perf probe: Fix mis-estimation for shortening filename
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / tools / perf / util / probe-event.c
CommitLineData
50656eec
MH
1/*
2 * probe-event.c : perf-probe definition to kprobe_events format converter
3 *
4 * Written by Masami Hiramatsu <mhiramat@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 *
20 */
21
22#define _GNU_SOURCE
23#include <sys/utsname.h>
24#include <sys/types.h>
25#include <sys/stat.h>
26#include <fcntl.h>
27#include <errno.h>
28#include <stdio.h>
29#include <unistd.h>
30#include <stdlib.h>
31#include <string.h>
4de189fe
MH
32#include <stdarg.h>
33#include <limits.h>
50656eec
MH
34
35#undef _GNU_SOURCE
31facc5f 36#include "util.h"
50656eec 37#include "event.h"
e1c01d61 38#include "string.h"
4de189fe 39#include "strlist.h"
50656eec 40#include "debug.h"
72041334 41#include "cache.h"
631c9def 42#include "color.h"
e0faa8d3
MH
43#include "symbol.h"
44#include "thread.h"
7ca5989d 45#include "debugfs.h"
4b4da7f7 46#include "trace-event.h" /* For __unused */
50656eec 47#include "probe-event.h"
4235b045 48#include "probe-finder.h"
50656eec
MH
49
50#define MAX_CMDLEN 256
51#define MAX_PROBE_ARGS 128
52#define PERFPROBE_GROUP "probe"
53
f4d7da49
MH
54bool probe_event_dry_run; /* Dry run flag */
55
146a1439 56#define semantic_error(msg ...) pr_err("Semantic error :" msg)
50656eec 57
4de189fe 58/* If there is no space to write, returns -E2BIG. */
84988450
MH
59static int e_snprintf(char *str, size_t size, const char *format, ...)
60 __attribute__((format(printf, 3, 4)));
61
4de189fe
MH
62static int e_snprintf(char *str, size_t size, const char *format, ...)
63{
64 int ret;
65 va_list ap;
66 va_start(ap, format);
67 ret = vsnprintf(str, size, format, ap);
68 va_end(ap);
69 if (ret >= (int)size)
70 ret = -E2BIG;
71 return ret;
72}
73
4b4da7f7 74static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
e0faa8d3
MH
75static struct map_groups kmap_groups;
76static struct map *kmaps[MAP__NR_TYPES];
77
4b4da7f7 78/* Initialize symbol maps and path of vmlinux */
146a1439 79static int init_vmlinux(void)
e0faa8d3 80{
146a1439
MH
81 int ret;
82
e0faa8d3
MH
83 symbol_conf.sort_by_name = true;
84 if (symbol_conf.vmlinux_name == NULL)
85 symbol_conf.try_vmlinux_path = true;
86 else
87 pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
146a1439
MH
88 ret = symbol__init();
89 if (ret < 0) {
90 pr_debug("Failed to init symbol map.\n");
91 goto out;
92 }
e0faa8d3
MH
93
94 map_groups__init(&kmap_groups);
146a1439
MH
95 ret = map_groups__create_kernel_maps(&kmap_groups, kmaps);
96 if (ret < 0)
97 pr_debug("Failed to create kernel maps.\n");
98
99out:
100 if (ret < 0)
101 pr_warning("Failed to init vmlinux path.\n");
102 return ret;
e0faa8d3
MH
103}
104
4b4da7f7 105#ifdef DWARF_SUPPORT
e0faa8d3
MH
106static int open_vmlinux(void)
107{
108 if (map__load(kmaps[MAP__FUNCTION], NULL) < 0) {
109 pr_debug("Failed to load kernel map.\n");
110 return -EINVAL;
111 }
112 pr_debug("Try to open %s\n", kmaps[MAP__FUNCTION]->dso->long_name);
113 return open(kmaps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
114}
4b4da7f7 115
146a1439
MH
116/* Convert trace point to probe point with debuginfo */
117static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
118 struct perf_probe_point *pp)
4b4da7f7
MH
119{
120 struct symbol *sym;
146a1439 121 int fd, ret = -ENOENT;
4b4da7f7
MH
122
123 sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
124 tp->symbol, NULL);
125 if (sym) {
126 fd = open_vmlinux();
146a1439
MH
127 if (fd >= 0) {
128 ret = find_perf_probe_point(fd,
129 sym->start + tp->offset, pp);
130 close(fd);
131 }
4b4da7f7
MH
132 }
133 if (ret <= 0) {
146a1439
MH
134 pr_debug("Failed to find corresponding probes from "
135 "debuginfo. Use kprobe event information.\n");
02b95dad
MH
136 pp->function = strdup(tp->symbol);
137 if (pp->function == NULL)
138 return -ENOMEM;
4b4da7f7
MH
139 pp->offset = tp->offset;
140 }
141 pp->retprobe = tp->retprobe;
146a1439
MH
142
143 return 0;
4b4da7f7
MH
144}
145
146/* Try to find perf_probe_event with debuginfo */
147static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
148 struct kprobe_trace_event **tevs)
149{
150 bool need_dwarf = perf_probe_event_need_dwarf(pev);
151 int fd, ntevs;
152
153 fd = open_vmlinux();
154 if (fd < 0) {
146a1439
MH
155 if (need_dwarf) {
156 pr_warning("Failed to open debuginfo file.\n");
157 return fd;
158 }
4b4da7f7
MH
159 pr_debug("Could not open vmlinux. Try to use symbols.\n");
160 return 0;
161 }
162
163 /* Searching trace events corresponding to probe event */
164 ntevs = find_kprobe_trace_events(fd, pev, tevs);
165 close(fd);
166
146a1439
MH
167 if (ntevs > 0) { /* Succeeded to find trace events */
168 pr_debug("find %d kprobe_trace_events.\n", ntevs);
4b4da7f7 169 return ntevs;
146a1439 170 }
4b4da7f7 171
146a1439
MH
172 if (ntevs == 0) { /* No error but failed to find probe point. */
173 pr_warning("Probe point '%s' not found.\n",
174 synthesize_perf_probe_point(&pev->point));
175 return -ENOENT;
176 }
177 /* Error path : ntevs < 0 */
4b4da7f7 178 if (need_dwarf) {
b55a87ad 179 if (ntevs == -EBADF)
4b4da7f7
MH
180 pr_warning("No dwarf info found in the vmlinux - "
181 "please rebuild with CONFIG_DEBUG_INFO=y.\n");
146a1439 182 return ntevs;
4b4da7f7
MH
183 }
184 pr_debug("An error occurred in debuginfo analysis."
185 " Try to use symbols.\n");
186 return 0;
4b4da7f7
MH
187}
188
189#define LINEBUF_SIZE 256
190#define NR_ADDITIONAL_LINES 2
191
146a1439 192static int show_one_line(FILE *fp, unsigned int l, bool skip, bool show_num)
4b4da7f7
MH
193{
194 char buf[LINEBUF_SIZE];
195 const char *color = PERF_COLOR_BLUE;
196
197 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
198 goto error;
199 if (!skip) {
200 if (show_num)
201 fprintf(stdout, "%7u %s", l, buf);
202 else
203 color_fprintf(stdout, color, " %s", buf);
204 }
205
206 while (strlen(buf) == LINEBUF_SIZE - 1 &&
207 buf[LINEBUF_SIZE - 2] != '\n') {
208 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
209 goto error;
210 if (!skip) {
211 if (show_num)
212 fprintf(stdout, "%s", buf);
213 else
214 color_fprintf(stdout, color, "%s", buf);
215 }
216 }
146a1439
MH
217
218 return 0;
4b4da7f7
MH
219error:
220 if (feof(fp))
146a1439 221 pr_warning("Source file is shorter than expected.\n");
4b4da7f7 222 else
146a1439
MH
223 pr_warning("File read error: %s\n", strerror(errno));
224
225 return -1;
4b4da7f7
MH
226}
227
228/*
229 * Show line-range always requires debuginfo to find source file and
230 * line number.
231 */
146a1439 232int show_line_range(struct line_range *lr)
4b4da7f7
MH
233{
234 unsigned int l = 1;
235 struct line_node *ln;
236 FILE *fp;
237 int fd, ret;
238
239 /* Search a line range */
146a1439
MH
240 ret = init_vmlinux();
241 if (ret < 0)
242 return ret;
243
4b4da7f7 244 fd = open_vmlinux();
146a1439
MH
245 if (fd < 0) {
246 pr_warning("Failed to open debuginfo file.\n");
247 return fd;
248 }
249
4b4da7f7 250 ret = find_line_range(fd, lr);
4b4da7f7 251 close(fd);
146a1439
MH
252 if (ret == 0) {
253 pr_warning("Specified source line is not found.\n");
254 return -ENOENT;
255 } else if (ret < 0) {
256 pr_warning("Debuginfo analysis failed. (%d)\n", ret);
257 return ret;
258 }
4b4da7f7
MH
259
260 setup_pager();
261
262 if (lr->function)
263 fprintf(stdout, "<%s:%d>\n", lr->function,
264 lr->start - lr->offset);
265 else
266 fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);
267
268 fp = fopen(lr->path, "r");
146a1439
MH
269 if (fp == NULL) {
270 pr_warning("Failed to open %s: %s\n", lr->path,
271 strerror(errno));
272 return -errno;
273 }
4b4da7f7 274 /* Skip to starting line number */
146a1439
MH
275 while (l < lr->start && ret >= 0)
276 ret = show_one_line(fp, l++, true, false);
277 if (ret < 0)
278 goto end;
4b4da7f7
MH
279
280 list_for_each_entry(ln, &lr->line_list, list) {
146a1439
MH
281 while (ln->line > l && ret >= 0)
282 ret = show_one_line(fp, (l++) - lr->offset,
283 false, false);
284 if (ret >= 0)
285 ret = show_one_line(fp, (l++) - lr->offset,
286 false, true);
287 if (ret < 0)
288 goto end;
4b4da7f7
MH
289 }
290
291 if (lr->end == INT_MAX)
292 lr->end = l + NR_ADDITIONAL_LINES;
146a1439
MH
293 while (l < lr->end && !feof(fp) && ret >= 0)
294 ret = show_one_line(fp, (l++) - lr->offset, false, false);
295end:
4b4da7f7 296 fclose(fp);
146a1439 297 return ret;
4b4da7f7
MH
298}
299
300#else /* !DWARF_SUPPORT */
301
146a1439 302static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
4b4da7f7
MH
303 struct perf_probe_point *pp)
304{
02b95dad
MH
305 pp->function = strdup(tp->symbol);
306 if (pp->function == NULL)
307 return -ENOMEM;
4b4da7f7
MH
308 pp->offset = tp->offset;
309 pp->retprobe = tp->retprobe;
146a1439
MH
310
311 return 0;
4b4da7f7
MH
312}
313
314static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
315 struct kprobe_trace_event **tevs __unused)
316{
146a1439
MH
317 if (perf_probe_event_need_dwarf(pev)) {
318 pr_warning("Debuginfo-analysis is not supported.\n");
319 return -ENOSYS;
320 }
4b4da7f7
MH
321 return 0;
322}
323
146a1439 324int show_line_range(struct line_range *lr __unused)
4b4da7f7 325{
146a1439
MH
326 pr_warning("Debuginfo-analysis is not supported.\n");
327 return -ENOSYS;
4b4da7f7
MH
328}
329
e0faa8d3
MH
330#endif
331
146a1439 332int parse_line_range_desc(const char *arg, struct line_range *lr)
631c9def
MH
333{
334 const char *ptr;
335 char *tmp;
336 /*
337 * <Syntax>
338 * SRC:SLN[+NUM|-ELN]
339 * FUNC[:SLN[+NUM|-ELN]]
340 */
341 ptr = strchr(arg, ':');
342 if (ptr) {
343 lr->start = (unsigned int)strtoul(ptr + 1, &tmp, 0);
344 if (*tmp == '+')
345 lr->end = lr->start + (unsigned int)strtoul(tmp + 1,
346 &tmp, 0);
347 else if (*tmp == '-')
348 lr->end = (unsigned int)strtoul(tmp + 1, &tmp, 0);
349 else
350 lr->end = 0;
351 pr_debug("Line range is %u to %u\n", lr->start, lr->end);
146a1439 352 if (lr->end && lr->start > lr->end) {
631c9def 353 semantic_error("Start line must be smaller"
146a1439
MH
354 " than end line.\n");
355 return -EINVAL;
356 }
357 if (*tmp != '\0') {
358 semantic_error("Tailing with invalid character '%d'.\n",
631c9def 359 *tmp);
146a1439
MH
360 return -EINVAL;
361 }
02b95dad 362 tmp = strndup(arg, (ptr - arg));
631c9def 363 } else
02b95dad
MH
364 tmp = strdup(arg);
365
366 if (tmp == NULL)
367 return -ENOMEM;
631c9def
MH
368
369 if (strchr(tmp, '.'))
370 lr->file = tmp;
371 else
372 lr->function = tmp;
146a1439
MH
373
374 return 0;
631c9def
MH
375}
376
b7702a21
MH
377/* Check the name is good for event/group */
378static bool check_event_name(const char *name)
379{
380 if (!isalpha(*name) && *name != '_')
381 return false;
382 while (*++name != '\0') {
383 if (!isalpha(*name) && !isdigit(*name) && *name != '_')
384 return false;
385 }
386 return true;
387}
388
50656eec 389/* Parse probepoint definition. */
146a1439 390static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
50656eec 391{
4235b045 392 struct perf_probe_point *pp = &pev->point;
50656eec
MH
393 char *ptr, *tmp;
394 char c, nc = 0;
395 /*
396 * <Syntax>
2a9c8c36
MH
397 * perf probe [EVENT=]SRC[:LN|;PTN]
398 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
af663d75
MH
399 *
400 * TODO:Group name support
50656eec
MH
401 */
402
2a9c8c36
MH
403 ptr = strpbrk(arg, ";=@+%");
404 if (ptr && *ptr == '=') { /* Event name */
af663d75
MH
405 *ptr = '\0';
406 tmp = ptr + 1;
146a1439
MH
407 if (strchr(arg, ':')) {
408 semantic_error("Group name is not supported yet.\n");
409 return -ENOTSUP;
410 }
411 if (!check_event_name(arg)) {
b7702a21 412 semantic_error("%s is bad for event name -it must "
146a1439
MH
413 "follow C symbol-naming rule.\n", arg);
414 return -EINVAL;
415 }
02b95dad
MH
416 pev->event = strdup(arg);
417 if (pev->event == NULL)
418 return -ENOMEM;
4235b045 419 pev->group = NULL;
af663d75
MH
420 arg = tmp;
421 }
422
2a9c8c36 423 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
424 if (ptr) {
425 nc = *ptr;
426 *ptr++ = '\0';
427 }
428
02b95dad
MH
429 tmp = strdup(arg);
430 if (tmp == NULL)
431 return -ENOMEM;
432
50656eec 433 /* Check arg is function or file and copy it */
02b95dad
MH
434 if (strchr(tmp, '.')) /* File */
435 pp->file = tmp;
50656eec 436 else /* Function */
02b95dad 437 pp->function = tmp;
50656eec
MH
438
439 /* Parse other options */
440 while (ptr) {
441 arg = ptr;
442 c = nc;
2a9c8c36 443 if (c == ';') { /* Lazy pattern must be the last part */
02b95dad
MH
444 pp->lazy_line = strdup(arg);
445 if (pp->lazy_line == NULL)
446 return -ENOMEM;
2a9c8c36
MH
447 break;
448 }
449 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
450 if (ptr) {
451 nc = *ptr;
452 *ptr++ = '\0';
453 }
454 switch (c) {
455 case ':': /* Line number */
456 pp->line = strtoul(arg, &tmp, 0);
146a1439 457 if (*tmp != '\0') {
2a9c8c36 458 semantic_error("There is non-digit char"
146a1439
MH
459 " in line number.\n");
460 return -EINVAL;
461 }
50656eec
MH
462 break;
463 case '+': /* Byte offset from a symbol */
464 pp->offset = strtoul(arg, &tmp, 0);
146a1439 465 if (*tmp != '\0') {
2a9c8c36 466 semantic_error("There is non-digit character"
146a1439
MH
467 " in offset.\n");
468 return -EINVAL;
469 }
50656eec
MH
470 break;
471 case '@': /* File name */
146a1439
MH
472 if (pp->file) {
473 semantic_error("SRC@SRC is not allowed.\n");
474 return -EINVAL;
475 }
02b95dad
MH
476 pp->file = strdup(arg);
477 if (pp->file == NULL)
478 return -ENOMEM;
50656eec
MH
479 break;
480 case '%': /* Probe places */
481 if (strcmp(arg, "return") == 0) {
482 pp->retprobe = 1;
146a1439
MH
483 } else { /* Others not supported yet */
484 semantic_error("%%%s is not supported.\n", arg);
485 return -ENOTSUP;
486 }
50656eec 487 break;
146a1439
MH
488 default: /* Buggy case */
489 pr_err("This program has a bug at %s:%d.\n",
490 __FILE__, __LINE__);
491 return -ENOTSUP;
50656eec
MH
492 break;
493 }
494 }
495
496 /* Exclusion check */
146a1439 497 if (pp->lazy_line && pp->line) {
2a9c8c36 498 semantic_error("Lazy pattern can't be used with line number.");
146a1439
MH
499 return -EINVAL;
500 }
2a9c8c36 501
146a1439 502 if (pp->lazy_line && pp->offset) {
2a9c8c36 503 semantic_error("Lazy pattern can't be used with offset.");
146a1439
MH
504 return -EINVAL;
505 }
2a9c8c36 506
146a1439 507 if (pp->line && pp->offset) {
50656eec 508 semantic_error("Offset can't be used with line number.");
146a1439
MH
509 return -EINVAL;
510 }
50656eec 511
146a1439 512 if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
2a9c8c36
MH
513 semantic_error("File always requires line number or "
514 "lazy pattern.");
146a1439
MH
515 return -EINVAL;
516 }
50656eec 517
146a1439 518 if (pp->offset && !pp->function) {
50656eec 519 semantic_error("Offset requires an entry function.");
146a1439
MH
520 return -EINVAL;
521 }
50656eec 522
146a1439 523 if (pp->retprobe && !pp->function) {
50656eec 524 semantic_error("Return probe requires an entry function.");
146a1439
MH
525 return -EINVAL;
526 }
50656eec 527
146a1439 528 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
2a9c8c36
MH
529 semantic_error("Offset/Line/Lazy pattern can't be used with "
530 "return probe.");
146a1439
MH
531 return -EINVAL;
532 }
50656eec 533
4235b045 534 pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
2a9c8c36
MH
535 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
536 pp->lazy_line);
146a1439 537 return 0;
50656eec
MH
538}
539
7df2f329 540/* Parse perf-probe event argument */
146a1439 541static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
7df2f329 542{
48481938 543 char *tmp;
7df2f329
MH
544 struct perf_probe_arg_field **fieldp;
545
546 pr_debug("parsing arg: %s into ", str);
547
48481938
MH
548 tmp = strchr(str, '=');
549 if (tmp) {
02b95dad
MH
550 arg->name = strndup(str, tmp - str);
551 if (arg->name == NULL)
552 return -ENOMEM;
11a1ca35 553 pr_debug("name:%s ", arg->name);
48481938
MH
554 str = tmp + 1;
555 }
556
11a1ca35
MH
557 tmp = strchr(str, ':');
558 if (tmp) { /* Type setting */
559 *tmp = '\0';
02b95dad
MH
560 arg->type = strdup(tmp + 1);
561 if (arg->type == NULL)
562 return -ENOMEM;
11a1ca35
MH
563 pr_debug("type:%s ", arg->type);
564 }
565
7df2f329
MH
566 tmp = strpbrk(str, "-.");
567 if (!is_c_varname(str) || !tmp) {
568 /* A variable, register, symbol or special value */
02b95dad
MH
569 arg->var = strdup(str);
570 if (arg->var == NULL)
571 return -ENOMEM;
48481938 572 pr_debug("%s\n", arg->var);
146a1439 573 return 0;
7df2f329
MH
574 }
575
576 /* Structure fields */
02b95dad
MH
577 arg->var = strndup(str, tmp - str);
578 if (arg->var == NULL)
579 return -ENOMEM;
48481938 580 pr_debug("%s, ", arg->var);
7df2f329
MH
581 fieldp = &arg->field;
582
583 do {
e334016f
MH
584 *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
585 if (*fieldp == NULL)
586 return -ENOMEM;
7df2f329
MH
587 if (*tmp == '.') {
588 str = tmp + 1;
589 (*fieldp)->ref = false;
590 } else if (tmp[1] == '>') {
591 str = tmp + 2;
592 (*fieldp)->ref = true;
146a1439
MH
593 } else {
594 semantic_error("Argument parse error: %s\n", str);
595 return -EINVAL;
596 }
7df2f329
MH
597
598 tmp = strpbrk(str, "-.");
599 if (tmp) {
02b95dad
MH
600 (*fieldp)->name = strndup(str, tmp - str);
601 if ((*fieldp)->name == NULL)
602 return -ENOMEM;
7df2f329
MH
603 pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
604 fieldp = &(*fieldp)->next;
605 }
606 } while (tmp);
02b95dad
MH
607 (*fieldp)->name = strdup(str);
608 if ((*fieldp)->name == NULL)
609 return -ENOMEM;
7df2f329 610 pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
df0faf4b
MH
611
612 /* If no name is specified, set the last field name */
02b95dad
MH
613 if (!arg->name) {
614 arg->name = strdup((*fieldp)->name);
615 if (arg->name == NULL)
616 return -ENOMEM;
617 }
146a1439 618 return 0;
7df2f329
MH
619}
620
4235b045 621/* Parse perf-probe event command */
146a1439 622int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
50656eec 623{
e1c01d61 624 char **argv;
146a1439 625 int argc, i, ret = 0;
fac13fd5 626
4235b045 627 argv = argv_split(cmd, &argc);
146a1439
MH
628 if (!argv) {
629 pr_debug("Failed to split arguments.\n");
630 return -ENOMEM;
631 }
632 if (argc - 1 > MAX_PROBE_ARGS) {
633 semantic_error("Too many probe arguments (%d).\n", argc - 1);
634 ret = -ERANGE;
635 goto out;
636 }
50656eec 637 /* Parse probe point */
146a1439
MH
638 ret = parse_perf_probe_point(argv[0], pev);
639 if (ret < 0)
640 goto out;
50656eec 641
e1c01d61 642 /* Copy arguments and ensure return probe has no C argument */
4235b045 643 pev->nargs = argc - 1;
e334016f
MH
644 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
645 if (pev->args == NULL) {
646 ret = -ENOMEM;
647 goto out;
648 }
146a1439
MH
649 for (i = 0; i < pev->nargs && ret >= 0; i++) {
650 ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
651 if (ret >= 0 &&
652 is_c_varname(pev->args[i].var) && pev->point.retprobe) {
4235b045 653 semantic_error("You can't specify local variable for"
146a1439
MH
654 " kretprobe.\n");
655 ret = -EINVAL;
656 }
e1c01d61 657 }
146a1439 658out:
e1c01d61 659 argv_free(argv);
146a1439
MH
660
661 return ret;
50656eec
MH
662}
663
4235b045
MH
664/* Return true if this perf_probe_event requires debuginfo */
665bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
666{
667 int i;
668
669 if (pev->point.file || pev->point.line || pev->point.lazy_line)
670 return true;
671
672 for (i = 0; i < pev->nargs; i++)
48481938 673 if (is_c_varname(pev->args[i].var))
4235b045
MH
674 return true;
675
676 return false;
677}
678
4de189fe 679/* Parse kprobe_events event into struct probe_point */
146a1439 680int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
4de189fe 681{
4235b045 682 struct kprobe_trace_point *tp = &tev->point;
4de189fe
MH
683 char pr;
684 char *p;
685 int ret, i, argc;
686 char **argv;
687
4235b045
MH
688 pr_debug("Parsing kprobe_events: %s\n", cmd);
689 argv = argv_split(cmd, &argc);
146a1439
MH
690 if (!argv) {
691 pr_debug("Failed to split arguments.\n");
692 return -ENOMEM;
693 }
694 if (argc < 2) {
695 semantic_error("Too few probe arguments.\n");
696 ret = -ERANGE;
697 goto out;
698 }
4de189fe
MH
699
700 /* Scan event and group name. */
93aaa45a 701 ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
4235b045
MH
702 &pr, (float *)(void *)&tev->group,
703 (float *)(void *)&tev->event);
146a1439
MH
704 if (ret != 3) {
705 semantic_error("Failed to parse event name: %s\n", argv[0]);
706 ret = -EINVAL;
707 goto out;
708 }
4235b045 709 pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
4de189fe 710
4235b045 711 tp->retprobe = (pr == 'r');
4de189fe
MH
712
713 /* Scan function name and offset */
4235b045
MH
714 ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
715 &tp->offset);
4de189fe 716 if (ret == 1)
4235b045 717 tp->offset = 0;
4de189fe 718
4235b045 719 tev->nargs = argc - 2;
e334016f
MH
720 tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
721 if (tev->args == NULL) {
722 ret = -ENOMEM;
723 goto out;
724 }
4235b045 725 for (i = 0; i < tev->nargs; i++) {
4de189fe
MH
726 p = strchr(argv[i + 2], '=');
727 if (p) /* We don't need which register is assigned. */
4235b045
MH
728 *p++ = '\0';
729 else
730 p = argv[i + 2];
02b95dad 731 tev->args[i].name = strdup(argv[i + 2]);
4235b045 732 /* TODO: parse regs and offset */
02b95dad
MH
733 tev->args[i].value = strdup(p);
734 if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
735 ret = -ENOMEM;
736 goto out;
737 }
4de189fe 738 }
146a1439
MH
739 ret = 0;
740out:
4de189fe 741 argv_free(argv);
146a1439 742 return ret;
4de189fe
MH
743}
744
7df2f329
MH
745/* Compose only probe arg */
746int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
747{
748 struct perf_probe_arg_field *field = pa->field;
749 int ret;
750 char *tmp = buf;
751
48481938
MH
752 if (pa->name && pa->var)
753 ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
754 else
755 ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
7df2f329
MH
756 if (ret <= 0)
757 goto error;
758 tmp += ret;
759 len -= ret;
760
761 while (field) {
762 ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
763 field->name);
764 if (ret <= 0)
765 goto error;
766 tmp += ret;
767 len -= ret;
768 field = field->next;
769 }
11a1ca35
MH
770
771 if (pa->type) {
772 ret = e_snprintf(tmp, len, ":%s", pa->type);
773 if (ret <= 0)
774 goto error;
775 tmp += ret;
776 len -= ret;
777 }
778
7df2f329
MH
779 return tmp - buf;
780error:
146a1439
MH
781 pr_debug("Failed to synthesize perf probe argument: %s",
782 strerror(-ret));
783 return ret;
7df2f329
MH
784}
785
4235b045
MH
786/* Compose only probe point (not argument) */
787static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
4de189fe 788{
fb1587d8
MH
789 char *buf, *tmp;
790 char offs[32] = "", line[32] = "", file[32] = "";
791 int ret, len;
4de189fe 792
e334016f
MH
793 buf = zalloc(MAX_CMDLEN);
794 if (buf == NULL) {
795 ret = -ENOMEM;
796 goto error;
797 }
4de189fe 798 if (pp->offset) {
fb1587d8 799 ret = e_snprintf(offs, 32, "+%lu", pp->offset);
4de189fe
MH
800 if (ret <= 0)
801 goto error;
802 }
803 if (pp->line) {
fb1587d8
MH
804 ret = e_snprintf(line, 32, ":%d", pp->line);
805 if (ret <= 0)
806 goto error;
807 }
808 if (pp->file) {
dd259c5d 809 len = strlen(pp->file) - 31;
fb1587d8
MH
810 if (len < 0)
811 len = 0;
812 tmp = strchr(pp->file + len, '/');
813 if (!tmp)
dd259c5d 814 tmp = pp->file + len;
fb1587d8 815 ret = e_snprintf(file, 32, "@%s", tmp + 1);
4de189fe
MH
816 if (ret <= 0)
817 goto error;
818 }
819
820 if (pp->function)
fb1587d8
MH
821 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
822 offs, pp->retprobe ? "%return" : "", line,
823 file);
4de189fe 824 else
fb1587d8 825 ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
4235b045
MH
826 if (ret <= 0)
827 goto error;
828
829 return buf;
7ef17aaf 830error:
146a1439
MH
831 pr_debug("Failed to synthesize perf probe point: %s",
832 strerror(-ret));
e334016f
MH
833 if (buf)
834 free(buf);
146a1439 835 return NULL;
7ef17aaf
MH
836}
837
4235b045
MH
838#if 0
839char *synthesize_perf_probe_command(struct perf_probe_event *pev)
7ef17aaf
MH
840{
841 char *buf;
842 int i, len, ret;
843
4235b045
MH
844 buf = synthesize_perf_probe_point(&pev->point);
845 if (!buf)
846 return NULL;
4de189fe 847
4235b045
MH
848 len = strlen(buf);
849 for (i = 0; i < pev->nargs; i++) {
4de189fe 850 ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
4235b045
MH
851 pev->args[i].name);
852 if (ret <= 0) {
853 free(buf);
854 return NULL;
855 }
4de189fe
MH
856 len += ret;
857 }
4de189fe 858
4235b045
MH
859 return buf;
860}
861#endif
862
863static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
864 char **buf, size_t *buflen,
865 int depth)
866{
867 int ret;
868 if (ref->next) {
869 depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
870 buflen, depth + 1);
871 if (depth < 0)
872 goto out;
873 }
874
875 ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
876 if (ret < 0)
877 depth = ret;
878 else {
879 *buf += ret;
880 *buflen -= ret;
881 }
882out:
883 return depth;
4de189fe 884
4de189fe
MH
885}
886
4235b045
MH
887static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
888 char *buf, size_t buflen)
50656eec 889{
4235b045
MH
890 int ret, depth = 0;
891 char *tmp = buf;
892
893 /* Argument name or separator */
894 if (arg->name)
895 ret = e_snprintf(buf, buflen, " %s=", arg->name);
896 else
897 ret = e_snprintf(buf, buflen, " ");
898 if (ret < 0)
899 return ret;
900 buf += ret;
901 buflen -= ret;
902
903 /* Dereferencing arguments */
904 if (arg->ref) {
905 depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
906 &buflen, 1);
907 if (depth < 0)
908 return depth;
909 }
910
911 /* Print argument value */
912 ret = e_snprintf(buf, buflen, "%s", arg->value);
913 if (ret < 0)
914 return ret;
915 buf += ret;
916 buflen -= ret;
917
918 /* Closing */
919 while (depth--) {
920 ret = e_snprintf(buf, buflen, ")");
921 if (ret < 0)
922 return ret;
923 buf += ret;
924 buflen -= ret;
925 }
4984912e
MH
926 /* Print argument type */
927 if (arg->type) {
928 ret = e_snprintf(buf, buflen, ":%s", arg->type);
929 if (ret <= 0)
930 return ret;
931 buf += ret;
932 }
4235b045
MH
933
934 return buf - tmp;
935}
936
937char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
938{
939 struct kprobe_trace_point *tp = &tev->point;
50656eec
MH
940 char *buf;
941 int i, len, ret;
942
e334016f
MH
943 buf = zalloc(MAX_CMDLEN);
944 if (buf == NULL)
945 return NULL;
946
4235b045
MH
947 len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
948 tp->retprobe ? 'r' : 'p',
949 tev->group, tev->event,
950 tp->symbol, tp->offset);
951 if (len <= 0)
50656eec 952 goto error;
50656eec 953
4235b045
MH
954 for (i = 0; i < tev->nargs; i++) {
955 ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
956 MAX_CMDLEN - len);
4de189fe 957 if (ret <= 0)
50656eec
MH
958 goto error;
959 len += ret;
960 }
50656eec 961
4235b045 962 return buf;
50656eec 963error:
4235b045
MH
964 free(buf);
965 return NULL;
966}
50656eec 967
146a1439
MH
968int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
969 struct perf_probe_event *pev)
4235b045 970{
02b95dad 971 char buf[64] = "";
146a1439 972 int i, ret;
4235b045 973
4b4da7f7 974 /* Convert event/group name */
02b95dad
MH
975 pev->event = strdup(tev->event);
976 pev->group = strdup(tev->group);
977 if (pev->event == NULL || pev->group == NULL)
978 return -ENOMEM;
fb1587d8 979
4b4da7f7 980 /* Convert trace_point to probe_point */
146a1439
MH
981 ret = convert_to_perf_probe_point(&tev->point, &pev->point);
982 if (ret < 0)
983 return ret;
4b4da7f7 984
4235b045
MH
985 /* Convert trace_arg to probe_arg */
986 pev->nargs = tev->nargs;
e334016f
MH
987 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
988 if (pev->args == NULL)
989 return -ENOMEM;
02b95dad 990 for (i = 0; i < tev->nargs && ret >= 0; i++) {
4235b045 991 if (tev->args[i].name)
02b95dad 992 pev->args[i].name = strdup(tev->args[i].name);
4235b045 993 else {
146a1439
MH
994 ret = synthesize_kprobe_trace_arg(&tev->args[i],
995 buf, 64);
02b95dad 996 pev->args[i].name = strdup(buf);
4235b045 997 }
02b95dad
MH
998 if (pev->args[i].name == NULL && ret >= 0)
999 ret = -ENOMEM;
1000 }
146a1439
MH
1001
1002 if (ret < 0)
1003 clear_perf_probe_event(pev);
1004
1005 return ret;
4235b045
MH
1006}
1007
1008void clear_perf_probe_event(struct perf_probe_event *pev)
1009{
1010 struct perf_probe_point *pp = &pev->point;
7df2f329 1011 struct perf_probe_arg_field *field, *next;
4235b045
MH
1012 int i;
1013
1014 if (pev->event)
1015 free(pev->event);
1016 if (pev->group)
1017 free(pev->group);
1018 if (pp->file)
1019 free(pp->file);
1020 if (pp->function)
1021 free(pp->function);
1022 if (pp->lazy_line)
1023 free(pp->lazy_line);
7df2f329 1024 for (i = 0; i < pev->nargs; i++) {
4235b045
MH
1025 if (pev->args[i].name)
1026 free(pev->args[i].name);
48481938
MH
1027 if (pev->args[i].var)
1028 free(pev->args[i].var);
11a1ca35
MH
1029 if (pev->args[i].type)
1030 free(pev->args[i].type);
7df2f329
MH
1031 field = pev->args[i].field;
1032 while (field) {
1033 next = field->next;
1034 if (field->name)
1035 free(field->name);
1036 free(field);
1037 field = next;
1038 }
1039 }
4235b045
MH
1040 if (pev->args)
1041 free(pev->args);
1042 memset(pev, 0, sizeof(*pev));
1043}
1044
1045void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
1046{
1047 struct kprobe_trace_arg_ref *ref, *next;
1048 int i;
1049
1050 if (tev->event)
1051 free(tev->event);
1052 if (tev->group)
1053 free(tev->group);
1054 if (tev->point.symbol)
1055 free(tev->point.symbol);
1056 for (i = 0; i < tev->nargs; i++) {
1057 if (tev->args[i].name)
1058 free(tev->args[i].name);
1059 if (tev->args[i].value)
1060 free(tev->args[i].value);
4984912e
MH
1061 if (tev->args[i].type)
1062 free(tev->args[i].type);
4235b045
MH
1063 ref = tev->args[i].ref;
1064 while (ref) {
1065 next = ref->next;
1066 free(ref);
1067 ref = next;
1068 }
1069 }
1070 if (tev->args)
1071 free(tev->args);
1072 memset(tev, 0, sizeof(*tev));
50656eec
MH
1073}
1074
f4d7da49 1075static int open_kprobe_events(bool readwrite)
4de189fe
MH
1076{
1077 char buf[PATH_MAX];
7ca5989d 1078 const char *__debugfs;
4de189fe
MH
1079 int ret;
1080
7ca5989d
MH
1081 __debugfs = debugfs_find_mountpoint();
1082 if (__debugfs == NULL) {
1083 pr_warning("Debugfs is not mounted.\n");
1084 return -ENOENT;
1085 }
1086
1087 ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
146a1439 1088 if (ret >= 0) {
7ca5989d 1089 pr_debug("Opening %s write=%d\n", buf, readwrite);
146a1439
MH
1090 if (readwrite && !probe_event_dry_run)
1091 ret = open(buf, O_RDWR, O_APPEND);
1092 else
1093 ret = open(buf, O_RDONLY, 0);
1094 }
f4d7da49 1095
4de189fe
MH
1096 if (ret < 0) {
1097 if (errno == ENOENT)
146a1439
MH
1098 pr_warning("kprobe_events file does not exist - please"
1099 " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
4de189fe 1100 else
146a1439
MH
1101 pr_warning("Failed to open kprobe_events file: %s\n",
1102 strerror(errno));
4de189fe
MH
1103 }
1104 return ret;
1105}
1106
1107/* Get raw string list of current kprobe_events */
4235b045 1108static struct strlist *get_kprobe_trace_command_rawlist(int fd)
4de189fe
MH
1109{
1110 int ret, idx;
1111 FILE *fp;
1112 char buf[MAX_CMDLEN];
1113 char *p;
1114 struct strlist *sl;
1115
1116 sl = strlist__new(true, NULL);
1117
1118 fp = fdopen(dup(fd), "r");
1119 while (!feof(fp)) {
1120 p = fgets(buf, MAX_CMDLEN, fp);
1121 if (!p)
1122 break;
1123
1124 idx = strlen(p) - 1;
1125 if (p[idx] == '\n')
1126 p[idx] = '\0';
1127 ret = strlist__add(sl, buf);
146a1439
MH
1128 if (ret < 0) {
1129 pr_debug("strlist__add failed: %s\n", strerror(-ret));
1130 strlist__delete(sl);
1131 return NULL;
1132 }
4de189fe
MH
1133 }
1134 fclose(fp);
1135
1136 return sl;
1137}
1138
278498d4 1139/* Show an event */
146a1439 1140static int show_perf_probe_event(struct perf_probe_event *pev)
278498d4 1141{
7e990a51 1142 int i, ret;
278498d4 1143 char buf[128];
4235b045 1144 char *place;
278498d4 1145
4235b045
MH
1146 /* Synthesize only event probe point */
1147 place = synthesize_perf_probe_point(&pev->point);
146a1439
MH
1148 if (!place)
1149 return -EINVAL;
4235b045
MH
1150
1151 ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
7e990a51 1152 if (ret < 0)
146a1439
MH
1153 return ret;
1154
fb1587d8 1155 printf(" %-20s (on %s", buf, place);
278498d4 1156
4235b045 1157 if (pev->nargs > 0) {
278498d4 1158 printf(" with");
7df2f329 1159 for (i = 0; i < pev->nargs; i++) {
146a1439
MH
1160 ret = synthesize_perf_probe_arg(&pev->args[i],
1161 buf, 128);
1162 if (ret < 0)
1163 break;
7df2f329
MH
1164 printf(" %s", buf);
1165 }
278498d4
MH
1166 }
1167 printf(")\n");
4235b045 1168 free(place);
146a1439 1169 return ret;
278498d4
MH
1170}
1171
4de189fe 1172/* List up current perf-probe events */
146a1439 1173int show_perf_probe_events(void)
4de189fe 1174{
146a1439 1175 int fd, ret;
4235b045
MH
1176 struct kprobe_trace_event tev;
1177 struct perf_probe_event pev;
4de189fe
MH
1178 struct strlist *rawlist;
1179 struct str_node *ent;
1180
72041334 1181 setup_pager();
146a1439
MH
1182 ret = init_vmlinux();
1183 if (ret < 0)
1184 return ret;
4235b045
MH
1185
1186 memset(&tev, 0, sizeof(tev));
1187 memset(&pev, 0, sizeof(pev));
72041334 1188
f4d7da49 1189 fd = open_kprobe_events(false);
146a1439
MH
1190 if (fd < 0)
1191 return fd;
1192
4235b045 1193 rawlist = get_kprobe_trace_command_rawlist(fd);
4de189fe 1194 close(fd);
146a1439
MH
1195 if (!rawlist)
1196 return -ENOENT;
4de189fe 1197
adf365f4 1198 strlist__for_each(ent, rawlist) {
146a1439
MH
1199 ret = parse_kprobe_trace_command(ent->s, &tev);
1200 if (ret >= 0) {
1201 ret = convert_to_perf_probe_event(&tev, &pev);
1202 if (ret >= 0)
1203 ret = show_perf_probe_event(&pev);
1204 }
4235b045
MH
1205 clear_perf_probe_event(&pev);
1206 clear_kprobe_trace_event(&tev);
146a1439
MH
1207 if (ret < 0)
1208 break;
4de189fe 1209 }
4de189fe 1210 strlist__delete(rawlist);
146a1439
MH
1211
1212 return ret;
4de189fe
MH
1213}
1214
b498ce1f 1215/* Get current perf-probe event names */
4235b045 1216static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
b498ce1f 1217{
fa28244d 1218 char buf[128];
b498ce1f
MH
1219 struct strlist *sl, *rawlist;
1220 struct str_node *ent;
4235b045 1221 struct kprobe_trace_event tev;
146a1439 1222 int ret = 0;
b498ce1f 1223
4235b045 1224 memset(&tev, 0, sizeof(tev));
b498ce1f 1225
4235b045 1226 rawlist = get_kprobe_trace_command_rawlist(fd);
e1d2017b 1227 sl = strlist__new(true, NULL);
adf365f4 1228 strlist__for_each(ent, rawlist) {
146a1439
MH
1229 ret = parse_kprobe_trace_command(ent->s, &tev);
1230 if (ret < 0)
1231 break;
fa28244d 1232 if (include_group) {
146a1439
MH
1233 ret = e_snprintf(buf, 128, "%s:%s", tev.group,
1234 tev.event);
1235 if (ret >= 0)
1236 ret = strlist__add(sl, buf);
fa28244d 1237 } else
146a1439 1238 ret = strlist__add(sl, tev.event);
4235b045 1239 clear_kprobe_trace_event(&tev);
146a1439
MH
1240 if (ret < 0)
1241 break;
b498ce1f 1242 }
b498ce1f
MH
1243 strlist__delete(rawlist);
1244
146a1439
MH
1245 if (ret < 0) {
1246 strlist__delete(sl);
1247 return NULL;
1248 }
b498ce1f
MH
1249 return sl;
1250}
1251
146a1439 1252static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
50656eec
MH
1253{
1254 int ret;
4235b045 1255 char *buf = synthesize_kprobe_trace_command(tev);
50656eec 1256
146a1439
MH
1257 if (!buf) {
1258 pr_debug("Failed to synthesize kprobe trace event.\n");
1259 return -EINVAL;
1260 }
1261
fa28244d 1262 pr_debug("Writing event: %s\n", buf);
f4d7da49
MH
1263 if (!probe_event_dry_run) {
1264 ret = write(fd, buf, strlen(buf));
1265 if (ret <= 0)
146a1439
MH
1266 pr_warning("Failed to write event: %s\n",
1267 strerror(errno));
f4d7da49 1268 }
4235b045 1269 free(buf);
146a1439 1270 return ret;
50656eec
MH
1271}
1272
146a1439
MH
1273static int get_new_event_name(char *buf, size_t len, const char *base,
1274 struct strlist *namelist, bool allow_suffix)
b498ce1f
MH
1275{
1276 int i, ret;
17f88fcd
MH
1277
1278 /* Try no suffix */
1279 ret = e_snprintf(buf, len, "%s", base);
146a1439
MH
1280 if (ret < 0) {
1281 pr_debug("snprintf() failed: %s\n", strerror(-ret));
1282 return ret;
1283 }
17f88fcd 1284 if (!strlist__has_entry(namelist, buf))
146a1439 1285 return 0;
17f88fcd 1286
d761b08b
MH
1287 if (!allow_suffix) {
1288 pr_warning("Error: event \"%s\" already exists. "
1289 "(Use -f to force duplicates.)\n", base);
146a1439 1290 return -EEXIST;
d761b08b
MH
1291 }
1292
17f88fcd
MH
1293 /* Try to add suffix */
1294 for (i = 1; i < MAX_EVENT_INDEX; i++) {
b498ce1f 1295 ret = e_snprintf(buf, len, "%s_%d", base, i);
146a1439
MH
1296 if (ret < 0) {
1297 pr_debug("snprintf() failed: %s\n", strerror(-ret));
1298 return ret;
1299 }
b498ce1f
MH
1300 if (!strlist__has_entry(namelist, buf))
1301 break;
1302 }
146a1439
MH
1303 if (i == MAX_EVENT_INDEX) {
1304 pr_warning("Too many events are on the same function.\n");
1305 ret = -ERANGE;
1306 }
1307
1308 return ret;
b498ce1f
MH
1309}
1310
146a1439
MH
1311static int __add_kprobe_trace_events(struct perf_probe_event *pev,
1312 struct kprobe_trace_event *tevs,
1313 int ntevs, bool allow_suffix)
50656eec 1314{
146a1439 1315 int i, fd, ret;
55632770 1316 struct kprobe_trace_event *tev = NULL;
4235b045
MH
1317 char buf[64];
1318 const char *event, *group;
b498ce1f 1319 struct strlist *namelist;
50656eec 1320
f4d7da49 1321 fd = open_kprobe_events(true);
146a1439
MH
1322 if (fd < 0)
1323 return fd;
b498ce1f 1324 /* Get current event names */
4235b045 1325 namelist = get_kprobe_trace_event_names(fd, false);
146a1439
MH
1326 if (!namelist) {
1327 pr_debug("Failed to get current event list.\n");
1328 return -EIO;
1329 }
4235b045 1330
146a1439 1331 ret = 0;
4235b045 1332 printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
02b95dad 1333 for (i = 0; i < ntevs; i++) {
4235b045
MH
1334 tev = &tevs[i];
1335 if (pev->event)
1336 event = pev->event;
1337 else
1338 if (pev->point.function)
1339 event = pev->point.function;
1340 else
1341 event = tev->point.symbol;
1342 if (pev->group)
1343 group = pev->group;
1344 else
1345 group = PERFPROBE_GROUP;
1346
1347 /* Get an unused new event name */
146a1439
MH
1348 ret = get_new_event_name(buf, 64, event,
1349 namelist, allow_suffix);
1350 if (ret < 0)
1351 break;
4235b045
MH
1352 event = buf;
1353
02b95dad
MH
1354 tev->event = strdup(event);
1355 tev->group = strdup(group);
1356 if (tev->event == NULL || tev->group == NULL) {
1357 ret = -ENOMEM;
1358 break;
1359 }
146a1439
MH
1360 ret = write_kprobe_trace_event(fd, tev);
1361 if (ret < 0)
1362 break;
4235b045
MH
1363 /* Add added event name to namelist */
1364 strlist__add(namelist, event);
1365
1366 /* Trick here - save current event/group */
1367 event = pev->event;
1368 group = pev->group;
1369 pev->event = tev->event;
1370 pev->group = tev->group;
1371 show_perf_probe_event(pev);
1372 /* Trick here - restore current event/group */
1373 pev->event = (char *)event;
1374 pev->group = (char *)group;
1375
1376 /*
1377 * Probes after the first probe which comes from same
1378 * user input are always allowed to add suffix, because
1379 * there might be several addresses corresponding to
1380 * one code line.
1381 */
1382 allow_suffix = true;
50656eec 1383 }
146a1439
MH
1384
1385 if (ret >= 0) {
1386 /* Show how to use the event. */
1387 printf("\nYou can now use it on all perf tools, such as:\n\n");
1388 printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
1389 tev->event);
1390 }
a9b495b0 1391
e1d2017b 1392 strlist__delete(namelist);
50656eec 1393 close(fd);
146a1439 1394 return ret;
50656eec 1395}
fa28244d 1396
4235b045
MH
1397static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
1398 struct kprobe_trace_event **tevs)
e0faa8d3
MH
1399{
1400 struct symbol *sym;
e334016f 1401 int ret = 0, i;
4235b045
MH
1402 struct kprobe_trace_event *tev;
1403
4b4da7f7 1404 /* Convert perf_probe_event with debuginfo */
e334016f
MH
1405 ret = try_to_find_kprobe_trace_events(pev, tevs);
1406 if (ret != 0)
1407 return ret;
e0faa8d3 1408
4235b045 1409 /* Allocate trace event buffer */
e334016f
MH
1410 tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
1411 if (tev == NULL)
1412 return -ENOMEM;
4235b045
MH
1413
1414 /* Copy parameters */
02b95dad
MH
1415 tev->point.symbol = strdup(pev->point.function);
1416 if (tev->point.symbol == NULL) {
1417 ret = -ENOMEM;
1418 goto error;
1419 }
4235b045
MH
1420 tev->point.offset = pev->point.offset;
1421 tev->nargs = pev->nargs;
1422 if (tev->nargs) {
e334016f
MH
1423 tev->args = zalloc(sizeof(struct kprobe_trace_arg)
1424 * tev->nargs);
1425 if (tev->args == NULL) {
02b95dad
MH
1426 ret = -ENOMEM;
1427 goto error;
e334016f 1428 }
48481938 1429 for (i = 0; i < tev->nargs; i++) {
02b95dad
MH
1430 if (pev->args[i].name) {
1431 tev->args[i].name = strdup(pev->args[i].name);
1432 if (tev->args[i].name == NULL) {
1433 ret = -ENOMEM;
1434 goto error;
1435 }
1436 }
1437 tev->args[i].value = strdup(pev->args[i].var);
1438 if (tev->args[i].value == NULL) {
1439 ret = -ENOMEM;
1440 goto error;
1441 }
1442 if (pev->args[i].type) {
1443 tev->args[i].type = strdup(pev->args[i].type);
1444 if (tev->args[i].type == NULL) {
1445 ret = -ENOMEM;
1446 goto error;
1447 }
1448 }
48481938 1449 }
4235b045
MH
1450 }
1451
1452 /* Currently just checking function name from symbol map */
1453 sym = map__find_symbol_by_name(kmaps[MAP__FUNCTION],
1454 tev->point.symbol, NULL);
146a1439
MH
1455 if (!sym) {
1456 pr_warning("Kernel symbol \'%s\' not found.\n",
1457 tev->point.symbol);
02b95dad
MH
1458 ret = -ENOENT;
1459 goto error;
1460 }
e334016f 1461
02b95dad
MH
1462 return 1;
1463error:
1464 clear_kprobe_trace_event(tev);
1465 free(tev);
1466 *tevs = NULL;
e334016f 1467 return ret;
4235b045
MH
1468}
1469
1470struct __event_package {
1471 struct perf_probe_event *pev;
1472 struct kprobe_trace_event *tevs;
1473 int ntevs;
1474};
1475
146a1439
MH
1476int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
1477 bool force_add)
4235b045 1478{
146a1439 1479 int i, j, ret;
4235b045
MH
1480 struct __event_package *pkgs;
1481
e334016f
MH
1482 pkgs = zalloc(sizeof(struct __event_package) * npevs);
1483 if (pkgs == NULL)
1484 return -ENOMEM;
4235b045
MH
1485
1486 /* Init vmlinux path */
146a1439
MH
1487 ret = init_vmlinux();
1488 if (ret < 0)
1489 return ret;
4235b045
MH
1490
1491 /* Loop 1: convert all events */
1492 for (i = 0; i < npevs; i++) {
1493 pkgs[i].pev = &pevs[i];
1494 /* Convert with or without debuginfo */
146a1439
MH
1495 ret = convert_to_kprobe_trace_events(pkgs[i].pev,
1496 &pkgs[i].tevs);
1497 if (ret < 0)
1498 goto end;
1499 pkgs[i].ntevs = ret;
e0faa8d3
MH
1500 }
1501
4235b045 1502 /* Loop 2: add all events */
146a1439
MH
1503 for (i = 0; i < npevs && ret >= 0; i++)
1504 ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
1505 pkgs[i].ntevs, force_add);
1506end:
1507 /* Loop 3: cleanup trace events */
4235b045 1508 for (i = 0; i < npevs; i++)
146a1439
MH
1509 for (j = 0; j < pkgs[i].ntevs; j++)
1510 clear_kprobe_trace_event(&pkgs[i].tevs[j]);
1511
1512 return ret;
e0faa8d3
MH
1513}
1514
146a1439 1515static int __del_trace_kprobe_event(int fd, struct str_node *ent)
bbbb521b
MH
1516{
1517 char *p;
1518 char buf[128];
4235b045 1519 int ret;
bbbb521b
MH
1520
1521 /* Convert from perf-probe event to trace-kprobe event */
146a1439
MH
1522 ret = e_snprintf(buf, 128, "-:%s", ent->s);
1523 if (ret < 0)
1524 goto error;
1525
bbbb521b 1526 p = strchr(buf + 2, ':');
146a1439
MH
1527 if (!p) {
1528 pr_debug("Internal error: %s should have ':' but not.\n",
1529 ent->s);
1530 ret = -ENOTSUP;
1531 goto error;
1532 }
bbbb521b
MH
1533 *p = '/';
1534
4235b045
MH
1535 pr_debug("Writing event: %s\n", buf);
1536 ret = write(fd, buf, strlen(buf));
146a1439
MH
1537 if (ret < 0)
1538 goto error;
1539
bbbb521b 1540 printf("Remove event: %s\n", ent->s);
146a1439
MH
1541 return 0;
1542error:
1543 pr_warning("Failed to delete event: %s\n", strerror(-ret));
1544 return ret;
bbbb521b
MH
1545}
1546
146a1439
MH
1547static int del_trace_kprobe_event(int fd, const char *group,
1548 const char *event, struct strlist *namelist)
fa28244d
MH
1549{
1550 char buf[128];
bbbb521b 1551 struct str_node *ent, *n;
146a1439 1552 int found = 0, ret = 0;
fa28244d 1553
146a1439
MH
1554 ret = e_snprintf(buf, 128, "%s:%s", group, event);
1555 if (ret < 0) {
1556 pr_err("Failed to copy event.");
1557 return ret;
1558 }
fa28244d 1559
bbbb521b
MH
1560 if (strpbrk(buf, "*?")) { /* Glob-exp */
1561 strlist__for_each_safe(ent, n, namelist)
1562 if (strglobmatch(ent->s, buf)) {
1563 found++;
146a1439
MH
1564 ret = __del_trace_kprobe_event(fd, ent);
1565 if (ret < 0)
1566 break;
bbbb521b
MH
1567 strlist__remove(namelist, ent);
1568 }
1569 } else {
1570 ent = strlist__find(namelist, buf);
1571 if (ent) {
1572 found++;
146a1439
MH
1573 ret = __del_trace_kprobe_event(fd, ent);
1574 if (ret >= 0)
1575 strlist__remove(namelist, ent);
bbbb521b
MH
1576 }
1577 }
146a1439
MH
1578 if (found == 0 && ret >= 0)
1579 pr_info("Info: Event \"%s\" does not exist.\n", buf);
1580
1581 return ret;
fa28244d
MH
1582}
1583
146a1439 1584int del_perf_probe_events(struct strlist *dellist)
fa28244d 1585{
146a1439 1586 int fd, ret = 0;
fa28244d
MH
1587 const char *group, *event;
1588 char *p, *str;
1589 struct str_node *ent;
1590 struct strlist *namelist;
1591
f4d7da49 1592 fd = open_kprobe_events(true);
146a1439
MH
1593 if (fd < 0)
1594 return fd;
1595
fa28244d 1596 /* Get current event names */
4235b045 1597 namelist = get_kprobe_trace_event_names(fd, true);
146a1439
MH
1598 if (namelist == NULL)
1599 return -EINVAL;
fa28244d 1600
adf365f4 1601 strlist__for_each(ent, dellist) {
02b95dad
MH
1602 str = strdup(ent->s);
1603 if (str == NULL) {
1604 ret = -ENOMEM;
1605 break;
1606 }
bbbb521b 1607 pr_debug("Parsing: %s\n", str);
fa28244d
MH
1608 p = strchr(str, ':');
1609 if (p) {
1610 group = str;
1611 *p = '\0';
1612 event = p + 1;
1613 } else {
bbbb521b 1614 group = "*";
fa28244d
MH
1615 event = str;
1616 }
bbbb521b 1617 pr_debug("Group: %s, Event: %s\n", group, event);
146a1439 1618 ret = del_trace_kprobe_event(fd, group, event, namelist);
fa28244d 1619 free(str);
146a1439
MH
1620 if (ret < 0)
1621 break;
fa28244d
MH
1622 }
1623 strlist__delete(namelist);
1624 close(fd);
146a1439
MH
1625
1626 return ret;
fa28244d
MH
1627}
1628