Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2663244ybb; Sun, 5 Apr 2020 13:14:59 -0700 (PDT) X-Google-Smtp-Source: APiQypKjr6bGQOuNb7q9z1cIgRPH5wfzx27reBrkiLidFAR5I/W/He1ZLfbEkNcZg6cvAjiiKZ4R X-Received: by 2002:a9d:7a7:: with SMTP id 36mr15587537oto.283.1586117699407; Sun, 05 Apr 2020 13:14:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586117699; cv=none; d=google.com; s=arc-20160816; b=lGXW9QjFHK+ecKaSi3SNPXCVRLqbQAtQaRaQvF1jsYMoF7zKzYPrKwPkQKsFNl8ClD eJMBSqhQpGKTV/Eleb0aSIO+nzaXm3H3RSIS9qa7verlSQ6ID5nDIDzI82rJJko781eg gyj3CCYAXveq5x2yQdiBC570kJuPNVR/cCLm2YA7/9AflHLxcF05TgslEzMzxBtLIPcE Lh0v2gRkw83JESBr8mP81trm8kS2Ube/IGKnKb+7SULeLzwd0sEc8jY7Vw2xExMJmoC8 MBcqeVsRpIoVd+UfHQtC6Mc7gn0lAKi1TiipBJ15WKnWC4q5fN4b9oOs6PWcJQx9BmC4 4haA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:organization:message-id:date:subject:cc :to:from:ironport-sdr:ironport-sdr; bh=8OsNtYAVGTCoJzoMFOoYcsqkn4uUrmmhBIrw/tVKFF0=; b=uK9/JtUoeKUNdfltorEuaDLwiPshGK1LKbPjG8cNZOuzZE0fAu0QHjKAZ+MpTIbD4A zxJPVDVKsgYybGO/x+0vWRK8++tHr2ltkPJKIjTj0lpt93fe8UcTHN2rxpOucqNdNDLU moCzDDc60mEDPrIn6Z28YN1Jb4UW4oNHrl7iDQ6h3nnDmvMvuDf1hogqyF9w3WVqPJHI vH31qiusI+hN9xeuNFH92MFM37/a/13nAvnMKpwXtsMcFwjGUi7g+8H+Tuwc0Quwkha8 aD0J4CxW6U3CTkjJ0f8fn3R2FGD8M/dLRQsJoPI8feCdL/s6VEWpKGffIAA1U6cyQP0d 7Bbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q15si7227244otm.212.2020.04.05.13.14.39; Sun, 05 Apr 2020 13:14:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727705AbgDEUOS (ORCPT + 99 others); Sun, 5 Apr 2020 16:14:18 -0400 Received: from mga01.intel.com ([192.55.52.88]:62225 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726887AbgDEUOR (ORCPT ); Sun, 5 Apr 2020 16:14:17 -0400 IronPort-SDR: JkCale7GbP1ZmTyda90MPz9Ho/z8ZLcw3yk2P9mENkPvF37tohqNK0p9ZR5Y25Jf6QbqHjnEh9 nI3sw8+nO0DA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2020 13:14:17 -0700 IronPort-SDR: lsnpJBhoI9DEBErc0atIDPfOn0IN1Q86/t6bvgY328+C1NOO7e3pnLsn/sBEizDgNAMktLOzOh YQsCEX8w8eJg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,348,1580803200"; d="scan'208";a="329688337" Received: from ahunter-desktop.fi.intel.com ([10.237.72.87]) by orsmga001.jf.intel.com with ESMTP; 05 Apr 2020 13:14:12 -0700 From: Adrian Hunter To: Peter Zijlstra Cc: Ingo Molnar , Masami Hiramatsu , Steven Rostedt , Borislav Petkov , "H . Peter Anvin" , x86@kernel.org, Mark Rutland , Alexander Shishkin , Mathieu Poirier , Leo Yan , Arnaldo Carvalho de Melo , Jiri Olsa , linux-kernel@vger.kernel.org Subject: [PATCH V6 00/15] perf/x86: Add perf text poke events Date: Sun, 5 Apr 2020 23:13:12 +0300 Message-Id: <20200405201327.7332-1-adrian.hunter@intel.com> X-Mailer: git-send-email 2.17.1 Organization: Intel Finland Oy, Registered Address: PL 281, 00181 Helsinki, Business Identity Code: 0357606 - 4, Domiciled in Helsinki Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Here are patches to add a text poke event to record changes to kernel text (i.e. self-modifying code) in order to support tracers like Intel PT decoding through jump labels, kprobes and ftrace trampolines. The first 8 patches make the kernel changes and the subsequent patches are tools changes. The next 4 patches add support for updating perf tools' data cache with the changed bytes. The next patch is an Intel PT specific tools change. The final 2 patches add perf script --show-text-poke-events option Patches also here: git://git.infradead.org/users/ahunter/linux-perf.git text_poke Changes in V6 perf: Add perf text poke event Adjustments due to re-base on top of cgroup event patches perf/x86: Add perf text poke events for kprobes Expand commit message Add Masami's Ack perf tools: Add support for PERF_RECORD_TEXT_POKE Adjustments due to re-base on top of cgroup event patches Improvements to perf_event__fprintf_text_poke() perf script: Add option --show-text-poke-events perf script: Show text poke address symbol New patches Changes in V5 perf/x86: Add perf text poke events for kprobes Simplify optimized kprobes events (Peter) Changes in V4 kprobes: Add symbols for kprobe insn pages Change "module name" from kprobe to __builtin__kprobes Added comment about "module name" use ftrace: Add symbols for ftrace trampolines Change "module name" from ftrace to __builtin__ftrace Move calls of ftrace_add_trampoline_to_kallsyms() and ftrace_remove_trampoline_from_kallsyms() into kernel/trace/ftrace.c Added comment about "module name" use ftrace: Add perf ksymbol events for ftrace trampolines Move changes into kernel/trace/ftrace.c ftrace: Add perf text poke events for ftrace trampolines Move changes into kernel/trace/ftrace.c Changes in V3: perf: Add perf text poke event To prevent warning, cast pointer to (unsigned long) not (u64) kprobes: Add symbols for kprobe insn pages Expand commit message Remove un-needed declarations of kprobe_cache_get_kallsym() and arch_kprobe_get_kallsym() when !CONFIG_KPROBES ftrace: Add symbols for ftrace trampolines Expand commit message Make ftrace_get_trampoline_kallsym() static Changes in V2: perf: Add perf text poke event Separate out x86 changes The text poke event now has old len and new len Revised commit message perf/x86: Add support for perf text poke event for text_poke_bp_batch() callers New patch containing x86 changes from original first patch kprobes: Add symbols for kprobe insn pages kprobes: Add perf ksymbol events for kprobe insn pages perf/x86: Add perf text poke events for kprobes ftrace: Add symbols for ftrace trampolines ftrace: Add perf ksymbol events for ftrace trampolines ftrace: Add perf text poke events for ftrace trampolines perf kcore_copy: Fix module map when there are no modules loaded perf evlist: Disable 'immediate' events last New patches perf tools: Add support for PERF_RECORD_TEXT_POKE The text poke event now has old len and new len Also select ksymbol events with text poke events perf tools: Add support for PERF_RECORD_KSYMBOL_TYPE_OOL New patch perf intel-pt: Add support for text poke events The text poke event now has old len and new len Allow for the address not having a map yet Changes since RFC: Dropped 'flags' from the new event. The consensus seemed to be that text pokes should employ a scheme similar to x86's INT3 method instead. dropped tools patches already applied. Example: For jump labels, the kernel needs CONFIG_JUMP_LABEL=y and also an easy to flip jump label is in sysctl_schedstats() which needs CONFIG_SCHEDSTATS=y CONFIG_PROC_SYSCTL=y CONFIG_SCHED_DEBUG=y Also note the 'sudo perf record' is put into the background which, as written, needs sudo credential caching (otherwise the background task will stop awaiting the sudo password), hence the 'sudo echo' to start. Before: $ sudo echo $ sudo perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M & [1] 1640 $ cat /proc/sys/kernel/sched_schedstats 0 $ sudo bash -c 'echo 1 > /proc/sys/kernel/sched_schedstats' $ cat /proc/sys/kernel/sched_schedstats 1 $ sudo bash -c 'echo 0 > /proc/sys/kernel/sched_schedstats' $ cat /proc/sys/kernel/sched_schedstats 0 $ sudo kill 1640 [ perf record: Woken up 1 times to write data ] [ perf record: Captured and wrote 16.635 MB perf.data.before ] $ perf script -i perf.data.before --itrace=e >/dev/null Warning: 1946 instruction trace errors After: $ sudo echo $ sudo perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M & [1] 1882 $ cat /proc/sys/kernel/sched_schedstats 0 $ sudo bash -c 'echo 1 > /proc/sys/kernel/sched_schedstats' $ cat /proc/sys/kernel/sched_schedstats 1 $ sudo bash -c 'echo 0 > /proc/sys/kernel/sched_schedstats' $ cat /proc/sys/kernel/sched_schedstats 0 $ sudo kill 1882 [ perf record: Woken up 1 times to write data ] [ perf record: Captured and wrote 10.893 MB perf.data.after ] $ perf script -i perf.data.after --itrace=e $ Adrian Hunter (15): perf: Add perf text poke event perf/x86: Add support for perf text poke event for text_poke_bp_batch() callers kprobes: Add symbols for kprobe insn pages kprobes: Add perf ksymbol events for kprobe insn pages perf/x86: Add perf text poke events for kprobes ftrace: Add symbols for ftrace trampolines ftrace: Add perf ksymbol events for ftrace trampolines ftrace: Add perf text poke events for ftrace trampolines perf kcore_copy: Fix module map when there are no modules loaded perf evlist: Disable 'immediate' events last perf tools: Add support for PERF_RECORD_TEXT_POKE perf tools: Add support for PERF_RECORD_KSYMBOL_TYPE_OOL perf intel-pt: Add support for text poke events perf script: Add option --show-text-poke-events perf script: Show text poke address symbol arch/x86/include/asm/kprobes.h | 2 + arch/x86/kernel/alternative.c | 37 ++++++++++- arch/x86/kernel/kprobes/core.c | 15 ++++- arch/x86/kernel/kprobes/opt.c | 38 +++++++++-- include/linux/ftrace.h | 12 ++-- include/linux/kprobes.h | 15 +++++ include/linux/perf_event.h | 8 +++ include/uapi/linux/perf_event.h | 26 +++++++- kernel/events/core.c | 90 +++++++++++++++++++++++++- kernel/kallsyms.c | 42 +++++++++++-- kernel/kprobes.c | 57 +++++++++++++++++ kernel/trace/ftrace.c | 101 +++++++++++++++++++++++++++++- tools/include/uapi/linux/perf_event.h | 26 +++++++- tools/lib/perf/include/perf/event.h | 9 +++ tools/perf/Documentation/perf-script.txt | 4 ++ tools/perf/arch/x86/util/intel-pt.c | 4 ++ tools/perf/builtin-record.c | 45 +++++++++++++ tools/perf/builtin-script.c | 23 ++++++- tools/perf/tests/perf-record.c | 4 +- tools/perf/util/dso.c | 3 + tools/perf/util/dso.h | 1 + tools/perf/util/event.c | 62 +++++++++++++++++- tools/perf/util/event.h | 9 ++- tools/perf/util/evlist.c | 31 ++++++--- tools/perf/util/evlist.h | 1 + tools/perf/util/evsel.c | 7 ++- tools/perf/util/intel-pt.c | 77 ++++++++++++++++++++++- tools/perf/util/machine.c | 49 +++++++++++++++ tools/perf/util/machine.h | 3 + tools/perf/util/map.c | 5 ++ tools/perf/util/map.h | 3 +- tools/perf/util/perf_event_attr_fprintf.c | 1 + tools/perf/util/record.c | 10 +++ tools/perf/util/record.h | 1 + tools/perf/util/session.c | 23 +++++++ tools/perf/util/symbol-elf.c | 7 +++ tools/perf/util/symbol.c | 1 + tools/perf/util/tool.h | 3 +- 38 files changed, 815 insertions(+), 40 deletions(-) Regards Adrian