]> bbs.cooldavid.org Git - net-next-2.6.git/blame - kernel/trace/ftrace.c
be2net: Fix to avoid firmware update when interface is not open.
[net-next-2.6.git] / kernel / trace / ftrace.c
CommitLineData
16444a8a
ACM
1/*
2 * Infrastructure for profiling code inserted by 'gcc -pg'.
3 *
4 * Copyright (C) 2007-2008 Steven Rostedt <srostedt@redhat.com>
5 * Copyright (C) 2004-2008 Ingo Molnar <mingo@redhat.com>
6 *
7 * Originally ported from the -rt patch by:
8 * Copyright (C) 2007 Arnaldo Carvalho de Melo <acme@redhat.com>
9 *
10 * Based on code in the latency_tracer, that is:
11 *
12 * Copyright (C) 2004-2006 Ingo Molnar
13 * Copyright (C) 2004 William Lee Irwin III
14 */
15
3d083395
SR
16#include <linux/stop_machine.h>
17#include <linux/clocksource.h>
18#include <linux/kallsyms.h>
5072c59f 19#include <linux/seq_file.h>
4a2b8dda 20#include <linux/suspend.h>
5072c59f 21#include <linux/debugfs.h>
3d083395 22#include <linux/hardirq.h>
2d8b820b 23#include <linux/kthread.h>
5072c59f 24#include <linux/uaccess.h>
2d8b820b 25#include <linux/ftrace.h>
b0fc494f 26#include <linux/sysctl.h>
5a0e3ad6 27#include <linux/slab.h>
5072c59f 28#include <linux/ctype.h>
3d083395 29#include <linux/list.h>
59df055f 30#include <linux/hash.h>
3f379b03 31#include <linux/rcupdate.h>
3d083395 32
ad8d75ff 33#include <trace/events/sched.h>
8aef2d28 34
395a59d0 35#include <asm/ftrace.h>
2af15d6a 36#include <asm/setup.h>
395a59d0 37
0706f1c4 38#include "trace_output.h"
bac429f0 39#include "trace_stat.h"
16444a8a 40
6912896e
SR
41#define FTRACE_WARN_ON(cond) \
42 do { \
43 if (WARN_ON(cond)) \
44 ftrace_kill(); \
45 } while (0)
46
47#define FTRACE_WARN_ON_ONCE(cond) \
48 do { \
49 if (WARN_ON_ONCE(cond)) \
50 ftrace_kill(); \
51 } while (0)
52
8fc0c701
SR
53/* hash bits for specific function selection */
54#define FTRACE_HASH_BITS 7
55#define FTRACE_FUNC_HASHSIZE (1 << FTRACE_HASH_BITS)
56
4eebcc81
SR
57/* ftrace_enabled is a method to turn ftrace on or off */
58int ftrace_enabled __read_mostly;
d61f82d0 59static int last_ftrace_enabled;
b0fc494f 60
60a7ecf4
SR
61/* Quick disabling of function tracer. */
62int function_trace_stop;
63
756d17ee 64/* List for set_ftrace_pid's pids. */
65LIST_HEAD(ftrace_pids);
66struct ftrace_pid {
67 struct list_head list;
68 struct pid *pid;
69};
70
4eebcc81
SR
71/*
72 * ftrace_disabled is set when an anomaly is discovered.
73 * ftrace_disabled is much stronger than ftrace_enabled.
74 */
75static int ftrace_disabled __read_mostly;
76
52baf119 77static DEFINE_MUTEX(ftrace_lock);
b0fc494f 78
16444a8a
ACM
79static struct ftrace_ops ftrace_list_end __read_mostly =
80{
fb9fb015 81 .func = ftrace_stub,
16444a8a
ACM
82};
83
84static struct ftrace_ops *ftrace_list __read_mostly = &ftrace_list_end;
85ftrace_func_t ftrace_trace_function __read_mostly = ftrace_stub;
60a7ecf4 86ftrace_func_t __ftrace_trace_function __read_mostly = ftrace_stub;
df4fc315 87ftrace_func_t ftrace_pid_function __read_mostly = ftrace_stub;
16444a8a 88
3f379b03
PM
89/*
90 * Traverse the ftrace_list, invoking all entries. The reason that we
91 * can use rcu_dereference_raw() is that elements removed from this list
92 * are simply leaked, so there is no need to interact with a grace-period
93 * mechanism. The rcu_dereference_raw() calls are needed to handle
94 * concurrent insertions into the ftrace_list.
95 *
96 * Silly Alpha and silly pointer-speculation compiler optimizations!
97 */
f2252935 98static void ftrace_list_func(unsigned long ip, unsigned long parent_ip)
16444a8a 99{
3f379b03 100 struct ftrace_ops *op = rcu_dereference_raw(ftrace_list); /*see above*/
16444a8a
ACM
101
102 while (op != &ftrace_list_end) {
16444a8a 103 op->func(ip, parent_ip);
3f379b03 104 op = rcu_dereference_raw(op->next); /*see above*/
16444a8a
ACM
105 };
106}
107
df4fc315
SR
108static void ftrace_pid_func(unsigned long ip, unsigned long parent_ip)
109{
0ef8cde5 110 if (!test_tsk_trace_trace(current))
df4fc315
SR
111 return;
112
113 ftrace_pid_function(ip, parent_ip);
114}
115
116static void set_ftrace_pid_function(ftrace_func_t func)
117{
118 /* do not set ftrace_pid_function to itself! */
119 if (func != ftrace_pid_func)
120 ftrace_pid_function = func;
121}
122
16444a8a 123/**
3d083395 124 * clear_ftrace_function - reset the ftrace function
16444a8a 125 *
3d083395
SR
126 * This NULLs the ftrace function and in essence stops
127 * tracing. There may be lag
16444a8a 128 */
3d083395 129void clear_ftrace_function(void)
16444a8a 130{
3d083395 131 ftrace_trace_function = ftrace_stub;
60a7ecf4 132 __ftrace_trace_function = ftrace_stub;
df4fc315 133 ftrace_pid_function = ftrace_stub;
3d083395
SR
134}
135
60a7ecf4
SR
136#ifndef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
137/*
138 * For those archs that do not test ftrace_trace_stop in their
139 * mcount call site, we need to do it from C.
140 */
141static void ftrace_test_stop_func(unsigned long ip, unsigned long parent_ip)
142{
143 if (function_trace_stop)
144 return;
145
146 __ftrace_trace_function(ip, parent_ip);
147}
148#endif
149
e309b41d 150static int __register_ftrace_function(struct ftrace_ops *ops)
3d083395 151{
16444a8a
ACM
152 ops->next = ftrace_list;
153 /*
154 * We are entering ops into the ftrace_list but another
155 * CPU might be walking that list. We need to make sure
156 * the ops->next pointer is valid before another CPU sees
157 * the ops pointer included into the ftrace_list.
158 */
3f379b03 159 rcu_assign_pointer(ftrace_list, ops);
3d083395 160
b0fc494f 161 if (ftrace_enabled) {
df4fc315
SR
162 ftrace_func_t func;
163
164 if (ops->next == &ftrace_list_end)
165 func = ops->func;
166 else
167 func = ftrace_list_func;
168
756d17ee 169 if (!list_empty(&ftrace_pids)) {
df4fc315
SR
170 set_ftrace_pid_function(func);
171 func = ftrace_pid_func;
172 }
173
b0fc494f
SR
174 /*
175 * For one func, simply call it directly.
176 * For more than one func, call the chain.
177 */
60a7ecf4 178#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
df4fc315 179 ftrace_trace_function = func;
60a7ecf4 180#else
df4fc315 181 __ftrace_trace_function = func;
60a7ecf4
SR
182 ftrace_trace_function = ftrace_test_stop_func;
183#endif
b0fc494f 184 }
3d083395 185
16444a8a
ACM
186 return 0;
187}
188
e309b41d 189static int __unregister_ftrace_function(struct ftrace_ops *ops)
16444a8a 190{
16444a8a 191 struct ftrace_ops **p;
16444a8a
ACM
192
193 /*
3d083395
SR
194 * If we are removing the last function, then simply point
195 * to the ftrace_stub.
16444a8a
ACM
196 */
197 if (ftrace_list == ops && ops->next == &ftrace_list_end) {
198 ftrace_trace_function = ftrace_stub;
199 ftrace_list = &ftrace_list_end;
e6ea44e9 200 return 0;
16444a8a
ACM
201 }
202
203 for (p = &ftrace_list; *p != &ftrace_list_end; p = &(*p)->next)
204 if (*p == ops)
205 break;
206
e6ea44e9
SR
207 if (*p != ops)
208 return -1;
16444a8a
ACM
209
210 *p = (*p)->next;
211
b0fc494f
SR
212 if (ftrace_enabled) {
213 /* If we only have one func left, then call that directly */
df4fc315
SR
214 if (ftrace_list->next == &ftrace_list_end) {
215 ftrace_func_t func = ftrace_list->func;
216
756d17ee 217 if (!list_empty(&ftrace_pids)) {
df4fc315
SR
218 set_ftrace_pid_function(func);
219 func = ftrace_pid_func;
220 }
221#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
222 ftrace_trace_function = func;
223#else
224 __ftrace_trace_function = func;
225#endif
226 }
b0fc494f 227 }
16444a8a 228
e6ea44e9 229 return 0;
3d083395
SR
230}
231
df4fc315
SR
232static void ftrace_update_pid_func(void)
233{
234 ftrace_func_t func;
235
df4fc315 236 if (ftrace_trace_function == ftrace_stub)
10dd3ebe 237 return;
df4fc315 238
33974093 239#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
df4fc315 240 func = ftrace_trace_function;
33974093
MF
241#else
242 func = __ftrace_trace_function;
243#endif
df4fc315 244
756d17ee 245 if (!list_empty(&ftrace_pids)) {
df4fc315
SR
246 set_ftrace_pid_function(func);
247 func = ftrace_pid_func;
248 } else {
66eafebc
LW
249 if (func == ftrace_pid_func)
250 func = ftrace_pid_function;
df4fc315
SR
251 }
252
253#ifdef CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST
254 ftrace_trace_function = func;
255#else
256 __ftrace_trace_function = func;
257#endif
df4fc315
SR
258}
259
493762fc
SR
260#ifdef CONFIG_FUNCTION_PROFILER
261struct ftrace_profile {
262 struct hlist_node node;
263 unsigned long ip;
264 unsigned long counter;
0706f1c4
SR
265#ifdef CONFIG_FUNCTION_GRAPH_TRACER
266 unsigned long long time;
e330b3bc 267 unsigned long long time_squared;
0706f1c4 268#endif
8fc0c701
SR
269};
270
493762fc
SR
271struct ftrace_profile_page {
272 struct ftrace_profile_page *next;
273 unsigned long index;
274 struct ftrace_profile records[];
d61f82d0
SR
275};
276
cafb168a
SR
277struct ftrace_profile_stat {
278 atomic_t disabled;
279 struct hlist_head *hash;
280 struct ftrace_profile_page *pages;
281 struct ftrace_profile_page *start;
282 struct tracer_stat stat;
283};
284
493762fc
SR
285#define PROFILE_RECORDS_SIZE \
286 (PAGE_SIZE - offsetof(struct ftrace_profile_page, records))
5072c59f 287
493762fc
SR
288#define PROFILES_PER_PAGE \
289 (PROFILE_RECORDS_SIZE / sizeof(struct ftrace_profile))
3d083395 290
fb9fb015
SR
291static int ftrace_profile_bits __read_mostly;
292static int ftrace_profile_enabled __read_mostly;
293
294/* ftrace_profile_lock - synchronize the enable and disable of the profiler */
bac429f0
SR
295static DEFINE_MUTEX(ftrace_profile_lock);
296
cafb168a 297static DEFINE_PER_CPU(struct ftrace_profile_stat, ftrace_profile_stats);
493762fc
SR
298
299#define FTRACE_PROFILE_HASH_SIZE 1024 /* must be power of 2 */
300
bac429f0
SR
301static void *
302function_stat_next(void *v, int idx)
303{
493762fc
SR
304 struct ftrace_profile *rec = v;
305 struct ftrace_profile_page *pg;
bac429f0 306
493762fc 307 pg = (struct ftrace_profile_page *)((unsigned long)rec & PAGE_MASK);
bac429f0
SR
308
309 again:
0296e425
LZ
310 if (idx != 0)
311 rec++;
312
bac429f0
SR
313 if ((void *)rec >= (void *)&pg->records[pg->index]) {
314 pg = pg->next;
315 if (!pg)
316 return NULL;
317 rec = &pg->records[0];
493762fc
SR
318 if (!rec->counter)
319 goto again;
bac429f0
SR
320 }
321
bac429f0
SR
322 return rec;
323}
324
325static void *function_stat_start(struct tracer_stat *trace)
326{
cafb168a
SR
327 struct ftrace_profile_stat *stat =
328 container_of(trace, struct ftrace_profile_stat, stat);
329
330 if (!stat || !stat->start)
331 return NULL;
332
333 return function_stat_next(&stat->start->records[0], 0);
bac429f0
SR
334}
335
0706f1c4
SR
336#ifdef CONFIG_FUNCTION_GRAPH_TRACER
337/* function graph compares on total time */
338static int function_stat_cmp(void *p1, void *p2)
339{
340 struct ftrace_profile *a = p1;
341 struct ftrace_profile *b = p2;
342
343 if (a->time < b->time)
344 return -1;
345 if (a->time > b->time)
346 return 1;
347 else
348 return 0;
349}
350#else
351/* not function graph compares against hits */
bac429f0
SR
352static int function_stat_cmp(void *p1, void *p2)
353{
493762fc
SR
354 struct ftrace_profile *a = p1;
355 struct ftrace_profile *b = p2;
bac429f0
SR
356
357 if (a->counter < b->counter)
358 return -1;
359 if (a->counter > b->counter)
360 return 1;
361 else
362 return 0;
363}
0706f1c4 364#endif
bac429f0
SR
365
366static int function_stat_headers(struct seq_file *m)
367{
0706f1c4 368#ifdef CONFIG_FUNCTION_GRAPH_TRACER
34886c8b 369 seq_printf(m, " Function "
e330b3bc 370 "Hit Time Avg s^2\n"
34886c8b 371 " -------- "
e330b3bc 372 "--- ---- --- ---\n");
0706f1c4 373#else
bac429f0
SR
374 seq_printf(m, " Function Hit\n"
375 " -------- ---\n");
0706f1c4 376#endif
bac429f0
SR
377 return 0;
378}
379
380static int function_stat_show(struct seq_file *m, void *v)
381{
493762fc 382 struct ftrace_profile *rec = v;
bac429f0 383 char str[KSYM_SYMBOL_LEN];
3aaba20f 384 int ret = 0;
0706f1c4 385#ifdef CONFIG_FUNCTION_GRAPH_TRACER
34886c8b
SR
386 static struct trace_seq s;
387 unsigned long long avg;
e330b3bc 388 unsigned long long stddev;
0706f1c4 389#endif
3aaba20f
LZ
390 mutex_lock(&ftrace_profile_lock);
391
392 /* we raced with function_profile_reset() */
393 if (unlikely(rec->counter == 0)) {
394 ret = -EBUSY;
395 goto out;
396 }
bac429f0
SR
397
398 kallsyms_lookup(rec->ip, NULL, NULL, NULL, str);
0706f1c4
SR
399 seq_printf(m, " %-30.30s %10lu", str, rec->counter);
400
401#ifdef CONFIG_FUNCTION_GRAPH_TRACER
402 seq_printf(m, " ");
34886c8b
SR
403 avg = rec->time;
404 do_div(avg, rec->counter);
405
e330b3bc
CD
406 /* Sample standard deviation (s^2) */
407 if (rec->counter <= 1)
408 stddev = 0;
409 else {
410 stddev = rec->time_squared - rec->counter * avg * avg;
411 /*
412 * Divide only 1000 for ns^2 -> us^2 conversion.
413 * trace_print_graph_duration will divide 1000 again.
414 */
415 do_div(stddev, (rec->counter - 1) * 1000);
416 }
417
34886c8b
SR
418 trace_seq_init(&s);
419 trace_print_graph_duration(rec->time, &s);
420 trace_seq_puts(&s, " ");
421 trace_print_graph_duration(avg, &s);
e330b3bc
CD
422 trace_seq_puts(&s, " ");
423 trace_print_graph_duration(stddev, &s);
0706f1c4 424 trace_print_seq(m, &s);
0706f1c4
SR
425#endif
426 seq_putc(m, '\n');
3aaba20f
LZ
427out:
428 mutex_unlock(&ftrace_profile_lock);
bac429f0 429
3aaba20f 430 return ret;
bac429f0
SR
431}
432
cafb168a 433static void ftrace_profile_reset(struct ftrace_profile_stat *stat)
bac429f0 434{
493762fc 435 struct ftrace_profile_page *pg;
bac429f0 436
cafb168a 437 pg = stat->pages = stat->start;
bac429f0 438
493762fc
SR
439 while (pg) {
440 memset(pg->records, 0, PROFILE_RECORDS_SIZE);
441 pg->index = 0;
442 pg = pg->next;
bac429f0
SR
443 }
444
cafb168a 445 memset(stat->hash, 0,
493762fc
SR
446 FTRACE_PROFILE_HASH_SIZE * sizeof(struct hlist_head));
447}
bac429f0 448
cafb168a 449int ftrace_profile_pages_init(struct ftrace_profile_stat *stat)
493762fc
SR
450{
451 struct ftrace_profile_page *pg;
318e0a73
SR
452 int functions;
453 int pages;
493762fc 454 int i;
bac429f0 455
493762fc 456 /* If we already allocated, do nothing */
cafb168a 457 if (stat->pages)
493762fc 458 return 0;
bac429f0 459
cafb168a
SR
460 stat->pages = (void *)get_zeroed_page(GFP_KERNEL);
461 if (!stat->pages)
493762fc 462 return -ENOMEM;
bac429f0 463
318e0a73
SR
464#ifdef CONFIG_DYNAMIC_FTRACE
465 functions = ftrace_update_tot_cnt;
466#else
467 /*
468 * We do not know the number of functions that exist because
469 * dynamic tracing is what counts them. With past experience
470 * we have around 20K functions. That should be more than enough.
471 * It is highly unlikely we will execute every function in
472 * the kernel.
473 */
474 functions = 20000;
475#endif
476
cafb168a 477 pg = stat->start = stat->pages;
bac429f0 478
318e0a73
SR
479 pages = DIV_ROUND_UP(functions, PROFILES_PER_PAGE);
480
481 for (i = 0; i < pages; i++) {
493762fc 482 pg->next = (void *)get_zeroed_page(GFP_KERNEL);
493762fc 483 if (!pg->next)
318e0a73 484 goto out_free;
493762fc
SR
485 pg = pg->next;
486 }
487
488 return 0;
318e0a73
SR
489
490 out_free:
491 pg = stat->start;
492 while (pg) {
493 unsigned long tmp = (unsigned long)pg;
494
495 pg = pg->next;
496 free_page(tmp);
497 }
498
499 free_page((unsigned long)stat->pages);
500 stat->pages = NULL;
501 stat->start = NULL;
502
503 return -ENOMEM;
bac429f0
SR
504}
505
cafb168a 506static int ftrace_profile_init_cpu(int cpu)
bac429f0 507{
cafb168a 508 struct ftrace_profile_stat *stat;
493762fc 509 int size;
bac429f0 510
cafb168a
SR
511 stat = &per_cpu(ftrace_profile_stats, cpu);
512
513 if (stat->hash) {
493762fc 514 /* If the profile is already created, simply reset it */
cafb168a 515 ftrace_profile_reset(stat);
493762fc
SR
516 return 0;
517 }
bac429f0 518
493762fc
SR
519 /*
520 * We are profiling all functions, but usually only a few thousand
521 * functions are hit. We'll make a hash of 1024 items.
522 */
523 size = FTRACE_PROFILE_HASH_SIZE;
bac429f0 524
cafb168a 525 stat->hash = kzalloc(sizeof(struct hlist_head) * size, GFP_KERNEL);
493762fc 526
cafb168a 527 if (!stat->hash)
493762fc
SR
528 return -ENOMEM;
529
cafb168a
SR
530 if (!ftrace_profile_bits) {
531 size--;
493762fc 532
cafb168a
SR
533 for (; size; size >>= 1)
534 ftrace_profile_bits++;
535 }
493762fc 536
318e0a73 537 /* Preallocate the function profiling pages */
cafb168a
SR
538 if (ftrace_profile_pages_init(stat) < 0) {
539 kfree(stat->hash);
540 stat->hash = NULL;
493762fc
SR
541 return -ENOMEM;
542 }
543
544 return 0;
bac429f0
SR
545}
546
cafb168a
SR
547static int ftrace_profile_init(void)
548{
549 int cpu;
550 int ret = 0;
551
552 for_each_online_cpu(cpu) {
553 ret = ftrace_profile_init_cpu(cpu);
554 if (ret)
555 break;
556 }
557
558 return ret;
559}
560
493762fc 561/* interrupts must be disabled */
cafb168a
SR
562static struct ftrace_profile *
563ftrace_find_profiled_func(struct ftrace_profile_stat *stat, unsigned long ip)
bac429f0 564{
493762fc 565 struct ftrace_profile *rec;
bac429f0
SR
566 struct hlist_head *hhd;
567 struct hlist_node *n;
bac429f0
SR
568 unsigned long key;
569
bac429f0 570 key = hash_long(ip, ftrace_profile_bits);
cafb168a 571 hhd = &stat->hash[key];
bac429f0
SR
572
573 if (hlist_empty(hhd))
574 return NULL;
575
bac429f0
SR
576 hlist_for_each_entry_rcu(rec, n, hhd, node) {
577 if (rec->ip == ip)
493762fc
SR
578 return rec;
579 }
580
581 return NULL;
582}
583
cafb168a
SR
584static void ftrace_add_profile(struct ftrace_profile_stat *stat,
585 struct ftrace_profile *rec)
493762fc
SR
586{
587 unsigned long key;
588
589 key = hash_long(rec->ip, ftrace_profile_bits);
cafb168a 590 hlist_add_head_rcu(&rec->node, &stat->hash[key]);
493762fc
SR
591}
592
318e0a73
SR
593/*
594 * The memory is already allocated, this simply finds a new record to use.
595 */
493762fc 596static struct ftrace_profile *
318e0a73 597ftrace_profile_alloc(struct ftrace_profile_stat *stat, unsigned long ip)
493762fc
SR
598{
599 struct ftrace_profile *rec = NULL;
600
318e0a73 601 /* prevent recursion (from NMIs) */
cafb168a 602 if (atomic_inc_return(&stat->disabled) != 1)
493762fc
SR
603 goto out;
604
493762fc 605 /*
318e0a73
SR
606 * Try to find the function again since an NMI
607 * could have added it
493762fc 608 */
cafb168a 609 rec = ftrace_find_profiled_func(stat, ip);
493762fc 610 if (rec)
cafb168a 611 goto out;
493762fc 612
cafb168a
SR
613 if (stat->pages->index == PROFILES_PER_PAGE) {
614 if (!stat->pages->next)
615 goto out;
616 stat->pages = stat->pages->next;
bac429f0 617 }
493762fc 618
cafb168a 619 rec = &stat->pages->records[stat->pages->index++];
493762fc 620 rec->ip = ip;
cafb168a 621 ftrace_add_profile(stat, rec);
493762fc 622
bac429f0 623 out:
cafb168a 624 atomic_dec(&stat->disabled);
bac429f0
SR
625
626 return rec;
627}
628
629static void
630function_profile_call(unsigned long ip, unsigned long parent_ip)
631{
cafb168a 632 struct ftrace_profile_stat *stat;
493762fc 633 struct ftrace_profile *rec;
bac429f0
SR
634 unsigned long flags;
635
636 if (!ftrace_profile_enabled)
637 return;
638
639 local_irq_save(flags);
cafb168a
SR
640
641 stat = &__get_cpu_var(ftrace_profile_stats);
0f6ce3de 642 if (!stat->hash || !ftrace_profile_enabled)
cafb168a
SR
643 goto out;
644
645 rec = ftrace_find_profiled_func(stat, ip);
493762fc 646 if (!rec) {
318e0a73 647 rec = ftrace_profile_alloc(stat, ip);
493762fc
SR
648 if (!rec)
649 goto out;
650 }
bac429f0
SR
651
652 rec->counter++;
653 out:
654 local_irq_restore(flags);
655}
656
0706f1c4
SR
657#ifdef CONFIG_FUNCTION_GRAPH_TRACER
658static int profile_graph_entry(struct ftrace_graph_ent *trace)
659{
660 function_profile_call(trace->func, 0);
661 return 1;
662}
663
664static void profile_graph_return(struct ftrace_graph_ret *trace)
665{
cafb168a 666 struct ftrace_profile_stat *stat;
a2a16d6a 667 unsigned long long calltime;
0706f1c4 668 struct ftrace_profile *rec;
cafb168a 669 unsigned long flags;
0706f1c4
SR
670
671 local_irq_save(flags);
cafb168a 672 stat = &__get_cpu_var(ftrace_profile_stats);
0f6ce3de 673 if (!stat->hash || !ftrace_profile_enabled)
cafb168a
SR
674 goto out;
675
37e44bc5
SR
676 /* If the calltime was zero'd ignore it */
677 if (!trace->calltime)
678 goto out;
679
a2a16d6a
SR
680 calltime = trace->rettime - trace->calltime;
681
682 if (!(trace_flags & TRACE_ITER_GRAPH_TIME)) {
683 int index;
684
685 index = trace->depth;
686
687 /* Append this call time to the parent time to subtract */
688 if (index)
689 current->ret_stack[index - 1].subtime += calltime;
690
691 if (current->ret_stack[index].subtime < calltime)
692 calltime -= current->ret_stack[index].subtime;
693 else
694 calltime = 0;
695 }
696
cafb168a 697 rec = ftrace_find_profiled_func(stat, trace->func);
e330b3bc 698 if (rec) {
a2a16d6a 699 rec->time += calltime;
e330b3bc
CD
700 rec->time_squared += calltime * calltime;
701 }
a2a16d6a 702
cafb168a 703 out:
0706f1c4
SR
704 local_irq_restore(flags);
705}
706
707static int register_ftrace_profiler(void)
708{
709 return register_ftrace_graph(&profile_graph_return,
710 &profile_graph_entry);
711}
712
713static void unregister_ftrace_profiler(void)
714{
715 unregister_ftrace_graph();
716}
717#else
bac429f0
SR
718static struct ftrace_ops ftrace_profile_ops __read_mostly =
719{
fb9fb015 720 .func = function_profile_call,
bac429f0
SR
721};
722
0706f1c4
SR
723static int register_ftrace_profiler(void)
724{
725 return register_ftrace_function(&ftrace_profile_ops);
726}
727
728static void unregister_ftrace_profiler(void)
729{
730 unregister_ftrace_function(&ftrace_profile_ops);
731}
732#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
733
bac429f0
SR
734static ssize_t
735ftrace_profile_write(struct file *filp, const char __user *ubuf,
736 size_t cnt, loff_t *ppos)
737{
738 unsigned long val;
fb9fb015 739 char buf[64]; /* big enough to hold a number */
bac429f0
SR
740 int ret;
741
bac429f0
SR
742 if (cnt >= sizeof(buf))
743 return -EINVAL;
744
745 if (copy_from_user(&buf, ubuf, cnt))
746 return -EFAULT;
747
748 buf[cnt] = 0;
749
750 ret = strict_strtoul(buf, 10, &val);
751 if (ret < 0)
752 return ret;
753
754 val = !!val;
755
756 mutex_lock(&ftrace_profile_lock);
757 if (ftrace_profile_enabled ^ val) {
758 if (val) {
493762fc
SR
759 ret = ftrace_profile_init();
760 if (ret < 0) {
761 cnt = ret;
762 goto out;
763 }
764
0706f1c4
SR
765 ret = register_ftrace_profiler();
766 if (ret < 0) {
767 cnt = ret;
768 goto out;
769 }
bac429f0
SR
770 ftrace_profile_enabled = 1;
771 } else {
772 ftrace_profile_enabled = 0;
0f6ce3de
SR
773 /*
774 * unregister_ftrace_profiler calls stop_machine
775 * so this acts like an synchronize_sched.
776 */
0706f1c4 777 unregister_ftrace_profiler();
bac429f0
SR
778 }
779 }
493762fc 780 out:
bac429f0
SR
781 mutex_unlock(&ftrace_profile_lock);
782
cf8517cf 783 *ppos += cnt;
bac429f0
SR
784
785 return cnt;
786}
787
493762fc
SR
788static ssize_t
789ftrace_profile_read(struct file *filp, char __user *ubuf,
790 size_t cnt, loff_t *ppos)
791{
fb9fb015 792 char buf[64]; /* big enough to hold a number */
493762fc
SR
793 int r;
794
795 r = sprintf(buf, "%u\n", ftrace_profile_enabled);
796 return simple_read_from_buffer(ubuf, cnt, ppos, buf, r);
797}
798
bac429f0
SR
799static const struct file_operations ftrace_profile_fops = {
800 .open = tracing_open_generic,
801 .read = ftrace_profile_read,
802 .write = ftrace_profile_write,
6038f373 803 .llseek = default_llseek,
bac429f0
SR
804};
805
cafb168a
SR
806/* used to initialize the real stat files */
807static struct tracer_stat function_stats __initdata = {
fb9fb015
SR
808 .name = "functions",
809 .stat_start = function_stat_start,
810 .stat_next = function_stat_next,
811 .stat_cmp = function_stat_cmp,
812 .stat_headers = function_stat_headers,
813 .stat_show = function_stat_show
cafb168a
SR
814};
815
6ab5d668 816static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
bac429f0 817{
cafb168a 818 struct ftrace_profile_stat *stat;
bac429f0 819 struct dentry *entry;
cafb168a 820 char *name;
bac429f0 821 int ret;
cafb168a
SR
822 int cpu;
823
824 for_each_possible_cpu(cpu) {
825 stat = &per_cpu(ftrace_profile_stats, cpu);
826
827 /* allocate enough for function name + cpu number */
828 name = kmalloc(32, GFP_KERNEL);
829 if (!name) {
830 /*
831 * The files created are permanent, if something happens
832 * we still do not free memory.
833 */
cafb168a
SR
834 WARN(1,
835 "Could not allocate stat file for cpu %d\n",
836 cpu);
837 return;
838 }
839 stat->stat = function_stats;
840 snprintf(name, 32, "function%d", cpu);
841 stat->stat.name = name;
842 ret = register_stat_tracer(&stat->stat);
843 if (ret) {
844 WARN(1,
845 "Could not register function stat for cpu %d\n",
846 cpu);
847 kfree(name);
848 return;
849 }
bac429f0
SR
850 }
851
852 entry = debugfs_create_file("function_profile_enabled", 0644,
853 d_tracer, NULL, &ftrace_profile_fops);
854 if (!entry)
855 pr_warning("Could not create debugfs "
856 "'function_profile_enabled' entry\n");
857}
858
bac429f0 859#else /* CONFIG_FUNCTION_PROFILER */
6ab5d668 860static __init void ftrace_profile_debugfs(struct dentry *d_tracer)
bac429f0
SR
861{
862}
bac429f0
SR
863#endif /* CONFIG_FUNCTION_PROFILER */
864
493762fc
SR
865static struct pid * const ftrace_swapper_pid = &init_struct_pid;
866
867#ifdef CONFIG_DYNAMIC_FTRACE
868
869#ifndef CONFIG_FTRACE_MCOUNT_RECORD
870# error Dynamic ftrace depends on MCOUNT_RECORD
871#endif
872
873static struct hlist_head ftrace_func_hash[FTRACE_FUNC_HASHSIZE] __read_mostly;
874
875struct ftrace_func_probe {
876 struct hlist_node node;
877 struct ftrace_probe_ops *ops;
878 unsigned long flags;
879 unsigned long ip;
880 void *data;
881 struct rcu_head rcu;
882};
883
884enum {
885 FTRACE_ENABLE_CALLS = (1 << 0),
886 FTRACE_DISABLE_CALLS = (1 << 1),
887 FTRACE_UPDATE_TRACE_FUNC = (1 << 2),
79e406d7
SR
888 FTRACE_START_FUNC_RET = (1 << 3),
889 FTRACE_STOP_FUNC_RET = (1 << 4),
493762fc
SR
890};
891
892static int ftrace_filtered;
893
894static struct dyn_ftrace *ftrace_new_addrs;
895
896static DEFINE_MUTEX(ftrace_regex_lock);
897
898struct ftrace_page {
899 struct ftrace_page *next;
900 int index;
901 struct dyn_ftrace records[];
902};
903
904#define ENTRIES_PER_PAGE \
905 ((PAGE_SIZE - sizeof(struct ftrace_page)) / sizeof(struct dyn_ftrace))
906
907/* estimate from running different kernels */
908#define NR_TO_INIT 10000
909
910static struct ftrace_page *ftrace_pages_start;
911static struct ftrace_page *ftrace_pages;
912
913static struct dyn_ftrace *ftrace_free_records;
914
915/*
916 * This is a double for. Do not use 'break' to break out of the loop,
917 * you must use a goto.
918 */
919#define do_for_each_ftrace_rec(pg, rec) \
920 for (pg = ftrace_pages_start; pg; pg = pg->next) { \
921 int _____i; \
922 for (_____i = 0; _____i < pg->index; _____i++) { \
923 rec = &pg->records[_____i];
924
925#define while_for_each_ftrace_rec() \
926 } \
927 }
928
e309b41d 929static void ftrace_free_rec(struct dyn_ftrace *rec)
37ad5084 930{
ee000b7f 931 rec->freelist = ftrace_free_records;
37ad5084
SR
932 ftrace_free_records = rec;
933 rec->flags |= FTRACE_FL_FREE;
934}
935
e309b41d 936static struct dyn_ftrace *ftrace_alloc_dyn_node(unsigned long ip)
3c1720f0 937{
37ad5084
SR
938 struct dyn_ftrace *rec;
939
940 /* First check for freed records */
941 if (ftrace_free_records) {
942 rec = ftrace_free_records;
943
37ad5084 944 if (unlikely(!(rec->flags & FTRACE_FL_FREE))) {
6912896e 945 FTRACE_WARN_ON_ONCE(1);
37ad5084
SR
946 ftrace_free_records = NULL;
947 return NULL;
948 }
949
ee000b7f 950 ftrace_free_records = rec->freelist;
37ad5084
SR
951 memset(rec, 0, sizeof(*rec));
952 return rec;
953 }
954
3c1720f0 955 if (ftrace_pages->index == ENTRIES_PER_PAGE) {
08f5ac90
SR
956 if (!ftrace_pages->next) {
957 /* allocate another page */
958 ftrace_pages->next =
959 (void *)get_zeroed_page(GFP_KERNEL);
960 if (!ftrace_pages->next)
961 return NULL;
962 }
3c1720f0
SR
963 ftrace_pages = ftrace_pages->next;
964 }
965
966 return &ftrace_pages->records[ftrace_pages->index++];
967}
968
08f5ac90 969static struct dyn_ftrace *
d61f82d0 970ftrace_record_ip(unsigned long ip)
3d083395 971{
08f5ac90 972 struct dyn_ftrace *rec;
3d083395 973
f3c7ac40 974 if (ftrace_disabled)
08f5ac90 975 return NULL;
3d083395 976
08f5ac90
SR
977 rec = ftrace_alloc_dyn_node(ip);
978 if (!rec)
979 return NULL;
3d083395 980
08f5ac90 981 rec->ip = ip;
ee000b7f 982 rec->newlist = ftrace_new_addrs;
e94142a6 983 ftrace_new_addrs = rec;
3d083395 984
08f5ac90 985 return rec;
3d083395
SR
986}
987
b17e8a37
SR
988static void print_ip_ins(const char *fmt, unsigned char *p)
989{
990 int i;
991
992 printk(KERN_CONT "%s", fmt);
993
994 for (i = 0; i < MCOUNT_INSN_SIZE; i++)
995 printk(KERN_CONT "%s%02x", i ? ":" : "", p[i]);
996}
997
31e88909 998static void ftrace_bug(int failed, unsigned long ip)
b17e8a37
SR
999{
1000 switch (failed) {
1001 case -EFAULT:
1002 FTRACE_WARN_ON_ONCE(1);
1003 pr_info("ftrace faulted on modifying ");
1004 print_ip_sym(ip);
1005 break;
1006 case -EINVAL:
1007 FTRACE_WARN_ON_ONCE(1);
1008 pr_info("ftrace failed to modify ");
1009 print_ip_sym(ip);
b17e8a37 1010 print_ip_ins(" actual: ", (unsigned char *)ip);
b17e8a37
SR
1011 printk(KERN_CONT "\n");
1012 break;
1013 case -EPERM:
1014 FTRACE_WARN_ON_ONCE(1);
1015 pr_info("ftrace faulted on writing ");
1016 print_ip_sym(ip);
1017 break;
1018 default:
1019 FTRACE_WARN_ON_ONCE(1);
1020 pr_info("ftrace faulted on unknown error ");
1021 print_ip_sym(ip);
1022 }
1023}
1024
3c1720f0 1025
2cfa1978
MH
1026/* Return 1 if the address range is reserved for ftrace */
1027int ftrace_text_reserved(void *start, void *end)
1028{
1029 struct dyn_ftrace *rec;
1030 struct ftrace_page *pg;
1031
1032 do_for_each_ftrace_rec(pg, rec) {
1033 if (rec->ip <= (unsigned long)end &&
1034 rec->ip + MCOUNT_INSN_SIZE > (unsigned long)start)
1035 return 1;
1036 } while_for_each_ftrace_rec();
1037 return 0;
1038}
1039
1040
0eb96701 1041static int
31e88909 1042__ftrace_replace_code(struct dyn_ftrace *rec, int enable)
5072c59f 1043{
e7d3737e 1044 unsigned long ftrace_addr;
64fbcd16 1045 unsigned long flag = 0UL;
e7d3737e 1046
f0001207 1047 ftrace_addr = (unsigned long)FTRACE_ADDR;
5072c59f 1048
982c350b 1049 /*
64fbcd16
XG
1050 * If this record is not to be traced or we want to disable it,
1051 * then disable it.
982c350b 1052 *
64fbcd16 1053 * If we want to enable it and filtering is off, then enable it.
982c350b 1054 *
64fbcd16
XG
1055 * If we want to enable it and filtering is on, enable it only if
1056 * it's filtered
982c350b 1057 */
64fbcd16
XG
1058 if (enable && !(rec->flags & FTRACE_FL_NOTRACE)) {
1059 if (!ftrace_filtered || (rec->flags & FTRACE_FL_FILTER))
1060 flag = FTRACE_FL_ENABLED;
1061 }
982c350b 1062
64fbcd16
XG
1063 /* If the state of this record hasn't changed, then do nothing */
1064 if ((rec->flags & FTRACE_FL_ENABLED) == flag)
1065 return 0;
982c350b 1066
64fbcd16
XG
1067 if (flag) {
1068 rec->flags |= FTRACE_FL_ENABLED;
1069 return ftrace_make_call(rec, ftrace_addr);
5072c59f
SR
1070 }
1071
64fbcd16
XG
1072 rec->flags &= ~FTRACE_FL_ENABLED;
1073 return ftrace_make_nop(NULL, rec, ftrace_addr);
5072c59f
SR
1074}
1075
e309b41d 1076static void ftrace_replace_code(int enable)
3c1720f0 1077{
3c1720f0
SR
1078 struct dyn_ftrace *rec;
1079 struct ftrace_page *pg;
6a24a244 1080 int failed;
3c1720f0 1081
265c831c
SR
1082 do_for_each_ftrace_rec(pg, rec) {
1083 /*
fa9d13cf
Z
1084 * Skip over free records, records that have
1085 * failed and not converted.
265c831c
SR
1086 */
1087 if (rec->flags & FTRACE_FL_FREE ||
fa9d13cf 1088 rec->flags & FTRACE_FL_FAILED ||
03303549 1089 !(rec->flags & FTRACE_FL_CONVERTED))
265c831c
SR
1090 continue;
1091
265c831c 1092 failed = __ftrace_replace_code(rec, enable);
fa9d13cf 1093 if (failed) {
265c831c 1094 rec->flags |= FTRACE_FL_FAILED;
3279ba37
SR
1095 ftrace_bug(failed, rec->ip);
1096 /* Stop processing */
1097 return;
3c1720f0 1098 }
265c831c 1099 } while_for_each_ftrace_rec();
3c1720f0
SR
1100}
1101
492a7ea5 1102static int
31e88909 1103ftrace_code_disable(struct module *mod, struct dyn_ftrace *rec)
3c1720f0
SR
1104{
1105 unsigned long ip;
593eb8a2 1106 int ret;
3c1720f0
SR
1107
1108 ip = rec->ip;
1109
25aac9dc 1110 ret = ftrace_make_nop(mod, rec, MCOUNT_ADDR);
593eb8a2 1111 if (ret) {
31e88909 1112 ftrace_bug(ret, ip);
3c1720f0 1113 rec->flags |= FTRACE_FL_FAILED;
492a7ea5 1114 return 0;
37ad5084 1115 }
492a7ea5 1116 return 1;
3c1720f0
SR
1117}
1118
000ab691
SR
1119/*
1120 * archs can override this function if they must do something
1121 * before the modifying code is performed.
1122 */
1123int __weak ftrace_arch_code_modify_prepare(void)
1124{
1125 return 0;
1126}
1127
1128/*
1129 * archs can override this function if they must do something
1130 * after the modifying code is performed.
1131 */
1132int __weak ftrace_arch_code_modify_post_process(void)
1133{
1134 return 0;
1135}
1136
e309b41d 1137static int __ftrace_modify_code(void *data)
3d083395 1138{
d61f82d0
SR
1139 int *command = data;
1140
a3583244 1141 if (*command & FTRACE_ENABLE_CALLS)
d61f82d0 1142 ftrace_replace_code(1);
a3583244 1143 else if (*command & FTRACE_DISABLE_CALLS)
d61f82d0
SR
1144 ftrace_replace_code(0);
1145
1146 if (*command & FTRACE_UPDATE_TRACE_FUNC)
1147 ftrace_update_ftrace_func(ftrace_trace_function);
1148
5a45cfe1
SR
1149 if (*command & FTRACE_START_FUNC_RET)
1150 ftrace_enable_ftrace_graph_caller();
1151 else if (*command & FTRACE_STOP_FUNC_RET)
1152 ftrace_disable_ftrace_graph_caller();
1153
d61f82d0 1154 return 0;
3d083395
SR
1155}
1156
e309b41d 1157static void ftrace_run_update_code(int command)
3d083395 1158{
000ab691
SR
1159 int ret;
1160
1161 ret = ftrace_arch_code_modify_prepare();
1162 FTRACE_WARN_ON(ret);
1163 if (ret)
1164 return;
1165
784e2d76 1166 stop_machine(__ftrace_modify_code, &command, NULL);
000ab691
SR
1167
1168 ret = ftrace_arch_code_modify_post_process();
1169 FTRACE_WARN_ON(ret);
3d083395
SR
1170}
1171
d61f82d0 1172static ftrace_func_t saved_ftrace_func;
60a7ecf4 1173static int ftrace_start_up;
df4fc315
SR
1174
1175static void ftrace_startup_enable(int command)
1176{
1177 if (saved_ftrace_func != ftrace_trace_function) {
1178 saved_ftrace_func = ftrace_trace_function;
1179 command |= FTRACE_UPDATE_TRACE_FUNC;
1180 }
1181
1182 if (!command || !ftrace_enabled)
1183 return;
1184
1185 ftrace_run_update_code(command);
1186}
d61f82d0 1187
5a45cfe1 1188static void ftrace_startup(int command)
3d083395 1189{
4eebcc81
SR
1190 if (unlikely(ftrace_disabled))
1191 return;
1192
60a7ecf4 1193 ftrace_start_up++;
982c350b 1194 command |= FTRACE_ENABLE_CALLS;
d61f82d0 1195
df4fc315 1196 ftrace_startup_enable(command);
3d083395
SR
1197}
1198
5a45cfe1 1199static void ftrace_shutdown(int command)
3d083395 1200{
4eebcc81
SR
1201 if (unlikely(ftrace_disabled))
1202 return;
1203
60a7ecf4 1204 ftrace_start_up--;
9ea1a153
FW
1205 /*
1206 * Just warn in case of unbalance, no need to kill ftrace, it's not
1207 * critical but the ftrace_call callers may be never nopped again after
1208 * further ftrace uses.
1209 */
1210 WARN_ON_ONCE(ftrace_start_up < 0);
1211
60a7ecf4 1212 if (!ftrace_start_up)
d61f82d0 1213 command |= FTRACE_DISABLE_CALLS;
3d083395 1214
d61f82d0
SR
1215 if (saved_ftrace_func != ftrace_trace_function) {
1216 saved_ftrace_func = ftrace_trace_function;
1217 command |= FTRACE_UPDATE_TRACE_FUNC;
1218 }
3d083395 1219
d61f82d0 1220 if (!command || !ftrace_enabled)
e6ea44e9 1221 return;
d61f82d0
SR
1222
1223 ftrace_run_update_code(command);
3d083395
SR
1224}
1225
e309b41d 1226static void ftrace_startup_sysctl(void)
b0fc494f 1227{
4eebcc81
SR
1228 if (unlikely(ftrace_disabled))
1229 return;
1230
d61f82d0
SR
1231 /* Force update next time */
1232 saved_ftrace_func = NULL;
60a7ecf4
SR
1233 /* ftrace_start_up is true if we want ftrace running */
1234 if (ftrace_start_up)
79e406d7 1235 ftrace_run_update_code(FTRACE_ENABLE_CALLS);
b0fc494f
SR
1236}
1237
e309b41d 1238static void ftrace_shutdown_sysctl(void)
b0fc494f 1239{
4eebcc81
SR
1240 if (unlikely(ftrace_disabled))
1241 return;
1242
60a7ecf4
SR
1243 /* ftrace_start_up is true if ftrace is running */
1244 if (ftrace_start_up)
79e406d7 1245 ftrace_run_update_code(FTRACE_DISABLE_CALLS);
b0fc494f
SR
1246}
1247
3d083395
SR
1248static cycle_t ftrace_update_time;
1249static unsigned long ftrace_update_cnt;
1250unsigned long ftrace_update_tot_cnt;
1251
31e88909 1252static int ftrace_update_code(struct module *mod)
3d083395 1253{
e94142a6 1254 struct dyn_ftrace *p;
f22f9a89 1255 cycle_t start, stop;
3d083395 1256
750ed1a4 1257 start = ftrace_now(raw_smp_processor_id());
3d083395
SR
1258 ftrace_update_cnt = 0;
1259
e94142a6 1260 while (ftrace_new_addrs) {
3d083395 1261
08f5ac90
SR
1262 /* If something went wrong, bail without enabling anything */
1263 if (unlikely(ftrace_disabled))
1264 return -1;
f22f9a89 1265
e94142a6 1266 p = ftrace_new_addrs;
ee000b7f 1267 ftrace_new_addrs = p->newlist;
e94142a6 1268 p->flags = 0L;
f22f9a89 1269
5cb084bb
JO
1270 /*
1271 * Do the initial record convertion from mcount jump
1272 * to the NOP instructions.
1273 */
1274 if (!ftrace_code_disable(mod, p)) {
08f5ac90 1275 ftrace_free_rec(p);
5cb084bb
JO
1276 continue;
1277 }
1278
1279 p->flags |= FTRACE_FL_CONVERTED;
1280 ftrace_update_cnt++;
1281
1282 /*
1283 * If the tracing is enabled, go ahead and enable the record.
1284 *
1285 * The reason not to enable the record immediatelly is the
1286 * inherent check of ftrace_make_nop/ftrace_make_call for
1287 * correct previous instructions. Making first the NOP
1288 * conversion puts the module to the correct state, thus
1289 * passing the ftrace_make_call check.
1290 */
1291 if (ftrace_start_up) {
1292 int failed = __ftrace_replace_code(p, 1);
1293 if (failed) {
1294 ftrace_bug(failed, p->ip);
1295 ftrace_free_rec(p);
1296 }
1297 }
3d083395
SR
1298 }
1299
750ed1a4 1300 stop = ftrace_now(raw_smp_processor_id());
3d083395
SR
1301 ftrace_update_time = stop - start;
1302 ftrace_update_tot_cnt += ftrace_update_cnt;
1303
16444a8a
ACM
1304 return 0;
1305}
1306
68bf21aa 1307static int __init ftrace_dyn_table_alloc(unsigned long num_to_init)
3c1720f0
SR
1308{
1309 struct ftrace_page *pg;
1310 int cnt;
1311 int i;
3c1720f0
SR
1312
1313 /* allocate a few pages */
1314 ftrace_pages_start = (void *)get_zeroed_page(GFP_KERNEL);
1315 if (!ftrace_pages_start)
1316 return -1;
1317
1318 /*
1319 * Allocate a few more pages.
1320 *
1321 * TODO: have some parser search vmlinux before
1322 * final linking to find all calls to ftrace.
1323 * Then we can:
1324 * a) know how many pages to allocate.
1325 * and/or
1326 * b) set up the table then.
1327 *
1328 * The dynamic code is still necessary for
1329 * modules.
1330 */
1331
1332 pg = ftrace_pages = ftrace_pages_start;
1333
68bf21aa 1334 cnt = num_to_init / ENTRIES_PER_PAGE;
08f5ac90 1335 pr_info("ftrace: allocating %ld entries in %d pages\n",
5821e1b7 1336 num_to_init, cnt + 1);
3c1720f0
SR
1337
1338 for (i = 0; i < cnt; i++) {
1339 pg->next = (void *)get_zeroed_page(GFP_KERNEL);
1340
1341 /* If we fail, we'll try later anyway */
1342 if (!pg->next)
1343 break;
1344
1345 pg = pg->next;
1346 }
1347
1348 return 0;
1349}
1350
5072c59f
SR
1351enum {
1352 FTRACE_ITER_FILTER = (1 << 0),
689fd8b6 1353 FTRACE_ITER_NOTRACE = (1 << 1),
1354 FTRACE_ITER_FAILURES = (1 << 2),
1355 FTRACE_ITER_PRINTALL = (1 << 3),
1356 FTRACE_ITER_HASH = (1 << 4),
5072c59f
SR
1357};
1358
1359#define FTRACE_BUFF_MAX (KSYM_SYMBOL_LEN+4) /* room for wildcards */
1360
1361struct ftrace_iterator {
98c4fd04 1362 loff_t pos;
4aeb6967
SR
1363 loff_t func_pos;
1364 struct ftrace_page *pg;
1365 struct dyn_ftrace *func;
1366 struct ftrace_func_probe *probe;
1367 struct trace_parser parser;
1368 int hidx;
1369 int idx;
1370 unsigned flags;
5072c59f
SR
1371};
1372
8fc0c701 1373static void *
4aeb6967 1374t_hash_next(struct seq_file *m, loff_t *pos)
8fc0c701
SR
1375{
1376 struct ftrace_iterator *iter = m->private;
4aeb6967 1377 struct hlist_node *hnd = NULL;
8fc0c701
SR
1378 struct hlist_head *hhd;
1379
8fc0c701 1380 (*pos)++;
98c4fd04 1381 iter->pos = *pos;
8fc0c701 1382
4aeb6967
SR
1383 if (iter->probe)
1384 hnd = &iter->probe->node;
8fc0c701
SR
1385 retry:
1386 if (iter->hidx >= FTRACE_FUNC_HASHSIZE)
1387 return NULL;
1388
1389 hhd = &ftrace_func_hash[iter->hidx];
1390
1391 if (hlist_empty(hhd)) {
1392 iter->hidx++;
1393 hnd = NULL;
1394 goto retry;
1395 }
1396
1397 if (!hnd)
1398 hnd = hhd->first;
1399 else {
1400 hnd = hnd->next;
1401 if (!hnd) {
1402 iter->hidx++;
1403 goto retry;
1404 }
1405 }
1406
4aeb6967
SR
1407 if (WARN_ON_ONCE(!hnd))
1408 return NULL;
1409
1410 iter->probe = hlist_entry(hnd, struct ftrace_func_probe, node);
1411
1412 return iter;
8fc0c701
SR
1413}
1414
1415static void *t_hash_start(struct seq_file *m, loff_t *pos)
1416{
1417 struct ftrace_iterator *iter = m->private;
1418 void *p = NULL;
d82d6244
LZ
1419 loff_t l;
1420
2bccfffd
SR
1421 if (iter->func_pos > *pos)
1422 return NULL;
8fc0c701 1423
d82d6244 1424 iter->hidx = 0;
2bccfffd 1425 for (l = 0; l <= (*pos - iter->func_pos); ) {
4aeb6967 1426 p = t_hash_next(m, &l);
d82d6244
LZ
1427 if (!p)
1428 break;
1429 }
4aeb6967
SR
1430 if (!p)
1431 return NULL;
1432
98c4fd04
SR
1433 /* Only set this if we have an item */
1434 iter->flags |= FTRACE_ITER_HASH;
1435
4aeb6967 1436 return iter;
8fc0c701
SR
1437}
1438
4aeb6967
SR
1439static int
1440t_hash_show(struct seq_file *m, struct ftrace_iterator *iter)
8fc0c701 1441{
b6887d79 1442 struct ftrace_func_probe *rec;
8fc0c701 1443
4aeb6967
SR
1444 rec = iter->probe;
1445 if (WARN_ON_ONCE(!rec))
1446 return -EIO;
8fc0c701 1447
809dcf29
SR
1448 if (rec->ops->print)
1449 return rec->ops->print(m, rec->ip, rec->ops, rec->data);
1450
b375a11a 1451 seq_printf(m, "%ps:%ps", (void *)rec->ip, (void *)rec->ops->func);
8fc0c701
SR
1452
1453 if (rec->data)
1454 seq_printf(m, ":%p", rec->data);
1455 seq_putc(m, '\n');
1456
1457 return 0;
1458}
1459
e309b41d 1460static void *
5072c59f
SR
1461t_next(struct seq_file *m, void *v, loff_t *pos)
1462{
1463 struct ftrace_iterator *iter = m->private;
1464 struct dyn_ftrace *rec = NULL;
1465
8fc0c701 1466 if (iter->flags & FTRACE_ITER_HASH)
4aeb6967 1467 return t_hash_next(m, pos);
8fc0c701 1468
5072c59f 1469 (*pos)++;
98c4fd04 1470 iter->pos = *pos;
5072c59f 1471
0c75a3ed 1472 if (iter->flags & FTRACE_ITER_PRINTALL)
57c072c7 1473 return t_hash_start(m, pos);
0c75a3ed 1474
5072c59f
SR
1475 retry:
1476 if (iter->idx >= iter->pg->index) {
1477 if (iter->pg->next) {
1478 iter->pg = iter->pg->next;
1479 iter->idx = 0;
1480 goto retry;
1481 }
1482 } else {
1483 rec = &iter->pg->records[iter->idx++];
a9fdda33
SR
1484 if ((rec->flags & FTRACE_FL_FREE) ||
1485
1486 (!(iter->flags & FTRACE_ITER_FAILURES) &&
eb9a7bf0
AS
1487 (rec->flags & FTRACE_FL_FAILED)) ||
1488
1489 ((iter->flags & FTRACE_ITER_FAILURES) &&
a9fdda33 1490 !(rec->flags & FTRACE_FL_FAILED)) ||
eb9a7bf0 1491
0183fb1c
SR
1492 ((iter->flags & FTRACE_ITER_FILTER) &&
1493 !(rec->flags & FTRACE_FL_FILTER)) ||
1494
41c52c0d
SR
1495 ((iter->flags & FTRACE_ITER_NOTRACE) &&
1496 !(rec->flags & FTRACE_FL_NOTRACE))) {
5072c59f
SR
1497 rec = NULL;
1498 goto retry;
1499 }
1500 }
1501
4aeb6967 1502 if (!rec)
57c072c7 1503 return t_hash_start(m, pos);
4aeb6967 1504
57c072c7 1505 iter->func_pos = *pos;
4aeb6967
SR
1506 iter->func = rec;
1507
1508 return iter;
5072c59f
SR
1509}
1510
98c4fd04
SR
1511static void reset_iter_read(struct ftrace_iterator *iter)
1512{
1513 iter->pos = 0;
1514 iter->func_pos = 0;
1515 iter->flags &= ~(FTRACE_ITER_PRINTALL & FTRACE_ITER_HASH);
5072c59f
SR
1516}
1517
1518static void *t_start(struct seq_file *m, loff_t *pos)
1519{
1520 struct ftrace_iterator *iter = m->private;
1521 void *p = NULL;
694ce0a5 1522 loff_t l;
5072c59f 1523
8fc0c701 1524 mutex_lock(&ftrace_lock);
98c4fd04
SR
1525 /*
1526 * If an lseek was done, then reset and start from beginning.
1527 */
1528 if (*pos < iter->pos)
1529 reset_iter_read(iter);
1530
0c75a3ed
SR
1531 /*
1532 * For set_ftrace_filter reading, if we have the filter
1533 * off, we can short cut and just print out that all
1534 * functions are enabled.
1535 */
1536 if (iter->flags & FTRACE_ITER_FILTER && !ftrace_filtered) {
1537 if (*pos > 0)
8fc0c701 1538 return t_hash_start(m, pos);
0c75a3ed 1539 iter->flags |= FTRACE_ITER_PRINTALL;
df091625
CW
1540 /* reset in case of seek/pread */
1541 iter->flags &= ~FTRACE_ITER_HASH;
0c75a3ed
SR
1542 return iter;
1543 }
1544
8fc0c701
SR
1545 if (iter->flags & FTRACE_ITER_HASH)
1546 return t_hash_start(m, pos);
1547
98c4fd04
SR
1548 /*
1549 * Unfortunately, we need to restart at ftrace_pages_start
1550 * every time we let go of the ftrace_mutex. This is because
1551 * those pointers can change without the lock.
1552 */
694ce0a5
LZ
1553 iter->pg = ftrace_pages_start;
1554 iter->idx = 0;
1555 for (l = 0; l <= *pos; ) {
1556 p = t_next(m, p, &l);
1557 if (!p)
1558 break;
50cdaf08 1559 }
5821e1b7 1560
4aeb6967
SR
1561 if (!p) {
1562 if (iter->flags & FTRACE_ITER_FILTER)
1563 return t_hash_start(m, pos);
8fc0c701 1564
4aeb6967
SR
1565 return NULL;
1566 }
1567
1568 return iter;
5072c59f
SR
1569}
1570
1571static void t_stop(struct seq_file *m, void *p)
1572{
8fc0c701 1573 mutex_unlock(&ftrace_lock);
5072c59f
SR
1574}
1575
1576static int t_show(struct seq_file *m, void *v)
1577{
0c75a3ed 1578 struct ftrace_iterator *iter = m->private;
4aeb6967 1579 struct dyn_ftrace *rec;
5072c59f 1580
8fc0c701 1581 if (iter->flags & FTRACE_ITER_HASH)
4aeb6967 1582 return t_hash_show(m, iter);
8fc0c701 1583
0c75a3ed
SR
1584 if (iter->flags & FTRACE_ITER_PRINTALL) {
1585 seq_printf(m, "#### all functions enabled ####\n");
1586 return 0;
1587 }
1588
4aeb6967
SR
1589 rec = iter->func;
1590
5072c59f
SR
1591 if (!rec)
1592 return 0;
1593
b375a11a 1594 seq_printf(m, "%ps\n", (void *)rec->ip);
5072c59f
SR
1595
1596 return 0;
1597}
1598
88e9d34c 1599static const struct seq_operations show_ftrace_seq_ops = {
5072c59f
SR
1600 .start = t_start,
1601 .next = t_next,
1602 .stop = t_stop,
1603 .show = t_show,
1604};
1605
e309b41d 1606static int
5072c59f
SR
1607ftrace_avail_open(struct inode *inode, struct file *file)
1608{
1609 struct ftrace_iterator *iter;
1610 int ret;
1611
4eebcc81
SR
1612 if (unlikely(ftrace_disabled))
1613 return -ENODEV;
1614
5072c59f
SR
1615 iter = kzalloc(sizeof(*iter), GFP_KERNEL);
1616 if (!iter)
1617 return -ENOMEM;
1618
1619 iter->pg = ftrace_pages_start;
5072c59f
SR
1620
1621 ret = seq_open(file, &show_ftrace_seq_ops);
1622 if (!ret) {
1623 struct seq_file *m = file->private_data;
4bf39a94 1624
5072c59f 1625 m->private = iter;
4bf39a94 1626 } else {
5072c59f 1627 kfree(iter);
4bf39a94 1628 }
5072c59f
SR
1629
1630 return ret;
1631}
1632
eb9a7bf0
AS
1633static int
1634ftrace_failures_open(struct inode *inode, struct file *file)
1635{
1636 int ret;
1637 struct seq_file *m;
1638 struct ftrace_iterator *iter;
1639
1640 ret = ftrace_avail_open(inode, file);
1641 if (!ret) {
907f2784 1642 m = file->private_data;
1643 iter = m->private;
eb9a7bf0
AS
1644 iter->flags = FTRACE_ITER_FAILURES;
1645 }
1646
1647 return ret;
1648}
1649
1650
41c52c0d 1651static void ftrace_filter_reset(int enable)
5072c59f
SR
1652{
1653 struct ftrace_page *pg;
1654 struct dyn_ftrace *rec;
41c52c0d 1655 unsigned long type = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
5072c59f 1656
52baf119 1657 mutex_lock(&ftrace_lock);
41c52c0d
SR
1658 if (enable)
1659 ftrace_filtered = 0;
265c831c
SR
1660 do_for_each_ftrace_rec(pg, rec) {
1661 if (rec->flags & FTRACE_FL_FAILED)
1662 continue;
1663 rec->flags &= ~type;
1664 } while_for_each_ftrace_rec();
52baf119 1665 mutex_unlock(&ftrace_lock);
5072c59f
SR
1666}
1667
e309b41d 1668static int
41c52c0d 1669ftrace_regex_open(struct inode *inode, struct file *file, int enable)
5072c59f
SR
1670{
1671 struct ftrace_iterator *iter;
1672 int ret = 0;
1673
4eebcc81
SR
1674 if (unlikely(ftrace_disabled))
1675 return -ENODEV;
1676
5072c59f
SR
1677 iter = kzalloc(sizeof(*iter), GFP_KERNEL);
1678 if (!iter)
1679 return -ENOMEM;
1680
689fd8b6 1681 if (trace_parser_get_init(&iter->parser, FTRACE_BUFF_MAX)) {
1682 kfree(iter);
1683 return -ENOMEM;
1684 }
1685
41c52c0d 1686 mutex_lock(&ftrace_regex_lock);
5072c59f 1687 if ((file->f_mode & FMODE_WRITE) &&
8650ae32 1688 (file->f_flags & O_TRUNC))
41c52c0d 1689 ftrace_filter_reset(enable);
5072c59f
SR
1690
1691 if (file->f_mode & FMODE_READ) {
1692 iter->pg = ftrace_pages_start;
41c52c0d
SR
1693 iter->flags = enable ? FTRACE_ITER_FILTER :
1694 FTRACE_ITER_NOTRACE;
5072c59f
SR
1695
1696 ret = seq_open(file, &show_ftrace_seq_ops);
1697 if (!ret) {
1698 struct seq_file *m = file->private_data;
1699 m->private = iter;
79fe249c
LZ
1700 } else {
1701 trace_parser_put(&iter->parser);
5072c59f 1702 kfree(iter);
79fe249c 1703 }
5072c59f
SR
1704 } else
1705 file->private_data = iter;
41c52c0d 1706 mutex_unlock(&ftrace_regex_lock);
5072c59f
SR
1707
1708 return ret;
1709}
1710
41c52c0d
SR
1711static int
1712ftrace_filter_open(struct inode *inode, struct file *file)
1713{
1714 return ftrace_regex_open(inode, file, 1);
1715}
1716
1717static int
1718ftrace_notrace_open(struct inode *inode, struct file *file)
1719{
1720 return ftrace_regex_open(inode, file, 0);
1721}
1722
e309b41d 1723static loff_t
41c52c0d 1724ftrace_regex_lseek(struct file *file, loff_t offset, int origin)
5072c59f
SR
1725{
1726 loff_t ret;
1727
1728 if (file->f_mode & FMODE_READ)
1729 ret = seq_lseek(file, offset, origin);
1730 else
1731 file->f_pos = ret = 1;
1732
1733 return ret;
1734}
1735
64e7c440 1736static int ftrace_match(char *str, char *regex, int len, int type)
9f4801e3 1737{
9f4801e3 1738 int matched = 0;
751e9983 1739 int slen;
9f4801e3 1740
9f4801e3
SR
1741 switch (type) {
1742 case MATCH_FULL:
1743 if (strcmp(str, regex) == 0)
1744 matched = 1;
1745 break;
1746 case MATCH_FRONT_ONLY:
1747 if (strncmp(str, regex, len) == 0)
1748 matched = 1;
1749 break;
1750 case MATCH_MIDDLE_ONLY:
1751 if (strstr(str, regex))
1752 matched = 1;
1753 break;
1754 case MATCH_END_ONLY:
751e9983
LZ
1755 slen = strlen(str);
1756 if (slen >= len && memcmp(str + slen - len, regex, len) == 0)
9f4801e3
SR
1757 matched = 1;
1758 break;
1759 }
1760
1761 return matched;
1762}
1763
64e7c440
SR
1764static int
1765ftrace_match_record(struct dyn_ftrace *rec, char *regex, int len, int type)
1766{
1767 char str[KSYM_SYMBOL_LEN];
1768
1769 kallsyms_lookup(rec->ip, NULL, NULL, NULL, str);
1770 return ftrace_match(str, regex, len, type);
1771}
1772
311d16da 1773static int ftrace_match_records(char *buff, int len, int enable)
9f4801e3 1774{
6a24a244 1775 unsigned int search_len;
9f4801e3
SR
1776 struct ftrace_page *pg;
1777 struct dyn_ftrace *rec;
6a24a244
SR
1778 unsigned long flag;
1779 char *search;
9f4801e3 1780 int type;
9f4801e3 1781 int not;
311d16da 1782 int found = 0;
9f4801e3 1783
6a24a244 1784 flag = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
3f6fe06d 1785 type = filter_parse_regex(buff, len, &search, &not);
9f4801e3
SR
1786
1787 search_len = strlen(search);
1788
52baf119 1789 mutex_lock(&ftrace_lock);
265c831c 1790 do_for_each_ftrace_rec(pg, rec) {
265c831c
SR
1791
1792 if (rec->flags & FTRACE_FL_FAILED)
1793 continue;
9f4801e3
SR
1794
1795 if (ftrace_match_record(rec, search, search_len, type)) {
265c831c
SR
1796 if (not)
1797 rec->flags &= ~flag;
1798 else
1799 rec->flags |= flag;
311d16da 1800 found = 1;
265c831c 1801 }
e68746a2
SR
1802 /*
1803 * Only enable filtering if we have a function that
1804 * is filtered on.
1805 */
1806 if (enable && (rec->flags & FTRACE_FL_FILTER))
1807 ftrace_filtered = 1;
265c831c 1808 } while_for_each_ftrace_rec();
52baf119 1809 mutex_unlock(&ftrace_lock);
311d16da
LZ
1810
1811 return found;
5072c59f
SR
1812}
1813
64e7c440
SR
1814static int
1815ftrace_match_module_record(struct dyn_ftrace *rec, char *mod,
1816 char *regex, int len, int type)
1817{
1818 char str[KSYM_SYMBOL_LEN];
1819 char *modname;
1820
1821 kallsyms_lookup(rec->ip, NULL, NULL, &modname, str);
1822
1823 if (!modname || strcmp(modname, mod))
1824 return 0;
1825
1826 /* blank search means to match all funcs in the mod */
1827 if (len)
1828 return ftrace_match(str, regex, len, type);
1829 else
1830 return 1;
1831}
1832
311d16da 1833static int ftrace_match_module_records(char *buff, char *mod, int enable)
64e7c440 1834{
6a24a244 1835 unsigned search_len = 0;
64e7c440
SR
1836 struct ftrace_page *pg;
1837 struct dyn_ftrace *rec;
1838 int type = MATCH_FULL;
6a24a244
SR
1839 char *search = buff;
1840 unsigned long flag;
64e7c440 1841 int not = 0;
311d16da 1842 int found = 0;
64e7c440 1843
6a24a244
SR
1844 flag = enable ? FTRACE_FL_FILTER : FTRACE_FL_NOTRACE;
1845
64e7c440
SR
1846 /* blank or '*' mean the same */
1847 if (strcmp(buff, "*") == 0)
1848 buff[0] = 0;
1849
1850 /* handle the case of 'dont filter this module' */
1851 if (strcmp(buff, "!") == 0 || strcmp(buff, "!*") == 0) {
1852 buff[0] = 0;
1853 not = 1;
1854 }
1855
1856 if (strlen(buff)) {
3f6fe06d 1857 type = filter_parse_regex(buff, strlen(buff), &search, &not);
64e7c440
SR
1858 search_len = strlen(search);
1859 }
1860
52baf119 1861 mutex_lock(&ftrace_lock);
64e7c440
SR
1862 do_for_each_ftrace_rec(pg, rec) {
1863
1864 if (rec->flags & FTRACE_FL_FAILED)
1865 continue;
1866
1867 if (ftrace_match_module_record(rec, mod,
1868 search, search_len, type)) {
1869 if (not)
1870 rec->flags &= ~flag;
1871 else
1872 rec->flags |= flag;
311d16da 1873 found = 1;
64e7c440 1874 }
e68746a2
SR
1875 if (enable && (rec->flags & FTRACE_FL_FILTER))
1876 ftrace_filtered = 1;
64e7c440
SR
1877
1878 } while_for_each_ftrace_rec();
52baf119 1879 mutex_unlock(&ftrace_lock);
311d16da
LZ
1880
1881 return found;
64e7c440
SR
1882}
1883
f6180773
SR
1884/*
1885 * We register the module command as a template to show others how
1886 * to register the a command as well.
1887 */
1888
1889static int
1890ftrace_mod_callback(char *func, char *cmd, char *param, int enable)
1891{
1892 char *mod;
1893
1894 /*
1895 * cmd == 'mod' because we only registered this func
1896 * for the 'mod' ftrace_func_command.
1897 * But if you register one func with multiple commands,
1898 * you can tell which command was used by the cmd
1899 * parameter.
1900 */
1901
1902 /* we must have a module name */
1903 if (!param)
1904 return -EINVAL;
1905
1906 mod = strsep(&param, ":");
1907 if (!strlen(mod))
1908 return -EINVAL;
1909
311d16da
LZ
1910 if (ftrace_match_module_records(func, mod, enable))
1911 return 0;
1912 return -EINVAL;
f6180773
SR
1913}
1914
1915static struct ftrace_func_command ftrace_mod_cmd = {
1916 .name = "mod",
1917 .func = ftrace_mod_callback,
1918};
1919
1920static int __init ftrace_mod_cmd_init(void)
1921{
1922 return register_ftrace_command(&ftrace_mod_cmd);
1923}
1924device_initcall(ftrace_mod_cmd_init);
1925
59df055f 1926static void
b6887d79 1927function_trace_probe_call(unsigned long ip, unsigned long parent_ip)
59df055f 1928{
b6887d79 1929 struct ftrace_func_probe *entry;
59df055f
SR
1930 struct hlist_head *hhd;
1931 struct hlist_node *n;
1932 unsigned long key;
59df055f
SR
1933
1934 key = hash_long(ip, FTRACE_HASH_BITS);
1935
1936 hhd = &ftrace_func_hash[key];
1937
1938 if (hlist_empty(hhd))
1939 return;
1940
1941 /*
1942 * Disable preemption for these calls to prevent a RCU grace
1943 * period. This syncs the hash iteration and freeing of items
1944 * on the hash. rcu_read_lock is too dangerous here.
1945 */
5168ae50 1946 preempt_disable_notrace();
59df055f
SR
1947 hlist_for_each_entry_rcu(entry, n, hhd, node) {
1948 if (entry->ip == ip)
1949 entry->ops->func(ip, parent_ip, &entry->data);
1950 }
5168ae50 1951 preempt_enable_notrace();
59df055f
SR
1952}
1953
b6887d79 1954static struct ftrace_ops trace_probe_ops __read_mostly =
59df055f 1955{
fb9fb015 1956 .func = function_trace_probe_call,
59df055f
SR
1957};
1958
b6887d79 1959static int ftrace_probe_registered;
59df055f 1960
b6887d79 1961static void __enable_ftrace_function_probe(void)
59df055f
SR
1962{
1963 int i;
1964
b6887d79 1965 if (ftrace_probe_registered)
59df055f
SR
1966 return;
1967
1968 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
1969 struct hlist_head *hhd = &ftrace_func_hash[i];
1970 if (hhd->first)
1971 break;
1972 }
1973 /* Nothing registered? */
1974 if (i == FTRACE_FUNC_HASHSIZE)
1975 return;
1976
b6887d79 1977 __register_ftrace_function(&trace_probe_ops);
59df055f 1978 ftrace_startup(0);
b6887d79 1979 ftrace_probe_registered = 1;
59df055f
SR
1980}
1981
b6887d79 1982static void __disable_ftrace_function_probe(void)
59df055f
SR
1983{
1984 int i;
1985
b6887d79 1986 if (!ftrace_probe_registered)
59df055f
SR
1987 return;
1988
1989 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
1990 struct hlist_head *hhd = &ftrace_func_hash[i];
1991 if (hhd->first)
1992 return;
1993 }
1994
1995 /* no more funcs left */
b6887d79 1996 __unregister_ftrace_function(&trace_probe_ops);
59df055f 1997 ftrace_shutdown(0);
b6887d79 1998 ftrace_probe_registered = 0;
59df055f
SR
1999}
2000
2001
2002static void ftrace_free_entry_rcu(struct rcu_head *rhp)
2003{
b6887d79
SR
2004 struct ftrace_func_probe *entry =
2005 container_of(rhp, struct ftrace_func_probe, rcu);
59df055f
SR
2006
2007 if (entry->ops->free)
2008 entry->ops->free(&entry->data);
2009 kfree(entry);
2010}
2011
2012
2013int
b6887d79 2014register_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
2015 void *data)
2016{
b6887d79 2017 struct ftrace_func_probe *entry;
59df055f
SR
2018 struct ftrace_page *pg;
2019 struct dyn_ftrace *rec;
59df055f 2020 int type, len, not;
6a24a244 2021 unsigned long key;
59df055f
SR
2022 int count = 0;
2023 char *search;
2024
3f6fe06d 2025 type = filter_parse_regex(glob, strlen(glob), &search, &not);
59df055f
SR
2026 len = strlen(search);
2027
b6887d79 2028 /* we do not support '!' for function probes */
59df055f
SR
2029 if (WARN_ON(not))
2030 return -EINVAL;
2031
2032 mutex_lock(&ftrace_lock);
2033 do_for_each_ftrace_rec(pg, rec) {
2034
2035 if (rec->flags & FTRACE_FL_FAILED)
2036 continue;
2037
2038 if (!ftrace_match_record(rec, search, len, type))
2039 continue;
2040
2041 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
2042 if (!entry) {
b6887d79 2043 /* If we did not process any, then return error */
59df055f
SR
2044 if (!count)
2045 count = -ENOMEM;
2046 goto out_unlock;
2047 }
2048
2049 count++;
2050
2051 entry->data = data;
2052
2053 /*
2054 * The caller might want to do something special
2055 * for each function we find. We call the callback
2056 * to give the caller an opportunity to do so.
2057 */
2058 if (ops->callback) {
2059 if (ops->callback(rec->ip, &entry->data) < 0) {
2060 /* caller does not like this func */
2061 kfree(entry);
2062 continue;
2063 }
2064 }
2065
2066 entry->ops = ops;
2067 entry->ip = rec->ip;
2068
2069 key = hash_long(entry->ip, FTRACE_HASH_BITS);
2070 hlist_add_head_rcu(&entry->node, &ftrace_func_hash[key]);
2071
2072 } while_for_each_ftrace_rec();
b6887d79 2073 __enable_ftrace_function_probe();
59df055f
SR
2074
2075 out_unlock:
2076 mutex_unlock(&ftrace_lock);
2077
2078 return count;
2079}
2080
2081enum {
b6887d79
SR
2082 PROBE_TEST_FUNC = 1,
2083 PROBE_TEST_DATA = 2
59df055f
SR
2084};
2085
2086static void
b6887d79 2087__unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
2088 void *data, int flags)
2089{
b6887d79 2090 struct ftrace_func_probe *entry;
59df055f
SR
2091 struct hlist_node *n, *tmp;
2092 char str[KSYM_SYMBOL_LEN];
2093 int type = MATCH_FULL;
2094 int i, len = 0;
2095 char *search;
2096
b36461da 2097 if (glob && (strcmp(glob, "*") == 0 || !strlen(glob)))
59df055f 2098 glob = NULL;
b36461da 2099 else if (glob) {
59df055f
SR
2100 int not;
2101
3f6fe06d 2102 type = filter_parse_regex(glob, strlen(glob), &search, &not);
59df055f
SR
2103 len = strlen(search);
2104
b6887d79 2105 /* we do not support '!' for function probes */
59df055f
SR
2106 if (WARN_ON(not))
2107 return;
2108 }
2109
2110 mutex_lock(&ftrace_lock);
2111 for (i = 0; i < FTRACE_FUNC_HASHSIZE; i++) {
2112 struct hlist_head *hhd = &ftrace_func_hash[i];
2113
2114 hlist_for_each_entry_safe(entry, n, tmp, hhd, node) {
2115
2116 /* break up if statements for readability */
b6887d79 2117 if ((flags & PROBE_TEST_FUNC) && entry->ops != ops)
59df055f
SR
2118 continue;
2119
b6887d79 2120 if ((flags & PROBE_TEST_DATA) && entry->data != data)
59df055f
SR
2121 continue;
2122
2123 /* do this last, since it is the most expensive */
2124 if (glob) {
2125 kallsyms_lookup(entry->ip, NULL, NULL,
2126 NULL, str);
2127 if (!ftrace_match(str, glob, len, type))
2128 continue;
2129 }
2130
2131 hlist_del(&entry->node);
2132 call_rcu(&entry->rcu, ftrace_free_entry_rcu);
2133 }
2134 }
b6887d79 2135 __disable_ftrace_function_probe();
59df055f
SR
2136 mutex_unlock(&ftrace_lock);
2137}
2138
2139void
b6887d79 2140unregister_ftrace_function_probe(char *glob, struct ftrace_probe_ops *ops,
59df055f
SR
2141 void *data)
2142{
b6887d79
SR
2143 __unregister_ftrace_function_probe(glob, ops, data,
2144 PROBE_TEST_FUNC | PROBE_TEST_DATA);
59df055f
SR
2145}
2146
2147void
b6887d79 2148unregister_ftrace_function_probe_func(char *glob, struct ftrace_probe_ops *ops)
59df055f 2149{
b6887d79 2150 __unregister_ftrace_function_probe(glob, ops, NULL, PROBE_TEST_FUNC);
59df055f
SR
2151}
2152
b6887d79 2153void unregister_ftrace_function_probe_all(char *glob)
59df055f 2154{
b6887d79 2155 __unregister_ftrace_function_probe(glob, NULL, NULL, 0);
59df055f
SR
2156}
2157
f6180773
SR
2158static LIST_HEAD(ftrace_commands);
2159static DEFINE_MUTEX(ftrace_cmd_mutex);
2160
2161int register_ftrace_command(struct ftrace_func_command *cmd)
2162{
2163 struct ftrace_func_command *p;
2164 int ret = 0;
2165
2166 mutex_lock(&ftrace_cmd_mutex);
2167 list_for_each_entry(p, &ftrace_commands, list) {
2168 if (strcmp(cmd->name, p->name) == 0) {
2169 ret = -EBUSY;
2170 goto out_unlock;
2171 }
2172 }
2173 list_add(&cmd->list, &ftrace_commands);
2174 out_unlock:
2175 mutex_unlock(&ftrace_cmd_mutex);
2176
2177 return ret;
2178}
2179
2180int unregister_ftrace_command(struct ftrace_func_command *cmd)
2181{
2182 struct ftrace_func_command *p, *n;
2183 int ret = -ENODEV;
2184
2185 mutex_lock(&ftrace_cmd_mutex);
2186 list_for_each_entry_safe(p, n, &ftrace_commands, list) {
2187 if (strcmp(cmd->name, p->name) == 0) {
2188 ret = 0;
2189 list_del_init(&p->list);
2190 goto out_unlock;
2191 }
2192 }
2193 out_unlock:
2194 mutex_unlock(&ftrace_cmd_mutex);
2195
2196 return ret;
2197}
2198
64e7c440
SR
2199static int ftrace_process_regex(char *buff, int len, int enable)
2200{
f6180773 2201 char *func, *command, *next = buff;
6a24a244 2202 struct ftrace_func_command *p;
f6180773 2203 int ret = -EINVAL;
64e7c440
SR
2204
2205 func = strsep(&next, ":");
2206
2207 if (!next) {
311d16da
LZ
2208 if (ftrace_match_records(func, len, enable))
2209 return 0;
2210 return ret;
64e7c440
SR
2211 }
2212
f6180773 2213 /* command found */
64e7c440
SR
2214
2215 command = strsep(&next, ":");
2216
f6180773
SR
2217 mutex_lock(&ftrace_cmd_mutex);
2218 list_for_each_entry(p, &ftrace_commands, list) {
2219 if (strcmp(p->name, command) == 0) {
2220 ret = p->func(func, command, next, enable);
2221 goto out_unlock;
2222 }
64e7c440 2223 }
f6180773
SR
2224 out_unlock:
2225 mutex_unlock(&ftrace_cmd_mutex);
64e7c440 2226
f6180773 2227 return ret;
64e7c440
SR
2228}
2229
e309b41d 2230static ssize_t
41c52c0d
SR
2231ftrace_regex_write(struct file *file, const char __user *ubuf,
2232 size_t cnt, loff_t *ppos, int enable)
5072c59f
SR
2233{
2234 struct ftrace_iterator *iter;
689fd8b6 2235 struct trace_parser *parser;
2236 ssize_t ret, read;
5072c59f 2237
4ba7978e 2238 if (!cnt)
5072c59f
SR
2239 return 0;
2240
41c52c0d 2241 mutex_lock(&ftrace_regex_lock);
5072c59f
SR
2242
2243 if (file->f_mode & FMODE_READ) {
2244 struct seq_file *m = file->private_data;
2245 iter = m->private;
2246 } else
2247 iter = file->private_data;
2248
689fd8b6 2249 parser = &iter->parser;
2250 read = trace_get_user(parser, ubuf, cnt, ppos);
5072c59f 2251
4ba7978e 2252 if (read >= 0 && trace_parser_loaded(parser) &&
689fd8b6 2253 !trace_parser_cont(parser)) {
2254 ret = ftrace_process_regex(parser->buffer,
2255 parser->idx, enable);
313254a9 2256 trace_parser_clear(parser);
5072c59f 2257 if (ret)
ed146b25 2258 goto out_unlock;
eda1e328 2259 }
5072c59f 2260
5072c59f 2261 ret = read;
ed146b25 2262out_unlock:
689fd8b6 2263 mutex_unlock(&ftrace_regex_lock);
ed146b25 2264
5072c59f
SR
2265 return ret;
2266}
2267
41c52c0d
SR
2268static ssize_t
2269ftrace_filter_write(struct file *file, const char __user *ubuf,
2270 size_t cnt, loff_t *ppos)
2271{
2272 return ftrace_regex_write(file, ubuf, cnt, ppos, 1);
2273}
2274
2275static ssize_t
2276ftrace_notrace_write(struct file *file, const char __user *ubuf,
2277 size_t cnt, loff_t *ppos)
2278{
2279 return ftrace_regex_write(file, ubuf, cnt, ppos, 0);
2280}
2281
2282static void
2283ftrace_set_regex(unsigned char *buf, int len, int reset, int enable)
2284{
2285 if (unlikely(ftrace_disabled))
2286 return;
2287
2288 mutex_lock(&ftrace_regex_lock);
2289 if (reset)
2290 ftrace_filter_reset(enable);
2291 if (buf)
7f24b31b 2292 ftrace_match_records(buf, len, enable);
41c52c0d
SR
2293 mutex_unlock(&ftrace_regex_lock);
2294}
2295
77a2b37d
SR
2296/**
2297 * ftrace_set_filter - set a function to filter on in ftrace
2298 * @buf - the string that holds the function filter text.
2299 * @len - the length of the string.
2300 * @reset - non zero to reset all filters before applying this filter.
2301 *
2302 * Filters denote which functions should be enabled when tracing is enabled.
2303 * If @buf is NULL and reset is set, all functions will be enabled for tracing.
2304 */
e309b41d 2305void ftrace_set_filter(unsigned char *buf, int len, int reset)
77a2b37d 2306{
41c52c0d
SR
2307 ftrace_set_regex(buf, len, reset, 1);
2308}
4eebcc81 2309
41c52c0d
SR
2310/**
2311 * ftrace_set_notrace - set a function to not trace in ftrace
2312 * @buf - the string that holds the function notrace text.
2313 * @len - the length of the string.
2314 * @reset - non zero to reset all filters before applying this filter.
2315 *
2316 * Notrace Filters denote which functions should not be enabled when tracing
2317 * is enabled. If @buf is NULL and reset is set, all functions will be enabled
2318 * for tracing.
2319 */
2320void ftrace_set_notrace(unsigned char *buf, int len, int reset)
2321{
2322 ftrace_set_regex(buf, len, reset, 0);
77a2b37d
SR
2323}
2324
2af15d6a
SR
2325/*
2326 * command line interface to allow users to set filters on boot up.
2327 */
2328#define FTRACE_FILTER_SIZE COMMAND_LINE_SIZE
2329static char ftrace_notrace_buf[FTRACE_FILTER_SIZE] __initdata;
2330static char ftrace_filter_buf[FTRACE_FILTER_SIZE] __initdata;
2331
2332static int __init set_ftrace_notrace(char *str)
2333{
2334 strncpy(ftrace_notrace_buf, str, FTRACE_FILTER_SIZE);
2335 return 1;
2336}
2337__setup("ftrace_notrace=", set_ftrace_notrace);
2338
2339static int __init set_ftrace_filter(char *str)
2340{
2341 strncpy(ftrace_filter_buf, str, FTRACE_FILTER_SIZE);
2342 return 1;
2343}
2344__setup("ftrace_filter=", set_ftrace_filter);
2345
369bc18f 2346#ifdef CONFIG_FUNCTION_GRAPH_TRACER
f6060f46 2347static char ftrace_graph_buf[FTRACE_FILTER_SIZE] __initdata;
801c29fd
SR
2348static int ftrace_set_func(unsigned long *array, int *idx, char *buffer);
2349
369bc18f
SA
2350static int __init set_graph_function(char *str)
2351{
06f43d66 2352 strlcpy(ftrace_graph_buf, str, FTRACE_FILTER_SIZE);
369bc18f
SA
2353 return 1;
2354}
2355__setup("ftrace_graph_filter=", set_graph_function);
2356
2357static void __init set_ftrace_early_graph(char *buf)
2358{
2359 int ret;
2360 char *func;
2361
2362 while (buf) {
2363 func = strsep(&buf, ",");
2364 /* we allow only one expression at a time */
2365 ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
2366 func);
2367 if (ret)
2368 printk(KERN_DEBUG "ftrace: function %s not "
2369 "traceable\n", func);
2370 }
2371}
2372#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2373
2af15d6a
SR
2374static void __init set_ftrace_early_filter(char *buf, int enable)
2375{
2376 char *func;
2377
2378 while (buf) {
2379 func = strsep(&buf, ",");
2380 ftrace_set_regex(func, strlen(func), 0, enable);
2381 }
2382}
2383
2384static void __init set_ftrace_early_filters(void)
2385{
2386 if (ftrace_filter_buf[0])
2387 set_ftrace_early_filter(ftrace_filter_buf, 1);
2388 if (ftrace_notrace_buf[0])
2389 set_ftrace_early_filter(ftrace_notrace_buf, 0);
369bc18f
SA
2390#ifdef CONFIG_FUNCTION_GRAPH_TRACER
2391 if (ftrace_graph_buf[0])
2392 set_ftrace_early_graph(ftrace_graph_buf);
2393#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2af15d6a
SR
2394}
2395
e309b41d 2396static int
41c52c0d 2397ftrace_regex_release(struct inode *inode, struct file *file, int enable)
5072c59f
SR
2398{
2399 struct seq_file *m = (struct seq_file *)file->private_data;
2400 struct ftrace_iterator *iter;
689fd8b6 2401 struct trace_parser *parser;
5072c59f 2402
41c52c0d 2403 mutex_lock(&ftrace_regex_lock);
5072c59f
SR
2404 if (file->f_mode & FMODE_READ) {
2405 iter = m->private;
2406
2407 seq_release(inode, file);
2408 } else
2409 iter = file->private_data;
2410
689fd8b6 2411 parser = &iter->parser;
2412 if (trace_parser_loaded(parser)) {
2413 parser->buffer[parser->idx] = 0;
2414 ftrace_match_records(parser->buffer, parser->idx, enable);
5072c59f
SR
2415 }
2416
e6ea44e9 2417 mutex_lock(&ftrace_lock);
ee02a2e5 2418 if (ftrace_start_up && ftrace_enabled)
5072c59f 2419 ftrace_run_update_code(FTRACE_ENABLE_CALLS);
e6ea44e9 2420 mutex_unlock(&ftrace_lock);
5072c59f 2421
689fd8b6 2422 trace_parser_put(parser);
5072c59f 2423 kfree(iter);
689fd8b6 2424
41c52c0d 2425 mutex_unlock(&ftrace_regex_lock);
5072c59f
SR
2426 return 0;
2427}
2428
41c52c0d
SR
2429static int
2430ftrace_filter_release(struct inode *inode, struct file *file)
2431{
2432 return ftrace_regex_release(inode, file, 1);
2433}
2434
2435static int
2436ftrace_notrace_release(struct inode *inode, struct file *file)
2437{
2438 return ftrace_regex_release(inode, file, 0);
2439}
2440
5e2336a0 2441static const struct file_operations ftrace_avail_fops = {
5072c59f
SR
2442 .open = ftrace_avail_open,
2443 .read = seq_read,
2444 .llseek = seq_lseek,
3be04b47 2445 .release = seq_release_private,
5072c59f
SR
2446};
2447
5e2336a0 2448static const struct file_operations ftrace_failures_fops = {
eb9a7bf0
AS
2449 .open = ftrace_failures_open,
2450 .read = seq_read,
2451 .llseek = seq_lseek,
3be04b47 2452 .release = seq_release_private,
eb9a7bf0
AS
2453};
2454
5e2336a0 2455static const struct file_operations ftrace_filter_fops = {
5072c59f 2456 .open = ftrace_filter_open,
850a80cf 2457 .read = seq_read,
5072c59f 2458 .write = ftrace_filter_write,
98c4fd04 2459 .llseek = ftrace_regex_lseek,
5072c59f
SR
2460 .release = ftrace_filter_release,
2461};
2462
5e2336a0 2463static const struct file_operations ftrace_notrace_fops = {
41c52c0d 2464 .open = ftrace_notrace_open,
850a80cf 2465 .read = seq_read,
41c52c0d
SR
2466 .write = ftrace_notrace_write,
2467 .llseek = ftrace_regex_lseek,
2468 .release = ftrace_notrace_release,
2469};
2470
ea4e2bc4
SR
2471#ifdef CONFIG_FUNCTION_GRAPH_TRACER
2472
2473static DEFINE_MUTEX(graph_lock);
2474
2475int ftrace_graph_count;
c7c6b1fe 2476int ftrace_graph_filter_enabled;
ea4e2bc4
SR
2477unsigned long ftrace_graph_funcs[FTRACE_GRAPH_MAX_FUNCS] __read_mostly;
2478
2479static void *
85951842 2480__g_next(struct seq_file *m, loff_t *pos)
ea4e2bc4 2481{
85951842 2482 if (*pos >= ftrace_graph_count)
ea4e2bc4 2483 return NULL;
a4ec5e0c 2484 return &ftrace_graph_funcs[*pos];
85951842 2485}
ea4e2bc4 2486
85951842
LZ
2487static void *
2488g_next(struct seq_file *m, void *v, loff_t *pos)
2489{
2490 (*pos)++;
2491 return __g_next(m, pos);
ea4e2bc4
SR
2492}
2493
2494static void *g_start(struct seq_file *m, loff_t *pos)
2495{
ea4e2bc4
SR
2496 mutex_lock(&graph_lock);
2497
f9349a8f 2498 /* Nothing, tell g_show to print all functions are enabled */
c7c6b1fe 2499 if (!ftrace_graph_filter_enabled && !*pos)
f9349a8f
FW
2500 return (void *)1;
2501
85951842 2502 return __g_next(m, pos);
ea4e2bc4
SR
2503}
2504
2505static void g_stop(struct seq_file *m, void *p)
2506{
2507 mutex_unlock(&graph_lock);
2508}
2509
2510static int g_show(struct seq_file *m, void *v)
2511{
2512 unsigned long *ptr = v;
ea4e2bc4
SR
2513
2514 if (!ptr)
2515 return 0;
2516
f9349a8f
FW
2517 if (ptr == (unsigned long *)1) {
2518 seq_printf(m, "#### all functions enabled ####\n");
2519 return 0;
2520 }
2521
b375a11a 2522 seq_printf(m, "%ps\n", (void *)*ptr);
ea4e2bc4
SR
2523
2524 return 0;
2525}
2526
88e9d34c 2527static const struct seq_operations ftrace_graph_seq_ops = {
ea4e2bc4
SR
2528 .start = g_start,
2529 .next = g_next,
2530 .stop = g_stop,
2531 .show = g_show,
2532};
2533
2534static int
2535ftrace_graph_open(struct inode *inode, struct file *file)
2536{
2537 int ret = 0;
2538
2539 if (unlikely(ftrace_disabled))
2540 return -ENODEV;
2541
2542 mutex_lock(&graph_lock);
2543 if ((file->f_mode & FMODE_WRITE) &&
8650ae32 2544 (file->f_flags & O_TRUNC)) {
c7c6b1fe 2545 ftrace_graph_filter_enabled = 0;
ea4e2bc4
SR
2546 ftrace_graph_count = 0;
2547 memset(ftrace_graph_funcs, 0, sizeof(ftrace_graph_funcs));
2548 }
a4ec5e0c 2549 mutex_unlock(&graph_lock);
ea4e2bc4 2550
a4ec5e0c 2551 if (file->f_mode & FMODE_READ)
ea4e2bc4 2552 ret = seq_open(file, &ftrace_graph_seq_ops);
ea4e2bc4
SR
2553
2554 return ret;
2555}
2556
87827111
LZ
2557static int
2558ftrace_graph_release(struct inode *inode, struct file *file)
2559{
2560 if (file->f_mode & FMODE_READ)
2561 seq_release(inode, file);
2562 return 0;
2563}
2564
ea4e2bc4 2565static int
f9349a8f 2566ftrace_set_func(unsigned long *array, int *idx, char *buffer)
ea4e2bc4 2567{
ea4e2bc4
SR
2568 struct dyn_ftrace *rec;
2569 struct ftrace_page *pg;
f9349a8f 2570 int search_len;
c7c6b1fe 2571 int fail = 1;
f9349a8f
FW
2572 int type, not;
2573 char *search;
2574 bool exists;
2575 int i;
ea4e2bc4
SR
2576
2577 if (ftrace_disabled)
2578 return -ENODEV;
2579
f9349a8f 2580 /* decode regex */
3f6fe06d 2581 type = filter_parse_regex(buffer, strlen(buffer), &search, &not);
c7c6b1fe
LZ
2582 if (!not && *idx >= FTRACE_GRAPH_MAX_FUNCS)
2583 return -EBUSY;
f9349a8f
FW
2584
2585 search_len = strlen(search);
2586
52baf119 2587 mutex_lock(&ftrace_lock);
265c831c
SR
2588 do_for_each_ftrace_rec(pg, rec) {
2589
2590 if (rec->flags & (FTRACE_FL_FAILED | FTRACE_FL_FREE))
2591 continue;
2592
f9349a8f 2593 if (ftrace_match_record(rec, search, search_len, type)) {
c7c6b1fe 2594 /* if it is in the array */
f9349a8f 2595 exists = false;
c7c6b1fe 2596 for (i = 0; i < *idx; i++) {
f9349a8f
FW
2597 if (array[i] == rec->ip) {
2598 exists = true;
265c831c
SR
2599 break;
2600 }
c7c6b1fe
LZ
2601 }
2602
2603 if (!not) {
2604 fail = 0;
2605 if (!exists) {
2606 array[(*idx)++] = rec->ip;
2607 if (*idx >= FTRACE_GRAPH_MAX_FUNCS)
2608 goto out;
2609 }
2610 } else {
2611 if (exists) {
2612 array[i] = array[--(*idx)];
2613 array[*idx] = 0;
2614 fail = 0;
2615 }
2616 }
ea4e2bc4 2617 }
265c831c 2618 } while_for_each_ftrace_rec();
c7c6b1fe 2619out:
52baf119 2620 mutex_unlock(&ftrace_lock);
ea4e2bc4 2621
c7c6b1fe
LZ
2622 if (fail)
2623 return -EINVAL;
2624
2625 ftrace_graph_filter_enabled = 1;
2626 return 0;
ea4e2bc4
SR
2627}
2628
2629static ssize_t
2630ftrace_graph_write(struct file *file, const char __user *ubuf,
2631 size_t cnt, loff_t *ppos)
2632{
689fd8b6 2633 struct trace_parser parser;
4ba7978e 2634 ssize_t read, ret;
ea4e2bc4 2635
c7c6b1fe 2636 if (!cnt)
ea4e2bc4
SR
2637 return 0;
2638
2639 mutex_lock(&graph_lock);
2640
689fd8b6 2641 if (trace_parser_get_init(&parser, FTRACE_BUFF_MAX)) {
2642 ret = -ENOMEM;
1eb90f13 2643 goto out_unlock;
ea4e2bc4
SR
2644 }
2645
689fd8b6 2646 read = trace_get_user(&parser, ubuf, cnt, ppos);
ea4e2bc4 2647
4ba7978e 2648 if (read >= 0 && trace_parser_loaded((&parser))) {
689fd8b6 2649 parser.buffer[parser.idx] = 0;
2650
2651 /* we allow only one expression at a time */
a4ec5e0c 2652 ret = ftrace_set_func(ftrace_graph_funcs, &ftrace_graph_count,
689fd8b6 2653 parser.buffer);
ea4e2bc4 2654 if (ret)
1eb90f13 2655 goto out_free;
ea4e2bc4 2656 }
ea4e2bc4
SR
2657
2658 ret = read;
1eb90f13
LZ
2659
2660out_free:
689fd8b6 2661 trace_parser_put(&parser);
1eb90f13 2662out_unlock:
ea4e2bc4
SR
2663 mutex_unlock(&graph_lock);
2664
2665 return ret;
2666}
2667
2668static const struct file_operations ftrace_graph_fops = {
87827111
LZ
2669 .open = ftrace_graph_open,
2670 .read = seq_read,
2671 .write = ftrace_graph_write,
2672 .release = ftrace_graph_release,
6038f373 2673 .llseek = seq_lseek,
ea4e2bc4
SR
2674};
2675#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2676
df4fc315 2677static __init int ftrace_init_dyn_debugfs(struct dentry *d_tracer)
5072c59f 2678{
5072c59f 2679
5452af66
FW
2680 trace_create_file("available_filter_functions", 0444,
2681 d_tracer, NULL, &ftrace_avail_fops);
5072c59f 2682
5452af66
FW
2683 trace_create_file("failures", 0444,
2684 d_tracer, NULL, &ftrace_failures_fops);
eb9a7bf0 2685
5452af66
FW
2686 trace_create_file("set_ftrace_filter", 0644, d_tracer,
2687 NULL, &ftrace_filter_fops);
41c52c0d 2688
5452af66 2689 trace_create_file("set_ftrace_notrace", 0644, d_tracer,
41c52c0d 2690 NULL, &ftrace_notrace_fops);
ad90c0e3 2691
ea4e2bc4 2692#ifdef CONFIG_FUNCTION_GRAPH_TRACER
5452af66 2693 trace_create_file("set_graph_function", 0444, d_tracer,
ea4e2bc4
SR
2694 NULL,
2695 &ftrace_graph_fops);
ea4e2bc4
SR
2696#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
2697
5072c59f
SR
2698 return 0;
2699}
2700
5cb084bb 2701static int ftrace_process_locs(struct module *mod,
31e88909 2702 unsigned long *start,
68bf21aa
SR
2703 unsigned long *end)
2704{
2705 unsigned long *p;
2706 unsigned long addr;
2707 unsigned long flags;
2708
e6ea44e9 2709 mutex_lock(&ftrace_lock);
68bf21aa
SR
2710 p = start;
2711 while (p < end) {
2712 addr = ftrace_call_adjust(*p++);
20e5227e
SR
2713 /*
2714 * Some architecture linkers will pad between
2715 * the different mcount_loc sections of different
2716 * object files to satisfy alignments.
2717 * Skip any NULL pointers.
2718 */
2719 if (!addr)
2720 continue;
68bf21aa 2721 ftrace_record_ip(addr);
68bf21aa
SR
2722 }
2723
08f5ac90 2724 /* disable interrupts to prevent kstop machine */
68bf21aa 2725 local_irq_save(flags);
31e88909 2726 ftrace_update_code(mod);
68bf21aa 2727 local_irq_restore(flags);
e6ea44e9 2728 mutex_unlock(&ftrace_lock);
68bf21aa
SR
2729
2730 return 0;
2731}
2732
93eb677d 2733#ifdef CONFIG_MODULES
e7247a15 2734void ftrace_release_mod(struct module *mod)
93eb677d
SR
2735{
2736 struct dyn_ftrace *rec;
2737 struct ftrace_page *pg;
93eb677d 2738
e7247a15 2739 if (ftrace_disabled)
93eb677d
SR
2740 return;
2741
2742 mutex_lock(&ftrace_lock);
2743 do_for_each_ftrace_rec(pg, rec) {
e7247a15 2744 if (within_module_core(rec->ip, mod)) {
93eb677d
SR
2745 /*
2746 * rec->ip is changed in ftrace_free_rec()
2747 * It should not between s and e if record was freed.
2748 */
2749 FTRACE_WARN_ON(rec->flags & FTRACE_FL_FREE);
2750 ftrace_free_rec(rec);
2751 }
2752 } while_for_each_ftrace_rec();
2753 mutex_unlock(&ftrace_lock);
2754}
2755
2756static void ftrace_init_module(struct module *mod,
2757 unsigned long *start, unsigned long *end)
90d595fe 2758{
00fd61ae 2759 if (ftrace_disabled || start == end)
fed1939c 2760 return;
5cb084bb 2761 ftrace_process_locs(mod, start, end);
90d595fe
SR
2762}
2763
93eb677d
SR
2764static int ftrace_module_notify(struct notifier_block *self,
2765 unsigned long val, void *data)
2766{
2767 struct module *mod = data;
2768
2769 switch (val) {
2770 case MODULE_STATE_COMING:
2771 ftrace_init_module(mod, mod->ftrace_callsites,
2772 mod->ftrace_callsites +
2773 mod->num_ftrace_callsites);
2774 break;
2775 case MODULE_STATE_GOING:
e7247a15 2776 ftrace_release_mod(mod);
93eb677d
SR
2777 break;
2778 }
2779
2780 return 0;
2781}
2782#else
2783static int ftrace_module_notify(struct notifier_block *self,
2784 unsigned long val, void *data)
2785{
2786 return 0;
2787}
2788#endif /* CONFIG_MODULES */
2789
2790struct notifier_block ftrace_module_nb = {
2791 .notifier_call = ftrace_module_notify,
2792 .priority = 0,
2793};
2794
68bf21aa
SR
2795extern unsigned long __start_mcount_loc[];
2796extern unsigned long __stop_mcount_loc[];
2797
2798void __init ftrace_init(void)
2799{
2800 unsigned long count, addr, flags;
2801 int ret;
2802
2803 /* Keep the ftrace pointer to the stub */
2804 addr = (unsigned long)ftrace_stub;
2805
2806 local_irq_save(flags);
2807 ftrace_dyn_arch_init(&addr);
2808 local_irq_restore(flags);
2809
2810 /* ftrace_dyn_arch_init places the return code in addr */
2811 if (addr)
2812 goto failed;
2813
2814 count = __stop_mcount_loc - __start_mcount_loc;
2815
2816 ret = ftrace_dyn_table_alloc(count);
2817 if (ret)
2818 goto failed;
2819
2820 last_ftrace_enabled = ftrace_enabled = 1;
2821
5cb084bb 2822 ret = ftrace_process_locs(NULL,
31e88909 2823 __start_mcount_loc,
68bf21aa
SR
2824 __stop_mcount_loc);
2825
93eb677d 2826 ret = register_module_notifier(&ftrace_module_nb);
24ed0c4b 2827 if (ret)
93eb677d
SR
2828 pr_warning("Failed to register trace ftrace module notifier\n");
2829
2af15d6a
SR
2830 set_ftrace_early_filters();
2831
68bf21aa
SR
2832 return;
2833 failed:
2834 ftrace_disabled = 1;
2835}
68bf21aa 2836
3d083395 2837#else
0b6e4d56
FW
2838
2839static int __init ftrace_nodyn_init(void)
2840{
2841 ftrace_enabled = 1;
2842 return 0;
2843}
2844device_initcall(ftrace_nodyn_init);
2845
df4fc315
SR
2846static inline int ftrace_init_dyn_debugfs(struct dentry *d_tracer) { return 0; }
2847static inline void ftrace_startup_enable(int command) { }
5a45cfe1
SR
2848/* Keep as macros so we do not need to define the commands */
2849# define ftrace_startup(command) do { } while (0)
2850# define ftrace_shutdown(command) do { } while (0)
c7aafc54
IM
2851# define ftrace_startup_sysctl() do { } while (0)
2852# define ftrace_shutdown_sysctl() do { } while (0)
3d083395
SR
2853#endif /* CONFIG_DYNAMIC_FTRACE */
2854
e32d8956 2855static void clear_ftrace_swapper(void)
978f3a45
SR
2856{
2857 struct task_struct *p;
e32d8956 2858 int cpu;
978f3a45 2859
e32d8956
SR
2860 get_online_cpus();
2861 for_each_online_cpu(cpu) {
2862 p = idle_task(cpu);
978f3a45 2863 clear_tsk_trace_trace(p);
e32d8956
SR
2864 }
2865 put_online_cpus();
2866}
978f3a45 2867
e32d8956
SR
2868static void set_ftrace_swapper(void)
2869{
2870 struct task_struct *p;
2871 int cpu;
2872
2873 get_online_cpus();
2874 for_each_online_cpu(cpu) {
2875 p = idle_task(cpu);
2876 set_tsk_trace_trace(p);
2877 }
2878 put_online_cpus();
978f3a45
SR
2879}
2880
e32d8956
SR
2881static void clear_ftrace_pid(struct pid *pid)
2882{
2883 struct task_struct *p;
2884
229c4ef8 2885 rcu_read_lock();
e32d8956
SR
2886 do_each_pid_task(pid, PIDTYPE_PID, p) {
2887 clear_tsk_trace_trace(p);
2888 } while_each_pid_task(pid, PIDTYPE_PID, p);
229c4ef8
ON
2889 rcu_read_unlock();
2890
e32d8956
SR
2891 put_pid(pid);
2892}
2893
2894static void set_ftrace_pid(struct pid *pid)
978f3a45
SR
2895{
2896 struct task_struct *p;
2897
229c4ef8 2898 rcu_read_lock();
978f3a45
SR
2899 do_each_pid_task(pid, PIDTYPE_PID, p) {
2900 set_tsk_trace_trace(p);
2901 } while_each_pid_task(pid, PIDTYPE_PID, p);
229c4ef8 2902 rcu_read_unlock();
978f3a45
SR
2903}
2904
756d17ee 2905static void clear_ftrace_pid_task(struct pid *pid)
e32d8956 2906{
756d17ee 2907 if (pid == ftrace_swapper_pid)
e32d8956
SR
2908 clear_ftrace_swapper();
2909 else
756d17ee 2910 clear_ftrace_pid(pid);
e32d8956
SR
2911}
2912
2913static void set_ftrace_pid_task(struct pid *pid)
2914{
2915 if (pid == ftrace_swapper_pid)
2916 set_ftrace_swapper();
2917 else
2918 set_ftrace_pid(pid);
2919}
2920
756d17ee 2921static int ftrace_pid_add(int p)
df4fc315 2922{
978f3a45 2923 struct pid *pid;
756d17ee 2924 struct ftrace_pid *fpid;
2925 int ret = -EINVAL;
df4fc315 2926
756d17ee 2927 mutex_lock(&ftrace_lock);
df4fc315 2928
756d17ee 2929 if (!p)
2930 pid = ftrace_swapper_pid;
2931 else
2932 pid = find_get_pid(p);
df4fc315 2933
756d17ee 2934 if (!pid)
2935 goto out;
df4fc315 2936
756d17ee 2937 ret = 0;
df4fc315 2938
756d17ee 2939 list_for_each_entry(fpid, &ftrace_pids, list)
2940 if (fpid->pid == pid)
2941 goto out_put;
978f3a45 2942
756d17ee 2943 ret = -ENOMEM;
df4fc315 2944
756d17ee 2945 fpid = kmalloc(sizeof(*fpid), GFP_KERNEL);
2946 if (!fpid)
2947 goto out_put;
df4fc315 2948
756d17ee 2949 list_add(&fpid->list, &ftrace_pids);
2950 fpid->pid = pid;
0ef8cde5 2951
756d17ee 2952 set_ftrace_pid_task(pid);
978f3a45 2953
756d17ee 2954 ftrace_update_pid_func();
2955 ftrace_startup_enable(0);
2956
2957 mutex_unlock(&ftrace_lock);
2958 return 0;
2959
2960out_put:
2961 if (pid != ftrace_swapper_pid)
2962 put_pid(pid);
978f3a45 2963
756d17ee 2964out:
2965 mutex_unlock(&ftrace_lock);
2966 return ret;
2967}
2968
2969static void ftrace_pid_reset(void)
2970{
2971 struct ftrace_pid *fpid, *safe;
978f3a45 2972
756d17ee 2973 mutex_lock(&ftrace_lock);
2974 list_for_each_entry_safe(fpid, safe, &ftrace_pids, list) {
2975 struct pid *pid = fpid->pid;
2976
2977 clear_ftrace_pid_task(pid);
2978
2979 list_del(&fpid->list);
2980 kfree(fpid);
df4fc315
SR
2981 }
2982
df4fc315
SR
2983 ftrace_update_pid_func();
2984 ftrace_startup_enable(0);
2985
e6ea44e9 2986 mutex_unlock(&ftrace_lock);
756d17ee 2987}
df4fc315 2988
756d17ee 2989static void *fpid_start(struct seq_file *m, loff_t *pos)
2990{
2991 mutex_lock(&ftrace_lock);
2992
2993 if (list_empty(&ftrace_pids) && (!*pos))
2994 return (void *) 1;
2995
2996 return seq_list_start(&ftrace_pids, *pos);
2997}
2998
2999static void *fpid_next(struct seq_file *m, void *v, loff_t *pos)
3000{
3001 if (v == (void *)1)
3002 return NULL;
3003
3004 return seq_list_next(v, &ftrace_pids, pos);
3005}
3006
3007static void fpid_stop(struct seq_file *m, void *p)
3008{
3009 mutex_unlock(&ftrace_lock);
3010}
3011
3012static int fpid_show(struct seq_file *m, void *v)
3013{
3014 const struct ftrace_pid *fpid = list_entry(v, struct ftrace_pid, list);
3015
3016 if (v == (void *)1) {
3017 seq_printf(m, "no pid\n");
3018 return 0;
3019 }
3020
3021 if (fpid->pid == ftrace_swapper_pid)
3022 seq_printf(m, "swapper tasks\n");
3023 else
3024 seq_printf(m, "%u\n", pid_vnr(fpid->pid));
3025
3026 return 0;
3027}
3028
3029static const struct seq_operations ftrace_pid_sops = {
3030 .start = fpid_start,
3031 .next = fpid_next,
3032 .stop = fpid_stop,
3033 .show = fpid_show,
3034};
3035
3036static int
3037ftrace_pid_open(struct inode *inode, struct file *file)
3038{
3039 int ret = 0;
3040
3041 if ((file->f_mode & FMODE_WRITE) &&
3042 (file->f_flags & O_TRUNC))
3043 ftrace_pid_reset();
3044
3045 if (file->f_mode & FMODE_READ)
3046 ret = seq_open(file, &ftrace_pid_sops);
3047
3048 return ret;
3049}
3050
df4fc315
SR
3051static ssize_t
3052ftrace_pid_write(struct file *filp, const char __user *ubuf,
3053 size_t cnt, loff_t *ppos)
3054{
457dc928 3055 char buf[64], *tmp;
df4fc315
SR
3056 long val;
3057 int ret;
3058
3059 if (cnt >= sizeof(buf))
3060 return -EINVAL;
3061
3062 if (copy_from_user(&buf, ubuf, cnt))
3063 return -EFAULT;
3064
3065 buf[cnt] = 0;
3066
756d17ee 3067 /*
3068 * Allow "echo > set_ftrace_pid" or "echo -n '' > set_ftrace_pid"
3069 * to clean the filter quietly.
3070 */
457dc928
IM
3071 tmp = strstrip(buf);
3072 if (strlen(tmp) == 0)
756d17ee 3073 return 1;
3074
457dc928 3075 ret = strict_strtol(tmp, 10, &val);
df4fc315
SR
3076 if (ret < 0)
3077 return ret;
3078
756d17ee 3079 ret = ftrace_pid_add(val);
df4fc315 3080
756d17ee 3081 return ret ? ret : cnt;
3082}
df4fc315 3083
756d17ee 3084static int
3085ftrace_pid_release(struct inode *inode, struct file *file)
3086{
3087 if (file->f_mode & FMODE_READ)
3088 seq_release(inode, file);
df4fc315 3089
756d17ee 3090 return 0;
df4fc315
SR
3091}
3092
5e2336a0 3093static const struct file_operations ftrace_pid_fops = {
756d17ee 3094 .open = ftrace_pid_open,
3095 .write = ftrace_pid_write,
3096 .read = seq_read,
3097 .llseek = seq_lseek,
3098 .release = ftrace_pid_release,
df4fc315
SR
3099};
3100
3101static __init int ftrace_init_debugfs(void)
3102{
3103 struct dentry *d_tracer;
df4fc315
SR
3104
3105 d_tracer = tracing_init_dentry();
3106 if (!d_tracer)
3107 return 0;
3108
3109 ftrace_init_dyn_debugfs(d_tracer);
3110
5452af66
FW
3111 trace_create_file("set_ftrace_pid", 0644, d_tracer,
3112 NULL, &ftrace_pid_fops);
493762fc
SR
3113
3114 ftrace_profile_debugfs(d_tracer);
3115
df4fc315
SR
3116 return 0;
3117}
df4fc315
SR
3118fs_initcall(ftrace_init_debugfs);
3119
a2bb6a3d 3120/**
81adbdc0 3121 * ftrace_kill - kill ftrace
a2bb6a3d
SR
3122 *
3123 * This function should be used by panic code. It stops ftrace
3124 * but in a not so nice way. If you need to simply kill ftrace
3125 * from a non-atomic section, use ftrace_kill.
3126 */
81adbdc0 3127void ftrace_kill(void)
a2bb6a3d
SR
3128{
3129 ftrace_disabled = 1;
3130 ftrace_enabled = 0;
a2bb6a3d
SR
3131 clear_ftrace_function();
3132}
3133
16444a8a 3134/**
3d083395
SR
3135 * register_ftrace_function - register a function for profiling
3136 * @ops - ops structure that holds the function for profiling.
16444a8a 3137 *
3d083395
SR
3138 * Register a function to be called by all functions in the
3139 * kernel.
3140 *
3141 * Note: @ops->func and all the functions it calls must be labeled
3142 * with "notrace", otherwise it will go into a
3143 * recursive loop.
16444a8a 3144 */
3d083395 3145int register_ftrace_function(struct ftrace_ops *ops)
16444a8a 3146{
b0fc494f
SR
3147 int ret;
3148
4eebcc81
SR
3149 if (unlikely(ftrace_disabled))
3150 return -1;
3151
e6ea44e9 3152 mutex_lock(&ftrace_lock);
e7d3737e 3153
b0fc494f 3154 ret = __register_ftrace_function(ops);
5a45cfe1 3155 ftrace_startup(0);
b0fc494f 3156
e6ea44e9 3157 mutex_unlock(&ftrace_lock);
b0fc494f 3158 return ret;
3d083395
SR
3159}
3160
3161/**
32632920 3162 * unregister_ftrace_function - unregister a function for profiling.
3d083395
SR
3163 * @ops - ops structure that holds the function to unregister
3164 *
3165 * Unregister a function that was added to be called by ftrace profiling.
3166 */
3167int unregister_ftrace_function(struct ftrace_ops *ops)
3168{
3169 int ret;
3170
e6ea44e9 3171 mutex_lock(&ftrace_lock);
3d083395 3172 ret = __unregister_ftrace_function(ops);
5a45cfe1 3173 ftrace_shutdown(0);
e6ea44e9 3174 mutex_unlock(&ftrace_lock);
b0fc494f
SR
3175
3176 return ret;
3177}
3178
e309b41d 3179int
b0fc494f 3180ftrace_enable_sysctl(struct ctl_table *table, int write,
8d65af78 3181 void __user *buffer, size_t *lenp,
b0fc494f
SR
3182 loff_t *ppos)
3183{
3184 int ret;
3185
4eebcc81
SR
3186 if (unlikely(ftrace_disabled))
3187 return -ENODEV;
3188
e6ea44e9 3189 mutex_lock(&ftrace_lock);
b0fc494f 3190
8d65af78 3191 ret = proc_dointvec(table, write, buffer, lenp, ppos);
b0fc494f 3192
a32c7765 3193 if (ret || !write || (last_ftrace_enabled == !!ftrace_enabled))
b0fc494f
SR
3194 goto out;
3195
a32c7765 3196 last_ftrace_enabled = !!ftrace_enabled;
b0fc494f
SR
3197
3198 if (ftrace_enabled) {
3199
3200 ftrace_startup_sysctl();
3201
3202 /* we are starting ftrace again */
3203 if (ftrace_list != &ftrace_list_end) {
3204 if (ftrace_list->next == &ftrace_list_end)
3205 ftrace_trace_function = ftrace_list->func;
3206 else
3207 ftrace_trace_function = ftrace_list_func;
3208 }
3209
3210 } else {
3211 /* stopping ftrace calls (just send to ftrace_stub) */
3212 ftrace_trace_function = ftrace_stub;
3213
3214 ftrace_shutdown_sysctl();
3215 }
3216
3217 out:
e6ea44e9 3218 mutex_unlock(&ftrace_lock);
3d083395 3219 return ret;
16444a8a 3220}
f17845e5 3221
fb52607a 3222#ifdef CONFIG_FUNCTION_GRAPH_TRACER
e7d3737e 3223
597af815 3224static int ftrace_graph_active;
4a2b8dda 3225static struct notifier_block ftrace_suspend_notifier;
e7d3737e 3226
e49dc19c
SR
3227int ftrace_graph_entry_stub(struct ftrace_graph_ent *trace)
3228{
3229 return 0;
3230}
3231
287b6e68
FW
3232/* The callbacks that hook a function */
3233trace_func_graph_ret_t ftrace_graph_return =
3234 (trace_func_graph_ret_t)ftrace_stub;
e49dc19c 3235trace_func_graph_ent_t ftrace_graph_entry = ftrace_graph_entry_stub;
f201ae23
FW
3236
3237/* Try to assign a return stack array on FTRACE_RETSTACK_ALLOC_SIZE tasks. */
3238static int alloc_retstack_tasklist(struct ftrace_ret_stack **ret_stack_list)
3239{
3240 int i;
3241 int ret = 0;
3242 unsigned long flags;
3243 int start = 0, end = FTRACE_RETSTACK_ALLOC_SIZE;
3244 struct task_struct *g, *t;
3245
3246 for (i = 0; i < FTRACE_RETSTACK_ALLOC_SIZE; i++) {
3247 ret_stack_list[i] = kmalloc(FTRACE_RETFUNC_DEPTH
3248 * sizeof(struct ftrace_ret_stack),
3249 GFP_KERNEL);
3250 if (!ret_stack_list[i]) {
3251 start = 0;
3252 end = i;
3253 ret = -ENOMEM;
3254 goto free;
3255 }
3256 }
3257
3258 read_lock_irqsave(&tasklist_lock, flags);
3259 do_each_thread(g, t) {
3260 if (start == end) {
3261 ret = -EAGAIN;
3262 goto unlock;
3263 }
3264
3265 if (t->ret_stack == NULL) {
380c4b14 3266 atomic_set(&t->tracing_graph_pause, 0);
f201ae23 3267 atomic_set(&t->trace_overrun, 0);
26c01624
SR
3268 t->curr_ret_stack = -1;
3269 /* Make sure the tasks see the -1 first: */
3270 smp_wmb();
3271 t->ret_stack = ret_stack_list[start++];
f201ae23
FW
3272 }
3273 } while_each_thread(g, t);
3274
3275unlock:
3276 read_unlock_irqrestore(&tasklist_lock, flags);
3277free:
3278 for (i = start; i < end; i++)
3279 kfree(ret_stack_list[i]);
3280 return ret;
3281}
3282
8aef2d28 3283static void
38516ab5
SR
3284ftrace_graph_probe_sched_switch(void *ignore,
3285 struct task_struct *prev, struct task_struct *next)
8aef2d28
SR
3286{
3287 unsigned long long timestamp;
3288 int index;
3289
be6f164a
SR
3290 /*
3291 * Does the user want to count the time a function was asleep.
3292 * If so, do not update the time stamps.
3293 */
3294 if (trace_flags & TRACE_ITER_SLEEP_TIME)
3295 return;
3296
8aef2d28
SR
3297 timestamp = trace_clock_local();
3298
3299 prev->ftrace_timestamp = timestamp;
3300
3301 /* only process tasks that we timestamped */
3302 if (!next->ftrace_timestamp)
3303 return;
3304
3305 /*
3306 * Update all the counters in next to make up for the
3307 * time next was sleeping.
3308 */
3309 timestamp -= next->ftrace_timestamp;
3310
3311 for (index = next->curr_ret_stack; index >= 0; index--)
3312 next->ret_stack[index].calltime += timestamp;
3313}
3314
f201ae23 3315/* Allocate a return stack for each task */
fb52607a 3316static int start_graph_tracing(void)
f201ae23
FW
3317{
3318 struct ftrace_ret_stack **ret_stack_list;
5b058bcd 3319 int ret, cpu;
f201ae23
FW
3320
3321 ret_stack_list = kmalloc(FTRACE_RETSTACK_ALLOC_SIZE *
3322 sizeof(struct ftrace_ret_stack *),
3323 GFP_KERNEL);
3324
3325 if (!ret_stack_list)
3326 return -ENOMEM;
3327
5b058bcd 3328 /* The cpu_boot init_task->ret_stack will never be freed */
179c498a
SR
3329 for_each_online_cpu(cpu) {
3330 if (!idle_task(cpu)->ret_stack)
3331 ftrace_graph_init_task(idle_task(cpu));
3332 }
5b058bcd 3333
f201ae23
FW
3334 do {
3335 ret = alloc_retstack_tasklist(ret_stack_list);
3336 } while (ret == -EAGAIN);
3337
8aef2d28 3338 if (!ret) {
38516ab5 3339 ret = register_trace_sched_switch(ftrace_graph_probe_sched_switch, NULL);
8aef2d28
SR
3340 if (ret)
3341 pr_info("ftrace_graph: Couldn't activate tracepoint"
3342 " probe to kernel_sched_switch\n");
3343 }
3344
f201ae23
FW
3345 kfree(ret_stack_list);
3346 return ret;
3347}
3348
4a2b8dda
FW
3349/*
3350 * Hibernation protection.
3351 * The state of the current task is too much unstable during
3352 * suspend/restore to disk. We want to protect against that.
3353 */
3354static int
3355ftrace_suspend_notifier_call(struct notifier_block *bl, unsigned long state,
3356 void *unused)
3357{
3358 switch (state) {
3359 case PM_HIBERNATION_PREPARE:
3360 pause_graph_tracing();
3361 break;
3362
3363 case PM_POST_HIBERNATION:
3364 unpause_graph_tracing();
3365 break;
3366 }
3367 return NOTIFY_DONE;
3368}
3369
287b6e68
FW
3370int register_ftrace_graph(trace_func_graph_ret_t retfunc,
3371 trace_func_graph_ent_t entryfunc)
15e6cb36 3372{
e7d3737e
FW
3373 int ret = 0;
3374
e6ea44e9 3375 mutex_lock(&ftrace_lock);
e7d3737e 3376
05ce5818 3377 /* we currently allow only one tracer registered at a time */
597af815 3378 if (ftrace_graph_active) {
05ce5818
SR
3379 ret = -EBUSY;
3380 goto out;
3381 }
3382
4a2b8dda
FW
3383 ftrace_suspend_notifier.notifier_call = ftrace_suspend_notifier_call;
3384 register_pm_notifier(&ftrace_suspend_notifier);
3385
597af815 3386 ftrace_graph_active++;
fb52607a 3387 ret = start_graph_tracing();
f201ae23 3388 if (ret) {
597af815 3389 ftrace_graph_active--;
f201ae23
FW
3390 goto out;
3391 }
e53a6319 3392
287b6e68
FW
3393 ftrace_graph_return = retfunc;
3394 ftrace_graph_entry = entryfunc;
e53a6319 3395
5a45cfe1 3396 ftrace_startup(FTRACE_START_FUNC_RET);
e7d3737e
FW
3397
3398out:
e6ea44e9 3399 mutex_unlock(&ftrace_lock);
e7d3737e 3400 return ret;
15e6cb36
FW
3401}
3402
fb52607a 3403void unregister_ftrace_graph(void)
15e6cb36 3404{
e6ea44e9 3405 mutex_lock(&ftrace_lock);
e7d3737e 3406
597af815 3407 if (unlikely(!ftrace_graph_active))
2aad1b76
SR
3408 goto out;
3409
597af815 3410 ftrace_graph_active--;
287b6e68 3411 ftrace_graph_return = (trace_func_graph_ret_t)ftrace_stub;
e49dc19c 3412 ftrace_graph_entry = ftrace_graph_entry_stub;
5a45cfe1 3413 ftrace_shutdown(FTRACE_STOP_FUNC_RET);
4a2b8dda 3414 unregister_pm_notifier(&ftrace_suspend_notifier);
38516ab5 3415 unregister_trace_sched_switch(ftrace_graph_probe_sched_switch, NULL);
e7d3737e 3416
2aad1b76 3417 out:
e6ea44e9 3418 mutex_unlock(&ftrace_lock);
15e6cb36 3419}
f201ae23
FW
3420
3421/* Allocate a return stack for newly created task */
fb52607a 3422void ftrace_graph_init_task(struct task_struct *t)
f201ae23 3423{
84047e36
SR
3424 /* Make sure we do not use the parent ret_stack */
3425 t->ret_stack = NULL;
ea14eb71 3426 t->curr_ret_stack = -1;
84047e36 3427
597af815 3428 if (ftrace_graph_active) {
82310a32
SR
3429 struct ftrace_ret_stack *ret_stack;
3430
3431 ret_stack = kmalloc(FTRACE_RETFUNC_DEPTH
f201ae23
FW
3432 * sizeof(struct ftrace_ret_stack),
3433 GFP_KERNEL);
82310a32 3434 if (!ret_stack)
f201ae23 3435 return;
380c4b14 3436 atomic_set(&t->tracing_graph_pause, 0);
f201ae23 3437 atomic_set(&t->trace_overrun, 0);
8aef2d28 3438 t->ftrace_timestamp = 0;
82310a32
SR
3439 /* make curr_ret_stack visable before we add the ret_stack */
3440 smp_wmb();
3441 t->ret_stack = ret_stack;
84047e36 3442 }
f201ae23
FW
3443}
3444
fb52607a 3445void ftrace_graph_exit_task(struct task_struct *t)
f201ae23 3446{
eae849ca
FW
3447 struct ftrace_ret_stack *ret_stack = t->ret_stack;
3448
f201ae23 3449 t->ret_stack = NULL;
eae849ca
FW
3450 /* NULL must become visible to IRQs before we free it: */
3451 barrier();
3452
3453 kfree(ret_stack);
f201ae23 3454}
14a866c5
SR
3455
3456void ftrace_graph_stop(void)
3457{
3458 ftrace_stop();
3459}
15e6cb36 3460#endif