probe-event.c 36.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
/*
 * probe-event.c : perf-probe definition to kprobe_events format converter
 *
 * Written by Masami Hiramatsu <mhiramat@redhat.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 *
 */

#define _GNU_SOURCE
#include <sys/utsname.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <errno.h>
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
32 33
#include <stdarg.h>
#include <limits.h>
34 35

#undef _GNU_SOURCE
36
#include "util.h"
37
#include "event.h"
38
#include "string.h"
39
#include "strlist.h"
40
#include "debug.h"
41
#include "cache.h"
42
#include "color.h"
43 44
#include "symbol.h"
#include "thread.h"
45
#include "debugfs.h"
46
#include "trace-event.h"	/* For __unused */
47
#include "probe-event.h"
48
#include "probe-finder.h"
49 50 51 52 53

#define MAX_CMDLEN 256
#define MAX_PROBE_ARGS 128
#define PERFPROBE_GROUP "probe"

54 55
bool probe_event_dry_run;	/* Dry run flag */

56
#define semantic_error(msg ...) pr_err("Semantic error :" msg)
57

58
/* If there is no space to write, returns -E2BIG. */
59 60 61
static int e_snprintf(char *str, size_t size, const char *format, ...)
	__attribute__((format(printf, 3, 4)));

62 63 64 65 66 67 68 69 70 71 72 73
static int e_snprintf(char *str, size_t size, const char *format, ...)
{
	int ret;
	va_list ap;
	va_start(ap, format);
	ret = vsnprintf(str, size, format, ap);
	va_end(ap);
	if (ret >= (int)size)
		ret = -E2BIG;
	return ret;
}

74
static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
75
static struct machine machine;
76

77
/* Initialize symbol maps and path of vmlinux */
78
static int init_vmlinux(void)
79
{
80
	struct dso *kernel;
81 82
	int ret;

83 84 85 86 87
	symbol_conf.sort_by_name = true;
	if (symbol_conf.vmlinux_name == NULL)
		symbol_conf.try_vmlinux_path = true;
	else
		pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
88 89 90 91 92
	ret = symbol__init();
	if (ret < 0) {
		pr_debug("Failed to init symbol map.\n");
		goto out;
	}
93

94 95 96 97
	ret = machine__init(&machine, "/", 0);
	if (ret < 0)
		goto out;

98 99 100 101
	kernel = dso__new_kernel(symbol_conf.vmlinux_name);
	if (kernel == NULL)
		die("Failed to create kernel dso.");

102
	ret = __machine__create_kernel_maps(&machine, kernel);
103 104 105 106 107 108 109
	if (ret < 0)
		pr_debug("Failed to create kernel maps.\n");

out:
	if (ret < 0)
		pr_warning("Failed to init vmlinux path.\n");
	return ret;
110 111
}

112
#ifdef DWARF_SUPPORT
113 114
static int open_vmlinux(void)
{
115
	if (map__load(machine.vmlinux_maps[MAP__FUNCTION], NULL) < 0) {
116 117 118
		pr_debug("Failed to load kernel map.\n");
		return -EINVAL;
	}
119 120
	pr_debug("Try to open %s\n", machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name);
	return open(machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
121
}
122

123 124 125
/* Convert trace point to probe point with debuginfo */
static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
				       struct perf_probe_point *pp)
126 127
{
	struct symbol *sym;
128
	int fd, ret = -ENOENT;
129

130
	sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
131 132 133
				       tp->symbol, NULL);
	if (sym) {
		fd = open_vmlinux();
134 135 136 137 138
		if (fd >= 0) {
			ret = find_perf_probe_point(fd,
						 sym->start + tp->offset, pp);
			close(fd);
		}
139 140
	}
	if (ret <= 0) {
141 142
		pr_debug("Failed to find corresponding probes from "
			 "debuginfo. Use kprobe event information.\n");
143 144 145
		pp->function = strdup(tp->symbol);
		if (pp->function == NULL)
			return -ENOMEM;
146 147 148
		pp->offset = tp->offset;
	}
	pp->retprobe = tp->retprobe;
149 150

	return 0;
151 152 153 154
}

/* Try to find perf_probe_event with debuginfo */
static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
155 156
					   struct kprobe_trace_event **tevs,
					   int max_tevs)
157 158 159 160 161 162
{
	bool need_dwarf = perf_probe_event_need_dwarf(pev);
	int fd, ntevs;

	fd = open_vmlinux();
	if (fd < 0) {
163 164 165 166
		if (need_dwarf) {
			pr_warning("Failed to open debuginfo file.\n");
			return fd;
		}
167 168 169 170 171
		pr_debug("Could not open vmlinux. Try to use symbols.\n");
		return 0;
	}

	/* Searching trace events corresponding to probe event */
172
	ntevs = find_kprobe_trace_events(fd, pev, tevs, max_tevs);
173 174
	close(fd);

175 176
	if (ntevs > 0) {	/* Succeeded to find trace events */
		pr_debug("find %d kprobe_trace_events.\n", ntevs);
177
		return ntevs;
178
	}
179

180 181 182 183 184 185
	if (ntevs == 0)	{	/* No error but failed to find probe point. */
		pr_warning("Probe point '%s' not found.\n",
			   synthesize_perf_probe_point(&pev->point));
		return -ENOENT;
	}
	/* Error path : ntevs < 0 */
186 187 188 189 190 191 192 193
	pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
	if (ntevs == -EBADF) {
		pr_warning("Warning: No dwarf info found in the vmlinux - "
			"please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
		if (!need_dwarf) {
			pr_debug("Trying to use symbols.\nn");
			return 0;
		}
194
	}
195
	return ntevs;
196 197 198 199 200
}

#define LINEBUF_SIZE 256
#define NR_ADDITIONAL_LINES 2

201
static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
202 203 204 205 206 207 208 209
{
	char buf[LINEBUF_SIZE];
	const char *color = PERF_COLOR_BLUE;

	if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
		goto error;
	if (!skip) {
		if (show_num)
210
			fprintf(stdout, "%7d  %s", l, buf);
211 212 213 214 215 216 217 218 219 220 221 222 223 224 225
		else
			color_fprintf(stdout, color, "         %s", buf);
	}

	while (strlen(buf) == LINEBUF_SIZE - 1 &&
	       buf[LINEBUF_SIZE - 2] != '\n') {
		if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
			goto error;
		if (!skip) {
			if (show_num)
				fprintf(stdout, "%s", buf);
			else
				color_fprintf(stdout, color, "%s", buf);
		}
	}
226 227

	return 0;
228 229
error:
	if (feof(fp))
230
		pr_warning("Source file is shorter than expected.\n");
231
	else
232 233 234
		pr_warning("File read error: %s\n", strerror(errno));

	return -1;
235 236 237 238 239 240
}

/*
 * Show line-range always requires debuginfo to find source file and
 * line number.
 */
241
int show_line_range(struct line_range *lr)
242
{
243
	int l = 1;
244 245 246 247 248
	struct line_node *ln;
	FILE *fp;
	int fd, ret;

	/* Search a line range */
249 250 251 252
	ret = init_vmlinux();
	if (ret < 0)
		return ret;

253
	fd = open_vmlinux();
254 255 256 257 258
	if (fd < 0) {
		pr_warning("Failed to open debuginfo file.\n");
		return fd;
	}

259 260
	ret = find_line_range(fd, lr);
	close(fd);
261 262 263 264 265 266 267
	if (ret == 0) {
		pr_warning("Specified source line is not found.\n");
		return -ENOENT;
	} else if (ret < 0) {
		pr_warning("Debuginfo analysis failed. (%d)\n", ret);
		return ret;
	}
268 269 270 271 272 273 274 275 276 277

	setup_pager();

	if (lr->function)
		fprintf(stdout, "<%s:%d>\n", lr->function,
			lr->start - lr->offset);
	else
		fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);

	fp = fopen(lr->path, "r");
278 279 280 281 282
	if (fp == NULL) {
		pr_warning("Failed to open %s: %s\n", lr->path,
			   strerror(errno));
		return -errno;
	}
283
	/* Skip to starting line number */
284 285 286 287
	while (l < lr->start && ret >= 0)
		ret = show_one_line(fp, l++, true, false);
	if (ret < 0)
		goto end;
288 289

	list_for_each_entry(ln, &lr->line_list, list) {
290 291 292 293 294 295 296 297
		while (ln->line > l && ret >= 0)
			ret = show_one_line(fp, (l++) - lr->offset,
					    false, false);
		if (ret >= 0)
			ret = show_one_line(fp, (l++) - lr->offset,
					    false, true);
		if (ret < 0)
			goto end;
298 299 300 301
	}

	if (lr->end == INT_MAX)
		lr->end = l + NR_ADDITIONAL_LINES;
302
	while (l <= lr->end && !feof(fp) && ret >= 0)
303 304
		ret = show_one_line(fp, (l++) - lr->offset, false, false);
end:
305
	fclose(fp);
306
	return ret;
307 308 309 310
}

#else	/* !DWARF_SUPPORT */

311
static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
312 313
					struct perf_probe_point *pp)
{
314 315 316
	pp->function = strdup(tp->symbol);
	if (pp->function == NULL)
		return -ENOMEM;
317 318
	pp->offset = tp->offset;
	pp->retprobe = tp->retprobe;
319 320

	return 0;
321 322 323
}

static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
324 325
				struct kprobe_trace_event **tevs __unused,
				int max_tevs __unused)
326
{
327 328 329 330
	if (perf_probe_event_need_dwarf(pev)) {
		pr_warning("Debuginfo-analysis is not supported.\n");
		return -ENOSYS;
	}
331 332 333
	return 0;
}

334
int show_line_range(struct line_range *lr __unused)
335
{
336 337
	pr_warning("Debuginfo-analysis is not supported.\n");
	return -ENOSYS;
338 339
}

340 341
#endif

342
int parse_line_range_desc(const char *arg, struct line_range *lr)
343 344 345 346 347 348 349 350 351 352
{
	const char *ptr;
	char *tmp;
	/*
	 * <Syntax>
	 * SRC:SLN[+NUM|-ELN]
	 * FUNC[:SLN[+NUM|-ELN]]
	 */
	ptr = strchr(arg, ':');
	if (ptr) {
353
		lr->start = (int)strtoul(ptr + 1, &tmp, 0);
354
		if (*tmp == '+') {
355
			lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
356 357 358 359 360 361 362
			lr->end--;	/*
					 * Adjust the number of lines here.
					 * If the number of lines == 1, the
					 * the end of line should be equal to
					 * the start of line.
					 */
		} else if (*tmp == '-')
363
			lr->end = (int)strtoul(tmp + 1, &tmp, 0);
364
		else
365 366 367
			lr->end = INT_MAX;
		pr_debug("Line range is %d to %d\n", lr->start, lr->end);
		if (lr->start > lr->end) {
368
			semantic_error("Start line must be smaller"
369 370 371 372 373
				       " than end line.\n");
			return -EINVAL;
		}
		if (*tmp != '\0') {
			semantic_error("Tailing with invalid character '%d'.\n",
374
				       *tmp);
375 376
			return -EINVAL;
		}
377
		tmp = strndup(arg, (ptr - arg));
378
	} else {
379
		tmp = strdup(arg);
380 381
		lr->end = INT_MAX;
	}
382 383 384

	if (tmp == NULL)
		return -ENOMEM;
385 386 387 388 389

	if (strchr(tmp, '.'))
		lr->file = tmp;
	else
		lr->function = tmp;
390 391

	return 0;
392 393
}

394 395 396 397 398 399 400 401 402 403 404 405
/* Check the name is good for event/group */
static bool check_event_name(const char *name)
{
	if (!isalpha(*name) && *name != '_')
		return false;
	while (*++name != '\0') {
		if (!isalpha(*name) && !isdigit(*name) && *name != '_')
			return false;
	}
	return true;
}

406
/* Parse probepoint definition. */
407
static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
408
{
409
	struct perf_probe_point *pp = &pev->point;
410 411 412 413
	char *ptr, *tmp;
	char c, nc = 0;
	/*
	 * <Syntax>
414 415
	 * perf probe [EVENT=]SRC[:LN|;PTN]
	 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
416 417
	 *
	 * TODO:Group name support
418 419
	 */

420 421
	ptr = strpbrk(arg, ";=@+%");
	if (ptr && *ptr == '=') {	/* Event name */
422 423
		*ptr = '\0';
		tmp = ptr + 1;
424 425 426 427 428
		if (strchr(arg, ':')) {
			semantic_error("Group name is not supported yet.\n");
			return -ENOTSUP;
		}
		if (!check_event_name(arg)) {
429
			semantic_error("%s is bad for event name -it must "
430 431 432
				       "follow C symbol-naming rule.\n", arg);
			return -EINVAL;
		}
433 434 435
		pev->event = strdup(arg);
		if (pev->event == NULL)
			return -ENOMEM;
436
		pev->group = NULL;
437 438 439
		arg = tmp;
	}

440
	ptr = strpbrk(arg, ";:+@%");
441 442 443 444 445
	if (ptr) {
		nc = *ptr;
		*ptr++ = '\0';
	}

446 447 448 449
	tmp = strdup(arg);
	if (tmp == NULL)
		return -ENOMEM;

450
	/* Check arg is function or file and copy it */
451 452
	if (strchr(tmp, '.'))	/* File */
		pp->file = tmp;
453
	else			/* Function */
454
		pp->function = tmp;
455 456 457 458 459

	/* Parse other options */
	while (ptr) {
		arg = ptr;
		c = nc;
460
		if (c == ';') {	/* Lazy pattern must be the last part */
461 462 463
			pp->lazy_line = strdup(arg);
			if (pp->lazy_line == NULL)
				return -ENOMEM;
464 465 466
			break;
		}
		ptr = strpbrk(arg, ";:+@%");
467 468 469 470 471 472 473
		if (ptr) {
			nc = *ptr;
			*ptr++ = '\0';
		}
		switch (c) {
		case ':':	/* Line number */
			pp->line = strtoul(arg, &tmp, 0);
474
			if (*tmp != '\0') {
475
				semantic_error("There is non-digit char"
476 477 478
					       " in line number.\n");
				return -EINVAL;
			}
479 480 481
			break;
		case '+':	/* Byte offset from a symbol */
			pp->offset = strtoul(arg, &tmp, 0);
482
			if (*tmp != '\0') {
483
				semantic_error("There is non-digit character"
484 485 486
						" in offset.\n");
				return -EINVAL;
			}
487 488
			break;
		case '@':	/* File name */
489 490 491 492
			if (pp->file) {
				semantic_error("SRC@SRC is not allowed.\n");
				return -EINVAL;
			}
493 494 495
			pp->file = strdup(arg);
			if (pp->file == NULL)
				return -ENOMEM;
496 497 498 499
			break;
		case '%':	/* Probe places */
			if (strcmp(arg, "return") == 0) {
				pp->retprobe = 1;
500 501 502 503
			} else {	/* Others not supported yet */
				semantic_error("%%%s is not supported.\n", arg);
				return -ENOTSUP;
			}
504
			break;
505 506 507 508
		default:	/* Buggy case */
			pr_err("This program has a bug at %s:%d.\n",
				__FILE__, __LINE__);
			return -ENOTSUP;
509 510 511 512 513
			break;
		}
	}

	/* Exclusion check */
514
	if (pp->lazy_line && pp->line) {
515
		semantic_error("Lazy pattern can't be used with line number.");
516 517
		return -EINVAL;
	}
518

519
	if (pp->lazy_line && pp->offset) {
520
		semantic_error("Lazy pattern can't be used with offset.");
521 522
		return -EINVAL;
	}
523

524
	if (pp->line && pp->offset) {
525
		semantic_error("Offset can't be used with line number.");
526 527
		return -EINVAL;
	}
528

529
	if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
530 531
		semantic_error("File always requires line number or "
			       "lazy pattern.");
532 533
		return -EINVAL;
	}
534

535
	if (pp->offset && !pp->function) {
536
		semantic_error("Offset requires an entry function.");
537 538
		return -EINVAL;
	}
539

540
	if (pp->retprobe && !pp->function) {
541
		semantic_error("Return probe requires an entry function.");
542 543
		return -EINVAL;
	}
544

545
	if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
546 547
		semantic_error("Offset/Line/Lazy pattern can't be used with "
			       "return probe.");
548 549
		return -EINVAL;
	}
550

551
	pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
552 553
		 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
		 pp->lazy_line);
554
	return 0;
555 556
}

557
/* Parse perf-probe event argument */
558
static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
559
{
560
	char *tmp, *goodname;
561 562 563 564
	struct perf_probe_arg_field **fieldp;

	pr_debug("parsing arg: %s into ", str);

565 566
	tmp = strchr(str, '=');
	if (tmp) {
567 568 569
		arg->name = strndup(str, tmp - str);
		if (arg->name == NULL)
			return -ENOMEM;
570
		pr_debug("name:%s ", arg->name);
571 572 573
		str = tmp + 1;
	}

574 575 576
	tmp = strchr(str, ':');
	if (tmp) {	/* Type setting */
		*tmp = '\0';
577 578 579
		arg->type = strdup(tmp + 1);
		if (arg->type == NULL)
			return -ENOMEM;
580 581 582
		pr_debug("type:%s ", arg->type);
	}

583
	tmp = strpbrk(str, "-.[");
584 585
	if (!is_c_varname(str) || !tmp) {
		/* A variable, register, symbol or special value */
586 587 588
		arg->var = strdup(str);
		if (arg->var == NULL)
			return -ENOMEM;
589
		pr_debug("%s\n", arg->var);
590
		return 0;
591 592
	}

593
	/* Structure fields or array element */
594 595 596
	arg->var = strndup(str, tmp - str);
	if (arg->var == NULL)
		return -ENOMEM;
597
	goodname = arg->var;
598
	pr_debug("%s, ", arg->var);
599 600 601
	fieldp = &arg->field;

	do {
602 603 604
		*fieldp = zalloc(sizeof(struct perf_probe_arg_field));
		if (*fieldp == NULL)
			return -ENOMEM;
605 606 607
		if (*tmp == '[') {	/* Array */
			str = tmp;
			(*fieldp)->index = strtol(str + 1, &tmp, 0);
608
			(*fieldp)->ref = true;
609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629
			if (*tmp != ']' || tmp == str + 1) {
				semantic_error("Array index must be a"
						" number.\n");
				return -EINVAL;
			}
			tmp++;
			if (*tmp == '\0')
				tmp = NULL;
		} else {		/* Structure */
			if (*tmp == '.') {
				str = tmp + 1;
				(*fieldp)->ref = false;
			} else if (tmp[1] == '>') {
				str = tmp + 2;
				(*fieldp)->ref = true;
			} else {
				semantic_error("Argument parse error: %s\n",
					       str);
				return -EINVAL;
			}
			tmp = strpbrk(str, "-.[");
630
		}
631
		if (tmp) {
632 633 634
			(*fieldp)->name = strndup(str, tmp - str);
			if ((*fieldp)->name == NULL)
				return -ENOMEM;
635 636
			if (*str != '[')
				goodname = (*fieldp)->name;
637 638 639 640
			pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
			fieldp = &(*fieldp)->next;
		}
	} while (tmp);
641 642 643
	(*fieldp)->name = strdup(str);
	if ((*fieldp)->name == NULL)
		return -ENOMEM;
644 645
	if (*str != '[')
		goodname = (*fieldp)->name;
646
	pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
647

648
	/* If no name is specified, set the last field name (not array index)*/
649
	if (!arg->name) {
650
		arg->name = strdup(goodname);
651 652 653
		if (arg->name == NULL)
			return -ENOMEM;
	}
654
	return 0;
655 656
}

657
/* Parse perf-probe event command */
658
int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
659
{
660
	char **argv;
661
	int argc, i, ret = 0;
662

663
	argv = argv_split(cmd, &argc);
664 665 666 667 668 669 670 671 672
	if (!argv) {
		pr_debug("Failed to split arguments.\n");
		return -ENOMEM;
	}
	if (argc - 1 > MAX_PROBE_ARGS) {
		semantic_error("Too many probe arguments (%d).\n", argc - 1);
		ret = -ERANGE;
		goto out;
	}
673
	/* Parse probe point */
674 675 676
	ret = parse_perf_probe_point(argv[0], pev);
	if (ret < 0)
		goto out;
677

678
	/* Copy arguments and ensure return probe has no C argument */
679
	pev->nargs = argc - 1;
680 681 682 683 684
	pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
	if (pev->args == NULL) {
		ret = -ENOMEM;
		goto out;
	}
685 686 687 688
	for (i = 0; i < pev->nargs && ret >= 0; i++) {
		ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
		if (ret >= 0 &&
		    is_c_varname(pev->args[i].var) && pev->point.retprobe) {
689
			semantic_error("You can't specify local variable for"
690 691 692
				       " kretprobe.\n");
			ret = -EINVAL;
		}
693
	}
694
out:
695
	argv_free(argv);
696 697

	return ret;
698 699
}

700 701 702 703 704 705 706 707 708
/* Return true if this perf_probe_event requires debuginfo */
bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
{
	int i;

	if (pev->point.file || pev->point.line || pev->point.lazy_line)
		return true;

	for (i = 0; i < pev->nargs; i++)
709
		if (is_c_varname(pev->args[i].var))
710 711 712 713 714
			return true;

	return false;
}

715
/* Parse kprobe_events event into struct probe_point */
716
int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
717
{
718
	struct kprobe_trace_point *tp = &tev->point;
719 720 721 722 723
	char pr;
	char *p;
	int ret, i, argc;
	char **argv;

724 725
	pr_debug("Parsing kprobe_events: %s\n", cmd);
	argv = argv_split(cmd, &argc);
726 727 728 729 730 731 732 733 734
	if (!argv) {
		pr_debug("Failed to split arguments.\n");
		return -ENOMEM;
	}
	if (argc < 2) {
		semantic_error("Too few probe arguments.\n");
		ret = -ERANGE;
		goto out;
	}
735 736

	/* Scan event and group name. */
737
	ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
738 739
		     &pr, (float *)(void *)&tev->group,
		     (float *)(void *)&tev->event);
740 741 742 743 744
	if (ret != 3) {
		semantic_error("Failed to parse event name: %s\n", argv[0]);
		ret = -EINVAL;
		goto out;
	}
745
	pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
746

747
	tp->retprobe = (pr == 'r');
748 749

	/* Scan function name and offset */
750 751
	ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
		     &tp->offset);
752
	if (ret == 1)
753
		tp->offset = 0;
754

755
	tev->nargs = argc - 2;
756 757 758 759 760
	tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
	if (tev->args == NULL) {
		ret = -ENOMEM;
		goto out;
	}
761
	for (i = 0; i < tev->nargs; i++) {
762 763
		p = strchr(argv[i + 2], '=');
		if (p)	/* We don't need which register is assigned. */
764 765 766
			*p++ = '\0';
		else
			p = argv[i + 2];
767
		tev->args[i].name = strdup(argv[i + 2]);
768
		/* TODO: parse regs and offset */
769 770 771 772 773
		tev->args[i].value = strdup(p);
		if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
			ret = -ENOMEM;
			goto out;
		}
774
	}
775 776
	ret = 0;
out:
777
	argv_free(argv);
778
	return ret;
779 780
}

781 782 783 784 785 786 787
/* Compose only probe arg */
int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
{
	struct perf_probe_arg_field *field = pa->field;
	int ret;
	char *tmp = buf;

788 789 790 791
	if (pa->name && pa->var)
		ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
	else
		ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
792 793 794 795 796 797
	if (ret <= 0)
		goto error;
	tmp += ret;
	len -= ret;

	while (field) {
798 799 800 801 802
		if (field->name[0] == '[')
			ret = e_snprintf(tmp, len, "%s", field->name);
		else
			ret = e_snprintf(tmp, len, "%s%s",
					 field->ref ? "->" : ".", field->name);
803 804 805 806 807 808
		if (ret <= 0)
			goto error;
		tmp += ret;
		len -= ret;
		field = field->next;
	}
809 810 811 812 813 814 815 816 817

	if (pa->type) {
		ret = e_snprintf(tmp, len, ":%s", pa->type);
		if (ret <= 0)
			goto error;
		tmp += ret;
		len -= ret;
	}

818 819
	return tmp - buf;
error:
820 821 822
	pr_debug("Failed to synthesize perf probe argument: %s",
		 strerror(-ret));
	return ret;
823 824
}

825 826
/* Compose only probe point (not argument) */
static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
827
{
828 829 830
	char *buf, *tmp;
	char offs[32] = "", line[32] = "", file[32] = "";
	int ret, len;
831

832 833 834 835 836
	buf = zalloc(MAX_CMDLEN);
	if (buf == NULL) {
		ret = -ENOMEM;
		goto error;
	}
837
	if (pp->offset) {
838
		ret = e_snprintf(offs, 32, "+%lu", pp->offset);
839 840 841 842
		if (ret <= 0)
			goto error;
	}
	if (pp->line) {
843 844 845 846 847
		ret = e_snprintf(line, 32, ":%d", pp->line);
		if (ret <= 0)
			goto error;
	}
	if (pp->file) {
848
		len = strlen(pp->file) - 31;
849 850 851 852
		if (len < 0)
			len = 0;
		tmp = strchr(pp->file + len, '/');
		if (!tmp)
853
			tmp = pp->file + len;
854
		ret = e_snprintf(file, 32, "@%s", tmp + 1);
855 856 857 858 859
		if (ret <= 0)
			goto error;
	}

	if (pp->function)
860 861 862
		ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
				 offs, pp->retprobe ? "%return" : "", line,
				 file);
863
	else
864
		ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
865 866 867 868
	if (ret <= 0)
		goto error;

	return buf;
869
error:
870 871
	pr_debug("Failed to synthesize perf probe point: %s",
		 strerror(-ret));
872 873
	if (buf)
		free(buf);
874
	return NULL;
875 876
}

877 878
#if 0
char *synthesize_perf_probe_command(struct perf_probe_event *pev)
879 880 881 882
{
	char *buf;
	int i, len, ret;

883 884 885
	buf = synthesize_perf_probe_point(&pev->point);
	if (!buf)
		return NULL;
886

887 888
	len = strlen(buf);
	for (i = 0; i < pev->nargs; i++) {
889
		ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
890 891 892 893 894
				 pev->args[i].name);
		if (ret <= 0) {
			free(buf);
			return NULL;
		}
895 896 897
		len += ret;
	}

898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922
	return buf;
}
#endif

static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
					     char **buf, size_t *buflen,
					     int depth)
{
	int ret;
	if (ref->next) {
		depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
							 buflen, depth + 1);
		if (depth < 0)
			goto out;
	}

	ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
	if (ret < 0)
		depth = ret;
	else {
		*buf += ret;
		*buflen -= ret;
	}
out:
	return depth;
923 924 925

}

926 927
static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
				       char *buf, size_t buflen)
928
{
929
	struct kprobe_trace_arg_ref *ref = arg->ref;
930 931 932 933 934 935 936 937 938 939 940 941 942
	int ret, depth = 0;
	char *tmp = buf;

	/* Argument name or separator */
	if (arg->name)
		ret = e_snprintf(buf, buflen, " %s=", arg->name);
	else
		ret = e_snprintf(buf, buflen, " ");
	if (ret < 0)
		return ret;
	buf += ret;
	buflen -= ret;

943 944 945 946
	/* Special case: @XXX */
	if (arg->value[0] == '@' && arg->ref)
			ref = ref->next;

947
	/* Dereferencing arguments */
948 949
	if (ref) {
		depth = __synthesize_kprobe_trace_arg_ref(ref, &buf,
950 951 952 953 954 955
							  &buflen, 1);
		if (depth < 0)
			return depth;
	}

	/* Print argument value */
956 957 958 959 960
	if (arg->value[0] == '@' && arg->ref)
		ret = e_snprintf(buf, buflen, "%s%+ld", arg->value,
				 arg->ref->offset);
	else
		ret = e_snprintf(buf, buflen, "%s", arg->value);
961 962 963 964 965 966 967 968 969 970 971 972 973
	if (ret < 0)
		return ret;
	buf += ret;
	buflen -= ret;

	/* Closing */
	while (depth--) {
		ret = e_snprintf(buf, buflen, ")");
		if (ret < 0)
			return ret;
		buf += ret;
		buflen -= ret;
	}
974 975 976 977 978 979 980
	/* Print argument type */
	if (arg->type) {
		ret = e_snprintf(buf, buflen, ":%s", arg->type);
		if (ret <= 0)
			return ret;
		buf += ret;
	}
981 982 983 984 985 986 987

	return buf - tmp;
}

char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
{
	struct kprobe_trace_point *tp = &tev->point;
988 989 990
	char *buf;
	int i, len, ret;

991 992 993 994
	buf = zalloc(MAX_CMDLEN);
	if (buf == NULL)
		return NULL;

995 996 997 998 999
	len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
			 tp->retprobe ? 'r' : 'p',
			 tev->group, tev->event,
			 tp->symbol, tp->offset);
	if (len <= 0)
1000 1001
		goto error;

1002 1003 1004
	for (i = 0; i < tev->nargs; i++) {
		ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
						  MAX_CMDLEN - len);
1005
		if (ret <= 0)
1006 1007 1008 1009
			goto error;
		len += ret;
	}

1010
	return buf;
1011
error:
1012 1013 1014
	free(buf);
	return NULL;
}
1015

1016 1017
int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
				struct perf_probe_event *pev)
1018
{
1019
	char buf[64] = "";
1020
	int i, ret;
1021

1022
	/* Convert event/group name */
1023 1024 1025 1026
	pev->event = strdup(tev->event);
	pev->group = strdup(tev->group);
	if (pev->event == NULL || pev->group == NULL)
		return -ENOMEM;
1027

1028
	/* Convert trace_point to probe_point */
1029 1030 1031
	ret = convert_to_perf_probe_point(&tev->point, &pev->point);
	if (ret < 0)
		return ret;
1032

1033 1034
	/* Convert trace_arg to probe_arg */
	pev->nargs = tev->nargs;
1035 1036 1037
	pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
	if (pev->args == NULL)
		return -ENOMEM;
1038
	for (i = 0; i < tev->nargs && ret >= 0; i++) {
1039
		if (tev->args[i].name)
1040
			pev->args[i].name = strdup(tev->args[i].name);
1041
		else {
1042 1043
			ret = synthesize_kprobe_trace_arg(&tev->args[i],
							  buf, 64);
1044
			pev->args[i].name = strdup(buf);
1045
		}
1046 1047 1048
		if (pev->args[i].name == NULL && ret >= 0)
			ret = -ENOMEM;
	}
1049 1050 1051 1052 1053

	if (ret < 0)
		clear_perf_probe_event(pev);

	return ret;
1054 1055 1056 1057 1058
}

void clear_perf_probe_event(struct perf_probe_event *pev)
{
	struct perf_probe_point *pp = &pev->point;
1059
	struct perf_probe_arg_field *field, *next;
1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071
	int i;

	if (pev->event)
		free(pev->event);
	if (pev->group)
		free(pev->group);
	if (pp->file)
		free(pp->file);
	if (pp->function)
		free(pp->function);
	if (pp->lazy_line)
		free(pp->lazy_line);
1072
	for (i = 0; i < pev->nargs; i++) {
1073 1074
		if (pev->args[i].name)
			free(pev->args[i].name);
1075 1076
		if (pev->args[i].var)
			free(pev->args[i].var);
1077 1078
		if (pev->args[i].type)
			free(pev->args[i].type);
1079 1080 1081 1082 1083 1084 1085 1086 1087
		field = pev->args[i].field;
		while (field) {
			next = field->next;
			if (field->name)
				free(field->name);
			free(field);
			field = next;
		}
	}
1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108
	if (pev->args)
		free(pev->args);
	memset(pev, 0, sizeof(*pev));
}

void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
{
	struct kprobe_trace_arg_ref *ref, *next;
	int i;

	if (tev->event)
		free(tev->event);
	if (tev->group)
		free(tev->group);
	if (tev->point.symbol)
		free(tev->point.symbol);
	for (i = 0; i < tev->nargs; i++) {
		if (tev->args[i].name)
			free(tev->args[i].name);
		if (tev->args[i].value)
			free(tev->args[i].value);
1109 1110
		if (tev->args[i].type)
			free(tev->args[i].type);
1111 1112 1113 1114 1115 1116 1117 1118 1119 1120
		ref = tev->args[i].ref;
		while (ref) {
			next = ref->next;
			free(ref);
			ref = next;
		}
	}
	if (tev->args)
		free(tev->args);
	memset(tev, 0, sizeof(*tev));
1121 1122
}

1123
static int open_kprobe_events(bool readwrite)
1124 1125
{
	char buf[PATH_MAX];
1126
	const char *__debugfs;
1127 1128
	int ret;

1129 1130 1131 1132 1133 1134 1135
	__debugfs = debugfs_find_mountpoint();
	if (__debugfs == NULL) {
		pr_warning("Debugfs is not mounted.\n");
		return -ENOENT;
	}

	ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
1136
	if (ret >= 0) {
1137
		pr_debug("Opening %s write=%d\n", buf, readwrite);
1138 1139 1140 1141 1142
		if (readwrite && !probe_event_dry_run)
			ret = open(buf, O_RDWR, O_APPEND);
		else
			ret = open(buf, O_RDONLY, 0);
	}
1143

1144 1145
	if (ret < 0) {
		if (errno == ENOENT)
1146 1147
			pr_warning("kprobe_events file does not exist - please"
				 " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
1148
		else
1149 1150
			pr_warning("Failed to open kprobe_events file: %s\n",
				   strerror(errno));
1151 1152 1153 1154 1155
	}
	return ret;
}

/* Get raw string list of current kprobe_events */
1156
static struct strlist *get_kprobe_trace_command_rawlist(int fd)
1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175
{
	int ret, idx;
	FILE *fp;
	char buf[MAX_CMDLEN];
	char *p;
	struct strlist *sl;

	sl = strlist__new(true, NULL);

	fp = fdopen(dup(fd), "r");
	while (!feof(fp)) {
		p = fgets(buf, MAX_CMDLEN, fp);
		if (!p)
			break;

		idx = strlen(p) - 1;
		if (p[idx] == '\n')
			p[idx] = '\0';
		ret = strlist__add(sl, buf);
1176 1177 1178 1179 1180
		if (ret < 0) {
			pr_debug("strlist__add failed: %s\n", strerror(-ret));
			strlist__delete(sl);
			return NULL;
		}
1181 1182 1183 1184 1185 1186
	}
	fclose(fp);

	return sl;
}

1187
/* Show an event */
1188
static int show_perf_probe_event(struct perf_probe_event *pev)
1189
{
1190
	int i, ret;
1191
	char buf[128];
1192
	char *place;
1193

1194 1195
	/* Synthesize only event probe point */
	place = synthesize_perf_probe_point(&pev->point);
1196 1197
	if (!place)
		return -EINVAL;
1198 1199

	ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
1200
	if (ret < 0)
1201 1202
		return ret;

1203
	printf("  %-20s (on %s", buf, place);
1204

1205
	if (pev->nargs > 0) {
1206
		printf(" with");
1207
		for (i = 0; i < pev->nargs; i++) {
1208 1209 1210 1211
			ret = synthesize_perf_probe_arg(&pev->args[i],
							buf, 128);
			if (ret < 0)
				break;
1212 1213
			printf(" %s", buf);
		}
1214 1215
	}
	printf(")\n");
1216
	free(place);
1217
	return ret;
1218 1219
}

1220
/* List up current perf-probe events */
1221
int show_perf_probe_events(void)
1222
{
1223
	int fd, ret;
1224 1225
	struct kprobe_trace_event tev;
	struct perf_probe_event pev;
1226 1227 1228
	struct strlist *rawlist;
	struct str_node *ent;

1229
	setup_pager();
1230 1231 1232
	ret = init_vmlinux();
	if (ret < 0)
		return ret;
1233 1234 1235

	memset(&tev, 0, sizeof(tev));
	memset(&pev, 0, sizeof(pev));
1236

1237
	fd = open_kprobe_events(false);
1238 1239 1240
	if (fd < 0)
		return fd;

1241
	rawlist = get_kprobe_trace_command_rawlist(fd);
1242
	close(fd);
1243 1244
	if (!rawlist)
		return -ENOENT;
1245

1246
	strlist__for_each(ent, rawlist) {
1247 1248 1249 1250 1251 1252
		ret = parse_kprobe_trace_command(ent->s, &tev);
		if (ret >= 0) {
			ret = convert_to_perf_probe_event(&tev, &pev);
			if (ret >= 0)
				ret = show_perf_probe_event(&pev);
		}
1253 1254
		clear_perf_probe_event(&pev);
		clear_kprobe_trace_event(&tev);
1255 1256
		if (ret < 0)
			break;
1257 1258
	}
	strlist__delete(rawlist);
1259 1260

	return ret;
1261 1262
}

1263
/* Get current perf-probe event names */
1264
static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
1265
{
1266
	char buf[128];
1267 1268
	struct strlist *sl, *rawlist;
	struct str_node *ent;
1269
	struct kprobe_trace_event tev;
1270
	int ret = 0;
1271

1272
	memset(&tev, 0, sizeof(tev));
1273

1274
	rawlist = get_kprobe_trace_command_rawlist(fd);
1275
	sl = strlist__new(true, NULL);
1276
	strlist__for_each(ent, rawlist) {
1277 1278 1279
		ret = parse_kprobe_trace_command(ent->s, &tev);
		if (ret < 0)
			break;
1280
		if (include_group) {
1281 1282 1283 1284
			ret = e_snprintf(buf, 128, "%s:%s", tev.group,
					tev.event);
			if (ret >= 0)
				ret = strlist__add(sl, buf);
1285
		} else
1286
			ret = strlist__add(sl, tev.event);
1287
		clear_kprobe_trace_event(&tev);
1288 1289
		if (ret < 0)
			break;
1290 1291 1292
	}
	strlist__delete(rawlist);

1293 1294 1295 1296
	if (ret < 0) {
		strlist__delete(sl);
		return NULL;
	}
1297 1298 1299
	return sl;
}

1300
static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
1301
{
1302
	int ret = 0;
1303
	char *buf = synthesize_kprobe_trace_command(tev);
1304

1305 1306 1307 1308 1309
	if (!buf) {
		pr_debug("Failed to synthesize kprobe trace event.\n");
		return -EINVAL;
	}

1310
	pr_debug("Writing event: %s\n", buf);
1311 1312 1313
	if (!probe_event_dry_run) {
		ret = write(fd, buf, strlen(buf));
		if (ret <= 0)
1314 1315
			pr_warning("Failed to write event: %s\n",
				   strerror(errno));
1316
	}
1317
	free(buf);
1318
	return ret;
1319 1320
}

1321 1322
static int get_new_event_name(char *buf, size_t len, const char *base,
			      struct strlist *namelist, bool allow_suffix)
1323 1324
{
	int i, ret;
1325 1326 1327

	/* Try no suffix */
	ret = e_snprintf(buf, len, "%s", base);
1328 1329 1330 1331
	if (ret < 0) {
		pr_debug("snprintf() failed: %s\n", strerror(-ret));
		return ret;
	}
1332
	if (!strlist__has_entry(namelist, buf))
1333
		return 0;
1334

1335 1336 1337
	if (!allow_suffix) {
		pr_warning("Error: event \"%s\" already exists. "
			   "(Use -f to force duplicates.)\n", base);
1338
		return -EEXIST;
1339 1340
	}

1341 1342
	/* Try to add suffix */
	for (i = 1; i < MAX_EVENT_INDEX; i++) {
1343
		ret = e_snprintf(buf, len, "%s_%d", base, i);
1344 1345 1346 1347
		if (ret < 0) {
			pr_debug("snprintf() failed: %s\n", strerror(-ret));
			return ret;
		}
1348 1349 1350
		if (!strlist__has_entry(namelist, buf))
			break;
	}
1351 1352 1353 1354 1355 1356
	if (i == MAX_EVENT_INDEX) {
		pr_warning("Too many events are on the same function.\n");
		ret = -ERANGE;
	}

	return ret;
1357 1358
}

1359 1360 1361
static int __add_kprobe_trace_events(struct perf_probe_event *pev,
				     struct kprobe_trace_event *tevs,
				     int ntevs, bool allow_suffix)
1362
{
1363
	int i, fd, ret;
1364
	struct kprobe_trace_event *tev = NULL;
1365 1366
	char buf[64];
	const char *event, *group;
1367
	struct strlist *namelist;
1368

1369
	fd = open_kprobe_events(true);
1370 1371
	if (fd < 0)
		return fd;
1372
	/* Get current event names */
1373
	namelist = get_kprobe_trace_event_names(fd, false);
1374 1375 1376 1377
	if (!namelist) {
		pr_debug("Failed to get current event list.\n");
		return -EIO;
	}
1378

1379
	ret = 0;
1380
	printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
1381
	for (i = 0; i < ntevs; i++) {
1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395
		tev = &tevs[i];
		if (pev->event)
			event = pev->event;
		else
			if (pev->point.function)
				event = pev->point.function;
			else
				event = tev->point.symbol;
		if (pev->group)
			group = pev->group;
		else
			group = PERFPROBE_GROUP;

		/* Get an unused new event name */
1396 1397 1398 1399
		ret = get_new_event_name(buf, 64, event,
					 namelist, allow_suffix);
		if (ret < 0)
			break;
1400 1401
		event = buf;

1402 1403 1404 1405 1406 1407
		tev->event = strdup(event);
		tev->group = strdup(group);
		if (tev->event == NULL || tev->group == NULL) {
			ret = -ENOMEM;
			break;
		}
1408 1409 1410
		ret = write_kprobe_trace_event(fd, tev);
		if (ret < 0)
			break;
1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430
		/* Add added event name to namelist */
		strlist__add(namelist, event);

		/* Trick here - save current event/group */
		event = pev->event;
		group = pev->group;
		pev->event = tev->event;
		pev->group = tev->group;
		show_perf_probe_event(pev);
		/* Trick here - restore current event/group */
		pev->event = (char *)event;
		pev->group = (char *)group;

		/*
		 * Probes after the first probe which comes from same
		 * user input are always allowed to add suffix, because
		 * there might be several addresses corresponding to
		 * one code line.
		 */
		allow_suffix = true;
1431
	}
1432 1433 1434 1435 1436 1437 1438

	if (ret >= 0) {
		/* Show how to use the event. */
		printf("\nYou can now use it on all perf tools, such as:\n\n");
		printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
			 tev->event);
	}
1439

1440
	strlist__delete(namelist);
1441
	close(fd);
1442
	return ret;
1443
}
1444

1445
static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
1446 1447
					  struct kprobe_trace_event **tevs,
					  int max_tevs)
1448 1449
{
	struct symbol *sym;
1450
	int ret = 0, i;
1451 1452
	struct kprobe_trace_event *tev;

1453
	/* Convert perf_probe_event with debuginfo */
1454
	ret = try_to_find_kprobe_trace_events(pev, tevs, max_tevs);
1455 1456
	if (ret != 0)
		return ret;
1457

1458
	/* Allocate trace event buffer */
1459 1460 1461
	tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
	if (tev == NULL)
		return -ENOMEM;
1462 1463

	/* Copy parameters */
1464 1465 1466 1467 1468
	tev->point.symbol = strdup(pev->point.function);
	if (tev->point.symbol == NULL) {
		ret = -ENOMEM;
		goto error;
	}
1469 1470 1471
	tev->point.offset = pev->point.offset;
	tev->nargs = pev->nargs;
	if (tev->nargs) {
1472 1473 1474
		tev->args = zalloc(sizeof(struct kprobe_trace_arg)
				   * tev->nargs);
		if (tev->args == NULL) {
1475 1476
			ret = -ENOMEM;
			goto error;
1477
		}
1478
		for (i = 0; i < tev->nargs; i++) {
1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497
			if (pev->args[i].name) {
				tev->args[i].name = strdup(pev->args[i].name);
				if (tev->args[i].name == NULL) {
					ret = -ENOMEM;
					goto error;
				}
			}
			tev->args[i].value = strdup(pev->args[i].var);
			if (tev->args[i].value == NULL) {
				ret = -ENOMEM;
				goto error;
			}
			if (pev->args[i].type) {
				tev->args[i].type = strdup(pev->args[i].type);
				if (tev->args[i].type == NULL) {
					ret = -ENOMEM;
					goto error;
				}
			}
1498
		}
1499 1500 1501
	}

	/* Currently just checking function name from symbol map */
1502
	sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
1503
				       tev->point.symbol, NULL);
1504 1505 1506
	if (!sym) {
		pr_warning("Kernel symbol \'%s\' not found.\n",
			   tev->point.symbol);
1507 1508 1509
		ret = -ENOENT;
		goto error;
	}
1510

1511 1512 1513 1514 1515
	return 1;
error:
	clear_kprobe_trace_event(tev);
	free(tev);
	*tevs = NULL;
1516
	return ret;
1517 1518 1519 1520 1521 1522 1523 1524
}

struct __event_package {
	struct perf_probe_event		*pev;
	struct kprobe_trace_event	*tevs;
	int				ntevs;
};

1525
int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
1526
			  bool force_add, int max_tevs)
1527
{
1528
	int i, j, ret;
1529 1530
	struct __event_package *pkgs;

1531 1532 1533
	pkgs = zalloc(sizeof(struct __event_package) * npevs);
	if (pkgs == NULL)
		return -ENOMEM;
1534 1535

	/* Init vmlinux path */
1536 1537 1538
	ret = init_vmlinux();
	if (ret < 0)
		return ret;
1539 1540 1541 1542 1543

	/* Loop 1: convert all events */
	for (i = 0; i < npevs; i++) {
		pkgs[i].pev = &pevs[i];
		/* Convert with or without debuginfo */
1544
		ret  = convert_to_kprobe_trace_events(pkgs[i].pev,
1545
						      &pkgs[i].tevs, max_tevs);
1546 1547 1548
		if (ret < 0)
			goto end;
		pkgs[i].ntevs = ret;
1549 1550
	}

1551
	/* Loop 2: add all events */
1552 1553 1554 1555 1556
	for (i = 0; i < npevs && ret >= 0; i++)
		ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
						pkgs[i].ntevs, force_add);
end:
	/* Loop 3: cleanup trace events  */
1557
	for (i = 0; i < npevs; i++)
1558 1559 1560 1561
		for (j = 0; j < pkgs[i].ntevs; j++)
			clear_kprobe_trace_event(&pkgs[i].tevs[j]);

	return ret;
1562 1563
}

1564
static int __del_trace_kprobe_event(int fd, struct str_node *ent)
1565 1566 1567
{
	char *p;
	char buf[128];
1568
	int ret;
1569 1570

	/* Convert from perf-probe event to trace-kprobe event */
1571 1572 1573 1574
	ret = e_snprintf(buf, 128, "-:%s", ent->s);
	if (ret < 0)
		goto error;

1575
	p = strchr(buf + 2, ':');
1576 1577 1578 1579 1580 1581
	if (!p) {
		pr_debug("Internal error: %s should have ':' but not.\n",
			 ent->s);
		ret = -ENOTSUP;
		goto error;
	}
1582 1583
	*p = '/';

1584 1585
	pr_debug("Writing event: %s\n", buf);
	ret = write(fd, buf, strlen(buf));
1586 1587 1588
	if (ret < 0)
		goto error;

1589
	printf("Remove event: %s\n", ent->s);
1590 1591 1592 1593
	return 0;
error:
	pr_warning("Failed to delete event: %s\n", strerror(-ret));
	return ret;
1594 1595
}

1596 1597
static int del_trace_kprobe_event(int fd, const char *group,
				  const char *event, struct strlist *namelist)
1598 1599
{
	char buf[128];
1600
	struct str_node *ent, *n;
1601
	int found = 0, ret = 0;
1602

1603 1604 1605 1606 1607
	ret = e_snprintf(buf, 128, "%s:%s", group, event);
	if (ret < 0) {
		pr_err("Failed to copy event.");
		return ret;
	}
1608

1609 1610 1611 1612
	if (strpbrk(buf, "*?")) { /* Glob-exp */
		strlist__for_each_safe(ent, n, namelist)
			if (strglobmatch(ent->s, buf)) {
				found++;
1613 1614 1615
				ret = __del_trace_kprobe_event(fd, ent);
				if (ret < 0)
					break;
1616 1617 1618 1619 1620 1621
				strlist__remove(namelist, ent);
			}
	} else {
		ent = strlist__find(namelist, buf);
		if (ent) {
			found++;
1622 1623 1624
			ret = __del_trace_kprobe_event(fd, ent);
			if (ret >= 0)
				strlist__remove(namelist, ent);
1625 1626
		}
	}
1627 1628 1629 1630
	if (found == 0 && ret >= 0)
		pr_info("Info: Event \"%s\" does not exist.\n", buf);

	return ret;
1631 1632
}

1633
int del_perf_probe_events(struct strlist *dellist)
1634
{
1635
	int fd, ret = 0;
1636 1637 1638 1639 1640
	const char *group, *event;
	char *p, *str;
	struct str_node *ent;
	struct strlist *namelist;

1641
	fd = open_kprobe_events(true);
1642 1643 1644
	if (fd < 0)
		return fd;

1645
	/* Get current event names */
1646
	namelist = get_kprobe_trace_event_names(fd, true);
1647 1648
	if (namelist == NULL)
		return -EINVAL;
1649

1650
	strlist__for_each(ent, dellist) {
1651 1652 1653 1654 1655
		str = strdup(ent->s);
		if (str == NULL) {
			ret = -ENOMEM;
			break;
		}
1656
		pr_debug("Parsing: %s\n", str);
1657 1658 1659 1660 1661 1662
		p = strchr(str, ':');
		if (p) {
			group = str;
			*p = '\0';
			event = p + 1;
		} else {
1663
			group = "*";
1664 1665
			event = str;
		}
1666
		pr_debug("Group: %s, Event: %s\n", group, event);
1667
		ret = del_trace_kprobe_event(fd, group, event, namelist);
1668
		free(str);
1669 1670
		if (ret < 0)
			break;
1671 1672 1673
	}
	strlist__delete(namelist);
	close(fd);
1674 1675

	return ret;
1676 1677
}