1 // SPDX-License-Identifier: GPL-2.0
3 * trace event based perf event profiling/tracing
5 * Copyright (C) 2009 Red Hat Inc, Peter Zijlstra
6 * Copyright (C) 2009-2010 Frederic Weisbecker <fweisbec@gmail.com>
9 #include <linux/module.h>
10 #include <linux/kprobes.h>
11 #include <linux/security.h>
13 #include "trace_probe.h"
15 static char __percpu
*perf_trace_buf
[PERF_NR_CONTEXTS
];
18 * Force it to be aligned to unsigned long to avoid misaligned accesses
21 typedef typeof(unsigned long [PERF_MAX_TRACE_SIZE
/ sizeof(unsigned long)])
24 /* Count the events in use (per event id, not per instance) */
25 static int total_ref_count
;
27 static int perf_trace_event_perm(struct trace_event_call
*tp_event
,
28 struct perf_event
*p_event
)
32 if (tp_event
->perf_perm
) {
33 ret
= tp_event
->perf_perm(tp_event
, p_event
);
39 * We checked and allowed to create parent,
40 * allow children without checking.
46 * It's ok to check current process (owner) permissions in here,
47 * because code below is called only via perf_event_open syscall.
50 /* The ftrace function trace is allowed only for root. */
51 if (ftrace_event_is_function(tp_event
)) {
52 ret
= perf_allow_tracepoint(&p_event
->attr
);
56 if (!is_sampling_event(p_event
))
60 * We don't allow user space callchains for function trace
61 * event, due to issues with page faults while tracing page
62 * fault handler and its overall trickiness nature.
64 if (!p_event
->attr
.exclude_callchain_user
)
68 * Same reason to disable user stack dump as for user space
71 if (p_event
->attr
.sample_type
& PERF_SAMPLE_STACK_USER
)
75 /* No tracing, just counting, so no obvious leak */
76 if (!(p_event
->attr
.sample_type
& PERF_SAMPLE_RAW
))
79 /* Some events are ok to be traced by non-root users... */
80 if (p_event
->attach_state
== PERF_ATTACH_TASK
) {
81 if (tp_event
->flags
& TRACE_EVENT_FL_CAP_ANY
)
86 * ...otherwise raw tracepoint data can be a severe data leak,
87 * only allow root to have these.
89 ret
= perf_allow_tracepoint(&p_event
->attr
);
96 static int perf_trace_event_reg(struct trace_event_call
*tp_event
,
97 struct perf_event
*p_event
)
99 struct hlist_head __percpu
*list
;
103 p_event
->tp_event
= tp_event
;
104 if (tp_event
->perf_refcount
++ > 0)
107 list
= alloc_percpu(struct hlist_head
);
111 for_each_possible_cpu(cpu
)
112 INIT_HLIST_HEAD(per_cpu_ptr(list
, cpu
));
114 tp_event
->perf_events
= list
;
116 if (!total_ref_count
) {
120 for (i
= 0; i
< PERF_NR_CONTEXTS
; i
++) {
121 buf
= (char __percpu
*)alloc_percpu(perf_trace_t
);
125 perf_trace_buf
[i
] = buf
;
129 ret
= tp_event
->class->reg(tp_event
, TRACE_REG_PERF_REGISTER
, NULL
);
137 if (!total_ref_count
) {
140 for (i
= 0; i
< PERF_NR_CONTEXTS
; i
++) {
141 free_percpu(perf_trace_buf
[i
]);
142 perf_trace_buf
[i
] = NULL
;
146 if (!--tp_event
->perf_refcount
) {
147 free_percpu(tp_event
->perf_events
);
148 tp_event
->perf_events
= NULL
;
154 static void perf_trace_event_unreg(struct perf_event
*p_event
)
156 struct trace_event_call
*tp_event
= p_event
->tp_event
;
159 if (--tp_event
->perf_refcount
> 0)
162 tp_event
->class->reg(tp_event
, TRACE_REG_PERF_UNREGISTER
, NULL
);
165 * Ensure our callback won't be called anymore. The buffers
166 * will be freed after that.
168 tracepoint_synchronize_unregister();
170 free_percpu(tp_event
->perf_events
);
171 tp_event
->perf_events
= NULL
;
173 if (!--total_ref_count
) {
174 for (i
= 0; i
< PERF_NR_CONTEXTS
; i
++) {
175 free_percpu(perf_trace_buf
[i
]);
176 perf_trace_buf
[i
] = NULL
;
180 module_put(tp_event
->mod
);
183 static int perf_trace_event_open(struct perf_event
*p_event
)
185 struct trace_event_call
*tp_event
= p_event
->tp_event
;
186 return tp_event
->class->reg(tp_event
, TRACE_REG_PERF_OPEN
, p_event
);
189 static void perf_trace_event_close(struct perf_event
*p_event
)
191 struct trace_event_call
*tp_event
= p_event
->tp_event
;
192 tp_event
->class->reg(tp_event
, TRACE_REG_PERF_CLOSE
, p_event
);
195 static int perf_trace_event_init(struct trace_event_call
*tp_event
,
196 struct perf_event
*p_event
)
200 ret
= perf_trace_event_perm(tp_event
, p_event
);
204 ret
= perf_trace_event_reg(tp_event
, p_event
);
208 ret
= perf_trace_event_open(p_event
);
210 perf_trace_event_unreg(p_event
);
217 int perf_trace_init(struct perf_event
*p_event
)
219 struct trace_event_call
*tp_event
;
220 u64 event_id
= p_event
->attr
.config
;
223 mutex_lock(&event_mutex
);
224 list_for_each_entry(tp_event
, &ftrace_events
, list
) {
225 if (tp_event
->event
.type
== event_id
&&
226 tp_event
->class && tp_event
->class->reg
&&
227 try_module_get(tp_event
->mod
)) {
228 ret
= perf_trace_event_init(tp_event
, p_event
);
230 module_put(tp_event
->mod
);
234 mutex_unlock(&event_mutex
);
239 void perf_trace_destroy(struct perf_event
*p_event
)
241 mutex_lock(&event_mutex
);
242 perf_trace_event_close(p_event
);
243 perf_trace_event_unreg(p_event
);
244 mutex_unlock(&event_mutex
);
247 #ifdef CONFIG_KPROBE_EVENTS
248 int perf_kprobe_init(struct perf_event
*p_event
, bool is_retprobe
)
252 struct trace_event_call
*tp_event
;
254 if (p_event
->attr
.kprobe_func
) {
255 func
= kzalloc(KSYM_NAME_LEN
, GFP_KERNEL
);
258 ret
= strncpy_from_user(
259 func
, u64_to_user_ptr(p_event
->attr
.kprobe_func
),
261 if (ret
== KSYM_NAME_LEN
)
266 if (func
[0] == '\0') {
272 tp_event
= create_local_trace_kprobe(
273 func
, (void *)(unsigned long)(p_event
->attr
.kprobe_addr
),
274 p_event
->attr
.probe_offset
, is_retprobe
);
275 if (IS_ERR(tp_event
)) {
276 ret
= PTR_ERR(tp_event
);
280 mutex_lock(&event_mutex
);
281 ret
= perf_trace_event_init(tp_event
, p_event
);
283 destroy_local_trace_kprobe(tp_event
);
284 mutex_unlock(&event_mutex
);
290 void perf_kprobe_destroy(struct perf_event
*p_event
)
292 mutex_lock(&event_mutex
);
293 perf_trace_event_close(p_event
);
294 perf_trace_event_unreg(p_event
);
295 mutex_unlock(&event_mutex
);
297 destroy_local_trace_kprobe(p_event
->tp_event
);
299 #endif /* CONFIG_KPROBE_EVENTS */
301 #ifdef CONFIG_UPROBE_EVENTS
302 int perf_uprobe_init(struct perf_event
*p_event
,
303 unsigned long ref_ctr_offset
, bool is_retprobe
)
307 struct trace_event_call
*tp_event
;
309 if (!p_event
->attr
.uprobe_path
)
312 path
= strndup_user(u64_to_user_ptr(p_event
->attr
.uprobe_path
),
316 return (ret
== -EINVAL
) ? -E2BIG
: ret
;
318 if (path
[0] == '\0') {
323 tp_event
= create_local_trace_uprobe(path
, p_event
->attr
.probe_offset
,
324 ref_ctr_offset
, is_retprobe
);
325 if (IS_ERR(tp_event
)) {
326 ret
= PTR_ERR(tp_event
);
331 * local trace_uprobe need to hold event_mutex to call
332 * uprobe_buffer_enable() and uprobe_buffer_disable().
333 * event_mutex is not required for local trace_kprobes.
335 mutex_lock(&event_mutex
);
336 ret
= perf_trace_event_init(tp_event
, p_event
);
338 destroy_local_trace_uprobe(tp_event
);
339 mutex_unlock(&event_mutex
);
345 void perf_uprobe_destroy(struct perf_event
*p_event
)
347 mutex_lock(&event_mutex
);
348 perf_trace_event_close(p_event
);
349 perf_trace_event_unreg(p_event
);
350 mutex_unlock(&event_mutex
);
351 destroy_local_trace_uprobe(p_event
->tp_event
);
353 #endif /* CONFIG_UPROBE_EVENTS */
355 int perf_trace_add(struct perf_event
*p_event
, int flags
)
357 struct trace_event_call
*tp_event
= p_event
->tp_event
;
359 if (!(flags
& PERF_EF_START
))
360 p_event
->hw
.state
= PERF_HES_STOPPED
;
363 * If TRACE_REG_PERF_ADD returns false; no custom action was performed
364 * and we need to take the default action of enqueueing our event on
365 * the right per-cpu hlist.
367 if (!tp_event
->class->reg(tp_event
, TRACE_REG_PERF_ADD
, p_event
)) {
368 struct hlist_head __percpu
*pcpu_list
;
369 struct hlist_head
*list
;
371 pcpu_list
= tp_event
->perf_events
;
372 if (WARN_ON_ONCE(!pcpu_list
))
375 list
= this_cpu_ptr(pcpu_list
);
376 hlist_add_head_rcu(&p_event
->hlist_entry
, list
);
382 void perf_trace_del(struct perf_event
*p_event
, int flags
)
384 struct trace_event_call
*tp_event
= p_event
->tp_event
;
387 * If TRACE_REG_PERF_DEL returns false; no custom action was performed
388 * and we need to take the default action of dequeueing our event from
389 * the right per-cpu hlist.
391 if (!tp_event
->class->reg(tp_event
, TRACE_REG_PERF_DEL
, p_event
))
392 hlist_del_rcu(&p_event
->hlist_entry
);
395 void *perf_trace_buf_alloc(int size
, struct pt_regs
**regs
, int *rctxp
)
400 BUILD_BUG_ON(PERF_MAX_TRACE_SIZE
% sizeof(unsigned long));
402 if (WARN_ONCE(size
> PERF_MAX_TRACE_SIZE
,
403 "perf buffer not large enough"))
406 *rctxp
= rctx
= perf_swevent_get_recursion_context();
411 *regs
= this_cpu_ptr(&__perf_regs
[rctx
]);
412 raw_data
= this_cpu_ptr(perf_trace_buf
[rctx
]);
414 /* zero the dead bytes from align to not leak stack to user */
415 memset(&raw_data
[size
- sizeof(u64
)], 0, sizeof(u64
));
418 EXPORT_SYMBOL_GPL(perf_trace_buf_alloc
);
419 NOKPROBE_SYMBOL(perf_trace_buf_alloc
);
421 void perf_trace_buf_update(void *record
, u16 type
)
423 struct trace_entry
*entry
= record
;
424 int pc
= preempt_count();
427 local_save_flags(flags
);
428 tracing_generic_entry_update(entry
, type
, flags
, pc
);
430 NOKPROBE_SYMBOL(perf_trace_buf_update
);
432 #ifdef CONFIG_FUNCTION_TRACER
434 perf_ftrace_function_call(unsigned long ip
, unsigned long parent_ip
,
435 struct ftrace_ops
*ops
, struct ftrace_regs
*fregs
)
437 struct ftrace_entry
*entry
;
438 struct perf_event
*event
;
439 struct hlist_head head
;
444 if (!rcu_is_watching())
447 if ((unsigned long)ops
->private != smp_processor_id())
450 bit
= ftrace_test_recursion_trylock(ip
, parent_ip
);
454 event
= container_of(ops
, struct perf_event
, ftrace_ops
);
457 * @event->hlist entry is NULL (per INIT_HLIST_NODE), and all
458 * the perf code does is hlist_for_each_entry_rcu(), so we can
459 * get away with simply setting the @head.first pointer in order
460 * to create a singular list.
462 head
.first
= &event
->hlist_entry
;
464 #define ENTRY_SIZE (ALIGN(sizeof(struct ftrace_entry) + sizeof(u32), \
465 sizeof(u64)) - sizeof(u32))
467 BUILD_BUG_ON(ENTRY_SIZE
> PERF_MAX_TRACE_SIZE
);
469 memset(®s
, 0, sizeof(regs
));
470 perf_fetch_caller_regs(®s
);
472 entry
= perf_trace_buf_alloc(ENTRY_SIZE
, NULL
, &rctx
);
477 entry
->parent_ip
= parent_ip
;
478 perf_trace_buf_submit(entry
, ENTRY_SIZE
, rctx
, TRACE_FN
,
479 1, ®s
, &head
, NULL
);
482 ftrace_test_recursion_unlock(bit
);
486 static int perf_ftrace_function_register(struct perf_event
*event
)
488 struct ftrace_ops
*ops
= &event
->ftrace_ops
;
490 ops
->func
= perf_ftrace_function_call
;
491 ops
->private = (void *)(unsigned long)nr_cpu_ids
;
493 return register_ftrace_function(ops
);
496 static int perf_ftrace_function_unregister(struct perf_event
*event
)
498 struct ftrace_ops
*ops
= &event
->ftrace_ops
;
499 int ret
= unregister_ftrace_function(ops
);
500 ftrace_free_filter(ops
);
504 int perf_ftrace_event_register(struct trace_event_call
*call
,
505 enum trace_reg type
, void *data
)
507 struct perf_event
*event
= data
;
510 case TRACE_REG_REGISTER
:
511 case TRACE_REG_UNREGISTER
:
513 case TRACE_REG_PERF_REGISTER
:
514 case TRACE_REG_PERF_UNREGISTER
:
516 case TRACE_REG_PERF_OPEN
:
517 return perf_ftrace_function_register(data
);
518 case TRACE_REG_PERF_CLOSE
:
519 return perf_ftrace_function_unregister(data
);
520 case TRACE_REG_PERF_ADD
:
521 event
->ftrace_ops
.private = (void *)(unsigned long)smp_processor_id();
523 case TRACE_REG_PERF_DEL
:
524 event
->ftrace_ops
.private = (void *)(unsigned long)nr_cpu_ids
;
530 #endif /* CONFIG_FUNCTION_TRACER */