Merge tag 'perf-core-for-mingo-20160615' of git://git.kernel.org/pub/scm/linux/kernel...
[deliverable/linux.git] / tools / perf / util / probe-event.c
CommitLineData
50656eec 1/*
0e60836b 2 * probe-event.c : perf-probe definition to probe_events format converter
50656eec
MH
3 *
4 * Written by Masami Hiramatsu <mhiramat@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 *
20 */
21
50656eec
MH
22#include <sys/utsname.h>
23#include <sys/types.h>
24#include <sys/stat.h>
25#include <fcntl.h>
26#include <errno.h>
27#include <stdio.h>
28#include <unistd.h>
29#include <stdlib.h>
30#include <string.h>
4de189fe
MH
31#include <stdarg.h>
32#include <limits.h>
e80711ca 33#include <elf.h>
50656eec 34
31facc5f 35#include "util.h"
50656eec 36#include "event.h"
4de189fe 37#include "strlist.h"
50656eec 38#include "debug.h"
72041334 39#include "cache.h"
631c9def 40#include "color.h"
e0faa8d3
MH
41#include "symbol.h"
42#include "thread.h"
4605eab3 43#include <api/fs/fs.h>
1d037ca1 44#include "trace-event.h" /* For __maybe_unused */
50656eec 45#include "probe-event.h"
4235b045 46#include "probe-finder.h"
92f6c72e 47#include "probe-file.h"
225466f1 48#include "session.h"
50656eec
MH
49
50#define MAX_CMDLEN 256
50656eec
MH
51#define PERFPROBE_GROUP "probe"
52
f4d7da49 53bool probe_event_dry_run; /* Dry run flag */
ddb2f58f 54struct probe_conf probe_conf;
f4d7da49 55
146a1439 56#define semantic_error(msg ...) pr_err("Semantic error :" msg)
50656eec 57
92f6c72e 58int e_snprintf(char *str, size_t size, const char *format, ...)
4de189fe
MH
59{
60 int ret;
61 va_list ap;
62 va_start(ap, format);
63 ret = vsnprintf(str, size, format, ap);
64 va_end(ap);
65 if (ret >= (int)size)
66 ret = -E2BIG;
67 return ret;
68}
69
ee45b6c2 70static struct machine *host_machine;
e0faa8d3 71
469b9b88 72/* Initialize symbol maps and path of vmlinux/modules */
9bae1e8c 73int init_probe_symbol_maps(bool user_only)
e0faa8d3 74{
146a1439
MH
75 int ret;
76
e0faa8d3 77 symbol_conf.sort_by_name = true;
680d926a 78 symbol_conf.allow_aliases = true;
0a7e6d1b 79 ret = symbol__init(NULL);
146a1439
MH
80 if (ret < 0) {
81 pr_debug("Failed to init symbol map.\n");
82 goto out;
83 }
e0faa8d3 84
ee45b6c2
MH
85 if (host_machine || user_only) /* already initialized */
86 return 0;
d28c6223 87
ee45b6c2
MH
88 if (symbol_conf.vmlinux_name)
89 pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
90
91 host_machine = machine__new_host();
92 if (!host_machine) {
93 pr_debug("machine__new_host() failed.\n");
94 symbol__exit();
95 ret = -1;
469b9b88 96 }
146a1439
MH
97out:
98 if (ret < 0)
99 pr_warning("Failed to init vmlinux path.\n");
100 return ret;
e0faa8d3
MH
101}
102
9bae1e8c 103void exit_probe_symbol_maps(void)
ee45b6c2
MH
104{
105 if (host_machine) {
106 machine__delete(host_machine);
107 host_machine = NULL;
108 }
109 symbol__exit();
110}
111
469b9b88
MH
112static struct symbol *__find_kernel_function_by_name(const char *name,
113 struct map **mapp)
114{
ee45b6c2 115 return machine__find_kernel_function_by_name(host_machine, name, mapp,
469b9b88
MH
116 NULL);
117}
118
8f33f7de
MH
119static struct symbol *__find_kernel_function(u64 addr, struct map **mapp)
120{
121 return machine__find_kernel_function(host_machine, addr, mapp, NULL);
122}
123
124static struct ref_reloc_sym *kernel_get_ref_reloc_sym(void)
125{
126 /* kmap->ref_reloc_sym should be set if host_machine is initialized */
127 struct kmap *kmap;
a5e813c6 128 struct map *map = machine__kernel_map(host_machine);
8f33f7de 129
77e65977 130 if (map__load(map, NULL) < 0)
8f33f7de
MH
131 return NULL;
132
77e65977 133 kmap = map__kmap(map);
ba92732e
WN
134 if (!kmap)
135 return NULL;
8f33f7de
MH
136 return kmap->ref_reloc_sym;
137}
138
9b239a12
MH
139static int kernel_get_symbol_address_by_name(const char *name, u64 *addr,
140 bool reloc, bool reladdr)
8f33f7de
MH
141{
142 struct ref_reloc_sym *reloc_sym;
143 struct symbol *sym;
144 struct map *map;
145
146 /* ref_reloc_sym is just a label. Need a special fix*/
147 reloc_sym = kernel_get_ref_reloc_sym();
148 if (reloc_sym && strcmp(name, reloc_sym->name) == 0)
9b239a12 149 *addr = (reloc) ? reloc_sym->addr : reloc_sym->unrelocated_addr;
8f33f7de
MH
150 else {
151 sym = __find_kernel_function_by_name(name, &map);
9b239a12
MH
152 if (!sym)
153 return -ENOENT;
154 *addr = map->unmap_ip(map, sym->start) -
155 ((reloc) ? 0 : map->reloc) -
156 ((reladdr) ? map->start : 0);
8f33f7de
MH
157 }
158 return 0;
159}
160
e80711ca
MH
161static struct map *kernel_get_module_map(const char *module)
162{
ee45b6c2 163 struct map_groups *grp = &host_machine->kmaps;
1eee78ae 164 struct maps *maps = &grp->maps[MAP__FUNCTION];
4bb7123d 165 struct map *pos;
e80711ca 166
14a8fd7c
MH
167 /* A file path -- this is an offline module */
168 if (module && strchr(module, '/'))
9f2de315 169 return machine__findnew_module_map(host_machine, 0, module);
14a8fd7c 170
e80711ca
MH
171 if (!module)
172 module = "kernel";
173
4bb7123d 174 for (pos = maps__first(maps); pos; pos = map__next(pos)) {
e80711ca
MH
175 if (strncmp(pos->dso->short_name + 1, module,
176 pos->dso->short_name_len - 2) == 0) {
177 return pos;
178 }
179 }
180 return NULL;
181}
182
9b118aca
MH
183static struct map *get_target_map(const char *target, bool user)
184{
185 /* Init maps of given executable or kernel */
186 if (user)
187 return dso__new_map(target);
188 else
189 return kernel_get_module_map(target);
190}
191
192static void put_target_map(struct map *map, bool user)
193{
194 if (map && user) {
195 /* Only the user map needs to be released */
84c2cafa 196 map__put(map);
9b118aca
MH
197 }
198}
199
200
fb7345bb
MH
201static int convert_exec_to_group(const char *exec, char **result)
202{
203 char *ptr1, *ptr2, *exec_copy;
204 char buf[64];
205 int ret;
206
207 exec_copy = strdup(exec);
208 if (!exec_copy)
209 return -ENOMEM;
210
211 ptr1 = basename(exec_copy);
212 if (!ptr1) {
213 ret = -EINVAL;
214 goto out;
215 }
216
217 ptr2 = strpbrk(ptr1, "-._");
218 if (ptr2)
219 *ptr2 = '\0';
220 ret = e_snprintf(buf, 64, "%s_%s", PERFPROBE_GROUP, ptr1);
221 if (ret < 0)
222 goto out;
223
224 *result = strdup(buf);
225 ret = *result ? 0 : -ENOMEM;
226
227out:
228 free(exec_copy);
229 return ret;
230}
231
9b118aca
MH
232static void clear_perf_probe_point(struct perf_probe_point *pp)
233{
234 free(pp->file);
235 free(pp->function);
236 free(pp->lazy_line);
237}
238
eb948e50
MH
239static void clear_probe_trace_events(struct probe_trace_event *tevs, int ntevs)
240{
241 int i;
242
243 for (i = 0; i < ntevs; i++)
244 clear_probe_trace_event(tevs + i);
245}
246
b031220d
MH
247static bool kprobe_blacklist__listed(unsigned long address);
248static bool kprobe_warn_out_range(const char *symbol, unsigned long address)
249{
9b239a12
MH
250 u64 etext_addr = 0;
251 int ret;
7c31bb8c 252
b031220d 253 /* Get the address of _etext for checking non-probable text symbol */
9b239a12
MH
254 ret = kernel_get_symbol_address_by_name("_etext", &etext_addr,
255 false, false);
7c31bb8c 256
9b239a12 257 if (ret == 0 && etext_addr < address)
b031220d
MH
258 pr_warning("%s is out of .text, skip it.\n", symbol);
259 else if (kprobe_blacklist__listed(address))
260 pr_warning("%s is blacklisted function, skip it.\n", symbol);
261 else
262 return false;
263
264 return true;
265}
266
c61fb959
RB
267/*
268 * NOTE:
269 * '.gnu.linkonce.this_module' section of kernel module elf directly
270 * maps to 'struct module' from linux/module.h. This section contains
271 * actual module name which will be used by kernel after loading it.
272 * But, we cannot use 'struct module' here since linux/module.h is not
273 * exposed to user-space. Offset of 'name' has remained same from long
274 * time, so hardcoding it here.
275 */
276#ifdef __LP64__
277#define MOD_NAME_OFFSET 24
278#else
279#define MOD_NAME_OFFSET 12
280#endif
281
282/*
283 * @module can be module name of module file path. In case of path,
284 * inspect elf and find out what is actual module name.
285 * Caller has to free mod_name after using it.
286 */
287static char *find_module_name(const char *module)
288{
289 int fd;
290 Elf *elf;
291 GElf_Ehdr ehdr;
292 GElf_Shdr shdr;
293 Elf_Data *data;
294 Elf_Scn *sec;
295 char *mod_name = NULL;
296
297 fd = open(module, O_RDONLY);
298 if (fd < 0)
299 return NULL;
300
301 elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
302 if (elf == NULL)
303 goto elf_err;
304
305 if (gelf_getehdr(elf, &ehdr) == NULL)
306 goto ret_err;
307
308 sec = elf_section_by_name(elf, &ehdr, &shdr,
309 ".gnu.linkonce.this_module", NULL);
310 if (!sec)
311 goto ret_err;
312
313 data = elf_getdata(sec, NULL);
314 if (!data || !data->d_buf)
315 goto ret_err;
316
317 mod_name = strdup((char *)data->d_buf + MOD_NAME_OFFSET);
318
319ret_err:
320 elf_end(elf);
321elf_err:
322 close(fd);
323 return mod_name;
324}
325
89fe808a 326#ifdef HAVE_DWARF_SUPPORT
60fb7742
WN
327
328static int kernel_get_module_dso(const char *module, struct dso **pdso)
329{
330 struct dso *dso;
331 struct map *map;
332 const char *vmlinux_name;
333 int ret = 0;
334
335 if (module) {
266fa2b2
ACM
336 char module_name[128];
337
338 snprintf(module_name, sizeof(module_name), "[%s]", module);
339 map = map_groups__find_by_name(&host_machine->kmaps, MAP__FUNCTION, module_name);
340 if (map) {
341 dso = map->dso;
342 goto found;
60fb7742
WN
343 }
344 pr_debug("Failed to find module %s.\n", module);
345 return -ENOENT;
346 }
347
a5e813c6 348 map = machine__kernel_map(host_machine);
60fb7742
WN
349 dso = map->dso;
350
351 vmlinux_name = symbol_conf.vmlinux_name;
352 dso->load_errno = 0;
353 if (vmlinux_name)
354 ret = dso__load_vmlinux(dso, map, vmlinux_name, false, NULL);
355 else
356 ret = dso__load_vmlinux_path(dso, map, NULL);
357found:
358 *pdso = dso;
359 return ret;
360}
361
9b118aca
MH
362/*
363 * Some binaries like glibc have special symbols which are on the symbol
364 * table, but not in the debuginfo. If we can find the address of the
365 * symbol from map, we can translate the address back to the probe point.
366 */
367static int find_alternative_probe_point(struct debuginfo *dinfo,
368 struct perf_probe_point *pp,
369 struct perf_probe_point *result,
370 const char *target, bool uprobes)
371{
372 struct map *map = NULL;
373 struct symbol *sym;
374 u64 address = 0;
375 int ret = -ENOENT;
376
377 /* This can work only for function-name based one */
378 if (!pp->function || pp->file)
379 return -ENOTSUP;
380
381 map = get_target_map(target, uprobes);
382 if (!map)
383 return -EINVAL;
384
385 /* Find the address of given function */
386 map__for_each_symbol_by_name(map, pp->function, sym) {
e6d7c91c
MH
387 if (uprobes)
388 address = sym->start;
389 else
390 address = map->unmap_ip(map, sym->start);
e578da3b 391 break;
9b118aca
MH
392 }
393 if (!address) {
394 ret = -ENOENT;
395 goto out;
396 }
f6c15621
WN
397 pr_debug("Symbol %s address found : %" PRIx64 "\n",
398 pp->function, address);
9b118aca
MH
399
400 ret = debuginfo__find_probe_point(dinfo, (unsigned long)address,
401 result);
402 if (ret <= 0)
403 ret = (!ret) ? -ENOENT : ret;
404 else {
405 result->offset += pp->offset;
406 result->line += pp->line;
9d7b45c5 407 result->retprobe = pp->retprobe;
9b118aca
MH
408 ret = 0;
409 }
410
411out:
412 put_target_map(map, uprobes);
413 return ret;
414
415}
416
417static int get_alternative_probe_event(struct debuginfo *dinfo,
418 struct perf_probe_event *pev,
44225521 419 struct perf_probe_point *tmp)
9b118aca
MH
420{
421 int ret;
422
423 memcpy(tmp, &pev->point, sizeof(*tmp));
424 memset(&pev->point, 0, sizeof(pev->point));
425 ret = find_alternative_probe_point(dinfo, tmp, &pev->point,
44225521 426 pev->target, pev->uprobes);
9b118aca
MH
427 if (ret < 0)
428 memcpy(&pev->point, tmp, sizeof(*tmp));
429
430 return ret;
431}
a15ad2f5 432
811dd2ae
MH
433static int get_alternative_line_range(struct debuginfo *dinfo,
434 struct line_range *lr,
435 const char *target, bool user)
436{
6d4a4896
DA
437 struct perf_probe_point pp = { .function = lr->function,
438 .file = lr->file,
439 .line = lr->start };
440 struct perf_probe_point result;
811dd2ae
MH
441 int ret, len = 0;
442
6d4a4896
DA
443 memset(&result, 0, sizeof(result));
444
811dd2ae
MH
445 if (lr->end != INT_MAX)
446 len = lr->end - lr->start;
447 ret = find_alternative_probe_point(dinfo, &pp, &result,
448 target, user);
449 if (!ret) {
450 lr->function = result.function;
451 lr->file = result.file;
452 lr->start = result.line;
453 if (lr->end != INT_MAX)
454 lr->end = lr->start + len;
455 clear_perf_probe_point(&pp);
456 }
457 return ret;
458}
459
ff741783 460/* Open new debuginfo of given module */
92561cb7 461static struct debuginfo *open_debuginfo(const char *module, bool silent)
e0faa8d3 462{
a15ad2f5 463 const char *path = module;
419e8738
MH
464 char reason[STRERR_BUFSIZE];
465 struct debuginfo *ret = NULL;
466 struct dso *dso = NULL;
467 int err;
ff741783 468
a15ad2f5 469 if (!module || !strchr(module, '/')) {
419e8738
MH
470 err = kernel_get_module_dso(module, &dso);
471 if (err < 0) {
472 if (!dso || dso->load_errno == 0) {
473 if (!strerror_r(-err, reason, STRERR_BUFSIZE))
474 strcpy(reason, "(unknown)");
475 } else
476 dso__strerror_load(dso, reason, STRERR_BUFSIZE);
92561cb7 477 if (!silent)
419e8738
MH
478 pr_err("Failed to find the path for %s: %s\n",
479 module ?: "kernel", reason);
14a8fd7c
MH
480 return NULL;
481 }
419e8738 482 path = dso->long_name;
e0faa8d3 483 }
92561cb7
MH
484 ret = debuginfo__new(path);
485 if (!ret && !silent) {
486 pr_warning("The %s file has no debug information.\n", path);
487 if (!module || !strtailcmp(path, ".ko"))
488 pr_warning("Rebuild with CONFIG_DEBUG_INFO=y, ");
489 else
490 pr_warning("Rebuild with -g, ");
491 pr_warning("or install an appropriate debuginfo package.\n");
492 }
493 return ret;
e0faa8d3 494}
4b4da7f7 495
7737af01
MH
496/* For caching the last debuginfo */
497static struct debuginfo *debuginfo_cache;
498static char *debuginfo_cache_path;
499
500static struct debuginfo *debuginfo_cache__open(const char *module, bool silent)
501{
20f49859
MH
502 const char *path = module;
503
504 /* If the module is NULL, it should be the kernel. */
505 if (!module)
506 path = "kernel";
507
508 if (debuginfo_cache_path && !strcmp(debuginfo_cache_path, path))
7737af01
MH
509 goto out;
510
511 /* Copy module path */
512 free(debuginfo_cache_path);
20f49859
MH
513 debuginfo_cache_path = strdup(path);
514 if (!debuginfo_cache_path) {
515 debuginfo__delete(debuginfo_cache);
516 debuginfo_cache = NULL;
517 goto out;
7737af01
MH
518 }
519
520 debuginfo_cache = open_debuginfo(module, silent);
521 if (!debuginfo_cache)
522 zfree(&debuginfo_cache_path);
523out:
524 return debuginfo_cache;
525}
526
527static void debuginfo_cache__exit(void)
528{
529 debuginfo__delete(debuginfo_cache);
530 debuginfo_cache = NULL;
531 zfree(&debuginfo_cache_path);
532}
533
92561cb7 534
99ca4233
MH
535static int get_text_start_address(const char *exec, unsigned long *address)
536{
537 Elf *elf;
538 GElf_Ehdr ehdr;
539 GElf_Shdr shdr;
540 int fd, ret = -ENOENT;
541
542 fd = open(exec, O_RDONLY);
543 if (fd < 0)
544 return -errno;
545
546 elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
062d6c2a
MH
547 if (elf == NULL) {
548 ret = -EINVAL;
549 goto out_close;
550 }
99ca4233
MH
551
552 if (gelf_getehdr(elf, &ehdr) == NULL)
553 goto out;
554
555 if (!elf_section_by_name(elf, &ehdr, &shdr, ".text", NULL))
556 goto out;
557
558 *address = shdr.sh_addr - shdr.sh_offset;
559 ret = 0;
560out:
561 elf_end(elf);
062d6c2a
MH
562out_close:
563 close(fd);
564
99ca4233
MH
565 return ret;
566}
567
5a6f6314
MH
568/*
569 * Convert trace point to probe point with debuginfo
570 */
571static int find_perf_probe_point_from_dwarf(struct probe_trace_point *tp,
572 struct perf_probe_point *pp,
573 bool is_kprobe)
574{
575 struct debuginfo *dinfo = NULL;
576 unsigned long stext = 0;
577 u64 addr = tp->address;
578 int ret = -ENOENT;
579
580 /* convert the address to dwarf address */
581 if (!is_kprobe) {
582 if (!addr) {
583 ret = -EINVAL;
584 goto error;
585 }
586 ret = get_text_start_address(tp->module, &stext);
587 if (ret < 0)
588 goto error;
589 addr += stext;
e486367f 590 } else if (tp->symbol) {
9b239a12
MH
591 /* If the module is given, this returns relative address */
592 ret = kernel_get_symbol_address_by_name(tp->symbol, &addr,
593 false, !!tp->module);
594 if (ret != 0)
5a6f6314
MH
595 goto error;
596 addr += tp->offset;
597 }
598
599 pr_debug("try to find information at %" PRIx64 " in %s\n", addr,
600 tp->module ? : "kernel");
601
7737af01
MH
602 dinfo = debuginfo_cache__open(tp->module, verbose == 0);
603 if (dinfo)
5a6f6314
MH
604 ret = debuginfo__find_probe_point(dinfo,
605 (unsigned long)addr, pp);
7737af01 606 else
5a6f6314 607 ret = -ENOENT;
5a6f6314
MH
608
609 if (ret > 0) {
610 pp->retprobe = tp->retprobe;
611 return 0;
612 }
613error:
614 pr_debug("Failed to find corresponding probes from debuginfo.\n");
615 return ret ? : -ENOENT;
616}
617
fb7345bb
MH
618static int add_exec_to_probe_trace_events(struct probe_trace_event *tevs,
619 int ntevs, const char *exec)
620{
621 int i, ret = 0;
eb948e50 622 unsigned long stext = 0;
fb7345bb
MH
623
624 if (!exec)
625 return 0;
626
627 ret = get_text_start_address(exec, &stext);
628 if (ret < 0)
629 return ret;
630
631 for (i = 0; i < ntevs && ret >= 0; i++) {
981a2379 632 /* point.address is the addres of point.symbol + point.offset */
eb948e50 633 tevs[i].point.address -= stext;
fb7345bb 634 tevs[i].point.module = strdup(exec);
eb948e50 635 if (!tevs[i].point.module) {
fb7345bb
MH
636 ret = -ENOMEM;
637 break;
638 }
639 tevs[i].uprobes = true;
640 }
641
642 return ret;
643}
644
190b57fc
MH
645static int add_module_to_probe_trace_events(struct probe_trace_event *tevs,
646 int ntevs, const char *module)
647{
14a8fd7c 648 int i, ret = 0;
63a29613 649 char *mod_name = NULL;
14a8fd7c
MH
650
651 if (!module)
652 return 0;
653
63a29613 654 mod_name = find_module_name(module);
14a8fd7c 655
190b57fc 656 for (i = 0; i < ntevs; i++) {
63a29613
RB
657 tevs[i].point.module =
658 strdup(mod_name ? mod_name : module);
14a8fd7c
MH
659 if (!tevs[i].point.module) {
660 ret = -ENOMEM;
661 break;
662 }
190b57fc 663 }
14a8fd7c 664
63a29613 665 free(mod_name);
14a8fd7c 666 return ret;
190b57fc
MH
667}
668
dfef99cd
MH
669/* Post processing the probe events */
670static int post_process_probe_trace_events(struct probe_trace_event *tevs,
671 int ntevs, const char *module,
672 bool uprobe)
673{
674 struct ref_reloc_sym *reloc_sym;
675 char *tmp;
5a51fcd1 676 int i, skipped = 0;
dfef99cd
MH
677
678 if (uprobe)
679 return add_exec_to_probe_trace_events(tevs, ntevs, module);
680
681 /* Note that currently ref_reloc_sym based probe is not for drivers */
682 if (module)
683 return add_module_to_probe_trace_events(tevs, ntevs, module);
684
8f33f7de 685 reloc_sym = kernel_get_ref_reloc_sym();
dfef99cd
MH
686 if (!reloc_sym) {
687 pr_warning("Relocated base symbol is not found!\n");
688 return -EINVAL;
689 }
690
691 for (i = 0; i < ntevs; i++) {
b031220d
MH
692 if (!tevs[i].point.address || tevs[i].point.retprobe)
693 continue;
694 /* If we found a wrong one, mark it by NULL symbol */
695 if (kprobe_warn_out_range(tevs[i].point.symbol,
696 tevs[i].point.address)) {
697 tmp = NULL;
698 skipped++;
699 } else {
700 tmp = strdup(reloc_sym->name);
701 if (!tmp)
702 return -ENOMEM;
dfef99cd 703 }
b031220d
MH
704 /* If we have no realname, use symbol for it */
705 if (!tevs[i].point.realname)
706 tevs[i].point.realname = tevs[i].point.symbol;
707 else
708 free(tevs[i].point.symbol);
709 tevs[i].point.symbol = tmp;
710 tevs[i].point.offset = tevs[i].point.address -
711 reloc_sym->unrelocated_addr;
dfef99cd 712 }
5a51fcd1 713 return skipped;
dfef99cd
MH
714}
715
4b4da7f7 716/* Try to find perf_probe_event with debuginfo */
0e60836b 717static int try_to_find_probe_trace_events(struct perf_probe_event *pev,
ddb2f58f 718 struct probe_trace_event **tevs)
4b4da7f7
MH
719{
720 bool need_dwarf = perf_probe_event_need_dwarf(pev);
9b118aca 721 struct perf_probe_point tmp;
225466f1 722 struct debuginfo *dinfo;
190b57fc 723 int ntevs, ret = 0;
4b4da7f7 724
44225521 725 dinfo = open_debuginfo(pev->target, !need_dwarf);
ff741783 726 if (!dinfo) {
92561cb7 727 if (need_dwarf)
ff741783 728 return -ENOENT;
ff741783 729 pr_debug("Could not open debuginfo. Try to use symbols.\n");
4b4da7f7
MH
730 return 0;
731 }
732
dfef99cd 733 pr_debug("Try to find probe point from debuginfo.\n");
ff741783 734 /* Searching trace events corresponding to a probe event */
ddb2f58f 735 ntevs = debuginfo__find_trace_events(dinfo, pev, tevs);
ff741783 736
9b118aca 737 if (ntevs == 0) { /* Not found, retry with an alternative */
44225521 738 ret = get_alternative_probe_event(dinfo, pev, &tmp);
9b118aca 739 if (!ret) {
ddb2f58f 740 ntevs = debuginfo__find_trace_events(dinfo, pev, tevs);
9b118aca
MH
741 /*
742 * Write back to the original probe_event for
743 * setting appropriate (user given) event name
744 */
745 clear_perf_probe_point(&pev->point);
746 memcpy(&pev->point, &tmp, sizeof(tmp));
747 }
748 }
749
ff741783 750 debuginfo__delete(dinfo);
4b4da7f7 751
146a1439 752 if (ntevs > 0) { /* Succeeded to find trace events */
dfef99cd
MH
753 pr_debug("Found %d probe_trace_events.\n", ntevs);
754 ret = post_process_probe_trace_events(*tevs, ntevs,
44225521 755 pev->target, pev->uprobes);
5a51fcd1 756 if (ret < 0 || ret == ntevs) {
981d05ad
MH
757 clear_probe_trace_events(*tevs, ntevs);
758 zfree(tevs);
759 }
5a51fcd1
MH
760 if (ret != ntevs)
761 return ret < 0 ? ret : ntevs;
762 ntevs = 0;
763 /* Fall through */
146a1439 764 }
4b4da7f7 765
146a1439 766 if (ntevs == 0) { /* No error but failed to find probe point. */
0687eba7 767 pr_warning("Probe point '%s' not found.\n",
146a1439 768 synthesize_perf_probe_point(&pev->point));
0687eba7 769 return -ENOENT;
146a1439
MH
770 }
771 /* Error path : ntevs < 0 */
15eca306 772 pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
1c0bd0e8
WN
773 if (ntevs < 0) {
774 if (ntevs == -EBADF)
775 pr_warning("Warning: No dwarf info found in the vmlinux - "
776 "please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
15eca306 777 if (!need_dwarf) {
0e43e5d2 778 pr_debug("Trying to use symbols.\n");
15eca306
MH
779 return 0;
780 }
4b4da7f7 781 }
15eca306 782 return ntevs;
4b4da7f7
MH
783}
784
785#define LINEBUF_SIZE 256
786#define NR_ADDITIONAL_LINES 2
787
fde52dbd 788static int __show_one_line(FILE *fp, int l, bool skip, bool show_num)
4b4da7f7 789{
5f03cba4 790 char buf[LINEBUF_SIZE], sbuf[STRERR_BUFSIZE];
befe3414
FBH
791 const char *color = show_num ? "" : PERF_COLOR_BLUE;
792 const char *prefix = NULL;
4b4da7f7 793
befe3414 794 do {
4b4da7f7
MH
795 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
796 goto error;
befe3414
FBH
797 if (skip)
798 continue;
799 if (!prefix) {
800 prefix = show_num ? "%7d " : " ";
801 color_fprintf(stdout, color, prefix, l);
4b4da7f7 802 }
befe3414
FBH
803 color_fprintf(stdout, color, "%s", buf);
804
805 } while (strchr(buf, '\n') == NULL);
146a1439 806
fde52dbd 807 return 1;
4b4da7f7 808error:
fde52dbd 809 if (ferror(fp)) {
5f03cba4
MH
810 pr_warning("File read error: %s\n",
811 strerror_r(errno, sbuf, sizeof(sbuf)));
fde52dbd
FBH
812 return -1;
813 }
814 return 0;
815}
146a1439 816
fde52dbd
FBH
817static int _show_one_line(FILE *fp, int l, bool skip, bool show_num)
818{
819 int rv = __show_one_line(fp, l, skip, show_num);
820 if (rv == 0) {
821 pr_warning("Source file is shorter than expected.\n");
822 rv = -1;
823 }
824 return rv;
4b4da7f7
MH
825}
826
fde52dbd
FBH
827#define show_one_line_with_num(f,l) _show_one_line(f,l,false,true)
828#define show_one_line(f,l) _show_one_line(f,l,false,false)
829#define skip_one_line(f,l) _show_one_line(f,l,true,false)
830#define show_one_line_or_eof(f,l) __show_one_line(f,l,false,false)
831
4b4da7f7
MH
832/*
833 * Show line-range always requires debuginfo to find source file and
834 * line number.
835 */
811dd2ae
MH
836static int __show_line_range(struct line_range *lr, const char *module,
837 bool user)
4b4da7f7 838{
d3b63d7a 839 int l = 1;
5a62257a 840 struct int_node *ln;
ff741783 841 struct debuginfo *dinfo;
4b4da7f7 842 FILE *fp;
ff741783 843 int ret;
7cf0b79e 844 char *tmp;
5f03cba4 845 char sbuf[STRERR_BUFSIZE];
4b4da7f7
MH
846
847 /* Search a line range */
92561cb7
MH
848 dinfo = open_debuginfo(module, false);
849 if (!dinfo)
ff741783 850 return -ENOENT;
146a1439 851
ff741783 852 ret = debuginfo__find_line_range(dinfo, lr);
811dd2ae
MH
853 if (!ret) { /* Not found, retry with an alternative */
854 ret = get_alternative_line_range(dinfo, lr, module, user);
855 if (!ret)
856 ret = debuginfo__find_line_range(dinfo, lr);
857 }
ff741783 858 debuginfo__delete(dinfo);
5ee05b88 859 if (ret == 0 || ret == -ENOENT) {
146a1439
MH
860 pr_warning("Specified source line is not found.\n");
861 return -ENOENT;
862 } else if (ret < 0) {
5ee05b88 863 pr_warning("Debuginfo analysis failed.\n");
146a1439
MH
864 return ret;
865 }
4b4da7f7 866
7cf0b79e
MH
867 /* Convert source file path */
868 tmp = lr->path;
6a330a3c 869 ret = get_real_path(tmp, lr->comp_dir, &lr->path);
a78604de
HK
870
871 /* Free old path when new path is assigned */
872 if (tmp != lr->path)
873 free(tmp);
874
7cf0b79e 875 if (ret < 0) {
5ee05b88 876 pr_warning("Failed to find source file path.\n");
7cf0b79e
MH
877 return ret;
878 }
879
4b4da7f7
MH
880 setup_pager();
881
882 if (lr->function)
8737ebde 883 fprintf(stdout, "<%s@%s:%d>\n", lr->function, lr->path,
4b4da7f7
MH
884 lr->start - lr->offset);
885 else
62c15fc4 886 fprintf(stdout, "<%s:%d>\n", lr->path, lr->start);
4b4da7f7
MH
887
888 fp = fopen(lr->path, "r");
146a1439
MH
889 if (fp == NULL) {
890 pr_warning("Failed to open %s: %s\n", lr->path,
5f03cba4 891 strerror_r(errno, sbuf, sizeof(sbuf)));
146a1439
MH
892 return -errno;
893 }
4b4da7f7 894 /* Skip to starting line number */
44b81e92 895 while (l < lr->start) {
fde52dbd 896 ret = skip_one_line(fp, l++);
44b81e92
FBH
897 if (ret < 0)
898 goto end;
899 }
4b4da7f7 900
5a62257a
MH
901 intlist__for_each(ln, lr->line_list) {
902 for (; ln->i > l; l++) {
fde52dbd 903 ret = show_one_line(fp, l - lr->offset);
44b81e92
FBH
904 if (ret < 0)
905 goto end;
906 }
fde52dbd 907 ret = show_one_line_with_num(fp, l++ - lr->offset);
146a1439
MH
908 if (ret < 0)
909 goto end;
4b4da7f7
MH
910 }
911
912 if (lr->end == INT_MAX)
913 lr->end = l + NR_ADDITIONAL_LINES;
fde52dbd
FBH
914 while (l <= lr->end) {
915 ret = show_one_line_or_eof(fp, l++ - lr->offset);
916 if (ret <= 0)
44b81e92
FBH
917 break;
918 }
146a1439 919end:
4b4da7f7 920 fclose(fp);
146a1439 921 return ret;
4b4da7f7
MH
922}
923
2b394bc4 924int show_line_range(struct line_range *lr, const char *module, bool user)
ee45b6c2
MH
925{
926 int ret;
927
9bae1e8c 928 ret = init_probe_symbol_maps(user);
ee45b6c2
MH
929 if (ret < 0)
930 return ret;
811dd2ae 931 ret = __show_line_range(lr, module, user);
9bae1e8c 932 exit_probe_symbol_maps();
ee45b6c2
MH
933
934 return ret;
935}
936
ff741783
MH
937static int show_available_vars_at(struct debuginfo *dinfo,
938 struct perf_probe_event *pev,
ddb2f58f 939 struct strfilter *_filter)
cf6eb489
MH
940{
941 char *buf;
bd09d7b5 942 int ret, i, nvars;
cf6eb489
MH
943 struct str_node *node;
944 struct variable_list *vls = NULL, *vl;
9b118aca 945 struct perf_probe_point tmp;
bd09d7b5 946 const char *var;
cf6eb489
MH
947
948 buf = synthesize_perf_probe_point(&pev->point);
949 if (!buf)
950 return -EINVAL;
951 pr_debug("Searching variables at %s\n", buf);
952
ddb2f58f 953 ret = debuginfo__find_available_vars_at(dinfo, pev, &vls);
9b118aca 954 if (!ret) { /* Not found, retry with an alternative */
44225521 955 ret = get_alternative_probe_event(dinfo, pev, &tmp);
9b118aca
MH
956 if (!ret) {
957 ret = debuginfo__find_available_vars_at(dinfo, pev,
ddb2f58f 958 &vls);
9b118aca
MH
959 /* Release the old probe_point */
960 clear_perf_probe_point(&tmp);
961 }
962 }
bd09d7b5 963 if (ret <= 0) {
69e96eaa
MH
964 if (ret == 0 || ret == -ENOENT) {
965 pr_err("Failed to find the address of %s\n", buf);
966 ret = -ENOENT;
967 } else
968 pr_warning("Debuginfo analysis failed.\n");
bd09d7b5
MH
969 goto end;
970 }
69e96eaa 971
bd09d7b5
MH
972 /* Some variables are found */
973 fprintf(stdout, "Available variables at %s\n", buf);
974 for (i = 0; i < ret; i++) {
975 vl = &vls[i];
976 /*
977 * A probe point might be converted to
978 * several trace points.
979 */
980 fprintf(stdout, "\t@<%s+%lu>\n", vl->point.symbol,
981 vl->point.offset);
74cf249d 982 zfree(&vl->point.symbol);
bd09d7b5
MH
983 nvars = 0;
984 if (vl->vars) {
985 strlist__for_each(node, vl->vars) {
986 var = strchr(node->s, '\t') + 1;
987 if (strfilter__compare(_filter, var)) {
cf6eb489 988 fprintf(stdout, "\t\t%s\n", node->s);
bd09d7b5
MH
989 nvars++;
990 }
991 }
992 strlist__delete(vl->vars);
cf6eb489 993 }
bd09d7b5
MH
994 if (nvars == 0)
995 fprintf(stdout, "\t\t(No matched variables)\n");
996 }
997 free(vls);
998end:
cf6eb489
MH
999 free(buf);
1000 return ret;
1001}
1002
1003/* Show available variables on given probe point */
1004int show_available_vars(struct perf_probe_event *pevs, int npevs,
ddb2f58f 1005 struct strfilter *_filter)
cf6eb489 1006{
ff741783
MH
1007 int i, ret = 0;
1008 struct debuginfo *dinfo;
cf6eb489 1009
9bae1e8c 1010 ret = init_probe_symbol_maps(pevs->uprobes);
cf6eb489
MH
1011 if (ret < 0)
1012 return ret;
1013
44225521 1014 dinfo = open_debuginfo(pevs->target, false);
ff741783 1015 if (!dinfo) {
ee45b6c2
MH
1016 ret = -ENOENT;
1017 goto out;
ff741783
MH
1018 }
1019
cf6eb489
MH
1020 setup_pager();
1021
ff741783 1022 for (i = 0; i < npevs && ret >= 0; i++)
ddb2f58f 1023 ret = show_available_vars_at(dinfo, &pevs[i], _filter);
ff741783
MH
1024
1025 debuginfo__delete(dinfo);
ee45b6c2 1026out:
9bae1e8c 1027 exit_probe_symbol_maps();
cf6eb489
MH
1028 return ret;
1029}
1030
89fe808a 1031#else /* !HAVE_DWARF_SUPPORT */
4b4da7f7 1032
7737af01
MH
1033static void debuginfo_cache__exit(void)
1034{
1035}
1036
5a6f6314
MH
1037static int
1038find_perf_probe_point_from_dwarf(struct probe_trace_point *tp __maybe_unused,
1039 struct perf_probe_point *pp __maybe_unused,
1040 bool is_kprobe __maybe_unused)
4b4da7f7 1041{
5a6f6314 1042 return -ENOSYS;
4b4da7f7
MH
1043}
1044
0e60836b 1045static int try_to_find_probe_trace_events(struct perf_probe_event *pev,
ddb2f58f 1046 struct probe_trace_event **tevs __maybe_unused)
4b4da7f7 1047{
146a1439
MH
1048 if (perf_probe_event_need_dwarf(pev)) {
1049 pr_warning("Debuginfo-analysis is not supported.\n");
1050 return -ENOSYS;
1051 }
225466f1 1052
4b4da7f7
MH
1053 return 0;
1054}
1055
1d037ca1 1056int show_line_range(struct line_range *lr __maybe_unused,
2b394bc4
MH
1057 const char *module __maybe_unused,
1058 bool user __maybe_unused)
4b4da7f7 1059{
146a1439
MH
1060 pr_warning("Debuginfo-analysis is not supported.\n");
1061 return -ENOSYS;
4b4da7f7
MH
1062}
1063
1d037ca1 1064int show_available_vars(struct perf_probe_event *pevs __maybe_unused,
ddb2f58f
MH
1065 int npevs __maybe_unused,
1066 struct strfilter *filter __maybe_unused)
cf6eb489
MH
1067{
1068 pr_warning("Debuginfo-analysis is not supported.\n");
1069 return -ENOSYS;
1070}
e0faa8d3
MH
1071#endif
1072
e53b00d3
MH
1073void line_range__clear(struct line_range *lr)
1074{
e53b00d3
MH
1075 free(lr->function);
1076 free(lr->file);
1077 free(lr->path);
1078 free(lr->comp_dir);
5a62257a 1079 intlist__delete(lr->line_list);
e53b00d3
MH
1080 memset(lr, 0, sizeof(*lr));
1081}
1082
5a62257a 1083int line_range__init(struct line_range *lr)
e53b00d3
MH
1084{
1085 memset(lr, 0, sizeof(*lr));
5a62257a
MH
1086 lr->line_list = intlist__new(NULL);
1087 if (!lr->line_list)
1088 return -ENOMEM;
1089 else
1090 return 0;
e53b00d3
MH
1091}
1092
21dd9ae5
FBH
1093static int parse_line_num(char **ptr, int *val, const char *what)
1094{
1095 const char *start = *ptr;
1096
1097 errno = 0;
1098 *val = strtol(*ptr, ptr, 0);
1099 if (errno || *ptr == start) {
1100 semantic_error("'%s' is not a valid number.\n", what);
1101 return -EINVAL;
1102 }
1103 return 0;
1104}
1105
573709fd
MH
1106/* Check the name is good for event, group or function */
1107static bool is_c_func_name(const char *name)
1108{
1109 if (!isalpha(*name) && *name != '_')
1110 return false;
1111 while (*++name != '\0') {
1112 if (!isalpha(*name) && !isdigit(*name) && *name != '_')
1113 return false;
1114 }
1115 return true;
1116}
1117
9d95b580
FBH
1118/*
1119 * Stuff 'lr' according to the line range described by 'arg'.
1120 * The line range syntax is described by:
1121 *
1122 * SRC[:SLN[+NUM|-ELN]]
e116dfa1 1123 * FNC[@SRC][:SLN[+NUM|-ELN]]
9d95b580 1124 */
146a1439 1125int parse_line_range_desc(const char *arg, struct line_range *lr)
631c9def 1126{
e116dfa1 1127 char *range, *file, *name = strdup(arg);
21dd9ae5
FBH
1128 int err;
1129
1130 if (!name)
1131 return -ENOMEM;
1132
1133 lr->start = 0;
1134 lr->end = INT_MAX;
1135
1136 range = strchr(name, ':');
1137 if (range) {
1138 *range++ = '\0';
1139
1140 err = parse_line_num(&range, &lr->start, "start line");
1141 if (err)
1142 goto err;
1143
1144 if (*range == '+' || *range == '-') {
1145 const char c = *range++;
1146
1147 err = parse_line_num(&range, &lr->end, "end line");
1148 if (err)
1149 goto err;
1150
1151 if (c == '+') {
1152 lr->end += lr->start;
1153 /*
1154 * Adjust the number of lines here.
1155 * If the number of lines == 1, the
1156 * the end of line should be equal to
1157 * the start of line.
1158 */
1159 lr->end--;
1160 }
1161 }
9d95b580 1162
d3b63d7a 1163 pr_debug("Line range is %d to %d\n", lr->start, lr->end);
21dd9ae5
FBH
1164
1165 err = -EINVAL;
d3b63d7a 1166 if (lr->start > lr->end) {
631c9def 1167 semantic_error("Start line must be smaller"
146a1439 1168 " than end line.\n");
21dd9ae5 1169 goto err;
146a1439 1170 }
21dd9ae5
FBH
1171 if (*range != '\0') {
1172 semantic_error("Tailing with invalid str '%s'.\n", range);
1173 goto err;
146a1439 1174 }
d3b63d7a 1175 }
02b95dad 1176
e116dfa1
MH
1177 file = strchr(name, '@');
1178 if (file) {
1179 *file = '\0';
1180 lr->file = strdup(++file);
1181 if (lr->file == NULL) {
1182 err = -ENOMEM;
1183 goto err;
1184 }
1185 lr->function = name;
573709fd 1186 } else if (strchr(name, '/') || strchr(name, '.'))
21dd9ae5 1187 lr->file = name;
573709fd 1188 else if (is_c_func_name(name))/* We reuse it for checking funcname */
21dd9ae5 1189 lr->function = name;
573709fd
MH
1190 else { /* Invalid name */
1191 semantic_error("'%s' is not a valid function name.\n", name);
1192 err = -EINVAL;
1193 goto err;
1194 }
146a1439
MH
1195
1196 return 0;
21dd9ae5
FBH
1197err:
1198 free(name);
1199 return err;
631c9def
MH
1200}
1201
50656eec 1202/* Parse probepoint definition. */
146a1439 1203static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
50656eec 1204{
4235b045 1205 struct perf_probe_point *pp = &pev->point;
50656eec
MH
1206 char *ptr, *tmp;
1207 char c, nc = 0;
3099c026 1208 bool file_spec = false;
50656eec
MH
1209 /*
1210 * <Syntax>
2a9c8c36
MH
1211 * perf probe [EVENT=]SRC[:LN|;PTN]
1212 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
af663d75
MH
1213 *
1214 * TODO:Group name support
50656eec 1215 */
e59d29e8
WN
1216 if (!arg)
1217 return -EINVAL;
50656eec 1218
2a9c8c36
MH
1219 ptr = strpbrk(arg, ";=@+%");
1220 if (ptr && *ptr == '=') { /* Event name */
af663d75
MH
1221 *ptr = '\0';
1222 tmp = ptr + 1;
146a1439
MH
1223 if (strchr(arg, ':')) {
1224 semantic_error("Group name is not supported yet.\n");
1225 return -ENOTSUP;
1226 }
573709fd 1227 if (!is_c_func_name(arg)) {
b7702a21 1228 semantic_error("%s is bad for event name -it must "
146a1439
MH
1229 "follow C symbol-naming rule.\n", arg);
1230 return -EINVAL;
1231 }
02b95dad
MH
1232 pev->event = strdup(arg);
1233 if (pev->event == NULL)
1234 return -ENOMEM;
4235b045 1235 pev->group = NULL;
af663d75
MH
1236 arg = tmp;
1237 }
1238
3099c026
NR
1239 /*
1240 * Check arg is function or file name and copy it.
1241 *
1242 * We consider arg to be a file spec if and only if it satisfies
1243 * all of the below criteria::
1244 * - it does not include any of "+@%",
1245 * - it includes one of ":;", and
1246 * - it has a period '.' in the name.
1247 *
1248 * Otherwise, we consider arg to be a function specification.
1249 */
1250 if (!strpbrk(arg, "+@%") && (ptr = strpbrk(arg, ";:")) != NULL) {
1251 /* This is a file spec if it includes a '.' before ; or : */
1252 if (memchr(arg, '.', ptr - arg))
1253 file_spec = true;
1254 }
1255
2a9c8c36 1256 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
1257 if (ptr) {
1258 nc = *ptr;
1259 *ptr++ = '\0';
1260 }
1261
6c6e024f
WN
1262 if (arg[0] == '\0')
1263 tmp = NULL;
1264 else {
1265 tmp = strdup(arg);
1266 if (tmp == NULL)
1267 return -ENOMEM;
1268 }
02b95dad 1269
3099c026 1270 if (file_spec)
02b95dad 1271 pp->file = tmp;
da15bd9d 1272 else {
02b95dad 1273 pp->function = tmp;
50656eec 1274
da15bd9d
WN
1275 /*
1276 * Keep pp->function even if this is absolute address,
1277 * so it can mark whether abs_address is valid.
1278 * Which make 'perf probe lib.bin 0x0' possible.
1279 *
1280 * Note that checking length of tmp is not needed
1281 * because when we access tmp[1] we know tmp[0] is '0',
1282 * so tmp[1] should always valid (but could be '\0').
1283 */
1284 if (tmp && !strncmp(tmp, "0x", 2)) {
1285 pp->abs_address = strtoul(pp->function, &tmp, 0);
1286 if (*tmp != '\0') {
1287 semantic_error("Invalid absolute address.\n");
1288 return -EINVAL;
1289 }
1290 }
1291 }
1292
50656eec
MH
1293 /* Parse other options */
1294 while (ptr) {
1295 arg = ptr;
1296 c = nc;
2a9c8c36 1297 if (c == ';') { /* Lazy pattern must be the last part */
02b95dad
MH
1298 pp->lazy_line = strdup(arg);
1299 if (pp->lazy_line == NULL)
1300 return -ENOMEM;
2a9c8c36
MH
1301 break;
1302 }
1303 ptr = strpbrk(arg, ";:+@%");
50656eec
MH
1304 if (ptr) {
1305 nc = *ptr;
1306 *ptr++ = '\0';
1307 }
1308 switch (c) {
1309 case ':': /* Line number */
1310 pp->line = strtoul(arg, &tmp, 0);
146a1439 1311 if (*tmp != '\0') {
2a9c8c36 1312 semantic_error("There is non-digit char"
146a1439
MH
1313 " in line number.\n");
1314 return -EINVAL;
1315 }
50656eec
MH
1316 break;
1317 case '+': /* Byte offset from a symbol */
1318 pp->offset = strtoul(arg, &tmp, 0);
146a1439 1319 if (*tmp != '\0') {
2a9c8c36 1320 semantic_error("There is non-digit character"
146a1439
MH
1321 " in offset.\n");
1322 return -EINVAL;
1323 }
50656eec
MH
1324 break;
1325 case '@': /* File name */
146a1439
MH
1326 if (pp->file) {
1327 semantic_error("SRC@SRC is not allowed.\n");
1328 return -EINVAL;
1329 }
02b95dad
MH
1330 pp->file = strdup(arg);
1331 if (pp->file == NULL)
1332 return -ENOMEM;
50656eec
MH
1333 break;
1334 case '%': /* Probe places */
1335 if (strcmp(arg, "return") == 0) {
1336 pp->retprobe = 1;
146a1439
MH
1337 } else { /* Others not supported yet */
1338 semantic_error("%%%s is not supported.\n", arg);
1339 return -ENOTSUP;
1340 }
50656eec 1341 break;
146a1439
MH
1342 default: /* Buggy case */
1343 pr_err("This program has a bug at %s:%d.\n",
1344 __FILE__, __LINE__);
1345 return -ENOTSUP;
50656eec
MH
1346 break;
1347 }
1348 }
1349
1350 /* Exclusion check */
146a1439 1351 if (pp->lazy_line && pp->line) {
0e43e5d2
MH
1352 semantic_error("Lazy pattern can't be used with"
1353 " line number.\n");
146a1439
MH
1354 return -EINVAL;
1355 }
2a9c8c36 1356
146a1439 1357 if (pp->lazy_line && pp->offset) {
0e43e5d2 1358 semantic_error("Lazy pattern can't be used with offset.\n");
146a1439
MH
1359 return -EINVAL;
1360 }
2a9c8c36 1361
146a1439 1362 if (pp->line && pp->offset) {
0e43e5d2 1363 semantic_error("Offset can't be used with line number.\n");
146a1439
MH
1364 return -EINVAL;
1365 }
50656eec 1366
146a1439 1367 if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
2a9c8c36 1368 semantic_error("File always requires line number or "
0e43e5d2 1369 "lazy pattern.\n");
146a1439
MH
1370 return -EINVAL;
1371 }
50656eec 1372
146a1439 1373 if (pp->offset && !pp->function) {
0e43e5d2 1374 semantic_error("Offset requires an entry function.\n");
146a1439
MH
1375 return -EINVAL;
1376 }
50656eec 1377
146a1439 1378 if (pp->retprobe && !pp->function) {
0e43e5d2 1379 semantic_error("Return probe requires an entry function.\n");
146a1439
MH
1380 return -EINVAL;
1381 }
50656eec 1382
146a1439 1383 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
2a9c8c36 1384 semantic_error("Offset/Line/Lazy pattern can't be used with "
0e43e5d2 1385 "return probe.\n");
146a1439
MH
1386 return -EINVAL;
1387 }
50656eec 1388
4235b045 1389 pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
2a9c8c36
MH
1390 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
1391 pp->lazy_line);
146a1439 1392 return 0;
50656eec
MH
1393}
1394
7df2f329 1395/* Parse perf-probe event argument */
146a1439 1396static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
7df2f329 1397{
b2a3c12b 1398 char *tmp, *goodname;
7df2f329
MH
1399 struct perf_probe_arg_field **fieldp;
1400
1401 pr_debug("parsing arg: %s into ", str);
1402
48481938
MH
1403 tmp = strchr(str, '=');
1404 if (tmp) {
02b95dad
MH
1405 arg->name = strndup(str, tmp - str);
1406 if (arg->name == NULL)
1407 return -ENOMEM;
11a1ca35 1408 pr_debug("name:%s ", arg->name);
48481938
MH
1409 str = tmp + 1;
1410 }
1411
11a1ca35
MH
1412 tmp = strchr(str, ':');
1413 if (tmp) { /* Type setting */
1414 *tmp = '\0';
02b95dad
MH
1415 arg->type = strdup(tmp + 1);
1416 if (arg->type == NULL)
1417 return -ENOMEM;
11a1ca35
MH
1418 pr_debug("type:%s ", arg->type);
1419 }
1420
b2a3c12b 1421 tmp = strpbrk(str, "-.[");
7df2f329
MH
1422 if (!is_c_varname(str) || !tmp) {
1423 /* A variable, register, symbol or special value */
02b95dad
MH
1424 arg->var = strdup(str);
1425 if (arg->var == NULL)
1426 return -ENOMEM;
48481938 1427 pr_debug("%s\n", arg->var);
146a1439 1428 return 0;
7df2f329
MH
1429 }
1430
b2a3c12b 1431 /* Structure fields or array element */
02b95dad
MH
1432 arg->var = strndup(str, tmp - str);
1433 if (arg->var == NULL)
1434 return -ENOMEM;
b2a3c12b 1435 goodname = arg->var;
48481938 1436 pr_debug("%s, ", arg->var);
7df2f329
MH
1437 fieldp = &arg->field;
1438
1439 do {
e334016f
MH
1440 *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
1441 if (*fieldp == NULL)
1442 return -ENOMEM;
b2a3c12b
MH
1443 if (*tmp == '[') { /* Array */
1444 str = tmp;
1445 (*fieldp)->index = strtol(str + 1, &tmp, 0);
7df2f329 1446 (*fieldp)->ref = true;
b2a3c12b
MH
1447 if (*tmp != ']' || tmp == str + 1) {
1448 semantic_error("Array index must be a"
1449 " number.\n");
1450 return -EINVAL;
1451 }
1452 tmp++;
1453 if (*tmp == '\0')
1454 tmp = NULL;
1455 } else { /* Structure */
1456 if (*tmp == '.') {
1457 str = tmp + 1;
1458 (*fieldp)->ref = false;
1459 } else if (tmp[1] == '>') {
1460 str = tmp + 2;
1461 (*fieldp)->ref = true;
1462 } else {
1463 semantic_error("Argument parse error: %s\n",
1464 str);
1465 return -EINVAL;
1466 }
1467 tmp = strpbrk(str, "-.[");
146a1439 1468 }
7df2f329 1469 if (tmp) {
02b95dad
MH
1470 (*fieldp)->name = strndup(str, tmp - str);
1471 if ((*fieldp)->name == NULL)
1472 return -ENOMEM;
b2a3c12b
MH
1473 if (*str != '[')
1474 goodname = (*fieldp)->name;
7df2f329
MH
1475 pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
1476 fieldp = &(*fieldp)->next;
1477 }
1478 } while (tmp);
02b95dad
MH
1479 (*fieldp)->name = strdup(str);
1480 if ((*fieldp)->name == NULL)
1481 return -ENOMEM;
b2a3c12b
MH
1482 if (*str != '[')
1483 goodname = (*fieldp)->name;
7df2f329 1484 pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
df0faf4b 1485
b2a3c12b 1486 /* If no name is specified, set the last field name (not array index)*/
02b95dad 1487 if (!arg->name) {
b2a3c12b 1488 arg->name = strdup(goodname);
02b95dad
MH
1489 if (arg->name == NULL)
1490 return -ENOMEM;
1491 }
146a1439 1492 return 0;
7df2f329
MH
1493}
1494
4235b045 1495/* Parse perf-probe event command */
146a1439 1496int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
50656eec 1497{
e1c01d61 1498 char **argv;
146a1439 1499 int argc, i, ret = 0;
fac13fd5 1500
4235b045 1501 argv = argv_split(cmd, &argc);
146a1439
MH
1502 if (!argv) {
1503 pr_debug("Failed to split arguments.\n");
1504 return -ENOMEM;
1505 }
1506 if (argc - 1 > MAX_PROBE_ARGS) {
1507 semantic_error("Too many probe arguments (%d).\n", argc - 1);
1508 ret = -ERANGE;
1509 goto out;
1510 }
50656eec 1511 /* Parse probe point */
146a1439
MH
1512 ret = parse_perf_probe_point(argv[0], pev);
1513 if (ret < 0)
1514 goto out;
50656eec 1515
e1c01d61 1516 /* Copy arguments and ensure return probe has no C argument */
4235b045 1517 pev->nargs = argc - 1;
e334016f
MH
1518 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1519 if (pev->args == NULL) {
1520 ret = -ENOMEM;
1521 goto out;
1522 }
146a1439
MH
1523 for (i = 0; i < pev->nargs && ret >= 0; i++) {
1524 ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
1525 if (ret >= 0 &&
1526 is_c_varname(pev->args[i].var) && pev->point.retprobe) {
4235b045 1527 semantic_error("You can't specify local variable for"
146a1439
MH
1528 " kretprobe.\n");
1529 ret = -EINVAL;
1530 }
e1c01d61 1531 }
146a1439 1532out:
e1c01d61 1533 argv_free(argv);
146a1439
MH
1534
1535 return ret;
50656eec
MH
1536}
1537
4235b045
MH
1538/* Return true if this perf_probe_event requires debuginfo */
1539bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
1540{
1541 int i;
1542
1543 if (pev->point.file || pev->point.line || pev->point.lazy_line)
1544 return true;
1545
1546 for (i = 0; i < pev->nargs; i++)
48481938 1547 if (is_c_varname(pev->args[i].var))
4235b045
MH
1548 return true;
1549
1550 return false;
1551}
1552
0e60836b 1553/* Parse probe_events event into struct probe_point */
92f6c72e 1554int parse_probe_trace_command(const char *cmd, struct probe_trace_event *tev)
4de189fe 1555{
0e60836b 1556 struct probe_trace_point *tp = &tev->point;
4de189fe
MH
1557 char pr;
1558 char *p;
bcbd0040 1559 char *argv0_str = NULL, *fmt, *fmt1_str, *fmt2_str, *fmt3_str;
4de189fe
MH
1560 int ret, i, argc;
1561 char **argv;
1562
0e60836b 1563 pr_debug("Parsing probe_events: %s\n", cmd);
4235b045 1564 argv = argv_split(cmd, &argc);
146a1439
MH
1565 if (!argv) {
1566 pr_debug("Failed to split arguments.\n");
1567 return -ENOMEM;
1568 }
1569 if (argc < 2) {
1570 semantic_error("Too few probe arguments.\n");
1571 ret = -ERANGE;
1572 goto out;
1573 }
4de189fe
MH
1574
1575 /* Scan event and group name. */
bcbd0040
IT
1576 argv0_str = strdup(argv[0]);
1577 if (argv0_str == NULL) {
1578 ret = -ENOMEM;
1579 goto out;
1580 }
1581 fmt1_str = strtok_r(argv0_str, ":", &fmt);
1582 fmt2_str = strtok_r(NULL, "/", &fmt);
1583 fmt3_str = strtok_r(NULL, " \t", &fmt);
1584 if (fmt1_str == NULL || strlen(fmt1_str) != 1 || fmt2_str == NULL
1585 || fmt3_str == NULL) {
146a1439
MH
1586 semantic_error("Failed to parse event name: %s\n", argv[0]);
1587 ret = -EINVAL;
1588 goto out;
1589 }
bcbd0040
IT
1590 pr = fmt1_str[0];
1591 tev->group = strdup(fmt2_str);
1592 tev->event = strdup(fmt3_str);
1593 if (tev->group == NULL || tev->event == NULL) {
1594 ret = -ENOMEM;
1595 goto out;
1596 }
4235b045 1597 pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
4de189fe 1598
4235b045 1599 tp->retprobe = (pr == 'r');
4de189fe 1600
190b57fc
MH
1601 /* Scan module name(if there), function name and offset */
1602 p = strchr(argv[1], ':');
1603 if (p) {
1604 tp->module = strndup(argv[1], p - argv[1]);
844faa4b
MH
1605 if (!tp->module) {
1606 ret = -ENOMEM;
1607 goto out;
1608 }
190b57fc
MH
1609 p++;
1610 } else
1611 p = argv[1];
bcbd0040 1612 fmt1_str = strtok_r(p, "+", &fmt);
be07afe9
WN
1613 /* only the address started with 0x */
1614 if (fmt1_str[0] == '0') {
1615 /*
1616 * Fix a special case:
1617 * if address == 0, kernel reports something like:
1618 * p:probe_libc/abs_0 /lib/libc-2.18.so:0x (null) arg1=%ax
1619 * Newer kernel may fix that, but we want to
1620 * support old kernel also.
1621 */
1622 if (strcmp(fmt1_str, "0x") == 0) {
1623 if (!argv[2] || strcmp(argv[2], "(null)")) {
1624 ret = -EINVAL;
1625 goto out;
1626 }
1627 tp->address = 0;
1628
1629 free(argv[2]);
1630 for (i = 2; argv[i + 1] != NULL; i++)
1631 argv[i] = argv[i + 1];
1632
1633 argv[i] = NULL;
1634 argc -= 1;
1635 } else
1636 tp->address = strtoul(fmt1_str, NULL, 0);
1637 } else {
5a6f6314
MH
1638 /* Only the symbol-based probe has offset */
1639 tp->symbol = strdup(fmt1_str);
1640 if (tp->symbol == NULL) {
1641 ret = -ENOMEM;
1642 goto out;
1643 }
1644 fmt2_str = strtok_r(NULL, "", &fmt);
1645 if (fmt2_str == NULL)
1646 tp->offset = 0;
1647 else
1648 tp->offset = strtoul(fmt2_str, NULL, 10);
bcbd0040 1649 }
4de189fe 1650
4235b045 1651 tev->nargs = argc - 2;
0e60836b 1652 tev->args = zalloc(sizeof(struct probe_trace_arg) * tev->nargs);
e334016f
MH
1653 if (tev->args == NULL) {
1654 ret = -ENOMEM;
1655 goto out;
1656 }
4235b045 1657 for (i = 0; i < tev->nargs; i++) {
4de189fe
MH
1658 p = strchr(argv[i + 2], '=');
1659 if (p) /* We don't need which register is assigned. */
4235b045
MH
1660 *p++ = '\0';
1661 else
1662 p = argv[i + 2];
02b95dad 1663 tev->args[i].name = strdup(argv[i + 2]);
4235b045 1664 /* TODO: parse regs and offset */
02b95dad
MH
1665 tev->args[i].value = strdup(p);
1666 if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
1667 ret = -ENOMEM;
1668 goto out;
1669 }
4de189fe 1670 }
146a1439
MH
1671 ret = 0;
1672out:
bcbd0040 1673 free(argv0_str);
4de189fe 1674 argv_free(argv);
146a1439 1675 return ret;
4de189fe
MH
1676}
1677
7df2f329 1678/* Compose only probe arg */
909b0360 1679char *synthesize_perf_probe_arg(struct perf_probe_arg *pa)
7df2f329
MH
1680{
1681 struct perf_probe_arg_field *field = pa->field;
909b0360 1682 struct strbuf buf;
bf4d5f25
MH
1683 char *ret = NULL;
1684 int err;
1685
1686 if (strbuf_init(&buf, 64) < 0)
1687 return NULL;
7df2f329 1688
48481938 1689 if (pa->name && pa->var)
bf4d5f25 1690 err = strbuf_addf(&buf, "%s=%s", pa->name, pa->var);
48481938 1691 else
bf4d5f25
MH
1692 err = strbuf_addstr(&buf, pa->name ?: pa->var);
1693 if (err)
1694 goto out;
7df2f329
MH
1695
1696 while (field) {
b2a3c12b 1697 if (field->name[0] == '[')
bf4d5f25 1698 err = strbuf_addstr(&buf, field->name);
b2a3c12b 1699 else
bf4d5f25
MH
1700 err = strbuf_addf(&buf, "%s%s", field->ref ? "->" : ".",
1701 field->name);
7df2f329 1702 field = field->next;
bf4d5f25
MH
1703 if (err)
1704 goto out;
7df2f329 1705 }
11a1ca35 1706
909b0360 1707 if (pa->type)
bf4d5f25
MH
1708 if (strbuf_addf(&buf, ":%s", pa->type) < 0)
1709 goto out;
909b0360
MH
1710
1711 ret = strbuf_detach(&buf, NULL);
bf4d5f25
MH
1712out:
1713 strbuf_release(&buf);
146a1439 1714 return ret;
7df2f329
MH
1715}
1716
4235b045 1717/* Compose only probe point (not argument) */
c4ff4920 1718char *synthesize_perf_probe_point(struct perf_probe_point *pp)
4de189fe 1719{
909b0360 1720 struct strbuf buf;
bf4d5f25
MH
1721 char *tmp, *ret = NULL;
1722 int len, err = 0;
1723
1724 if (strbuf_init(&buf, 64) < 0)
1725 return NULL;
909b0360 1726
909b0360 1727 if (pp->function) {
bf4d5f25
MH
1728 if (strbuf_addstr(&buf, pp->function) < 0)
1729 goto out;
909b0360 1730 if (pp->offset)
bf4d5f25 1731 err = strbuf_addf(&buf, "+%lu", pp->offset);
909b0360 1732 else if (pp->line)
bf4d5f25 1733 err = strbuf_addf(&buf, ":%d", pp->line);
909b0360 1734 else if (pp->retprobe)
bf4d5f25
MH
1735 err = strbuf_addstr(&buf, "%return");
1736 if (err)
1737 goto out;
fb1587d8
MH
1738 }
1739 if (pp->file) {
32ae2ade
FBH
1740 tmp = pp->file;
1741 len = strlen(tmp);
1742 if (len > 30) {
1743 tmp = strchr(pp->file + len - 30, '/');
1744 tmp = tmp ? tmp + 1 : pp->file + len - 30;
1745 }
bf4d5f25
MH
1746 err = strbuf_addf(&buf, "@%s", tmp);
1747 if (!err && !pp->function && pp->line)
1748 err = strbuf_addf(&buf, ":%d", pp->line);
4de189fe 1749 }
bf4d5f25
MH
1750 if (!err)
1751 ret = strbuf_detach(&buf, NULL);
1752out:
1753 strbuf_release(&buf);
1754 return ret;
7ef17aaf
MH
1755}
1756
4235b045 1757char *synthesize_perf_probe_command(struct perf_probe_event *pev)
7ef17aaf 1758{
c4ff4920
MH
1759 struct strbuf buf;
1760 char *tmp, *ret = NULL;
1761 int i;
7ef17aaf 1762
c4ff4920 1763 if (strbuf_init(&buf, 64))
4235b045 1764 return NULL;
c4ff4920
MH
1765 if (pev->event)
1766 if (strbuf_addf(&buf, "%s:%s=", pev->group ?: PERFPROBE_GROUP,
1767 pev->event) < 0)
1768 goto out;
1769
1770 tmp = synthesize_perf_probe_point(&pev->point);
1771 if (!tmp || strbuf_addstr(&buf, tmp) < 0)
1772 goto out;
1773 free(tmp);
4de189fe 1774
4235b045 1775 for (i = 0; i < pev->nargs; i++) {
c4ff4920
MH
1776 tmp = synthesize_perf_probe_arg(pev->args + i);
1777 if (!tmp || strbuf_addf(&buf, " %s", tmp) < 0)
1778 goto out;
1779 free(tmp);
4de189fe 1780 }
4de189fe 1781
c4ff4920
MH
1782 ret = strbuf_detach(&buf, NULL);
1783out:
1784 strbuf_release(&buf);
1785 return ret;
4235b045 1786}
4235b045 1787
0e60836b 1788static int __synthesize_probe_trace_arg_ref(struct probe_trace_arg_ref *ref,
909b0360 1789 struct strbuf *buf, int depth)
4235b045 1790{
bf4d5f25 1791 int err;
4235b045 1792 if (ref->next) {
0e60836b 1793 depth = __synthesize_probe_trace_arg_ref(ref->next, buf,
909b0360 1794 depth + 1);
4235b045 1795 if (depth < 0)
bf4d5f25 1796 return depth;
4235b045 1797 }
bf4d5f25
MH
1798 err = strbuf_addf(buf, "%+ld(", ref->offset);
1799 return (err < 0) ? err : depth;
4de189fe
MH
1800}
1801
0e60836b 1802static int synthesize_probe_trace_arg(struct probe_trace_arg *arg,
909b0360 1803 struct strbuf *buf)
50656eec 1804{
0e60836b 1805 struct probe_trace_arg_ref *ref = arg->ref;
bf4d5f25 1806 int depth = 0, err;
4235b045
MH
1807
1808 /* Argument name or separator */
1809 if (arg->name)
bf4d5f25 1810 err = strbuf_addf(buf, " %s=", arg->name);
4235b045 1811 else
bf4d5f25
MH
1812 err = strbuf_addch(buf, ' ');
1813 if (err)
1814 return err;
4235b045 1815
b7dcb857
MH
1816 /* Special case: @XXX */
1817 if (arg->value[0] == '@' && arg->ref)
1818 ref = ref->next;
1819
4235b045 1820 /* Dereferencing arguments */
b7dcb857 1821 if (ref) {
909b0360 1822 depth = __synthesize_probe_trace_arg_ref(ref, buf, 1);
4235b045
MH
1823 if (depth < 0)
1824 return depth;
1825 }
1826
1827 /* Print argument value */
b7dcb857 1828 if (arg->value[0] == '@' && arg->ref)
bf4d5f25 1829 err = strbuf_addf(buf, "%s%+ld", arg->value, arg->ref->offset);
b7dcb857 1830 else
bf4d5f25 1831 err = strbuf_addstr(buf, arg->value);
4235b045
MH
1832
1833 /* Closing */
bf4d5f25
MH
1834 while (!err && depth--)
1835 err = strbuf_addch(buf, ')');
1836
4984912e 1837 /* Print argument type */
bf4d5f25
MH
1838 if (!err && arg->type)
1839 err = strbuf_addf(buf, ":%s", arg->type);
4235b045 1840
bf4d5f25 1841 return err;
4235b045
MH
1842}
1843
0e60836b 1844char *synthesize_probe_trace_command(struct probe_trace_event *tev)
4235b045 1845{
0e60836b 1846 struct probe_trace_point *tp = &tev->point;
909b0360
MH
1847 struct strbuf buf;
1848 char *ret = NULL;
bf4d5f25 1849 int i, err;
eb948e50 1850
da15bd9d
WN
1851 /* Uprobes must have tp->module */
1852 if (tev->uprobes && !tp->module)
909b0360
MH
1853 return NULL;
1854
bf4d5f25
MH
1855 if (strbuf_init(&buf, 32) < 0)
1856 return NULL;
1857
1858 if (strbuf_addf(&buf, "%c:%s/%s ", tp->retprobe ? 'r' : 'p',
1859 tev->group, tev->event) < 0)
1860 goto error;
da15bd9d
WN
1861 /*
1862 * If tp->address == 0, then this point must be a
1863 * absolute address uprobe.
1864 * try_to_find_absolute_address() should have made
1865 * tp->symbol to "0x0".
1866 */
1867 if (tev->uprobes && !tp->address) {
1868 if (!tp->symbol || strcmp(tp->symbol, "0x0"))
1869 goto error;
1870 }
eb948e50
MH
1871
1872 /* Use the tp->address for uprobes */
225466f1 1873 if (tev->uprobes)
bf4d5f25 1874 err = strbuf_addf(&buf, "%s:0x%lx", tp->module, tp->address);
da15bd9d
WN
1875 else if (!strncmp(tp->symbol, "0x", 2))
1876 /* Absolute address. See try_to_find_absolute_address() */
bf4d5f25
MH
1877 err = strbuf_addf(&buf, "%s%s0x%lx", tp->module ?: "",
1878 tp->module ? ":" : "", tp->address);
225466f1 1879 else
bf4d5f25
MH
1880 err = strbuf_addf(&buf, "%s%s%s+%lu", tp->module ?: "",
1881 tp->module ? ":" : "", tp->symbol, tp->offset);
1882 if (err)
1883 goto error;
50656eec 1884
909b0360
MH
1885 for (i = 0; i < tev->nargs; i++)
1886 if (synthesize_probe_trace_arg(&tev->args[i], &buf) < 0)
50656eec 1887 goto error;
50656eec 1888
909b0360 1889 ret = strbuf_detach(&buf, NULL);
50656eec 1890error:
909b0360
MH
1891 strbuf_release(&buf);
1892 return ret;
4235b045 1893}
50656eec 1894
5a6f6314
MH
1895static int find_perf_probe_point_from_map(struct probe_trace_point *tp,
1896 struct perf_probe_point *pp,
1897 bool is_kprobe)
1898{
1899 struct symbol *sym = NULL;
1900 struct map *map;
e486367f 1901 u64 addr = tp->address;
5a6f6314
MH
1902 int ret = -ENOENT;
1903
1904 if (!is_kprobe) {
1905 map = dso__new_map(tp->module);
1906 if (!map)
1907 goto out;
5a6f6314
MH
1908 sym = map__find_symbol(map, addr, NULL);
1909 } else {
9b239a12 1910 if (tp->symbol && !addr) {
0a62f686
MH
1911 if (kernel_get_symbol_address_by_name(tp->symbol,
1912 &addr, true, false) < 0)
9b239a12
MH
1913 goto out;
1914 }
5a6f6314
MH
1915 if (addr) {
1916 addr += tp->offset;
1917 sym = __find_kernel_function(addr, &map);
1918 }
1919 }
98d3b258 1920
5a6f6314
MH
1921 if (!sym)
1922 goto out;
1923
1924 pp->retprobe = tp->retprobe;
1925 pp->offset = addr - map->unmap_ip(map, sym->start);
1926 pp->function = strdup(sym->name);
1927 ret = pp->function ? 0 : -ENOMEM;
1928
1929out:
1930 if (map && !is_kprobe) {
84c2cafa 1931 map__put(map);
5a6f6314
MH
1932 }
1933
1934 return ret;
1935}
1936
1937static int convert_to_perf_probe_point(struct probe_trace_point *tp,
da15bd9d
WN
1938 struct perf_probe_point *pp,
1939 bool is_kprobe)
5a6f6314
MH
1940{
1941 char buf[128];
1942 int ret;
1943
1944 ret = find_perf_probe_point_from_dwarf(tp, pp, is_kprobe);
1945 if (!ret)
1946 return 0;
1947 ret = find_perf_probe_point_from_map(tp, pp, is_kprobe);
1948 if (!ret)
1949 return 0;
1950
1951 pr_debug("Failed to find probe point from both of dwarf and map.\n");
1952
1953 if (tp->symbol) {
1954 pp->function = strdup(tp->symbol);
1955 pp->offset = tp->offset;
614e2fdb 1956 } else {
5a6f6314
MH
1957 ret = e_snprintf(buf, 128, "0x%" PRIx64, (u64)tp->address);
1958 if (ret < 0)
1959 return ret;
1960 pp->function = strdup(buf);
1961 pp->offset = 0;
1962 }
1963 if (pp->function == NULL)
1964 return -ENOMEM;
1965
1966 pp->retprobe = tp->retprobe;
1967
1968 return 0;
1969}
1970
0e60836b 1971static int convert_to_perf_probe_event(struct probe_trace_event *tev,
225466f1 1972 struct perf_probe_event *pev, bool is_kprobe)
4235b045 1973{
909b0360 1974 struct strbuf buf = STRBUF_INIT;
146a1439 1975 int i, ret;
4235b045 1976
4b4da7f7 1977 /* Convert event/group name */
02b95dad
MH
1978 pev->event = strdup(tev->event);
1979 pev->group = strdup(tev->group);
1980 if (pev->event == NULL || pev->group == NULL)
1981 return -ENOMEM;
fb1587d8 1982
4b4da7f7 1983 /* Convert trace_point to probe_point */
5a6f6314 1984 ret = convert_to_perf_probe_point(&tev->point, &pev->point, is_kprobe);
146a1439
MH
1985 if (ret < 0)
1986 return ret;
4b4da7f7 1987
4235b045
MH
1988 /* Convert trace_arg to probe_arg */
1989 pev->nargs = tev->nargs;
e334016f
MH
1990 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1991 if (pev->args == NULL)
1992 return -ENOMEM;
02b95dad 1993 for (i = 0; i < tev->nargs && ret >= 0; i++) {
4235b045 1994 if (tev->args[i].name)
02b95dad 1995 pev->args[i].name = strdup(tev->args[i].name);
4235b045 1996 else {
bf4d5f25
MH
1997 if ((ret = strbuf_init(&buf, 32)) < 0)
1998 goto error;
909b0360
MH
1999 ret = synthesize_probe_trace_arg(&tev->args[i], &buf);
2000 pev->args[i].name = strbuf_detach(&buf, NULL);
4235b045 2001 }
02b95dad
MH
2002 if (pev->args[i].name == NULL && ret >= 0)
2003 ret = -ENOMEM;
2004 }
bf4d5f25 2005error:
146a1439
MH
2006 if (ret < 0)
2007 clear_perf_probe_event(pev);
2008
2009 return ret;
4235b045
MH
2010}
2011
2012void clear_perf_probe_event(struct perf_probe_event *pev)
2013{
7df2f329 2014 struct perf_probe_arg_field *field, *next;
4235b045
MH
2015 int i;
2016
f5385650
ACM
2017 free(pev->event);
2018 free(pev->group);
7afb3fab 2019 free(pev->target);
9b118aca 2020 clear_perf_probe_point(&pev->point);
f5385650 2021
7df2f329 2022 for (i = 0; i < pev->nargs; i++) {
f5385650
ACM
2023 free(pev->args[i].name);
2024 free(pev->args[i].var);
2025 free(pev->args[i].type);
7df2f329
MH
2026 field = pev->args[i].field;
2027 while (field) {
2028 next = field->next;
74cf249d 2029 zfree(&field->name);
7df2f329
MH
2030 free(field);
2031 field = next;
2032 }
2033 }
f5385650 2034 free(pev->args);
4235b045
MH
2035 memset(pev, 0, sizeof(*pev));
2036}
2037
0542bb9c
MH
2038#define strdup_or_goto(str, label) \
2039({ char *__p = NULL; if (str && !(__p = strdup(str))) goto label; __p; })
2040
2041static int perf_probe_point__copy(struct perf_probe_point *dst,
2042 struct perf_probe_point *src)
2043{
2044 dst->file = strdup_or_goto(src->file, out_err);
2045 dst->function = strdup_or_goto(src->function, out_err);
2046 dst->lazy_line = strdup_or_goto(src->lazy_line, out_err);
2047 dst->line = src->line;
2048 dst->retprobe = src->retprobe;
2049 dst->offset = src->offset;
2050 return 0;
2051
2052out_err:
2053 clear_perf_probe_point(dst);
2054 return -ENOMEM;
2055}
2056
2057static int perf_probe_arg__copy(struct perf_probe_arg *dst,
2058 struct perf_probe_arg *src)
2059{
2060 struct perf_probe_arg_field *field, **ppfield;
2061
2062 dst->name = strdup_or_goto(src->name, out_err);
2063 dst->var = strdup_or_goto(src->var, out_err);
2064 dst->type = strdup_or_goto(src->type, out_err);
2065
2066 field = src->field;
2067 ppfield = &(dst->field);
2068 while (field) {
2069 *ppfield = zalloc(sizeof(*field));
2070 if (!*ppfield)
2071 goto out_err;
2072 (*ppfield)->name = strdup_or_goto(field->name, out_err);
2073 (*ppfield)->index = field->index;
2074 (*ppfield)->ref = field->ref;
2075 field = field->next;
2076 ppfield = &((*ppfield)->next);
2077 }
2078 return 0;
2079out_err:
2080 return -ENOMEM;
2081}
2082
2083int perf_probe_event__copy(struct perf_probe_event *dst,
2084 struct perf_probe_event *src)
2085{
2086 int i;
2087
2088 dst->event = strdup_or_goto(src->event, out_err);
2089 dst->group = strdup_or_goto(src->group, out_err);
2090 dst->target = strdup_or_goto(src->target, out_err);
2091 dst->uprobes = src->uprobes;
2092
2093 if (perf_probe_point__copy(&dst->point, &src->point) < 0)
2094 goto out_err;
2095
2096 dst->args = zalloc(sizeof(struct perf_probe_arg) * src->nargs);
2097 if (!dst->args)
2098 goto out_err;
2099 dst->nargs = src->nargs;
2100
2101 for (i = 0; i < src->nargs; i++)
2102 if (perf_probe_arg__copy(&dst->args[i], &src->args[i]) < 0)
2103 goto out_err;
2104 return 0;
2105
2106out_err:
2107 clear_perf_probe_event(dst);
2108 return -ENOMEM;
2109}
2110
92f6c72e 2111void clear_probe_trace_event(struct probe_trace_event *tev)
4235b045 2112{
0e60836b 2113 struct probe_trace_arg_ref *ref, *next;
4235b045
MH
2114 int i;
2115
f5385650
ACM
2116 free(tev->event);
2117 free(tev->group);
2118 free(tev->point.symbol);
4c859351 2119 free(tev->point.realname);
f5385650 2120 free(tev->point.module);
4235b045 2121 for (i = 0; i < tev->nargs; i++) {
f5385650
ACM
2122 free(tev->args[i].name);
2123 free(tev->args[i].value);
2124 free(tev->args[i].type);
4235b045
MH
2125 ref = tev->args[i].ref;
2126 while (ref) {
2127 next = ref->next;
2128 free(ref);
2129 ref = next;
2130 }
2131 }
f5385650 2132 free(tev->args);
4235b045 2133 memset(tev, 0, sizeof(*tev));
50656eec
MH
2134}
2135
9aaf5a5f
MH
2136struct kprobe_blacklist_node {
2137 struct list_head list;
2138 unsigned long start;
2139 unsigned long end;
2140 char *symbol;
2141};
2142
2143static void kprobe_blacklist__delete(struct list_head *blacklist)
2144{
2145 struct kprobe_blacklist_node *node;
2146
2147 while (!list_empty(blacklist)) {
2148 node = list_first_entry(blacklist,
2149 struct kprobe_blacklist_node, list);
2150 list_del(&node->list);
2151 free(node->symbol);
2152 free(node);
2153 }
2154}
2155
2156static int kprobe_blacklist__load(struct list_head *blacklist)
2157{
2158 struct kprobe_blacklist_node *node;
4605eab3 2159 const char *__debugfs = debugfs__mountpoint();
9aaf5a5f
MH
2160 char buf[PATH_MAX], *p;
2161 FILE *fp;
2162 int ret;
2163
2164 if (__debugfs == NULL)
2165 return -ENOTSUP;
2166
2167 ret = e_snprintf(buf, PATH_MAX, "%s/kprobes/blacklist", __debugfs);
2168 if (ret < 0)
2169 return ret;
2170
2171 fp = fopen(buf, "r");
2172 if (!fp)
2173 return -errno;
2174
2175 ret = 0;
2176 while (fgets(buf, PATH_MAX, fp)) {
2177 node = zalloc(sizeof(*node));
2178 if (!node) {
2179 ret = -ENOMEM;
2180 break;
2181 }
2182 INIT_LIST_HEAD(&node->list);
2183 list_add_tail(&node->list, blacklist);
2184 if (sscanf(buf, "0x%lx-0x%lx", &node->start, &node->end) != 2) {
2185 ret = -EINVAL;
2186 break;
2187 }
2188 p = strchr(buf, '\t');
2189 if (p) {
2190 p++;
2191 if (p[strlen(p) - 1] == '\n')
2192 p[strlen(p) - 1] = '\0';
2193 } else
2194 p = (char *)"unknown";
2195 node->symbol = strdup(p);
2196 if (!node->symbol) {
2197 ret = -ENOMEM;
2198 break;
2199 }
2200 pr_debug2("Blacklist: 0x%lx-0x%lx, %s\n",
2201 node->start, node->end, node->symbol);
2202 ret++;
2203 }
2204 if (ret < 0)
2205 kprobe_blacklist__delete(blacklist);
2206 fclose(fp);
2207
2208 return ret;
2209}
2210
2211static struct kprobe_blacklist_node *
2212kprobe_blacklist__find_by_address(struct list_head *blacklist,
2213 unsigned long address)
2214{
2215 struct kprobe_blacklist_node *node;
2216
2217 list_for_each_entry(node, blacklist, list) {
2218 if (node->start <= address && address <= node->end)
2219 return node;
2220 }
2221
2222 return NULL;
2223}
2224
b031220d
MH
2225static LIST_HEAD(kprobe_blacklist);
2226
2227static void kprobe_blacklist__init(void)
2228{
2229 if (!list_empty(&kprobe_blacklist))
2230 return;
2231
2232 if (kprobe_blacklist__load(&kprobe_blacklist) < 0)
2233 pr_debug("No kprobe blacklist support, ignored\n");
2234}
2235
2236static void kprobe_blacklist__release(void)
2237{
2238 kprobe_blacklist__delete(&kprobe_blacklist);
2239}
2240
2241static bool kprobe_blacklist__listed(unsigned long address)
2242{
2243 return !!kprobe_blacklist__find_by_address(&kprobe_blacklist, address);
2244}
2245
d350bd57
MH
2246static int perf_probe_event__sprintf(const char *group, const char *event,
2247 struct perf_probe_event *pev,
ba7ecb02
MH
2248 const char *module,
2249 struct strbuf *result)
278498d4 2250{
bf4d5f25 2251 int i, ret;
909b0360 2252 char *buf;
278498d4 2253
909b0360
MH
2254 if (asprintf(&buf, "%s:%s", group, event) < 0)
2255 return -errno;
bf4d5f25 2256 ret = strbuf_addf(result, " %-20s (on ", buf);
909b0360 2257 free(buf);
bf4d5f25
MH
2258 if (ret)
2259 return ret;
4235b045 2260
909b0360
MH
2261 /* Synthesize only event probe point */
2262 buf = synthesize_perf_probe_point(&pev->point);
2263 if (!buf)
2264 return -ENOMEM;
bf4d5f25 2265 ret = strbuf_addstr(result, buf);
909b0360 2266 free(buf);
146a1439 2267
bf4d5f25
MH
2268 if (!ret && module)
2269 ret = strbuf_addf(result, " in %s", module);
278498d4 2270
bf4d5f25
MH
2271 if (!ret && pev->nargs > 0) {
2272 ret = strbuf_add(result, " with", 5);
2273 for (i = 0; !ret && i < pev->nargs; i++) {
909b0360
MH
2274 buf = synthesize_perf_probe_arg(&pev->args[i]);
2275 if (!buf)
2276 return -ENOMEM;
bf4d5f25 2277 ret = strbuf_addf(result, " %s", buf);
909b0360 2278 free(buf);
7df2f329 2279 }
278498d4 2280 }
bf4d5f25
MH
2281 if (!ret)
2282 ret = strbuf_addch(result, ')');
909b0360 2283
bf4d5f25 2284 return ret;
278498d4
MH
2285}
2286
ba7ecb02 2287/* Show an event */
b02137cc
NK
2288int show_perf_probe_event(const char *group, const char *event,
2289 struct perf_probe_event *pev,
2290 const char *module, bool use_stdout)
ba7ecb02
MH
2291{
2292 struct strbuf buf = STRBUF_INIT;
2293 int ret;
2294
d350bd57 2295 ret = perf_probe_event__sprintf(group, event, pev, module, &buf);
ba7ecb02
MH
2296 if (ret >= 0) {
2297 if (use_stdout)
2298 printf("%s\n", buf.buf);
2299 else
2300 pr_info("%s\n", buf.buf);
2301 }
2302 strbuf_release(&buf);
2303
2304 return ret;
2305}
2306
b6a89643
MH
2307static bool filter_probe_trace_event(struct probe_trace_event *tev,
2308 struct strfilter *filter)
2309{
2310 char tmp[128];
2311
2312 /* At first, check the event name itself */
2313 if (strfilter__compare(filter, tev->event))
2314 return true;
2315
2316 /* Next, check the combination of name and group */
2317 if (e_snprintf(tmp, 128, "%s:%s", tev->group, tev->event) < 0)
2318 return false;
2319 return strfilter__compare(filter, tmp);
2320}
2321
2322static int __show_perf_probe_events(int fd, bool is_kprobe,
2323 struct strfilter *filter)
4de189fe 2324{
225466f1 2325 int ret = 0;
0e60836b 2326 struct probe_trace_event tev;
4235b045 2327 struct perf_probe_event pev;
4de189fe
MH
2328 struct strlist *rawlist;
2329 struct str_node *ent;
2330
4235b045
MH
2331 memset(&tev, 0, sizeof(tev));
2332 memset(&pev, 0, sizeof(pev));
72041334 2333
92f6c72e 2334 rawlist = probe_file__get_rawlist(fd);
146a1439 2335 if (!rawlist)
6eb08660 2336 return -ENOMEM;
4de189fe 2337
adf365f4 2338 strlist__for_each(ent, rawlist) {
0e60836b 2339 ret = parse_probe_trace_command(ent->s, &tev);
146a1439 2340 if (ret >= 0) {
b6a89643
MH
2341 if (!filter_probe_trace_event(&tev, filter))
2342 goto next;
225466f1
SD
2343 ret = convert_to_perf_probe_event(&tev, &pev,
2344 is_kprobe);
ba7ecb02
MH
2345 if (ret < 0)
2346 goto next;
d350bd57
MH
2347 ret = show_perf_probe_event(pev.group, pev.event,
2348 &pev, tev.point.module,
ba7ecb02 2349 true);
146a1439 2350 }
b6a89643 2351next:
4235b045 2352 clear_perf_probe_event(&pev);
0e60836b 2353 clear_probe_trace_event(&tev);
146a1439
MH
2354 if (ret < 0)
2355 break;
4de189fe 2356 }
4de189fe 2357 strlist__delete(rawlist);
7737af01
MH
2358 /* Cleanup cached debuginfo if needed */
2359 debuginfo_cache__exit();
146a1439
MH
2360
2361 return ret;
4de189fe
MH
2362}
2363
225466f1 2364/* List up current perf-probe events */
b6a89643 2365int show_perf_probe_events(struct strfilter *filter)
225466f1 2366{
5e45187c 2367 int kp_fd, up_fd, ret;
225466f1
SD
2368
2369 setup_pager();
225466f1 2370
9bae1e8c 2371 ret = init_probe_symbol_maps(false);
225466f1
SD
2372 if (ret < 0)
2373 return ret;
2374
92f6c72e
MH
2375 ret = probe_file__open_both(&kp_fd, &up_fd, 0);
2376 if (ret < 0)
2377 return ret;
225466f1 2378
92f6c72e
MH
2379 if (kp_fd >= 0)
2380 ret = __show_perf_probe_events(kp_fd, true, filter);
2381 if (up_fd >= 0 && ret >= 0)
b6a89643 2382 ret = __show_perf_probe_events(up_fd, false, filter);
92f6c72e
MH
2383 if (kp_fd > 0)
2384 close(kp_fd);
2385 if (up_fd > 0)
5e45187c 2386 close(up_fd);
9bae1e8c 2387 exit_probe_symbol_maps();
225466f1 2388
146a1439 2389 return ret;
50656eec
MH
2390}
2391
146a1439
MH
2392static int get_new_event_name(char *buf, size_t len, const char *base,
2393 struct strlist *namelist, bool allow_suffix)
b498ce1f
MH
2394{
2395 int i, ret;
663b1151 2396 char *p, *nbase;
17f88fcd 2397
3099c026
NR
2398 if (*base == '.')
2399 base++;
663b1151
MH
2400 nbase = strdup(base);
2401 if (!nbase)
2402 return -ENOMEM;
2403
2404 /* Cut off the dot suffixes (e.g. .const, .isra)*/
2405 p = strchr(nbase, '.');
2406 if (p && p != nbase)
2407 *p = '\0';
3099c026 2408
663b1151
MH
2409 /* Try no suffix number */
2410 ret = e_snprintf(buf, len, "%s", nbase);
146a1439 2411 if (ret < 0) {
5f03cba4 2412 pr_debug("snprintf() failed: %d\n", ret);
663b1151 2413 goto out;
146a1439 2414 }
17f88fcd 2415 if (!strlist__has_entry(namelist, buf))
663b1151 2416 goto out;
17f88fcd 2417
d761b08b 2418 if (!allow_suffix) {
03e01f56
WN
2419 pr_warning("Error: event \"%s\" already exists.\n"
2420 " Hint: Remove existing event by 'perf probe -d'\n"
2421 " or force duplicates by 'perf probe -f'\n"
2422 " or set 'force=yes' in BPF source.\n",
2423 buf);
663b1151
MH
2424 ret = -EEXIST;
2425 goto out;
d761b08b
MH
2426 }
2427
17f88fcd
MH
2428 /* Try to add suffix */
2429 for (i = 1; i < MAX_EVENT_INDEX; i++) {
663b1151 2430 ret = e_snprintf(buf, len, "%s_%d", nbase, i);
146a1439 2431 if (ret < 0) {
5f03cba4 2432 pr_debug("snprintf() failed: %d\n", ret);
663b1151 2433 goto out;
146a1439 2434 }
b498ce1f
MH
2435 if (!strlist__has_entry(namelist, buf))
2436 break;
2437 }
146a1439
MH
2438 if (i == MAX_EVENT_INDEX) {
2439 pr_warning("Too many events are on the same function.\n");
2440 ret = -ERANGE;
2441 }
2442
663b1151
MH
2443out:
2444 free(nbase);
146a1439 2445 return ret;
b498ce1f
MH
2446}
2447
79702f61
MH
2448/* Warn if the current kernel's uprobe implementation is old */
2449static void warn_uprobe_event_compat(struct probe_trace_event *tev)
2450{
2451 int i;
2452 char *buf = synthesize_probe_trace_command(tev);
2453
2454 /* Old uprobe event doesn't support memory dereference */
2455 if (!tev->uprobes || tev->nargs == 0 || !buf)
2456 goto out;
2457
2458 for (i = 0; i < tev->nargs; i++)
2459 if (strglobmatch(tev->args[i].value, "[$@+-]*")) {
2460 pr_warning("Please upgrade your kernel to at least "
2461 "3.14 to have access to feature %s\n",
2462 tev->args[i].value);
2463 break;
2464 }
2465out:
2466 free(buf);
2467}
2468
a3c9de62
MH
2469/* Set new name from original perf_probe_event and namelist */
2470static int probe_trace_event__set_name(struct probe_trace_event *tev,
2471 struct perf_probe_event *pev,
2472 struct strlist *namelist,
2473 bool allow_suffix)
2474{
2475 const char *event, *group;
2476 char buf[64];
2477 int ret;
2478
2479 if (pev->event)
2480 event = pev->event;
2481 else
da15bd9d
WN
2482 if (pev->point.function &&
2483 (strncmp(pev->point.function, "0x", 2) != 0) &&
2484 !strisglob(pev->point.function))
a3c9de62
MH
2485 event = pev->point.function;
2486 else
2487 event = tev->point.realname;
2488 if (pev->group)
2489 group = pev->group;
2490 else
2491 group = PERFPROBE_GROUP;
2492
2493 /* Get an unused new event name */
2494 ret = get_new_event_name(buf, 64, event,
2495 namelist, allow_suffix);
2496 if (ret < 0)
2497 return ret;
2498
2499 event = buf;
2500
2501 tev->event = strdup(event);
2502 tev->group = strdup(group);
2503 if (tev->event == NULL || tev->group == NULL)
2504 return -ENOMEM;
2505
2506 /* Add added event name to namelist */
2507 strlist__add(namelist, event);
2508 return 0;
2509}
2510
0e60836b
SD
2511static int __add_probe_trace_events(struct perf_probe_event *pev,
2512 struct probe_trace_event *tevs,
146a1439 2513 int ntevs, bool allow_suffix)
50656eec 2514{
146a1439 2515 int i, fd, ret;
0e60836b 2516 struct probe_trace_event *tev = NULL;
2fd457a3 2517 struct probe_cache *cache = NULL;
b498ce1f 2518 struct strlist *namelist;
50656eec 2519
92f6c72e
MH
2520 fd = probe_file__open(PF_FL_RW | (pev->uprobes ? PF_FL_UPROBE : 0));
2521 if (fd < 0)
146a1439 2522 return fd;
5e45187c 2523
b498ce1f 2524 /* Get current event names */
92f6c72e 2525 namelist = probe_file__get_namelist(fd);
146a1439
MH
2526 if (!namelist) {
2527 pr_debug("Failed to get current event list.\n");
ae2cb1ac
MH
2528 ret = -ENOMEM;
2529 goto close_out;
146a1439 2530 }
4235b045 2531
146a1439 2532 ret = 0;
02b95dad 2533 for (i = 0; i < ntevs; i++) {
4235b045 2534 tev = &tevs[i];
b031220d 2535 /* Skip if the symbol is out of .text or blacklisted */
5a51fcd1
MH
2536 if (!tev->point.symbol)
2537 continue;
9aaf5a5f 2538
a3c9de62
MH
2539 /* Set new name for tev (and update namelist) */
2540 ret = probe_trace_event__set_name(tev, pev, namelist,
2541 allow_suffix);
146a1439
MH
2542 if (ret < 0)
2543 break;
4235b045 2544
92f6c72e 2545 ret = probe_file__add_event(fd, tev);
146a1439
MH
2546 if (ret < 0)
2547 break;
4235b045 2548
4235b045
MH
2549 /*
2550 * Probes after the first probe which comes from same
2551 * user input are always allowed to add suffix, because
2552 * there might be several addresses corresponding to
2553 * one code line.
2554 */
2555 allow_suffix = true;
50656eec 2556 }
79702f61
MH
2557 if (ret == -EINVAL && pev->uprobes)
2558 warn_uprobe_event_compat(tev);
2fd457a3
MH
2559 if (ret == 0 && probe_conf.cache) {
2560 cache = probe_cache__new(pev->target);
2561 if (!cache ||
2562 probe_cache__add_entry(cache, pev, tevs, ntevs) < 0 ||
2563 probe_cache__commit(cache) < 0)
2564 pr_warning("Failed to add event to probe cache\n");
2565 probe_cache__delete(cache);
2566 }
146a1439 2567
e1d2017b 2568 strlist__delete(namelist);
ae2cb1ac 2569close_out:
50656eec 2570 close(fd);
146a1439 2571 return ret;
50656eec 2572}
fa28244d 2573
6bb536cc
WN
2574static int find_probe_functions(struct map *map, char *name,
2575 struct symbol **syms)
eb948e50 2576{
564c62a4 2577 int found = 0;
0a3873a8 2578 struct symbol *sym;
4c859351 2579 struct rb_node *tmp;
564c62a4 2580
75e4a2a6
WN
2581 if (map__load(map, NULL) < 0)
2582 return 0;
2583
4c859351 2584 map__for_each_symbol(map, sym, tmp) {
6bb536cc 2585 if (strglobmatch(sym->name, name)) {
4c859351 2586 found++;
6bb536cc
WN
2587 if (syms && found < probe_conf.max_probes)
2588 syms[found - 1] = sym;
2589 }
eb948e50 2590 }
564c62a4
NK
2591
2592 return found;
eb948e50
MH
2593}
2594
7b6ff0bd
NR
2595void __weak arch__fix_tev_from_maps(struct perf_probe_event *pev __maybe_unused,
2596 struct probe_trace_event *tev __maybe_unused,
0b3c2264
NR
2597 struct map *map __maybe_unused,
2598 struct symbol *sym __maybe_unused) { }
7b6ff0bd 2599
eb948e50
MH
2600/*
2601 * Find probe function addresses from map.
2602 * Return an error or the number of found probe_trace_event
2603 */
2604static int find_probe_trace_events_from_map(struct perf_probe_event *pev,
ddb2f58f 2605 struct probe_trace_event **tevs)
e0faa8d3 2606{
eb948e50 2607 struct map *map = NULL;
eb948e50 2608 struct ref_reloc_sym *reloc_sym = NULL;
e0faa8d3 2609 struct symbol *sym;
6bb536cc 2610 struct symbol **syms = NULL;
0e60836b 2611 struct probe_trace_event *tev;
eb948e50
MH
2612 struct perf_probe_point *pp = &pev->point;
2613 struct probe_trace_point *tp;
564c62a4 2614 int num_matched_functions;
b031220d 2615 int ret, i, j, skipped = 0;
c61fb959 2616 char *mod_name;
4235b045 2617
44225521 2618 map = get_target_map(pev->target, pev->uprobes);
eb948e50
MH
2619 if (!map) {
2620 ret = -EINVAL;
2621 goto out;
fb7345bb
MH
2622 }
2623
6bb536cc
WN
2624 syms = malloc(sizeof(struct symbol *) * probe_conf.max_probes);
2625 if (!syms) {
2626 ret = -ENOMEM;
2627 goto out;
2628 }
2629
eb948e50
MH
2630 /*
2631 * Load matched symbols: Since the different local symbols may have
2632 * same name but different addresses, this lists all the symbols.
2633 */
6bb536cc 2634 num_matched_functions = find_probe_functions(map, pp->function, syms);
564c62a4 2635 if (num_matched_functions == 0) {
eb948e50 2636 pr_err("Failed to find symbol %s in %s\n", pp->function,
44225521 2637 pev->target ? : "kernel");
eb948e50
MH
2638 ret = -ENOENT;
2639 goto out;
ddb2f58f 2640 } else if (num_matched_functions > probe_conf.max_probes) {
eb948e50 2641 pr_err("Too many functions matched in %s\n",
44225521 2642 pev->target ? : "kernel");
eb948e50
MH
2643 ret = -E2BIG;
2644 goto out;
fb7345bb
MH
2645 }
2646
1a8ac29c
MH
2647 /* Note that the symbols in the kmodule are not relocated */
2648 if (!pev->uprobes && !pp->retprobe && !pev->target) {
0560a0c4 2649 reloc_sym = kernel_get_ref_reloc_sym();
eb948e50
MH
2650 if (!reloc_sym) {
2651 pr_warning("Relocated base symbol is not found!\n");
2652 ret = -EINVAL;
2653 goto out;
2654 }
2655 }
4235b045 2656
eb948e50
MH
2657 /* Setup result trace-probe-events */
2658 *tevs = zalloc(sizeof(*tev) * num_matched_functions);
2659 if (!*tevs) {
02b95dad 2660 ret = -ENOMEM;
eb948e50 2661 goto out;
02b95dad 2662 }
ce27a443 2663
eb948e50 2664 ret = 0;
564c62a4 2665
6bb536cc
WN
2666 for (j = 0; j < num_matched_functions; j++) {
2667 sym = syms[j];
2668
eb948e50
MH
2669 tev = (*tevs) + ret;
2670 tp = &tev->point;
2671 if (ret == num_matched_functions) {
2672 pr_warning("Too many symbols are listed. Skip it.\n");
2673 break;
ce27a443 2674 }
eb948e50 2675 ret++;
ce27a443 2676
eb948e50
MH
2677 if (pp->offset > sym->end - sym->start) {
2678 pr_warning("Offset %ld is bigger than the size of %s\n",
2679 pp->offset, sym->name);
2680 ret = -ENOENT;
2681 goto err_out;
2682 }
2683 /* Add one probe point */
2684 tp->address = map->unmap_ip(map, sym->start) + pp->offset;
1a8ac29c
MH
2685
2686 /* Check the kprobe (not in module) is within .text */
2687 if (!pev->uprobes && !pev->target &&
b031220d
MH
2688 kprobe_warn_out_range(sym->name, tp->address)) {
2689 tp->symbol = NULL; /* Skip it */
2690 skipped++;
2691 } else if (reloc_sym) {
eb948e50
MH
2692 tp->symbol = strdup_or_goto(reloc_sym->name, nomem_out);
2693 tp->offset = tp->address - reloc_sym->addr;
2694 } else {
2695 tp->symbol = strdup_or_goto(sym->name, nomem_out);
2696 tp->offset = pp->offset;
2697 }
6bb536cc
WN
2698 tp->realname = strdup_or_goto(sym->name, nomem_out);
2699
eb948e50 2700 tp->retprobe = pp->retprobe;
c61fb959
RB
2701 if (pev->target) {
2702 if (pev->uprobes) {
2703 tev->point.module = strdup_or_goto(pev->target,
2704 nomem_out);
2705 } else {
2706 mod_name = find_module_name(pev->target);
2707 tev->point.module =
2708 strdup(mod_name ? mod_name : pev->target);
2709 free(mod_name);
2710 if (!tev->point.module)
2711 goto nomem_out;
2712 }
2713 }
eb948e50
MH
2714 tev->uprobes = pev->uprobes;
2715 tev->nargs = pev->nargs;
2716 if (tev->nargs) {
2717 tev->args = zalloc(sizeof(struct probe_trace_arg) *
2718 tev->nargs);
2719 if (tev->args == NULL)
2720 goto nomem_out;
e334016f 2721 }
48481938 2722 for (i = 0; i < tev->nargs; i++) {
eb948e50
MH
2723 if (pev->args[i].name)
2724 tev->args[i].name =
2725 strdup_or_goto(pev->args[i].name,
2726 nomem_out);
2727
2728 tev->args[i].value = strdup_or_goto(pev->args[i].var,
2729 nomem_out);
2730 if (pev->args[i].type)
2731 tev->args[i].type =
2732 strdup_or_goto(pev->args[i].type,
2733 nomem_out);
48481938 2734 }
0b3c2264 2735 arch__fix_tev_from_maps(pev, tev, map, sym);
4235b045 2736 }
b031220d
MH
2737 if (ret == skipped) {
2738 ret = -ENOENT;
2739 goto err_out;
2740 }
4235b045 2741
eb948e50 2742out:
9b118aca 2743 put_target_map(map, pev->uprobes);
6bb536cc 2744 free(syms);
eb948e50 2745 return ret;
225466f1 2746
eb948e50
MH
2747nomem_out:
2748 ret = -ENOMEM;
2749err_out:
2750 clear_probe_trace_events(*tevs, num_matched_functions);
2751 zfree(tevs);
2752 goto out;
2753}
1c1bc922 2754
da15bd9d
WN
2755static int try_to_find_absolute_address(struct perf_probe_event *pev,
2756 struct probe_trace_event **tevs)
2757{
2758 struct perf_probe_point *pp = &pev->point;
2759 struct probe_trace_event *tev;
2760 struct probe_trace_point *tp;
2761 int i, err;
2762
2763 if (!(pev->point.function && !strncmp(pev->point.function, "0x", 2)))
2764 return -EINVAL;
2765 if (perf_probe_event_need_dwarf(pev))
2766 return -EINVAL;
2767
2768 /*
2769 * This is 'perf probe /lib/libc.so 0xabcd'. Try to probe at
2770 * absolute address.
2771 *
2772 * Only one tev can be generated by this.
2773 */
2774 *tevs = zalloc(sizeof(*tev));
2775 if (!*tevs)
2776 return -ENOMEM;
2777
2778 tev = *tevs;
2779 tp = &tev->point;
2780
2781 /*
2782 * Don't use tp->offset, use address directly, because
2783 * in synthesize_probe_trace_command() address cannot be
2784 * zero.
2785 */
2786 tp->address = pev->point.abs_address;
2787 tp->retprobe = pp->retprobe;
2788 tev->uprobes = pev->uprobes;
2789
2790 err = -ENOMEM;
2791 /*
2792 * Give it a '0x' leading symbol name.
2793 * In __add_probe_trace_events, a NULL symbol is interpreted as
2794 * invalud.
2795 */
2796 if (asprintf(&tp->symbol, "0x%lx", tp->address) < 0)
2797 goto errout;
2798
2799 /* For kprobe, check range */
2800 if ((!tev->uprobes) &&
2801 (kprobe_warn_out_range(tev->point.symbol,
2802 tev->point.address))) {
2803 err = -EACCES;
2804 goto errout;
2805 }
2806
2807 if (asprintf(&tp->realname, "abs_%lx", tp->address) < 0)
2808 goto errout;
2809
2810 if (pev->target) {
2811 tp->module = strdup(pev->target);
2812 if (!tp->module)
2813 goto errout;
2814 }
2815
2816 if (tev->group) {
2817 tev->group = strdup(pev->group);
2818 if (!tev->group)
2819 goto errout;
2820 }
2821
2822 if (pev->event) {
2823 tev->event = strdup(pev->event);
2824 if (!tev->event)
2825 goto errout;
2826 }
2827
2828 tev->nargs = pev->nargs;
2829 tev->args = zalloc(sizeof(struct probe_trace_arg) * tev->nargs);
2830 if (!tev->args) {
2831 err = -ENOMEM;
2832 goto errout;
2833 }
2834 for (i = 0; i < tev->nargs; i++)
2835 copy_to_probe_trace_arg(&tev->args[i], &pev->args[i]);
2836
2837 return 1;
2838
2839errout:
2840 if (*tevs) {
2841 clear_probe_trace_events(*tevs, 1);
2842 *tevs = NULL;
2843 }
2844 return err;
2845}
2846
d5c2e2c1
NR
2847bool __weak arch__prefers_symtab(void) { return false; }
2848
eb948e50 2849static int convert_to_probe_trace_events(struct perf_probe_event *pev,
ddb2f58f 2850 struct probe_trace_event **tevs)
eb948e50
MH
2851{
2852 int ret;
2853
2a12ec13
MH
2854 if (!pev->group) {
2855 /* Set group name if not given */
2856 if (!pev->uprobes) {
2857 pev->group = strdup(PERFPROBE_GROUP);
2858 ret = pev->group ? 0 : -ENOMEM;
2859 } else
2860 ret = convert_exec_to_group(pev->target, &pev->group);
eb948e50
MH
2861 if (ret != 0) {
2862 pr_warning("Failed to make a group name.\n");
2863 return ret;
2864 }
02b95dad 2865 }
e334016f 2866
da15bd9d
WN
2867 ret = try_to_find_absolute_address(pev, tevs);
2868 if (ret > 0)
2869 return ret;
2870
d5c2e2c1 2871 if (arch__prefers_symtab() && !perf_probe_event_need_dwarf(pev)) {
ddb2f58f 2872 ret = find_probe_trace_events_from_map(pev, tevs);
d5c2e2c1
NR
2873 if (ret > 0)
2874 return ret; /* Found in symbol table */
2875 }
2876
eb948e50 2877 /* Convert perf_probe_event with debuginfo */
ddb2f58f 2878 ret = try_to_find_probe_trace_events(pev, tevs);
eb948e50
MH
2879 if (ret != 0)
2880 return ret; /* Found in debuginfo or got an error */
2881
ddb2f58f 2882 return find_probe_trace_events_from_map(pev, tevs);
4235b045
MH
2883}
2884
12fae5ef 2885int convert_perf_probe_events(struct perf_probe_event *pevs, int npevs)
4235b045 2886{
844dffa5 2887 int i, ret;
4235b045 2888
4235b045
MH
2889 /* Loop 1: convert all events */
2890 for (i = 0; i < npevs; i++) {
b031220d 2891 /* Init kprobe blacklist if needed */
12fae5ef 2892 if (!pevs[i].uprobes)
b031220d 2893 kprobe_blacklist__init();
4235b045 2894 /* Convert with or without debuginfo */
12fae5ef 2895 ret = convert_to_probe_trace_events(&pevs[i], &pevs[i].tevs);
146a1439 2896 if (ret < 0)
844dffa5 2897 return ret;
12fae5ef 2898 pevs[i].ntevs = ret;
e0faa8d3 2899 }
b031220d
MH
2900 /* This just release blacklist only if allocated */
2901 kprobe_blacklist__release();
e0faa8d3 2902
844dffa5
NK
2903 return 0;
2904}
2905
12fae5ef 2906int apply_perf_probe_events(struct perf_probe_event *pevs, int npevs)
844dffa5
NK
2907{
2908 int i, ret = 0;
2909
4235b045 2910 /* Loop 2: add all events */
8635bf6e 2911 for (i = 0; i < npevs; i++) {
12fae5ef
WN
2912 ret = __add_probe_trace_events(&pevs[i], pevs[i].tevs,
2913 pevs[i].ntevs,
ddb2f58f 2914 probe_conf.force_add);
fbee632d
ACM
2915 if (ret < 0)
2916 break;
2917 }
844dffa5
NK
2918 return ret;
2919}
2920
12fae5ef 2921void cleanup_perf_probe_events(struct perf_probe_event *pevs, int npevs)
844dffa5
NK
2922{
2923 int i, j;
2924
449e5b24
MH
2925 /* Loop 3: cleanup and free trace events */
2926 for (i = 0; i < npevs; i++) {
12fae5ef
WN
2927 for (j = 0; j < pevs[i].ntevs; j++)
2928 clear_probe_trace_event(&pevs[i].tevs[j]);
2929 zfree(&pevs[i].tevs);
2930 pevs[i].ntevs = 0;
a43aac29 2931 clear_perf_probe_event(&pevs[i]);
449e5b24 2932 }
844dffa5
NK
2933}
2934
2935int add_perf_probe_events(struct perf_probe_event *pevs, int npevs)
2936{
2937 int ret;
844dffa5 2938
9bae1e8c
NK
2939 ret = init_probe_symbol_maps(pevs->uprobes);
2940 if (ret < 0)
2941 return ret;
2942
12fae5ef 2943 ret = convert_perf_probe_events(pevs, npevs);
844dffa5 2944 if (ret == 0)
12fae5ef 2945 ret = apply_perf_probe_events(pevs, npevs);
844dffa5 2946
12fae5ef 2947 cleanup_perf_probe_events(pevs, npevs);
146a1439 2948
9bae1e8c 2949 exit_probe_symbol_maps();
146a1439 2950 return ret;
e0faa8d3
MH
2951}
2952
307a464b 2953int del_perf_probe_events(struct strfilter *filter)
fa28244d 2954{
307a464b 2955 int ret, ret2, ufd = -1, kfd = -1;
307a464b
MH
2956 char *str = strfilter__string(filter);
2957
2958 if (!str)
2959 return -EINVAL;
2960
fa28244d 2961 /* Get current event names */
92f6c72e
MH
2962 ret = probe_file__open_both(&kfd, &ufd, PF_FL_RW);
2963 if (ret < 0)
2964 goto out;
467ec085 2965
92f6c72e 2966 ret = probe_file__del_events(kfd, filter);
307a464b 2967 if (ret < 0 && ret != -ENOENT)
225466f1 2968 goto error;
225466f1 2969
92f6c72e 2970 ret2 = probe_file__del_events(ufd, filter);
dddc7ee3 2971 if (ret2 < 0 && ret2 != -ENOENT) {
307a464b 2972 ret = ret2;
dddc7ee3
MH
2973 goto error;
2974 }
dddc7ee3 2975 ret = 0;
225466f1
SD
2976
2977error:
92f6c72e 2978 if (kfd >= 0)
225466f1 2979 close(kfd);
92f6c72e 2980 if (ufd >= 0)
225466f1 2981 close(ufd);
92f6c72e 2982out:
307a464b 2983 free(str);
146a1439
MH
2984
2985 return ret;
fa28244d 2986}
225466f1 2987
3c42258c
MH
2988/* TODO: don't use a global variable for filter ... */
2989static struct strfilter *available_func_filter;
fa28244d 2990
e80711ca 2991/*
3c42258c
MH
2992 * If a symbol corresponds to a function with global binding and
2993 * matches filter return 0. For all others return 1.
e80711ca 2994 */
1d037ca1 2995static int filter_available_functions(struct map *map __maybe_unused,
3c42258c 2996 struct symbol *sym)
e80711ca 2997{
e578da3b 2998 if (strfilter__compare(available_func_filter, sym->name))
3c42258c
MH
2999 return 0;
3000 return 1;
e80711ca
MH
3001}
3002
2df58634
MH
3003int show_available_funcs(const char *target, struct strfilter *_filter,
3004 bool user)
e80711ca
MH
3005{
3006 struct map *map;
3007 int ret;
3008
9bae1e8c 3009 ret = init_probe_symbol_maps(user);
e80711ca
MH
3010 if (ret < 0)
3011 return ret;
3012
2df58634
MH
3013 /* Get a symbol map */
3014 if (user)
3015 map = dso__new_map(target);
3016 else
3017 map = kernel_get_module_map(target);
e80711ca 3018 if (!map) {
2df58634 3019 pr_err("Failed to get a map for %s\n", (target) ? : "kernel");
e80711ca
MH
3020 return -EINVAL;
3021 }
225466f1 3022
2df58634 3023 /* Load symbols with given filter */
3c42258c 3024 available_func_filter = _filter;
2df58634
MH
3025 if (map__load(map, filter_available_functions)) {
3026 pr_err("Failed to load symbols in %s\n", (target) ? : "kernel");
3027 goto end;
3028 }
3029 if (!dso__sorted_by_name(map->dso, map->type))
3030 dso__sort_by_name(map->dso, map->type);
225466f1 3031
2df58634
MH
3032 /* Show all (filtered) symbols */
3033 setup_pager();
3034 dso__fprintf_symbols_by_name(map->dso, map->type, stdout);
3035end:
3036 if (user) {
84c2cafa 3037 map__put(map);
2df58634 3038 }
9bae1e8c 3039 exit_probe_symbol_maps();
225466f1 3040
2df58634 3041 return ret;
225466f1
SD
3042}
3043
da15bd9d
WN
3044int copy_to_probe_trace_arg(struct probe_trace_arg *tvar,
3045 struct perf_probe_arg *pvar)
3046{
3047 tvar->value = strdup(pvar->var);
3048 if (tvar->value == NULL)
3049 return -ENOMEM;
3050 if (pvar->type) {
3051 tvar->type = strdup(pvar->type);
3052 if (tvar->type == NULL)
3053 return -ENOMEM;
3054 }
3055 if (pvar->name) {
3056 tvar->name = strdup(pvar->name);
3057 if (tvar->name == NULL)
3058 return -ENOMEM;
3059 } else
3060 tvar->name = NULL;
3061 return 0;
3062}
This page took 0.408537 seconds and 5 git commands to generate.