probe-event.c 36 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640
  1. /*
  2. * probe-event.c : perf-probe definition to kprobe_events format converter
  3. *
  4. * Written by Masami Hiramatsu <mhiramat@redhat.com>
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  19. *
  20. */
  21. #define _GNU_SOURCE
  22. #include <sys/utsname.h>
  23. #include <sys/types.h>
  24. #include <sys/stat.h>
  25. #include <fcntl.h>
  26. #include <errno.h>
  27. #include <stdio.h>
  28. #include <unistd.h>
  29. #include <stdlib.h>
  30. #include <string.h>
  31. #include <stdarg.h>
  32. #include <limits.h>
  33. #undef _GNU_SOURCE
  34. #include "util.h"
  35. #include "event.h"
  36. #include "string.h"
  37. #include "strlist.h"
  38. #include "debug.h"
  39. #include "cache.h"
  40. #include "color.h"
  41. #include "symbol.h"
  42. #include "thread.h"
  43. #include "debugfs.h"
  44. #include "trace-event.h" /* For __unused */
  45. #include "probe-event.h"
  46. #include "probe-finder.h"
  47. #define MAX_CMDLEN 256
  48. #define MAX_PROBE_ARGS 128
  49. #define PERFPROBE_GROUP "probe"
  50. bool probe_event_dry_run; /* Dry run flag */
  51. #define semantic_error(msg ...) pr_err("Semantic error :" msg)
  52. /* If there is no space to write, returns -E2BIG. */
  53. static int e_snprintf(char *str, size_t size, const char *format, ...)
  54. __attribute__((format(printf, 3, 4)));
  55. static int e_snprintf(char *str, size_t size, const char *format, ...)
  56. {
  57. int ret;
  58. va_list ap;
  59. va_start(ap, format);
  60. ret = vsnprintf(str, size, format, ap);
  61. va_end(ap);
  62. if (ret >= (int)size)
  63. ret = -E2BIG;
  64. return ret;
  65. }
  66. static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
  67. static struct map_groups kmap_groups;
  68. static struct map *kmaps[MAP__NR_TYPES];
  69. /* Initialize symbol maps and path of vmlinux */
  70. static int init_vmlinux(void)
  71. {
  72. struct dso *kernel;
  73. int ret;
  74. symbol_conf.sort_by_name = true;
  75. if (symbol_conf.vmlinux_name == NULL)
  76. symbol_conf.try_vmlinux_path = true;
  77. else
  78. pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
  79. ret = symbol__init();
  80. if (ret < 0) {
  81. pr_debug("Failed to init symbol map.\n");
  82. goto out;
  83. }
  84. kernel = dso__new_kernel(symbol_conf.vmlinux_name);
  85. if (kernel == NULL)
  86. die("Failed to create kernel dso.");
  87. map_groups__init(&kmap_groups);
  88. ret = __map_groups__create_kernel_maps(&kmap_groups, kmaps, kernel);
  89. if (ret < 0)
  90. pr_debug("Failed to create kernel maps.\n");
  91. out:
  92. if (ret < 0)
  93. pr_warning("Failed to init vmlinux path.\n");
  94. return ret;
  95. }
  96. #ifdef DWARF_SUPPORT
  97. static int open_vmlinux(void)
  98. {
  99. if (map__load(kmaps[MAP__FUNCTION], NULL) < 0) {
  100. pr_debug("Failed to load kernel map.\n");
  101. return -EINVAL;
  102. }
  103. pr_debug("Try to open %s\n", kmaps[MAP__FUNCTION]->dso->long_name);
  104. return open(kmaps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
  105. }
  106. /* Convert trace point to probe point with debuginfo */
  107. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  108. struct perf_probe_point *pp)
  109. {
  110. struct symbol *sym;
  111. int fd, ret = -ENOENT;
  112. sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
  113. tp->symbol, NULL);
  114. if (sym) {
  115. fd = open_vmlinux();
  116. if (fd >= 0) {
  117. ret = find_perf_probe_point(fd,
  118. sym->start + tp->offset, pp);
  119. close(fd);
  120. }
  121. }
  122. if (ret <= 0) {
  123. pr_debug("Failed to find corresponding probes from "
  124. "debuginfo. Use kprobe event information.\n");
  125. pp->function = strdup(tp->symbol);
  126. if (pp->function == NULL)
  127. return -ENOMEM;
  128. pp->offset = tp->offset;
  129. }
  130. pp->retprobe = tp->retprobe;
  131. return 0;
  132. }
  133. /* Try to find perf_probe_event with debuginfo */
  134. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  135. struct kprobe_trace_event **tevs)
  136. {
  137. bool need_dwarf = perf_probe_event_need_dwarf(pev);
  138. int fd, ntevs;
  139. fd = open_vmlinux();
  140. if (fd < 0) {
  141. if (need_dwarf) {
  142. pr_warning("Failed to open debuginfo file.\n");
  143. return fd;
  144. }
  145. pr_debug("Could not open vmlinux. Try to use symbols.\n");
  146. return 0;
  147. }
  148. /* Searching trace events corresponding to probe event */
  149. ntevs = find_kprobe_trace_events(fd, pev, tevs);
  150. close(fd);
  151. if (ntevs > 0) { /* Succeeded to find trace events */
  152. pr_debug("find %d kprobe_trace_events.\n", ntevs);
  153. return ntevs;
  154. }
  155. if (ntevs == 0) { /* No error but failed to find probe point. */
  156. pr_warning("Probe point '%s' not found.\n",
  157. synthesize_perf_probe_point(&pev->point));
  158. return -ENOENT;
  159. }
  160. /* Error path : ntevs < 0 */
  161. if (need_dwarf) {
  162. if (ntevs == -EBADF)
  163. pr_warning("No dwarf info found in the vmlinux - "
  164. "please rebuild with CONFIG_DEBUG_INFO=y.\n");
  165. return ntevs;
  166. }
  167. pr_debug("An error occurred in debuginfo analysis."
  168. " Try to use symbols.\n");
  169. return 0;
  170. }
  171. #define LINEBUF_SIZE 256
  172. #define NR_ADDITIONAL_LINES 2
  173. static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
  174. {
  175. char buf[LINEBUF_SIZE];
  176. const char *color = PERF_COLOR_BLUE;
  177. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  178. goto error;
  179. if (!skip) {
  180. if (show_num)
  181. fprintf(stdout, "%7d %s", l, buf);
  182. else
  183. color_fprintf(stdout, color, " %s", buf);
  184. }
  185. while (strlen(buf) == LINEBUF_SIZE - 1 &&
  186. buf[LINEBUF_SIZE - 2] != '\n') {
  187. if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
  188. goto error;
  189. if (!skip) {
  190. if (show_num)
  191. fprintf(stdout, "%s", buf);
  192. else
  193. color_fprintf(stdout, color, "%s", buf);
  194. }
  195. }
  196. return 0;
  197. error:
  198. if (feof(fp))
  199. pr_warning("Source file is shorter than expected.\n");
  200. else
  201. pr_warning("File read error: %s\n", strerror(errno));
  202. return -1;
  203. }
  204. /*
  205. * Show line-range always requires debuginfo to find source file and
  206. * line number.
  207. */
  208. int show_line_range(struct line_range *lr)
  209. {
  210. int l = 1;
  211. struct line_node *ln;
  212. FILE *fp;
  213. int fd, ret;
  214. /* Search a line range */
  215. ret = init_vmlinux();
  216. if (ret < 0)
  217. return ret;
  218. fd = open_vmlinux();
  219. if (fd < 0) {
  220. pr_warning("Failed to open debuginfo file.\n");
  221. return fd;
  222. }
  223. ret = find_line_range(fd, lr);
  224. close(fd);
  225. if (ret == 0) {
  226. pr_warning("Specified source line is not found.\n");
  227. return -ENOENT;
  228. } else if (ret < 0) {
  229. pr_warning("Debuginfo analysis failed. (%d)\n", ret);
  230. return ret;
  231. }
  232. setup_pager();
  233. if (lr->function)
  234. fprintf(stdout, "<%s:%d>\n", lr->function,
  235. lr->start - lr->offset);
  236. else
  237. fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
  238. fp = fopen(lr->path, "r");
  239. if (fp == NULL) {
  240. pr_warning("Failed to open %s: %s\n", lr->path,
  241. strerror(errno));
  242. return -errno;
  243. }
  244. /* Skip to starting line number */
  245. while (l < lr->start && ret >= 0)
  246. ret = show_one_line(fp, l++, true, false);
  247. if (ret < 0)
  248. goto end;
  249. list_for_each_entry(ln, &lr->line_list, list) {
  250. while (ln->line > l && ret >= 0)
  251. ret = show_one_line(fp, (l++) - lr->offset,
  252. false, false);
  253. if (ret >= 0)
  254. ret = show_one_line(fp, (l++) - lr->offset,
  255. false, true);
  256. if (ret < 0)
  257. goto end;
  258. }
  259. if (lr->end == INT_MAX)
  260. lr->end = l + NR_ADDITIONAL_LINES;
  261. while (l <= lr->end && !feof(fp) && ret >= 0)
  262. ret = show_one_line(fp, (l++) - lr->offset, false, false);
  263. end:
  264. fclose(fp);
  265. return ret;
  266. }
  267. #else /* !DWARF_SUPPORT */
  268. static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
  269. struct perf_probe_point *pp)
  270. {
  271. pp->function = strdup(tp->symbol);
  272. if (pp->function == NULL)
  273. return -ENOMEM;
  274. pp->offset = tp->offset;
  275. pp->retprobe = tp->retprobe;
  276. return 0;
  277. }
  278. static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
  279. struct kprobe_trace_event **tevs __unused)
  280. {
  281. if (perf_probe_event_need_dwarf(pev)) {
  282. pr_warning("Debuginfo-analysis is not supported.\n");
  283. return -ENOSYS;
  284. }
  285. return 0;
  286. }
  287. int show_line_range(struct line_range *lr __unused)
  288. {
  289. pr_warning("Debuginfo-analysis is not supported.\n");
  290. return -ENOSYS;
  291. }
  292. #endif
  293. int parse_line_range_desc(const char *arg, struct line_range *lr)
  294. {
  295. const char *ptr;
  296. char *tmp;
  297. /*
  298. * <Syntax>
  299. * SRC:SLN[+NUM|-ELN]
  300. * FUNC[:SLN[+NUM|-ELN]]
  301. */
  302. ptr = strchr(arg, ':');
  303. if (ptr) {
  304. lr->start = (int)strtoul(ptr + 1, &tmp, 0);
  305. if (*tmp == '+') {
  306. lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
  307. lr->end--; /*
  308. * Adjust the number of lines here.
  309. * If the number of lines == 1, the
  310. * the end of line should be equal to
  311. * the start of line.
  312. */
  313. } else if (*tmp == '-')
  314. lr->end = (int)strtoul(tmp + 1, &tmp, 0);
  315. else
  316. lr->end = INT_MAX;
  317. pr_debug("Line range is %d to %d\n", lr->start, lr->end);
  318. if (lr->start > lr->end) {
  319. semantic_error("Start line must be smaller"
  320. " than end line.\n");
  321. return -EINVAL;
  322. }
  323. if (*tmp != '\0') {
  324. semantic_error("Tailing with invalid character '%d'.\n",
  325. *tmp);
  326. return -EINVAL;
  327. }
  328. tmp = strndup(arg, (ptr - arg));
  329. } else {
  330. tmp = strdup(arg);
  331. lr->end = INT_MAX;
  332. }
  333. if (tmp == NULL)
  334. return -ENOMEM;
  335. if (strchr(tmp, '.'))
  336. lr->file = tmp;
  337. else
  338. lr->function = tmp;
  339. return 0;
  340. }
  341. /* Check the name is good for event/group */
  342. static bool check_event_name(const char *name)
  343. {
  344. if (!isalpha(*name) && *name != '_')
  345. return false;
  346. while (*++name != '\0') {
  347. if (!isalpha(*name) && !isdigit(*name) && *name != '_')
  348. return false;
  349. }
  350. return true;
  351. }
  352. /* Parse probepoint definition. */
  353. static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
  354. {
  355. struct perf_probe_point *pp = &pev->point;
  356. char *ptr, *tmp;
  357. char c, nc = 0;
  358. /*
  359. * <Syntax>
  360. * perf probe [EVENT=]SRC[:LN|;PTN]
  361. * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
  362. *
  363. * TODO:Group name support
  364. */
  365. ptr = strpbrk(arg, ";=@+%");
  366. if (ptr && *ptr == '=') { /* Event name */
  367. *ptr = '\0';
  368. tmp = ptr + 1;
  369. if (strchr(arg, ':')) {
  370. semantic_error("Group name is not supported yet.\n");
  371. return -ENOTSUP;
  372. }
  373. if (!check_event_name(arg)) {
  374. semantic_error("%s is bad for event name -it must "
  375. "follow C symbol-naming rule.\n", arg);
  376. return -EINVAL;
  377. }
  378. pev->event = strdup(arg);
  379. if (pev->event == NULL)
  380. return -ENOMEM;
  381. pev->group = NULL;
  382. arg = tmp;
  383. }
  384. ptr = strpbrk(arg, ";:+@%");
  385. if (ptr) {
  386. nc = *ptr;
  387. *ptr++ = '\0';
  388. }
  389. tmp = strdup(arg);
  390. if (tmp == NULL)
  391. return -ENOMEM;
  392. /* Check arg is function or file and copy it */
  393. if (strchr(tmp, '.')) /* File */
  394. pp->file = tmp;
  395. else /* Function */
  396. pp->function = tmp;
  397. /* Parse other options */
  398. while (ptr) {
  399. arg = ptr;
  400. c = nc;
  401. if (c == ';') { /* Lazy pattern must be the last part */
  402. pp->lazy_line = strdup(arg);
  403. if (pp->lazy_line == NULL)
  404. return -ENOMEM;
  405. break;
  406. }
  407. ptr = strpbrk(arg, ";:+@%");
  408. if (ptr) {
  409. nc = *ptr;
  410. *ptr++ = '\0';
  411. }
  412. switch (c) {
  413. case ':': /* Line number */
  414. pp->line = strtoul(arg, &tmp, 0);
  415. if (*tmp != '\0') {
  416. semantic_error("There is non-digit char"
  417. " in line number.\n");
  418. return -EINVAL;
  419. }
  420. break;
  421. case '+': /* Byte offset from a symbol */
  422. pp->offset = strtoul(arg, &tmp, 0);
  423. if (*tmp != '\0') {
  424. semantic_error("There is non-digit character"
  425. " in offset.\n");
  426. return -EINVAL;
  427. }
  428. break;
  429. case '@': /* File name */
  430. if (pp->file) {
  431. semantic_error("SRC@SRC is not allowed.\n");
  432. return -EINVAL;
  433. }
  434. pp->file = strdup(arg);
  435. if (pp->file == NULL)
  436. return -ENOMEM;
  437. break;
  438. case '%': /* Probe places */
  439. if (strcmp(arg, "return") == 0) {
  440. pp->retprobe = 1;
  441. } else { /* Others not supported yet */
  442. semantic_error("%%%s is not supported.\n", arg);
  443. return -ENOTSUP;
  444. }
  445. break;
  446. default: /* Buggy case */
  447. pr_err("This program has a bug at %s:%d.\n",
  448. __FILE__, __LINE__);
  449. return -ENOTSUP;
  450. break;
  451. }
  452. }
  453. /* Exclusion check */
  454. if (pp->lazy_line && pp->line) {
  455. semantic_error("Lazy pattern can't be used with line number.");
  456. return -EINVAL;
  457. }
  458. if (pp->lazy_line && pp->offset) {
  459. semantic_error("Lazy pattern can't be used with offset.");
  460. return -EINVAL;
  461. }
  462. if (pp->line && pp->offset) {
  463. semantic_error("Offset can't be used with line number.");
  464. return -EINVAL;
  465. }
  466. if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
  467. semantic_error("File always requires line number or "
  468. "lazy pattern.");
  469. return -EINVAL;
  470. }
  471. if (pp->offset && !pp->function) {
  472. semantic_error("Offset requires an entry function.");
  473. return -EINVAL;
  474. }
  475. if (pp->retprobe && !pp->function) {
  476. semantic_error("Return probe requires an entry function.");
  477. return -EINVAL;
  478. }
  479. if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
  480. semantic_error("Offset/Line/Lazy pattern can't be used with "
  481. "return probe.");
  482. return -EINVAL;
  483. }
  484. pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
  485. pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
  486. pp->lazy_line);
  487. return 0;
  488. }
  489. /* Parse perf-probe event argument */
  490. static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
  491. {
  492. char *tmp;
  493. struct perf_probe_arg_field **fieldp;
  494. pr_debug("parsing arg: %s into ", str);
  495. tmp = strchr(str, '=');
  496. if (tmp) {
  497. arg->name = strndup(str, tmp - str);
  498. if (arg->name == NULL)
  499. return -ENOMEM;
  500. pr_debug("name:%s ", arg->name);
  501. str = tmp + 1;
  502. }
  503. tmp = strchr(str, ':');
  504. if (tmp) { /* Type setting */
  505. *tmp = '\0';
  506. arg->type = strdup(tmp + 1);
  507. if (arg->type == NULL)
  508. return -ENOMEM;
  509. pr_debug("type:%s ", arg->type);
  510. }
  511. tmp = strpbrk(str, "-.");
  512. if (!is_c_varname(str) || !tmp) {
  513. /* A variable, register, symbol or special value */
  514. arg->var = strdup(str);
  515. if (arg->var == NULL)
  516. return -ENOMEM;
  517. pr_debug("%s\n", arg->var);
  518. return 0;
  519. }
  520. /* Structure fields */
  521. arg->var = strndup(str, tmp - str);
  522. if (arg->var == NULL)
  523. return -ENOMEM;
  524. pr_debug("%s, ", arg->var);
  525. fieldp = &arg->field;
  526. do {
  527. *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
  528. if (*fieldp == NULL)
  529. return -ENOMEM;
  530. if (*tmp == '.') {
  531. str = tmp + 1;
  532. (*fieldp)->ref = false;
  533. } else if (tmp[1] == '>') {
  534. str = tmp + 2;
  535. (*fieldp)->ref = true;
  536. } else {
  537. semantic_error("Argument parse error: %s\n", str);
  538. return -EINVAL;
  539. }
  540. tmp = strpbrk(str, "-.");
  541. if (tmp) {
  542. (*fieldp)->name = strndup(str, tmp - str);
  543. if ((*fieldp)->name == NULL)
  544. return -ENOMEM;
  545. pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
  546. fieldp = &(*fieldp)->next;
  547. }
  548. } while (tmp);
  549. (*fieldp)->name = strdup(str);
  550. if ((*fieldp)->name == NULL)
  551. return -ENOMEM;
  552. pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
  553. /* If no name is specified, set the last field name */
  554. if (!arg->name) {
  555. arg->name = strdup((*fieldp)->name);
  556. if (arg->name == NULL)
  557. return -ENOMEM;
  558. }
  559. return 0;
  560. }
  561. /* Parse perf-probe event command */
  562. int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
  563. {
  564. char **argv;
  565. int argc, i, ret = 0;
  566. argv = argv_split(cmd, &argc);
  567. if (!argv) {
  568. pr_debug("Failed to split arguments.\n");
  569. return -ENOMEM;
  570. }
  571. if (argc - 1 > MAX_PROBE_ARGS) {
  572. semantic_error("Too many probe arguments (%d).\n", argc - 1);
  573. ret = -ERANGE;
  574. goto out;
  575. }
  576. /* Parse probe point */
  577. ret = parse_perf_probe_point(argv[0], pev);
  578. if (ret < 0)
  579. goto out;
  580. /* Copy arguments and ensure return probe has no C argument */
  581. pev->nargs = argc - 1;
  582. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  583. if (pev->args == NULL) {
  584. ret = -ENOMEM;
  585. goto out;
  586. }
  587. for (i = 0; i < pev->nargs && ret >= 0; i++) {
  588. ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
  589. if (ret >= 0 &&
  590. is_c_varname(pev->args[i].var) && pev->point.retprobe) {
  591. semantic_error("You can't specify local variable for"
  592. " kretprobe.\n");
  593. ret = -EINVAL;
  594. }
  595. }
  596. out:
  597. argv_free(argv);
  598. return ret;
  599. }
  600. /* Return true if this perf_probe_event requires debuginfo */
  601. bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
  602. {
  603. int i;
  604. if (pev->point.file || pev->point.line || pev->point.lazy_line)
  605. return true;
  606. for (i = 0; i < pev->nargs; i++)
  607. if (is_c_varname(pev->args[i].var))
  608. return true;
  609. return false;
  610. }
  611. /* Parse kprobe_events event into struct probe_point */
  612. int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
  613. {
  614. struct kprobe_trace_point *tp = &tev->point;
  615. char pr;
  616. char *p;
  617. int ret, i, argc;
  618. char **argv;
  619. pr_debug("Parsing kprobe_events: %s\n", cmd);
  620. argv = argv_split(cmd, &argc);
  621. if (!argv) {
  622. pr_debug("Failed to split arguments.\n");
  623. return -ENOMEM;
  624. }
  625. if (argc < 2) {
  626. semantic_error("Too few probe arguments.\n");
  627. ret = -ERANGE;
  628. goto out;
  629. }
  630. /* Scan event and group name. */
  631. ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
  632. &pr, (float *)(void *)&tev->group,
  633. (float *)(void *)&tev->event);
  634. if (ret != 3) {
  635. semantic_error("Failed to parse event name: %s\n", argv[0]);
  636. ret = -EINVAL;
  637. goto out;
  638. }
  639. pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
  640. tp->retprobe = (pr == 'r');
  641. /* Scan function name and offset */
  642. ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
  643. &tp->offset);
  644. if (ret == 1)
  645. tp->offset = 0;
  646. tev->nargs = argc - 2;
  647. tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
  648. if (tev->args == NULL) {
  649. ret = -ENOMEM;
  650. goto out;
  651. }
  652. for (i = 0; i < tev->nargs; i++) {
  653. p = strchr(argv[i + 2], '=');
  654. if (p) /* We don't need which register is assigned. */
  655. *p++ = '\0';
  656. else
  657. p = argv[i + 2];
  658. tev->args[i].name = strdup(argv[i + 2]);
  659. /* TODO: parse regs and offset */
  660. tev->args[i].value = strdup(p);
  661. if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
  662. ret = -ENOMEM;
  663. goto out;
  664. }
  665. }
  666. ret = 0;
  667. out:
  668. argv_free(argv);
  669. return ret;
  670. }
  671. /* Compose only probe arg */
  672. int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
  673. {
  674. struct perf_probe_arg_field *field = pa->field;
  675. int ret;
  676. char *tmp = buf;
  677. if (pa->name && pa->var)
  678. ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
  679. else
  680. ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
  681. if (ret <= 0)
  682. goto error;
  683. tmp += ret;
  684. len -= ret;
  685. while (field) {
  686. ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
  687. field->name);
  688. if (ret <= 0)
  689. goto error;
  690. tmp += ret;
  691. len -= ret;
  692. field = field->next;
  693. }
  694. if (pa->type) {
  695. ret = e_snprintf(tmp, len, ":%s", pa->type);
  696. if (ret <= 0)
  697. goto error;
  698. tmp += ret;
  699. len -= ret;
  700. }
  701. return tmp - buf;
  702. error:
  703. pr_debug("Failed to synthesize perf probe argument: %s",
  704. strerror(-ret));
  705. return ret;
  706. }
  707. /* Compose only probe point (not argument) */
  708. static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
  709. {
  710. char *buf, *tmp;
  711. char offs[32] = "", line[32] = "", file[32] = "";
  712. int ret, len;
  713. buf = zalloc(MAX_CMDLEN);
  714. if (buf == NULL) {
  715. ret = -ENOMEM;
  716. goto error;
  717. }
  718. if (pp->offset) {
  719. ret = e_snprintf(offs, 32, "+%lu", pp->offset);
  720. if (ret <= 0)
  721. goto error;
  722. }
  723. if (pp->line) {
  724. ret = e_snprintf(line, 32, ":%d", pp->line);
  725. if (ret <= 0)
  726. goto error;
  727. }
  728. if (pp->file) {
  729. len = strlen(pp->file) - 31;
  730. if (len < 0)
  731. len = 0;
  732. tmp = strchr(pp->file + len, '/');
  733. if (!tmp)
  734. tmp = pp->file + len;
  735. ret = e_snprintf(file, 32, "@%s", tmp + 1);
  736. if (ret <= 0)
  737. goto error;
  738. }
  739. if (pp->function)
  740. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
  741. offs, pp->retprobe ? "%return" : "", line,
  742. file);
  743. else
  744. ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
  745. if (ret <= 0)
  746. goto error;
  747. return buf;
  748. error:
  749. pr_debug("Failed to synthesize perf probe point: %s",
  750. strerror(-ret));
  751. if (buf)
  752. free(buf);
  753. return NULL;
  754. }
  755. #if 0
  756. char *synthesize_perf_probe_command(struct perf_probe_event *pev)
  757. {
  758. char *buf;
  759. int i, len, ret;
  760. buf = synthesize_perf_probe_point(&pev->point);
  761. if (!buf)
  762. return NULL;
  763. len = strlen(buf);
  764. for (i = 0; i < pev->nargs; i++) {
  765. ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
  766. pev->args[i].name);
  767. if (ret <= 0) {
  768. free(buf);
  769. return NULL;
  770. }
  771. len += ret;
  772. }
  773. return buf;
  774. }
  775. #endif
  776. static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
  777. char **buf, size_t *buflen,
  778. int depth)
  779. {
  780. int ret;
  781. if (ref->next) {
  782. depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
  783. buflen, depth + 1);
  784. if (depth < 0)
  785. goto out;
  786. }
  787. ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
  788. if (ret < 0)
  789. depth = ret;
  790. else {
  791. *buf += ret;
  792. *buflen -= ret;
  793. }
  794. out:
  795. return depth;
  796. }
  797. static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
  798. char *buf, size_t buflen)
  799. {
  800. int ret, depth = 0;
  801. char *tmp = buf;
  802. /* Argument name or separator */
  803. if (arg->name)
  804. ret = e_snprintf(buf, buflen, " %s=", arg->name);
  805. else
  806. ret = e_snprintf(buf, buflen, " ");
  807. if (ret < 0)
  808. return ret;
  809. buf += ret;
  810. buflen -= ret;
  811. /* Dereferencing arguments */
  812. if (arg->ref) {
  813. depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
  814. &buflen, 1);
  815. if (depth < 0)
  816. return depth;
  817. }
  818. /* Print argument value */
  819. ret = e_snprintf(buf, buflen, "%s", arg->value);
  820. if (ret < 0)
  821. return ret;
  822. buf += ret;
  823. buflen -= ret;
  824. /* Closing */
  825. while (depth--) {
  826. ret = e_snprintf(buf, buflen, ")");
  827. if (ret < 0)
  828. return ret;
  829. buf += ret;
  830. buflen -= ret;
  831. }
  832. /* Print argument type */
  833. if (arg->type) {
  834. ret = e_snprintf(buf, buflen, ":%s", arg->type);
  835. if (ret <= 0)
  836. return ret;
  837. buf += ret;
  838. }
  839. return buf - tmp;
  840. }
  841. char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
  842. {
  843. struct kprobe_trace_point *tp = &tev->point;
  844. char *buf;
  845. int i, len, ret;
  846. buf = zalloc(MAX_CMDLEN);
  847. if (buf == NULL)
  848. return NULL;
  849. len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
  850. tp->retprobe ? 'r' : 'p',
  851. tev->group, tev->event,
  852. tp->symbol, tp->offset);
  853. if (len <= 0)
  854. goto error;
  855. for (i = 0; i < tev->nargs; i++) {
  856. ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
  857. MAX_CMDLEN - len);
  858. if (ret <= 0)
  859. goto error;
  860. len += ret;
  861. }
  862. return buf;
  863. error:
  864. free(buf);
  865. return NULL;
  866. }
  867. int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
  868. struct perf_probe_event *pev)
  869. {
  870. char buf[64] = "";
  871. int i, ret;
  872. /* Convert event/group name */
  873. pev->event = strdup(tev->event);
  874. pev->group = strdup(tev->group);
  875. if (pev->event == NULL || pev->group == NULL)
  876. return -ENOMEM;
  877. /* Convert trace_point to probe_point */
  878. ret = convert_to_perf_probe_point(&tev->point, &pev->point);
  879. if (ret < 0)
  880. return ret;
  881. /* Convert trace_arg to probe_arg */
  882. pev->nargs = tev->nargs;
  883. pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
  884. if (pev->args == NULL)
  885. return -ENOMEM;
  886. for (i = 0; i < tev->nargs && ret >= 0; i++) {
  887. if (tev->args[i].name)
  888. pev->args[i].name = strdup(tev->args[i].name);
  889. else {
  890. ret = synthesize_kprobe_trace_arg(&tev->args[i],
  891. buf, 64);
  892. pev->args[i].name = strdup(buf);
  893. }
  894. if (pev->args[i].name == NULL && ret >= 0)
  895. ret = -ENOMEM;
  896. }
  897. if (ret < 0)
  898. clear_perf_probe_event(pev);
  899. return ret;
  900. }
  901. void clear_perf_probe_event(struct perf_probe_event *pev)
  902. {
  903. struct perf_probe_point *pp = &pev->point;
  904. struct perf_probe_arg_field *field, *next;
  905. int i;
  906. if (pev->event)
  907. free(pev->event);
  908. if (pev->group)
  909. free(pev->group);
  910. if (pp->file)
  911. free(pp->file);
  912. if (pp->function)
  913. free(pp->function);
  914. if (pp->lazy_line)
  915. free(pp->lazy_line);
  916. for (i = 0; i < pev->nargs; i++) {
  917. if (pev->args[i].name)
  918. free(pev->args[i].name);
  919. if (pev->args[i].var)
  920. free(pev->args[i].var);
  921. if (pev->args[i].type)
  922. free(pev->args[i].type);
  923. field = pev->args[i].field;
  924. while (field) {
  925. next = field->next;
  926. if (field->name)
  927. free(field->name);
  928. free(field);
  929. field = next;
  930. }
  931. }
  932. if (pev->args)
  933. free(pev->args);
  934. memset(pev, 0, sizeof(*pev));
  935. }
  936. void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
  937. {
  938. struct kprobe_trace_arg_ref *ref, *next;
  939. int i;
  940. if (tev->event)
  941. free(tev->event);
  942. if (tev->group)
  943. free(tev->group);
  944. if (tev->point.symbol)
  945. free(tev->point.symbol);
  946. for (i = 0; i < tev->nargs; i++) {
  947. if (tev->args[i].name)
  948. free(tev->args[i].name);
  949. if (tev->args[i].value)
  950. free(tev->args[i].value);
  951. if (tev->args[i].type)
  952. free(tev->args[i].type);
  953. ref = tev->args[i].ref;
  954. while (ref) {
  955. next = ref->next;
  956. free(ref);
  957. ref = next;
  958. }
  959. }
  960. if (tev->args)
  961. free(tev->args);
  962. memset(tev, 0, sizeof(*tev));
  963. }
  964. static int open_kprobe_events(bool readwrite)
  965. {
  966. char buf[PATH_MAX];
  967. const char *__debugfs;
  968. int ret;
  969. __debugfs = debugfs_find_mountpoint();
  970. if (__debugfs == NULL) {
  971. pr_warning("Debugfs is not mounted.\n");
  972. return -ENOENT;
  973. }
  974. ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
  975. if (ret >= 0) {
  976. pr_debug("Opening %s write=%d\n", buf, readwrite);
  977. if (readwrite && !probe_event_dry_run)
  978. ret = open(buf, O_RDWR, O_APPEND);
  979. else
  980. ret = open(buf, O_RDONLY, 0);
  981. }
  982. if (ret < 0) {
  983. if (errno == ENOENT)
  984. pr_warning("kprobe_events file does not exist - please"
  985. " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
  986. else
  987. pr_warning("Failed to open kprobe_events file: %s\n",
  988. strerror(errno));
  989. }
  990. return ret;
  991. }
  992. /* Get raw string list of current kprobe_events */
  993. static struct strlist *get_kprobe_trace_command_rawlist(int fd)
  994. {
  995. int ret, idx;
  996. FILE *fp;
  997. char buf[MAX_CMDLEN];
  998. char *p;
  999. struct strlist *sl;
  1000. sl = strlist__new(true, NULL);
  1001. fp = fdopen(dup(fd), "r");
  1002. while (!feof(fp)) {
  1003. p = fgets(buf, MAX_CMDLEN, fp);
  1004. if (!p)
  1005. break;
  1006. idx = strlen(p) - 1;
  1007. if (p[idx] == '\n')
  1008. p[idx] = '\0';
  1009. ret = strlist__add(sl, buf);
  1010. if (ret < 0) {
  1011. pr_debug("strlist__add failed: %s\n", strerror(-ret));
  1012. strlist__delete(sl);
  1013. return NULL;
  1014. }
  1015. }
  1016. fclose(fp);
  1017. return sl;
  1018. }
  1019. /* Show an event */
  1020. static int show_perf_probe_event(struct perf_probe_event *pev)
  1021. {
  1022. int i, ret;
  1023. char buf[128];
  1024. char *place;
  1025. /* Synthesize only event probe point */
  1026. place = synthesize_perf_probe_point(&pev->point);
  1027. if (!place)
  1028. return -EINVAL;
  1029. ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
  1030. if (ret < 0)
  1031. return ret;
  1032. printf(" %-20s (on %s", buf, place);
  1033. if (pev->nargs > 0) {
  1034. printf(" with");
  1035. for (i = 0; i < pev->nargs; i++) {
  1036. ret = synthesize_perf_probe_arg(&pev->args[i],
  1037. buf, 128);
  1038. if (ret < 0)
  1039. break;
  1040. printf(" %s", buf);
  1041. }
  1042. }
  1043. printf(")\n");
  1044. free(place);
  1045. return ret;
  1046. }
  1047. /* List up current perf-probe events */
  1048. int show_perf_probe_events(void)
  1049. {
  1050. int fd, ret;
  1051. struct kprobe_trace_event tev;
  1052. struct perf_probe_event pev;
  1053. struct strlist *rawlist;
  1054. struct str_node *ent;
  1055. setup_pager();
  1056. ret = init_vmlinux();
  1057. if (ret < 0)
  1058. return ret;
  1059. memset(&tev, 0, sizeof(tev));
  1060. memset(&pev, 0, sizeof(pev));
  1061. fd = open_kprobe_events(false);
  1062. if (fd < 0)
  1063. return fd;
  1064. rawlist = get_kprobe_trace_command_rawlist(fd);
  1065. close(fd);
  1066. if (!rawlist)
  1067. return -ENOENT;
  1068. strlist__for_each(ent, rawlist) {
  1069. ret = parse_kprobe_trace_command(ent->s, &tev);
  1070. if (ret >= 0) {
  1071. ret = convert_to_perf_probe_event(&tev, &pev);
  1072. if (ret >= 0)
  1073. ret = show_perf_probe_event(&pev);
  1074. }
  1075. clear_perf_probe_event(&pev);
  1076. clear_kprobe_trace_event(&tev);
  1077. if (ret < 0)
  1078. break;
  1079. }
  1080. strlist__delete(rawlist);
  1081. return ret;
  1082. }
  1083. /* Get current perf-probe event names */
  1084. static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
  1085. {
  1086. char buf[128];
  1087. struct strlist *sl, *rawlist;
  1088. struct str_node *ent;
  1089. struct kprobe_trace_event tev;
  1090. int ret = 0;
  1091. memset(&tev, 0, sizeof(tev));
  1092. rawlist = get_kprobe_trace_command_rawlist(fd);
  1093. sl = strlist__new(true, NULL);
  1094. strlist__for_each(ent, rawlist) {
  1095. ret = parse_kprobe_trace_command(ent->s, &tev);
  1096. if (ret < 0)
  1097. break;
  1098. if (include_group) {
  1099. ret = e_snprintf(buf, 128, "%s:%s", tev.group,
  1100. tev.event);
  1101. if (ret >= 0)
  1102. ret = strlist__add(sl, buf);
  1103. } else
  1104. ret = strlist__add(sl, tev.event);
  1105. clear_kprobe_trace_event(&tev);
  1106. if (ret < 0)
  1107. break;
  1108. }
  1109. strlist__delete(rawlist);
  1110. if (ret < 0) {
  1111. strlist__delete(sl);
  1112. return NULL;
  1113. }
  1114. return sl;
  1115. }
  1116. static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
  1117. {
  1118. int ret = 0;
  1119. char *buf = synthesize_kprobe_trace_command(tev);
  1120. if (!buf) {
  1121. pr_debug("Failed to synthesize kprobe trace event.\n");
  1122. return -EINVAL;
  1123. }
  1124. pr_debug("Writing event: %s\n", buf);
  1125. if (!probe_event_dry_run) {
  1126. ret = write(fd, buf, strlen(buf));
  1127. if (ret <= 0)
  1128. pr_warning("Failed to write event: %s\n",
  1129. strerror(errno));
  1130. }
  1131. free(buf);
  1132. return ret;
  1133. }
  1134. static int get_new_event_name(char *buf, size_t len, const char *base,
  1135. struct strlist *namelist, bool allow_suffix)
  1136. {
  1137. int i, ret;
  1138. /* Try no suffix */
  1139. ret = e_snprintf(buf, len, "%s", base);
  1140. if (ret < 0) {
  1141. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1142. return ret;
  1143. }
  1144. if (!strlist__has_entry(namelist, buf))
  1145. return 0;
  1146. if (!allow_suffix) {
  1147. pr_warning("Error: event \"%s\" already exists. "
  1148. "(Use -f to force duplicates.)\n", base);
  1149. return -EEXIST;
  1150. }
  1151. /* Try to add suffix */
  1152. for (i = 1; i < MAX_EVENT_INDEX; i++) {
  1153. ret = e_snprintf(buf, len, "%s_%d", base, i);
  1154. if (ret < 0) {
  1155. pr_debug("snprintf() failed: %s\n", strerror(-ret));
  1156. return ret;
  1157. }
  1158. if (!strlist__has_entry(namelist, buf))
  1159. break;
  1160. }
  1161. if (i == MAX_EVENT_INDEX) {
  1162. pr_warning("Too many events are on the same function.\n");
  1163. ret = -ERANGE;
  1164. }
  1165. return ret;
  1166. }
  1167. static int __add_kprobe_trace_events(struct perf_probe_event *pev,
  1168. struct kprobe_trace_event *tevs,
  1169. int ntevs, bool allow_suffix)
  1170. {
  1171. int i, fd, ret;
  1172. struct kprobe_trace_event *tev = NULL;
  1173. char buf[64];
  1174. const char *event, *group;
  1175. struct strlist *namelist;
  1176. fd = open_kprobe_events(true);
  1177. if (fd < 0)
  1178. return fd;
  1179. /* Get current event names */
  1180. namelist = get_kprobe_trace_event_names(fd, false);
  1181. if (!namelist) {
  1182. pr_debug("Failed to get current event list.\n");
  1183. return -EIO;
  1184. }
  1185. ret = 0;
  1186. printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
  1187. for (i = 0; i < ntevs; i++) {
  1188. tev = &tevs[i];
  1189. if (pev->event)
  1190. event = pev->event;
  1191. else
  1192. if (pev->point.function)
  1193. event = pev->point.function;
  1194. else
  1195. event = tev->point.symbol;
  1196. if (pev->group)
  1197. group = pev->group;
  1198. else
  1199. group = PERFPROBE_GROUP;
  1200. /* Get an unused new event name */
  1201. ret = get_new_event_name(buf, 64, event,
  1202. namelist, allow_suffix);
  1203. if (ret < 0)
  1204. break;
  1205. event = buf;
  1206. tev->event = strdup(event);
  1207. tev->group = strdup(group);
  1208. if (tev->event == NULL || tev->group == NULL) {
  1209. ret = -ENOMEM;
  1210. break;
  1211. }
  1212. ret = write_kprobe_trace_event(fd, tev);
  1213. if (ret < 0)
  1214. break;
  1215. /* Add added event name to namelist */
  1216. strlist__add(namelist, event);
  1217. /* Trick here - save current event/group */
  1218. event = pev->event;
  1219. group = pev->group;
  1220. pev->event = tev->event;
  1221. pev->group = tev->group;
  1222. show_perf_probe_event(pev);
  1223. /* Trick here - restore current event/group */
  1224. pev->event = (char *)event;
  1225. pev->group = (char *)group;
  1226. /*
  1227. * Probes after the first probe which comes from same
  1228. * user input are always allowed to add suffix, because
  1229. * there might be several addresses corresponding to
  1230. * one code line.
  1231. */
  1232. allow_suffix = true;
  1233. }
  1234. if (ret >= 0) {
  1235. /* Show how to use the event. */
  1236. printf("\nYou can now use it on all perf tools, such as:\n\n");
  1237. printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
  1238. tev->event);
  1239. }
  1240. strlist__delete(namelist);
  1241. close(fd);
  1242. return ret;
  1243. }
  1244. static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
  1245. struct kprobe_trace_event **tevs)
  1246. {
  1247. struct symbol *sym;
  1248. int ret = 0, i;
  1249. struct kprobe_trace_event *tev;
  1250. /* Convert perf_probe_event with debuginfo */
  1251. ret = try_to_find_kprobe_trace_events(pev, tevs);
  1252. if (ret != 0)
  1253. return ret;
  1254. /* Allocate trace event buffer */
  1255. tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
  1256. if (tev == NULL)
  1257. return -ENOMEM;
  1258. /* Copy parameters */
  1259. tev->point.symbol = strdup(pev->point.function);
  1260. if (tev->point.symbol == NULL) {
  1261. ret = -ENOMEM;
  1262. goto error;
  1263. }
  1264. tev->point.offset = pev->point.offset;
  1265. tev->nargs = pev->nargs;
  1266. if (tev->nargs) {
  1267. tev->args = zalloc(sizeof(struct kprobe_trace_arg)
  1268. * tev->nargs);
  1269. if (tev->args == NULL) {
  1270. ret = -ENOMEM;
  1271. goto error;
  1272. }
  1273. for (i = 0; i < tev->nargs; i++) {
  1274. if (pev->args[i].name) {
  1275. tev->args[i].name = strdup(pev->args[i].name);
  1276. if (tev->args[i].name == NULL) {
  1277. ret = -ENOMEM;
  1278. goto error;
  1279. }
  1280. }
  1281. tev->args[i].value = strdup(pev->args[i].var);
  1282. if (tev->args[i].value == NULL) {
  1283. ret = -ENOMEM;
  1284. goto error;
  1285. }
  1286. if (pev->args[i].type) {
  1287. tev->args[i].type = strdup(pev->args[i].type);
  1288. if (tev->args[i].type == NULL) {
  1289. ret = -ENOMEM;
  1290. goto error;
  1291. }
  1292. }
  1293. }
  1294. }
  1295. /* Currently just checking function name from symbol map */
  1296. sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
  1297. tev->point.symbol, NULL);
  1298. if (!sym) {
  1299. pr_warning("Kernel symbol \'%s\' not found.\n",
  1300. tev->point.symbol);
  1301. ret = -ENOENT;
  1302. goto error;
  1303. }
  1304. return 1;
  1305. error:
  1306. clear_kprobe_trace_event(tev);
  1307. free(tev);
  1308. *tevs = NULL;
  1309. return ret;
  1310. }
  1311. struct __event_package {
  1312. struct perf_probe_event *pev;
  1313. struct kprobe_trace_event *tevs;
  1314. int ntevs;
  1315. };
  1316. int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
  1317. bool force_add)
  1318. {
  1319. int i, j, ret;
  1320. struct __event_package *pkgs;
  1321. pkgs = zalloc(sizeof(struct __event_package) * npevs);
  1322. if (pkgs == NULL)
  1323. return -ENOMEM;
  1324. /* Init vmlinux path */
  1325. ret = init_vmlinux();
  1326. if (ret < 0)
  1327. return ret;
  1328. /* Loop 1: convert all events */
  1329. for (i = 0; i < npevs; i++) {
  1330. pkgs[i].pev = &pevs[i];
  1331. /* Convert with or without debuginfo */
  1332. ret = convert_to_kprobe_trace_events(pkgs[i].pev,
  1333. &pkgs[i].tevs);
  1334. if (ret < 0)
  1335. goto end;
  1336. pkgs[i].ntevs = ret;
  1337. }
  1338. /* Loop 2: add all events */
  1339. for (i = 0; i < npevs && ret >= 0; i++)
  1340. ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
  1341. pkgs[i].ntevs, force_add);
  1342. end:
  1343. /* Loop 3: cleanup trace events */
  1344. for (i = 0; i < npevs; i++)
  1345. for (j = 0; j < pkgs[i].ntevs; j++)
  1346. clear_kprobe_trace_event(&pkgs[i].tevs[j]);
  1347. return ret;
  1348. }
  1349. static int __del_trace_kprobe_event(int fd, struct str_node *ent)
  1350. {
  1351. char *p;
  1352. char buf[128];
  1353. int ret;
  1354. /* Convert from perf-probe event to trace-kprobe event */
  1355. ret = e_snprintf(buf, 128, "-:%s", ent->s);
  1356. if (ret < 0)
  1357. goto error;
  1358. p = strchr(buf + 2, ':');
  1359. if (!p) {
  1360. pr_debug("Internal error: %s should have ':' but not.\n",
  1361. ent->s);
  1362. ret = -ENOTSUP;
  1363. goto error;
  1364. }
  1365. *p = '/';
  1366. pr_debug("Writing event: %s\n", buf);
  1367. ret = write(fd, buf, strlen(buf));
  1368. if (ret < 0)
  1369. goto error;
  1370. printf("Remove event: %s\n", ent->s);
  1371. return 0;
  1372. error:
  1373. pr_warning("Failed to delete event: %s\n", strerror(-ret));
  1374. return ret;
  1375. }
  1376. static int del_trace_kprobe_event(int fd, const char *group,
  1377. const char *event, struct strlist *namelist)
  1378. {
  1379. char buf[128];
  1380. struct str_node *ent, *n;
  1381. int found = 0, ret = 0;
  1382. ret = e_snprintf(buf, 128, "%s:%s", group, event);
  1383. if (ret < 0) {
  1384. pr_err("Failed to copy event.");
  1385. return ret;
  1386. }
  1387. if (strpbrk(buf, "*?")) { /* Glob-exp */
  1388. strlist__for_each_safe(ent, n, namelist)
  1389. if (strglobmatch(ent->s, buf)) {
  1390. found++;
  1391. ret = __del_trace_kprobe_event(fd, ent);
  1392. if (ret < 0)
  1393. break;
  1394. strlist__remove(namelist, ent);
  1395. }
  1396. } else {
  1397. ent = strlist__find(namelist, buf);
  1398. if (ent) {
  1399. found++;
  1400. ret = __del_trace_kprobe_event(fd, ent);
  1401. if (ret >= 0)
  1402. strlist__remove(namelist, ent);
  1403. }
  1404. }
  1405. if (found == 0 && ret >= 0)
  1406. pr_info("Info: Event \"%s\" does not exist.\n", buf);
  1407. return ret;
  1408. }
  1409. int del_perf_probe_events(struct strlist *dellist)
  1410. {
  1411. int fd, ret = 0;
  1412. const char *group, *event;
  1413. char *p, *str;
  1414. struct str_node *ent;
  1415. struct strlist *namelist;
  1416. fd = open_kprobe_events(true);
  1417. if (fd < 0)
  1418. return fd;
  1419. /* Get current event names */
  1420. namelist = get_kprobe_trace_event_names(fd, true);
  1421. if (namelist == NULL)
  1422. return -EINVAL;
  1423. strlist__for_each(ent, dellist) {
  1424. str = strdup(ent->s);
  1425. if (str == NULL) {
  1426. ret = -ENOMEM;
  1427. break;
  1428. }
  1429. pr_debug("Parsing: %s\n", str);
  1430. p = strchr(str, ':');
  1431. if (p) {
  1432. group = str;
  1433. *p = '\0';
  1434. event = p + 1;
  1435. } else {
  1436. group = "*";
  1437. event = str;
  1438. }
  1439. pr_debug("Group: %s, Event: %s\n", group, event);
  1440. ret = del_trace_kprobe_event(fd, group, event, namelist);
  1441. free(str);
  1442. if (ret < 0)
  1443. break;
  1444. }
  1445. strlist__delete(namelist);
  1446. close(fd);
  1447. return ret;
  1448. }