trace_event_perf.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * trace event based perf event profiling/tracing
  4. *
  5. * Copyright (C) 2009 Red Hat Inc, Peter Zijlstra
  6. * Copyright (C) 2009-2010 Frederic Weisbecker <fweisbec@gmail.com>
  7. */
  8. #include <linux/module.h>
  9. #include <linux/kprobes.h>
  10. #include <linux/security.h>
  11. #include "trace.h"
  12. #include "trace_probe.h"
  13. static char __percpu *perf_trace_buf[PERF_NR_CONTEXTS];
  14. /*
  15. * Force it to be aligned to unsigned long to avoid misaligned accesses
  16. * surprises
  17. */
  18. typedef typeof(unsigned long [PERF_MAX_TRACE_SIZE / sizeof(unsigned long)])
  19. perf_trace_t;
  20. /* Count the events in use (per event id, not per instance) */
  21. static int total_ref_count;
  22. static int perf_trace_event_perm(struct trace_event_call *tp_event,
  23. struct perf_event *p_event)
  24. {
  25. int ret;
  26. if (tp_event->perf_perm) {
  27. ret = tp_event->perf_perm(tp_event, p_event);
  28. if (ret)
  29. return ret;
  30. }
  31. /*
  32. * We checked and allowed to create parent,
  33. * allow children without checking.
  34. */
  35. if (p_event->parent)
  36. return 0;
  37. /*
  38. * It's ok to check current process (owner) permissions in here,
  39. * because code below is called only via perf_event_open syscall.
  40. */
  41. /* The ftrace function trace is allowed only for root. */
  42. if (ftrace_event_is_function(tp_event)) {
  43. ret = perf_allow_tracepoint(&p_event->attr);
  44. if (ret)
  45. return ret;
  46. if (!is_sampling_event(p_event))
  47. return 0;
  48. /*
  49. * We don't allow user space callchains for function trace
  50. * event, due to issues with page faults while tracing page
  51. * fault handler and its overall trickiness nature.
  52. */
  53. if (!p_event->attr.exclude_callchain_user)
  54. return -EINVAL;
  55. /*
  56. * Same reason to disable user stack dump as for user space
  57. * callchains above.
  58. */
  59. if (p_event->attr.sample_type & PERF_SAMPLE_STACK_USER)
  60. return -EINVAL;
  61. }
  62. /* No tracing, just counting, so no obvious leak */
  63. if (!(p_event->attr.sample_type & PERF_SAMPLE_RAW))
  64. return 0;
  65. /* Some events are ok to be traced by non-root users... */
  66. if (p_event->attach_state == PERF_ATTACH_TASK) {
  67. if (tp_event->flags & TRACE_EVENT_FL_CAP_ANY)
  68. return 0;
  69. }
  70. /*
  71. * ...otherwise raw tracepoint data can be a severe data leak,
  72. * only allow root to have these.
  73. */
  74. ret = perf_allow_tracepoint(&p_event->attr);
  75. if (ret)
  76. return ret;
  77. return 0;
  78. }
  79. static int perf_trace_event_reg(struct trace_event_call *tp_event,
  80. struct perf_event *p_event)
  81. {
  82. struct hlist_head __percpu *list;
  83. int ret = -ENOMEM;
  84. int cpu;
  85. p_event->tp_event = tp_event;
  86. if (tp_event->perf_refcount++ > 0)
  87. return 0;
  88. list = alloc_percpu(struct hlist_head);
  89. if (!list)
  90. goto fail;
  91. for_each_possible_cpu(cpu)
  92. INIT_HLIST_HEAD(per_cpu_ptr(list, cpu));
  93. tp_event->perf_events = list;
  94. if (!total_ref_count) {
  95. char __percpu *buf;
  96. int i;
  97. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  98. buf = (char __percpu *)alloc_percpu(perf_trace_t);
  99. if (!buf)
  100. goto fail;
  101. perf_trace_buf[i] = buf;
  102. }
  103. }
  104. ret = tp_event->class->reg(tp_event, TRACE_REG_PERF_REGISTER, NULL);
  105. if (ret)
  106. goto fail;
  107. total_ref_count++;
  108. return 0;
  109. fail:
  110. if (!total_ref_count) {
  111. int i;
  112. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  113. free_percpu(perf_trace_buf[i]);
  114. perf_trace_buf[i] = NULL;
  115. }
  116. }
  117. if (!--tp_event->perf_refcount) {
  118. free_percpu(tp_event->perf_events);
  119. tp_event->perf_events = NULL;
  120. }
  121. return ret;
  122. }
  123. static void perf_trace_event_unreg(struct perf_event *p_event)
  124. {
  125. struct trace_event_call *tp_event = p_event->tp_event;
  126. int i;
  127. if (--tp_event->perf_refcount > 0)
  128. return;
  129. tp_event->class->reg(tp_event, TRACE_REG_PERF_UNREGISTER, NULL);
  130. /*
  131. * Ensure our callback won't be called anymore. The buffers
  132. * will be freed after that.
  133. */
  134. tracepoint_synchronize_unregister();
  135. free_percpu(tp_event->perf_events);
  136. tp_event->perf_events = NULL;
  137. if (!--total_ref_count) {
  138. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  139. free_percpu(perf_trace_buf[i]);
  140. perf_trace_buf[i] = NULL;
  141. }
  142. }
  143. }
  144. static int perf_trace_event_open(struct perf_event *p_event)
  145. {
  146. struct trace_event_call *tp_event = p_event->tp_event;
  147. return tp_event->class->reg(tp_event, TRACE_REG_PERF_OPEN, p_event);
  148. }
  149. static void perf_trace_event_close(struct perf_event *p_event)
  150. {
  151. struct trace_event_call *tp_event = p_event->tp_event;
  152. tp_event->class->reg(tp_event, TRACE_REG_PERF_CLOSE, p_event);
  153. }
  154. static int perf_trace_event_init(struct trace_event_call *tp_event,
  155. struct perf_event *p_event)
  156. {
  157. int ret;
  158. ret = perf_trace_event_perm(tp_event, p_event);
  159. if (ret)
  160. return ret;
  161. ret = perf_trace_event_reg(tp_event, p_event);
  162. if (ret)
  163. return ret;
  164. ret = perf_trace_event_open(p_event);
  165. if (ret) {
  166. perf_trace_event_unreg(p_event);
  167. return ret;
  168. }
  169. return 0;
  170. }
  171. int perf_trace_init(struct perf_event *p_event)
  172. {
  173. struct trace_event_call *tp_event;
  174. u64 event_id = p_event->attr.config;
  175. int ret = -EINVAL;
  176. mutex_lock(&event_mutex);
  177. list_for_each_entry(tp_event, &ftrace_events, list) {
  178. if (tp_event->event.type == event_id &&
  179. tp_event->class && tp_event->class->reg &&
  180. trace_event_try_get_ref(tp_event)) {
  181. ret = perf_trace_event_init(tp_event, p_event);
  182. if (ret)
  183. trace_event_put_ref(tp_event);
  184. break;
  185. }
  186. }
  187. mutex_unlock(&event_mutex);
  188. return ret;
  189. }
  190. void perf_trace_destroy(struct perf_event *p_event)
  191. {
  192. mutex_lock(&event_mutex);
  193. perf_trace_event_close(p_event);
  194. perf_trace_event_unreg(p_event);
  195. trace_event_put_ref(p_event->tp_event);
  196. mutex_unlock(&event_mutex);
  197. }
  198. #ifdef CONFIG_KPROBE_EVENTS
  199. int perf_kprobe_init(struct perf_event *p_event, bool is_retprobe)
  200. {
  201. int ret;
  202. char *func = NULL;
  203. struct trace_event_call *tp_event;
  204. if (p_event->attr.kprobe_func) {
  205. func = strndup_user(u64_to_user_ptr(p_event->attr.kprobe_func),
  206. KSYM_NAME_LEN);
  207. if (IS_ERR(func)) {
  208. ret = PTR_ERR(func);
  209. return (ret == -EINVAL) ? -E2BIG : ret;
  210. }
  211. if (func[0] == '\0') {
  212. kfree(func);
  213. func = NULL;
  214. }
  215. }
  216. tp_event = create_local_trace_kprobe(
  217. func, (void *)(unsigned long)(p_event->attr.kprobe_addr),
  218. p_event->attr.probe_offset, is_retprobe);
  219. if (IS_ERR(tp_event)) {
  220. ret = PTR_ERR(tp_event);
  221. goto out;
  222. }
  223. mutex_lock(&event_mutex);
  224. ret = perf_trace_event_init(tp_event, p_event);
  225. if (ret)
  226. destroy_local_trace_kprobe(tp_event);
  227. mutex_unlock(&event_mutex);
  228. out:
  229. kfree(func);
  230. return ret;
  231. }
  232. void perf_kprobe_destroy(struct perf_event *p_event)
  233. {
  234. mutex_lock(&event_mutex);
  235. perf_trace_event_close(p_event);
  236. perf_trace_event_unreg(p_event);
  237. trace_event_put_ref(p_event->tp_event);
  238. mutex_unlock(&event_mutex);
  239. destroy_local_trace_kprobe(p_event->tp_event);
  240. }
  241. #endif /* CONFIG_KPROBE_EVENTS */
  242. #ifdef CONFIG_UPROBE_EVENTS
  243. int perf_uprobe_init(struct perf_event *p_event,
  244. unsigned long ref_ctr_offset, bool is_retprobe)
  245. {
  246. int ret;
  247. char *path = NULL;
  248. struct trace_event_call *tp_event;
  249. if (!p_event->attr.uprobe_path)
  250. return -EINVAL;
  251. path = strndup_user(u64_to_user_ptr(p_event->attr.uprobe_path),
  252. PATH_MAX);
  253. if (IS_ERR(path)) {
  254. ret = PTR_ERR(path);
  255. return (ret == -EINVAL) ? -E2BIG : ret;
  256. }
  257. if (path[0] == '\0') {
  258. ret = -EINVAL;
  259. goto out;
  260. }
  261. tp_event = create_local_trace_uprobe(path, p_event->attr.probe_offset,
  262. ref_ctr_offset, is_retprobe);
  263. if (IS_ERR(tp_event)) {
  264. ret = PTR_ERR(tp_event);
  265. goto out;
  266. }
  267. /*
  268. * local trace_uprobe need to hold event_mutex to call
  269. * uprobe_buffer_enable() and uprobe_buffer_disable().
  270. * event_mutex is not required for local trace_kprobes.
  271. */
  272. mutex_lock(&event_mutex);
  273. ret = perf_trace_event_init(tp_event, p_event);
  274. if (ret)
  275. destroy_local_trace_uprobe(tp_event);
  276. mutex_unlock(&event_mutex);
  277. out:
  278. kfree(path);
  279. return ret;
  280. }
  281. void perf_uprobe_destroy(struct perf_event *p_event)
  282. {
  283. mutex_lock(&event_mutex);
  284. perf_trace_event_close(p_event);
  285. perf_trace_event_unreg(p_event);
  286. trace_event_put_ref(p_event->tp_event);
  287. mutex_unlock(&event_mutex);
  288. destroy_local_trace_uprobe(p_event->tp_event);
  289. }
  290. #endif /* CONFIG_UPROBE_EVENTS */
  291. int perf_trace_add(struct perf_event *p_event, int flags)
  292. {
  293. struct trace_event_call *tp_event = p_event->tp_event;
  294. struct hw_perf_event *hwc = &p_event->hw;
  295. if (!(flags & PERF_EF_START))
  296. p_event->hw.state = PERF_HES_STOPPED;
  297. if (is_sampling_event(p_event)) {
  298. hwc->last_period = hwc->sample_period;
  299. perf_swevent_set_period(p_event);
  300. }
  301. /*
  302. * If TRACE_REG_PERF_ADD returns false; no custom action was performed
  303. * and we need to take the default action of enqueueing our event on
  304. * the right per-cpu hlist.
  305. */
  306. if (!tp_event->class->reg(tp_event, TRACE_REG_PERF_ADD, p_event)) {
  307. struct hlist_head __percpu *pcpu_list;
  308. struct hlist_head *list;
  309. pcpu_list = tp_event->perf_events;
  310. if (WARN_ON_ONCE(!pcpu_list))
  311. return -EINVAL;
  312. list = this_cpu_ptr(pcpu_list);
  313. hlist_add_head_rcu(&p_event->hlist_entry, list);
  314. }
  315. return 0;
  316. }
  317. void perf_trace_del(struct perf_event *p_event, int flags)
  318. {
  319. struct trace_event_call *tp_event = p_event->tp_event;
  320. /*
  321. * If TRACE_REG_PERF_DEL returns false; no custom action was performed
  322. * and we need to take the default action of dequeueing our event from
  323. * the right per-cpu hlist.
  324. */
  325. if (!tp_event->class->reg(tp_event, TRACE_REG_PERF_DEL, p_event))
  326. hlist_del_rcu(&p_event->hlist_entry);
  327. }
  328. void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp)
  329. {
  330. char *raw_data;
  331. int rctx;
  332. BUILD_BUG_ON(PERF_MAX_TRACE_SIZE % sizeof(unsigned long));
  333. if (WARN_ONCE(size > PERF_MAX_TRACE_SIZE,
  334. "perf buffer not large enough, wanted %d, have %d",
  335. size, PERF_MAX_TRACE_SIZE))
  336. return NULL;
  337. *rctxp = rctx = perf_swevent_get_recursion_context();
  338. if (rctx < 0)
  339. return NULL;
  340. if (regs)
  341. *regs = this_cpu_ptr(&__perf_regs[rctx]);
  342. raw_data = this_cpu_ptr(perf_trace_buf[rctx]);
  343. /* zero the dead bytes from align to not leak stack to user */
  344. memset(&raw_data[size - sizeof(u64)], 0, sizeof(u64));
  345. return raw_data;
  346. }
  347. EXPORT_SYMBOL_GPL(perf_trace_buf_alloc);
  348. NOKPROBE_SYMBOL(perf_trace_buf_alloc);
  349. void perf_trace_buf_update(void *record, u16 type)
  350. {
  351. struct trace_entry *entry = record;
  352. tracing_generic_entry_update(entry, type, tracing_gen_ctx());
  353. }
  354. NOKPROBE_SYMBOL(perf_trace_buf_update);
  355. #ifdef CONFIG_FUNCTION_TRACER
  356. static void
  357. perf_ftrace_function_call(unsigned long ip, unsigned long parent_ip,
  358. struct ftrace_ops *ops, struct ftrace_regs *fregs)
  359. {
  360. struct ftrace_entry *entry;
  361. struct perf_event *event;
  362. struct hlist_head head;
  363. struct pt_regs regs;
  364. int rctx;
  365. int bit;
  366. if (!rcu_is_watching())
  367. return;
  368. bit = ftrace_test_recursion_trylock(ip, parent_ip);
  369. if (bit < 0)
  370. return;
  371. if ((unsigned long)ops->private != smp_processor_id())
  372. goto out;
  373. event = container_of(ops, struct perf_event, ftrace_ops);
  374. /*
  375. * @event->hlist entry is NULL (per INIT_HLIST_NODE), and all
  376. * the perf code does is hlist_for_each_entry_rcu(), so we can
  377. * get away with simply setting the @head.first pointer in order
  378. * to create a singular list.
  379. */
  380. head.first = &event->hlist_entry;
  381. #define ENTRY_SIZE (ALIGN(sizeof(struct ftrace_entry) + sizeof(u32), \
  382. sizeof(u64)) - sizeof(u32))
  383. BUILD_BUG_ON(ENTRY_SIZE > PERF_MAX_TRACE_SIZE);
  384. memset(&regs, 0, sizeof(regs));
  385. perf_fetch_caller_regs(&regs);
  386. entry = perf_trace_buf_alloc(ENTRY_SIZE, NULL, &rctx);
  387. if (!entry)
  388. goto out;
  389. entry->ip = ip;
  390. entry->parent_ip = parent_ip;
  391. perf_trace_buf_submit(entry, ENTRY_SIZE, rctx, TRACE_FN,
  392. 1, &regs, &head, NULL);
  393. out:
  394. ftrace_test_recursion_unlock(bit);
  395. #undef ENTRY_SIZE
  396. }
  397. static int perf_ftrace_function_register(struct perf_event *event)
  398. {
  399. struct ftrace_ops *ops = &event->ftrace_ops;
  400. ops->func = perf_ftrace_function_call;
  401. ops->private = (void *)(unsigned long)nr_cpu_ids;
  402. return register_ftrace_function(ops);
  403. }
  404. static int perf_ftrace_function_unregister(struct perf_event *event)
  405. {
  406. struct ftrace_ops *ops = &event->ftrace_ops;
  407. int ret = unregister_ftrace_function(ops);
  408. ftrace_free_filter(ops);
  409. return ret;
  410. }
  411. int perf_ftrace_event_register(struct trace_event_call *call,
  412. enum trace_reg type, void *data)
  413. {
  414. struct perf_event *event = data;
  415. switch (type) {
  416. case TRACE_REG_REGISTER:
  417. case TRACE_REG_UNREGISTER:
  418. break;
  419. case TRACE_REG_PERF_REGISTER:
  420. case TRACE_REG_PERF_UNREGISTER:
  421. return 0;
  422. case TRACE_REG_PERF_OPEN:
  423. return perf_ftrace_function_register(data);
  424. case TRACE_REG_PERF_CLOSE:
  425. return perf_ftrace_function_unregister(data);
  426. case TRACE_REG_PERF_ADD:
  427. event->ftrace_ops.private = (void *)(unsigned long)smp_processor_id();
  428. return 1;
  429. case TRACE_REG_PERF_DEL:
  430. event->ftrace_ops.private = (void *)(unsigned long)nr_cpu_ids;
  431. return 1;
  432. }
  433. return -EINVAL;
  434. }
  435. #endif /* CONFIG_FUNCTION_TRACER */