]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blob - tools/perf/util/probe-event.c
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/egtvedt...
[mirror_ubuntu-jammy-kernel.git] / tools / perf / util / probe-event.c
1 /*
2 * probe-event.c : perf-probe definition to probe_events format converter
3 *
4 * Written by Masami Hiramatsu <mhiramat@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 *
20 */
21
22 #include <sys/utsname.h>
23 #include <sys/types.h>
24 #include <sys/stat.h>
25 #include <fcntl.h>
26 #include <errno.h>
27 #include <stdio.h>
28 #include <unistd.h>
29 #include <stdlib.h>
30 #include <string.h>
31 #include <stdarg.h>
32 #include <limits.h>
33 #include <elf.h>
34
35 #include "util.h"
36 #include "event.h"
37 #include "strlist.h"
38 #include "debug.h"
39 #include "cache.h"
40 #include "color.h"
41 #include "symbol.h"
42 #include "thread.h"
43 #include <api/fs/debugfs.h>
44 #include "trace-event.h" /* For __maybe_unused */
45 #include "probe-event.h"
46 #include "probe-finder.h"
47 #include "session.h"
48
49 #define MAX_CMDLEN 256
50 #define PERFPROBE_GROUP "probe"
51
52 bool probe_event_dry_run; /* Dry run flag */
53
54 #define semantic_error(msg ...) pr_err("Semantic error :" msg)
55
56 /* If there is no space to write, returns -E2BIG. */
57 static int e_snprintf(char *str, size_t size, const char *format, ...)
58 __attribute__((format(printf, 3, 4)));
59
60 static int e_snprintf(char *str, size_t size, const char *format, ...)
61 {
62 int ret;
63 va_list ap;
64 va_start(ap, format);
65 ret = vsnprintf(str, size, format, ap);
66 va_end(ap);
67 if (ret >= (int)size)
68 ret = -E2BIG;
69 return ret;
70 }
71
72 static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
73 static void clear_probe_trace_event(struct probe_trace_event *tev);
74 static struct machine *host_machine;
75
76 /* Initialize symbol maps and path of vmlinux/modules */
77 static int init_symbol_maps(bool user_only)
78 {
79 int ret;
80
81 symbol_conf.sort_by_name = true;
82 ret = symbol__init();
83 if (ret < 0) {
84 pr_debug("Failed to init symbol map.\n");
85 goto out;
86 }
87
88 if (host_machine || user_only) /* already initialized */
89 return 0;
90
91 if (symbol_conf.vmlinux_name)
92 pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
93
94 host_machine = machine__new_host();
95 if (!host_machine) {
96 pr_debug("machine__new_host() failed.\n");
97 symbol__exit();
98 ret = -1;
99 }
100 out:
101 if (ret < 0)
102 pr_warning("Failed to init vmlinux path.\n");
103 return ret;
104 }
105
106 static void exit_symbol_maps(void)
107 {
108 if (host_machine) {
109 machine__delete(host_machine);
110 host_machine = NULL;
111 }
112 symbol__exit();
113 }
114
115 static struct symbol *__find_kernel_function_by_name(const char *name,
116 struct map **mapp)
117 {
118 return machine__find_kernel_function_by_name(host_machine, name, mapp,
119 NULL);
120 }
121
122 static struct symbol *__find_kernel_function(u64 addr, struct map **mapp)
123 {
124 return machine__find_kernel_function(host_machine, addr, mapp, NULL);
125 }
126
127 static struct ref_reloc_sym *kernel_get_ref_reloc_sym(void)
128 {
129 /* kmap->ref_reloc_sym should be set if host_machine is initialized */
130 struct kmap *kmap;
131
132 if (map__load(host_machine->vmlinux_maps[MAP__FUNCTION], NULL) < 0)
133 return NULL;
134
135 kmap = map__kmap(host_machine->vmlinux_maps[MAP__FUNCTION]);
136 return kmap->ref_reloc_sym;
137 }
138
139 static u64 kernel_get_symbol_address_by_name(const char *name, bool reloc)
140 {
141 struct ref_reloc_sym *reloc_sym;
142 struct symbol *sym;
143 struct map *map;
144
145 /* ref_reloc_sym is just a label. Need a special fix*/
146 reloc_sym = kernel_get_ref_reloc_sym();
147 if (reloc_sym && strcmp(name, reloc_sym->name) == 0)
148 return (reloc) ? reloc_sym->addr : reloc_sym->unrelocated_addr;
149 else {
150 sym = __find_kernel_function_by_name(name, &map);
151 if (sym)
152 return map->unmap_ip(map, sym->start) -
153 (reloc) ? 0 : map->reloc;
154 }
155 return 0;
156 }
157
158 static struct map *kernel_get_module_map(const char *module)
159 {
160 struct rb_node *nd;
161 struct map_groups *grp = &host_machine->kmaps;
162
163 /* A file path -- this is an offline module */
164 if (module && strchr(module, '/'))
165 return machine__new_module(host_machine, 0, module);
166
167 if (!module)
168 module = "kernel";
169
170 for (nd = rb_first(&grp->maps[MAP__FUNCTION]); nd; nd = rb_next(nd)) {
171 struct map *pos = rb_entry(nd, struct map, rb_node);
172 if (strncmp(pos->dso->short_name + 1, module,
173 pos->dso->short_name_len - 2) == 0) {
174 return pos;
175 }
176 }
177 return NULL;
178 }
179
180 static struct dso *kernel_get_module_dso(const char *module)
181 {
182 struct dso *dso;
183 struct map *map;
184 const char *vmlinux_name;
185
186 if (module) {
187 list_for_each_entry(dso, &host_machine->kernel_dsos, node) {
188 if (strncmp(dso->short_name + 1, module,
189 dso->short_name_len - 2) == 0)
190 goto found;
191 }
192 pr_debug("Failed to find module %s.\n", module);
193 return NULL;
194 }
195
196 map = host_machine->vmlinux_maps[MAP__FUNCTION];
197 dso = map->dso;
198
199 vmlinux_name = symbol_conf.vmlinux_name;
200 if (vmlinux_name) {
201 if (dso__load_vmlinux(dso, map, vmlinux_name, false, NULL) <= 0)
202 return NULL;
203 } else {
204 if (dso__load_vmlinux_path(dso, map, NULL) <= 0) {
205 pr_debug("Failed to load kernel map.\n");
206 return NULL;
207 }
208 }
209 found:
210 return dso;
211 }
212
213 const char *kernel_get_module_path(const char *module)
214 {
215 struct dso *dso = kernel_get_module_dso(module);
216 return (dso) ? dso->long_name : NULL;
217 }
218
219 static int convert_exec_to_group(const char *exec, char **result)
220 {
221 char *ptr1, *ptr2, *exec_copy;
222 char buf[64];
223 int ret;
224
225 exec_copy = strdup(exec);
226 if (!exec_copy)
227 return -ENOMEM;
228
229 ptr1 = basename(exec_copy);
230 if (!ptr1) {
231 ret = -EINVAL;
232 goto out;
233 }
234
235 ptr2 = strpbrk(ptr1, "-._");
236 if (ptr2)
237 *ptr2 = '\0';
238 ret = e_snprintf(buf, 64, "%s_%s", PERFPROBE_GROUP, ptr1);
239 if (ret < 0)
240 goto out;
241
242 *result = strdup(buf);
243 ret = *result ? 0 : -ENOMEM;
244
245 out:
246 free(exec_copy);
247 return ret;
248 }
249
250 static void clear_probe_trace_events(struct probe_trace_event *tevs, int ntevs)
251 {
252 int i;
253
254 for (i = 0; i < ntevs; i++)
255 clear_probe_trace_event(tevs + i);
256 }
257
258 #ifdef HAVE_DWARF_SUPPORT
259
260 /* Open new debuginfo of given module */
261 static struct debuginfo *open_debuginfo(const char *module)
262 {
263 const char *path = module;
264
265 if (!module || !strchr(module, '/')) {
266 path = kernel_get_module_path(module);
267 if (!path) {
268 pr_err("Failed to find path of %s module.\n",
269 module ?: "kernel");
270 return NULL;
271 }
272 }
273 return debuginfo__new(path);
274 }
275
276 static int get_text_start_address(const char *exec, unsigned long *address)
277 {
278 Elf *elf;
279 GElf_Ehdr ehdr;
280 GElf_Shdr shdr;
281 int fd, ret = -ENOENT;
282
283 fd = open(exec, O_RDONLY);
284 if (fd < 0)
285 return -errno;
286
287 elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
288 if (elf == NULL)
289 return -EINVAL;
290
291 if (gelf_getehdr(elf, &ehdr) == NULL)
292 goto out;
293
294 if (!elf_section_by_name(elf, &ehdr, &shdr, ".text", NULL))
295 goto out;
296
297 *address = shdr.sh_addr - shdr.sh_offset;
298 ret = 0;
299 out:
300 elf_end(elf);
301 return ret;
302 }
303
304 /*
305 * Convert trace point to probe point with debuginfo
306 */
307 static int find_perf_probe_point_from_dwarf(struct probe_trace_point *tp,
308 struct perf_probe_point *pp,
309 bool is_kprobe)
310 {
311 struct debuginfo *dinfo = NULL;
312 unsigned long stext = 0;
313 u64 addr = tp->address;
314 int ret = -ENOENT;
315
316 /* convert the address to dwarf address */
317 if (!is_kprobe) {
318 if (!addr) {
319 ret = -EINVAL;
320 goto error;
321 }
322 ret = get_text_start_address(tp->module, &stext);
323 if (ret < 0)
324 goto error;
325 addr += stext;
326 } else {
327 addr = kernel_get_symbol_address_by_name(tp->symbol, false);
328 if (addr == 0)
329 goto error;
330 addr += tp->offset;
331 }
332
333 pr_debug("try to find information at %" PRIx64 " in %s\n", addr,
334 tp->module ? : "kernel");
335
336 dinfo = open_debuginfo(tp->module);
337 if (dinfo) {
338 ret = debuginfo__find_probe_point(dinfo,
339 (unsigned long)addr, pp);
340 debuginfo__delete(dinfo);
341 } else {
342 pr_debug("Failed to open debuginfo at 0x%" PRIx64 "\n", addr);
343 ret = -ENOENT;
344 }
345
346 if (ret > 0) {
347 pp->retprobe = tp->retprobe;
348 return 0;
349 }
350 error:
351 pr_debug("Failed to find corresponding probes from debuginfo.\n");
352 return ret ? : -ENOENT;
353 }
354
355 static int add_exec_to_probe_trace_events(struct probe_trace_event *tevs,
356 int ntevs, const char *exec)
357 {
358 int i, ret = 0;
359 unsigned long stext = 0;
360
361 if (!exec)
362 return 0;
363
364 ret = get_text_start_address(exec, &stext);
365 if (ret < 0)
366 return ret;
367
368 for (i = 0; i < ntevs && ret >= 0; i++) {
369 /* point.address is the addres of point.symbol + point.offset */
370 tevs[i].point.address -= stext;
371 tevs[i].point.module = strdup(exec);
372 if (!tevs[i].point.module) {
373 ret = -ENOMEM;
374 break;
375 }
376 tevs[i].uprobes = true;
377 }
378
379 return ret;
380 }
381
382 static int add_module_to_probe_trace_events(struct probe_trace_event *tevs,
383 int ntevs, const char *module)
384 {
385 int i, ret = 0;
386 char *tmp;
387
388 if (!module)
389 return 0;
390
391 tmp = strrchr(module, '/');
392 if (tmp) {
393 /* This is a module path -- get the module name */
394 module = strdup(tmp + 1);
395 if (!module)
396 return -ENOMEM;
397 tmp = strchr(module, '.');
398 if (tmp)
399 *tmp = '\0';
400 tmp = (char *)module; /* For free() */
401 }
402
403 for (i = 0; i < ntevs; i++) {
404 tevs[i].point.module = strdup(module);
405 if (!tevs[i].point.module) {
406 ret = -ENOMEM;
407 break;
408 }
409 }
410
411 free(tmp);
412 return ret;
413 }
414
415 /* Post processing the probe events */
416 static int post_process_probe_trace_events(struct probe_trace_event *tevs,
417 int ntevs, const char *module,
418 bool uprobe)
419 {
420 struct ref_reloc_sym *reloc_sym;
421 char *tmp;
422 int i;
423
424 if (uprobe)
425 return add_exec_to_probe_trace_events(tevs, ntevs, module);
426
427 /* Note that currently ref_reloc_sym based probe is not for drivers */
428 if (module)
429 return add_module_to_probe_trace_events(tevs, ntevs, module);
430
431 reloc_sym = kernel_get_ref_reloc_sym();
432 if (!reloc_sym) {
433 pr_warning("Relocated base symbol is not found!\n");
434 return -EINVAL;
435 }
436
437 for (i = 0; i < ntevs; i++) {
438 if (tevs[i].point.address) {
439 tmp = strdup(reloc_sym->name);
440 if (!tmp)
441 return -ENOMEM;
442 free(tevs[i].point.symbol);
443 tevs[i].point.symbol = tmp;
444 tevs[i].point.offset = tevs[i].point.address -
445 reloc_sym->unrelocated_addr;
446 }
447 }
448 return 0;
449 }
450
451 /* Try to find perf_probe_event with debuginfo */
452 static int try_to_find_probe_trace_events(struct perf_probe_event *pev,
453 struct probe_trace_event **tevs,
454 int max_tevs, const char *target)
455 {
456 bool need_dwarf = perf_probe_event_need_dwarf(pev);
457 struct debuginfo *dinfo;
458 int ntevs, ret = 0;
459
460 dinfo = open_debuginfo(target);
461
462 if (!dinfo) {
463 if (need_dwarf) {
464 pr_warning("Failed to open debuginfo file.\n");
465 return -ENOENT;
466 }
467 pr_debug("Could not open debuginfo. Try to use symbols.\n");
468 return 0;
469 }
470
471 pr_debug("Try to find probe point from debuginfo.\n");
472 /* Searching trace events corresponding to a probe event */
473 ntevs = debuginfo__find_trace_events(dinfo, pev, tevs, max_tevs);
474
475 debuginfo__delete(dinfo);
476
477 if (ntevs > 0) { /* Succeeded to find trace events */
478 pr_debug("Found %d probe_trace_events.\n", ntevs);
479 ret = post_process_probe_trace_events(*tevs, ntevs,
480 target, pev->uprobes);
481 if (ret < 0) {
482 clear_probe_trace_events(*tevs, ntevs);
483 zfree(tevs);
484 }
485 return ret < 0 ? ret : ntevs;
486 }
487
488 if (ntevs == 0) { /* No error but failed to find probe point. */
489 pr_warning("Probe point '%s' not found.\n",
490 synthesize_perf_probe_point(&pev->point));
491 return -ENOENT;
492 }
493 /* Error path : ntevs < 0 */
494 pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
495 if (ntevs == -EBADF) {
496 pr_warning("Warning: No dwarf info found in the vmlinux - "
497 "please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
498 if (!need_dwarf) {
499 pr_debug("Trying to use symbols.\n");
500 return 0;
501 }
502 }
503 return ntevs;
504 }
505
506 /*
507 * Find a src file from a DWARF tag path. Prepend optional source path prefix
508 * and chop off leading directories that do not exist. Result is passed back as
509 * a newly allocated path on success.
510 * Return 0 if file was found and readable, -errno otherwise.
511 */
512 static int get_real_path(const char *raw_path, const char *comp_dir,
513 char **new_path)
514 {
515 const char *prefix = symbol_conf.source_prefix;
516
517 if (!prefix) {
518 if (raw_path[0] != '/' && comp_dir)
519 /* If not an absolute path, try to use comp_dir */
520 prefix = comp_dir;
521 else {
522 if (access(raw_path, R_OK) == 0) {
523 *new_path = strdup(raw_path);
524 return 0;
525 } else
526 return -errno;
527 }
528 }
529
530 *new_path = malloc((strlen(prefix) + strlen(raw_path) + 2));
531 if (!*new_path)
532 return -ENOMEM;
533
534 for (;;) {
535 sprintf(*new_path, "%s/%s", prefix, raw_path);
536
537 if (access(*new_path, R_OK) == 0)
538 return 0;
539
540 if (!symbol_conf.source_prefix)
541 /* In case of searching comp_dir, don't retry */
542 return -errno;
543
544 switch (errno) {
545 case ENAMETOOLONG:
546 case ENOENT:
547 case EROFS:
548 case EFAULT:
549 raw_path = strchr(++raw_path, '/');
550 if (!raw_path) {
551 zfree(new_path);
552 return -ENOENT;
553 }
554 continue;
555
556 default:
557 zfree(new_path);
558 return -errno;
559 }
560 }
561 }
562
563 #define LINEBUF_SIZE 256
564 #define NR_ADDITIONAL_LINES 2
565
566 static int __show_one_line(FILE *fp, int l, bool skip, bool show_num)
567 {
568 char buf[LINEBUF_SIZE];
569 const char *color = show_num ? "" : PERF_COLOR_BLUE;
570 const char *prefix = NULL;
571
572 do {
573 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
574 goto error;
575 if (skip)
576 continue;
577 if (!prefix) {
578 prefix = show_num ? "%7d " : " ";
579 color_fprintf(stdout, color, prefix, l);
580 }
581 color_fprintf(stdout, color, "%s", buf);
582
583 } while (strchr(buf, '\n') == NULL);
584
585 return 1;
586 error:
587 if (ferror(fp)) {
588 pr_warning("File read error: %s\n", strerror(errno));
589 return -1;
590 }
591 return 0;
592 }
593
594 static int _show_one_line(FILE *fp, int l, bool skip, bool show_num)
595 {
596 int rv = __show_one_line(fp, l, skip, show_num);
597 if (rv == 0) {
598 pr_warning("Source file is shorter than expected.\n");
599 rv = -1;
600 }
601 return rv;
602 }
603
604 #define show_one_line_with_num(f,l) _show_one_line(f,l,false,true)
605 #define show_one_line(f,l) _show_one_line(f,l,false,false)
606 #define skip_one_line(f,l) _show_one_line(f,l,true,false)
607 #define show_one_line_or_eof(f,l) __show_one_line(f,l,false,false)
608
609 /*
610 * Show line-range always requires debuginfo to find source file and
611 * line number.
612 */
613 static int __show_line_range(struct line_range *lr, const char *module)
614 {
615 int l = 1;
616 struct int_node *ln;
617 struct debuginfo *dinfo;
618 FILE *fp;
619 int ret;
620 char *tmp;
621
622 /* Search a line range */
623 dinfo = open_debuginfo(module);
624 if (!dinfo) {
625 pr_warning("Failed to open debuginfo file.\n");
626 return -ENOENT;
627 }
628
629 ret = debuginfo__find_line_range(dinfo, lr);
630 debuginfo__delete(dinfo);
631 if (ret == 0) {
632 pr_warning("Specified source line is not found.\n");
633 return -ENOENT;
634 } else if (ret < 0) {
635 pr_warning("Debuginfo analysis failed. (%d)\n", ret);
636 return ret;
637 }
638
639 /* Convert source file path */
640 tmp = lr->path;
641 ret = get_real_path(tmp, lr->comp_dir, &lr->path);
642 free(tmp); /* Free old path */
643 if (ret < 0) {
644 pr_warning("Failed to find source file. (%d)\n", ret);
645 return ret;
646 }
647
648 setup_pager();
649
650 if (lr->function)
651 fprintf(stdout, "<%s@%s:%d>\n", lr->function, lr->path,
652 lr->start - lr->offset);
653 else
654 fprintf(stdout, "<%s:%d>\n", lr->path, lr->start);
655
656 fp = fopen(lr->path, "r");
657 if (fp == NULL) {
658 pr_warning("Failed to open %s: %s\n", lr->path,
659 strerror(errno));
660 return -errno;
661 }
662 /* Skip to starting line number */
663 while (l < lr->start) {
664 ret = skip_one_line(fp, l++);
665 if (ret < 0)
666 goto end;
667 }
668
669 intlist__for_each(ln, lr->line_list) {
670 for (; ln->i > l; l++) {
671 ret = show_one_line(fp, l - lr->offset);
672 if (ret < 0)
673 goto end;
674 }
675 ret = show_one_line_with_num(fp, l++ - lr->offset);
676 if (ret < 0)
677 goto end;
678 }
679
680 if (lr->end == INT_MAX)
681 lr->end = l + NR_ADDITIONAL_LINES;
682 while (l <= lr->end) {
683 ret = show_one_line_or_eof(fp, l++ - lr->offset);
684 if (ret <= 0)
685 break;
686 }
687 end:
688 fclose(fp);
689 return ret;
690 }
691
692 int show_line_range(struct line_range *lr, const char *module)
693 {
694 int ret;
695
696 ret = init_symbol_maps(false);
697 if (ret < 0)
698 return ret;
699 ret = __show_line_range(lr, module);
700 exit_symbol_maps();
701
702 return ret;
703 }
704
705 static int show_available_vars_at(struct debuginfo *dinfo,
706 struct perf_probe_event *pev,
707 int max_vls, struct strfilter *_filter,
708 bool externs)
709 {
710 char *buf;
711 int ret, i, nvars;
712 struct str_node *node;
713 struct variable_list *vls = NULL, *vl;
714 const char *var;
715
716 buf = synthesize_perf_probe_point(&pev->point);
717 if (!buf)
718 return -EINVAL;
719 pr_debug("Searching variables at %s\n", buf);
720
721 ret = debuginfo__find_available_vars_at(dinfo, pev, &vls,
722 max_vls, externs);
723 if (ret <= 0) {
724 pr_err("Failed to find variables at %s (%d)\n", buf, ret);
725 goto end;
726 }
727 /* Some variables are found */
728 fprintf(stdout, "Available variables at %s\n", buf);
729 for (i = 0; i < ret; i++) {
730 vl = &vls[i];
731 /*
732 * A probe point might be converted to
733 * several trace points.
734 */
735 fprintf(stdout, "\t@<%s+%lu>\n", vl->point.symbol,
736 vl->point.offset);
737 zfree(&vl->point.symbol);
738 nvars = 0;
739 if (vl->vars) {
740 strlist__for_each(node, vl->vars) {
741 var = strchr(node->s, '\t') + 1;
742 if (strfilter__compare(_filter, var)) {
743 fprintf(stdout, "\t\t%s\n", node->s);
744 nvars++;
745 }
746 }
747 strlist__delete(vl->vars);
748 }
749 if (nvars == 0)
750 fprintf(stdout, "\t\t(No matched variables)\n");
751 }
752 free(vls);
753 end:
754 free(buf);
755 return ret;
756 }
757
758 /* Show available variables on given probe point */
759 int show_available_vars(struct perf_probe_event *pevs, int npevs,
760 int max_vls, const char *module,
761 struct strfilter *_filter, bool externs)
762 {
763 int i, ret = 0;
764 struct debuginfo *dinfo;
765
766 ret = init_symbol_maps(false);
767 if (ret < 0)
768 return ret;
769
770 dinfo = open_debuginfo(module);
771 if (!dinfo) {
772 pr_warning("Failed to open debuginfo file.\n");
773 ret = -ENOENT;
774 goto out;
775 }
776
777 setup_pager();
778
779 for (i = 0; i < npevs && ret >= 0; i++)
780 ret = show_available_vars_at(dinfo, &pevs[i], max_vls, _filter,
781 externs);
782
783 debuginfo__delete(dinfo);
784 out:
785 exit_symbol_maps();
786 return ret;
787 }
788
789 #else /* !HAVE_DWARF_SUPPORT */
790
791 static int
792 find_perf_probe_point_from_dwarf(struct probe_trace_point *tp __maybe_unused,
793 struct perf_probe_point *pp __maybe_unused,
794 bool is_kprobe __maybe_unused)
795 {
796 return -ENOSYS;
797 }
798
799 static int try_to_find_probe_trace_events(struct perf_probe_event *pev,
800 struct probe_trace_event **tevs __maybe_unused,
801 int max_tevs __maybe_unused,
802 const char *target __maybe_unused)
803 {
804 if (perf_probe_event_need_dwarf(pev)) {
805 pr_warning("Debuginfo-analysis is not supported.\n");
806 return -ENOSYS;
807 }
808
809 return 0;
810 }
811
812 int show_line_range(struct line_range *lr __maybe_unused,
813 const char *module __maybe_unused)
814 {
815 pr_warning("Debuginfo-analysis is not supported.\n");
816 return -ENOSYS;
817 }
818
819 int show_available_vars(struct perf_probe_event *pevs __maybe_unused,
820 int npevs __maybe_unused, int max_vls __maybe_unused,
821 const char *module __maybe_unused,
822 struct strfilter *filter __maybe_unused,
823 bool externs __maybe_unused)
824 {
825 pr_warning("Debuginfo-analysis is not supported.\n");
826 return -ENOSYS;
827 }
828 #endif
829
830 void line_range__clear(struct line_range *lr)
831 {
832 free(lr->function);
833 free(lr->file);
834 free(lr->path);
835 free(lr->comp_dir);
836 intlist__delete(lr->line_list);
837 memset(lr, 0, sizeof(*lr));
838 }
839
840 int line_range__init(struct line_range *lr)
841 {
842 memset(lr, 0, sizeof(*lr));
843 lr->line_list = intlist__new(NULL);
844 if (!lr->line_list)
845 return -ENOMEM;
846 else
847 return 0;
848 }
849
850 static int parse_line_num(char **ptr, int *val, const char *what)
851 {
852 const char *start = *ptr;
853
854 errno = 0;
855 *val = strtol(*ptr, ptr, 0);
856 if (errno || *ptr == start) {
857 semantic_error("'%s' is not a valid number.\n", what);
858 return -EINVAL;
859 }
860 return 0;
861 }
862
863 /*
864 * Stuff 'lr' according to the line range described by 'arg'.
865 * The line range syntax is described by:
866 *
867 * SRC[:SLN[+NUM|-ELN]]
868 * FNC[@SRC][:SLN[+NUM|-ELN]]
869 */
870 int parse_line_range_desc(const char *arg, struct line_range *lr)
871 {
872 char *range, *file, *name = strdup(arg);
873 int err;
874
875 if (!name)
876 return -ENOMEM;
877
878 lr->start = 0;
879 lr->end = INT_MAX;
880
881 range = strchr(name, ':');
882 if (range) {
883 *range++ = '\0';
884
885 err = parse_line_num(&range, &lr->start, "start line");
886 if (err)
887 goto err;
888
889 if (*range == '+' || *range == '-') {
890 const char c = *range++;
891
892 err = parse_line_num(&range, &lr->end, "end line");
893 if (err)
894 goto err;
895
896 if (c == '+') {
897 lr->end += lr->start;
898 /*
899 * Adjust the number of lines here.
900 * If the number of lines == 1, the
901 * the end of line should be equal to
902 * the start of line.
903 */
904 lr->end--;
905 }
906 }
907
908 pr_debug("Line range is %d to %d\n", lr->start, lr->end);
909
910 err = -EINVAL;
911 if (lr->start > lr->end) {
912 semantic_error("Start line must be smaller"
913 " than end line.\n");
914 goto err;
915 }
916 if (*range != '\0') {
917 semantic_error("Tailing with invalid str '%s'.\n", range);
918 goto err;
919 }
920 }
921
922 file = strchr(name, '@');
923 if (file) {
924 *file = '\0';
925 lr->file = strdup(++file);
926 if (lr->file == NULL) {
927 err = -ENOMEM;
928 goto err;
929 }
930 lr->function = name;
931 } else if (strchr(name, '.'))
932 lr->file = name;
933 else
934 lr->function = name;
935
936 return 0;
937 err:
938 free(name);
939 return err;
940 }
941
942 /* Check the name is good for event/group */
943 static bool check_event_name(const char *name)
944 {
945 if (!isalpha(*name) && *name != '_')
946 return false;
947 while (*++name != '\0') {
948 if (!isalpha(*name) && !isdigit(*name) && *name != '_')
949 return false;
950 }
951 return true;
952 }
953
954 /* Parse probepoint definition. */
955 static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
956 {
957 struct perf_probe_point *pp = &pev->point;
958 char *ptr, *tmp;
959 char c, nc = 0;
960 /*
961 * <Syntax>
962 * perf probe [EVENT=]SRC[:LN|;PTN]
963 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
964 *
965 * TODO:Group name support
966 */
967
968 ptr = strpbrk(arg, ";=@+%");
969 if (ptr && *ptr == '=') { /* Event name */
970 *ptr = '\0';
971 tmp = ptr + 1;
972 if (strchr(arg, ':')) {
973 semantic_error("Group name is not supported yet.\n");
974 return -ENOTSUP;
975 }
976 if (!check_event_name(arg)) {
977 semantic_error("%s is bad for event name -it must "
978 "follow C symbol-naming rule.\n", arg);
979 return -EINVAL;
980 }
981 pev->event = strdup(arg);
982 if (pev->event == NULL)
983 return -ENOMEM;
984 pev->group = NULL;
985 arg = tmp;
986 }
987
988 ptr = strpbrk(arg, ";:+@%");
989 if (ptr) {
990 nc = *ptr;
991 *ptr++ = '\0';
992 }
993
994 tmp = strdup(arg);
995 if (tmp == NULL)
996 return -ENOMEM;
997
998 /* Check arg is function or file and copy it */
999 if (strchr(tmp, '.')) /* File */
1000 pp->file = tmp;
1001 else /* Function */
1002 pp->function = tmp;
1003
1004 /* Parse other options */
1005 while (ptr) {
1006 arg = ptr;
1007 c = nc;
1008 if (c == ';') { /* Lazy pattern must be the last part */
1009 pp->lazy_line = strdup(arg);
1010 if (pp->lazy_line == NULL)
1011 return -ENOMEM;
1012 break;
1013 }
1014 ptr = strpbrk(arg, ";:+@%");
1015 if (ptr) {
1016 nc = *ptr;
1017 *ptr++ = '\0';
1018 }
1019 switch (c) {
1020 case ':': /* Line number */
1021 pp->line = strtoul(arg, &tmp, 0);
1022 if (*tmp != '\0') {
1023 semantic_error("There is non-digit char"
1024 " in line number.\n");
1025 return -EINVAL;
1026 }
1027 break;
1028 case '+': /* Byte offset from a symbol */
1029 pp->offset = strtoul(arg, &tmp, 0);
1030 if (*tmp != '\0') {
1031 semantic_error("There is non-digit character"
1032 " in offset.\n");
1033 return -EINVAL;
1034 }
1035 break;
1036 case '@': /* File name */
1037 if (pp->file) {
1038 semantic_error("SRC@SRC is not allowed.\n");
1039 return -EINVAL;
1040 }
1041 pp->file = strdup(arg);
1042 if (pp->file == NULL)
1043 return -ENOMEM;
1044 break;
1045 case '%': /* Probe places */
1046 if (strcmp(arg, "return") == 0) {
1047 pp->retprobe = 1;
1048 } else { /* Others not supported yet */
1049 semantic_error("%%%s is not supported.\n", arg);
1050 return -ENOTSUP;
1051 }
1052 break;
1053 default: /* Buggy case */
1054 pr_err("This program has a bug at %s:%d.\n",
1055 __FILE__, __LINE__);
1056 return -ENOTSUP;
1057 break;
1058 }
1059 }
1060
1061 /* Exclusion check */
1062 if (pp->lazy_line && pp->line) {
1063 semantic_error("Lazy pattern can't be used with"
1064 " line number.\n");
1065 return -EINVAL;
1066 }
1067
1068 if (pp->lazy_line && pp->offset) {
1069 semantic_error("Lazy pattern can't be used with offset.\n");
1070 return -EINVAL;
1071 }
1072
1073 if (pp->line && pp->offset) {
1074 semantic_error("Offset can't be used with line number.\n");
1075 return -EINVAL;
1076 }
1077
1078 if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
1079 semantic_error("File always requires line number or "
1080 "lazy pattern.\n");
1081 return -EINVAL;
1082 }
1083
1084 if (pp->offset && !pp->function) {
1085 semantic_error("Offset requires an entry function.\n");
1086 return -EINVAL;
1087 }
1088
1089 if (pp->retprobe && !pp->function) {
1090 semantic_error("Return probe requires an entry function.\n");
1091 return -EINVAL;
1092 }
1093
1094 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
1095 semantic_error("Offset/Line/Lazy pattern can't be used with "
1096 "return probe.\n");
1097 return -EINVAL;
1098 }
1099
1100 pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
1101 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
1102 pp->lazy_line);
1103 return 0;
1104 }
1105
1106 /* Parse perf-probe event argument */
1107 static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
1108 {
1109 char *tmp, *goodname;
1110 struct perf_probe_arg_field **fieldp;
1111
1112 pr_debug("parsing arg: %s into ", str);
1113
1114 tmp = strchr(str, '=');
1115 if (tmp) {
1116 arg->name = strndup(str, tmp - str);
1117 if (arg->name == NULL)
1118 return -ENOMEM;
1119 pr_debug("name:%s ", arg->name);
1120 str = tmp + 1;
1121 }
1122
1123 tmp = strchr(str, ':');
1124 if (tmp) { /* Type setting */
1125 *tmp = '\0';
1126 arg->type = strdup(tmp + 1);
1127 if (arg->type == NULL)
1128 return -ENOMEM;
1129 pr_debug("type:%s ", arg->type);
1130 }
1131
1132 tmp = strpbrk(str, "-.[");
1133 if (!is_c_varname(str) || !tmp) {
1134 /* A variable, register, symbol or special value */
1135 arg->var = strdup(str);
1136 if (arg->var == NULL)
1137 return -ENOMEM;
1138 pr_debug("%s\n", arg->var);
1139 return 0;
1140 }
1141
1142 /* Structure fields or array element */
1143 arg->var = strndup(str, tmp - str);
1144 if (arg->var == NULL)
1145 return -ENOMEM;
1146 goodname = arg->var;
1147 pr_debug("%s, ", arg->var);
1148 fieldp = &arg->field;
1149
1150 do {
1151 *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
1152 if (*fieldp == NULL)
1153 return -ENOMEM;
1154 if (*tmp == '[') { /* Array */
1155 str = tmp;
1156 (*fieldp)->index = strtol(str + 1, &tmp, 0);
1157 (*fieldp)->ref = true;
1158 if (*tmp != ']' || tmp == str + 1) {
1159 semantic_error("Array index must be a"
1160 " number.\n");
1161 return -EINVAL;
1162 }
1163 tmp++;
1164 if (*tmp == '\0')
1165 tmp = NULL;
1166 } else { /* Structure */
1167 if (*tmp == '.') {
1168 str = tmp + 1;
1169 (*fieldp)->ref = false;
1170 } else if (tmp[1] == '>') {
1171 str = tmp + 2;
1172 (*fieldp)->ref = true;
1173 } else {
1174 semantic_error("Argument parse error: %s\n",
1175 str);
1176 return -EINVAL;
1177 }
1178 tmp = strpbrk(str, "-.[");
1179 }
1180 if (tmp) {
1181 (*fieldp)->name = strndup(str, tmp - str);
1182 if ((*fieldp)->name == NULL)
1183 return -ENOMEM;
1184 if (*str != '[')
1185 goodname = (*fieldp)->name;
1186 pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
1187 fieldp = &(*fieldp)->next;
1188 }
1189 } while (tmp);
1190 (*fieldp)->name = strdup(str);
1191 if ((*fieldp)->name == NULL)
1192 return -ENOMEM;
1193 if (*str != '[')
1194 goodname = (*fieldp)->name;
1195 pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
1196
1197 /* If no name is specified, set the last field name (not array index)*/
1198 if (!arg->name) {
1199 arg->name = strdup(goodname);
1200 if (arg->name == NULL)
1201 return -ENOMEM;
1202 }
1203 return 0;
1204 }
1205
1206 /* Parse perf-probe event command */
1207 int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
1208 {
1209 char **argv;
1210 int argc, i, ret = 0;
1211
1212 argv = argv_split(cmd, &argc);
1213 if (!argv) {
1214 pr_debug("Failed to split arguments.\n");
1215 return -ENOMEM;
1216 }
1217 if (argc - 1 > MAX_PROBE_ARGS) {
1218 semantic_error("Too many probe arguments (%d).\n", argc - 1);
1219 ret = -ERANGE;
1220 goto out;
1221 }
1222 /* Parse probe point */
1223 ret = parse_perf_probe_point(argv[0], pev);
1224 if (ret < 0)
1225 goto out;
1226
1227 /* Copy arguments and ensure return probe has no C argument */
1228 pev->nargs = argc - 1;
1229 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1230 if (pev->args == NULL) {
1231 ret = -ENOMEM;
1232 goto out;
1233 }
1234 for (i = 0; i < pev->nargs && ret >= 0; i++) {
1235 ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
1236 if (ret >= 0 &&
1237 is_c_varname(pev->args[i].var) && pev->point.retprobe) {
1238 semantic_error("You can't specify local variable for"
1239 " kretprobe.\n");
1240 ret = -EINVAL;
1241 }
1242 }
1243 out:
1244 argv_free(argv);
1245
1246 return ret;
1247 }
1248
1249 /* Return true if this perf_probe_event requires debuginfo */
1250 bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
1251 {
1252 int i;
1253
1254 if (pev->point.file || pev->point.line || pev->point.lazy_line)
1255 return true;
1256
1257 for (i = 0; i < pev->nargs; i++)
1258 if (is_c_varname(pev->args[i].var))
1259 return true;
1260
1261 return false;
1262 }
1263
1264 /* Parse probe_events event into struct probe_point */
1265 static int parse_probe_trace_command(const char *cmd,
1266 struct probe_trace_event *tev)
1267 {
1268 struct probe_trace_point *tp = &tev->point;
1269 char pr;
1270 char *p;
1271 char *argv0_str = NULL, *fmt, *fmt1_str, *fmt2_str, *fmt3_str;
1272 int ret, i, argc;
1273 char **argv;
1274
1275 pr_debug("Parsing probe_events: %s\n", cmd);
1276 argv = argv_split(cmd, &argc);
1277 if (!argv) {
1278 pr_debug("Failed to split arguments.\n");
1279 return -ENOMEM;
1280 }
1281 if (argc < 2) {
1282 semantic_error("Too few probe arguments.\n");
1283 ret = -ERANGE;
1284 goto out;
1285 }
1286
1287 /* Scan event and group name. */
1288 argv0_str = strdup(argv[0]);
1289 if (argv0_str == NULL) {
1290 ret = -ENOMEM;
1291 goto out;
1292 }
1293 fmt1_str = strtok_r(argv0_str, ":", &fmt);
1294 fmt2_str = strtok_r(NULL, "/", &fmt);
1295 fmt3_str = strtok_r(NULL, " \t", &fmt);
1296 if (fmt1_str == NULL || strlen(fmt1_str) != 1 || fmt2_str == NULL
1297 || fmt3_str == NULL) {
1298 semantic_error("Failed to parse event name: %s\n", argv[0]);
1299 ret = -EINVAL;
1300 goto out;
1301 }
1302 pr = fmt1_str[0];
1303 tev->group = strdup(fmt2_str);
1304 tev->event = strdup(fmt3_str);
1305 if (tev->group == NULL || tev->event == NULL) {
1306 ret = -ENOMEM;
1307 goto out;
1308 }
1309 pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
1310
1311 tp->retprobe = (pr == 'r');
1312
1313 /* Scan module name(if there), function name and offset */
1314 p = strchr(argv[1], ':');
1315 if (p) {
1316 tp->module = strndup(argv[1], p - argv[1]);
1317 p++;
1318 } else
1319 p = argv[1];
1320 fmt1_str = strtok_r(p, "+", &fmt);
1321 if (fmt1_str[0] == '0') /* only the address started with 0x */
1322 tp->address = strtoul(fmt1_str, NULL, 0);
1323 else {
1324 /* Only the symbol-based probe has offset */
1325 tp->symbol = strdup(fmt1_str);
1326 if (tp->symbol == NULL) {
1327 ret = -ENOMEM;
1328 goto out;
1329 }
1330 fmt2_str = strtok_r(NULL, "", &fmt);
1331 if (fmt2_str == NULL)
1332 tp->offset = 0;
1333 else
1334 tp->offset = strtoul(fmt2_str, NULL, 10);
1335 }
1336
1337 tev->nargs = argc - 2;
1338 tev->args = zalloc(sizeof(struct probe_trace_arg) * tev->nargs);
1339 if (tev->args == NULL) {
1340 ret = -ENOMEM;
1341 goto out;
1342 }
1343 for (i = 0; i < tev->nargs; i++) {
1344 p = strchr(argv[i + 2], '=');
1345 if (p) /* We don't need which register is assigned. */
1346 *p++ = '\0';
1347 else
1348 p = argv[i + 2];
1349 tev->args[i].name = strdup(argv[i + 2]);
1350 /* TODO: parse regs and offset */
1351 tev->args[i].value = strdup(p);
1352 if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
1353 ret = -ENOMEM;
1354 goto out;
1355 }
1356 }
1357 ret = 0;
1358 out:
1359 free(argv0_str);
1360 argv_free(argv);
1361 return ret;
1362 }
1363
1364 /* Compose only probe arg */
1365 int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
1366 {
1367 struct perf_probe_arg_field *field = pa->field;
1368 int ret;
1369 char *tmp = buf;
1370
1371 if (pa->name && pa->var)
1372 ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
1373 else
1374 ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
1375 if (ret <= 0)
1376 goto error;
1377 tmp += ret;
1378 len -= ret;
1379
1380 while (field) {
1381 if (field->name[0] == '[')
1382 ret = e_snprintf(tmp, len, "%s", field->name);
1383 else
1384 ret = e_snprintf(tmp, len, "%s%s",
1385 field->ref ? "->" : ".", field->name);
1386 if (ret <= 0)
1387 goto error;
1388 tmp += ret;
1389 len -= ret;
1390 field = field->next;
1391 }
1392
1393 if (pa->type) {
1394 ret = e_snprintf(tmp, len, ":%s", pa->type);
1395 if (ret <= 0)
1396 goto error;
1397 tmp += ret;
1398 len -= ret;
1399 }
1400
1401 return tmp - buf;
1402 error:
1403 pr_debug("Failed to synthesize perf probe argument: %s\n",
1404 strerror(-ret));
1405 return ret;
1406 }
1407
1408 /* Compose only probe point (not argument) */
1409 static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
1410 {
1411 char *buf, *tmp;
1412 char offs[32] = "", line[32] = "", file[32] = "";
1413 int ret, len;
1414
1415 buf = zalloc(MAX_CMDLEN);
1416 if (buf == NULL) {
1417 ret = -ENOMEM;
1418 goto error;
1419 }
1420 if (pp->offset) {
1421 ret = e_snprintf(offs, 32, "+%lu", pp->offset);
1422 if (ret <= 0)
1423 goto error;
1424 }
1425 if (pp->line) {
1426 ret = e_snprintf(line, 32, ":%d", pp->line);
1427 if (ret <= 0)
1428 goto error;
1429 }
1430 if (pp->file) {
1431 tmp = pp->file;
1432 len = strlen(tmp);
1433 if (len > 30) {
1434 tmp = strchr(pp->file + len - 30, '/');
1435 tmp = tmp ? tmp + 1 : pp->file + len - 30;
1436 }
1437 ret = e_snprintf(file, 32, "@%s", tmp);
1438 if (ret <= 0)
1439 goto error;
1440 }
1441
1442 if (pp->function)
1443 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
1444 offs, pp->retprobe ? "%return" : "", line,
1445 file);
1446 else
1447 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
1448 if (ret <= 0)
1449 goto error;
1450
1451 return buf;
1452 error:
1453 pr_debug("Failed to synthesize perf probe point: %s\n",
1454 strerror(-ret));
1455 free(buf);
1456 return NULL;
1457 }
1458
1459 #if 0
1460 char *synthesize_perf_probe_command(struct perf_probe_event *pev)
1461 {
1462 char *buf;
1463 int i, len, ret;
1464
1465 buf = synthesize_perf_probe_point(&pev->point);
1466 if (!buf)
1467 return NULL;
1468
1469 len = strlen(buf);
1470 for (i = 0; i < pev->nargs; i++) {
1471 ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
1472 pev->args[i].name);
1473 if (ret <= 0) {
1474 free(buf);
1475 return NULL;
1476 }
1477 len += ret;
1478 }
1479
1480 return buf;
1481 }
1482 #endif
1483
1484 static int __synthesize_probe_trace_arg_ref(struct probe_trace_arg_ref *ref,
1485 char **buf, size_t *buflen,
1486 int depth)
1487 {
1488 int ret;
1489 if (ref->next) {
1490 depth = __synthesize_probe_trace_arg_ref(ref->next, buf,
1491 buflen, depth + 1);
1492 if (depth < 0)
1493 goto out;
1494 }
1495
1496 ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
1497 if (ret < 0)
1498 depth = ret;
1499 else {
1500 *buf += ret;
1501 *buflen -= ret;
1502 }
1503 out:
1504 return depth;
1505
1506 }
1507
1508 static int synthesize_probe_trace_arg(struct probe_trace_arg *arg,
1509 char *buf, size_t buflen)
1510 {
1511 struct probe_trace_arg_ref *ref = arg->ref;
1512 int ret, depth = 0;
1513 char *tmp = buf;
1514
1515 /* Argument name or separator */
1516 if (arg->name)
1517 ret = e_snprintf(buf, buflen, " %s=", arg->name);
1518 else
1519 ret = e_snprintf(buf, buflen, " ");
1520 if (ret < 0)
1521 return ret;
1522 buf += ret;
1523 buflen -= ret;
1524
1525 /* Special case: @XXX */
1526 if (arg->value[0] == '@' && arg->ref)
1527 ref = ref->next;
1528
1529 /* Dereferencing arguments */
1530 if (ref) {
1531 depth = __synthesize_probe_trace_arg_ref(ref, &buf,
1532 &buflen, 1);
1533 if (depth < 0)
1534 return depth;
1535 }
1536
1537 /* Print argument value */
1538 if (arg->value[0] == '@' && arg->ref)
1539 ret = e_snprintf(buf, buflen, "%s%+ld", arg->value,
1540 arg->ref->offset);
1541 else
1542 ret = e_snprintf(buf, buflen, "%s", arg->value);
1543 if (ret < 0)
1544 return ret;
1545 buf += ret;
1546 buflen -= ret;
1547
1548 /* Closing */
1549 while (depth--) {
1550 ret = e_snprintf(buf, buflen, ")");
1551 if (ret < 0)
1552 return ret;
1553 buf += ret;
1554 buflen -= ret;
1555 }
1556 /* Print argument type */
1557 if (arg->type) {
1558 ret = e_snprintf(buf, buflen, ":%s", arg->type);
1559 if (ret <= 0)
1560 return ret;
1561 buf += ret;
1562 }
1563
1564 return buf - tmp;
1565 }
1566
1567 char *synthesize_probe_trace_command(struct probe_trace_event *tev)
1568 {
1569 struct probe_trace_point *tp = &tev->point;
1570 char *buf;
1571 int i, len, ret;
1572
1573 buf = zalloc(MAX_CMDLEN);
1574 if (buf == NULL)
1575 return NULL;
1576
1577 len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s ", tp->retprobe ? 'r' : 'p',
1578 tev->group, tev->event);
1579 if (len <= 0)
1580 goto error;
1581
1582 /* Uprobes must have tp->address and tp->module */
1583 if (tev->uprobes && (!tp->address || !tp->module))
1584 goto error;
1585
1586 /* Use the tp->address for uprobes */
1587 if (tev->uprobes)
1588 ret = e_snprintf(buf + len, MAX_CMDLEN - len, "%s:0x%lx",
1589 tp->module, tp->address);
1590 else
1591 ret = e_snprintf(buf + len, MAX_CMDLEN - len, "%s%s%s+%lu",
1592 tp->module ?: "", tp->module ? ":" : "",
1593 tp->symbol, tp->offset);
1594
1595 if (ret <= 0)
1596 goto error;
1597 len += ret;
1598
1599 for (i = 0; i < tev->nargs; i++) {
1600 ret = synthesize_probe_trace_arg(&tev->args[i], buf + len,
1601 MAX_CMDLEN - len);
1602 if (ret <= 0)
1603 goto error;
1604 len += ret;
1605 }
1606
1607 return buf;
1608 error:
1609 free(buf);
1610 return NULL;
1611 }
1612
1613 static int find_perf_probe_point_from_map(struct probe_trace_point *tp,
1614 struct perf_probe_point *pp,
1615 bool is_kprobe)
1616 {
1617 struct symbol *sym = NULL;
1618 struct map *map;
1619 u64 addr;
1620 int ret = -ENOENT;
1621
1622 if (!is_kprobe) {
1623 map = dso__new_map(tp->module);
1624 if (!map)
1625 goto out;
1626 addr = tp->address;
1627 sym = map__find_symbol(map, addr, NULL);
1628 } else {
1629 addr = kernel_get_symbol_address_by_name(tp->symbol, true);
1630 if (addr) {
1631 addr += tp->offset;
1632 sym = __find_kernel_function(addr, &map);
1633 }
1634 }
1635 if (!sym)
1636 goto out;
1637
1638 pp->retprobe = tp->retprobe;
1639 pp->offset = addr - map->unmap_ip(map, sym->start);
1640 pp->function = strdup(sym->name);
1641 ret = pp->function ? 0 : -ENOMEM;
1642
1643 out:
1644 if (map && !is_kprobe) {
1645 dso__delete(map->dso);
1646 map__delete(map);
1647 }
1648
1649 return ret;
1650 }
1651
1652 static int convert_to_perf_probe_point(struct probe_trace_point *tp,
1653 struct perf_probe_point *pp,
1654 bool is_kprobe)
1655 {
1656 char buf[128];
1657 int ret;
1658
1659 ret = find_perf_probe_point_from_dwarf(tp, pp, is_kprobe);
1660 if (!ret)
1661 return 0;
1662 ret = find_perf_probe_point_from_map(tp, pp, is_kprobe);
1663 if (!ret)
1664 return 0;
1665
1666 pr_debug("Failed to find probe point from both of dwarf and map.\n");
1667
1668 if (tp->symbol) {
1669 pp->function = strdup(tp->symbol);
1670 pp->offset = tp->offset;
1671 } else if (!tp->module && !is_kprobe) {
1672 ret = e_snprintf(buf, 128, "0x%" PRIx64, (u64)tp->address);
1673 if (ret < 0)
1674 return ret;
1675 pp->function = strdup(buf);
1676 pp->offset = 0;
1677 }
1678 if (pp->function == NULL)
1679 return -ENOMEM;
1680
1681 pp->retprobe = tp->retprobe;
1682
1683 return 0;
1684 }
1685
1686 static int convert_to_perf_probe_event(struct probe_trace_event *tev,
1687 struct perf_probe_event *pev, bool is_kprobe)
1688 {
1689 char buf[64] = "";
1690 int i, ret;
1691
1692 /* Convert event/group name */
1693 pev->event = strdup(tev->event);
1694 pev->group = strdup(tev->group);
1695 if (pev->event == NULL || pev->group == NULL)
1696 return -ENOMEM;
1697
1698 /* Convert trace_point to probe_point */
1699 ret = convert_to_perf_probe_point(&tev->point, &pev->point, is_kprobe);
1700 if (ret < 0)
1701 return ret;
1702
1703 /* Convert trace_arg to probe_arg */
1704 pev->nargs = tev->nargs;
1705 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1706 if (pev->args == NULL)
1707 return -ENOMEM;
1708 for (i = 0; i < tev->nargs && ret >= 0; i++) {
1709 if (tev->args[i].name)
1710 pev->args[i].name = strdup(tev->args[i].name);
1711 else {
1712 ret = synthesize_probe_trace_arg(&tev->args[i],
1713 buf, 64);
1714 pev->args[i].name = strdup(buf);
1715 }
1716 if (pev->args[i].name == NULL && ret >= 0)
1717 ret = -ENOMEM;
1718 }
1719
1720 if (ret < 0)
1721 clear_perf_probe_event(pev);
1722
1723 return ret;
1724 }
1725
1726 void clear_perf_probe_event(struct perf_probe_event *pev)
1727 {
1728 struct perf_probe_point *pp = &pev->point;
1729 struct perf_probe_arg_field *field, *next;
1730 int i;
1731
1732 free(pev->event);
1733 free(pev->group);
1734 free(pp->file);
1735 free(pp->function);
1736 free(pp->lazy_line);
1737
1738 for (i = 0; i < pev->nargs; i++) {
1739 free(pev->args[i].name);
1740 free(pev->args[i].var);
1741 free(pev->args[i].type);
1742 field = pev->args[i].field;
1743 while (field) {
1744 next = field->next;
1745 zfree(&field->name);
1746 free(field);
1747 field = next;
1748 }
1749 }
1750 free(pev->args);
1751 memset(pev, 0, sizeof(*pev));
1752 }
1753
1754 static void clear_probe_trace_event(struct probe_trace_event *tev)
1755 {
1756 struct probe_trace_arg_ref *ref, *next;
1757 int i;
1758
1759 free(tev->event);
1760 free(tev->group);
1761 free(tev->point.symbol);
1762 free(tev->point.module);
1763 for (i = 0; i < tev->nargs; i++) {
1764 free(tev->args[i].name);
1765 free(tev->args[i].value);
1766 free(tev->args[i].type);
1767 ref = tev->args[i].ref;
1768 while (ref) {
1769 next = ref->next;
1770 free(ref);
1771 ref = next;
1772 }
1773 }
1774 free(tev->args);
1775 memset(tev, 0, sizeof(*tev));
1776 }
1777
1778 static void print_warn_msg(const char *file, bool is_kprobe)
1779 {
1780
1781 if (errno == ENOENT) {
1782 const char *config;
1783
1784 if (!is_kprobe)
1785 config = "CONFIG_UPROBE_EVENTS";
1786 else
1787 config = "CONFIG_KPROBE_EVENTS";
1788
1789 pr_warning("%s file does not exist - please rebuild kernel"
1790 " with %s.\n", file, config);
1791 } else
1792 pr_warning("Failed to open %s file: %s\n", file,
1793 strerror(errno));
1794 }
1795
1796 static int open_probe_events(const char *trace_file, bool readwrite,
1797 bool is_kprobe)
1798 {
1799 char buf[PATH_MAX];
1800 const char *__debugfs;
1801 int ret;
1802
1803 __debugfs = debugfs_find_mountpoint();
1804 if (__debugfs == NULL) {
1805 pr_warning("Debugfs is not mounted.\n");
1806 return -ENOENT;
1807 }
1808
1809 ret = e_snprintf(buf, PATH_MAX, "%s/%s", __debugfs, trace_file);
1810 if (ret >= 0) {
1811 pr_debug("Opening %s write=%d\n", buf, readwrite);
1812 if (readwrite && !probe_event_dry_run)
1813 ret = open(buf, O_RDWR, O_APPEND);
1814 else
1815 ret = open(buf, O_RDONLY, 0);
1816
1817 if (ret < 0)
1818 print_warn_msg(buf, is_kprobe);
1819 }
1820 return ret;
1821 }
1822
1823 static int open_kprobe_events(bool readwrite)
1824 {
1825 return open_probe_events("tracing/kprobe_events", readwrite, true);
1826 }
1827
1828 static int open_uprobe_events(bool readwrite)
1829 {
1830 return open_probe_events("tracing/uprobe_events", readwrite, false);
1831 }
1832
1833 /* Get raw string list of current kprobe_events or uprobe_events */
1834 static struct strlist *get_probe_trace_command_rawlist(int fd)
1835 {
1836 int ret, idx;
1837 FILE *fp;
1838 char buf[MAX_CMDLEN];
1839 char *p;
1840 struct strlist *sl;
1841
1842 sl = strlist__new(true, NULL);
1843
1844 fp = fdopen(dup(fd), "r");
1845 while (!feof(fp)) {
1846 p = fgets(buf, MAX_CMDLEN, fp);
1847 if (!p)
1848 break;
1849
1850 idx = strlen(p) - 1;
1851 if (p[idx] == '\n')
1852 p[idx] = '\0';
1853 ret = strlist__add(sl, buf);
1854 if (ret < 0) {
1855 pr_debug("strlist__add failed: %s\n", strerror(-ret));
1856 strlist__delete(sl);
1857 return NULL;
1858 }
1859 }
1860 fclose(fp);
1861
1862 return sl;
1863 }
1864
1865 /* Show an event */
1866 static int show_perf_probe_event(struct perf_probe_event *pev,
1867 const char *module)
1868 {
1869 int i, ret;
1870 char buf[128];
1871 char *place;
1872
1873 /* Synthesize only event probe point */
1874 place = synthesize_perf_probe_point(&pev->point);
1875 if (!place)
1876 return -EINVAL;
1877
1878 ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
1879 if (ret < 0)
1880 return ret;
1881
1882 printf(" %-20s (on %s", buf, place);
1883 if (module)
1884 printf(" in %s", module);
1885
1886 if (pev->nargs > 0) {
1887 printf(" with");
1888 for (i = 0; i < pev->nargs; i++) {
1889 ret = synthesize_perf_probe_arg(&pev->args[i],
1890 buf, 128);
1891 if (ret < 0)
1892 break;
1893 printf(" %s", buf);
1894 }
1895 }
1896 printf(")\n");
1897 free(place);
1898 return ret;
1899 }
1900
1901 static int __show_perf_probe_events(int fd, bool is_kprobe)
1902 {
1903 int ret = 0;
1904 struct probe_trace_event tev;
1905 struct perf_probe_event pev;
1906 struct strlist *rawlist;
1907 struct str_node *ent;
1908
1909 memset(&tev, 0, sizeof(tev));
1910 memset(&pev, 0, sizeof(pev));
1911
1912 rawlist = get_probe_trace_command_rawlist(fd);
1913 if (!rawlist)
1914 return -ENOENT;
1915
1916 strlist__for_each(ent, rawlist) {
1917 ret = parse_probe_trace_command(ent->s, &tev);
1918 if (ret >= 0) {
1919 ret = convert_to_perf_probe_event(&tev, &pev,
1920 is_kprobe);
1921 if (ret >= 0)
1922 ret = show_perf_probe_event(&pev,
1923 tev.point.module);
1924 }
1925 clear_perf_probe_event(&pev);
1926 clear_probe_trace_event(&tev);
1927 if (ret < 0)
1928 break;
1929 }
1930 strlist__delete(rawlist);
1931
1932 return ret;
1933 }
1934
1935 /* List up current perf-probe events */
1936 int show_perf_probe_events(void)
1937 {
1938 int fd, ret;
1939
1940 setup_pager();
1941 fd = open_kprobe_events(false);
1942
1943 if (fd < 0)
1944 return fd;
1945
1946 ret = init_symbol_maps(false);
1947 if (ret < 0)
1948 return ret;
1949
1950 ret = __show_perf_probe_events(fd, true);
1951 close(fd);
1952
1953 fd = open_uprobe_events(false);
1954 if (fd >= 0) {
1955 ret = __show_perf_probe_events(fd, false);
1956 close(fd);
1957 }
1958
1959 exit_symbol_maps();
1960 return ret;
1961 }
1962
1963 /* Get current perf-probe event names */
1964 static struct strlist *get_probe_trace_event_names(int fd, bool include_group)
1965 {
1966 char buf[128];
1967 struct strlist *sl, *rawlist;
1968 struct str_node *ent;
1969 struct probe_trace_event tev;
1970 int ret = 0;
1971
1972 memset(&tev, 0, sizeof(tev));
1973 rawlist = get_probe_trace_command_rawlist(fd);
1974 sl = strlist__new(true, NULL);
1975 strlist__for_each(ent, rawlist) {
1976 ret = parse_probe_trace_command(ent->s, &tev);
1977 if (ret < 0)
1978 break;
1979 if (include_group) {
1980 ret = e_snprintf(buf, 128, "%s:%s", tev.group,
1981 tev.event);
1982 if (ret >= 0)
1983 ret = strlist__add(sl, buf);
1984 } else
1985 ret = strlist__add(sl, tev.event);
1986 clear_probe_trace_event(&tev);
1987 if (ret < 0)
1988 break;
1989 }
1990 strlist__delete(rawlist);
1991
1992 if (ret < 0) {
1993 strlist__delete(sl);
1994 return NULL;
1995 }
1996 return sl;
1997 }
1998
1999 static int write_probe_trace_event(int fd, struct probe_trace_event *tev)
2000 {
2001 int ret = 0;
2002 char *buf = synthesize_probe_trace_command(tev);
2003
2004 if (!buf) {
2005 pr_debug("Failed to synthesize probe trace event.\n");
2006 return -EINVAL;
2007 }
2008
2009 pr_debug("Writing event: %s\n", buf);
2010 if (!probe_event_dry_run) {
2011 ret = write(fd, buf, strlen(buf));
2012 if (ret <= 0)
2013 pr_warning("Failed to write event: %s\n",
2014 strerror(errno));
2015 }
2016 free(buf);
2017 return ret;
2018 }
2019
2020 static int get_new_event_name(char *buf, size_t len, const char *base,
2021 struct strlist *namelist, bool allow_suffix)
2022 {
2023 int i, ret;
2024
2025 /* Try no suffix */
2026 ret = e_snprintf(buf, len, "%s", base);
2027 if (ret < 0) {
2028 pr_debug("snprintf() failed: %s\n", strerror(-ret));
2029 return ret;
2030 }
2031 if (!strlist__has_entry(namelist, buf))
2032 return 0;
2033
2034 if (!allow_suffix) {
2035 pr_warning("Error: event \"%s\" already exists. "
2036 "(Use -f to force duplicates.)\n", base);
2037 return -EEXIST;
2038 }
2039
2040 /* Try to add suffix */
2041 for (i = 1; i < MAX_EVENT_INDEX; i++) {
2042 ret = e_snprintf(buf, len, "%s_%d", base, i);
2043 if (ret < 0) {
2044 pr_debug("snprintf() failed: %s\n", strerror(-ret));
2045 return ret;
2046 }
2047 if (!strlist__has_entry(namelist, buf))
2048 break;
2049 }
2050 if (i == MAX_EVENT_INDEX) {
2051 pr_warning("Too many events are on the same function.\n");
2052 ret = -ERANGE;
2053 }
2054
2055 return ret;
2056 }
2057
2058 static int __add_probe_trace_events(struct perf_probe_event *pev,
2059 struct probe_trace_event *tevs,
2060 int ntevs, bool allow_suffix)
2061 {
2062 int i, fd, ret;
2063 struct probe_trace_event *tev = NULL;
2064 char buf[64];
2065 const char *event, *group;
2066 struct strlist *namelist;
2067
2068 if (pev->uprobes)
2069 fd = open_uprobe_events(true);
2070 else
2071 fd = open_kprobe_events(true);
2072
2073 if (fd < 0)
2074 return fd;
2075 /* Get current event names */
2076 namelist = get_probe_trace_event_names(fd, false);
2077 if (!namelist) {
2078 pr_debug("Failed to get current event list.\n");
2079 return -EIO;
2080 }
2081
2082 ret = 0;
2083 printf("Added new event%s\n", (ntevs > 1) ? "s:" : ":");
2084 for (i = 0; i < ntevs; i++) {
2085 tev = &tevs[i];
2086 if (pev->event)
2087 event = pev->event;
2088 else
2089 if (pev->point.function)
2090 event = pev->point.function;
2091 else
2092 event = tev->point.symbol;
2093 if (pev->group)
2094 group = pev->group;
2095 else
2096 group = PERFPROBE_GROUP;
2097
2098 /* Get an unused new event name */
2099 ret = get_new_event_name(buf, 64, event,
2100 namelist, allow_suffix);
2101 if (ret < 0)
2102 break;
2103 event = buf;
2104
2105 tev->event = strdup(event);
2106 tev->group = strdup(group);
2107 if (tev->event == NULL || tev->group == NULL) {
2108 ret = -ENOMEM;
2109 break;
2110 }
2111 ret = write_probe_trace_event(fd, tev);
2112 if (ret < 0)
2113 break;
2114 /* Add added event name to namelist */
2115 strlist__add(namelist, event);
2116
2117 /* Trick here - save current event/group */
2118 event = pev->event;
2119 group = pev->group;
2120 pev->event = tev->event;
2121 pev->group = tev->group;
2122 show_perf_probe_event(pev, tev->point.module);
2123 /* Trick here - restore current event/group */
2124 pev->event = (char *)event;
2125 pev->group = (char *)group;
2126
2127 /*
2128 * Probes after the first probe which comes from same
2129 * user input are always allowed to add suffix, because
2130 * there might be several addresses corresponding to
2131 * one code line.
2132 */
2133 allow_suffix = true;
2134 }
2135
2136 if (ret >= 0) {
2137 /* Show how to use the event. */
2138 printf("\nYou can now use it in all perf tools, such as:\n\n");
2139 printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
2140 tev->event);
2141 }
2142
2143 strlist__delete(namelist);
2144 close(fd);
2145 return ret;
2146 }
2147
2148 static char *looking_function_name;
2149 static int num_matched_functions;
2150
2151 static int probe_function_filter(struct map *map __maybe_unused,
2152 struct symbol *sym)
2153 {
2154 if ((sym->binding == STB_GLOBAL || sym->binding == STB_LOCAL) &&
2155 strcmp(looking_function_name, sym->name) == 0) {
2156 num_matched_functions++;
2157 return 0;
2158 }
2159 return 1;
2160 }
2161
2162 #define strdup_or_goto(str, label) \
2163 ({ char *__p = strdup(str); if (!__p) goto label; __p; })
2164
2165 /*
2166 * Find probe function addresses from map.
2167 * Return an error or the number of found probe_trace_event
2168 */
2169 static int find_probe_trace_events_from_map(struct perf_probe_event *pev,
2170 struct probe_trace_event **tevs,
2171 int max_tevs, const char *target)
2172 {
2173 struct map *map = NULL;
2174 struct kmap *kmap = NULL;
2175 struct ref_reloc_sym *reloc_sym = NULL;
2176 struct symbol *sym;
2177 struct rb_node *nd;
2178 struct probe_trace_event *tev;
2179 struct perf_probe_point *pp = &pev->point;
2180 struct probe_trace_point *tp;
2181 int ret, i;
2182
2183 /* Init maps of given executable or kernel */
2184 if (pev->uprobes)
2185 map = dso__new_map(target);
2186 else
2187 map = kernel_get_module_map(target);
2188 if (!map) {
2189 ret = -EINVAL;
2190 goto out;
2191 }
2192
2193 /*
2194 * Load matched symbols: Since the different local symbols may have
2195 * same name but different addresses, this lists all the symbols.
2196 */
2197 num_matched_functions = 0;
2198 looking_function_name = pp->function;
2199 ret = map__load(map, probe_function_filter);
2200 if (ret || num_matched_functions == 0) {
2201 pr_err("Failed to find symbol %s in %s\n", pp->function,
2202 target ? : "kernel");
2203 ret = -ENOENT;
2204 goto out;
2205 } else if (num_matched_functions > max_tevs) {
2206 pr_err("Too many functions matched in %s\n",
2207 target ? : "kernel");
2208 ret = -E2BIG;
2209 goto out;
2210 }
2211
2212 if (!pev->uprobes) {
2213 kmap = map__kmap(map);
2214 reloc_sym = kmap->ref_reloc_sym;
2215 if (!reloc_sym) {
2216 pr_warning("Relocated base symbol is not found!\n");
2217 ret = -EINVAL;
2218 goto out;
2219 }
2220 }
2221
2222 /* Setup result trace-probe-events */
2223 *tevs = zalloc(sizeof(*tev) * num_matched_functions);
2224 if (!*tevs) {
2225 ret = -ENOMEM;
2226 goto out;
2227 }
2228
2229 ret = 0;
2230 map__for_each_symbol(map, sym, nd) {
2231 tev = (*tevs) + ret;
2232 tp = &tev->point;
2233 if (ret == num_matched_functions) {
2234 pr_warning("Too many symbols are listed. Skip it.\n");
2235 break;
2236 }
2237 ret++;
2238
2239 if (pp->offset > sym->end - sym->start) {
2240 pr_warning("Offset %ld is bigger than the size of %s\n",
2241 pp->offset, sym->name);
2242 ret = -ENOENT;
2243 goto err_out;
2244 }
2245 /* Add one probe point */
2246 tp->address = map->unmap_ip(map, sym->start) + pp->offset;
2247 if (reloc_sym) {
2248 tp->symbol = strdup_or_goto(reloc_sym->name, nomem_out);
2249 tp->offset = tp->address - reloc_sym->addr;
2250 } else {
2251 tp->symbol = strdup_or_goto(sym->name, nomem_out);
2252 tp->offset = pp->offset;
2253 }
2254 tp->retprobe = pp->retprobe;
2255 if (target)
2256 tev->point.module = strdup_or_goto(target, nomem_out);
2257 tev->uprobes = pev->uprobes;
2258 tev->nargs = pev->nargs;
2259 if (tev->nargs) {
2260 tev->args = zalloc(sizeof(struct probe_trace_arg) *
2261 tev->nargs);
2262 if (tev->args == NULL)
2263 goto nomem_out;
2264 }
2265 for (i = 0; i < tev->nargs; i++) {
2266 if (pev->args[i].name)
2267 tev->args[i].name =
2268 strdup_or_goto(pev->args[i].name,
2269 nomem_out);
2270
2271 tev->args[i].value = strdup_or_goto(pev->args[i].var,
2272 nomem_out);
2273 if (pev->args[i].type)
2274 tev->args[i].type =
2275 strdup_or_goto(pev->args[i].type,
2276 nomem_out);
2277 }
2278 }
2279
2280 out:
2281 if (map && pev->uprobes) {
2282 /* Only when using uprobe(exec) map needs to be released */
2283 dso__delete(map->dso);
2284 map__delete(map);
2285 }
2286 return ret;
2287
2288 nomem_out:
2289 ret = -ENOMEM;
2290 err_out:
2291 clear_probe_trace_events(*tevs, num_matched_functions);
2292 zfree(tevs);
2293 goto out;
2294 }
2295
2296 static int convert_to_probe_trace_events(struct perf_probe_event *pev,
2297 struct probe_trace_event **tevs,
2298 int max_tevs, const char *target)
2299 {
2300 int ret;
2301
2302 if (pev->uprobes && !pev->group) {
2303 /* Replace group name if not given */
2304 ret = convert_exec_to_group(target, &pev->group);
2305 if (ret != 0) {
2306 pr_warning("Failed to make a group name.\n");
2307 return ret;
2308 }
2309 }
2310
2311 /* Convert perf_probe_event with debuginfo */
2312 ret = try_to_find_probe_trace_events(pev, tevs, max_tevs, target);
2313 if (ret != 0)
2314 return ret; /* Found in debuginfo or got an error */
2315
2316 return find_probe_trace_events_from_map(pev, tevs, max_tevs, target);
2317 }
2318
2319 struct __event_package {
2320 struct perf_probe_event *pev;
2321 struct probe_trace_event *tevs;
2322 int ntevs;
2323 };
2324
2325 int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
2326 int max_tevs, const char *target, bool force_add)
2327 {
2328 int i, j, ret;
2329 struct __event_package *pkgs;
2330
2331 ret = 0;
2332 pkgs = zalloc(sizeof(struct __event_package) * npevs);
2333
2334 if (pkgs == NULL)
2335 return -ENOMEM;
2336
2337 ret = init_symbol_maps(pevs->uprobes);
2338 if (ret < 0) {
2339 free(pkgs);
2340 return ret;
2341 }
2342
2343 /* Loop 1: convert all events */
2344 for (i = 0; i < npevs; i++) {
2345 pkgs[i].pev = &pevs[i];
2346 /* Convert with or without debuginfo */
2347 ret = convert_to_probe_trace_events(pkgs[i].pev,
2348 &pkgs[i].tevs,
2349 max_tevs,
2350 target);
2351 if (ret < 0)
2352 goto end;
2353 pkgs[i].ntevs = ret;
2354 }
2355
2356 /* Loop 2: add all events */
2357 for (i = 0; i < npevs; i++) {
2358 ret = __add_probe_trace_events(pkgs[i].pev, pkgs[i].tevs,
2359 pkgs[i].ntevs, force_add);
2360 if (ret < 0)
2361 break;
2362 }
2363 end:
2364 /* Loop 3: cleanup and free trace events */
2365 for (i = 0; i < npevs; i++) {
2366 for (j = 0; j < pkgs[i].ntevs; j++)
2367 clear_probe_trace_event(&pkgs[i].tevs[j]);
2368 zfree(&pkgs[i].tevs);
2369 }
2370 free(pkgs);
2371 exit_symbol_maps();
2372
2373 return ret;
2374 }
2375
2376 static int __del_trace_probe_event(int fd, struct str_node *ent)
2377 {
2378 char *p;
2379 char buf[128];
2380 int ret;
2381
2382 /* Convert from perf-probe event to trace-probe event */
2383 ret = e_snprintf(buf, 128, "-:%s", ent->s);
2384 if (ret < 0)
2385 goto error;
2386
2387 p = strchr(buf + 2, ':');
2388 if (!p) {
2389 pr_debug("Internal error: %s should have ':' but not.\n",
2390 ent->s);
2391 ret = -ENOTSUP;
2392 goto error;
2393 }
2394 *p = '/';
2395
2396 pr_debug("Writing event: %s\n", buf);
2397 ret = write(fd, buf, strlen(buf));
2398 if (ret < 0) {
2399 ret = -errno;
2400 goto error;
2401 }
2402
2403 printf("Removed event: %s\n", ent->s);
2404 return 0;
2405 error:
2406 pr_warning("Failed to delete event: %s\n", strerror(-ret));
2407 return ret;
2408 }
2409
2410 static int del_trace_probe_event(int fd, const char *buf,
2411 struct strlist *namelist)
2412 {
2413 struct str_node *ent, *n;
2414 int ret = -1;
2415
2416 if (strpbrk(buf, "*?")) { /* Glob-exp */
2417 strlist__for_each_safe(ent, n, namelist)
2418 if (strglobmatch(ent->s, buf)) {
2419 ret = __del_trace_probe_event(fd, ent);
2420 if (ret < 0)
2421 break;
2422 strlist__remove(namelist, ent);
2423 }
2424 } else {
2425 ent = strlist__find(namelist, buf);
2426 if (ent) {
2427 ret = __del_trace_probe_event(fd, ent);
2428 if (ret >= 0)
2429 strlist__remove(namelist, ent);
2430 }
2431 }
2432
2433 return ret;
2434 }
2435
2436 int del_perf_probe_events(struct strlist *dellist)
2437 {
2438 int ret = -1, ufd = -1, kfd = -1;
2439 char buf[128];
2440 const char *group, *event;
2441 char *p, *str;
2442 struct str_node *ent;
2443 struct strlist *namelist = NULL, *unamelist = NULL;
2444
2445 /* Get current event names */
2446 kfd = open_kprobe_events(true);
2447 if (kfd < 0)
2448 return kfd;
2449
2450 namelist = get_probe_trace_event_names(kfd, true);
2451 ufd = open_uprobe_events(true);
2452
2453 if (ufd >= 0)
2454 unamelist = get_probe_trace_event_names(ufd, true);
2455
2456 if (namelist == NULL && unamelist == NULL)
2457 goto error;
2458
2459 strlist__for_each(ent, dellist) {
2460 str = strdup(ent->s);
2461 if (str == NULL) {
2462 ret = -ENOMEM;
2463 goto error;
2464 }
2465 pr_debug("Parsing: %s\n", str);
2466 p = strchr(str, ':');
2467 if (p) {
2468 group = str;
2469 *p = '\0';
2470 event = p + 1;
2471 } else {
2472 group = "*";
2473 event = str;
2474 }
2475
2476 ret = e_snprintf(buf, 128, "%s:%s", group, event);
2477 if (ret < 0) {
2478 pr_err("Failed to copy event.");
2479 free(str);
2480 goto error;
2481 }
2482
2483 pr_debug("Group: %s, Event: %s\n", group, event);
2484
2485 if (namelist)
2486 ret = del_trace_probe_event(kfd, buf, namelist);
2487
2488 if (unamelist && ret != 0)
2489 ret = del_trace_probe_event(ufd, buf, unamelist);
2490
2491 if (ret != 0)
2492 pr_info("Info: Event \"%s\" does not exist.\n", buf);
2493
2494 free(str);
2495 }
2496
2497 error:
2498 if (kfd >= 0) {
2499 strlist__delete(namelist);
2500 close(kfd);
2501 }
2502
2503 if (ufd >= 0) {
2504 strlist__delete(unamelist);
2505 close(ufd);
2506 }
2507
2508 return ret;
2509 }
2510
2511 /* TODO: don't use a global variable for filter ... */
2512 static struct strfilter *available_func_filter;
2513
2514 /*
2515 * If a symbol corresponds to a function with global binding and
2516 * matches filter return 0. For all others return 1.
2517 */
2518 static int filter_available_functions(struct map *map __maybe_unused,
2519 struct symbol *sym)
2520 {
2521 if ((sym->binding == STB_GLOBAL || sym->binding == STB_LOCAL) &&
2522 strfilter__compare(available_func_filter, sym->name))
2523 return 0;
2524 return 1;
2525 }
2526
2527 int show_available_funcs(const char *target, struct strfilter *_filter,
2528 bool user)
2529 {
2530 struct map *map;
2531 int ret;
2532
2533 ret = init_symbol_maps(user);
2534 if (ret < 0)
2535 return ret;
2536
2537 /* Get a symbol map */
2538 if (user)
2539 map = dso__new_map(target);
2540 else
2541 map = kernel_get_module_map(target);
2542 if (!map) {
2543 pr_err("Failed to get a map for %s\n", (target) ? : "kernel");
2544 return -EINVAL;
2545 }
2546
2547 /* Load symbols with given filter */
2548 available_func_filter = _filter;
2549 if (map__load(map, filter_available_functions)) {
2550 pr_err("Failed to load symbols in %s\n", (target) ? : "kernel");
2551 goto end;
2552 }
2553 if (!dso__sorted_by_name(map->dso, map->type))
2554 dso__sort_by_name(map->dso, map->type);
2555
2556 /* Show all (filtered) symbols */
2557 setup_pager();
2558 dso__fprintf_symbols_by_name(map->dso, map->type, stdout);
2559 end:
2560 if (user) {
2561 dso__delete(map->dso);
2562 map__delete(map);
2563 }
2564 exit_symbol_maps();
2565
2566 return ret;
2567 }
2568