callchain.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497
  1. /*
  2. * Performance counter callchain support - powerpc architecture code
  3. *
  4. * Copyright © 2009 Paul Mackerras, IBM Corporation.
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public License
  8. * as published by the Free Software Foundation; either version
  9. * 2 of the License, or (at your option) any later version.
  10. */
  11. #include <linux/kernel.h>
  12. #include <linux/sched.h>
  13. #include <linux/perf_event.h>
  14. #include <linux/percpu.h>
  15. #include <linux/uaccess.h>
  16. #include <linux/mm.h>
  17. #include <asm/ptrace.h>
  18. #include <asm/pgtable.h>
  19. #include <asm/sigcontext.h>
  20. #include <asm/ucontext.h>
  21. #include <asm/vdso.h>
  22. #ifdef CONFIG_PPC64
  23. #include "../kernel/ppc32.h"
  24. #endif
  25. #include <asm/pte-walk.h>
  26. /*
  27. * Is sp valid as the address of the next kernel stack frame after prev_sp?
  28. * The next frame may be in a different stack area but should not go
  29. * back down in the same stack area.
  30. */
  31. static int valid_next_sp(unsigned long sp, unsigned long prev_sp)
  32. {
  33. if (sp & 0xf)
  34. return 0; /* must be 16-byte aligned */
  35. if (!validate_sp(sp, current, STACK_FRAME_OVERHEAD))
  36. return 0;
  37. if (sp >= prev_sp + STACK_FRAME_MIN_SIZE)
  38. return 1;
  39. /*
  40. * sp could decrease when we jump off an interrupt stack
  41. * back to the regular process stack.
  42. */
  43. if ((sp & ~(THREAD_SIZE - 1)) != (prev_sp & ~(THREAD_SIZE - 1)))
  44. return 1;
  45. return 0;
  46. }
  47. void
  48. perf_callchain_kernel(struct perf_callchain_entry_ctx *entry, struct pt_regs *regs)
  49. {
  50. unsigned long sp, next_sp;
  51. unsigned long next_ip;
  52. unsigned long lr;
  53. long level = 0;
  54. unsigned long *fp;
  55. lr = regs->link;
  56. sp = regs->gpr[1];
  57. perf_callchain_store(entry, perf_instruction_pointer(regs));
  58. if (!validate_sp(sp, current, STACK_FRAME_OVERHEAD))
  59. return;
  60. for (;;) {
  61. fp = (unsigned long *) sp;
  62. next_sp = fp[0];
  63. if (next_sp == sp + STACK_INT_FRAME_SIZE &&
  64. fp[STACK_FRAME_MARKER] == STACK_FRAME_REGS_MARKER) {
  65. /*
  66. * This looks like an interrupt frame for an
  67. * interrupt that occurred in the kernel
  68. */
  69. regs = (struct pt_regs *)(sp + STACK_FRAME_OVERHEAD);
  70. next_ip = regs->nip;
  71. lr = regs->link;
  72. level = 0;
  73. perf_callchain_store_context(entry, PERF_CONTEXT_KERNEL);
  74. } else {
  75. if (level == 0)
  76. next_ip = lr;
  77. else
  78. next_ip = fp[STACK_FRAME_LR_SAVE];
  79. /*
  80. * We can't tell which of the first two addresses
  81. * we get are valid, but we can filter out the
  82. * obviously bogus ones here. We replace them
  83. * with 0 rather than removing them entirely so
  84. * that userspace can tell which is which.
  85. */
  86. if ((level == 1 && next_ip == lr) ||
  87. (level <= 1 && !kernel_text_address(next_ip)))
  88. next_ip = 0;
  89. ++level;
  90. }
  91. perf_callchain_store(entry, next_ip);
  92. if (!valid_next_sp(next_sp, sp))
  93. return;
  94. sp = next_sp;
  95. }
  96. }
  97. #ifdef CONFIG_PPC64
  98. /*
  99. * On 64-bit we don't want to invoke hash_page on user addresses from
  100. * interrupt context, so if the access faults, we read the page tables
  101. * to find which page (if any) is mapped and access it directly.
  102. */
  103. static int read_user_stack_slow(void __user *ptr, void *buf, int nb)
  104. {
  105. int ret = -EFAULT;
  106. pgd_t *pgdir;
  107. pte_t *ptep, pte;
  108. unsigned shift;
  109. unsigned long addr = (unsigned long) ptr;
  110. unsigned long offset;
  111. unsigned long pfn, flags;
  112. void *kaddr;
  113. pgdir = current->mm->pgd;
  114. if (!pgdir)
  115. return -EFAULT;
  116. local_irq_save(flags);
  117. ptep = find_current_mm_pte(pgdir, addr, NULL, &shift);
  118. if (!ptep)
  119. goto err_out;
  120. if (!shift)
  121. shift = PAGE_SHIFT;
  122. /* align address to page boundary */
  123. offset = addr & ((1UL << shift) - 1);
  124. pte = READ_ONCE(*ptep);
  125. if (!pte_present(pte) || !pte_user(pte))
  126. goto err_out;
  127. pfn = pte_pfn(pte);
  128. if (!page_is_ram(pfn))
  129. goto err_out;
  130. /* no highmem to worry about here */
  131. kaddr = pfn_to_kaddr(pfn);
  132. memcpy(buf, kaddr + offset, nb);
  133. ret = 0;
  134. err_out:
  135. local_irq_restore(flags);
  136. return ret;
  137. }
  138. static int read_user_stack_64(unsigned long __user *ptr, unsigned long *ret)
  139. {
  140. if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned long) ||
  141. ((unsigned long)ptr & 7))
  142. return -EFAULT;
  143. pagefault_disable();
  144. if (!__get_user_inatomic(*ret, ptr)) {
  145. pagefault_enable();
  146. return 0;
  147. }
  148. pagefault_enable();
  149. return read_user_stack_slow(ptr, ret, 8);
  150. }
  151. static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret)
  152. {
  153. if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) ||
  154. ((unsigned long)ptr & 3))
  155. return -EFAULT;
  156. pagefault_disable();
  157. if (!__get_user_inatomic(*ret, ptr)) {
  158. pagefault_enable();
  159. return 0;
  160. }
  161. pagefault_enable();
  162. return read_user_stack_slow(ptr, ret, 4);
  163. }
  164. static inline int valid_user_sp(unsigned long sp, int is_64)
  165. {
  166. if (!sp || (sp & 7) || sp > (is_64 ? TASK_SIZE : 0x100000000UL) - 32)
  167. return 0;
  168. return 1;
  169. }
  170. /*
  171. * 64-bit user processes use the same stack frame for RT and non-RT signals.
  172. */
  173. struct signal_frame_64 {
  174. char dummy[__SIGNAL_FRAMESIZE];
  175. struct ucontext uc;
  176. unsigned long unused[2];
  177. unsigned int tramp[6];
  178. struct siginfo *pinfo;
  179. void *puc;
  180. struct siginfo info;
  181. char abigap[288];
  182. };
  183. static int is_sigreturn_64_address(unsigned long nip, unsigned long fp)
  184. {
  185. if (nip == fp + offsetof(struct signal_frame_64, tramp))
  186. return 1;
  187. if (vdso64_rt_sigtramp && current->mm->context.vdso_base &&
  188. nip == current->mm->context.vdso_base + vdso64_rt_sigtramp)
  189. return 1;
  190. return 0;
  191. }
  192. /*
  193. * Do some sanity checking on the signal frame pointed to by sp.
  194. * We check the pinfo and puc pointers in the frame.
  195. */
  196. static int sane_signal_64_frame(unsigned long sp)
  197. {
  198. struct signal_frame_64 __user *sf;
  199. unsigned long pinfo, puc;
  200. sf = (struct signal_frame_64 __user *) sp;
  201. if (read_user_stack_64((unsigned long __user *) &sf->pinfo, &pinfo) ||
  202. read_user_stack_64((unsigned long __user *) &sf->puc, &puc))
  203. return 0;
  204. return pinfo == (unsigned long) &sf->info &&
  205. puc == (unsigned long) &sf->uc;
  206. }
  207. static void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry,
  208. struct pt_regs *regs)
  209. {
  210. unsigned long sp, next_sp;
  211. unsigned long next_ip;
  212. unsigned long lr;
  213. long level = 0;
  214. struct signal_frame_64 __user *sigframe;
  215. unsigned long __user *fp, *uregs;
  216. next_ip = perf_instruction_pointer(regs);
  217. lr = regs->link;
  218. sp = regs->gpr[1];
  219. perf_callchain_store(entry, next_ip);
  220. while (entry->nr < entry->max_stack) {
  221. fp = (unsigned long __user *) sp;
  222. if (!valid_user_sp(sp, 1) || read_user_stack_64(fp, &next_sp))
  223. return;
  224. if (level > 0 && read_user_stack_64(&fp[2], &next_ip))
  225. return;
  226. /*
  227. * Note: the next_sp - sp >= signal frame size check
  228. * is true when next_sp < sp, which can happen when
  229. * transitioning from an alternate signal stack to the
  230. * normal stack.
  231. */
  232. if (next_sp - sp >= sizeof(struct signal_frame_64) &&
  233. (is_sigreturn_64_address(next_ip, sp) ||
  234. (level <= 1 && is_sigreturn_64_address(lr, sp))) &&
  235. sane_signal_64_frame(sp)) {
  236. /*
  237. * This looks like an signal frame
  238. */
  239. sigframe = (struct signal_frame_64 __user *) sp;
  240. uregs = sigframe->uc.uc_mcontext.gp_regs;
  241. if (read_user_stack_64(&uregs[PT_NIP], &next_ip) ||
  242. read_user_stack_64(&uregs[PT_LNK], &lr) ||
  243. read_user_stack_64(&uregs[PT_R1], &sp))
  244. return;
  245. level = 0;
  246. perf_callchain_store_context(entry, PERF_CONTEXT_USER);
  247. perf_callchain_store(entry, next_ip);
  248. continue;
  249. }
  250. if (level == 0)
  251. next_ip = lr;
  252. perf_callchain_store(entry, next_ip);
  253. ++level;
  254. sp = next_sp;
  255. }
  256. }
  257. static inline int current_is_64bit(void)
  258. {
  259. /*
  260. * We can't use test_thread_flag() here because we may be on an
  261. * interrupt stack, and the thread flags don't get copied over
  262. * from the thread_info on the main stack to the interrupt stack.
  263. */
  264. return !test_ti_thread_flag(task_thread_info(current), TIF_32BIT);
  265. }
  266. #else /* CONFIG_PPC64 */
  267. /*
  268. * On 32-bit we just access the address and let hash_page create a
  269. * HPTE if necessary, so there is no need to fall back to reading
  270. * the page tables. Since this is called at interrupt level,
  271. * do_page_fault() won't treat a DSI as a page fault.
  272. */
  273. static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret)
  274. {
  275. int rc;
  276. if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) ||
  277. ((unsigned long)ptr & 3))
  278. return -EFAULT;
  279. pagefault_disable();
  280. rc = __get_user_inatomic(*ret, ptr);
  281. pagefault_enable();
  282. return rc;
  283. }
  284. static inline void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry,
  285. struct pt_regs *regs)
  286. {
  287. }
  288. static inline int current_is_64bit(void)
  289. {
  290. return 0;
  291. }
  292. static inline int valid_user_sp(unsigned long sp, int is_64)
  293. {
  294. if (!sp || (sp & 7) || sp > TASK_SIZE - 32)
  295. return 0;
  296. return 1;
  297. }
  298. #define __SIGNAL_FRAMESIZE32 __SIGNAL_FRAMESIZE
  299. #define sigcontext32 sigcontext
  300. #define mcontext32 mcontext
  301. #define ucontext32 ucontext
  302. #define compat_siginfo_t struct siginfo
  303. #endif /* CONFIG_PPC64 */
  304. /*
  305. * Layout for non-RT signal frames
  306. */
  307. struct signal_frame_32 {
  308. char dummy[__SIGNAL_FRAMESIZE32];
  309. struct sigcontext32 sctx;
  310. struct mcontext32 mctx;
  311. int abigap[56];
  312. };
  313. /*
  314. * Layout for RT signal frames
  315. */
  316. struct rt_signal_frame_32 {
  317. char dummy[__SIGNAL_FRAMESIZE32 + 16];
  318. compat_siginfo_t info;
  319. struct ucontext32 uc;
  320. int abigap[56];
  321. };
  322. static int is_sigreturn_32_address(unsigned int nip, unsigned int fp)
  323. {
  324. if (nip == fp + offsetof(struct signal_frame_32, mctx.mc_pad))
  325. return 1;
  326. if (vdso32_sigtramp && current->mm->context.vdso_base &&
  327. nip == current->mm->context.vdso_base + vdso32_sigtramp)
  328. return 1;
  329. return 0;
  330. }
  331. static int is_rt_sigreturn_32_address(unsigned int nip, unsigned int fp)
  332. {
  333. if (nip == fp + offsetof(struct rt_signal_frame_32,
  334. uc.uc_mcontext.mc_pad))
  335. return 1;
  336. if (vdso32_rt_sigtramp && current->mm->context.vdso_base &&
  337. nip == current->mm->context.vdso_base + vdso32_rt_sigtramp)
  338. return 1;
  339. return 0;
  340. }
  341. static int sane_signal_32_frame(unsigned int sp)
  342. {
  343. struct signal_frame_32 __user *sf;
  344. unsigned int regs;
  345. sf = (struct signal_frame_32 __user *) (unsigned long) sp;
  346. if (read_user_stack_32((unsigned int __user *) &sf->sctx.regs, &regs))
  347. return 0;
  348. return regs == (unsigned long) &sf->mctx;
  349. }
  350. static int sane_rt_signal_32_frame(unsigned int sp)
  351. {
  352. struct rt_signal_frame_32 __user *sf;
  353. unsigned int regs;
  354. sf = (struct rt_signal_frame_32 __user *) (unsigned long) sp;
  355. if (read_user_stack_32((unsigned int __user *) &sf->uc.uc_regs, &regs))
  356. return 0;
  357. return regs == (unsigned long) &sf->uc.uc_mcontext;
  358. }
  359. static unsigned int __user *signal_frame_32_regs(unsigned int sp,
  360. unsigned int next_sp, unsigned int next_ip)
  361. {
  362. struct mcontext32 __user *mctx = NULL;
  363. struct signal_frame_32 __user *sf;
  364. struct rt_signal_frame_32 __user *rt_sf;
  365. /*
  366. * Note: the next_sp - sp >= signal frame size check
  367. * is true when next_sp < sp, for example, when
  368. * transitioning from an alternate signal stack to the
  369. * normal stack.
  370. */
  371. if (next_sp - sp >= sizeof(struct signal_frame_32) &&
  372. is_sigreturn_32_address(next_ip, sp) &&
  373. sane_signal_32_frame(sp)) {
  374. sf = (struct signal_frame_32 __user *) (unsigned long) sp;
  375. mctx = &sf->mctx;
  376. }
  377. if (!mctx && next_sp - sp >= sizeof(struct rt_signal_frame_32) &&
  378. is_rt_sigreturn_32_address(next_ip, sp) &&
  379. sane_rt_signal_32_frame(sp)) {
  380. rt_sf = (struct rt_signal_frame_32 __user *) (unsigned long) sp;
  381. mctx = &rt_sf->uc.uc_mcontext;
  382. }
  383. if (!mctx)
  384. return NULL;
  385. return mctx->mc_gregs;
  386. }
  387. static void perf_callchain_user_32(struct perf_callchain_entry_ctx *entry,
  388. struct pt_regs *regs)
  389. {
  390. unsigned int sp, next_sp;
  391. unsigned int next_ip;
  392. unsigned int lr;
  393. long level = 0;
  394. unsigned int __user *fp, *uregs;
  395. next_ip = perf_instruction_pointer(regs);
  396. lr = regs->link;
  397. sp = regs->gpr[1];
  398. perf_callchain_store(entry, next_ip);
  399. while (entry->nr < entry->max_stack) {
  400. fp = (unsigned int __user *) (unsigned long) sp;
  401. if (!valid_user_sp(sp, 0) || read_user_stack_32(fp, &next_sp))
  402. return;
  403. if (level > 0 && read_user_stack_32(&fp[1], &next_ip))
  404. return;
  405. uregs = signal_frame_32_regs(sp, next_sp, next_ip);
  406. if (!uregs && level <= 1)
  407. uregs = signal_frame_32_regs(sp, next_sp, lr);
  408. if (uregs) {
  409. /*
  410. * This looks like an signal frame, so restart
  411. * the stack trace with the values in it.
  412. */
  413. if (read_user_stack_32(&uregs[PT_NIP], &next_ip) ||
  414. read_user_stack_32(&uregs[PT_LNK], &lr) ||
  415. read_user_stack_32(&uregs[PT_R1], &sp))
  416. return;
  417. level = 0;
  418. perf_callchain_store_context(entry, PERF_CONTEXT_USER);
  419. perf_callchain_store(entry, next_ip);
  420. continue;
  421. }
  422. if (level == 0)
  423. next_ip = lr;
  424. perf_callchain_store(entry, next_ip);
  425. ++level;
  426. sp = next_sp;
  427. }
  428. }
  429. void
  430. perf_callchain_user(struct perf_callchain_entry_ctx *entry, struct pt_regs *regs)
  431. {
  432. if (current_is_64bit())
  433. perf_callchain_user_64(entry, regs);
  434. else
  435. perf_callchain_user_32(entry, regs);
  436. }