trace_event_perf.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * trace event based perf event profiling/tracing
  4. *
  5. * Copyright (C) 2009 Red Hat Inc, Peter Zijlstra
  6. * Copyright (C) 2009-2010 Frederic Weisbecker <[email protected]>
  7. */
  8. #include <linux/module.h>
  9. #include <linux/kprobes.h>
  10. #include <linux/security.h>
  11. #include "trace.h"
  12. #include "trace_probe.h"
  13. static char __percpu *perf_trace_buf[PERF_NR_CONTEXTS];
  14. /*
  15. * Force it to be aligned to unsigned long to avoid misaligned accesses
  16. * surprises
  17. */
  18. typedef typeof(unsigned long [PERF_MAX_TRACE_SIZE / sizeof(unsigned long)])
  19. perf_trace_t;
  20. /* Count the events in use (per event id, not per instance) */
  21. static int total_ref_count;
  22. static int perf_trace_event_perm(struct trace_event_call *tp_event,
  23. struct perf_event *p_event)
  24. {
  25. int ret;
  26. if (tp_event->perf_perm) {
  27. ret = tp_event->perf_perm(tp_event, p_event);
  28. if (ret)
  29. return ret;
  30. }
  31. /*
  32. * We checked and allowed to create parent,
  33. * allow children without checking.
  34. */
  35. if (p_event->parent)
  36. return 0;
  37. /*
  38. * It's ok to check current process (owner) permissions in here,
  39. * because code below is called only via perf_event_open syscall.
  40. */
  41. /* The ftrace function trace is allowed only for root. */
  42. if (ftrace_event_is_function(tp_event)) {
  43. ret = perf_allow_tracepoint(&p_event->attr);
  44. if (ret)
  45. return ret;
  46. if (!is_sampling_event(p_event))
  47. return 0;
  48. /*
  49. * We don't allow user space callchains for function trace
  50. * event, due to issues with page faults while tracing page
  51. * fault handler and its overall trickiness nature.
  52. */
  53. if (!p_event->attr.exclude_callchain_user)
  54. return -EINVAL;
  55. /*
  56. * Same reason to disable user stack dump as for user space
  57. * callchains above.
  58. */
  59. if (p_event->attr.sample_type & PERF_SAMPLE_STACK_USER)
  60. return -EINVAL;
  61. }
  62. /* No tracing, just counting, so no obvious leak */
  63. if (!(p_event->attr.sample_type & PERF_SAMPLE_RAW))
  64. return 0;
  65. /* Some events are ok to be traced by non-root users... */
  66. if (p_event->attach_state == PERF_ATTACH_TASK) {
  67. if (tp_event->flags & TRACE_EVENT_FL_CAP_ANY)
  68. return 0;
  69. }
  70. /*
  71. * ...otherwise raw tracepoint data can be a severe data leak,
  72. * only allow root to have these.
  73. */
  74. ret = perf_allow_tracepoint(&p_event->attr);
  75. if (ret)
  76. return ret;
  77. return 0;
  78. }
  79. static int perf_trace_event_reg(struct trace_event_call *tp_event,
  80. struct perf_event *p_event)
  81. {
  82. struct hlist_head __percpu *list;
  83. int ret = -ENOMEM;
  84. int cpu;
  85. p_event->tp_event = tp_event;
  86. if (tp_event->perf_refcount++ > 0)
  87. return 0;
  88. list = alloc_percpu(struct hlist_head);
  89. if (!list)
  90. goto fail;
  91. for_each_possible_cpu(cpu)
  92. INIT_HLIST_HEAD(per_cpu_ptr(list, cpu));
  93. tp_event->perf_events = list;
  94. if (!total_ref_count) {
  95. char __percpu *buf;
  96. int i;
  97. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  98. buf = (char __percpu *)alloc_percpu(perf_trace_t);
  99. if (!buf)
  100. goto fail;
  101. perf_trace_buf[i] = buf;
  102. }
  103. }
  104. ret = tp_event->class->reg(tp_event, TRACE_REG_PERF_REGISTER, NULL);
  105. if (ret)
  106. goto fail;
  107. total_ref_count++;
  108. return 0;
  109. fail:
  110. if (!total_ref_count) {
  111. int i;
  112. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  113. free_percpu(perf_trace_buf[i]);
  114. perf_trace_buf[i] = NULL;
  115. }
  116. }
  117. if (!--tp_event->perf_refcount) {
  118. free_percpu(tp_event->perf_events);
  119. tp_event->perf_events = NULL;
  120. }
  121. return ret;
  122. }
  123. static void perf_trace_event_unreg(struct perf_event *p_event)
  124. {
  125. struct trace_event_call *tp_event = p_event->tp_event;
  126. int i;
  127. if (--tp_event->perf_refcount > 0)
  128. return;
  129. tp_event->class->reg(tp_event, TRACE_REG_PERF_UNREGISTER, NULL);
  130. /*
  131. * Ensure our callback won't be called anymore. The buffers
  132. * will be freed after that.
  133. */
  134. tracepoint_synchronize_unregister();
  135. free_percpu(tp_event->perf_events);
  136. tp_event->perf_events = NULL;
  137. if (!--total_ref_count) {
  138. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  139. free_percpu(perf_trace_buf[i]);
  140. perf_trace_buf[i] = NULL;
  141. }
  142. }
  143. }
  144. static int perf_trace_event_open(struct perf_event *p_event)
  145. {
  146. struct trace_event_call *tp_event = p_event->tp_event;
  147. return tp_event->class->reg(tp_event, TRACE_REG_PERF_OPEN, p_event);
  148. }
  149. static void perf_trace_event_close(struct perf_event *p_event)
  150. {
  151. struct trace_event_call *tp_event = p_event->tp_event;
  152. tp_event->class->reg(tp_event, TRACE_REG_PERF_CLOSE, p_event);
  153. }
  154. static int perf_trace_event_init(struct trace_event_call *tp_event,
  155. struct perf_event *p_event)
  156. {
  157. int ret;
  158. ret = perf_trace_event_perm(tp_event, p_event);
  159. if (ret)
  160. return ret;
  161. ret = perf_trace_event_reg(tp_event, p_event);
  162. if (ret)
  163. return ret;
  164. ret = perf_trace_event_open(p_event);
  165. if (ret) {
  166. perf_trace_event_unreg(p_event);
  167. return ret;
  168. }
  169. return 0;
  170. }
  171. int perf_trace_init(struct perf_event *p_event)
  172. {
  173. struct trace_event_call *tp_event;
  174. u64 event_id = p_event->attr.config;
  175. int ret = -EINVAL;
  176. mutex_lock(&event_mutex);
  177. list_for_each_entry(tp_event, &ftrace_events, list) {
  178. if (tp_event->event.type == event_id &&
  179. tp_event->class && tp_event->class->reg &&
  180. trace_event_try_get_ref(tp_event)) {
  181. ret = perf_trace_event_init(tp_event, p_event);
  182. if (ret)
  183. trace_event_put_ref(tp_event);
  184. break;
  185. }
  186. }
  187. mutex_unlock(&event_mutex);
  188. return ret;
  189. }
  190. void perf_trace_destroy(struct perf_event *p_event)
  191. {
  192. mutex_lock(&event_mutex);
  193. perf_trace_event_close(p_event);
  194. perf_trace_event_unreg(p_event);
  195. trace_event_put_ref(p_event->tp_event);
  196. mutex_unlock(&event_mutex);
  197. }
  198. #ifdef CONFIG_KPROBE_EVENTS
  199. int perf_kprobe_init(struct perf_event *p_event, bool is_retprobe)
  200. {
  201. int ret;
  202. char *func = NULL;
  203. struct trace_event_call *tp_event;
  204. if (p_event->attr.kprobe_func) {
  205. func = kzalloc(KSYM_NAME_LEN, GFP_KERNEL);
  206. if (!func)
  207. return -ENOMEM;
  208. ret = strncpy_from_user(
  209. func, u64_to_user_ptr(p_event->attr.kprobe_func),
  210. KSYM_NAME_LEN);
  211. if (ret == KSYM_NAME_LEN)
  212. ret = -E2BIG;
  213. if (ret < 0)
  214. goto out;
  215. if (func[0] == '\0') {
  216. kfree(func);
  217. func = NULL;
  218. }
  219. }
  220. tp_event = create_local_trace_kprobe(
  221. func, (void *)(unsigned long)(p_event->attr.kprobe_addr),
  222. p_event->attr.probe_offset, is_retprobe);
  223. if (IS_ERR(tp_event)) {
  224. ret = PTR_ERR(tp_event);
  225. goto out;
  226. }
  227. mutex_lock(&event_mutex);
  228. ret = perf_trace_event_init(tp_event, p_event);
  229. if (ret)
  230. destroy_local_trace_kprobe(tp_event);
  231. mutex_unlock(&event_mutex);
  232. out:
  233. kfree(func);
  234. return ret;
  235. }
  236. void perf_kprobe_destroy(struct perf_event *p_event)
  237. {
  238. mutex_lock(&event_mutex);
  239. perf_trace_event_close(p_event);
  240. perf_trace_event_unreg(p_event);
  241. trace_event_put_ref(p_event->tp_event);
  242. mutex_unlock(&event_mutex);
  243. destroy_local_trace_kprobe(p_event->tp_event);
  244. }
  245. #endif /* CONFIG_KPROBE_EVENTS */
  246. #ifdef CONFIG_UPROBE_EVENTS
  247. int perf_uprobe_init(struct perf_event *p_event,
  248. unsigned long ref_ctr_offset, bool is_retprobe)
  249. {
  250. int ret;
  251. char *path = NULL;
  252. struct trace_event_call *tp_event;
  253. if (!p_event->attr.uprobe_path)
  254. return -EINVAL;
  255. path = strndup_user(u64_to_user_ptr(p_event->attr.uprobe_path),
  256. PATH_MAX);
  257. if (IS_ERR(path)) {
  258. ret = PTR_ERR(path);
  259. return (ret == -EINVAL) ? -E2BIG : ret;
  260. }
  261. if (path[0] == '\0') {
  262. ret = -EINVAL;
  263. goto out;
  264. }
  265. tp_event = create_local_trace_uprobe(path, p_event->attr.probe_offset,
  266. ref_ctr_offset, is_retprobe);
  267. if (IS_ERR(tp_event)) {
  268. ret = PTR_ERR(tp_event);
  269. goto out;
  270. }
  271. /*
  272. * local trace_uprobe need to hold event_mutex to call
  273. * uprobe_buffer_enable() and uprobe_buffer_disable().
  274. * event_mutex is not required for local trace_kprobes.
  275. */
  276. mutex_lock(&event_mutex);
  277. ret = perf_trace_event_init(tp_event, p_event);
  278. if (ret)
  279. destroy_local_trace_uprobe(tp_event);
  280. mutex_unlock(&event_mutex);
  281. out:
  282. kfree(path);
  283. return ret;
  284. }
  285. void perf_uprobe_destroy(struct perf_event *p_event)
  286. {
  287. mutex_lock(&event_mutex);
  288. perf_trace_event_close(p_event);
  289. perf_trace_event_unreg(p_event);
  290. trace_event_put_ref(p_event->tp_event);
  291. mutex_unlock(&event_mutex);
  292. destroy_local_trace_uprobe(p_event->tp_event);
  293. }
  294. #endif /* CONFIG_UPROBE_EVENTS */
  295. int perf_trace_add(struct perf_event *p_event, int flags)
  296. {
  297. struct trace_event_call *tp_event = p_event->tp_event;
  298. if (!(flags & PERF_EF_START))
  299. p_event->hw.state = PERF_HES_STOPPED;
  300. /*
  301. * If TRACE_REG_PERF_ADD returns false; no custom action was performed
  302. * and we need to take the default action of enqueueing our event on
  303. * the right per-cpu hlist.
  304. */
  305. if (!tp_event->class->reg(tp_event, TRACE_REG_PERF_ADD, p_event)) {
  306. struct hlist_head __percpu *pcpu_list;
  307. struct hlist_head *list;
  308. pcpu_list = tp_event->perf_events;
  309. if (WARN_ON_ONCE(!pcpu_list))
  310. return -EINVAL;
  311. list = this_cpu_ptr(pcpu_list);
  312. hlist_add_head_rcu(&p_event->hlist_entry, list);
  313. }
  314. return 0;
  315. }
  316. void perf_trace_del(struct perf_event *p_event, int flags)
  317. {
  318. struct trace_event_call *tp_event = p_event->tp_event;
  319. /*
  320. * If TRACE_REG_PERF_DEL returns false; no custom action was performed
  321. * and we need to take the default action of dequeueing our event from
  322. * the right per-cpu hlist.
  323. */
  324. if (!tp_event->class->reg(tp_event, TRACE_REG_PERF_DEL, p_event))
  325. hlist_del_rcu(&p_event->hlist_entry);
  326. }
  327. void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp)
  328. {
  329. char *raw_data;
  330. int rctx;
  331. BUILD_BUG_ON(PERF_MAX_TRACE_SIZE % sizeof(unsigned long));
  332. if (WARN_ONCE(size > PERF_MAX_TRACE_SIZE,
  333. "perf buffer not large enough, wanted %d, have %d",
  334. size, PERF_MAX_TRACE_SIZE))
  335. return NULL;
  336. *rctxp = rctx = perf_swevent_get_recursion_context();
  337. if (rctx < 0)
  338. return NULL;
  339. if (regs)
  340. *regs = this_cpu_ptr(&__perf_regs[rctx]);
  341. raw_data = this_cpu_ptr(perf_trace_buf[rctx]);
  342. /* zero the dead bytes from align to not leak stack to user */
  343. memset(&raw_data[size - sizeof(u64)], 0, sizeof(u64));
  344. return raw_data;
  345. }
  346. EXPORT_SYMBOL_GPL(perf_trace_buf_alloc);
  347. NOKPROBE_SYMBOL(perf_trace_buf_alloc);
  348. void perf_trace_buf_update(void *record, u16 type)
  349. {
  350. struct trace_entry *entry = record;
  351. tracing_generic_entry_update(entry, type, tracing_gen_ctx());
  352. }
  353. NOKPROBE_SYMBOL(perf_trace_buf_update);
  354. #ifdef CONFIG_FUNCTION_TRACER
  355. static void
  356. perf_ftrace_function_call(unsigned long ip, unsigned long parent_ip,
  357. struct ftrace_ops *ops, struct ftrace_regs *fregs)
  358. {
  359. struct ftrace_entry *entry;
  360. struct perf_event *event;
  361. struct hlist_head head;
  362. struct pt_regs regs;
  363. int rctx;
  364. int bit;
  365. if (!rcu_is_watching())
  366. return;
  367. bit = ftrace_test_recursion_trylock(ip, parent_ip);
  368. if (bit < 0)
  369. return;
  370. if ((unsigned long)ops->private != smp_processor_id())
  371. goto out;
  372. event = container_of(ops, struct perf_event, ftrace_ops);
  373. /*
  374. * @event->hlist entry is NULL (per INIT_HLIST_NODE), and all
  375. * the perf code does is hlist_for_each_entry_rcu(), so we can
  376. * get away with simply setting the @head.first pointer in order
  377. * to create a singular list.
  378. */
  379. head.first = &event->hlist_entry;
  380. #define ENTRY_SIZE (ALIGN(sizeof(struct ftrace_entry) + sizeof(u32), \
  381. sizeof(u64)) - sizeof(u32))
  382. BUILD_BUG_ON(ENTRY_SIZE > PERF_MAX_TRACE_SIZE);
  383. memset(&regs, 0, sizeof(regs));
  384. perf_fetch_caller_regs(&regs);
  385. entry = perf_trace_buf_alloc(ENTRY_SIZE, NULL, &rctx);
  386. if (!entry)
  387. goto out;
  388. entry->ip = ip;
  389. entry->parent_ip = parent_ip;
  390. perf_trace_buf_submit(entry, ENTRY_SIZE, rctx, TRACE_FN,
  391. 1, &regs, &head, NULL);
  392. out:
  393. ftrace_test_recursion_unlock(bit);
  394. #undef ENTRY_SIZE
  395. }
  396. static int perf_ftrace_function_register(struct perf_event *event)
  397. {
  398. struct ftrace_ops *ops = &event->ftrace_ops;
  399. ops->func = perf_ftrace_function_call;
  400. ops->private = (void *)(unsigned long)nr_cpu_ids;
  401. return register_ftrace_function(ops);
  402. }
  403. static int perf_ftrace_function_unregister(struct perf_event *event)
  404. {
  405. struct ftrace_ops *ops = &event->ftrace_ops;
  406. int ret = unregister_ftrace_function(ops);
  407. ftrace_free_filter(ops);
  408. return ret;
  409. }
  410. int perf_ftrace_event_register(struct trace_event_call *call,
  411. enum trace_reg type, void *data)
  412. {
  413. struct perf_event *event = data;
  414. switch (type) {
  415. case TRACE_REG_REGISTER:
  416. case TRACE_REG_UNREGISTER:
  417. break;
  418. case TRACE_REG_PERF_REGISTER:
  419. case TRACE_REG_PERF_UNREGISTER:
  420. return 0;
  421. case TRACE_REG_PERF_OPEN:
  422. return perf_ftrace_function_register(data);
  423. case TRACE_REG_PERF_CLOSE:
  424. return perf_ftrace_function_unregister(data);
  425. case TRACE_REG_PERF_ADD:
  426. event->ftrace_ops.private = (void *)(unsigned long)smp_processor_id();
  427. return 1;
  428. case TRACE_REG_PERF_DEL:
  429. event->ftrace_ops.private = (void *)(unsigned long)nr_cpu_ids;
  430. return 1;
  431. }
  432. return -EINVAL;
  433. }
  434. #endif /* CONFIG_FUNCTION_TRACER */