1 // SPDX-License-Identifier: GPL-2.0
3 * Common code for probe-based Dynamic events.
5 * This code was copied from kernel/trace/trace_kprobe.c written by
6 * Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
8 * Updates to make this generic:
9 * Copyright (C) IBM Corporation, 2010-2011
10 * Author: Srikar Dronamraju
12 #define pr_fmt(fmt) "trace_probe: " fmt
14 #include "trace_probe.h"
16 const char *reserved_field_names
[] = {
19 "common_preempt_count",
27 /* Printing in basic type function template */
28 #define DEFINE_BASIC_PRINT_TYPE_FUNC(tname, type, fmt) \
29 int PRINT_TYPE_FUNC_NAME(tname)(struct trace_seq *s, void *data, void *ent)\
31 trace_seq_printf(s, fmt, *(type *)data); \
32 return !trace_seq_has_overflowed(s); \
34 const char PRINT_TYPE_FMT_NAME(tname)[] = fmt;
36 DEFINE_BASIC_PRINT_TYPE_FUNC(u8
, u8
, "%u")
37 DEFINE_BASIC_PRINT_TYPE_FUNC(u16
, u16
, "%u")
38 DEFINE_BASIC_PRINT_TYPE_FUNC(u32
, u32
, "%u")
39 DEFINE_BASIC_PRINT_TYPE_FUNC(u64
, u64
, "%Lu")
40 DEFINE_BASIC_PRINT_TYPE_FUNC(s8
, s8
, "%d")
41 DEFINE_BASIC_PRINT_TYPE_FUNC(s16
, s16
, "%d")
42 DEFINE_BASIC_PRINT_TYPE_FUNC(s32
, s32
, "%d")
43 DEFINE_BASIC_PRINT_TYPE_FUNC(s64
, s64
, "%Ld")
44 DEFINE_BASIC_PRINT_TYPE_FUNC(x8
, u8
, "0x%x")
45 DEFINE_BASIC_PRINT_TYPE_FUNC(x16
, u16
, "0x%x")
46 DEFINE_BASIC_PRINT_TYPE_FUNC(x32
, u32
, "0x%x")
47 DEFINE_BASIC_PRINT_TYPE_FUNC(x64
, u64
, "0x%Lx")
49 int PRINT_TYPE_FUNC_NAME(symbol
)(struct trace_seq
*s
, void *data
, void *ent
)
51 trace_seq_printf(s
, "%pS", (void *)*(unsigned long *)data
);
52 return !trace_seq_has_overflowed(s
);
54 const char PRINT_TYPE_FMT_NAME(symbol
)[] = "%pS";
56 /* Print type function for string type */
57 int PRINT_TYPE_FUNC_NAME(string
)(struct trace_seq
*s
, void *data
, void *ent
)
59 int len
= *(u32
*)data
>> 16;
62 trace_seq_puts(s
, "(fault)");
64 trace_seq_printf(s
, "\"%s\"",
65 (const char *)get_loc_data(data
, ent
));
66 return !trace_seq_has_overflowed(s
);
69 const char PRINT_TYPE_FMT_NAME(string
)[] = "\\\"%s\\\"";
71 /* Fetch type information table */
72 static const struct fetch_type probe_fetch_types
[] = {
74 __ASSIGN_FETCH_TYPE("string", string
, string
, sizeof(u32
), 1,
77 ASSIGN_FETCH_TYPE(u8
, u8
, 0),
78 ASSIGN_FETCH_TYPE(u16
, u16
, 0),
79 ASSIGN_FETCH_TYPE(u32
, u32
, 0),
80 ASSIGN_FETCH_TYPE(u64
, u64
, 0),
81 ASSIGN_FETCH_TYPE(s8
, u8
, 1),
82 ASSIGN_FETCH_TYPE(s16
, u16
, 1),
83 ASSIGN_FETCH_TYPE(s32
, u32
, 1),
84 ASSIGN_FETCH_TYPE(s64
, u64
, 1),
85 ASSIGN_FETCH_TYPE_ALIAS(x8
, u8
, u8
, 0),
86 ASSIGN_FETCH_TYPE_ALIAS(x16
, u16
, u16
, 0),
87 ASSIGN_FETCH_TYPE_ALIAS(x32
, u32
, u32
, 0),
88 ASSIGN_FETCH_TYPE_ALIAS(x64
, u64
, u64
, 0),
89 ASSIGN_FETCH_TYPE_ALIAS(symbol
, ADDR_FETCH_TYPE
, ADDR_FETCH_TYPE
, 0),
94 static const struct fetch_type
*find_fetch_type(const char *type
)
99 type
= DEFAULT_FETCH_TYPE_STR
;
101 /* Special case: bitfield */
105 type
= strchr(type
, '/');
110 if (kstrtoul(type
, 0, &bs
))
115 return find_fetch_type("u8");
117 return find_fetch_type("u16");
119 return find_fetch_type("u32");
121 return find_fetch_type("u64");
127 for (i
= 0; probe_fetch_types
[i
].name
; i
++) {
128 if (strcmp(type
, probe_fetch_types
[i
].name
) == 0)
129 return &probe_fetch_types
[i
];
136 /* Split symbol and offset. */
137 int traceprobe_split_symbol_offset(char *symbol
, long *offset
)
145 tmp
= strpbrk(symbol
, "+-");
147 ret
= kstrtol(tmp
, 0, offset
);
157 /* @buf must has MAX_EVENT_NAME_LEN size */
158 int traceprobe_parse_event_name(const char **pevent
, const char **pgroup
,
161 const char *slash
, *event
= *pevent
;
163 slash
= strchr(event
, '/');
165 if (slash
== event
) {
166 pr_info("Group name is not specified\n");
169 if (slash
- event
+ 1 > MAX_EVENT_NAME_LEN
) {
170 pr_info("Group name is too long\n");
173 strlcpy(buf
, event
, slash
- event
+ 1);
177 if (strlen(event
) == 0) {
178 pr_info("Event name is not specified\n");
184 #define PARAM_MAX_STACK (THREAD_SIZE / sizeof(unsigned long))
186 static int parse_probe_vars(char *arg
, const struct fetch_type
*t
,
187 struct fetch_insn
*code
, unsigned int flags
)
193 if (strcmp(arg
, "retval") == 0) {
194 if (flags
& TPARG_FL_RETURN
)
195 code
->op
= FETCH_OP_RETVAL
;
198 } else if ((len
= str_has_prefix(arg
, "stack"))) {
199 if (arg
[len
] == '\0') {
200 code
->op
= FETCH_OP_STACKP
;
201 } else if (isdigit(arg
[len
])) {
202 ret
= kstrtoul(arg
+ len
, 10, ¶m
);
203 if (ret
|| ((flags
& TPARG_FL_KERNEL
) &&
204 param
> PARAM_MAX_STACK
))
207 code
->op
= FETCH_OP_STACK
;
208 code
->param
= (unsigned int)param
;
212 } else if (strcmp(arg
, "comm") == 0) {
213 code
->op
= FETCH_OP_COMM
;
214 #ifdef CONFIG_HAVE_FUNCTION_ARG_ACCESS_API
215 } else if (((flags
& TPARG_FL_MASK
) ==
216 (TPARG_FL_KERNEL
| TPARG_FL_FENTRY
)) &&
217 (len
= str_has_prefix(arg
, "arg"))) {
218 if (!isdigit(arg
[len
]))
220 ret
= kstrtoul(arg
+ len
, 10, ¶m
);
221 if (ret
|| !param
|| param
> PARAM_MAX_STACK
)
223 code
->op
= FETCH_OP_ARG
;
224 code
->param
= (unsigned int)param
- 1;
232 /* Recursive argument parser */
234 parse_probe_arg(char *arg
, const struct fetch_type
*type
,
235 struct fetch_insn
**pcode
, struct fetch_insn
*end
,
238 struct fetch_insn
*code
= *pcode
;
246 ret
= parse_probe_vars(arg
+ 1, type
, code
, flags
);
249 case '%': /* named register */
250 ret
= regs_query_register_offset(arg
+ 1);
252 code
->op
= FETCH_OP_REG
;
253 code
->param
= (unsigned int)ret
;
258 case '@': /* memory, file-offset or symbol */
259 if (isdigit(arg
[1])) {
260 ret
= kstrtoul(arg
+ 1, 0, ¶m
);
264 code
->op
= FETCH_OP_IMM
;
265 code
->immediate
= param
;
266 } else if (arg
[1] == '+') {
267 /* kprobes don't support file offsets */
268 if (flags
& TPARG_FL_KERNEL
)
271 ret
= kstrtol(arg
+ 2, 0, &offset
);
275 code
->op
= FETCH_OP_FOFFS
;
276 code
->immediate
= (unsigned long)offset
; // imm64?
278 /* uprobes don't support symbols */
279 if (!(flags
& TPARG_FL_KERNEL
))
282 /* Preserve symbol for updating */
283 code
->op
= FETCH_NOP_SYMBOL
;
284 code
->data
= kstrdup(arg
+ 1, GFP_KERNEL
);
290 code
->op
= FETCH_OP_IMM
;
293 /* These are fetching from memory */
297 code
->op
= FETCH_OP_DEREF
;
298 code
->offset
= offset
;
301 case '+': /* deref memory */
302 arg
++; /* Skip '+', because kstrtol() rejects it. */
304 tmp
= strchr(arg
, '(');
309 ret
= kstrtol(arg
, 0, &offset
);
314 tmp
= strrchr(arg
, ')');
317 const struct fetch_type
*t2
= find_fetch_type(NULL
);
320 ret
= parse_probe_arg(arg
, t2
, &code
, end
, flags
);
323 if (code
->op
== FETCH_OP_COMM
)
329 code
->op
= FETCH_OP_DEREF
;
330 code
->offset
= offset
;
334 if (!ret
&& code
->op
== FETCH_OP_NOP
) {
335 /* Parsed, but do not find fetch method */
341 #define BYTES_TO_BITS(nb) ((BITS_PER_LONG * (nb)) / sizeof(long))
343 /* Bitfield type needs to be parsed into a fetch function */
344 static int __parse_bitfield_probe_arg(const char *bf
,
345 const struct fetch_type
*t
,
346 struct fetch_insn
**pcode
)
348 struct fetch_insn
*code
= *pcode
;
349 unsigned long bw
, bo
;
355 bw
= simple_strtoul(bf
+ 1, &tail
, 0); /* Use simple one */
357 if (bw
== 0 || *tail
!= '@')
361 bo
= simple_strtoul(bf
, &tail
, 0);
363 if (tail
== bf
|| *tail
!= '/')
366 if (code
->op
!= FETCH_OP_NOP
)
370 code
->op
= FETCH_OP_MOD_BF
;
371 code
->lshift
= BYTES_TO_BITS(t
->size
) - (bw
+ bo
);
372 code
->rshift
= BYTES_TO_BITS(t
->size
) - bw
;
373 code
->basesize
= t
->size
;
375 return (BYTES_TO_BITS(t
->size
) < (bw
+ bo
)) ? -EINVAL
: 0;
378 /* String length checking wrapper */
379 static int traceprobe_parse_probe_arg_body(char *arg
, ssize_t
*size
,
380 struct probe_arg
*parg
, unsigned int flags
)
382 struct fetch_insn
*code
, *scode
, *tmp
= NULL
;
386 if (strlen(arg
) > MAX_ARGSTR_LEN
) {
387 pr_info("Argument is too long.: %s\n", arg
);
390 parg
->comm
= kstrdup(arg
, GFP_KERNEL
);
392 pr_info("Failed to allocate memory for command '%s'.\n", arg
);
395 t
= strchr(arg
, ':');
398 t2
= strchr(++t
, '[');
401 parg
->count
= simple_strtoul(t2
+ 1, &t2
, 0);
402 if (strcmp(t2
, "]") || parg
->count
== 0)
404 if (parg
->count
> MAX_ARRAY_LEN
)
409 * The default type of $comm should be "string", and it can't be
412 if (!t
&& strcmp(arg
, "$comm") == 0)
413 parg
->type
= find_fetch_type("string");
415 parg
->type
= find_fetch_type(t
);
417 pr_info("Unsupported type: %s\n", t
);
420 parg
->offset
= *size
;
421 *size
+= parg
->type
->size
* (parg
->count
?: 1);
424 len
= strlen(parg
->type
->fmttype
) + 6;
425 parg
->fmt
= kmalloc(len
, GFP_KERNEL
);
428 snprintf(parg
->fmt
, len
, "%s[%d]", parg
->type
->fmttype
,
432 code
= tmp
= kzalloc(sizeof(*code
) * FETCH_INSN_MAX
, GFP_KERNEL
);
435 code
[FETCH_INSN_MAX
- 1].op
= FETCH_OP_END
;
437 ret
= parse_probe_arg(arg
, parg
->type
, &code
, &code
[FETCH_INSN_MAX
- 1],
442 /* Store operation */
443 if (!strcmp(parg
->type
->name
, "string")) {
444 if (code
->op
!= FETCH_OP_DEREF
&& code
->op
!= FETCH_OP_IMM
&&
445 code
->op
!= FETCH_OP_COMM
) {
446 pr_info("string only accepts memory or address.\n");
450 if (code
->op
!= FETCH_OP_DEREF
|| parg
->count
) {
452 * IMM and COMM is pointing actual address, those must
453 * be kept, and if parg->count != 0, this is an array
454 * of string pointers instead of string address itself.
457 if (code
->op
!= FETCH_OP_NOP
) {
462 code
->op
= FETCH_OP_ST_STRING
; /* In DEREF case, replace it */
463 code
->size
= parg
->type
->size
;
464 parg
->dynamic
= true;
465 } else if (code
->op
== FETCH_OP_DEREF
) {
466 code
->op
= FETCH_OP_ST_MEM
;
467 code
->size
= parg
->type
->size
;
470 if (code
->op
!= FETCH_OP_NOP
) {
474 code
->op
= FETCH_OP_ST_RAW
;
475 code
->size
= parg
->type
->size
;
478 /* Modify operation */
480 ret
= __parse_bitfield_probe_arg(t
, parg
->type
, &code
);
484 /* Loop(Array) operation */
486 if (scode
->op
!= FETCH_OP_ST_MEM
&&
487 scode
->op
!= FETCH_OP_ST_STRING
) {
488 pr_info("array only accepts memory or address\n");
493 if (code
->op
!= FETCH_OP_NOP
) {
497 code
->op
= FETCH_OP_LP_ARRAY
;
498 code
->param
= parg
->count
;
501 code
->op
= FETCH_OP_END
;
503 /* Shrink down the code buffer */
504 parg
->code
= kzalloc(sizeof(*code
) * (code
- tmp
+ 1), GFP_KERNEL
);
508 memcpy(parg
->code
, tmp
, sizeof(*code
) * (code
- tmp
+ 1));
512 for (code
= tmp
; code
< tmp
+ FETCH_INSN_MAX
; code
++)
513 if (code
->op
== FETCH_NOP_SYMBOL
)
521 /* Return 1 if name is reserved or already used by another argument */
522 static int traceprobe_conflict_field_name(const char *name
,
523 struct probe_arg
*args
, int narg
)
527 for (i
= 0; i
< ARRAY_SIZE(reserved_field_names
); i
++)
528 if (strcmp(reserved_field_names
[i
], name
) == 0)
531 for (i
= 0; i
< narg
; i
++)
532 if (strcmp(args
[i
].name
, name
) == 0)
538 int traceprobe_parse_probe_arg(struct trace_probe
*tp
, int i
, char *arg
,
541 struct probe_arg
*parg
= &tp
->args
[i
];
545 /* Increment count for freeing args in error case */
548 body
= strchr(arg
, '=');
550 parg
->name
= kmemdup_nul(arg
, body
- arg
, GFP_KERNEL
);
553 /* If argument name is omitted, set "argN" */
554 parg
->name
= kasprintf(GFP_KERNEL
, "arg%d", i
+ 1);
560 if (!is_good_name(parg
->name
)) {
561 pr_info("Invalid argument[%d] name: %s\n",
566 if (traceprobe_conflict_field_name(parg
->name
, tp
->args
, i
)) {
567 pr_info("Argument[%d]: '%s' conflicts with another field.\n",
572 /* Parse fetch argument */
573 ret
= traceprobe_parse_probe_arg_body(body
, &tp
->size
, parg
, flags
);
575 pr_info("Parse error at argument[%d]. (%d)\n", i
, ret
);
579 void traceprobe_free_probe_arg(struct probe_arg
*arg
)
581 struct fetch_insn
*code
= arg
->code
;
583 while (code
&& code
->op
!= FETCH_OP_END
) {
584 if (code
->op
== FETCH_NOP_SYMBOL
)
594 int traceprobe_update_arg(struct probe_arg
*arg
)
596 struct fetch_insn
*code
= arg
->code
;
602 while (code
&& code
->op
!= FETCH_OP_END
) {
603 if (code
->op
== FETCH_NOP_SYMBOL
) {
604 if (code
[1].op
!= FETCH_OP_IMM
)
607 tmp
= strpbrk(code
->data
, "+-");
610 ret
= traceprobe_split_symbol_offset(code
->data
,
616 (unsigned long)kallsyms_lookup_name(code
->data
);
619 if (!code
[1].immediate
)
621 code
[1].immediate
+= offset
;
628 /* When len=0, we just calculate the needed length */
629 #define LEN_OR_ZERO (len ? len - pos : 0)
630 static int __set_print_fmt(struct trace_probe
*tp
, char *buf
, int len
,
633 struct probe_arg
*parg
;
636 const char *fmt
, *arg
;
640 arg
= "REC->" FIELD_STRING_IP
;
642 fmt
= "(%lx <- %lx)";
643 arg
= "REC->" FIELD_STRING_FUNC
", REC->" FIELD_STRING_RETIP
;
646 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, "\"%s", fmt
);
648 for (i
= 0; i
< tp
->nr_args
; i
++) {
650 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, " %s=", parg
->name
);
652 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, "{%s",
654 for (j
= 1; j
< parg
->count
; j
++)
655 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, ",%s",
657 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, "}");
659 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, "%s",
663 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
, "\", %s", arg
);
665 for (i
= 0; i
< tp
->nr_args
; i
++) {
668 if (strcmp(parg
->type
->name
, "string") == 0)
669 fmt
= ", __get_str(%s[%d])";
671 fmt
= ", REC->%s[%d]";
672 for (j
= 0; j
< parg
->count
; j
++)
673 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
,
676 if (strcmp(parg
->type
->name
, "string") == 0)
677 fmt
= ", __get_str(%s)";
680 pos
+= snprintf(buf
+ pos
, LEN_OR_ZERO
,
685 /* return the length of print_fmt */
690 int traceprobe_set_print_fmt(struct trace_probe
*tp
, bool is_return
)
695 /* First: called with 0 length to calculate the needed length */
696 len
= __set_print_fmt(tp
, NULL
, 0, is_return
);
697 print_fmt
= kmalloc(len
+ 1, GFP_KERNEL
);
701 /* Second: actually write the @print_fmt */
702 __set_print_fmt(tp
, print_fmt
, len
+ 1, is_return
);
703 tp
->call
.print_fmt
= print_fmt
;
708 int traceprobe_define_arg_fields(struct trace_event_call
*event_call
,
709 size_t offset
, struct trace_probe
*tp
)
713 /* Set argument names as fields */
714 for (i
= 0; i
< tp
->nr_args
; i
++) {
715 struct probe_arg
*parg
= &tp
->args
[i
];
716 const char *fmt
= parg
->type
->fmttype
;
717 int size
= parg
->type
->size
;
723 ret
= trace_define_field(event_call
, fmt
, parg
->name
,
724 offset
+ parg
->offset
, size
,
725 parg
->type
->is_signed
,