]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - tools/perf/util/probe-event.c
perf probe: Remove xzalloc() from util/probe-{event, finder}.c
[mirror_ubuntu-bionic-kernel.git] / tools / perf / util / probe-event.c
CommitLineData
50656eec
MH
1/*
2 * probe-event.c : perf-probe definition to kprobe_events format converter
3 *
4 * Written by Masami Hiramatsu <mhiramat@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 *
20 */
21
22#define _GNU_SOURCE
23#include <sys/utsname.h>
24#include <sys/types.h>
25#include <sys/stat.h>
26#include <fcntl.h>
27#include <errno.h>
28#include <stdio.h>
29#include <unistd.h>
30#include <stdlib.h>
31#include <string.h>
4de189fe
MH
32#include <stdarg.h>
33#include <limits.h>
50656eec
MH
34
35#undef _GNU_SOURCE
31facc5f 36#include "util.h"
50656eec 37#include "event.h"
e1c01d61 38#include "string.h"
4de189fe 39#include "strlist.h"
50656eec 40#include "debug.h"
72041334 41#include "cache.h"
631c9def 42#include "color.h"
e0faa8d3
MH
43#include "symbol.h"
44#include "thread.h"
4b4da7f7
MH
45#include "trace-event.h" /* For __unused */
46#include "parse-events.h" /* For debugfs_path */
50656eec 47#include "probe-event.h"
4235b045 48#include "probe-finder.h"
50656eec
MH
49
50#define MAX_CMDLEN 256
51#define MAX_PROBE_ARGS 128
52#define PERFPROBE_GROUP "probe"
53
f4d7da49
MH
54bool probe_event_dry_run; /* Dry run flag */
55
146a1439 56#define semantic_error(msg ...) pr_err("Semantic error :" msg)
50656eec 57
4de189fe 58/* If there is no space to write, returns -E2BIG. */
84988450
MH
59static int e_snprintf(char *str, size_t size, const char *format, ...)
60 __attribute__((format(printf, 3, 4)));
61
4de189fe
MH
62static int e_snprintf(char *str, size_t size, const char *format, ...)
63{
64 int ret;
65 va_list ap;
66 va_start(ap, format);
67 ret = vsnprintf(str, size, format, ap);
68 va_end(ap);
69 if (ret >= (int)size)
70 ret = -E2BIG;
71 return ret;
72}
73
4b4da7f7 74static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
e0faa8d3
MH
75static struct map_groups kmap_groups;
76static struct map *kmaps[MAP__NR_TYPES];
77
4b4da7f7 78/* Initialize symbol maps and path of vmlinux */
146a1439 79static int init_vmlinux(void)
e0faa8d3 80{
146a1439
MH
81 int ret;
82
e0faa8d3
MH
83 symbol_conf.sort_by_name = true;
84 if (symbol_conf.vmlinux_name == NULL)
85 symbol_conf.try_vmlinux_path = true;
86 else
87 pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
146a1439
MH
88 ret = symbol__init();
89 if (ret < 0) {
90 pr_debug("Failed to init symbol map.\n");
91 goto out;
92 }
e0faa8d3
MH
93
94 map_groups__init(&kmap_groups);
146a1439
MH
95 ret = map_groups__create_kernel_maps(&kmap_groups, kmaps);
96 if (ret < 0)
97 pr_debug("Failed to create kernel maps.\n");
98
99out:
100 if (ret < 0)
101 pr_warning("Failed to init vmlinux path.\n");
102 return ret;
e0faa8d3
MH
103}
104
4b4da7f7 105#ifdef DWARF_SUPPORT
e0faa8d3
MH
106static int open_vmlinux(void)
107{
108 if (map__load(kmaps[MAP__FUNCTION], NULL) < 0) {
109 pr_debug("Failed to load kernel map.\n");
110 return -EINVAL;
111 }
112 pr_debug("Try to open %s\n", kmaps[MAP__FUNCTION]->dso->long_name);
113 return open(kmaps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
114}
4b4da7f7 115
146a1439
MH
116/* Convert trace point to probe point with debuginfo */
117static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
118 struct perf_probe_point *pp)
4b4da7f7
MH
119{
120 struct symbol *sym;
146a1439 121 int fd, ret = -ENOENT;
4b4da7f7
MH
122
123 sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
124 tp->symbol, NULL);
125 if (sym) {
126 fd = open_vmlinux();
146a1439
MH
127 if (fd >= 0) {
128 ret = find_perf_probe_point(fd,
129 sym->start + tp->offset, pp);
130 close(fd);
131 }
4b4da7f7
MH
132 }
133 if (ret <= 0) {
146a1439
MH
134 pr_debug("Failed to find corresponding probes from "
135 "debuginfo. Use kprobe event information.\n");
4b4da7f7
MH
136 pp->function = xstrdup(tp->symbol);
137 pp->offset = tp->offset;
138 }
139 pp->retprobe = tp->retprobe;
146a1439
MH
140
141 return 0;
4b4da7f7
MH
142}
143
144/* Try to find perf_probe_event with debuginfo */
145static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
146 struct kprobe_trace_event **tevs)
147{
148 bool need_dwarf = perf_probe_event_need_dwarf(pev);
149 int fd, ntevs;
150
151 fd = open_vmlinux();
152 if (fd < 0) {
146a1439
MH
153 if (need_dwarf) {
154 pr_warning("Failed to open debuginfo file.\n");
155 return fd;
156 }
4b4da7f7
MH
157 pr_debug("Could not open vmlinux. Try to use symbols.\n");
158 return 0;
159 }
160
161 /* Searching trace events corresponding to probe event */
162 ntevs = find_kprobe_trace_events(fd, pev, tevs);
163 close(fd);
164
146a1439
MH
165 if (ntevs > 0) { /* Succeeded to find trace events */
166 pr_debug("find %d kprobe_trace_events.\n", ntevs);
4b4da7f7 167 return ntevs;
146a1439 168 }
4b4da7f7 169
146a1439
MH
170 if (ntevs == 0) { /* No error but failed to find probe point. */
171 pr_warning("Probe point '%s' not found.\n",
172 synthesize_perf_probe_point(&pev->point));
173 return -ENOENT;
174 }
175 /* Error path : ntevs < 0 */
4b4da7f7 176 if (need_dwarf) {
b55a87ad 177 if (ntevs == -EBADF)
4b4da7f7
MH
178 pr_warning("No dwarf info found in the vmlinux - "
179 "please rebuild with CONFIG_DEBUG_INFO=y.\n");
146a1439 180 return ntevs;
4b4da7f7
MH
181 }
182 pr_debug("An error occurred in debuginfo analysis."
183 " Try to use symbols.\n");
184 return 0;
4b4da7f7
MH
185}
186
187#define LINEBUF_SIZE 256
188#define NR_ADDITIONAL_LINES 2
189
146a1439 190static int show_one_line(FILE *fp, unsigned int l, bool skip, bool show_num)
4b4da7f7
MH
191{
192 char buf[LINEBUF_SIZE];
193 const char *color = PERF_COLOR_BLUE;
194
195 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
196 goto error;
197 if (!skip) {
198 if (show_num)
199 fprintf(stdout, "%7u %s", l, buf);
200 else
201 color_fprintf(stdout, color, " %s", buf);
202 }
203
204 while (strlen(buf) == LINEBUF_SIZE - 1 &&
205 buf[LINEBUF_SIZE - 2] != '\n') {
206 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
207 goto error;
208 if (!skip) {
209 if (show_num)
210 fprintf(stdout, "%s", buf);
211 else
212 color_fprintf(stdout, color, "%s", buf);
213 }
214 }
146a1439
MH
215
216 return 0;
4b4da7f7
MH
217error:
218 if (feof(fp))
146a1439 219 pr_warning("Source file is shorter than expected.\n");
4b4da7f7 220 else
146a1439
MH
221 pr_warning("File read error: %s\n", strerror(errno));
222
223 return -1;
4b4da7f7
MH
224}
225
226/*
227 * Show line-range always requires debuginfo to find source file and
228 * line number.
229 */
146a1439 230int show_line_range(struct line_range *lr)
4b4da7f7
MH
231{
232 unsigned int l = 1;
233 struct line_node *ln;
234 FILE *fp;
235 int fd, ret;
236
237 /* Search a line range */
146a1439
MH
238 ret = init_vmlinux();
239 if (ret < 0)
240 return ret;
241
4b4da7f7 242 fd = open_vmlinux();
146a1439
MH
243 if (fd < 0) {
244 pr_warning("Failed to open debuginfo file.\n");
245 return fd;
246 }
247
4b4da7f7 248 ret = find_line_range(fd, lr);
4b4da7f7 249 close(fd);
146a1439
MH
250 if (ret == 0) {
251 pr_warning("Specified source line is not found.\n");
252 return -ENOENT;
253 } else if (ret < 0) {
254 pr_warning("Debuginfo analysis failed. (%d)\n", ret);
255 return ret;
256 }
4b4da7f7
MH
257
258 setup_pager();
259
260 if (lr->function)
261 fprintf(stdout, "<%s:%d>\n", lr->function,
262 lr->start - lr->offset);
263 else
264 fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
265
266 fp = fopen(lr->path, "r");
146a1439
MH
267 if (fp == NULL) {
268 pr_warning("Failed to open %s: %s\n", lr->path,
269 strerror(errno));
270 return -errno;
271 }
4b4da7f7 272 /* Skip to starting line number */
146a1439
MH
273 while (l < lr->start && ret >= 0)
274 ret = show_one_line(fp, l++, true, false);
275 if (ret < 0)
276 goto end;
4b4da7f7
MH
277
278 list_for_each_entry(ln, &lr->line_list, list) {
146a1439
MH
279 while (ln->line > l && ret >= 0)
280 ret = show_one_line(fp, (l++) - lr->offset,
281 false, false);
282 if (ret >= 0)
283 ret = show_one_line(fp, (l++) - lr->offset,
284 false, true);
285 if (ret < 0)
286 goto end;
4b4da7f7
MH
287 }
288
289 if (lr->end == INT_MAX)
290 lr->end = l + NR_ADDITIONAL_LINES;
146a1439
MH
291 while (l < lr->end && !feof(fp) && ret >= 0)
292 ret = show_one_line(fp, (l++) - lr->offset, false, false);
293end:
4b4da7f7 294 fclose(fp);
146a1439 295 return ret;
4b4da7f7
MH
296}
297
298#else /* !DWARF_SUPPORT */
299
146a1439 300static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
4b4da7f7
MH
301 struct perf_probe_point *pp)
302{
303 pp->function = xstrdup(tp->symbol);
304 pp->offset = tp->offset;
305 pp->retprobe = tp->retprobe;
146a1439
MH
306
307 return 0;
4b4da7f7
MH
308}
309
310static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
311 struct kprobe_trace_event **tevs __unused)
312{
146a1439
MH
313 if (perf_probe_event_need_dwarf(pev)) {
314 pr_warning("Debuginfo-analysis is not supported.\n");
315 return -ENOSYS;
316 }
4b4da7f7
MH
317 return 0;
318}
319
146a1439 320int show_line_range(struct line_range *lr __unused)
4b4da7f7 321{
146a1439
MH
322 pr_warning("Debuginfo-analysis is not supported.\n");
323 return -ENOSYS;
4b4da7f7
MH
324}
325
e0faa8d3
MH
326#endif
327
146a1439 328int parse_line_range_desc(const char *arg, struct line_range *lr)
631c9def
MH
329{
330 const char *ptr;
331 char *tmp;
332 /*
333 * <Syntax>
334 * SRC:SLN[+NUM|-ELN]
335 * FUNC[:SLN[+NUM|-ELN]]
336 */
337 ptr = strchr(arg, ':');
338 if (ptr) {
339 lr->start = (unsigned int)strtoul(ptr + 1, &tmp, 0);
340 if (*tmp == '+')
341 lr->end = lr->start + (unsigned int)strtoul(tmp + 1,
342 &tmp, 0);
343 else if (*tmp == '-')
344 lr->end = (unsigned int)strtoul(tmp + 1, &tmp, 0);
345 else
346 lr->end = 0;
347 pr_debug("Line range is %u to %u\n", lr->start, lr->end);
146a1439 348 if (lr->end && lr->start > lr->end) {
631c9def 349 semantic_error("Start line must be smaller"
146a1439
MH
350 " than end line.\n");
351 return -EINVAL;
352 }
353 if (*tmp != '\0') {
354 semantic_error("Tailing with invalid character '%d'.\n",
631c9def 355 *tmp);
146a1439
MH
356 return -EINVAL;
357 }
31facc5f 358 tmp = xstrndup(arg, (ptr - arg));
631c9def 359 } else
31facc5f 360 tmp = xstrdup(arg);
631c9def
MH
361
362 if (strchr(tmp, '.'))
363 lr->file = tmp;
364 else
365 lr->function = tmp;
146a1439
MH
366
367 return 0;
631c9def
MH
368}
369
b7702a21
MH
370/* Check the name is good for event/group */
371static bool check_event_name(const char *name)
372{
373 if (!isalpha(*name) && *name != '_')
374 return false;
375 while (*++name != '\0') {
376 if (!isalpha(*name) && !isdigit(*name) && *name != '_')
377 return false;
378 }
379 return true;
380}
381
50656eec 382/* Parse probepoint definition. */
146a1439 383static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
50656eec 384{
4235b045 385 struct perf_probe_point *pp = &pev->point;
50656eec
MH
386 char *ptr, *tmp;
387 char c, nc = 0;
388 /*
389 * <Syntax>
2a9c8c36
MH
390 * perf probe [EVENT=]SRC[:LN|;PTN]
391 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
af663d75
MH
392 *
393 * TODO:Group name support
50656eec
MH
394 */
395
2a9c8c36
MH
396 ptr = strpbrk(arg, ";=@+%");
397 if (ptr && *ptr == '=') { /* Event name */
af663d75
MH
398 *ptr = '\0';
399 tmp = ptr + 1;
146a1439
MH
400 if (strchr(arg, ':')) {
401 semantic_error("Group name is not supported yet.\n");
402 return -ENOTSUP;
403 }
404 if (!check_event_name(arg)) {
b7702a21 405 semantic_error("%s is bad for event name -it must "
146a1439
MH
406 "follow C symbol-naming rule.\n", arg);
407 return -EINVAL;
408 }
4235b045
MH
409 pev->event = xstrdup(arg);
410 pev->group = NULL;
af663d75
MH
411 arg = tmp;
412 }
413
2a9c8c36 414 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
415 if (ptr) {
416 nc = *ptr;
417 *ptr++ = '\0';
418 }
419
420 /* Check arg is function or file and copy it */
421 if (strchr(arg, '.')) /* File */
31facc5f 422 pp->file = xstrdup(arg);
50656eec 423 else /* Function */
31facc5f 424 pp->function = xstrdup(arg);
50656eec
MH
425
426 /* Parse other options */
427 while (ptr) {
428 arg = ptr;
429 c = nc;
2a9c8c36 430 if (c == ';') { /* Lazy pattern must be the last part */
31facc5f 431 pp->lazy_line = xstrdup(arg);
2a9c8c36
MH
432 break;
433 }
434 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
435 if (ptr) {
436 nc = *ptr;
437 *ptr++ = '\0';
438 }
439 switch (c) {
440 case ':': /* Line number */
441 pp->line = strtoul(arg, &tmp, 0);
146a1439 442 if (*tmp != '\0') {
2a9c8c36 443 semantic_error("There is non-digit char"
146a1439
MH
444 " in line number.\n");
445 return -EINVAL;
446 }
50656eec
MH
447 break;
448 case '+': /* Byte offset from a symbol */
449 pp->offset = strtoul(arg, &tmp, 0);
146a1439 450 if (*tmp != '\0') {
2a9c8c36 451 semantic_error("There is non-digit character"
146a1439
MH
452 " in offset.\n");
453 return -EINVAL;
454 }
50656eec
MH
455 break;
456 case '@': /* File name */
146a1439
MH
457 if (pp->file) {
458 semantic_error("SRC@SRC is not allowed.\n");
459 return -EINVAL;
460 }
31facc5f 461 pp->file = xstrdup(arg);
50656eec
MH
462 break;
463 case '%': /* Probe places */
464 if (strcmp(arg, "return") == 0) {
465 pp->retprobe = 1;
146a1439
MH
466 } else { /* Others not supported yet */
467 semantic_error("%%%s is not supported.\n", arg);
468 return -ENOTSUP;
469 }
50656eec 470 break;
146a1439
MH
471 default: /* Buggy case */
472 pr_err("This program has a bug at %s:%d.\n",
473 __FILE__, __LINE__);
474 return -ENOTSUP;
50656eec
MH
475 break;
476 }
477 }
478
479 /* Exclusion check */
146a1439 480 if (pp->lazy_line && pp->line) {
2a9c8c36 481 semantic_error("Lazy pattern can't be used with line number.");
146a1439
MH
482 return -EINVAL;
483 }
2a9c8c36 484
146a1439 485 if (pp->lazy_line && pp->offset) {
2a9c8c36 486 semantic_error("Lazy pattern can't be used with offset.");
146a1439
MH
487 return -EINVAL;
488 }
2a9c8c36 489
146a1439 490 if (pp->line && pp->offset) {
50656eec 491 semantic_error("Offset can't be used with line number.");
146a1439
MH
492 return -EINVAL;
493 }
50656eec 494
146a1439 495 if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
2a9c8c36
MH
496 semantic_error("File always requires line number or "
497 "lazy pattern.");
146a1439
MH
498 return -EINVAL;
499 }
50656eec 500
146a1439 501 if (pp->offset && !pp->function) {
50656eec 502 semantic_error("Offset requires an entry function.");
146a1439
MH
503 return -EINVAL;
504 }
50656eec 505
146a1439 506 if (pp->retprobe && !pp->function) {
50656eec 507 semantic_error("Return probe requires an entry function.");
146a1439
MH
508 return -EINVAL;
509 }
50656eec 510
146a1439 511 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
2a9c8c36
MH
512 semantic_error("Offset/Line/Lazy pattern can't be used with "
513 "return probe.");
146a1439
MH
514 return -EINVAL;
515 }
50656eec 516
4235b045 517 pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
2a9c8c36
MH
518 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
519 pp->lazy_line);
146a1439 520 return 0;
50656eec
MH
521}
522
7df2f329 523/* Parse perf-probe event argument */
146a1439 524static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
7df2f329 525{
48481938 526 char *tmp;
7df2f329
MH
527 struct perf_probe_arg_field **fieldp;
528
529 pr_debug("parsing arg: %s into ", str);
530
48481938
MH
531 tmp = strchr(str, '=');
532 if (tmp) {
533 arg->name = xstrndup(str, tmp - str);
11a1ca35 534 pr_debug("name:%s ", arg->name);
48481938
MH
535 str = tmp + 1;
536 }
537
11a1ca35
MH
538 tmp = strchr(str, ':');
539 if (tmp) { /* Type setting */
540 *tmp = '\0';
541 arg->type = xstrdup(tmp + 1);
542 pr_debug("type:%s ", arg->type);
543 }
544
7df2f329
MH
545 tmp = strpbrk(str, "-.");
546 if (!is_c_varname(str) || !tmp) {
547 /* A variable, register, symbol or special value */
48481938
MH
548 arg->var = xstrdup(str);
549 pr_debug("%s\n", arg->var);
146a1439 550 return 0;
7df2f329
MH
551 }
552
553 /* Structure fields */
48481938
MH
554 arg->var = xstrndup(str, tmp - str);
555 pr_debug("%s, ", arg->var);
7df2f329
MH
556 fieldp = &arg->field;
557
558 do {
e334016f
MH
559 *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
560 if (*fieldp == NULL)
561 return -ENOMEM;
7df2f329
MH
562 if (*tmp == '.') {
563 str = tmp + 1;
564 (*fieldp)->ref = false;
565 } else if (tmp[1] == '>') {
566 str = tmp + 2;
567 (*fieldp)->ref = true;
146a1439
MH
568 } else {
569 semantic_error("Argument parse error: %s\n", str);
570 return -EINVAL;
571 }
7df2f329
MH
572
573 tmp = strpbrk(str, "-.");
574 if (tmp) {
575 (*fieldp)->name = xstrndup(str, tmp - str);
576 pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
577 fieldp = &(*fieldp)->next;
578 }
579 } while (tmp);
580 (*fieldp)->name = xstrdup(str);
581 pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
df0faf4b
MH
582
583 /* If no name is specified, set the last field name */
584 if (!arg->name)
585 arg->name = xstrdup((*fieldp)->name);
146a1439
MH
586
587 return 0;
7df2f329
MH
588}
589
4235b045 590/* Parse perf-probe event command */
146a1439 591int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
50656eec 592{
e1c01d61 593 char **argv;
146a1439 594 int argc, i, ret = 0;
fac13fd5 595
4235b045 596 argv = argv_split(cmd, &argc);
146a1439
MH
597 if (!argv) {
598 pr_debug("Failed to split arguments.\n");
599 return -ENOMEM;
600 }
601 if (argc - 1 > MAX_PROBE_ARGS) {
602 semantic_error("Too many probe arguments (%d).\n", argc - 1);
603 ret = -ERANGE;
604 goto out;
605 }
50656eec 606 /* Parse probe point */
146a1439
MH
607 ret = parse_perf_probe_point(argv[0], pev);
608 if (ret < 0)
609 goto out;
50656eec 610
e1c01d61 611 /* Copy arguments and ensure return probe has no C argument */
4235b045 612 pev->nargs = argc - 1;
e334016f
MH
613 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
614 if (pev->args == NULL) {
615 ret = -ENOMEM;
616 goto out;
617 }
146a1439
MH
618 for (i = 0; i < pev->nargs && ret >= 0; i++) {
619 ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
620 if (ret >= 0 &&
621 is_c_varname(pev->args[i].var) && pev->point.retprobe) {
4235b045 622 semantic_error("You can't specify local variable for"
146a1439
MH
623 " kretprobe.\n");
624 ret = -EINVAL;
625 }
e1c01d61 626 }
146a1439 627out:
e1c01d61 628 argv_free(argv);
146a1439
MH
629
630 return ret;
50656eec
MH
631}
632
4235b045
MH
633/* Return true if this perf_probe_event requires debuginfo */
634bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
635{
636 int i;
637
638 if (pev->point.file || pev->point.line || pev->point.lazy_line)
639 return true;
640
641 for (i = 0; i < pev->nargs; i++)
48481938 642 if (is_c_varname(pev->args[i].var))
4235b045
MH
643 return true;
644
645 return false;
646}
647
4de189fe 648/* Parse kprobe_events event into struct probe_point */
146a1439 649int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
4de189fe 650{
4235b045 651 struct kprobe_trace_point *tp = &tev->point;
4de189fe
MH
652 char pr;
653 char *p;
654 int ret, i, argc;
655 char **argv;
656
4235b045
MH
657 pr_debug("Parsing kprobe_events: %s\n", cmd);
658 argv = argv_split(cmd, &argc);
146a1439
MH
659 if (!argv) {
660 pr_debug("Failed to split arguments.\n");
661 return -ENOMEM;
662 }
663 if (argc < 2) {
664 semantic_error("Too few probe arguments.\n");
665 ret = -ERANGE;
666 goto out;
667 }
4de189fe
MH
668
669 /* Scan event and group name. */
93aaa45a 670 ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
4235b045
MH
671 &pr, (float *)(void *)&tev->group,
672 (float *)(void *)&tev->event);
146a1439
MH
673 if (ret != 3) {
674 semantic_error("Failed to parse event name: %s\n", argv[0]);
675 ret = -EINVAL;
676 goto out;
677 }
4235b045 678 pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
4de189fe 679
4235b045 680 tp->retprobe = (pr == 'r');
4de189fe
MH
681
682 /* Scan function name and offset */
4235b045
MH
683 ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
684 &tp->offset);
4de189fe 685 if (ret == 1)
4235b045 686 tp->offset = 0;
4de189fe 687
4235b045 688 tev->nargs = argc - 2;
e334016f
MH
689 tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
690 if (tev->args == NULL) {
691 ret = -ENOMEM;
692 goto out;
693 }
4235b045 694 for (i = 0; i < tev->nargs; i++) {
4de189fe
MH
695 p = strchr(argv[i + 2], '=');
696 if (p) /* We don't need which register is assigned. */
4235b045
MH
697 *p++ = '\0';
698 else
699 p = argv[i + 2];
700 tev->args[i].name = xstrdup(argv[i + 2]);
701 /* TODO: parse regs and offset */
702 tev->args[i].value = xstrdup(p);
4de189fe 703 }
146a1439
MH
704 ret = 0;
705out:
4de189fe 706 argv_free(argv);
146a1439 707 return ret;
4de189fe
MH
708}
709
7df2f329
MH
710/* Compose only probe arg */
711int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
712{
713 struct perf_probe_arg_field *field = pa->field;
714 int ret;
715 char *tmp = buf;
716
48481938
MH
717 if (pa->name && pa->var)
718 ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
719 else
720 ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
7df2f329
MH
721 if (ret <= 0)
722 goto error;
723 tmp += ret;
724 len -= ret;
725
726 while (field) {
727 ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
728 field->name);
729 if (ret <= 0)
730 goto error;
731 tmp += ret;
732 len -= ret;
733 field = field->next;
734 }
11a1ca35
MH
735
736 if (pa->type) {
737 ret = e_snprintf(tmp, len, ":%s", pa->type);
738 if (ret <= 0)
739 goto error;
740 tmp += ret;
741 len -= ret;
742 }
743
7df2f329
MH
744 return tmp - buf;
745error:
146a1439
MH
746 pr_debug("Failed to synthesize perf probe argument: %s",
747 strerror(-ret));
748 return ret;
7df2f329
MH
749}
750
4235b045
MH
751/* Compose only probe point (not argument) */
752static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
4de189fe 753{
fb1587d8
MH
754 char *buf, *tmp;
755 char offs[32] = "", line[32] = "", file[32] = "";
756 int ret, len;
4de189fe 757
e334016f
MH
758 buf = zalloc(MAX_CMDLEN);
759 if (buf == NULL) {
760 ret = -ENOMEM;
761 goto error;
762 }
4de189fe 763 if (pp->offset) {
fb1587d8 764 ret = e_snprintf(offs, 32, "+%lu", pp->offset);
4de189fe
MH
765 if (ret <= 0)
766 goto error;
767 }
768 if (pp->line) {
fb1587d8
MH
769 ret = e_snprintf(line, 32, ":%d", pp->line);
770 if (ret <= 0)
771 goto error;
772 }
773 if (pp->file) {
774 len = strlen(pp->file) - 32;
775 if (len < 0)
776 len = 0;
777 tmp = strchr(pp->file + len, '/');
778 if (!tmp)
779 tmp = pp->file + len - 1;
780 ret = e_snprintf(file, 32, "@%s", tmp + 1);
4de189fe
MH
781 if (ret <= 0)
782 goto error;
783 }
784
785 if (pp->function)
fb1587d8
MH
786 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
787 offs, pp->retprobe ? "%return" : "", line,
788 file);
4de189fe 789 else
fb1587d8 790 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
4235b045
MH
791 if (ret <= 0)
792 goto error;
793
794 return buf;
7ef17aaf 795error:
146a1439
MH
796 pr_debug("Failed to synthesize perf probe point: %s",
797 strerror(-ret));
e334016f
MH
798 if (buf)
799 free(buf);
146a1439 800 return NULL;
7ef17aaf
MH
801}
802
4235b045
MH
803#if 0
804char *synthesize_perf_probe_command(struct perf_probe_event *pev)
7ef17aaf
MH
805{
806 char *buf;
807 int i, len, ret;
808
4235b045
MH
809 buf = synthesize_perf_probe_point(&pev->point);
810 if (!buf)
811 return NULL;
4de189fe 812
4235b045
MH
813 len = strlen(buf);
814 for (i = 0; i < pev->nargs; i++) {
4de189fe 815 ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
4235b045
MH
816 pev->args[i].name);
817 if (ret <= 0) {
818 free(buf);
819 return NULL;
820 }
4de189fe
MH
821 len += ret;
822 }
4de189fe 823
4235b045
MH
824 return buf;
825}
826#endif
827
828static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
829 char **buf, size_t *buflen,
830 int depth)
831{
832 int ret;
833 if (ref->next) {
834 depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
835 buflen, depth + 1);
836 if (depth < 0)
837 goto out;
838 }
839
840 ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
841 if (ret < 0)
842 depth = ret;
843 else {
844 *buf += ret;
845 *buflen -= ret;
846 }
847out:
848 return depth;
4de189fe 849
4de189fe
MH
850}
851
4235b045
MH
852static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
853 char *buf, size_t buflen)
50656eec 854{
4235b045
MH
855 int ret, depth = 0;
856 char *tmp = buf;
857
858 /* Argument name or separator */
859 if (arg->name)
860 ret = e_snprintf(buf, buflen, " %s=", arg->name);
861 else
862 ret = e_snprintf(buf, buflen, " ");
863 if (ret < 0)
864 return ret;
865 buf += ret;
866 buflen -= ret;
867
868 /* Dereferencing arguments */
869 if (arg->ref) {
870 depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
871 &buflen, 1);
872 if (depth < 0)
873 return depth;
874 }
875
876 /* Print argument value */
877 ret = e_snprintf(buf, buflen, "%s", arg->value);
878 if (ret < 0)
879 return ret;
880 buf += ret;
881 buflen -= ret;
882
883 /* Closing */
884 while (depth--) {
885 ret = e_snprintf(buf, buflen, ")");
886 if (ret < 0)
887 return ret;
888 buf += ret;
889 buflen -= ret;
890 }
4984912e
MH
891 /* Print argument type */
892 if (arg->type) {
893 ret = e_snprintf(buf, buflen, ":%s", arg->type);
894 if (ret <= 0)
895 return ret;
896 buf += ret;
897 }
4235b045
MH
898
899 return buf - tmp;
900}
901
902char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
903{
904 struct kprobe_trace_point *tp = &tev->point;
50656eec
MH
905 char *buf;
906 int i, len, ret;
907
e334016f
MH
908 buf = zalloc(MAX_CMDLEN);
909 if (buf == NULL)
910 return NULL;
911
4235b045
MH
912 len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
913 tp->retprobe ? 'r' : 'p',
914 tev->group, tev->event,
915 tp->symbol, tp->offset);
916 if (len <= 0)
50656eec 917 goto error;
50656eec 918
4235b045
MH
919 for (i = 0; i < tev->nargs; i++) {
920 ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
921 MAX_CMDLEN - len);
4de189fe 922 if (ret <= 0)
50656eec
MH
923 goto error;
924 len += ret;
925 }
50656eec 926
4235b045 927 return buf;
50656eec 928error:
4235b045
MH
929 free(buf);
930 return NULL;
931}
50656eec 932
146a1439
MH
933int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
934 struct perf_probe_event *pev)
4235b045
MH
935{
936 char buf[64];
146a1439 937 int i, ret;
4235b045 938
4b4da7f7 939 /* Convert event/group name */
fb1587d8
MH
940 pev->event = xstrdup(tev->event);
941 pev->group = xstrdup(tev->group);
942
4b4da7f7 943 /* Convert trace_point to probe_point */
146a1439
MH
944 ret = convert_to_perf_probe_point(&tev->point, &pev->point);
945 if (ret < 0)
946 return ret;
4b4da7f7 947
4235b045
MH
948 /* Convert trace_arg to probe_arg */
949 pev->nargs = tev->nargs;
e334016f
MH
950 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
951 if (pev->args == NULL)
952 return -ENOMEM;
146a1439 953 for (i = 0; i < tev->nargs && ret >= 0; i++)
4235b045
MH
954 if (tev->args[i].name)
955 pev->args[i].name = xstrdup(tev->args[i].name);
956 else {
146a1439
MH
957 ret = synthesize_kprobe_trace_arg(&tev->args[i],
958 buf, 64);
4235b045
MH
959 pev->args[i].name = xstrdup(buf);
960 }
146a1439
MH
961
962 if (ret < 0)
963 clear_perf_probe_event(pev);
964
965 return ret;
4235b045
MH
966}
967
968void clear_perf_probe_event(struct perf_probe_event *pev)
969{
970 struct perf_probe_point *pp = &pev->point;
7df2f329 971 struct perf_probe_arg_field *field, *next;
4235b045
MH
972 int i;
973
974 if (pev->event)
975 free(pev->event);
976 if (pev->group)
977 free(pev->group);
978 if (pp->file)
979 free(pp->file);
980 if (pp->function)
981 free(pp->function);
982 if (pp->lazy_line)
983 free(pp->lazy_line);
7df2f329 984 for (i = 0; i < pev->nargs; i++) {
4235b045
MH
985 if (pev->args[i].name)
986 free(pev->args[i].name);
48481938
MH
987 if (pev->args[i].var)
988 free(pev->args[i].var);
11a1ca35
MH
989 if (pev->args[i].type)
990 free(pev->args[i].type);
7df2f329
MH
991 field = pev->args[i].field;
992 while (field) {
993 next = field->next;
994 if (field->name)
995 free(field->name);
996 free(field);
997 field = next;
998 }
999 }
4235b045
MH
1000 if (pev->args)
1001 free(pev->args);
1002 memset(pev, 0, sizeof(*pev));
1003}
1004
1005void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
1006{
1007 struct kprobe_trace_arg_ref *ref, *next;
1008 int i;
1009
1010 if (tev->event)
1011 free(tev->event);
1012 if (tev->group)
1013 free(tev->group);
1014 if (tev->point.symbol)
1015 free(tev->point.symbol);
1016 for (i = 0; i < tev->nargs; i++) {
1017 if (tev->args[i].name)
1018 free(tev->args[i].name);
1019 if (tev->args[i].value)
1020 free(tev->args[i].value);
4984912e
MH
1021 if (tev->args[i].type)
1022 free(tev->args[i].type);
4235b045
MH
1023 ref = tev->args[i].ref;
1024 while (ref) {
1025 next = ref->next;
1026 free(ref);
1027 ref = next;
1028 }
1029 }
1030 if (tev->args)
1031 free(tev->args);
1032 memset(tev, 0, sizeof(*tev));
50656eec
MH
1033}
1034
f4d7da49 1035static int open_kprobe_events(bool readwrite)
4de189fe
MH
1036{
1037 char buf[PATH_MAX];
1038 int ret;
1039
1040 ret = e_snprintf(buf, PATH_MAX, "%s/../kprobe_events", debugfs_path);
146a1439
MH
1041 if (ret >= 0) {
1042 if (readwrite && !probe_event_dry_run)
1043 ret = open(buf, O_RDWR, O_APPEND);
1044 else
1045 ret = open(buf, O_RDONLY, 0);
1046 }
f4d7da49 1047
4de189fe
MH
1048 if (ret < 0) {
1049 if (errno == ENOENT)
146a1439
MH
1050 pr_warning("kprobe_events file does not exist - please"
1051 " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
4de189fe 1052 else
146a1439
MH
1053 pr_warning("Failed to open kprobe_events file: %s\n",
1054 strerror(errno));
4de189fe
MH
1055 }
1056 return ret;
1057}
1058
1059/* Get raw string list of current kprobe_events */
4235b045 1060static struct strlist *get_kprobe_trace_command_rawlist(int fd)
4de189fe
MH
1061{
1062 int ret, idx;
1063 FILE *fp;
1064 char buf[MAX_CMDLEN];
1065 char *p;
1066 struct strlist *sl;
1067
1068 sl = strlist__new(true, NULL);
1069
1070 fp = fdopen(dup(fd), "r");
1071 while (!feof(fp)) {
1072 p = fgets(buf, MAX_CMDLEN, fp);
1073 if (!p)
1074 break;
1075
1076 idx = strlen(p) - 1;
1077 if (p[idx] == '\n')
1078 p[idx] = '\0';
1079 ret = strlist__add(sl, buf);
146a1439
MH
1080 if (ret < 0) {
1081 pr_debug("strlist__add failed: %s\n", strerror(-ret));
1082 strlist__delete(sl);
1083 return NULL;
1084 }
4de189fe
MH
1085 }
1086 fclose(fp);
1087
1088 return sl;
1089}
1090
278498d4 1091/* Show an event */
146a1439 1092static int show_perf_probe_event(struct perf_probe_event *pev)
278498d4 1093{
7e990a51 1094 int i, ret;
278498d4 1095 char buf[128];
4235b045 1096 char *place;
278498d4 1097
4235b045
MH
1098 /* Synthesize only event probe point */
1099 place = synthesize_perf_probe_point(&pev->point);
146a1439
MH
1100 if (!place)
1101 return -EINVAL;
4235b045
MH
1102
1103 ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
7e990a51 1104 if (ret < 0)
146a1439
MH
1105 return ret;
1106
fb1587d8 1107 printf(" %-20s (on %s", buf, place);
278498d4 1108
4235b045 1109 if (pev->nargs > 0) {
278498d4 1110 printf(" with");
7df2f329 1111 for (i = 0; i < pev->nargs; i++) {
146a1439
MH
1112 ret = synthesize_perf_probe_arg(&pev->args[i],
1113 buf, 128);
1114 if (ret < 0)
1115 break;
7df2f329
MH
1116 printf(" %s", buf);
1117 }
278498d4
MH
1118 }
1119 printf(")\n");
4235b045 1120 free(place);
146a1439 1121 return ret;
278498d4
MH
1122}
1123
4de189fe 1124/* List up current perf-probe events */
146a1439 1125int show_perf_probe_events(void)
4de189fe 1126{
146a1439 1127 int fd, ret;
4235b045
MH
1128 struct kprobe_trace_event tev;
1129 struct perf_probe_event pev;
4de189fe
MH
1130 struct strlist *rawlist;
1131 struct str_node *ent;
1132
72041334 1133 setup_pager();
146a1439
MH
1134 ret = init_vmlinux();
1135 if (ret < 0)
1136 return ret;
4235b045
MH
1137
1138 memset(&tev, 0, sizeof(tev));
1139 memset(&pev, 0, sizeof(pev));
72041334 1140
f4d7da49 1141 fd = open_kprobe_events(false);
146a1439
MH
1142 if (fd < 0)
1143 return fd;
1144
4235b045 1145 rawlist = get_kprobe_trace_command_rawlist(fd);
4de189fe 1146 close(fd);
146a1439
MH
1147 if (!rawlist)
1148 return -ENOENT;
4de189fe 1149
adf365f4 1150 strlist__for_each(ent, rawlist) {
146a1439
MH
1151 ret = parse_kprobe_trace_command(ent->s, &tev);
1152 if (ret >= 0) {
1153 ret = convert_to_perf_probe_event(&tev, &pev);
1154 if (ret >= 0)
1155 ret = show_perf_probe_event(&pev);
1156 }
4235b045
MH
1157 clear_perf_probe_event(&pev);
1158 clear_kprobe_trace_event(&tev);
146a1439
MH
1159 if (ret < 0)
1160 break;
4de189fe 1161 }
4de189fe 1162 strlist__delete(rawlist);
146a1439
MH
1163
1164 return ret;
4de189fe
MH
1165}
1166
b498ce1f 1167/* Get current perf-probe event names */
4235b045 1168static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
b498ce1f 1169{
fa28244d 1170 char buf[128];
b498ce1f
MH
1171 struct strlist *sl, *rawlist;
1172 struct str_node *ent;
4235b045 1173 struct kprobe_trace_event tev;
146a1439 1174 int ret = 0;
b498ce1f 1175
4235b045 1176 memset(&tev, 0, sizeof(tev));
b498ce1f 1177
4235b045 1178 rawlist = get_kprobe_trace_command_rawlist(fd);
e1d2017b 1179 sl = strlist__new(true, NULL);
adf365f4 1180 strlist__for_each(ent, rawlist) {
146a1439
MH
1181 ret = parse_kprobe_trace_command(ent->s, &tev);
1182 if (ret < 0)
1183 break;
fa28244d 1184 if (include_group) {
146a1439
MH
1185 ret = e_snprintf(buf, 128, "%s:%s", tev.group,
1186 tev.event);
1187 if (ret >= 0)
1188 ret = strlist__add(sl, buf);
fa28244d 1189 } else
146a1439 1190 ret = strlist__add(sl, tev.event);
4235b045 1191 clear_kprobe_trace_event(&tev);
146a1439
MH
1192 if (ret < 0)
1193 break;
b498ce1f 1194 }
b498ce1f
MH
1195 strlist__delete(rawlist);
1196
146a1439
MH
1197 if (ret < 0) {
1198 strlist__delete(sl);
1199 return NULL;
1200 }
b498ce1f
MH
1201 return sl;
1202}
1203
146a1439 1204static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
50656eec
MH
1205{
1206 int ret;
4235b045 1207 char *buf = synthesize_kprobe_trace_command(tev);
50656eec 1208
146a1439
MH
1209 if (!buf) {
1210 pr_debug("Failed to synthesize kprobe trace event.\n");
1211 return -EINVAL;
1212 }
1213
fa28244d 1214 pr_debug("Writing event: %s\n", buf);
f4d7da49
MH
1215 if (!probe_event_dry_run) {
1216 ret = write(fd, buf, strlen(buf));
1217 if (ret <= 0)
146a1439
MH
1218 pr_warning("Failed to write event: %s\n",
1219 strerror(errno));
f4d7da49 1220 }
4235b045 1221 free(buf);
146a1439 1222 return ret;
50656eec
MH
1223}
1224
146a1439
MH
1225static int get_new_event_name(char *buf, size_t len, const char *base,
1226 struct strlist *namelist, bool allow_suffix)
b498ce1f
MH
1227{
1228 int i, ret;
17f88fcd
MH
1229
1230 /* Try no suffix */
1231 ret = e_snprintf(buf, len, "%s", base);
146a1439
MH
1232 if (ret < 0) {
1233 pr_debug("snprintf() failed: %s\n", strerror(-ret));
1234 return ret;
1235 }
17f88fcd 1236 if (!strlist__has_entry(namelist, buf))
146a1439 1237 return 0;
17f88fcd 1238
d761b08b
MH
1239 if (!allow_suffix) {
1240 pr_warning("Error: event \"%s\" already exists. "
1241 "(Use -f to force duplicates.)\n", base);
146a1439 1242 return -EEXIST;
d761b08b
MH
1243 }
1244
17f88fcd
MH
1245 /* Try to add suffix */
1246 for (i = 1; i < MAX_EVENT_INDEX; i++) {
b498ce1f 1247 ret = e_snprintf(buf, len, "%s_%d", base, i);
146a1439
MH
1248 if (ret < 0) {
1249 pr_debug("snprintf() failed: %s\n", strerror(-ret));
1250 return ret;
1251 }
b498ce1f
MH
1252 if (!strlist__has_entry(namelist, buf))
1253 break;
1254 }
146a1439
MH
1255 if (i == MAX_EVENT_INDEX) {
1256 pr_warning("Too many events are on the same function.\n");
1257 ret = -ERANGE;
1258 }
1259
1260 return ret;
b498ce1f
MH
1261}
1262
146a1439
MH
1263static int __add_kprobe_trace_events(struct perf_probe_event *pev,
1264 struct kprobe_trace_event *tevs,
1265 int ntevs, bool allow_suffix)
50656eec 1266{
146a1439 1267 int i, fd, ret;
55632770 1268 struct kprobe_trace_event *tev = NULL;
4235b045
MH
1269 char buf[64];
1270 const char *event, *group;
b498ce1f 1271 struct strlist *namelist;
50656eec 1272
f4d7da49 1273 fd = open_kprobe_events(true);
146a1439
MH
1274 if (fd < 0)
1275 return fd;
b498ce1f 1276 /* Get current event names */
4235b045 1277 namelist = get_kprobe_trace_event_names(fd, false);
146a1439
MH
1278 if (!namelist) {
1279 pr_debug("Failed to get current event list.\n");
1280 return -EIO;
1281 }
4235b045 1282
146a1439 1283 ret = 0;
4235b045 1284 printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
146a1439 1285 for (i = 0; i < ntevs && ret >= 0; i++) {
4235b045
MH
1286 tev = &tevs[i];
1287 if (pev->event)
1288 event = pev->event;
1289 else
1290 if (pev->point.function)
1291 event = pev->point.function;
1292 else
1293 event = tev->point.symbol;
1294 if (pev->group)
1295 group = pev->group;
1296 else
1297 group = PERFPROBE_GROUP;
1298
1299 /* Get an unused new event name */
146a1439
MH
1300 ret = get_new_event_name(buf, 64, event,
1301 namelist, allow_suffix);
1302 if (ret < 0)
1303 break;
4235b045
MH
1304 event = buf;
1305
1306 tev->event = xstrdup(event);
1307 tev->group = xstrdup(group);
146a1439
MH
1308 ret = write_kprobe_trace_event(fd, tev);
1309 if (ret < 0)
1310 break;
4235b045
MH
1311 /* Add added event name to namelist */
1312 strlist__add(namelist, event);
1313
1314 /* Trick here - save current event/group */
1315 event = pev->event;
1316 group = pev->group;
1317 pev->event = tev->event;
1318 pev->group = tev->group;
1319 show_perf_probe_event(pev);
1320 /* Trick here - restore current event/group */
1321 pev->event = (char *)event;
1322 pev->group = (char *)group;
1323
1324 /*
1325 * Probes after the first probe which comes from same
1326 * user input are always allowed to add suffix, because
1327 * there might be several addresses corresponding to
1328 * one code line.
1329 */
1330 allow_suffix = true;
50656eec 1331 }
146a1439
MH
1332
1333 if (ret >= 0) {
1334 /* Show how to use the event. */
1335 printf("\nYou can now use it on all perf tools, such as:\n\n");
1336 printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
1337 tev->event);
1338 }
a9b495b0 1339
e1d2017b 1340 strlist__delete(namelist);
50656eec 1341 close(fd);
146a1439 1342 return ret;
50656eec 1343}
fa28244d 1344
4235b045
MH
1345static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
1346 struct kprobe_trace_event **tevs)
e0faa8d3
MH
1347{
1348 struct symbol *sym;
e334016f 1349 int ret = 0, i;
4235b045
MH
1350 struct kprobe_trace_event *tev;
1351
4b4da7f7 1352 /* Convert perf_probe_event with debuginfo */
e334016f
MH
1353 ret = try_to_find_kprobe_trace_events(pev, tevs);
1354 if (ret != 0)
1355 return ret;
e0faa8d3 1356
4235b045 1357 /* Allocate trace event buffer */
e334016f
MH
1358 tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
1359 if (tev == NULL)
1360 return -ENOMEM;
4235b045
MH
1361
1362 /* Copy parameters */
1363 tev->point.symbol = xstrdup(pev->point.function);
1364 tev->point.offset = pev->point.offset;
1365 tev->nargs = pev->nargs;
1366 if (tev->nargs) {
e334016f
MH
1367 tev->args = zalloc(sizeof(struct kprobe_trace_arg)
1368 * tev->nargs);
1369 if (tev->args == NULL) {
1370 free(tev);
1371 *tevs = NULL;
1372 return -ENOMEM;
1373 }
48481938
MH
1374 for (i = 0; i < tev->nargs; i++) {
1375 if (pev->args[i].name)
1376 tev->args[i].name = xstrdup(pev->args[i].name);
1377 tev->args[i].value = xstrdup(pev->args[i].var);
11a1ca35
MH
1378 if (pev->args[i].type)
1379 tev->args[i].type = xstrdup(pev->args[i].type);
48481938 1380 }
4235b045
MH
1381 }
1382
1383 /* Currently just checking function name from symbol map */
1384 sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
1385 tev->point.symbol, NULL);
146a1439
MH
1386 if (!sym) {
1387 pr_warning("Kernel symbol \'%s\' not found.\n",
1388 tev->point.symbol);
e334016f
MH
1389 clear_kprobe_trace_event(tev);
1390 free(tev);
1391 *tevs = NULL;
146a1439 1392 return -ENOENT;
e334016f
MH
1393 } else
1394 ret = 1;
1395
1396 return ret;
4235b045
MH
1397}
1398
1399struct __event_package {
1400 struct perf_probe_event *pev;
1401 struct kprobe_trace_event *tevs;
1402 int ntevs;
1403};
1404
146a1439
MH
1405int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
1406 bool force_add)
4235b045 1407{
146a1439 1408 int i, j, ret;
4235b045
MH
1409 struct __event_package *pkgs;
1410
e334016f
MH
1411 pkgs = zalloc(sizeof(struct __event_package) * npevs);
1412 if (pkgs == NULL)
1413 return -ENOMEM;
4235b045
MH
1414
1415 /* Init vmlinux path */
146a1439
MH
1416 ret = init_vmlinux();
1417 if (ret < 0)
1418 return ret;
4235b045
MH
1419
1420 /* Loop 1: convert all events */
1421 for (i = 0; i < npevs; i++) {
1422 pkgs[i].pev = &pevs[i];
1423 /* Convert with or without debuginfo */
146a1439
MH
1424 ret = convert_to_kprobe_trace_events(pkgs[i].pev,
1425 &pkgs[i].tevs);
1426 if (ret < 0)
1427 goto end;
1428 pkgs[i].ntevs = ret;
e0faa8d3
MH
1429 }
1430
4235b045 1431 /* Loop 2: add all events */
146a1439
MH
1432 for (i = 0; i < npevs && ret >= 0; i++)
1433 ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
1434 pkgs[i].ntevs, force_add);
1435end:
1436 /* Loop 3: cleanup trace events */
4235b045 1437 for (i = 0; i < npevs; i++)
146a1439
MH
1438 for (j = 0; j < pkgs[i].ntevs; j++)
1439 clear_kprobe_trace_event(&pkgs[i].tevs[j]);
1440
1441 return ret;
e0faa8d3
MH
1442}
1443
146a1439 1444static int __del_trace_kprobe_event(int fd, struct str_node *ent)
bbbb521b
MH
1445{
1446 char *p;
1447 char buf[128];
4235b045 1448 int ret;
bbbb521b
MH
1449
1450 /* Convert from perf-probe event to trace-kprobe event */
146a1439
MH
1451 ret = e_snprintf(buf, 128, "-:%s", ent->s);
1452 if (ret < 0)
1453 goto error;
1454
bbbb521b 1455 p = strchr(buf + 2, ':');
146a1439
MH
1456 if (!p) {
1457 pr_debug("Internal error: %s should have ':' but not.\n",
1458 ent->s);
1459 ret = -ENOTSUP;
1460 goto error;
1461 }
bbbb521b
MH
1462 *p = '/';
1463
4235b045
MH
1464 pr_debug("Writing event: %s\n", buf);
1465 ret = write(fd, buf, strlen(buf));
146a1439
MH
1466 if (ret < 0)
1467 goto error;
1468
bbbb521b 1469 printf("Remove event: %s\n", ent->s);
146a1439
MH
1470 return 0;
1471error:
1472 pr_warning("Failed to delete event: %s\n", strerror(-ret));
1473 return ret;
bbbb521b
MH
1474}
1475
146a1439
MH
1476static int del_trace_kprobe_event(int fd, const char *group,
1477 const char *event, struct strlist *namelist)
fa28244d
MH
1478{
1479 char buf[128];
bbbb521b 1480 struct str_node *ent, *n;
146a1439 1481 int found = 0, ret = 0;
fa28244d 1482
146a1439
MH
1483 ret = e_snprintf(buf, 128, "%s:%s", group, event);
1484 if (ret < 0) {
1485 pr_err("Failed to copy event.");
1486 return ret;
1487 }
fa28244d 1488
bbbb521b
MH
1489 if (strpbrk(buf, "*?")) { /* Glob-exp */
1490 strlist__for_each_safe(ent, n, namelist)
1491 if (strglobmatch(ent->s, buf)) {
1492 found++;
146a1439
MH
1493 ret = __del_trace_kprobe_event(fd, ent);
1494 if (ret < 0)
1495 break;
bbbb521b
MH
1496 strlist__remove(namelist, ent);
1497 }
1498 } else {
1499 ent = strlist__find(namelist, buf);
1500 if (ent) {
1501 found++;
146a1439
MH
1502 ret = __del_trace_kprobe_event(fd, ent);
1503 if (ret >= 0)
1504 strlist__remove(namelist, ent);
bbbb521b
MH
1505 }
1506 }
146a1439
MH
1507 if (found == 0 && ret >= 0)
1508 pr_info("Info: Event \"%s\" does not exist.\n", buf);
1509
1510 return ret;
fa28244d
MH
1511}
1512
146a1439 1513int del_perf_probe_events(struct strlist *dellist)
fa28244d 1514{
146a1439 1515 int fd, ret = 0;
fa28244d
MH
1516 const char *group, *event;
1517 char *p, *str;
1518 struct str_node *ent;
1519 struct strlist *namelist;
1520
f4d7da49 1521 fd = open_kprobe_events(true);
146a1439
MH
1522 if (fd < 0)
1523 return fd;
1524
fa28244d 1525 /* Get current event names */
4235b045 1526 namelist = get_kprobe_trace_event_names(fd, true);
146a1439
MH
1527 if (namelist == NULL)
1528 return -EINVAL;
fa28244d 1529
adf365f4 1530 strlist__for_each(ent, dellist) {
31facc5f 1531 str = xstrdup(ent->s);
bbbb521b 1532 pr_debug("Parsing: %s\n", str);
fa28244d
MH
1533 p = strchr(str, ':');
1534 if (p) {
1535 group = str;
1536 *p = '\0';
1537 event = p + 1;
1538 } else {
bbbb521b 1539 group = "*";
fa28244d
MH
1540 event = str;
1541 }
bbbb521b 1542 pr_debug("Group: %s, Event: %s\n", group, event);
146a1439 1543 ret = del_trace_kprobe_event(fd, group, event, namelist);
fa28244d 1544 free(str);
146a1439
MH
1545 if (ret < 0)
1546 break;
fa28244d
MH
1547 }
1548 strlist__delete(namelist);
1549 close(fd);
146a1439
MH
1550
1551 return ret;
fa28244d
MH
1552}
1553