probe-event.c 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644
  1. /*
  2. * probe-event.c : perf-probe definition to kprobe_events format converter
  3. *
  4. * Written by Masami Hiramatsu <mhiramat@redhat.com>
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  19. *
  20. */
  21. #define _GNU_SOURCE
  22. #include <sys/utsname.h>
  23. #include <sys/types.h>
  24. #include <sys/stat.h>
  25. #include <fcntl.h>
  26. #include <errno.h>
  27. #include <stdio.h>
  28. #include <unistd.h>
  29. #include <stdlib.h>
  30. #include <string.h>
  31. #include <stdarg.h>
  32. #include <limits.h>
  33. #undef _GNU_SOURCE
  34. #include "util.h"
  35. #include "event.h"
  36. #include "string.h"
  37. #include "strlist.h"
  38. #include "debug.h"
  39. #include "cache.h"
  40. #include "color.h"
  41. #include "symbol.h"
  42. #include "thread.h"
  43. #include "debugfs.h"
  44. #include "trace-event.h" /* For __unused */
  45. #include "probe-event.h"
  46. #include "probe-finder.h"
  47. #define MAX_CMDLEN 256
  48. #define MAX_PROBE_ARGS 128
  49. #define PERFPROBE_GROUP "probe"
  50. bool probe_event_dry_run; /* Dry run flag */
  51. #define semantic_error(msg ...) pr_err("Semantic error :" msg)
  52. /* If there is no space to write, returns -E2BIG. */
  53. static int e_snprintf(char *str, size_t size, const char *format, ...)
  54. __attribute__((format(printf, 3, 4)));
  55. static int e_snprintf(char *str, size_t size, const char *format, ...)
  56. {
  57. int ret;
  58. va_list ap;
  59. va_start(ap, format);
  60. ret = vsnprintf(str, size, format, ap);
  61. va_end(ap);
  62. if (ret >= (int)size)
  63. ret = -E2BIG;
  64. return ret;
  65. }
  66. static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
  67. static struct map_groups kmap_groups;
  68. static struct map *kmaps[MAP__NR_TYPES];
  69. /* Initialize symbol maps and path of vmlinux */
  70. static int init_vmlinux(void)
  71. {
  72. struct dso *kernel;
  73. int ret;
  74. symbol_conf.sort_by_name = true;
  75. if (symbol_conf.vmlinux_name == NULL)
  76. symbol_conf.try_vmlinux_path = true;
  77. else
  78. pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
  79. ret = symbol__init();
  80. if (ret < 0) {
  81. pr_debug("Failed to init symbol map.\n");
  82. goto out;
  83. }
  84. kernel = dso__new_kernel(symbol_conf.vmlinux_name);
  85. if (kernel == NULL)
  86. die("Failed to create kernel dso.");
  87. map_groups__init(&kmap_groups);
  88. ret = __map_groups__create_kernel_maps(&kmap_groups, kmaps, kernel);
  89. if (ret < 0)
  90. pr_debug("Failed to create kernel maps.\n");
  91. out:
  92. if (ret < 0)
  93. pr_warning("Failed to init vmlinux path.\n");
  94. return ret;
  95. }
  96. #ifdef DWARF_SUPPORT
  97. static int open_vmlinux(void)
  98. {
  99. if (map__load(kmaps[MAP__FUNCTION], NULL) < 0) {
  100. pr_debug("Failed to load kernel map.\n");
  101. return -EINVAL;
  102. }
  103. pr_debug("Try to open %s\n", kmaps[MAP__FUNCTION]->dso->long_name);
  104. return open(kmaps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
  105. }
  106. /* Convert trace point to probe point with debuginfo */
  107. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  108. struct perf_probe_point *pp)
  109. {
  110. struct symbol *sym;
  111. int fd, ret = -ENOENT;
  112. sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
  113. tp->symbol, NULL);
  114. if (sym) {
  115. fd = open_vmlinux();
  116. if (fd >= 0) {
  117. ret = find_perf_probe_point(fd,
  118. sym->start + tp->offset, pp);
  119. close(fd);
  120. }
  121. }
  122. if (ret <= 0) {
  123. pr_debug("Failed to find corresponding probes from "
  124. "debuginfo. Use kprobe event information.\n");
  125. pp->function = strdup(tp->symbol);
  126. if (pp->function == NULL)
  127. return -ENOMEM;
  128. pp->offset = tp->offset;
  129. }
  130. pp->retprobe = tp->retprobe;
  131. return 0;
  132. }
  133. /* Try to find perf_probe_event with debuginfo */
  134. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  135. struct kprobe_trace_event **tevs,
  136. int max_tevs)
  137. {
  138. bool need_dwarf = perf_probe_event_need_dwarf(pev);
  139. int fd, ntevs;
  140. fd = open_vmlinux();
  141. if (fd < 0) {
  142. if (need_dwarf) {
  143. pr_warning("Failed to open debuginfo file.\n");
  144. return fd;
  145. }
  146. pr_debug("Could not open vmlinux. Try to use symbols.\n");
  147. return 0;
  148. }
  149. /* Searching trace events corresponding to probe event */
  150. ntevs = find_kprobe_trace_events(fd, pev, tevs, max_tevs);
  151. close(fd);
  152. if (ntevs > 0) { /* Succeeded to find trace events */
  153. pr_debug("find %d kprobe_trace_events.\n", ntevs);
  154. return ntevs;
  155. }
  156. if (ntevs == 0) { /* No error but failed to find probe point. */
  157. pr_warning("Probe point '%s' not found.\n",
  158. synthesize_perf_probe_point(&pev->point));
  159. return -ENOENT;
  160. }
  161. /* Error path : ntevs < 0 */
  162. pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
  163. if (ntevs == -EBADF) {
  164. pr_warning("Warning: No dwarf info found in the vmlinux - "
  165. "please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
  166. if (!need_dwarf) {
  167. pr_debug("Trying to use symbols.\nn");
  168. return 0;
  169. }
  170. }
  171. return ntevs;
  172. }
  173. #define LINEBUF_SIZE 256
  174. #define NR_ADDITIONAL_LINES 2
  175. static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
  176. {
  177. char buf[LINEBUF_SIZE];
  178. const char *color = PERF_COLOR_BLUE;
  179. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  180. goto error;
  181. if (!skip) {
  182. if (show_num)
  183. fprintf(stdout, "%7d %s", l, buf);
  184. else
  185. color_fprintf(stdout, color, " %s", buf);
  186. }
  187. while (strlen(buf) == LINEBUF_SIZE - 1 &&
  188. buf[LINEBUF_SIZE - 2] != '\n') {
  189. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  190. goto error;
  191. if (!skip) {
  192. if (show_num)
  193. fprintf(stdout, "%s", buf);
  194. else
  195. color_fprintf(stdout, color, "%s", buf);
  196. }
  197. }
  198. return 0;
  199. error:
  200. if (feof(fp))
  201. pr_warning("Source file is shorter than expected.\n");
  202. else
  203. pr_warning("File read error: %s\n", strerror(errno));
  204. return -1;
  205. }
  206. /*
  207. * Show line-range always requires debuginfo to find source file and
  208. * line number.
  209. */
  210. int show_line_range(struct line_range *lr)
  211. {
  212. int l = 1;
  213. struct line_node *ln;
  214. FILE *fp;
  215. int fd, ret;
  216. /* Search a line range */
  217. ret = init_vmlinux();
  218. if (ret < 0)
  219. return ret;
  220. fd = open_vmlinux();
  221. if (fd < 0) {
  222. pr_warning("Failed to open debuginfo file.\n");
  223. return fd;
  224. }
  225. ret = find_line_range(fd, lr);
  226. close(fd);
  227. if (ret == 0) {
  228. pr_warning("Specified source line is not found.\n");
  229. return -ENOENT;
  230. } else if (ret < 0) {
  231. pr_warning("Debuginfo analysis failed. (%d)\n", ret);
  232. return ret;
  233. }
  234. setup_pager();
  235. if (lr->function)
  236. fprintf(stdout, "<%s:%d>\n", lr->function,
  237. lr->start - lr->offset);
  238. else
  239. fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
  240. fp = fopen(lr->path, "r");
  241. if (fp == NULL) {
  242. pr_warning("Failed to open %s: %s\n", lr->path,
  243. strerror(errno));
  244. return -errno;
  245. }
  246. /* Skip to starting line number */
  247. while (l < lr->start && ret >= 0)
  248. ret = show_one_line(fp, l++, true, false);
  249. if (ret < 0)
  250. goto end;
  251. list_for_each_entry(ln, &lr->line_list, list) {
  252. while (ln->line > l && ret >= 0)
  253. ret = show_one_line(fp, (l++) - lr->offset,
  254. false, false);
  255. if (ret >= 0)
  256. ret = show_one_line(fp, (l++) - lr->offset,
  257. false, true);
  258. if (ret < 0)
  259. goto end;
  260. }
  261. if (lr->end == INT_MAX)
  262. lr->end = l + NR_ADDITIONAL_LINES;
  263. while (l <= lr->end && !feof(fp) && ret >= 0)
  264. ret = show_one_line(fp, (l++) - lr->offset, false, false);
  265. end:
  266. fclose(fp);
  267. return ret;
  268. }
  269. #else /* !DWARF_SUPPORT */
  270. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  271. struct perf_probe_point *pp)
  272. {
  273. pp->function = strdup(tp->symbol);
  274. if (pp->function == NULL)
  275. return -ENOMEM;
  276. pp->offset = tp->offset;
  277. pp->retprobe = tp->retprobe;
  278. return 0;
  279. }
  280. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  281. struct kprobe_trace_event **tevs __unused,
  282. int max_tevs __unused)
  283. {
  284. if (perf_probe_event_need_dwarf(pev)) {
  285. pr_warning("Debuginfo-analysis is not supported.\n");
  286. return -ENOSYS;
  287. }
  288. return 0;
  289. }
  290. int show_line_range(struct line_range *lr __unused)
  291. {
  292. pr_warning("Debuginfo-analysis is not supported.\n");
  293. return -ENOSYS;
  294. }
  295. #endif
  296. int parse_line_range_desc(const char *arg, struct line_range *lr)
  297. {
  298. const char *ptr;
  299. char *tmp;
  300. /*
  301. * <Syntax>
  302. * SRC:SLN[+NUM|-ELN]
  303. * FUNC[:SLN[+NUM|-ELN]]
  304. */
  305. ptr = strchr(arg, ':');
  306. if (ptr) {
  307. lr->start = (int)strtoul(ptr + 1, &tmp, 0);
  308. if (*tmp == '+') {
  309. lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
  310. lr->end--; /*
  311. * Adjust the number of lines here.
  312. * If the number of lines == 1, the
  313. * the end of line should be equal to
  314. * the start of line.
  315. */
  316. } else if (*tmp == '-')
  317. lr->end = (int)strtoul(tmp + 1, &tmp, 0);
  318. else
  319. lr->end = INT_MAX;
  320. pr_debug("Line range is %d to %d\n", lr->start, lr->end);
  321. if (lr->start > lr->end) {
  322. semantic_error("Start line must be smaller"
  323. " than end line.\n");
  324. return -EINVAL;
  325. }
  326. if (*tmp != '\0') {
  327. semantic_error("Tailing with invalid character '%d'.\n",
  328. *tmp);
  329. return -EINVAL;
  330. }
  331. tmp = strndup(arg, (ptr - arg));
  332. } else {
  333. tmp = strdup(arg);
  334. lr->end = INT_MAX;
  335. }
  336. if (tmp == NULL)
  337. return -ENOMEM;
  338. if (strchr(tmp, '.'))
  339. lr->file = tmp;
  340. else
  341. lr->function = tmp;
  342. return 0;
  343. }
  344. /* Check the name is good for event/group */
  345. static bool check_event_name(const char *name)
  346. {
  347. if (!isalpha(*name) && *name != '_')
  348. return false;
  349. while (*++name != '\0') {
  350. if (!isalpha(*name) && !isdigit(*name) && *name != '_')
  351. return false;
  352. }
  353. return true;
  354. }
  355. /* Parse probepoint definition. */
  356. static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
  357. {
  358. struct perf_probe_point *pp = &pev->point;
  359. char *ptr, *tmp;
  360. char c, nc = 0;
  361. /*
  362. * <Syntax>
  363. * perf probe [EVENT=]SRC[:LN|;PTN]
  364. * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
  365. *
  366. * TODO:Group name support
  367. */
  368. ptr = strpbrk(arg, ";=@+%");
  369. if (ptr && *ptr == '=') { /* Event name */
  370. *ptr = '\0';
  371. tmp = ptr + 1;
  372. if (strchr(arg, ':')) {
  373. semantic_error("Group name is not supported yet.\n");
  374. return -ENOTSUP;
  375. }
  376. if (!check_event_name(arg)) {
  377. semantic_error("%s is bad for event name -it must "
  378. "follow C symbol-naming rule.\n", arg);
  379. return -EINVAL;
  380. }
  381. pev->event = strdup(arg);
  382. if (pev->event == NULL)
  383. return -ENOMEM;
  384. pev->group = NULL;
  385. arg = tmp;
  386. }
  387. ptr = strpbrk(arg, ";:+@%");
  388. if (ptr) {
  389. nc = *ptr;
  390. *ptr++ = '\0';
  391. }
  392. tmp = strdup(arg);
  393. if (tmp == NULL)
  394. return -ENOMEM;
  395. /* Check arg is function or file and copy it */
  396. if (strchr(tmp, '.')) /* File */
  397. pp->file = tmp;
  398. else /* Function */
  399. pp->function = tmp;
  400. /* Parse other options */
  401. while (ptr) {
  402. arg = ptr;
  403. c = nc;
  404. if (c == ';') { /* Lazy pattern must be the last part */
  405. pp->lazy_line = strdup(arg);
  406. if (pp->lazy_line == NULL)
  407. return -ENOMEM;
  408. break;
  409. }
  410. ptr = strpbrk(arg, ";:+@%");
  411. if (ptr) {
  412. nc = *ptr;
  413. *ptr++ = '\0';
  414. }
  415. switch (c) {
  416. case ':': /* Line number */
  417. pp->line = strtoul(arg, &tmp, 0);
  418. if (*tmp != '\0') {
  419. semantic_error("There is non-digit char"
  420. " in line number.\n");
  421. return -EINVAL;
  422. }
  423. break;
  424. case '+': /* Byte offset from a symbol */
  425. pp->offset = strtoul(arg, &tmp, 0);
  426. if (*tmp != '\0') {
  427. semantic_error("There is non-digit character"
  428. " in offset.\n");
  429. return -EINVAL;
  430. }
  431. break;
  432. case '@': /* File name */
  433. if (pp->file) {
  434. semantic_error("SRC@SRC is not allowed.\n");
  435. return -EINVAL;
  436. }
  437. pp->file = strdup(arg);
  438. if (pp->file == NULL)
  439. return -ENOMEM;
  440. break;
  441. case '%': /* Probe places */
  442. if (strcmp(arg, "return") == 0) {
  443. pp->retprobe = 1;
  444. } else { /* Others not supported yet */
  445. semantic_error("%%%s is not supported.\n", arg);
  446. return -ENOTSUP;
  447. }
  448. break;
  449. default: /* Buggy case */
  450. pr_err("This program has a bug at %s:%d.\n",
  451. __FILE__, __LINE__);
  452. return -ENOTSUP;
  453. break;
  454. }
  455. }
  456. /* Exclusion check */
  457. if (pp->lazy_line && pp->line) {
  458. semantic_error("Lazy pattern can't be used with line number.");
  459. return -EINVAL;
  460. }
  461. if (pp->lazy_line && pp->offset) {
  462. semantic_error("Lazy pattern can't be used with offset.");
  463. return -EINVAL;
  464. }
  465. if (pp->line && pp->offset) {
  466. semantic_error("Offset can't be used with line number.");
  467. return -EINVAL;
  468. }
  469. if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
  470. semantic_error("File always requires line number or "
  471. "lazy pattern.");
  472. return -EINVAL;
  473. }
  474. if (pp->offset && !pp->function) {
  475. semantic_error("Offset requires an entry function.");
  476. return -EINVAL;
  477. }
  478. if (pp->retprobe && !pp->function) {
  479. semantic_error("Return probe requires an entry function.");
  480. return -EINVAL;
  481. }
  482. if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
  483. semantic_error("Offset/Line/Lazy pattern can't be used with "
  484. "return probe.");
  485. return -EINVAL;
  486. }
  487. pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
  488. pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
  489. pp->lazy_line);
  490. return 0;
  491. }
  492. /* Parse perf-probe event argument */
  493. static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
  494. {
  495. char *tmp;
  496. struct perf_probe_arg_field **fieldp;
  497. pr_debug("parsing arg: %s into ", str);
  498. tmp = strchr(str, '=');
  499. if (tmp) {
  500. arg->name = strndup(str, tmp - str);
  501. if (arg->name == NULL)
  502. return -ENOMEM;
  503. pr_debug("name:%s ", arg->name);
  504. str = tmp + 1;
  505. }
  506. tmp = strchr(str, ':');
  507. if (tmp) { /* Type setting */
  508. *tmp = '\0';
  509. arg->type = strdup(tmp + 1);
  510. if (arg->type == NULL)
  511. return -ENOMEM;
  512. pr_debug("type:%s ", arg->type);
  513. }
  514. tmp = strpbrk(str, "-.");
  515. if (!is_c_varname(str) || !tmp) {
  516. /* A variable, register, symbol or special value */
  517. arg->var = strdup(str);
  518. if (arg->var == NULL)
  519. return -ENOMEM;
  520. pr_debug("%s\n", arg->var);
  521. return 0;
  522. }
  523. /* Structure fields */
  524. arg->var = strndup(str, tmp - str);
  525. if (arg->var == NULL)
  526. return -ENOMEM;
  527. pr_debug("%s, ", arg->var);
  528. fieldp = &arg->field;
  529. do {
  530. *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
  531. if (*fieldp == NULL)
  532. return -ENOMEM;
  533. if (*tmp == '.') {
  534. str = tmp + 1;
  535. (*fieldp)->ref = false;
  536. } else if (tmp[1] == '>') {
  537. str = tmp + 2;
  538. (*fieldp)->ref = true;
  539. } else {
  540. semantic_error("Argument parse error: %s\n", str);
  541. return -EINVAL;
  542. }
  543. tmp = strpbrk(str, "-.");
  544. if (tmp) {
  545. (*fieldp)->name = strndup(str, tmp - str);
  546. if ((*fieldp)->name == NULL)
  547. return -ENOMEM;
  548. pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
  549. fieldp = &(*fieldp)->next;
  550. }
  551. } while (tmp);
  552. (*fieldp)->name = strdup(str);
  553. if ((*fieldp)->name == NULL)
  554. return -ENOMEM;
  555. pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
  556. /* If no name is specified, set the last field name */
  557. if (!arg->name) {
  558. arg->name = strdup((*fieldp)->name);
  559. if (arg->name == NULL)
  560. return -ENOMEM;
  561. }
  562. return 0;
  563. }
  564. /* Parse perf-probe event command */
  565. int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
  566. {
  567. char **argv;
  568. int argc, i, ret = 0;
  569. argv = argv_split(cmd, &argc);
  570. if (!argv) {
  571. pr_debug("Failed to split arguments.\n");
  572. return -ENOMEM;
  573. }
  574. if (argc - 1 > MAX_PROBE_ARGS) {
  575. semantic_error("Too many probe arguments (%d).\n", argc - 1);
  576. ret = -ERANGE;
  577. goto out;
  578. }
  579. /* Parse probe point */
  580. ret = parse_perf_probe_point(argv[0], pev);
  581. if (ret < 0)
  582. goto out;
  583. /* Copy arguments and ensure return probe has no C argument */
  584. pev->nargs = argc - 1;
  585. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  586. if (pev->args == NULL) {
  587. ret = -ENOMEM;
  588. goto out;
  589. }
  590. for (i = 0; i < pev->nargs && ret >= 0; i++) {
  591. ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
  592. if (ret >= 0 &&
  593. is_c_varname(pev->args[i].var) && pev->point.retprobe) {
  594. semantic_error("You can't specify local variable for"
  595. " kretprobe.\n");
  596. ret = -EINVAL;
  597. }
  598. }
  599. out:
  600. argv_free(argv);
  601. return ret;
  602. }
  603. /* Return true if this perf_probe_event requires debuginfo */
  604. bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
  605. {
  606. int i;
  607. if (pev->point.file || pev->point.line || pev->point.lazy_line)
  608. return true;
  609. for (i = 0; i < pev->nargs; i++)
  610. if (is_c_varname(pev->args[i].var))
  611. return true;
  612. return false;
  613. }
  614. /* Parse kprobe_events event into struct probe_point */
  615. int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
  616. {
  617. struct kprobe_trace_point *tp = &tev->point;
  618. char pr;
  619. char *p;
  620. int ret, i, argc;
  621. char **argv;
  622. pr_debug("Parsing kprobe_events: %s\n", cmd);
  623. argv = argv_split(cmd, &argc);
  624. if (!argv) {
  625. pr_debug("Failed to split arguments.\n");
  626. return -ENOMEM;
  627. }
  628. if (argc < 2) {
  629. semantic_error("Too few probe arguments.\n");
  630. ret = -ERANGE;
  631. goto out;
  632. }
  633. /* Scan event and group name. */
  634. ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
  635. &pr, (float *)(void *)&tev->group,
  636. (float *)(void *)&tev->event);
  637. if (ret != 3) {
  638. semantic_error("Failed to parse event name: %s\n", argv[0]);
  639. ret = -EINVAL;
  640. goto out;
  641. }
  642. pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
  643. tp->retprobe = (pr == 'r');
  644. /* Scan function name and offset */
  645. ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
  646. &tp->offset);
  647. if (ret == 1)
  648. tp->offset = 0;
  649. tev->nargs = argc - 2;
  650. tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
  651. if (tev->args == NULL) {
  652. ret = -ENOMEM;
  653. goto out;
  654. }
  655. for (i = 0; i < tev->nargs; i++) {
  656. p = strchr(argv[i + 2], '=');
  657. if (p) /* We don't need which register is assigned. */
  658. *p++ = '\0';
  659. else
  660. p = argv[i + 2];
  661. tev->args[i].name = strdup(argv[i + 2]);
  662. /* TODO: parse regs and offset */
  663. tev->args[i].value = strdup(p);
  664. if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
  665. ret = -ENOMEM;
  666. goto out;
  667. }
  668. }
  669. ret = 0;
  670. out:
  671. argv_free(argv);
  672. return ret;
  673. }
  674. /* Compose only probe arg */
  675. int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
  676. {
  677. struct perf_probe_arg_field *field = pa->field;
  678. int ret;
  679. char *tmp = buf;
  680. if (pa->name && pa->var)
  681. ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
  682. else
  683. ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
  684. if (ret <= 0)
  685. goto error;
  686. tmp += ret;
  687. len -= ret;
  688. while (field) {
  689. ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
  690. field->name);
  691. if (ret <= 0)
  692. goto error;
  693. tmp += ret;
  694. len -= ret;
  695. field = field->next;
  696. }
  697. if (pa->type) {
  698. ret = e_snprintf(tmp, len, ":%s", pa->type);
  699. if (ret <= 0)
  700. goto error;
  701. tmp += ret;
  702. len -= ret;
  703. }
  704. return tmp - buf;
  705. error:
  706. pr_debug("Failed to synthesize perf probe argument: %s",
  707. strerror(-ret));
  708. return ret;
  709. }
  710. /* Compose only probe point (not argument) */
  711. static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
  712. {
  713. char *buf, *tmp;
  714. char offs[32] = "", line[32] = "", file[32] = "";
  715. int ret, len;
  716. buf = zalloc(MAX_CMDLEN);
  717. if (buf == NULL) {
  718. ret = -ENOMEM;
  719. goto error;
  720. }
  721. if (pp->offset) {
  722. ret = e_snprintf(offs, 32, "+%lu", pp->offset);
  723. if (ret <= 0)
  724. goto error;
  725. }
  726. if (pp->line) {
  727. ret = e_snprintf(line, 32, ":%d", pp->line);
  728. if (ret <= 0)
  729. goto error;
  730. }
  731. if (pp->file) {
  732. len = strlen(pp->file) - 31;
  733. if (len < 0)
  734. len = 0;
  735. tmp = strchr(pp->file + len, '/');
  736. if (!tmp)
  737. tmp = pp->file + len;
  738. ret = e_snprintf(file, 32, "@%s", tmp + 1);
  739. if (ret <= 0)
  740. goto error;
  741. }
  742. if (pp->function)
  743. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
  744. offs, pp->retprobe ? "%return" : "", line,
  745. file);
  746. else
  747. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
  748. if (ret <= 0)
  749. goto error;
  750. return buf;
  751. error:
  752. pr_debug("Failed to synthesize perf probe point: %s",
  753. strerror(-ret));
  754. if (buf)
  755. free(buf);
  756. return NULL;
  757. }
  758. #if 0
  759. char *synthesize_perf_probe_command(struct perf_probe_event *pev)
  760. {
  761. char *buf;
  762. int i, len, ret;
  763. buf = synthesize_perf_probe_point(&pev->point);
  764. if (!buf)
  765. return NULL;
  766. len = strlen(buf);
  767. for (i = 0; i < pev->nargs; i++) {
  768. ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
  769. pev->args[i].name);
  770. if (ret <= 0) {
  771. free(buf);
  772. return NULL;
  773. }
  774. len += ret;
  775. }
  776. return buf;
  777. }
  778. #endif
  779. static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
  780. char **buf, size_t *buflen,
  781. int depth)
  782. {
  783. int ret;
  784. if (ref->next) {
  785. depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
  786. buflen, depth + 1);
  787. if (depth < 0)
  788. goto out;
  789. }
  790. ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
  791. if (ret < 0)
  792. depth = ret;
  793. else {
  794. *buf += ret;
  795. *buflen -= ret;
  796. }
  797. out:
  798. return depth;
  799. }
  800. static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
  801. char *buf, size_t buflen)
  802. {
  803. int ret, depth = 0;
  804. char *tmp = buf;
  805. /* Argument name or separator */
  806. if (arg->name)
  807. ret = e_snprintf(buf, buflen, " %s=", arg->name);
  808. else
  809. ret = e_snprintf(buf, buflen, " ");
  810. if (ret < 0)
  811. return ret;
  812. buf += ret;
  813. buflen -= ret;
  814. /* Dereferencing arguments */
  815. if (arg->ref) {
  816. depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
  817. &buflen, 1);
  818. if (depth < 0)
  819. return depth;
  820. }
  821. /* Print argument value */
  822. ret = e_snprintf(buf, buflen, "%s", arg->value);
  823. if (ret < 0)
  824. return ret;
  825. buf += ret;
  826. buflen -= ret;
  827. /* Closing */
  828. while (depth--) {
  829. ret = e_snprintf(buf, buflen, ")");
  830. if (ret < 0)
  831. return ret;
  832. buf += ret;
  833. buflen -= ret;
  834. }
  835. /* Print argument type */
  836. if (arg->type) {
  837. ret = e_snprintf(buf, buflen, ":%s", arg->type);
  838. if (ret <= 0)
  839. return ret;
  840. buf += ret;
  841. }
  842. return buf - tmp;
  843. }
  844. char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
  845. {
  846. struct kprobe_trace_point *tp = &tev->point;
  847. char *buf;
  848. int i, len, ret;
  849. buf = zalloc(MAX_CMDLEN);
  850. if (buf == NULL)
  851. return NULL;
  852. len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
  853. tp->retprobe ? 'r' : 'p',
  854. tev->group, tev->event,
  855. tp->symbol, tp->offset);
  856. if (len <= 0)
  857. goto error;
  858. for (i = 0; i < tev->nargs; i++) {
  859. ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
  860. MAX_CMDLEN - len);
  861. if (ret <= 0)
  862. goto error;
  863. len += ret;
  864. }
  865. return buf;
  866. error:
  867. free(buf);
  868. return NULL;
  869. }
  870. int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
  871. struct perf_probe_event *pev)
  872. {
  873. char buf[64] = "";
  874. int i, ret;
  875. /* Convert event/group name */
  876. pev->event = strdup(tev->event);
  877. pev->group = strdup(tev->group);
  878. if (pev->event == NULL || pev->group == NULL)
  879. return -ENOMEM;
  880. /* Convert trace_point to probe_point */
  881. ret = convert_to_perf_probe_point(&tev->point, &pev->point);
  882. if (ret < 0)
  883. return ret;
  884. /* Convert trace_arg to probe_arg */
  885. pev->nargs = tev->nargs;
  886. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  887. if (pev->args == NULL)
  888. return -ENOMEM;
  889. for (i = 0; i < tev->nargs && ret >= 0; i++) {
  890. if (tev->args[i].name)
  891. pev->args[i].name = strdup(tev->args[i].name);
  892. else {
  893. ret = synthesize_kprobe_trace_arg(&tev->args[i],
  894. buf, 64);
  895. pev->args[i].name = strdup(buf);
  896. }
  897. if (pev->args[i].name == NULL && ret >= 0)
  898. ret = -ENOMEM;
  899. }
  900. if (ret < 0)
  901. clear_perf_probe_event(pev);
  902. return ret;
  903. }
  904. void clear_perf_probe_event(struct perf_probe_event *pev)
  905. {
  906. struct perf_probe_point *pp = &pev->point;
  907. struct perf_probe_arg_field *field, *next;
  908. int i;
  909. if (pev->event)
  910. free(pev->event);
  911. if (pev->group)
  912. free(pev->group);
  913. if (pp->file)
  914. free(pp->file);
  915. if (pp->function)
  916. free(pp->function);
  917. if (pp->lazy_line)
  918. free(pp->lazy_line);
  919. for (i = 0; i < pev->nargs; i++) {
  920. if (pev->args[i].name)
  921. free(pev->args[i].name);
  922. if (pev->args[i].var)
  923. free(pev->args[i].var);
  924. if (pev->args[i].type)
  925. free(pev->args[i].type);
  926. field = pev->args[i].field;
  927. while (field) {
  928. next = field->next;
  929. if (field->name)
  930. free(field->name);
  931. free(field);
  932. field = next;
  933. }
  934. }
  935. if (pev->args)
  936. free(pev->args);
  937. memset(pev, 0, sizeof(*pev));
  938. }
  939. void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
  940. {
  941. struct kprobe_trace_arg_ref *ref, *next;
  942. int i;
  943. if (tev->event)
  944. free(tev->event);
  945. if (tev->group)
  946. free(tev->group);
  947. if (tev->point.symbol)
  948. free(tev->point.symbol);
  949. for (i = 0; i < tev->nargs; i++) {
  950. if (tev->args[i].name)
  951. free(tev->args[i].name);
  952. if (tev->args[i].value)
  953. free(tev->args[i].value);
  954. if (tev->args[i].type)
  955. free(tev->args[i].type);
  956. ref = tev->args[i].ref;
  957. while (ref) {
  958. next = ref->next;
  959. free(ref);
  960. ref = next;
  961. }
  962. }
  963. if (tev->args)
  964. free(tev->args);
  965. memset(tev, 0, sizeof(*tev));
  966. }
  967. static int open_kprobe_events(bool readwrite)
  968. {
  969. char buf[PATH_MAX];
  970. const char *__debugfs;
  971. int ret;
  972. __debugfs = debugfs_find_mountpoint();
  973. if (__debugfs == NULL) {
  974. pr_warning("Debugfs is not mounted.\n");
  975. return -ENOENT;
  976. }
  977. ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
  978. if (ret >= 0) {
  979. pr_debug("Opening %s write=%d\n", buf, readwrite);
  980. if (readwrite && !probe_event_dry_run)
  981. ret = open(buf, O_RDWR, O_APPEND);
  982. else
  983. ret = open(buf, O_RDONLY, 0);
  984. }
  985. if (ret < 0) {
  986. if (errno == ENOENT)
  987. pr_warning("kprobe_events file does not exist - please"
  988. " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
  989. else
  990. pr_warning("Failed to open kprobe_events file: %s\n",
  991. strerror(errno));
  992. }
  993. return ret;
  994. }
  995. /* Get raw string list of current kprobe_events */
  996. static struct strlist *get_kprobe_trace_command_rawlist(int fd)
  997. {
  998. int ret, idx;
  999. FILE *fp;
  1000. char buf[MAX_CMDLEN];
  1001. char *p;
  1002. struct strlist *sl;
  1003. sl = strlist__new(true, NULL);
  1004. fp = fdopen(dup(fd), "r");
  1005. while (!feof(fp)) {
  1006. p = fgets(buf, MAX_CMDLEN, fp);
  1007. if (!p)
  1008. break;
  1009. idx = strlen(p) - 1;
  1010. if (p[idx] == '\n')
  1011. p[idx] = '\0';
  1012. ret = strlist__add(sl, buf);
  1013. if (ret < 0) {
  1014. pr_debug("strlist__add failed: %s\n", strerror(-ret));
  1015. strlist__delete(sl);
  1016. return NULL;
  1017. }
  1018. }
  1019. fclose(fp);
  1020. return sl;
  1021. }
  1022. /* Show an event */
  1023. static int show_perf_probe_event(struct perf_probe_event *pev)
  1024. {
  1025. int i, ret;
  1026. char buf[128];
  1027. char *place;
  1028. /* Synthesize only event probe point */
  1029. place = synthesize_perf_probe_point(&pev->point);
  1030. if (!place)
  1031. return -EINVAL;
  1032. ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
  1033. if (ret < 0)
  1034. return ret;
  1035. printf(" %-20s (on %s", buf, place);
  1036. if (pev->nargs > 0) {
  1037. printf(" with");
  1038. for (i = 0; i < pev->nargs; i++) {
  1039. ret = synthesize_perf_probe_arg(&pev->args[i],
  1040. buf, 128);
  1041. if (ret < 0)
  1042. break;
  1043. printf(" %s", buf);
  1044. }
  1045. }
  1046. printf(")\n");
  1047. free(place);
  1048. return ret;
  1049. }
  1050. /* List up current perf-probe events */
  1051. int show_perf_probe_events(void)
  1052. {
  1053. int fd, ret;
  1054. struct kprobe_trace_event tev;
  1055. struct perf_probe_event pev;
  1056. struct strlist *rawlist;
  1057. struct str_node *ent;
  1058. setup_pager();
  1059. ret = init_vmlinux();
  1060. if (ret < 0)
  1061. return ret;
  1062. memset(&tev, 0, sizeof(tev));
  1063. memset(&pev, 0, sizeof(pev));
  1064. fd = open_kprobe_events(false);
  1065. if (fd < 0)
  1066. return fd;
  1067. rawlist = get_kprobe_trace_command_rawlist(fd);
  1068. close(fd);
  1069. if (!rawlist)
  1070. return -ENOENT;
  1071. strlist__for_each(ent, rawlist) {
  1072. ret = parse_kprobe_trace_command(ent->s, &tev);
  1073. if (ret >= 0) {
  1074. ret = convert_to_perf_probe_event(&tev, &pev);
  1075. if (ret >= 0)
  1076. ret = show_perf_probe_event(&pev);
  1077. }
  1078. clear_perf_probe_event(&pev);
  1079. clear_kprobe_trace_event(&tev);
  1080. if (ret < 0)
  1081. break;
  1082. }
  1083. strlist__delete(rawlist);
  1084. return ret;
  1085. }
  1086. /* Get current perf-probe event names */
  1087. static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
  1088. {
  1089. char buf[128];
  1090. struct strlist *sl, *rawlist;
  1091. struct str_node *ent;
  1092. struct kprobe_trace_event tev;
  1093. int ret = 0;
  1094. memset(&tev, 0, sizeof(tev));
  1095. rawlist = get_kprobe_trace_command_rawlist(fd);
  1096. sl = strlist__new(true, NULL);
  1097. strlist__for_each(ent, rawlist) {
  1098. ret = parse_kprobe_trace_command(ent->s, &tev);
  1099. if (ret < 0)
  1100. break;
  1101. if (include_group) {
  1102. ret = e_snprintf(buf, 128, "%s:%s", tev.group,
  1103. tev.event);
  1104. if (ret >= 0)
  1105. ret = strlist__add(sl, buf);
  1106. } else
  1107. ret = strlist__add(sl, tev.event);
  1108. clear_kprobe_trace_event(&tev);
  1109. if (ret < 0)
  1110. break;
  1111. }
  1112. strlist__delete(rawlist);
  1113. if (ret < 0) {
  1114. strlist__delete(sl);
  1115. return NULL;
  1116. }
  1117. return sl;
  1118. }
  1119. static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
  1120. {
  1121. int ret = 0;
  1122. char *buf = synthesize_kprobe_trace_command(tev);
  1123. if (!buf) {
  1124. pr_debug("Failed to synthesize kprobe trace event.\n");
  1125. return -EINVAL;
  1126. }
  1127. pr_debug("Writing event: %s\n", buf);
  1128. if (!probe_event_dry_run) {
  1129. ret = write(fd, buf, strlen(buf));
  1130. if (ret <= 0)
  1131. pr_warning("Failed to write event: %s\n",
  1132. strerror(errno));
  1133. }
  1134. free(buf);
  1135. return ret;
  1136. }
  1137. static int get_new_event_name(char *buf, size_t len, const char *base,
  1138. struct strlist *namelist, bool allow_suffix)
  1139. {
  1140. int i, ret;
  1141. /* Try no suffix */
  1142. ret = e_snprintf(buf, len, "%s", base);
  1143. if (ret < 0) {
  1144. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1145. return ret;
  1146. }
  1147. if (!strlist__has_entry(namelist, buf))
  1148. return 0;
  1149. if (!allow_suffix) {
  1150. pr_warning("Error: event \"%s\" already exists. "
  1151. "(Use -f to force duplicates.)\n", base);
  1152. return -EEXIST;
  1153. }
  1154. /* Try to add suffix */
  1155. for (i = 1; i < MAX_EVENT_INDEX; i++) {
  1156. ret = e_snprintf(buf, len, "%s_%d", base, i);
  1157. if (ret < 0) {
  1158. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1159. return ret;
  1160. }
  1161. if (!strlist__has_entry(namelist, buf))
  1162. break;
  1163. }
  1164. if (i == MAX_EVENT_INDEX) {
  1165. pr_warning("Too many events are on the same function.\n");
  1166. ret = -ERANGE;
  1167. }
  1168. return ret;
  1169. }
  1170. static int __add_kprobe_trace_events(struct perf_probe_event *pev,
  1171. struct kprobe_trace_event *tevs,
  1172. int ntevs, bool allow_suffix)
  1173. {
  1174. int i, fd, ret;
  1175. struct kprobe_trace_event *tev = NULL;
  1176. char buf[64];
  1177. const char *event, *group;
  1178. struct strlist *namelist;
  1179. fd = open_kprobe_events(true);
  1180. if (fd < 0)
  1181. return fd;
  1182. /* Get current event names */
  1183. namelist = get_kprobe_trace_event_names(fd, false);
  1184. if (!namelist) {
  1185. pr_debug("Failed to get current event list.\n");
  1186. return -EIO;
  1187. }
  1188. ret = 0;
  1189. printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
  1190. for (i = 0; i < ntevs; i++) {
  1191. tev = &tevs[i];
  1192. if (pev->event)
  1193. event = pev->event;
  1194. else
  1195. if (pev->point.function)
  1196. event = pev->point.function;
  1197. else
  1198. event = tev->point.symbol;
  1199. if (pev->group)
  1200. group = pev->group;
  1201. else
  1202. group = PERFPROBE_GROUP;
  1203. /* Get an unused new event name */
  1204. ret = get_new_event_name(buf, 64, event,
  1205. namelist, allow_suffix);
  1206. if (ret < 0)
  1207. break;
  1208. event = buf;
  1209. tev->event = strdup(event);
  1210. tev->group = strdup(group);
  1211. if (tev->event == NULL || tev->group == NULL) {
  1212. ret = -ENOMEM;
  1213. break;
  1214. }
  1215. ret = write_kprobe_trace_event(fd, tev);
  1216. if (ret < 0)
  1217. break;
  1218. /* Add added event name to namelist */
  1219. strlist__add(namelist, event);
  1220. /* Trick here - save current event/group */
  1221. event = pev->event;
  1222. group = pev->group;
  1223. pev->event = tev->event;
  1224. pev->group = tev->group;
  1225. show_perf_probe_event(pev);
  1226. /* Trick here - restore current event/group */
  1227. pev->event = (char *)event;
  1228. pev->group = (char *)group;
  1229. /*
  1230. * Probes after the first probe which comes from same
  1231. * user input are always allowed to add suffix, because
  1232. * there might be several addresses corresponding to
  1233. * one code line.
  1234. */
  1235. allow_suffix = true;
  1236. }
  1237. if (ret >= 0) {
  1238. /* Show how to use the event. */
  1239. printf("\nYou can now use it on all perf tools, such as:\n\n");
  1240. printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
  1241. tev->event);
  1242. }
  1243. strlist__delete(namelist);
  1244. close(fd);
  1245. return ret;
  1246. }
  1247. static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
  1248. struct kprobe_trace_event **tevs,
  1249. int max_tevs)
  1250. {
  1251. struct symbol *sym;
  1252. int ret = 0, i;
  1253. struct kprobe_trace_event *tev;
  1254. /* Convert perf_probe_event with debuginfo */
  1255. ret = try_to_find_kprobe_trace_events(pev, tevs, max_tevs);
  1256. if (ret != 0)
  1257. return ret;
  1258. /* Allocate trace event buffer */
  1259. tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
  1260. if (tev == NULL)
  1261. return -ENOMEM;
  1262. /* Copy parameters */
  1263. tev->point.symbol = strdup(pev->point.function);
  1264. if (tev->point.symbol == NULL) {
  1265. ret = -ENOMEM;
  1266. goto error;
  1267. }
  1268. tev->point.offset = pev->point.offset;
  1269. tev->nargs = pev->nargs;
  1270. if (tev->nargs) {
  1271. tev->args = zalloc(sizeof(struct kprobe_trace_arg)
  1272. * tev->nargs);
  1273. if (tev->args == NULL) {
  1274. ret = -ENOMEM;
  1275. goto error;
  1276. }
  1277. for (i = 0; i < tev->nargs; i++) {
  1278. if (pev->args[i].name) {
  1279. tev->args[i].name = strdup(pev->args[i].name);
  1280. if (tev->args[i].name == NULL) {
  1281. ret = -ENOMEM;
  1282. goto error;
  1283. }
  1284. }
  1285. tev->args[i].value = strdup(pev->args[i].var);
  1286. if (tev->args[i].value == NULL) {
  1287. ret = -ENOMEM;
  1288. goto error;
  1289. }
  1290. if (pev->args[i].type) {
  1291. tev->args[i].type = strdup(pev->args[i].type);
  1292. if (tev->args[i].type == NULL) {
  1293. ret = -ENOMEM;
  1294. goto error;
  1295. }
  1296. }
  1297. }
  1298. }
  1299. /* Currently just checking function name from symbol map */
  1300. sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
  1301. tev->point.symbol, NULL);
  1302. if (!sym) {
  1303. pr_warning("Kernel symbol \'%s\' not found.\n",
  1304. tev->point.symbol);
  1305. ret = -ENOENT;
  1306. goto error;
  1307. }
  1308. return 1;
  1309. error:
  1310. clear_kprobe_trace_event(tev);
  1311. free(tev);
  1312. *tevs = NULL;
  1313. return ret;
  1314. }
  1315. struct __event_package {
  1316. struct perf_probe_event *pev;
  1317. struct kprobe_trace_event *tevs;
  1318. int ntevs;
  1319. };
  1320. int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
  1321. bool force_add, int max_tevs)
  1322. {
  1323. int i, j, ret;
  1324. struct __event_package *pkgs;
  1325. pkgs = zalloc(sizeof(struct __event_package) * npevs);
  1326. if (pkgs == NULL)
  1327. return -ENOMEM;
  1328. /* Init vmlinux path */
  1329. ret = init_vmlinux();
  1330. if (ret < 0)
  1331. return ret;
  1332. /* Loop 1: convert all events */
  1333. for (i = 0; i < npevs; i++) {
  1334. pkgs[i].pev = &pevs[i];
  1335. /* Convert with or without debuginfo */
  1336. ret = convert_to_kprobe_trace_events(pkgs[i].pev,
  1337. &pkgs[i].tevs, max_tevs);
  1338. if (ret < 0)
  1339. goto end;
  1340. pkgs[i].ntevs = ret;
  1341. }
  1342. /* Loop 2: add all events */
  1343. for (i = 0; i < npevs && ret >= 0; i++)
  1344. ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
  1345. pkgs[i].ntevs, force_add);
  1346. end:
  1347. /* Loop 3: cleanup trace events */
  1348. for (i = 0; i < npevs; i++)
  1349. for (j = 0; j < pkgs[i].ntevs; j++)
  1350. clear_kprobe_trace_event(&pkgs[i].tevs[j]);
  1351. return ret;
  1352. }
  1353. static int __del_trace_kprobe_event(int fd, struct str_node *ent)
  1354. {
  1355. char *p;
  1356. char buf[128];
  1357. int ret;
  1358. /* Convert from perf-probe event to trace-kprobe event */
  1359. ret = e_snprintf(buf, 128, "-:%s", ent->s);
  1360. if (ret < 0)
  1361. goto error;
  1362. p = strchr(buf + 2, ':');
  1363. if (!p) {
  1364. pr_debug("Internal error: %s should have ':' but not.\n",
  1365. ent->s);
  1366. ret = -ENOTSUP;
  1367. goto error;
  1368. }
  1369. *p = '/';
  1370. pr_debug("Writing event: %s\n", buf);
  1371. ret = write(fd, buf, strlen(buf));
  1372. if (ret < 0)
  1373. goto error;
  1374. printf("Remove event: %s\n", ent->s);
  1375. return 0;
  1376. error:
  1377. pr_warning("Failed to delete event: %s\n", strerror(-ret));
  1378. return ret;
  1379. }
  1380. static int del_trace_kprobe_event(int fd, const char *group,
  1381. const char *event, struct strlist *namelist)
  1382. {
  1383. char buf[128];
  1384. struct str_node *ent, *n;
  1385. int found = 0, ret = 0;
  1386. ret = e_snprintf(buf, 128, "%s:%s", group, event);
  1387. if (ret < 0) {
  1388. pr_err("Failed to copy event.");
  1389. return ret;
  1390. }
  1391. if (strpbrk(buf, "*?")) { /* Glob-exp */
  1392. strlist__for_each_safe(ent, n, namelist)
  1393. if (strglobmatch(ent->s, buf)) {
  1394. found++;
  1395. ret = __del_trace_kprobe_event(fd, ent);
  1396. if (ret < 0)
  1397. break;
  1398. strlist__remove(namelist, ent);
  1399. }
  1400. } else {
  1401. ent = strlist__find(namelist, buf);
  1402. if (ent) {
  1403. found++;
  1404. ret = __del_trace_kprobe_event(fd, ent);
  1405. if (ret >= 0)
  1406. strlist__remove(namelist, ent);
  1407. }
  1408. }
  1409. if (found == 0 && ret >= 0)
  1410. pr_info("Info: Event \"%s\" does not exist.\n", buf);
  1411. return ret;
  1412. }
  1413. int del_perf_probe_events(struct strlist *dellist)
  1414. {
  1415. int fd, ret = 0;
  1416. const char *group, *event;
  1417. char *p, *str;
  1418. struct str_node *ent;
  1419. struct strlist *namelist;
  1420. fd = open_kprobe_events(true);
  1421. if (fd < 0)
  1422. return fd;
  1423. /* Get current event names */
  1424. namelist = get_kprobe_trace_event_names(fd, true);
  1425. if (namelist == NULL)
  1426. return -EINVAL;
  1427. strlist__for_each(ent, dellist) {
  1428. str = strdup(ent->s);
  1429. if (str == NULL) {
  1430. ret = -ENOMEM;
  1431. break;
  1432. }
  1433. pr_debug("Parsing: %s\n", str);
  1434. p = strchr(str, ':');
  1435. if (p) {
  1436. group = str;
  1437. *p = '\0';
  1438. event = p + 1;
  1439. } else {
  1440. group = "*";
  1441. event = str;
  1442. }
  1443. pr_debug("Group: %s, Event: %s\n", group, event);
  1444. ret = del_trace_kprobe_event(fd, group, event, namelist);
  1445. free(str);
  1446. if (ret < 0)
  1447. break;
  1448. }
  1449. strlist__delete(namelist);
  1450. close(fd);
  1451. return ret;
  1452. }