2 * Code for replacing ftrace calls with jumps.
4 * Copyright (C) 2007-2008 Steven Rostedt <srostedt@redhat.com>
6 * Thanks goes out to P.A. Semi, Inc for supplying me with a PPC64 box.
8 * Added function graph tracer code, taken from x86 that was written
9 * by Frederic Weisbecker, and ported to PPC by Steven Rostedt.
13 #include <linux/spinlock.h>
14 #include <linux/hardirq.h>
15 #include <linux/uaccess.h>
16 #include <linux/module.h>
17 #include <linux/ftrace.h>
18 #include <linux/percpu.h>
19 #include <linux/init.h>
20 #include <linux/list.h>
22 #include <asm/cacheflush.h>
23 #include <asm/code-patching.h>
24 #include <asm/ftrace.h>
25 #include <asm/syscall.h>
28 #ifdef CONFIG_DYNAMIC_FTRACE
30 ftrace_call_replace(unsigned long ip
, unsigned long addr
, int link
)
34 addr
= ppc_function_entry((void *)addr
);
36 /* if (link) set op to 'bl' else 'b' */
37 op
= create_branch((unsigned int *)ip
, addr
, link
? 1 : 0);
43 ftrace_modify_code(unsigned long ip
, unsigned int old
, unsigned int new)
45 unsigned int replaced
;
48 * Note: Due to modules and __init, code can
49 * disappear and change, we need to protect against faulting
50 * as well as code changing. We do this by using the
51 * probe_kernel_* functions.
53 * No real locking needed, this code is run through
54 * kstop_machine, or before SMP starts.
57 /* read the text we want to modify */
58 if (probe_kernel_read(&replaced
, (void *)ip
, MCOUNT_INSN_SIZE
))
61 /* Make sure it is what we expect it to be */
65 /* replace the text with the new text */
66 if (probe_kernel_write((void *)ip
, &new, MCOUNT_INSN_SIZE
))
69 flush_icache_range(ip
, ip
+ 8);
75 * Helper functions that are the same for both PPC64 and PPC32.
77 static int test_24bit_addr(unsigned long ip
, unsigned long addr
)
80 /* use the create_branch to verify that this offset can be branched */
81 return create_branch((unsigned int *)ip
, addr
, 0);
86 static int is_bl_op(unsigned int op
)
88 return (op
& 0xfc000003) == 0x48000001;
91 static unsigned long find_bl_target(unsigned long ip
, unsigned int op
)
95 offset
= (op
& 0x03fffffc);
97 if (offset
& 0x02000000)
100 return ip
+ (long)offset
;
105 __ftrace_make_nop(struct module
*mod
,
106 struct dyn_ftrace
*rec
, unsigned long addr
)
111 unsigned long ip
= rec
->ip
;
115 /* read where this goes */
116 if (probe_kernel_read(&op
, (void *)ip
, sizeof(int)))
119 /* Make sure that that this is still a 24bit jump */
121 printk(KERN_ERR
"Not expected bl: opcode is %x\n", op
);
125 /* lets find where the pointer goes */
126 tramp
= find_bl_target(ip
, op
);
129 * On PPC64 the trampoline looks like:
130 * 0x3d, 0x82, 0x00, 0x00, addis r12,r2, <high>
131 * 0x39, 0x8c, 0x00, 0x00, addi r12,r12, <low>
132 * Where the bytes 2,3,6 and 7 make up the 32bit offset
133 * to the TOC that holds the pointer.
135 * 0xf8, 0x41, 0x00, 0x28, std r2,40(r1)
136 * 0xe9, 0x6c, 0x00, 0x20, ld r11,32(r12)
137 * The actually address is 32 bytes from the offset
139 * 0xe8, 0x4c, 0x00, 0x28, ld r2,40(r12)
142 pr_devel("ip:%lx jumps to %lx r2: %lx", ip
, tramp
, mod
->arch
.toc
);
144 /* Find where the trampoline jumps to */
145 if (probe_kernel_read(jmp
, (void *)tramp
, sizeof(jmp
))) {
146 printk(KERN_ERR
"Failed to read %lx\n", tramp
);
150 pr_devel(" %08x %08x", jmp
[0], jmp
[1]);
152 /* verify that this is what we expect it to be */
153 if (((jmp
[0] & 0xffff0000) != 0x3d820000) ||
154 ((jmp
[1] & 0xffff0000) != 0x398c0000) ||
155 (jmp
[2] != 0xf8410028) ||
156 (jmp
[3] != 0xe96c0020) ||
157 (jmp
[4] != 0xe84c0028)) {
158 printk(KERN_ERR
"Not a trampoline\n");
162 /* The bottom half is signed extended */
163 offset
= ((unsigned)((unsigned short)jmp
[0]) << 16) +
164 (int)((short)jmp
[1]);
166 pr_devel(" %x ", offset
);
168 /* get the address this jumps too */
169 tramp
= mod
->arch
.toc
+ offset
+ 32;
170 pr_devel("toc: %lx", tramp
);
172 if (probe_kernel_read(jmp
, (void *)tramp
, 8)) {
173 printk(KERN_ERR
"Failed to read %lx\n", tramp
);
177 pr_devel(" %08x %08x\n", jmp
[0], jmp
[1]);
179 ptr
= ((unsigned long)jmp
[0] << 32) + jmp
[1];
181 /* This should match what was called */
182 if (ptr
!= ppc_function_entry((void *)addr
)) {
183 printk(KERN_ERR
"addr does not match %lx\n", ptr
);
188 * We want to nop the line, but the next line is
189 * 0xe8, 0x41, 0x00, 0x28 ld r2,40(r1)
190 * This needs to be turned to a nop too.
192 if (probe_kernel_read(&op
, (void *)(ip
+4), MCOUNT_INSN_SIZE
))
195 if (op
!= 0xe8410028) {
196 printk(KERN_ERR
"Next line is not ld! (%08x)\n", op
);
201 * Milton Miller pointed out that we can not blindly do nops.
202 * If a task was preempted when calling a trace function,
203 * the nops will remove the way to restore the TOC in r2
204 * and the r2 TOC will get corrupted.
209 * bl <tramp> <==== will be replaced with "b 1f"
213 op
= 0x48000008; /* b +8 */
215 if (probe_kernel_write((void *)ip
, &op
, MCOUNT_INSN_SIZE
))
219 flush_icache_range(ip
, ip
+ 8);
226 __ftrace_make_nop(struct module
*mod
,
227 struct dyn_ftrace
*rec
, unsigned long addr
)
231 unsigned long ip
= rec
->ip
;
234 if (probe_kernel_read(&op
, (void *)ip
, MCOUNT_INSN_SIZE
))
237 /* Make sure that that this is still a 24bit jump */
239 printk(KERN_ERR
"Not expected bl: opcode is %x\n", op
);
243 /* lets find where the pointer goes */
244 tramp
= find_bl_target(ip
, op
);
247 * On PPC32 the trampoline looks like:
248 * 0x3d, 0x60, 0x00, 0x00 lis r11,sym@ha
249 * 0x39, 0x6b, 0x00, 0x00 addi r11,r11,sym@l
250 * 0x7d, 0x69, 0x03, 0xa6 mtctr r11
251 * 0x4e, 0x80, 0x04, 0x20 bctr
254 pr_devel("ip:%lx jumps to %lx", ip
, tramp
);
256 /* Find where the trampoline jumps to */
257 if (probe_kernel_read(jmp
, (void *)tramp
, sizeof(jmp
))) {
258 printk(KERN_ERR
"Failed to read %lx\n", tramp
);
262 pr_devel(" %08x %08x ", jmp
[0], jmp
[1]);
264 /* verify that this is what we expect it to be */
265 if (((jmp
[0] & 0xffff0000) != 0x3d600000) ||
266 ((jmp
[1] & 0xffff0000) != 0x396b0000) ||
267 (jmp
[2] != 0x7d6903a6) ||
268 (jmp
[3] != 0x4e800420)) {
269 printk(KERN_ERR
"Not a trampoline\n");
273 tramp
= (jmp
[1] & 0xffff) |
274 ((jmp
[0] & 0xffff) << 16);
278 pr_devel(" %lx ", tramp
);
282 "Trampoline location %08lx does not match addr\n",
289 if (probe_kernel_write((void *)ip
, &op
, MCOUNT_INSN_SIZE
))
292 flush_icache_range(ip
, ip
+ 8);
297 #endif /* CONFIG_MODULES */
299 int ftrace_make_nop(struct module
*mod
,
300 struct dyn_ftrace
*rec
, unsigned long addr
)
302 unsigned long ip
= rec
->ip
;
303 unsigned int old
, new;
306 * If the calling address is more that 24 bits away,
307 * then we had to use a trampoline to make the call.
308 * Otherwise just update the call site.
310 if (test_24bit_addr(ip
, addr
)) {
312 old
= ftrace_call_replace(ip
, addr
, 1);
314 return ftrace_modify_code(ip
, old
, new);
317 #ifdef CONFIG_MODULES
319 * Out of range jumps are called from modules.
320 * We should either already have a pointer to the module
321 * or it has been passed in.
323 if (!rec
->arch
.mod
) {
325 printk(KERN_ERR
"No module loaded addr=%lx\n",
331 if (mod
!= rec
->arch
.mod
) {
333 "Record mod %p not equal to passed in mod %p\n",
337 /* nothing to do if mod == rec->arch.mod */
341 return __ftrace_make_nop(mod
, rec
, addr
);
343 /* We should not get here without modules */
345 #endif /* CONFIG_MODULES */
348 #ifdef CONFIG_MODULES
351 __ftrace_make_call(struct dyn_ftrace
*rec
, unsigned long addr
)
354 unsigned long ip
= rec
->ip
;
356 /* read where this goes */
357 if (probe_kernel_read(op
, (void *)ip
, MCOUNT_INSN_SIZE
* 2))
361 * It should be pointing to two nops or
364 if (((op
[0] != 0x48000008) || (op
[1] != 0xe8410028)) &&
365 ((op
[0] != PPC_INST_NOP
) || (op
[1] != PPC_INST_NOP
))) {
366 printk(KERN_ERR
"Expected NOPs but have %x %x\n", op
[0], op
[1]);
370 /* If we never set up a trampoline to ftrace_caller, then bail */
371 if (!rec
->arch
.mod
->arch
.tramp
) {
372 printk(KERN_ERR
"No ftrace trampoline\n");
376 /* create the branch to the trampoline */
377 op
[0] = create_branch((unsigned int *)ip
,
378 rec
->arch
.mod
->arch
.tramp
, BRANCH_SET_LINK
);
380 printk(KERN_ERR
"REL24 out of range!\n");
387 pr_devel("write to %lx\n", rec
->ip
);
389 if (probe_kernel_write((void *)ip
, op
, MCOUNT_INSN_SIZE
* 2))
392 flush_icache_range(ip
, ip
+ 8);
398 __ftrace_make_call(struct dyn_ftrace
*rec
, unsigned long addr
)
401 unsigned long ip
= rec
->ip
;
403 /* read where this goes */
404 if (probe_kernel_read(&op
, (void *)ip
, MCOUNT_INSN_SIZE
))
407 /* It should be pointing to a nop */
408 if (op
!= PPC_INST_NOP
) {
409 printk(KERN_ERR
"Expected NOP but have %x\n", op
);
413 /* If we never set up a trampoline to ftrace_caller, then bail */
414 if (!rec
->arch
.mod
->arch
.tramp
) {
415 printk(KERN_ERR
"No ftrace trampoline\n");
419 /* create the branch to the trampoline */
420 op
= create_branch((unsigned int *)ip
,
421 rec
->arch
.mod
->arch
.tramp
, BRANCH_SET_LINK
);
423 printk(KERN_ERR
"REL24 out of range!\n");
427 pr_devel("write to %lx\n", rec
->ip
);
429 if (probe_kernel_write((void *)ip
, &op
, MCOUNT_INSN_SIZE
))
432 flush_icache_range(ip
, ip
+ 8);
436 #endif /* CONFIG_PPC64 */
437 #endif /* CONFIG_MODULES */
439 int ftrace_make_call(struct dyn_ftrace
*rec
, unsigned long addr
)
441 unsigned long ip
= rec
->ip
;
442 unsigned int old
, new;
445 * If the calling address is more that 24 bits away,
446 * then we had to use a trampoline to make the call.
447 * Otherwise just update the call site.
449 if (test_24bit_addr(ip
, addr
)) {
452 new = ftrace_call_replace(ip
, addr
, 1);
453 return ftrace_modify_code(ip
, old
, new);
456 #ifdef CONFIG_MODULES
458 * Out of range jumps are called from modules.
459 * Being that we are converting from nop, it had better
460 * already have a module defined.
462 if (!rec
->arch
.mod
) {
463 printk(KERN_ERR
"No module loaded\n");
467 return __ftrace_make_call(rec
, addr
);
469 /* We should not get here without modules */
471 #endif /* CONFIG_MODULES */
474 int ftrace_update_ftrace_func(ftrace_func_t func
)
476 unsigned long ip
= (unsigned long)(&ftrace_call
);
477 unsigned int old
, new;
480 old
= *(unsigned int *)&ftrace_call
;
481 new = ftrace_call_replace(ip
, (unsigned long)func
, 1);
482 ret
= ftrace_modify_code(ip
, old
, new);
487 int __init
ftrace_dyn_arch_init(void *data
)
489 /* caller expects data to be zero */
490 unsigned long *p
= data
;
496 #endif /* CONFIG_DYNAMIC_FTRACE */
498 #ifdef CONFIG_FUNCTION_GRAPH_TRACER
500 #ifdef CONFIG_DYNAMIC_FTRACE
501 extern void ftrace_graph_call(void);
502 extern void ftrace_graph_stub(void);
504 int ftrace_enable_ftrace_graph_caller(void)
506 unsigned long ip
= (unsigned long)(&ftrace_graph_call
);
507 unsigned long addr
= (unsigned long)(&ftrace_graph_caller
);
508 unsigned long stub
= (unsigned long)(&ftrace_graph_stub
);
509 unsigned int old
, new;
511 old
= ftrace_call_replace(ip
, stub
, 0);
512 new = ftrace_call_replace(ip
, addr
, 0);
514 return ftrace_modify_code(ip
, old
, new);
517 int ftrace_disable_ftrace_graph_caller(void)
519 unsigned long ip
= (unsigned long)(&ftrace_graph_call
);
520 unsigned long addr
= (unsigned long)(&ftrace_graph_caller
);
521 unsigned long stub
= (unsigned long)(&ftrace_graph_stub
);
522 unsigned int old
, new;
524 old
= ftrace_call_replace(ip
, addr
, 0);
525 new = ftrace_call_replace(ip
, stub
, 0);
527 return ftrace_modify_code(ip
, old
, new);
529 #endif /* CONFIG_DYNAMIC_FTRACE */
532 extern void mod_return_to_handler(void);
536 * Hook the return address and push it in the stack of return addrs
537 * in current thread info.
539 void prepare_ftrace_return(unsigned long *parent
, unsigned long self_addr
)
543 struct ftrace_graph_ent trace
;
544 unsigned long return_hooker
= (unsigned long)&return_to_handler
;
546 if (unlikely(atomic_read(¤t
->tracing_graph_pause
)))
550 /* non core kernel code needs to save and restore the TOC */
551 if (REGION_ID(self_addr
) != KERNEL_REGION_ID
)
552 return_hooker
= (unsigned long)&mod_return_to_handler
;
555 return_hooker
= ppc_function_entry((void *)return_hooker
);
558 * Protect against fault, even if it shouldn't
559 * happen. This tool is too much intrusive to
560 * ignore such a protection.
563 "1: " PPC_LL
"%[old], 0(%[parent])\n"
564 "2: " PPC_STL
"%[return_hooker], 0(%[parent])\n"
565 " li %[faulted], 0\n"
568 ".section .fixup, \"ax\"\n"
569 "4: li %[faulted], 1\n"
573 ".section __ex_table,\"a\"\n"
579 : [old
] "=&r" (old
), [faulted
] "=r" (faulted
)
580 : [parent
] "r" (parent
), [return_hooker
] "r" (return_hooker
)
584 if (unlikely(faulted
)) {
590 if (ftrace_push_return_trace(old
, self_addr
, &trace
.depth
, 0) == -EBUSY
) {
595 trace
.func
= self_addr
;
597 /* Only trace if the calling function expects to */
598 if (!ftrace_graph_entry(&trace
)) {
599 current
->curr_ret_stack
--;
603 #endif /* CONFIG_FUNCTION_GRAPH_TRACER */
605 #if defined(CONFIG_FTRACE_SYSCALLS) && defined(CONFIG_PPC64)
606 unsigned long __init
arch_syscall_addr(int nr
)
608 return sys_call_table
[nr
*2];
610 #endif /* CONFIG_FTRACE_SYSCALLS && CONFIG_PPC64 */