Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
47788c58 | 2 | #include <trace/syscall.h> |
1c569f02 | 3 | #include <trace/events/syscalls.h> |
f431b634 | 4 | #include <linux/syscalls.h> |
5a0e3ad6 | 5 | #include <linux/slab.h> |
ee08c6ec | 6 | #include <linux/kernel.h> |
56d82e00 | 7 | #include <linux/module.h> /* for MODULE_NAME_LEN via KSYM_SYMBOL_LEN */ |
fb34a08c | 8 | #include <linux/ftrace.h> |
cdd6c482 | 9 | #include <linux/perf_event.h> |
0e242208 | 10 | #include <linux/xarray.h> |
ee08c6ec FW |
11 | #include <asm/syscall.h> |
12 | ||
13 | #include "trace_output.h" | |
14 | #include "trace.h" | |
15 | ||
5be71b61 | 16 | static DEFINE_MUTEX(syscall_trace_lock); |
ee08c6ec | 17 | |
2425bcb9 | 18 | static int syscall_enter_register(struct trace_event_call *event, |
ceec0b6f | 19 | enum trace_reg type, void *data); |
2425bcb9 | 20 | static int syscall_exit_register(struct trace_event_call *event, |
ceec0b6f | 21 | enum trace_reg type, void *data); |
2239291a | 22 | |
2e33af02 | 23 | static struct list_head * |
2425bcb9 | 24 | syscall_get_enter_fields(struct trace_event_call *call) |
2e33af02 SR |
25 | { |
26 | struct syscall_metadata *entry = call->data; | |
27 | ||
28 | return &entry->enter_fields; | |
29 | } | |
30 | ||
3d56e331 SR |
31 | extern struct syscall_metadata *__start_syscalls_metadata[]; |
32 | extern struct syscall_metadata *__stop_syscalls_metadata[]; | |
c44fc770 | 33 | |
0e242208 | 34 | static DEFINE_XARRAY(syscalls_metadata_sparse); |
c44fc770 FW |
35 | static struct syscall_metadata **syscalls_metadata; |
36 | ||
b2d55496 IM |
37 | #ifndef ARCH_HAS_SYSCALL_MATCH_SYM_NAME |
38 | static inline bool arch_syscall_match_sym_name(const char *sym, const char *name) | |
39 | { | |
40 | /* | |
41 | * Only compare after the "sys" prefix. Archs that use | |
42 | * syscall wrappers may have syscalls symbols aliases prefixed | |
36a78e9e | 43 | * with ".SyS" or ".sys" instead of "sys", leading to an unwanted |
b2d55496 IM |
44 | * mismatch. |
45 | */ | |
46 | return !strcmp(sym + 3, name + 3); | |
47 | } | |
48 | #endif | |
49 | ||
f431b634 SR |
50 | #ifdef ARCH_TRACE_IGNORE_COMPAT_SYSCALLS |
51 | /* | |
52 | * Some architectures that allow for 32bit applications | |
53 | * to run on a 64bit kernel, do not map the syscalls for | |
54 | * the 32bit tasks the same as they do for 64bit tasks. | |
55 | * | |
56 | * *cough*x86*cough* | |
57 | * | |
58 | * In such a case, instead of reporting the wrong syscalls, | |
59 | * simply ignore them. | |
60 | * | |
61 | * For an arch to ignore the compat syscalls it needs to | |
62 | * define ARCH_TRACE_IGNORE_COMPAT_SYSCALLS as well as | |
63 | * define the function arch_trace_is_compat_syscall() to let | |
64 | * the tracing system know that it should ignore it. | |
65 | */ | |
66 | static int | |
67 | trace_get_syscall_nr(struct task_struct *task, struct pt_regs *regs) | |
68 | { | |
69 | if (unlikely(arch_trace_is_compat_syscall(regs))) | |
70 | return -1; | |
71 | ||
72 | return syscall_get_nr(task, regs); | |
73 | } | |
74 | #else | |
75 | static inline int | |
76 | trace_get_syscall_nr(struct task_struct *task, struct pt_regs *regs) | |
77 | { | |
78 | return syscall_get_nr(task, regs); | |
79 | } | |
80 | #endif /* ARCH_TRACE_IGNORE_COMPAT_SYSCALLS */ | |
81 | ||
3d56e331 SR |
82 | static __init struct syscall_metadata * |
83 | find_syscall_meta(unsigned long syscall) | |
c44fc770 | 84 | { |
3d56e331 SR |
85 | struct syscall_metadata **start; |
86 | struct syscall_metadata **stop; | |
c44fc770 FW |
87 | char str[KSYM_SYMBOL_LEN]; |
88 | ||
89 | ||
3d56e331 SR |
90 | start = __start_syscalls_metadata; |
91 | stop = __stop_syscalls_metadata; | |
c44fc770 FW |
92 | kallsyms_lookup(syscall, NULL, NULL, NULL, str); |
93 | ||
ae07f551 IM |
94 | if (arch_syscall_match_sym_name(str, "sys_ni_syscall")) |
95 | return NULL; | |
96 | ||
c44fc770 | 97 | for ( ; start < stop; start++) { |
b2d55496 | 98 | if ((*start)->name && arch_syscall_match_sym_name(str, (*start)->name)) |
3d56e331 | 99 | return *start; |
c44fc770 FW |
100 | } |
101 | return NULL; | |
102 | } | |
103 | ||
104 | static struct syscall_metadata *syscall_nr_to_meta(int nr) | |
105 | { | |
0e242208 HN |
106 | if (IS_ENABLED(CONFIG_HAVE_SPARSE_SYSCALL_NR)) |
107 | return xa_load(&syscalls_metadata_sparse, (unsigned long)nr); | |
108 | ||
c44fc770 FW |
109 | if (!syscalls_metadata || nr >= NR_syscalls || nr < 0) |
110 | return NULL; | |
111 | ||
112 | return syscalls_metadata[nr]; | |
113 | } | |
114 | ||
dbfeaa7a TZ |
115 | const char *get_syscall_name(int syscall) |
116 | { | |
117 | struct syscall_metadata *entry; | |
118 | ||
119 | entry = syscall_nr_to_meta(syscall); | |
120 | if (!entry) | |
121 | return NULL; | |
122 | ||
123 | return entry->name; | |
124 | } | |
125 | ||
6aea49cb | 126 | static enum print_line_t |
a9a57763 SR |
127 | print_syscall_enter(struct trace_iterator *iter, int flags, |
128 | struct trace_event *event) | |
bed1ffca | 129 | { |
983f938a | 130 | struct trace_array *tr = iter->tr; |
bed1ffca FW |
131 | struct trace_seq *s = &iter->seq; |
132 | struct trace_entry *ent = iter->ent; | |
133 | struct syscall_trace_enter *trace; | |
134 | struct syscall_metadata *entry; | |
183742f0 | 135 | int i, syscall; |
bed1ffca | 136 | |
64c12e04 | 137 | trace = (typeof(trace))ent; |
bed1ffca | 138 | syscall = trace->nr; |
bed1ffca | 139 | entry = syscall_nr_to_meta(syscall); |
64c12e04 | 140 | |
bed1ffca FW |
141 | if (!entry) |
142 | goto end; | |
143 | ||
32c0edae | 144 | if (entry->enter_event->event.type != ent->type) { |
64c12e04 JB |
145 | WARN_ON_ONCE(1); |
146 | goto end; | |
147 | } | |
148 | ||
183742f0 | 149 | trace_seq_printf(s, "%s(", entry->name); |
bed1ffca FW |
150 | |
151 | for (i = 0; i < entry->nb_args; i++) { | |
183742f0 SRRH |
152 | |
153 | if (trace_seq_has_overflowed(s)) | |
154 | goto end; | |
155 | ||
bed1ffca | 156 | /* parameter types */ |
983f938a | 157 | if (tr->trace_flags & TRACE_ITER_VERBOSE) |
183742f0 SRRH |
158 | trace_seq_printf(s, "%s ", entry->types[i]); |
159 | ||
bed1ffca | 160 | /* parameter values */ |
183742f0 SRRH |
161 | trace_seq_printf(s, "%s: %lx%s", entry->args[i], |
162 | trace->args[i], | |
163 | i == entry->nb_args - 1 ? "" : ", "); | |
bed1ffca FW |
164 | } |
165 | ||
183742f0 | 166 | trace_seq_putc(s, ')'); |
bed1ffca | 167 | end: |
183742f0 | 168 | trace_seq_putc(s, '\n'); |
4539f077 | 169 | |
183742f0 | 170 | return trace_handle_return(s); |
bed1ffca FW |
171 | } |
172 | ||
6aea49cb | 173 | static enum print_line_t |
a9a57763 SR |
174 | print_syscall_exit(struct trace_iterator *iter, int flags, |
175 | struct trace_event *event) | |
bed1ffca FW |
176 | { |
177 | struct trace_seq *s = &iter->seq; | |
178 | struct trace_entry *ent = iter->ent; | |
179 | struct syscall_trace_exit *trace; | |
180 | int syscall; | |
181 | struct syscall_metadata *entry; | |
bed1ffca | 182 | |
64c12e04 | 183 | trace = (typeof(trace))ent; |
bed1ffca | 184 | syscall = trace->nr; |
bed1ffca | 185 | entry = syscall_nr_to_meta(syscall); |
64c12e04 | 186 | |
bed1ffca | 187 | if (!entry) { |
146c3442 | 188 | trace_seq_putc(s, '\n'); |
183742f0 | 189 | goto out; |
bed1ffca FW |
190 | } |
191 | ||
32c0edae | 192 | if (entry->exit_event->event.type != ent->type) { |
64c12e04 JB |
193 | WARN_ON_ONCE(1); |
194 | return TRACE_TYPE_UNHANDLED; | |
195 | } | |
196 | ||
183742f0 | 197 | trace_seq_printf(s, "%s -> 0x%lx\n", entry->name, |
bed1ffca | 198 | trace->ret); |
bed1ffca | 199 | |
183742f0 SRRH |
200 | out: |
201 | return trace_handle_return(s); | |
bed1ffca FW |
202 | } |
203 | ||
e6971969 LZ |
204 | extern char *__bad_type_size(void); |
205 | ||
04ae87a5 PZ |
206 | #define SYSCALL_FIELD(_type, _name) { \ |
207 | .type = #_type, .name = #_name, \ | |
208 | .size = sizeof(_type), .align = __alignof__(_type), \ | |
209 | .is_signed = is_signed_type(_type), .filter_type = FILTER_OTHER } | |
e6971969 | 210 | |
3ddc77f6 LZ |
211 | static int __init |
212 | __set_enter_print_fmt(struct syscall_metadata *entry, char *buf, int len) | |
50307a45 LJ |
213 | { |
214 | int i; | |
215 | int pos = 0; | |
216 | ||
217 | /* When len=0, we just calculate the needed length */ | |
218 | #define LEN_OR_ZERO (len ? len - pos : 0) | |
219 | ||
220 | pos += snprintf(buf + pos, LEN_OR_ZERO, "\""); | |
221 | for (i = 0; i < entry->nb_args; i++) { | |
222 | pos += snprintf(buf + pos, LEN_OR_ZERO, "%s: 0x%%0%zulx%s", | |
223 | entry->args[i], sizeof(unsigned long), | |
224 | i == entry->nb_args - 1 ? "" : ", "); | |
225 | } | |
226 | pos += snprintf(buf + pos, LEN_OR_ZERO, "\""); | |
227 | ||
228 | for (i = 0; i < entry->nb_args; i++) { | |
229 | pos += snprintf(buf + pos, LEN_OR_ZERO, | |
230 | ", ((unsigned long)(REC->%s))", entry->args[i]); | |
231 | } | |
232 | ||
233 | #undef LEN_OR_ZERO | |
234 | ||
235 | /* return the length of print_fmt */ | |
236 | return pos; | |
237 | } | |
238 | ||
2425bcb9 | 239 | static int __init set_syscall_print_fmt(struct trace_event_call *call) |
50307a45 LJ |
240 | { |
241 | char *print_fmt; | |
242 | int len; | |
243 | struct syscall_metadata *entry = call->data; | |
244 | ||
245 | if (entry->enter_event != call) { | |
246 | call->print_fmt = "\"0x%lx\", REC->ret"; | |
247 | return 0; | |
248 | } | |
249 | ||
250 | /* First: called with 0 length to calculate the needed length */ | |
251 | len = __set_enter_print_fmt(entry, NULL, 0); | |
252 | ||
253 | print_fmt = kmalloc(len + 1, GFP_KERNEL); | |
254 | if (!print_fmt) | |
255 | return -ENOMEM; | |
256 | ||
257 | /* Second: actually write the @print_fmt */ | |
258 | __set_enter_print_fmt(entry, print_fmt, len + 1); | |
259 | call->print_fmt = print_fmt; | |
260 | ||
261 | return 0; | |
262 | } | |
263 | ||
2425bcb9 | 264 | static void __init free_syscall_print_fmt(struct trace_event_call *call) |
50307a45 LJ |
265 | { |
266 | struct syscall_metadata *entry = call->data; | |
267 | ||
268 | if (entry->enter_event == call) | |
269 | kfree(call->print_fmt); | |
270 | } | |
271 | ||
2425bcb9 | 272 | static int __init syscall_enter_define_fields(struct trace_event_call *call) |
540b7b8d LZ |
273 | { |
274 | struct syscall_trace_enter trace; | |
31c16b13 | 275 | struct syscall_metadata *meta = call->data; |
540b7b8d | 276 | int offset = offsetof(typeof(trace), args); |
31537cf8 SRV |
277 | int ret = 0; |
278 | int i; | |
0f1ef51d | 279 | |
540b7b8d | 280 | for (i = 0; i < meta->nb_args; i++) { |
aeaeae11 FW |
281 | ret = trace_define_field(call, meta->types[i], |
282 | meta->args[i], offset, | |
43b51ead LZ |
283 | sizeof(unsigned long), 0, |
284 | FILTER_OTHER); | |
04ae87a5 PZ |
285 | if (ret) |
286 | break; | |
540b7b8d LZ |
287 | offset += sizeof(unsigned long); |
288 | } | |
289 | ||
290 | return ret; | |
291 | } | |
292 | ||
12ab74ee | 293 | static void ftrace_syscall_enter(void *data, struct pt_regs *regs, long id) |
ee08c6ec | 294 | { |
12ab74ee | 295 | struct trace_array *tr = data; |
7f1d2f82 | 296 | struct trace_event_file *trace_file; |
bed1ffca FW |
297 | struct syscall_trace_enter *entry; |
298 | struct syscall_metadata *sys_data; | |
299 | struct ring_buffer_event *event; | |
13292494 | 300 | struct trace_buffer *buffer; |
36590c50 | 301 | unsigned int trace_ctx; |
d08e4113 | 302 | unsigned long args[6]; |
ee08c6ec | 303 | int syscall_nr; |
f431b634 | 304 | int size; |
ee08c6ec | 305 | |
f431b634 | 306 | syscall_nr = trace_get_syscall_nr(current, regs); |
086ba77a | 307 | if (syscall_nr < 0 || syscall_nr >= NR_syscalls) |
cd0980fc | 308 | return; |
d562aff9 TZ |
309 | |
310 | /* Here we're inside tp handler's rcu_read_lock_sched (__DO_TRACE) */ | |
7f1d2f82 SRRH |
311 | trace_file = rcu_dereference_sched(tr->enter_syscall_files[syscall_nr]); |
312 | if (!trace_file) | |
d562aff9 TZ |
313 | return; |
314 | ||
09a5059a | 315 | if (trace_trigger_soft_disabled(trace_file)) |
13a1e4ae | 316 | return; |
ee08c6ec | 317 | |
bed1ffca FW |
318 | sys_data = syscall_nr_to_meta(syscall_nr); |
319 | if (!sys_data) | |
320 | return; | |
321 | ||
322 | size = sizeof(*entry) + sizeof(unsigned long) * sys_data->nb_args; | |
323 | ||
36590c50 | 324 | trace_ctx = tracing_gen_ctx(); |
11034ae9 | 325 | |
1c5eb448 | 326 | buffer = tr->array_buffer.buffer; |
12ab74ee | 327 | event = trace_buffer_lock_reserve(buffer, |
36590c50 | 328 | sys_data->enter_event->event.type, size, trace_ctx); |
bed1ffca FW |
329 | if (!event) |
330 | return; | |
331 | ||
332 | entry = ring_buffer_event_data(event); | |
333 | entry->nr = syscall_nr; | |
b35f549d | 334 | syscall_get_arguments(current, regs, args); |
d08e4113 | 335 | memcpy(entry->args, args, sizeof(unsigned long) * sys_data->nb_args); |
bed1ffca | 336 | |
7f1d2f82 | 337 | event_trigger_unlock_commit(trace_file, buffer, event, entry, |
36590c50 | 338 | trace_ctx); |
ee08c6ec FW |
339 | } |
340 | ||
12ab74ee | 341 | static void ftrace_syscall_exit(void *data, struct pt_regs *regs, long ret) |
ee08c6ec | 342 | { |
12ab74ee | 343 | struct trace_array *tr = data; |
7f1d2f82 | 344 | struct trace_event_file *trace_file; |
bed1ffca FW |
345 | struct syscall_trace_exit *entry; |
346 | struct syscall_metadata *sys_data; | |
347 | struct ring_buffer_event *event; | |
13292494 | 348 | struct trace_buffer *buffer; |
36590c50 | 349 | unsigned int trace_ctx; |
ee08c6ec FW |
350 | int syscall_nr; |
351 | ||
f431b634 | 352 | syscall_nr = trace_get_syscall_nr(current, regs); |
086ba77a | 353 | if (syscall_nr < 0 || syscall_nr >= NR_syscalls) |
cd0980fc | 354 | return; |
d562aff9 TZ |
355 | |
356 | /* Here we're inside tp handler's rcu_read_lock_sched (__DO_TRACE()) */ | |
7f1d2f82 SRRH |
357 | trace_file = rcu_dereference_sched(tr->exit_syscall_files[syscall_nr]); |
358 | if (!trace_file) | |
d562aff9 TZ |
359 | return; |
360 | ||
09a5059a | 361 | if (trace_trigger_soft_disabled(trace_file)) |
13a1e4ae | 362 | return; |
ee08c6ec | 363 | |
bed1ffca FW |
364 | sys_data = syscall_nr_to_meta(syscall_nr); |
365 | if (!sys_data) | |
366 | return; | |
367 | ||
36590c50 | 368 | trace_ctx = tracing_gen_ctx(); |
11034ae9 | 369 | |
1c5eb448 | 370 | buffer = tr->array_buffer.buffer; |
12ab74ee | 371 | event = trace_buffer_lock_reserve(buffer, |
11034ae9 | 372 | sys_data->exit_event->event.type, sizeof(*entry), |
36590c50 | 373 | trace_ctx); |
bed1ffca FW |
374 | if (!event) |
375 | return; | |
376 | ||
377 | entry = ring_buffer_event_data(event); | |
378 | entry->nr = syscall_nr; | |
379 | entry->ret = syscall_get_return_value(current, regs); | |
380 | ||
7f1d2f82 | 381 | event_trigger_unlock_commit(trace_file, buffer, event, entry, |
36590c50 | 382 | trace_ctx); |
ee08c6ec FW |
383 | } |
384 | ||
7f1d2f82 | 385 | static int reg_event_syscall_enter(struct trace_event_file *file, |
2425bcb9 | 386 | struct trace_event_call *call) |
ee08c6ec | 387 | { |
12ab74ee | 388 | struct trace_array *tr = file->tr; |
fb34a08c JB |
389 | int ret = 0; |
390 | int num; | |
fb34a08c | 391 | |
c252f657 | 392 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
3773b389 | 393 | if (WARN_ON_ONCE(num < 0 || num >= NR_syscalls)) |
fb34a08c JB |
394 | return -ENOSYS; |
395 | mutex_lock(&syscall_trace_lock); | |
12ab74ee SR |
396 | if (!tr->sys_refcount_enter) |
397 | ret = register_trace_sys_enter(ftrace_syscall_enter, tr); | |
3b8e4273 | 398 | if (!ret) { |
d562aff9 | 399 | rcu_assign_pointer(tr->enter_syscall_files[num], file); |
12ab74ee | 400 | tr->sys_refcount_enter++; |
fb34a08c JB |
401 | } |
402 | mutex_unlock(&syscall_trace_lock); | |
403 | return ret; | |
ee08c6ec FW |
404 | } |
405 | ||
7f1d2f82 | 406 | static void unreg_event_syscall_enter(struct trace_event_file *file, |
2425bcb9 | 407 | struct trace_event_call *call) |
ee08c6ec | 408 | { |
12ab74ee | 409 | struct trace_array *tr = file->tr; |
fb34a08c | 410 | int num; |
ee08c6ec | 411 | |
c252f657 | 412 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
3773b389 | 413 | if (WARN_ON_ONCE(num < 0 || num >= NR_syscalls)) |
fb34a08c JB |
414 | return; |
415 | mutex_lock(&syscall_trace_lock); | |
12ab74ee | 416 | tr->sys_refcount_enter--; |
fb5a613b | 417 | RCU_INIT_POINTER(tr->enter_syscall_files[num], NULL); |
12ab74ee SR |
418 | if (!tr->sys_refcount_enter) |
419 | unregister_trace_sys_enter(ftrace_syscall_enter, tr); | |
fb34a08c JB |
420 | mutex_unlock(&syscall_trace_lock); |
421 | } | |
ee08c6ec | 422 | |
7f1d2f82 | 423 | static int reg_event_syscall_exit(struct trace_event_file *file, |
2425bcb9 | 424 | struct trace_event_call *call) |
ee08c6ec | 425 | { |
12ab74ee | 426 | struct trace_array *tr = file->tr; |
fb34a08c JB |
427 | int ret = 0; |
428 | int num; | |
fb34a08c | 429 | |
c252f657 | 430 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
3773b389 | 431 | if (WARN_ON_ONCE(num < 0 || num >= NR_syscalls)) |
fb34a08c JB |
432 | return -ENOSYS; |
433 | mutex_lock(&syscall_trace_lock); | |
12ab74ee SR |
434 | if (!tr->sys_refcount_exit) |
435 | ret = register_trace_sys_exit(ftrace_syscall_exit, tr); | |
3b8e4273 | 436 | if (!ret) { |
d562aff9 | 437 | rcu_assign_pointer(tr->exit_syscall_files[num], file); |
12ab74ee | 438 | tr->sys_refcount_exit++; |
ee08c6ec | 439 | } |
fb34a08c JB |
440 | mutex_unlock(&syscall_trace_lock); |
441 | return ret; | |
442 | } | |
ee08c6ec | 443 | |
7f1d2f82 | 444 | static void unreg_event_syscall_exit(struct trace_event_file *file, |
2425bcb9 | 445 | struct trace_event_call *call) |
fb34a08c | 446 | { |
12ab74ee | 447 | struct trace_array *tr = file->tr; |
fb34a08c | 448 | int num; |
ee08c6ec | 449 | |
c252f657 | 450 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
3773b389 | 451 | if (WARN_ON_ONCE(num < 0 || num >= NR_syscalls)) |
fb34a08c JB |
452 | return; |
453 | mutex_lock(&syscall_trace_lock); | |
12ab74ee | 454 | tr->sys_refcount_exit--; |
fb5a613b | 455 | RCU_INIT_POINTER(tr->exit_syscall_files[num], NULL); |
12ab74ee SR |
456 | if (!tr->sys_refcount_exit) |
457 | unregister_trace_sys_exit(ftrace_syscall_exit, tr); | |
fb34a08c | 458 | mutex_unlock(&syscall_trace_lock); |
ee08c6ec | 459 | } |
fb34a08c | 460 | |
2425bcb9 | 461 | static int __init init_syscall_trace(struct trace_event_call *call) |
a1301da0 LJ |
462 | { |
463 | int id; | |
ba976970 IM |
464 | int num; |
465 | ||
466 | num = ((struct syscall_metadata *)call->data)->syscall_nr; | |
467 | if (num < 0 || num >= NR_syscalls) { | |
468 | pr_debug("syscall %s metadata not mapped, disabling ftrace event\n", | |
469 | ((struct syscall_metadata *)call->data)->name); | |
470 | return -ENOSYS; | |
471 | } | |
a1301da0 | 472 | |
50307a45 LJ |
473 | if (set_syscall_print_fmt(call) < 0) |
474 | return -ENOMEM; | |
475 | ||
c7ef3a90 SR |
476 | id = trace_event_raw_init(call); |
477 | ||
478 | if (id < 0) { | |
50307a45 | 479 | free_syscall_print_fmt(call); |
c7ef3a90 | 480 | return id; |
50307a45 | 481 | } |
c7ef3a90 SR |
482 | |
483 | return id; | |
a1301da0 LJ |
484 | } |
485 | ||
04ae87a5 PZ |
486 | static struct trace_event_fields __refdata syscall_enter_fields_array[] = { |
487 | SYSCALL_FIELD(int, __syscall_nr), | |
488 | { .type = TRACE_FUNCTION_TYPE, | |
489 | .define_fields = syscall_enter_define_fields }, | |
490 | {} | |
491 | }; | |
492 | ||
6f86ab9f VN |
493 | struct trace_event_functions enter_syscall_print_funcs = { |
494 | .trace = print_syscall_enter, | |
495 | }; | |
496 | ||
497 | struct trace_event_functions exit_syscall_print_funcs = { | |
498 | .trace = print_syscall_exit, | |
499 | }; | |
500 | ||
2425bcb9 | 501 | struct trace_event_class __refdata event_class_syscall_enter = { |
6f86ab9f VN |
502 | .system = "syscalls", |
503 | .reg = syscall_enter_register, | |
04ae87a5 | 504 | .fields_array = syscall_enter_fields_array, |
6f86ab9f VN |
505 | .get_fields = syscall_get_enter_fields, |
506 | .raw_init = init_syscall_trace, | |
507 | }; | |
508 | ||
2425bcb9 | 509 | struct trace_event_class __refdata event_class_syscall_exit = { |
6f86ab9f VN |
510 | .system = "syscalls", |
511 | .reg = syscall_exit_register, | |
04ae87a5 PZ |
512 | .fields_array = (struct trace_event_fields[]){ |
513 | SYSCALL_FIELD(int, __syscall_nr), | |
514 | SYSCALL_FIELD(long, ret), | |
515 | {} | |
516 | }, | |
6f86ab9f VN |
517 | .fields = LIST_HEAD_INIT(event_class_syscall_exit.fields), |
518 | .raw_init = init_syscall_trace, | |
519 | }; | |
520 | ||
c763ba06 | 521 | unsigned long __init __weak arch_syscall_addr(int nr) |
e7b8e675 MF |
522 | { |
523 | return (unsigned long)sys_call_table[nr]; | |
524 | } | |
525 | ||
5f893b26 | 526 | void __init init_ftrace_syscalls(void) |
c44fc770 FW |
527 | { |
528 | struct syscall_metadata *meta; | |
529 | unsigned long addr; | |
530 | int i; | |
0e242208 HN |
531 | void *ret; |
532 | ||
533 | if (!IS_ENABLED(CONFIG_HAVE_SPARSE_SYSCALL_NR)) { | |
534 | syscalls_metadata = kcalloc(NR_syscalls, | |
535 | sizeof(*syscalls_metadata), | |
536 | GFP_KERNEL); | |
537 | if (!syscalls_metadata) { | |
538 | WARN_ON(1); | |
539 | return; | |
540 | } | |
c44fc770 FW |
541 | } |
542 | ||
543 | for (i = 0; i < NR_syscalls; i++) { | |
544 | addr = arch_syscall_addr(i); | |
545 | meta = find_syscall_meta(addr); | |
c252f657 LJ |
546 | if (!meta) |
547 | continue; | |
548 | ||
549 | meta->syscall_nr = i; | |
0e242208 HN |
550 | |
551 | if (!IS_ENABLED(CONFIG_HAVE_SPARSE_SYSCALL_NR)) { | |
552 | syscalls_metadata[i] = meta; | |
553 | } else { | |
554 | ret = xa_store(&syscalls_metadata_sparse, i, meta, | |
555 | GFP_KERNEL); | |
556 | WARN(xa_is_err(ret), | |
557 | "Syscall memory allocation failed\n"); | |
558 | } | |
559 | ||
c44fc770 | 560 | } |
c44fc770 | 561 | } |
c44fc770 | 562 | |
07b139c8 | 563 | #ifdef CONFIG_PERF_EVENTS |
19007a67 | 564 | |
97d5a220 FW |
565 | static DECLARE_BITMAP(enabled_perf_enter_syscalls, NR_syscalls); |
566 | static DECLARE_BITMAP(enabled_perf_exit_syscalls, NR_syscalls); | |
567 | static int sys_perf_refcount_enter; | |
568 | static int sys_perf_refcount_exit; | |
f4b5ffcc | 569 | |
e87c6bc3 YS |
570 | static int perf_call_bpf_enter(struct trace_event_call *call, struct pt_regs *regs, |
571 | struct syscall_metadata *sys_data, | |
572 | struct syscall_trace_enter *rec) | |
573 | { | |
cf5f5cea YS |
574 | struct syscall_tp_t { |
575 | unsigned long long regs; | |
576 | unsigned long syscall_nr; | |
609320c8 | 577 | unsigned long args[SYSCALL_DEFINE_MAXARGS]; |
cf5f5cea YS |
578 | } param; |
579 | int i; | |
580 | ||
581 | *(struct pt_regs **)¶m = regs; | |
582 | param.syscall_nr = rec->nr; | |
583 | for (i = 0; i < sys_data->nb_args; i++) | |
584 | param.args[i] = rec->args[i]; | |
e87c6bc3 | 585 | return trace_call_bpf(call, ¶m); |
cf5f5cea YS |
586 | } |
587 | ||
38516ab5 | 588 | static void perf_syscall_enter(void *ignore, struct pt_regs *regs, long id) |
f4b5ffcc JB |
589 | { |
590 | struct syscall_metadata *sys_data; | |
20ab4425 | 591 | struct syscall_trace_enter *rec; |
1c024eca | 592 | struct hlist_head *head; |
d08e4113 | 593 | unsigned long args[6]; |
e87c6bc3 | 594 | bool valid_prog_array; |
f4b5ffcc | 595 | int syscall_nr; |
4ed7c92d | 596 | int rctx; |
19007a67 | 597 | int size; |
f4b5ffcc | 598 | |
f431b634 | 599 | syscall_nr = trace_get_syscall_nr(current, regs); |
086ba77a | 600 | if (syscall_nr < 0 || syscall_nr >= NR_syscalls) |
60916a93 | 601 | return; |
97d5a220 | 602 | if (!test_bit(syscall_nr, enabled_perf_enter_syscalls)) |
f4b5ffcc JB |
603 | return; |
604 | ||
605 | sys_data = syscall_nr_to_meta(syscall_nr); | |
606 | if (!sys_data) | |
607 | return; | |
608 | ||
421c7860 | 609 | head = this_cpu_ptr(sys_data->enter_event->perf_events); |
e87c6bc3 YS |
610 | valid_prog_array = bpf_prog_array_valid(sys_data->enter_event); |
611 | if (!valid_prog_array && hlist_empty(head)) | |
421c7860 ON |
612 | return; |
613 | ||
19007a67 FW |
614 | /* get the size after alignment with the u32 buffer size field */ |
615 | size = sizeof(unsigned long) * sys_data->nb_args + sizeof(*rec); | |
616 | size = ALIGN(size + sizeof(u32), sizeof(u64)); | |
617 | size -= sizeof(u32); | |
618 | ||
1e1dcd93 | 619 | rec = perf_trace_buf_alloc(size, NULL, &rctx); |
430ad5a6 XG |
620 | if (!rec) |
621 | return; | |
20ab4425 | 622 | |
20ab4425 | 623 | rec->nr = syscall_nr; |
b35f549d | 624 | syscall_get_arguments(current, regs, args); |
d08e4113 | 625 | memcpy(&rec->args, args, sizeof(unsigned long) * sys_data->nb_args); |
cf5f5cea | 626 | |
e87c6bc3 YS |
627 | if ((valid_prog_array && |
628 | !perf_call_bpf_enter(sys_data->enter_event, regs, sys_data, rec)) || | |
cf5f5cea YS |
629 | hlist_empty(head)) { |
630 | perf_swevent_put_recursion_context(rctx); | |
631 | return; | |
632 | } | |
633 | ||
1e1dcd93 AS |
634 | perf_trace_buf_submit(rec, size, rctx, |
635 | sys_data->enter_event->event.type, 1, regs, | |
8fd0fbbe | 636 | head, NULL); |
f4b5ffcc JB |
637 | } |
638 | ||
2425bcb9 | 639 | static int perf_sysenter_enable(struct trace_event_call *call) |
f4b5ffcc JB |
640 | { |
641 | int ret = 0; | |
642 | int num; | |
643 | ||
3bbe84e9 | 644 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
f4b5ffcc JB |
645 | |
646 | mutex_lock(&syscall_trace_lock); | |
97d5a220 | 647 | if (!sys_perf_refcount_enter) |
38516ab5 | 648 | ret = register_trace_sys_enter(perf_syscall_enter, NULL); |
f4b5ffcc | 649 | if (ret) { |
d282b9c0 | 650 | pr_info("event trace: Could not activate syscall entry trace point"); |
f4b5ffcc | 651 | } else { |
97d5a220 FW |
652 | set_bit(num, enabled_perf_enter_syscalls); |
653 | sys_perf_refcount_enter++; | |
f4b5ffcc JB |
654 | } |
655 | mutex_unlock(&syscall_trace_lock); | |
656 | return ret; | |
657 | } | |
658 | ||
2425bcb9 | 659 | static void perf_sysenter_disable(struct trace_event_call *call) |
f4b5ffcc JB |
660 | { |
661 | int num; | |
662 | ||
3bbe84e9 | 663 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
f4b5ffcc JB |
664 | |
665 | mutex_lock(&syscall_trace_lock); | |
97d5a220 FW |
666 | sys_perf_refcount_enter--; |
667 | clear_bit(num, enabled_perf_enter_syscalls); | |
668 | if (!sys_perf_refcount_enter) | |
38516ab5 | 669 | unregister_trace_sys_enter(perf_syscall_enter, NULL); |
f4b5ffcc JB |
670 | mutex_unlock(&syscall_trace_lock); |
671 | } | |
672 | ||
e87c6bc3 YS |
673 | static int perf_call_bpf_exit(struct trace_event_call *call, struct pt_regs *regs, |
674 | struct syscall_trace_exit *rec) | |
675 | { | |
cf5f5cea YS |
676 | struct syscall_tp_t { |
677 | unsigned long long regs; | |
678 | unsigned long syscall_nr; | |
679 | unsigned long ret; | |
680 | } param; | |
681 | ||
682 | *(struct pt_regs **)¶m = regs; | |
683 | param.syscall_nr = rec->nr; | |
684 | param.ret = rec->ret; | |
e87c6bc3 | 685 | return trace_call_bpf(call, ¶m); |
cf5f5cea YS |
686 | } |
687 | ||
38516ab5 | 688 | static void perf_syscall_exit(void *ignore, struct pt_regs *regs, long ret) |
f4b5ffcc JB |
689 | { |
690 | struct syscall_metadata *sys_data; | |
20ab4425 | 691 | struct syscall_trace_exit *rec; |
1c024eca | 692 | struct hlist_head *head; |
e87c6bc3 | 693 | bool valid_prog_array; |
f4b5ffcc | 694 | int syscall_nr; |
4ed7c92d | 695 | int rctx; |
20ab4425 | 696 | int size; |
f4b5ffcc | 697 | |
f431b634 | 698 | syscall_nr = trace_get_syscall_nr(current, regs); |
086ba77a | 699 | if (syscall_nr < 0 || syscall_nr >= NR_syscalls) |
60916a93 | 700 | return; |
97d5a220 | 701 | if (!test_bit(syscall_nr, enabled_perf_exit_syscalls)) |
f4b5ffcc JB |
702 | return; |
703 | ||
704 | sys_data = syscall_nr_to_meta(syscall_nr); | |
705 | if (!sys_data) | |
706 | return; | |
707 | ||
421c7860 | 708 | head = this_cpu_ptr(sys_data->exit_event->perf_events); |
e87c6bc3 YS |
709 | valid_prog_array = bpf_prog_array_valid(sys_data->exit_event); |
710 | if (!valid_prog_array && hlist_empty(head)) | |
421c7860 ON |
711 | return; |
712 | ||
20ab4425 FW |
713 | /* We can probably do that at build time */ |
714 | size = ALIGN(sizeof(*rec) + sizeof(u32), sizeof(u64)); | |
715 | size -= sizeof(u32); | |
19007a67 | 716 | |
1e1dcd93 | 717 | rec = perf_trace_buf_alloc(size, NULL, &rctx); |
430ad5a6 XG |
718 | if (!rec) |
719 | return; | |
20ab4425 | 720 | |
20ab4425 FW |
721 | rec->nr = syscall_nr; |
722 | rec->ret = syscall_get_return_value(current, regs); | |
cf5f5cea | 723 | |
e87c6bc3 YS |
724 | if ((valid_prog_array && |
725 | !perf_call_bpf_exit(sys_data->exit_event, regs, rec)) || | |
cf5f5cea YS |
726 | hlist_empty(head)) { |
727 | perf_swevent_put_recursion_context(rctx); | |
728 | return; | |
729 | } | |
730 | ||
1e1dcd93 | 731 | perf_trace_buf_submit(rec, size, rctx, sys_data->exit_event->event.type, |
8fd0fbbe | 732 | 1, regs, head, NULL); |
f4b5ffcc JB |
733 | } |
734 | ||
2425bcb9 | 735 | static int perf_sysexit_enable(struct trace_event_call *call) |
f4b5ffcc JB |
736 | { |
737 | int ret = 0; | |
738 | int num; | |
739 | ||
3bbe84e9 | 740 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
f4b5ffcc JB |
741 | |
742 | mutex_lock(&syscall_trace_lock); | |
97d5a220 | 743 | if (!sys_perf_refcount_exit) |
38516ab5 | 744 | ret = register_trace_sys_exit(perf_syscall_exit, NULL); |
f4b5ffcc | 745 | if (ret) { |
d282b9c0 | 746 | pr_info("event trace: Could not activate syscall exit trace point"); |
f4b5ffcc | 747 | } else { |
97d5a220 FW |
748 | set_bit(num, enabled_perf_exit_syscalls); |
749 | sys_perf_refcount_exit++; | |
f4b5ffcc JB |
750 | } |
751 | mutex_unlock(&syscall_trace_lock); | |
752 | return ret; | |
753 | } | |
754 | ||
2425bcb9 | 755 | static void perf_sysexit_disable(struct trace_event_call *call) |
f4b5ffcc JB |
756 | { |
757 | int num; | |
758 | ||
3bbe84e9 | 759 | num = ((struct syscall_metadata *)call->data)->syscall_nr; |
f4b5ffcc JB |
760 | |
761 | mutex_lock(&syscall_trace_lock); | |
97d5a220 FW |
762 | sys_perf_refcount_exit--; |
763 | clear_bit(num, enabled_perf_exit_syscalls); | |
764 | if (!sys_perf_refcount_exit) | |
38516ab5 | 765 | unregister_trace_sys_exit(perf_syscall_exit, NULL); |
f4b5ffcc JB |
766 | mutex_unlock(&syscall_trace_lock); |
767 | } | |
768 | ||
07b139c8 | 769 | #endif /* CONFIG_PERF_EVENTS */ |
f4b5ffcc | 770 | |
2425bcb9 | 771 | static int syscall_enter_register(struct trace_event_call *event, |
ceec0b6f | 772 | enum trace_reg type, void *data) |
2239291a | 773 | { |
7f1d2f82 | 774 | struct trace_event_file *file = data; |
12ab74ee | 775 | |
2239291a SR |
776 | switch (type) { |
777 | case TRACE_REG_REGISTER: | |
12ab74ee | 778 | return reg_event_syscall_enter(file, event); |
2239291a | 779 | case TRACE_REG_UNREGISTER: |
12ab74ee | 780 | unreg_event_syscall_enter(file, event); |
2239291a SR |
781 | return 0; |
782 | ||
783 | #ifdef CONFIG_PERF_EVENTS | |
784 | case TRACE_REG_PERF_REGISTER: | |
785 | return perf_sysenter_enable(event); | |
786 | case TRACE_REG_PERF_UNREGISTER: | |
787 | perf_sysenter_disable(event); | |
788 | return 0; | |
ceec0b6f JO |
789 | case TRACE_REG_PERF_OPEN: |
790 | case TRACE_REG_PERF_CLOSE: | |
489c75c3 JO |
791 | case TRACE_REG_PERF_ADD: |
792 | case TRACE_REG_PERF_DEL: | |
ceec0b6f | 793 | return 0; |
2239291a SR |
794 | #endif |
795 | } | |
796 | return 0; | |
797 | } | |
798 | ||
2425bcb9 | 799 | static int syscall_exit_register(struct trace_event_call *event, |
ceec0b6f | 800 | enum trace_reg type, void *data) |
2239291a | 801 | { |
7f1d2f82 | 802 | struct trace_event_file *file = data; |
12ab74ee | 803 | |
2239291a SR |
804 | switch (type) { |
805 | case TRACE_REG_REGISTER: | |
12ab74ee | 806 | return reg_event_syscall_exit(file, event); |
2239291a | 807 | case TRACE_REG_UNREGISTER: |
12ab74ee | 808 | unreg_event_syscall_exit(file, event); |
2239291a SR |
809 | return 0; |
810 | ||
811 | #ifdef CONFIG_PERF_EVENTS | |
812 | case TRACE_REG_PERF_REGISTER: | |
813 | return perf_sysexit_enable(event); | |
814 | case TRACE_REG_PERF_UNREGISTER: | |
815 | perf_sysexit_disable(event); | |
816 | return 0; | |
ceec0b6f JO |
817 | case TRACE_REG_PERF_OPEN: |
818 | case TRACE_REG_PERF_CLOSE: | |
489c75c3 JO |
819 | case TRACE_REG_PERF_ADD: |
820 | case TRACE_REG_PERF_DEL: | |
ceec0b6f | 821 | return 0; |
2239291a SR |
822 | #endif |
823 | } | |
824 | return 0; | |
825 | } |