probe-event.c 35.9 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
/*
 * probe-event.c : perf-probe definition to kprobe_events format converter
 *
 * Written by Masami Hiramatsu <mhiramat@redhat.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 *
 */

#define _GNU_SOURCE
#include <sys/utsname.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <errno.h>
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
32 33
#include <stdarg.h>
#include <limits.h>
34 35

#undef _GNU_SOURCE
36
#include "util.h"
37
#include "event.h"
38
#include "string.h"
39
#include "strlist.h"
40
#include "debug.h"
41
#include "cache.h"
42
#include "color.h"
43 44
#include "symbol.h"
#include "thread.h"
45
#include "debugfs.h"
46
#include "trace-event.h"	/* For __unused */
47
#include "probe-event.h"
48
#include "probe-finder.h"
49 50 51 52 53

#define MAX_CMDLEN 256
#define MAX_PROBE_ARGS 128
#define PERFPROBE_GROUP "probe"

54 55
bool probe_event_dry_run;	/* Dry run flag */

56
#define semantic_error(msg ...) pr_err("Semantic error :" msg)
57

58
/* If there is no space to write, returns -E2BIG. */
59 60 61
static int e_snprintf(char *str, size_t size, const char *format, ...)
	__attribute__((format(printf, 3, 4)));

62 63 64 65 66 67 68 69 70 71 72 73
static int e_snprintf(char *str, size_t size, const char *format, ...)
{
	int ret;
	va_list ap;
	va_start(ap, format);
	ret = vsnprintf(str, size, format, ap);
	va_end(ap);
	if (ret >= (int)size)
		ret = -E2BIG;
	return ret;
}

74
static char *synthesize_perf_probe_point(struct perf_probe_point *pp);
75
static struct machine machine;
76

77
/* Initialize symbol maps and path of vmlinux */
78
static int init_vmlinux(void)
79
{
80
	struct dso *kernel;
81 82
	int ret;

83 84 85 86 87
	symbol_conf.sort_by_name = true;
	if (symbol_conf.vmlinux_name == NULL)
		symbol_conf.try_vmlinux_path = true;
	else
		pr_debug("Use vmlinux: %s\n", symbol_conf.vmlinux_name);
88 89 90 91 92
	ret = symbol__init();
	if (ret < 0) {
		pr_debug("Failed to init symbol map.\n");
		goto out;
	}
93

94 95 96 97
	ret = machine__init(&machine, "/", 0);
	if (ret < 0)
		goto out;

98 99 100 101
	kernel = dso__new_kernel(symbol_conf.vmlinux_name);
	if (kernel == NULL)
		die("Failed to create kernel dso.");

102
	ret = __machine__create_kernel_maps(&machine, kernel);
103 104 105 106 107 108 109
	if (ret < 0)
		pr_debug("Failed to create kernel maps.\n");

out:
	if (ret < 0)
		pr_warning("Failed to init vmlinux path.\n");
	return ret;
110 111
}

112
#ifdef DWARF_SUPPORT
113 114
static int open_vmlinux(void)
{
115
	if (map__load(machine.vmlinux_maps[MAP__FUNCTION], NULL) < 0) {
116 117 118
		pr_debug("Failed to load kernel map.\n");
		return -EINVAL;
	}
119 120
	pr_debug("Try to open %s\n", machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name);
	return open(machine.vmlinux_maps[MAP__FUNCTION]->dso->long_name, O_RDONLY);
121
}
122

123 124 125
/* Convert trace point to probe point with debuginfo */
static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
				       struct perf_probe_point *pp)
126 127
{
	struct symbol *sym;
128
	int fd, ret = -ENOENT;
129

130
	sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
131 132 133
				       tp->symbol, NULL);
	if (sym) {
		fd = open_vmlinux();
134 135 136 137 138
		if (fd >= 0) {
			ret = find_perf_probe_point(fd,
						 sym->start + tp->offset, pp);
			close(fd);
		}
139 140
	}
	if (ret <= 0) {
141 142
		pr_debug("Failed to find corresponding probes from "
			 "debuginfo. Use kprobe event information.\n");
143 144 145
		pp->function = strdup(tp->symbol);
		if (pp->function == NULL)
			return -ENOMEM;
146 147 148
		pp->offset = tp->offset;
	}
	pp->retprobe = tp->retprobe;
149 150

	return 0;
151 152 153 154
}

/* Try to find perf_probe_event with debuginfo */
static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
155 156
					   struct kprobe_trace_event **tevs,
					   int max_tevs)
157 158 159 160 161 162
{
	bool need_dwarf = perf_probe_event_need_dwarf(pev);
	int fd, ntevs;

	fd = open_vmlinux();
	if (fd < 0) {
163 164 165 166
		if (need_dwarf) {
			pr_warning("Failed to open debuginfo file.\n");
			return fd;
		}
167 168 169 170 171
		pr_debug("Could not open vmlinux. Try to use symbols.\n");
		return 0;
	}

	/* Searching trace events corresponding to probe event */
172
	ntevs = find_kprobe_trace_events(fd, pev, tevs, max_tevs);
173 174
	close(fd);

175 176
	if (ntevs > 0) {	/* Succeeded to find trace events */
		pr_debug("find %d kprobe_trace_events.\n", ntevs);
177
		return ntevs;
178
	}
179

180 181 182 183 184 185
	if (ntevs == 0)	{	/* No error but failed to find probe point. */
		pr_warning("Probe point '%s' not found.\n",
			   synthesize_perf_probe_point(&pev->point));
		return -ENOENT;
	}
	/* Error path : ntevs < 0 */
186 187 188 189 190 191 192 193
	pr_debug("An error occurred in debuginfo analysis (%d).\n", ntevs);
	if (ntevs == -EBADF) {
		pr_warning("Warning: No dwarf info found in the vmlinux - "
			"please rebuild kernel with CONFIG_DEBUG_INFO=y.\n");
		if (!need_dwarf) {
			pr_debug("Trying to use symbols.\nn");
			return 0;
		}
194
	}
195
	return ntevs;
196 197 198 199 200
}

#define LINEBUF_SIZE 256
#define NR_ADDITIONAL_LINES 2

201
static int show_one_line(FILE *fp, int l, bool skip, bool show_num)
202 203 204 205 206 207 208 209
{
	char buf[LINEBUF_SIZE];
	const char *color = PERF_COLOR_BLUE;

	if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
		goto error;
	if (!skip) {
		if (show_num)
210
			fprintf(stdout, "%7d  %s", l, buf);
211 212 213 214 215 216 217 218 219 220 221 222 223 224 225
		else
			color_fprintf(stdout, color, "         %s", buf);
	}

	while (strlen(buf) == LINEBUF_SIZE - 1 &&
	       buf[LINEBUF_SIZE - 2] != '\n') {
		if (fgets(buf, LINEBUF_SIZE, fp) == NULL)
			goto error;
		if (!skip) {
			if (show_num)
				fprintf(stdout, "%s", buf);
			else
				color_fprintf(stdout, color, "%s", buf);
		}
	}
226 227

	return 0;
228 229
error:
	if (feof(fp))
230
		pr_warning("Source file is shorter than expected.\n");
231
	else
232 233 234
		pr_warning("File read error: %s\n", strerror(errno));

	return -1;
235 236 237 238 239 240
}

/*
 * Show line-range always requires debuginfo to find source file and
 * line number.
 */
241
int show_line_range(struct line_range *lr)
242
{
243
	int l = 1;
244 245 246 247 248
	struct line_node *ln;
	FILE *fp;
	int fd, ret;

	/* Search a line range */
249 250 251 252
	ret = init_vmlinux();
	if (ret < 0)
		return ret;

253
	fd = open_vmlinux();
254 255 256 257 258
	if (fd < 0) {
		pr_warning("Failed to open debuginfo file.\n");
		return fd;
	}

259 260
	ret = find_line_range(fd, lr);
	close(fd);
261 262 263 264 265 266 267
	if (ret == 0) {
		pr_warning("Specified source line is not found.\n");
		return -ENOENT;
	} else if (ret < 0) {
		pr_warning("Debuginfo analysis failed. (%d)\n", ret);
		return ret;
	}
268 269 270 271 272 273 274 275 276 277

	setup_pager();

	if (lr->function)
		fprintf(stdout, "<%s:%d>\n", lr->function,
			lr->start - lr->offset);
	else
		fprintf(stdout, "<%s:%d>\n", lr->file, lr->start);

	fp = fopen(lr->path, "r");
278 279 280 281 282
	if (fp == NULL) {
		pr_warning("Failed to open %s: %s\n", lr->path,
			   strerror(errno));
		return -errno;
	}
283
	/* Skip to starting line number */
284 285 286 287
	while (l < lr->start && ret >= 0)
		ret = show_one_line(fp, l++, true, false);
	if (ret < 0)
		goto end;
288 289

	list_for_each_entry(ln, &lr->line_list, list) {
290 291 292 293 294 295 296 297
		while (ln->line > l && ret >= 0)
			ret = show_one_line(fp, (l++) - lr->offset,
					    false, false);
		if (ret >= 0)
			ret = show_one_line(fp, (l++) - lr->offset,
					    false, true);
		if (ret < 0)
			goto end;
298 299 300 301
	}

	if (lr->end == INT_MAX)
		lr->end = l + NR_ADDITIONAL_LINES;
302
	while (l <= lr->end && !feof(fp) && ret >= 0)
303 304
		ret = show_one_line(fp, (l++) - lr->offset, false, false);
end:
305
	fclose(fp);
306
	return ret;
307 308 309 310
}

#else	/* !DWARF_SUPPORT */

311
static int convert_to_perf_probe_point(struct kprobe_trace_point *tp,
312 313
					struct perf_probe_point *pp)
{
314 315 316
	pp->function = strdup(tp->symbol);
	if (pp->function == NULL)
		return -ENOMEM;
317 318
	pp->offset = tp->offset;
	pp->retprobe = tp->retprobe;
319 320

	return 0;
321 322 323
}

static int try_to_find_kprobe_trace_events(struct perf_probe_event *pev,
324 325
				struct kprobe_trace_event **tevs __unused,
				int max_tevs __unused)
326
{
327 328 329 330
	if (perf_probe_event_need_dwarf(pev)) {
		pr_warning("Debuginfo-analysis is not supported.\n");
		return -ENOSYS;
	}
331 332 333
	return 0;
}

334
int show_line_range(struct line_range *lr __unused)
335
{
336 337
	pr_warning("Debuginfo-analysis is not supported.\n");
	return -ENOSYS;
338 339
}

340 341
#endif

342
int parse_line_range_desc(const char *arg, struct line_range *lr)
343 344 345 346 347 348 349 350 351 352
{
	const char *ptr;
	char *tmp;
	/*
	 * <Syntax>
	 * SRC:SLN[+NUM|-ELN]
	 * FUNC[:SLN[+NUM|-ELN]]
	 */
	ptr = strchr(arg, ':');
	if (ptr) {
353
		lr->start = (int)strtoul(ptr + 1, &tmp, 0);
354
		if (*tmp == '+') {
355
			lr->end = lr->start + (int)strtoul(tmp + 1, &tmp, 0);
356 357 358 359 360 361 362
			lr->end--;	/*
					 * Adjust the number of lines here.
					 * If the number of lines == 1, the
					 * the end of line should be equal to
					 * the start of line.
					 */
		} else if (*tmp == '-')
363
			lr->end = (int)strtoul(tmp + 1, &tmp, 0);
364
		else
365 366 367
			lr->end = INT_MAX;
		pr_debug("Line range is %d to %d\n", lr->start, lr->end);
		if (lr->start > lr->end) {
368
			semantic_error("Start line must be smaller"
369 370 371 372 373
				       " than end line.\n");
			return -EINVAL;
		}
		if (*tmp != '\0') {
			semantic_error("Tailing with invalid character '%d'.\n",
374
				       *tmp);
375 376
			return -EINVAL;
		}
377
		tmp = strndup(arg, (ptr - arg));
378
	} else {
379
		tmp = strdup(arg);
380 381
		lr->end = INT_MAX;
	}
382 383 384

	if (tmp == NULL)
		return -ENOMEM;
385 386 387 388 389

	if (strchr(tmp, '.'))
		lr->file = tmp;
	else
		lr->function = tmp;
390 391

	return 0;
392 393
}

394 395 396 397 398 399 400 401 402 403 404 405
/* Check the name is good for event/group */
static bool check_event_name(const char *name)
{
	if (!isalpha(*name) && *name != '_')
		return false;
	while (*++name != '\0') {
		if (!isalpha(*name) && !isdigit(*name) && *name != '_')
			return false;
	}
	return true;
}

406
/* Parse probepoint definition. */
407
static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)
408
{
409
	struct perf_probe_point *pp = &pev->point;
410 411 412 413
	char *ptr, *tmp;
	char c, nc = 0;
	/*
	 * <Syntax>
414 415
	 * perf probe [EVENT=]SRC[:LN|;PTN]
	 * perf probe [EVENT=]FUNC[@SRC][+OFFS|%return|:LN|;PAT]
416 417
	 *
	 * TODO:Group name support
418 419
	 */

420 421
	ptr = strpbrk(arg, ";=@+%");
	if (ptr && *ptr == '=') {	/* Event name */
422 423
		*ptr = '\0';
		tmp = ptr + 1;
424 425 426 427 428
		if (strchr(arg, ':')) {
			semantic_error("Group name is not supported yet.\n");
			return -ENOTSUP;
		}
		if (!check_event_name(arg)) {
429
			semantic_error("%s is bad for event name -it must "
430 431 432
				       "follow C symbol-naming rule.\n", arg);
			return -EINVAL;
		}
433 434 435
		pev->event = strdup(arg);
		if (pev->event == NULL)
			return -ENOMEM;
436
		pev->group = NULL;
437 438 439
		arg = tmp;
	}

440
	ptr = strpbrk(arg, ";:+@%");
441 442 443 444 445
	if (ptr) {
		nc = *ptr;
		*ptr++ = '\0';
	}

446 447 448 449
	tmp = strdup(arg);
	if (tmp == NULL)
		return -ENOMEM;

450
	/* Check arg is function or file and copy it */
451 452
	if (strchr(tmp, '.'))	/* File */
		pp->file = tmp;
453
	else			/* Function */
454
		pp->function = tmp;
455 456 457 458 459

	/* Parse other options */
	while (ptr) {
		arg = ptr;
		c = nc;
460
		if (c == ';') {	/* Lazy pattern must be the last part */
461 462 463
			pp->lazy_line = strdup(arg);
			if (pp->lazy_line == NULL)
				return -ENOMEM;
464 465 466
			break;
		}
		ptr = strpbrk(arg, ";:+@%");
467 468 469 470 471 472 473
		if (ptr) {
			nc = *ptr;
			*ptr++ = '\0';
		}
		switch (c) {
		case ':':	/* Line number */
			pp->line = strtoul(arg, &tmp, 0);
474
			if (*tmp != '\0') {
475
				semantic_error("There is non-digit char"
476 477 478
					       " in line number.\n");
				return -EINVAL;
			}
479 480 481
			break;
		case '+':	/* Byte offset from a symbol */
			pp->offset = strtoul(arg, &tmp, 0);
482
			if (*tmp != '\0') {
483
				semantic_error("There is non-digit character"
484 485 486
						" in offset.\n");
				return -EINVAL;
			}
487 488
			break;
		case '@':	/* File name */
489 490 491 492
			if (pp->file) {
				semantic_error("SRC@SRC is not allowed.\n");
				return -EINVAL;
			}
493 494 495
			pp->file = strdup(arg);
			if (pp->file == NULL)
				return -ENOMEM;
496 497 498 499
			break;
		case '%':	/* Probe places */
			if (strcmp(arg, "return") == 0) {
				pp->retprobe = 1;
500 501 502 503
			} else {	/* Others not supported yet */
				semantic_error("%%%s is not supported.\n", arg);
				return -ENOTSUP;
			}
504
			break;
505 506 507 508
		default:	/* Buggy case */
			pr_err("This program has a bug at %s:%d.\n",
				__FILE__, __LINE__);
			return -ENOTSUP;
509 510 511 512 513
			break;
		}
	}

	/* Exclusion check */
514
	if (pp->lazy_line && pp->line) {
515
		semantic_error("Lazy pattern can't be used with line number.");
516 517
		return -EINVAL;
	}
518

519
	if (pp->lazy_line && pp->offset) {
520
		semantic_error("Lazy pattern can't be used with offset.");
521 522
		return -EINVAL;
	}
523

524
	if (pp->line && pp->offset) {
525
		semantic_error("Offset can't be used with line number.");
526 527
		return -EINVAL;
	}
528

529
	if (!pp->line && !pp->lazy_line && pp->file && !pp->function) {
530 531
		semantic_error("File always requires line number or "
			       "lazy pattern.");
532 533
		return -EINVAL;
	}
534

535
	if (pp->offset && !pp->function) {
536
		semantic_error("Offset requires an entry function.");
537 538
		return -EINVAL;
	}
539

540
	if (pp->retprobe && !pp->function) {
541
		semantic_error("Return probe requires an entry function.");
542 543
		return -EINVAL;
	}
544

545
	if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) {
546 547
		semantic_error("Offset/Line/Lazy pattern can't be used with "
			       "return probe.");
548 549
		return -EINVAL;
	}
550

551
	pr_debug("symbol:%s file:%s line:%d offset:%lu return:%d lazy:%s\n",
552 553
		 pp->function, pp->file, pp->line, pp->offset, pp->retprobe,
		 pp->lazy_line);
554
	return 0;
555 556
}

557
/* Parse perf-probe event argument */
558
static int parse_perf_probe_arg(char *str, struct perf_probe_arg *arg)
559
{
560
	char *tmp;
561 562 563 564
	struct perf_probe_arg_field **fieldp;

	pr_debug("parsing arg: %s into ", str);

565 566
	tmp = strchr(str, '=');
	if (tmp) {
567 568 569
		arg->name = strndup(str, tmp - str);
		if (arg->name == NULL)
			return -ENOMEM;
570
		pr_debug("name:%s ", arg->name);
571 572 573
		str = tmp + 1;
	}

574 575 576
	tmp = strchr(str, ':');
	if (tmp) {	/* Type setting */
		*tmp = '\0';
577 578 579
		arg->type = strdup(tmp + 1);
		if (arg->type == NULL)
			return -ENOMEM;
580 581 582
		pr_debug("type:%s ", arg->type);
	}

583 584 585
	tmp = strpbrk(str, "-.");
	if (!is_c_varname(str) || !tmp) {
		/* A variable, register, symbol or special value */
586 587 588
		arg->var = strdup(str);
		if (arg->var == NULL)
			return -ENOMEM;
589
		pr_debug("%s\n", arg->var);
590
		return 0;
591 592 593
	}

	/* Structure fields */
594 595 596
	arg->var = strndup(str, tmp - str);
	if (arg->var == NULL)
		return -ENOMEM;
597
	pr_debug("%s, ", arg->var);
598 599 600
	fieldp = &arg->field;

	do {
601 602 603
		*fieldp = zalloc(sizeof(struct perf_probe_arg_field));
		if (*fieldp == NULL)
			return -ENOMEM;
604 605 606 607 608 609
		if (*tmp == '.') {
			str = tmp + 1;
			(*fieldp)->ref = false;
		} else if (tmp[1] == '>') {
			str = tmp + 2;
			(*fieldp)->ref = true;
610 611 612 613
		} else {
			semantic_error("Argument parse error: %s\n", str);
			return -EINVAL;
		}
614 615 616

		tmp = strpbrk(str, "-.");
		if (tmp) {
617 618 619
			(*fieldp)->name = strndup(str, tmp - str);
			if ((*fieldp)->name == NULL)
				return -ENOMEM;
620 621 622 623
			pr_debug("%s(%d), ", (*fieldp)->name, (*fieldp)->ref);
			fieldp = &(*fieldp)->next;
		}
	} while (tmp);
624 625 626
	(*fieldp)->name = strdup(str);
	if ((*fieldp)->name == NULL)
		return -ENOMEM;
627
	pr_debug("%s(%d)\n", (*fieldp)->name, (*fieldp)->ref);
628 629

	/* If no name is specified, set the last field name */
630 631 632 633 634
	if (!arg->name) {
		arg->name = strdup((*fieldp)->name);
		if (arg->name == NULL)
			return -ENOMEM;
	}
635
	return 0;
636 637
}

638
/* Parse perf-probe event command */
639
int parse_perf_probe_command(const char *cmd, struct perf_probe_event *pev)
640
{
641
	char **argv;
642
	int argc, i, ret = 0;
643

644
	argv = argv_split(cmd, &argc);
645 646 647 648 649 650 651 652 653
	if (!argv) {
		pr_debug("Failed to split arguments.\n");
		return -ENOMEM;
	}
	if (argc - 1 > MAX_PROBE_ARGS) {
		semantic_error("Too many probe arguments (%d).\n", argc - 1);
		ret = -ERANGE;
		goto out;
	}
654
	/* Parse probe point */
655 656 657
	ret = parse_perf_probe_point(argv[0], pev);
	if (ret < 0)
		goto out;
658

659
	/* Copy arguments and ensure return probe has no C argument */
660
	pev->nargs = argc - 1;
661 662 663 664 665
	pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
	if (pev->args == NULL) {
		ret = -ENOMEM;
		goto out;
	}
666 667 668 669
	for (i = 0; i < pev->nargs && ret >= 0; i++) {
		ret = parse_perf_probe_arg(argv[i + 1], &pev->args[i]);
		if (ret >= 0 &&
		    is_c_varname(pev->args[i].var) && pev->point.retprobe) {
670
			semantic_error("You can't specify local variable for"
671 672 673
				       " kretprobe.\n");
			ret = -EINVAL;
		}
674
	}
675
out:
676
	argv_free(argv);
677 678

	return ret;
679 680
}

681 682 683 684 685 686 687 688 689
/* Return true if this perf_probe_event requires debuginfo */
bool perf_probe_event_need_dwarf(struct perf_probe_event *pev)
{
	int i;

	if (pev->point.file || pev->point.line || pev->point.lazy_line)
		return true;

	for (i = 0; i < pev->nargs; i++)
690
		if (is_c_varname(pev->args[i].var))
691 692 693 694 695
			return true;

	return false;
}

696
/* Parse kprobe_events event into struct probe_point */
697
int parse_kprobe_trace_command(const char *cmd, struct kprobe_trace_event *tev)
698
{
699
	struct kprobe_trace_point *tp = &tev->point;
700 701 702 703 704
	char pr;
	char *p;
	int ret, i, argc;
	char **argv;

705 706
	pr_debug("Parsing kprobe_events: %s\n", cmd);
	argv = argv_split(cmd, &argc);
707 708 709 710 711 712 713 714 715
	if (!argv) {
		pr_debug("Failed to split arguments.\n");
		return -ENOMEM;
	}
	if (argc < 2) {
		semantic_error("Too few probe arguments.\n");
		ret = -ERANGE;
		goto out;
	}
716 717

	/* Scan event and group name. */
718
	ret = sscanf(argv[0], "%c:%a[^/ \t]/%a[^ \t]",
719 720
		     &pr, (float *)(void *)&tev->group,
		     (float *)(void *)&tev->event);
721 722 723 724 725
	if (ret != 3) {
		semantic_error("Failed to parse event name: %s\n", argv[0]);
		ret = -EINVAL;
		goto out;
	}
726
	pr_debug("Group:%s Event:%s probe:%c\n", tev->group, tev->event, pr);
727

728
	tp->retprobe = (pr == 'r');
729 730

	/* Scan function name and offset */
731 732
	ret = sscanf(argv[1], "%a[^+]+%lu", (float *)(void *)&tp->symbol,
		     &tp->offset);
733
	if (ret == 1)
734
		tp->offset = 0;
735

736
	tev->nargs = argc - 2;
737 738 739 740 741
	tev->args = zalloc(sizeof(struct kprobe_trace_arg) * tev->nargs);
	if (tev->args == NULL) {
		ret = -ENOMEM;
		goto out;
	}
742
	for (i = 0; i < tev->nargs; i++) {
743 744
		p = strchr(argv[i + 2], '=');
		if (p)	/* We don't need which register is assigned. */
745 746 747
			*p++ = '\0';
		else
			p = argv[i + 2];
748
		tev->args[i].name = strdup(argv[i + 2]);
749
		/* TODO: parse regs and offset */
750 751 752 753 754
		tev->args[i].value = strdup(p);
		if (tev->args[i].name == NULL || tev->args[i].value == NULL) {
			ret = -ENOMEM;
			goto out;
		}
755
	}
756 757
	ret = 0;
out:
758
	argv_free(argv);
759
	return ret;
760 761
}

762 763 764 765 766 767 768
/* Compose only probe arg */
int synthesize_perf_probe_arg(struct perf_probe_arg *pa, char *buf, size_t len)
{
	struct perf_probe_arg_field *field = pa->field;
	int ret;
	char *tmp = buf;

769 770 771 772
	if (pa->name && pa->var)
		ret = e_snprintf(tmp, len, "%s=%s", pa->name, pa->var);
	else
		ret = e_snprintf(tmp, len, "%s", pa->name ? pa->name : pa->var);
773 774 775 776 777 778 779 780 781 782 783 784 785 786
	if (ret <= 0)
		goto error;
	tmp += ret;
	len -= ret;

	while (field) {
		ret = e_snprintf(tmp, len, "%s%s", field->ref ? "->" : ".",
				 field->name);
		if (ret <= 0)
			goto error;
		tmp += ret;
		len -= ret;
		field = field->next;
	}
787 788 789 790 791 792 793 794 795

	if (pa->type) {
		ret = e_snprintf(tmp, len, ":%s", pa->type);
		if (ret <= 0)
			goto error;
		tmp += ret;
		len -= ret;
	}

796 797
	return tmp - buf;
error:
798 799 800
	pr_debug("Failed to synthesize perf probe argument: %s",
		 strerror(-ret));
	return ret;
801 802
}

803 804
/* Compose only probe point (not argument) */
static char *synthesize_perf_probe_point(struct perf_probe_point *pp)
805
{
806 807 808
	char *buf, *tmp;
	char offs[32] = "", line[32] = "", file[32] = "";
	int ret, len;
809

810 811 812 813 814
	buf = zalloc(MAX_CMDLEN);
	if (buf == NULL) {
		ret = -ENOMEM;
		goto error;
	}
815
	if (pp->offset) {
816
		ret = e_snprintf(offs, 32, "+%lu", pp->offset);
817 818 819 820
		if (ret <= 0)
			goto error;
	}
	if (pp->line) {
821 822 823 824 825
		ret = e_snprintf(line, 32, ":%d", pp->line);
		if (ret <= 0)
			goto error;
	}
	if (pp->file) {
826
		len = strlen(pp->file) - 31;
827 828 829 830
		if (len < 0)
			len = 0;
		tmp = strchr(pp->file + len, '/');
		if (!tmp)
831
			tmp = pp->file + len;
832
		ret = e_snprintf(file, 32, "@%s", tmp + 1);
833 834 835 836 837
		if (ret <= 0)
			goto error;
	}

	if (pp->function)
838 839 840
		ret = e_snprintf(buf, MAX_CMDLEN, "%s%s%s%s%s", pp->function,
				 offs, pp->retprobe ? "%return" : "", line,
				 file);
841
	else
842
		ret = e_snprintf(buf, MAX_CMDLEN, "%s%s", file, line);
843 844 845 846
	if (ret <= 0)
		goto error;

	return buf;
847
error:
848 849
	pr_debug("Failed to synthesize perf probe point: %s",
		 strerror(-ret));
850 851
	if (buf)
		free(buf);
852
	return NULL;
853 854
}

855 856
#if 0
char *synthesize_perf_probe_command(struct perf_probe_event *pev)
857 858 859 860
{
	char *buf;
	int i, len, ret;

861 862 863
	buf = synthesize_perf_probe_point(&pev->point);
	if (!buf)
		return NULL;
864

865 866
	len = strlen(buf);
	for (i = 0; i < pev->nargs; i++) {
867
		ret = e_snprintf(&buf[len], MAX_CMDLEN - len, " %s",
868 869 870 871 872
				 pev->args[i].name);
		if (ret <= 0) {
			free(buf);
			return NULL;
		}
873 874 875
		len += ret;
	}

876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900
	return buf;
}
#endif

static int __synthesize_kprobe_trace_arg_ref(struct kprobe_trace_arg_ref *ref,
					     char **buf, size_t *buflen,
					     int depth)
{
	int ret;
	if (ref->next) {
		depth = __synthesize_kprobe_trace_arg_ref(ref->next, buf,
							 buflen, depth + 1);
		if (depth < 0)
			goto out;
	}

	ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
	if (ret < 0)
		depth = ret;
	else {
		*buf += ret;
		*buflen -= ret;
	}
out:
	return depth;
901 902 903

}

904 905
static int synthesize_kprobe_trace_arg(struct kprobe_trace_arg *arg,
				       char *buf, size_t buflen)
906
{
907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942
	int ret, depth = 0;
	char *tmp = buf;

	/* Argument name or separator */
	if (arg->name)
		ret = e_snprintf(buf, buflen, " %s=", arg->name);
	else
		ret = e_snprintf(buf, buflen, " ");
	if (ret < 0)
		return ret;
	buf += ret;
	buflen -= ret;

	/* Dereferencing arguments */
	if (arg->ref) {
		depth = __synthesize_kprobe_trace_arg_ref(arg->ref, &buf,
							  &buflen, 1);
		if (depth < 0)
			return depth;
	}

	/* Print argument value */
	ret = e_snprintf(buf, buflen, "%s", arg->value);
	if (ret < 0)
		return ret;
	buf += ret;
	buflen -= ret;

	/* Closing */
	while (depth--) {
		ret = e_snprintf(buf, buflen, ")");
		if (ret < 0)
			return ret;
		buf += ret;
		buflen -= ret;
	}
943 944 945 946 947 948 949
	/* Print argument type */
	if (arg->type) {
		ret = e_snprintf(buf, buflen, ":%s", arg->type);
		if (ret <= 0)
			return ret;
		buf += ret;
	}
950 951 952 953 954 955 956

	return buf - tmp;
}

char *synthesize_kprobe_trace_command(struct kprobe_trace_event *tev)
{
	struct kprobe_trace_point *tp = &tev->point;
957 958 959
	char *buf;
	int i, len, ret;

960 961 962 963
	buf = zalloc(MAX_CMDLEN);
	if (buf == NULL)
		return NULL;

964 965 966 967 968
	len = e_snprintf(buf, MAX_CMDLEN, "%c:%s/%s %s+%lu",
			 tp->retprobe ? 'r' : 'p',
			 tev->group, tev->event,
			 tp->symbol, tp->offset);
	if (len <= 0)
969 970
		goto error;

971 972 973
	for (i = 0; i < tev->nargs; i++) {
		ret = synthesize_kprobe_trace_arg(&tev->args[i], buf + len,
						  MAX_CMDLEN - len);
974
		if (ret <= 0)
975 976 977 978
			goto error;
		len += ret;
	}

979
	return buf;
980
error:
981 982 983
	free(buf);
	return NULL;
}
984

985 986
int convert_to_perf_probe_event(struct kprobe_trace_event *tev,
				struct perf_probe_event *pev)
987
{
988
	char buf[64] = "";
989
	int i, ret;
990

991
	/* Convert event/group name */
992 993 994 995
	pev->event = strdup(tev->event);
	pev->group = strdup(tev->group);
	if (pev->event == NULL || pev->group == NULL)
		return -ENOMEM;
996

997
	/* Convert trace_point to probe_point */
998 999 1000
	ret = convert_to_perf_probe_point(&tev->point, &pev->point);
	if (ret < 0)
		return ret;
1001

1002 1003
	/* Convert trace_arg to probe_arg */
	pev->nargs = tev->nargs;
1004 1005 1006
	pev->args = zalloc(sizeof(struct perf_probe_arg) * pev->nargs);
	if (pev->args == NULL)
		return -ENOMEM;
1007
	for (i = 0; i < tev->nargs && ret >= 0; i++) {
1008
		if (tev->args[i].name)
1009
			pev->args[i].name = strdup(tev->args[i].name);
1010
		else {
1011 1012
			ret = synthesize_kprobe_trace_arg(&tev->args[i],
							  buf, 64);
1013
			pev->args[i].name = strdup(buf);
1014
		}
1015 1016 1017
		if (pev->args[i].name == NULL && ret >= 0)
			ret = -ENOMEM;
	}
1018 1019 1020 1021 1022

	if (ret < 0)
		clear_perf_probe_event(pev);

	return ret;
1023 1024 1025 1026 1027
}

void clear_perf_probe_event(struct perf_probe_event *pev)
{
	struct perf_probe_point *pp = &pev->point;
1028
	struct perf_probe_arg_field *field, *next;
1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040
	int i;

	if (pev->event)
		free(pev->event);
	if (pev->group)
		free(pev->group);
	if (pp->file)
		free(pp->file);
	if (pp->function)
		free(pp->function);
	if (pp->lazy_line)
		free(pp->lazy_line);
1041
	for (i = 0; i < pev->nargs; i++) {
1042 1043
		if (pev->args[i].name)
			free(pev->args[i].name);
1044 1045
		if (pev->args[i].var)
			free(pev->args[i].var);
1046 1047
		if (pev->args[i].type)
			free(pev->args[i].type);
1048 1049 1050 1051 1052 1053 1054 1055 1056
		field = pev->args[i].field;
		while (field) {
			next = field->next;
			if (field->name)
				free(field->name);
			free(field);
			field = next;
		}
	}
1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077
	if (pev->args)
		free(pev->args);
	memset(pev, 0, sizeof(*pev));
}

void clear_kprobe_trace_event(struct kprobe_trace_event *tev)
{
	struct kprobe_trace_arg_ref *ref, *next;
	int i;

	if (tev->event)
		free(tev->event);
	if (tev->group)
		free(tev->group);
	if (tev->point.symbol)
		free(tev->point.symbol);
	for (i = 0; i < tev->nargs; i++) {
		if (tev->args[i].name)
			free(tev->args[i].name);
		if (tev->args[i].value)
			free(tev->args[i].value);
1078 1079
		if (tev->args[i].type)
			free(tev->args[i].type);
1080 1081 1082 1083 1084 1085 1086 1087 1088 1089
		ref = tev->args[i].ref;
		while (ref) {
			next = ref->next;
			free(ref);
			ref = next;
		}
	}
	if (tev->args)
		free(tev->args);
	memset(tev, 0, sizeof(*tev));
1090 1091
}

1092
static int open_kprobe_events(bool readwrite)
1093 1094
{
	char buf[PATH_MAX];
1095
	const char *__debugfs;
1096 1097
	int ret;

1098 1099 1100 1101 1102 1103 1104
	__debugfs = debugfs_find_mountpoint();
	if (__debugfs == NULL) {
		pr_warning("Debugfs is not mounted.\n");
		return -ENOENT;
	}

	ret = e_snprintf(buf, PATH_MAX, "%stracing/kprobe_events", __debugfs);
1105
	if (ret >= 0) {
1106
		pr_debug("Opening %s write=%d\n", buf, readwrite);
1107 1108 1109 1110 1111
		if (readwrite && !probe_event_dry_run)
			ret = open(buf, O_RDWR, O_APPEND);
		else
			ret = open(buf, O_RDONLY, 0);
	}
1112

1113 1114
	if (ret < 0) {
		if (errno == ENOENT)
1115 1116
			pr_warning("kprobe_events file does not exist - please"
				 " rebuild kernel with CONFIG_KPROBE_EVENT.\n");
1117
		else
1118 1119
			pr_warning("Failed to open kprobe_events file: %s\n",
				   strerror(errno));
1120 1121 1122 1123 1124
	}
	return ret;
}

/* Get raw string list of current kprobe_events */
1125
static struct strlist *get_kprobe_trace_command_rawlist(int fd)
1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144
{
	int ret, idx;
	FILE *fp;
	char buf[MAX_CMDLEN];
	char *p;
	struct strlist *sl;

	sl = strlist__new(true, NULL);

	fp = fdopen(dup(fd), "r");
	while (!feof(fp)) {
		p = fgets(buf, MAX_CMDLEN, fp);
		if (!p)
			break;

		idx = strlen(p) - 1;
		if (p[idx] == '\n')
			p[idx] = '\0';
		ret = strlist__add(sl, buf);
1145 1146 1147 1148 1149
		if (ret < 0) {
			pr_debug("strlist__add failed: %s\n", strerror(-ret));
			strlist__delete(sl);
			return NULL;
		}
1150 1151 1152 1153 1154 1155
	}
	fclose(fp);

	return sl;
}

1156
/* Show an event */
1157
static int show_perf_probe_event(struct perf_probe_event *pev)
1158
{
1159
	int i, ret;
1160
	char buf[128];
1161
	char *place;
1162

1163 1164
	/* Synthesize only event probe point */
	place = synthesize_perf_probe_point(&pev->point);
1165 1166
	if (!place)
		return -EINVAL;
1167 1168

	ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event);
1169
	if (ret < 0)
1170 1171
		return ret;

1172
	printf("  %-20s (on %s", buf, place);
1173

1174
	if (pev->nargs > 0) {
1175
		printf(" with");
1176
		for (i = 0; i < pev->nargs; i++) {
1177 1178 1179 1180
			ret = synthesize_perf_probe_arg(&pev->args[i],
							buf, 128);
			if (ret < 0)
				break;
1181 1182
			printf(" %s", buf);
		}
1183 1184
	}
	printf(")\n");
1185
	free(place);
1186
	return ret;
1187 1188
}

1189
/* List up current perf-probe events */
1190
int show_perf_probe_events(void)
1191
{
1192
	int fd, ret;
1193 1194
	struct kprobe_trace_event tev;
	struct perf_probe_event pev;
1195 1196 1197
	struct strlist *rawlist;
	struct str_node *ent;

1198
	setup_pager();
1199 1200 1201
	ret = init_vmlinux();
	if (ret < 0)
		return ret;
1202 1203 1204

	memset(&tev, 0, sizeof(tev));
	memset(&pev, 0, sizeof(pev));
1205

1206
	fd = open_kprobe_events(false);
1207 1208 1209
	if (fd < 0)
		return fd;

1210
	rawlist = get_kprobe_trace_command_rawlist(fd);
1211
	close(fd);
1212 1213
	if (!rawlist)
		return -ENOENT;
1214

1215
	strlist__for_each(ent, rawlist) {
1216 1217 1218 1219 1220 1221
		ret = parse_kprobe_trace_command(ent->s, &tev);
		if (ret >= 0) {
			ret = convert_to_perf_probe_event(&tev, &pev);
			if (ret >= 0)
				ret = show_perf_probe_event(&pev);
		}
1222 1223
		clear_perf_probe_event(&pev);
		clear_kprobe_trace_event(&tev);
1224 1225
		if (ret < 0)
			break;
1226 1227
	}
	strlist__delete(rawlist);
1228 1229

	return ret;
1230 1231
}

1232
/* Get current perf-probe event names */
1233
static struct strlist *get_kprobe_trace_event_names(int fd, bool include_group)
1234
{
1235
	char buf[128];
1236 1237
	struct strlist *sl, *rawlist;
	struct str_node *ent;
1238
	struct kprobe_trace_event tev;
1239
	int ret = 0;
1240

1241
	memset(&tev, 0, sizeof(tev));
1242

1243
	rawlist = get_kprobe_trace_command_rawlist(fd);
1244
	sl = strlist__new(true, NULL);
1245
	strlist__for_each(ent, rawlist) {
1246 1247 1248
		ret = parse_kprobe_trace_command(ent->s, &tev);
		if (ret < 0)
			break;
1249
		if (include_group) {
1250 1251 1252 1253
			ret = e_snprintf(buf, 128, "%s:%s", tev.group,
					tev.event);
			if (ret >= 0)
				ret = strlist__add(sl, buf);
1254
		} else
1255
			ret = strlist__add(sl, tev.event);
1256
		clear_kprobe_trace_event(&tev);
1257 1258
		if (ret < 0)
			break;
1259 1260 1261
	}
	strlist__delete(rawlist);

1262 1263 1264 1265
	if (ret < 0) {
		strlist__delete(sl);
		return NULL;
	}
1266 1267 1268
	return sl;
}

1269
static int write_kprobe_trace_event(int fd, struct kprobe_trace_event *tev)
1270
{
1271
	int ret = 0;
1272
	char *buf = synthesize_kprobe_trace_command(tev);
1273

1274 1275 1276 1277 1278
	if (!buf) {
		pr_debug("Failed to synthesize kprobe trace event.\n");
		return -EINVAL;
	}

1279
	pr_debug("Writing event: %s\n", buf);
1280 1281 1282
	if (!probe_event_dry_run) {
		ret = write(fd, buf, strlen(buf));
		if (ret <= 0)
1283 1284
			pr_warning("Failed to write event: %s\n",
				   strerror(errno));
1285
	}
1286
	free(buf);
1287
	return ret;
1288 1289
}

1290 1291
static int get_new_event_name(char *buf, size_t len, const char *base,
			      struct strlist *namelist, bool allow_suffix)
1292 1293
{
	int i, ret;
1294 1295 1296

	/* Try no suffix */
	ret = e_snprintf(buf, len, "%s", base);
1297 1298 1299 1300
	if (ret < 0) {
		pr_debug("snprintf() failed: %s\n", strerror(-ret));
		return ret;
	}
1301
	if (!strlist__has_entry(namelist, buf))
1302
		return 0;
1303

1304 1305 1306
	if (!allow_suffix) {
		pr_warning("Error: event \"%s\" already exists. "
			   "(Use -f to force duplicates.)\n", base);
1307
		return -EEXIST;
1308 1309
	}

1310 1311
	/* Try to add suffix */
	for (i = 1; i < MAX_EVENT_INDEX; i++) {
1312
		ret = e_snprintf(buf, len, "%s_%d", base, i);
1313 1314 1315 1316
		if (ret < 0) {
			pr_debug("snprintf() failed: %s\n", strerror(-ret));
			return ret;
		}
1317 1318 1319
		if (!strlist__has_entry(namelist, buf))
			break;
	}
1320 1321 1322 1323 1324 1325
	if (i == MAX_EVENT_INDEX) {
		pr_warning("Too many events are on the same function.\n");
		ret = -ERANGE;
	}

	return ret;
1326 1327
}

1328 1329 1330
static int __add_kprobe_trace_events(struct perf_probe_event *pev,
				     struct kprobe_trace_event *tevs,
				     int ntevs, bool allow_suffix)
1331
{
1332
	int i, fd, ret;
1333
	struct kprobe_trace_event *tev = NULL;
1334 1335
	char buf[64];
	const char *event, *group;
1336
	struct strlist *namelist;
1337

1338
	fd = open_kprobe_events(true);
1339 1340
	if (fd < 0)
		return fd;
1341
	/* Get current event names */
1342
	namelist = get_kprobe_trace_event_names(fd, false);
1343 1344 1345 1346
	if (!namelist) {
		pr_debug("Failed to get current event list.\n");
		return -EIO;
	}
1347

1348
	ret = 0;
1349
	printf("Add new event%s\n", (ntevs > 1) ? "s:" : ":");
1350
	for (i = 0; i < ntevs; i++) {
1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364
		tev = &tevs[i];
		if (pev->event)
			event = pev->event;
		else
			if (pev->point.function)
				event = pev->point.function;
			else
				event = tev->point.symbol;
		if (pev->group)
			group = pev->group;
		else
			group = PERFPROBE_GROUP;

		/* Get an unused new event name */
1365 1366 1367 1368
		ret = get_new_event_name(buf, 64, event,
					 namelist, allow_suffix);
		if (ret < 0)
			break;
1369 1370
		event = buf;

1371 1372 1373 1374 1375 1376
		tev->event = strdup(event);
		tev->group = strdup(group);
		if (tev->event == NULL || tev->group == NULL) {
			ret = -ENOMEM;
			break;
		}
1377 1378 1379
		ret = write_kprobe_trace_event(fd, tev);
		if (ret < 0)
			break;
1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399
		/* Add added event name to namelist */
		strlist__add(namelist, event);

		/* Trick here - save current event/group */
		event = pev->event;
		group = pev->group;
		pev->event = tev->event;
		pev->group = tev->group;
		show_perf_probe_event(pev);
		/* Trick here - restore current event/group */
		pev->event = (char *)event;
		pev->group = (char *)group;

		/*
		 * Probes after the first probe which comes from same
		 * user input are always allowed to add suffix, because
		 * there might be several addresses corresponding to
		 * one code line.
		 */
		allow_suffix = true;
1400
	}
1401 1402 1403 1404 1405 1406 1407

	if (ret >= 0) {
		/* Show how to use the event. */
		printf("\nYou can now use it on all perf tools, such as:\n\n");
		printf("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group,
			 tev->event);
	}
1408

1409
	strlist__delete(namelist);
1410
	close(fd);
1411
	return ret;
1412
}
1413

1414
static int convert_to_kprobe_trace_events(struct perf_probe_event *pev,
1415 1416
					  struct kprobe_trace_event **tevs,
					  int max_tevs)
1417 1418
{
	struct symbol *sym;
1419
	int ret = 0, i;
1420 1421
	struct kprobe_trace_event *tev;

1422
	/* Convert perf_probe_event with debuginfo */
1423
	ret = try_to_find_kprobe_trace_events(pev, tevs, max_tevs);
1424 1425
	if (ret != 0)
		return ret;
1426

1427
	/* Allocate trace event buffer */
1428 1429 1430
	tev = *tevs = zalloc(sizeof(struct kprobe_trace_event));
	if (tev == NULL)
		return -ENOMEM;
1431 1432

	/* Copy parameters */
1433 1434 1435 1436 1437
	tev->point.symbol = strdup(pev->point.function);
	if (tev->point.symbol == NULL) {
		ret = -ENOMEM;
		goto error;
	}
1438 1439 1440
	tev->point.offset = pev->point.offset;
	tev->nargs = pev->nargs;
	if (tev->nargs) {
1441 1442 1443
		tev->args = zalloc(sizeof(struct kprobe_trace_arg)
				   * tev->nargs);
		if (tev->args == NULL) {
1444 1445
			ret = -ENOMEM;
			goto error;
1446
		}
1447
		for (i = 0; i < tev->nargs; i++) {
1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466
			if (pev->args[i].name) {
				tev->args[i].name = strdup(pev->args[i].name);
				if (tev->args[i].name == NULL) {
					ret = -ENOMEM;
					goto error;
				}
			}
			tev->args[i].value = strdup(pev->args[i].var);
			if (tev->args[i].value == NULL) {
				ret = -ENOMEM;
				goto error;
			}
			if (pev->args[i].type) {
				tev->args[i].type = strdup(pev->args[i].type);
				if (tev->args[i].type == NULL) {
					ret = -ENOMEM;
					goto error;
				}
			}
1467
		}
1468 1469 1470
	}

	/* Currently just checking function name from symbol map */
1471
	sym = map__find_symbol_by_name(machine.vmlinux_maps[MAP__FUNCTION],
1472
				       tev->point.symbol, NULL);
1473 1474 1475
	if (!sym) {
		pr_warning("Kernel symbol \'%s\' not found.\n",
			   tev->point.symbol);
1476 1477 1478
		ret = -ENOENT;
		goto error;
	}
1479

1480 1481 1482 1483 1484
	return 1;
error:
	clear_kprobe_trace_event(tev);
	free(tev);
	*tevs = NULL;
1485
	return ret;
1486 1487 1488 1489 1490 1491 1492 1493
}

struct __event_package {
	struct perf_probe_event		*pev;
	struct kprobe_trace_event	*tevs;
	int				ntevs;
};

1494
int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,
1495
			  bool force_add, int max_tevs)
1496
{
1497
	int i, j, ret;
1498 1499
	struct __event_package *pkgs;

1500 1501 1502
	pkgs = zalloc(sizeof(struct __event_package) * npevs);
	if (pkgs == NULL)
		return -ENOMEM;
1503 1504

	/* Init vmlinux path */
1505 1506 1507
	ret = init_vmlinux();
	if (ret < 0)
		return ret;
1508 1509 1510 1511 1512

	/* Loop 1: convert all events */
	for (i = 0; i < npevs; i++) {
		pkgs[i].pev = &pevs[i];
		/* Convert with or without debuginfo */
1513
		ret  = convert_to_kprobe_trace_events(pkgs[i].pev,
1514
						      &pkgs[i].tevs, max_tevs);
1515 1516 1517
		if (ret < 0)
			goto end;
		pkgs[i].ntevs = ret;
1518 1519
	}

1520
	/* Loop 2: add all events */
1521 1522 1523 1524 1525
	for (i = 0; i < npevs && ret >= 0; i++)
		ret = __add_kprobe_trace_events(pkgs[i].pev, pkgs[i].tevs,
						pkgs[i].ntevs, force_add);
end:
	/* Loop 3: cleanup trace events  */
1526
	for (i = 0; i < npevs; i++)
1527 1528 1529 1530
		for (j = 0; j < pkgs[i].ntevs; j++)
			clear_kprobe_trace_event(&pkgs[i].tevs[j]);

	return ret;
1531 1532
}

1533
static int __del_trace_kprobe_event(int fd, struct str_node *ent)
1534 1535 1536
{
	char *p;
	char buf[128];
1537
	int ret;
1538 1539

	/* Convert from perf-probe event to trace-kprobe event */
1540 1541 1542 1543
	ret = e_snprintf(buf, 128, "-:%s", ent->s);
	if (ret < 0)
		goto error;

1544
	p = strchr(buf + 2, ':');
1545 1546 1547 1548 1549 1550
	if (!p) {
		pr_debug("Internal error: %s should have ':' but not.\n",
			 ent->s);
		ret = -ENOTSUP;
		goto error;
	}
1551 1552
	*p = '/';

1553 1554
	pr_debug("Writing event: %s\n", buf);
	ret = write(fd, buf, strlen(buf));
1555 1556 1557
	if (ret < 0)
		goto error;

1558
	printf("Remove event: %s\n", ent->s);
1559 1560 1561 1562
	return 0;
error:
	pr_warning("Failed to delete event: %s\n", strerror(-ret));
	return ret;
1563 1564
}

1565 1566
static int del_trace_kprobe_event(int fd, const char *group,
				  const char *event, struct strlist *namelist)
1567 1568
{
	char buf[128];
1569
	struct str_node *ent, *n;
1570
	int found = 0, ret = 0;
1571

1572 1573 1574 1575 1576
	ret = e_snprintf(buf, 128, "%s:%s", group, event);
	if (ret < 0) {
		pr_err("Failed to copy event.");
		return ret;
	}
1577

1578 1579 1580 1581
	if (strpbrk(buf, "*?")) { /* Glob-exp */
		strlist__for_each_safe(ent, n, namelist)
			if (strglobmatch(ent->s, buf)) {
				found++;
1582 1583 1584
				ret = __del_trace_kprobe_event(fd, ent);
				if (ret < 0)
					break;
1585 1586 1587 1588 1589 1590
				strlist__remove(namelist, ent);
			}
	} else {
		ent = strlist__find(namelist, buf);
		if (ent) {
			found++;
1591 1592 1593
			ret = __del_trace_kprobe_event(fd, ent);
			if (ret >= 0)
				strlist__remove(namelist, ent);
1594 1595
		}
	}
1596 1597 1598 1599
	if (found == 0 && ret >= 0)
		pr_info("Info: Event \"%s\" does not exist.\n", buf);

	return ret;
1600 1601
}

1602
int del_perf_probe_events(struct strlist *dellist)
1603
{
1604
	int fd, ret = 0;
1605 1606 1607 1608 1609
	const char *group, *event;
	char *p, *str;
	struct str_node *ent;
	struct strlist *namelist;

1610
	fd = open_kprobe_events(true);
1611 1612 1613
	if (fd < 0)
		return fd;

1614
	/* Get current event names */
1615
	namelist = get_kprobe_trace_event_names(fd, true);
1616 1617
	if (namelist == NULL)
		return -EINVAL;
1618

1619
	strlist__for_each(ent, dellist) {
1620 1621 1622 1623 1624
		str = strdup(ent->s);
		if (str == NULL) {
			ret = -ENOMEM;
			break;
		}
1625
		pr_debug("Parsing: %s\n", str);
1626 1627 1628 1629 1630 1631
		p = strchr(str, ':');
		if (p) {
			group = str;
			*p = '\0';
			event = p + 1;
		} else {
1632
			group = "*";
1633 1634
			event = str;
		}
1635
		pr_debug("Group: %s, Event: %s\n", group, event);
1636
		ret = del_trace_kprobe_event(fd, group, event, namelist);
1637
		free(str);
1638 1639
		if (ret < 0)
			break;
1640 1641 1642
	}
	strlist__delete(namelist);
	close(fd);
1643 1644

	return ret;
1645 1646
}