trace_kprobe.c 36.5 KB
Newer Older
1
/*
2
 * Kprobes-based tracing events
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
 *
 * Created by Masami Hiramatsu <mhiramat@redhat.com>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */

#include <linux/module.h>
#include <linux/uaccess.h>

23
#include "trace_probe.h"
24

25
#define KPROBE_EVENT_SYSTEM "kprobes"
26

27
/**
28
 * Kprobe event core functions
29
 */
30
struct trace_kprobe {
31
	struct list_head	list;
32
	struct kretprobe	rp;	/* Use rp.kp for kprobe use */
33
	unsigned long __percpu *nhit;
34
	const char		*symbol;	/* symbol name */
35
	struct trace_probe	tp;
36 37
};

38 39
#define SIZEOF_TRACE_KPROBE(n)				\
	(offsetof(struct trace_kprobe, tp.args) +	\
40
	(sizeof(struct probe_arg) * (n)))
41

42

43
static nokprobe_inline bool trace_kprobe_is_return(struct trace_kprobe *tk)
44
{
45
	return tk->rp.handler != NULL;
46 47
}

48
static nokprobe_inline const char *trace_kprobe_symbol(struct trace_kprobe *tk)
49
{
50
	return tk->symbol ? tk->symbol : "unknown";
51 52
}

53
static nokprobe_inline unsigned long trace_kprobe_offset(struct trace_kprobe *tk)
54
{
55
	return tk->rp.kp.offset;
56 57
}

58
static nokprobe_inline bool trace_kprobe_has_gone(struct trace_kprobe *tk)
59
{
60
	return !!(kprobe_gone(&tk->rp.kp));
61 62
}

63
static nokprobe_inline bool trace_kprobe_within_module(struct trace_kprobe *tk,
64
						 struct module *mod)
65 66
{
	int len = strlen(mod->name);
67
	const char *name = trace_kprobe_symbol(tk);
68 69 70
	return strncmp(mod->name, name, len) == 0 && name[len] == ':';
}

71
static nokprobe_inline bool trace_kprobe_is_on_module(struct trace_kprobe *tk)
72
{
73
	return !!strchr(trace_kprobe_symbol(tk), ':');
74 75
}

76 77
static int register_kprobe_event(struct trace_kprobe *tk);
static int unregister_kprobe_event(struct trace_kprobe *tk);
78 79 80 81

static DEFINE_MUTEX(probe_lock);
static LIST_HEAD(probe_list);

82 83 84 85
static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs);
static int kretprobe_dispatcher(struct kretprobe_instance *ri,
				struct pt_regs *regs);

86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130
/* Memory fetching by symbol */
struct symbol_cache {
	char		*symbol;
	long		offset;
	unsigned long	addr;
};

unsigned long update_symbol_cache(struct symbol_cache *sc)
{
	sc->addr = (unsigned long)kallsyms_lookup_name(sc->symbol);

	if (sc->addr)
		sc->addr += sc->offset;

	return sc->addr;
}

void free_symbol_cache(struct symbol_cache *sc)
{
	kfree(sc->symbol);
	kfree(sc);
}

struct symbol_cache *alloc_symbol_cache(const char *sym, long offset)
{
	struct symbol_cache *sc;

	if (!sym || strlen(sym) == 0)
		return NULL;

	sc = kzalloc(sizeof(struct symbol_cache), GFP_KERNEL);
	if (!sc)
		return NULL;

	sc->symbol = kstrdup(sym, GFP_KERNEL);
	if (!sc->symbol) {
		kfree(sc);
		return NULL;
	}
	sc->offset = offset;
	update_symbol_cache(sc);

	return sc;
}

131 132 133 134
/*
 * Kprobes-specific fetch functions
 */
#define DEFINE_FETCH_stack(type)					\
135
static void FETCH_FUNC_NAME(stack, type)(struct pt_regs *regs,		\
136 137 138 139
					  void *offset, void *dest)	\
{									\
	*(type *)dest = (type)regs_get_kernel_stack_nth(regs,		\
				(unsigned int)((unsigned long)offset));	\
140 141 142
}									\
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(stack, type));

143 144 145 146 147
DEFINE_BASIC_FETCH_FUNCS(stack)
/* No string on the stack entry */
#define fetch_stack_string	NULL
#define fetch_stack_string_size	NULL

148
#define DEFINE_FETCH_memory(type)					\
149
static void FETCH_FUNC_NAME(memory, type)(struct pt_regs *regs,		\
150 151 152 153 154 155 156
					  void *addr, void *dest)	\
{									\
	type retval;							\
	if (probe_kernel_address(addr, retval))				\
		*(type *)dest = 0;					\
	else								\
		*(type *)dest = retval;					\
157 158 159
}									\
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(memory, type));

160 161 162 163 164
DEFINE_BASIC_FETCH_FUNCS(memory)
/*
 * Fetch a null-terminated string. Caller MUST set *(u32 *)dest with max
 * length and relative data location.
 */
165 166
static void FETCH_FUNC_NAME(memory, string)(struct pt_regs *regs,
					    void *addr, void *dest)
167 168 169
{
	int maxlen = get_rloc_len(*(u32 *)dest);
	u8 *dst = get_rloc_data(dest);
170
	long ret;
171 172 173 174 175 176 177 178

	if (!maxlen)
		return;

	/*
	 * Try to get string again, since the string can be changed while
	 * probing.
	 */
179
	ret = strncpy_from_unsafe(dst, addr, maxlen);
180 181

	if (ret < 0) {	/* Failed to fetch string */
182
		dst[0] = '\0';
183 184
		*(u32 *)dest = make_data_rloc(0, get_rloc_offs(*(u32 *)dest));
	} else {
185
		*(u32 *)dest = make_data_rloc(ret, get_rloc_offs(*(u32 *)dest));
186 187
	}
}
188
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(memory, string));
189 190

/* Return the length of string -- including null terminal byte */
191 192
static void FETCH_FUNC_NAME(memory, string_size)(struct pt_regs *regs,
						 void *addr, void *dest)
193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214
{
	mm_segment_t old_fs;
	int ret, len = 0;
	u8 c;

	old_fs = get_fs();
	set_fs(KERNEL_DS);
	pagefault_disable();

	do {
		ret = __copy_from_user_inatomic(&c, (u8 *)addr + len, 1);
		len++;
	} while (c && ret == 0 && len < MAX_STRING_SIZE);

	pagefault_enable();
	set_fs(old_fs);

	if (ret < 0)	/* Failed to check the length */
		*(u32 *)dest = 0;
	else
		*(u32 *)dest = len;
}
215
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(memory, string_size));
216

217
#define DEFINE_FETCH_symbol(type)					\
218
void FETCH_FUNC_NAME(symbol, type)(struct pt_regs *regs, void *data, void *dest)\
219 220 221 222 223 224
{									\
	struct symbol_cache *sc = data;					\
	if (sc->addr)							\
		fetch_memory_##type(regs, (void *)sc->addr, dest);	\
	else								\
		*(type *)dest = 0;					\
225 226 227
}									\
NOKPROBE_SYMBOL(FETCH_FUNC_NAME(symbol, type));

228 229 230 231
DEFINE_BASIC_FETCH_FUNCS(symbol)
DEFINE_FETCH_symbol(string)
DEFINE_FETCH_symbol(string_size)

232 233 234 235 236 237 238 239
/* kprobes don't support file_offset fetch methods */
#define fetch_file_offset_u8		NULL
#define fetch_file_offset_u16		NULL
#define fetch_file_offset_u32		NULL
#define fetch_file_offset_u64		NULL
#define fetch_file_offset_string	NULL
#define fetch_file_offset_string_size	NULL

240
/* Fetch type information table */
241
static const struct fetch_type kprobes_fetch_type_table[] = {
242 243 244 245 246 247 248 249 250 251 252 253 254 255
	/* Special types */
	[FETCH_TYPE_STRING] = __ASSIGN_FETCH_TYPE("string", string, string,
					sizeof(u32), 1, "__data_loc char[]"),
	[FETCH_TYPE_STRSIZE] = __ASSIGN_FETCH_TYPE("string_size", u32,
					string_size, sizeof(u32), 0, "u32"),
	/* Basic types */
	ASSIGN_FETCH_TYPE(u8,  u8,  0),
	ASSIGN_FETCH_TYPE(u16, u16, 0),
	ASSIGN_FETCH_TYPE(u32, u32, 0),
	ASSIGN_FETCH_TYPE(u64, u64, 0),
	ASSIGN_FETCH_TYPE(s8,  u8,  1),
	ASSIGN_FETCH_TYPE(s16, u16, 1),
	ASSIGN_FETCH_TYPE(s32, u32, 1),
	ASSIGN_FETCH_TYPE(s64, u64, 1),
256 257 258 259
	ASSIGN_FETCH_TYPE_ALIAS(x8,  u8,  u8,  0),
	ASSIGN_FETCH_TYPE_ALIAS(x16, u16, u16, 0),
	ASSIGN_FETCH_TYPE_ALIAS(x32, u32, u32, 0),
	ASSIGN_FETCH_TYPE_ALIAS(x64, u64, u64, 0),
260 261 262 263

	ASSIGN_FETCH_TYPE_END
};

264 265 266
/*
 * Allocate new trace_probe and initialize it (including kprobes).
 */
267
static struct trace_kprobe *alloc_trace_kprobe(const char *group,
268
					     const char *event,
269 270 271
					     void *addr,
					     const char *symbol,
					     unsigned long offs,
272
					     int nargs, bool is_return)
273
{
274
	struct trace_kprobe *tk;
275
	int ret = -ENOMEM;
276

277 278
	tk = kzalloc(SIZEOF_TRACE_KPROBE(nargs), GFP_KERNEL);
	if (!tk)
279
		return ERR_PTR(ret);
280

281 282 283 284
	tk->nhit = alloc_percpu(unsigned long);
	if (!tk->nhit)
		goto error;

285
	if (symbol) {
286 287
		tk->symbol = kstrdup(symbol, GFP_KERNEL);
		if (!tk->symbol)
288
			goto error;
289 290
		tk->rp.kp.symbol_name = tk->symbol;
		tk->rp.kp.offset = offs;
291
	} else
292
		tk->rp.kp.addr = addr;
293 294

	if (is_return)
295
		tk->rp.handler = kretprobe_dispatcher;
296
	else
297
		tk->rp.kp.pre_handler = kprobe_dispatcher;
298

299
	if (!event || !is_good_name(event)) {
300
		ret = -EINVAL;
301
		goto error;
302 303
	}

304 305 306
	tk->tp.call.class = &tk->tp.class;
	tk->tp.call.name = kstrdup(event, GFP_KERNEL);
	if (!tk->tp.call.name)
307
		goto error;
308

309
	if (!group || !is_good_name(group)) {
310
		ret = -EINVAL;
311
		goto error;
312 313
	}

314 315
	tk->tp.class.system = kstrdup(group, GFP_KERNEL);
	if (!tk->tp.class.system)
316 317
		goto error;

318 319 320
	INIT_LIST_HEAD(&tk->list);
	INIT_LIST_HEAD(&tk->tp.files);
	return tk;
321
error:
322 323
	kfree(tk->tp.call.name);
	kfree(tk->symbol);
324
	free_percpu(tk->nhit);
325
	kfree(tk);
326
	return ERR_PTR(ret);
327 328
}

329
static void free_trace_kprobe(struct trace_kprobe *tk)
330 331 332
{
	int i;

333 334
	for (i = 0; i < tk->tp.nr_args; i++)
		traceprobe_free_probe_arg(&tk->tp.args[i]);
335

336 337 338
	kfree(tk->tp.call.class->system);
	kfree(tk->tp.call.name);
	kfree(tk->symbol);
339
	free_percpu(tk->nhit);
340
	kfree(tk);
341 342
}

343 344
static struct trace_kprobe *find_trace_kprobe(const char *event,
					      const char *group)
345
{
346
	struct trace_kprobe *tk;
347

348
	list_for_each_entry(tk, &probe_list, list)
349
		if (strcmp(trace_event_name(&tk->tp.call), event) == 0 &&
350 351
		    strcmp(tk->tp.call.class->system, group) == 0)
			return tk;
352 353 354
	return NULL;
}

355 356 357 358 359
/*
 * Enable trace_probe
 * if the file is NULL, enable "perf" handler, or enable "trace" handler.
 */
static int
360
enable_trace_kprobe(struct trace_kprobe *tk, struct trace_event_file *file)
361 362 363
{
	int ret = 0;

364
	if (file) {
365 366 367 368
		struct event_file_link *link;

		link = kmalloc(sizeof(*link), GFP_KERNEL);
		if (!link) {
369
			ret = -ENOMEM;
370
			goto out;
371 372
		}

373
		link->file = file;
374
		list_add_tail_rcu(&link->list, &tk->tp.files);
375

376
		tk->tp.flags |= TP_FLAG_TRACE;
377
	} else
378
		tk->tp.flags |= TP_FLAG_PROFILE;
379

380 381 382
	if (trace_probe_is_registered(&tk->tp) && !trace_kprobe_has_gone(tk)) {
		if (trace_kprobe_is_return(tk))
			ret = enable_kretprobe(&tk->rp);
383
		else
384
			ret = enable_kprobe(&tk->rp.kp);
385
	}
386
 out:
387 388 389
	return ret;
}

390 391 392 393 394
/*
 * Disable trace_probe
 * if the file is NULL, disable "perf" handler, or disable "trace" handler.
 */
static int
395
disable_trace_kprobe(struct trace_kprobe *tk, struct trace_event_file *file)
396
{
397 398
	struct event_file_link *link = NULL;
	int wait = 0;
399 400 401
	int ret = 0;

	if (file) {
402
		link = find_event_file_link(&tk->tp, file);
403
		if (!link) {
404
			ret = -EINVAL;
405
			goto out;
406 407
		}

408
		list_del_rcu(&link->list);
409
		wait = 1;
410
		if (!list_empty(&tk->tp.files))
411
			goto out;
412

413
		tk->tp.flags &= ~TP_FLAG_TRACE;
414
	} else
415
		tk->tp.flags &= ~TP_FLAG_PROFILE;
416

417 418 419
	if (!trace_probe_is_enabled(&tk->tp) && trace_probe_is_registered(&tk->tp)) {
		if (trace_kprobe_is_return(tk))
			disable_kretprobe(&tk->rp);
420
		else
421
			disable_kprobe(&tk->rp.kp);
422
		wait = 1;
423
	}
424
 out:
425 426 427 428 429 430 431 432 433 434 435 436 437
	if (wait) {
		/*
		 * Synchronize with kprobe_trace_func/kretprobe_trace_func
		 * to ensure disabled (all running handlers are finished).
		 * This is not only for kfree(), but also the caller,
		 * trace_remove_event_call() supposes it for releasing
		 * event_call related objects, which will be accessed in
		 * the kprobe_trace_func/kretprobe_trace_func.
		 */
		synchronize_sched();
		kfree(link);	/* Ignored if link == NULL */
	}

438
	return ret;
439 440
}

441
/* Internal register function - just handle k*probes and flags */
442
static int __register_trace_kprobe(struct trace_kprobe *tk)
443
{
444
	int i, ret;
445

446
	if (trace_probe_is_registered(&tk->tp))
447 448
		return -EINVAL;

449 450
	for (i = 0; i < tk->tp.nr_args; i++)
		traceprobe_update_arg(&tk->tp.args[i]);
451

452
	/* Set/clear disabled flag according to tp->flag */
453 454
	if (trace_probe_is_enabled(&tk->tp))
		tk->rp.kp.flags &= ~KPROBE_FLAG_DISABLED;
455
	else
456
		tk->rp.kp.flags |= KPROBE_FLAG_DISABLED;
457

458 459
	if (trace_kprobe_is_return(tk))
		ret = register_kretprobe(&tk->rp);
460
	else
461
		ret = register_kprobe(&tk->rp.kp);
462 463

	if (ret == 0)
464
		tk->tp.flags |= TP_FLAG_REGISTERED;
465
	else {
466 467
		pr_warn("Could not insert probe at %s+%lu: %d\n",
			trace_kprobe_symbol(tk), trace_kprobe_offset(tk), ret);
468
		if (ret == -ENOENT && trace_kprobe_is_on_module(tk)) {
469
			pr_warn("This probe might be able to register after target module is loaded. Continue.\n");
470 471
			ret = 0;
		} else if (ret == -EILSEQ) {
472 473
			pr_warn("Probing address(0x%p) is not an instruction boundary.\n",
				tk->rp.kp.addr);
474 475 476 477 478 479 480 481
			ret = -EINVAL;
		}
	}

	return ret;
}

/* Internal unregister function - just handle k*probes and flags */
482
static void __unregister_trace_kprobe(struct trace_kprobe *tk)
483
{
484 485 486
	if (trace_probe_is_registered(&tk->tp)) {
		if (trace_kprobe_is_return(tk))
			unregister_kretprobe(&tk->rp);
487
		else
488 489
			unregister_kprobe(&tk->rp.kp);
		tk->tp.flags &= ~TP_FLAG_REGISTERED;
490
		/* Cleanup kprobe for reuse */
491 492
		if (tk->rp.kp.symbol_name)
			tk->rp.kp.addr = NULL;
493 494 495 496
	}
}

/* Unregister a trace_probe and probe_event: call with locking probe_lock */
497
static int unregister_trace_kprobe(struct trace_kprobe *tk)
498
{
499
	/* Enabled event can not be unregistered */
500
	if (trace_probe_is_enabled(&tk->tp))
501 502
		return -EBUSY;

503
	/* Will fail if probe is being used by ftrace or perf */
504
	if (unregister_kprobe_event(tk))
505 506
		return -EBUSY;

507 508
	__unregister_trace_kprobe(tk);
	list_del(&tk->list);
509 510

	return 0;
511 512 513
}

/* Register a trace_probe and probe_event */
514
static int register_trace_kprobe(struct trace_kprobe *tk)
515
{
516
	struct trace_kprobe *old_tk;
517 518 519 520
	int ret;

	mutex_lock(&probe_lock);

521
	/* Delete old (same name) event if exist */
522
	old_tk = find_trace_kprobe(trace_event_name(&tk->tp.call),
523
			tk->tp.call.class->system);
524 525
	if (old_tk) {
		ret = unregister_trace_kprobe(old_tk);
526 527
		if (ret < 0)
			goto end;
528
		free_trace_kprobe(old_tk);
529
	}
530 531

	/* Register new event */
532
	ret = register_kprobe_event(tk);
533
	if (ret) {
534
		pr_warn("Failed to register probe event(%d)\n", ret);
535 536 537
		goto end;
	}

538
	/* Register k*probe */
539
	ret = __register_trace_kprobe(tk);
540
	if (ret < 0)
541
		unregister_kprobe_event(tk);
542
	else
543
		list_add_tail(&tk->list, &probe_list);
544

545 546 547 548 549
end:
	mutex_unlock(&probe_lock);
	return ret;
}

550
/* Module notifier call back, checking event on the module */
551
static int trace_kprobe_module_callback(struct notifier_block *nb,
552 553 554
				       unsigned long val, void *data)
{
	struct module *mod = data;
555
	struct trace_kprobe *tk;
556 557 558 559 560 561 562
	int ret;

	if (val != MODULE_STATE_COMING)
		return NOTIFY_DONE;

	/* Update probes on coming module */
	mutex_lock(&probe_lock);
563 564
	list_for_each_entry(tk, &probe_list, list) {
		if (trace_kprobe_within_module(tk, mod)) {
565
			/* Don't need to check busy - this should have gone. */
566 567
			__unregister_trace_kprobe(tk);
			ret = __register_trace_kprobe(tk);
568
			if (ret)
569 570 571
				pr_warn("Failed to re-register probe %s on %s: %d\n",
					trace_event_name(&tk->tp.call),
					mod->name, ret);
572 573 574 575 576 577 578
		}
	}
	mutex_unlock(&probe_lock);

	return NOTIFY_DONE;
}

579 580
static struct notifier_block trace_kprobe_module_nb = {
	.notifier_call = trace_kprobe_module_callback,
581 582 583
	.priority = 1	/* Invoked after kprobe module callback */
};

584
static int create_trace_kprobe(int argc, char **argv)
585 586 587
{
	/*
	 * Argument syntax:
588 589
	 *  - Add kprobe: p[:[GRP/]EVENT] [MOD:]KSYM[+OFFS]|KADDR [FETCHARGS]
	 *  - Add kretprobe: r[:[GRP/]EVENT] [MOD:]KSYM[+0] [FETCHARGS]
590
	 * Fetch args:
591 592 593
	 *  $retval	: fetch return value
	 *  $stack	: fetch stack address
	 *  $stackN	: fetch Nth of stack (N:0-)
594
	 *  $comm       : fetch current task comm
595 596 597
	 *  @ADDR	: fetch memory at ADDR (ADDR should be in kernel)
	 *  @SYM[+|-offs] : fetch memory at SYM +|- offs (SYM is a data symbol)
	 *  %REG	: fetch register REG
598
	 * Dereferencing memory fetch:
599
	 *  +|-offs(ARG) : fetch memory at ARG +|- offs address.
600 601
	 * Alias name of args:
	 *  NAME=FETCHARG : set NAME as alias of FETCHARG.
602 603
	 * Type of args:
	 *  FETCHARG:TYPE : use TYPE instead of unsigned long.
604
	 */
605
	struct trace_kprobe *tk;
606
	int i, ret = 0;
607
	bool is_return = false, is_delete = false;
608
	char *symbol = NULL, *event = NULL, *group = NULL;
609
	char *arg;
610
	unsigned long offset = 0;
611
	void *addr = NULL;
612
	char buf[MAX_EVENT_NAME_LEN];
613

614
	/* argc must be >= 1 */
615
	if (argv[0][0] == 'p')
616
		is_return = false;
617
	else if (argv[0][0] == 'r')
618
		is_return = true;
619
	else if (argv[0][0] == '-')
620
		is_delete = true;
621
	else {
622 623
		pr_info("Probe definition must be started with 'p', 'r' or"
			" '-'.\n");
624
		return -EINVAL;
625
	}
626 627 628

	if (argv[0][1] == ':') {
		event = &argv[0][2];
629 630 631 632 633
		if (strchr(event, '/')) {
			group = event;
			event = strchr(group, '/') + 1;
			event[-1] = '\0';
			if (strlen(group) == 0) {
634
				pr_info("Group name is not specified\n");
635 636 637
				return -EINVAL;
			}
		}
638
		if (strlen(event) == 0) {
639
			pr_info("Event name is not specified\n");
640 641 642
			return -EINVAL;
		}
	}
643 644
	if (!group)
		group = KPROBE_EVENT_SYSTEM;
645

646 647 648 649 650
	if (is_delete) {
		if (!event) {
			pr_info("Delete command needs an event name.\n");
			return -EINVAL;
		}
651
		mutex_lock(&probe_lock);
652 653
		tk = find_trace_kprobe(event, group);
		if (!tk) {
654
			mutex_unlock(&probe_lock);
655 656 657 658
			pr_info("Event %s/%s doesn't exist.\n", group, event);
			return -ENOENT;
		}
		/* delete an event */
659
		ret = unregister_trace_kprobe(tk);
660
		if (ret == 0)
661
			free_trace_kprobe(tk);
662
		mutex_unlock(&probe_lock);
663
		return ret;
664 665 666 667 668 669
	}

	if (argc < 2) {
		pr_info("Probe point is not specified.\n");
		return -EINVAL;
	}
670
	if (isdigit(argv[1][0])) {
671 672
		if (is_return) {
			pr_info("Return probe point must be a symbol.\n");
673
			return -EINVAL;
674
		}
675
		/* an address specified */
676
		ret = kstrtoul(&argv[1][0], 0, (unsigned long *)&addr);
677 678
		if (ret) {
			pr_info("Failed to parse address.\n");
679
			return ret;
680
		}
681 682 683 684
	} else {
		/* a symbol specified */
		symbol = argv[1];
		/* TODO: support .init module functions */
685
		ret = traceprobe_split_symbol_offset(symbol, &offset);
686 687
		if (ret) {
			pr_info("Failed to parse symbol.\n");
688
			return ret;
689 690 691
		}
		if (offset && is_return) {
			pr_info("Return probe must be used without offset.\n");
692
			return -EINVAL;
693
		}
694
	}
695
	argc -= 2; argv += 2;
696 697

	/* setup a probe */
698 699 700
	if (!event) {
		/* Make a new event name */
		if (symbol)
701
			snprintf(buf, MAX_EVENT_NAME_LEN, "%c_%s_%ld",
702 703
				 is_return ? 'r' : 'p', symbol, offset);
		else
704
			snprintf(buf, MAX_EVENT_NAME_LEN, "%c_0x%p",
705
				 is_return ? 'r' : 'p', addr);
706 707
		event = buf;
	}
708
	tk = alloc_trace_kprobe(group, event, addr, symbol, offset, argc,
709
			       is_return);
710
	if (IS_ERR(tk)) {
711
		pr_info("Failed to allocate trace_probe.(%d)\n",
712 713
			(int)PTR_ERR(tk));
		return PTR_ERR(tk);
714
	}
715 716

	/* parse arguments */
717 718
	ret = 0;
	for (i = 0; i < argc && i < MAX_TRACE_ARGS; i++) {
719 720
		struct probe_arg *parg = &tk->tp.args[i];

721
		/* Increment count for freeing args in error case */
722
		tk->tp.nr_args++;
723

724 725
		/* Parse argument name */
		arg = strchr(argv[i], '=');
726
		if (arg) {
727
			*arg++ = '\0';
728
			parg->name = kstrdup(argv[i], GFP_KERNEL);
729
		} else {
730
			arg = argv[i];
731 732
			/* If argument name is omitted, set "argN" */
			snprintf(buf, MAX_EVENT_NAME_LEN, "arg%d", i + 1);
733
			parg->name = kstrdup(buf, GFP_KERNEL);
734
		}
735

736
		if (!parg->name) {
737
			pr_info("Failed to allocate argument[%d] name.\n", i);
738
			ret = -ENOMEM;
739 740
			goto error;
		}
741

742
		if (!is_good_name(parg->name)) {
743
			pr_info("Invalid argument[%d] name: %s\n",
744
				i, parg->name);
745 746 747
			ret = -EINVAL;
			goto error;
		}
748

749 750
		if (traceprobe_conflict_field_name(parg->name,
							tk->tp.args, i)) {
751
			pr_info("Argument[%d] name '%s' conflicts with "
752 753 754 755
				"another field.\n", i, argv[i]);
			ret = -EINVAL;
			goto error;
		}
756 757

		/* Parse fetch argument */
758
		ret = traceprobe_parse_probe_arg(arg, &tk->tp.size, parg,
759 760
						is_return, true,
						kprobes_fetch_type_table);
761
		if (ret) {
762
			pr_info("Parse error at argument[%d]. (%d)\n", i, ret);
763
			goto error;
764
		}
765 766
	}

767
	ret = register_trace_kprobe(tk);
768 769 770 771 772
	if (ret)
		goto error;
	return 0;

error:
773
	free_trace_kprobe(tk);
774 775 776
	return ret;
}

777
static int release_all_trace_kprobes(void)
778
{
779
	struct trace_kprobe *tk;
780
	int ret = 0;
781 782

	mutex_lock(&probe_lock);
783
	/* Ensure no probe is in use. */
784 785
	list_for_each_entry(tk, &probe_list, list)
		if (trace_probe_is_enabled(&tk->tp)) {
786 787 788
			ret = -EBUSY;
			goto end;
		}
789 790
	/* TODO: Use batch unregistration */
	while (!list_empty(&probe_list)) {
791 792
		tk = list_entry(probe_list.next, struct trace_kprobe, list);
		ret = unregister_trace_kprobe(tk);
793 794
		if (ret)
			goto end;
795
		free_trace_kprobe(tk);
796
	}
797 798

end:
799
	mutex_unlock(&probe_lock);
800 801

	return ret;
802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822
}

/* Probes listing interfaces */
static void *probes_seq_start(struct seq_file *m, loff_t *pos)
{
	mutex_lock(&probe_lock);
	return seq_list_start(&probe_list, *pos);
}

static void *probes_seq_next(struct seq_file *m, void *v, loff_t *pos)
{
	return seq_list_next(v, &probe_list, pos);
}

static void probes_seq_stop(struct seq_file *m, void *v)
{
	mutex_unlock(&probe_lock);
}

static int probes_seq_show(struct seq_file *m, void *v)
{
823
	struct trace_kprobe *tk = v;
824
	int i;
825

826
	seq_putc(m, trace_kprobe_is_return(tk) ? 'r' : 'p');
827
	seq_printf(m, ":%s/%s", tk->tp.call.class->system,
828
			trace_event_name(&tk->tp.call));
829

830 831 832 833 834
	if (!tk->symbol)
		seq_printf(m, " 0x%p", tk->rp.kp.addr);
	else if (tk->rp.kp.offset)
		seq_printf(m, " %s+%u", trace_kprobe_symbol(tk),
			   tk->rp.kp.offset);
835
	else
836
		seq_printf(m, " %s", trace_kprobe_symbol(tk));
837

838 839
	for (i = 0; i < tk->tp.nr_args; i++)
		seq_printf(m, " %s=%s", tk->tp.args[i].name, tk->tp.args[i].comm);
840
	seq_putc(m, '\n');
841

842 843 844 845 846 847 848 849 850 851 852 853
	return 0;
}

static const struct seq_operations probes_seq_op = {
	.start  = probes_seq_start,
	.next   = probes_seq_next,
	.stop   = probes_seq_stop,
	.show   = probes_seq_show
};

static int probes_open(struct inode *inode, struct file *file)
{
854 855 856
	int ret;

	if ((file->f_mode & FMODE_WRITE) && (file->f_flags & O_TRUNC)) {
857
		ret = release_all_trace_kprobes();
858 859 860
		if (ret < 0)
			return ret;
	}
861 862 863 864 865 866 867

	return seq_open(file, &probes_seq_op);
}

static ssize_t probes_write(struct file *file, const char __user *buffer,
			    size_t count, loff_t *ppos)
{
868
	return traceprobe_probes_write(file, buffer, count, ppos,
869
			create_trace_kprobe);
870 871 872 873 874 875 876 877 878 879 880
}

static const struct file_operations kprobe_events_ops = {
	.owner          = THIS_MODULE,
	.open           = probes_open,
	.read           = seq_read,
	.llseek         = seq_lseek,
	.release        = seq_release,
	.write		= probes_write,
};

881 882 883
/* Probes profiling interfaces */
static int probes_profile_seq_show(struct seq_file *m, void *v)
{
884
	struct trace_kprobe *tk = v;
885 886 887 888 889
	unsigned long nhit = 0;
	int cpu;

	for_each_possible_cpu(cpu)
		nhit += *per_cpu_ptr(tk->nhit, cpu);
890

891
	seq_printf(m, "  %-44s %15lu %15lu\n",
892
		   trace_event_name(&tk->tp.call), nhit,
893
		   tk->rp.kp.nmissed);
894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917

	return 0;
}

static const struct seq_operations profile_seq_op = {
	.start  = probes_seq_start,
	.next   = probes_seq_next,
	.stop   = probes_seq_stop,
	.show   = probes_profile_seq_show
};

static int profile_open(struct inode *inode, struct file *file)
{
	return seq_open(file, &profile_seq_op);
}

static const struct file_operations kprobe_profile_ops = {
	.owner          = THIS_MODULE,
	.open           = profile_open,
	.read           = seq_read,
	.llseek         = seq_lseek,
	.release        = seq_release,
};

918
/* Kprobe handler */
919
static nokprobe_inline void
920
__kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs,
921
		    struct trace_event_file *trace_file)
922
{
923
	struct kprobe_trace_entry_head *entry;
924
	struct ring_buffer_event *event;
925
	struct ring_buffer *buffer;
926
	int size, dsize, pc;
927
	unsigned long irq_flags;
928
	struct trace_event_call *call = &tk->tp.call;
929

930
	WARN_ON(call != trace_file->event_call);
931

932
	if (trace_trigger_soft_disabled(trace_file))
933
		return;
934

935 936 937
	local_save_flags(irq_flags);
	pc = preempt_count();

938 939
	dsize = __get_data_size(&tk->tp, regs);
	size = sizeof(*entry) + tk->tp.size + dsize;
940

941
	event = trace_event_buffer_lock_reserve(&buffer, trace_file,
942 943
						call->event.type,
						size, irq_flags, pc);
944
	if (!event)
945
		return;
946 947

	entry = ring_buffer_event_data(event);
948 949
	entry->ip = (unsigned long)tk->rp.kp.addr;
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
950

951
	event_trigger_unlock_commit_regs(trace_file, buffer, event,
952
					 entry, irq_flags, pc, regs);
953 954
}

955
static void
956
kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs)
957
{
958
	struct event_file_link *link;
959

960 961
	list_for_each_entry_rcu(link, &tk->tp.files, list)
		__kprobe_trace_func(tk, regs, link->file);
962
}
963
NOKPROBE_SYMBOL(kprobe_trace_func);
964

965
/* Kretprobe handler */
966
static nokprobe_inline void
967
__kretprobe_trace_func(struct trace_kprobe *tk, struct kretprobe_instance *ri,
968
		       struct pt_regs *regs,
969
		       struct trace_event_file *trace_file)
970
{
971
	struct kretprobe_trace_entry_head *entry;
972
	struct ring_buffer_event *event;
973
	struct ring_buffer *buffer;
974
	int size, pc, dsize;
975
	unsigned long irq_flags;
976
	struct trace_event_call *call = &tk->tp.call;
977

978
	WARN_ON(call != trace_file->event_call);
979

980
	if (trace_trigger_soft_disabled(trace_file))
981
		return;
982

983 984 985
	local_save_flags(irq_flags);
	pc = preempt_count();

986 987
	dsize = __get_data_size(&tk->tp, regs);
	size = sizeof(*entry) + tk->tp.size + dsize;
988

989
	event = trace_event_buffer_lock_reserve(&buffer, trace_file,
990 991
						call->event.type,
						size, irq_flags, pc);
992
	if (!event)
993
		return;
994 995

	entry = ring_buffer_event_data(event);
996
	entry->func = (unsigned long)tk->rp.kp.addr;
997
	entry->ret_ip = (unsigned long)ri->ret_addr;
998
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
999

1000
	event_trigger_unlock_commit_regs(trace_file, buffer, event,
1001
					 entry, irq_flags, pc, regs);
1002 1003
}

1004
static void
1005
kretprobe_trace_func(struct trace_kprobe *tk, struct kretprobe_instance *ri,
1006 1007
		     struct pt_regs *regs)
{
1008
	struct event_file_link *link;
1009

1010 1011
	list_for_each_entry_rcu(link, &tk->tp.files, list)
		__kretprobe_trace_func(tk, ri, regs, link->file);
1012
}
1013
NOKPROBE_SYMBOL(kretprobe_trace_func);
1014

1015
/* Event entry printers */
1016
static enum print_line_t
1017 1018
print_kprobe_event(struct trace_iterator *iter, int flags,
		   struct trace_event *event)
1019
{
1020
	struct kprobe_trace_entry_head *field;
1021
	struct trace_seq *s = &iter->seq;
1022
	struct trace_probe *tp;
1023
	u8 *data;
1024 1025
	int i;

1026
	field = (struct kprobe_trace_entry_head *)iter->ent;
1027
	tp = container_of(event, struct trace_probe, call.event);
1028

1029
	trace_seq_printf(s, "%s: (", trace_event_name(&tp->call));
1030

1031
	if (!seq_print_ip_sym(s, field->ip, flags | TRACE_ITER_SYM_OFFSET))
1032
		goto out;
1033

1034
	trace_seq_putc(s, ')');
1035

1036 1037 1038
	data = (u8 *)&field[1];
	for (i = 0; i < tp->nr_args; i++)
		if (!tp->args[i].type->print(s, tp->args[i].name,
1039
					     data + tp->args[i].offset, field))
1040
			goto out;
1041

1042 1043 1044
	trace_seq_putc(s, '\n');
 out:
	return trace_handle_return(s);
1045 1046
}

1047
static enum print_line_t
1048 1049
print_kretprobe_event(struct trace_iterator *iter, int flags,
		      struct trace_event *event)
1050
{
1051
	struct kretprobe_trace_entry_head *field;
1052
	struct trace_seq *s = &iter->seq;
1053
	struct trace_probe *tp;
1054
	u8 *data;
1055 1056
	int i;

1057
	field = (struct kretprobe_trace_entry_head *)iter->ent;
1058
	tp = container_of(event, struct trace_probe, call.event);
1059

1060
	trace_seq_printf(s, "%s: (", trace_event_name(&tp->call));
1061

1062
	if (!seq_print_ip_sym(s, field->ret_ip, flags | TRACE_ITER_SYM_OFFSET))
1063
		goto out;
1064

1065
	trace_seq_puts(s, " <- ");
1066 1067

	if (!seq_print_ip_sym(s, field->func, flags & ~TRACE_ITER_SYM_OFFSET))
1068
		goto out;
1069

1070
	trace_seq_putc(s, ')');
1071

1072 1073 1074
	data = (u8 *)&field[1];
	for (i = 0; i < tp->nr_args; i++)
		if (!tp->args[i].type->print(s, tp->args[i].name,
1075
					     data + tp->args[i].offset, field))
1076
			goto out;
1077

1078
	trace_seq_putc(s, '\n');
1079

1080 1081
 out:
	return trace_handle_return(s);
1082 1083 1084
}


1085
static int kprobe_event_define_fields(struct trace_event_call *event_call)
1086 1087
{
	int ret, i;
1088
	struct kprobe_trace_entry_head field;
1089
	struct trace_kprobe *tk = (struct trace_kprobe *)event_call->data;
1090

1091
	DEFINE_FIELD(unsigned long, ip, FIELD_STRING_IP, 0);
1092
	/* Set argument names as fields */
1093 1094 1095 1096 1097 1098 1099 1100
	for (i = 0; i < tk->tp.nr_args; i++) {
		struct probe_arg *parg = &tk->tp.args[i];

		ret = trace_define_field(event_call, parg->type->fmttype,
					 parg->name,
					 sizeof(field) + parg->offset,
					 parg->type->size,
					 parg->type->is_signed,
1101 1102 1103 1104
					 FILTER_OTHER);
		if (ret)
			return ret;
	}
1105 1106 1107
	return 0;
}

1108
static int kretprobe_event_define_fields(struct trace_event_call *event_call)
1109 1110
{
	int ret, i;
1111
	struct kretprobe_trace_entry_head field;
1112
	struct trace_kprobe *tk = (struct trace_kprobe *)event_call->data;
1113

1114 1115
	DEFINE_FIELD(unsigned long, func, FIELD_STRING_FUNC, 0);
	DEFINE_FIELD(unsigned long, ret_ip, FIELD_STRING_RETIP, 0);
1116
	/* Set argument names as fields */
1117 1118 1119 1120 1121 1122 1123 1124
	for (i = 0; i < tk->tp.nr_args; i++) {
		struct probe_arg *parg = &tk->tp.args[i];

		ret = trace_define_field(event_call, parg->type->fmttype,
					 parg->name,
					 sizeof(field) + parg->offset,
					 parg->type->size,
					 parg->type->is_signed,
1125 1126 1127 1128
					 FILTER_OTHER);
		if (ret)
			return ret;
	}
1129 1130 1131
	return 0;
}

1132
#ifdef CONFIG_PERF_EVENTS
1133 1134

/* Kprobe profile handler */
1135
static void
1136
kprobe_perf_func(struct trace_kprobe *tk, struct pt_regs *regs)
1137
{
1138
	struct trace_event_call *call = &tk->tp.call;
1139
	struct bpf_prog *prog = call->prog;
1140
	struct kprobe_trace_entry_head *entry;
1141
	struct hlist_head *head;
1142
	int size, __size, dsize;
1143
	int rctx;
1144

1145 1146 1147
	if (prog && !trace_call_bpf(prog, regs))
		return;

1148 1149 1150 1151
	head = this_cpu_ptr(call->perf_events);
	if (hlist_empty(head))
		return;

1152 1153
	dsize = __get_data_size(&tk->tp, regs);
	__size = sizeof(*entry) + tk->tp.size + dsize;
1154 1155
	size = ALIGN(__size + sizeof(u32), sizeof(u64));
	size -= sizeof(u32);
1156

1157
	entry = perf_trace_buf_alloc(size, NULL, &rctx);
1158
	if (!entry)
1159
		return;
1160

1161
	entry->ip = (unsigned long)tk->rp.kp.addr;
1162
	memset(&entry[1], 0, dsize);
1163
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
1164 1165
	perf_trace_buf_submit(entry, size, rctx, call->event.type, 1, regs,
			      head, NULL);
1166
}
1167
NOKPROBE_SYMBOL(kprobe_perf_func);
1168 1169

/* Kretprobe profile handler */
1170
static void
1171
kretprobe_perf_func(struct trace_kprobe *tk, struct kretprobe_instance *ri,
1172
		    struct pt_regs *regs)
1173
{
1174
	struct trace_event_call *call = &tk->tp.call;
1175
	struct bpf_prog *prog = call->prog;
1176
	struct kretprobe_trace_entry_head *entry;
1177
	struct hlist_head *head;
1178
	int size, __size, dsize;
1179
	int rctx;
1180

1181 1182 1183
	if (prog && !trace_call_bpf(prog, regs))
		return;

1184 1185 1186 1187
	head = this_cpu_ptr(call->perf_events);
	if (hlist_empty(head))
		return;

1188 1189
	dsize = __get_data_size(&tk->tp, regs);
	__size = sizeof(*entry) + tk->tp.size + dsize;
1190 1191
	size = ALIGN(__size + sizeof(u32), sizeof(u64));
	size -= sizeof(u32);
1192

1193
	entry = perf_trace_buf_alloc(size, NULL, &rctx);
1194
	if (!entry)
1195
		return;
1196

1197
	entry->func = (unsigned long)tk->rp.kp.addr;
1198
	entry->ret_ip = (unsigned long)ri->ret_addr;
1199
	store_trace_args(sizeof(*entry), &tk->tp, regs, (u8 *)&entry[1], dsize);
1200 1201
	perf_trace_buf_submit(entry, size, rctx, call->event.type, 1, regs,
			      head, NULL);
1202
}
1203
NOKPROBE_SYMBOL(kretprobe_perf_func);
1204
#endif	/* CONFIG_PERF_EVENTS */
1205

1206 1207 1208 1209 1210 1211
/*
 * called by perf_trace_init() or __ftrace_set_clr_event() under event_mutex.
 *
 * kprobe_trace_self_tests_init() does enable_trace_probe/disable_trace_probe
 * lockless, but we can't race with this __init function.
 */
1212
static int kprobe_register(struct trace_event_call *event,
1213
			   enum trace_reg type, void *data)
1214
{
1215
	struct trace_kprobe *tk = (struct trace_kprobe *)event->data;
1216
	struct trace_event_file *file = data;
1217

1218 1219
	switch (type) {
	case TRACE_REG_REGISTER:
1220
		return enable_trace_kprobe(tk, file);
1221
	case TRACE_REG_UNREGISTER:
1222
		return disable_trace_kprobe(tk, file);
1223 1224 1225

#ifdef CONFIG_PERF_EVENTS
	case TRACE_REG_PERF_REGISTER:
1226
		return enable_trace_kprobe(tk, NULL);
1227
	case TRACE_REG_PERF_UNREGISTER:
1228
		return disable_trace_kprobe(tk, NULL);
1229 1230
	case TRACE_REG_PERF_OPEN:
	case TRACE_REG_PERF_CLOSE:
1231 1232
	case TRACE_REG_PERF_ADD:
	case TRACE_REG_PERF_DEL:
1233
		return 0;
1234 1235 1236 1237
#endif
	}
	return 0;
}
1238

1239
static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs)
1240
{
1241
	struct trace_kprobe *tk = container_of(kp, struct trace_kprobe, rp.kp);
1242

1243
	raw_cpu_inc(*tk->nhit);
1244

1245 1246
	if (tk->tp.flags & TP_FLAG_TRACE)
		kprobe_trace_func(tk, regs);
1247
#ifdef CONFIG_PERF_EVENTS
1248 1249
	if (tk->tp.flags & TP_FLAG_PROFILE)
		kprobe_perf_func(tk, regs);
1250
#endif
1251 1252
	return 0;	/* We don't tweek kernel, so just return 0 */
}
1253
NOKPROBE_SYMBOL(kprobe_dispatcher);
1254

1255 1256
static int
kretprobe_dispatcher(struct kretprobe_instance *ri, struct pt_regs *regs)
1257
{
1258
	struct trace_kprobe *tk = container_of(ri->rp, struct trace_kprobe, rp);
1259

1260
	raw_cpu_inc(*tk->nhit);
1261

1262 1263
	if (tk->tp.flags & TP_FLAG_TRACE)
		kretprobe_trace_func(tk, ri, regs);
1264
#ifdef CONFIG_PERF_EVENTS
1265 1266
	if (tk->tp.flags & TP_FLAG_PROFILE)
		kretprobe_perf_func(tk, ri, regs);
1267
#endif
1268 1269
	return 0;	/* We don't tweek kernel, so just return 0 */
}
1270
NOKPROBE_SYMBOL(kretprobe_dispatcher);
1271

1272 1273 1274 1275 1276 1277 1278 1279
static struct trace_event_functions kretprobe_funcs = {
	.trace		= print_kretprobe_event
};

static struct trace_event_functions kprobe_funcs = {
	.trace		= print_kprobe_event
};

1280
static int register_kprobe_event(struct trace_kprobe *tk)
1281
{
1282
	struct trace_event_call *call = &tk->tp.call;
1283 1284
	int ret;

1285
	/* Initialize trace_event_call */
1286
	INIT_LIST_HEAD(&call->class->fields);
1287
	if (trace_kprobe_is_return(tk)) {
1288
		call->event.funcs = &kretprobe_funcs;
1289
		call->class->define_fields = kretprobe_event_define_fields;
1290
	} else {
1291
		call->event.funcs = &kprobe_funcs;
1292
		call->class->define_fields = kprobe_event_define_fields;
1293
	}
1294
	if (set_print_fmt(&tk->tp, trace_kprobe_is_return(tk)) < 0)
1295
		return -ENOMEM;
1296
	ret = register_trace_event(&call->event);
1297
	if (!ret) {
1298
		kfree(call->print_fmt);
1299
		return -ENODEV;
1300
	}
A
Alexei Starovoitov 已提交
1301
	call->flags = TRACE_EVENT_FL_KPROBE;
1302
	call->class->reg = kprobe_register;
1303
	call->data = tk;
1304
	ret = trace_add_event_call(call);
1305
	if (ret) {
1306
		pr_info("Failed to register kprobe event: %s\n",
1307
			trace_event_name(call));
1308
		kfree(call->print_fmt);
1309
		unregister_trace_event(&call->event);
1310
	}
1311 1312 1313
	return ret;
}

1314
static int unregister_kprobe_event(struct trace_kprobe *tk)
1315
{
1316 1317
	int ret;

1318
	/* tp->event is unregistered in trace_remove_event_call() */
1319
	ret = trace_remove_event_call(&tk->tp.call);
1320
	if (!ret)
1321
		kfree(tk->tp.call.print_fmt);
1322
	return ret;
1323 1324
}

1325
/* Make a tracefs interface for controlling probe points */
1326 1327 1328 1329 1330
static __init int init_kprobe_trace(void)
{
	struct dentry *d_tracer;
	struct dentry *entry;

1331
	if (register_module_notifier(&trace_kprobe_module_nb))
1332 1333
		return -EINVAL;

1334
	d_tracer = tracing_init_dentry();
1335
	if (IS_ERR(d_tracer))
1336 1337
		return 0;

1338
	entry = tracefs_create_file("kprobe_events", 0644, d_tracer,
1339 1340
				    NULL, &kprobe_events_ops);

1341
	/* Event list interface */
1342
	if (!entry)
1343
		pr_warn("Could not create tracefs 'kprobe_events' entry\n");
1344 1345

	/* Profile interface */
1346
	entry = tracefs_create_file("kprobe_profile", 0444, d_tracer,
1347 1348 1349
				    NULL, &kprobe_profile_ops);

	if (!entry)
1350
		pr_warn("Could not create tracefs 'kprobe_profile' entry\n");
1351 1352 1353 1354 1355 1356 1357
	return 0;
}
fs_initcall(init_kprobe_trace);


#ifdef CONFIG_FTRACE_STARTUP_TEST

1358 1359 1360 1361 1362 1363
/*
 * The "__used" keeps gcc from removing the function symbol
 * from the kallsyms table.
 */
static __used int kprobe_trace_selftest_target(int a1, int a2, int a3,
					       int a4, int a5, int a6)
1364 1365 1366 1367
{
	return a1 + a2 + a3 + a4 + a5 + a6;
}

1368
static struct trace_event_file *
1369
find_trace_probe_file(struct trace_kprobe *tk, struct trace_array *tr)
1370
{
1371
	struct trace_event_file *file;
1372 1373

	list_for_each_entry(file, &tr->events, list)
1374
		if (file->event_call == &tk->tp.call)
1375 1376 1377 1378 1379
			return file;

	return NULL;
}

1380
/*
1381
 * Nobody but us can call enable_trace_kprobe/disable_trace_kprobe at this
1382 1383
 * stage, we can do this lockless.
 */
1384 1385
static __init int kprobe_trace_self_tests_init(void)
{
1386
	int ret, warn = 0;
1387
	int (*target)(int, int, int, int, int, int);
1388
	struct trace_kprobe *tk;
1389
	struct trace_event_file *file;
1390

1391 1392 1393
	if (tracing_is_disabled())
		return -ENODEV;

1394 1395 1396 1397
	target = kprobe_trace_selftest_target;

	pr_info("Testing kprobe tracing: ");

1398 1399
	ret = traceprobe_command("p:testprobe kprobe_trace_selftest_target "
				  "$stack $stack0 +0($stack)",
1400
				  create_trace_kprobe);
1401
	if (WARN_ON_ONCE(ret)) {
1402
		pr_warn("error on probing function entry.\n");
1403 1404 1405
		warn++;
	} else {
		/* Enable trace point */
1406 1407
		tk = find_trace_kprobe("testprobe", KPROBE_EVENT_SYSTEM);
		if (WARN_ON_ONCE(tk == NULL)) {
1408
			pr_warn("error on getting new probe.\n");
1409
			warn++;
1410
		} else {
1411
			file = find_trace_probe_file(tk, top_trace_array());
1412 1413 1414 1415
			if (WARN_ON_ONCE(file == NULL)) {
				pr_warn("error on getting probe file.\n");
				warn++;
			} else
1416
				enable_trace_kprobe(tk, file);
1417
		}
1418
	}
1419

1420
	ret = traceprobe_command("r:testprobe2 kprobe_trace_selftest_target "
1421
				  "$retval", create_trace_kprobe);
1422
	if (WARN_ON_ONCE(ret)) {
1423
		pr_warn("error on probing function return.\n");
1424 1425 1426
		warn++;
	} else {
		/* Enable trace point */
1427 1428
		tk = find_trace_kprobe("testprobe2", KPROBE_EVENT_SYSTEM);
		if (WARN_ON_ONCE(tk == NULL)) {
1429
			pr_warn("error on getting 2nd new probe.\n");
1430
			warn++;
1431
		} else {
1432
			file = find_trace_probe_file(tk, top_trace_array());
1433 1434 1435 1436
			if (WARN_ON_ONCE(file == NULL)) {
				pr_warn("error on getting probe file.\n");
				warn++;
			} else
1437
				enable_trace_kprobe(tk, file);
1438
		}
1439 1440 1441 1442
	}

	if (warn)
		goto end;
1443 1444 1445

	ret = target(1, 2, 3, 4, 5, 6);

1446
	/* Disable trace points before removing it */
1447 1448
	tk = find_trace_kprobe("testprobe", KPROBE_EVENT_SYSTEM);
	if (WARN_ON_ONCE(tk == NULL)) {
1449
		pr_warn("error on getting test probe.\n");
1450
		warn++;
1451
	} else {
1452
		file = find_trace_probe_file(tk, top_trace_array());
1453 1454 1455 1456
		if (WARN_ON_ONCE(file == NULL)) {
			pr_warn("error on getting probe file.\n");
			warn++;
		} else
1457
			disable_trace_kprobe(tk, file);
1458
	}
1459

1460 1461
	tk = find_trace_kprobe("testprobe2", KPROBE_EVENT_SYSTEM);
	if (WARN_ON_ONCE(tk == NULL)) {
1462
		pr_warn("error on getting 2nd test probe.\n");
1463
		warn++;
1464
	} else {
1465
		file = find_trace_probe_file(tk, top_trace_array());
1466 1467 1468 1469
		if (WARN_ON_ONCE(file == NULL)) {
			pr_warn("error on getting probe file.\n");
			warn++;
		} else
1470
			disable_trace_kprobe(tk, file);
1471
	}
1472

1473
	ret = traceprobe_command("-:testprobe", create_trace_kprobe);
1474
	if (WARN_ON_ONCE(ret)) {
1475
		pr_warn("error on deleting a probe.\n");
1476 1477 1478
		warn++;
	}

1479
	ret = traceprobe_command("-:testprobe2", create_trace_kprobe);
1480
	if (WARN_ON_ONCE(ret)) {
1481
		pr_warn("error on deleting a probe.\n");
1482 1483
		warn++;
	}
1484

1485
end:
1486
	release_all_trace_kprobes();
1487 1488 1489 1490
	if (warn)
		pr_cont("NG: Some tests are failed. Please check them.\n");
	else
		pr_cont("OK\n");
1491 1492 1493 1494 1495 1496
	return 0;
}

late_initcall(kprobe_trace_self_tests_init);

#endif