Loading...
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Dynamic function tracer architecture backend.
4 *
5 * Copyright IBM Corp. 2009,2014
6 *
7 * Author(s): Martin Schwidefsky <schwidefsky@de.ibm.com>
8 */
9
10#include <linux/hardirq.h>
11#include <linux/uaccess.h>
12#include <linux/ftrace.h>
13#include <linux/kernel.h>
14#include <linux/types.h>
15#include <linux/kmsan-checks.h>
16#include <linux/kprobes.h>
17#include <linux/execmem.h>
18#include <trace/syscall.h>
19#include <asm/asm-offsets.h>
20#include <asm/text-patching.h>
21#include <asm/cacheflush.h>
22#include <asm/ftrace.lds.h>
23#include <asm/nospec-branch.h>
24#include <asm/set_memory.h>
25#include "entry.h"
26#include "ftrace.h"
27
28/*
29 * To generate function prologue either gcc's hotpatch feature (since gcc 4.8)
30 * or a combination of -pg -mrecord-mcount -mnop-mcount -mfentry flags
31 * (since gcc 9 / clang 10) is used.
32 * In both cases the original and also the disabled function prologue contains
33 * only a single six byte instruction and looks like this:
34 * > brcl 0,0 # offset 0
35 * To enable ftrace the code gets patched like above and afterwards looks
36 * like this:
37 * > brasl %r0,ftrace_caller # offset 0
38 *
39 * The instruction will be patched by ftrace_make_call / ftrace_make_nop.
40 * The ftrace function gets called with a non-standard C function call ABI
41 * where r0 contains the return address. It is also expected that the called
42 * function only clobbers r0 and r1, but restores r2-r15.
43 * For module code we can't directly jump to ftrace caller, but need a
44 * trampoline (ftrace_plt), which clobbers also r1.
45 */
46
47void *ftrace_func __read_mostly = ftrace_stub;
48struct ftrace_insn {
49 u16 opc;
50 s32 disp;
51} __packed;
52
53static const char *ftrace_shared_hotpatch_trampoline(const char **end)
54{
55 const char *tstart, *tend;
56
57 tstart = ftrace_shared_hotpatch_trampoline_br;
58 tend = ftrace_shared_hotpatch_trampoline_br_end;
59#ifdef CONFIG_EXPOLINE
60 if (!nospec_disable) {
61 tstart = ftrace_shared_hotpatch_trampoline_exrl;
62 tend = ftrace_shared_hotpatch_trampoline_exrl_end;
63 }
64#endif /* CONFIG_EXPOLINE */
65 if (end)
66 *end = tend;
67 return tstart;
68}
69
70bool ftrace_need_init_nop(void)
71{
72 return !MACHINE_HAS_SEQ_INSN;
73}
74
75int ftrace_init_nop(struct module *mod, struct dyn_ftrace *rec)
76{
77 static struct ftrace_hotpatch_trampoline *next_vmlinux_trampoline =
78 __ftrace_hotpatch_trampolines_start;
79 static const struct ftrace_insn orig = { .opc = 0xc004, .disp = 0 };
80 static struct ftrace_hotpatch_trampoline *trampoline;
81 struct ftrace_hotpatch_trampoline **next_trampoline;
82 struct ftrace_hotpatch_trampoline *trampolines_end;
83 struct ftrace_hotpatch_trampoline tmp;
84 struct ftrace_insn *insn;
85 struct ftrace_insn old;
86 const char *shared;
87 s32 disp;
88
89 BUILD_BUG_ON(sizeof(struct ftrace_hotpatch_trampoline) !=
90 SIZEOF_FTRACE_HOTPATCH_TRAMPOLINE);
91
92 next_trampoline = &next_vmlinux_trampoline;
93 trampolines_end = __ftrace_hotpatch_trampolines_end;
94 shared = ftrace_shared_hotpatch_trampoline(NULL);
95#ifdef CONFIG_MODULES
96 if (mod) {
97 next_trampoline = &mod->arch.next_trampoline;
98 trampolines_end = mod->arch.trampolines_end;
99 }
100#endif
101
102 if (WARN_ON_ONCE(*next_trampoline >= trampolines_end))
103 return -ENOMEM;
104 trampoline = (*next_trampoline)++;
105
106 if (copy_from_kernel_nofault(&old, (void *)rec->ip, sizeof(old)))
107 return -EFAULT;
108 /* Check for the compiler-generated fentry nop (brcl 0, .). */
109 if (WARN_ON_ONCE(memcmp(&orig, &old, sizeof(old))))
110 return -EINVAL;
111
112 /* Generate the trampoline. */
113 tmp.brasl_opc = 0xc015; /* brasl %r1, shared */
114 tmp.brasl_disp = (shared - (const char *)&trampoline->brasl_opc) / 2;
115 tmp.interceptor = FTRACE_ADDR;
116 tmp.rest_of_intercepted_function = rec->ip + sizeof(struct ftrace_insn);
117 s390_kernel_write(trampoline, &tmp, sizeof(tmp));
118
119 /* Generate a jump to the trampoline. */
120 disp = ((char *)trampoline - (char *)rec->ip) / 2;
121 insn = (struct ftrace_insn *)rec->ip;
122 s390_kernel_write(&insn->disp, &disp, sizeof(disp));
123
124 return 0;
125}
126
127static struct ftrace_hotpatch_trampoline *ftrace_get_trampoline(struct dyn_ftrace *rec)
128{
129 struct ftrace_hotpatch_trampoline *trampoline;
130 struct ftrace_insn insn;
131 s64 disp;
132 u16 opc;
133
134 if (copy_from_kernel_nofault(&insn, (void *)rec->ip, sizeof(insn)))
135 return ERR_PTR(-EFAULT);
136 disp = (s64)insn.disp * 2;
137 trampoline = (void *)(rec->ip + disp);
138 if (get_kernel_nofault(opc, &trampoline->brasl_opc))
139 return ERR_PTR(-EFAULT);
140 if (opc != 0xc015)
141 return ERR_PTR(-EINVAL);
142 return trampoline;
143}
144
145static inline struct ftrace_insn
146ftrace_generate_branch_insn(unsigned long ip, unsigned long target)
147{
148 /* brasl r0,target or brcl 0,0 */
149 return (struct ftrace_insn){ .opc = target ? 0xc005 : 0xc004,
150 .disp = target ? (target - ip) / 2 : 0 };
151}
152
153static int ftrace_patch_branch_insn(unsigned long ip, unsigned long old_target,
154 unsigned long target)
155{
156 struct ftrace_insn orig = ftrace_generate_branch_insn(ip, old_target);
157 struct ftrace_insn new = ftrace_generate_branch_insn(ip, target);
158 struct ftrace_insn old;
159
160 if (!IS_ALIGNED(ip, 8))
161 return -EINVAL;
162 if (copy_from_kernel_nofault(&old, (void *)ip, sizeof(old)))
163 return -EFAULT;
164 /* Verify that the to be replaced code matches what we expect. */
165 if (memcmp(&orig, &old, sizeof(old)))
166 return -EINVAL;
167 s390_kernel_write((void *)ip, &new, sizeof(new));
168 return 0;
169}
170
171static int ftrace_modify_trampoline_call(struct dyn_ftrace *rec,
172 unsigned long old_addr,
173 unsigned long addr)
174{
175 struct ftrace_hotpatch_trampoline *trampoline;
176 u64 old;
177
178 trampoline = ftrace_get_trampoline(rec);
179 if (IS_ERR(trampoline))
180 return PTR_ERR(trampoline);
181 if (get_kernel_nofault(old, &trampoline->interceptor))
182 return -EFAULT;
183 if (old != old_addr)
184 return -EINVAL;
185 s390_kernel_write(&trampoline->interceptor, &addr, sizeof(addr));
186 return 0;
187}
188
189int ftrace_modify_call(struct dyn_ftrace *rec, unsigned long old_addr,
190 unsigned long addr)
191{
192 if (MACHINE_HAS_SEQ_INSN)
193 return ftrace_patch_branch_insn(rec->ip, old_addr, addr);
194 else
195 return ftrace_modify_trampoline_call(rec, old_addr, addr);
196}
197
198static int ftrace_patch_branch_mask(void *addr, u16 expected, bool enable)
199{
200 u16 old;
201 u8 op;
202
203 if (get_kernel_nofault(old, addr))
204 return -EFAULT;
205 if (old != expected)
206 return -EINVAL;
207 /* set mask field to all ones or zeroes */
208 op = enable ? 0xf4 : 0x04;
209 s390_kernel_write((char *)addr + 1, &op, sizeof(op));
210 return 0;
211}
212
213int ftrace_make_nop(struct module *mod, struct dyn_ftrace *rec,
214 unsigned long addr)
215{
216 /* Expect brcl 0xf,... for the !MACHINE_HAS_SEQ_INSN case */
217 if (MACHINE_HAS_SEQ_INSN)
218 return ftrace_patch_branch_insn(rec->ip, addr, 0);
219 else
220 return ftrace_patch_branch_mask((void *)rec->ip, 0xc0f4, false);
221}
222
223static int ftrace_make_trampoline_call(struct dyn_ftrace *rec, unsigned long addr)
224{
225 struct ftrace_hotpatch_trampoline *trampoline;
226
227 trampoline = ftrace_get_trampoline(rec);
228 if (IS_ERR(trampoline))
229 return PTR_ERR(trampoline);
230 s390_kernel_write(&trampoline->interceptor, &addr, sizeof(addr));
231 /* Expect brcl 0x0,... */
232 return ftrace_patch_branch_mask((void *)rec->ip, 0xc004, true);
233}
234
235int ftrace_make_call(struct dyn_ftrace *rec, unsigned long addr)
236{
237 if (MACHINE_HAS_SEQ_INSN)
238 return ftrace_patch_branch_insn(rec->ip, 0, addr);
239 else
240 return ftrace_make_trampoline_call(rec, addr);
241}
242
243int ftrace_update_ftrace_func(ftrace_func_t func)
244{
245 ftrace_func = func;
246 return 0;
247}
248
249void arch_ftrace_update_code(int command)
250{
251 ftrace_modify_all_code(command);
252}
253
254void ftrace_arch_code_modify_post_process(void)
255{
256 /*
257 * Flush any pre-fetched instructions on all
258 * CPUs to make the new code visible.
259 */
260 text_poke_sync_lock();
261}
262
263#ifdef CONFIG_FUNCTION_GRAPH_TRACER
264/*
265 * Hook the return address and push it in the stack of return addresses
266 * in current thread info.
267 */
268unsigned long prepare_ftrace_return(unsigned long ra, unsigned long sp,
269 unsigned long ip)
270{
271 if (unlikely(ftrace_graph_is_dead()))
272 goto out;
273 if (unlikely(atomic_read(¤t->tracing_graph_pause)))
274 goto out;
275 ip -= MCOUNT_INSN_SIZE;
276 if (!function_graph_enter(ra, ip, 0, (void *) sp))
277 ra = (unsigned long) return_to_handler;
278out:
279 return ra;
280}
281NOKPROBE_SYMBOL(prepare_ftrace_return);
282
283/*
284 * Patch the kernel code at ftrace_graph_caller location. The instruction
285 * there is branch relative on condition. To enable the ftrace graph code
286 * block, we simply patch the mask field of the instruction to zero and
287 * turn the instruction into a nop.
288 * To disable the ftrace graph code the mask field will be patched to
289 * all ones, which turns the instruction into an unconditional branch.
290 */
291int ftrace_enable_ftrace_graph_caller(void)
292{
293 /* Expect brc 0xf,... */
294 return ftrace_patch_branch_mask(ftrace_graph_caller, 0xa7f4, false);
295}
296
297int ftrace_disable_ftrace_graph_caller(void)
298{
299 /* Expect brc 0x0,... */
300 return ftrace_patch_branch_mask(ftrace_graph_caller, 0xa704, true);
301}
302
303#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
304
305#ifdef CONFIG_KPROBES_ON_FTRACE
306void kprobe_ftrace_handler(unsigned long ip, unsigned long parent_ip,
307 struct ftrace_ops *ops, struct ftrace_regs *fregs)
308{
309 struct kprobe_ctlblk *kcb;
310 struct pt_regs *regs;
311 struct kprobe *p;
312 int bit;
313
314 if (unlikely(kprobe_ftrace_disabled))
315 return;
316
317 bit = ftrace_test_recursion_trylock(ip, parent_ip);
318 if (bit < 0)
319 return;
320
321 kmsan_unpoison_memory(fregs, ftrace_regs_size());
322 regs = ftrace_get_regs(fregs);
323 p = get_kprobe((kprobe_opcode_t *)ip);
324 if (!regs || unlikely(!p) || kprobe_disabled(p))
325 goto out;
326
327 if (kprobe_running()) {
328 kprobes_inc_nmissed_count(p);
329 goto out;
330 }
331
332 __this_cpu_write(current_kprobe, p);
333
334 kcb = get_kprobe_ctlblk();
335 kcb->kprobe_status = KPROBE_HIT_ACTIVE;
336
337 instruction_pointer_set(regs, ip);
338
339 if (!p->pre_handler || !p->pre_handler(p, regs)) {
340
341 instruction_pointer_set(regs, ip + MCOUNT_INSN_SIZE);
342
343 if (unlikely(p->post_handler)) {
344 kcb->kprobe_status = KPROBE_HIT_SSDONE;
345 p->post_handler(p, regs, 0);
346 }
347 }
348 __this_cpu_write(current_kprobe, NULL);
349out:
350 ftrace_test_recursion_unlock(bit);
351}
352NOKPROBE_SYMBOL(kprobe_ftrace_handler);
353
354int arch_prepare_kprobe_ftrace(struct kprobe *p)
355{
356 p->ainsn.insn = NULL;
357 return 0;
358}
359#endif
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Dynamic function tracer architecture backend.
4 *
5 * Copyright IBM Corp. 2009,2014
6 *
7 * Author(s): Martin Schwidefsky <schwidefsky@de.ibm.com>
8 */
9
10#include <linux/moduleloader.h>
11#include <linux/hardirq.h>
12#include <linux/uaccess.h>
13#include <linux/ftrace.h>
14#include <linux/kernel.h>
15#include <linux/types.h>
16#include <linux/kprobes.h>
17#include <trace/syscall.h>
18#include <asm/asm-offsets.h>
19#include <asm/text-patching.h>
20#include <asm/cacheflush.h>
21#include <asm/ftrace.lds.h>
22#include <asm/nospec-branch.h>
23#include <asm/set_memory.h>
24#include "entry.h"
25#include "ftrace.h"
26
27/*
28 * To generate function prologue either gcc's hotpatch feature (since gcc 4.8)
29 * or a combination of -pg -mrecord-mcount -mnop-mcount -mfentry flags
30 * (since gcc 9 / clang 10) is used.
31 * In both cases the original and also the disabled function prologue contains
32 * only a single six byte instruction and looks like this:
33 * > brcl 0,0 # offset 0
34 * To enable ftrace the code gets patched like above and afterwards looks
35 * like this:
36 * > brasl %r0,ftrace_caller # offset 0
37 *
38 * The instruction will be patched by ftrace_make_call / ftrace_make_nop.
39 * The ftrace function gets called with a non-standard C function call ABI
40 * where r0 contains the return address. It is also expected that the called
41 * function only clobbers r0 and r1, but restores r2-r15.
42 * For module code we can't directly jump to ftrace caller, but need a
43 * trampoline (ftrace_plt), which clobbers also r1.
44 */
45
46void *ftrace_func __read_mostly = ftrace_stub;
47struct ftrace_insn {
48 u16 opc;
49 s32 disp;
50} __packed;
51
52asm(
53 " .align 16\n"
54 "ftrace_shared_hotpatch_trampoline_br:\n"
55 " lmg %r0,%r1,2(%r1)\n"
56 " br %r1\n"
57 "ftrace_shared_hotpatch_trampoline_br_end:\n"
58);
59
60#ifdef CONFIG_EXPOLINE
61asm(
62 " .align 16\n"
63 "ftrace_shared_hotpatch_trampoline_exrl:\n"
64 " lmg %r0,%r1,2(%r1)\n"
65 " exrl %r0,0f\n"
66 " j .\n"
67 "0: br %r1\n"
68 "ftrace_shared_hotpatch_trampoline_exrl_end:\n"
69);
70#endif /* CONFIG_EXPOLINE */
71
72#ifdef CONFIG_MODULES
73static char *ftrace_plt;
74#endif /* CONFIG_MODULES */
75
76static const char *ftrace_shared_hotpatch_trampoline(const char **end)
77{
78 const char *tstart, *tend;
79
80 tstart = ftrace_shared_hotpatch_trampoline_br;
81 tend = ftrace_shared_hotpatch_trampoline_br_end;
82#ifdef CONFIG_EXPOLINE
83 if (!nospec_disable) {
84 tstart = ftrace_shared_hotpatch_trampoline_exrl;
85 tend = ftrace_shared_hotpatch_trampoline_exrl_end;
86 }
87#endif /* CONFIG_EXPOLINE */
88 if (end)
89 *end = tend;
90 return tstart;
91}
92
93bool ftrace_need_init_nop(void)
94{
95 return true;
96}
97
98int ftrace_init_nop(struct module *mod, struct dyn_ftrace *rec)
99{
100 static struct ftrace_hotpatch_trampoline *next_vmlinux_trampoline =
101 __ftrace_hotpatch_trampolines_start;
102 static const char orig[6] = { 0xc0, 0x04, 0x00, 0x00, 0x00, 0x00 };
103 static struct ftrace_hotpatch_trampoline *trampoline;
104 struct ftrace_hotpatch_trampoline **next_trampoline;
105 struct ftrace_hotpatch_trampoline *trampolines_end;
106 struct ftrace_hotpatch_trampoline tmp;
107 struct ftrace_insn *insn;
108 const char *shared;
109 s32 disp;
110
111 BUILD_BUG_ON(sizeof(struct ftrace_hotpatch_trampoline) !=
112 SIZEOF_FTRACE_HOTPATCH_TRAMPOLINE);
113
114 next_trampoline = &next_vmlinux_trampoline;
115 trampolines_end = __ftrace_hotpatch_trampolines_end;
116 shared = ftrace_shared_hotpatch_trampoline(NULL);
117#ifdef CONFIG_MODULES
118 if (mod) {
119 next_trampoline = &mod->arch.next_trampoline;
120 trampolines_end = mod->arch.trampolines_end;
121 shared = ftrace_plt;
122 }
123#endif
124
125 if (WARN_ON_ONCE(*next_trampoline >= trampolines_end))
126 return -ENOMEM;
127 trampoline = (*next_trampoline)++;
128
129 /* Check for the compiler-generated fentry nop (brcl 0, .). */
130 if (WARN_ON_ONCE(memcmp((const void *)rec->ip, &orig, sizeof(orig))))
131 return -EINVAL;
132
133 /* Generate the trampoline. */
134 tmp.brasl_opc = 0xc015; /* brasl %r1, shared */
135 tmp.brasl_disp = (shared - (const char *)&trampoline->brasl_opc) / 2;
136 tmp.interceptor = FTRACE_ADDR;
137 tmp.rest_of_intercepted_function = rec->ip + sizeof(struct ftrace_insn);
138 s390_kernel_write(trampoline, &tmp, sizeof(tmp));
139
140 /* Generate a jump to the trampoline. */
141 disp = ((char *)trampoline - (char *)rec->ip) / 2;
142 insn = (struct ftrace_insn *)rec->ip;
143 s390_kernel_write(&insn->disp, &disp, sizeof(disp));
144
145 return 0;
146}
147
148static struct ftrace_hotpatch_trampoline *ftrace_get_trampoline(struct dyn_ftrace *rec)
149{
150 struct ftrace_hotpatch_trampoline *trampoline;
151 struct ftrace_insn insn;
152 s64 disp;
153 u16 opc;
154
155 if (copy_from_kernel_nofault(&insn, (void *)rec->ip, sizeof(insn)))
156 return ERR_PTR(-EFAULT);
157 disp = (s64)insn.disp * 2;
158 trampoline = (void *)(rec->ip + disp);
159 if (get_kernel_nofault(opc, &trampoline->brasl_opc))
160 return ERR_PTR(-EFAULT);
161 if (opc != 0xc015)
162 return ERR_PTR(-EINVAL);
163 return trampoline;
164}
165
166int ftrace_modify_call(struct dyn_ftrace *rec, unsigned long old_addr,
167 unsigned long addr)
168{
169 struct ftrace_hotpatch_trampoline *trampoline;
170 u64 old;
171
172 trampoline = ftrace_get_trampoline(rec);
173 if (IS_ERR(trampoline))
174 return PTR_ERR(trampoline);
175 if (get_kernel_nofault(old, &trampoline->interceptor))
176 return -EFAULT;
177 if (old != old_addr)
178 return -EINVAL;
179 s390_kernel_write(&trampoline->interceptor, &addr, sizeof(addr));
180 return 0;
181}
182
183static int ftrace_patch_branch_mask(void *addr, u16 expected, bool enable)
184{
185 u16 old;
186 u8 op;
187
188 if (get_kernel_nofault(old, addr))
189 return -EFAULT;
190 if (old != expected)
191 return -EINVAL;
192 /* set mask field to all ones or zeroes */
193 op = enable ? 0xf4 : 0x04;
194 s390_kernel_write((char *)addr + 1, &op, sizeof(op));
195 return 0;
196}
197
198int ftrace_make_nop(struct module *mod, struct dyn_ftrace *rec,
199 unsigned long addr)
200{
201 /* Expect brcl 0xf,... */
202 return ftrace_patch_branch_mask((void *)rec->ip, 0xc0f4, false);
203}
204
205int ftrace_make_call(struct dyn_ftrace *rec, unsigned long addr)
206{
207 struct ftrace_hotpatch_trampoline *trampoline;
208
209 trampoline = ftrace_get_trampoline(rec);
210 if (IS_ERR(trampoline))
211 return PTR_ERR(trampoline);
212 s390_kernel_write(&trampoline->interceptor, &addr, sizeof(addr));
213 /* Expect brcl 0x0,... */
214 return ftrace_patch_branch_mask((void *)rec->ip, 0xc004, true);
215}
216
217int ftrace_update_ftrace_func(ftrace_func_t func)
218{
219 ftrace_func = func;
220 return 0;
221}
222
223void arch_ftrace_update_code(int command)
224{
225 ftrace_modify_all_code(command);
226}
227
228void ftrace_arch_code_modify_post_process(void)
229{
230 /*
231 * Flush any pre-fetched instructions on all
232 * CPUs to make the new code visible.
233 */
234 text_poke_sync_lock();
235}
236
237#ifdef CONFIG_MODULES
238
239static int __init ftrace_plt_init(void)
240{
241 const char *start, *end;
242
243 ftrace_plt = module_alloc(PAGE_SIZE);
244 if (!ftrace_plt)
245 panic("cannot allocate ftrace plt\n");
246
247 start = ftrace_shared_hotpatch_trampoline(&end);
248 memcpy(ftrace_plt, start, end - start);
249 set_memory_ro((unsigned long)ftrace_plt, 1);
250 return 0;
251}
252device_initcall(ftrace_plt_init);
253
254#endif /* CONFIG_MODULES */
255
256#ifdef CONFIG_FUNCTION_GRAPH_TRACER
257/*
258 * Hook the return address and push it in the stack of return addresses
259 * in current thread info.
260 */
261unsigned long prepare_ftrace_return(unsigned long ra, unsigned long sp,
262 unsigned long ip)
263{
264 if (unlikely(ftrace_graph_is_dead()))
265 goto out;
266 if (unlikely(atomic_read(¤t->tracing_graph_pause)))
267 goto out;
268 ip -= MCOUNT_INSN_SIZE;
269 if (!function_graph_enter(ra, ip, 0, (void *) sp))
270 ra = (unsigned long) return_to_handler;
271out:
272 return ra;
273}
274NOKPROBE_SYMBOL(prepare_ftrace_return);
275
276/*
277 * Patch the kernel code at ftrace_graph_caller location. The instruction
278 * there is branch relative on condition. To enable the ftrace graph code
279 * block, we simply patch the mask field of the instruction to zero and
280 * turn the instruction into a nop.
281 * To disable the ftrace graph code the mask field will be patched to
282 * all ones, which turns the instruction into an unconditional branch.
283 */
284int ftrace_enable_ftrace_graph_caller(void)
285{
286 int rc;
287
288 /* Expect brc 0xf,... */
289 rc = ftrace_patch_branch_mask(ftrace_graph_caller, 0xa7f4, false);
290 if (rc)
291 return rc;
292 text_poke_sync_lock();
293 return 0;
294}
295
296int ftrace_disable_ftrace_graph_caller(void)
297{
298 int rc;
299
300 /* Expect brc 0x0,... */
301 rc = ftrace_patch_branch_mask(ftrace_graph_caller, 0xa704, true);
302 if (rc)
303 return rc;
304 text_poke_sync_lock();
305 return 0;
306}
307
308#endif /* CONFIG_FUNCTION_GRAPH_TRACER */
309
310#ifdef CONFIG_KPROBES_ON_FTRACE
311void kprobe_ftrace_handler(unsigned long ip, unsigned long parent_ip,
312 struct ftrace_ops *ops, struct ftrace_regs *fregs)
313{
314 struct kprobe_ctlblk *kcb;
315 struct pt_regs *regs;
316 struct kprobe *p;
317 int bit;
318
319 bit = ftrace_test_recursion_trylock(ip, parent_ip);
320 if (bit < 0)
321 return;
322
323 regs = ftrace_get_regs(fregs);
324 p = get_kprobe((kprobe_opcode_t *)ip);
325 if (!regs || unlikely(!p) || kprobe_disabled(p))
326 goto out;
327
328 if (kprobe_running()) {
329 kprobes_inc_nmissed_count(p);
330 goto out;
331 }
332
333 __this_cpu_write(current_kprobe, p);
334
335 kcb = get_kprobe_ctlblk();
336 kcb->kprobe_status = KPROBE_HIT_ACTIVE;
337
338 instruction_pointer_set(regs, ip);
339
340 if (!p->pre_handler || !p->pre_handler(p, regs)) {
341
342 instruction_pointer_set(regs, ip + MCOUNT_INSN_SIZE);
343
344 if (unlikely(p->post_handler)) {
345 kcb->kprobe_status = KPROBE_HIT_SSDONE;
346 p->post_handler(p, regs, 0);
347 }
348 }
349 __this_cpu_write(current_kprobe, NULL);
350out:
351 ftrace_test_recursion_unlock(bit);
352}
353NOKPROBE_SYMBOL(kprobe_ftrace_handler);
354
355int arch_prepare_kprobe_ftrace(struct kprobe *p)
356{
357 p->ainsn.insn = NULL;
358 return 0;
359}
360#endif