trace_event_perf.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513
  1. /*
  2. * trace event based perf event profiling/tracing
  3. *
  4. * Copyright (C) 2009 Red Hat Inc, Peter Zijlstra
  5. * Copyright (C) 2009-2010 Frederic Weisbecker <fweisbec@gmail.com>
  6. */
  7. #include <linux/module.h>
  8. #include <linux/kprobes.h>
  9. #include "trace.h"
  10. #include "trace_probe.h"
  11. static char __percpu *perf_trace_buf[PERF_NR_CONTEXTS];
  12. /*
  13. * Force it to be aligned to unsigned long to avoid misaligned accesses
  14. * suprises
  15. */
  16. typedef typeof(unsigned long [PERF_MAX_TRACE_SIZE / sizeof(unsigned long)])
  17. perf_trace_t;
  18. /* Count the events in use (per event id, not per instance) */
  19. static int total_ref_count;
  20. static int perf_trace_event_perm(struct trace_event_call *tp_event,
  21. struct perf_event *p_event)
  22. {
  23. if (tp_event->perf_perm) {
  24. int ret = tp_event->perf_perm(tp_event, p_event);
  25. if (ret)
  26. return ret;
  27. }
  28. /*
  29. * We checked and allowed to create parent,
  30. * allow children without checking.
  31. */
  32. if (p_event->parent)
  33. return 0;
  34. /*
  35. * It's ok to check current process (owner) permissions in here,
  36. * because code below is called only via perf_event_open syscall.
  37. */
  38. /* The ftrace function trace is allowed only for root. */
  39. if (ftrace_event_is_function(tp_event)) {
  40. if (perf_paranoid_tracepoint_raw() && !capable(CAP_SYS_ADMIN))
  41. return -EPERM;
  42. if (!is_sampling_event(p_event))
  43. return 0;
  44. /*
  45. * We don't allow user space callchains for function trace
  46. * event, due to issues with page faults while tracing page
  47. * fault handler and its overall trickiness nature.
  48. */
  49. if (!p_event->attr.exclude_callchain_user)
  50. return -EINVAL;
  51. /*
  52. * Same reason to disable user stack dump as for user space
  53. * callchains above.
  54. */
  55. if (p_event->attr.sample_type & PERF_SAMPLE_STACK_USER)
  56. return -EINVAL;
  57. }
  58. /* No tracing, just counting, so no obvious leak */
  59. if (!(p_event->attr.sample_type & PERF_SAMPLE_RAW))
  60. return 0;
  61. /* Some events are ok to be traced by non-root users... */
  62. if (p_event->attach_state == PERF_ATTACH_TASK) {
  63. if (tp_event->flags & TRACE_EVENT_FL_CAP_ANY)
  64. return 0;
  65. }
  66. /*
  67. * ...otherwise raw tracepoint data can be a severe data leak,
  68. * only allow root to have these.
  69. */
  70. if (perf_paranoid_tracepoint_raw() && !capable(CAP_SYS_ADMIN))
  71. return -EPERM;
  72. return 0;
  73. }
  74. static int perf_trace_event_reg(struct trace_event_call *tp_event,
  75. struct perf_event *p_event)
  76. {
  77. struct hlist_head __percpu *list;
  78. int ret = -ENOMEM;
  79. int cpu;
  80. p_event->tp_event = tp_event;
  81. if (tp_event->perf_refcount++ > 0)
  82. return 0;
  83. list = alloc_percpu(struct hlist_head);
  84. if (!list)
  85. goto fail;
  86. for_each_possible_cpu(cpu)
  87. INIT_HLIST_HEAD(per_cpu_ptr(list, cpu));
  88. tp_event->perf_events = list;
  89. if (!total_ref_count) {
  90. char __percpu *buf;
  91. int i;
  92. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  93. buf = (char __percpu *)alloc_percpu(perf_trace_t);
  94. if (!buf)
  95. goto fail;
  96. perf_trace_buf[i] = buf;
  97. }
  98. }
  99. ret = tp_event->class->reg(tp_event, TRACE_REG_PERF_REGISTER, NULL);
  100. if (ret)
  101. goto fail;
  102. total_ref_count++;
  103. return 0;
  104. fail:
  105. if (!total_ref_count) {
  106. int i;
  107. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  108. free_percpu(perf_trace_buf[i]);
  109. perf_trace_buf[i] = NULL;
  110. }
  111. }
  112. if (!--tp_event->perf_refcount) {
  113. free_percpu(tp_event->perf_events);
  114. tp_event->perf_events = NULL;
  115. }
  116. return ret;
  117. }
  118. static void perf_trace_event_unreg(struct perf_event *p_event)
  119. {
  120. struct trace_event_call *tp_event = p_event->tp_event;
  121. int i;
  122. if (--tp_event->perf_refcount > 0)
  123. goto out;
  124. tp_event->class->reg(tp_event, TRACE_REG_PERF_UNREGISTER, NULL);
  125. /*
  126. * Ensure our callback won't be called anymore. The buffers
  127. * will be freed after that.
  128. */
  129. tracepoint_synchronize_unregister();
  130. free_percpu(tp_event->perf_events);
  131. tp_event->perf_events = NULL;
  132. if (!--total_ref_count) {
  133. for (i = 0; i < PERF_NR_CONTEXTS; i++) {
  134. free_percpu(perf_trace_buf[i]);
  135. perf_trace_buf[i] = NULL;
  136. }
  137. }
  138. out:
  139. module_put(tp_event->mod);
  140. }
  141. static int perf_trace_event_open(struct perf_event *p_event)
  142. {
  143. struct trace_event_call *tp_event = p_event->tp_event;
  144. return tp_event->class->reg(tp_event, TRACE_REG_PERF_OPEN, p_event);
  145. }
  146. static void perf_trace_event_close(struct perf_event *p_event)
  147. {
  148. struct trace_event_call *tp_event = p_event->tp_event;
  149. tp_event->class->reg(tp_event, TRACE_REG_PERF_CLOSE, p_event);
  150. }
  151. static int perf_trace_event_init(struct trace_event_call *tp_event,
  152. struct perf_event *p_event)
  153. {
  154. int ret;
  155. ret = perf_trace_event_perm(tp_event, p_event);
  156. if (ret)
  157. return ret;
  158. ret = perf_trace_event_reg(tp_event, p_event);
  159. if (ret)
  160. return ret;
  161. ret = perf_trace_event_open(p_event);
  162. if (ret) {
  163. perf_trace_event_unreg(p_event);
  164. return ret;
  165. }
  166. return 0;
  167. }
  168. int perf_trace_init(struct perf_event *p_event)
  169. {
  170. struct trace_event_call *tp_event;
  171. u64 event_id = p_event->attr.config;
  172. int ret = -EINVAL;
  173. mutex_lock(&event_mutex);
  174. list_for_each_entry(tp_event, &ftrace_events, list) {
  175. if (tp_event->event.type == event_id &&
  176. tp_event->class && tp_event->class->reg &&
  177. try_module_get(tp_event->mod)) {
  178. ret = perf_trace_event_init(tp_event, p_event);
  179. if (ret)
  180. module_put(tp_event->mod);
  181. break;
  182. }
  183. }
  184. mutex_unlock(&event_mutex);
  185. return ret;
  186. }
  187. void perf_trace_destroy(struct perf_event *p_event)
  188. {
  189. mutex_lock(&event_mutex);
  190. perf_trace_event_close(p_event);
  191. perf_trace_event_unreg(p_event);
  192. mutex_unlock(&event_mutex);
  193. }
  194. #ifdef CONFIG_KPROBE_EVENTS
  195. int perf_kprobe_init(struct perf_event *p_event, bool is_retprobe)
  196. {
  197. int ret;
  198. char *func = NULL;
  199. struct trace_event_call *tp_event;
  200. if (p_event->attr.kprobe_func) {
  201. func = kzalloc(KSYM_NAME_LEN, GFP_KERNEL);
  202. if (!func)
  203. return -ENOMEM;
  204. ret = strncpy_from_user(
  205. func, u64_to_user_ptr(p_event->attr.kprobe_func),
  206. KSYM_NAME_LEN);
  207. if (ret == KSYM_NAME_LEN)
  208. ret = -E2BIG;
  209. if (ret < 0)
  210. goto out;
  211. if (func[0] == '\0') {
  212. kfree(func);
  213. func = NULL;
  214. }
  215. }
  216. tp_event = create_local_trace_kprobe(
  217. func, (void *)(unsigned long)(p_event->attr.kprobe_addr),
  218. p_event->attr.probe_offset, is_retprobe);
  219. if (IS_ERR(tp_event)) {
  220. ret = PTR_ERR(tp_event);
  221. goto out;
  222. }
  223. ret = perf_trace_event_init(tp_event, p_event);
  224. if (ret)
  225. destroy_local_trace_kprobe(tp_event);
  226. out:
  227. kfree(func);
  228. return ret;
  229. }
  230. void perf_kprobe_destroy(struct perf_event *p_event)
  231. {
  232. perf_trace_event_close(p_event);
  233. perf_trace_event_unreg(p_event);
  234. destroy_local_trace_kprobe(p_event->tp_event);
  235. }
  236. #endif /* CONFIG_KPROBE_EVENTS */
  237. #ifdef CONFIG_UPROBE_EVENTS
  238. int perf_uprobe_init(struct perf_event *p_event, bool is_retprobe)
  239. {
  240. int ret;
  241. char *path = NULL;
  242. struct trace_event_call *tp_event;
  243. if (!p_event->attr.uprobe_path)
  244. return -EINVAL;
  245. path = kzalloc(PATH_MAX, GFP_KERNEL);
  246. if (!path)
  247. return -ENOMEM;
  248. ret = strncpy_from_user(
  249. path, u64_to_user_ptr(p_event->attr.uprobe_path), PATH_MAX);
  250. if (ret == PATH_MAX)
  251. return -E2BIG;
  252. if (ret < 0)
  253. goto out;
  254. if (path[0] == '\0') {
  255. ret = -EINVAL;
  256. goto out;
  257. }
  258. tp_event = create_local_trace_uprobe(
  259. path, p_event->attr.probe_offset, is_retprobe);
  260. if (IS_ERR(tp_event)) {
  261. ret = PTR_ERR(tp_event);
  262. goto out;
  263. }
  264. /*
  265. * local trace_uprobe need to hold event_mutex to call
  266. * uprobe_buffer_enable() and uprobe_buffer_disable().
  267. * event_mutex is not required for local trace_kprobes.
  268. */
  269. mutex_lock(&event_mutex);
  270. ret = perf_trace_event_init(tp_event, p_event);
  271. if (ret)
  272. destroy_local_trace_uprobe(tp_event);
  273. mutex_unlock(&event_mutex);
  274. out:
  275. kfree(path);
  276. return ret;
  277. }
  278. void perf_uprobe_destroy(struct perf_event *p_event)
  279. {
  280. mutex_lock(&event_mutex);
  281. perf_trace_event_close(p_event);
  282. perf_trace_event_unreg(p_event);
  283. mutex_unlock(&event_mutex);
  284. destroy_local_trace_uprobe(p_event->tp_event);
  285. }
  286. #endif /* CONFIG_UPROBE_EVENTS */
  287. int perf_trace_add(struct perf_event *p_event, int flags)
  288. {
  289. struct trace_event_call *tp_event = p_event->tp_event;
  290. if (!(flags & PERF_EF_START))
  291. p_event->hw.state = PERF_HES_STOPPED;
  292. /*
  293. * If TRACE_REG_PERF_ADD returns false; no custom action was performed
  294. * and we need to take the default action of enqueueing our event on
  295. * the right per-cpu hlist.
  296. */
  297. if (!tp_event->class->reg(tp_event, TRACE_REG_PERF_ADD, p_event)) {
  298. struct hlist_head __percpu *pcpu_list;
  299. struct hlist_head *list;
  300. pcpu_list = tp_event->perf_events;
  301. if (WARN_ON_ONCE(!pcpu_list))
  302. return -EINVAL;
  303. list = this_cpu_ptr(pcpu_list);
  304. hlist_add_head_rcu(&p_event->hlist_entry, list);
  305. }
  306. return 0;
  307. }
  308. void perf_trace_del(struct perf_event *p_event, int flags)
  309. {
  310. struct trace_event_call *tp_event = p_event->tp_event;
  311. /*
  312. * If TRACE_REG_PERF_DEL returns false; no custom action was performed
  313. * and we need to take the default action of dequeueing our event from
  314. * the right per-cpu hlist.
  315. */
  316. if (!tp_event->class->reg(tp_event, TRACE_REG_PERF_DEL, p_event))
  317. hlist_del_rcu(&p_event->hlist_entry);
  318. }
  319. void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp)
  320. {
  321. char *raw_data;
  322. int rctx;
  323. BUILD_BUG_ON(PERF_MAX_TRACE_SIZE % sizeof(unsigned long));
  324. if (WARN_ONCE(size > PERF_MAX_TRACE_SIZE,
  325. "perf buffer not large enough"))
  326. return NULL;
  327. *rctxp = rctx = perf_swevent_get_recursion_context();
  328. if (rctx < 0)
  329. return NULL;
  330. if (regs)
  331. *regs = this_cpu_ptr(&__perf_regs[rctx]);
  332. raw_data = this_cpu_ptr(perf_trace_buf[rctx]);
  333. /* zero the dead bytes from align to not leak stack to user */
  334. memset(&raw_data[size - sizeof(u64)], 0, sizeof(u64));
  335. return raw_data;
  336. }
  337. EXPORT_SYMBOL_GPL(perf_trace_buf_alloc);
  338. NOKPROBE_SYMBOL(perf_trace_buf_alloc);
  339. void perf_trace_buf_update(void *record, u16 type)
  340. {
  341. struct trace_entry *entry = record;
  342. int pc = preempt_count();
  343. unsigned long flags;
  344. local_save_flags(flags);
  345. tracing_generic_entry_update(entry, flags, pc);
  346. entry->type = type;
  347. }
  348. NOKPROBE_SYMBOL(perf_trace_buf_update);
  349. #ifdef CONFIG_FUNCTION_TRACER
  350. static void
  351. perf_ftrace_function_call(unsigned long ip, unsigned long parent_ip,
  352. struct ftrace_ops *ops, struct pt_regs *pt_regs)
  353. {
  354. struct ftrace_entry *entry;
  355. struct perf_event *event;
  356. struct hlist_head head;
  357. struct pt_regs regs;
  358. int rctx;
  359. if ((unsigned long)ops->private != smp_processor_id())
  360. return;
  361. event = container_of(ops, struct perf_event, ftrace_ops);
  362. /*
  363. * @event->hlist entry is NULL (per INIT_HLIST_NODE), and all
  364. * the perf code does is hlist_for_each_entry_rcu(), so we can
  365. * get away with simply setting the @head.first pointer in order
  366. * to create a singular list.
  367. */
  368. head.first = &event->hlist_entry;
  369. #define ENTRY_SIZE (ALIGN(sizeof(struct ftrace_entry) + sizeof(u32), \
  370. sizeof(u64)) - sizeof(u32))
  371. BUILD_BUG_ON(ENTRY_SIZE > PERF_MAX_TRACE_SIZE);
  372. memset(&regs, 0, sizeof(regs));
  373. perf_fetch_caller_regs(&regs);
  374. entry = perf_trace_buf_alloc(ENTRY_SIZE, NULL, &rctx);
  375. if (!entry)
  376. return;
  377. entry->ip = ip;
  378. entry->parent_ip = parent_ip;
  379. perf_trace_buf_submit(entry, ENTRY_SIZE, rctx, TRACE_FN,
  380. 1, &regs, &head, NULL);
  381. #undef ENTRY_SIZE
  382. }
  383. static int perf_ftrace_function_register(struct perf_event *event)
  384. {
  385. struct ftrace_ops *ops = &event->ftrace_ops;
  386. ops->flags = FTRACE_OPS_FL_RCU;
  387. ops->func = perf_ftrace_function_call;
  388. ops->private = (void *)(unsigned long)nr_cpu_ids;
  389. return register_ftrace_function(ops);
  390. }
  391. static int perf_ftrace_function_unregister(struct perf_event *event)
  392. {
  393. struct ftrace_ops *ops = &event->ftrace_ops;
  394. int ret = unregister_ftrace_function(ops);
  395. ftrace_free_filter(ops);
  396. return ret;
  397. }
  398. int perf_ftrace_event_register(struct trace_event_call *call,
  399. enum trace_reg type, void *data)
  400. {
  401. struct perf_event *event = data;
  402. switch (type) {
  403. case TRACE_REG_REGISTER:
  404. case TRACE_REG_UNREGISTER:
  405. break;
  406. case TRACE_REG_PERF_REGISTER:
  407. case TRACE_REG_PERF_UNREGISTER:
  408. return 0;
  409. case TRACE_REG_PERF_OPEN:
  410. return perf_ftrace_function_register(data);
  411. case TRACE_REG_PERF_CLOSE:
  412. return perf_ftrace_function_unregister(data);
  413. case TRACE_REG_PERF_ADD:
  414. event->ftrace_ops.private = (void *)(unsigned long)smp_processor_id();
  415. return 1;
  416. case TRACE_REG_PERF_DEL:
  417. event->ftrace_ops.private = (void *)(unsigned long)nr_cpu_ids;
  418. return 1;
  419. }
  420. return -EINVAL;
  421. }
  422. #endif /* CONFIG_FUNCTION_TRACER */