]> git.proxmox.com Git - mirror_ubuntu-kernels.git/blame - kernel/tracepoint.c
Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
[mirror_ubuntu-kernels.git] / kernel / tracepoint.c
CommitLineData
1a59d1b8 1// SPDX-License-Identifier: GPL-2.0-or-later
97e1c18e 2/*
de7b2973 3 * Copyright (C) 2008-2014 Mathieu Desnoyers
97e1c18e
MD
4 */
5#include <linux/module.h>
6#include <linux/mutex.h>
7#include <linux/types.h>
8#include <linux/jhash.h>
9#include <linux/list.h>
10#include <linux/rcupdate.h>
11#include <linux/tracepoint.h>
12#include <linux/err.h>
13#include <linux/slab.h>
3f07c014 14#include <linux/sched/signal.h>
29930025 15#include <linux/sched/task.h>
c5905afb 16#include <linux/static_key.h>
97e1c18e 17
9c0be3f6
MD
18extern tracepoint_ptr_t __start___tracepoints_ptrs[];
19extern tracepoint_ptr_t __stop___tracepoints_ptrs[];
97e1c18e 20
e6753f23
JFG
21DEFINE_SRCU(tracepoint_srcu);
22EXPORT_SYMBOL_GPL(tracepoint_srcu);
23
97e1c18e
MD
24/* Set to 1 to enable tracepoint debug output */
25static const int tracepoint_debug;
26
de7b2973 27#ifdef CONFIG_MODULES
97e1c18e 28/*
de7b2973 29 * Tracepoint module list mutex protects the local module list.
97e1c18e 30 */
de7b2973 31static DEFINE_MUTEX(tracepoint_module_list_mutex);
97e1c18e 32
de7b2973 33/* Local list of struct tp_module */
b75ef8b4
MD
34static LIST_HEAD(tracepoint_module_list);
35#endif /* CONFIG_MODULES */
36
97e1c18e 37/*
de7b2973
MD
38 * tracepoints_mutex protects the builtin and module tracepoints.
39 * tracepoints_mutex nests inside tracepoint_module_list_mutex.
97e1c18e 40 */
de7b2973 41static DEFINE_MUTEX(tracepoints_mutex);
97e1c18e 42
f8a79d5c
SRV
43static struct rcu_head *early_probes;
44static bool ok_to_free_tracepoints;
45
97e1c18e
MD
46/*
47 * Note about RCU :
fd589a8f 48 * It is used to delay the free of multiple probes array until a quiescent
97e1c18e 49 * state is reached.
97e1c18e 50 */
19dba33c 51struct tp_probes {
0dea6d52 52 struct rcu_head rcu;
9d0a49c7 53 struct tracepoint_func probes[];
19dba33c 54};
97e1c18e 55
befe6d94
SRV
56/* Called in removal of a func but failed to allocate a new tp_funcs */
57static void tp_stub_func(void)
58{
59 return;
60}
61
19dba33c 62static inline void *allocate_probes(int count)
97e1c18e 63{
f0553dcb
GS
64 struct tp_probes *p = kmalloc(struct_size(p, probes, count),
65 GFP_KERNEL);
19dba33c 66 return p == NULL ? NULL : p->probes;
97e1c18e
MD
67}
68
e6753f23 69static void srcu_free_old_probes(struct rcu_head *head)
97e1c18e 70{
0dea6d52 71 kfree(container_of(head, struct tp_probes, rcu));
19dba33c
LJ
72}
73
e6753f23
JFG
74static void rcu_free_old_probes(struct rcu_head *head)
75{
76 call_srcu(&tracepoint_srcu, head, srcu_free_old_probes);
77}
78
f8a79d5c
SRV
79static __init int release_early_probes(void)
80{
81 struct rcu_head *tmp;
82
83 ok_to_free_tracepoints = true;
84
85 while (early_probes) {
86 tmp = early_probes;
87 early_probes = tmp->next;
74401729 88 call_rcu(tmp, rcu_free_old_probes);
f8a79d5c
SRV
89 }
90
91 return 0;
92}
93
94/* SRCU is initialized at core_initcall */
95postcore_initcall(release_early_probes);
96
38516ab5 97static inline void release_probes(struct tracepoint_func *old)
19dba33c
LJ
98{
99 if (old) {
100 struct tp_probes *tp_probes = container_of(old,
101 struct tp_probes, probes[0]);
f8a79d5c
SRV
102
103 /*
104 * We can't free probes if SRCU is not initialized yet.
105 * Postpone the freeing till after SRCU is initialized.
106 */
107 if (unlikely(!ok_to_free_tracepoints)) {
108 tp_probes->rcu.next = early_probes;
109 early_probes = &tp_probes->rcu;
110 return;
111 }
112
e6753f23
JFG
113 /*
114 * Tracepoint probes are protected by both sched RCU and SRCU,
115 * by calling the SRCU callback in the sched RCU callback we
116 * cover both cases. So let us chain the SRCU and sched RCU
117 * callbacks to wait for both grace periods.
118 */
74401729 119 call_rcu(&tp_probes->rcu, rcu_free_old_probes);
19dba33c 120 }
97e1c18e
MD
121}
122
de7b2973 123static void debug_print_probes(struct tracepoint_func *funcs)
97e1c18e
MD
124{
125 int i;
126
de7b2973 127 if (!tracepoint_debug || !funcs)
97e1c18e
MD
128 return;
129
de7b2973
MD
130 for (i = 0; funcs[i].func; i++)
131 printk(KERN_DEBUG "Probe %d : %p\n", i, funcs[i].func);
97e1c18e
MD
132}
133
7904b5c4
SRRH
134static struct tracepoint_func *
135func_add(struct tracepoint_func **funcs, struct tracepoint_func *tp_func,
136 int prio)
97e1c18e 137{
38516ab5 138 struct tracepoint_func *old, *new;
7211f0a2
SRV
139 int iter_probes; /* Iterate over old probe array. */
140 int nr_probes = 0; /* Counter for probes */
141 int pos = -1; /* Insertion position into new array */
97e1c18e 142
de7b2973 143 if (WARN_ON(!tp_func->func))
4c69e6ea 144 return ERR_PTR(-EINVAL);
97e1c18e 145
de7b2973
MD
146 debug_print_probes(*funcs);
147 old = *funcs;
97e1c18e
MD
148 if (old) {
149 /* (N -> N+1), (N != 0, 1) probes */
7211f0a2
SRV
150 for (iter_probes = 0; old[iter_probes].func; iter_probes++) {
151 if (old[iter_probes].func == tp_stub_func)
152 continue; /* Skip stub functions. */
153 if (old[iter_probes].func == tp_func->func &&
154 old[iter_probes].data == tp_func->data)
97e1c18e 155 return ERR_PTR(-EEXIST);
7211f0a2 156 nr_probes++;
7904b5c4 157 }
97e1c18e 158 }
7211f0a2
SRV
159 /* + 2 : one for new probe, one for NULL func */
160 new = allocate_probes(nr_probes + 2);
97e1c18e
MD
161 if (new == NULL)
162 return ERR_PTR(-ENOMEM);
7904b5c4 163 if (old) {
7211f0a2
SRV
164 nr_probes = 0;
165 for (iter_probes = 0; old[iter_probes].func; iter_probes++) {
166 if (old[iter_probes].func == tp_stub_func)
167 continue;
168 /* Insert before probes of lower priority */
169 if (pos < 0 && old[iter_probes].prio < prio)
170 pos = nr_probes++;
171 new[nr_probes++] = old[iter_probes];
7904b5c4 172 }
7211f0a2
SRV
173 if (pos < 0)
174 pos = nr_probes++;
175 /* nr_probes now points to the end of the new array */
176 } else {
7904b5c4 177 pos = 0;
7211f0a2
SRV
178 nr_probes = 1; /* must point at end of array */
179 }
7904b5c4 180 new[pos] = *tp_func;
7211f0a2 181 new[nr_probes].func = NULL;
de7b2973
MD
182 *funcs = new;
183 debug_print_probes(*funcs);
97e1c18e
MD
184 return old;
185}
186
de7b2973
MD
187static void *func_remove(struct tracepoint_func **funcs,
188 struct tracepoint_func *tp_func)
97e1c18e
MD
189{
190 int nr_probes = 0, nr_del = 0, i;
38516ab5 191 struct tracepoint_func *old, *new;
97e1c18e 192
de7b2973 193 old = *funcs;
97e1c18e 194
f66af459 195 if (!old)
19dba33c 196 return ERR_PTR(-ENOENT);
f66af459 197
de7b2973 198 debug_print_probes(*funcs);
97e1c18e 199 /* (N -> M), (N > 1, M >= 0) probes */
de7b2973 200 if (tp_func->func) {
4c69e6ea 201 for (nr_probes = 0; old[nr_probes].func; nr_probes++) {
befe6d94
SRV
202 if ((old[nr_probes].func == tp_func->func &&
203 old[nr_probes].data == tp_func->data) ||
204 old[nr_probes].func == tp_stub_func)
4c69e6ea
S
205 nr_del++;
206 }
97e1c18e
MD
207 }
208
4c69e6ea
S
209 /*
210 * If probe is NULL, then nr_probes = nr_del = 0, and then the
211 * entire entry will be removed.
212 */
97e1c18e
MD
213 if (nr_probes - nr_del == 0) {
214 /* N -> 0, (N > 1) */
de7b2973
MD
215 *funcs = NULL;
216 debug_print_probes(*funcs);
97e1c18e
MD
217 return old;
218 } else {
219 int j = 0;
220 /* N -> M, (N > 1, M > 0) */
221 /* + 1 for NULL */
19dba33c 222 new = allocate_probes(nr_probes - nr_del + 1);
befe6d94 223 if (new) {
7211f0a2
SRV
224 for (i = 0; old[i].func; i++) {
225 if ((old[i].func != tp_func->func ||
226 old[i].data != tp_func->data) &&
227 old[i].func != tp_stub_func)
befe6d94 228 new[j++] = old[i];
7211f0a2 229 }
befe6d94
SRV
230 new[nr_probes - nr_del].func = NULL;
231 *funcs = new;
232 } else {
233 /*
234 * Failed to allocate, replace the old function
235 * with calls to tp_stub_func.
236 */
7211f0a2 237 for (i = 0; old[i].func; i++) {
befe6d94 238 if (old[i].func == tp_func->func &&
7211f0a2
SRV
239 old[i].data == tp_func->data)
240 WRITE_ONCE(old[i].func, tp_stub_func);
241 }
befe6d94
SRV
242 *funcs = old;
243 }
97e1c18e 244 }
de7b2973 245 debug_print_probes(*funcs);
97e1c18e
MD
246 return old;
247}
248
547305a6 249static void tracepoint_update_call(struct tracepoint *tp, struct tracepoint_func *tp_funcs, bool sync)
d25e37d8
SRV
250{
251 void *func = tp->iterator;
252
253 /* Synthetic events do not have static call sites */
254 if (!tp->static_call_key)
255 return;
256
547305a6 257 if (!tp_funcs[1].func) {
d25e37d8 258 func = tp_funcs[0].func;
547305a6
SRV
259 /*
260 * If going from the iterator back to a single caller,
261 * we need to synchronize with __DO_TRACE to make sure
262 * that the data passed to the callback is the one that
263 * belongs to that callback.
264 */
265 if (sync)
266 tracepoint_synchronize_unregister();
267 }
d25e37d8
SRV
268
269 __static_call_update(tp->static_call_key, tp->static_call_tramp, func);
270}
271
97e1c18e 272/*
de7b2973 273 * Add the probe function to a tracepoint.
97e1c18e 274 */
de7b2973 275static int tracepoint_add_func(struct tracepoint *tp,
9913d574
SRV
276 struct tracepoint_func *func, int prio,
277 bool warn)
97e1c18e 278{
de7b2973 279 struct tracepoint_func *old, *tp_funcs;
8cf868af 280 int ret;
97e1c18e 281
8cf868af
SRRH
282 if (tp->regfunc && !static_key_enabled(&tp->key)) {
283 ret = tp->regfunc();
284 if (ret < 0)
285 return ret;
286 }
97e1c18e 287
b725dfea
MD
288 tp_funcs = rcu_dereference_protected(tp->funcs,
289 lockdep_is_held(&tracepoints_mutex));
7904b5c4 290 old = func_add(&tp_funcs, func, prio);
de7b2973 291 if (IS_ERR(old)) {
9913d574 292 WARN_ON_ONCE(warn && PTR_ERR(old) != -ENOMEM);
de7b2973
MD
293 return PTR_ERR(old);
294 }
97419875 295
97e1c18e 296 /*
243d1a79
PM
297 * rcu_assign_pointer has as smp_store_release() which makes sure
298 * that the new probe callbacks array is consistent before setting
299 * a pointer to it. This array is referenced by __DO_TRACE from
300 * include/linux/tracepoint.h using rcu_dereference_sched().
97e1c18e 301 */
de7b2973 302 rcu_assign_pointer(tp->funcs, tp_funcs);
547305a6 303 tracepoint_update_call(tp, tp_funcs, false);
d25e37d8
SRV
304 static_key_enable(&tp->key);
305
8058bd0f 306 release_probes(old);
de7b2973 307 return 0;
97e1c18e
MD
308}
309
310/*
de7b2973 311 * Remove a probe function from a tracepoint.
97e1c18e
MD
312 * Note: only waiting an RCU period after setting elem->call to the empty
313 * function insures that the original callback is not used anymore. This insured
314 * by preempt_disable around the call site.
315 */
de7b2973
MD
316static int tracepoint_remove_func(struct tracepoint *tp,
317 struct tracepoint_func *func)
97e1c18e 318{
de7b2973 319 struct tracepoint_func *old, *tp_funcs;
97e1c18e 320
b725dfea
MD
321 tp_funcs = rcu_dereference_protected(tp->funcs,
322 lockdep_is_held(&tracepoints_mutex));
de7b2973 323 old = func_remove(&tp_funcs, func);
befe6d94 324 if (WARN_ON_ONCE(IS_ERR(old)))
de7b2973 325 return PTR_ERR(old);
befe6d94
SRV
326
327 if (tp_funcs == old)
328 /* Failed allocating new tp_funcs, replaced func with stub */
329 return 0;
b75ef8b4 330
de7b2973
MD
331 if (!tp_funcs) {
332 /* Removed last function */
333 if (tp->unregfunc && static_key_enabled(&tp->key))
334 tp->unregfunc();
b75ef8b4 335
d25e37d8 336 static_key_disable(&tp->key);
547305a6 337 rcu_assign_pointer(tp->funcs, tp_funcs);
d25e37d8 338 } else {
547305a6
SRV
339 rcu_assign_pointer(tp->funcs, tp_funcs);
340 tracepoint_update_call(tp, tp_funcs,
341 tp_funcs[0].func != old[0].func);
127cafbb 342 }
8058bd0f 343 release_probes(old);
de7b2973 344 return 0;
127cafbb
LJ
345}
346
9913d574
SRV
347/**
348 * tracepoint_probe_register_prio_may_exist - Connect a probe to a tracepoint with priority
349 * @tp: tracepoint
350 * @probe: probe handler
351 * @data: tracepoint data
352 * @prio: priority of this function over other registered functions
353 *
354 * Same as tracepoint_probe_register_prio() except that it will not warn
355 * if the tracepoint is already registered.
356 */
357int tracepoint_probe_register_prio_may_exist(struct tracepoint *tp, void *probe,
358 void *data, int prio)
359{
360 struct tracepoint_func tp_func;
361 int ret;
362
363 mutex_lock(&tracepoints_mutex);
364 tp_func.func = probe;
365 tp_func.data = data;
366 tp_func.prio = prio;
367 ret = tracepoint_add_func(tp, &tp_func, prio, false);
368 mutex_unlock(&tracepoints_mutex);
369 return ret;
370}
371EXPORT_SYMBOL_GPL(tracepoint_probe_register_prio_may_exist);
372
97e1c18e 373/**
f39e2391 374 * tracepoint_probe_register_prio - Connect a probe to a tracepoint with priority
de7b2973 375 * @tp: tracepoint
97e1c18e 376 * @probe: probe handler
cac92ba7 377 * @data: tracepoint data
7904b5c4 378 * @prio: priority of this function over other registered functions
97e1c18e 379 *
de7b2973
MD
380 * Returns 0 if ok, error value on error.
381 * Note: if @tp is within a module, the caller is responsible for
382 * unregistering the probe before the module is gone. This can be
383 * performed either with a tracepoint module going notifier, or from
384 * within module exit functions.
97e1c18e 385 */
7904b5c4
SRRH
386int tracepoint_probe_register_prio(struct tracepoint *tp, void *probe,
387 void *data, int prio)
97e1c18e 388{
de7b2973
MD
389 struct tracepoint_func tp_func;
390 int ret;
97e1c18e
MD
391
392 mutex_lock(&tracepoints_mutex);
de7b2973
MD
393 tp_func.func = probe;
394 tp_func.data = data;
7904b5c4 395 tp_func.prio = prio;
9913d574 396 ret = tracepoint_add_func(tp, &tp_func, prio, true);
b75ef8b4 397 mutex_unlock(&tracepoints_mutex);
b196e2b9 398 return ret;
97e1c18e 399}
7904b5c4
SRRH
400EXPORT_SYMBOL_GPL(tracepoint_probe_register_prio);
401
402/**
403 * tracepoint_probe_register - Connect a probe to a tracepoint
404 * @tp: tracepoint
405 * @probe: probe handler
406 * @data: tracepoint data
7904b5c4
SRRH
407 *
408 * Returns 0 if ok, error value on error.
409 * Note: if @tp is within a module, the caller is responsible for
410 * unregistering the probe before the module is gone. This can be
411 * performed either with a tracepoint module going notifier, or from
412 * within module exit functions.
413 */
414int tracepoint_probe_register(struct tracepoint *tp, void *probe, void *data)
415{
416 return tracepoint_probe_register_prio(tp, probe, data, TRACEPOINT_DEFAULT_PRIO);
417}
97e1c18e
MD
418EXPORT_SYMBOL_GPL(tracepoint_probe_register);
419
420/**
421 * tracepoint_probe_unregister - Disconnect a probe from a tracepoint
de7b2973 422 * @tp: tracepoint
97e1c18e 423 * @probe: probe function pointer
cac92ba7 424 * @data: tracepoint data
97e1c18e 425 *
de7b2973 426 * Returns 0 if ok, error value on error.
97e1c18e 427 */
de7b2973 428int tracepoint_probe_unregister(struct tracepoint *tp, void *probe, void *data)
97e1c18e 429{
de7b2973
MD
430 struct tracepoint_func tp_func;
431 int ret;
97e1c18e
MD
432
433 mutex_lock(&tracepoints_mutex);
de7b2973
MD
434 tp_func.func = probe;
435 tp_func.data = data;
436 ret = tracepoint_remove_func(tp, &tp_func);
b75ef8b4 437 mutex_unlock(&tracepoints_mutex);
de7b2973 438 return ret;
97e1c18e
MD
439}
440EXPORT_SYMBOL_GPL(tracepoint_probe_unregister);
441
9c0be3f6
MD
442static void for_each_tracepoint_range(
443 tracepoint_ptr_t *begin, tracepoint_ptr_t *end,
46e0c9be
AB
444 void (*fct)(struct tracepoint *tp, void *priv),
445 void *priv)
446{
9c0be3f6
MD
447 tracepoint_ptr_t *iter;
448
46e0c9be
AB
449 if (!begin)
450 return;
9c0be3f6
MD
451 for (iter = begin; iter < end; iter++)
452 fct(tracepoint_ptr_deref(iter), priv);
46e0c9be
AB
453}
454
227a8375 455#ifdef CONFIG_MODULES
45ab2813
SRRH
456bool trace_module_has_bad_taint(struct module *mod)
457{
66cc69e3
MD
458 return mod->taints & ~((1 << TAINT_OOT_MODULE) | (1 << TAINT_CRAP) |
459 (1 << TAINT_UNSIGNED_MODULE));
45ab2813
SRRH
460}
461
de7b2973
MD
462static BLOCKING_NOTIFIER_HEAD(tracepoint_notify_list);
463
464/**
465 * register_tracepoint_notifier - register tracepoint coming/going notifier
466 * @nb: notifier block
467 *
468 * Notifiers registered with this function are called on module
469 * coming/going with the tracepoint_module_list_mutex held.
470 * The notifier block callback should expect a "struct tp_module" data
471 * pointer.
472 */
473int register_tracepoint_module_notifier(struct notifier_block *nb)
474{
475 struct tp_module *tp_mod;
476 int ret;
477
478 mutex_lock(&tracepoint_module_list_mutex);
479 ret = blocking_notifier_chain_register(&tracepoint_notify_list, nb);
480 if (ret)
481 goto end;
482 list_for_each_entry(tp_mod, &tracepoint_module_list, list)
483 (void) nb->notifier_call(nb, MODULE_STATE_COMING, tp_mod);
484end:
485 mutex_unlock(&tracepoint_module_list_mutex);
486 return ret;
487}
488EXPORT_SYMBOL_GPL(register_tracepoint_module_notifier);
489
490/**
491 * unregister_tracepoint_notifier - unregister tracepoint coming/going notifier
492 * @nb: notifier block
493 *
494 * The notifier block callback should expect a "struct tp_module" data
495 * pointer.
496 */
497int unregister_tracepoint_module_notifier(struct notifier_block *nb)
498{
499 struct tp_module *tp_mod;
500 int ret;
501
502 mutex_lock(&tracepoint_module_list_mutex);
503 ret = blocking_notifier_chain_unregister(&tracepoint_notify_list, nb);
504 if (ret)
505 goto end;
506 list_for_each_entry(tp_mod, &tracepoint_module_list, list)
507 (void) nb->notifier_call(nb, MODULE_STATE_GOING, tp_mod);
508end:
509 mutex_unlock(&tracepoint_module_list_mutex);
510 return ret;
511
512}
513EXPORT_SYMBOL_GPL(unregister_tracepoint_module_notifier);
514
515/*
516 * Ensure the tracer unregistered the module's probes before the module
517 * teardown is performed. Prevents leaks of probe and data pointers.
518 */
46e0c9be 519static void tp_module_going_check_quiescent(struct tracepoint *tp, void *priv)
de7b2973 520{
46e0c9be 521 WARN_ON_ONCE(tp->funcs);
de7b2973
MD
522}
523
b75ef8b4
MD
524static int tracepoint_module_coming(struct module *mod)
525{
0dea6d52 526 struct tp_module *tp_mod;
b75ef8b4
MD
527 int ret = 0;
528
7dec935a
SRRH
529 if (!mod->num_tracepoints)
530 return 0;
531
b75ef8b4 532 /*
c10076c4
SR
533 * We skip modules that taint the kernel, especially those with different
534 * module headers (for forced load), to make sure we don't cause a crash.
66cc69e3 535 * Staging, out-of-tree, and unsigned GPL modules are fine.
b75ef8b4 536 */
45ab2813 537 if (trace_module_has_bad_taint(mod))
b75ef8b4 538 return 0;
de7b2973 539 mutex_lock(&tracepoint_module_list_mutex);
b75ef8b4
MD
540 tp_mod = kmalloc(sizeof(struct tp_module), GFP_KERNEL);
541 if (!tp_mod) {
542 ret = -ENOMEM;
543 goto end;
544 }
eb7d035c 545 tp_mod->mod = mod;
0dea6d52 546 list_add_tail(&tp_mod->list, &tracepoint_module_list);
de7b2973
MD
547 blocking_notifier_call_chain(&tracepoint_notify_list,
548 MODULE_STATE_COMING, tp_mod);
b75ef8b4 549end:
de7b2973 550 mutex_unlock(&tracepoint_module_list_mutex);
b75ef8b4
MD
551 return ret;
552}
553
de7b2973 554static void tracepoint_module_going(struct module *mod)
b75ef8b4 555{
de7b2973 556 struct tp_module *tp_mod;
b75ef8b4 557
7dec935a 558 if (!mod->num_tracepoints)
de7b2973 559 return;
7dec935a 560
de7b2973
MD
561 mutex_lock(&tracepoint_module_list_mutex);
562 list_for_each_entry(tp_mod, &tracepoint_module_list, list) {
eb7d035c 563 if (tp_mod->mod == mod) {
de7b2973
MD
564 blocking_notifier_call_chain(&tracepoint_notify_list,
565 MODULE_STATE_GOING, tp_mod);
566 list_del(&tp_mod->list);
567 kfree(tp_mod);
568 /*
569 * Called the going notifier before checking for
570 * quiescence.
571 */
46e0c9be
AB
572 for_each_tracepoint_range(mod->tracepoints_ptrs,
573 mod->tracepoints_ptrs + mod->num_tracepoints,
574 tp_module_going_check_quiescent, NULL);
b75ef8b4
MD
575 break;
576 }
577 }
578 /*
579 * In the case of modules that were tainted at "coming", we'll simply
580 * walk through the list without finding it. We cannot use the "tainted"
581 * flag on "going", in case a module taints the kernel only after being
582 * loaded.
583 */
de7b2973 584 mutex_unlock(&tracepoint_module_list_mutex);
b75ef8b4 585}
227a8375 586
de7b2973
MD
587static int tracepoint_module_notify(struct notifier_block *self,
588 unsigned long val, void *data)
32f85742
MD
589{
590 struct module *mod = data;
b75ef8b4 591 int ret = 0;
32f85742
MD
592
593 switch (val) {
594 case MODULE_STATE_COMING:
b75ef8b4
MD
595 ret = tracepoint_module_coming(mod);
596 break;
597 case MODULE_STATE_LIVE:
598 break;
32f85742 599 case MODULE_STATE_GOING:
de7b2973
MD
600 tracepoint_module_going(mod);
601 break;
602 case MODULE_STATE_UNFORMED:
32f85742
MD
603 break;
604 }
0340a6b7 605 return notifier_from_errno(ret);
32f85742
MD
606}
607
de7b2973 608static struct notifier_block tracepoint_module_nb = {
32f85742
MD
609 .notifier_call = tracepoint_module_notify,
610 .priority = 0,
611};
612
de7b2973 613static __init int init_tracepoints(void)
32f85742 614{
de7b2973
MD
615 int ret;
616
617 ret = register_module_notifier(&tracepoint_module_nb);
eb7d035c 618 if (ret)
a395d6a7 619 pr_warn("Failed to register tracepoint module enter notifier\n");
eb7d035c 620
de7b2973 621 return ret;
32f85742
MD
622}
623__initcall(init_tracepoints);
227a8375 624#endif /* CONFIG_MODULES */
a871bd33 625
de7b2973
MD
626/**
627 * for_each_kernel_tracepoint - iteration on all kernel tracepoints
628 * @fct: callback
629 * @priv: private data
630 */
631void for_each_kernel_tracepoint(void (*fct)(struct tracepoint *tp, void *priv),
632 void *priv)
633{
634 for_each_tracepoint_range(__start___tracepoints_ptrs,
635 __stop___tracepoints_ptrs, fct, priv);
636}
637EXPORT_SYMBOL_GPL(for_each_kernel_tracepoint);
638
3d27d8cb 639#ifdef CONFIG_HAVE_SYSCALL_TRACEPOINTS
60d970c2 640
97419875 641/* NB: reg/unreg are called while guarded with the tracepoints_mutex */
a871bd33
JB
642static int sys_tracepoint_refcount;
643
8cf868af 644int syscall_regfunc(void)
a871bd33 645{
8063e41d 646 struct task_struct *p, *t;
a871bd33 647
a871bd33 648 if (!sys_tracepoint_refcount) {
8063e41d
ON
649 read_lock(&tasklist_lock);
650 for_each_process_thread(p, t) {
524666cb 651 set_task_syscall_work(t, SYSCALL_TRACEPOINT);
8063e41d
ON
652 }
653 read_unlock(&tasklist_lock);
a871bd33
JB
654 }
655 sys_tracepoint_refcount++;
8cf868af
SRRH
656
657 return 0;
a871bd33
JB
658}
659
660void syscall_unregfunc(void)
661{
8063e41d 662 struct task_struct *p, *t;
a871bd33 663
a871bd33
JB
664 sys_tracepoint_refcount--;
665 if (!sys_tracepoint_refcount) {
8063e41d
ON
666 read_lock(&tasklist_lock);
667 for_each_process_thread(p, t) {
524666cb 668 clear_task_syscall_work(t, SYSCALL_TRACEPOINT);
8063e41d
ON
669 }
670 read_unlock(&tasklist_lock);
a871bd33 671 }
a871bd33 672}
60d970c2 673#endif