perf probe: Add --cache option to cache the probe definitions
[deliverable/linux.git] / tools / perf / util / probe-event.c
1 /*
2 * probe-event.c : perf-probe definition to probe_events format converter
3 *
4 * Written by Masami Hiramatsu <mhiramat@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 *
20 */
21
22 #include <sys/utsname.h>
23 #include <sys/types.h>
24 #include <sys/stat.h>
25 #include <fcntl.h>
26 #include <errno.h>
27 #include <stdio.h>
28 #include <unistd.h>
29 #include <stdlib.h>
30 #include <string.h>
31 #include <stdarg.h>
32 #include <limits.h>
33 #include <elf.h>
34
35 #include "util.h"
36 #include "event.h"
37 #include "strlist.h"
38 #include "debug.h"
39 #include "cache.h"
40 #include "color.h"
41 #include "symbol.h"
42 #include "thread.h"
43 #include <api/fs/fs.h>
44 #include "trace-event.h" /* For __maybe_unused */
45 #include "probe-event.h"
46 #include "probe-finder.h"
47 #include "probe-file.h"
48 #include "session.h"
49
50 #define MAX_CMDLEN 256
51 #define PERFPROBE_GROUP "probe"
52
53 bool probe_event_dry_run; /* Dry run flag */
54 struct probe_conf probe_conf;
55
56 #define semantic_error(msg ...) pr_err("Semantic error :" msg)
57
58 int e_snprintf(char *str, size_t size, const char *format, ...)
59 {
60 int ret;
61 va_list ap;
62 va_start(ap, format);
63 ret = vsnprintf(str, size, format, ap);
64 va_end(ap);
65 if (ret >= (int)size)
66 ret = -E2BIG;
67 return ret;
68 }
69
70 static struct machine *host_machine;
71
72 /* Initialize symbol maps and path of vmlinux/modules */
73 int init_probe_symbol_maps(bool user_only)
74 {
75 int ret;
76
77 symbol_conf.sort_by_name = true;
78 symbol_conf.allow_aliases = true;
79 ret = symbol__init(NULL);
80 if (ret < 0) {
81 pr_debug("Failed to init symbol map.\n");
82 goto out;
83 }
84
85 if (host_machine || user_only) /* already initialized */
86 return 0;
87
88 if (symbol_conf.vmlinux_name)
89 pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
90
91 host_machine = machine__new_host();
92 if (!host_machine) {
93 pr_debug("machine__new_host() failed.\n");
94 symbol__exit();
95 ret = -1;
96 }
97 out:
98 if (ret < 0)
99 pr_warning("Failed to init vmlinux path.\n");
100 return ret;
101 }
102
103 void exit_probe_symbol_maps(void)
104 {
105 if (host_machine) {
106 machine__delete(host_machine);
107 host_machine = NULL;
108 }
109 symbol__exit();
110 }
111
112 static struct symbol *__find_kernel_function_by_name(const char *name,
113 struct map **mapp)
114 {
115 return machine__find_kernel_function_by_name(host_machine, name, mapp,
116 NULL);
117 }
118
119 static struct symbol *__find_kernel_function(u64 addr, struct map **mapp)
120 {
121 return machine__find_kernel_function(host_machine, addr, mapp, NULL);
122 }
123
124 static struct ref_reloc_sym *kernel_get_ref_reloc_sym(void)
125 {
126 /* kmap->ref_reloc_sym should be set if host_machine is initialized */
127 struct kmap *kmap;
128 struct map *map = machine__kernel_map(host_machine);
129
130 if (map__load(map, NULL) < 0)
131 return NULL;
132
133 kmap = map__kmap(map);
134 if (!kmap)
135 return NULL;
136 return kmap->ref_reloc_sym;
137 }
138
139 static int kernel_get_symbol_address_by_name(const char *name, u64 *addr,
140 bool reloc, bool reladdr)
141 {
142 struct ref_reloc_sym *reloc_sym;
143 struct symbol *sym;
144 struct map *map;
145
146 /* ref_reloc_sym is just a label. Need a special fix*/
147 reloc_sym = kernel_get_ref_reloc_sym();
148 if (reloc_sym && strcmp(name, reloc_sym->name) == 0)
149 *addr = (reloc) ? reloc_sym->addr : reloc_sym->unrelocated_addr;
150 else {
151 sym = __find_kernel_function_by_name(name, &map);
152 if (!sym)
153 return -ENOENT;
154 *addr = map->unmap_ip(map, sym->start) -
155 ((reloc) ? 0 : map->reloc) -
156 ((reladdr) ? map->start : 0);
157 }
158 return 0;
159 }
160
161 static struct map *kernel_get_module_map(const char *module)
162 {
163 struct map_groups *grp = &host_machine->kmaps;
164 struct maps *maps = &grp->maps[MAP__FUNCTION];
165 struct map *pos;
166
167 /* A file path -- this is an offline module */
168 if (module && strchr(module, '/'))
169 return machine__findnew_module_map(host_machine, 0, module);
170
171 if (!module)
172 module = "kernel";
173
174 for (pos = maps__first(maps); pos; pos = map__next(pos)) {
175 if (strncmp(pos->dso->short_name + 1, module,
176 pos->dso->short_name_len - 2) == 0) {
177 return pos;
178 }
179 }
180 return NULL;
181 }
182
183 static struct map *get_target_map(const char *target, bool user)
184 {
185 /* Init maps of given executable or kernel */
186 if (user)
187 return dso__new_map(target);
188 else
189 return kernel_get_module_map(target);
190 }
191
192 static void put_target_map(struct map *map, bool user)
193 {
194 if (map && user) {
195 /* Only the user map needs to be released */
196 map__put(map);
197 }
198 }
199
200
201 static int convert_exec_to_group(const char *exec, char **result)
202 {
203 char *ptr1, *ptr2, *exec_copy;
204 char buf[64];
205 int ret;
206
207 exec_copy = strdup(exec);
208 if (!exec_copy)
209 return -ENOMEM;
210
211 ptr1 = basename(exec_copy);
212 if (!ptr1) {
213 ret = -EINVAL;
214 goto out;
215 }
216
217 ptr2 = strpbrk(ptr1, "-._");
218 if (ptr2)
219 *ptr2 = '\0';
220 ret = e_snprintf(buf, 64, "%s_%s", PERFPROBE_GROUP, ptr1);
221 if (ret < 0)
222 goto out;
223
224 *result = strdup(buf);
225 ret = *result ? 0 : -ENOMEM;
226
227 out:
228 free(exec_copy);
229 return ret;
230 }
231
232 static void clear_perf_probe_point(struct perf_probe_point *pp)
233 {
234 free(pp->file);
235 free(pp->function);
236 free(pp->lazy_line);
237 }
238
239 static void clear_probe_trace_events(struct probe_trace_event *tevs, int ntevs)
240 {
241 int i;
242
243 for (i = 0; i < ntevs; i++)
244 clear_probe_trace_event(tevs + i);
245 }
246
247 static bool kprobe_blacklist__listed(unsigned long address);
248 static bool kprobe_warn_out_range(const char *symbol, unsigned long address)
249 {
250 u64 etext_addr = 0;
251 int ret;
252
253 /* Get the address of _etext for checking non-probable text symbol */
254 ret = kernel_get_symbol_address_by_name("_etext", &etext_addr,
255 false, false);
256
257 if (ret == 0 && etext_addr < address)
258 pr_warning("%s is out of .text, skip it.\n", symbol);
259 else if (kprobe_blacklist__listed(address))
260 pr_warning("%s is blacklisted function, skip it.\n", symbol);
261 else
262 return false;
263
264 return true;
265 }
266
267 /*
268 * NOTE:
269 * '.gnu.linkonce.this_module' section of kernel module elf directly
270 * maps to 'struct module' from linux/module.h. This section contains
271 * actual module name which will be used by kernel after loading it.
272 * But, we cannot use 'struct module' here since linux/module.h is not
273 * exposed to user-space. Offset of 'name' has remained same from long
274 * time, so hardcoding it here.
275 */
276 #ifdef __LP64__
277 #define MOD_NAME_OFFSET 24
278 #else
279 #define MOD_NAME_OFFSET 12
280 #endif
281
282 /*
283 * @module can be module name of module file path. In case of path,
284 * inspect elf and find out what is actual module name.
285 * Caller has to free mod_name after using it.
286 */
287 static char *find_module_name(const char *module)
288 {
289 int fd;
290 Elf *elf;
291 GElf_Ehdr ehdr;
292 GElf_Shdr shdr;
293 Elf_Data *data;
294 Elf_Scn *sec;
295 char *mod_name = NULL;
296
297 fd = open(module, O_RDONLY);
298 if (fd < 0)
299 return NULL;
300
301 elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
302 if (elf == NULL)
303 goto elf_err;
304
305 if (gelf_getehdr(elf, &ehdr) == NULL)
306 goto ret_err;
307
308 sec = elf_section_by_name(elf, &ehdr, &shdr,
309 ".gnu.linkonce.this_module", NULL);
310 if (!sec)
311 goto ret_err;
312
313 data = elf_getdata(sec, NULL);
314 if (!data || !data->d_buf)
315 goto ret_err;
316
317 mod_name = strdup((char *)data->d_buf + MOD_NAME_OFFSET);
318
319 ret_err:
320 elf_end(elf);
321 elf_err:
322 close(fd);
323 return mod_name;
324 }
325
326 #ifdef HAVE_DWARF_SUPPORT
327
328 static int kernel_get_module_dso(const char *module, struct dso **pdso)
329 {
330 struct dso *dso;
331 struct map *map;
332 const char *vmlinux_name;
333 int ret = 0;
334
335 if (module) {
336 char module_name[128];
337
338 snprintf(module_name, sizeof(module_name), "[%s]", module);
339 map = map_groups__find_by_name(&host_machine->kmaps, MAP__FUNCTION, module_name);
340 if (map) {
341 dso = map->dso;
342 goto found;
343 }
344 pr_debug("Failed to find module %s.\n", module);
345 return -ENOENT;
346 }
347
348 map = machine__kernel_map(host_machine);
349 dso = map->dso;
350
351 vmlinux_name = symbol_conf.vmlinux_name;
352 dso->load_errno = 0;
353 if (vmlinux_name)
354 ret = dso__load_vmlinux(dso, map, vmlinux_name, false, NULL);
355 else
356 ret = dso__load_vmlinux_path(dso, map, NULL);
357 found:
358 *pdso = dso;
359 return ret;
360 }
361
362 /*
363 * Some binaries like glibc have special symbols which are on the symbol
364 * table, but not in the debuginfo. If we can find the address of the
365 * symbol from map, we can translate the address back to the probe point.
366 */
367 static int find_alternative_probe_point(struct debuginfo *dinfo,
368 struct perf_probe_point *pp,
369 struct perf_probe_point *result,
370 const char *target, bool uprobes)
371 {
372 struct map *map = NULL;
373 struct symbol *sym;
374 u64 address = 0;
375 int ret = -ENOENT;
376
377 /* This can work only for function-name based one */
378 if (!pp->function || pp->file)
379 return -ENOTSUP;
380
381 map = get_target_map(target, uprobes);
382 if (!map)
383 return -EINVAL;
384
385 /* Find the address of given function */
386 map__for_each_symbol_by_name(map, pp->function, sym) {
387 if (uprobes)
388 address = sym->start;
389 else
390 address = map->unmap_ip(map, sym->start);
391 break;
392 }
393 if (!address) {
394 ret = -ENOENT;
395 goto out;
396 }
397 pr_debug("Symbol %s address found : %" PRIx64 "\n",
398 pp->function, address);
399
400 ret = debuginfo__find_probe_point(dinfo, (unsigned long)address,
401 result);
402 if (ret <= 0)
403 ret = (!ret) ? -ENOENT : ret;
404 else {
405 result->offset += pp->offset;
406 result->line += pp->line;
407 result->retprobe = pp->retprobe;
408 ret = 0;
409 }
410
411 out:
412 put_target_map(map, uprobes);
413 return ret;
414
415 }
416
417 static int get_alternative_probe_event(struct debuginfo *dinfo,
418 struct perf_probe_event *pev,
419 struct perf_probe_point *tmp)
420 {
421 int ret;
422
423 memcpy(tmp, &pev->point, sizeof(*tmp));
424 memset(&pev->point, 0, sizeof(pev->point));
425 ret = find_alternative_probe_point(dinfo, tmp, &pev->point,
426 pev->target, pev->uprobes);
427 if (ret < 0)
428 memcpy(&pev->point, tmp, sizeof(*tmp));
429
430 return ret;
431 }
432
433 static int get_alternative_line_range(struct debuginfo *dinfo,
434 struct line_range *lr,
435 const char *target, bool user)
436 {
437 struct perf_probe_point pp = { .function = lr->function,
438 .file = lr->file,
439 .line = lr->start };
440 struct perf_probe_point result;
441 int ret, len = 0;
442
443 memset(&result, 0, sizeof(result));
444
445 if (lr->end != INT_MAX)
446 len = lr->end - lr->start;
447 ret = find_alternative_probe_point(dinfo, &pp, &result,
448 target, user);
449 if (!ret) {
450 lr->function = result.function;
451 lr->file = result.file;
452 lr->start = result.line;
453 if (lr->end != INT_MAX)
454 lr->end = lr->start + len;
455 clear_perf_probe_point(&pp);
456 }
457 return ret;
458 }
459
460 /* Open new debuginfo of given module */
461 static struct debuginfo *open_debuginfo(const char *module, bool silent)
462 {
463 const char *path = module;
464 char reason[STRERR_BUFSIZE];
465 struct debuginfo *ret = NULL;
466 struct dso *dso = NULL;
467 int err;
468
469 if (!module || !strchr(module, '/')) {
470 err = kernel_get_module_dso(module, &dso);
471 if (err < 0) {
472 if (!dso || dso->load_errno == 0) {
473 if (!strerror_r(-err, reason, STRERR_BUFSIZE))
474 strcpy(reason, "(unknown)");
475 } else
476 dso__strerror_load(dso, reason, STRERR_BUFSIZE);
477 if (!silent)
478 pr_err("Failed to find the path for %s: %s\n",
479 module ?: "kernel", reason);
480 return NULL;
481 }
482 path = dso->long_name;
483 }
484 ret = debuginfo__new(path);
485 if (!ret && !silent) {
486 pr_warning("The %s file has no debug information.\n", path);
487 if (!module || !strtailcmp(path, ".ko"))
488 pr_warning("Rebuild with CONFIG_DEBUG_INFO=y, ");
489 else
490 pr_warning("Rebuild with -g, ");
491 pr_warning("or install an appropriate debuginfo package.\n");
492 }
493 return ret;
494 }
495
496 /* For caching the last debuginfo */
497 static struct debuginfo *debuginfo_cache;
498 static char *debuginfo_cache_path;
499
500 static struct debuginfo *debuginfo_cache__open(const char *module, bool silent)
501 {
502 const char *path = module;
503
504 /* If the module is NULL, it should be the kernel. */
505 if (!module)
506 path = "kernel";
507
508 if (debuginfo_cache_path && !strcmp(debuginfo_cache_path, path))
509 goto out;
510
511 /* Copy module path */
512 free(debuginfo_cache_path);
513 debuginfo_cache_path = strdup(path);
514 if (!debuginfo_cache_path) {
515 debuginfo__delete(debuginfo_cache);
516 debuginfo_cache = NULL;
517 goto out;
518 }
519
520 debuginfo_cache = open_debuginfo(module, silent);
521 if (!debuginfo_cache)
522 zfree(&debuginfo_cache_path);
523 out:
524 return debuginfo_cache;
525 }
526
527 static void debuginfo_cache__exit(void)
528 {
529 debuginfo__delete(debuginfo_cache);
530 debuginfo_cache = NULL;
531 zfree(&debuginfo_cache_path);
532 }
533
534
535 static int get_text_start_address(const char *exec, unsigned long *address)
536 {
537 Elf *elf;
538 GElf_Ehdr ehdr;
539 GElf_Shdr shdr;
540 int fd, ret = -ENOENT;
541
542 fd = open(exec, O_RDONLY);
543 if (fd < 0)
544 return -errno;
545
546 elf = elf_begin(fd, PERF_ELF_C_READ_MMAP, NULL);
547 if (elf == NULL) {
548 ret = -EINVAL;
549 goto out_close;
550 }
551
552 if (gelf_getehdr(elf, &ehdr) == NULL)
553 goto out;
554
555 if (!elf_section_by_name(elf, &ehdr, &shdr, ".text", NULL))
556 goto out;
557
558 *address = shdr.sh_addr - shdr.sh_offset;
559 ret = 0;
560 out:
561 elf_end(elf);
562 out_close:
563 close(fd);
564
565 return ret;
566 }
567
568 /*
569 * Convert trace point to probe point with debuginfo
570 */
571 static int find_perf_probe_point_from_dwarf(struct probe_trace_point *tp,
572 struct perf_probe_point *pp,
573 bool is_kprobe)
574 {
575 struct debuginfo *dinfo = NULL;
576 unsigned long stext = 0;
577 u64 addr = tp->address;
578 int ret = -ENOENT;
579
580 /* convert the address to dwarf address */
581 if (!is_kprobe) {
582 if (!addr) {
583 ret = -EINVAL;
584 goto error;
585 }
586 ret = get_text_start_address(tp->module, &stext);
587 if (ret < 0)
588 goto error;
589 addr += stext;
590 } else if (tp->symbol) {
591 /* If the module is given, this returns relative address */
592 ret = kernel_get_symbol_address_by_name(tp->symbol, &addr,
593 false, !!tp->module);
594 if (ret != 0)
595 goto error;
596 addr += tp->offset;
597 }
598
599 pr_debug("try to find information at %" PRIx64 " in %s\n", addr,
600 tp->module ? : "kernel");
601
602 dinfo = debuginfo_cache__open(tp->module, verbose == 0);
603 if (dinfo)
604 ret = debuginfo__find_probe_point(dinfo,
605 (unsigned long)addr, pp);
606 else
607 ret = -ENOENT;
608
609 if (ret > 0) {
610 pp->retprobe = tp->retprobe;
611 return 0;
612 }
613 error:
614 pr_debug("Failed to find corresponding probes from debuginfo.\n");
615 return ret ? : -ENOENT;
616 }
617
618 static int add_exec_to_probe_trace_events(struct probe_trace_event *tevs,
619 int ntevs, const char *exec)
620 {
621 int i, ret = 0;
622 unsigned long stext = 0;
623
624 if (!exec)
625 return 0;
626
627 ret = get_text_start_address(exec, &stext);
628 if (ret < 0)
629 return ret;
630
631 for (i = 0; i < ntevs && ret >= 0; i++) {
632 /* point.address is the addres of point.symbol + point.offset */
633 tevs[i].point.address -= stext;
634 tevs[i].point.module = strdup(exec);
635 if (!tevs[i].point.module) {
636 ret = -ENOMEM;
637 break;
638 }
639 tevs[i].uprobes = true;
640 }
641
642 return ret;
643 }
644
645 static int add_module_to_probe_trace_events(struct probe_trace_event *tevs,
646 int ntevs, const char *module)
647 {
648 int i, ret = 0;
649 char *mod_name = NULL;
650
651 if (!module)
652 return 0;
653
654 mod_name = find_module_name(module);
655
656 for (i = 0; i < ntevs; i++) {
657 tevs[i].point.module =
658 strdup(mod_name ? mod_name : module);
659 if (!tevs[i].point.module) {
660 ret = -ENOMEM;
661 break;
662 }
663 }
664
665 free(mod_name);
666 return ret;
667 }
668
669 /* Post processing the probe events */
670 static int post_process_probe_trace_events(struct probe_trace_event *tevs,
671 int ntevs, const char *module,
672 bool uprobe)
673 {
674 struct ref_reloc_sym *reloc_sym;
675 char *tmp;
676 int i, skipped = 0;
677
678 if (uprobe)
679 return add_exec_to_probe_trace_events(tevs, ntevs, module);
680
681 /* Note that currently ref_reloc_sym based probe is not for drivers */
682 if (module)
683 return add_module_to_probe_trace_events(tevs, ntevs, module);
684
685 reloc_sym = kernel_get_ref_reloc_sym();
686 if (!reloc_sym) {
687 pr_warning("Relocated base symbol is not found!\n");
688 return -EINVAL;
689 }
690
691 for (i = 0; i < ntevs; i++) {
692 if (!tevs[i].point.address || tevs[i].point.retprobe)
693 continue;
694 /* If we found a wrong one, mark it by NULL symbol */
695 if (kprobe_warn_out_range(tevs[i].point.symbol,
696 tevs[i].point.address)) {
697 tmp = NULL;
698 skipped++;
699 } else {
700 tmp = strdup(reloc_sym->name);
701 if (!tmp)
702 return -ENOMEM;
703 }
704 /* If we have no realname, use symbol for it */
705 if (!tevs[i].point.realname)
706 tevs[i].point.realname = tevs[i].point.symbol;
707 else
708 free(tevs[i].point.symbol);
709 tevs[i].point.symbol = tmp;
710 tevs[i].point.offset = tevs[i].point.address -
711 reloc_sym->unrelocated_addr;
712 }
713 return skipped;
714 }
715
716 /* Try to find perf_probe_event with debuginfo */
717 static int try_to_find_probe_trace_events(struct perf_probe_event *pev,
718 struct probe_trace_event **tevs)
719 {
720 bool need_dwarf = perf_probe_event_need_dwarf(pev);
721 struct perf_probe_point tmp;
722 struct debuginfo *dinfo;
723 int ntevs, ret = 0;
724
725 dinfo = open_debuginfo(pev->target, !need_dwarf);
726 if (!dinfo) {
727 if (need_dwarf)
728 return -ENOENT;
729 pr_debug("Could not open debuginfo. Try to use symbols.\n");
730 return 0;
731 }
732
733 pr_debug("Try to find probe point from debuginfo.\n");
734 /* Searching trace events corresponding to a probe event */
735 ntevs = debuginfo__find_trace_events(dinfo, pev, tevs);
736
737 if (ntevs == 0) { /* Not found, retry with an alternative */
738 ret = get_alternative_probe_event(dinfo, pev, &tmp);
739 if (!ret) {
740 ntevs = debuginfo__find_trace_events(dinfo, pev, tevs);
741 /*
742 * Write back to the original probe_event for
743 * setting appropriate (user given) event name
744 */
745 clear_perf_probe_point(&pev->point);
746 memcpy(&pev->point, &tmp, sizeof(tmp));
747 }
748 }
749
750 debuginfo__delete(dinfo);
751
752 if (ntevs > 0) { /* Succeeded to find trace events */
753 pr_debug("Found %d probe_trace_events.\n", ntevs);
754 ret = post_process_probe_trace_events(*tevs, ntevs,
755 pev->target, pev->uprobes);
756 if (ret < 0 || ret == ntevs) {
757 clear_probe_trace_events(*tevs, ntevs);
758 zfree(tevs);
759 }
760 if (ret != ntevs)
761 return ret < 0 ? ret : ntevs;
762 ntevs = 0;
763 /* Fall through */
764 }
765
766 if (ntevs == 0) { /* No error but failed to find probe point. */
767 pr_warning("Probe point '%s' not found.\n",
768 synthesize_perf_probe_point(&pev->point));
769 return -ENOENT;
770 }
771 /* Error path : ntevs < 0 */
772 pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
773 if (ntevs < 0) {
774 if (ntevs == -EBADF)
775 pr_warning("Warning: No dwarf info found in the vmlinux - "
776 "please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
777 if (!need_dwarf) {
778 pr_debug("Trying to use symbols.\n");
779 return 0;
780 }
781 }
782 return ntevs;
783 }
784
785 #define LINEBUF_SIZE 256
786 #define NR_ADDITIONAL_LINES 2
787
788 static int __show_one_line(FILE *fp, int l, bool skip, bool show_num)
789 {
790 char buf[LINEBUF_SIZE], sbuf[STRERR_BUFSIZE];
791 const char *color = show_num ? "" : PERF_COLOR_BLUE;
792 const char *prefix = NULL;
793
794 do {
795 if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
796 goto error;
797 if (skip)
798 continue;
799 if (!prefix) {
800 prefix = show_num ? "%7d " : " ";
801 color_fprintf(stdout, color, prefix, l);
802 }
803 color_fprintf(stdout, color, "%s", buf);
804
805 } while (strchr(buf, '\n') == NULL);
806
807 return 1;
808 error:
809 if (ferror(fp)) {
810 pr_warning("File read error: %s\n",
811 strerror_r(errno, sbuf, sizeof(sbuf)));
812 return -1;
813 }
814 return 0;
815 }
816
817 static int _show_one_line(FILE *fp, int l, bool skip, bool show_num)
818 {
819 int rv = __show_one_line(fp, l, skip, show_num);
820 if (rv == 0) {
821 pr_warning("Source file is shorter than expected.\n");
822 rv = -1;
823 }
824 return rv;
825 }
826
827 #define show_one_line_with_num(f,l) _show_one_line(f,l,false,true)
828 #define show_one_line(f,l) _show_one_line(f,l,false,false)
829 #define skip_one_line(f,l) _show_one_line(f,l,true,false)
830 #define show_one_line_or_eof(f,l) __show_one_line(f,l,false,false)
831
832 /*
833 * Show line-range always requires debuginfo to find source file and
834 * line number.
835 */
836 static int __show_line_range(struct line_range *lr, const char *module,
837 bool user)
838 {
839 int l = 1;
840 struct int_node *ln;
841 struct debuginfo *dinfo;
842 FILE *fp;
843 int ret;
844 char *tmp;
845 char sbuf[STRERR_BUFSIZE];
846
847 /* Search a line range */
848 dinfo = open_debuginfo(module, false);
849 if (!dinfo)
850 return -ENOENT;
851
852 ret = debuginfo__find_line_range(dinfo, lr);
853 if (!ret) { /* Not found, retry with an alternative */
854 ret = get_alternative_line_range(dinfo, lr, module, user);
855 if (!ret)
856 ret = debuginfo__find_line_range(dinfo, lr);
857 }
858 debuginfo__delete(dinfo);
859 if (ret == 0 || ret == -ENOENT) {
860 pr_warning("Specified source line is not found.\n");
861 return -ENOENT;
862 } else if (ret < 0) {
863 pr_warning("Debuginfo analysis failed.\n");
864 return ret;
865 }
866
867 /* Convert source file path */
868 tmp = lr->path;
869 ret = get_real_path(tmp, lr->comp_dir, &lr->path);
870
871 /* Free old path when new path is assigned */
872 if (tmp != lr->path)
873 free(tmp);
874
875 if (ret < 0) {
876 pr_warning("Failed to find source file path.\n");
877 return ret;
878 }
879
880 setup_pager();
881
882 if (lr->function)
883 fprintf(stdout, "<%s@%s:%d>\n", lr->function, lr->path,
884 lr->start - lr->offset);
885 else
886 fprintf(stdout, "<%s:%d>\n", lr->path, lr->start);
887
888 fp = fopen(lr->path, "r");
889 if (fp == NULL) {
890 pr_warning("Failed to open %s: %s\n", lr->path,
891 strerror_r(errno, sbuf, sizeof(sbuf)));
892 return -errno;
893 }
894 /* Skip to starting line number */
895 while (l < lr->start) {
896 ret = skip_one_line(fp, l++);
897 if (ret < 0)
898 goto end;
899 }
900
901 intlist__for_each(ln, lr->line_list) {
902 for (; ln->i > l; l++) {
903 ret = show_one_line(fp, l - lr->offset);
904 if (ret < 0)
905 goto end;
906 }
907 ret = show_one_line_with_num(fp, l++ - lr->offset);
908 if (ret < 0)
909 goto end;
910 }
911
912 if (lr->end == INT_MAX)
913 lr->end = l + NR_ADDITIONAL_LINES;
914 while (l <= lr->end) {
915 ret = show_one_line_or_eof(fp, l++ - lr->offset);
916 if (ret <= 0)
917 break;
918 }
919 end:
920 fclose(fp);
921 return ret;
922 }
923
924 int show_line_range(struct line_range *lr, const char *module, bool user)
925 {
926 int ret;
927
928 ret = init_probe_symbol_maps(user);
929 if (ret < 0)
930 return ret;
931 ret = __show_line_range(lr, module, user);
932 exit_probe_symbol_maps();
933
934 return ret;
935 }
936
937 static int show_available_vars_at(struct debuginfo *dinfo,
938 struct perf_probe_event *pev,
939 struct strfilter *_filter)
940 {
941 char *buf;
942 int ret, i, nvars;
943 struct str_node *node;
944 struct variable_list *vls = NULL, *vl;
945 struct perf_probe_point tmp;
946 const char *var;
947
948 buf = synthesize_perf_probe_point(&pev->point);
949 if (!buf)
950 return -EINVAL;
951 pr_debug("Searching variables at %s\n", buf);
952
953 ret = debuginfo__find_available_vars_at(dinfo, pev, &vls);
954 if (!ret) { /* Not found, retry with an alternative */
955 ret = get_alternative_probe_event(dinfo, pev, &tmp);
956 if (!ret) {
957 ret = debuginfo__find_available_vars_at(dinfo, pev,
958 &vls);
959 /* Release the old probe_point */
960 clear_perf_probe_point(&tmp);
961 }
962 }
963 if (ret <= 0) {
964 if (ret == 0 || ret == -ENOENT) {
965 pr_err("Failed to find the address of %s\n", buf);
966 ret = -ENOENT;
967 } else
968 pr_warning("Debuginfo analysis failed.\n");
969 goto end;
970 }
971
972 /* Some variables are found */
973 fprintf(stdout, "Available variables at %s\n", buf);
974 for (i = 0; i < ret; i++) {
975 vl = &vls[i];
976 /*
977 * A probe point might be converted to
978 * several trace points.
979 */
980 fprintf(stdout, "\t@<%s+%lu>\n", vl->point.symbol,
981 vl->point.offset);
982 zfree(&vl->point.symbol);
983 nvars = 0;
984 if (vl->vars) {
985 strlist__for_each(node, vl->vars) {
986 var = strchr(node->s, '\t') + 1;
987 if (strfilter__compare(_filter, var)) {
988 fprintf(stdout, "\t\t%s\n", node->s);
989 nvars++;
990 }
991 }
992 strlist__delete(vl->vars);
993 }
994 if (nvars == 0)
995 fprintf(stdout, "\t\t(No matched variables)\n");
996 }
997 free(vls);
998 end:
999 free(buf);
1000 return ret;
1001 }
1002
1003 /* Show available variables on given probe point */
1004 int show_available_vars(struct perf_probe_event *pevs, int npevs,
1005 struct strfilter *_filter)
1006 {
1007 int i, ret = 0;
1008 struct debuginfo *dinfo;
1009
1010 ret = init_probe_symbol_maps(pevs->uprobes);
1011 if (ret < 0)
1012 return ret;
1013
1014 dinfo = open_debuginfo(pevs->target, false);
1015 if (!dinfo) {
1016 ret = -ENOENT;
1017 goto out;
1018 }
1019
1020 setup_pager();
1021
1022 for (i = 0; i < npevs && ret >= 0; i++)
1023 ret = show_available_vars_at(dinfo, &pevs[i], _filter);
1024
1025 debuginfo__delete(dinfo);
1026 out:
1027 exit_probe_symbol_maps();
1028 return ret;
1029 }
1030
1031 #else /* !HAVE_DWARF_SUPPORT */
1032
1033 static void debuginfo_cache__exit(void)
1034 {
1035 }
1036
1037 static int
1038 find_perf_probe_point_from_dwarf(struct probe_trace_point *tp __maybe_unused,
1039 struct perf_probe_point *pp __maybe_unused,
1040 bool is_kprobe __maybe_unused)
1041 {
1042 return -ENOSYS;
1043 }
1044
1045 static int try_to_find_probe_trace_events(struct perf_probe_event *pev,
1046 struct probe_trace_event **tevs __maybe_unused)
1047 {
1048 if (perf_probe_event_need_dwarf(pev)) {
1049 pr_warning("Debuginfo-analysis is not supported.\n");
1050 return -ENOSYS;
1051 }
1052
1053 return 0;
1054 }
1055
1056 int show_line_range(struct line_range *lr __maybe_unused,
1057 const char *module __maybe_unused,
1058 bool user __maybe_unused)
1059 {
1060 pr_warning("Debuginfo-analysis is not supported.\n");
1061 return -ENOSYS;
1062 }
1063
1064 int show_available_vars(struct perf_probe_event *pevs __maybe_unused,
1065 int npevs __maybe_unused,
1066 struct strfilter *filter __maybe_unused)
1067 {
1068 pr_warning("Debuginfo-analysis is not supported.\n");
1069 return -ENOSYS;
1070 }
1071 #endif
1072
1073 void line_range__clear(struct line_range *lr)
1074 {
1075 free(lr->function);
1076 free(lr->file);
1077 free(lr->path);
1078 free(lr->comp_dir);
1079 intlist__delete(lr->line_list);
1080 memset(lr, 0, sizeof(*lr));
1081 }
1082
1083 int line_range__init(struct line_range *lr)
1084 {
1085 memset(lr, 0, sizeof(*lr));
1086 lr->line_list = intlist__new(NULL);
1087 if (!lr->line_list)
1088 return -ENOMEM;
1089 else
1090 return 0;
1091 }
1092
1093 static int parse_line_num(char **ptr, int *val, const char *what)
1094 {
1095 const char *start = *ptr;
1096
1097 errno = 0;
1098 *val = strtol(*ptr, ptr, 0);
1099 if (errno || *ptr == start) {
1100 semantic_error("'%s' is not a valid number.\n", what);
1101 return -EINVAL;
1102 }
1103 return 0;
1104 }
1105
1106 /* Check the name is good for event, group or function */
1107 static bool is_c_func_name(const char *name)
1108 {
1109 if (!isalpha(*name) && *name != '_')
1110 return false;
1111 while (*++name != '\0') {
1112 if (!isalpha(*name) && !isdigit(*name) && *name != '_')
1113 return false;
1114 }
1115 return true;
1116 }
1117
1118 /*
1119 * Stuff 'lr' according to the line range described by 'arg'.
1120 * The line range syntax is described by:
1121 *
1122 * SRC[:SLN[+NUM|-ELN]]
1123 * FNC[@SRC][:SLN[+NUM|-ELN]]
1124 */
1125 int parse_line_range_desc(const char *arg, struct line_range *lr)
1126 {
1127 char *range, *file, *name = strdup(arg);
1128 int err;
1129
1130 if (!name)
1131 return -ENOMEM;
1132
1133 lr->start = 0;
1134 lr->end = INT_MAX;
1135
1136 range = strchr(name, ':');
1137 if (range) {
1138 *range++ = '\0';
1139
1140 err = parse_line_num(&range, &lr->start, "start line");
1141 if (err)
1142 goto err;
1143
1144 if (*range == '+' || *range == '-') {
1145 const char c = *range++;
1146
1147 err = parse_line_num(&range, &lr->end, "end line");
1148 if (err)
1149 goto err;
1150
1151 if (c == '+') {
1152 lr->end += lr->start;
1153 /*
1154 * Adjust the number of lines here.
1155 * If the number of lines == 1, the
1156 * the end of line should be equal to
1157 * the start of line.
1158 */
1159 lr->end--;
1160 }
1161 }
1162
1163 pr_debug("Line range is %d to %d\n", lr->start, lr->end);
1164
1165 err = -EINVAL;
1166 if (lr->start > lr->end) {
1167 semantic_error("Start line must be smaller"
1168 " than end line.\n");
1169 goto err;
1170 }
1171 if (*range != '\0') {
1172 semantic_error("Tailing with invalid str '%s'.\n", range);
1173 goto err;
1174 }
1175 }
1176
1177 file = strchr(name, '@');
1178 if (file) {
1179 *file = '\0';
1180 lr->file = strdup(++file);
1181 if (lr->file == NULL) {
1182 err = -ENOMEM;
1183 goto err;
1184 }
1185 lr->function = name;
1186 } else if (strchr(name, '/') || strchr(name, '.'))
1187 lr->file = name;
1188 else if (is_c_func_name(name))/* We reuse it for checking funcname */
1189 lr->function = name;
1190 else { /* Invalid name */
1191 semantic_error("'%s' is not a valid function name.\n", name);
1192 err = -EINVAL;
1193 goto err;
1194 }
1195
1196 return 0;
1197 err:
1198 free(name);
1199 return err;
1200 }
1201
1202 /* Parse probepoint definition. */
1203 static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
1204 {
1205 struct perf_probe_point *pp = &pev->point;
1206 char *ptr, *tmp;
1207 char c, nc = 0;
1208 bool file_spec = false;
1209 /*
1210 * <Syntax>
1211 * perf probe [EVENT=]SRC[:LN|;PTN]
1212 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
1213 *
1214 * TODO:Group name support
1215 */
1216 if (!arg)
1217 return -EINVAL;
1218
1219 ptr = strpbrk(arg, ";=@+%");
1220 if (ptr && *ptr == '=') { /* Event name */
1221 *ptr = '\0';
1222 tmp = ptr + 1;
1223 if (strchr(arg, ':')) {
1224 semantic_error("Group name is not supported yet.\n");
1225 return -ENOTSUP;
1226 }
1227 if (!is_c_func_name(arg)) {
1228 semantic_error("%s is bad for event name -it must "
1229 "follow C symbol-naming rule.\n", arg);
1230 return -EINVAL;
1231 }
1232 pev->event = strdup(arg);
1233 if (pev->event == NULL)
1234 return -ENOMEM;
1235 pev->group = NULL;
1236 arg = tmp;
1237 }
1238
1239 /*
1240 * Check arg is function or file name and copy it.
1241 *
1242 * We consider arg to be a file spec if and only if it satisfies
1243 * all of the below criteria::
1244 * - it does not include any of "+@%",
1245 * - it includes one of ":;", and
1246 * - it has a period '.' in the name.
1247 *
1248 * Otherwise, we consider arg to be a function specification.
1249 */
1250 if (!strpbrk(arg, "+@%") && (ptr = strpbrk(arg, ";:")) != NULL) {
1251 /* This is a file spec if it includes a '.' before ; or : */
1252 if (memchr(arg, '.', ptr - arg))
1253 file_spec = true;
1254 }
1255
1256 ptr = strpbrk(arg, ";:+@%");
1257 if (ptr) {
1258 nc = *ptr;
1259 *ptr++ = '\0';
1260 }
1261
1262 if (arg[0] == '\0')
1263 tmp = NULL;
1264 else {
1265 tmp = strdup(arg);
1266 if (tmp == NULL)
1267 return -ENOMEM;
1268 }
1269
1270 if (file_spec)
1271 pp->file = tmp;
1272 else {
1273 pp->function = tmp;
1274
1275 /*
1276 * Keep pp->function even if this is absolute address,
1277 * so it can mark whether abs_address is valid.
1278 * Which make 'perf probe lib.bin 0x0' possible.
1279 *
1280 * Note that checking length of tmp is not needed
1281 * because when we access tmp[1] we know tmp[0] is '0',
1282 * so tmp[1] should always valid (but could be '\0').
1283 */
1284 if (tmp && !strncmp(tmp, "0x", 2)) {
1285 pp->abs_address = strtoul(pp->function, &tmp, 0);
1286 if (*tmp != '\0') {
1287 semantic_error("Invalid absolute address.\n");
1288 return -EINVAL;
1289 }
1290 }
1291 }
1292
1293 /* Parse other options */
1294 while (ptr) {
1295 arg = ptr;
1296 c = nc;
1297 if (c == ';') { /* Lazy pattern must be the last part */
1298 pp->lazy_line = strdup(arg);
1299 if (pp->lazy_line == NULL)
1300 return -ENOMEM;
1301 break;
1302 }
1303 ptr = strpbrk(arg, ";:+@%");
1304 if (ptr) {
1305 nc = *ptr;
1306 *ptr++ = '\0';
1307 }
1308 switch (c) {
1309 case ':': /* Line number */
1310 pp->line = strtoul(arg, &tmp, 0);
1311 if (*tmp != '\0') {
1312 semantic_error("There is non-digit char"
1313 " in line number.\n");
1314 return -EINVAL;
1315 }
1316 break;
1317 case '+': /* Byte offset from a symbol */
1318 pp->offset = strtoul(arg, &tmp, 0);
1319 if (*tmp != '\0') {
1320 semantic_error("There is non-digit character"
1321 " in offset.\n");
1322 return -EINVAL;
1323 }
1324 break;
1325 case '@': /* File name */
1326 if (pp->file) {
1327 semantic_error("SRC@SRC is not allowed.\n");
1328 return -EINVAL;
1329 }
1330 pp->file = strdup(arg);
1331 if (pp->file == NULL)
1332 return -ENOMEM;
1333 break;
1334 case '%': /* Probe places */
1335 if (strcmp(arg, "return") == 0) {
1336 pp->retprobe = 1;
1337 } else { /* Others not supported yet */
1338 semantic_error("%%%s is not supported.\n", arg);
1339 return -ENOTSUP;
1340 }
1341 break;
1342 default: /* Buggy case */
1343 pr_err("This program has a bug at %s:%d.\n",
1344 __FILE__, __LINE__);
1345 return -ENOTSUP;
1346 break;
1347 }
1348 }
1349
1350 /* Exclusion check */
1351 if (pp->lazy_line && pp->line) {
1352 semantic_error("Lazy pattern can't be used with"
1353 " line number.\n");
1354 return -EINVAL;
1355 }
1356
1357 if (pp->lazy_line && pp->offset) {
1358 semantic_error("Lazy pattern can't be used with offset.\n");
1359 return -EINVAL;
1360 }
1361
1362 if (pp->line && pp->offset) {
1363 semantic_error("Offset can't be used with line number.\n");
1364 return -EINVAL;
1365 }
1366
1367 if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
1368 semantic_error("File always requires line number or "
1369 "lazy pattern.\n");
1370 return -EINVAL;
1371 }
1372
1373 if (pp->offset && !pp->function) {
1374 semantic_error("Offset requires an entry function.\n");
1375 return -EINVAL;
1376 }
1377
1378 if (pp->retprobe && !pp->function) {
1379 semantic_error("Return probe requires an entry function.\n");
1380 return -EINVAL;
1381 }
1382
1383 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
1384 semantic_error("Offset/Line/Lazy pattern can't be used with "
1385 "return probe.\n");
1386 return -EINVAL;
1387 }
1388
1389 pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
1390 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
1391 pp->lazy_line);
1392 return 0;
1393 }
1394
1395 /* Parse perf-probe event argument */
1396 static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
1397 {
1398 char *tmp, *goodname;
1399 struct perf_probe_arg_field **fieldp;
1400
1401 pr_debug("parsing arg: %s into ", str);
1402
1403 tmp = strchr(str, '=');
1404 if (tmp) {
1405 arg->name = strndup(str, tmp - str);
1406 if (arg->name == NULL)
1407 return -ENOMEM;
1408 pr_debug("name:%s ", arg->name);
1409 str = tmp + 1;
1410 }
1411
1412 tmp = strchr(str, ':');
1413 if (tmp) { /* Type setting */
1414 *tmp = '\0';
1415 arg->type = strdup(tmp + 1);
1416 if (arg->type == NULL)
1417 return -ENOMEM;
1418 pr_debug("type:%s ", arg->type);
1419 }
1420
1421 tmp = strpbrk(str, "-.[");
1422 if (!is_c_varname(str) || !tmp) {
1423 /* A variable, register, symbol or special value */
1424 arg->var = strdup(str);
1425 if (arg->var == NULL)
1426 return -ENOMEM;
1427 pr_debug("%s\n", arg->var);
1428 return 0;
1429 }
1430
1431 /* Structure fields or array element */
1432 arg->var = strndup(str, tmp - str);
1433 if (arg->var == NULL)
1434 return -ENOMEM;
1435 goodname = arg->var;
1436 pr_debug("%s, ", arg->var);
1437 fieldp = &arg->field;
1438
1439 do {
1440 *fieldp = zalloc(sizeof(struct perf_probe_arg_field));
1441 if (*fieldp == NULL)
1442 return -ENOMEM;
1443 if (*tmp == '[') { /* Array */
1444 str = tmp;
1445 (*fieldp)->index = strtol(str + 1, &tmp, 0);
1446 (*fieldp)->ref = true;
1447 if (*tmp != ']' || tmp == str + 1) {
1448 semantic_error("Array index must be a"
1449 " number.\n");
1450 return -EINVAL;
1451 }
1452 tmp++;
1453 if (*tmp == '\0')
1454 tmp = NULL;
1455 } else { /* Structure */
1456 if (*tmp == '.') {
1457 str = tmp + 1;
1458 (*fieldp)->ref = false;
1459 } else if (tmp[1] == '>') {
1460 str = tmp + 2;
1461 (*fieldp)->ref = true;
1462 } else {
1463 semantic_error("Argument parse error: %s\n",
1464 str);
1465 return -EINVAL;
1466 }
1467 tmp = strpbrk(str, "-.[");
1468 }
1469 if (tmp) {
1470 (*fieldp)->name = strndup(str, tmp - str);
1471 if ((*fieldp)->name == NULL)
1472 return -ENOMEM;
1473 if (*str != '[')
1474 goodname = (*fieldp)->name;
1475 pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
1476 fieldp = &(*fieldp)->next;
1477 }
1478 } while (tmp);
1479 (*fieldp)->name = strdup(str);
1480 if ((*fieldp)->name == NULL)
1481 return -ENOMEM;
1482 if (*str != '[')
1483 goodname = (*fieldp)->name;
1484 pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
1485
1486 /* If no name is specified, set the last field name (not array index)*/
1487 if (!arg->name) {
1488 arg->name = strdup(goodname);
1489 if (arg->name == NULL)
1490 return -ENOMEM;
1491 }
1492 return 0;
1493 }
1494
1495 /* Parse perf-probe event command */
1496 int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
1497 {
1498 char **argv;
1499 int argc, i, ret = 0;
1500
1501 argv = argv_split(cmd, &argc);
1502 if (!argv) {
1503 pr_debug("Failed to split arguments.\n");
1504 return -ENOMEM;
1505 }
1506 if (argc - 1 > MAX_PROBE_ARGS) {
1507 semantic_error("Too many probe arguments (%d).\n", argc - 1);
1508 ret = -ERANGE;
1509 goto out;
1510 }
1511 /* Parse probe point */
1512 ret = parse_perf_probe_point(argv[0], pev);
1513 if (ret < 0)
1514 goto out;
1515
1516 /* Copy arguments and ensure return probe has no C argument */
1517 pev->nargs = argc - 1;
1518 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1519 if (pev->args == NULL) {
1520 ret = -ENOMEM;
1521 goto out;
1522 }
1523 for (i = 0; i < pev->nargs && ret >= 0; i++) {
1524 ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
1525 if (ret >= 0 &&
1526 is_c_varname(pev->args[i].var) && pev->point.retprobe) {
1527 semantic_error("You can't specify local variable for"
1528 " kretprobe.\n");
1529 ret = -EINVAL;
1530 }
1531 }
1532 out:
1533 argv_free(argv);
1534
1535 return ret;
1536 }
1537
1538 /* Return true if this perf_probe_event requires debuginfo */
1539 bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
1540 {
1541 int i;
1542
1543 if (pev->point.file || pev->point.line || pev->point.lazy_line)
1544 return true;
1545
1546 for (i = 0; i < pev->nargs; i++)
1547 if (is_c_varname(pev->args[i].var))
1548 return true;
1549
1550 return false;
1551 }
1552
1553 /* Parse probe_events event into struct probe_point */
1554 int parse_probe_trace_command(const char *cmd, struct probe_trace_event *tev)
1555 {
1556 struct probe_trace_point *tp = &tev->point;
1557 char pr;
1558 char *p;
1559 char *argv0_str = NULL, *fmt, *fmt1_str, *fmt2_str, *fmt3_str;
1560 int ret, i, argc;
1561 char **argv;
1562
1563 pr_debug("Parsing probe_events: %s\n", cmd);
1564 argv = argv_split(cmd, &argc);
1565 if (!argv) {
1566 pr_debug("Failed to split arguments.\n");
1567 return -ENOMEM;
1568 }
1569 if (argc < 2) {
1570 semantic_error("Too few probe arguments.\n");
1571 ret = -ERANGE;
1572 goto out;
1573 }
1574
1575 /* Scan event and group name. */
1576 argv0_str = strdup(argv[0]);
1577 if (argv0_str == NULL) {
1578 ret = -ENOMEM;
1579 goto out;
1580 }
1581 fmt1_str = strtok_r(argv0_str, ":", &fmt);
1582 fmt2_str = strtok_r(NULL, "/", &fmt);
1583 fmt3_str = strtok_r(NULL, " \t", &fmt);
1584 if (fmt1_str == NULL || strlen(fmt1_str) != 1 || fmt2_str == NULL
1585 || fmt3_str == NULL) {
1586 semantic_error("Failed to parse event name: %s\n", argv[0]);
1587 ret = -EINVAL;
1588 goto out;
1589 }
1590 pr = fmt1_str[0];
1591 tev->group = strdup(fmt2_str);
1592 tev->event = strdup(fmt3_str);
1593 if (tev->group == NULL || tev->event == NULL) {
1594 ret = -ENOMEM;
1595 goto out;
1596 }
1597 pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
1598
1599 tp->retprobe = (pr == 'r');
1600
1601 /* Scan module name(if there), function name and offset */
1602 p = strchr(argv[1], ':');
1603 if (p) {
1604 tp->module = strndup(argv[1], p - argv[1]);
1605 if (!tp->module) {
1606 ret = -ENOMEM;
1607 goto out;
1608 }
1609 p++;
1610 } else
1611 p = argv[1];
1612 fmt1_str = strtok_r(p, "+", &fmt);
1613 /* only the address started with 0x */
1614 if (fmt1_str[0] == '0') {
1615 /*
1616 * Fix a special case:
1617 * if address == 0, kernel reports something like:
1618 * p:probe_libc/abs_0 /lib/libc-2.18.so:0x (null) arg1=%ax
1619 * Newer kernel may fix that, but we want to
1620 * support old kernel also.
1621 */
1622 if (strcmp(fmt1_str, "0x") == 0) {
1623 if (!argv[2] || strcmp(argv[2], "(null)")) {
1624 ret = -EINVAL;
1625 goto out;
1626 }
1627 tp->address = 0;
1628
1629 free(argv[2]);
1630 for (i = 2; argv[i + 1] != NULL; i++)
1631 argv[i] = argv[i + 1];
1632
1633 argv[i] = NULL;
1634 argc -= 1;
1635 } else
1636 tp->address = strtoul(fmt1_str, NULL, 0);
1637 } else {
1638 /* Only the symbol-based probe has offset */
1639 tp->symbol = strdup(fmt1_str);
1640 if (tp->symbol == NULL) {
1641 ret = -ENOMEM;
1642 goto out;
1643 }
1644 fmt2_str = strtok_r(NULL, "", &fmt);
1645 if (fmt2_str == NULL)
1646 tp->offset = 0;
1647 else
1648 tp->offset = strtoul(fmt2_str, NULL, 10);
1649 }
1650
1651 tev->nargs = argc - 2;
1652 tev->args = zalloc(sizeof(struct probe_trace_arg) * tev->nargs);
1653 if (tev->args == NULL) {
1654 ret = -ENOMEM;
1655 goto out;
1656 }
1657 for (i = 0; i < tev->nargs; i++) {
1658 p = strchr(argv[i + 2], '=');
1659 if (p) /* We don't need which register is assigned. */
1660 *p++ = '\0';
1661 else
1662 p = argv[i + 2];
1663 tev->args[i].name = strdup(argv[i + 2]);
1664 /* TODO: parse regs and offset */
1665 tev->args[i].value = strdup(p);
1666 if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
1667 ret = -ENOMEM;
1668 goto out;
1669 }
1670 }
1671 ret = 0;
1672 out:
1673 free(argv0_str);
1674 argv_free(argv);
1675 return ret;
1676 }
1677
1678 /* Compose only probe arg */
1679 char *synthesize_perf_probe_arg(struct perf_probe_arg *pa)
1680 {
1681 struct perf_probe_arg_field *field = pa->field;
1682 struct strbuf buf;
1683 char *ret = NULL;
1684 int err;
1685
1686 if (strbuf_init(&buf, 64) < 0)
1687 return NULL;
1688
1689 if (pa->name && pa->var)
1690 err = strbuf_addf(&buf, "%s=%s", pa->name, pa->var);
1691 else
1692 err = strbuf_addstr(&buf, pa->name ?: pa->var);
1693 if (err)
1694 goto out;
1695
1696 while (field) {
1697 if (field->name[0] == '[')
1698 err = strbuf_addstr(&buf, field->name);
1699 else
1700 err = strbuf_addf(&buf, "%s%s", field->ref ? "->" : ".",
1701 field->name);
1702 field = field->next;
1703 if (err)
1704 goto out;
1705 }
1706
1707 if (pa->type)
1708 if (strbuf_addf(&buf, ":%s", pa->type) < 0)
1709 goto out;
1710
1711 ret = strbuf_detach(&buf, NULL);
1712 out:
1713 strbuf_release(&buf);
1714 return ret;
1715 }
1716
1717 /* Compose only probe point (not argument) */
1718 char *synthesize_perf_probe_point(struct perf_probe_point *pp)
1719 {
1720 struct strbuf buf;
1721 char *tmp, *ret = NULL;
1722 int len, err = 0;
1723
1724 if (strbuf_init(&buf, 64) < 0)
1725 return NULL;
1726
1727 if (pp->function) {
1728 if (strbuf_addstr(&buf, pp->function) < 0)
1729 goto out;
1730 if (pp->offset)
1731 err = strbuf_addf(&buf, "+%lu", pp->offset);
1732 else if (pp->line)
1733 err = strbuf_addf(&buf, ":%d", pp->line);
1734 else if (pp->retprobe)
1735 err = strbuf_addstr(&buf, "%return");
1736 if (err)
1737 goto out;
1738 }
1739 if (pp->file) {
1740 tmp = pp->file;
1741 len = strlen(tmp);
1742 if (len > 30) {
1743 tmp = strchr(pp->file + len - 30, '/');
1744 tmp = tmp ? tmp + 1 : pp->file + len - 30;
1745 }
1746 err = strbuf_addf(&buf, "@%s", tmp);
1747 if (!err && !pp->function && pp->line)
1748 err = strbuf_addf(&buf, ":%d", pp->line);
1749 }
1750 if (!err)
1751 ret = strbuf_detach(&buf, NULL);
1752 out:
1753 strbuf_release(&buf);
1754 return ret;
1755 }
1756
1757 char *synthesize_perf_probe_command(struct perf_probe_event *pev)
1758 {
1759 struct strbuf buf;
1760 char *tmp, *ret = NULL;
1761 int i;
1762
1763 if (strbuf_init(&buf, 64))
1764 return NULL;
1765 if (pev->event)
1766 if (strbuf_addf(&buf, "%s:%s=", pev->group ?: PERFPROBE_GROUP,
1767 pev->event) < 0)
1768 goto out;
1769
1770 tmp = synthesize_perf_probe_point(&pev->point);
1771 if (!tmp || strbuf_addstr(&buf, tmp) < 0)
1772 goto out;
1773 free(tmp);
1774
1775 for (i = 0; i < pev->nargs; i++) {
1776 tmp = synthesize_perf_probe_arg(pev->args + i);
1777 if (!tmp || strbuf_addf(&buf, " %s", tmp) < 0)
1778 goto out;
1779 free(tmp);
1780 }
1781
1782 ret = strbuf_detach(&buf, NULL);
1783 out:
1784 strbuf_release(&buf);
1785 return ret;
1786 }
1787
1788 static int __synthesize_probe_trace_arg_ref(struct probe_trace_arg_ref *ref,
1789 struct strbuf *buf, int depth)
1790 {
1791 int err;
1792 if (ref->next) {
1793 depth = __synthesize_probe_trace_arg_ref(ref->next, buf,
1794 depth + 1);
1795 if (depth < 0)
1796 return depth;
1797 }
1798 err = strbuf_addf(buf, "%+ld(", ref->offset);
1799 return (err < 0) ? err : depth;
1800 }
1801
1802 static int synthesize_probe_trace_arg(struct probe_trace_arg *arg,
1803 struct strbuf *buf)
1804 {
1805 struct probe_trace_arg_ref *ref = arg->ref;
1806 int depth = 0, err;
1807
1808 /* Argument name or separator */
1809 if (arg->name)
1810 err = strbuf_addf(buf, " %s=", arg->name);
1811 else
1812 err = strbuf_addch(buf, ' ');
1813 if (err)
1814 return err;
1815
1816 /* Special case: @XXX */
1817 if (arg->value[0] == '@' && arg->ref)
1818 ref = ref->next;
1819
1820 /* Dereferencing arguments */
1821 if (ref) {
1822 depth = __synthesize_probe_trace_arg_ref(ref, buf, 1);
1823 if (depth < 0)
1824 return depth;
1825 }
1826
1827 /* Print argument value */
1828 if (arg->value[0] == '@' && arg->ref)
1829 err = strbuf_addf(buf, "%s%+ld", arg->value, arg->ref->offset);
1830 else
1831 err = strbuf_addstr(buf, arg->value);
1832
1833 /* Closing */
1834 while (!err && depth--)
1835 err = strbuf_addch(buf, ')');
1836
1837 /* Print argument type */
1838 if (!err && arg->type)
1839 err = strbuf_addf(buf, ":%s", arg->type);
1840
1841 return err;
1842 }
1843
1844 char *synthesize_probe_trace_command(struct probe_trace_event *tev)
1845 {
1846 struct probe_trace_point *tp = &tev->point;
1847 struct strbuf buf;
1848 char *ret = NULL;
1849 int i, err;
1850
1851 /* Uprobes must have tp->module */
1852 if (tev->uprobes && !tp->module)
1853 return NULL;
1854
1855 if (strbuf_init(&buf, 32) < 0)
1856 return NULL;
1857
1858 if (strbuf_addf(&buf, "%c:%s/%s ", tp->retprobe ? 'r' : 'p',
1859 tev->group, tev->event) < 0)
1860 goto error;
1861 /*
1862 * If tp->address == 0, then this point must be a
1863 * absolute address uprobe.
1864 * try_to_find_absolute_address() should have made
1865 * tp->symbol to "0x0".
1866 */
1867 if (tev->uprobes && !tp->address) {
1868 if (!tp->symbol || strcmp(tp->symbol, "0x0"))
1869 goto error;
1870 }
1871
1872 /* Use the tp->address for uprobes */
1873 if (tev->uprobes)
1874 err = strbuf_addf(&buf, "%s:0x%lx", tp->module, tp->address);
1875 else if (!strncmp(tp->symbol, "0x", 2))
1876 /* Absolute address. See try_to_find_absolute_address() */
1877 err = strbuf_addf(&buf, "%s%s0x%lx", tp->module ?: "",
1878 tp->module ? ":" : "", tp->address);
1879 else
1880 err = strbuf_addf(&buf, "%s%s%s+%lu", tp->module ?: "",
1881 tp->module ? ":" : "", tp->symbol, tp->offset);
1882 if (err)
1883 goto error;
1884
1885 for (i = 0; i < tev->nargs; i++)
1886 if (synthesize_probe_trace_arg(&tev->args[i], &buf) < 0)
1887 goto error;
1888
1889 ret = strbuf_detach(&buf, NULL);
1890 error:
1891 strbuf_release(&buf);
1892 return ret;
1893 }
1894
1895 static int find_perf_probe_point_from_map(struct probe_trace_point *tp,
1896 struct perf_probe_point *pp,
1897 bool is_kprobe)
1898 {
1899 struct symbol *sym = NULL;
1900 struct map *map;
1901 u64 addr = tp->address;
1902 int ret = -ENOENT;
1903
1904 if (!is_kprobe) {
1905 map = dso__new_map(tp->module);
1906 if (!map)
1907 goto out;
1908 sym = map__find_symbol(map, addr, NULL);
1909 } else {
1910 if (tp->symbol && !addr) {
1911 if (kernel_get_symbol_address_by_name(tp->symbol,
1912 &addr, true, false) < 0)
1913 goto out;
1914 }
1915 if (addr) {
1916 addr += tp->offset;
1917 sym = __find_kernel_function(addr, &map);
1918 }
1919 }
1920
1921 if (!sym)
1922 goto out;
1923
1924 pp->retprobe = tp->retprobe;
1925 pp->offset = addr - map->unmap_ip(map, sym->start);
1926 pp->function = strdup(sym->name);
1927 ret = pp->function ? 0 : -ENOMEM;
1928
1929 out:
1930 if (map && !is_kprobe) {
1931 map__put(map);
1932 }
1933
1934 return ret;
1935 }
1936
1937 static int convert_to_perf_probe_point(struct probe_trace_point *tp,
1938 struct perf_probe_point *pp,
1939 bool is_kprobe)
1940 {
1941 char buf[128];
1942 int ret;
1943
1944 ret = find_perf_probe_point_from_dwarf(tp, pp, is_kprobe);
1945 if (!ret)
1946 return 0;
1947 ret = find_perf_probe_point_from_map(tp, pp, is_kprobe);
1948 if (!ret)
1949 return 0;
1950
1951 pr_debug("Failed to find probe point from both of dwarf and map.\n");
1952
1953 if (tp->symbol) {
1954 pp->function = strdup(tp->symbol);
1955 pp->offset = tp->offset;
1956 } else {
1957 ret = e_snprintf(buf, 128, "0x%" PRIx64, (u64)tp->address);
1958 if (ret < 0)
1959 return ret;
1960 pp->function = strdup(buf);
1961 pp->offset = 0;
1962 }
1963 if (pp->function == NULL)
1964 return -ENOMEM;
1965
1966 pp->retprobe = tp->retprobe;
1967
1968 return 0;
1969 }
1970
1971 static int convert_to_perf_probe_event(struct probe_trace_event *tev,
1972 struct perf_probe_event *pev, bool is_kprobe)
1973 {
1974 struct strbuf buf = STRBUF_INIT;
1975 int i, ret;
1976
1977 /* Convert event/group name */
1978 pev->event = strdup(tev->event);
1979 pev->group = strdup(tev->group);
1980 if (pev->event == NULL || pev->group == NULL)
1981 return -ENOMEM;
1982
1983 /* Convert trace_point to probe_point */
1984 ret = convert_to_perf_probe_point(&tev->point, &pev->point, is_kprobe);
1985 if (ret < 0)
1986 return ret;
1987
1988 /* Convert trace_arg to probe_arg */
1989 pev->nargs = tev->nargs;
1990 pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
1991 if (pev->args == NULL)
1992 return -ENOMEM;
1993 for (i = 0; i < tev->nargs && ret >= 0; i++) {
1994 if (tev->args[i].name)
1995 pev->args[i].name = strdup(tev->args[i].name);
1996 else {
1997 if ((ret = strbuf_init(&buf, 32)) < 0)
1998 goto error;
1999 ret = synthesize_probe_trace_arg(&tev->args[i], &buf);
2000 pev->args[i].name = strbuf_detach(&buf, NULL);
2001 }
2002 if (pev->args[i].name == NULL && ret >= 0)
2003 ret = -ENOMEM;
2004 }
2005 error:
2006 if (ret < 0)
2007 clear_perf_probe_event(pev);
2008
2009 return ret;
2010 }
2011
2012 void clear_perf_probe_event(struct perf_probe_event *pev)
2013 {
2014 struct perf_probe_arg_field *field, *next;
2015 int i;
2016
2017 free(pev->event);
2018 free(pev->group);
2019 free(pev->target);
2020 clear_perf_probe_point(&pev->point);
2021
2022 for (i = 0; i < pev->nargs; i++) {
2023 free(pev->args[i].name);
2024 free(pev->args[i].var);
2025 free(pev->args[i].type);
2026 field = pev->args[i].field;
2027 while (field) {
2028 next = field->next;
2029 zfree(&field->name);
2030 free(field);
2031 field = next;
2032 }
2033 }
2034 free(pev->args);
2035 memset(pev, 0, sizeof(*pev));
2036 }
2037
2038 #define strdup_or_goto(str, label) \
2039 ({ char *__p = NULL; if (str && !(__p = strdup(str))) goto label; __p; })
2040
2041 static int perf_probe_point__copy(struct perf_probe_point *dst,
2042 struct perf_probe_point *src)
2043 {
2044 dst->file = strdup_or_goto(src->file, out_err);
2045 dst->function = strdup_or_goto(src->function, out_err);
2046 dst->lazy_line = strdup_or_goto(src->lazy_line, out_err);
2047 dst->line = src->line;
2048 dst->retprobe = src->retprobe;
2049 dst->offset = src->offset;
2050 return 0;
2051
2052 out_err:
2053 clear_perf_probe_point(dst);
2054 return -ENOMEM;
2055 }
2056
2057 static int perf_probe_arg__copy(struct perf_probe_arg *dst,
2058 struct perf_probe_arg *src)
2059 {
2060 struct perf_probe_arg_field *field, **ppfield;
2061
2062 dst->name = strdup_or_goto(src->name, out_err);
2063 dst->var = strdup_or_goto(src->var, out_err);
2064 dst->type = strdup_or_goto(src->type, out_err);
2065
2066 field = src->field;
2067 ppfield = &(dst->field);
2068 while (field) {
2069 *ppfield = zalloc(sizeof(*field));
2070 if (!*ppfield)
2071 goto out_err;
2072 (*ppfield)->name = strdup_or_goto(field->name, out_err);
2073 (*ppfield)->index = field->index;
2074 (*ppfield)->ref = field->ref;
2075 field = field->next;
2076 ppfield = &((*ppfield)->next);
2077 }
2078 return 0;
2079 out_err:
2080 return -ENOMEM;
2081 }
2082
2083 int perf_probe_event__copy(struct perf_probe_event *dst,
2084 struct perf_probe_event *src)
2085 {
2086 int i;
2087
2088 dst->event = strdup_or_goto(src->event, out_err);
2089 dst->group = strdup_or_goto(src->group, out_err);
2090 dst->target = strdup_or_goto(src->target, out_err);
2091 dst->uprobes = src->uprobes;
2092
2093 if (perf_probe_point__copy(&dst->point, &src->point) < 0)
2094 goto out_err;
2095
2096 dst->args = zalloc(sizeof(struct perf_probe_arg) * src->nargs);
2097 if (!dst->args)
2098 goto out_err;
2099 dst->nargs = src->nargs;
2100
2101 for (i = 0; i < src->nargs; i++)
2102 if (perf_probe_arg__copy(&dst->args[i], &src->args[i]) < 0)
2103 goto out_err;
2104 return 0;
2105
2106 out_err:
2107 clear_perf_probe_event(dst);
2108 return -ENOMEM;
2109 }
2110
2111 void clear_probe_trace_event(struct probe_trace_event *tev)
2112 {
2113 struct probe_trace_arg_ref *ref, *next;
2114 int i;
2115
2116 free(tev->event);
2117 free(tev->group);
2118 free(tev->point.symbol);
2119 free(tev->point.realname);
2120 free(tev->point.module);
2121 for (i = 0; i < tev->nargs; i++) {
2122 free(tev->args[i].name);
2123 free(tev->args[i].value);
2124 free(tev->args[i].type);
2125 ref = tev->args[i].ref;
2126 while (ref) {
2127 next = ref->next;
2128 free(ref);
2129 ref = next;
2130 }
2131 }
2132 free(tev->args);
2133 memset(tev, 0, sizeof(*tev));
2134 }
2135
2136 struct kprobe_blacklist_node {
2137 struct list_head list;
2138 unsigned long start;
2139 unsigned long end;
2140 char *symbol;
2141 };
2142
2143 static void kprobe_blacklist__delete(struct list_head *blacklist)
2144 {
2145 struct kprobe_blacklist_node *node;
2146
2147 while (!list_empty(blacklist)) {
2148 node = list_first_entry(blacklist,
2149 struct kprobe_blacklist_node, list);
2150 list_del(&node->list);
2151 free(node->symbol);
2152 free(node);
2153 }
2154 }
2155
2156 static int kprobe_blacklist__load(struct list_head *blacklist)
2157 {
2158 struct kprobe_blacklist_node *node;
2159 const char *__debugfs = debugfs__mountpoint();
2160 char buf[PATH_MAX], *p;
2161 FILE *fp;
2162 int ret;
2163
2164 if (__debugfs == NULL)
2165 return -ENOTSUP;
2166
2167 ret = e_snprintf(buf, PATH_MAX, "%s/kprobes/blacklist", __debugfs);
2168 if (ret < 0)
2169 return ret;
2170
2171 fp = fopen(buf, "r");
2172 if (!fp)
2173 return -errno;
2174
2175 ret = 0;
2176 while (fgets(buf, PATH_MAX, fp)) {
2177 node = zalloc(sizeof(*node));
2178 if (!node) {
2179 ret = -ENOMEM;
2180 break;
2181 }
2182 INIT_LIST_HEAD(&node->list);
2183 list_add_tail(&node->list, blacklist);
2184 if (sscanf(buf, "0x%lx-0x%lx", &node->start, &node->end) != 2) {
2185 ret = -EINVAL;
2186 break;
2187 }
2188 p = strchr(buf, '\t');
2189 if (p) {
2190 p++;
2191 if (p[strlen(p) - 1] == '\n')
2192 p[strlen(p) - 1] = '\0';
2193 } else
2194 p = (char *)"unknown";
2195 node->symbol = strdup(p);
2196 if (!node->symbol) {
2197 ret = -ENOMEM;
2198 break;
2199 }
2200 pr_debug2("Blacklist: 0x%lx-0x%lx, %s\n",
2201 node->start, node->end, node->symbol);
2202 ret++;
2203 }
2204 if (ret < 0)
2205 kprobe_blacklist__delete(blacklist);
2206 fclose(fp);
2207
2208 return ret;
2209 }
2210
2211 static struct kprobe_blacklist_node *
2212 kprobe_blacklist__find_by_address(struct list_head *blacklist,
2213 unsigned long address)
2214 {
2215 struct kprobe_blacklist_node *node;
2216
2217 list_for_each_entry(node, blacklist, list) {
2218 if (node->start <= address && address <= node->end)
2219 return node;
2220 }
2221
2222 return NULL;
2223 }
2224
2225 static LIST_HEAD(kprobe_blacklist);
2226
2227 static void kprobe_blacklist__init(void)
2228 {
2229 if (!list_empty(&kprobe_blacklist))
2230 return;
2231
2232 if (kprobe_blacklist__load(&kprobe_blacklist) < 0)
2233 pr_debug("No kprobe blacklist support, ignored\n");
2234 }
2235
2236 static void kprobe_blacklist__release(void)
2237 {
2238 kprobe_blacklist__delete(&kprobe_blacklist);
2239 }
2240
2241 static bool kprobe_blacklist__listed(unsigned long address)
2242 {
2243 return !!kprobe_blacklist__find_by_address(&kprobe_blacklist, address);
2244 }
2245
2246 static int perf_probe_event__sprintf(const char *group, const char *event,
2247 struct perf_probe_event *pev,
2248 const char *module,
2249 struct strbuf *result)
2250 {
2251 int i, ret;
2252 char *buf;
2253
2254 if (asprintf(&buf, "%s:%s", group, event) < 0)
2255 return -errno;
2256 ret = strbuf_addf(result, " %-20s (on ", buf);
2257 free(buf);
2258 if (ret)
2259 return ret;
2260
2261 /* Synthesize only event probe point */
2262 buf = synthesize_perf_probe_point(&pev->point);
2263 if (!buf)
2264 return -ENOMEM;
2265 ret = strbuf_addstr(result, buf);
2266 free(buf);
2267
2268 if (!ret && module)
2269 ret = strbuf_addf(result, " in %s", module);
2270
2271 if (!ret && pev->nargs > 0) {
2272 ret = strbuf_add(result, " with", 5);
2273 for (i = 0; !ret && i < pev->nargs; i++) {
2274 buf = synthesize_perf_probe_arg(&pev->args[i]);
2275 if (!buf)
2276 return -ENOMEM;
2277 ret = strbuf_addf(result, " %s", buf);
2278 free(buf);
2279 }
2280 }
2281 if (!ret)
2282 ret = strbuf_addch(result, ')');
2283
2284 return ret;
2285 }
2286
2287 /* Show an event */
2288 int show_perf_probe_event(const char *group, const char *event,
2289 struct perf_probe_event *pev,
2290 const char *module, bool use_stdout)
2291 {
2292 struct strbuf buf = STRBUF_INIT;
2293 int ret;
2294
2295 ret = perf_probe_event__sprintf(group, event, pev, module, &buf);
2296 if (ret >= 0) {
2297 if (use_stdout)
2298 printf("%s\n", buf.buf);
2299 else
2300 pr_info("%s\n", buf.buf);
2301 }
2302 strbuf_release(&buf);
2303
2304 return ret;
2305 }
2306
2307 static bool filter_probe_trace_event(struct probe_trace_event *tev,
2308 struct strfilter *filter)
2309 {
2310 char tmp[128];
2311
2312 /* At first, check the event name itself */
2313 if (strfilter__compare(filter, tev->event))
2314 return true;
2315
2316 /* Next, check the combination of name and group */
2317 if (e_snprintf(tmp, 128, "%s:%s", tev->group, tev->event) < 0)
2318 return false;
2319 return strfilter__compare(filter, tmp);
2320 }
2321
2322 static int __show_perf_probe_events(int fd, bool is_kprobe,
2323 struct strfilter *filter)
2324 {
2325 int ret = 0;
2326 struct probe_trace_event tev;
2327 struct perf_probe_event pev;
2328 struct strlist *rawlist;
2329 struct str_node *ent;
2330
2331 memset(&tev, 0, sizeof(tev));
2332 memset(&pev, 0, sizeof(pev));
2333
2334 rawlist = probe_file__get_rawlist(fd);
2335 if (!rawlist)
2336 return -ENOMEM;
2337
2338 strlist__for_each(ent, rawlist) {
2339 ret = parse_probe_trace_command(ent->s, &tev);
2340 if (ret >= 0) {
2341 if (!filter_probe_trace_event(&tev, filter))
2342 goto next;
2343 ret = convert_to_perf_probe_event(&tev, &pev,
2344 is_kprobe);
2345 if (ret < 0)
2346 goto next;
2347 ret = show_perf_probe_event(pev.group, pev.event,
2348 &pev, tev.point.module,
2349 true);
2350 }
2351 next:
2352 clear_perf_probe_event(&pev);
2353 clear_probe_trace_event(&tev);
2354 if (ret < 0)
2355 break;
2356 }
2357 strlist__delete(rawlist);
2358 /* Cleanup cached debuginfo if needed */
2359 debuginfo_cache__exit();
2360
2361 return ret;
2362 }
2363
2364 /* List up current perf-probe events */
2365 int show_perf_probe_events(struct strfilter *filter)
2366 {
2367 int kp_fd, up_fd, ret;
2368
2369 setup_pager();
2370
2371 ret = init_probe_symbol_maps(false);
2372 if (ret < 0)
2373 return ret;
2374
2375 ret = probe_file__open_both(&kp_fd, &up_fd, 0);
2376 if (ret < 0)
2377 return ret;
2378
2379 if (kp_fd >= 0)
2380 ret = __show_perf_probe_events(kp_fd, true, filter);
2381 if (up_fd >= 0 && ret >= 0)
2382 ret = __show_perf_probe_events(up_fd, false, filter);
2383 if (kp_fd > 0)
2384 close(kp_fd);
2385 if (up_fd > 0)
2386 close(up_fd);
2387 exit_probe_symbol_maps();
2388
2389 return ret;
2390 }
2391
2392 static int get_new_event_name(char *buf, size_t len, const char *base,
2393 struct strlist *namelist, bool allow_suffix)
2394 {
2395 int i, ret;
2396 char *p, *nbase;
2397
2398 if (*base == '.')
2399 base++;
2400 nbase = strdup(base);
2401 if (!nbase)
2402 return -ENOMEM;
2403
2404 /* Cut off the dot suffixes (e.g. .const, .isra)*/
2405 p = strchr(nbase, '.');
2406 if (p && p != nbase)
2407 *p = '\0';
2408
2409 /* Try no suffix number */
2410 ret = e_snprintf(buf, len, "%s", nbase);
2411 if (ret < 0) {
2412 pr_debug("snprintf() failed: %d\n", ret);
2413 goto out;
2414 }
2415 if (!strlist__has_entry(namelist, buf))
2416 goto out;
2417
2418 if (!allow_suffix) {
2419 pr_warning("Error: event \"%s\" already exists.\n"
2420 " Hint: Remove existing event by 'perf probe -d'\n"
2421 " or force duplicates by 'perf probe -f'\n"
2422 " or set 'force=yes' in BPF source.\n",
2423 buf);
2424 ret = -EEXIST;
2425 goto out;
2426 }
2427
2428 /* Try to add suffix */
2429 for (i = 1; i < MAX_EVENT_INDEX; i++) {
2430 ret = e_snprintf(buf, len, "%s_%d", nbase, i);
2431 if (ret < 0) {
2432 pr_debug("snprintf() failed: %d\n", ret);
2433 goto out;
2434 }
2435 if (!strlist__has_entry(namelist, buf))
2436 break;
2437 }
2438 if (i == MAX_EVENT_INDEX) {
2439 pr_warning("Too many events are on the same function.\n");
2440 ret = -ERANGE;
2441 }
2442
2443 out:
2444 free(nbase);
2445 return ret;
2446 }
2447
2448 /* Warn if the current kernel's uprobe implementation is old */
2449 static void warn_uprobe_event_compat(struct probe_trace_event *tev)
2450 {
2451 int i;
2452 char *buf = synthesize_probe_trace_command(tev);
2453
2454 /* Old uprobe event doesn't support memory dereference */
2455 if (!tev->uprobes || tev->nargs == 0 || !buf)
2456 goto out;
2457
2458 for (i = 0; i < tev->nargs; i++)
2459 if (strglobmatch(tev->args[i].value, "[$@+-]*")) {
2460 pr_warning("Please upgrade your kernel to at least "
2461 "3.14 to have access to feature %s\n",
2462 tev->args[i].value);
2463 break;
2464 }
2465 out:
2466 free(buf);
2467 }
2468
2469 /* Set new name from original perf_probe_event and namelist */
2470 static int probe_trace_event__set_name(struct probe_trace_event *tev,
2471 struct perf_probe_event *pev,
2472 struct strlist *namelist,
2473 bool allow_suffix)
2474 {
2475 const char *event, *group;
2476 char buf[64];
2477 int ret;
2478
2479 if (pev->event)
2480 event = pev->event;
2481 else
2482 if (pev->point.function &&
2483 (strncmp(pev->point.function, "0x", 2) != 0) &&
2484 !strisglob(pev->point.function))
2485 event = pev->point.function;
2486 else
2487 event = tev->point.realname;
2488 if (pev->group)
2489 group = pev->group;
2490 else
2491 group = PERFPROBE_GROUP;
2492
2493 /* Get an unused new event name */
2494 ret = get_new_event_name(buf, 64, event,
2495 namelist, allow_suffix);
2496 if (ret < 0)
2497 return ret;
2498
2499 event = buf;
2500
2501 tev->event = strdup(event);
2502 tev->group = strdup(group);
2503 if (tev->event == NULL || tev->group == NULL)
2504 return -ENOMEM;
2505
2506 /* Add added event name to namelist */
2507 strlist__add(namelist, event);
2508 return 0;
2509 }
2510
2511 static int __add_probe_trace_events(struct perf_probe_event *pev,
2512 struct probe_trace_event *tevs,
2513 int ntevs, bool allow_suffix)
2514 {
2515 int i, fd, ret;
2516 struct probe_trace_event *tev = NULL;
2517 struct probe_cache *cache = NULL;
2518 struct strlist *namelist;
2519
2520 fd = probe_file__open(PF_FL_RW | (pev->uprobes ? PF_FL_UPROBE : 0));
2521 if (fd < 0)
2522 return fd;
2523
2524 /* Get current event names */
2525 namelist = probe_file__get_namelist(fd);
2526 if (!namelist) {
2527 pr_debug("Failed to get current event list.\n");
2528 ret = -ENOMEM;
2529 goto close_out;
2530 }
2531
2532 ret = 0;
2533 for (i = 0; i < ntevs; i++) {
2534 tev = &tevs[i];
2535 /* Skip if the symbol is out of .text or blacklisted */
2536 if (!tev->point.symbol)
2537 continue;
2538
2539 /* Set new name for tev (and update namelist) */
2540 ret = probe_trace_event__set_name(tev, pev, namelist,
2541 allow_suffix);
2542 if (ret < 0)
2543 break;
2544
2545 ret = probe_file__add_event(fd, tev);
2546 if (ret < 0)
2547 break;
2548
2549 /*
2550 * Probes after the first probe which comes from same
2551 * user input are always allowed to add suffix, because
2552 * there might be several addresses corresponding to
2553 * one code line.
2554 */
2555 allow_suffix = true;
2556 }
2557 if (ret == -EINVAL && pev->uprobes)
2558 warn_uprobe_event_compat(tev);
2559 if (ret == 0 && probe_conf.cache) {
2560 cache = probe_cache__new(pev->target);
2561 if (!cache ||
2562 probe_cache__add_entry(cache, pev, tevs, ntevs) < 0 ||
2563 probe_cache__commit(cache) < 0)
2564 pr_warning("Failed to add event to probe cache\n");
2565 probe_cache__delete(cache);
2566 }
2567
2568 strlist__delete(namelist);
2569 close_out:
2570 close(fd);
2571 return ret;
2572 }
2573
2574 static int find_probe_functions(struct map *map, char *name,
2575 struct symbol **syms)
2576 {
2577 int found = 0;
2578 struct symbol *sym;
2579 struct rb_node *tmp;
2580
2581 if (map__load(map, NULL) < 0)
2582 return 0;
2583
2584 map__for_each_symbol(map, sym, tmp) {
2585 if (strglobmatch(sym->name, name)) {
2586 found++;
2587 if (syms && found < probe_conf.max_probes)
2588 syms[found - 1] = sym;
2589 }
2590 }
2591
2592 return found;
2593 }
2594
2595 void __weak arch__fix_tev_from_maps(struct perf_probe_event *pev __maybe_unused,
2596 struct probe_trace_event *tev __maybe_unused,
2597 struct map *map __maybe_unused,
2598 struct symbol *sym __maybe_unused) { }
2599
2600 /*
2601 * Find probe function addresses from map.
2602 * Return an error or the number of found probe_trace_event
2603 */
2604 static int find_probe_trace_events_from_map(struct perf_probe_event *pev,
2605 struct probe_trace_event **tevs)
2606 {
2607 struct map *map = NULL;
2608 struct ref_reloc_sym *reloc_sym = NULL;
2609 struct symbol *sym;
2610 struct symbol **syms = NULL;
2611 struct probe_trace_event *tev;
2612 struct perf_probe_point *pp = &pev->point;
2613 struct probe_trace_point *tp;
2614 int num_matched_functions;
2615 int ret, i, j, skipped = 0;
2616 char *mod_name;
2617
2618 map = get_target_map(pev->target, pev->uprobes);
2619 if (!map) {
2620 ret = -EINVAL;
2621 goto out;
2622 }
2623
2624 syms = malloc(sizeof(struct symbol *) * probe_conf.max_probes);
2625 if (!syms) {
2626 ret = -ENOMEM;
2627 goto out;
2628 }
2629
2630 /*
2631 * Load matched symbols: Since the different local symbols may have
2632 * same name but different addresses, this lists all the symbols.
2633 */
2634 num_matched_functions = find_probe_functions(map, pp->function, syms);
2635 if (num_matched_functions == 0) {
2636 pr_err("Failed to find symbol %s in %s\n", pp->function,
2637 pev->target ? : "kernel");
2638 ret = -ENOENT;
2639 goto out;
2640 } else if (num_matched_functions > probe_conf.max_probes) {
2641 pr_err("Too many functions matched in %s\n",
2642 pev->target ? : "kernel");
2643 ret = -E2BIG;
2644 goto out;
2645 }
2646
2647 /* Note that the symbols in the kmodule are not relocated */
2648 if (!pev->uprobes && !pp->retprobe && !pev->target) {
2649 reloc_sym = kernel_get_ref_reloc_sym();
2650 if (!reloc_sym) {
2651 pr_warning("Relocated base symbol is not found!\n");
2652 ret = -EINVAL;
2653 goto out;
2654 }
2655 }
2656
2657 /* Setup result trace-probe-events */
2658 *tevs = zalloc(sizeof(*tev) * num_matched_functions);
2659 if (!*tevs) {
2660 ret = -ENOMEM;
2661 goto out;
2662 }
2663
2664 ret = 0;
2665
2666 for (j = 0; j < num_matched_functions; j++) {
2667 sym = syms[j];
2668
2669 tev = (*tevs) + ret;
2670 tp = &tev->point;
2671 if (ret == num_matched_functions) {
2672 pr_warning("Too many symbols are listed. Skip it.\n");
2673 break;
2674 }
2675 ret++;
2676
2677 if (pp->offset > sym->end - sym->start) {
2678 pr_warning("Offset %ld is bigger than the size of %s\n",
2679 pp->offset, sym->name);
2680 ret = -ENOENT;
2681 goto err_out;
2682 }
2683 /* Add one probe point */
2684 tp->address = map->unmap_ip(map, sym->start) + pp->offset;
2685
2686 /* Check the kprobe (not in module) is within .text */
2687 if (!pev->uprobes && !pev->target &&
2688 kprobe_warn_out_range(sym->name, tp->address)) {
2689 tp->symbol = NULL; /* Skip it */
2690 skipped++;
2691 } else if (reloc_sym) {
2692 tp->symbol = strdup_or_goto(reloc_sym->name, nomem_out);
2693 tp->offset = tp->address - reloc_sym->addr;
2694 } else {
2695 tp->symbol = strdup_or_goto(sym->name, nomem_out);
2696 tp->offset = pp->offset;
2697 }
2698 tp->realname = strdup_or_goto(sym->name, nomem_out);
2699
2700 tp->retprobe = pp->retprobe;
2701 if (pev->target) {
2702 if (pev->uprobes) {
2703 tev->point.module = strdup_or_goto(pev->target,
2704 nomem_out);
2705 } else {
2706 mod_name = find_module_name(pev->target);
2707 tev->point.module =
2708 strdup(mod_name ? mod_name : pev->target);
2709 free(mod_name);
2710 if (!tev->point.module)
2711 goto nomem_out;
2712 }
2713 }
2714 tev->uprobes = pev->uprobes;
2715 tev->nargs = pev->nargs;
2716 if (tev->nargs) {
2717 tev->args = zalloc(sizeof(struct probe_trace_arg) *
2718 tev->nargs);
2719 if (tev->args == NULL)
2720 goto nomem_out;
2721 }
2722 for (i = 0; i < tev->nargs; i++) {
2723 if (pev->args[i].name)
2724 tev->args[i].name =
2725 strdup_or_goto(pev->args[i].name,
2726 nomem_out);
2727
2728 tev->args[i].value = strdup_or_goto(pev->args[i].var,
2729 nomem_out);
2730 if (pev->args[i].type)
2731 tev->args[i].type =
2732 strdup_or_goto(pev->args[i].type,
2733 nomem_out);
2734 }
2735 arch__fix_tev_from_maps(pev, tev, map, sym);
2736 }
2737 if (ret == skipped) {
2738 ret = -ENOENT;
2739 goto err_out;
2740 }
2741
2742 out:
2743 put_target_map(map, pev->uprobes);
2744 free(syms);
2745 return ret;
2746
2747 nomem_out:
2748 ret = -ENOMEM;
2749 err_out:
2750 clear_probe_trace_events(*tevs, num_matched_functions);
2751 zfree(tevs);
2752 goto out;
2753 }
2754
2755 static int try_to_find_absolute_address(struct perf_probe_event *pev,
2756 struct probe_trace_event **tevs)
2757 {
2758 struct perf_probe_point *pp = &pev->point;
2759 struct probe_trace_event *tev;
2760 struct probe_trace_point *tp;
2761 int i, err;
2762
2763 if (!(pev->point.function && !strncmp(pev->point.function, "0x", 2)))
2764 return -EINVAL;
2765 if (perf_probe_event_need_dwarf(pev))
2766 return -EINVAL;
2767
2768 /*
2769 * This is 'perf probe /lib/libc.so 0xabcd'. Try to probe at
2770 * absolute address.
2771 *
2772 * Only one tev can be generated by this.
2773 */
2774 *tevs = zalloc(sizeof(*tev));
2775 if (!*tevs)
2776 return -ENOMEM;
2777
2778 tev = *tevs;
2779 tp = &tev->point;
2780
2781 /*
2782 * Don't use tp->offset, use address directly, because
2783 * in synthesize_probe_trace_command() address cannot be
2784 * zero.
2785 */
2786 tp->address = pev->point.abs_address;
2787 tp->retprobe = pp->retprobe;
2788 tev->uprobes = pev->uprobes;
2789
2790 err = -ENOMEM;
2791 /*
2792 * Give it a '0x' leading symbol name.
2793 * In __add_probe_trace_events, a NULL symbol is interpreted as
2794 * invalud.
2795 */
2796 if (asprintf(&tp->symbol, "0x%lx", tp->address) < 0)
2797 goto errout;
2798
2799 /* For kprobe, check range */
2800 if ((!tev->uprobes) &&
2801 (kprobe_warn_out_range(tev->point.symbol,
2802 tev->point.address))) {
2803 err = -EACCES;
2804 goto errout;
2805 }
2806
2807 if (asprintf(&tp->realname, "abs_%lx", tp->address) < 0)
2808 goto errout;
2809
2810 if (pev->target) {
2811 tp->module = strdup(pev->target);
2812 if (!tp->module)
2813 goto errout;
2814 }
2815
2816 if (tev->group) {
2817 tev->group = strdup(pev->group);
2818 if (!tev->group)
2819 goto errout;
2820 }
2821
2822 if (pev->event) {
2823 tev->event = strdup(pev->event);
2824 if (!tev->event)
2825 goto errout;
2826 }
2827
2828 tev->nargs = pev->nargs;
2829 tev->args = zalloc(sizeof(struct probe_trace_arg) * tev->nargs);
2830 if (!tev->args) {
2831 err = -ENOMEM;
2832 goto errout;
2833 }
2834 for (i = 0; i < tev->nargs; i++)
2835 copy_to_probe_trace_arg(&tev->args[i], &pev->args[i]);
2836
2837 return 1;
2838
2839 errout:
2840 if (*tevs) {
2841 clear_probe_trace_events(*tevs, 1);
2842 *tevs = NULL;
2843 }
2844 return err;
2845 }
2846
2847 bool __weak arch__prefers_symtab(void) { return false; }
2848
2849 static int convert_to_probe_trace_events(struct perf_probe_event *pev,
2850 struct probe_trace_event **tevs)
2851 {
2852 int ret;
2853
2854 if (!pev->group) {
2855 /* Set group name if not given */
2856 if (!pev->uprobes) {
2857 pev->group = strdup(PERFPROBE_GROUP);
2858 ret = pev->group ? 0 : -ENOMEM;
2859 } else
2860 ret = convert_exec_to_group(pev->target, &pev->group);
2861 if (ret != 0) {
2862 pr_warning("Failed to make a group name.\n");
2863 return ret;
2864 }
2865 }
2866
2867 ret = try_to_find_absolute_address(pev, tevs);
2868 if (ret > 0)
2869 return ret;
2870
2871 if (arch__prefers_symtab() && !perf_probe_event_need_dwarf(pev)) {
2872 ret = find_probe_trace_events_from_map(pev, tevs);
2873 if (ret > 0)
2874 return ret; /* Found in symbol table */
2875 }
2876
2877 /* Convert perf_probe_event with debuginfo */
2878 ret = try_to_find_probe_trace_events(pev, tevs);
2879 if (ret != 0)
2880 return ret; /* Found in debuginfo or got an error */
2881
2882 return find_probe_trace_events_from_map(pev, tevs);
2883 }
2884
2885 int convert_perf_probe_events(struct perf_probe_event *pevs, int npevs)
2886 {
2887 int i, ret;
2888
2889 /* Loop 1: convert all events */
2890 for (i = 0; i < npevs; i++) {
2891 /* Init kprobe blacklist if needed */
2892 if (!pevs[i].uprobes)
2893 kprobe_blacklist__init();
2894 /* Convert with or without debuginfo */
2895 ret = convert_to_probe_trace_events(&pevs[i], &pevs[i].tevs);
2896 if (ret < 0)
2897 return ret;
2898 pevs[i].ntevs = ret;
2899 }
2900 /* This just release blacklist only if allocated */
2901 kprobe_blacklist__release();
2902
2903 return 0;
2904 }
2905
2906 int apply_perf_probe_events(struct perf_probe_event *pevs, int npevs)
2907 {
2908 int i, ret = 0;
2909
2910 /* Loop 2: add all events */
2911 for (i = 0; i < npevs; i++) {
2912 ret = __add_probe_trace_events(&pevs[i], pevs[i].tevs,
2913 pevs[i].ntevs,
2914 probe_conf.force_add);
2915 if (ret < 0)
2916 break;
2917 }
2918 return ret;
2919 }
2920
2921 void cleanup_perf_probe_events(struct perf_probe_event *pevs, int npevs)
2922 {
2923 int i, j;
2924
2925 /* Loop 3: cleanup and free trace events */
2926 for (i = 0; i < npevs; i++) {
2927 for (j = 0; j < pevs[i].ntevs; j++)
2928 clear_probe_trace_event(&pevs[i].tevs[j]);
2929 zfree(&pevs[i].tevs);
2930 pevs[i].ntevs = 0;
2931 clear_perf_probe_event(&pevs[i]);
2932 }
2933 }
2934
2935 int add_perf_probe_events(struct perf_probe_event *pevs, int npevs)
2936 {
2937 int ret;
2938
2939 ret = init_probe_symbol_maps(pevs->uprobes);
2940 if (ret < 0)
2941 return ret;
2942
2943 ret = convert_perf_probe_events(pevs, npevs);
2944 if (ret == 0)
2945 ret = apply_perf_probe_events(pevs, npevs);
2946
2947 cleanup_perf_probe_events(pevs, npevs);
2948
2949 exit_probe_symbol_maps();
2950 return ret;
2951 }
2952
2953 int del_perf_probe_events(struct strfilter *filter)
2954 {
2955 int ret, ret2, ufd = -1, kfd = -1;
2956 char *str = strfilter__string(filter);
2957
2958 if (!str)
2959 return -EINVAL;
2960
2961 /* Get current event names */
2962 ret = probe_file__open_both(&kfd, &ufd, PF_FL_RW);
2963 if (ret < 0)
2964 goto out;
2965
2966 ret = probe_file__del_events(kfd, filter);
2967 if (ret < 0 && ret != -ENOENT)
2968 goto error;
2969
2970 ret2 = probe_file__del_events(ufd, filter);
2971 if (ret2 < 0 && ret2 != -ENOENT) {
2972 ret = ret2;
2973 goto error;
2974 }
2975 ret = 0;
2976
2977 error:
2978 if (kfd >= 0)
2979 close(kfd);
2980 if (ufd >= 0)
2981 close(ufd);
2982 out:
2983 free(str);
2984
2985 return ret;
2986 }
2987
2988 /* TODO: don't use a global variable for filter ... */
2989 static struct strfilter *available_func_filter;
2990
2991 /*
2992 * If a symbol corresponds to a function with global binding and
2993 * matches filter return 0. For all others return 1.
2994 */
2995 static int filter_available_functions(struct map *map __maybe_unused,
2996 struct symbol *sym)
2997 {
2998 if (strfilter__compare(available_func_filter, sym->name))
2999 return 0;
3000 return 1;
3001 }
3002
3003 int show_available_funcs(const char *target, struct strfilter *_filter,
3004 bool user)
3005 {
3006 struct map *map;
3007 int ret;
3008
3009 ret = init_probe_symbol_maps(user);
3010 if (ret < 0)
3011 return ret;
3012
3013 /* Get a symbol map */
3014 if (user)
3015 map = dso__new_map(target);
3016 else
3017 map = kernel_get_module_map(target);
3018 if (!map) {
3019 pr_err("Failed to get a map for %s\n", (target) ? : "kernel");
3020 return -EINVAL;
3021 }
3022
3023 /* Load symbols with given filter */
3024 available_func_filter = _filter;
3025 if (map__load(map, filter_available_functions)) {
3026 pr_err("Failed to load symbols in %s\n", (target) ? : "kernel");
3027 goto end;
3028 }
3029 if (!dso__sorted_by_name(map->dso, map->type))
3030 dso__sort_by_name(map->dso, map->type);
3031
3032 /* Show all (filtered) symbols */
3033 setup_pager();
3034 dso__fprintf_symbols_by_name(map->dso, map->type, stdout);
3035 end:
3036 if (user) {
3037 map__put(map);
3038 }
3039 exit_probe_symbol_maps();
3040
3041 return ret;
3042 }
3043
3044 int copy_to_probe_trace_arg(struct probe_trace_arg *tvar,
3045 struct perf_probe_arg *pvar)
3046 {
3047 tvar->value = strdup(pvar->var);
3048 if (tvar->value == NULL)
3049 return -ENOMEM;
3050 if (pvar->type) {
3051 tvar->type = strdup(pvar->type);
3052 if (tvar->type == NULL)
3053 return -ENOMEM;
3054 }
3055 if (pvar->name) {
3056 tvar->name = strdup(pvar->name);
3057 if (tvar->name == NULL)
3058 return -ENOMEM;
3059 } else
3060 tvar->name = NULL;
3061 return 0;
3062 }
This page took 0.093412 seconds and 6 git commands to generate.