probe-event.c 36 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646
  1. /*
  2. * probe-event.c : perf-probe definition to kprobe_events format converter
  3. *
  4. * Written by Masami Hiramatsu <mhiramat@redhat.com>
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  19. *
  20. */
  21. #define _GNU_SOURCE
  22. #include <sys/utsname.h>
  23. #include <sys/types.h>
  24. #include <sys/stat.h>
  25. #include <fcntl.h>
  26. #include <errno.h>
  27. #include <stdio.h>
  28. #include <unistd.h>
  29. #include <stdlib.h>
  30. #include <string.h>
  31. #include <stdarg.h>
  32. #include <limits.h>
  33. #undef _GNU_SOURCE
  34. #include "util.h"
  35. #include "event.h"
  36. #include "string.h"
  37. #include "strlist.h"
  38. #include "debug.h"
  39. #include "cache.h"
  40. #include "color.h"
  41. #include "symbol.h"
  42. #include "thread.h"
  43. #include "debugfs.h"
  44. #include "trace-event.h" /* For __unused */
  45. #include "probe-event.h"
  46. #include "probe-finder.h"
  47. #define MAX_CMDLEN 256
  48. #define MAX_PROBE_ARGS 128
  49. #define PERFPROBE_GROUP "probe"
  50. bool probe_event_dry_run; /* Dry run flag */
  51. #define semantic_error(msg ...) pr_err("Semantic error :" msg)
  52. /* If there is no space to write, returns -E2BIG. */
  53. static int e_snprintf(char *str, size_t size, const char *format, ...)
  54. __attribute__((format(printf, 3, 4)));
  55. static int e_snprintf(char *str, size_t size, const char *format, ...)
  56. {
  57. int ret;
  58. va_list ap;
  59. va_start(ap, format);
  60. ret = vsnprintf(str, size, format, ap);
  61. va_end(ap);
  62. if (ret >= (int)size)
  63. ret = -E2BIG;
  64. return ret;
  65. }
  66. static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
  67. static struct machine machine;
  68. /* Initialize symbol maps and path of vmlinux */
  69. static int init_vmlinux(void)
  70. {
  71. struct dso *kernel;
  72. int ret;
  73. symbol_conf.sort_by_name = true;
  74. if (symbol_conf.vmlinux_name == NULL)
  75. symbol_conf.try_vmlinux_path = true;
  76. else
  77. pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
  78. ret = symbol__init();
  79. if (ret < 0) {
  80. pr_debug("Failed to init symbol map.\n");
  81. goto out;
  82. }
  83. ret = machine__init(&machine, "/", 0);
  84. if (ret < 0)
  85. goto out;
  86. kernel = dso__new_kernel(symbol_conf.vmlinux_name);
  87. if (kernel == NULL)
  88. die("Failed to create kernel dso.");
  89. ret = __machine__create_kernel_maps(&machine, kernel);
  90. if (ret < 0)
  91. pr_debug("Failed to create kernel maps.\n");
  92. out:
  93. if (ret < 0)
  94. pr_warning("Failed to init vmlinux path.\n");
  95. return ret;
  96. }
  97. #ifdef DWARF_SUPPORT
  98. static int open_vmlinux(void)
  99. {
  100. if (map__load(machine.vmlinux_maps[MAP__FUNCTION], NULL) < 0) {
  101. pr_debug("Failed to load kernel map.\n");
  102. return -EINVAL;
  103. }
  104. pr_debug("Try to open %s\n", machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name);
  105. return open(machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
  106. }
  107. /* Convert trace point to probe point with debuginfo */
  108. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  109. struct perf_probe_point *pp)
  110. {
  111. struct symbol *sym;
  112. int fd, ret = -ENOENT;
  113. sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
  114. tp->symbol, NULL);
  115. if (sym) {
  116. fd = open_vmlinux();
  117. if (fd >= 0) {
  118. ret = find_perf_probe_point(fd,
  119. sym->start + tp->offset, pp);
  120. close(fd);
  121. }
  122. }
  123. if (ret <= 0) {
  124. pr_debug("Failed to find corresponding probes from "
  125. "debuginfo. Use kprobe event information.\n");
  126. pp->function = strdup(tp->symbol);
  127. if (pp->function == NULL)
  128. return -ENOMEM;
  129. pp->offset = tp->offset;
  130. }
  131. pp->retprobe = tp->retprobe;
  132. return 0;
  133. }
  134. /* Try to find perf_probe_event with debuginfo */
  135. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  136. struct kprobe_trace_event **tevs,
  137. int max_tevs)
  138. {
  139. bool need_dwarf = perf_probe_event_need_dwarf(pev);
  140. int fd, ntevs;
  141. fd = open_vmlinux();
  142. if (fd < 0) {
  143. if (need_dwarf) {
  144. pr_warning("Failed to open debuginfo file.\n");
  145. return fd;
  146. }
  147. pr_debug("Could not open vmlinux. Try to use symbols.\n");
  148. return 0;
  149. }
  150. /* Searching trace events corresponding to probe event */
  151. ntevs = find_kprobe_trace_events(fd, pev, tevs, max_tevs);
  152. close(fd);
  153. if (ntevs > 0) { /* Succeeded to find trace events */
  154. pr_debug("find %d kprobe_trace_events.\n", ntevs);
  155. return ntevs;
  156. }
  157. if (ntevs == 0) { /* No error but failed to find probe point. */
  158. pr_warning("Probe point '%s' not found.\n",
  159. synthesize_perf_probe_point(&pev->point));
  160. return -ENOENT;
  161. }
  162. /* Error path : ntevs < 0 */
  163. pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
  164. if (ntevs == -EBADF) {
  165. pr_warning("Warning: No dwarf info found in the vmlinux - "
  166. "please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
  167. if (!need_dwarf) {
  168. pr_debug("Trying to use symbols.\nn");
  169. return 0;
  170. }
  171. }
  172. return ntevs;
  173. }
  174. #define LINEBUF_SIZE 256
  175. #define NR_ADDITIONAL_LINES 2
  176. static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
  177. {
  178. char buf[LINEBUF_SIZE];
  179. const char *color = PERF_COLOR_BLUE;
  180. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  181. goto error;
  182. if (!skip) {
  183. if (show_num)
  184. fprintf(stdout, "%7d %s", l, buf);
  185. else
  186. color_fprintf(stdout, color, " %s", buf);
  187. }
  188. while (strlen(buf) == LINEBUF_SIZE - 1 &&
  189. buf[LINEBUF_SIZE - 2] != '\n') {
  190. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  191. goto error;
  192. if (!skip) {
  193. if (show_num)
  194. fprintf(stdout, "%s", buf);
  195. else
  196. color_fprintf(stdout, color, "%s", buf);
  197. }
  198. }
  199. return 0;
  200. error:
  201. if (feof(fp))
  202. pr_warning("Source file is shorter than expected.\n");
  203. else
  204. pr_warning("File read error: %s\n", strerror(errno));
  205. return -1;
  206. }
  207. /*
  208. * Show line-range always requires debuginfo to find source file and
  209. * line number.
  210. */
  211. int show_line_range(struct line_range *lr)
  212. {
  213. int l = 1;
  214. struct line_node *ln;
  215. FILE *fp;
  216. int fd, ret;
  217. /* Search a line range */
  218. ret = init_vmlinux();
  219. if (ret < 0)
  220. return ret;
  221. fd = open_vmlinux();
  222. if (fd < 0) {
  223. pr_warning("Failed to open debuginfo file.\n");
  224. return fd;
  225. }
  226. ret = find_line_range(fd, lr);
  227. close(fd);
  228. if (ret == 0) {
  229. pr_warning("Specified source line is not found.\n");
  230. return -ENOENT;
  231. } else if (ret < 0) {
  232. pr_warning("Debuginfo analysis failed. (%d)\n", ret);
  233. return ret;
  234. }
  235. setup_pager();
  236. if (lr->function)
  237. fprintf(stdout, "<%s:%d>\n", lr->function,
  238. lr->start - lr->offset);
  239. else
  240. fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
  241. fp = fopen(lr->path, "r");
  242. if (fp == NULL) {
  243. pr_warning("Failed to open %s: %s\n", lr->path,
  244. strerror(errno));
  245. return -errno;
  246. }
  247. /* Skip to starting line number */
  248. while (l < lr->start && ret >= 0)
  249. ret = show_one_line(fp, l++, true, false);
  250. if (ret < 0)
  251. goto end;
  252. list_for_each_entry(ln, &lr->line_list, list) {
  253. while (ln->line > l && ret >= 0)
  254. ret = show_one_line(fp, (l++) - lr->offset,
  255. false, false);
  256. if (ret >= 0)
  257. ret = show_one_line(fp, (l++) - lr->offset,
  258. false, true);
  259. if (ret < 0)
  260. goto end;
  261. }
  262. if (lr->end == INT_MAX)
  263. lr->end = l + NR_ADDITIONAL_LINES;
  264. while (l <= lr->end && !feof(fp) && ret >= 0)
  265. ret = show_one_line(fp, (l++) - lr->offset, false, false);
  266. end:
  267. fclose(fp);
  268. return ret;
  269. }
  270. #else /* !DWARF_SUPPORT */
  271. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  272. struct perf_probe_point *pp)
  273. {
  274. pp->function = strdup(tp->symbol);
  275. if (pp->function == NULL)
  276. return -ENOMEM;
  277. pp->offset = tp->offset;
  278. pp->retprobe = tp->retprobe;
  279. return 0;
  280. }
  281. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  282. struct kprobe_trace_event **tevs __unused,
  283. int max_tevs __unused)
  284. {
  285. if (perf_probe_event_need_dwarf(pev)) {
  286. pr_warning("Debuginfo-analysis is not supported.\n");
  287. return -ENOSYS;
  288. }
  289. return 0;
  290. }
  291. int show_line_range(struct line_range *lr __unused)
  292. {
  293. pr_warning("Debuginfo-analysis is not supported.\n");
  294. return -ENOSYS;
  295. }
  296. #endif
  297. int parse_line_range_desc(const char *arg, struct line_range *lr)
  298. {
  299. const char *ptr;
  300. char *tmp;
  301. /*
  302. * <Syntax>
  303. * SRC:SLN[+NUM|-ELN]
  304. * FUNC[:SLN[+NUM|-ELN]]
  305. */
  306. ptr = strchr(arg, ':');
  307. if (ptr) {
  308. lr->start = (int)strtoul(ptr + 1, &tmp, 0);
  309. if (*tmp == '+') {
  310. lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
  311. lr->end--; /*
  312. * Adjust the number of lines here.
  313. * If the number of lines == 1, the
  314. * the end of line should be equal to
  315. * the start of line.
  316. */
  317. } else if (*tmp == '-')
  318. lr->end = (int)strtoul(tmp + 1, &tmp, 0);
  319. else
  320. lr->end = INT_MAX;
  321. pr_debug("Line range is %d to %d\n", lr->start, lr->end);
  322. if (lr->start > lr->end) {
  323. semantic_error("Start line must be smaller"
  324. " than end line.\n");
  325. return -EINVAL;
  326. }
  327. if (*tmp != '\0') {
  328. semantic_error("Tailing with invalid character '%d'.\n",
  329. *tmp);
  330. return -EINVAL;
  331. }
  332. tmp = strndup(arg, (ptr - arg));
  333. } else {
  334. tmp = strdup(arg);
  335. lr->end = INT_MAX;
  336. }
  337. if (tmp == NULL)
  338. return -ENOMEM;
  339. if (strchr(tmp, '.'))
  340. lr->file = tmp;
  341. else
  342. lr->function = tmp;
  343. return 0;
  344. }
  345. /* Check the name is good for event/group */
  346. static bool check_event_name(const char *name)
  347. {
  348. if (!isalpha(*name) && *name != '_')
  349. return false;
  350. while (*++name != '\0') {
  351. if (!isalpha(*name) && !isdigit(*name) && *name != '_')
  352. return false;
  353. }
  354. return true;
  355. }
  356. /* Parse probepoint definition. */
  357. static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
  358. {
  359. struct perf_probe_point *pp = &pev->point;
  360. char *ptr, *tmp;
  361. char c, nc = 0;
  362. /*
  363. * <Syntax>
  364. * perf probe [EVENT=]SRC[:LN|;PTN]
  365. * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
  366. *
  367. * TODO:Group name support
  368. */
  369. ptr = strpbrk(arg, ";=@+%");
  370. if (ptr && *ptr == '=') { /* Event name */
  371. *ptr = '\0';
  372. tmp = ptr + 1;
  373. if (strchr(arg, ':')) {
  374. semantic_error("Group name is not supported yet.\n");
  375. return -ENOTSUP;
  376. }
  377. if (!check_event_name(arg)) {
  378. semantic_error("%s is bad for event name -it must "
  379. "follow C symbol-naming rule.\n", arg);
  380. return -EINVAL;
  381. }
  382. pev->event = strdup(arg);
  383. if (pev->event == NULL)
  384. return -ENOMEM;
  385. pev->group = NULL;
  386. arg = tmp;
  387. }
  388. ptr = strpbrk(arg, ";:+@%");
  389. if (ptr) {
  390. nc = *ptr;
  391. *ptr++ = '\0';
  392. }
  393. tmp = strdup(arg);
  394. if (tmp == NULL)
  395. return -ENOMEM;
  396. /* Check arg is function or file and copy it */
  397. if (strchr(tmp, '.')) /* File */
  398. pp->file = tmp;
  399. else /* Function */
  400. pp->function = tmp;
  401. /* Parse other options */
  402. while (ptr) {
  403. arg = ptr;
  404. c = nc;
  405. if (c == ';') { /* Lazy pattern must be the last part */
  406. pp->lazy_line = strdup(arg);
  407. if (pp->lazy_line == NULL)
  408. return -ENOMEM;
  409. break;
  410. }
  411. ptr = strpbrk(arg, ";:+@%");
  412. if (ptr) {
  413. nc = *ptr;
  414. *ptr++ = '\0';
  415. }
  416. switch (c) {
  417. case ':': /* Line number */
  418. pp->line = strtoul(arg, &tmp, 0);
  419. if (*tmp != '\0') {
  420. semantic_error("There is non-digit char"
  421. " in line number.\n");
  422. return -EINVAL;
  423. }
  424. break;
  425. case '+': /* Byte offset from a symbol */
  426. pp->offset = strtoul(arg, &tmp, 0);
  427. if (*tmp != '\0') {
  428. semantic_error("There is non-digit character"
  429. " in offset.\n");
  430. return -EINVAL;
  431. }
  432. break;
  433. case '@': /* File name */
  434. if (pp->file) {
  435. semantic_error("SRC@SRC is not allowed.\n");
  436. return -EINVAL;
  437. }
  438. pp->file = strdup(arg);
  439. if (pp->file == NULL)
  440. return -ENOMEM;
  441. break;
  442. case '%': /* Probe places */
  443. if (strcmp(arg, "return") == 0) {
  444. pp->retprobe = 1;
  445. } else { /* Others not supported yet */
  446. semantic_error("%%%s is not supported.\n", arg);
  447. return -ENOTSUP;
  448. }
  449. break;
  450. default: /* Buggy case */
  451. pr_err("This program has a bug at %s:%d.\n",
  452. __FILE__, __LINE__);
  453. return -ENOTSUP;
  454. break;
  455. }
  456. }
  457. /* Exclusion check */
  458. if (pp->lazy_line && pp->line) {
  459. semantic_error("Lazy pattern can't be used with line number.");
  460. return -EINVAL;
  461. }
  462. if (pp->lazy_line && pp->offset) {
  463. semantic_error("Lazy pattern can't be used with offset.");
  464. return -EINVAL;
  465. }
  466. if (pp->line && pp->offset) {
  467. semantic_error("Offset can't be used with line number.");
  468. return -EINVAL;
  469. }
  470. if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
  471. semantic_error("File always requires line number or "
  472. "lazy pattern.");
  473. return -EINVAL;
  474. }
  475. if (pp->offset && !pp->function) {
  476. semantic_error("Offset requires an entry function.");
  477. return -EINVAL;
  478. }
  479. if (pp->retprobe && !pp->function) {
  480. semantic_error("Return probe requires an entry function.");
  481. return -EINVAL;
  482. }
  483. if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
  484. semantic_error("Offset/Line/Lazy pattern can't be used with "
  485. "return probe.");
  486. return -EINVAL;
  487. }
  488. pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
  489. pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
  490. pp->lazy_line);
  491. return 0;
  492. }
  493. /* Parse perf-probe event argument */
  494. static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
  495. {
  496. char *tmp;
  497. struct perf_probe_arg_field **fieldp;
  498. pr_debug("parsing arg: %s into ", str);
  499. tmp = strchr(str, '=');
  500. if (tmp) {
  501. arg->name = strndup(str, tmp - str);
  502. if (arg->name == NULL)
  503. return -ENOMEM;
  504. pr_debug("name:%s ", arg->name);
  505. str = tmp + 1;
  506. }
  507. tmp = strchr(str, ':');
  508. if (tmp) { /* Type setting */
  509. *tmp = '\0';
  510. arg->type = strdup(tmp + 1);
  511. if (arg->type == NULL)
  512. return -ENOMEM;
  513. pr_debug("type:%s ", arg->type);
  514. }
  515. tmp = strpbrk(str, "-.");
  516. if (!is_c_varname(str) || !tmp) {
  517. /* A variable, register, symbol or special value */
  518. arg->var = strdup(str);
  519. if (arg->var == NULL)
  520. return -ENOMEM;
  521. pr_debug("%s\n", arg->var);
  522. return 0;
  523. }
  524. /* Structure fields */
  525. arg->var = strndup(str, tmp - str);
  526. if (arg->var == NULL)
  527. return -ENOMEM;
  528. pr_debug("%s, ", arg->var);
  529. fieldp = &arg->field;
  530. do {
  531. *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
  532. if (*fieldp == NULL)
  533. return -ENOMEM;
  534. if (*tmp == '.') {
  535. str = tmp + 1;
  536. (*fieldp)->ref = false;
  537. } else if (tmp[1] == '>') {
  538. str = tmp + 2;
  539. (*fieldp)->ref = true;
  540. } else {
  541. semantic_error("Argument parse error: %s\n", str);
  542. return -EINVAL;
  543. }
  544. tmp = strpbrk(str, "-.");
  545. if (tmp) {
  546. (*fieldp)->name = strndup(str, tmp - str);
  547. if ((*fieldp)->name == NULL)
  548. return -ENOMEM;
  549. pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
  550. fieldp = &(*fieldp)->next;
  551. }
  552. } while (tmp);
  553. (*fieldp)->name = strdup(str);
  554. if ((*fieldp)->name == NULL)
  555. return -ENOMEM;
  556. pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
  557. /* If no name is specified, set the last field name */
  558. if (!arg->name) {
  559. arg->name = strdup((*fieldp)->name);
  560. if (arg->name == NULL)
  561. return -ENOMEM;
  562. }
  563. return 0;
  564. }
  565. /* Parse perf-probe event command */
  566. int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
  567. {
  568. char **argv;
  569. int argc, i, ret = 0;
  570. argv = argv_split(cmd, &argc);
  571. if (!argv) {
  572. pr_debug("Failed to split arguments.\n");
  573. return -ENOMEM;
  574. }
  575. if (argc - 1 > MAX_PROBE_ARGS) {
  576. semantic_error("Too many probe arguments (%d).\n", argc - 1);
  577. ret = -ERANGE;
  578. goto out;
  579. }
  580. /* Parse probe point */
  581. ret = parse_perf_probe_point(argv[0], pev);
  582. if (ret < 0)
  583. goto out;
  584. /* Copy arguments and ensure return probe has no C argument */
  585. pev->nargs = argc - 1;
  586. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  587. if (pev->args == NULL) {
  588. ret = -ENOMEM;
  589. goto out;
  590. }
  591. for (i = 0; i < pev->nargs && ret >= 0; i++) {
  592. ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
  593. if (ret >= 0 &&
  594. is_c_varname(pev->args[i].var) && pev->point.retprobe) {
  595. semantic_error("You can't specify local variable for"
  596. " kretprobe.\n");
  597. ret = -EINVAL;
  598. }
  599. }
  600. out:
  601. argv_free(argv);
  602. return ret;
  603. }
  604. /* Return true if this perf_probe_event requires debuginfo */
  605. bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
  606. {
  607. int i;
  608. if (pev->point.file || pev->point.line || pev->point.lazy_line)
  609. return true;
  610. for (i = 0; i < pev->nargs; i++)
  611. if (is_c_varname(pev->args[i].var))
  612. return true;
  613. return false;
  614. }
  615. /* Parse kprobe_events event into struct probe_point */
  616. int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
  617. {
  618. struct kprobe_trace_point *tp = &tev->point;
  619. char pr;
  620. char *p;
  621. int ret, i, argc;
  622. char **argv;
  623. pr_debug("Parsing kprobe_events: %s\n", cmd);
  624. argv = argv_split(cmd, &argc);
  625. if (!argv) {
  626. pr_debug("Failed to split arguments.\n");
  627. return -ENOMEM;
  628. }
  629. if (argc < 2) {
  630. semantic_error("Too few probe arguments.\n");
  631. ret = -ERANGE;
  632. goto out;
  633. }
  634. /* Scan event and group name. */
  635. ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
  636. &pr, (float *)(void *)&tev->group,
  637. (float *)(void *)&tev->event);
  638. if (ret != 3) {
  639. semantic_error("Failed to parse event name: %s\n", argv[0]);
  640. ret = -EINVAL;
  641. goto out;
  642. }
  643. pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
  644. tp->retprobe = (pr == 'r');
  645. /* Scan function name and offset */
  646. ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
  647. &tp->offset);
  648. if (ret == 1)
  649. tp->offset = 0;
  650. tev->nargs = argc - 2;
  651. tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
  652. if (tev->args == NULL) {
  653. ret = -ENOMEM;
  654. goto out;
  655. }
  656. for (i = 0; i < tev->nargs; i++) {
  657. p = strchr(argv[i + 2], '=');
  658. if (p) /* We don't need which register is assigned. */
  659. *p++ = '\0';
  660. else
  661. p = argv[i + 2];
  662. tev->args[i].name = strdup(argv[i + 2]);
  663. /* TODO: parse regs and offset */
  664. tev->args[i].value = strdup(p);
  665. if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
  666. ret = -ENOMEM;
  667. goto out;
  668. }
  669. }
  670. ret = 0;
  671. out:
  672. argv_free(argv);
  673. return ret;
  674. }
  675. /* Compose only probe arg */
  676. int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
  677. {
  678. struct perf_probe_arg_field *field = pa->field;
  679. int ret;
  680. char *tmp = buf;
  681. if (pa->name && pa->var)
  682. ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
  683. else
  684. ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
  685. if (ret <= 0)
  686. goto error;
  687. tmp += ret;
  688. len -= ret;
  689. while (field) {
  690. ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
  691. field->name);
  692. if (ret <= 0)
  693. goto error;
  694. tmp += ret;
  695. len -= ret;
  696. field = field->next;
  697. }
  698. if (pa->type) {
  699. ret = e_snprintf(tmp, len, ":%s", pa->type);
  700. if (ret <= 0)
  701. goto error;
  702. tmp += ret;
  703. len -= ret;
  704. }
  705. return tmp - buf;
  706. error:
  707. pr_debug("Failed to synthesize perf probe argument: %s",
  708. strerror(-ret));
  709. return ret;
  710. }
  711. /* Compose only probe point (not argument) */
  712. static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
  713. {
  714. char *buf, *tmp;
  715. char offs[32] = "", line[32] = "", file[32] = "";
  716. int ret, len;
  717. buf = zalloc(MAX_CMDLEN);
  718. if (buf == NULL) {
  719. ret = -ENOMEM;
  720. goto error;
  721. }
  722. if (pp->offset) {
  723. ret = e_snprintf(offs, 32, "+%lu", pp->offset);
  724. if (ret <= 0)
  725. goto error;
  726. }
  727. if (pp->line) {
  728. ret = e_snprintf(line, 32, ":%d", pp->line);
  729. if (ret <= 0)
  730. goto error;
  731. }
  732. if (pp->file) {
  733. len = strlen(pp->file) - 31;
  734. if (len < 0)
  735. len = 0;
  736. tmp = strchr(pp->file + len, '/');
  737. if (!tmp)
  738. tmp = pp->file + len;
  739. ret = e_snprintf(file, 32, "@%s", tmp + 1);
  740. if (ret <= 0)
  741. goto error;
  742. }
  743. if (pp->function)
  744. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
  745. offs, pp->retprobe ? "%return" : "", line,
  746. file);
  747. else
  748. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
  749. if (ret <= 0)
  750. goto error;
  751. return buf;
  752. error:
  753. pr_debug("Failed to synthesize perf probe point: %s",
  754. strerror(-ret));
  755. if (buf)
  756. free(buf);
  757. return NULL;
  758. }
  759. #if 0
  760. char *synthesize_perf_probe_command(struct perf_probe_event *pev)
  761. {
  762. char *buf;
  763. int i, len, ret;
  764. buf = synthesize_perf_probe_point(&pev->point);
  765. if (!buf)
  766. return NULL;
  767. len = strlen(buf);
  768. for (i = 0; i < pev->nargs; i++) {
  769. ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
  770. pev->args[i].name);
  771. if (ret <= 0) {
  772. free(buf);
  773. return NULL;
  774. }
  775. len += ret;
  776. }
  777. return buf;
  778. }
  779. #endif
  780. static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
  781. char **buf, size_t *buflen,
  782. int depth)
  783. {
  784. int ret;
  785. if (ref->next) {
  786. depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
  787. buflen, depth + 1);
  788. if (depth < 0)
  789. goto out;
  790. }
  791. ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
  792. if (ret < 0)
  793. depth = ret;
  794. else {
  795. *buf += ret;
  796. *buflen -= ret;
  797. }
  798. out:
  799. return depth;
  800. }
  801. static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
  802. char *buf, size_t buflen)
  803. {
  804. int ret, depth = 0;
  805. char *tmp = buf;
  806. /* Argument name or separator */
  807. if (arg->name)
  808. ret = e_snprintf(buf, buflen, " %s=", arg->name);
  809. else
  810. ret = e_snprintf(buf, buflen, " ");
  811. if (ret < 0)
  812. return ret;
  813. buf += ret;
  814. buflen -= ret;
  815. /* Dereferencing arguments */
  816. if (arg->ref) {
  817. depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
  818. &buflen, 1);
  819. if (depth < 0)
  820. return depth;
  821. }
  822. /* Print argument value */
  823. ret = e_snprintf(buf, buflen, "%s", arg->value);
  824. if (ret < 0)
  825. return ret;
  826. buf += ret;
  827. buflen -= ret;
  828. /* Closing */
  829. while (depth--) {
  830. ret = e_snprintf(buf, buflen, ")");
  831. if (ret < 0)
  832. return ret;
  833. buf += ret;
  834. buflen -= ret;
  835. }
  836. /* Print argument type */
  837. if (arg->type) {
  838. ret = e_snprintf(buf, buflen, ":%s", arg->type);
  839. if (ret <= 0)
  840. return ret;
  841. buf += ret;
  842. }
  843. return buf - tmp;
  844. }
  845. char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
  846. {
  847. struct kprobe_trace_point *tp = &tev->point;
  848. char *buf;
  849. int i, len, ret;
  850. buf = zalloc(MAX_CMDLEN);
  851. if (buf == NULL)
  852. return NULL;
  853. len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
  854. tp->retprobe ? 'r' : 'p',
  855. tev->group, tev->event,
  856. tp->symbol, tp->offset);
  857. if (len <= 0)
  858. goto error;
  859. for (i = 0; i < tev->nargs; i++) {
  860. ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
  861. MAX_CMDLEN - len);
  862. if (ret <= 0)
  863. goto error;
  864. len += ret;
  865. }
  866. return buf;
  867. error:
  868. free(buf);
  869. return NULL;
  870. }
  871. int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
  872. struct perf_probe_event *pev)
  873. {
  874. char buf[64] = "";
  875. int i, ret;
  876. /* Convert event/group name */
  877. pev->event = strdup(tev->event);
  878. pev->group = strdup(tev->group);
  879. if (pev->event == NULL || pev->group == NULL)
  880. return -ENOMEM;
  881. /* Convert trace_point to probe_point */
  882. ret = convert_to_perf_probe_point(&tev->point, &pev->point);
  883. if (ret < 0)
  884. return ret;
  885. /* Convert trace_arg to probe_arg */
  886. pev->nargs = tev->nargs;
  887. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  888. if (pev->args == NULL)
  889. return -ENOMEM;
  890. for (i = 0; i < tev->nargs && ret >= 0; i++) {
  891. if (tev->args[i].name)
  892. pev->args[i].name = strdup(tev->args[i].name);
  893. else {
  894. ret = synthesize_kprobe_trace_arg(&tev->args[i],
  895. buf, 64);
  896. pev->args[i].name = strdup(buf);
  897. }
  898. if (pev->args[i].name == NULL && ret >= 0)
  899. ret = -ENOMEM;
  900. }
  901. if (ret < 0)
  902. clear_perf_probe_event(pev);
  903. return ret;
  904. }
  905. void clear_perf_probe_event(struct perf_probe_event *pev)
  906. {
  907. struct perf_probe_point *pp = &pev->point;
  908. struct perf_probe_arg_field *field, *next;
  909. int i;
  910. if (pev->event)
  911. free(pev->event);
  912. if (pev->group)
  913. free(pev->group);
  914. if (pp->file)
  915. free(pp->file);
  916. if (pp->function)
  917. free(pp->function);
  918. if (pp->lazy_line)
  919. free(pp->lazy_line);
  920. for (i = 0; i < pev->nargs; i++) {
  921. if (pev->args[i].name)
  922. free(pev->args[i].name);
  923. if (pev->args[i].var)
  924. free(pev->args[i].var);
  925. if (pev->args[i].type)
  926. free(pev->args[i].type);
  927. field = pev->args[i].field;
  928. while (field) {
  929. next = field->next;
  930. if (field->name)
  931. free(field->name);
  932. free(field);
  933. field = next;
  934. }
  935. }
  936. if (pev->args)
  937. free(pev->args);
  938. memset(pev, 0, sizeof(*pev));
  939. }
  940. void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
  941. {
  942. struct kprobe_trace_arg_ref *ref, *next;
  943. int i;
  944. if (tev->event)
  945. free(tev->event);
  946. if (tev->group)
  947. free(tev->group);
  948. if (tev->point.symbol)
  949. free(tev->point.symbol);
  950. for (i = 0; i < tev->nargs; i++) {
  951. if (tev->args[i].name)
  952. free(tev->args[i].name);
  953. if (tev->args[i].value)
  954. free(tev->args[i].value);
  955. if (tev->args[i].type)
  956. free(tev->args[i].type);
  957. ref = tev->args[i].ref;
  958. while (ref) {
  959. next = ref->next;
  960. free(ref);
  961. ref = next;
  962. }
  963. }
  964. if (tev->args)
  965. free(tev->args);
  966. memset(tev, 0, sizeof(*tev));
  967. }
  968. static int open_kprobe_events(bool readwrite)
  969. {
  970. char buf[PATH_MAX];
  971. const char *__debugfs;
  972. int ret;
  973. __debugfs = debugfs_find_mountpoint();
  974. if (__debugfs == NULL) {
  975. pr_warning("Debugfs is not mounted.\n");
  976. return -ENOENT;
  977. }
  978. ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
  979. if (ret >= 0) {
  980. pr_debug("Opening %s write=%d\n", buf, readwrite);
  981. if (readwrite && !probe_event_dry_run)
  982. ret = open(buf, O_RDWR, O_APPEND);
  983. else
  984. ret = open(buf, O_RDONLY, 0);
  985. }
  986. if (ret < 0) {
  987. if (errno == ENOENT)
  988. pr_warning("kprobe_events file does not exist - please"
  989. " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
  990. else
  991. pr_warning("Failed to open kprobe_events file: %s\n",
  992. strerror(errno));
  993. }
  994. return ret;
  995. }
  996. /* Get raw string list of current kprobe_events */
  997. static struct strlist *get_kprobe_trace_command_rawlist(int fd)
  998. {
  999. int ret, idx;
  1000. FILE *fp;
  1001. char buf[MAX_CMDLEN];
  1002. char *p;
  1003. struct strlist *sl;
  1004. sl = strlist__new(true, NULL);
  1005. fp = fdopen(dup(fd), "r");
  1006. while (!feof(fp)) {
  1007. p = fgets(buf, MAX_CMDLEN, fp);
  1008. if (!p)
  1009. break;
  1010. idx = strlen(p) - 1;
  1011. if (p[idx] == '\n')
  1012. p[idx] = '\0';
  1013. ret = strlist__add(sl, buf);
  1014. if (ret < 0) {
  1015. pr_debug("strlist__add failed: %s\n", strerror(-ret));
  1016. strlist__delete(sl);
  1017. return NULL;
  1018. }
  1019. }
  1020. fclose(fp);
  1021. return sl;
  1022. }
  1023. /* Show an event */
  1024. static int show_perf_probe_event(struct perf_probe_event *pev)
  1025. {
  1026. int i, ret;
  1027. char buf[128];
  1028. char *place;
  1029. /* Synthesize only event probe point */
  1030. place = synthesize_perf_probe_point(&pev->point);
  1031. if (!place)
  1032. return -EINVAL;
  1033. ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
  1034. if (ret < 0)
  1035. return ret;
  1036. printf(" %-20s (on %s", buf, place);
  1037. if (pev->nargs > 0) {
  1038. printf(" with");
  1039. for (i = 0; i < pev->nargs; i++) {
  1040. ret = synthesize_perf_probe_arg(&pev->args[i],
  1041. buf, 128);
  1042. if (ret < 0)
  1043. break;
  1044. printf(" %s", buf);
  1045. }
  1046. }
  1047. printf(")\n");
  1048. free(place);
  1049. return ret;
  1050. }
  1051. /* List up current perf-probe events */
  1052. int show_perf_probe_events(void)
  1053. {
  1054. int fd, ret;
  1055. struct kprobe_trace_event tev;
  1056. struct perf_probe_event pev;
  1057. struct strlist *rawlist;
  1058. struct str_node *ent;
  1059. setup_pager();
  1060. ret = init_vmlinux();
  1061. if (ret < 0)
  1062. return ret;
  1063. memset(&tev, 0, sizeof(tev));
  1064. memset(&pev, 0, sizeof(pev));
  1065. fd = open_kprobe_events(false);
  1066. if (fd < 0)
  1067. return fd;
  1068. rawlist = get_kprobe_trace_command_rawlist(fd);
  1069. close(fd);
  1070. if (!rawlist)
  1071. return -ENOENT;
  1072. strlist__for_each(ent, rawlist) {
  1073. ret = parse_kprobe_trace_command(ent->s, &tev);
  1074. if (ret >= 0) {
  1075. ret = convert_to_perf_probe_event(&tev, &pev);
  1076. if (ret >= 0)
  1077. ret = show_perf_probe_event(&pev);
  1078. }
  1079. clear_perf_probe_event(&pev);
  1080. clear_kprobe_trace_event(&tev);
  1081. if (ret < 0)
  1082. break;
  1083. }
  1084. strlist__delete(rawlist);
  1085. return ret;
  1086. }
  1087. /* Get current perf-probe event names */
  1088. static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
  1089. {
  1090. char buf[128];
  1091. struct strlist *sl, *rawlist;
  1092. struct str_node *ent;
  1093. struct kprobe_trace_event tev;
  1094. int ret = 0;
  1095. memset(&tev, 0, sizeof(tev));
  1096. rawlist = get_kprobe_trace_command_rawlist(fd);
  1097. sl = strlist__new(true, NULL);
  1098. strlist__for_each(ent, rawlist) {
  1099. ret = parse_kprobe_trace_command(ent->s, &tev);
  1100. if (ret < 0)
  1101. break;
  1102. if (include_group) {
  1103. ret = e_snprintf(buf, 128, "%s:%s", tev.group,
  1104. tev.event);
  1105. if (ret >= 0)
  1106. ret = strlist__add(sl, buf);
  1107. } else
  1108. ret = strlist__add(sl, tev.event);
  1109. clear_kprobe_trace_event(&tev);
  1110. if (ret < 0)
  1111. break;
  1112. }
  1113. strlist__delete(rawlist);
  1114. if (ret < 0) {
  1115. strlist__delete(sl);
  1116. return NULL;
  1117. }
  1118. return sl;
  1119. }
  1120. static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
  1121. {
  1122. int ret = 0;
  1123. char *buf = synthesize_kprobe_trace_command(tev);
  1124. if (!buf) {
  1125. pr_debug("Failed to synthesize kprobe trace event.\n");
  1126. return -EINVAL;
  1127. }
  1128. pr_debug("Writing event: %s\n", buf);
  1129. if (!probe_event_dry_run) {
  1130. ret = write(fd, buf, strlen(buf));
  1131. if (ret <= 0)
  1132. pr_warning("Failed to write event: %s\n",
  1133. strerror(errno));
  1134. }
  1135. free(buf);
  1136. return ret;
  1137. }
  1138. static int get_new_event_name(char *buf, size_t len, const char *base,
  1139. struct strlist *namelist, bool allow_suffix)
  1140. {
  1141. int i, ret;
  1142. /* Try no suffix */
  1143. ret = e_snprintf(buf, len, "%s", base);
  1144. if (ret < 0) {
  1145. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1146. return ret;
  1147. }
  1148. if (!strlist__has_entry(namelist, buf))
  1149. return 0;
  1150. if (!allow_suffix) {
  1151. pr_warning("Error: event \"%s\" already exists. "
  1152. "(Use -f to force duplicates.)\n", base);
  1153. return -EEXIST;
  1154. }
  1155. /* Try to add suffix */
  1156. for (i = 1; i < MAX_EVENT_INDEX; i++) {
  1157. ret = e_snprintf(buf, len, "%s_%d", base, i);
  1158. if (ret < 0) {
  1159. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1160. return ret;
  1161. }
  1162. if (!strlist__has_entry(namelist, buf))
  1163. break;
  1164. }
  1165. if (i == MAX_EVENT_INDEX) {
  1166. pr_warning("Too many events are on the same function.\n");
  1167. ret = -ERANGE;
  1168. }
  1169. return ret;
  1170. }
  1171. static int __add_kprobe_trace_events(struct perf_probe_event *pev,
  1172. struct kprobe_trace_event *tevs,
  1173. int ntevs, bool allow_suffix)
  1174. {
  1175. int i, fd, ret;
  1176. struct kprobe_trace_event *tev = NULL;
  1177. char buf[64];
  1178. const char *event, *group;
  1179. struct strlist *namelist;
  1180. fd = open_kprobe_events(true);
  1181. if (fd < 0)
  1182. return fd;
  1183. /* Get current event names */
  1184. namelist = get_kprobe_trace_event_names(fd, false);
  1185. if (!namelist) {
  1186. pr_debug("Failed to get current event list.\n");
  1187. return -EIO;
  1188. }
  1189. ret = 0;
  1190. printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
  1191. for (i = 0; i < ntevs; i++) {
  1192. tev = &tevs[i];
  1193. if (pev->event)
  1194. event = pev->event;
  1195. else
  1196. if (pev->point.function)
  1197. event = pev->point.function;
  1198. else
  1199. event = tev->point.symbol;
  1200. if (pev->group)
  1201. group = pev->group;
  1202. else
  1203. group = PERFPROBE_GROUP;
  1204. /* Get an unused new event name */
  1205. ret = get_new_event_name(buf, 64, event,
  1206. namelist, allow_suffix);
  1207. if (ret < 0)
  1208. break;
  1209. event = buf;
  1210. tev->event = strdup(event);
  1211. tev->group = strdup(group);
  1212. if (tev->event == NULL || tev->group == NULL) {
  1213. ret = -ENOMEM;
  1214. break;
  1215. }
  1216. ret = write_kprobe_trace_event(fd, tev);
  1217. if (ret < 0)
  1218. break;
  1219. /* Add added event name to namelist */
  1220. strlist__add(namelist, event);
  1221. /* Trick here - save current event/group */
  1222. event = pev->event;
  1223. group = pev->group;
  1224. pev->event = tev->event;
  1225. pev->group = tev->group;
  1226. show_perf_probe_event(pev);
  1227. /* Trick here - restore current event/group */
  1228. pev->event = (char *)event;
  1229. pev->group = (char *)group;
  1230. /*
  1231. * Probes after the first probe which comes from same
  1232. * user input are always allowed to add suffix, because
  1233. * there might be several addresses corresponding to
  1234. * one code line.
  1235. */
  1236. allow_suffix = true;
  1237. }
  1238. if (ret >= 0) {
  1239. /* Show how to use the event. */
  1240. printf("\nYou can now use it on all perf tools, such as:\n\n");
  1241. printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
  1242. tev->event);
  1243. }
  1244. strlist__delete(namelist);
  1245. close(fd);
  1246. return ret;
  1247. }
  1248. static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
  1249. struct kprobe_trace_event **tevs,
  1250. int max_tevs)
  1251. {
  1252. struct symbol *sym;
  1253. int ret = 0, i;
  1254. struct kprobe_trace_event *tev;
  1255. /* Convert perf_probe_event with debuginfo */
  1256. ret = try_to_find_kprobe_trace_events(pev, tevs, max_tevs);
  1257. if (ret != 0)
  1258. return ret;
  1259. /* Allocate trace event buffer */
  1260. tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
  1261. if (tev == NULL)
  1262. return -ENOMEM;
  1263. /* Copy parameters */
  1264. tev->point.symbol = strdup(pev->point.function);
  1265. if (tev->point.symbol == NULL) {
  1266. ret = -ENOMEM;
  1267. goto error;
  1268. }
  1269. tev->point.offset = pev->point.offset;
  1270. tev->nargs = pev->nargs;
  1271. if (tev->nargs) {
  1272. tev->args = zalloc(sizeof(struct kprobe_trace_arg)
  1273. * tev->nargs);
  1274. if (tev->args == NULL) {
  1275. ret = -ENOMEM;
  1276. goto error;
  1277. }
  1278. for (i = 0; i < tev->nargs; i++) {
  1279. if (pev->args[i].name) {
  1280. tev->args[i].name = strdup(pev->args[i].name);
  1281. if (tev->args[i].name == NULL) {
  1282. ret = -ENOMEM;
  1283. goto error;
  1284. }
  1285. }
  1286. tev->args[i].value = strdup(pev->args[i].var);
  1287. if (tev->args[i].value == NULL) {
  1288. ret = -ENOMEM;
  1289. goto error;
  1290. }
  1291. if (pev->args[i].type) {
  1292. tev->args[i].type = strdup(pev->args[i].type);
  1293. if (tev->args[i].type == NULL) {
  1294. ret = -ENOMEM;
  1295. goto error;
  1296. }
  1297. }
  1298. }
  1299. }
  1300. /* Currently just checking function name from symbol map */
  1301. sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
  1302. tev->point.symbol, NULL);
  1303. if (!sym) {
  1304. pr_warning("Kernel symbol \'%s\' not found.\n",
  1305. tev->point.symbol);
  1306. ret = -ENOENT;
  1307. goto error;
  1308. }
  1309. return 1;
  1310. error:
  1311. clear_kprobe_trace_event(tev);
  1312. free(tev);
  1313. *tevs = NULL;
  1314. return ret;
  1315. }
  1316. struct __event_package {
  1317. struct perf_probe_event *pev;
  1318. struct kprobe_trace_event *tevs;
  1319. int ntevs;
  1320. };
  1321. int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
  1322. bool force_add, int max_tevs)
  1323. {
  1324. int i, j, ret;
  1325. struct __event_package *pkgs;
  1326. pkgs = zalloc(sizeof(struct __event_package) * npevs);
  1327. if (pkgs == NULL)
  1328. return -ENOMEM;
  1329. /* Init vmlinux path */
  1330. ret = init_vmlinux();
  1331. if (ret < 0)
  1332. return ret;
  1333. /* Loop 1: convert all events */
  1334. for (i = 0; i < npevs; i++) {
  1335. pkgs[i].pev = &pevs[i];
  1336. /* Convert with or without debuginfo */
  1337. ret = convert_to_kprobe_trace_events(pkgs[i].pev,
  1338. &pkgs[i].tevs, max_tevs);
  1339. if (ret < 0)
  1340. goto end;
  1341. pkgs[i].ntevs = ret;
  1342. }
  1343. /* Loop 2: add all events */
  1344. for (i = 0; i < npevs && ret >= 0; i++)
  1345. ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
  1346. pkgs[i].ntevs, force_add);
  1347. end:
  1348. /* Loop 3: cleanup trace events */
  1349. for (i = 0; i < npevs; i++)
  1350. for (j = 0; j < pkgs[i].ntevs; j++)
  1351. clear_kprobe_trace_event(&pkgs[i].tevs[j]);
  1352. return ret;
  1353. }
  1354. static int __del_trace_kprobe_event(int fd, struct str_node *ent)
  1355. {
  1356. char *p;
  1357. char buf[128];
  1358. int ret;
  1359. /* Convert from perf-probe event to trace-kprobe event */
  1360. ret = e_snprintf(buf, 128, "-:%s", ent->s);
  1361. if (ret < 0)
  1362. goto error;
  1363. p = strchr(buf + 2, ':');
  1364. if (!p) {
  1365. pr_debug("Internal error: %s should have ':' but not.\n",
  1366. ent->s);
  1367. ret = -ENOTSUP;
  1368. goto error;
  1369. }
  1370. *p = '/';
  1371. pr_debug("Writing event: %s\n", buf);
  1372. ret = write(fd, buf, strlen(buf));
  1373. if (ret < 0)
  1374. goto error;
  1375. printf("Remove event: %s\n", ent->s);
  1376. return 0;
  1377. error:
  1378. pr_warning("Failed to delete event: %s\n", strerror(-ret));
  1379. return ret;
  1380. }
  1381. static int del_trace_kprobe_event(int fd, const char *group,
  1382. const char *event, struct strlist *namelist)
  1383. {
  1384. char buf[128];
  1385. struct str_node *ent, *n;
  1386. int found = 0, ret = 0;
  1387. ret = e_snprintf(buf, 128, "%s:%s", group, event);
  1388. if (ret < 0) {
  1389. pr_err("Failed to copy event.");
  1390. return ret;
  1391. }
  1392. if (strpbrk(buf, "*?")) { /* Glob-exp */
  1393. strlist__for_each_safe(ent, n, namelist)
  1394. if (strglobmatch(ent->s, buf)) {
  1395. found++;
  1396. ret = __del_trace_kprobe_event(fd, ent);
  1397. if (ret < 0)
  1398. break;
  1399. strlist__remove(namelist, ent);
  1400. }
  1401. } else {
  1402. ent = strlist__find(namelist, buf);
  1403. if (ent) {
  1404. found++;
  1405. ret = __del_trace_kprobe_event(fd, ent);
  1406. if (ret >= 0)
  1407. strlist__remove(namelist, ent);
  1408. }
  1409. }
  1410. if (found == 0 && ret >= 0)
  1411. pr_info("Info: Event \"%s\" does not exist.\n", buf);
  1412. return ret;
  1413. }
  1414. int del_perf_probe_events(struct strlist *dellist)
  1415. {
  1416. int fd, ret = 0;
  1417. const char *group, *event;
  1418. char *p, *str;
  1419. struct str_node *ent;
  1420. struct strlist *namelist;
  1421. fd = open_kprobe_events(true);
  1422. if (fd < 0)
  1423. return fd;
  1424. /* Get current event names */
  1425. namelist = get_kprobe_trace_event_names(fd, true);
  1426. if (namelist == NULL)
  1427. return -EINVAL;
  1428. strlist__for_each(ent, dellist) {
  1429. str = strdup(ent->s);
  1430. if (str == NULL) {
  1431. ret = -ENOMEM;
  1432. break;
  1433. }
  1434. pr_debug("Parsing: %s\n", str);
  1435. p = strchr(str, ':');
  1436. if (p) {
  1437. group = str;
  1438. *p = '\0';
  1439. event = p + 1;
  1440. } else {
  1441. group = "*";
  1442. event = str;
  1443. }
  1444. pr_debug("Group: %s, Event: %s\n", group, event);
  1445. ret = del_trace_kprobe_event(fd, group, event, namelist);
  1446. free(str);
  1447. if (ret < 0)
  1448. break;
  1449. }
  1450. strlist__delete(namelist);
  1451. close(fd);
  1452. return ret;
  1453. }