trace_kprobe.c 35.8 KB
Newer Older
1
/*
2
 * Kprobes-based tracing events
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
 *
 * Created by Masami Hiramatsu <mhiramat@redhat.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */

#include <linux/module.h>
#include <linux/uaccess.h>

23
#include "trace_probe.h"
24

25
#define KPROBE_EVENT_SYSTEM "kprobes"
26

27
/**
28
 * Kprobe event core functions
29 30 31
 */
struct trace_probe {
	struct list_head	list;
32
	struct kretprobe	rp;	/* Use rp.kp for kprobe use */
33
	unsigned long 		nhit;
34
	unsigned int		flags;	/* For TP_FLAG_* */
35
	const char		*symbol;	/* symbol name */
36
	struct ftrace_event_class	class;
37
	struct ftrace_event_call	call;
38
	struct ftrace_event_file * __rcu *files;
39
	ssize_t			size;		/* trace entry size */
40
	unsigned int		nr_args;
41
	struct probe_arg	args[];
42 43
};

44 45
#define SIZEOF_TRACE_PROBE(n)			\
	(offsetof(struct trace_probe, args) +	\
46
	(sizeof(struct probe_arg) * (n)))
47

48

49
static __kprobes bool trace_probe_is_return(struct trace_probe *tp)
50
{
51
	return tp->rp.handler != NULL;
52 53
}

54
static __kprobes const char *trace_probe_symbol(struct trace_probe *tp)
55 56 57 58
{
	return tp->symbol ? tp->symbol : "unknown";
}

59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
static __kprobes unsigned long trace_probe_offset(struct trace_probe *tp)
{
	return tp->rp.kp.offset;
}

static __kprobes bool trace_probe_is_enabled(struct trace_probe *tp)
{
	return !!(tp->flags & (TP_FLAG_TRACE | TP_FLAG_PROFILE));
}

static __kprobes bool trace_probe_is_registered(struct trace_probe *tp)
{
	return !!(tp->flags & TP_FLAG_REGISTERED);
}

static __kprobes bool trace_probe_has_gone(struct trace_probe *tp)
{
	return !!(kprobe_gone(&tp->rp.kp));
}

static __kprobes bool trace_probe_within_module(struct trace_probe *tp,
						struct module *mod)
{
	int len = strlen(mod->name);
	const char *name = trace_probe_symbol(tp);
	return strncmp(mod->name, name, len) == 0 && name[len] == ':';
}

static __kprobes bool trace_probe_is_on_module(struct trace_probe *tp)
{
	return !!strchr(trace_probe_symbol(tp), ':');
}

92 93 94 95 96 97
static int register_probe_event(struct trace_probe *tp);
static void unregister_probe_event(struct trace_probe *tp);

static DEFINE_MUTEX(probe_lock);
static LIST_HEAD(probe_list);

98 99 100 101
static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs);
static int kretprobe_dispatcher(struct kretprobe_instance *ri,
				struct pt_regs *regs);

102 103 104
/*
 * Allocate new trace_probe and initialize it (including kprobes).
 */
105 106
static struct trace_probe *alloc_trace_probe(const char *group,
					     const char *event,
107 108 109
					     void *addr,
					     const char *symbol,
					     unsigned long offs,
110
					     int nargs, bool is_return)
111 112
{
	struct trace_probe *tp;
113
	int ret = -ENOMEM;
114

115
	tp = kzalloc(SIZEOF_TRACE_PROBE(nargs), GFP_KERNEL);
116
	if (!tp)
117
		return ERR_PTR(ret);
118 119 120 121 122

	if (symbol) {
		tp->symbol = kstrdup(symbol, GFP_KERNEL);
		if (!tp->symbol)
			goto error;
123 124 125 126 127 128
		tp->rp.kp.symbol_name = tp->symbol;
		tp->rp.kp.offset = offs;
	} else
		tp->rp.kp.addr = addr;

	if (is_return)
129
		tp->rp.handler = kretprobe_dispatcher;
130
	else
131
		tp->rp.kp.pre_handler = kprobe_dispatcher;
132

133
	if (!event || !is_good_name(event)) {
134
		ret = -EINVAL;
135
		goto error;
136 137
	}

138
	tp->call.class = &tp->class;
139 140 141
	tp->call.name = kstrdup(event, GFP_KERNEL);
	if (!tp->call.name)
		goto error;
142

143
	if (!group || !is_good_name(group)) {
144
		ret = -EINVAL;
145
		goto error;
146 147
	}

148 149
	tp->class.system = kstrdup(group, GFP_KERNEL);
	if (!tp->class.system)
150 151
		goto error;

152 153 154
	INIT_LIST_HEAD(&tp->list);
	return tp;
error:
155
	kfree(tp->call.name);
156 157
	kfree(tp->symbol);
	kfree(tp);
158
	return ERR_PTR(ret);
159 160 161 162 163 164 165
}

static void free_trace_probe(struct trace_probe *tp)
{
	int i;

	for (i = 0; i < tp->nr_args; i++)
166
		traceprobe_free_probe_arg(&tp->args[i]);
167

168
	kfree(tp->call.class->system);
169 170 171 172 173
	kfree(tp->call.name);
	kfree(tp->symbol);
	kfree(tp);
}

174
static struct trace_probe *find_trace_probe(const char *event,
175
					    const char *group)
176 177 178 179
{
	struct trace_probe *tp;

	list_for_each_entry(tp, &probe_list, list)
180
		if (strcmp(tp->call.name, event) == 0 &&
181
		    strcmp(tp->call.class->system, group) == 0)
182 183 184 185
			return tp;
	return NULL;
}

186 187
static int trace_probe_nr_files(struct trace_probe *tp)
{
188
	struct ftrace_event_file **file;
189 190
	int ret = 0;

191 192 193 194 195
	/*
	 * Since all tp->files updater is protected by probe_enable_lock,
	 * we don't need to lock an rcu_read_lock.
	 */
	file = rcu_dereference_raw(tp->files);
196 197 198 199 200 201 202 203 204 205 206 207 208 209 210
	if (file)
		while (*(file++))
			ret++;

	return ret;
}

static DEFINE_MUTEX(probe_enable_lock);

/*
 * Enable trace_probe
 * if the file is NULL, enable "perf" handler, or enable "trace" handler.
 */
static int
enable_trace_probe(struct trace_probe *tp, struct ftrace_event_file *file)
211 212 213
{
	int ret = 0;

214 215 216
	mutex_lock(&probe_enable_lock);

	if (file) {
217
		struct ftrace_event_file **new, **old;
218 219
		int n = trace_probe_nr_files(tp);

220
		old = rcu_dereference_raw(tp->files);
221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242
		/* 1 is for new one and 1 is for stopper */
		new = kzalloc((n + 2) * sizeof(struct ftrace_event_file *),
			      GFP_KERNEL);
		if (!new) {
			ret = -ENOMEM;
			goto out_unlock;
		}
		memcpy(new, old, n * sizeof(struct ftrace_event_file *));
		new[n] = file;
		/* The last one keeps a NULL */

		rcu_assign_pointer(tp->files, new);
		tp->flags |= TP_FLAG_TRACE;

		if (old) {
			/* Make sure the probe is done with old files */
			synchronize_sched();
			kfree(old);
		}
	} else
		tp->flags |= TP_FLAG_PROFILE;

243
	if (trace_probe_is_registered(tp) && !trace_probe_has_gone(tp)) {
244 245 246 247 248 249
		if (trace_probe_is_return(tp))
			ret = enable_kretprobe(&tp->rp);
		else
			ret = enable_kprobe(&tp->rp.kp);
	}

250 251 252
 out_unlock:
	mutex_unlock(&probe_enable_lock);

253 254 255
	return ret;
}

256 257 258
static int
trace_probe_file_index(struct trace_probe *tp, struct ftrace_event_file *file)
{
259
	struct ftrace_event_file **files;
260 261
	int i;

262 263 264 265 266 267 268 269
	/*
	 * Since all tp->files updater is protected by probe_enable_lock,
	 * we don't need to lock an rcu_read_lock.
	 */
	files = rcu_dereference_raw(tp->files);
	if (files) {
		for (i = 0; files[i]; i++)
			if (files[i] == file)
270 271 272 273 274 275 276 277 278 279 280 281
				return i;
	}

	return -1;
}

/*
 * Disable trace_probe
 * if the file is NULL, disable "perf" handler, or disable "trace" handler.
 */
static int
disable_trace_probe(struct trace_probe *tp, struct ftrace_event_file *file)
282
{
283 284 285 286 287
	int ret = 0;

	mutex_lock(&probe_enable_lock);

	if (file) {
288
		struct ftrace_event_file **new, **old;
289 290 291
		int n = trace_probe_nr_files(tp);
		int i, j;

292
		old = rcu_dereference_raw(tp->files);
293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322
		if (n == 0 || trace_probe_file_index(tp, file) < 0) {
			ret = -EINVAL;
			goto out_unlock;
		}

		if (n == 1) {	/* Remove the last file */
			tp->flags &= ~TP_FLAG_TRACE;
			new = NULL;
		} else {
			new = kzalloc(n * sizeof(struct ftrace_event_file *),
				      GFP_KERNEL);
			if (!new) {
				ret = -ENOMEM;
				goto out_unlock;
			}

			/* This copy & check loop copies the NULL stopper too */
			for (i = 0, j = 0; j < n && i < n + 1; i++)
				if (old[i] != file)
					new[j++] = old[i];
		}

		rcu_assign_pointer(tp->files, new);

		/* Make sure the probe is done with old files */
		synchronize_sched();
		kfree(old);
	} else
		tp->flags &= ~TP_FLAG_PROFILE;

323
	if (!trace_probe_is_enabled(tp) && trace_probe_is_registered(tp)) {
324 325 326 327 328
		if (trace_probe_is_return(tp))
			disable_kretprobe(&tp->rp);
		else
			disable_kprobe(&tp->rp.kp);
	}
329 330 331 332 333

 out_unlock:
	mutex_unlock(&probe_enable_lock);

	return ret;
334 335
}

336 337
/* Internal register function - just handle k*probes and flags */
static int __register_trace_probe(struct trace_probe *tp)
338
{
339
	int i, ret;
340 341 342 343

	if (trace_probe_is_registered(tp))
		return -EINVAL;

344
	for (i = 0; i < tp->nr_args; i++)
345
		traceprobe_update_arg(&tp->args[i]);
346

347 348 349 350 351 352
	/* Set/clear disabled flag according to tp->flag */
	if (trace_probe_is_enabled(tp))
		tp->rp.kp.flags &= ~KPROBE_FLAG_DISABLED;
	else
		tp->rp.kp.flags |= KPROBE_FLAG_DISABLED;

353
	if (trace_probe_is_return(tp))
354
		ret = register_kretprobe(&tp->rp);
355
	else
356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393
		ret = register_kprobe(&tp->rp.kp);

	if (ret == 0)
		tp->flags |= TP_FLAG_REGISTERED;
	else {
		pr_warning("Could not insert probe at %s+%lu: %d\n",
			   trace_probe_symbol(tp), trace_probe_offset(tp), ret);
		if (ret == -ENOENT && trace_probe_is_on_module(tp)) {
			pr_warning("This probe might be able to register after"
				   "target module is loaded. Continue.\n");
			ret = 0;
		} else if (ret == -EILSEQ) {
			pr_warning("Probing address(0x%p) is not an "
				   "instruction boundary.\n",
				   tp->rp.kp.addr);
			ret = -EINVAL;
		}
	}

	return ret;
}

/* Internal unregister function - just handle k*probes and flags */
static void __unregister_trace_probe(struct trace_probe *tp)
{
	if (trace_probe_is_registered(tp)) {
		if (trace_probe_is_return(tp))
			unregister_kretprobe(&tp->rp);
		else
			unregister_kprobe(&tp->rp.kp);
		tp->flags &= ~TP_FLAG_REGISTERED;
		/* Cleanup kprobe for reuse */
		if (tp->rp.kp.symbol_name)
			tp->rp.kp.addr = NULL;
	}
}

/* Unregister a trace_probe and probe_event: call with locking probe_lock */
394
static int unregister_trace_probe(struct trace_probe *tp)
395
{
396 397 398 399
	/* Enabled event can not be unregistered */
	if (trace_probe_is_enabled(tp))
		return -EBUSY;

400
	__unregister_trace_probe(tp);
401
	list_del(&tp->list);
402
	unregister_probe_event(tp);
403 404

	return 0;
405 406 407 408 409 410 411 412 413 414
}

/* Register a trace_probe and probe_event */
static int register_trace_probe(struct trace_probe *tp)
{
	struct trace_probe *old_tp;
	int ret;

	mutex_lock(&probe_lock);

415
	/* Delete old (same name) event if exist */
416
	old_tp = find_trace_probe(tp->call.name, tp->call.class->system);
417
	if (old_tp) {
418 419 420
		ret = unregister_trace_probe(old_tp);
		if (ret < 0)
			goto end;
421 422
		free_trace_probe(old_tp);
	}
423 424

	/* Register new event */
425 426
	ret = register_probe_event(tp);
	if (ret) {
P
Paul Bolle 已提交
427
		pr_warning("Failed to register probe event(%d)\n", ret);
428 429 430
		goto end;
	}

431 432 433
	/* Register k*probe */
	ret = __register_trace_probe(tp);
	if (ret < 0)
434
		unregister_probe_event(tp);
435
	else
436
		list_add_tail(&tp->list, &probe_list);
437

438 439 440 441 442
end:
	mutex_unlock(&probe_lock);
	return ret;
}

443 444 445 446 447 448 449 450 451 452 453 454 455 456 457
/* Module notifier call back, checking event on the module */
static int trace_probe_module_callback(struct notifier_block *nb,
				       unsigned long val, void *data)
{
	struct module *mod = data;
	struct trace_probe *tp;
	int ret;

	if (val != MODULE_STATE_COMING)
		return NOTIFY_DONE;

	/* Update probes on coming module */
	mutex_lock(&probe_lock);
	list_for_each_entry(tp, &probe_list, list) {
		if (trace_probe_within_module(tp, mod)) {
458
			/* Don't need to check busy - this should have gone. */
459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476
			__unregister_trace_probe(tp);
			ret = __register_trace_probe(tp);
			if (ret)
				pr_warning("Failed to re-register probe %s on"
					   "%s: %d\n",
					   tp->call.name, mod->name, ret);
		}
	}
	mutex_unlock(&probe_lock);

	return NOTIFY_DONE;
}

static struct notifier_block trace_probe_module_nb = {
	.notifier_call = trace_probe_module_callback,
	.priority = 1	/* Invoked after kprobe module callback */
};

477 478 479 480
static int create_trace_probe(int argc, char **argv)
{
	/*
	 * Argument syntax:
481 482
	 *  - Add kprobe: p[:[GRP/]EVENT] [MOD:]KSYM[+OFFS]|KADDR [FETCHARGS]
	 *  - Add kretprobe: r[:[GRP/]EVENT] [MOD:]KSYM[+0] [FETCHARGS]
483
	 * Fetch args:
484 485 486
	 *  $retval	: fetch return value
	 *  $stack	: fetch stack address
	 *  $stackN	: fetch Nth of stack (N:0-)
487 488 489
	 *  @ADDR	: fetch memory at ADDR (ADDR should be in kernel)
	 *  @SYM[+|-offs] : fetch memory at SYM +|- offs (SYM is a data symbol)
	 *  %REG	: fetch register REG
490
	 * Dereferencing memory fetch:
491
	 *  +|-offs(ARG) : fetch memory at ARG +|- offs address.
492 493
	 * Alias name of args:
	 *  NAME=FETCHARG : set NAME as alias of FETCHARG.
494 495
	 * Type of args:
	 *  FETCHARG:TYPE : use TYPE instead of unsigned long.
496 497 498
	 */
	struct trace_probe *tp;
	int i, ret = 0;
499
	bool is_return = false, is_delete = false;
500
	char *symbol = NULL, *event = NULL, *group = NULL;
501
	char *arg;
502
	unsigned long offset = 0;
503
	void *addr = NULL;
504
	char buf[MAX_EVENT_NAME_LEN];
505

506
	/* argc must be >= 1 */
507
	if (argv[0][0] == 'p')
508
		is_return = false;
509
	else if (argv[0][0] == 'r')
510
		is_return = true;
511
	else if (argv[0][0] == '-')
512
		is_delete = true;
513
	else {
514 515
		pr_info("Probe definition must be started with 'p', 'r' or"
			" '-'.\n");
516
		return -EINVAL;
517
	}
518 519 520

	if (argv[0][1] == ':') {
		event = &argv[0][2];
521 522 523 524 525
		if (strchr(event, '/')) {
			group = event;
			event = strchr(group, '/') + 1;
			event[-1] = '\0';
			if (strlen(group) == 0) {
526
				pr_info("Group name is not specified\n");
527 528 529
				return -EINVAL;
			}
		}
530
		if (strlen(event) == 0) {
531
			pr_info("Event name is not specified\n");
532 533 534
			return -EINVAL;
		}
	}
535 536
	if (!group)
		group = KPROBE_EVENT_SYSTEM;
537

538 539 540 541 542
	if (is_delete) {
		if (!event) {
			pr_info("Delete command needs an event name.\n");
			return -EINVAL;
		}
543
		mutex_lock(&probe_lock);
544
		tp = find_trace_probe(event, group);
545
		if (!tp) {
546
			mutex_unlock(&probe_lock);
547 548 549 550
			pr_info("Event %s/%s doesn't exist.\n", group, event);
			return -ENOENT;
		}
		/* delete an event */
551 552 553
		ret = unregister_trace_probe(tp);
		if (ret == 0)
			free_trace_probe(tp);
554
		mutex_unlock(&probe_lock);
555
		return ret;
556 557 558 559 560 561
	}

	if (argc < 2) {
		pr_info("Probe point is not specified.\n");
		return -EINVAL;
	}
562
	if (isdigit(argv[1][0])) {
563 564
		if (is_return) {
			pr_info("Return probe point must be a symbol.\n");
565
			return -EINVAL;
566
		}
567
		/* an address specified */
568
		ret = kstrtoul(&argv[1][0], 0, (unsigned long *)&addr);
569 570
		if (ret) {
			pr_info("Failed to parse address.\n");
571
			return ret;
572
		}
573 574 575 576
	} else {
		/* a symbol specified */
		symbol = argv[1];
		/* TODO: support .init module functions */
577
		ret = traceprobe_split_symbol_offset(symbol, &offset);
578 579
		if (ret) {
			pr_info("Failed to parse symbol.\n");
580
			return ret;
581 582 583
		}
		if (offset && is_return) {
			pr_info("Return probe must be used without offset.\n");
584
			return -EINVAL;
585
		}
586
	}
587
	argc -= 2; argv += 2;
588 589

	/* setup a probe */
590 591 592
	if (!event) {
		/* Make a new event name */
		if (symbol)
593
			snprintf(buf, MAX_EVENT_NAME_LEN, "%c_%s_%ld",
594 595
				 is_return ? 'r' : 'p', symbol, offset);
		else
596
			snprintf(buf, MAX_EVENT_NAME_LEN, "%c_0x%p",
597
				 is_return ? 'r' : 'p', addr);
598 599
		event = buf;
	}
600 601
	tp = alloc_trace_probe(group, event, addr, symbol, offset, argc,
			       is_return);
602 603 604
	if (IS_ERR(tp)) {
		pr_info("Failed to allocate trace_probe.(%d)\n",
			(int)PTR_ERR(tp));
605
		return PTR_ERR(tp);
606
	}
607 608

	/* parse arguments */
609 610
	ret = 0;
	for (i = 0; i < argc && i < MAX_TRACE_ARGS; i++) {
611 612 613
		/* Increment count for freeing args in error case */
		tp->nr_args++;

614 615
		/* Parse argument name */
		arg = strchr(argv[i], '=');
616
		if (arg) {
617
			*arg++ = '\0';
618 619
			tp->args[i].name = kstrdup(argv[i], GFP_KERNEL);
		} else {
620
			arg = argv[i];
621 622 623 624
			/* If argument name is omitted, set "argN" */
			snprintf(buf, MAX_EVENT_NAME_LEN, "arg%d", i + 1);
			tp->args[i].name = kstrdup(buf, GFP_KERNEL);
		}
625

626
		if (!tp->args[i].name) {
627
			pr_info("Failed to allocate argument[%d] name.\n", i);
628
			ret = -ENOMEM;
629 630
			goto error;
		}
631 632 633 634 635 636 637

		if (!is_good_name(tp->args[i].name)) {
			pr_info("Invalid argument[%d] name: %s\n",
				i, tp->args[i].name);
			ret = -EINVAL;
			goto error;
		}
638

639 640
		if (traceprobe_conflict_field_name(tp->args[i].name,
							tp->args, i)) {
641
			pr_info("Argument[%d] name '%s' conflicts with "
642 643 644 645
				"another field.\n", i, argv[i]);
			ret = -EINVAL;
			goto error;
		}
646 647

		/* Parse fetch argument */
648
		ret = traceprobe_parse_probe_arg(arg, &tp->size, &tp->args[i],
649
						is_return, true);
650
		if (ret) {
651
			pr_info("Parse error at argument[%d]. (%d)\n", i, ret);
652
			goto error;
653
		}
654 655 656 657 658 659 660 661 662 663 664 665
	}

	ret = register_trace_probe(tp);
	if (ret)
		goto error;
	return 0;

error:
	free_trace_probe(tp);
	return ret;
}

666
static int release_all_trace_probes(void)
667 668
{
	struct trace_probe *tp;
669
	int ret = 0;
670 671

	mutex_lock(&probe_lock);
672 673 674 675 676 677
	/* Ensure no probe is in use. */
	list_for_each_entry(tp, &probe_list, list)
		if (trace_probe_is_enabled(tp)) {
			ret = -EBUSY;
			goto end;
		}
678 679 680 681 682 683
	/* TODO: Use batch unregistration */
	while (!list_empty(&probe_list)) {
		tp = list_entry(probe_list.next, struct trace_probe, list);
		unregister_trace_probe(tp);
		free_trace_probe(tp);
	}
684 685

end:
686
	mutex_unlock(&probe_lock);
687 688

	return ret;
689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710
}

/* Probes listing interfaces */
static void *probes_seq_start(struct seq_file *m, loff_t *pos)
{
	mutex_lock(&probe_lock);
	return seq_list_start(&probe_list, *pos);
}

static void *probes_seq_next(struct seq_file *m, void *v, loff_t *pos)
{
	return seq_list_next(v, &probe_list, pos);
}

static void probes_seq_stop(struct seq_file *m, void *v)
{
	mutex_unlock(&probe_lock);
}

static int probes_seq_show(struct seq_file *m, void *v)
{
	struct trace_probe *tp = v;
711
	int i;
712

713
	seq_printf(m, "%c", trace_probe_is_return(tp) ? 'r' : 'p');
714
	seq_printf(m, ":%s/%s", tp->call.class->system, tp->call.name);
715

716 717 718
	if (!tp->symbol)
		seq_printf(m, " 0x%p", tp->rp.kp.addr);
	else if (tp->rp.kp.offset)
719 720
		seq_printf(m, " %s+%u", trace_probe_symbol(tp),
			   tp->rp.kp.offset);
721
	else
722
		seq_printf(m, " %s", trace_probe_symbol(tp));
723

724 725
	for (i = 0; i < tp->nr_args; i++)
		seq_printf(m, " %s=%s", tp->args[i].name, tp->args[i].comm);
726
	seq_printf(m, "\n");
727

728 729 730 731 732 733 734 735 736 737 738 739
	return 0;
}

static const struct seq_operations probes_seq_op = {
	.start  = probes_seq_start,
	.next   = probes_seq_next,
	.stop   = probes_seq_stop,
	.show   = probes_seq_show
};

static int probes_open(struct inode *inode, struct file *file)
{
740 741 742 743 744 745 746
	int ret;

	if ((file->f_mode & FMODE_WRITE) && (file->f_flags & O_TRUNC)) {
		ret = release_all_trace_probes();
		if (ret < 0)
			return ret;
	}
747 748 749 750 751 752 753

	return seq_open(file, &probes_seq_op);
}

static ssize_t probes_write(struct file *file, const char __user *buffer,
			    size_t count, loff_t *ppos)
{
754 755
	return traceprobe_probes_write(file, buffer, count, ppos,
			create_trace_probe);
756 757 758 759 760 761 762 763 764 765 766
}

static const struct file_operations kprobe_events_ops = {
	.owner          = THIS_MODULE,
	.open           = probes_open,
	.read           = seq_read,
	.llseek         = seq_lseek,
	.release        = seq_release,
	.write		= probes_write,
};

767 768 769 770 771 772
/* Probes profiling interfaces */
static int probes_profile_seq_show(struct seq_file *m, void *v)
{
	struct trace_probe *tp = v;

	seq_printf(m, "  %-44s %15lu %15lu\n", tp->call.name, tp->nhit,
773
		   tp->rp.kp.nmissed);
774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797

	return 0;
}

static const struct seq_operations profile_seq_op = {
	.start  = probes_seq_start,
	.next   = probes_seq_next,
	.stop   = probes_seq_stop,
	.show   = probes_profile_seq_show
};

static int profile_open(struct inode *inode, struct file *file)
{
	return seq_open(file, &profile_seq_op);
}

static const struct file_operations kprobe_profile_ops = {
	.owner          = THIS_MODULE,
	.open           = profile_open,
	.read           = seq_read,
	.llseek         = seq_lseek,
	.release        = seq_release,
};

798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845
/* Sum up total data length for dynamic arraies (strings) */
static __kprobes int __get_data_size(struct trace_probe *tp,
				     struct pt_regs *regs)
{
	int i, ret = 0;
	u32 len;

	for (i = 0; i < tp->nr_args; i++)
		if (unlikely(tp->args[i].fetch_size.fn)) {
			call_fetch(&tp->args[i].fetch_size, regs, &len);
			ret += len;
		}

	return ret;
}

/* Store the value of each argument */
static __kprobes void store_trace_args(int ent_size, struct trace_probe *tp,
				       struct pt_regs *regs,
				       u8 *data, int maxlen)
{
	int i;
	u32 end = tp->size;
	u32 *dl;	/* Data (relative) location */

	for (i = 0; i < tp->nr_args; i++) {
		if (unlikely(tp->args[i].fetch_size.fn)) {
			/*
			 * First, we set the relative location and
			 * maximum data length to *dl
			 */
			dl = (u32 *)(data + tp->args[i].offset);
			*dl = make_data_rloc(maxlen, end - tp->args[i].offset);
			/* Then try to fetch string or dynamic array data */
			call_fetch(&tp->args[i].fetch, regs, dl);
			/* Reduce maximum length */
			end += get_rloc_len(*dl);
			maxlen -= get_rloc_len(*dl);
			/* Trick here, convert data_rloc to data_loc */
			*dl = convert_rloc_to_loc(*dl,
				 ent_size + tp->args[i].offset);
		} else
			/* Just fetching data normally */
			call_fetch(&tp->args[i].fetch, regs,
				   data + tp->args[i].offset);
	}
}

846
/* Kprobe handler */
847
static __kprobes void
848 849
__kprobe_trace_func(struct trace_probe *tp, struct pt_regs *regs,
		    struct ftrace_event_file *ftrace_file)
850
{
851
	struct kprobe_trace_entry_head *entry;
852
	struct ring_buffer_event *event;
853
	struct ring_buffer *buffer;
854
	int size, dsize, pc;
855
	unsigned long irq_flags;
856
	struct ftrace_event_call *call = &tp->call;
857

858 859
	WARN_ON(call != ftrace_file->event_call);

860 861 862
	if (test_bit(FTRACE_EVENT_FL_SOFT_DISABLED_BIT, &ftrace_file->flags))
		return;

863 864 865
	local_save_flags(irq_flags);
	pc = preempt_count();

866 867
	dsize = __get_data_size(tp, regs);
	size = sizeof(*entry) + tp->size + dsize;
868

869 870 871
	event = trace_event_buffer_lock_reserve(&buffer, ftrace_file,
						call->event.type,
						size, irq_flags, pc);
872
	if (!event)
873
		return;
874 875

	entry = ring_buffer_event_data(event);
876
	entry->ip = (unsigned long)tp->rp.kp.addr;
877
	store_trace_args(sizeof(*entry), tp, regs, (u8 *)&entry[1], dsize);
878

879
	if (!filter_current_check_discard(buffer, call, entry, event))
880 881
		trace_buffer_unlock_commit_regs(buffer, event,
						irq_flags, pc, regs);
882 883
}

884 885 886
static __kprobes void
kprobe_trace_func(struct trace_probe *tp, struct pt_regs *regs)
{
887 888 889 890 891 892 893 894 895
	/*
	 * Note: preempt is already disabled around the kprobe handler.
	 * However, we still need an smp_read_barrier_depends() corresponding
	 * to smp_wmb() in rcu_assign_pointer() to access the pointer.
	 */
	struct ftrace_event_file **file = rcu_dereference_raw(tp->files);

	if (unlikely(!file))
		return;
896 897 898 899 900 901 902

	while (*file) {
		__kprobe_trace_func(tp, regs, *file);
		file++;
	}
}

903
/* Kretprobe handler */
904
static __kprobes void
905 906 907
__kretprobe_trace_func(struct trace_probe *tp, struct kretprobe_instance *ri,
		       struct pt_regs *regs,
		       struct ftrace_event_file *ftrace_file)
908
{
909
	struct kretprobe_trace_entry_head *entry;
910
	struct ring_buffer_event *event;
911
	struct ring_buffer *buffer;
912
	int size, pc, dsize;
913
	unsigned long irq_flags;
914
	struct ftrace_event_call *call = &tp->call;
915

916 917
	WARN_ON(call != ftrace_file->event_call);

918 919 920
	if (test_bit(FTRACE_EVENT_FL_SOFT_DISABLED_BIT, &ftrace_file->flags))
		return;

921 922 923
	local_save_flags(irq_flags);
	pc = preempt_count();

924 925
	dsize = __get_data_size(tp, regs);
	size = sizeof(*entry) + tp->size + dsize;
926

927 928 929
	event = trace_event_buffer_lock_reserve(&buffer, ftrace_file,
						call->event.type,
						size, irq_flags, pc);
930
	if (!event)
931
		return;
932 933

	entry = ring_buffer_event_data(event);
934
	entry->func = (unsigned long)tp->rp.kp.addr;
935
	entry->ret_ip = (unsigned long)ri->ret_addr;
936
	store_trace_args(sizeof(*entry), tp, regs, (u8 *)&entry[1], dsize);
937

938
	if (!filter_current_check_discard(buffer, call, entry, event))
939 940
		trace_buffer_unlock_commit_regs(buffer, event,
						irq_flags, pc, regs);
941 942
}

943 944 945 946
static __kprobes void
kretprobe_trace_func(struct trace_probe *tp, struct kretprobe_instance *ri,
		     struct pt_regs *regs)
{
947 948 949 950 951 952 953 954 955
	/*
	 * Note: preempt is already disabled around the kprobe handler.
	 * However, we still need an smp_read_barrier_depends() corresponding
	 * to smp_wmb() in rcu_assign_pointer() to access the pointer.
	 */
	struct ftrace_event_file **file = rcu_dereference_raw(tp->files);

	if (unlikely(!file))
		return;
956 957 958 959 960 961 962

	while (*file) {
		__kretprobe_trace_func(tp, ri, regs, *file);
		file++;
	}
}

963
/* Event entry printers */
964
static enum print_line_t
965 966
print_kprobe_event(struct trace_iterator *iter, int flags,
		   struct trace_event *event)
967
{
968
	struct kprobe_trace_entry_head *field;
969
	struct trace_seq *s = &iter->seq;
970
	struct trace_probe *tp;
971
	u8 *data;
972 973
	int i;

974
	field = (struct kprobe_trace_entry_head *)iter->ent;
975
	tp = container_of(event, struct trace_probe, call.event);
976

977 978 979
	if (!trace_seq_printf(s, "%s: (", tp->call.name))
		goto partial;

980 981 982
	if (!seq_print_ip_sym(s, field->ip, flags | TRACE_ITER_SYM_OFFSET))
		goto partial;

983
	if (!trace_seq_puts(s, ")"))
984 985
		goto partial;

986 987 988
	data = (u8 *)&field[1];
	for (i = 0; i < tp->nr_args; i++)
		if (!tp->args[i].type->print(s, tp->args[i].name,
989
					     data + tp->args[i].offset, field))
990 991 992 993 994 995 996 997 998 999
			goto partial;

	if (!trace_seq_puts(s, "\n"))
		goto partial;

	return TRACE_TYPE_HANDLED;
partial:
	return TRACE_TYPE_PARTIAL_LINE;
}

1000
static enum print_line_t
1001 1002
print_kretprobe_event(struct trace_iterator *iter, int flags,
		      struct trace_event *event)
1003
{
1004
	struct kretprobe_trace_entry_head *field;
1005
	struct trace_seq *s = &iter->seq;
1006
	struct trace_probe *tp;
1007
	u8 *data;
1008 1009
	int i;

1010
	field = (struct kretprobe_trace_entry_head *)iter->ent;
1011
	tp = container_of(event, struct trace_probe, call.event);
1012

1013 1014 1015
	if (!trace_seq_printf(s, "%s: (", tp->call.name))
		goto partial;

1016 1017 1018 1019 1020 1021 1022 1023 1024
	if (!seq_print_ip_sym(s, field->ret_ip, flags | TRACE_ITER_SYM_OFFSET))
		goto partial;

	if (!trace_seq_puts(s, " <- "))
		goto partial;

	if (!seq_print_ip_sym(s, field->func, flags & ~TRACE_ITER_SYM_OFFSET))
		goto partial;

1025
	if (!trace_seq_puts(s, ")"))
1026 1027
		goto partial;

1028 1029 1030
	data = (u8 *)&field[1];
	for (i = 0; i < tp->nr_args; i++)
		if (!tp->args[i].type->print(s, tp->args[i].name,
1031
					     data + tp->args[i].offset, field))
1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045
			goto partial;

	if (!trace_seq_puts(s, "\n"))
		goto partial;

	return TRACE_TYPE_HANDLED;
partial:
	return TRACE_TYPE_PARTIAL_LINE;
}


static int kprobe_event_define_fields(struct ftrace_event_call *event_call)
{
	int ret, i;
1046
	struct kprobe_trace_entry_head field;
1047 1048
	struct trace_probe *tp = (struct trace_probe *)event_call->data;

1049
	DEFINE_FIELD(unsigned long, ip, FIELD_STRING_IP, 0);
1050
	/* Set argument names as fields */
1051
	for (i = 0; i < tp->nr_args; i++) {
1052
		ret = trace_define_field(event_call, tp->args[i].type->fmttype,
1053 1054 1055 1056 1057 1058 1059 1060
					 tp->args[i].name,
					 sizeof(field) + tp->args[i].offset,
					 tp->args[i].type->size,
					 tp->args[i].type->is_signed,
					 FILTER_OTHER);
		if (ret)
			return ret;
	}
1061 1062 1063 1064 1065 1066
	return 0;
}

static int kretprobe_event_define_fields(struct ftrace_event_call *event_call)
{
	int ret, i;
1067
	struct kretprobe_trace_entry_head field;
1068 1069
	struct trace_probe *tp = (struct trace_probe *)event_call->data;

1070 1071
	DEFINE_FIELD(unsigned long, func, FIELD_STRING_FUNC, 0);
	DEFINE_FIELD(unsigned long, ret_ip, FIELD_STRING_RETIP, 0);
1072
	/* Set argument names as fields */
1073
	for (i = 0; i < tp->nr_args; i++) {
1074
		ret = trace_define_field(event_call, tp->args[i].type->fmttype,
1075 1076 1077 1078 1079 1080 1081 1082
					 tp->args[i].name,
					 sizeof(field) + tp->args[i].offset,
					 tp->args[i].type->size,
					 tp->args[i].type->is_signed,
					 FILTER_OTHER);
		if (ret)
			return ret;
	}
1083 1084 1085
	return 0;
}

1086 1087 1088 1089 1090 1091 1092
static int __set_print_fmt(struct trace_probe *tp, char *buf, int len)
{
	int i;
	int pos = 0;

	const char *fmt, *arg;

1093
	if (!trace_probe_is_return(tp)) {
1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106
		fmt = "(%lx)";
		arg = "REC->" FIELD_STRING_IP;
	} else {
		fmt = "(%lx <- %lx)";
		arg = "REC->" FIELD_STRING_FUNC ", REC->" FIELD_STRING_RETIP;
	}

	/* When len=0, we just calculate the needed length */
#define LEN_OR_ZERO (len ? len - pos : 0)

	pos += snprintf(buf + pos, LEN_OR_ZERO, "\"%s", fmt);

	for (i = 0; i < tp->nr_args; i++) {
1107 1108
		pos += snprintf(buf + pos, LEN_OR_ZERO, " %s=%s",
				tp->args[i].name, tp->args[i].type->fmt);
1109 1110 1111 1112 1113
	}

	pos += snprintf(buf + pos, LEN_OR_ZERO, "\", %s", arg);

	for (i = 0; i < tp->nr_args; i++) {
1114 1115 1116 1117 1118 1119 1120
		if (strcmp(tp->args[i].type->name, "string") == 0)
			pos += snprintf(buf + pos, LEN_OR_ZERO,
					", __get_str(%s)",
					tp->args[i].name);
		else
			pos += snprintf(buf + pos, LEN_OR_ZERO, ", REC->%s",
					tp->args[i].name);
1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146
	}

#undef LEN_OR_ZERO

	/* return the length of print_fmt */
	return pos;
}

static int set_print_fmt(struct trace_probe *tp)
{
	int len;
	char *print_fmt;

	/* First: called with 0 length to calculate the needed length */
	len = __set_print_fmt(tp, NULL, 0);
	print_fmt = kmalloc(len + 1, GFP_KERNEL);
	if (!print_fmt)
		return -ENOMEM;

	/* Second: actually write the @print_fmt */
	__set_print_fmt(tp, print_fmt, len + 1);
	tp->call.print_fmt = print_fmt;

	return 0;
}

1147
#ifdef CONFIG_PERF_EVENTS
1148 1149

/* Kprobe profile handler */
1150 1151
static __kprobes void
kprobe_perf_func(struct trace_probe *tp, struct pt_regs *regs)
1152 1153
{
	struct ftrace_event_call *call = &tp->call;
1154
	struct kprobe_trace_entry_head *entry;
1155
	struct hlist_head *head;
1156
	int size, __size, dsize;
1157
	int rctx;
1158

1159 1160
	dsize = __get_data_size(tp, regs);
	__size = sizeof(*entry) + tp->size + dsize;
1161 1162
	size = ALIGN(__size + sizeof(u32), sizeof(u64));
	size -= sizeof(u32);
1163
	if (WARN_ONCE(size > PERF_MAX_TRACE_SIZE,
1164
		     "profile buffer not large enough"))
1165
		return;
1166

S
Steven Rostedt 已提交
1167
	entry = perf_trace_buf_prepare(size, call->event.type, regs, &rctx);
1168
	if (!entry)
1169
		return;
1170

1171
	entry->ip = (unsigned long)tp->rp.kp.addr;
1172 1173
	memset(&entry[1], 0, dsize);
	store_trace_args(sizeof(*entry), tp, regs, (u8 *)&entry[1], dsize);
1174

1175
	head = this_cpu_ptr(call->perf_events);
1176 1177
	perf_trace_buf_submit(entry, size, rctx,
					entry->ip, 1, regs, head, NULL);
1178 1179 1180
}

/* Kretprobe profile handler */
1181 1182 1183
static __kprobes void
kretprobe_perf_func(struct trace_probe *tp, struct kretprobe_instance *ri,
		    struct pt_regs *regs)
1184 1185
{
	struct ftrace_event_call *call = &tp->call;
1186
	struct kretprobe_trace_entry_head *entry;
1187
	struct hlist_head *head;
1188
	int size, __size, dsize;
1189
	int rctx;
1190

1191 1192
	dsize = __get_data_size(tp, regs);
	__size = sizeof(*entry) + tp->size + dsize;
1193 1194
	size = ALIGN(__size + sizeof(u32), sizeof(u64));
	size -= sizeof(u32);
1195
	if (WARN_ONCE(size > PERF_MAX_TRACE_SIZE,
1196
		     "profile buffer not large enough"))
1197
		return;
1198

S
Steven Rostedt 已提交
1199
	entry = perf_trace_buf_prepare(size, call->event.type, regs, &rctx);
1200
	if (!entry)
1201
		return;
1202

1203 1204
	entry->func = (unsigned long)tp->rp.kp.addr;
	entry->ret_ip = (unsigned long)ri->ret_addr;
1205
	store_trace_args(sizeof(*entry), tp, regs, (u8 *)&entry[1], dsize);
1206

1207
	head = this_cpu_ptr(call->perf_events);
1208 1209
	perf_trace_buf_submit(entry, size, rctx,
					entry->ret_ip, 1, regs, head, NULL);
1210
}
1211
#endif	/* CONFIG_PERF_EVENTS */
1212

1213
static __kprobes
1214 1215
int kprobe_register(struct ftrace_event_call *event,
		    enum trace_reg type, void *data)
1216
{
1217
	struct trace_probe *tp = (struct trace_probe *)event->data;
1218
	struct ftrace_event_file *file = data;
1219

1220 1221
	switch (type) {
	case TRACE_REG_REGISTER:
1222
		return enable_trace_probe(tp, file);
1223
	case TRACE_REG_UNREGISTER:
1224
		return disable_trace_probe(tp, file);
1225 1226 1227

#ifdef CONFIG_PERF_EVENTS
	case TRACE_REG_PERF_REGISTER:
1228
		return enable_trace_probe(tp, NULL);
1229
	case TRACE_REG_PERF_UNREGISTER:
1230
		return disable_trace_probe(tp, NULL);
1231 1232
	case TRACE_REG_PERF_OPEN:
	case TRACE_REG_PERF_CLOSE:
1233 1234
	case TRACE_REG_PERF_ADD:
	case TRACE_REG_PERF_DEL:
1235
		return 0;
1236 1237 1238 1239
#endif
	}
	return 0;
}
1240 1241 1242 1243 1244

static __kprobes
int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs)
{
	struct trace_probe *tp = container_of(kp, struct trace_probe, rp.kp);
1245

1246 1247
	tp->nhit++;

1248
	if (tp->flags & TP_FLAG_TRACE)
1249
		kprobe_trace_func(tp, regs);
1250
#ifdef CONFIG_PERF_EVENTS
1251
	if (tp->flags & TP_FLAG_PROFILE)
1252
		kprobe_perf_func(tp, regs);
1253
#endif
1254 1255 1256 1257 1258 1259 1260 1261
	return 0;	/* We don't tweek kernel, so just return 0 */
}

static __kprobes
int kretprobe_dispatcher(struct kretprobe_instance *ri, struct pt_regs *regs)
{
	struct trace_probe *tp = container_of(ri->rp, struct trace_probe, rp);

1262 1263
	tp->nhit++;

1264
	if (tp->flags & TP_FLAG_TRACE)
1265
		kretprobe_trace_func(tp, ri, regs);
1266
#ifdef CONFIG_PERF_EVENTS
1267
	if (tp->flags & TP_FLAG_PROFILE)
1268
		kretprobe_perf_func(tp, ri, regs);
1269
#endif
1270 1271
	return 0;	/* We don't tweek kernel, so just return 0 */
}
1272

1273 1274 1275 1276 1277 1278 1279 1280
static struct trace_event_functions kretprobe_funcs = {
	.trace		= print_kretprobe_event
};

static struct trace_event_functions kprobe_funcs = {
	.trace		= print_kprobe_event
};

1281 1282 1283 1284 1285 1286
static int register_probe_event(struct trace_probe *tp)
{
	struct ftrace_event_call *call = &tp->call;
	int ret;

	/* Initialize ftrace_event_call */
1287
	INIT_LIST_HEAD(&call->class->fields);
1288
	if (trace_probe_is_return(tp)) {
1289
		call->event.funcs = &kretprobe_funcs;
1290
		call->class->define_fields = kretprobe_event_define_fields;
1291
	} else {
1292
		call->event.funcs = &kprobe_funcs;
1293
		call->class->define_fields = kprobe_event_define_fields;
1294
	}
1295 1296
	if (set_print_fmt(tp) < 0)
		return -ENOMEM;
1297 1298
	ret = register_ftrace_event(&call->event);
	if (!ret) {
1299
		kfree(call->print_fmt);
1300
		return -ENODEV;
1301
	}
1302
	call->flags = 0;
1303
	call->class->reg = kprobe_register;
1304 1305
	call->data = tp;
	ret = trace_add_event_call(call);
1306
	if (ret) {
1307
		pr_info("Failed to register kprobe event: %s\n", call->name);
1308
		kfree(call->print_fmt);
1309
		unregister_ftrace_event(&call->event);
1310
	}
1311 1312 1313 1314 1315
	return ret;
}

static void unregister_probe_event(struct trace_probe *tp)
{
1316
	/* tp->event is unregistered in trace_remove_event_call() */
1317
	trace_remove_event_call(&tp->call);
1318
	kfree(tp->call.print_fmt);
1319 1320
}

L
Lucas De Marchi 已提交
1321
/* Make a debugfs interface for controlling probe points */
1322 1323 1324 1325 1326
static __init int init_kprobe_trace(void)
{
	struct dentry *d_tracer;
	struct dentry *entry;

1327 1328 1329
	if (register_module_notifier(&trace_probe_module_nb))
		return -EINVAL;

1330 1331 1332 1333 1334 1335 1336
	d_tracer = tracing_init_dentry();
	if (!d_tracer)
		return 0;

	entry = debugfs_create_file("kprobe_events", 0644, d_tracer,
				    NULL, &kprobe_events_ops);

1337
	/* Event list interface */
1338 1339 1340
	if (!entry)
		pr_warning("Could not create debugfs "
			   "'kprobe_events' entry\n");
1341 1342 1343 1344 1345 1346 1347 1348

	/* Profile interface */
	entry = debugfs_create_file("kprobe_profile", 0444, d_tracer,
				    NULL, &kprobe_profile_ops);

	if (!entry)
		pr_warning("Could not create debugfs "
			   "'kprobe_profile' entry\n");
1349 1350 1351 1352 1353 1354 1355
	return 0;
}
fs_initcall(init_kprobe_trace);


#ifdef CONFIG_FTRACE_STARTUP_TEST

1356 1357 1358 1359 1360 1361
/*
 * The "__used" keeps gcc from removing the function symbol
 * from the kallsyms table.
 */
static __used int kprobe_trace_selftest_target(int a1, int a2, int a3,
					       int a4, int a5, int a6)
1362 1363 1364 1365
{
	return a1 + a2 + a3 + a4 + a5 + a6;
}

1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377
static struct ftrace_event_file *
find_trace_probe_file(struct trace_probe *tp, struct trace_array *tr)
{
	struct ftrace_event_file *file;

	list_for_each_entry(file, &tr->events, list)
		if (file->event_call == &tp->call)
			return file;

	return NULL;
}

1378 1379
static __init int kprobe_trace_self_tests_init(void)
{
1380
	int ret, warn = 0;
1381
	int (*target)(int, int, int, int, int, int);
1382
	struct trace_probe *tp;
1383
	struct ftrace_event_file *file;
1384 1385 1386 1387 1388

	target = kprobe_trace_selftest_target;

	pr_info("Testing kprobe tracing: ");

1389 1390 1391
	ret = traceprobe_command("p:testprobe kprobe_trace_selftest_target "
				  "$stack $stack0 +0($stack)",
				  create_trace_probe);
1392
	if (WARN_ON_ONCE(ret)) {
1393
		pr_warn("error on probing function entry.\n");
1394 1395 1396
		warn++;
	} else {
		/* Enable trace point */
1397
		tp = find_trace_probe("testprobe", KPROBE_EVENT_SYSTEM);
1398
		if (WARN_ON_ONCE(tp == NULL)) {
1399
			pr_warn("error on getting new probe.\n");
1400
			warn++;
1401 1402 1403 1404 1405 1406 1407 1408
		} else {
			file = find_trace_probe_file(tp, top_trace_array());
			if (WARN_ON_ONCE(file == NULL)) {
				pr_warn("error on getting probe file.\n");
				warn++;
			} else
				enable_trace_probe(tp, file);
		}
1409
	}
1410

1411 1412
	ret = traceprobe_command("r:testprobe2 kprobe_trace_selftest_target "
				  "$retval", create_trace_probe);
1413
	if (WARN_ON_ONCE(ret)) {
1414
		pr_warn("error on probing function return.\n");
1415 1416 1417
		warn++;
	} else {
		/* Enable trace point */
1418
		tp = find_trace_probe("testprobe2", KPROBE_EVENT_SYSTEM);
1419
		if (WARN_ON_ONCE(tp == NULL)) {
1420
			pr_warn("error on getting 2nd new probe.\n");
1421
			warn++;
1422 1423 1424 1425 1426 1427 1428 1429
		} else {
			file = find_trace_probe_file(tp, top_trace_array());
			if (WARN_ON_ONCE(file == NULL)) {
				pr_warn("error on getting probe file.\n");
				warn++;
			} else
				enable_trace_probe(tp, file);
		}
1430 1431 1432 1433
	}

	if (warn)
		goto end;
1434 1435 1436

	ret = target(1, 2, 3, 4, 5, 6);

1437 1438 1439
	/* Disable trace points before removing it */
	tp = find_trace_probe("testprobe", KPROBE_EVENT_SYSTEM);
	if (WARN_ON_ONCE(tp == NULL)) {
1440
		pr_warn("error on getting test probe.\n");
1441
		warn++;
1442 1443 1444 1445 1446 1447 1448 1449
	} else {
		file = find_trace_probe_file(tp, top_trace_array());
		if (WARN_ON_ONCE(file == NULL)) {
			pr_warn("error on getting probe file.\n");
			warn++;
		} else
			disable_trace_probe(tp, file);
	}
1450 1451 1452

	tp = find_trace_probe("testprobe2", KPROBE_EVENT_SYSTEM);
	if (WARN_ON_ONCE(tp == NULL)) {
1453
		pr_warn("error on getting 2nd test probe.\n");
1454
		warn++;
1455 1456 1457 1458 1459 1460 1461 1462
	} else {
		file = find_trace_probe_file(tp, top_trace_array());
		if (WARN_ON_ONCE(file == NULL)) {
			pr_warn("error on getting probe file.\n");
			warn++;
		} else
			disable_trace_probe(tp, file);
	}
1463

1464
	ret = traceprobe_command("-:testprobe", create_trace_probe);
1465
	if (WARN_ON_ONCE(ret)) {
1466
		pr_warn("error on deleting a probe.\n");
1467 1468 1469
		warn++;
	}

1470
	ret = traceprobe_command("-:testprobe2", create_trace_probe);
1471
	if (WARN_ON_ONCE(ret)) {
1472
		pr_warn("error on deleting a probe.\n");
1473 1474
		warn++;
	}
1475

1476
end:
1477
	release_all_trace_probes();
1478 1479 1480 1481
	if (warn)
		pr_cont("NG: Some tests are failed. Please check them.\n");
	else
		pr_cont("OK\n");
1482 1483 1484 1485 1486 1487
	return 0;
}

late_initcall(kprobe_trace_self_tests_init);

#endif