2622 }
ea4e2bc4
SR
2623
2624 ret = read;
1eb90f13
LZ
2625
2626out_free:
689fd8b6 2627 trace_parser_put(&parser);
1eb90f13 2628out_unlock:
ea4e2bc4
SR
2629 mutex_unlock(&graph_lock);
2630
2631 return ret;
2632}
2633
2634static const struct file_operations ftrace_graph_fops = {
87827111
LZ
2635 .open = ftrace_graph_open,
2636 .read = seq_read,
2637 .write = ftrace_graph_write,
2638 .release = ftrace_graph_release,
ea4e2bc4
SR
2639};
2640#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2641
df4fc315 2642static __init int ftrace_init_dyn_debugfs(struct dentry *d_tracer)
5072c59f 2643{
5072c59f 2644
5452af66
FW
2645 trace_create_file("available_filter_functions", 0444,
2646 d_tracer, NULL, &ftrace_avail_fops);
5072c59f 2647
5452af66
FW
2648 trace_create_file("failures", 0444,
2649 d_tracer, NULL, &ftrace_failures_fops);
eb9a7bf0 2650
5452af66
FW
2651 trace_create_file("set_ftrace_filter", 0644, d_tracer,
2652 NULL, &ftrace_filter_fops);
41c52c0d 2653
5452af66 2654 trace_create_file("set_ftrace_notrace", 0644, d_tracer,
41c52c0d 2655 NULL, &ftrace_notrace_fops);
ad90c0e3 2656
ea4e2bc4 2657#ifdef CONFIG_FUNCTION_GRAPH_TRACER
5452af66 2658 trace_create_file("set_graph_function", 0444, d_tracer,
ea4e2bc4
SR
2659 NULL,
2660 &ftrace_graph_fops);
ea4e2bc4
SR
2661#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2662
5072c59f
SR
2663 return 0;
2664}
2665
5cb084bb 2666static int ftrace_process_locs(struct module *mod,
31e88909 2667 unsigned long *start,
68bf21aa
SR
2668 unsigned long *end)
2669{
2670 unsigned long *p;
2671 unsigned long addr;
2672 unsigned long flags;
2673
e6ea44e9 2674 mutex_lock(&ftrace_lock);
68bf21aa
SR
2675 p = start;
2676 while (p < end) {
2677 addr = ftrace_call_adjust(*p++);
20e5227e
SR
2678 /*
2679 * Some architecture linkers will pad between
2680 * the different mcount_loc sections of different
2681 * object files to satisfy alignments.
2682 * Skip any NULL pointers.
2683 */
2684 if (!addr)
2685 continue;
68bf21aa 2686 ftrace_record_ip(addr);
68bf21aa
SR
2687 }
2688
08f5ac90 2689 /* disable interrupts to prevent kstop machine */
68bf21aa 2690 local_irq_save(flags);
31e88909 2691 ftrace_update_code(mod);
68bf21aa 2692 local_irq_restore(flags);
e6ea44e9 2693 mutex_unlock(&ftrace_lock);
68bf21aa
SR
2694
2695 return 0;
2696}
2697
93eb677d 2698#ifdef CONFIG_MODULES
e7247a15 2699void ftrace_release_mod(struct module *mod)
93eb677d
SR
2700{
2701 struct dyn_ftrace *rec;
2702 struct ftrace_page *pg;
93eb677d 2703
e7247a15 2704 if (ftrace_disabled)
93eb677d
SR
2705 return;
2706
2707 mutex_lock(&ftrace_lock);
2708 do_for_each_ftrace_rec(pg, rec) {
e7247a15 2709 if (within_module_core(rec->ip, mod)) {
93eb677d
SR
2710 /*
2711 * rec->ip is changed in ftrace_free_rec()
2712 * It should not between s and e if record was freed.
2713 */
2714 FTRACE_WARN_ON(rec->flags & FTRACE_FL_FREE);
2715 ftrace_free_rec(rec);
2716 }
2717 } while_for_each_ftrace_rec();
2718 mutex_unlock(&ftrace_lock);
2719}
2720
2721static void ftrace_init_module(struct module *mod,
2722 unsigned long *start, unsigned long *end)
90d595fe 2723{
00fd61ae 2724 if (ftrace_disabled || start == end)
fed1939c 2725 return;
5cb084bb 2726 ftrace_process_locs(mod, start, end);
90d595fe
SR
2727}
2728
93eb677d
SR
2729static int ftrace_module_notify(struct notifier_block *self,
2730 unsigned long val, void *data)
2731{
2732 struct module *mod = data;
2733
2734 switch (val) {
2735 case MODULE_STATE_COMING:
2736 ftrace_init_module(mod, mod->ftrace_callsites,
2737 mod->ftrace_callsites +
2738 mod->num_ftrace_callsites);
2739 break;
2740 case MODULE_STATE_GOING:
e7247a15 2741 ftrace_release_mod(mod);
93eb677d
SR
2742 break;
2743 }
2744
2745 return 0;
2746}
2747#else
2748static int ftrace_module_notify(struct notifier_block *self,
2749 unsigned long val, void *data)
2750{
2751 return 0;
2752}
2753#endif /* CONFIG_MODULES */
2754
2755struct notifier_block ftrace_module_nb = {
2756 .notifier_call = ftrace_module_notify,
2757 .priority = 0,
2758};
2759
68bf21aa
SR
2760extern unsigned long __start_mcount_loc[];
2761extern unsigned long __stop_mcount_loc[];
2762
2763void __init ftrace_init(void)
2764{
2765 unsigned long count, addr, flags;
2766 int ret;
2767
2768 /* Keep the ftrace pointer to the stub */
2769 addr = (unsigned long)ftrace_stub;
2770
2771 local_irq_save(flags);
2772 ftrace_dyn_arch_init(&addr);
2773 local_irq_restore(flags);
2774
2775 /* ftrace_dyn_arch_init places the return code in addr */
2776 if (addr)
2777 goto failed;
2778
2779 count = __stop_mcount_loc - __start_mcount_loc;
2780
2781 ret = ftrace_dyn_table_alloc(count);
2782 if (ret)
2783 goto failed;
2784
2785 last_ftrace_enabled = ftrace_enabled = 1;
2786
5cb084bb 2787 ret = ftrace_process_locs(NULL,
31e88909 2788 __start_mcount_loc,
68bf21aa
SR
2789 __stop_mcount_loc);
2790
93eb677d 2791 ret = register_module_notifier(&ftrace_module_nb);
24ed0c4b 2792 if (ret)
93eb677d
SR
2793 pr_warning("Failed to register trace ftrace module notifier\n");
2794
2af15d6a
SR
2795 set_ftrace_early_filters();
2796
68bf21aa
SR
2797 return;
2798 failed:
2799 ftrace_disabled = 1;
2800}
68bf21aa 2801
3d083395 2802#else
0b6e4d56
FW
2803
2804static int __init ftrace_nodyn_init(void)
2805{
2806 ftrace_enabled = 1;
2807 return 0;
2808}
2809device_initcall(ftrace_nodyn_init);
2810
df4fc315
SR
2811static inline int ftrace_init_dyn_debugfs(struct dentry *d_tracer) { return 0; }
2812static inline void ftrace_startup_enable(int command) { }
5a45cfe1
SR
2813/* Keep as macros so we do not need to define the commands */
2814# define ftrace_startup(command) do { } while (0)
2815# define ftrace_shutdown(command) do { } while (0)
c7aafc54
IM
2816# define ftrace_startup_sysctl() do { } while (0)
2817# define ftrace_shutdown_sysctl() do { } while (0)
3d083395
SR
2818#endif /* CONFIG_DYNAMIC_FTRACE */
2819
e32d8956 2820static void clear_ftrace_swapper(void)
978f3a45
SR
2821{
2822 struct task_struct *p;
e32d8956 2823 int cpu;
978f3a45 2824
e32d8956
SR
2825 get_online_cpus();
2826 for_each_online_cpu(cpu) {
2827 p = idle_task(cpu);
978f3a45 2828 clear_tsk_trace_trace(p);
e32d8956
SR
2829 }
2830 put_online_cpus();
2831}
978f3a45 2832
e32d8956
SR
2833static void set_ftrace_swapper(void)
2834{
2835 struct task_struct *p;
2836 int cpu;
2837
2838 get_online_cpus();
2839 for_each_online_cpu(cpu) {
2840 p = idle_task(cpu);
2841 set_tsk_trace_trace(p);
2842 }
2843 put_online_cpus();
978f3a45
SR
2844}
2845
e32d8956
SR
2846static void clear_ftrace_pid(struct pid *pid)
2847{
2848 struct task_struct *p;
2849
229c4ef8 2850 rcu_read_lock();
e32d8956
SR
2851 do_each_pid_task(pid, PIDTYPE_PID, p) {
2852 clear_tsk_trace_trace(p);
2853 } while_each_pid_task(pid, PIDTYPE_PID, p);
229c4ef8
ON
2854 rcu_read_unlock();
2855
e32d8956
SR
2856 put_pid(pid);
2857}
2858
2859static void set_ftrace_pid(struct pid *pid)
978f3a45
SR
2860{
2861 struct task_struct *p;
2862
229c4ef8 2863 rcu_read_lock();
978f3a45
SR
2864 do_each_pid_task(pid, PIDTYPE_PID, p) {
2865 set_tsk_trace_trace(p);
2866 } while_each_pid_task(pid, PIDTYPE_PID, p);
229c4ef8 2867 rcu_read_unlock();
978f3a45
SR
2868}
2869
756d17ee 2870static void clear_ftrace_pid_task(struct pid *pid)
e32d8956 2871{
756d17ee 2872 if (pid == ftrace_swapper_pid)
e32d8956
SR
2873 clear_ftrace_swapper();
2874 else
756d17ee 2875 clear_ftrace_pid(pid);
e32d8956
SR
2876}
2877
2878static void set_ftrace_pid_task(struct pid *pid)
2879{
2880 if (pid == ftrace_swapper_pid)
2881 set_ftrace_swapper();
2882 else
2883 set_ftrace_pid(pid);
2884}
2885
756d17ee 2886static int ftrace_pid_add(int p)
df4fc315 2887{
978f3a45 2888 struct pid *pid;
756d17ee 2889 struct ftrace_pid *fpid;
2890 int ret = -EINVAL;
df4fc315 2891
756d17ee 2892 mutex_lock(&ftrace_lock);
df4fc315 2893
756d17ee 2894 if (!p)
2895 pid = ftrace_swapper_pid;
2896 else
2897 pid = find_get_pid(p);
df4fc315 2898
756d17ee 2899 if (!pid)
2900 goto out;
df4fc315 2901
756d17ee 2902 ret = 0;
df4fc315 2903
756d17ee 2904 list_for_each_entry(fpid, &ftrace_pids, list)
2905 if (fpid->pid == pid)
2906 goto out_put;
978f3a45 2907
756d17ee 2908 ret = -ENOMEM;
df4fc315 2909
756d17ee 2910 fpid = kmalloc(sizeof(*fpid), GFP_KERNEL);
2911 if (!fpid)
2912 goto out_put;
df4fc315 2913
756d17ee 2914 list_add(&fpid->list, &ftrace_pids);
2915 fpid->pid = pid;
0ef8cde5 2916
756d17ee 2917 set_ftrace_pid_task(pid);
978f3a45 2918
756d17ee 2919 ftrace_update_pid_func();
2920 ftrace_startup_enable(0);
2921
2922 mutex_unlock(&ftrace_lock);
2923 return 0;
2924
2925out_put:
2926 if (pid != ftrace_swapper_pid)
2927 put_pid(pid);
978f3a45 2928
756d17ee 2929out:
2930 mutex_unlock(&ftrace_lock);
2931 return ret;
2932}
2933
2934static void ftrace_pid_reset(void)
2935{
2936 struct ftrace_pid *fpid, *safe;
978f3a45 2937
756d17ee 2938 mutex_lock(&ftrace_lock);
2939 list_for_each_entry_safe(fpid, safe, &ftrace_pids, list) {
2940 struct pid *pid = fpid->pid;
2941
2942 clear_ftrace_pid_task(pid);
2943
2944 list_del(&fpid->list);
2945 kfree(fpid);
df4fc315
SR
2946 }
2947
df4fc315
SR
2948 ftrace_update_pid_func();
2949 ftrace_startup_enable(0);
2950
e6ea44e9 2951 mutex_unlock(&ftrace_lock);
756d17ee 2952}
df4fc315 2953
756d17ee 2954static void *fpid_start(struct seq_file *m, loff_t *pos)
2955{
2956 mutex_lock(&ftrace_lock);
2957
2958 if (list_empty(&ftrace_pids) && (!*pos))
2959 return (void *) 1;
2960
2961 return seq_list_start(&ftrace_pids, *pos);
2962}
2963
2964static void *fpid_next(struct seq_file *m, void *v, loff_t *pos)
2965{
2966 if (v == (void *)1)
2967 return NULL;
2968
2969 return seq_list_next(v, &ftrace_pids, pos);
2970}
2971
2972static void fpid_stop(struct seq_file *m, void *p)
2973{
2974 mutex_unlock(&ftrace_lock);
2975}
2976
2977static int fpid_show(struct seq_file *m, void *v)
2978{
2979 const struct ftrace_pid *fpid = list_entry(v, struct ftrace_pid, list);
2980
2981 if (v == (void *)1) {
2982 seq_printf(m, "no pid\n");
2983 return 0;
2984 }
2985
2986 if (fpid->pid == ftrace_swapper_pid)
2987 seq_printf(m, "swapper tasks\n");
2988 else
2989 seq_printf(m, "%u\n", pid_vnr(fpid->pid));
2990
2991 return 0;
2992}
2993
2994static const struct seq_operations ftrace_pid_sops = {
2995 .start = fpid_start,
2996 .next = fpid_next,
2997 .stop = fpid_stop,
2998 .show = fpid_show,
2999};
3000
3001static int
3002ftrace_pid_open(struct inode *inode, struct file *file)
3003{
3004 int ret = 0;
3005
3006 if ((file->f_mode & FMODE_WRITE) &&
3007 (file->f_flags & O_TRUNC))
3008 ftrace_pid_reset();
3009
3010 if (file->f_mode & FMODE_READ)
3011 ret = seq_open(file, &ftrace_pid_sops);
3012
3013 return ret;
3014}
3015
df4fc315
SR
3016static ssize_t
3017ftrace_pid_write(struct file *filp, const char __user *ubuf,
3018 size_t cnt, loff_t *ppos)
3019{
457dc928 3020 char buf[64], *tmp;
df4fc315
SR
3021 long val;
3022 int ret;
3023
3024 if (cnt >= sizeof(buf))
3025 return -EINVAL;
3026
3027 if (copy_from_user(&buf, ubuf, cnt))
3028 return -EFAULT;
3029
3030 buf[cnt] = 0;
3031
756d17ee 3032 /*
3033 * Allow "echo > set_ftrace_pid" or "echo -n '' > set_ftrace_pid"
3034 * to clean the filter quietly.
3035 */
457dc928
IM
3036 tmp = strstrip(buf);
3037 if (strlen(tmp) == 0)
756d17ee 3038 return 1;
3039
457dc928 3040 ret = strict_strtol(tmp, 10, &val);
df4fc315
SR
3041 if (ret < 0)
3042 return ret;
3043
756d17ee 3044 ret = ftrace_pid_add(val);
df4fc315 3045
756d17ee 3046 return ret ? ret : cnt;
3047}
df4fc315 3048
756d17ee 3049static int
3050ftrace_pid_release(struct inode *inode, struct file *file)
3051{
3052 if (file->f_mode & FMODE_READ)
3053 seq_release(inode, file);
df4fc315 3054
756d17ee 3055 return 0;
df4fc315
SR
3056}
3057
5e2336a0 3058static const struct file_operations ftrace_pid_fops = {
756d17ee 3059 .open = ftrace_pid_open,
3060 .write = ftrace_pid_write,
3061 .read = seq_read,
3062 .llseek = seq_lseek,
3063 .release = ftrace_pid_release,
df4fc315
SR
3064};
3065
3066static __init int ftrace_init_debugfs(void)
3067{
3068 struct dentry *d_tracer;
df4fc315
SR
3069
3070 d_tracer = tracing_init_dentry();
3071 if (!d_tracer)
3072 return 0;
3073
3074 ftrace_init_dyn_debugfs(d_tracer);
3075
5452af66
FW
3076 trace_create_file("set_ftrace_pid", 0644, d_tracer,
3077 NULL, &ftrace_pid_fops);
493762fc
SR
3078
3079 ftrace_profile_debugfs(d_tracer);
3080
df4fc315
SR
3081 return 0;
3082}
df4fc315
SR
3083fs_initcall(ftrace_init_debugfs);
3084
a2bb6a3d 3085/**
81adbdc0 3086 * ftrace_kill - kill ftrace
a2bb6a3d
SR
3087 *
3088 * This function should be used by panic code. It stops ftrace
3089 * but in a not so nice way. If you need to simply kill ftrace
3090 * from a non-atomic section, use ftrace_kill.
3091 */
81adbdc0 3092void ftrace_kill(void)
a2bb6a3d
SR
3093{
3094 ftrace_disabled = 1;
3095 ftrace_enabled = 0;
a2bb6a3d
SR
3096 clear_ftrace_function();
3097}
3098
16444a8a 3099/**
3d083395
SR
3100 * register_ftrace_function - register a function for profiling
3101 * @ops - ops structure that holds the function for profiling.
16444a8a 3102 *
3d083395
SR
3103 * Register a function to be called by all functions in the
3104 * kernel.
3105 *
3106 * Note: @ops->func and all the functions it calls must be labeled
3107 * with "notrace", otherwise it will go into a
3108 * recursive loop.
16444a8a 3109 */
3d083395 3110int register_ftrace_function(struct ftrace_ops *ops)
16444a8a 3111{
b0fc494f
SR
3112 int ret;
3113
4eebcc81
SR
3114 if (unlikely(ftrace_disabled))
3115 return -1;
3116
e6ea44e9 3117 mutex_lock(&ftrace_lock);
e7d3737e 3118
b0fc494f 3119 ret = __register_ftrace_function(ops);
5a45cfe1 3120 ftrace_startup(0);
b0fc494f 3121
e6ea44e9 3122 mutex_unlock(&ftrace_lock);
b0fc494f 3123 return ret;
3d083395
SR
3124}
3125
3126/**
32632920 3127 * unregister_ftrace_function - unregister a function for profiling.
3d083395
SR
3128 * @ops - ops structure that holds the function to unregister
3129 *
3130 * Unregister a function that was added to be called by ftrace profiling.
3131 */
3132int unregister_ftrace_function(struct ftrace_ops *ops)
3133{
3134 int ret;
3135
e6ea44e9 3136 mutex_lock(&ftrace_lock);
3d083395 3137 ret = __unregister_ftrace_function(ops);
5a45cfe1 3138 ftrace_shutdown(0);
e6ea44e9 3139 mutex_unlock(&ftrace_lock);
b0fc494f
SR
3140
3141 return ret;
3142}
3143
e309b41d 3144int
b0fc494f 3145ftrace_enable_sysctl(struct ctl_table *table, int write,
8d65af78 3146 void __user *buffer, size_t *lenp,
b0fc494f
SR
3147 loff_t *ppos)
3148{
3149 int ret;
3150
4eebcc81
SR
3151 if (unlikely(ftrace_disabled))
3152 return -ENODEV;
3153
e6ea44e9 3154 mutex_lock(&ftrace_lock);
b0fc494f 3155
8d65af78 3156 ret = proc_dointvec(table, write, buffer, lenp, ppos);
b0fc494f 3157
a32c7765 3158 if (ret || !write || (last_ftrace_enabled == !!ftrace_enabled))
b0fc494f
SR
3159 goto out;
3160
a32c7765 3161 last_ftrace_enabled = !!ftrace_enabled;
b0fc494f
SR
3162
3163 if (ftrace_enabled) {
3164
3165 ftrace_startup_sysctl();
3166
3167 /* we are starting ftrace again */
3168 if (ftrace_list != &ftrace_list_end) {
3169 if (ftrace_list->next == &ftrace_list_end)
3170 ftrace_trace_function = ftrace_list->func;
3171 else
3172 ftrace_trace_function = ftrace_list_func;
3173 }
3174
3175 } else {
3176 /* stopping ftrace calls (just send to ftrace_stub) */
3177 ftrace_trace_function = ftrace_stub;
3178
3179 ftrace_shutdown_sysctl();
3180 }
3181
3182 out:
e6ea44e9 3183 mutex_unlock(&ftrace_lock);
3d083395 3184 return ret;
16444a8a 3185}
f17845e5 3186
fb52607a 3187#ifdef CONFIG_FUNCTION_GRAPH_TRACER
e7d3737e 3188
597af815 3189static int ftrace_graph_active;
4a2b8dda 3190static struct notifier_block ftrace_suspend_notifier;
e7d3737e 3191
e49dc19c
SR
3192int ftrace_graph_entry_stub(struct ftrace_graph_ent *trace)
3193{
3194 return 0;
3195}
3196
287b6e68
FW
3197/* The callbacks that hook a function */
3198trace_func_graph_ret_t ftrace_graph_return =
3199 (trace_func_graph_ret_t)ftrace_stub;
e49dc19c 3200trace_func_graph_ent_t ftrace_graph_entry = ftrace_graph_entry_stub;
f201ae23
FW
3201
3202/* Try to assign a return stack array on FTRACE_RETSTACK_ALLOC_SIZE tasks. */
3203static int alloc_retstack_tasklist(struct ftrace_ret_stack **ret_stack_list)
3204{
3205 int i;
3206 int ret = 0;
3207 unsigned long flags;
3208 int start = 0, end = FTRACE_RETSTACK_ALLOC_SIZE;
3209 struct task_struct *g, *t;
3210
3211 for (i = 0; i < FTRACE_RETSTACK_ALLOC_SIZE; i++) {
3212 ret_stack_list[i] = kmalloc(FTRACE_RETFUNC_DEPTH
3213 * sizeof(struct ftrace_ret_stack),
3214 GFP_KERNEL);
3215 if (!ret_stack_list[i]) {
3216 start = 0;
3217 end = i;
3218 ret = -ENOMEM;
3219 goto free;
3220 }
3221 }
3222
3223 read_lock_irqsave(&tasklist_lock, flags);
3224 do_each_thread(g, t) {
3225 if (start == end) {
3226 ret = -EAGAIN;
3227 goto unlock;
3228 }
3229
3230 if (t->ret_stack == NULL) {
380c4b14 3231 atomic_set(&t->tracing_graph_pause, 0);
f201ae23 3232 atomic_set(&t->trace_overrun, 0);
26c01624
SR
3233 t->curr_ret_stack = -1;
3234 /* Make sure the tasks see the -1 first: */
3235 smp_wmb();
3236 t->ret_stack = ret_stack_list[start++];
f201ae23
FW
3237 }
3238 } while_each_thread(g, t);
3239
3240unlock:
3241 read_unlock_irqrestore(&tasklist_lock, flags);
3242free:
3243 for (i = start; i < end; i++)
3244 kfree(ret_stack_list[i]);
3245 return ret;
3246}
3247
8aef2d28 3248static void
38516ab5
SR
3249ftrace_graph_probe_sched_switch(void *ignore,
3250 struct task_struct *prev, struct task_struct *next)
8aef2d28
SR
3251{
3252 unsigned long long timestamp;
3253 int index;
3254
be6f164a
SR
3255 /*
3256 * Does the user want to count the time a function was asleep.
3257 * If so, do not update the time stamps.
3258 */
3259 if (trace_flags & TRACE_ITER_SLEEP_TIME)
3260 return;
3261
8aef2d28
SR
3262 timestamp = trace_clock_local();
3263
3264 prev->ftrace_timestamp = timestamp;
3265
3266 /* only process tasks that we timestamped */
3267 if (!next->ftrace_timestamp)
3268 return;
3269
3270 /*
3271 * Update all the counters in next to make up for the
3272 * time next was sleeping.
3273 */
3274 timestamp -= next->ftrace_timestamp;
3275
3276 for (index = next->curr_ret_stack; index >= 0; index--)
3277 next->ret_stack[index].calltime += timestamp;
3278}
3279
f201ae23 3280/* Allocate a return stack for each task */
fb52607a 3281static int start_graph_tracing(void)
f201ae23
FW
3282{
3283 struct ftrace_ret_stack **ret_stack_list;
5b058bcd 3284 int ret, cpu;
f201ae23
FW
3285
3286 ret_stack_list = kmalloc(FTRACE_RETSTACK_ALLOC_SIZE *
3287 sizeof(struct ftrace_ret_stack *),
3288 GFP_KERNEL);
3289
3290 if (!ret_stack_list)
3291 return -ENOMEM;
3292
5b058bcd 3293 /* The cpu_boot init_task->ret_stack will never be freed */
179c498a
SR
3294 for_each_online_cpu(cpu) {
3295 if (!idle_task(cpu)->ret_stack)
3296 ftrace_graph_init_task(idle_task(cpu));
3297 }
5b058bcd 3298
f201ae23
FW
3299 do {
3300 ret = alloc_retstack_tasklist(ret_stack_list);
3301 } while (ret == -EAGAIN);
3302
8aef2d28 3303 if (!ret) {
38516ab5 3304 ret = register_trace_sched_switch(ftrace_graph_probe_sched_switch, NULL);
8aef2d28
SR
3305 if (ret)
3306 pr_info("ftrace_graph: Couldn't activate tracepoint"
3307 " probe to kernel_sched_switch\n");
3308 }
3309
f201ae23
FW
3310 kfree(ret_stack_list);
3311 return ret;
3312}
3313
4a2b8dda
FW
3314/*
3315 * Hibernation protection.
3316 * The state of the current task is too much unstable during
3317 * suspend/restore to disk. We want to protect against that.
3318 */
3319static int
3320ftrace_suspend_notifier_call(struct notifier_block *bl, unsigned long state,
3321 void *unused)
3322{
3323 switch (state) {
3324 case PM_HIBERNATION_PREPARE:
3325 pause_graph_tracing();
3326 break;
3327
3328 case PM_POST_HIBERNATION:
3329 unpause_graph_tracing();
3330 break;
3331 }
3332 return NOTIFY_DONE;
3333}
3334
287b6e68
FW
3335int register_ftrace_graph(trace_func_graph_ret_t retfunc,
3336 trace_func_graph_ent_t entryfunc)
15e6cb36 3337{
e7d3737e
FW
3338 int ret = 0;
3339
e6ea44e9 3340 mutex_lock(&ftrace_lock);
e7d3737e 3341
05ce5818 3342 /* we currently allow only one tracer registered at a time */
597af815 3343 if (ftrace_graph_active) {
05ce5818
SR
3344 ret = -EBUSY;
3345 goto out;
3346 }
3347
4a2b8dda
FW
3348 ftrace_suspend_notifier.notifier_call = ftrace_suspend_notifier_call;
3349 register_pm_notifier(&ftrace_suspend_notifier);
3350
597af815 3351 ftrace_graph_active++;
fb52607a 3352 ret = start_graph_tracing();
f201ae23 3353 if (ret) {
597af815 3354 ftrace_graph_active--;
f201ae23
FW
3355 goto out;
3356 }
e53a6319 3357
287b6e68
FW
3358 ftrace_graph_return = retfunc;
3359 ftrace_graph_entry = entryfunc;
e53a6319 3360
5a45cfe1 3361 ftrace_startup(FTRACE_START_FUNC_RET);
e7d3737e
FW
3362
3363out:
e6ea44e9 3364 mutex_unlock(&ftrace_lock);
e7d3737e 3365 return ret;
15e6cb36
FW
3366}
3367
fb52607a 3368void unregister_ftrace_graph(void)
15e6cb36 3369{
e6ea44e9 3370 mutex_lock(&ftrace_lock);
e7d3737e 3371
597af815 3372 if (unlikely(!ftrace_graph_active))
2aad1b76
SR
3373 goto out;
3374
597af815 3375 ftrace_graph_active--;
287b6e68 3376 ftrace_graph_return = (trace_func_graph_ret_t)ftrace_stub;
e49dc19c 3377 ftrace_graph_entry = ftrace_graph_entry_stub;
5a45cfe1 3378 ftrace_shutdown(FTRACE_STOP_FUNC_RET);
4a2b8dda 3379 unregister_pm_notifier(&ftrace_suspend_notifier);
38516ab5 3380 unregister_trace_sched_switch(ftrace_graph_probe_sched_switch, NULL);
e7d3737e 3381
2aad1b76 3382 out:
e6ea44e9 3383 mutex_unlock(&ftrace_lock);
15e6cb36 3384}
f201ae23
FW
3385
3386/* Allocate a return stack for newly created task */
fb52607a 3387void ftrace_graph_init_task(struct task_struct *t)
f201ae23 3388{
84047e36
SR
3389 /* Make sure we do not use the parent ret_stack */
3390 t->ret_stack = NULL;
ea14eb71 3391 t->curr_ret_stack = -1;
84047e36 3392
597af815 3393 if (ftrace_graph_active) {
82310a32
SR
3394 struct ftrace_ret_stack *ret_stack;
3395
3396 ret_stack = kmalloc(FTRACE_RETFUNC_DEPTH
f201ae23
FW
3397 * sizeof(struct ftrace_ret_stack),
3398 GFP_KERNEL);
82310a32 3399 if (!ret_stack)
f201ae23 3400 return;
380c4b14 3401 atomic_set(&t->tracing_graph_pause, 0);
f201ae23 3402 atomic_set(&t->trace_overrun, 0);
8aef2d28 3403 t->ftrace_timestamp = 0;
82310a32
SR
3404 /* make curr_ret_stack visable before we add the ret_stack */
3405 smp_wmb();
3406 t->ret_stack = ret_stack;
84047e36 3407 }
f201ae23
FW
3408}
3409
fb52607a 3410void ftrace_graph_exit_task(struct task_struct *t)
f201ae23 3411{
eae849ca
FW
3412 struct ftrace_ret_stack *ret_stack = t->ret_stack;
3413
f201ae23 3414 t->ret_stack = NULL;
eae849ca
FW
3415 /* NULL must become visible to IRQs before we free it: */
3416 barrier();
3417
3418 kfree(ret_stack);
f201ae23 3419}
14a866c5
SR
3420
3421void ftrace_graph_stop(void)
3422{
3423 ftrace_stop();
3424}
15e6cb36 3425#endif