probe-event.c 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677
  1. /*
  2. * probe-event.c : perf-probe definition to kprobe_events format converter
  3. *
  4. * Written by Masami Hiramatsu <mhiramat@redhat.com>
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  19. *
  20. */
  21. #define _GNU_SOURCE
  22. #include <sys/utsname.h>
  23. #include <sys/types.h>
  24. #include <sys/stat.h>
  25. #include <fcntl.h>
  26. #include <errno.h>
  27. #include <stdio.h>
  28. #include <unistd.h>
  29. #include <stdlib.h>
  30. #include <string.h>
  31. #include <stdarg.h>
  32. #include <limits.h>
  33. #undef _GNU_SOURCE
  34. #include "util.h"
  35. #include "event.h"
  36. #include "string.h"
  37. #include "strlist.h"
  38. #include "debug.h"
  39. #include "cache.h"
  40. #include "color.h"
  41. #include "symbol.h"
  42. #include "thread.h"
  43. #include "debugfs.h"
  44. #include "trace-event.h" /* For __unused */
  45. #include "probe-event.h"
  46. #include "probe-finder.h"
  47. #define MAX_CMDLEN 256
  48. #define MAX_PROBE_ARGS 128
  49. #define PERFPROBE_GROUP "probe"
  50. bool probe_event_dry_run; /* Dry run flag */
  51. #define semantic_error(msg ...) pr_err("Semantic error :" msg)
  52. /* If there is no space to write, returns -E2BIG. */
  53. static int e_snprintf(char *str, size_t size, const char *format, ...)
  54. __attribute__((format(printf, 3, 4)));
  55. static int e_snprintf(char *str, size_t size, const char *format, ...)
  56. {
  57. int ret;
  58. va_list ap;
  59. va_start(ap, format);
  60. ret = vsnprintf(str, size, format, ap);
  61. va_end(ap);
  62. if (ret >= (int)size)
  63. ret = -E2BIG;
  64. return ret;
  65. }
  66. static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
  67. static struct machine machine;
  68. /* Initialize symbol maps and path of vmlinux */
  69. static int init_vmlinux(void)
  70. {
  71. struct dso *kernel;
  72. int ret;
  73. symbol_conf.sort_by_name = true;
  74. if (symbol_conf.vmlinux_name == NULL)
  75. symbol_conf.try_vmlinux_path = true;
  76. else
  77. pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
  78. ret = symbol__init();
  79. if (ret < 0) {
  80. pr_debug("Failed to init symbol map.\n");
  81. goto out;
  82. }
  83. ret = machine__init(&machine, "/", 0);
  84. if (ret < 0)
  85. goto out;
  86. kernel = dso__new_kernel(symbol_conf.vmlinux_name);
  87. if (kernel == NULL)
  88. die("Failed to create kernel dso.");
  89. ret = __machine__create_kernel_maps(&machine, kernel);
  90. if (ret < 0)
  91. pr_debug("Failed to create kernel maps.\n");
  92. out:
  93. if (ret < 0)
  94. pr_warning("Failed to init vmlinux path.\n");
  95. return ret;
  96. }
  97. #ifdef DWARF_SUPPORT
  98. static int open_vmlinux(void)
  99. {
  100. if (map__load(machine.vmlinux_maps[MAP__FUNCTION], NULL) < 0) {
  101. pr_debug("Failed to load kernel map.\n");
  102. return -EINVAL;
  103. }
  104. pr_debug("Try to open %s\n", machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name);
  105. return open(machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
  106. }
  107. /* Convert trace point to probe point with debuginfo */
  108. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  109. struct perf_probe_point *pp)
  110. {
  111. struct symbol *sym;
  112. int fd, ret = -ENOENT;
  113. sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
  114. tp->symbol, NULL);
  115. if (sym) {
  116. fd = open_vmlinux();
  117. if (fd >= 0) {
  118. ret = find_perf_probe_point(fd,
  119. sym->start + tp->offset, pp);
  120. close(fd);
  121. }
  122. }
  123. if (ret <= 0) {
  124. pr_debug("Failed to find corresponding probes from "
  125. "debuginfo. Use kprobe event information.\n");
  126. pp->function = strdup(tp->symbol);
  127. if (pp->function == NULL)
  128. return -ENOMEM;
  129. pp->offset = tp->offset;
  130. }
  131. pp->retprobe = tp->retprobe;
  132. return 0;
  133. }
  134. /* Try to find perf_probe_event with debuginfo */
  135. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  136. struct kprobe_trace_event **tevs,
  137. int max_tevs)
  138. {
  139. bool need_dwarf = perf_probe_event_need_dwarf(pev);
  140. int fd, ntevs;
  141. fd = open_vmlinux();
  142. if (fd < 0) {
  143. if (need_dwarf) {
  144. pr_warning("Failed to open debuginfo file.\n");
  145. return fd;
  146. }
  147. pr_debug("Could not open vmlinux. Try to use symbols.\n");
  148. return 0;
  149. }
  150. /* Searching trace events corresponding to probe event */
  151. ntevs = find_kprobe_trace_events(fd, pev, tevs, max_tevs);
  152. close(fd);
  153. if (ntevs > 0) { /* Succeeded to find trace events */
  154. pr_debug("find %d kprobe_trace_events.\n", ntevs);
  155. return ntevs;
  156. }
  157. if (ntevs == 0) { /* No error but failed to find probe point. */
  158. pr_warning("Probe point '%s' not found.\n",
  159. synthesize_perf_probe_point(&pev->point));
  160. return -ENOENT;
  161. }
  162. /* Error path : ntevs < 0 */
  163. pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
  164. if (ntevs == -EBADF) {
  165. pr_warning("Warning: No dwarf info found in the vmlinux - "
  166. "please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
  167. if (!need_dwarf) {
  168. pr_debug("Trying to use symbols.\nn");
  169. return 0;
  170. }
  171. }
  172. return ntevs;
  173. }
  174. #define LINEBUF_SIZE 256
  175. #define NR_ADDITIONAL_LINES 2
  176. static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
  177. {
  178. char buf[LINEBUF_SIZE];
  179. const char *color = PERF_COLOR_BLUE;
  180. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  181. goto error;
  182. if (!skip) {
  183. if (show_num)
  184. fprintf(stdout, "%7d %s", l, buf);
  185. else
  186. color_fprintf(stdout, color, " %s", buf);
  187. }
  188. while (strlen(buf) == LINEBUF_SIZE - 1 &&
  189. buf[LINEBUF_SIZE - 2] != '\n') {
  190. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  191. goto error;
  192. if (!skip) {
  193. if (show_num)
  194. fprintf(stdout, "%s", buf);
  195. else
  196. color_fprintf(stdout, color, "%s", buf);
  197. }
  198. }
  199. return 0;
  200. error:
  201. if (feof(fp))
  202. pr_warning("Source file is shorter than expected.\n");
  203. else
  204. pr_warning("File read error: %s\n", strerror(errno));
  205. return -1;
  206. }
  207. /*
  208. * Show line-range always requires debuginfo to find source file and
  209. * line number.
  210. */
  211. int show_line_range(struct line_range *lr)
  212. {
  213. int l = 1;
  214. struct line_node *ln;
  215. FILE *fp;
  216. int fd, ret;
  217. /* Search a line range */
  218. ret = init_vmlinux();
  219. if (ret < 0)
  220. return ret;
  221. fd = open_vmlinux();
  222. if (fd < 0) {
  223. pr_warning("Failed to open debuginfo file.\n");
  224. return fd;
  225. }
  226. ret = find_line_range(fd, lr);
  227. close(fd);
  228. if (ret == 0) {
  229. pr_warning("Specified source line is not found.\n");
  230. return -ENOENT;
  231. } else if (ret < 0) {
  232. pr_warning("Debuginfo analysis failed. (%d)\n", ret);
  233. return ret;
  234. }
  235. setup_pager();
  236. if (lr->function)
  237. fprintf(stdout, "<%s:%d>\n", lr->function,
  238. lr->start - lr->offset);
  239. else
  240. fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
  241. fp = fopen(lr->path, "r");
  242. if (fp == NULL) {
  243. pr_warning("Failed to open %s: %s\n", lr->path,
  244. strerror(errno));
  245. return -errno;
  246. }
  247. /* Skip to starting line number */
  248. while (l < lr->start && ret >= 0)
  249. ret = show_one_line(fp, l++, true, false);
  250. if (ret < 0)
  251. goto end;
  252. list_for_each_entry(ln, &lr->line_list, list) {
  253. while (ln->line > l && ret >= 0)
  254. ret = show_one_line(fp, (l++) - lr->offset,
  255. false, false);
  256. if (ret >= 0)
  257. ret = show_one_line(fp, (l++) - lr->offset,
  258. false, true);
  259. if (ret < 0)
  260. goto end;
  261. }
  262. if (lr->end == INT_MAX)
  263. lr->end = l + NR_ADDITIONAL_LINES;
  264. while (l <= lr->end && !feof(fp) && ret >= 0)
  265. ret = show_one_line(fp, (l++) - lr->offset, false, false);
  266. end:
  267. fclose(fp);
  268. return ret;
  269. }
  270. #else /* !DWARF_SUPPORT */
  271. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  272. struct perf_probe_point *pp)
  273. {
  274. pp->function = strdup(tp->symbol);
  275. if (pp->function == NULL)
  276. return -ENOMEM;
  277. pp->offset = tp->offset;
  278. pp->retprobe = tp->retprobe;
  279. return 0;
  280. }
  281. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  282. struct kprobe_trace_event **tevs __unused,
  283. int max_tevs __unused)
  284. {
  285. if (perf_probe_event_need_dwarf(pev)) {
  286. pr_warning("Debuginfo-analysis is not supported.\n");
  287. return -ENOSYS;
  288. }
  289. return 0;
  290. }
  291. int show_line_range(struct line_range *lr __unused)
  292. {
  293. pr_warning("Debuginfo-analysis is not supported.\n");
  294. return -ENOSYS;
  295. }
  296. #endif
  297. int parse_line_range_desc(const char *arg, struct line_range *lr)
  298. {
  299. const char *ptr;
  300. char *tmp;
  301. /*
  302. * <Syntax>
  303. * SRC:SLN[+NUM|-ELN]
  304. * FUNC[:SLN[+NUM|-ELN]]
  305. */
  306. ptr = strchr(arg, ':');
  307. if (ptr) {
  308. lr->start = (int)strtoul(ptr + 1, &tmp, 0);
  309. if (*tmp == '+') {
  310. lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
  311. lr->end--; /*
  312. * Adjust the number of lines here.
  313. * If the number of lines == 1, the
  314. * the end of line should be equal to
  315. * the start of line.
  316. */
  317. } else if (*tmp == '-')
  318. lr->end = (int)strtoul(tmp + 1, &tmp, 0);
  319. else
  320. lr->end = INT_MAX;
  321. pr_debug("Line range is %d to %d\n", lr->start, lr->end);
  322. if (lr->start > lr->end) {
  323. semantic_error("Start line must be smaller"
  324. " than end line.\n");
  325. return -EINVAL;
  326. }
  327. if (*tmp != '\0') {
  328. semantic_error("Tailing with invalid character '%d'.\n",
  329. *tmp);
  330. return -EINVAL;
  331. }
  332. tmp = strndup(arg, (ptr - arg));
  333. } else {
  334. tmp = strdup(arg);
  335. lr->end = INT_MAX;
  336. }
  337. if (tmp == NULL)
  338. return -ENOMEM;
  339. if (strchr(tmp, '.'))
  340. lr->file = tmp;
  341. else
  342. lr->function = tmp;
  343. return 0;
  344. }
  345. /* Check the name is good for event/group */
  346. static bool check_event_name(const char *name)
  347. {
  348. if (!isalpha(*name) && *name != '_')
  349. return false;
  350. while (*++name != '\0') {
  351. if (!isalpha(*name) && !isdigit(*name) && *name != '_')
  352. return false;
  353. }
  354. return true;
  355. }
  356. /* Parse probepoint definition. */
  357. static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
  358. {
  359. struct perf_probe_point *pp = &pev->point;
  360. char *ptr, *tmp;
  361. char c, nc = 0;
  362. /*
  363. * <Syntax>
  364. * perf probe [EVENT=]SRC[:LN|;PTN]
  365. * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
  366. *
  367. * TODO:Group name support
  368. */
  369. ptr = strpbrk(arg, ";=@+%");
  370. if (ptr && *ptr == '=') { /* Event name */
  371. *ptr = '\0';
  372. tmp = ptr + 1;
  373. if (strchr(arg, ':')) {
  374. semantic_error("Group name is not supported yet.\n");
  375. return -ENOTSUP;
  376. }
  377. if (!check_event_name(arg)) {
  378. semantic_error("%s is bad for event name -it must "
  379. "follow C symbol-naming rule.\n", arg);
  380. return -EINVAL;
  381. }
  382. pev->event = strdup(arg);
  383. if (pev->event == NULL)
  384. return -ENOMEM;
  385. pev->group = NULL;
  386. arg = tmp;
  387. }
  388. ptr = strpbrk(arg, ";:+@%");
  389. if (ptr) {
  390. nc = *ptr;
  391. *ptr++ = '\0';
  392. }
  393. tmp = strdup(arg);
  394. if (tmp == NULL)
  395. return -ENOMEM;
  396. /* Check arg is function or file and copy it */
  397. if (strchr(tmp, '.')) /* File */
  398. pp->file = tmp;
  399. else /* Function */
  400. pp->function = tmp;
  401. /* Parse other options */
  402. while (ptr) {
  403. arg = ptr;
  404. c = nc;
  405. if (c == ';') { /* Lazy pattern must be the last part */
  406. pp->lazy_line = strdup(arg);
  407. if (pp->lazy_line == NULL)
  408. return -ENOMEM;
  409. break;
  410. }
  411. ptr = strpbrk(arg, ";:+@%");
  412. if (ptr) {
  413. nc = *ptr;
  414. *ptr++ = '\0';
  415. }
  416. switch (c) {
  417. case ':': /* Line number */
  418. pp->line = strtoul(arg, &tmp, 0);
  419. if (*tmp != '\0') {
  420. semantic_error("There is non-digit char"
  421. " in line number.\n");
  422. return -EINVAL;
  423. }
  424. break;
  425. case '+': /* Byte offset from a symbol */
  426. pp->offset = strtoul(arg, &tmp, 0);
  427. if (*tmp != '\0') {
  428. semantic_error("There is non-digit character"
  429. " in offset.\n");
  430. return -EINVAL;
  431. }
  432. break;
  433. case '@': /* File name */
  434. if (pp->file) {
  435. semantic_error("SRC@SRC is not allowed.\n");
  436. return -EINVAL;
  437. }
  438. pp->file = strdup(arg);
  439. if (pp->file == NULL)
  440. return -ENOMEM;
  441. break;
  442. case '%': /* Probe places */
  443. if (strcmp(arg, "return") == 0) {
  444. pp->retprobe = 1;
  445. } else { /* Others not supported yet */
  446. semantic_error("%%%s is not supported.\n", arg);
  447. return -ENOTSUP;
  448. }
  449. break;
  450. default: /* Buggy case */
  451. pr_err("This program has a bug at %s:%d.\n",
  452. __FILE__, __LINE__);
  453. return -ENOTSUP;
  454. break;
  455. }
  456. }
  457. /* Exclusion check */
  458. if (pp->lazy_line && pp->line) {
  459. semantic_error("Lazy pattern can't be used with line number.");
  460. return -EINVAL;
  461. }
  462. if (pp->lazy_line && pp->offset) {
  463. semantic_error("Lazy pattern can't be used with offset.");
  464. return -EINVAL;
  465. }
  466. if (pp->line && pp->offset) {
  467. semantic_error("Offset can't be used with line number.");
  468. return -EINVAL;
  469. }
  470. if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
  471. semantic_error("File always requires line number or "
  472. "lazy pattern.");
  473. return -EINVAL;
  474. }
  475. if (pp->offset && !pp->function) {
  476. semantic_error("Offset requires an entry function.");
  477. return -EINVAL;
  478. }
  479. if (pp->retprobe && !pp->function) {
  480. semantic_error("Return probe requires an entry function.");
  481. return -EINVAL;
  482. }
  483. if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
  484. semantic_error("Offset/Line/Lazy pattern can't be used with "
  485. "return probe.");
  486. return -EINVAL;
  487. }
  488. pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
  489. pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
  490. pp->lazy_line);
  491. return 0;
  492. }
  493. /* Parse perf-probe event argument */
  494. static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
  495. {
  496. char *tmp, *goodname;
  497. struct perf_probe_arg_field **fieldp;
  498. pr_debug("parsing arg: %s into ", str);
  499. tmp = strchr(str, '=');
  500. if (tmp) {
  501. arg->name = strndup(str, tmp - str);
  502. if (arg->name == NULL)
  503. return -ENOMEM;
  504. pr_debug("name:%s ", arg->name);
  505. str = tmp + 1;
  506. }
  507. tmp = strchr(str, ':');
  508. if (tmp) { /* Type setting */
  509. *tmp = '\0';
  510. arg->type = strdup(tmp + 1);
  511. if (arg->type == NULL)
  512. return -ENOMEM;
  513. pr_debug("type:%s ", arg->type);
  514. }
  515. tmp = strpbrk(str, "-.[");
  516. if (!is_c_varname(str) || !tmp) {
  517. /* A variable, register, symbol or special value */
  518. arg->var = strdup(str);
  519. if (arg->var == NULL)
  520. return -ENOMEM;
  521. pr_debug("%s\n", arg->var);
  522. return 0;
  523. }
  524. /* Structure fields or array element */
  525. arg->var = strndup(str, tmp - str);
  526. if (arg->var == NULL)
  527. return -ENOMEM;
  528. goodname = arg->var;
  529. pr_debug("%s, ", arg->var);
  530. fieldp = &arg->field;
  531. do {
  532. *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
  533. if (*fieldp == NULL)
  534. return -ENOMEM;
  535. if (*tmp == '[') { /* Array */
  536. str = tmp;
  537. (*fieldp)->index = strtol(str + 1, &tmp, 0);
  538. (*fieldp)->ref = true;
  539. if (*tmp != ']' || tmp == str + 1) {
  540. semantic_error("Array index must be a"
  541. " number.\n");
  542. return -EINVAL;
  543. }
  544. tmp++;
  545. if (*tmp == '\0')
  546. tmp = NULL;
  547. } else { /* Structure */
  548. if (*tmp == '.') {
  549. str = tmp + 1;
  550. (*fieldp)->ref = false;
  551. } else if (tmp[1] == '>') {
  552. str = tmp + 2;
  553. (*fieldp)->ref = true;
  554. } else {
  555. semantic_error("Argument parse error: %s\n",
  556. str);
  557. return -EINVAL;
  558. }
  559. tmp = strpbrk(str, "-.[");
  560. }
  561. if (tmp) {
  562. (*fieldp)->name = strndup(str, tmp - str);
  563. if ((*fieldp)->name == NULL)
  564. return -ENOMEM;
  565. if (*str != '[')
  566. goodname = (*fieldp)->name;
  567. pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
  568. fieldp = &(*fieldp)->next;
  569. }
  570. } while (tmp);
  571. (*fieldp)->name = strdup(str);
  572. if ((*fieldp)->name == NULL)
  573. return -ENOMEM;
  574. if (*str != '[')
  575. goodname = (*fieldp)->name;
  576. pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
  577. /* If no name is specified, set the last field name (not array index)*/
  578. if (!arg->name) {
  579. arg->name = strdup(goodname);
  580. if (arg->name == NULL)
  581. return -ENOMEM;
  582. }
  583. return 0;
  584. }
  585. /* Parse perf-probe event command */
  586. int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
  587. {
  588. char **argv;
  589. int argc, i, ret = 0;
  590. argv = argv_split(cmd, &argc);
  591. if (!argv) {
  592. pr_debug("Failed to split arguments.\n");
  593. return -ENOMEM;
  594. }
  595. if (argc - 1 > MAX_PROBE_ARGS) {
  596. semantic_error("Too many probe arguments (%d).\n", argc - 1);
  597. ret = -ERANGE;
  598. goto out;
  599. }
  600. /* Parse probe point */
  601. ret = parse_perf_probe_point(argv[0], pev);
  602. if (ret < 0)
  603. goto out;
  604. /* Copy arguments and ensure return probe has no C argument */
  605. pev->nargs = argc - 1;
  606. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  607. if (pev->args == NULL) {
  608. ret = -ENOMEM;
  609. goto out;
  610. }
  611. for (i = 0; i < pev->nargs && ret >= 0; i++) {
  612. ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
  613. if (ret >= 0 &&
  614. is_c_varname(pev->args[i].var) && pev->point.retprobe) {
  615. semantic_error("You can't specify local variable for"
  616. " kretprobe.\n");
  617. ret = -EINVAL;
  618. }
  619. }
  620. out:
  621. argv_free(argv);
  622. return ret;
  623. }
  624. /* Return true if this perf_probe_event requires debuginfo */
  625. bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
  626. {
  627. int i;
  628. if (pev->point.file || pev->point.line || pev->point.lazy_line)
  629. return true;
  630. for (i = 0; i < pev->nargs; i++)
  631. if (is_c_varname(pev->args[i].var))
  632. return true;
  633. return false;
  634. }
  635. /* Parse kprobe_events event into struct probe_point */
  636. int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
  637. {
  638. struct kprobe_trace_point *tp = &tev->point;
  639. char pr;
  640. char *p;
  641. int ret, i, argc;
  642. char **argv;
  643. pr_debug("Parsing kprobe_events: %s\n", cmd);
  644. argv = argv_split(cmd, &argc);
  645. if (!argv) {
  646. pr_debug("Failed to split arguments.\n");
  647. return -ENOMEM;
  648. }
  649. if (argc < 2) {
  650. semantic_error("Too few probe arguments.\n");
  651. ret = -ERANGE;
  652. goto out;
  653. }
  654. /* Scan event and group name. */
  655. ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
  656. &pr, (float *)(void *)&tev->group,
  657. (float *)(void *)&tev->event);
  658. if (ret != 3) {
  659. semantic_error("Failed to parse event name: %s\n", argv[0]);
  660. ret = -EINVAL;
  661. goto out;
  662. }
  663. pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
  664. tp->retprobe = (pr == 'r');
  665. /* Scan function name and offset */
  666. ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
  667. &tp->offset);
  668. if (ret == 1)
  669. tp->offset = 0;
  670. tev->nargs = argc - 2;
  671. tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
  672. if (tev->args == NULL) {
  673. ret = -ENOMEM;
  674. goto out;
  675. }
  676. for (i = 0; i < tev->nargs; i++) {
  677. p = strchr(argv[i + 2], '=');
  678. if (p) /* We don't need which register is assigned. */
  679. *p++ = '\0';
  680. else
  681. p = argv[i + 2];
  682. tev->args[i].name = strdup(argv[i + 2]);
  683. /* TODO: parse regs and offset */
  684. tev->args[i].value = strdup(p);
  685. if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
  686. ret = -ENOMEM;
  687. goto out;
  688. }
  689. }
  690. ret = 0;
  691. out:
  692. argv_free(argv);
  693. return ret;
  694. }
  695. /* Compose only probe arg */
  696. int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
  697. {
  698. struct perf_probe_arg_field *field = pa->field;
  699. int ret;
  700. char *tmp = buf;
  701. if (pa->name && pa->var)
  702. ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
  703. else
  704. ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
  705. if (ret <= 0)
  706. goto error;
  707. tmp += ret;
  708. len -= ret;
  709. while (field) {
  710. if (field->name[0] == '[')
  711. ret = e_snprintf(tmp, len, "%s", field->name);
  712. else
  713. ret = e_snprintf(tmp, len, "%s%s",
  714. field->ref ? "->" : ".", field->name);
  715. if (ret <= 0)
  716. goto error;
  717. tmp += ret;
  718. len -= ret;
  719. field = field->next;
  720. }
  721. if (pa->type) {
  722. ret = e_snprintf(tmp, len, ":%s", pa->type);
  723. if (ret <= 0)
  724. goto error;
  725. tmp += ret;
  726. len -= ret;
  727. }
  728. return tmp - buf;
  729. error:
  730. pr_debug("Failed to synthesize perf probe argument: %s",
  731. strerror(-ret));
  732. return ret;
  733. }
  734. /* Compose only probe point (not argument) */
  735. static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
  736. {
  737. char *buf, *tmp;
  738. char offs[32] = "", line[32] = "", file[32] = "";
  739. int ret, len;
  740. buf = zalloc(MAX_CMDLEN);
  741. if (buf == NULL) {
  742. ret = -ENOMEM;
  743. goto error;
  744. }
  745. if (pp->offset) {
  746. ret = e_snprintf(offs, 32, "+%lu", pp->offset);
  747. if (ret <= 0)
  748. goto error;
  749. }
  750. if (pp->line) {
  751. ret = e_snprintf(line, 32, ":%d", pp->line);
  752. if (ret <= 0)
  753. goto error;
  754. }
  755. if (pp->file) {
  756. len = strlen(pp->file) - 31;
  757. if (len < 0)
  758. len = 0;
  759. tmp = strchr(pp->file + len, '/');
  760. if (!tmp)
  761. tmp = pp->file + len;
  762. ret = e_snprintf(file, 32, "@%s", tmp + 1);
  763. if (ret <= 0)
  764. goto error;
  765. }
  766. if (pp->function)
  767. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
  768. offs, pp->retprobe ? "%return" : "", line,
  769. file);
  770. else
  771. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
  772. if (ret <= 0)
  773. goto error;
  774. return buf;
  775. error:
  776. pr_debug("Failed to synthesize perf probe point: %s",
  777. strerror(-ret));
  778. if (buf)
  779. free(buf);
  780. return NULL;
  781. }
  782. #if 0
  783. char *synthesize_perf_probe_command(struct perf_probe_event *pev)
  784. {
  785. char *buf;
  786. int i, len, ret;
  787. buf = synthesize_perf_probe_point(&pev->point);
  788. if (!buf)
  789. return NULL;
  790. len = strlen(buf);
  791. for (i = 0; i < pev->nargs; i++) {
  792. ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
  793. pev->args[i].name);
  794. if (ret <= 0) {
  795. free(buf);
  796. return NULL;
  797. }
  798. len += ret;
  799. }
  800. return buf;
  801. }
  802. #endif
  803. static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
  804. char **buf, size_t *buflen,
  805. int depth)
  806. {
  807. int ret;
  808. if (ref->next) {
  809. depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
  810. buflen, depth + 1);
  811. if (depth < 0)
  812. goto out;
  813. }
  814. ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
  815. if (ret < 0)
  816. depth = ret;
  817. else {
  818. *buf += ret;
  819. *buflen -= ret;
  820. }
  821. out:
  822. return depth;
  823. }
  824. static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
  825. char *buf, size_t buflen)
  826. {
  827. struct kprobe_trace_arg_ref *ref = arg->ref;
  828. int ret, depth = 0;
  829. char *tmp = buf;
  830. /* Argument name or separator */
  831. if (arg->name)
  832. ret = e_snprintf(buf, buflen, " %s=", arg->name);
  833. else
  834. ret = e_snprintf(buf, buflen, " ");
  835. if (ret < 0)
  836. return ret;
  837. buf += ret;
  838. buflen -= ret;
  839. /* Special case: @XXX */
  840. if (arg->value[0] == '@' && arg->ref)
  841. ref = ref->next;
  842. /* Dereferencing arguments */
  843. if (ref) {
  844. depth = __synthesize_kprobe_trace_arg_ref(ref, &buf,
  845. &buflen, 1);
  846. if (depth < 0)
  847. return depth;
  848. }
  849. /* Print argument value */
  850. if (arg->value[0] == '@' && arg->ref)
  851. ret = e_snprintf(buf, buflen, "%s%+ld", arg->value,
  852. arg->ref->offset);
  853. else
  854. ret = e_snprintf(buf, buflen, "%s", arg->value);
  855. if (ret < 0)
  856. return ret;
  857. buf += ret;
  858. buflen -= ret;
  859. /* Closing */
  860. while (depth--) {
  861. ret = e_snprintf(buf, buflen, ")");
  862. if (ret < 0)
  863. return ret;
  864. buf += ret;
  865. buflen -= ret;
  866. }
  867. /* Print argument type */
  868. if (arg->type) {
  869. ret = e_snprintf(buf, buflen, ":%s", arg->type);
  870. if (ret <= 0)
  871. return ret;
  872. buf += ret;
  873. }
  874. return buf - tmp;
  875. }
  876. char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
  877. {
  878. struct kprobe_trace_point *tp = &tev->point;
  879. char *buf;
  880. int i, len, ret;
  881. buf = zalloc(MAX_CMDLEN);
  882. if (buf == NULL)
  883. return NULL;
  884. len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
  885. tp->retprobe ? 'r' : 'p',
  886. tev->group, tev->event,
  887. tp->symbol, tp->offset);
  888. if (len <= 0)
  889. goto error;
  890. for (i = 0; i < tev->nargs; i++) {
  891. ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
  892. MAX_CMDLEN - len);
  893. if (ret <= 0)
  894. goto error;
  895. len += ret;
  896. }
  897. return buf;
  898. error:
  899. free(buf);
  900. return NULL;
  901. }
  902. int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
  903. struct perf_probe_event *pev)
  904. {
  905. char buf[64] = "";
  906. int i, ret;
  907. /* Convert event/group name */
  908. pev->event = strdup(tev->event);
  909. pev->group = strdup(tev->group);
  910. if (pev->event == NULL || pev->group == NULL)
  911. return -ENOMEM;
  912. /* Convert trace_point to probe_point */
  913. ret = convert_to_perf_probe_point(&tev->point, &pev->point);
  914. if (ret < 0)
  915. return ret;
  916. /* Convert trace_arg to probe_arg */
  917. pev->nargs = tev->nargs;
  918. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  919. if (pev->args == NULL)
  920. return -ENOMEM;
  921. for (i = 0; i < tev->nargs && ret >= 0; i++) {
  922. if (tev->args[i].name)
  923. pev->args[i].name = strdup(tev->args[i].name);
  924. else {
  925. ret = synthesize_kprobe_trace_arg(&tev->args[i],
  926. buf, 64);
  927. pev->args[i].name = strdup(buf);
  928. }
  929. if (pev->args[i].name == NULL && ret >= 0)
  930. ret = -ENOMEM;
  931. }
  932. if (ret < 0)
  933. clear_perf_probe_event(pev);
  934. return ret;
  935. }
  936. void clear_perf_probe_event(struct perf_probe_event *pev)
  937. {
  938. struct perf_probe_point *pp = &pev->point;
  939. struct perf_probe_arg_field *field, *next;
  940. int i;
  941. if (pev->event)
  942. free(pev->event);
  943. if (pev->group)
  944. free(pev->group);
  945. if (pp->file)
  946. free(pp->file);
  947. if (pp->function)
  948. free(pp->function);
  949. if (pp->lazy_line)
  950. free(pp->lazy_line);
  951. for (i = 0; i < pev->nargs; i++) {
  952. if (pev->args[i].name)
  953. free(pev->args[i].name);
  954. if (pev->args[i].var)
  955. free(pev->args[i].var);
  956. if (pev->args[i].type)
  957. free(pev->args[i].type);
  958. field = pev->args[i].field;
  959. while (field) {
  960. next = field->next;
  961. if (field->name)
  962. free(field->name);
  963. free(field);
  964. field = next;
  965. }
  966. }
  967. if (pev->args)
  968. free(pev->args);
  969. memset(pev, 0, sizeof(*pev));
  970. }
  971. void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
  972. {
  973. struct kprobe_trace_arg_ref *ref, *next;
  974. int i;
  975. if (tev->event)
  976. free(tev->event);
  977. if (tev->group)
  978. free(tev->group);
  979. if (tev->point.symbol)
  980. free(tev->point.symbol);
  981. for (i = 0; i < tev->nargs; i++) {
  982. if (tev->args[i].name)
  983. free(tev->args[i].name);
  984. if (tev->args[i].value)
  985. free(tev->args[i].value);
  986. if (tev->args[i].type)
  987. free(tev->args[i].type);
  988. ref = tev->args[i].ref;
  989. while (ref) {
  990. next = ref->next;
  991. free(ref);
  992. ref = next;
  993. }
  994. }
  995. if (tev->args)
  996. free(tev->args);
  997. memset(tev, 0, sizeof(*tev));
  998. }
  999. static int open_kprobe_events(bool readwrite)
  1000. {
  1001. char buf[PATH_MAX];
  1002. const char *__debugfs;
  1003. int ret;
  1004. __debugfs = debugfs_find_mountpoint();
  1005. if (__debugfs == NULL) {
  1006. pr_warning("Debugfs is not mounted.\n");
  1007. return -ENOENT;
  1008. }
  1009. ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
  1010. if (ret >= 0) {
  1011. pr_debug("Opening %s write=%d\n", buf, readwrite);
  1012. if (readwrite && !probe_event_dry_run)
  1013. ret = open(buf, O_RDWR, O_APPEND);
  1014. else
  1015. ret = open(buf, O_RDONLY, 0);
  1016. }
  1017. if (ret < 0) {
  1018. if (errno == ENOENT)
  1019. pr_warning("kprobe_events file does not exist - please"
  1020. " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
  1021. else
  1022. pr_warning("Failed to open kprobe_events file: %s\n",
  1023. strerror(errno));
  1024. }
  1025. return ret;
  1026. }
  1027. /* Get raw string list of current kprobe_events */
  1028. static struct strlist *get_kprobe_trace_command_rawlist(int fd)
  1029. {
  1030. int ret, idx;
  1031. FILE *fp;
  1032. char buf[MAX_CMDLEN];
  1033. char *p;
  1034. struct strlist *sl;
  1035. sl = strlist__new(true, NULL);
  1036. fp = fdopen(dup(fd), "r");
  1037. while (!feof(fp)) {
  1038. p = fgets(buf, MAX_CMDLEN, fp);
  1039. if (!p)
  1040. break;
  1041. idx = strlen(p) - 1;
  1042. if (p[idx] == '\n')
  1043. p[idx] = '\0';
  1044. ret = strlist__add(sl, buf);
  1045. if (ret < 0) {
  1046. pr_debug("strlist__add failed: %s\n", strerror(-ret));
  1047. strlist__delete(sl);
  1048. return NULL;
  1049. }
  1050. }
  1051. fclose(fp);
  1052. return sl;
  1053. }
  1054. /* Show an event */
  1055. static int show_perf_probe_event(struct perf_probe_event *pev)
  1056. {
  1057. int i, ret;
  1058. char buf[128];
  1059. char *place;
  1060. /* Synthesize only event probe point */
  1061. place = synthesize_perf_probe_point(&pev->point);
  1062. if (!place)
  1063. return -EINVAL;
  1064. ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
  1065. if (ret < 0)
  1066. return ret;
  1067. printf(" %-20s (on %s", buf, place);
  1068. if (pev->nargs > 0) {
  1069. printf(" with");
  1070. for (i = 0; i < pev->nargs; i++) {
  1071. ret = synthesize_perf_probe_arg(&pev->args[i],
  1072. buf, 128);
  1073. if (ret < 0)
  1074. break;
  1075. printf(" %s", buf);
  1076. }
  1077. }
  1078. printf(")\n");
  1079. free(place);
  1080. return ret;
  1081. }
  1082. /* List up current perf-probe events */
  1083. int show_perf_probe_events(void)
  1084. {
  1085. int fd, ret;
  1086. struct kprobe_trace_event tev;
  1087. struct perf_probe_event pev;
  1088. struct strlist *rawlist;
  1089. struct str_node *ent;
  1090. setup_pager();
  1091. ret = init_vmlinux();
  1092. if (ret < 0)
  1093. return ret;
  1094. memset(&tev, 0, sizeof(tev));
  1095. memset(&pev, 0, sizeof(pev));
  1096. fd = open_kprobe_events(false);
  1097. if (fd < 0)
  1098. return fd;
  1099. rawlist = get_kprobe_trace_command_rawlist(fd);
  1100. close(fd);
  1101. if (!rawlist)
  1102. return -ENOENT;
  1103. strlist__for_each(ent, rawlist) {
  1104. ret = parse_kprobe_trace_command(ent->s, &tev);
  1105. if (ret >= 0) {
  1106. ret = convert_to_perf_probe_event(&tev, &pev);
  1107. if (ret >= 0)
  1108. ret = show_perf_probe_event(&pev);
  1109. }
  1110. clear_perf_probe_event(&pev);
  1111. clear_kprobe_trace_event(&tev);
  1112. if (ret < 0)
  1113. break;
  1114. }
  1115. strlist__delete(rawlist);
  1116. return ret;
  1117. }
  1118. /* Get current perf-probe event names */
  1119. static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
  1120. {
  1121. char buf[128];
  1122. struct strlist *sl, *rawlist;
  1123. struct str_node *ent;
  1124. struct kprobe_trace_event tev;
  1125. int ret = 0;
  1126. memset(&tev, 0, sizeof(tev));
  1127. rawlist = get_kprobe_trace_command_rawlist(fd);
  1128. sl = strlist__new(true, NULL);
  1129. strlist__for_each(ent, rawlist) {
  1130. ret = parse_kprobe_trace_command(ent->s, &tev);
  1131. if (ret < 0)
  1132. break;
  1133. if (include_group) {
  1134. ret = e_snprintf(buf, 128, "%s:%s", tev.group,
  1135. tev.event);
  1136. if (ret >= 0)
  1137. ret = strlist__add(sl, buf);
  1138. } else
  1139. ret = strlist__add(sl, tev.event);
  1140. clear_kprobe_trace_event(&tev);
  1141. if (ret < 0)
  1142. break;
  1143. }
  1144. strlist__delete(rawlist);
  1145. if (ret < 0) {
  1146. strlist__delete(sl);
  1147. return NULL;
  1148. }
  1149. return sl;
  1150. }
  1151. static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
  1152. {
  1153. int ret = 0;
  1154. char *buf = synthesize_kprobe_trace_command(tev);
  1155. if (!buf) {
  1156. pr_debug("Failed to synthesize kprobe trace event.\n");
  1157. return -EINVAL;
  1158. }
  1159. pr_debug("Writing event: %s\n", buf);
  1160. if (!probe_event_dry_run) {
  1161. ret = write(fd, buf, strlen(buf));
  1162. if (ret <= 0)
  1163. pr_warning("Failed to write event: %s\n",
  1164. strerror(errno));
  1165. }
  1166. free(buf);
  1167. return ret;
  1168. }
  1169. static int get_new_event_name(char *buf, size_t len, const char *base,
  1170. struct strlist *namelist, bool allow_suffix)
  1171. {
  1172. int i, ret;
  1173. /* Try no suffix */
  1174. ret = e_snprintf(buf, len, "%s", base);
  1175. if (ret < 0) {
  1176. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1177. return ret;
  1178. }
  1179. if (!strlist__has_entry(namelist, buf))
  1180. return 0;
  1181. if (!allow_suffix) {
  1182. pr_warning("Error: event \"%s\" already exists. "
  1183. "(Use -f to force duplicates.)\n", base);
  1184. return -EEXIST;
  1185. }
  1186. /* Try to add suffix */
  1187. for (i = 1; i < MAX_EVENT_INDEX; i++) {
  1188. ret = e_snprintf(buf, len, "%s_%d", base, i);
  1189. if (ret < 0) {
  1190. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1191. return ret;
  1192. }
  1193. if (!strlist__has_entry(namelist, buf))
  1194. break;
  1195. }
  1196. if (i == MAX_EVENT_INDEX) {
  1197. pr_warning("Too many events are on the same function.\n");
  1198. ret = -ERANGE;
  1199. }
  1200. return ret;
  1201. }
  1202. static int __add_kprobe_trace_events(struct perf_probe_event *pev,
  1203. struct kprobe_trace_event *tevs,
  1204. int ntevs, bool allow_suffix)
  1205. {
  1206. int i, fd, ret;
  1207. struct kprobe_trace_event *tev = NULL;
  1208. char buf[64];
  1209. const char *event, *group;
  1210. struct strlist *namelist;
  1211. fd = open_kprobe_events(true);
  1212. if (fd < 0)
  1213. return fd;
  1214. /* Get current event names */
  1215. namelist = get_kprobe_trace_event_names(fd, false);
  1216. if (!namelist) {
  1217. pr_debug("Failed to get current event list.\n");
  1218. return -EIO;
  1219. }
  1220. ret = 0;
  1221. printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
  1222. for (i = 0; i < ntevs; i++) {
  1223. tev = &tevs[i];
  1224. if (pev->event)
  1225. event = pev->event;
  1226. else
  1227. if (pev->point.function)
  1228. event = pev->point.function;
  1229. else
  1230. event = tev->point.symbol;
  1231. if (pev->group)
  1232. group = pev->group;
  1233. else
  1234. group = PERFPROBE_GROUP;
  1235. /* Get an unused new event name */
  1236. ret = get_new_event_name(buf, 64, event,
  1237. namelist, allow_suffix);
  1238. if (ret < 0)
  1239. break;
  1240. event = buf;
  1241. tev->event = strdup(event);
  1242. tev->group = strdup(group);
  1243. if (tev->event == NULL || tev->group == NULL) {
  1244. ret = -ENOMEM;
  1245. break;
  1246. }
  1247. ret = write_kprobe_trace_event(fd, tev);
  1248. if (ret < 0)
  1249. break;
  1250. /* Add added event name to namelist */
  1251. strlist__add(namelist, event);
  1252. /* Trick here - save current event/group */
  1253. event = pev->event;
  1254. group = pev->group;
  1255. pev->event = tev->event;
  1256. pev->group = tev->group;
  1257. show_perf_probe_event(pev);
  1258. /* Trick here - restore current event/group */
  1259. pev->event = (char *)event;
  1260. pev->group = (char *)group;
  1261. /*
  1262. * Probes after the first probe which comes from same
  1263. * user input are always allowed to add suffix, because
  1264. * there might be several addresses corresponding to
  1265. * one code line.
  1266. */
  1267. allow_suffix = true;
  1268. }
  1269. if (ret >= 0) {
  1270. /* Show how to use the event. */
  1271. printf("\nYou can now use it on all perf tools, such as:\n\n");
  1272. printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
  1273. tev->event);
  1274. }
  1275. strlist__delete(namelist);
  1276. close(fd);
  1277. return ret;
  1278. }
  1279. static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
  1280. struct kprobe_trace_event **tevs,
  1281. int max_tevs)
  1282. {
  1283. struct symbol *sym;
  1284. int ret = 0, i;
  1285. struct kprobe_trace_event *tev;
  1286. /* Convert perf_probe_event with debuginfo */
  1287. ret = try_to_find_kprobe_trace_events(pev, tevs, max_tevs);
  1288. if (ret != 0)
  1289. return ret;
  1290. /* Allocate trace event buffer */
  1291. tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
  1292. if (tev == NULL)
  1293. return -ENOMEM;
  1294. /* Copy parameters */
  1295. tev->point.symbol = strdup(pev->point.function);
  1296. if (tev->point.symbol == NULL) {
  1297. ret = -ENOMEM;
  1298. goto error;
  1299. }
  1300. tev->point.offset = pev->point.offset;
  1301. tev->nargs = pev->nargs;
  1302. if (tev->nargs) {
  1303. tev->args = zalloc(sizeof(struct kprobe_trace_arg)
  1304. * tev->nargs);
  1305. if (tev->args == NULL) {
  1306. ret = -ENOMEM;
  1307. goto error;
  1308. }
  1309. for (i = 0; i < tev->nargs; i++) {
  1310. if (pev->args[i].name) {
  1311. tev->args[i].name = strdup(pev->args[i].name);
  1312. if (tev->args[i].name == NULL) {
  1313. ret = -ENOMEM;
  1314. goto error;
  1315. }
  1316. }
  1317. tev->args[i].value = strdup(pev->args[i].var);
  1318. if (tev->args[i].value == NULL) {
  1319. ret = -ENOMEM;
  1320. goto error;
  1321. }
  1322. if (pev->args[i].type) {
  1323. tev->args[i].type = strdup(pev->args[i].type);
  1324. if (tev->args[i].type == NULL) {
  1325. ret = -ENOMEM;
  1326. goto error;
  1327. }
  1328. }
  1329. }
  1330. }
  1331. /* Currently just checking function name from symbol map */
  1332. sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
  1333. tev->point.symbol, NULL);
  1334. if (!sym) {
  1335. pr_warning("Kernel symbol \'%s\' not found.\n",
  1336. tev->point.symbol);
  1337. ret = -ENOENT;
  1338. goto error;
  1339. }
  1340. return 1;
  1341. error:
  1342. clear_kprobe_trace_event(tev);
  1343. free(tev);
  1344. *tevs = NULL;
  1345. return ret;
  1346. }
  1347. struct __event_package {
  1348. struct perf_probe_event *pev;
  1349. struct kprobe_trace_event *tevs;
  1350. int ntevs;
  1351. };
  1352. int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
  1353. bool force_add, int max_tevs)
  1354. {
  1355. int i, j, ret;
  1356. struct __event_package *pkgs;
  1357. pkgs = zalloc(sizeof(struct __event_package) * npevs);
  1358. if (pkgs == NULL)
  1359. return -ENOMEM;
  1360. /* Init vmlinux path */
  1361. ret = init_vmlinux();
  1362. if (ret < 0)
  1363. return ret;
  1364. /* Loop 1: convert all events */
  1365. for (i = 0; i < npevs; i++) {
  1366. pkgs[i].pev = &pevs[i];
  1367. /* Convert with or without debuginfo */
  1368. ret = convert_to_kprobe_trace_events(pkgs[i].pev,
  1369. &pkgs[i].tevs, max_tevs);
  1370. if (ret < 0)
  1371. goto end;
  1372. pkgs[i].ntevs = ret;
  1373. }
  1374. /* Loop 2: add all events */
  1375. for (i = 0; i < npevs && ret >= 0; i++)
  1376. ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
  1377. pkgs[i].ntevs, force_add);
  1378. end:
  1379. /* Loop 3: cleanup trace events */
  1380. for (i = 0; i < npevs; i++)
  1381. for (j = 0; j < pkgs[i].ntevs; j++)
  1382. clear_kprobe_trace_event(&pkgs[i].tevs[j]);
  1383. return ret;
  1384. }
  1385. static int __del_trace_kprobe_event(int fd, struct str_node *ent)
  1386. {
  1387. char *p;
  1388. char buf[128];
  1389. int ret;
  1390. /* Convert from perf-probe event to trace-kprobe event */
  1391. ret = e_snprintf(buf, 128, "-:%s", ent->s);
  1392. if (ret < 0)
  1393. goto error;
  1394. p = strchr(buf + 2, ':');
  1395. if (!p) {
  1396. pr_debug("Internal error: %s should have ':' but not.\n",
  1397. ent->s);
  1398. ret = -ENOTSUP;
  1399. goto error;
  1400. }
  1401. *p = '/';
  1402. pr_debug("Writing event: %s\n", buf);
  1403. ret = write(fd, buf, strlen(buf));
  1404. if (ret < 0)
  1405. goto error;
  1406. printf("Remove event: %s\n", ent->s);
  1407. return 0;
  1408. error:
  1409. pr_warning("Failed to delete event: %s\n", strerror(-ret));
  1410. return ret;
  1411. }
  1412. static int del_trace_kprobe_event(int fd, const char *group,
  1413. const char *event, struct strlist *namelist)
  1414. {
  1415. char buf[128];
  1416. struct str_node *ent, *n;
  1417. int found = 0, ret = 0;
  1418. ret = e_snprintf(buf, 128, "%s:%s", group, event);
  1419. if (ret < 0) {
  1420. pr_err("Failed to copy event.");
  1421. return ret;
  1422. }
  1423. if (strpbrk(buf, "*?")) { /* Glob-exp */
  1424. strlist__for_each_safe(ent, n, namelist)
  1425. if (strglobmatch(ent->s, buf)) {
  1426. found++;
  1427. ret = __del_trace_kprobe_event(fd, ent);
  1428. if (ret < 0)
  1429. break;
  1430. strlist__remove(namelist, ent);
  1431. }
  1432. } else {
  1433. ent = strlist__find(namelist, buf);
  1434. if (ent) {
  1435. found++;
  1436. ret = __del_trace_kprobe_event(fd, ent);
  1437. if (ret >= 0)
  1438. strlist__remove(namelist, ent);
  1439. }
  1440. }
  1441. if (found == 0 && ret >= 0)
  1442. pr_info("Info: Event \"%s\" does not exist.\n", buf);
  1443. return ret;
  1444. }
  1445. int del_perf_probe_events(struct strlist *dellist)
  1446. {
  1447. int fd, ret = 0;
  1448. const char *group, *event;
  1449. char *p, *str;
  1450. struct str_node *ent;
  1451. struct strlist *namelist;
  1452. fd = open_kprobe_events(true);
  1453. if (fd < 0)
  1454. return fd;
  1455. /* Get current event names */
  1456. namelist = get_kprobe_trace_event_names(fd, true);
  1457. if (namelist == NULL)
  1458. return -EINVAL;
  1459. strlist__for_each(ent, dellist) {
  1460. str = strdup(ent->s);
  1461. if (str == NULL) {
  1462. ret = -ENOMEM;
  1463. break;
  1464. }
  1465. pr_debug("Parsing: %s\n", str);
  1466. p = strchr(str, ':');
  1467. if (p) {
  1468. group = str;
  1469. *p = '\0';
  1470. event = p + 1;
  1471. } else {
  1472. group = "*";
  1473. event = str;
  1474. }
  1475. pr_debug("Group: %s, Event: %s\n", group, event);
  1476. ret = del_trace_kprobe_event(fd, group, event, namelist);
  1477. free(str);
  1478. if (ret < 0)
  1479. break;
  1480. }
  1481. strlist__delete(namelist);
  1482. close(fd);
  1483. return ret;
  1484. }