]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - arch/powerpc/perf/callchain.c
treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152
[mirror_ubuntu-focal-kernel.git] / arch / powerpc / perf / callchain.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
20002ded
PM
2/*
3 * Performance counter callchain support - powerpc architecture code
4 *
5 * Copyright © 2009 Paul Mackerras, IBM Corporation.
20002ded
PM
6 */
7#include <linux/kernel.h>
8#include <linux/sched.h>
cdd6c482 9#include <linux/perf_event.h>
20002ded
PM
10#include <linux/percpu.h>
11#include <linux/uaccess.h>
12#include <linux/mm.h>
13#include <asm/ptrace.h>
14#include <asm/pgtable.h>
15#include <asm/sigcontext.h>
16#include <asm/ucontext.h>
17#include <asm/vdso.h>
18#ifdef CONFIG_PPC64
f2699491 19#include "../kernel/ppc32.h"
20002ded 20#endif
94171b19 21#include <asm/pte-walk.h>
20002ded 22
20002ded
PM
23
24/*
25 * Is sp valid as the address of the next kernel stack frame after prev_sp?
26 * The next frame may be in a different stack area but should not go
27 * back down in the same stack area.
28 */
29static int valid_next_sp(unsigned long sp, unsigned long prev_sp)
30{
31 if (sp & 0xf)
32 return 0; /* must be 16-byte aligned */
33 if (!validate_sp(sp, current, STACK_FRAME_OVERHEAD))
34 return 0;
85101af1 35 if (sp >= prev_sp + STACK_FRAME_MIN_SIZE)
20002ded
PM
36 return 1;
37 /*
38 * sp could decrease when we jump off an interrupt stack
39 * back to the regular process stack.
40 */
41 if ((sp & ~(THREAD_SIZE - 1)) != (prev_sp & ~(THREAD_SIZE - 1)))
42 return 1;
43 return 0;
44}
45
56962b44 46void
cfbcf468 47perf_callchain_kernel(struct perf_callchain_entry_ctx *entry, struct pt_regs *regs)
20002ded
PM
48{
49 unsigned long sp, next_sp;
50 unsigned long next_ip;
51 unsigned long lr;
52 long level = 0;
53 unsigned long *fp;
54
55 lr = regs->link;
56 sp = regs->gpr[1];
6da70948 57 perf_callchain_store(entry, perf_instruction_pointer(regs));
20002ded
PM
58
59 if (!validate_sp(sp, current, STACK_FRAME_OVERHEAD))
60 return;
61
62 for (;;) {
63 fp = (unsigned long *) sp;
64 next_sp = fp[0];
65
66 if (next_sp == sp + STACK_INT_FRAME_SIZE &&
67 fp[STACK_FRAME_MARKER] == STACK_FRAME_REGS_MARKER) {
68 /*
69 * This looks like an interrupt frame for an
70 * interrupt that occurred in the kernel
71 */
72 regs = (struct pt_regs *)(sp + STACK_FRAME_OVERHEAD);
73 next_ip = regs->nip;
74 lr = regs->link;
75 level = 0;
3e4de4ec 76 perf_callchain_store_context(entry, PERF_CONTEXT_KERNEL);
20002ded
PM
77
78 } else {
79 if (level == 0)
80 next_ip = lr;
81 else
82 next_ip = fp[STACK_FRAME_LR_SAVE];
83
84 /*
85 * We can't tell which of the first two addresses
86 * we get are valid, but we can filter out the
87 * obviously bogus ones here. We replace them
88 * with 0 rather than removing them entirely so
89 * that userspace can tell which is which.
90 */
91 if ((level == 1 && next_ip == lr) ||
92 (level <= 1 && !kernel_text_address(next_ip)))
93 next_ip = 0;
94
95 ++level;
96 }
97
70791ce9 98 perf_callchain_store(entry, next_ip);
20002ded
PM
99 if (!valid_next_sp(next_sp, sp))
100 return;
101 sp = next_sp;
102 }
103}
104
105#ifdef CONFIG_PPC64
20002ded
PM
106/*
107 * On 64-bit we don't want to invoke hash_page on user addresses from
108 * interrupt context, so if the access faults, we read the page tables
109 * to find which page (if any) is mapped and access it directly.
110 */
691e95fd 111static int read_user_stack_slow(void __user *ptr, void *buf, int nb)
20002ded 112{
691e95fd 113 int ret = -EFAULT;
20002ded
PM
114 pgd_t *pgdir;
115 pte_t *ptep, pte;
a4fe3ce7 116 unsigned shift;
20002ded
PM
117 unsigned long addr = (unsigned long) ptr;
118 unsigned long offset;
691e95fd 119 unsigned long pfn, flags;
20002ded
PM
120 void *kaddr;
121
122 pgdir = current->mm->pgd;
123 if (!pgdir)
124 return -EFAULT;
125
691e95fd 126 local_irq_save(flags);
94171b19 127 ptep = find_current_mm_pte(pgdir, addr, NULL, &shift);
691e95fd
AK
128 if (!ptep)
129 goto err_out;
a4fe3ce7
DG
130 if (!shift)
131 shift = PAGE_SHIFT;
20002ded
PM
132
133 /* align address to page boundary */
a4fe3ce7 134 offset = addr & ((1UL << shift) - 1);
20002ded 135
691e95fd 136 pte = READ_ONCE(*ptep);
e7bfc462 137 if (!pte_present(pte) || !pte_user(pte))
691e95fd 138 goto err_out;
20002ded
PM
139 pfn = pte_pfn(pte);
140 if (!page_is_ram(pfn))
691e95fd 141 goto err_out;
20002ded
PM
142
143 /* no highmem to worry about here */
144 kaddr = pfn_to_kaddr(pfn);
691e95fd
AK
145 memcpy(buf, kaddr + offset, nb);
146 ret = 0;
147err_out:
148 local_irq_restore(flags);
149 return ret;
20002ded
PM
150}
151
152static int read_user_stack_64(unsigned long __user *ptr, unsigned long *ret)
153{
154 if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned long) ||
155 ((unsigned long)ptr & 7))
156 return -EFAULT;
157
b59a1bfc
DA
158 pagefault_disable();
159 if (!__get_user_inatomic(*ret, ptr)) {
160 pagefault_enable();
20002ded 161 return 0;
b59a1bfc
DA
162 }
163 pagefault_enable();
20002ded
PM
164
165 return read_user_stack_slow(ptr, ret, 8);
166}
167
168static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret)
169{
170 if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) ||
171 ((unsigned long)ptr & 3))
172 return -EFAULT;
173
b59a1bfc
DA
174 pagefault_disable();
175 if (!__get_user_inatomic(*ret, ptr)) {
176 pagefault_enable();
20002ded 177 return 0;
b59a1bfc
DA
178 }
179 pagefault_enable();
20002ded
PM
180
181 return read_user_stack_slow(ptr, ret, 4);
182}
183
184static inline int valid_user_sp(unsigned long sp, int is_64)
185{
186 if (!sp || (sp & 7) || sp > (is_64 ? TASK_SIZE : 0x100000000UL) - 32)
187 return 0;
188 return 1;
189}
190
191/*
192 * 64-bit user processes use the same stack frame for RT and non-RT signals.
193 */
194struct signal_frame_64 {
195 char dummy[__SIGNAL_FRAMESIZE];
196 struct ucontext uc;
197 unsigned long unused[2];
198 unsigned int tramp[6];
199 struct siginfo *pinfo;
200 void *puc;
201 struct siginfo info;
202 char abigap[288];
203};
204
205static int is_sigreturn_64_address(unsigned long nip, unsigned long fp)
206{
207 if (nip == fp + offsetof(struct signal_frame_64, tramp))
208 return 1;
209 if (vdso64_rt_sigtramp && current->mm->context.vdso_base &&
210 nip == current->mm->context.vdso_base + vdso64_rt_sigtramp)
211 return 1;
212 return 0;
213}
214
215/*
216 * Do some sanity checking on the signal frame pointed to by sp.
217 * We check the pinfo and puc pointers in the frame.
218 */
219static int sane_signal_64_frame(unsigned long sp)
220{
221 struct signal_frame_64 __user *sf;
222 unsigned long pinfo, puc;
223
224 sf = (struct signal_frame_64 __user *) sp;
225 if (read_user_stack_64((unsigned long __user *) &sf->pinfo, &pinfo) ||
226 read_user_stack_64((unsigned long __user *) &sf->puc, &puc))
227 return 0;
228 return pinfo == (unsigned long) &sf->info &&
229 puc == (unsigned long) &sf->uc;
230}
231
cfbcf468 232static void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry,
56962b44 233 struct pt_regs *regs)
20002ded
PM
234{
235 unsigned long sp, next_sp;
236 unsigned long next_ip;
237 unsigned long lr;
238 long level = 0;
239 struct signal_frame_64 __user *sigframe;
240 unsigned long __user *fp, *uregs;
241
6da70948 242 next_ip = perf_instruction_pointer(regs);
20002ded
PM
243 lr = regs->link;
244 sp = regs->gpr[1];
70791ce9 245 perf_callchain_store(entry, next_ip);
20002ded 246
3b1fff08 247 while (entry->nr < entry->max_stack) {
20002ded
PM
248 fp = (unsigned long __user *) sp;
249 if (!valid_user_sp(sp, 1) || read_user_stack_64(fp, &next_sp))
250 return;
251 if (level > 0 && read_user_stack_64(&fp[2], &next_ip))
252 return;
253
254 /*
255 * Note: the next_sp - sp >= signal frame size check
256 * is true when next_sp < sp, which can happen when
257 * transitioning from an alternate signal stack to the
258 * normal stack.
259 */
260 if (next_sp - sp >= sizeof(struct signal_frame_64) &&
261 (is_sigreturn_64_address(next_ip, sp) ||
262 (level <= 1 && is_sigreturn_64_address(lr, sp))) &&
263 sane_signal_64_frame(sp)) {
264 /*
265 * This looks like an signal frame
266 */
267 sigframe = (struct signal_frame_64 __user *) sp;
268 uregs = sigframe->uc.uc_mcontext.gp_regs;
269 if (read_user_stack_64(&uregs[PT_NIP], &next_ip) ||
270 read_user_stack_64(&uregs[PT_LNK], &lr) ||
271 read_user_stack_64(&uregs[PT_R1], &sp))
272 return;
273 level = 0;
3e4de4ec 274 perf_callchain_store_context(entry, PERF_CONTEXT_USER);
70791ce9 275 perf_callchain_store(entry, next_ip);
20002ded
PM
276 continue;
277 }
278
279 if (level == 0)
280 next_ip = lr;
70791ce9 281 perf_callchain_store(entry, next_ip);
20002ded
PM
282 ++level;
283 sp = next_sp;
284 }
285}
286
287static inline int current_is_64bit(void)
288{
289 /*
290 * We can't use test_thread_flag() here because we may be on an
291 * interrupt stack, and the thread flags don't get copied over
292 * from the thread_info on the main stack to the interrupt stack.
293 */
294 return !test_ti_thread_flag(task_thread_info(current), TIF_32BIT);
295}
296
297#else /* CONFIG_PPC64 */
298/*
299 * On 32-bit we just access the address and let hash_page create a
300 * HPTE if necessary, so there is no need to fall back to reading
301 * the page tables. Since this is called at interrupt level,
302 * do_page_fault() won't treat a DSI as a page fault.
303 */
304static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret)
305{
b59a1bfc
DA
306 int rc;
307
20002ded
PM
308 if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) ||
309 ((unsigned long)ptr & 3))
310 return -EFAULT;
311
b59a1bfc
DA
312 pagefault_disable();
313 rc = __get_user_inatomic(*ret, ptr);
314 pagefault_enable();
315
316 return rc;
20002ded
PM
317}
318
cfbcf468 319static inline void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry,
56962b44 320 struct pt_regs *regs)
20002ded
PM
321{
322}
323
324static inline int current_is_64bit(void)
325{
326 return 0;
327}
328
329static inline int valid_user_sp(unsigned long sp, int is_64)
330{
331 if (!sp || (sp & 7) || sp > TASK_SIZE - 32)
332 return 0;
333 return 1;
334}
335
336#define __SIGNAL_FRAMESIZE32 __SIGNAL_FRAMESIZE
337#define sigcontext32 sigcontext
338#define mcontext32 mcontext
339#define ucontext32 ucontext
340#define compat_siginfo_t struct siginfo
341
342#endif /* CONFIG_PPC64 */
343
344/*
345 * Layout for non-RT signal frames
346 */
347struct signal_frame_32 {
348 char dummy[__SIGNAL_FRAMESIZE32];
349 struct sigcontext32 sctx;
350 struct mcontext32 mctx;
351 int abigap[56];
352};
353
354/*
355 * Layout for RT signal frames
356 */
357struct rt_signal_frame_32 {
358 char dummy[__SIGNAL_FRAMESIZE32 + 16];
359 compat_siginfo_t info;
360 struct ucontext32 uc;
361 int abigap[56];
362};
363
364static int is_sigreturn_32_address(unsigned int nip, unsigned int fp)
365{
366 if (nip == fp + offsetof(struct signal_frame_32, mctx.mc_pad))
367 return 1;
368 if (vdso32_sigtramp && current->mm->context.vdso_base &&
369 nip == current->mm->context.vdso_base + vdso32_sigtramp)
370 return 1;
371 return 0;
372}
373
374static int is_rt_sigreturn_32_address(unsigned int nip, unsigned int fp)
375{
376 if (nip == fp + offsetof(struct rt_signal_frame_32,
377 uc.uc_mcontext.mc_pad))
378 return 1;
379 if (vdso32_rt_sigtramp && current->mm->context.vdso_base &&
380 nip == current->mm->context.vdso_base + vdso32_rt_sigtramp)
381 return 1;
382 return 0;
383}
384
385static int sane_signal_32_frame(unsigned int sp)
386{
387 struct signal_frame_32 __user *sf;
388 unsigned int regs;
389
390 sf = (struct signal_frame_32 __user *) (unsigned long) sp;
391 if (read_user_stack_32((unsigned int __user *) &sf->sctx.regs, &regs))
392 return 0;
393 return regs == (unsigned long) &sf->mctx;
394}
395
396static int sane_rt_signal_32_frame(unsigned int sp)
397{
398 struct rt_signal_frame_32 __user *sf;
399 unsigned int regs;
400
401 sf = (struct rt_signal_frame_32 __user *) (unsigned long) sp;
402 if (read_user_stack_32((unsigned int __user *) &sf->uc.uc_regs, &regs))
403 return 0;
404 return regs == (unsigned long) &sf->uc.uc_mcontext;
405}
406
407static unsigned int __user *signal_frame_32_regs(unsigned int sp,
408 unsigned int next_sp, unsigned int next_ip)
409{
410 struct mcontext32 __user *mctx = NULL;
411 struct signal_frame_32 __user *sf;
412 struct rt_signal_frame_32 __user *rt_sf;
413
414 /*
415 * Note: the next_sp - sp >= signal frame size check
416 * is true when next_sp < sp, for example, when
417 * transitioning from an alternate signal stack to the
418 * normal stack.
419 */
420 if (next_sp - sp >= sizeof(struct signal_frame_32) &&
421 is_sigreturn_32_address(next_ip, sp) &&
422 sane_signal_32_frame(sp)) {
423 sf = (struct signal_frame_32 __user *) (unsigned long) sp;
424 mctx = &sf->mctx;
425 }
426
427 if (!mctx && next_sp - sp >= sizeof(struct rt_signal_frame_32) &&
428 is_rt_sigreturn_32_address(next_ip, sp) &&
429 sane_rt_signal_32_frame(sp)) {
430 rt_sf = (struct rt_signal_frame_32 __user *) (unsigned long) sp;
431 mctx = &rt_sf->uc.uc_mcontext;
432 }
433
434 if (!mctx)
435 return NULL;
436 return mctx->mc_gregs;
437}
438
cfbcf468 439static void perf_callchain_user_32(struct perf_callchain_entry_ctx *entry,
56962b44 440 struct pt_regs *regs)
20002ded
PM
441{
442 unsigned int sp, next_sp;
443 unsigned int next_ip;
444 unsigned int lr;
445 long level = 0;
446 unsigned int __user *fp, *uregs;
447
6da70948 448 next_ip = perf_instruction_pointer(regs);
20002ded
PM
449 lr = regs->link;
450 sp = regs->gpr[1];
70791ce9 451 perf_callchain_store(entry, next_ip);
20002ded 452
3b1fff08 453 while (entry->nr < entry->max_stack) {
20002ded
PM
454 fp = (unsigned int __user *) (unsigned long) sp;
455 if (!valid_user_sp(sp, 0) || read_user_stack_32(fp, &next_sp))
456 return;
457 if (level > 0 && read_user_stack_32(&fp[1], &next_ip))
458 return;
459
460 uregs = signal_frame_32_regs(sp, next_sp, next_ip);
461 if (!uregs && level <= 1)
462 uregs = signal_frame_32_regs(sp, next_sp, lr);
463 if (uregs) {
464 /*
465 * This looks like an signal frame, so restart
466 * the stack trace with the values in it.
467 */
468 if (read_user_stack_32(&uregs[PT_NIP], &next_ip) ||
469 read_user_stack_32(&uregs[PT_LNK], &lr) ||
470 read_user_stack_32(&uregs[PT_R1], &sp))
471 return;
472 level = 0;
3e4de4ec 473 perf_callchain_store_context(entry, PERF_CONTEXT_USER);
70791ce9 474 perf_callchain_store(entry, next_ip);
20002ded
PM
475 continue;
476 }
477
478 if (level == 0)
479 next_ip = lr;
70791ce9 480 perf_callchain_store(entry, next_ip);
20002ded
PM
481 ++level;
482 sp = next_sp;
483 }
484}
485
56962b44 486void
cfbcf468 487perf_callchain_user(struct perf_callchain_entry_ctx *entry, struct pt_regs *regs)
20002ded 488{
56962b44
FW
489 if (current_is_64bit())
490 perf_callchain_user_64(entry, regs);
491 else
492 perf_callchain_user_32(entry, regs);
20002ded 493}