diff options
Diffstat (limited to 'tools/perf/util/probe-event.c')
| -rw-r--r-- | tools/perf/util/probe-event.c | 666 | 
1 files changed, 414 insertions, 252 deletions
diff --git a/tools/perf/util/probe-event.c b/tools/perf/util/probe-event.c index d05b77cf35f7..381f23a443c7 100644 --- a/tools/perf/util/probe-event.c +++ b/tools/perf/util/probe-event.c @@ -51,6 +51,7 @@  #define PERFPROBE_GROUP "probe"  bool probe_event_dry_run;	/* Dry run flag */ +struct probe_conf probe_conf;  #define semantic_error(msg ...) pr_err("Semantic error :" msg) @@ -161,18 +162,18 @@ static u64 kernel_get_symbol_address_by_name(const char *name, bool reloc)  static struct map *kernel_get_module_map(const char *module)  { -	struct rb_node *nd;  	struct map_groups *grp = &host_machine->kmaps; +	struct maps *maps = &grp->maps[MAP__FUNCTION]; +	struct map *pos;  	/* A file path -- this is an offline module */  	if (module && strchr(module, '/')) -		return machine__new_module(host_machine, 0, module); +		return machine__findnew_module_map(host_machine, 0, module);  	if (!module)  		module = "kernel"; -	for (nd = rb_first(&grp->maps[MAP__FUNCTION]); nd; nd = rb_next(nd)) { -		struct map *pos = rb_entry(nd, struct map, rb_node); +	for (pos = maps__first(maps); pos; pos = map__next(pos)) {  		if (strncmp(pos->dso->short_name + 1, module,  			    pos->dso->short_name_len - 2) == 0) {  			return pos; @@ -194,52 +195,11 @@ static void put_target_map(struct map *map, bool user)  {  	if (map && user) {  		/* Only the user map needs to be released */ -		dso__delete(map->dso); -		map__delete(map); +		map__put(map);  	}  } -static struct dso *kernel_get_module_dso(const char *module) -{ -	struct dso *dso; -	struct map *map; -	const char *vmlinux_name; - -	if (module) { -		list_for_each_entry(dso, &host_machine->kernel_dsos.head, -				    node) { -			if (strncmp(dso->short_name + 1, module, -				    dso->short_name_len - 2) == 0) -				goto found; -		} -		pr_debug("Failed to find module %s.\n", module); -		return NULL; -	} - -	map = host_machine->vmlinux_maps[MAP__FUNCTION]; -	dso = map->dso; - -	vmlinux_name = symbol_conf.vmlinux_name; -	if (vmlinux_name) { -		if (dso__load_vmlinux(dso, map, vmlinux_name, false, NULL) <= 0) -			return NULL; -	} else { -		if (dso__load_vmlinux_path(dso, map, NULL) <= 0) { -			pr_debug("Failed to load kernel map.\n"); -			return NULL; -		} -	} -found: -	return dso; -} - -const char *kernel_get_module_path(const char *module) -{ -	struct dso *dso = kernel_get_module_dso(module); -	return (dso) ? dso->long_name : NULL; -} -  static int convert_exec_to_group(const char *exec, char **result)  {  	char *ptr1, *ptr2, *exec_copy; @@ -286,7 +246,59 @@ static void clear_probe_trace_events(struct probe_trace_event *tevs, int ntevs)  		clear_probe_trace_event(tevs + i);  } +static bool kprobe_blacklist__listed(unsigned long address); +static bool kprobe_warn_out_range(const char *symbol, unsigned long address) +{ +	u64 etext_addr; + +	/* Get the address of _etext for checking non-probable text symbol */ +	etext_addr = kernel_get_symbol_address_by_name("_etext", false); + +	if (etext_addr != 0 && etext_addr < address) +		pr_warning("%s is out of .text, skip it.\n", symbol); +	else if (kprobe_blacklist__listed(address)) +		pr_warning("%s is blacklisted function, skip it.\n", symbol); +	else +		return false; + +	return true; +} +  #ifdef HAVE_DWARF_SUPPORT + +static int kernel_get_module_dso(const char *module, struct dso **pdso) +{ +	struct dso *dso; +	struct map *map; +	const char *vmlinux_name; +	int ret = 0; + +	if (module) { +		list_for_each_entry(dso, &host_machine->dsos.head, node) { +			if (!dso->kernel) +				continue; +			if (strncmp(dso->short_name + 1, module, +				    dso->short_name_len - 2) == 0) +				goto found; +		} +		pr_debug("Failed to find module %s.\n", module); +		return -ENOENT; +	} + +	map = host_machine->vmlinux_maps[MAP__FUNCTION]; +	dso = map->dso; + +	vmlinux_name = symbol_conf.vmlinux_name; +	dso->load_errno = 0; +	if (vmlinux_name) +		ret = dso__load_vmlinux(dso, map, vmlinux_name, false, NULL); +	else +		ret = dso__load_vmlinux_path(dso, map, NULL); +found: +	*pdso = dso; +	return ret; +} +  /*   * Some binaries like glibc have special symbols which are on the symbol   * table, but not in the debuginfo. If we can find the address of the @@ -344,15 +356,14 @@ out:  static int get_alternative_probe_event(struct debuginfo *dinfo,  				       struct perf_probe_event *pev, -				       struct perf_probe_point *tmp, -				       const char *target) +				       struct perf_probe_point *tmp)  {  	int ret;  	memcpy(tmp, &pev->point, sizeof(*tmp));  	memset(&pev->point, 0, sizeof(pev->point));  	ret = find_alternative_probe_point(dinfo, tmp, &pev->point, -					   target, pev->uprobes); +					   pev->target, pev->uprobes);  	if (ret < 0)  		memcpy(&pev->point, tmp, sizeof(*tmp)); @@ -390,16 +401,25 @@ static int get_alternative_line_range(struct debuginfo *dinfo,  static struct debuginfo *open_debuginfo(const char *module, bool silent)  {  	const char *path = module; -	struct debuginfo *ret; +	char reason[STRERR_BUFSIZE]; +	struct debuginfo *ret = NULL; +	struct dso *dso = NULL; +	int err;  	if (!module || !strchr(module, '/')) { -		path = kernel_get_module_path(module); -		if (!path) { +		err = kernel_get_module_dso(module, &dso); +		if (err < 0) { +			if (!dso || dso->load_errno == 0) { +				if (!strerror_r(-err, reason, STRERR_BUFSIZE)) +					strcpy(reason, "(unknown)"); +			} else +				dso__strerror_load(dso, reason, STRERR_BUFSIZE);  			if (!silent) -				pr_err("Failed to find path of %s module.\n", -				       module ?: "kernel"); +				pr_err("Failed to find the path for %s: %s\n", +					module ?: "kernel", reason);  			return NULL;  		} +		path = dso->long_name;  	}  	ret = debuginfo__new(path);  	if (!ret && !silent) { @@ -413,6 +433,41 @@ static struct debuginfo *open_debuginfo(const char *module, bool silent)  	return ret;  } +/* For caching the last debuginfo */ +static struct debuginfo *debuginfo_cache; +static char *debuginfo_cache_path; + +static struct debuginfo *debuginfo_cache__open(const char *module, bool silent) +{ +	if ((debuginfo_cache_path && !strcmp(debuginfo_cache_path, module)) || +	    (!debuginfo_cache_path && !module && debuginfo_cache)) +		goto out; + +	/* Copy module path */ +	free(debuginfo_cache_path); +	if (module) { +		debuginfo_cache_path = strdup(module); +		if (!debuginfo_cache_path) { +			debuginfo__delete(debuginfo_cache); +			debuginfo_cache = NULL; +			goto out; +		} +	} + +	debuginfo_cache = open_debuginfo(module, silent); +	if (!debuginfo_cache) +		zfree(&debuginfo_cache_path); +out: +	return debuginfo_cache; +} + +static void debuginfo_cache__exit(void) +{ +	debuginfo__delete(debuginfo_cache); +	debuginfo_cache = NULL; +	zfree(&debuginfo_cache_path); +} +  static int get_text_start_address(const char *exec, unsigned long *address)  { @@ -474,12 +529,11 @@ static int find_perf_probe_point_from_dwarf(struct probe_trace_point *tp,  	pr_debug("try to find information at %" PRIx64 " in %s\n", addr,  		 tp->module ? : "kernel"); -	dinfo = open_debuginfo(tp->module, verbose == 0); -	if (dinfo) { +	dinfo = debuginfo_cache__open(tp->module, verbose == 0); +	if (dinfo)  		ret = debuginfo__find_probe_point(dinfo,  						 (unsigned long)addr, pp); -		debuginfo__delete(dinfo); -	} else +	else  		ret = -ENOENT;  	if (ret > 0) { @@ -558,7 +612,7 @@ static int post_process_probe_trace_events(struct probe_trace_event *tevs,  {  	struct ref_reloc_sym *reloc_sym;  	char *tmp; -	int i; +	int i, skipped = 0;  	if (uprobe)  		return add_exec_to_probe_trace_events(tevs, ntevs, module); @@ -574,31 +628,40 @@ static int post_process_probe_trace_events(struct probe_trace_event *tevs,  	}  	for (i = 0; i < ntevs; i++) { -		if (tevs[i].point.address && !tevs[i].point.retprobe) { +		if (!tevs[i].point.address || tevs[i].point.retprobe) +			continue; +		/* If we found a wrong one, mark it by NULL symbol */ +		if (kprobe_warn_out_range(tevs[i].point.symbol, +					  tevs[i].point.address)) { +			tmp = NULL; +			skipped++; +		} else {  			tmp = strdup(reloc_sym->name);  			if (!tmp)  				return -ENOMEM; -			free(tevs[i].point.symbol); -			tevs[i].point.symbol = tmp; -			tevs[i].point.offset = tevs[i].point.address - -					       reloc_sym->unrelocated_addr;  		} +		/* If we have no realname, use symbol for it */ +		if (!tevs[i].point.realname) +			tevs[i].point.realname = tevs[i].point.symbol; +		else +			free(tevs[i].point.symbol); +		tevs[i].point.symbol = tmp; +		tevs[i].point.offset = tevs[i].point.address - +				       reloc_sym->unrelocated_addr;  	} -	return 0; +	return skipped;  }  /* Try to find perf_probe_event with debuginfo */  static int try_to_find_probe_trace_events(struct perf_probe_event *pev, -					  struct probe_trace_event **tevs, -					  int max_tevs, const char *target) +					  struct probe_trace_event **tevs)  {  	bool need_dwarf = perf_probe_event_need_dwarf(pev);  	struct perf_probe_point tmp;  	struct debuginfo *dinfo;  	int ntevs, ret = 0; -	dinfo = open_debuginfo(target, !need_dwarf); - +	dinfo = open_debuginfo(pev->target, !need_dwarf);  	if (!dinfo) {  		if (need_dwarf)  			return -ENOENT; @@ -608,13 +671,12 @@ static int try_to_find_probe_trace_events(struct perf_probe_event *pev,  	pr_debug("Try to find probe point from debuginfo.\n");  	/* Searching trace events corresponding to a probe event */ -	ntevs = debuginfo__find_trace_events(dinfo, pev, tevs, max_tevs); +	ntevs = debuginfo__find_trace_events(dinfo, pev, tevs);  	if (ntevs == 0)	{  /* Not found, retry with an alternative */ -		ret = get_alternative_probe_event(dinfo, pev, &tmp, target); +		ret = get_alternative_probe_event(dinfo, pev, &tmp);  		if (!ret) { -			ntevs = debuginfo__find_trace_events(dinfo, pev, -							     tevs, max_tevs); +			ntevs = debuginfo__find_trace_events(dinfo, pev, tevs);  			/*  			 * Write back to the original probe_event for  			 * setting appropriate (user given) event name @@ -629,12 +691,15 @@ static int try_to_find_probe_trace_events(struct perf_probe_event *pev,  	if (ntevs > 0) {	/* Succeeded to find trace events */  		pr_debug("Found %d probe_trace_events.\n", ntevs);  		ret = post_process_probe_trace_events(*tevs, ntevs, -							target, pev->uprobes); -		if (ret < 0) { +						pev->target, pev->uprobes); +		if (ret < 0 || ret == ntevs) {  			clear_probe_trace_events(*tevs, ntevs);  			zfree(tevs);  		} -		return ret < 0 ? ret : ntevs; +		if (ret != ntevs) +			return ret < 0 ? ret : ntevs; +		ntevs = 0; +		/* Fall through */  	}  	if (ntevs == 0)	{	/* No error but failed to find probe point. */ @@ -809,8 +874,7 @@ int show_line_range(struct line_range *lr, const char *module, bool user)  static int show_available_vars_at(struct debuginfo *dinfo,  				  struct perf_probe_event *pev, -				  int max_vls, struct strfilter *_filter, -				  bool externs, const char *target) +				  struct strfilter *_filter)  {  	char *buf;  	int ret, i, nvars; @@ -824,13 +888,12 @@ static int show_available_vars_at(struct debuginfo *dinfo,  		return -EINVAL;  	pr_debug("Searching variables at %s\n", buf); -	ret = debuginfo__find_available_vars_at(dinfo, pev, &vls, -						max_vls, externs); +	ret = debuginfo__find_available_vars_at(dinfo, pev, &vls);  	if (!ret) {  /* Not found, retry with an alternative */ -		ret = get_alternative_probe_event(dinfo, pev, &tmp, target); +		ret = get_alternative_probe_event(dinfo, pev, &tmp);  		if (!ret) {  			ret = debuginfo__find_available_vars_at(dinfo, pev, -						&vls, max_vls, externs); +								&vls);  			/* Release the old probe_point */  			clear_perf_probe_point(&tmp);  		} @@ -877,8 +940,7 @@ end:  /* Show available variables on given probe point */  int show_available_vars(struct perf_probe_event *pevs, int npevs, -			int max_vls, const char *module, -			struct strfilter *_filter, bool externs) +			struct strfilter *_filter)  {  	int i, ret = 0;  	struct debuginfo *dinfo; @@ -887,7 +949,7 @@ int show_available_vars(struct perf_probe_event *pevs, int npevs,  	if (ret < 0)  		return ret; -	dinfo = open_debuginfo(module, false); +	dinfo = open_debuginfo(pevs->target, false);  	if (!dinfo) {  		ret = -ENOENT;  		goto out; @@ -896,8 +958,7 @@ int show_available_vars(struct perf_probe_event *pevs, int npevs,  	setup_pager();  	for (i = 0; i < npevs && ret >= 0; i++) -		ret = show_available_vars_at(dinfo, &pevs[i], max_vls, _filter, -					     externs, module); +		ret = show_available_vars_at(dinfo, &pevs[i], _filter);  	debuginfo__delete(dinfo);  out: @@ -907,6 +968,10 @@ out:  #else	/* !HAVE_DWARF_SUPPORT */ +static void debuginfo_cache__exit(void) +{ +} +  static int  find_perf_probe_point_from_dwarf(struct probe_trace_point *tp __maybe_unused,  				 struct perf_probe_point *pp __maybe_unused, @@ -916,9 +981,7 @@ find_perf_probe_point_from_dwarf(struct probe_trace_point *tp __maybe_unused,  }  static int try_to_find_probe_trace_events(struct perf_probe_event *pev, -				struct probe_trace_event **tevs __maybe_unused, -				int max_tevs __maybe_unused, -				const char *target __maybe_unused) +				struct probe_trace_event **tevs __maybe_unused)  {  	if (perf_probe_event_need_dwarf(pev)) {  		pr_warning("Debuginfo-analysis is not supported.\n"); @@ -937,10 +1000,8 @@ int show_line_range(struct line_range *lr __maybe_unused,  }  int show_available_vars(struct perf_probe_event *pevs __maybe_unused, -			int npevs __maybe_unused, int max_vls __maybe_unused, -			const char *module __maybe_unused, -			struct strfilter *filter __maybe_unused, -			bool externs __maybe_unused) +			int npevs __maybe_unused, +			struct strfilter *filter __maybe_unused)  {  	pr_warning("Debuginfo-analysis is not supported.\n");  	return -ENOSYS; @@ -980,6 +1041,18 @@ static int parse_line_num(char **ptr, int *val, const char *what)  	return 0;  } +/* Check the name is good for event, group or function */ +static bool is_c_func_name(const char *name) +{ +	if (!isalpha(*name) && *name != '_') +		return false; +	while (*++name != '\0') { +		if (!isalpha(*name) && !isdigit(*name) && *name != '_') +			return false; +	} +	return true; +} +  /*   * Stuff 'lr' according to the line range described by 'arg'.   * The line range syntax is described by: @@ -1048,10 +1121,15 @@ int parse_line_range_desc(const char *arg, struct line_range *lr)  			goto err;  		}  		lr->function = name; -	} else if (strchr(name, '.')) +	} else if (strchr(name, '/') || strchr(name, '.'))  		lr->file = name; -	else +	else if (is_c_func_name(name))/* We reuse it for checking funcname */  		lr->function = name; +	else {	/* Invalid name */ +		semantic_error("'%s' is not a valid function name.\n", name); +		err = -EINVAL; +		goto err; +	}  	return 0;  err: @@ -1059,24 +1137,13 @@ err:  	return err;  } -/* Check the name is good for event/group */ -static bool check_event_name(const char *name) -{ -	if (!isalpha(*name) && *name != '_') -		return false; -	while (*++name != '\0') { -		if (!isalpha(*name) && !isdigit(*name) && *name != '_') -			return false; -	} -	return true; -} -  /* Parse probepoint definition. */  static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)  {  	struct perf_probe_point *pp = &pev->point;  	char *ptr, *tmp;  	char c, nc = 0; +	bool file_spec = false;  	/*  	 * <Syntax>  	 * perf probe [EVENT=]SRC[:LN|;PTN] @@ -1095,7 +1162,7 @@ static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)  			semantic_error("Group name is not supported yet.\n");  			return -ENOTSUP;  		} -		if (!check_event_name(arg)) { +		if (!is_c_func_name(arg)) {  			semantic_error("%s is bad for event name -it must "  				       "follow C symbol-naming rule.\n", arg);  			return -EINVAL; @@ -1107,6 +1174,23 @@ static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)  		arg = tmp;  	} +	/* +	 * Check arg is function or file name and copy it. +	 * +	 * We consider arg to be a file spec if and only if it satisfies +	 * all of the below criteria:: +	 * - it does not include any of "+@%", +	 * - it includes one of ":;", and +	 * - it has a period '.' in the name. +	 * +	 * Otherwise, we consider arg to be a function specification. +	 */ +	if (!strpbrk(arg, "+@%") && (ptr = strpbrk(arg, ";:")) != NULL) { +		/* This is a file spec if it includes a '.' before ; or : */ +		if (memchr(arg, '.', ptr - arg)) +			file_spec = true; +	} +  	ptr = strpbrk(arg, ";:+@%");  	if (ptr) {  		nc = *ptr; @@ -1117,10 +1201,9 @@ static int parse_perf_probe_point(char *arg, struct perf_probe_event *pev)  	if (tmp == NULL)  		return -ENOMEM; -	/* Check arg is function or file and copy it */ -	if (strchr(tmp, '.'))	/* File */ +	if (file_spec)  		pp->file = tmp; -	else			/* Function */ +	else  		pp->function = tmp;  	/* Parse other options */ @@ -1762,8 +1845,7 @@ static int find_perf_probe_point_from_map(struct probe_trace_point *tp,  out:  	if (map && !is_kprobe) { -		dso__delete(map->dso); -		map__delete(map); +		map__put(map);  	}  	return ret; @@ -1877,6 +1959,7 @@ static void clear_probe_trace_event(struct probe_trace_event *tev)  	free(tev->event);  	free(tev->group);  	free(tev->point.symbol); +	free(tev->point.realname);  	free(tev->point.module);  	for (i = 0; i < tev->nargs; i++) {  		free(tev->args[i].name); @@ -1954,7 +2037,7 @@ static int open_probe_events(const char *trace_file, bool readwrite)  	if (ret >= 0) {  		pr_debug("Opening %s write=%d\n", buf, readwrite);  		if (readwrite && !probe_event_dry_run) -			ret = open(buf, O_RDWR, O_APPEND); +			ret = open(buf, O_RDWR | O_APPEND, 0);  		else  			ret = open(buf, O_RDONLY, 0); @@ -2095,9 +2178,31 @@ kprobe_blacklist__find_by_address(struct list_head *blacklist,  	return NULL;  } -/* Show an event */ -static int show_perf_probe_event(struct perf_probe_event *pev, -				 const char *module) +static LIST_HEAD(kprobe_blacklist); + +static void kprobe_blacklist__init(void) +{ +	if (!list_empty(&kprobe_blacklist)) +		return; + +	if (kprobe_blacklist__load(&kprobe_blacklist) < 0) +		pr_debug("No kprobe blacklist support, ignored\n"); +} + +static void kprobe_blacklist__release(void) +{ +	kprobe_blacklist__delete(&kprobe_blacklist); +} + +static bool kprobe_blacklist__listed(unsigned long address) +{ +	return !!kprobe_blacklist__find_by_address(&kprobe_blacklist, address); +} + +static int perf_probe_event__sprintf(const char *group, const char *event, +				     struct perf_probe_event *pev, +				     const char *module, +				     struct strbuf *result)  {  	int i, ret;  	char buf[128]; @@ -2108,30 +2213,67 @@ static int show_perf_probe_event(struct perf_probe_event *pev,  	if (!place)  		return -EINVAL; -	ret = e_snprintf(buf, 128, "%s:%s", pev->group, pev->event); +	ret = e_snprintf(buf, 128, "%s:%s", group, event);  	if (ret < 0) -		return ret; +		goto out; -	pr_info("  %-20s (on %s", buf, place); +	strbuf_addf(result, "  %-20s (on %s", buf, place);  	if (module) -		pr_info(" in %s", module); +		strbuf_addf(result, " in %s", module);  	if (pev->nargs > 0) { -		pr_info(" with"); +		strbuf_addstr(result, " with");  		for (i = 0; i < pev->nargs; i++) {  			ret = synthesize_perf_probe_arg(&pev->args[i],  							buf, 128);  			if (ret < 0) -				break; -			pr_info(" %s", buf); +				goto out; +			strbuf_addf(result, " %s", buf);  		}  	} -	pr_info(")\n"); +	strbuf_addch(result, ')'); +out:  	free(place);  	return ret;  } -static int __show_perf_probe_events(int fd, bool is_kprobe) +/* Show an event */ +static int show_perf_probe_event(const char *group, const char *event, +				 struct perf_probe_event *pev, +				 const char *module, bool use_stdout) +{ +	struct strbuf buf = STRBUF_INIT; +	int ret; + +	ret = perf_probe_event__sprintf(group, event, pev, module, &buf); +	if (ret >= 0) { +		if (use_stdout) +			printf("%s\n", buf.buf); +		else +			pr_info("%s\n", buf.buf); +	} +	strbuf_release(&buf); + +	return ret; +} + +static bool filter_probe_trace_event(struct probe_trace_event *tev, +				     struct strfilter *filter) +{ +	char tmp[128]; + +	/* At first, check the event name itself */ +	if (strfilter__compare(filter, tev->event)) +		return true; + +	/* Next, check the combination of name and group */ +	if (e_snprintf(tmp, 128, "%s:%s", tev->group, tev->event) < 0) +		return false; +	return strfilter__compare(filter, tmp); +} + +static int __show_perf_probe_events(int fd, bool is_kprobe, +				    struct strfilter *filter)  {  	int ret = 0;  	struct probe_trace_event tev; @@ -2149,24 +2291,31 @@ static int __show_perf_probe_events(int fd, bool is_kprobe)  	strlist__for_each(ent, rawlist) {  		ret = parse_probe_trace_command(ent->s, &tev);  		if (ret >= 0) { +			if (!filter_probe_trace_event(&tev, filter)) +				goto next;  			ret = convert_to_perf_probe_event(&tev, &pev,  								is_kprobe); -			if (ret >= 0) -				ret = show_perf_probe_event(&pev, -							    tev.point.module); +			if (ret < 0) +				goto next; +			ret = show_perf_probe_event(pev.group, pev.event, +						    &pev, tev.point.module, +						    true);  		} +next:  		clear_perf_probe_event(&pev);  		clear_probe_trace_event(&tev);  		if (ret < 0)  			break;  	}  	strlist__delete(rawlist); +	/* Cleanup cached debuginfo if needed */ +	debuginfo_cache__exit();  	return ret;  }  /* List up current perf-probe events */ -int show_perf_probe_events(void) +int show_perf_probe_events(struct strfilter *filter)  {  	int kp_fd, up_fd, ret; @@ -2178,7 +2327,7 @@ int show_perf_probe_events(void)  	kp_fd = open_kprobe_events(false);  	if (kp_fd >= 0) { -		ret = __show_perf_probe_events(kp_fd, true); +		ret = __show_perf_probe_events(kp_fd, true, filter);  		close(kp_fd);  		if (ret < 0)  			goto out; @@ -2192,7 +2341,7 @@ int show_perf_probe_events(void)  	}  	if (up_fd >= 0) { -		ret = __show_perf_probe_events(up_fd, false); +		ret = __show_perf_probe_events(up_fd, false, filter);  		close(up_fd);  	}  out: @@ -2266,6 +2415,10 @@ static int get_new_event_name(char *buf, size_t len, const char *base,  			      struct strlist *namelist, bool allow_suffix)  {  	int i, ret; +	char *p; + +	if (*base == '.') +		base++;  	/* Try no suffix */  	ret = e_snprintf(buf, len, "%s", base); @@ -2273,6 +2426,10 @@ static int get_new_event_name(char *buf, size_t len, const char *base,  		pr_debug("snprintf() failed: %d\n", ret);  		return ret;  	} +	/* Cut off the postfixes (e.g. .const, .isra)*/ +	p = strchr(buf, '.'); +	if (p && p != buf) +		*p = '\0';  	if (!strlist__has_entry(namelist, buf))  		return 0; @@ -2328,10 +2485,9 @@ static int __add_probe_trace_events(struct perf_probe_event *pev,  	int i, fd, ret;  	struct probe_trace_event *tev = NULL;  	char buf[64]; -	const char *event, *group; +	const char *event = NULL, *group = NULL;  	struct strlist *namelist; -	LIST_HEAD(blacklist); -	struct kprobe_blacklist_node *node; +	bool safename;  	if (pev->uprobes)  		fd = open_uprobe_events(true); @@ -2347,34 +2503,26 @@ static int __add_probe_trace_events(struct perf_probe_event *pev,  	namelist = get_probe_trace_event_names(fd, false);  	if (!namelist) {  		pr_debug("Failed to get current event list.\n"); -		return -EIO; -	} -	/* Get kprobe blacklist if exists */ -	if (!pev->uprobes) { -		ret = kprobe_blacklist__load(&blacklist); -		if (ret < 0) -			pr_debug("No kprobe blacklist support, ignored\n"); +		ret = -ENOMEM; +		goto close_out;  	} +	safename = (pev->point.function && !strisglob(pev->point.function));  	ret = 0;  	pr_info("Added new event%s\n", (ntevs > 1) ? "s:" : ":");  	for (i = 0; i < ntevs; i++) {  		tev = &tevs[i]; -		/* Ensure that the address is NOT blacklisted */ -		node = kprobe_blacklist__find_by_address(&blacklist, -							 tev->point.address); -		if (node) { -			pr_warning("Warning: Skipped probing on blacklisted function: %s\n", node->symbol); +		/* Skip if the symbol is out of .text or blacklisted */ +		if (!tev->point.symbol)  			continue; -		}  		if (pev->event)  			event = pev->event;  		else -			if (pev->point.function) +			if (safename)  				event = pev->point.function;  			else -				event = tev->point.symbol; +				event = tev->point.realname;  		if (pev->group)  			group = pev->group;  		else @@ -2399,15 +2547,12 @@ static int __add_probe_trace_events(struct perf_probe_event *pev,  		/* Add added event name to namelist */  		strlist__add(namelist, event); -		/* Trick here - save current event/group */ -		event = pev->event; -		group = pev->group; -		pev->event = tev->event; -		pev->group = tev->group; -		show_perf_probe_event(pev, tev->point.module); -		/* Trick here - restore current event/group */ -		pev->event = (char *)event; -		pev->group = (char *)group; +		/* We use tev's name for showing new events */ +		show_perf_probe_event(tev->group, tev->event, pev, +				      tev->point.module, false); +		/* Save the last valid name */ +		event = tev->event; +		group = tev->group;  		/*  		 * Probes after the first probe which comes from same @@ -2421,26 +2566,34 @@ static int __add_probe_trace_events(struct perf_probe_event *pev,  		warn_uprobe_event_compat(tev);  	/* Note that it is possible to skip all events because of blacklist */ -	if (ret >= 0 && tev->event) { +	if (ret >= 0 && event) {  		/* Show how to use the event. */  		pr_info("\nYou can now use it in all perf tools, such as:\n\n"); -		pr_info("\tperf record -e %s:%s -aR sleep 1\n\n", tev->group, -			 tev->event); +		pr_info("\tperf record -e %s:%s -aR sleep 1\n\n", group, event);  	} -	kprobe_blacklist__delete(&blacklist);  	strlist__delete(namelist); +close_out:  	close(fd);  	return ret;  } -static int find_probe_functions(struct map *map, char *name) +static int find_probe_functions(struct map *map, char *name, +				struct symbol **syms)  {  	int found = 0;  	struct symbol *sym; +	struct rb_node *tmp; + +	if (map__load(map, NULL) < 0) +		return 0; -	map__for_each_symbol_by_name(map, name, sym) { -		found++; +	map__for_each_symbol(map, sym, tmp) { +		if (strglobmatch(sym->name, name)) { +			found++; +			if (syms && found < probe_conf.max_probes) +				syms[found - 1] = sym; +		}  	}  	return found; @@ -2449,42 +2602,52 @@ static int find_probe_functions(struct map *map, char *name)  #define strdup_or_goto(str, label)	\  	({ char *__p = strdup(str); if (!__p) goto label; __p; }) +void __weak arch__fix_tev_from_maps(struct perf_probe_event *pev __maybe_unused, +				struct probe_trace_event *tev __maybe_unused, +				struct map *map __maybe_unused) { } +  /*   * Find probe function addresses from map.   * Return an error or the number of found probe_trace_event   */  static int find_probe_trace_events_from_map(struct perf_probe_event *pev, -					    struct probe_trace_event **tevs, -					    int max_tevs, const char *target) +					    struct probe_trace_event **tevs)  {  	struct map *map = NULL;  	struct ref_reloc_sym *reloc_sym = NULL;  	struct symbol *sym; +	struct symbol **syms = NULL;  	struct probe_trace_event *tev;  	struct perf_probe_point *pp = &pev->point;  	struct probe_trace_point *tp;  	int num_matched_functions; -	int ret, i; +	int ret, i, j, skipped = 0; -	map = get_target_map(target, pev->uprobes); +	map = get_target_map(pev->target, pev->uprobes);  	if (!map) {  		ret = -EINVAL;  		goto out;  	} +	syms = malloc(sizeof(struct symbol *) * probe_conf.max_probes); +	if (!syms) { +		ret = -ENOMEM; +		goto out; +	} +  	/*  	 * Load matched symbols: Since the different local symbols may have  	 * same name but different addresses, this lists all the symbols.  	 */ -	num_matched_functions = find_probe_functions(map, pp->function); +	num_matched_functions = find_probe_functions(map, pp->function, syms);  	if (num_matched_functions == 0) {  		pr_err("Failed to find symbol %s in %s\n", pp->function, -			target ? : "kernel"); +			pev->target ? : "kernel");  		ret = -ENOENT;  		goto out; -	} else if (num_matched_functions > max_tevs) { +	} else if (num_matched_functions > probe_conf.max_probes) {  		pr_err("Too many functions matched in %s\n", -			target ? : "kernel"); +			pev->target ? : "kernel");  		ret = -E2BIG;  		goto out;  	} @@ -2507,7 +2670,9 @@ static int find_probe_trace_events_from_map(struct perf_probe_event *pev,  	ret = 0; -	map__for_each_symbol_by_name(map, pp->function, sym) { +	for (j = 0; j < num_matched_functions; j++) { +		sym = syms[j]; +  		tev = (*tevs) + ret;  		tp = &tev->point;  		if (ret == num_matched_functions) { @@ -2524,16 +2689,24 @@ static int find_probe_trace_events_from_map(struct perf_probe_event *pev,  		}  		/* Add one probe point */  		tp->address = map->unmap_ip(map, sym->start) + pp->offset; -		if (reloc_sym) { +		/* If we found a wrong one, mark it by NULL symbol */ +		if (!pev->uprobes && +		    kprobe_warn_out_range(sym->name, tp->address)) { +			tp->symbol = NULL;	/* Skip it */ +			skipped++; +		} else if (reloc_sym) {  			tp->symbol = strdup_or_goto(reloc_sym->name, nomem_out);  			tp->offset = tp->address - reloc_sym->addr;  		} else {  			tp->symbol = strdup_or_goto(sym->name, nomem_out);  			tp->offset = pp->offset;  		} +		tp->realname = strdup_or_goto(sym->name, nomem_out); +  		tp->retprobe = pp->retprobe; -		if (target) -			tev->point.module = strdup_or_goto(target, nomem_out); +		if (pev->target) +			tev->point.module = strdup_or_goto(pev->target, +							   nomem_out);  		tev->uprobes = pev->uprobes;  		tev->nargs = pev->nargs;  		if (tev->nargs) { @@ -2555,10 +2728,16 @@ static int find_probe_trace_events_from_map(struct perf_probe_event *pev,  					strdup_or_goto(pev->args[i].type,  							nomem_out);  		} +		arch__fix_tev_from_maps(pev, tev, map); +	} +	if (ret == skipped) { +		ret = -ENOENT; +		goto err_out;  	}  out:  	put_target_map(map, pev->uprobes); +	free(syms);  	return ret;  nomem_out: @@ -2569,27 +2748,34 @@ err_out:  	goto out;  } +bool __weak arch__prefers_symtab(void) { return false; } +  static int convert_to_probe_trace_events(struct perf_probe_event *pev, -					  struct probe_trace_event **tevs, -					  int max_tevs, const char *target) +					 struct probe_trace_event **tevs)  {  	int ret;  	if (pev->uprobes && !pev->group) {  		/* Replace group name if not given */ -		ret = convert_exec_to_group(target, &pev->group); +		ret = convert_exec_to_group(pev->target, &pev->group);  		if (ret != 0) {  			pr_warning("Failed to make a group name.\n");  			return ret;  		}  	} +	if (arch__prefers_symtab() && !perf_probe_event_need_dwarf(pev)) { +		ret = find_probe_trace_events_from_map(pev, tevs); +		if (ret > 0) +			return ret; /* Found in symbol table */ +	} +  	/* Convert perf_probe_event with debuginfo */ -	ret = try_to_find_probe_trace_events(pev, tevs, max_tevs, target); +	ret = try_to_find_probe_trace_events(pev, tevs);  	if (ret != 0)  		return ret;	/* Found in debuginfo or got an error */ -	return find_probe_trace_events_from_map(pev, tevs, max_tevs, target); +	return find_probe_trace_events_from_map(pev, tevs);  }  struct __event_package { @@ -2598,8 +2784,7 @@ struct __event_package {  	int				ntevs;  }; -int add_perf_probe_events(struct perf_probe_event *pevs, int npevs, -			  int max_tevs, bool force_add) +int add_perf_probe_events(struct perf_probe_event *pevs, int npevs)  {  	int i, j, ret;  	struct __event_package *pkgs; @@ -2619,20 +2804,24 @@ int add_perf_probe_events(struct perf_probe_event *pevs, int npevs,  	/* Loop 1: convert all events */  	for (i = 0; i < npevs; i++) {  		pkgs[i].pev = &pevs[i]; +		/* Init kprobe blacklist if needed */ +		if (!pkgs[i].pev->uprobes) +			kprobe_blacklist__init();  		/* Convert with or without debuginfo */  		ret  = convert_to_probe_trace_events(pkgs[i].pev, -						     &pkgs[i].tevs, -						     max_tevs, -						     pkgs[i].pev->target); +						     &pkgs[i].tevs);  		if (ret < 0)  			goto end;  		pkgs[i].ntevs = ret;  	} +	/* This just release blacklist only if allocated */ +	kprobe_blacklist__release();  	/* Loop 2: add all events */  	for (i = 0; i < npevs; i++) {  		ret = __add_probe_trace_events(pkgs[i].pev, pkgs[i].tevs, -						pkgs[i].ntevs, force_add); +					       pkgs[i].ntevs, +					       probe_conf.force_add);  		if (ret < 0)  			break;  	} @@ -2684,40 +2873,39 @@ error:  	return ret;  } -static int del_trace_probe_event(int fd, const char *buf, -						  struct strlist *namelist) +static int del_trace_probe_events(int fd, struct strfilter *filter, +				  struct strlist *namelist)  { -	struct str_node *ent, *n; -	int ret = -1; +	struct str_node *ent; +	const char *p; +	int ret = -ENOENT; -	if (strpbrk(buf, "*?")) { /* Glob-exp */ -		strlist__for_each_safe(ent, n, namelist) -			if (strglobmatch(ent->s, buf)) { -				ret = __del_trace_probe_event(fd, ent); -				if (ret < 0) -					break; -				strlist__remove(namelist, ent); -			} -	} else { -		ent = strlist__find(namelist, buf); -		if (ent) { +	if (!namelist) +		return -ENOENT; + +	strlist__for_each(ent, namelist) { +		p = strchr(ent->s, ':'); +		if ((p && strfilter__compare(filter, p + 1)) || +		    strfilter__compare(filter, ent->s)) {  			ret = __del_trace_probe_event(fd, ent); -			if (ret >= 0) -				strlist__remove(namelist, ent); +			if (ret < 0) +				break;  		}  	}  	return ret;  } -int del_perf_probe_events(struct strlist *dellist) +int del_perf_probe_events(struct strfilter *filter)  { -	int ret = -1, ufd = -1, kfd = -1; -	char buf[128]; -	const char *group, *event; -	char *p, *str; -	struct str_node *ent; +	int ret, ret2, ufd = -1, kfd = -1;  	struct strlist *namelist = NULL, *unamelist = NULL; +	char *str = strfilter__string(filter); + +	if (!str) +		return -EINVAL; + +	pr_debug("Delete filter: \'%s\'\n", str);  	/* Get current event names */  	kfd = open_kprobe_events(true); @@ -2730,49 +2918,23 @@ int del_perf_probe_events(struct strlist *dellist)  	if (kfd < 0 && ufd < 0) {  		print_both_open_warning(kfd, ufd); +		ret = kfd;  		goto error;  	} -	if (namelist == NULL && unamelist == NULL) +	ret = del_trace_probe_events(kfd, filter, namelist); +	if (ret < 0 && ret != -ENOENT)  		goto error; -	strlist__for_each(ent, dellist) { -		str = strdup(ent->s); -		if (str == NULL) { -			ret = -ENOMEM; -			goto error; -		} -		pr_debug("Parsing: %s\n", str); -		p = strchr(str, ':'); -		if (p) { -			group = str; -			*p = '\0'; -			event = p + 1; -		} else { -			group = "*"; -			event = str; -		} - -		ret = e_snprintf(buf, 128, "%s:%s", group, event); -		if (ret < 0) { -			pr_err("Failed to copy event."); -			free(str); -			goto error; -		} - -		pr_debug("Group: %s, Event: %s\n", group, event); - -		if (namelist) -			ret = del_trace_probe_event(kfd, buf, namelist); - -		if (unamelist && ret != 0) -			ret = del_trace_probe_event(ufd, buf, unamelist); - -		if (ret != 0) -			pr_info("Info: Event \"%s\" does not exist.\n", buf); - -		free(str); +	ret2 = del_trace_probe_events(ufd, filter, unamelist); +	if (ret2 < 0 && ret2 != -ENOENT) { +		ret = ret2; +		goto error;  	} +	if (ret == -ENOENT && ret2 == -ENOENT) +		pr_debug("\"%s\" does not hit any event.\n", str); +		/* Note that this is silently ignored */ +	ret = 0;  error:  	if (kfd >= 0) { @@ -2784,6 +2946,7 @@ error:  		strlist__delete(unamelist);  		close(ufd);  	} +	free(str);  	return ret;  } @@ -2837,8 +3000,7 @@ int show_available_funcs(const char *target, struct strfilter *_filter,  	dso__fprintf_symbols_by_name(map->dso, map->type, stdout);  end:  	if (user) { -		dso__delete(map->dso); -		map__delete(map); +		map__put(map);  	}  	exit_symbol_maps();  |