perf & kvm: Clean up some of the guest profiling callback API details
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / tools / perf / util / probe-event.c
CommitLineData
50656eec
MH
1/*
2 * probe-event.c : perf-probe definition to kprobe_events format converter
3 *
4 * Written by Masami Hiramatsu <mhiramat@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 *
20 */
21
22#define _GNU_SOURCE
23#include <sys/utsname.h>
24#include <sys/types.h>
25#include <sys/stat.h>
26#include <fcntl.h>
27#include <errno.h>
28#include <stdio.h>
29#include <unistd.h>
30#include <stdlib.h>
31#include <string.h>
4de189fe
MH
32#include <stdarg.h>
33#include <limits.h>
50656eec
MH
34
35#undef _GNU_SOURCE
31facc5f 36#include "util.h"
50656eec 37#include "event.h"
e1c01d61 38#include "string.h"
4de189fe 39#include "strlist.h"
50656eec 40#include "debug.h"
72041334 41#include "cache.h"
631c9def 42#include "color.h"
e0faa8d3
MH
43#include "symbol.h"
44#include "thread.h"
7ca5989d 45#include "debugfs.h"
4b4da7f7 46#include "trace-event.h" /* For __unused */
50656eec 47#include "probe-event.h"
4235b045 48#include "probe-finder.h"
50656eec
MH
49
50#define MAX_CMDLEN 256
51#define MAX_PROBE_ARGS 128
52#define PERFPROBE_GROUP "probe"
53
f4d7da49
MH
54bool probe_event_dry_run; /* Dry run flag */
55
146a1439 56#define semantic_error(msg ...) pr_err("Semantic error :" msg)
50656eec 57
4de189fe 58/* If there is no space to write, returns -E2BIG. */
84988450
MH
59static int e_snprintf(char *str, size_t size, const char *format, ...)
60 __attribute__((format(printf, 3, 4)));
61
4de189fe
MH
62static int e_snprintf(char *str, size_t size, const char *format, ...)
63{
64 int ret;
65 va_list ap;
66 va_start(ap, format);
67 ret = vsnprintf(str, size, format, ap);
68 va_end(ap);
69 if (ret >= (int)size)
70 ret = -E2BIG;
71 return ret;
72}
73
4b4da7f7 74static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
e0faa8d3
MH
75static struct map_groups kmap_groups;
76static struct map *kmaps[MAP__NR_TYPES];
77
4b4da7f7 78/* Initialize symbol maps and path of vmlinux */
146a1439 79static int init_vmlinux(void)
e0faa8d3 80{
a1645ce1 81 struct dso *kernel;
146a1439
MH
82 int ret;
83
e0faa8d3
MH
84 symbol_conf.sort_by_name = true;
85 if (symbol_conf.vmlinux_name == NULL)
86 symbol_conf.try_vmlinux_path = true;
87 else
88 pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
146a1439
MH
89 ret = symbol__init();
90 if (ret < 0) {
91 pr_debug("Failed to init symbol map.\n");
92 goto out;
93 }
e0faa8d3 94
a1645ce1
ZY
95 kernel = dso__new_kernel(symbol_conf.vmlinux_name);
96 if (kernel == NULL)
97 die("Failed to create kernel dso.");
98
e0faa8d3 99 map_groups__init(&kmap_groups);
a1645ce1 100 ret = __map_groups__create_kernel_maps(&kmap_groups, kmaps, kernel);
146a1439
MH
101 if (ret < 0)
102 pr_debug("Failed to create kernel maps.\n");
103
104out:
105 if (ret < 0)
106 pr_warning("Failed to init vmlinux path.\n");
107 return ret;
e0faa8d3
MH
108}
109
4b4da7f7 110#ifdef DWARF_SUPPORT
e0faa8d3
MH
111static int open_vmlinux(void)
112{
113 if (map__load(kmaps[MAP__FUNCTION], NULL) < 0) {
114 pr_debug("Failed to load kernel map.\n");
115 return -EINVAL;
116 }
117 pr_debug("Try to open %s\n", kmaps[MAP__FUNCTION]->dso->long_name);
118 return open(kmaps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
119}
4b4da7f7 120
146a1439
MH
121/* Convert trace point to probe point with debuginfo */
122static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
123 struct perf_probe_point *pp)
4b4da7f7
MH
124{
125 struct symbol *sym;
146a1439 126 int fd, ret = -ENOENT;
4b4da7f7
MH
127
128 sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
129 tp->symbol, NULL);
130 if (sym) {
131 fd = open_vmlinux();
146a1439
MH
132 if (fd >= 0) {
133 ret = find_perf_probe_point(fd,
134 sym->start + tp->offset, pp);
135 close(fd);
136 }
4b4da7f7
MH
137 }
138 if (ret <= 0) {
146a1439
MH
139 pr_debug("Failed to find corresponding probes from "
140 "debuginfo. Use kprobe event information.\n");
02b95dad
MH
141 pp->function = strdup(tp->symbol);
142 if (pp->function == NULL)
143 return -ENOMEM;
4b4da7f7
MH
144 pp->offset = tp->offset;
145 }
146 pp->retprobe = tp->retprobe;
146a1439
MH
147
148 return 0;
4b4da7f7
MH
149}
150
151/* Try to find perf_probe_event with debuginfo */
152static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
153 struct kprobe_trace_event **tevs)
154{
155 bool need_dwarf = perf_probe_event_need_dwarf(pev);
156 int fd, ntevs;
157
158 fd = open_vmlinux();
159 if (fd < 0) {
146a1439
MH
160 if (need_dwarf) {
161 pr_warning("Failed to open debuginfo file.\n");
162 return fd;
163 }
4b4da7f7
MH
164 pr_debug("Could not open vmlinux. Try to use symbols.\n");
165 return 0;
166 }
167
168 /* Searching trace events corresponding to probe event */
169 ntevs = find_kprobe_trace_events(fd, pev, tevs);
170 close(fd);
171
146a1439
MH
172 if (ntevs > 0) { /* Succeeded to find trace events */
173 pr_debug("find %d kprobe_trace_events.\n", ntevs);
4b4da7f7 174 return ntevs;
146a1439 175 }
4b4da7f7 176
146a1439
MH
177 if (ntevs == 0) { /* No error but failed to find probe point. */
178 pr_warning("Probe point '%s' not found.\n",
179 synthesize_perf_probe_point(&pev->point));
180 return -ENOENT;
181 }
182 /* Error path : ntevs < 0 */
4b4da7f7 183 if (need_dwarf) {
b55a87ad 184 if (ntevs == -EBADF)
4b4da7f7
MH
185 pr_warning("No dwarf info found in the vmlinux - "
186 "please rebuild with CONFIG_DEBUG_INFO=y.\n");
146a1439 187 return ntevs;
4b4da7f7
MH
188 }
189 pr_debug("An error occurred in debuginfo analysis."
190 " Try to use symbols.\n");
191 return 0;
4b4da7f7
MH
192}
193
194#define LINEBUF_SIZE 256
195#define NR_ADDITIONAL_LINES 2
196
d3b63d7a 197static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
4b4da7f7
MH
198{
199 char buf[LINEBUF_SIZE];
200 const char *color = PERF_COLOR_BLUE;
201
202 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
203 goto error;
204 if (!skip) {
205 if (show_num)
d3b63d7a 206 fprintf(stdout, "%7d %s", l, buf);
4b4da7f7
MH
207 else
208 color_fprintf(stdout, color, " %s", buf);
209 }
210
211 while (strlen(buf) == LINEBUF_SIZE - 1 &&
212 buf[LINEBUF_SIZE - 2] != '\n') {
213 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
214 goto error;
215 if (!skip) {
216 if (show_num)
217 fprintf(stdout, "%s", buf);
218 else
219 color_fprintf(stdout, color, "%s", buf);
220 }
221 }
146a1439
MH
222
223 return 0;
4b4da7f7
MH
224error:
225 if (feof(fp))
146a1439 226 pr_warning("Source file is shorter than expected.\n");
4b4da7f7 227 else
146a1439
MH
228 pr_warning("File read error: %s\n", strerror(errno));
229
230 return -1;
4b4da7f7
MH
231}
232
233/*
234 * Show line-range always requires debuginfo to find source file and
235 * line number.
236 */
146a1439 237int show_line_range(struct line_range *lr)
4b4da7f7 238{
d3b63d7a 239 int l = 1;
4b4da7f7
MH
240 struct line_node *ln;
241 FILE *fp;
242 int fd, ret;
243
244 /* Search a line range */
146a1439
MH
245 ret = init_vmlinux();
246 if (ret < 0)
247 return ret;
248
4b4da7f7 249 fd = open_vmlinux();
146a1439
MH
250 if (fd < 0) {
251 pr_warning("Failed to open debuginfo file.\n");
252 return fd;
253 }
254
4b4da7f7 255 ret = find_line_range(fd, lr);
4b4da7f7 256 close(fd);
146a1439
MH
257 if (ret == 0) {
258 pr_warning("Specified source line is not found.\n");
259 return -ENOENT;
260 } else if (ret < 0) {
261 pr_warning("Debuginfo analysis failed. (%d)\n", ret);
262 return ret;
263 }
4b4da7f7
MH
264
265 setup_pager();
266
267 if (lr->function)
268 fprintf(stdout, "<%s:%d>\n", lr->function,
269 lr->start - lr->offset);
270 else
271 fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
272
273 fp = fopen(lr->path, "r");
146a1439
MH
274 if (fp == NULL) {
275 pr_warning("Failed to open %s: %s\n", lr->path,
276 strerror(errno));
277 return -errno;
278 }
4b4da7f7 279 /* Skip to starting line number */
146a1439
MH
280 while (l < lr->start && ret >= 0)
281 ret = show_one_line(fp, l++, true, false);
282 if (ret < 0)
283 goto end;
4b4da7f7
MH
284
285 list_for_each_entry(ln, &lr->line_list, list) {
146a1439
MH
286 while (ln->line > l && ret >= 0)
287 ret = show_one_line(fp, (l++) - lr->offset,
288 false, false);
289 if (ret >= 0)
290 ret = show_one_line(fp, (l++) - lr->offset,
291 false, true);
292 if (ret < 0)
293 goto end;
4b4da7f7
MH
294 }
295
296 if (lr->end == INT_MAX)
297 lr->end = l + NR_ADDITIONAL_LINES;
dda4ab34 298 while (l <= lr->end && !feof(fp) && ret >= 0)
146a1439
MH
299 ret = show_one_line(fp, (l++) - lr->offset, false, false);
300end:
4b4da7f7 301 fclose(fp);
146a1439 302 return ret;
4b4da7f7
MH
303}
304
305#else /* !DWARF_SUPPORT */
306
146a1439 307static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
4b4da7f7
MH
308 struct perf_probe_point *pp)
309{
02b95dad
MH
310 pp->function = strdup(tp->symbol);
311 if (pp->function == NULL)
312 return -ENOMEM;
4b4da7f7
MH
313 pp->offset = tp->offset;
314 pp->retprobe = tp->retprobe;
146a1439
MH
315
316 return 0;
4b4da7f7
MH
317}
318
319static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
320 struct kprobe_trace_event **tevs __unused)
321{
146a1439
MH
322 if (perf_probe_event_need_dwarf(pev)) {
323 pr_warning("Debuginfo-analysis is not supported.\n");
324 return -ENOSYS;
325 }
4b4da7f7
MH
326 return 0;
327}
328
146a1439 329int show_line_range(struct line_range *lr __unused)
4b4da7f7 330{
146a1439
MH
331 pr_warning("Debuginfo-analysis is not supported.\n");
332 return -ENOSYS;
4b4da7f7
MH
333}
334
e0faa8d3
MH
335#endif
336
146a1439 337int parse_line_range_desc(const char *arg, struct line_range *lr)
631c9def
MH
338{
339 const char *ptr;
340 char *tmp;
341 /*
342 * <Syntax>
343 * SRC:SLN[+NUM|-ELN]
344 * FUNC[:SLN[+NUM|-ELN]]
345 */
346 ptr = strchr(arg, ':');
347 if (ptr) {
d3b63d7a 348 lr->start = (int)strtoul(ptr + 1, &tmp, 0);
dda4ab34 349 if (*tmp == '+') {
d3b63d7a 350 lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
dda4ab34
MH
351 lr->end--; /*
352 * Adjust the number of lines here.
353 * If the number of lines == 1, the
354 * the end of line should be equal to
355 * the start of line.
356 */
357 } else if (*tmp == '-')
d3b63d7a 358 lr->end = (int)strtoul(tmp + 1, &tmp, 0);
631c9def 359 else
d3b63d7a
MH
360 lr->end = INT_MAX;
361 pr_debug("Line range is %d to %d\n", lr->start, lr->end);
362 if (lr->start > lr->end) {
631c9def 363 semantic_error("Start line must be smaller"
146a1439
MH
364 " than end line.\n");
365 return -EINVAL;
366 }
367 if (*tmp != '\0') {
368 semantic_error("Tailing with invalid character '%d'.\n",
631c9def 369 *tmp);
146a1439
MH
370 return -EINVAL;
371 }
02b95dad 372 tmp = strndup(arg, (ptr - arg));
d3b63d7a 373 } else {
02b95dad 374 tmp = strdup(arg);
d3b63d7a
MH
375 lr->end = INT_MAX;
376 }
02b95dad
MH
377
378 if (tmp == NULL)
379 return -ENOMEM;
631c9def
MH
380
381 if (strchr(tmp, '.'))
382 lr->file = tmp;
383 else
384 lr->function = tmp;
146a1439
MH
385
386 return 0;
631c9def
MH
387}
388
b7702a21
MH
389/* Check the name is good for event/group */
390static bool check_event_name(const char *name)
391{
392 if (!isalpha(*name) && *name != '_')
393 return false;
394 while (*++name != '\0') {
395 if (!isalpha(*name) && !isdigit(*name) && *name != '_')
396 return false;
397 }
398 return true;
399}
400
50656eec 401/* Parse probepoint definition. */
146a1439 402static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
50656eec 403{
4235b045 404 struct perf_probe_point *pp = &pev->point;
50656eec
MH
405 char *ptr, *tmp;
406 char c, nc = 0;
407 /*
408 * <Syntax>
2a9c8c36
MH
409 * perf probe [EVENT=]SRC[:LN|;PTN]
410 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
af663d75
MH
411 *
412 * TODO:Group name support
50656eec
MH
413 */
414
2a9c8c36
MH
415 ptr = strpbrk(arg, ";=@+%");
416 if (ptr && *ptr == '=') { /* Event name */
af663d75
MH
417 *ptr = '\0';
418 tmp = ptr + 1;
146a1439
MH
419 if (strchr(arg, ':')) {
420 semantic_error("Group name is not supported yet.\n");
421 return -ENOTSUP;
422 }
423 if (!check_event_name(arg)) {
b7702a21 424 semantic_error("%s is bad for event name -it must "
146a1439
MH
425 "follow C symbol-naming rule.\n", arg);
426 return -EINVAL;
427 }
02b95dad
MH
428 pev->event = strdup(arg);
429 if (pev->event == NULL)
430 return -ENOMEM;
4235b045 431 pev->group = NULL;
af663d75
MH
432 arg = tmp;
433 }
434
2a9c8c36 435 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
436 if (ptr) {
437 nc = *ptr;
438 *ptr++ = '\0';
439 }
440
02b95dad
MH
441 tmp = strdup(arg);
442 if (tmp == NULL)
443 return -ENOMEM;
444
50656eec 445 /* Check arg is function or file and copy it */
02b95dad
MH
446 if (strchr(tmp, '.')) /* File */
447 pp->file = tmp;
50656eec 448 else /* Function */
02b95dad 449 pp->function = tmp;
50656eec
MH
450
451 /* Parse other options */
452 while (ptr) {
453 arg = ptr;
454 c = nc;
2a9c8c36 455 if (c == ';') { /* Lazy pattern must be the last part */
02b95dad
MH
456 pp->lazy_line = strdup(arg);
457 if (pp->lazy_line == NULL)
458 return -ENOMEM;
2a9c8c36
MH
459 break;
460 }
461 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
462 if (ptr) {
463 nc = *ptr;
464 *ptr++ = '\0';
465 }
466 switch (c) {
467 case ':': /* Line number */
468 pp->line = strtoul(arg, &tmp, 0);
146a1439 469 if (*tmp != '\0') {
2a9c8c36 470 semantic_error("There is non-digit char"
146a1439
MH
471 " in line number.\n");
472 return -EINVAL;
473 }
50656eec
MH
474 break;
475 case '+': /* Byte offset from a symbol */
476 pp->offset = strtoul(arg, &tmp, 0);
146a1439 477 if (*tmp != '\0') {
2a9c8c36 478 semantic_error("There is non-digit character"
146a1439
MH
479 " in offset.\n");
480 return -EINVAL;
481 }
50656eec
MH
482 break;
483 case '@': /* File name */
146a1439
MH
484 if (pp->file) {
485 semantic_error("SRC@SRC is not allowed.\n");
486 return -EINVAL;
487 }
02b95dad
MH
488 pp->file = strdup(arg);
489 if (pp->file == NULL)
490 return -ENOMEM;
50656eec
MH
491 break;
492 case '%': /* Probe places */
493 if (strcmp(arg, "return") == 0) {
494 pp->retprobe = 1;
146a1439
MH
495 } else { /* Others not supported yet */
496 semantic_error("%%%s is not supported.\n", arg);
497 return -ENOTSUP;
498 }
50656eec 499 break;
146a1439
MH
500 default: /* Buggy case */
501 pr_err("This program has a bug at %s:%d.\n",
502 __FILE__, __LINE__);
503 return -ENOTSUP;
50656eec
MH
504 break;
505 }
506 }
507
508 /* Exclusion check */
146a1439 509 if (pp->lazy_line && pp->line) {
2a9c8c36 510 semantic_error("Lazy pattern can't be used with line number.");
146a1439
MH
511 return -EINVAL;
512 }
2a9c8c36 513
146a1439 514 if (pp->lazy_line && pp->offset) {
2a9c8c36 515 semantic_error("Lazy pattern can't be used with offset.");
146a1439
MH
516 return -EINVAL;
517 }
2a9c8c36 518
146a1439 519 if (pp->line && pp->offset) {
50656eec 520 semantic_error("Offset can't be used with line number.");
146a1439
MH
521 return -EINVAL;
522 }
50656eec 523
146a1439 524 if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
2a9c8c36
MH
525 semantic_error("File always requires line number or "
526 "lazy pattern.");
146a1439
MH
527 return -EINVAL;
528 }
50656eec 529
146a1439 530 if (pp->offset && !pp->function) {
50656eec 531 semantic_error("Offset requires an entry function.");
146a1439
MH
532 return -EINVAL;
533 }
50656eec 534
146a1439 535 if (pp->retprobe && !pp->function) {
50656eec 536 semantic_error("Return probe requires an entry function.");
146a1439
MH
537 return -EINVAL;
538 }
50656eec 539
146a1439 540 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
2a9c8c36
MH
541 semantic_error("Offset/Line/Lazy pattern can't be used with "
542 "return probe.");
146a1439
MH
543 return -EINVAL;
544 }
50656eec 545
4235b045 546 pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
2a9c8c36
MH
547 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
548 pp->lazy_line);
146a1439 549 return 0;
50656eec
MH
550}
551
7df2f329 552/* Parse perf-probe event argument */
146a1439 553static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
7df2f329 554{
48481938 555 char *tmp;
7df2f329
MH
556 struct perf_probe_arg_field **fieldp;
557
558 pr_debug("parsing arg: %s into ", str);
559
48481938
MH
560 tmp = strchr(str, '=');
561 if (tmp) {
02b95dad
MH
562 arg->name = strndup(str, tmp - str);
563 if (arg->name == NULL)
564 return -ENOMEM;
11a1ca35 565 pr_debug("name:%s ", arg->name);
48481938
MH
566 str = tmp + 1;
567 }
568
11a1ca35
MH
569 tmp = strchr(str, ':');
570 if (tmp) { /* Type setting */
571 *tmp = '\0';
02b95dad
MH
572 arg->type = strdup(tmp + 1);
573 if (arg->type == NULL)
574 return -ENOMEM;
11a1ca35
MH
575 pr_debug("type:%s ", arg->type);
576 }
577
7df2f329
MH
578 tmp = strpbrk(str, "-.");
579 if (!is_c_varname(str) || !tmp) {
580 /* A variable, register, symbol or special value */
02b95dad
MH
581 arg->var = strdup(str);
582 if (arg->var == NULL)
583 return -ENOMEM;
48481938 584 pr_debug("%s\n", arg->var);
146a1439 585 return 0;
7df2f329
MH
586 }
587
588 /* Structure fields */
02b95dad
MH
589 arg->var = strndup(str, tmp - str);
590 if (arg->var == NULL)
591 return -ENOMEM;
48481938 592 pr_debug("%s, ", arg->var);
7df2f329
MH
593 fieldp = &arg->field;
594
595 do {
e334016f
MH
596 *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
597 if (*fieldp == NULL)
598 return -ENOMEM;
7df2f329
MH
599 if (*tmp == '.') {
600 str = tmp + 1;
601 (*fieldp)->ref = false;
602 } else if (tmp[1] == '>') {
603 str = tmp + 2;
604 (*fieldp)->ref = true;
146a1439
MH
605 } else {
606 semantic_error("Argument parse error: %s\n", str);
607 return -EINVAL;
608 }
7df2f329
MH
609
610 tmp = strpbrk(str, "-.");
611 if (tmp) {
02b95dad
MH
612 (*fieldp)->name = strndup(str, tmp - str);
613 if ((*fieldp)->name == NULL)
614 return -ENOMEM;
7df2f329
MH
615 pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
616 fieldp = &(*fieldp)->next;
617 }
618 } while (tmp);
02b95dad
MH
619 (*fieldp)->name = strdup(str);
620 if ((*fieldp)->name == NULL)
621 return -ENOMEM;
7df2f329 622 pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
df0faf4b
MH
623
624 /* If no name is specified, set the last field name */
02b95dad
MH
625 if (!arg->name) {
626 arg->name = strdup((*fieldp)->name);
627 if (arg->name == NULL)
628 return -ENOMEM;
629 }
146a1439 630 return 0;
7df2f329
MH
631}
632
4235b045 633/* Parse perf-probe event command */
146a1439 634int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
50656eec 635{
e1c01d61 636 char **argv;
146a1439 637 int argc, i, ret = 0;
fac13fd5 638
4235b045 639 argv = argv_split(cmd, &argc);
146a1439
MH
640 if (!argv) {
641 pr_debug("Failed to split arguments.\n");
642 return -ENOMEM;
643 }
644 if (argc - 1 > MAX_PROBE_ARGS) {
645 semantic_error("Too many probe arguments (%d).\n", argc - 1);
646 ret = -ERANGE;
647 goto out;
648 }
50656eec 649 /* Parse probe point */
146a1439
MH
650 ret = parse_perf_probe_point(argv[0], pev);
651 if (ret < 0)
652 goto out;
50656eec 653
e1c01d61 654 /* Copy arguments and ensure return probe has no C argument */
4235b045 655 pev->nargs = argc - 1;
e334016f
MH
656 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
657 if (pev->args == NULL) {
658 ret = -ENOMEM;
659 goto out;
660 }
146a1439
MH
661 for (i = 0; i < pev->nargs && ret >= 0; i++) {
662 ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
663 if (ret >= 0 &&
664 is_c_varname(pev->args[i].var) && pev->point.retprobe) {
4235b045 665 semantic_error("You can't specify local variable for"
146a1439
MH
666 " kretprobe.\n");
667 ret = -EINVAL;
668 }
e1c01d61 669 }
146a1439 670out:
e1c01d61 671 argv_free(argv);
146a1439
MH
672
673 return ret;
50656eec
MH
674}
675
4235b045
MH
676/* Return true if this perf_probe_event requires debuginfo */
677bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
678{
679 int i;
680
681 if (pev->point.file || pev->point.line || pev->point.lazy_line)
682 return true;
683
684 for (i = 0; i < pev->nargs; i++)
48481938 685 if (is_c_varname(pev->args[i].var))
4235b045
MH
686 return true;
687
688 return false;
689}
690
4de189fe 691/* Parse kprobe_events event into struct probe_point */
146a1439 692int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
4de189fe 693{
4235b045 694 struct kprobe_trace_point *tp = &tev->point;
4de189fe
MH
695 char pr;
696 char *p;
697 int ret, i, argc;
698 char **argv;
699
4235b045
MH
700 pr_debug("Parsing kprobe_events: %s\n", cmd);
701 argv = argv_split(cmd, &argc);
146a1439
MH
702 if (!argv) {
703 pr_debug("Failed to split arguments.\n");
704 return -ENOMEM;
705 }
706 if (argc < 2) {
707 semantic_error("Too few probe arguments.\n");
708 ret = -ERANGE;
709 goto out;
710 }
4de189fe
MH
711
712 /* Scan event and group name. */
93aaa45a 713 ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
4235b045
MH
714 &pr, (float *)(void *)&tev->group,
715 (float *)(void *)&tev->event);
146a1439
MH
716 if (ret != 3) {
717 semantic_error("Failed to parse event name: %s\n", argv[0]);
718 ret = -EINVAL;
719 goto out;
720 }
4235b045 721 pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
4de189fe 722
4235b045 723 tp->retprobe = (pr == 'r');
4de189fe
MH
724
725 /* Scan function name and offset */
4235b045
MH
726 ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
727 &tp->offset);
4de189fe 728 if (ret == 1)
4235b045 729 tp->offset = 0;
4de189fe 730
4235b045 731 tev->nargs = argc - 2;
e334016f
MH
732 tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
733 if (tev->args == NULL) {
734 ret = -ENOMEM;
735 goto out;
736 }
4235b045 737 for (i = 0; i < tev->nargs; i++) {
4de189fe
MH
738 p = strchr(argv[i + 2], '=');
739 if (p) /* We don't need which register is assigned. */
4235b045
MH
740 *p++ = '\0';
741 else
742 p = argv[i + 2];
02b95dad 743 tev->args[i].name = strdup(argv[i + 2]);
4235b045 744 /* TODO: parse regs and offset */
02b95dad
MH
745 tev->args[i].value = strdup(p);
746 if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
747 ret = -ENOMEM;
748 goto out;
749 }
4de189fe 750 }
146a1439
MH
751 ret = 0;
752out:
4de189fe 753 argv_free(argv);
146a1439 754 return ret;
4de189fe
MH
755}
756
7df2f329
MH
757/* Compose only probe arg */
758int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
759{
760 struct perf_probe_arg_field *field = pa->field;
761 int ret;
762 char *tmp = buf;
763
48481938
MH
764 if (pa->name && pa->var)
765 ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
766 else
767 ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
7df2f329
MH
768 if (ret <= 0)
769 goto error;
770 tmp += ret;
771 len -= ret;
772
773 while (field) {
774 ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
775 field->name);
776 if (ret <= 0)
777 goto error;
778 tmp += ret;
779 len -= ret;
780 field = field->next;
781 }
11a1ca35
MH
782
783 if (pa->type) {
784 ret = e_snprintf(tmp, len, ":%s", pa->type);
785 if (ret <= 0)
786 goto error;
787 tmp += ret;
788 len -= ret;
789 }
790
7df2f329
MH
791 return tmp - buf;
792error:
146a1439
MH
793 pr_debug("Failed to synthesize perf probe argument: %s",
794 strerror(-ret));
795 return ret;
7df2f329
MH
796}
797
4235b045
MH
798/* Compose only probe point (not argument) */
799static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
4de189fe 800{
fb1587d8
MH
801 char *buf, *tmp;
802 char offs[32] = "", line[32] = "", file[32] = "";
803 int ret, len;
4de189fe 804
e334016f
MH
805 buf = zalloc(MAX_CMDLEN);
806 if (buf == NULL) {
807 ret = -ENOMEM;
808 goto error;
809 }
4de189fe 810 if (pp->offset) {
fb1587d8 811 ret = e_snprintf(offs, 32, "+%lu", pp->offset);
4de189fe
MH
812 if (ret <= 0)
813 goto error;
814 }
815 if (pp->line) {
fb1587d8
MH
816 ret = e_snprintf(line, 32, ":%d", pp->line);
817 if (ret <= 0)
818 goto error;
819 }
820 if (pp->file) {
dd259c5d 821 len = strlen(pp->file) - 31;
fb1587d8
MH
822 if (len < 0)
823 len = 0;
824 tmp = strchr(pp->file + len, '/');
825 if (!tmp)
dd259c5d 826 tmp = pp->file + len;
fb1587d8 827 ret = e_snprintf(file, 32, "@%s", tmp + 1);
4de189fe
MH
828 if (ret <= 0)
829 goto error;
830 }
831
832 if (pp->function)
fb1587d8
MH
833 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
834 offs, pp->retprobe ? "%return" : "", line,
835 file);
4de189fe 836 else
fb1587d8 837 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
4235b045
MH
838 if (ret <= 0)
839 goto error;
840
841 return buf;
7ef17aaf 842error:
146a1439
MH
843 pr_debug("Failed to synthesize perf probe point: %s",
844 strerror(-ret));
e334016f
MH
845 if (buf)
846 free(buf);
146a1439 847 return NULL;
7ef17aaf
MH
848}
849
4235b045
MH
850#if 0
851char *synthesize_perf_probe_command(struct perf_probe_event *pev)
7ef17aaf
MH
852{
853 char *buf;
854 int i, len, ret;
855
4235b045
MH
856 buf = synthesize_perf_probe_point(&pev->point);
857 if (!buf)
858 return NULL;
4de189fe 859
4235b045
MH
860 len = strlen(buf);
861 for (i = 0; i < pev->nargs; i++) {
4de189fe 862 ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
4235b045
MH
863 pev->args[i].name);
864 if (ret <= 0) {
865 free(buf);
866 return NULL;
867 }
4de189fe
MH
868 len += ret;
869 }
4de189fe 870
4235b045
MH
871 return buf;
872}
873#endif
874
875static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
876 char **buf, size_t *buflen,
877 int depth)
878{
879 int ret;
880 if (ref->next) {
881 depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
882 buflen, depth + 1);
883 if (depth < 0)
884 goto out;
885 }
886
887 ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
888 if (ret < 0)
889 depth = ret;
890 else {
891 *buf += ret;
892 *buflen -= ret;
893 }
894out:
895 return depth;
4de189fe 896
4de189fe
MH
897}
898
4235b045
MH
899static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
900 char *buf, size_t buflen)
50656eec 901{
4235b045
MH
902 int ret, depth = 0;
903 char *tmp = buf;
904
905 /* Argument name or separator */
906 if (arg->name)
907 ret = e_snprintf(buf, buflen, " %s=", arg->name);
908 else
909 ret = e_snprintf(buf, buflen, " ");
910 if (ret < 0)
911 return ret;
912 buf += ret;
913 buflen -= ret;
914
915 /* Dereferencing arguments */
916 if (arg->ref) {
917 depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
918 &buflen, 1);
919 if (depth < 0)
920 return depth;
921 }
922
923 /* Print argument value */
924 ret = e_snprintf(buf, buflen, "%s", arg->value);
925 if (ret < 0)
926 return ret;
927 buf += ret;
928 buflen -= ret;
929
930 /* Closing */
931 while (depth--) {
932 ret = e_snprintf(buf, buflen, ")");
933 if (ret < 0)
934 return ret;
935 buf += ret;
936 buflen -= ret;
937 }
4984912e
MH
938 /* Print argument type */
939 if (arg->type) {
940 ret = e_snprintf(buf, buflen, ":%s", arg->type);
941 if (ret <= 0)
942 return ret;
943 buf += ret;
944 }
4235b045
MH
945
946 return buf - tmp;
947}
948
949char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
950{
951 struct kprobe_trace_point *tp = &tev->point;
50656eec
MH
952 char *buf;
953 int i, len, ret;
954
e334016f
MH
955 buf = zalloc(MAX_CMDLEN);
956 if (buf == NULL)
957 return NULL;
958
4235b045
MH
959 len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
960 tp->retprobe ? 'r' : 'p',
961 tev->group, tev->event,
962 tp->symbol, tp->offset);
963 if (len <= 0)
50656eec 964 goto error;
50656eec 965
4235b045
MH
966 for (i = 0; i < tev->nargs; i++) {
967 ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
968 MAX_CMDLEN - len);
4de189fe 969 if (ret <= 0)
50656eec
MH
970 goto error;
971 len += ret;
972 }
50656eec 973
4235b045 974 return buf;
50656eec 975error:
4235b045
MH
976 free(buf);
977 return NULL;
978}
50656eec 979
146a1439
MH
980int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
981 struct perf_probe_event *pev)
4235b045 982{
02b95dad 983 char buf[64] = "";
146a1439 984 int i, ret;
4235b045 985
4b4da7f7 986 /* Convert event/group name */
02b95dad
MH
987 pev->event = strdup(tev->event);
988 pev->group = strdup(tev->group);
989 if (pev->event == NULL || pev->group == NULL)
990 return -ENOMEM;
fb1587d8 991
4b4da7f7 992 /* Convert trace_point to probe_point */
146a1439
MH
993 ret = convert_to_perf_probe_point(&tev->point, &pev->point);
994 if (ret < 0)
995 return ret;
4b4da7f7 996
4235b045
MH
997 /* Convert trace_arg to probe_arg */
998 pev->nargs = tev->nargs;
e334016f
MH
999 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1000 if (pev->args == NULL)
1001 return -ENOMEM;
02b95dad 1002 for (i = 0; i < tev->nargs && ret >= 0; i++) {
4235b045 1003 if (tev->args[i].name)
02b95dad 1004 pev->args[i].name = strdup(tev->args[i].name);
4235b045 1005 else {
146a1439
MH
1006 ret = synthesize_kprobe_trace_arg(&tev->args[i],
1007 buf, 64);
02b95dad 1008 pev->args[i].name = strdup(buf);
4235b045 1009 }
02b95dad
MH
1010 if (pev->args[i].name == NULL && ret >= 0)
1011 ret = -ENOMEM;
1012 }
146a1439
MH
1013
1014 if (ret < 0)
1015 clear_perf_probe_event(pev);
1016
1017 return ret;
4235b045
MH
1018}
1019
1020void clear_perf_probe_event(struct perf_probe_event *pev)
1021{
1022 struct perf_probe_point *pp = &pev->point;
7df2f329 1023 struct perf_probe_arg_field *field, *next;
4235b045
MH
1024 int i;
1025
1026 if (pev->event)
1027 free(pev->event);
1028 if (pev->group)
1029 free(pev->group);
1030 if (pp->file)
1031 free(pp->file);
1032 if (pp->function)
1033 free(pp->function);
1034 if (pp->lazy_line)
1035 free(pp->lazy_line);
7df2f329 1036 for (i = 0; i < pev->nargs; i++) {
4235b045
MH
1037 if (pev->args[i].name)
1038 free(pev->args[i].name);
48481938
MH
1039 if (pev->args[i].var)
1040 free(pev->args[i].var);
11a1ca35
MH
1041 if (pev->args[i].type)
1042 free(pev->args[i].type);
7df2f329
MH
1043 field = pev->args[i].field;
1044 while (field) {
1045 next = field->next;
1046 if (field->name)
1047 free(field->name);
1048 free(field);
1049 field = next;
1050 }
1051 }
4235b045
MH
1052 if (pev->args)
1053 free(pev->args);
1054 memset(pev, 0, sizeof(*pev));
1055}
1056
1057void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
1058{
1059 struct kprobe_trace_arg_ref *ref, *next;
1060 int i;
1061
1062 if (tev->event)
1063 free(tev->event);
1064 if (tev->group)
1065 free(tev->group);
1066 if (tev->point.symbol)
1067 free(tev->point.symbol);
1068 for (i = 0; i < tev->nargs; i++) {
1069 if (tev->args[i].name)
1070 free(tev->args[i].name);
1071 if (tev->args[i].value)
1072 free(tev->args[i].value);
4984912e
MH
1073 if (tev->args[i].type)
1074 free(tev->args[i].type);
4235b045
MH
1075 ref = tev->args[i].ref;
1076 while (ref) {
1077 next = ref->next;
1078 free(ref);
1079 ref = next;
1080 }
1081 }
1082 if (tev->args)
1083 free(tev->args);
1084 memset(tev, 0, sizeof(*tev));
50656eec
MH
1085}
1086
f4d7da49 1087static int open_kprobe_events(bool readwrite)
4de189fe
MH
1088{
1089 char buf[PATH_MAX];
7ca5989d 1090 const char *__debugfs;
4de189fe
MH
1091 int ret;
1092
7ca5989d
MH
1093 __debugfs = debugfs_find_mountpoint();
1094 if (__debugfs == NULL) {
1095 pr_warning("Debugfs is not mounted.\n");
1096 return -ENOENT;
1097 }
1098
1099 ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
146a1439 1100 if (ret >= 0) {
7ca5989d 1101 pr_debug("Opening %s write=%d\n", buf, readwrite);
146a1439
MH
1102 if (readwrite && !probe_event_dry_run)
1103 ret = open(buf, O_RDWR, O_APPEND);
1104 else
1105 ret = open(buf, O_RDONLY, 0);
1106 }
f4d7da49 1107
4de189fe
MH
1108 if (ret < 0) {
1109 if (errno == ENOENT)
146a1439
MH
1110 pr_warning("kprobe_events file does not exist - please"
1111 " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
4de189fe 1112 else
146a1439
MH
1113 pr_warning("Failed to open kprobe_events file: %s\n",
1114 strerror(errno));
4de189fe
MH
1115 }
1116 return ret;
1117}
1118
1119/* Get raw string list of current kprobe_events */
4235b045 1120static struct strlist *get_kprobe_trace_command_rawlist(int fd)
4de189fe
MH
1121{
1122 int ret, idx;
1123 FILE *fp;
1124 char buf[MAX_CMDLEN];
1125 char *p;
1126 struct strlist *sl;
1127
1128 sl = strlist__new(true, NULL);
1129
1130 fp = fdopen(dup(fd), "r");
1131 while (!feof(fp)) {
1132 p = fgets(buf, MAX_CMDLEN, fp);
1133 if (!p)
1134 break;
1135
1136 idx = strlen(p) - 1;
1137 if (p[idx] == '\n')
1138 p[idx] = '\0';
1139 ret = strlist__add(sl, buf);
146a1439
MH
1140 if (ret < 0) {
1141 pr_debug("strlist__add failed: %s\n", strerror(-ret));
1142 strlist__delete(sl);
1143 return NULL;
1144 }
4de189fe
MH
1145 }
1146 fclose(fp);
1147
1148 return sl;
1149}
1150
278498d4 1151/* Show an event */
146a1439 1152static int show_perf_probe_event(struct perf_probe_event *pev)
278498d4 1153{
7e990a51 1154 int i, ret;
278498d4 1155 char buf[128];
4235b045 1156 char *place;
278498d4 1157
4235b045
MH
1158 /* Synthesize only event probe point */
1159 place = synthesize_perf_probe_point(&pev->point);
146a1439
MH
1160 if (!place)
1161 return -EINVAL;
4235b045
MH
1162
1163 ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
7e990a51 1164 if (ret < 0)
146a1439
MH
1165 return ret;
1166
fb1587d8 1167 printf(" %-20s (on %s", buf, place);
278498d4 1168
4235b045 1169 if (pev->nargs > 0) {
278498d4 1170 printf(" with");
7df2f329 1171 for (i = 0; i < pev->nargs; i++) {
146a1439
MH
1172 ret = synthesize_perf_probe_arg(&pev->args[i],
1173 buf, 128);
1174 if (ret < 0)
1175 break;
7df2f329
MH
1176 printf(" %s", buf);
1177 }
278498d4
MH
1178 }
1179 printf(")\n");
4235b045 1180 free(place);
146a1439 1181 return ret;
278498d4
MH
1182}
1183
4de189fe 1184/* List up current perf-probe events */
146a1439 1185int show_perf_probe_events(void)
4de189fe 1186{
146a1439 1187 int fd, ret;
4235b045
MH
1188 struct kprobe_trace_event tev;
1189 struct perf_probe_event pev;
4de189fe
MH
1190 struct strlist *rawlist;
1191 struct str_node *ent;
1192
72041334 1193 setup_pager();
146a1439
MH
1194 ret = init_vmlinux();
1195 if (ret < 0)
1196 return ret;
4235b045
MH
1197
1198 memset(&tev, 0, sizeof(tev));
1199 memset(&pev, 0, sizeof(pev));
72041334 1200
f4d7da49 1201 fd = open_kprobe_events(false);
146a1439
MH
1202 if (fd < 0)
1203 return fd;
1204
4235b045 1205 rawlist = get_kprobe_trace_command_rawlist(fd);
4de189fe 1206 close(fd);
146a1439
MH
1207 if (!rawlist)
1208 return -ENOENT;
4de189fe 1209
adf365f4 1210 strlist__for_each(ent, rawlist) {
146a1439
MH
1211 ret = parse_kprobe_trace_command(ent->s, &tev);
1212 if (ret >= 0) {
1213 ret = convert_to_perf_probe_event(&tev, &pev);
1214 if (ret >= 0)
1215 ret = show_perf_probe_event(&pev);
1216 }
4235b045
MH
1217 clear_perf_probe_event(&pev);
1218 clear_kprobe_trace_event(&tev);
146a1439
MH
1219 if (ret < 0)
1220 break;
4de189fe 1221 }
4de189fe 1222 strlist__delete(rawlist);
146a1439
MH
1223
1224 return ret;
4de189fe
MH
1225}
1226
b498ce1f 1227/* Get current perf-probe event names */
4235b045 1228static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
b498ce1f 1229{
fa28244d 1230 char buf[128];
b498ce1f
MH
1231 struct strlist *sl, *rawlist;
1232 struct str_node *ent;
4235b045 1233 struct kprobe_trace_event tev;
146a1439 1234 int ret = 0;
b498ce1f 1235
4235b045 1236 memset(&tev, 0, sizeof(tev));
b498ce1f 1237
4235b045 1238 rawlist = get_kprobe_trace_command_rawlist(fd);
e1d2017b 1239 sl = strlist__new(true, NULL);
adf365f4 1240 strlist__for_each(ent, rawlist) {
146a1439
MH
1241 ret = parse_kprobe_trace_command(ent->s, &tev);
1242 if (ret < 0)
1243 break;
fa28244d 1244 if (include_group) {
146a1439
MH
1245 ret = e_snprintf(buf, 128, "%s:%s", tev.group,
1246 tev.event);
1247 if (ret >= 0)
1248 ret = strlist__add(sl, buf);
fa28244d 1249 } else
146a1439 1250 ret = strlist__add(sl, tev.event);
4235b045 1251 clear_kprobe_trace_event(&tev);
146a1439
MH
1252 if (ret < 0)
1253 break;
b498ce1f 1254 }
b498ce1f
MH
1255 strlist__delete(rawlist);
1256
146a1439
MH
1257 if (ret < 0) {
1258 strlist__delete(sl);
1259 return NULL;
1260 }
b498ce1f
MH
1261 return sl;
1262}
1263
146a1439 1264static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
50656eec
MH
1265{
1266 int ret;
4235b045 1267 char *buf = synthesize_kprobe_trace_command(tev);
50656eec 1268
146a1439
MH
1269 if (!buf) {
1270 pr_debug("Failed to synthesize kprobe trace event.\n");
1271 return -EINVAL;
1272 }
1273
fa28244d 1274 pr_debug("Writing event: %s\n", buf);
f4d7da49
MH
1275 if (!probe_event_dry_run) {
1276 ret = write(fd, buf, strlen(buf));
1277 if (ret <= 0)
146a1439
MH
1278 pr_warning("Failed to write event: %s\n",
1279 strerror(errno));
f4d7da49 1280 }
4235b045 1281 free(buf);
146a1439 1282 return ret;
50656eec
MH
1283}
1284
146a1439
MH
1285static int get_new_event_name(char *buf, size_t len, const char *base,
1286 struct strlist *namelist, bool allow_suffix)
b498ce1f
MH
1287{
1288 int i, ret;
17f88fcd
MH
1289
1290 /* Try no suffix */
1291 ret = e_snprintf(buf, len, "%s", base);
146a1439
MH
1292 if (ret < 0) {
1293 pr_debug("snprintf() failed: %s\n", strerror(-ret));
1294 return ret;
1295 }
17f88fcd 1296 if (!strlist__has_entry(namelist, buf))
146a1439 1297 return 0;
17f88fcd 1298
d761b08b
MH
1299 if (!allow_suffix) {
1300 pr_warning("Error: event \"%s\" already exists. "
1301 "(Use -f to force duplicates.)\n", base);
146a1439 1302 return -EEXIST;
d761b08b
MH
1303 }
1304
17f88fcd
MH
1305 /* Try to add suffix */
1306 for (i = 1; i < MAX_EVENT_INDEX; i++) {
b498ce1f 1307 ret = e_snprintf(buf, len, "%s_%d", base, i);
146a1439
MH
1308 if (ret < 0) {
1309 pr_debug("snprintf() failed: %s\n", strerror(-ret));
1310 return ret;
1311 }
b498ce1f
MH
1312 if (!strlist__has_entry(namelist, buf))
1313 break;
1314 }
146a1439
MH
1315 if (i == MAX_EVENT_INDEX) {
1316 pr_warning("Too many events are on the same function.\n");
1317 ret = -ERANGE;
1318 }
1319
1320 return ret;
b498ce1f
MH
1321}
1322
146a1439
MH
1323static int __add_kprobe_trace_events(struct perf_probe_event *pev,
1324 struct kprobe_trace_event *tevs,
1325 int ntevs, bool allow_suffix)
50656eec 1326{
146a1439 1327 int i, fd, ret;
55632770 1328 struct kprobe_trace_event *tev = NULL;
4235b045
MH
1329 char buf[64];
1330 const char *event, *group;
b498ce1f 1331 struct strlist *namelist;
50656eec 1332
f4d7da49 1333 fd = open_kprobe_events(true);
146a1439
MH
1334 if (fd < 0)
1335 return fd;
b498ce1f 1336 /* Get current event names */
4235b045 1337 namelist = get_kprobe_trace_event_names(fd, false);
146a1439
MH
1338 if (!namelist) {
1339 pr_debug("Failed to get current event list.\n");
1340 return -EIO;
1341 }
4235b045 1342
146a1439 1343 ret = 0;
4235b045 1344 printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
02b95dad 1345 for (i = 0; i < ntevs; i++) {
4235b045
MH
1346 tev = &tevs[i];
1347 if (pev->event)
1348 event = pev->event;
1349 else
1350 if (pev->point.function)
1351 event = pev->point.function;
1352 else
1353 event = tev->point.symbol;
1354 if (pev->group)
1355 group = pev->group;
1356 else
1357 group = PERFPROBE_GROUP;
1358
1359 /* Get an unused new event name */
146a1439
MH
1360 ret = get_new_event_name(buf, 64, event,
1361 namelist, allow_suffix);
1362 if (ret < 0)
1363 break;
4235b045
MH
1364 event = buf;
1365
02b95dad
MH
1366 tev->event = strdup(event);
1367 tev->group = strdup(group);
1368 if (tev->event == NULL || tev->group == NULL) {
1369 ret = -ENOMEM;
1370 break;
1371 }
146a1439
MH
1372 ret = write_kprobe_trace_event(fd, tev);
1373 if (ret < 0)
1374 break;
4235b045
MH
1375 /* Add added event name to namelist */
1376 strlist__add(namelist, event);
1377
1378 /* Trick here - save current event/group */
1379 event = pev->event;
1380 group = pev->group;
1381 pev->event = tev->event;
1382 pev->group = tev->group;
1383 show_perf_probe_event(pev);
1384 /* Trick here - restore current event/group */
1385 pev->event = (char *)event;
1386 pev->group = (char *)group;
1387
1388 /*
1389 * Probes after the first probe which comes from same
1390 * user input are always allowed to add suffix, because
1391 * there might be several addresses corresponding to
1392 * one code line.
1393 */
1394 allow_suffix = true;
50656eec 1395 }
146a1439
MH
1396
1397 if (ret >= 0) {
1398 /* Show how to use the event. */
1399 printf("\nYou can now use it on all perf tools, such as:\n\n");
1400 printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
1401 tev->event);
1402 }
a9b495b0 1403
e1d2017b 1404 strlist__delete(namelist);
50656eec 1405 close(fd);
146a1439 1406 return ret;
50656eec 1407}
fa28244d 1408
4235b045
MH
1409static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
1410 struct kprobe_trace_event **tevs)
e0faa8d3
MH
1411{
1412 struct symbol *sym;
e334016f 1413 int ret = 0, i;
4235b045
MH
1414 struct kprobe_trace_event *tev;
1415
4b4da7f7 1416 /* Convert perf_probe_event with debuginfo */
e334016f
MH
1417 ret = try_to_find_kprobe_trace_events(pev, tevs);
1418 if (ret != 0)
1419 return ret;
e0faa8d3 1420
4235b045 1421 /* Allocate trace event buffer */
e334016f
MH
1422 tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
1423 if (tev == NULL)
1424 return -ENOMEM;
4235b045
MH
1425
1426 /* Copy parameters */
02b95dad
MH
1427 tev->point.symbol = strdup(pev->point.function);
1428 if (tev->point.symbol == NULL) {
1429 ret = -ENOMEM;
1430 goto error;
1431 }
4235b045
MH
1432 tev->point.offset = pev->point.offset;
1433 tev->nargs = pev->nargs;
1434 if (tev->nargs) {
e334016f
MH
1435 tev->args = zalloc(sizeof(struct kprobe_trace_arg)
1436 * tev->nargs);
1437 if (tev->args == NULL) {
02b95dad
MH
1438 ret = -ENOMEM;
1439 goto error;
e334016f 1440 }
48481938 1441 for (i = 0; i < tev->nargs; i++) {
02b95dad
MH
1442 if (pev->args[i].name) {
1443 tev->args[i].name = strdup(pev->args[i].name);
1444 if (tev->args[i].name == NULL) {
1445 ret = -ENOMEM;
1446 goto error;
1447 }
1448 }
1449 tev->args[i].value = strdup(pev->args[i].var);
1450 if (tev->args[i].value == NULL) {
1451 ret = -ENOMEM;
1452 goto error;
1453 }
1454 if (pev->args[i].type) {
1455 tev->args[i].type = strdup(pev->args[i].type);
1456 if (tev->args[i].type == NULL) {
1457 ret = -ENOMEM;
1458 goto error;
1459 }
1460 }
48481938 1461 }
4235b045
MH
1462 }
1463
1464 /* Currently just checking function name from symbol map */
1465 sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
1466 tev->point.symbol, NULL);
146a1439
MH
1467 if (!sym) {
1468 pr_warning("Kernel symbol \'%s\' not found.\n",
1469 tev->point.symbol);
02b95dad
MH
1470 ret = -ENOENT;
1471 goto error;
1472 }
e334016f 1473
02b95dad
MH
1474 return 1;
1475error:
1476 clear_kprobe_trace_event(tev);
1477 free(tev);
1478 *tevs = NULL;
e334016f 1479 return ret;
4235b045
MH
1480}
1481
1482struct __event_package {
1483 struct perf_probe_event *pev;
1484 struct kprobe_trace_event *tevs;
1485 int ntevs;
1486};
1487
146a1439
MH
1488int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
1489 bool force_add)
4235b045 1490{
146a1439 1491 int i, j, ret;
4235b045
MH
1492 struct __event_package *pkgs;
1493
e334016f
MH
1494 pkgs = zalloc(sizeof(struct __event_package) * npevs);
1495 if (pkgs == NULL)
1496 return -ENOMEM;
4235b045
MH
1497
1498 /* Init vmlinux path */
146a1439
MH
1499 ret = init_vmlinux();
1500 if (ret < 0)
1501 return ret;
4235b045
MH
1502
1503 /* Loop 1: convert all events */
1504 for (i = 0; i < npevs; i++) {
1505 pkgs[i].pev = &pevs[i];
1506 /* Convert with or without debuginfo */
146a1439
MH
1507 ret = convert_to_kprobe_trace_events(pkgs[i].pev,
1508 &pkgs[i].tevs);
1509 if (ret < 0)
1510 goto end;
1511 pkgs[i].ntevs = ret;
e0faa8d3
MH
1512 }
1513
4235b045 1514 /* Loop 2: add all events */
146a1439
MH
1515 for (i = 0; i < npevs && ret >= 0; i++)
1516 ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
1517 pkgs[i].ntevs, force_add);
1518end:
1519 /* Loop 3: cleanup trace events */
4235b045 1520 for (i = 0; i < npevs; i++)
146a1439
MH
1521 for (j = 0; j < pkgs[i].ntevs; j++)
1522 clear_kprobe_trace_event(&pkgs[i].tevs[j]);
1523
1524 return ret;
e0faa8d3
MH
1525}
1526
146a1439 1527static int __del_trace_kprobe_event(int fd, struct str_node *ent)
bbbb521b
MH
1528{
1529 char *p;
1530 char buf[128];
4235b045 1531 int ret;
bbbb521b
MH
1532
1533 /* Convert from perf-probe event to trace-kprobe event */
146a1439
MH
1534 ret = e_snprintf(buf, 128, "-:%s", ent->s);
1535 if (ret < 0)
1536 goto error;
1537
bbbb521b 1538 p = strchr(buf + 2, ':');
146a1439
MH
1539 if (!p) {
1540 pr_debug("Internal error: %s should have ':' but not.\n",
1541 ent->s);
1542 ret = -ENOTSUP;
1543 goto error;
1544 }
bbbb521b
MH
1545 *p = '/';
1546
4235b045
MH
1547 pr_debug("Writing event: %s\n", buf);
1548 ret = write(fd, buf, strlen(buf));
146a1439
MH
1549 if (ret < 0)
1550 goto error;
1551
bbbb521b 1552 printf("Remove event: %s\n", ent->s);
146a1439
MH
1553 return 0;
1554error:
1555 pr_warning("Failed to delete event: %s\n", strerror(-ret));
1556 return ret;
bbbb521b
MH
1557}
1558
146a1439
MH
1559static int del_trace_kprobe_event(int fd, const char *group,
1560 const char *event, struct strlist *namelist)
fa28244d
MH
1561{
1562 char buf[128];
bbbb521b 1563 struct str_node *ent, *n;
146a1439 1564 int found = 0, ret = 0;
fa28244d 1565
146a1439
MH
1566 ret = e_snprintf(buf, 128, "%s:%s", group, event);
1567 if (ret < 0) {
1568 pr_err("Failed to copy event.");
1569 return ret;
1570 }
fa28244d 1571
bbbb521b
MH
1572 if (strpbrk(buf, "*?")) { /* Glob-exp */
1573 strlist__for_each_safe(ent, n, namelist)
1574 if (strglobmatch(ent->s, buf)) {
1575 found++;
146a1439
MH
1576 ret = __del_trace_kprobe_event(fd, ent);
1577 if (ret < 0)
1578 break;
bbbb521b
MH
1579 strlist__remove(namelist, ent);
1580 }
1581 } else {
1582 ent = strlist__find(namelist, buf);
1583 if (ent) {
1584 found++;
146a1439
MH
1585 ret = __del_trace_kprobe_event(fd, ent);
1586 if (ret >= 0)
1587 strlist__remove(namelist, ent);
bbbb521b
MH
1588 }
1589 }
146a1439
MH
1590 if (found == 0 && ret >= 0)
1591 pr_info("Info: Event \"%s\" does not exist.\n", buf);
1592
1593 return ret;
fa28244d
MH
1594}
1595
146a1439 1596int del_perf_probe_events(struct strlist *dellist)
fa28244d 1597{
146a1439 1598 int fd, ret = 0;
fa28244d
MH
1599 const char *group, *event;
1600 char *p, *str;
1601 struct str_node *ent;
1602 struct strlist *namelist;
1603
f4d7da49 1604 fd = open_kprobe_events(true);
146a1439
MH
1605 if (fd < 0)
1606 return fd;
1607
fa28244d 1608 /* Get current event names */
4235b045 1609 namelist = get_kprobe_trace_event_names(fd, true);
146a1439
MH
1610 if (namelist == NULL)
1611 return -EINVAL;
fa28244d 1612
adf365f4 1613 strlist__for_each(ent, dellist) {
02b95dad
MH
1614 str = strdup(ent->s);
1615 if (str == NULL) {
1616 ret = -ENOMEM;
1617 break;
1618 }
bbbb521b 1619 pr_debug("Parsing: %s\n", str);
fa28244d
MH
1620 p = strchr(str, ':');
1621 if (p) {
1622 group = str;
1623 *p = '\0';
1624 event = p + 1;
1625 } else {
bbbb521b 1626 group = "*";
fa28244d
MH
1627 event = str;
1628 }
bbbb521b 1629 pr_debug("Group: %s, Event: %s\n", group, event);
146a1439 1630 ret = del_trace_kprobe_event(fd, group, event, namelist);
fa28244d 1631 free(str);
146a1439
MH
1632 if (ret < 0)
1633 break;
fa28244d
MH
1634 }
1635 strlist__delete(namelist);
1636 close(fd);
146a1439
MH
1637
1638 return ret;
fa28244d
MH
1639}
1640