trace_kprobe.c 37.0 KB
Newer Older
1
/*
2
 * Kprobes-based tracing events
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
 *
 * Created by Masami Hiramatsu <mhiramat@redhat.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */
19
#define pr_fmt(fmt)	"trace_kprobe: " fmt
20 21 22 23

#include <linux/module.h>
#include <linux/uaccess.h>

24
#include "trace_probe.h"
25

26
#define KPROBE_EVENT_SYSTEM "kprobes"
27

28
/**
29
 * Kprobe event core functions
30
 */
31
struct trace_kprobe {
32
	struct list_head	list;
33
	struct kretprobe	rp;	/* Use rp.kp for kprobe use */
34
	unsigned long __percpu *nhit;
35
	const char		*symbol;	/* symbol name */
36
	struct trace_probe	tp;
37 38
};

39 40
#define SIZEOF_TRACE_KPROBE(n)				\
	(offsetof(struct trace_kprobe, tp.args) +	\
41
	(sizeof(struct probe_arg) * (n)))
42

43

44
static nokprobe_inline bool trace_kprobe_is_return(struct trace_kprobe *tk)
45
{
46
	return tk->rp.handler != NULL;
47 48
}

49
static nokprobe_inline const char *trace_kprobe_symbol(struct trace_kprobe *tk)
50
{
51
	return tk->symbol ? tk->symbol : "unknown";
52 53
}

54
static nokprobe_inline unsigned long trace_kprobe_offset(struct trace_kprobe *tk)
55
{
56
	return tk->rp.kp.offset;
57 58
}

59
static nokprobe_inline bool trace_kprobe_has_gone(struct trace_kprobe *tk)
60
{
61
	return !!(kprobe_gone(&tk->rp.kp));
62 63
}

64
static nokprobe_inline bool trace_kprobe_within_module(struct trace_kprobe *tk,
65
						 struct module *mod)
66 67
{
	int len = strlen(mod->name);
68
	const char *name = trace_kprobe_symbol(tk);
69 70 71
	return strncmp(mod->name, name, len) == 0 && name[len] == ':';
}

72
static nokprobe_inline bool trace_kprobe_is_on_module(struct trace_kprobe *tk)
73
{
74
	return !!strchr(trace_kprobe_symbol(tk), ':');
75 76
}

77 78 79 80 81 82 83 84 85 86 87
static nokprobe_inline unsigned long trace_kprobe_nhit(struct trace_kprobe *tk)
{
	unsigned long nhit = 0;
	int cpu;

	for_each_possible_cpu(cpu)
		nhit += *per_cpu_ptr(tk->nhit, cpu);

	return nhit;
}

88 89
static int register_kprobe_event(struct trace_kprobe *tk);
static int unregister_kprobe_event(struct trace_kprobe *tk);
90 91 92 93

static DEFINE_MUTEX(probe_lock);
static LIST_HEAD(probe_list);

94 95 96 97
static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs);
static int kretprobe_dispatcher(struct kretprobe_instance *ri,
				struct pt_regs *regs);

98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142
/* Memory fetching by symbol */
struct symbol_cache {
	char		*symbol;
	long		offset;
	unsigned long	addr;
};

unsigned long update_symbol_cache(struct symbol_cache *sc)
{
	sc->addr = (unsigned long)kallsyms_lookup_name(sc->symbol);

	if (sc->addr)
		sc->addr += sc->offset;

	return sc->addr;
}

void free_symbol_cache(struct symbol_cache *sc)
{
	kfree(sc->symbol);
	kfree(sc);
}

struct symbol_cache *alloc_symbol_cache(const char *sym, long offset)
{
	struct symbol_cache *sc;

	if (!sym || strlen(sym) == 0)
		return NULL;

	sc = kzalloc(sizeof(struct symbol_cache), GFP_KERNEL);
	if (!sc)
		return NULL;

	sc->symbol = kstrdup(sym, GFP_KERNEL);
	if (!sc->symbol) {
		kfree(sc);
		return NULL;
	}
	sc->offset = offset;
	update_symbol_cache(sc);

	return sc;
}

143 144 145 146
/*
 * Kprobes-specific fetch functions
 */
#define DEFINE_FETCH_stack(type)					\
147
static void FETCH_FUNC_NAME(stack, type)(struct pt_regs *regs,		\
148 149 150 151
					  void *offset, void *dest)	\
{									\
	*(type *)dest = (type)regs_get_kernel_stack_nth(regs,		\
				(unsigned int)((unsigned long)offset));	\
152 153 154
}									\
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(stack, type));

155 156 157 158 159
DEFINE_BASIC_FETCH_FUNCS(stack)
/* No string on the stack entry */
#define fetch_stack_string	NULL
#define fetch_stack_string_size	NULL

160
#define DEFINE_FETCH_memory(type)					\
161
static void FETCH_FUNC_NAME(memory, type)(struct pt_regs *regs,		\
162 163 164 165 166 167 168
					  void *addr, void *dest)	\
{									\
	type retval;							\
	if (probe_kernel_address(addr, retval))				\
		*(type *)dest = 0;					\
	else								\
		*(type *)dest = retval;					\
169 170 171
}									\
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(memory, type));

172 173 174 175 176
DEFINE_BASIC_FETCH_FUNCS(memory)
/*
 * Fetch a null-terminated string. Caller MUST set *(u32 *)dest with max
 * length and relative data location.
 */
177 178
static void FETCH_FUNC_NAME(memory, string)(struct pt_regs *regs,
					    void *addr, void *dest)
179 180 181
{
	int maxlen = get_rloc_len(*(u32 *)dest);
	u8 *dst = get_rloc_data(dest);
182
	long ret;
183 184 185 186 187 188 189 190

	if (!maxlen)
		return;

	/*
	 * Try to get string again, since the string can be changed while
	 * probing.
	 */
191
	ret = strncpy_from_unsafe(dst, addr, maxlen);
192 193

	if (ret < 0) {	/* Failed to fetch string */
194
		dst[0] = '\0';
195 196
		*(u32 *)dest = make_data_rloc(0, get_rloc_offs(*(u32 *)dest));
	} else {
197
		*(u32 *)dest = make_data_rloc(ret, get_rloc_offs(*(u32 *)dest));
198 199
	}
}
200
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(memory, string));
201 202

/* Return the length of string -- including null terminal byte */
203 204
static void FETCH_FUNC_NAME(memory, string_size)(struct pt_regs *regs,
						 void *addr, void *dest)
205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226
{
	mm_segment_t old_fs;
	int ret, len = 0;
	u8 c;

	old_fs = get_fs();
	set_fs(KERNEL_DS);
	pagefault_disable();

	do {
		ret = __copy_from_user_inatomic(&c, (u8 *)addr + len, 1);
		len++;
	} while (c && ret == 0 && len < MAX_STRING_SIZE);

	pagefault_enable();
	set_fs(old_fs);

	if (ret < 0)	/* Failed to check the length */
		*(u32 *)dest = 0;
	else
		*(u32 *)dest = len;
}
227
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(memory, string_size));
228

229
#define DEFINE_FETCH_symbol(type)					\
230
void FETCH_FUNC_NAME(symbol, type)(struct pt_regs *regs, void *data, void *dest)\
231 232 233 234 235 236
{									\
	struct symbol_cache *sc = data;					\
	if (sc->addr)							\
		fetch_memory_##type(regs, (void *)sc->addr, dest);	\
	else								\
		*(type *)dest = 0;					\
237 238 239
}									\
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(symbol, type));

240 241 242 243
DEFINE_BASIC_FETCH_FUNCS(symbol)
DEFINE_FETCH_symbol(string)
DEFINE_FETCH_symbol(string_size)

244 245 246 247 248 249 250 251
/* kprobes don't support file_offset fetch methods */
#define fetch_file_offset_u8		NULL
#define fetch_file_offset_u16		NULL
#define fetch_file_offset_u32		NULL
#define fetch_file_offset_u64		NULL
#define fetch_file_offset_string	NULL
#define fetch_file_offset_string_size	NULL

252
/* Fetch type information table */
253
static const struct fetch_type kprobes_fetch_type_table[] = {
254 255 256 257 258 259 260 261 262 263 264 265 266 267
	/* Special types */
	[FETCH_TYPE_STRING] = __ASSIGN_FETCH_TYPE("string", string, string,
					sizeof(u32), 1, "__data_loc char[]"),
	[FETCH_TYPE_STRSIZE] = __ASSIGN_FETCH_TYPE("string_size", u32,
					string_size, sizeof(u32), 0, "u32"),
	/* Basic types */
	ASSIGN_FETCH_TYPE(u8,  u8,  0),
	ASSIGN_FETCH_TYPE(u16, u16, 0),
	ASSIGN_FETCH_TYPE(u32, u32, 0),
	ASSIGN_FETCH_TYPE(u64, u64, 0),
	ASSIGN_FETCH_TYPE(s8,  u8,  1),
	ASSIGN_FETCH_TYPE(s16, u16, 1),
	ASSIGN_FETCH_TYPE(s32, u32, 1),
	ASSIGN_FETCH_TYPE(s64, u64, 1),
268 269 270 271
	ASSIGN_FETCH_TYPE_ALIAS(x8,  u8,  u8,  0),
	ASSIGN_FETCH_TYPE_ALIAS(x16, u16, u16, 0),
	ASSIGN_FETCH_TYPE_ALIAS(x32, u32, u32, 0),
	ASSIGN_FETCH_TYPE_ALIAS(x64, u64, u64, 0),
272 273 274 275

	ASSIGN_FETCH_TYPE_END
};

276 277 278
/*
 * Allocate new trace_probe and initialize it (including kprobes).
 */
279
static struct trace_kprobe *alloc_trace_kprobe(const char *group,
280
					     const char *event,
281 282 283
					     void *addr,
					     const char *symbol,
					     unsigned long offs,
284
					     int nargs, bool is_return)
285
{
286
	struct trace_kprobe *tk;
287
	int ret = -ENOMEM;
288

289 290
	tk = kzalloc(SIZEOF_TRACE_KPROBE(nargs), GFP_KERNEL);
	if (!tk)
291
		return ERR_PTR(ret);
292

293 294 295 296
	tk->nhit = alloc_percpu(unsigned long);
	if (!tk->nhit)
		goto error;

297
	if (symbol) {
298 299
		tk->symbol = kstrdup(symbol, GFP_KERNEL);
		if (!tk->symbol)
300
			goto error;
301 302
		tk->rp.kp.symbol_name = tk->symbol;
		tk->rp.kp.offset = offs;
303
	} else
304
		tk->rp.kp.addr = addr;
305 306

	if (is_return)
307
		tk->rp.handler = kretprobe_dispatcher;
308
	else
309
		tk->rp.kp.pre_handler = kprobe_dispatcher;
310

311
	if (!event || !is_good_name(event)) {
312
		ret = -EINVAL;
313
		goto error;
314 315
	}

316 317 318
	tk->tp.call.class = &tk->tp.class;
	tk->tp.call.name = kstrdup(event, GFP_KERNEL);
	if (!tk->tp.call.name)
319
		goto error;
320

321
	if (!group || !is_good_name(group)) {
322
		ret = -EINVAL;
323
		goto error;
324 325
	}

326 327
	tk->tp.class.system = kstrdup(group, GFP_KERNEL);
	if (!tk->tp.class.system)
328 329
		goto error;

330 331 332
	INIT_LIST_HEAD(&tk->list);
	INIT_LIST_HEAD(&tk->tp.files);
	return tk;
333
error:
334 335
	kfree(tk->tp.call.name);
	kfree(tk->symbol);
336
	free_percpu(tk->nhit);
337
	kfree(tk);
338
	return ERR_PTR(ret);
339 340
}

341
static void free_trace_kprobe(struct trace_kprobe *tk)
342 343 344
{
	int i;

345 346
	for (i = 0; i < tk->tp.nr_args; i++)
		traceprobe_free_probe_arg(&tk->tp.args[i]);
347

348 349 350
	kfree(tk->tp.call.class->system);
	kfree(tk->tp.call.name);
	kfree(tk->symbol);
351
	free_percpu(tk->nhit);
352
	kfree(tk);
353 354
}

355 356
static struct trace_kprobe *find_trace_kprobe(const char *event,
					      const char *group)
357
{
358
	struct trace_kprobe *tk;
359

360
	list_for_each_entry(tk, &probe_list, list)
361
		if (strcmp(trace_event_name(&tk->tp.call), event) == 0 &&
362 363
		    strcmp(tk->tp.call.class->system, group) == 0)
			return tk;
364 365 366
	return NULL;
}

367 368 369 370 371
/*
 * Enable trace_probe
 * if the file is NULL, enable "perf" handler, or enable "trace" handler.
 */
static int
372
enable_trace_kprobe(struct trace_kprobe *tk, struct trace_event_file *file)
373 374 375
{
	int ret = 0;

376
	if (file) {
377 378 379 380
		struct event_file_link *link;

		link = kmalloc(sizeof(*link), GFP_KERNEL);
		if (!link) {
381
			ret = -ENOMEM;
382
			goto out;
383 384
		}

385
		link->file = file;
386
		list_add_tail_rcu(&link->list, &tk->tp.files);
387

388
		tk->tp.flags |= TP_FLAG_TRACE;
389
	} else
390
		tk->tp.flags |= TP_FLAG_PROFILE;
391

392 393 394
	if (trace_probe_is_registered(&tk->tp) && !trace_kprobe_has_gone(tk)) {
		if (trace_kprobe_is_return(tk))
			ret = enable_kretprobe(&tk->rp);
395
		else
396
			ret = enable_kprobe(&tk->rp.kp);
397
	}
398
 out:
399 400 401
	return ret;
}

402 403 404 405 406
/*
 * Disable trace_probe
 * if the file is NULL, disable "perf" handler, or disable "trace" handler.
 */
static int
407
disable_trace_kprobe(struct trace_kprobe *tk, struct trace_event_file *file)
408
{
409 410
	struct event_file_link *link = NULL;
	int wait = 0;
411 412 413
	int ret = 0;

	if (file) {
414
		link = find_event_file_link(&tk->tp, file);
415
		if (!link) {
416
			ret = -EINVAL;
417
			goto out;
418 419
		}

420
		list_del_rcu(&link->list);
421
		wait = 1;
422
		if (!list_empty(&tk->tp.files))
423
			goto out;
424

425
		tk->tp.flags &= ~TP_FLAG_TRACE;
426
	} else
427
		tk->tp.flags &= ~TP_FLAG_PROFILE;
428

429 430 431
	if (!trace_probe_is_enabled(&tk->tp) && trace_probe_is_registered(&tk->tp)) {
		if (trace_kprobe_is_return(tk))
			disable_kretprobe(&tk->rp);
432
		else
433
			disable_kprobe(&tk->rp.kp);
434
		wait = 1;
435
	}
436
 out:
437 438 439 440 441 442 443 444 445 446 447 448 449
	if (wait) {
		/*
		 * Synchronize with kprobe_trace_func/kretprobe_trace_func
		 * to ensure disabled (all running handlers are finished).
		 * This is not only for kfree(), but also the caller,
		 * trace_remove_event_call() supposes it for releasing
		 * event_call related objects, which will be accessed in
		 * the kprobe_trace_func/kretprobe_trace_func.
		 */
		synchronize_sched();
		kfree(link);	/* Ignored if link == NULL */
	}

450
	return ret;
451 452
}

453
/* Internal register function - just handle k*probes and flags */
454
static int __register_trace_kprobe(struct trace_kprobe *tk)
455
{
456
	int i, ret;
457

458
	if (trace_probe_is_registered(&tk->tp))
459 460
		return -EINVAL;

461 462
	for (i = 0; i < tk->tp.nr_args; i++)
		traceprobe_update_arg(&tk->tp.args[i]);
463

464
	/* Set/clear disabled flag according to tp->flag */
465 466
	if (trace_probe_is_enabled(&tk->tp))
		tk->rp.kp.flags &= ~KPROBE_FLAG_DISABLED;
467
	else
468
		tk->rp.kp.flags |= KPROBE_FLAG_DISABLED;
469

470 471
	if (trace_kprobe_is_return(tk))
		ret = register_kretprobe(&tk->rp);
472
	else
473
		ret = register_kprobe(&tk->rp.kp);
474 475

	if (ret == 0)
476
		tk->tp.flags |= TP_FLAG_REGISTERED;
477
	else {
478 479
		pr_warn("Could not insert probe at %s+%lu: %d\n",
			trace_kprobe_symbol(tk), trace_kprobe_offset(tk), ret);
480
		if (ret == -ENOENT && trace_kprobe_is_on_module(tk)) {
481
			pr_warn("This probe might be able to register after target module is loaded. Continue.\n");
482 483
			ret = 0;
		} else if (ret == -EILSEQ) {
484 485
			pr_warn("Probing address(0x%p) is not an instruction boundary.\n",
				tk->rp.kp.addr);
486 487 488 489 490 491 492 493
			ret = -EINVAL;
		}
	}

	return ret;
}

/* Internal unregister function - just handle k*probes and flags */
494
static void __unregister_trace_kprobe(struct trace_kprobe *tk)
495
{
496 497 498
	if (trace_probe_is_registered(&tk->tp)) {
		if (trace_kprobe_is_return(tk))
			unregister_kretprobe(&tk->rp);
499
		else
500 501
			unregister_kprobe(&tk->rp.kp);
		tk->tp.flags &= ~TP_FLAG_REGISTERED;
502
		/* Cleanup kprobe for reuse */
503 504
		if (tk->rp.kp.symbol_name)
			tk->rp.kp.addr = NULL;
505 506 507 508
	}
}

/* Unregister a trace_probe and probe_event: call with locking probe_lock */
509
static int unregister_trace_kprobe(struct trace_kprobe *tk)
510
{
511
	/* Enabled event can not be unregistered */
512
	if (trace_probe_is_enabled(&tk->tp))
513 514
		return -EBUSY;

515
	/* Will fail if probe is being used by ftrace or perf */
516
	if (unregister_kprobe_event(tk))
517 518
		return -EBUSY;

519 520
	__unregister_trace_kprobe(tk);
	list_del(&tk->list);
521 522

	return 0;
523 524 525
}

/* Register a trace_probe and probe_event */
526
static int register_trace_kprobe(struct trace_kprobe *tk)
527
{
528
	struct trace_kprobe *old_tk;
529 530 531 532
	int ret;

	mutex_lock(&probe_lock);

533
	/* Delete old (same name) event if exist */
534
	old_tk = find_trace_kprobe(trace_event_name(&tk->tp.call),
535
			tk->tp.call.class->system);
536 537
	if (old_tk) {
		ret = unregister_trace_kprobe(old_tk);
538 539
		if (ret < 0)
			goto end;
540
		free_trace_kprobe(old_tk);
541
	}
542 543

	/* Register new event */
544
	ret = register_kprobe_event(tk);
545
	if (ret) {
546
		pr_warn("Failed to register probe event(%d)\n", ret);
547 548 549
		goto end;
	}

550
	/* Register k*probe */
551
	ret = __register_trace_kprobe(tk);
552
	if (ret < 0)
553
		unregister_kprobe_event(tk);
554
	else
555
		list_add_tail(&tk->list, &probe_list);
556

557 558 559 560 561
end:
	mutex_unlock(&probe_lock);
	return ret;
}

562
/* Module notifier call back, checking event on the module */
563
static int trace_kprobe_module_callback(struct notifier_block *nb,
564 565 566
				       unsigned long val, void *data)
{
	struct module *mod = data;
567
	struct trace_kprobe *tk;
568 569 570 571 572 573 574
	int ret;

	if (val != MODULE_STATE_COMING)
		return NOTIFY_DONE;

	/* Update probes on coming module */
	mutex_lock(&probe_lock);
575 576
	list_for_each_entry(tk, &probe_list, list) {
		if (trace_kprobe_within_module(tk, mod)) {
577
			/* Don't need to check busy - this should have gone. */
578 579
			__unregister_trace_kprobe(tk);
			ret = __register_trace_kprobe(tk);
580
			if (ret)
581 582 583
				pr_warn("Failed to re-register probe %s on %s: %d\n",
					trace_event_name(&tk->tp.call),
					mod->name, ret);
584 585 586 587 588 589 590
		}
	}
	mutex_unlock(&probe_lock);

	return NOTIFY_DONE;
}

591 592
static struct notifier_block trace_kprobe_module_nb = {
	.notifier_call = trace_kprobe_module_callback,
593 594 595
	.priority = 1	/* Invoked after kprobe module callback */
};

596
static int create_trace_kprobe(int argc, char **argv)
597 598 599
{
	/*
	 * Argument syntax:
600 601
	 *  - Add kprobe: p[:[GRP/]EVENT] [MOD:]KSYM[+OFFS]|KADDR [FETCHARGS]
	 *  - Add kretprobe: r[:[GRP/]EVENT] [MOD:]KSYM[+0] [FETCHARGS]
602
	 * Fetch args:
603 604 605
	 *  $retval	: fetch return value
	 *  $stack	: fetch stack address
	 *  $stackN	: fetch Nth of stack (N:0-)
606
	 *  $comm       : fetch current task comm
607 608 609
	 *  @ADDR	: fetch memory at ADDR (ADDR should be in kernel)
	 *  @SYM[+|-offs] : fetch memory at SYM +|- offs (SYM is a data symbol)
	 *  %REG	: fetch register REG
610
	 * Dereferencing memory fetch:
611
	 *  +|-offs(ARG) : fetch memory at ARG +|- offs address.
612 613
	 * Alias name of args:
	 *  NAME=FETCHARG : set NAME as alias of FETCHARG.
614 615
	 * Type of args:
	 *  FETCHARG:TYPE : use TYPE instead of unsigned long.
616
	 */
617
	struct trace_kprobe *tk;
618
	int i, ret = 0;
619
	bool is_return = false, is_delete = false;
620
	char *symbol = NULL, *event = NULL, *group = NULL;
621
	char *arg;
622
	unsigned long offset = 0;
623
	void *addr = NULL;
624
	char buf[MAX_EVENT_NAME_LEN];
625

626
	/* argc must be >= 1 */
627
	if (argv[0][0] == 'p')
628
		is_return = false;
629
	else if (argv[0][0] == 'r')
630
		is_return = true;
631
	else if (argv[0][0] == '-')
632
		is_delete = true;
633
	else {
634 635
		pr_info("Probe definition must be started with 'p', 'r' or"
			" '-'.\n");
636
		return -EINVAL;
637
	}
638 639 640

	if (argv[0][1] == ':') {
		event = &argv[0][2];
641 642 643 644 645
		if (strchr(event, '/')) {
			group = event;
			event = strchr(group, '/') + 1;
			event[-1] = '\0';
			if (strlen(group) == 0) {
646
				pr_info("Group name is not specified\n");
647 648 649
				return -EINVAL;
			}
		}
650
		if (strlen(event) == 0) {
651
			pr_info("Event name is not specified\n");
652 653 654
			return -EINVAL;
		}
	}
655 656
	if (!group)
		group = KPROBE_EVENT_SYSTEM;
657

658 659 660 661 662
	if (is_delete) {
		if (!event) {
			pr_info("Delete command needs an event name.\n");
			return -EINVAL;
		}
663
		mutex_lock(&probe_lock);
664 665
		tk = find_trace_kprobe(event, group);
		if (!tk) {
666
			mutex_unlock(&probe_lock);
667 668 669 670
			pr_info("Event %s/%s doesn't exist.\n", group, event);
			return -ENOENT;
		}
		/* delete an event */
671
		ret = unregister_trace_kprobe(tk);
672
		if (ret == 0)
673
			free_trace_kprobe(tk);
674
		mutex_unlock(&probe_lock);
675
		return ret;
676 677 678 679 680 681
	}

	if (argc < 2) {
		pr_info("Probe point is not specified.\n");
		return -EINVAL;
	}
682 683
	if (isdigit(argv[1][0])) {
		/* an address specified */
684
		ret = kstrtoul(&argv[1][0], 0, (unsigned long *)&addr);
685 686
		if (ret) {
			pr_info("Failed to parse address.\n");
687
			return ret;
688
		}
689 690 691 692
	} else {
		/* a symbol specified */
		symbol = argv[1];
		/* TODO: support .init module functions */
693
		ret = traceprobe_split_symbol_offset(symbol, &offset);
694 695
		if (ret) {
			pr_info("Failed to parse symbol.\n");
696
			return ret;
697
		}
698
	}
699
	argc -= 2; argv += 2;
700 701

	/* setup a probe */
702 703 704
	if (!event) {
		/* Make a new event name */
		if (symbol)
705
			snprintf(buf, MAX_EVENT_NAME_LEN, "%c_%s_%ld",
706 707
				 is_return ? 'r' : 'p', symbol, offset);
		else
708
			snprintf(buf, MAX_EVENT_NAME_LEN, "%c_0x%p",
709
				 is_return ? 'r' : 'p', addr);
710 711
		event = buf;
	}
712
	tk = alloc_trace_kprobe(group, event, addr, symbol, offset, argc,
713
			       is_return);
714
	if (IS_ERR(tk)) {
715
		pr_info("Failed to allocate trace_probe.(%d)\n",
716 717
			(int)PTR_ERR(tk));
		return PTR_ERR(tk);
718
	}
719 720

	/* parse arguments */
721 722
	ret = 0;
	for (i = 0; i < argc && i < MAX_TRACE_ARGS; i++) {
723 724
		struct probe_arg *parg = &tk->tp.args[i];

725
		/* Increment count for freeing args in error case */
726
		tk->tp.nr_args++;
727

728 729
		/* Parse argument name */
		arg = strchr(argv[i], '=');
730
		if (arg) {
731
			*arg++ = '\0';
732
			parg->name = kstrdup(argv[i], GFP_KERNEL);
733
		} else {
734
			arg = argv[i];
735 736
			/* If argument name is omitted, set "argN" */
			snprintf(buf, MAX_EVENT_NAME_LEN, "arg%d", i + 1);
737
			parg->name = kstrdup(buf, GFP_KERNEL);
738
		}
739

740
		if (!parg->name) {
741
			pr_info("Failed to allocate argument[%d] name.\n", i);
742
			ret = -ENOMEM;
743 744
			goto error;
		}
745

746
		if (!is_good_name(parg->name)) {
747
			pr_info("Invalid argument[%d] name: %s\n",
748
				i, parg->name);
749 750 751
			ret = -EINVAL;
			goto error;
		}
752

753 754
		if (traceprobe_conflict_field_name(parg->name,
							tk->tp.args, i)) {
755
			pr_info("Argument[%d] name '%s' conflicts with "
756 757 758 759
				"another field.\n", i, argv[i]);
			ret = -EINVAL;
			goto error;
		}
760 761

		/* Parse fetch argument */
762
		ret = traceprobe_parse_probe_arg(arg, &tk->tp.size, parg,
763 764
						is_return, true,
						kprobes_fetch_type_table);
765
		if (ret) {
766
			pr_info("Parse error at argument[%d]. (%d)\n", i, ret);
767
			goto error;
768
		}
769 770
	}

771
	ret = register_trace_kprobe(tk);
772 773 774 775 776
	if (ret)
		goto error;
	return 0;

error:
777
	free_trace_kprobe(tk);
778 779 780
	return ret;
}

781
static int release_all_trace_kprobes(void)
782
{
783
	struct trace_kprobe *tk;
784
	int ret = 0;
785 786

	mutex_lock(&probe_lock);
787
	/* Ensure no probe is in use. */
788 789
	list_for_each_entry(tk, &probe_list, list)
		if (trace_probe_is_enabled(&tk->tp)) {
790 791 792
			ret = -EBUSY;
			goto end;
		}
793 794
	/* TODO: Use batch unregistration */
	while (!list_empty(&probe_list)) {
795 796
		tk = list_entry(probe_list.next, struct trace_kprobe, list);
		ret = unregister_trace_kprobe(tk);
797 798
		if (ret)
			goto end;
799
		free_trace_kprobe(tk);
800
	}
801 802

end:
803
	mutex_unlock(&probe_lock);
804 805

	return ret;
806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826
}

/* Probes listing interfaces */
static void *probes_seq_start(struct seq_file *m, loff_t *pos)
{
	mutex_lock(&probe_lock);
	return seq_list_start(&probe_list, *pos);
}

static void *probes_seq_next(struct seq_file *m, void *v, loff_t *pos)
{
	return seq_list_next(v, &probe_list, pos);
}

static void probes_seq_stop(struct seq_file *m, void *v)
{
	mutex_unlock(&probe_lock);
}

static int probes_seq_show(struct seq_file *m, void *v)
{
827
	struct trace_kprobe *tk = v;
828
	int i;
829

830
	seq_putc(m, trace_kprobe_is_return(tk) ? 'r' : 'p');
831
	seq_printf(m, ":%s/%s", tk->tp.call.class->system,
832
			trace_event_name(&tk->tp.call));
833

834 835 836 837 838
	if (!tk->symbol)
		seq_printf(m, " 0x%p", tk->rp.kp.addr);
	else if (tk->rp.kp.offset)
		seq_printf(m, " %s+%u", trace_kprobe_symbol(tk),
			   tk->rp.kp.offset);
839
	else
840
		seq_printf(m, " %s", trace_kprobe_symbol(tk));
841

842 843
	for (i = 0; i < tk->tp.nr_args; i++)
		seq_printf(m, " %s=%s", tk->tp.args[i].name, tk->tp.args[i].comm);
844
	seq_putc(m, '\n');
845

846 847 848 849 850 851 852 853 854 855 856 857
	return 0;
}

static const struct seq_operations probes_seq_op = {
	.start  = probes_seq_start,
	.next   = probes_seq_next,
	.stop   = probes_seq_stop,
	.show   = probes_seq_show
};

static int probes_open(struct inode *inode, struct file *file)
{
858 859 860
	int ret;

	if ((file->f_mode & FMODE_WRITE) && (file->f_flags & O_TRUNC)) {
861
		ret = release_all_trace_kprobes();
862 863 864
		if (ret < 0)
			return ret;
	}
865 866 867 868 869 870 871

	return seq_open(file, &probes_seq_op);
}

static ssize_t probes_write(struct file *file, const char __user *buffer,
			    size_t count, loff_t *ppos)
{
872
	return traceprobe_probes_write(file, buffer, count, ppos,
873
			create_trace_kprobe);
874 875 876 877 878 879 880 881 882 883 884
}

static const struct file_operations kprobe_events_ops = {
	.owner          = THIS_MODULE,
	.open           = probes_open,
	.read           = seq_read,
	.llseek         = seq_lseek,
	.release        = seq_release,
	.write		= probes_write,
};

885 886 887
/* Probes profiling interfaces */
static int probes_profile_seq_show(struct seq_file *m, void *v)
{
888
	struct trace_kprobe *tk = v;
889

890
	seq_printf(m, "  %-44s %15lu %15lu\n",
891 892
		   trace_event_name(&tk->tp.call),
		   trace_kprobe_nhit(tk),
893
		   tk->rp.kp.nmissed);
894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917

	return 0;
}

static const struct seq_operations profile_seq_op = {
	.start  = probes_seq_start,
	.next   = probes_seq_next,
	.stop   = probes_seq_stop,
	.show   = probes_profile_seq_show
};

static int profile_open(struct inode *inode, struct file *file)
{
	return seq_open(file, &profile_seq_op);
}

static const struct file_operations kprobe_profile_ops = {
	.owner          = THIS_MODULE,
	.open           = profile_open,
	.read           = seq_read,
	.llseek         = seq_lseek,
	.release        = seq_release,
};

918
/* Kprobe handler */
919
static nokprobe_inline void
920
__kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs,
921
		    struct trace_event_file *trace_file)
922
{
923
	struct kprobe_trace_entry_head *entry;
924
	struct ring_buffer_event *event;
925
	struct ring_buffer *buffer;
926
	int size, dsize, pc;
927
	unsigned long irq_flags;
928
	struct trace_event_call *call = &tk->tp.call;
929

930
	WARN_ON(call != trace_file->event_call);
931

932
	if (trace_trigger_soft_disabled(trace_file))
933
		return;
934

935 936 937
	local_save_flags(irq_flags);
	pc = preempt_count();

938 939
	dsize = __get_data_size(&tk->tp, regs);
	size = sizeof(*entry) + tk->tp.size + dsize;
940

941
	event = trace_event_buffer_lock_reserve(&buffer, trace_file,
942 943
						call->event.type,
						size, irq_flags, pc);
944
	if (!event)
945
		return;
946 947

	entry = ring_buffer_event_data(event);
948 949
	entry->ip = (unsigned long)tk->rp.kp.addr;
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
950

951
	event_trigger_unlock_commit_regs(trace_file, buffer, event,
952
					 entry, irq_flags, pc, regs);
953 954
}

955
static void
956
kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs)
957
{
958
	struct event_file_link *link;
959

960 961
	list_for_each_entry_rcu(link, &tk->tp.files, list)
		__kprobe_trace_func(tk, regs, link->file);
962
}
963
NOKPROBE_SYMBOL(kprobe_trace_func);
964

965
/* Kretprobe handler */
966
static nokprobe_inline void
967
__kretprobe_trace_func(struct trace_kprobe *tk, struct kretprobe_instance *ri,
968
		       struct pt_regs *regs,
969
		       struct trace_event_file *trace_file)
970
{
971
	struct kretprobe_trace_entry_head *entry;
972
	struct ring_buffer_event *event;
973
	struct ring_buffer *buffer;
974
	int size, pc, dsize;
975
	unsigned long irq_flags;
976
	struct trace_event_call *call = &tk->tp.call;
977

978
	WARN_ON(call != trace_file->event_call);
979

980
	if (trace_trigger_soft_disabled(trace_file))
981
		return;
982

983 984 985
	local_save_flags(irq_flags);
	pc = preempt_count();

986 987
	dsize = __get_data_size(&tk->tp, regs);
	size = sizeof(*entry) + tk->tp.size + dsize;
988

989
	event = trace_event_buffer_lock_reserve(&buffer, trace_file,
990 991
						call->event.type,
						size, irq_flags, pc);
992
	if (!event)
993
		return;
994 995

	entry = ring_buffer_event_data(event);
996
	entry->func = (unsigned long)tk->rp.kp.addr;
997
	entry->ret_ip = (unsigned long)ri->ret_addr;
998
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
999

1000
	event_trigger_unlock_commit_regs(trace_file, buffer, event,
1001
					 entry, irq_flags, pc, regs);
1002 1003
}

1004
static void
1005
kretprobe_trace_func(struct trace_kprobe *tk, struct kretprobe_instance *ri,
1006 1007
		     struct pt_regs *regs)
{
1008
	struct event_file_link *link;
1009

1010 1011
	list_for_each_entry_rcu(link, &tk->tp.files, list)
		__kretprobe_trace_func(tk, ri, regs, link->file);
1012
}
1013
NOKPROBE_SYMBOL(kretprobe_trace_func);
1014

1015
/* Event entry printers */
1016
static enum print_line_t
1017 1018
print_kprobe_event(struct trace_iterator *iter, int flags,
		   struct trace_event *event)
1019
{
1020
	struct kprobe_trace_entry_head *field;
1021
	struct trace_seq *s = &iter->seq;
1022
	struct trace_probe *tp;
1023
	u8 *data;
1024 1025
	int i;

1026
	field = (struct kprobe_trace_entry_head *)iter->ent;
1027
	tp = container_of(event, struct trace_probe, call.event);
1028

1029
	trace_seq_printf(s, "%s: (", trace_event_name(&tp->call));
1030

1031
	if (!seq_print_ip_sym(s, field->ip, flags | TRACE_ITER_SYM_OFFSET))
1032
		goto out;
1033

1034
	trace_seq_putc(s, ')');
1035

1036 1037 1038
	data = (u8 *)&field[1];
	for (i = 0; i < tp->nr_args; i++)
		if (!tp->args[i].type->print(s, tp->args[i].name,
1039
					     data + tp->args[i].offset, field))
1040
			goto out;
1041

1042 1043 1044
	trace_seq_putc(s, '\n');
 out:
	return trace_handle_return(s);
1045 1046
}

1047
static enum print_line_t
1048 1049
print_kretprobe_event(struct trace_iterator *iter, int flags,
		      struct trace_event *event)
1050
{
1051
	struct kretprobe_trace_entry_head *field;
1052
	struct trace_seq *s = &iter->seq;
1053
	struct trace_probe *tp;
1054
	u8 *data;
1055 1056
	int i;

1057
	field = (struct kretprobe_trace_entry_head *)iter->ent;
1058
	tp = container_of(event, struct trace_probe, call.event);
1059

1060
	trace_seq_printf(s, "%s: (", trace_event_name(&tp->call));
1061

1062
	if (!seq_print_ip_sym(s, field->ret_ip, flags | TRACE_ITER_SYM_OFFSET))
1063
		goto out;
1064

1065
	trace_seq_puts(s, " <- ");
1066 1067

	if (!seq_print_ip_sym(s, field->func, flags & ~TRACE_ITER_SYM_OFFSET))
1068
		goto out;
1069

1070
	trace_seq_putc(s, ')');
1071

1072 1073 1074
	data = (u8 *)&field[1];
	for (i = 0; i < tp->nr_args; i++)
		if (!tp->args[i].type->print(s, tp->args[i].name,
1075
					     data + tp->args[i].offset, field))
1076
			goto out;
1077

1078
	trace_seq_putc(s, '\n');
1079

1080 1081
 out:
	return trace_handle_return(s);
1082 1083 1084
}


1085
static int kprobe_event_define_fields(struct trace_event_call *event_call)
1086 1087
{
	int ret, i;
1088
	struct kprobe_trace_entry_head field;
1089
	struct trace_kprobe *tk = (struct trace_kprobe *)event_call->data;
1090

1091
	DEFINE_FIELD(unsigned long, ip, FIELD_STRING_IP, 0);
1092
	/* Set argument names as fields */
1093 1094 1095 1096 1097 1098 1099 1100
	for (i = 0; i < tk->tp.nr_args; i++) {
		struct probe_arg *parg = &tk->tp.args[i];

		ret = trace_define_field(event_call, parg->type->fmttype,
					 parg->name,
					 sizeof(field) + parg->offset,
					 parg->type->size,
					 parg->type->is_signed,
1101 1102 1103 1104
					 FILTER_OTHER);
		if (ret)
			return ret;
	}
1105 1106 1107
	return 0;
}

1108
static int kretprobe_event_define_fields(struct trace_event_call *event_call)
1109 1110
{
	int ret, i;
1111
	struct kretprobe_trace_entry_head field;
1112
	struct trace_kprobe *tk = (struct trace_kprobe *)event_call->data;
1113

1114 1115
	DEFINE_FIELD(unsigned long, func, FIELD_STRING_FUNC, 0);
	DEFINE_FIELD(unsigned long, ret_ip, FIELD_STRING_RETIP, 0);
1116
	/* Set argument names as fields */
1117 1118 1119 1120 1121 1122 1123 1124
	for (i = 0; i < tk->tp.nr_args; i++) {
		struct probe_arg *parg = &tk->tp.args[i];

		ret = trace_define_field(event_call, parg->type->fmttype,
					 parg->name,
					 sizeof(field) + parg->offset,
					 parg->type->size,
					 parg->type->is_signed,
1125 1126 1127 1128
					 FILTER_OTHER);
		if (ret)
			return ret;
	}
1129 1130 1131
	return 0;
}

1132
#ifdef CONFIG_PERF_EVENTS
1133 1134

/* Kprobe profile handler */
1135
static void
1136
kprobe_perf_func(struct trace_kprobe *tk, struct pt_regs *regs)
1137
{
1138
	struct trace_event_call *call = &tk->tp.call;
1139
	struct bpf_prog *prog = call->prog;
1140
	struct kprobe_trace_entry_head *entry;
1141
	struct hlist_head *head;
1142
	int size, __size, dsize;
1143
	int rctx;
1144

1145 1146 1147
	if (prog && !trace_call_bpf(prog, regs))
		return;

1148 1149 1150 1151
	head = this_cpu_ptr(call->perf_events);
	if (hlist_empty(head))
		return;

1152 1153
	dsize = __get_data_size(&tk->tp, regs);
	__size = sizeof(*entry) + tk->tp.size + dsize;
1154 1155
	size = ALIGN(__size + sizeof(u32), sizeof(u64));
	size -= sizeof(u32);
1156

1157
	entry = perf_trace_buf_alloc(size, NULL, &rctx);
1158
	if (!entry)
1159
		return;
1160

1161
	entry->ip = (unsigned long)tk->rp.kp.addr;
1162
	memset(&entry[1], 0, dsize);
1163
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
1164 1165
	perf_trace_buf_submit(entry, size, rctx, call->event.type, 1, regs,
			      head, NULL);
1166
}
1167
NOKPROBE_SYMBOL(kprobe_perf_func);
1168 1169

/* Kretprobe profile handler */
1170
static void
1171
kretprobe_perf_func(struct trace_kprobe *tk, struct kretprobe_instance *ri,
1172
		    struct pt_regs *regs)
1173
{
1174
	struct trace_event_call *call = &tk->tp.call;
1175
	struct bpf_prog *prog = call->prog;
1176
	struct kretprobe_trace_entry_head *entry;
1177
	struct hlist_head *head;
1178
	int size, __size, dsize;
1179
	int rctx;
1180

1181 1182 1183
	if (prog && !trace_call_bpf(prog, regs))
		return;

1184 1185 1186 1187
	head = this_cpu_ptr(call->perf_events);
	if (hlist_empty(head))
		return;

1188 1189
	dsize = __get_data_size(&tk->tp, regs);
	__size = sizeof(*entry) + tk->tp.size + dsize;
1190 1191
	size = ALIGN(__size + sizeof(u32), sizeof(u64));
	size -= sizeof(u32);
1192

1193
	entry = perf_trace_buf_alloc(size, NULL, &rctx);
1194
	if (!entry)
1195
		return;
1196

1197
	entry->func = (unsigned long)tk->rp.kp.addr;
1198
	entry->ret_ip = (unsigned long)ri->ret_addr;
1199
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
1200 1201
	perf_trace_buf_submit(entry, size, rctx, call->event.type, 1, regs,
			      head, NULL);
1202
}
1203
NOKPROBE_SYMBOL(kretprobe_perf_func);
1204
#endif	/* CONFIG_PERF_EVENTS */
1205

1206 1207 1208 1209 1210 1211
/*
 * called by perf_trace_init() or __ftrace_set_clr_event() under event_mutex.
 *
 * kprobe_trace_self_tests_init() does enable_trace_probe/disable_trace_probe
 * lockless, but we can't race with this __init function.
 */
1212
static int kprobe_register(struct trace_event_call *event,
1213
			   enum trace_reg type, void *data)
1214
{
1215
	struct trace_kprobe *tk = (struct trace_kprobe *)event->data;
1216
	struct trace_event_file *file = data;
1217

1218 1219
	switch (type) {
	case TRACE_REG_REGISTER:
1220
		return enable_trace_kprobe(tk, file);
1221
	case TRACE_REG_UNREGISTER:
1222
		return disable_trace_kprobe(tk, file);
1223 1224 1225

#ifdef CONFIG_PERF_EVENTS
	case TRACE_REG_PERF_REGISTER:
1226
		return enable_trace_kprobe(tk, NULL);
1227
	case TRACE_REG_PERF_UNREGISTER:
1228
		return disable_trace_kprobe(tk, NULL);
1229 1230
	case TRACE_REG_PERF_OPEN:
	case TRACE_REG_PERF_CLOSE:
1231 1232
	case TRACE_REG_PERF_ADD:
	case TRACE_REG_PERF_DEL:
1233
		return 0;
1234 1235 1236 1237
#endif
	}
	return 0;
}
1238

1239
static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs)
1240
{
1241
	struct trace_kprobe *tk = container_of(kp, struct trace_kprobe, rp.kp);
1242

1243
	raw_cpu_inc(*tk->nhit);
1244

1245 1246
	if (tk->tp.flags & TP_FLAG_TRACE)
		kprobe_trace_func(tk, regs);
1247
#ifdef CONFIG_PERF_EVENTS
1248 1249
	if (tk->tp.flags & TP_FLAG_PROFILE)
		kprobe_perf_func(tk, regs);
1250
#endif
1251 1252
	return 0;	/* We don't tweek kernel, so just return 0 */
}
1253
NOKPROBE_SYMBOL(kprobe_dispatcher);
1254

1255 1256
static int
kretprobe_dispatcher(struct kretprobe_instance *ri, struct pt_regs *regs)
1257
{
1258
	struct trace_kprobe *tk = container_of(ri->rp, struct trace_kprobe, rp);
1259

1260
	raw_cpu_inc(*tk->nhit);
1261

1262 1263
	if (tk->tp.flags & TP_FLAG_TRACE)
		kretprobe_trace_func(tk, ri, regs);
1264
#ifdef CONFIG_PERF_EVENTS
1265 1266
	if (tk->tp.flags & TP_FLAG_PROFILE)
		kretprobe_perf_func(tk, ri, regs);
1267
#endif
1268 1269
	return 0;	/* We don't tweek kernel, so just return 0 */
}
1270
NOKPROBE_SYMBOL(kretprobe_dispatcher);
1271

1272 1273 1274 1275 1276 1277 1278 1279
static struct trace_event_functions kretprobe_funcs = {
	.trace		= print_kretprobe_event
};

static struct trace_event_functions kprobe_funcs = {
	.trace		= print_kprobe_event
};

1280
static int register_kprobe_event(struct trace_kprobe *tk)
1281
{
1282
	struct trace_event_call *call = &tk->tp.call;
1283 1284
	int ret;

1285
	/* Initialize trace_event_call */
1286
	INIT_LIST_HEAD(&call->class->fields);
1287
	if (trace_kprobe_is_return(tk)) {
1288
		call->event.funcs = &kretprobe_funcs;
1289
		call->class->define_fields = kretprobe_event_define_fields;
1290
	} else {
1291
		call->event.funcs = &kprobe_funcs;
1292
		call->class->define_fields = kprobe_event_define_fields;
1293
	}
1294
	if (set_print_fmt(&tk->tp, trace_kprobe_is_return(tk)) < 0)
1295
		return -ENOMEM;
1296
	ret = register_trace_event(&call->event);
1297
	if (!ret) {
1298
		kfree(call->print_fmt);
1299
		return -ENODEV;
1300
	}
A
Alexei Starovoitov 已提交
1301
	call->flags = TRACE_EVENT_FL_KPROBE;
1302
	call->class->reg = kprobe_register;
1303
	call->data = tk;
1304
	ret = trace_add_event_call(call);
1305
	if (ret) {
1306
		pr_info("Failed to register kprobe event: %s\n",
1307
			trace_event_name(call));
1308
		kfree(call->print_fmt);
1309
		unregister_trace_event(&call->event);
1310
	}
1311 1312 1313
	return ret;
}

1314
static int unregister_kprobe_event(struct trace_kprobe *tk)
1315
{
1316 1317
	int ret;

1318
	/* tp->event is unregistered in trace_remove_event_call() */
1319
	ret = trace_remove_event_call(&tk->tp.call);
1320
	if (!ret)
1321
		kfree(tk->tp.call.print_fmt);
1322
	return ret;
1323 1324
}

1325
/* Make a tracefs interface for controlling probe points */
1326 1327 1328 1329 1330
static __init int init_kprobe_trace(void)
{
	struct dentry *d_tracer;
	struct dentry *entry;

1331
	if (register_module_notifier(&trace_kprobe_module_nb))
1332 1333
		return -EINVAL;

1334
	d_tracer = tracing_init_dentry();
1335
	if (IS_ERR(d_tracer))
1336 1337
		return 0;

1338
	entry = tracefs_create_file("kprobe_events", 0644, d_tracer,
1339 1340
				    NULL, &kprobe_events_ops);

1341
	/* Event list interface */
1342
	if (!entry)
1343
		pr_warn("Could not create tracefs 'kprobe_events' entry\n");
1344 1345

	/* Profile interface */
1346
	entry = tracefs_create_file("kprobe_profile", 0444, d_tracer,
1347 1348 1349
				    NULL, &kprobe_profile_ops);

	if (!entry)
1350
		pr_warn("Could not create tracefs 'kprobe_profile' entry\n");
1351 1352 1353 1354 1355 1356
	return 0;
}
fs_initcall(init_kprobe_trace);


#ifdef CONFIG_FTRACE_STARTUP_TEST
1357 1358
/*
 * The "__used" keeps gcc from removing the function symbol
1359 1360
 * from the kallsyms table. 'noinline' makes sure that there
 * isn't an inlined version used by the test method below
1361
 */
1362 1363
static __used __init noinline int
kprobe_trace_selftest_target(int a1, int a2, int a3, int a4, int a5, int a6)
1364 1365 1366 1367
{
	return a1 + a2 + a3 + a4 + a5 + a6;
}

1368
static __init struct trace_event_file *
1369
find_trace_probe_file(struct trace_kprobe *tk, struct trace_array *tr)
1370
{
1371
	struct trace_event_file *file;
1372 1373

	list_for_each_entry(file, &tr->events, list)
1374
		if (file->event_call == &tk->tp.call)
1375 1376 1377 1378 1379
			return file;

	return NULL;
}

1380
/*
1381
 * Nobody but us can call enable_trace_kprobe/disable_trace_kprobe at this
1382 1383
 * stage, we can do this lockless.
 */
1384 1385
static __init int kprobe_trace_self_tests_init(void)
{
1386
	int ret, warn = 0;
1387
	int (*target)(int, int, int, int, int, int);
1388
	struct trace_kprobe *tk;
1389
	struct trace_event_file *file;
1390

1391 1392 1393
	if (tracing_is_disabled())
		return -ENODEV;

1394 1395 1396 1397
	target = kprobe_trace_selftest_target;

	pr_info("Testing kprobe tracing: ");

1398 1399
	ret = traceprobe_command("p:testprobe kprobe_trace_selftest_target "
				  "$stack $stack0 +0($stack)",
1400
				  create_trace_kprobe);
1401
	if (WARN_ON_ONCE(ret)) {
1402
		pr_warn("error on probing function entry.\n");
1403 1404 1405
		warn++;
	} else {
		/* Enable trace point */
1406 1407
		tk = find_trace_kprobe("testprobe", KPROBE_EVENT_SYSTEM);
		if (WARN_ON_ONCE(tk == NULL)) {
1408
			pr_warn("error on getting new probe.\n");
1409
			warn++;
1410
		} else {
1411
			file = find_trace_probe_file(tk, top_trace_array());
1412 1413 1414 1415
			if (WARN_ON_ONCE(file == NULL)) {
				pr_warn("error on getting probe file.\n");
				warn++;
			} else
1416
				enable_trace_kprobe(tk, file);
1417
		}
1418
	}
1419

1420
	ret = traceprobe_command("r:testprobe2 kprobe_trace_selftest_target "
1421
				  "$retval", create_trace_kprobe);
1422
	if (WARN_ON_ONCE(ret)) {
1423
		pr_warn("error on probing function return.\n");
1424 1425 1426
		warn++;
	} else {
		/* Enable trace point */
1427 1428
		tk = find_trace_kprobe("testprobe2", KPROBE_EVENT_SYSTEM);
		if (WARN_ON_ONCE(tk == NULL)) {
1429
			pr_warn("error on getting 2nd new probe.\n");
1430
			warn++;
1431
		} else {
1432
			file = find_trace_probe_file(tk, top_trace_array());
1433 1434 1435 1436
			if (WARN_ON_ONCE(file == NULL)) {
				pr_warn("error on getting probe file.\n");
				warn++;
			} else
1437
				enable_trace_kprobe(tk, file);
1438
		}
1439 1440 1441 1442
	}

	if (warn)
		goto end;
1443 1444 1445

	ret = target(1, 2, 3, 4, 5, 6);

1446 1447 1448 1449 1450 1451 1452 1453
	/*
	 * Not expecting an error here, the check is only to prevent the
	 * optimizer from removing the call to target() as otherwise there
	 * are no side-effects and the call is never performed.
	 */
	if (ret != 21)
		warn++;

1454
	/* Disable trace points before removing it */
1455 1456
	tk = find_trace_kprobe("testprobe", KPROBE_EVENT_SYSTEM);
	if (WARN_ON_ONCE(tk == NULL)) {
1457
		pr_warn("error on getting test probe.\n");
1458
		warn++;
1459
	} else {
1460 1461 1462 1463 1464
		if (trace_kprobe_nhit(tk) != 1) {
			pr_warn("incorrect number of testprobe hits\n");
			warn++;
		}

1465
		file = find_trace_probe_file(tk, top_trace_array());
1466 1467 1468 1469
		if (WARN_ON_ONCE(file == NULL)) {
			pr_warn("error on getting probe file.\n");
			warn++;
		} else
1470
			disable_trace_kprobe(tk, file);
1471
	}
1472

1473 1474
	tk = find_trace_kprobe("testprobe2", KPROBE_EVENT_SYSTEM);
	if (WARN_ON_ONCE(tk == NULL)) {
1475
		pr_warn("error on getting 2nd test probe.\n");
1476
		warn++;
1477
	} else {
1478 1479 1480 1481 1482
		if (trace_kprobe_nhit(tk) != 1) {
			pr_warn("incorrect number of testprobe2 hits\n");
			warn++;
		}

1483
		file = find_trace_probe_file(tk, top_trace_array());
1484 1485 1486 1487
		if (WARN_ON_ONCE(file == NULL)) {
			pr_warn("error on getting probe file.\n");
			warn++;
		} else
1488
			disable_trace_kprobe(tk, file);
1489
	}
1490

1491
	ret = traceprobe_command("-:testprobe", create_trace_kprobe);
1492
	if (WARN_ON_ONCE(ret)) {
1493
		pr_warn("error on deleting a probe.\n");
1494 1495 1496
		warn++;
	}

1497
	ret = traceprobe_command("-:testprobe2", create_trace_kprobe);
1498
	if (WARN_ON_ONCE(ret)) {
1499
		pr_warn("error on deleting a probe.\n");
1500 1501
		warn++;
	}
1502

1503
end:
1504
	release_all_trace_kprobes();
1505 1506 1507 1508
	if (warn)
		pr_cont("NG: Some tests are failed. Please check them.\n");
	else
		pr_cont("OK\n");
1509 1510 1511 1512 1513 1514
	return 0;
}

late_initcall(kprobe_trace_self_tests_init);

#endif